Manualsbrain.com
de
English
Español
Français
Italiano
Português
Русский
조선말, 한국어
日本語
中文
Handbücher
Marken
Acronis
privacy expert suite 8.0
Benutzerhandbuch
Acronis privacy expert suite 8.0 Benutzerhandbuch
Download
Like
Vollbild
Standard
Seite
von
71
Los
3.3.4
Entering the account information........................................................................................ 30
3.3.5
Setting the schedule........................................................................................................... 31
CHAPTER 4.
INTERNET CLEAN-UP......................................................................................... 32
4.1
General information .................................................................................................. 32
4.2
Using the Internet Clean-up Wizard ......................................................................... 32
4.3
Internet Clean-up Wizard Settings ........................................................................... 34
4.3.1
«Data Destruction Method» settings .................................................................................. 34
4.3.2
«Internet Browsers» setting................................................................................................ 34
4.3.3
«Address» setting............................................................................................................... 35
4.3.4
«File» settings .................................................................................................................... 36
4.3.5
«Data filter» settings........................................................................................................... 37
4.3.6
«E-mail clients» settings..................................................................................................... 37
4.4
Cleaning up separate Internet components ............................................................. 38
CHAPTER 5.
SYSTEM CLEAN-UP ............................................................................................ 39
5.1
General information .................................................................................................. 39
5.2
Using the System Clean-up Wizard ......................................................................... 39
5.3
System Clean-up Wizard settings ............................................................................ 40
5.3.1
«Data Destruction Method» settings .................................................................................. 41
5.3.2
«Files» settings .................................................................................................................. 41
5.3.3
«Computers» setting .......................................................................................................... 42
5.3.4
«Drive Free Space» setting ................................................................................................ 43
5.3.5
«Commands» setting ......................................................................................................... 44
5.3.6
«System Password Filter» setting ...................................................................................... 44
5.4
Cleaning up separate system components .............................................................. 45
CHAPTER 6.
APPLICATION TRACES CLEAN-UP .................................................................. 46
6.1
General information .................................................................................................. 46
6.2
Using the Application Traces Clean-up Wizard........................................................ 46
6.3
Application Traces Clean-up Wizard settings .......................................................... 47
6.3.1
«Data Destruction Method» settings .................................................................................. 47
6.3.2
Select Applications ............................................................................................................. 48
6.3.3
«Files» settings .................................................................................................................. 49
CHAPTER 7.
MY PRIVACY TOOLS........................................................................................... 51
7.1
General information .................................................................................................. 51
7.2
Using File Shredder.................................................................................................. 52
7.3
Paging file cleaner .................................................................................................... 52
CHAPTER 8.
ACRONIS POP-UP BLOCKER ............................................................................ 54
8.1
What are pop-ups? ................................................................................................... 54
8.2
Acronis Privacy Expert Pop-up Blocker ................................................................... 54
8.3
Pop-up Blocker settings ........................................................................................... 54
8.3.1
Acronis Privacy Expert Pop-up Blocker general settings.................................................... 55
8.3.2
Last visited pages............................................................................................................... 55
8.3.3
Blocked URLs .................................................................................................................... 55
8.3.4
White URLs ........................................................................................................................ 55
8.3.5
Black URLs ........................................................................................................................ 56
CHAPTER 9.
ACRONIS DRIVE CLEANSER............................................................................. 57
9.1
Acronis Drive Cleanser capabilities.......................................................................... 57
9.2
Working with Acronis Drive Cleanser ....................................................................... 57
9.3
Using preset data destruction methods.................................................................... 58
9.4
Creating custom methods of data destruction.......................................................... 60
9.4.1
Creating custom methods .................................................................................................. 60
9.4.2
Method definition: template ................................................................................................ 61
9.4.3
Saving a custom method to file .......................................................................................... 65
9.4.4
Loading a method from a file .............................................................................................. 67
Copyright © Acronis, Inc., 2000-2005
5
Vorherige
Nächste
1
…
3
4
5
6
7
…
71