Manualsbrain.com
de
English
Español
Français
Italiano
Português
Русский
조선말, 한국어
日本語
中文
Handbücher
Marken
Acronis
privacyexpert 2003
Benutzerhandbuch
Acronis privacyexpert 2003 Benutzerhandbuch
Download
Like
Vollbild
Standard
Seite
von
43
Los
Table of Contenets
I
NTRODUCTION
................................................................................................... 4
C
HAPTER
1.
I
NSTALLING AND STARTING TO WORK WITH
A
CRONIS
P
RIVACY
E
XPERT
............................................................................ 8
1.1
W
HAT
’
S INCLUDED
.......................................................................... 8
1.2
S
YSTEM REQUIREMENTS
................................................................. 8
1.3
I
NSTALLING THE SYSTEM
................................................................ 8
1.4
R
ECOVERING
A
CRONIS
P
RIVACY
E
XPERT
....................................... 8
1.5
R
EMOVING THE SYSTEM
.................................................................. 9
1.6
S
TARTING TO WORK WITH
A
CRONIS
P
RIVACY
E
XPERT
................... 9
1.6.1
T
HE
A
CRONIS
P
RIVACY
E
XPERT MAIN WINDOW
..........................................9
1.6.2
L
OGICAL SOFTWARE ORGANIZATION
:
SECTIONS
.......................................10
1.6.3
E
XECUTING
PC
CLEAN
-
UP MANUALLY
.....................................................11
1.6.4
C
LEAN
-
UP SETTINGS
.................................................................................11
1.6.5
S
EPARATE COMPONENTS CLEAN
-
UP SETTINGS
..........................................14
1.6.6
E
XECUTING SCHEDULED
PC
CLEAN
-
UP
....................................................20
1.6.7
R
ENAMING CLEAN
-
UP VARIANTS
..............................................................21
1.7
D
ATA CLEAN
-
UP ALGORITHMS
...................................................... 22
C
HAPTER
2.
C
OMPLEX
PC
CLEAN
-
UP
........................................................... 23
2.1
E
NTIRE
PC
CLEAN
-
UP
.................................................................... 23
2.2
S
YSTEM CLEAN
-
UP
........................................................................ 24
2.3
I
NTERNET CLEAN
-
UP
..................................................................... 24
C
HAPTER
3.
S
EPARATE
PC
COMPONENTS CLEAN
-
UP
................................. 25
3.1
I
NTERNET
C
OMPONENTS
............................................................... 25
3.1.1
I
NTERNET CACHE
......................................................................................26
3.1.2
C
OOKIES
...................................................................................................27
3.1.3
D
OWNLOADED
C
OMPONENTS
...................................................................28
3.1.4
L
AST
V
ISITED
P
AGES
................................................................................30
3.2
S
YSTEM
C
OMPONENTS
.................................................................. 32
3.2.1
P
AGING
/S
WAP
F
ILE
...................................................................................32
3.2.2
R
ECYCLE
B
IN
...........................................................................................32
3.2.3
T
EMPORARY
F
ILES
....................................................................................32
3.2.4
H
ARD
D
ISKS
F
REE
S
PACE
.........................................................................33
3.2.5
C
USTOM
F
OLDERS
/F
ILES
..........................................................................34
3.2.6
R
EGISTRY
B
ACK
-
UPS
................................................................................35
3.2.7
F
IND
C
OMPUTERS
L
IST
.............................................................................36
3.2.8
F
IND
F
ILES
L
IST
........................................................................................37
3.2.9
R
ECENTLY
U
SED
D
OCUMENTS
L
IST
.........................................................38
3.2.10
W
INDOWS
R
UN
L
IST
.................................................................................39
3.2.11
O
PENED
/S
AVED
F
ILES
H
ISTORY
...............................................................40
A
PPENDIX
A.
H
ARD
D
ISK
W
IPING ALGORITHMS
.......................................... 41
A.1
I
NFORMATION WIPING ALGORITHMS FUNCTIONING PRINCIPLES
... 41
A.2
A
LGORITHMS USED BY
A
CRONIS
P
RIVACY
E
XPERT
...................... 42
Acronis PrivacyExpert
3
Vorherige
Nächste
1
2
3
4
5
…
43