ACRONIS PRIVACY EXPERT SUITE 7.0 User Manual page 5

Table of Contents

Advertisement

4.1.1
Recycle Bin ........................................................................................................................ 29
4.1.2
Temporary Files ................................................................................................................. 30
4.1.3
Hard Disk Free Space ........................................................................................................ 30
4.1.4
Custom Folders/Files ......................................................................................................... 31
4.1.5
Registry Backups ............................................................................................................... 31
4.1.6
Find Computers List ........................................................................................................... 32
4.1.7
Find Files List ..................................................................................................................... 33
4.1.8
Recently Used Documents List .......................................................................................... 33
4.1.9
Windows Run List............................................................................................................... 34
4.1.10
Opened/Saved Files History............................................................................................... 34
4.2
Internet components................................................................................................. 35
4.2.1
Internet Cache.................................................................................................................... 35
4.2.2
Cookies .............................................................................................................................. 36
4.2.3
Downloaded components ................................................................................................... 38
4.2.4
Last Visited Pages.............................................................................................................. 39
4.2.5
Typed URLs ....................................................................................................................... 40
4.2.6
Passwords.......................................................................................................................... 41
4.2.7
Forms autocomplete clean-up ............................................................................................ 42
4.2.8
E-mail messages................................................................................................................ 43
4.2.9
E-mail contacts................................................................................................................... 43
4.3
Spyware clean-up..................................................................................................... 43
4.3.1
Spyware threats ................................................................................................................. 44
4.3.2
Browser pages hijacking..................................................................................................... 44
4.3.3
IE Trusted Sites.................................................................................................................. 45
ACRONIS PRIVACY EXPERT POP-UP BLOCKER ........................................... 46
5.1
What are pop-ups? ................................................................................................... 46
5.2
Acronis Privacy Expert Pop-up Blocker ................................................................... 46
5.3
Pop-up Blocker settings ........................................................................................... 46
5.3.1
Acronis Privacy Expert Pop-up Blocker general settings.................................................... 47
5.3.2
Browsed history.................................................................................................................. 47
5.3.3
Blocked URLs .................................................................................................................... 47
5.3.4
White URLs ........................................................................................................................ 47
5.3.5
Black URLs ........................................................................................................................ 47
ACRONIS DRIVE CLEANSER............................................................................. 48
6.1
Acronis Drive Cleanser capabilities.......................................................................... 48
6.2
Working with Acronis Drive Cleanser....................................................................... 48
6.3
Using preset data destruction methods.................................................................... 49
6.4
Creating custom methods of data destruction.......................................................... 50
6.4.1
Creating custom methods .................................................................................................. 50
6.4.2
Method definition: template ................................................................................................ 52
6.4.3
Saving a custom method to file .......................................................................................... 55
6.4.4
Loading an method from a file ............................................................................................ 57
6.5
HARD DISK WIPING METHODS ........................................................................ 59
A.1
Information wiping methods functioning principles................................................... 59
A.2
Information wiping methods used by Acronis........................................................... 60
5

Advertisement

Table of Contents
loading

Table of Contents