Acronis power utilities Manual Do Utilizador
If you need to:
1. clean-up Internet cache (last visited pages list) from all files (lists,
elements), downloaded from specific Internet address (site), enter
addresses or their parts separated by semicolon, for example like:
addresses or their parts separated by semicolon, for example like:
*cnn*;*formula1*
As a result all files downloaded from
will be deleted.
2. clean-up Internet cache from only specific file types downloaded from
specific Internet address (site), enter addresses separated by semicolon,
for example like:
for example like:
*cnn*.jpg;*cnn*.gif;*formula1*.jpg;*formula1*.gif
As a result only *.jpg, *.gif files will be deleted, and, for example, *.html
files will remain in cache.
files will remain in cache.
Entering the Internet addresses list, you can browse files (visited pages)
selected according to the list. To do this click
selected according to the list. To do this click
Show URLs
. You will see the
window with selected addresses. They will be deleted during at the selected
component clean-up.
component clean-up.
3.4.2
System Component Clean-up Settings
«Data Destruction Algorithm» and «Files» settings are common for system
component cleanup.
component cleanup.
«Data destruction algorithm» Setting
Having selected «Data Destruction Algorithm» setting you can change the
security level provided by PC clean-up and clean-up speed.
security level provided by PC clean-up and clean-up speed.
For detailed information about data destruction algorithms see 3.7 «Data
Clean-up Algorithms» and Appendix A. «Hard Disk Wiping Algorithms».
Clean-up Algorithms» and Appendix A. «Hard Disk Wiping Algorithms».
The highest level security algorithms are always very slow, and vice versa,
the quickest algorithms provide less reliability and security.
the quickest algorithms provide less reliability and security.
16
Chapter 3 : Cleaning User Activity Traces From a Computer