User manual ACRONIS PRIVACY EXPERT SUITE 9.0

DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!

If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Diplodocs provides you a fast and easy access to the user manual ACRONIS PRIVACY EXPERT SUITE 9.0. We hope that this ACRONIS PRIVACY EXPERT SUITE 9.0 user guide will be useful to you.


ACRONIS PRIVACY EXPERT SUITE 9.0 : Download the complete user guide (3494 Ko)

Manual abstract: user guide ACRONIS PRIVACY EXPERT SUITE 9.0

Detailed instructions for use are in the User's Guide.

[. . . ] User's Guide Acronis Privacy Expert Suite 9. 0 Compute with confidence www. acronis. com Copyright © Acronis, Inc. , 2000-2005. Windows and MS-DOS are registered trademarks of Microsoft Corporation. All other trademarks and copyrights referred to are the property of their respective owners. Distribution of substantively modified versions of this document is prohibited without the explicit permission of the copyright holder. [. . . ] All malicious software found will be automatically checked for removal. If you, want to leave some malicious applications or their components, uncheck them in the resulting list. This option gives you the ability to keep those programs and/or settings. ) 24 Copyright © Acronis, Inc. , 2000-2005 Malicious software removal and Malware shield After you finish forming the list of malicious software to be removed, click Next. In the next window, you will see the final script of malicious software removal operations. Malicious software removal operations final script To execute the script, click Proceed. After malicious software clean-up is finished, you will see a summary that will state the amount of malicious software applications removed. In Windows normal mode some malicious applications are usually stay hidden so you can not see them and track their work. Therefore, we recommend you to launch the Malicious Software Wizard in Windows safe mode periodically in addition to scanning malware in normal mode. To run Windows in safe mode press <F8> key after your computer starts (restarts) but before Windows launches. 3. 1. 2 Setting up the Malicious Software Wizard To set up the Malicious Software Wizard, select Configure Malware Removal Options in the Malware Removal window. Selecting scanning mode There are two modes of searching for malware: Smart scanning mode ­ used by default. In this case, the suite searches for malware only in the most likely locations, including system, user profile and temporary files folders, as well as in the system registry. This variant could take much more time depending on the capacity of your hard disks. Copyright © Acronis, Inc. , 2000-2005 25 Malicious software removal and Malware shield Malicious software scanning modes Setting up Deep scanning mode If you selected Deep scanning mode, you can manually select disks and folders in which to search for malware: Disk and folders selection Saving settings All Malicious Software Wizard settings will be active until you change them. 3. 2 Malicious software protection Acronis Privacy Expert Suite not only allows you to remove malicious software, but also prevent it from getting on your PC in the first place. This is provided by 26 Copyright © Acronis, Inc. , 2000-2005 Malicious software removal and Malware shield Acronis Malware shield -- a special tool that monitors your system for suspicious applications and components. 3. 2. 1 Enabling Malware shield To enable Malware shield, select Start Programs Acronis Malware shield Acronis Malware shield. After Malware shield is enabled, you will see its icon in the system tray. To disable Malware shield right click the Acronis Malware shield icon in the system tray and select Disable Acronis Malware shield. 3. 2. 2 Setting up Malware shield You can configure the Malware shield settings. To do so, right click on the Acronis Malware shield icon in the system tray and select Acronis Malware Shield Options. Setting up the system protection level You can set up the Protection Level monitoring your system for malicious software and applications: Low protection level monitors only all running processes and notifies you if a process is described in malicious software database. Medium protection level monitors all running processes and notifies you if a process is described in malicious software database. It also prevents suspicious processes from launching at Windows startup, prevents Web browser settings from hijacking and protects ActiveX components settings. It includes all Medium level protections and also protects all processes and Windows system files. This is the recommended setting for experienced users. Copyright © Acronis, Inc. , 2000-2005 27 Malicious software removal and Malware shield System protection level To view and/or customize options of the selected protection level click Options. General settings In the General settings window, you can enable Acronis Malware Shield protecting your system and running at system startup. General settings window Having set up all settings, you can apply changes by clicking Apply button. Use Cancel button to if you do not want changes to be applied. 28 Copyright © Acronis, Inc. , 2000-2005 Malicious software removal and Malware shield Process analyzing You can enable/disable analyzing of the running processes by checking the corresponding parameter. Process analyzing Registry protection In the Registry protection section, you can enable/disable: Browser settings protection from hijacking by suspicious applications Preventing suspicious software and processes from launching at system startup Protection of the ActiveX components settings Preventing application from sharing resources or changing settings of shared resources Copyright © Acronis, Inc. , 2000-2005 29 Malicious software removal and Malware shield Registry protection Memory protection In the Memory protection section, you can enable/disable: Process' thread access protection from other processes Process' virtual memory protection from trying to get access to any other process memory Process terminating protection 30 Copyright © Acronis, Inc. , 2000-2005 Malicious software removal and Malware shield Process protection File protection In the File protection section, you can enable/disable protection your system files, critical to Windows work. Specified rules The Specified rules section contains a list of protection rules that you specified. You can remove selected rule by clicking Remove or use Clear all to remove all entries. Copyright © Acronis, Inc. , 2000-2005 31 Malicious software removal and Malware shield Specified rules History The History section contents a list of all events occurred, so you can view and analyze it. Use Clear all button to remove all list entries. History window Show alerts You can select an unresolved alert (or group of alerts), view its description and choose an action to be taken with it. 32 Copyright © Acronis, Inc. , 2000-2005 Malicious software removal and Malware shield To extend the chosen action to all other alerts of the same activity type check the Propagate this action to all alerts of the same activity type parameter. You can also choose how to apply specified action (Once, This time and specify the permanent rule or This time and always until the process is restarted). Alert window You can close Alert window, outing off rule creation. As a result the Malware Shield's pictogram in the system tray will start to blink, notifying that you have unresolved alerts. [. . . ] Logical zeros (0x00 numbers) to each byte of each sector for 6th to 4th security level systems. Randomly selected symbols (numbers) to each byte of each sector for 3rd to 1st security level systems. It's based on his theory of hard disk information wiping (see http://www. cs. auckland. ac. nz/~pgut001 /pubs/secure_del. html). Bruce Schneier offers a seven-pass overwriting method in his Applied Cryptography book. [. . . ]

DISCLAIMER TO DOWNLOAD THE USER GUIDE ACRONIS PRIVACY EXPERT SUITE 9.0




Click on "Download the user Manual" at the end of this Contract if you accept its terms, the downloading of the manual ACRONIS PRIVACY EXPERT SUITE 9.0 will begin.

 

Copyright © 2015 - manualRetreiver - All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.