User manual ACRONIS PRIVACY EXPERT SUITE 9.0

Lastmanuals offers a socially driven service of sharing, storing and searching manuals related to use of hardware and software : user guide, owner's manual, quick start guide, technical datasheets... DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!

If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Lastmanuals provides you a fast and easy access to the user manual ACRONIS PRIVACY EXPERT SUITE 9.0. We hope that this ACRONIS PRIVACY EXPERT SUITE 9.0 user guide will be useful to you.

Lastmanuals help download the user guide ACRONIS PRIVACY EXPERT SUITE 9.0.


Mode d'emploi ACRONIS PRIVACY EXPERT SUITE 9.0
Download
Manual abstract: user guide ACRONIS PRIVACY EXPERT SUITE 9.0

Detailed instructions for use are in the User's Guide.

[. . . ] User's Guide Acronis Privacy Expert Suite 9. 0 Compute with confidence www. acronis. com Copyright © Acronis, Inc. , 2000-2005. Linux is a registered trademark of Linus Torvalds. OS/2 is a registered trademark of IBM Corporation. UNIX is a registered trademark of The Open Group. [. . . ] After malicious software clean-up is finished, you will see a summary that will state the amount of malicious software applications removed. In Windows normal mode some malicious applications are usually stay hidden so you can not see them and track their work. Therefore, we recommend you to launch the Malicious Software Wizard in Windows safe mode periodically in addition to scanning malware in normal mode. To run Windows in safe mode press <F8> key after your computer starts (restarts) but before Windows launches. 3. 1. 2 Setting up the Malicious Software Wizard To set up the Malicious Software Wizard, select Configure Malware Removal Options in the Malware Removal window. Selecting scanning mode There are two modes of searching for malware: Smart scanning mode ­ used by default. In this case, the suite searches for malware only in the most likely locations, including system, user profile and temporary files folders, as well as in the system registry. Deep scanning mode ­ an extended algorithm for malware scanning. In this case, all folders on all PC hard drives are searched. This variant could take much more time depending on the capacity of your hard disks. Copyright © Acronis, Inc. , 2000-2005 25 Malicious software removal and Malware shield Malicious software scanning modes Setting up Deep scanning mode If you selected Deep scanning mode, you can manually select disks and folders in which to search for malware: Disk and folders selection Saving settings All Malicious Software Wizard settings will be active until you change them. 3. 2 Malicious software protection Acronis Privacy Expert Suite not only allows you to remove malicious software, but also prevent it from getting on your PC in the first place. This is provided by 26 Copyright © Acronis, Inc. , 2000-2005 Malicious software removal and Malware shield Acronis Malware shield -- a special tool that monitors your system for suspicious applications and components. 3. 2. 1 Enabling Malware shield To enable Malware shield, select Start Programs Acronis Malware shield Acronis Malware shield. After Malware shield is enabled, you will see its icon in the system tray. To disable Malware shield right click the Acronis Malware shield icon in the system tray and select Disable Acronis Malware shield. 3. 2. 2 Setting up Malware shield You can configure the Malware shield settings. To do so, right click on the Acronis Malware shield icon in the system tray and select Acronis Malware Shield Options. Setting up the system protection level You can set up the Protection Level monitoring your system for malicious software and applications: Low protection level monitors only all running processes and notifies you if a process is described in malicious software database. Medium protection level monitors all running processes and notifies you if a process is described in malicious software database. It also prevents suspicious processes from launching at Windows startup, prevents Web browser settings from hijacking and protects ActiveX components settings. It includes all Medium level protections and also protects all processes and Windows system files. This is the recommended setting for experienced users. Copyright © Acronis, Inc. , 2000-2005 27 Malicious software removal and Malware shield System protection level To view and/or customize options of the selected protection level click Options. General settings In the General settings window, you can enable Acronis Malware Shield protecting your system and running at system startup. General settings window Having set up all settings, you can apply changes by clicking Apply button. Use Cancel button to if you do not want changes to be applied. 28 Copyright © Acronis, Inc. , 2000-2005 Malicious software removal and Malware shield Process analyzing You can enable/disable analyzing of the running processes by checking the corresponding parameter. Process analyzing Registry protection In the Registry protection section, you can enable/disable: Browser settings protection from hijacking by suspicious applications Preventing suspicious software and processes from launching at system startup Protection of the ActiveX components settings Preventing application from sharing resources or changing settings of shared resources Copyright © Acronis, Inc. , 2000-2005 29 Malicious software removal and Malware shield Registry protection Memory protection In the Memory protection section, you can enable/disable: Process' thread access protection from other processes Process' virtual memory protection from trying to get access to any other process memory Process terminating protection 30 Copyright © Acronis, Inc. , 2000-2005 Malicious software removal and Malware shield Process protection File protection In the File protection section, you can enable/disable protection your system files, critical to Windows work. Specified rules The Specified rules section contains a list of protection rules that you specified. You can remove selected rule by clicking Remove or use Clear all to remove all entries. Copyright © Acronis, Inc. , 2000-2005 31 Malicious software removal and Malware shield Specified rules History The History section contents a list of all events occurred, so you can view and analyze it. Use Clear all button to remove all list entries. History window Show alerts You can select an unresolved alert (or group of alerts), view its description and choose an action to be taken with it. 32 Copyright © Acronis, Inc. , 2000-2005 Malicious software removal and Malware shield To extend the chosen action to all other alerts of the same activity type check the Propagate this action to all alerts of the same activity type parameter. You can also choose how to apply specified action (Once, This time and specify the permanent rule or This time and always until the process is restarted). Alert window You can close Alert window, outing off rule creation. As a result the Malware Shield's pictogram in the system tray will start to blink, notifying that you have unresolved alerts. To open Malware Shield Alert window double click on the Malware Shield's pictogram in the system tray. 3. 3 Quarantine The Malicious Software Wizard removes all the malicious programs from the system and stores them in the special protected directory called Quarantine. You can either permanently delete the removed objects (files, registry keys etc. ) from Quarantine or restore them if needed (fore example, if your system works unstable as a result of malware removal). [. . . ] It's based on his theory of hard disk information wiping (see http://www. cs. auckland. ac. nz/~pgut001 /pubs/secure_del. html). Bruce Schneier offers a seven-pass overwriting method in his Applied Cryptography book. 1st pass ­ 0xFF, 2nd pass ­ 0x00, and then five times with a cryptographically secure pseudo-random sequence. Logical zeros (0x00 numbers) to all sectors to wipe. 2. [. . . ]

DISCLAIMER TO DOWNLOAD THE USER GUIDE ACRONIS PRIVACY EXPERT SUITE 9.0

Lastmanuals offers a socially driven service of sharing, storing and searching manuals related to use of hardware and software : user guide, owner's manual, quick start guide, technical datasheets...
In any way can't Lastmanuals be held responsible if the document you are looking for is not available, incomplete, in a different language than yours, or if the model or language do not match the description. Lastmanuals, for instance, does not offer a translation service.

Click on "Download the user manual" at the end of this Contract if you accept its terms, the downloading of the manual ACRONIS PRIVACY EXPERT SUITE 9.0 will begin.

Search for a user manual

 

Copyright © 2015 - LastManuals - All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.

flag