Manualsbrain.com
de
English
Español
Français
Italiano
Português
Русский
조선말, 한국어
日本語
中文
Handbücher
Marken
Acronis
privacy expert corporate
Benutzerhandbuch
Acronis privacy expert corporate Benutzerhandbuch
Download
Like
Vollbild
Standard
Seite
von
39
Los
5.1
Product registration .................................................................................................. 29
5.2
Spyware database update........................................................................................ 29
5.2.1
Running Spyware Definitions Updates Wizard ................................................................... 29
5.2.2
Selecting remote computers to update spyware definitions................................................ 30
5.2.3
Selecting update mode....................................................................................................... 30
5.2.4
Setting the schedule........................................................................................................... 31
5.2.5
Entering user name and password ..................................................................................... 32
CHAPTER 6.
ACRONIS POP-UP BLOCKER ............................................................................ 33
6.1
What are pop-ups? ................................................................................................... 33
6.2
Acronis Pop-up Blocker ............................................................................................ 33
6.3
Acronis Pop-up Blocker local options....................................................................... 33
6.3.1
Acronis Pop-up Blocker general settings............................................................................ 34
6.3.2
Last visited pages............................................................................................................... 34
6.3.3
Blocked URLs .................................................................................................................... 34
6.3.4
White URLs ........................................................................................................................ 34
6.3.5
Black URLs ........................................................................................................................ 35
CHAPTER 7.
OTHER OPERATIONS......................................................................................... 36
7.1
Creating a bootable diskette or CD with Acronis Drive Cleanser ............................ 36
7.2
Data destruction with Acronis Drive Cleanser.......................................................... 36
APPENDIX A.
SPYWARE THREATS GLOSSARY.................................................................... 38
Adware .............................................................................................................................................. 38
Browser Helper Objects..................................................................................................................... 38
Browser hijackers .............................................................................................................................. 38
Commercial keylogger....................................................................................................................... 38
Dialers ............................................................................................................................................... 38
Exploit/Security holes ........................................................................................................................ 39
Remote Administration ...................................................................................................................... 39
Sniffers .............................................................................................................................................. 39
Spyware ............................................................................................................................................ 39
Toolbars ............................................................................................................................................ 39
Trojan Horses (Trojans) .................................................................................................................... 39
Copyright © Acronis, Inc., 2000-2005
5
Vorherige
Nächste
1
…
3
4
5
6
7
…
39