Acronis power utilities User Manual
7. clean the last visited pages and last used documents list;
8. delete
8. delete
the
evidence of searching for files on connected disks, for
networked computers, for information on the Internet;
9. clean
Internet cache;
10. delete cookies
11. delete downloaded components;
12. clean Internet history and last visited pages list.
11. delete downloaded components;
12. clean Internet history and last visited pages list.
Entire PC clean-up is executed by a mouse-click on its name in the right part
of the main window (for other execution methods see sections 3.2, 3.5).
of the main window (for other execution methods see sections 3.2, 3.5).
3.8.2 System
Clean-up
If you need to wipe the evidence of your PC activity from its system sections,
use the System clean-up. Executing it allows you to:
use the System clean-up. Executing it allows you to:
1. clean
Windows registry from user activity traces;
2. delete
temporary files from standard Windows folders;
3. delete
any file types from user folders on any disks connected to a PC;
4. clean
Windows
Recycle Bin;
5. clean
Windows
swap file;
6. clean hard disk free space;
7. clean
7. clean
last used documents list;
8. delete
the
evidence of searching for files on connected disks, for
networked computers, for information on the Internet.
System cleanup can be executed by mouse-clicking the cleanup variant in the
right part of the main window (for other execution methods see sections 3.2, 3.5).
right part of the main window (for other execution methods see sections 3.2, 3.5).
3.8.3 Internet
Clean-up
If you need to wipe the evidence of your Internet activity, use Internet
cleanup. This variant allows you:
cleanup. This variant allows you:
1. clean-up
Internet cache;
2. delete
cookies;
3. delete
downloaded components;
4. clean
Internet history and last visited pages list.
Internet clean-up can be executed by mouse-clicking its name in the right
part of the main window (for other execution methods see sections 3.2, 3.5).
part of the main window (for other execution methods see sections 3.2, 3.5).
24
Chapter 3 : Cleaning User Activity Traces From a Computer