4.1.1
Recycle Bin ........................................................................................................................ 29
4.1.2
Temporary Files ................................................................................................................. 30
4.1.3
Hard Disk Free Space ........................................................................................................ 30
4.1.4
Custom Folders/Files ......................................................................................................... 31
4.1.5
Registry Backups ............................................................................................................... 31
4.1.6
Find Computers List ........................................................................................................... 32
4.1.7
Find Files List ..................................................................................................................... 33
4.1.8
4.1.9
Windows Run List............................................................................................................... 34
4.1.10
4.2
Internet components................................................................................................. 35
4.2.1
Internet Cache.................................................................................................................... 35
4.2.2
Cookies .............................................................................................................................. 36
4.2.3
Downloaded components ................................................................................................... 38
4.2.4
Last Visited Pages.............................................................................................................. 39
4.2.5
Typed URLs ....................................................................................................................... 40
4.2.6
Passwords.......................................................................................................................... 41
4.2.7
4.2.8
E-mail messages................................................................................................................ 43
4.2.9
E-mail contacts................................................................................................................... 43
4.3
Spyware clean-up..................................................................................................... 43
4.3.1
Spyware threats ................................................................................................................. 44
4.3.2
Browser pages hijacking..................................................................................................... 44
4.3.3
IE Trusted Sites.................................................................................................................. 45
5.1
What are pop-ups? ................................................................................................... 46
5.2
5.3
Pop-up Blocker settings ........................................................................................... 46
5.3.1
5.3.2
Browsed history.................................................................................................................. 47
5.3.3
Blocked URLs .................................................................................................................... 47
5.3.4
White URLs ........................................................................................................................ 47
5.3.5
Black URLs ........................................................................................................................ 47
6.1
6.2
6.3
6.4
6.4.1
Creating custom methods .................................................................................................. 50
6.4.2
6.4.3
6.4.4
6.5
A.1
A.2
5