Acronis privacy expert suite 8.0 User Manual

Page of 71
Working with Acronis Privacy Expert Suite 
16 
Copyright © Acronis, Inc., 2000-2005
ƒ  Completely clean the PC, including Windows and Internet components, run Entire 
PC Clean-up 
ƒ  Clean your PC of spyware, run Spyware Removal 
ƒ  Clean Windows components along with user files and folders, run System 
Clean-up 
ƒ  Remove  all  traces  of  your  work  on  the  Internet and e-mail, select 
Internet Clean-up. 
2.5 
Acronis Privacy Expert Suite options 
If you regularly use Acronis Privacy Expert Suite, you can provide custom 
preferences for typical situations. 
The Options window can be invoked in different ways: 
ƒ   From the sidebar of the Acronis Privacy Expert Suite main window  
ƒ   From Settings of the main menu 
ƒ   By clicking the Options icon on the Toolbar 
2.5.1 General 
options 
The General section contains the following items: 
ƒ  Start Clean-up/Removal Wizard – if you flag this item, Acronis Privacy Expert 
Suite will ask each time before it runs the clean-up wizard for the given 
component or the entire category. Otherwise, the clean-up will be performed 
automatically without user confirmation. 
ƒ  Show Summary – if you flag this item, the program will show you the 
clean-up summary after each session. 
ƒ  Treat shortcuts as separate files  if you flag this item, the shortcut target will 
be left untouched. Otherwise, target files will be deleted along with the 
shortcuts. 
2.5.2 Clean-up 
Options 
In the Clean-up Options group, you can set the common data destruction 
method
 that will be used by default for any PC clean-up operation, 
independently of category. 
In this section, you will see all data destruction methods available in Acronis 
Privacy Expert Suite by clicking your mouse on the drop-down list in the 
righthand part of the editor. 
If you need to ensure: 
ƒ  maximum security while destroying files, select Peter Gutmann’s method (35 
data destruction cycles), but please keep in mind that this method requires 
the greatest amount of time to complete the task 
ƒ  mid-level security at an average speed of clean-up, select VSITR or Bruce 
Schneier’s method (seven data destruction cycles)