Manualsbrain.com
de
English
Español
Français
Italiano
Português
Русский
조선말, 한국어
日本語
中文
Handbücher
Marken
Acronis
privacy expert suite 8.0
Benutzerhandbuch
Acronis privacy expert suite 8.0 Benutzerhandbuch
Download
Like
Vollbild
Standard
Seite
von
71
Los
9.5
Creating a bootable diskette or CD with Acronis Drive Cleanser ............................ 67
APPENDIX A.
HARD DISK WIPING METHODS ........................................................................ 68
A.1
Information wiping methods’ functioning principles.................................................. 68
A.2
Information wiping methods used by Acronis........................................................... 69
APPENDIX B.
SPYWARE THREATS GLOSSARY.................................................................... 70
Adware .............................................................................................................................................. 70
Browser Helper Objects..................................................................................................................... 70
Browser hijackers .............................................................................................................................. 70
Commercial keylogger....................................................................................................................... 70
Dialers ............................................................................................................................................... 70
Exploit/Security holes ........................................................................................................................ 71
Remote Administration ...................................................................................................................... 71
Sniffers .............................................................................................................................................. 71
Spyware ............................................................................................................................................ 71
Toolbars ............................................................................................................................................ 71
Trojan Horses (Trojans) .................................................................................................................... 71
6
Copyright © Acronis, Inc., 2000-2005
Vorherige
Nächste
1
…
4
5
6
7
8
…
71