Manualsbrain.com
it
English
Deutsch
Español
Français
Português
Русский
조선말, 한국어
日本語
中文
Manuali
Marche
Acronis
privacy expert corporate
Manuale Utente
Acronis privacy expert corporate Manuale Utente
Scarica
Like
Schermo intero
Standard
Pagina
di
39
Vai
5.1
Product registration .................................................................................................. 29
5.2
Spyware database update........................................................................................ 29
5.2.1
Running Spyware Definitions Updates Wizard ................................................................... 29
5.2.2
Selecting remote computers to update spyware definitions................................................ 30
5.2.3
Selecting update mode....................................................................................................... 30
5.2.4
Setting the schedule........................................................................................................... 31
5.2.5
Entering user name and password ..................................................................................... 32
CHAPTER 6.
ACRONIS POP-UP BLOCKER ............................................................................ 33
6.1
What are pop-ups? ................................................................................................... 33
6.2
Acronis Pop-up Blocker ............................................................................................ 33
6.3
Acronis Pop-up Blocker local options....................................................................... 33
6.3.1
Acronis Pop-up Blocker general settings............................................................................ 34
6.3.2
Last visited pages............................................................................................................... 34
6.3.3
Blocked URLs .................................................................................................................... 34
6.3.4
White URLs ........................................................................................................................ 34
6.3.5
Black URLs ........................................................................................................................ 35
CHAPTER 7.
OTHER OPERATIONS......................................................................................... 36
7.1
Creating a bootable diskette or CD with Acronis Drive Cleanser ............................ 36
7.2
Data destruction with Acronis Drive Cleanser.......................................................... 36
APPENDIX A.
SPYWARE THREATS GLOSSARY.................................................................... 38
Adware .............................................................................................................................................. 38
Browser Helper Objects..................................................................................................................... 38
Browser hijackers .............................................................................................................................. 38
Commercial keylogger....................................................................................................................... 38
Dialers ............................................................................................................................................... 38
Exploit/Security holes ........................................................................................................................ 39
Remote Administration ...................................................................................................................... 39
Sniffers .............................................................................................................................................. 39
Spyware ............................................................................................................................................ 39
Toolbars ............................................................................................................................................ 39
Trojan Horses (Trojans) .................................................................................................................... 39
Copyright © Acronis, Inc., 2000-2005
5
Prec
Successivo
1
…
3
4
5
6
7
…
39