Manualsbrain.com
fr
English
Deutsch
Español
Italiano
Português
Русский
조선말, 한국어
日本語
中文
Manuels
Marques
Acronis
privacyexpert 2003
Manuel D’Utilisation
Acronis privacyexpert 2003 Manuel D’Utilisation
Télécharger
Aimer
Full screen
Plein écran
Page
de
43
Aller
Table of Contenets
I
NTRODUCTION
................................................................................................... 4
C
HAPTER
1.
I
NSTALLING AND STARTING TO WORK WITH
A
CRONIS
P
RIVACY
E
XPERT
............................................................................ 8
1.1
W
HAT
’
S INCLUDED
.......................................................................... 8
1.2
S
YSTEM REQUIREMENTS
................................................................. 8
1.3
I
NSTALLING THE SYSTEM
................................................................ 8
1.4
R
ECOVERING
A
CRONIS
P
RIVACY
E
XPERT
....................................... 8
1.5
R
EMOVING THE SYSTEM
.................................................................. 9
1.6
S
TARTING TO WORK WITH
A
CRONIS
P
RIVACY
E
XPERT
................... 9
1.6.1
T
HE
A
CRONIS
P
RIVACY
E
XPERT MAIN WINDOW
..........................................9
1.6.2
L
OGICAL SOFTWARE ORGANIZATION
:
SECTIONS
.......................................10
1.6.3
E
XECUTING
PC
CLEAN
-
UP MANUALLY
.....................................................11
1.6.4
C
LEAN
-
UP SETTINGS
.................................................................................11
1.6.5
S
EPARATE COMPONENTS CLEAN
-
UP SETTINGS
..........................................14
1.6.6
E
XECUTING SCHEDULED
PC
CLEAN
-
UP
....................................................20
1.6.7
R
ENAMING CLEAN
-
UP VARIANTS
..............................................................21
1.7
D
ATA CLEAN
-
UP ALGORITHMS
...................................................... 22
C
HAPTER
2.
C
OMPLEX
PC
CLEAN
-
UP
........................................................... 23
2.1
E
NTIRE
PC
CLEAN
-
UP
.................................................................... 23
2.2
S
YSTEM CLEAN
-
UP
........................................................................ 24
2.3
I
NTERNET CLEAN
-
UP
..................................................................... 24
C
HAPTER
3.
S
EPARATE
PC
COMPONENTS CLEAN
-
UP
................................. 25
3.1
I
NTERNET
C
OMPONENTS
............................................................... 25
3.1.1
I
NTERNET CACHE
......................................................................................26
3.1.2
C
OOKIES
...................................................................................................27
3.1.3
D
OWNLOADED
C
OMPONENTS
...................................................................28
3.1.4
L
AST
V
ISITED
P
AGES
................................................................................30
3.2
S
YSTEM
C
OMPONENTS
.................................................................. 32
3.2.1
P
AGING
/S
WAP
F
ILE
...................................................................................32
3.2.2
R
ECYCLE
B
IN
...........................................................................................32
3.2.3
T
EMPORARY
F
ILES
....................................................................................32
3.2.4
H
ARD
D
ISKS
F
REE
S
PACE
.........................................................................33
3.2.5
C
USTOM
F
OLDERS
/F
ILES
..........................................................................34
3.2.6
R
EGISTRY
B
ACK
-
UPS
................................................................................35
3.2.7
F
IND
C
OMPUTERS
L
IST
.............................................................................36
3.2.8
F
IND
F
ILES
L
IST
........................................................................................37
3.2.9
R
ECENTLY
U
SED
D
OCUMENTS
L
IST
.........................................................38
3.2.10
W
INDOWS
R
UN
L
IST
.................................................................................39
3.2.11
O
PENED
/S
AVED
F
ILES
H
ISTORY
...............................................................40
A
PPENDIX
A.
H
ARD
D
ISK
W
IPING ALGORITHMS
.......................................... 41
A.1
I
NFORMATION WIPING ALGORITHMS FUNCTIONING PRINCIPLES
... 41
A.2
A
LGORITHMS USED BY
A
CRONIS
P
RIVACY
E
XPERT
...................... 42
Acronis PrivacyExpert
3
Préc
Suiv
1
2
3
4
5
…
43