User manual ACRONIS PRIVACY EXPERT SUITE 9.0
Lastmanuals offers a socially driven service of sharing, storing and searching manuals related to use of hardware and software : user guide, owner's manual, quick start guide, technical datasheets... DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!
If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Lastmanuals provides you a fast and easy access to the user manual ACRONIS PRIVACY EXPERT SUITE 9.0. We hope that this ACRONIS PRIVACY EXPERT SUITE 9.0 user guide will be useful to you.
Lastmanuals help download the user guide ACRONIS PRIVACY EXPERT SUITE 9.0.
Manual abstract: user guide ACRONIS PRIVACY EXPERT SUITE 9.0
Detailed instructions for use are in the User's Guide.
[. . . ] User's Guide
Acronis Privacy Expert Suite 9. 0
Compute with confidence
www. acronis. com
Copyright © Acronis, Inc. , 2000-2005. Linux is a registered trademark of Linus Torvalds. OS/2 is a registered trademark of IBM Corporation. UNIX is a registered trademark of The Open Group. [. . . ] After malicious software clean-up is finished, you will see a summary that will state the amount of malicious software applications removed.
In Windows normal mode some malicious applications are usually stay hidden so you can not see them and track their work. Therefore, we recommend you to launch the Malicious Software Wizard in Windows safe mode periodically in addition to scanning malware in normal mode. To run Windows in safe mode press <F8> key after your computer starts (restarts) but before Windows launches.
3. 1. 2 Setting up the Malicious Software Wizard
To set up the Malicious Software Wizard, select Configure Malware Removal Options in the Malware Removal window.
Selecting scanning mode
There are two modes of searching for malware: Smart scanning mode used by default. In this case, the suite searches for malware only in the most likely locations, including system, user profile and temporary files folders, as well as in the system registry. Deep scanning mode an extended algorithm for malware scanning. In this case, all folders on all PC hard drives are searched. This variant could take much more time depending on the capacity of your hard disks.
Copyright © Acronis, Inc. , 2000-2005
25
Malicious software removal and Malware shield
Malicious software scanning modes
Setting up Deep scanning mode
If you selected Deep scanning mode, you can manually select disks and folders in which to search for malware:
Disk and folders selection
Saving settings
All Malicious Software Wizard settings will be active until you change them.
3. 2
Malicious software protection
Acronis Privacy Expert Suite not only allows you to remove malicious software, but also prevent it from getting on your PC in the first place. This is provided by
26
Copyright © Acronis, Inc. , 2000-2005
Malicious software removal and Malware shield
Acronis Malware shield -- a special tool that monitors your system for suspicious applications and components.
3. 2. 1 Enabling Malware shield
To enable Malware shield, select Start Programs Acronis Malware shield Acronis Malware shield. After Malware shield is enabled, you will see its icon in the system tray. To disable Malware shield right click the Acronis Malware shield icon in the system tray and select Disable Acronis Malware shield.
3. 2. 2 Setting up Malware shield
You can configure the Malware shield settings. To do so, right click on the Acronis Malware shield icon in the system tray and select Acronis Malware Shield Options.
Setting up the system protection level
You can set up the Protection Level monitoring your system for malicious software and applications: Low protection level monitors only all running processes and notifies you if a process is described in malicious software database. Medium protection level monitors all running processes and notifies you if a process is described in malicious software database. It also prevents suspicious processes from launching at Windows startup, prevents Web browser settings from hijacking and protects ActiveX components settings. It includes all Medium level protections and also protects all processes and Windows system files. This is the recommended setting for experienced users.
Copyright © Acronis, Inc. , 2000-2005
27
Malicious software removal and Malware shield
System protection level
To view and/or customize options of the selected protection level click Options.
General settings
In the General settings window, you can enable Acronis Malware Shield protecting your system and running at system startup.
General settings window
Having set up all settings, you can apply changes by clicking Apply button. Use Cancel button to if you do not want changes to be applied.
28
Copyright © Acronis, Inc. , 2000-2005
Malicious software removal and Malware shield
Process analyzing
You can enable/disable analyzing of the running processes by checking the corresponding parameter.
Process analyzing
Registry protection
In the Registry protection section, you can enable/disable: Browser settings protection from hijacking by suspicious applications Preventing suspicious software and processes from launching at system startup Protection of the ActiveX components settings Preventing application from sharing resources or changing settings of shared resources
Copyright © Acronis, Inc. , 2000-2005
29
Malicious software removal and Malware shield
Registry protection
Memory protection
In the Memory protection section, you can enable/disable: Process' thread access protection from other processes Process' virtual memory protection from trying to get access to any other process memory Process terminating protection
30
Copyright © Acronis, Inc. , 2000-2005
Malicious software removal and Malware shield
Process protection
File protection
In the File protection section, you can enable/disable protection your system files, critical to Windows work.
Specified rules
The Specified rules section contains a list of protection rules that you specified. You can remove selected rule by clicking Remove or use Clear all to remove all entries.
Copyright © Acronis, Inc. , 2000-2005
31
Malicious software removal and Malware shield
Specified rules
History
The History section contents a list of all events occurred, so you can view and analyze it. Use Clear all button to remove all list entries.
History window
Show alerts
You can select an unresolved alert (or group of alerts), view its description and choose an action to be taken with it.
32 Copyright © Acronis, Inc. , 2000-2005
Malicious software removal and Malware shield
To extend the chosen action to all other alerts of the same activity type check the Propagate this action to all alerts of the same activity type parameter. You can also choose how to apply specified action (Once, This time and specify the permanent rule or This time and always until the process is restarted).
Alert window
You can close Alert window, outing off rule creation. As a result the Malware Shield's pictogram in the system tray will start to blink, notifying that you have unresolved alerts. To open Malware Shield Alert window double click on the Malware Shield's pictogram in the system tray.
3. 3
Quarantine
The Malicious Software Wizard removes all the malicious programs from the system and stores them in the special protected directory called Quarantine. You can either permanently delete the removed objects (files, registry keys etc. ) from Quarantine or restore them if needed (fore example, if your system works unstable as a result of malware removal). [. . . ] It's based on his theory of hard disk information wiping (see http://www. cs. auckland. ac. nz/~pgut001 /pubs/secure_del. html). Bruce Schneier offers a seven-pass overwriting method in his Applied Cryptography book. 1st pass 0xFF, 2nd pass 0x00, and then five times with a cryptographically secure pseudo-random sequence. Logical zeros (0x00 numbers) to all sectors to wipe.
2. [. . . ]
DISCLAIMER TO DOWNLOAD THE USER GUIDE ACRONIS PRIVACY EXPERT SUITE 9.0 Lastmanuals offers a socially driven service of sharing, storing and searching manuals related to use of hardware and software : user guide, owner's manual, quick start guide, technical datasheets... In any way can't Lastmanuals be held responsible if the document you are looking for is not available, incomplete, in a different language than yours, or if the model or language do not match the description. Lastmanuals, for instance, does not offer a translation service. Click on "Download the user manual" at the end of this Contract if you accept its terms, the downloading of the manual ACRONIS PRIVACY EXPERT SUITE 9.0 will begin.