5.1
Product registration .................................................................................................. 29
5.2
5.2.1
5.2.2
5.2.3
Selecting update mode....................................................................................................... 30
5.2.4
Setting the schedule........................................................................................................... 31
5.2.5
6.1
What are pop-ups? ................................................................................................... 33
6.2
Acronis Pop-up Blocker............................................................................................ 33
6.3
6.3.1
6.3.2
Last visited pages............................................................................................................... 34
6.3.3
Blocked URLs .................................................................................................................... 34
6.3.4
White URLs ........................................................................................................................ 34
6.3.5
Black URLs ........................................................................................................................ 35
OTHER OPERATIONS......................................................................................... 36
7.1
7.2
Adware .............................................................................................................................................. 38
Browser Helper Objects..................................................................................................................... 38
Browser hijackers .............................................................................................................................. 38
Commercial keylogger....................................................................................................................... 38
Dialers ............................................................................................................................................... 38
Exploit/Security holes ........................................................................................................................ 39
Remote Administration ...................................................................................................................... 39
Sniffers .............................................................................................................................................. 39
Spyware ............................................................................................................................................ 39
Toolbars ............................................................................................................................................ 39
Trojan Horses (Trojans) .................................................................................................................... 39
Copyright © Acronis, Inc., 2000-2005
5