Acronis PRIVACY EXPERT SUITE 7.0 User Manual

Acronis Privacy Expert Suite 7.0
User’s Guide
Copyright © SWsoft, 2000-2003. All rights reserved.
Linux is a registered trademark of Linus Torvalds.
OS/2 is a registered trademark of IBM Corporation.
UNIX is a registered trademark of The Open Group.
Windows and MS-DOS are registered trademarks of Microsoft Corporation.
All other trademarks and copyrights referred to are the property of their respective owners.
Distribution of substantively modified versions of this document is prohibited without the explicit permission of the copyright holder.
Distribution of this work or derivative work in any standard (paper) book form for commercial purposes is prohibited unless prior permission is obtained from the copyright holder.
DOCUMENTATION IS PROVIDED «AS IS» AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID.

END-USER LICENSE AGREEMENT

BY ACCEPTING, YOU (ORIGINAL PURCHASER) INDICATE YOUR ACCEPTANCE OF THESE TERMS. IF YOU DO NOT WISH TO ACCEPT THE PRODUCT UNDER THESE TERMS YOU MAY CHOOSE NOT TO ACCEPT BY SELECTING "I decline..." AND NOT INSTALLING THE SOFTWARE.
The Acronis Privacy Expert Suite (the Software) is Copyright © SWsoft, 2000-2003. All rights are reserved. The ORIGINAL PURCHASER is granted a LICENSE to use the software only, subject to the following restrictions and limitations.
1. The license is to the original purchaser only, and is not transferable without prior
written Permission from SWsoft.
2. The Original Purchaser may use the Software on a single computer owned or leased
by the Original Purchaser. You may not use the Software on more than a single machine even if you own or lease all of them without the written consent of SWsoft.
3. The Original Purchaser may not engage in, nor permit third parties to engage in, any
of the following:
A. Providing or permitting use of or disclosing the Software to third parties. B. Providing use of the Software in a computer service business, network, timesharing
or multiple user arrangement to users who are not individually licensed by SWsoft.
C. Making alterations or copies of any kind in the Software (except as specifically
permitted above).
D. Attempting to un-assemble, de-compile or reverse engineer the Software in any way. E. Granting sublicenses, leases, or other rights in the Software to others. F. Making copies, or verbal or media translations, of the users guide.
G. Making telecommunication data transmission of the software.
SWsoft has the right to terminate this license if there is a violation of its terms or default by the Original Purchaser. Upon termination for any reason, all copies of the Software must be immediately returned to SWsoft, and the Original Purchaser shall be liable to SWsoft for any and all damages suffered as a result of the violation or default.
ENTIRE RISK
THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE SOFTWARE IS WITH YOU THE PURCHASER. SWSOFT DOES NOT WARRANT THAT THE SOFTWARE OR ITS FUNCTIONS WILL MEET YOUR REQUIREMENTS OR THAT THE OPERATION OF THE SOFTWARE WILL BE UNINTERRUPTED OR ERROR FREE OR THAT ANY DEFECTS WILL BE CORRECTED. NO LIABILITY FOR CONSEQUENTIAL DAMAGES - IN NO EVENT SHALL SWSOFT OR ITS VENDORS BE LIABLE FOR ANY DAMAGES WHATSOEVER (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR THE LOSS OF BUSINESS PROFITS, BUSINESS INTERRUPTION, LOSS OF BUSINESS INFORMATION, OR ANY OTHER PECUNIARY LOSS) ARISING OUT OF THE USE OR INABILITY TO USE THE SOFTWARE, EVEN IF SWSOFT HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Table of Contents
END-USER LICENSE AGREEMENT ..................................................................................................3
INTRODUCTION...............................................................................................................................6
What is Acronis Privacy Expert Suite?.................................................................................................6
Why is it necessary to keep PC work confidential?..............................................................................6
Standards of guaranteed destruction of confidential information..........................................................7
What's new in Acronis Privacy Expert Suite 7.0?.................................................................................7
What Acronis Privacy Expert Suite enables you to clean up................................................................8
On the contents of the guide, or how to find the necessary information...............................................8
System requirements...........................................................................................................................9
Software use conditions.......................................................................................................................9
Technical support.................................................................................................................................9
CHAPTER 1. INSTALLING ACRONIS PRIVACY EXPERT SUITE...........................................11
1.1 What’s included ........................................................................................................11
1.2 Installing the system................................................................................................. 11
1.3 Recovering Acronis Privacy Expert Suite.................................................................11
1.4 Removing the software.............................................................................................11
CHAPTER 2. WORKING WITH ACRONIS PRIVACY EXPERT SUITE .................................... 12
2.1 Getting started..........................................................................................................12
2.2 The main window...................................................................................................... 12
2.3 Logical software organization: sections....................................................................13
2.3.1 Complex PC clean-up.........................................................................................................13
2.3.2 Cleaning separate system components..............................................................................13
2.3.3 Additional cleanup tools......................................................................................................14
2.4 Acronis Privacy Expert Suite global settings............................................................14
2.4.1 General preferences ...........................................................................................................14
2.4.2 Scheduled tasks..................................................................................................................15
2.5 Executing PC clean-up manually..............................................................................15
2.6 Using File Shredder..................................................................................................15
2.7 Folders/files clean-up through the context menu .....................................................16
2.8 Clean-up settings...................................................................................................... 17
2.8.1 Clean-up settings editor......................................................................................................17
2.8.2 Setting PC component clean-up with the editor ..................................................................17
2.9 Separate components clean-up settings..................................................................18
2.10 System component clean-up settings ...................................................................19
2.10.1 «Data destruction method» setting......................................................................................19
2.10.2 «Files» setting.....................................................................................................................19
2.10.3 «Computers» setting...........................................................................................................21
2.11 Clean-up settings of components related to working on the Internet....................22
2.11.1 «Internet Browsers» setting ................................................................................................22
2.11.2 «Address» setting...............................................................................................................22
2.12 Spyware clean-up preferences .............................................................................23
2.13 Executing scheduled PC clean-up ........................................................................23
2.13.1 Invoking the scheduler........................................................................................................24
2.13.2 Scheduled tasks preferences..............................................................................................24
2.14 Paging file..............................................................................................................25
2.15 Renaming clean-up variants .................................................................................25
2.16 Using the Log ........................................................................................................ 26
CHAPTER 3. COMPLEX PC CLEAN-UP...................................................................................27
3.1 Entire PC clean-up....................................................................................................27
3.2 System clean-up.......................................................................................................28
3.3 Internet clean-up....................................................................................................... 28
3.4 Complete spyware clean-up.....................................................................................28
CHAPTER 4. SEPARATE PC COMPONENTS CLEAN-UP...................................................... 29
4.1 System components................................................................................................. 29
Acronis Privacy Expert Suite
4
Recycle Bin........................................................................................................................ 29
4.1.1
4.1.2 Temporary Files .................................................................................................................30
4.1.3 Hard Disk Free Space........................................................................................................ 30
4.1.4 Custom Folders/Files ......................................................................................................... 31
4.1.5 Registry Backups ............................................................................................................... 31
4.1.6 Find Computers List........................................................................................................... 32
4.1.7 Find Files List..................................................................................................................... 33
4.1.8 Recently Used Documents List .......................................................................................... 33
4.1.9 Windows Run List............................................................................................................... 34
4.1.10 Opened/Saved Files History............................................................................................... 34
4.2 Internet components................................................................................................. 35
4.2.1 Internet Cache.................................................................................................................... 35
4.2.2 Cookies.............................................................................................................................. 36
4.2.3 Downloaded components................................................................................................... 38
4.2.4 Last Visited Pages..............................................................................................................39
4.2.5 Typed URLs ....................................................................................................................... 40
4.2.6 Passwords.......................................................................................................................... 41
4.2.7 Forms autocomplete clean-up............................................................................................ 42
4.2.8 E-mail messages................................................................................................................ 43
4.2.9 E-mail contacts................................................................................................................... 43
4.3 Spyware clean-up..................................................................................................... 43
4.3.1 Spyware threats .................................................................................................................44
4.3.2 Browser pages hijacking..................................................................................................... 44
4.3.3 IE Trusted Sites.................................................................................................................. 45
CHAPTER 5. ACRONIS PRIVACY EXPERT POP-UP BLOCKER ........................................... 46
5.1 What are pop-ups?...................................................................................................46
5.2 Acronis Privacy Expert Pop-up Blocker ...................................................................46
5.3 Pop-up Blocker settings ........................................................................................... 46
5.3.1 Acronis Privacy Expert Pop-up Blocker general settings.................................................... 47
5.3.2 Browsed history.................................................................................................................. 47
5.3.3 Blocked URLs ....................................................................................................................47
5.3.4 White URLs........................................................................................................................ 47
5.3.5 Black URLs ........................................................................................................................ 47
CHAPTER 6. ACRONIS DRIVE CLEANSER.............................................................................48
6.1 Acronis Drive Cleanser capabilities.......................................................................... 48
6.2 Working with Acronis Drive Cleanser.......................................................................48
6.3 Using preset data destruction methods.................................................................... 49
6.4 Creating custom methods of data destruction.......................................................... 50
6.4.1 Creating custom methods .................................................................................................. 50
6.4.2 Method definition: template................................................................................................ 52
6.4.3 Saving a custom method to file.......................................................................................... 55
6.4.4 Loading an method from a file............................................................................................ 57
6.5 Creating a bootable diskette or CD with Acronis Drive Cleanser ............................57
APPENDIX A. HARD DISK WIPING METHODS........................................................................ 59
A.1 Information wiping methods functioning principles................................................... 59
A.2 Information wiping methods used by Acronis........................................................... 60
5

Introduction

What is Acronis Privacy Expert Suite?

It is an integrated software suite that standalone PCs or machines connected to the Internet.
The following capabilities of Acronis Privacy Expert Suite ensure PC confidentiality:
PC hard disk and any Windows partitions clean-up of any traces of user
actions
Unwanted pop-up ad blocking for convenient Web browsing
Clean-up of spyware that secretly operates on a user’s PC
Guaranteed confidential data destruction on selected hard disks or disk
partitions
Unlike other software, Acronis Privacy Expert Suite fully removes evidence of PC usage through the use of guaranteed data destruction methods.
It also increases PC performance by cleaning out temporary files.

Why is it necessary to keep PC work confidential?

Working with a PC creates a number of serious security problems for users:
You have created and deleted multiple files on your computer. You do not
want anyone to view its contents. But is a deleted file really gone? No! The problem is that deleted files can be easily recovered under the Windows operating system to gain access to information a user would like to conceal.
provides confidentiality and protects
Windows and the most widely used browsers, Internet Explorer and
Netscape Navigator, provide very weak protection on keeping trace Internet
data private.
While working with a PC, you leave thousands of bytes of evidence
showing your actions (records in various system files) you don’t even
know about.
While installing software on your PC, you might unknowingly install
programs that secretly change system settings, collect and transfer personal information to external addresses, and perform other unwanted and uncontrollable actions.
When replacing your old hard drive with a new, higher-capacity one you,
unwittingly leave lots or important and confidential information on the old drive that can be recovered even if you have reformatted it.
Acronis Privacy Expert Suite provides a solution to all of these problems. It assures complete confidentiality of your PC and Internet actions and prevents situations that threaten your computer and general security.
6
Standards of guaranteed destruction of confidential information
The software offers the guaranteed destruction of confidential information on hard disk drives with the help of special methods.
Acronis methods guarantee compliance with most national standards:
American: U.S. Standard, DoD 5220.22-M
American: NAVSO P-5239-26 (RLL)
American: NAVSO P-5239-26 (MFM)
German: VSITR
Russian: GOST P50739-95
Besides methods corresponding to national standards, Acronis supports predefined methods proposed by widely known and authoritative specialists in the field of information security:
Peter Gutmann’s method – data on hard disk is destroyed with 35 passes
Bruce Schneier’s method – data is destroyed with 7 passes
The suite also supports simple but fast methods for information destruction that zero all sectors on a single hard disk pass.
Another major feature of this version is the opportunity for you to create your
own methods for data destruction.
Detailed information on data destruction standards is given in Appendix A «Hard Disk Wiping methods» to the current guide.
What's new in Acronis Privacy Expert Suite 7.0?
Acronis Privacy Expert Suite has lots of new features that make it an integrated software suite. They include:
Spyware clean-up
Guaranteed data destruction on selected hard drives and partitions
Pop-up blocking for convenient Web surfing
Selected e-mail deletion in Microsoft Outlook and Outlook Express along
with contact list and address book clean-up
Browsed URLs clean-up
Forms autocomplete and password lists clean-up
Convenient paging file clean-up wizard
Quick user files and folders clean-up through Windows Explorer interface or
Software actions logging
Additionally, improvements have been made to provide even more convenience in Acronis Privacy Expert Suite.
Introduction
context menu
7
What Acronis Privacy Expert Suite enables you to clean up
The suite enables you to remove the evidence of your work in any Windows section. It allows you:
to remove Windows registry backups that retain evidence of a user’s work
with PCs and the Internet
to delete temporary files from standard Windows folders
to delete custom folders/files from any disks connected to a PC
to clean the Windows Recycle Bin
to clean hard disk free space
to clean the opened/saved files history
to remove evidence from the Find Files list and Find Computers list
to clean the Internet cache
to delete cookies
to delete downloaded components
to clean up the Last Visited Pages
and Typed URLs lists
to delete forms autocomplete and password lists for Web sites that require
authorization
to delete e-mail messages in Microsoft Outlook and Microsoft Outlook
Express and clean up the contacts and address book lists
to block unwanted pop-up ads
to destroy securely all data on hard disks or partitions, if needed
to remove secretly operating spyware threats
to clean up the Windows paging/swap file
Acronis Privacy Expert Suite permanently removes evidence of user PC activity. To clean up a PC, Acronis Privacy Expert Suite strict methods for guaranteed confidential data destruction that meet and/or exceed most national/state
standards (see Appendix A «Hard Disk Wiping methods» for details).
On the contents of the guide, or how to find the necessary information
This user’s guide contains the following main chapters:
Chapter 1«Installing Acronis Privacy Expert Suite» — contains detailed
information about the installation of this software suite.
8
Chapter 2 «Working with Acronis Privacy Expert Suite»— describes common
principles and settings of the software.
Chapter 3 «Complex PC clean-up»:
If you need to perform a comprehensive clean-up of all PC partitions, see the
section 3.1 «Entire PC clean-up»
Acronis Privacy Expert Suite
If you need to perform a comprehensive system clean-up, see the section
3.2 «System clean-up»
If you need to remove Web activity traces only, see the section 3.3
«Internet clean-up».
If you need to perform a comprehensive spyware clean-up, see the section
3.4 «Complete spyware clean-up».
If you need to quickly clean up particular Windows components (partitions),
see Chapter 4 «Separate PC components clean-up».
Chapter 5 «Acronis Privacy Expert Pop-up Blocker» is dedicated to the pop-
up ad tool included in Acronis Privacy Expert Suite.
Chapter 6 «Acronis Drive Cleanser» provides tools for guaranteed data
destruction on selected drives or partitions.
Appendix A «Hard Disk Wiping methods» — contains more detailed
information about used methods of guaranteed confidential data destruction on
PC hard disk.
System requirements
To take full advantage ofAcronis Privacy Expert Suite, you should have:
a PC-compatible computer with a Pentium CPU or equivalent
32 MB RAM
a floppy or a CD-RW drive
VGA monitor
a mouse (recommended)
Microsoft Windows 95/98/Me/NT/2000/XP
Microsoft Internet Explorer 4.0 or higher for correct Pop-up Blocker
operation
Software use conditions
The conditions for use of Acronis Privacy Expert Suite are listed in the supplied «License Agreement». To be able to prove that you legally purchased and use the suite, you received a registration card along with the package. Each registration card has a unique number.
Based on current legislation, the «License Agreement» is considered as a contract between user and software vendor. Violation of the contract may lead to prosecution.
Illegal use or distribution of software a violation of the law and will be prosecuted.
Technical support
Users that have legally purchased and registered their copy of Acronis Privacy
Expert Suite will receive free e-mail technical support from Acronis. If you have
Introduction
9
problems installing or using the system that you cannot resolve with the help of this guide and readme file, please e-mail technical support. You will also need to provide the registration number of your Acronis Privacy Expert Suite supplied with this package.
Support URL:
E-mail:
support@acronis.com
http://www.acronis.com/support/
10
Acronis Privacy Expert Suite
Chapter 1. Installing Acronis Privacy Expert Suite
1.1 What’s included
installation CD-ROM
this guide
License Agreement
registration card
advertising information

1.2 Installing the system

To install the software, insert the installation CD-ROM into your drive and run the program. Please carefully follow all instructions shown in the installation wizard.
During the installation, you will be prompted to create a bootable diskette or CD with Acronis Privacy Expert Suite. Using this disk you will be able to easily and securely destroy information on your PC that doesn’t have Acronis Privacy Expert Suite installed. If you don't want to create this diskette immediately, you will be
able to do it later using the Bootable Media Builder feature included with the suite.
Having answered all the questions in the installation wizard and copied Acronis Privacy Expert Suite files to the hard disk, you must reboot your PC.

1.3 Recovering Acronis Privacy Expert Suite

If Acronis Privacy Expert Suite is damaged during installation or execution, run its installation program again. The software will determine that the suite has already been installed to your PC and ask if you want to recover (update) or remove it from the disk.
In the installation wizard window, select Recover/update Acronis Privacy Expert Suite and click Next. All files will be copied to your hard disk again to restore the
software.

1.4 Removing the software

To remove the software, select Acronis Æ Privacy Expert Suite Æ Remove Acronis Privacy Expert Suite from the Programs menu. You will see the dialog box to
confirm removal of the software from your PC hard disk.
To confirm removal, click completely from your PC.
11
Yes. Acronis Privacy Expert Suite will be removed
Chapter 2. Working with Acronis Privacy Expert Suite
2.1 Getting started
The Acronis Privacy Expert Suite user interface features standard Windows XP icon graphical user interface (GUI) elements. We will not describe details here, but instead pay general attention to setting and executing clean-up variants.

2.2 The main window

Acronis Privacy Expert Suite is controlled from the main window. It is shown on the screen after selecting Acronis Æ Privacy Expert Suite Æ Privacy Expert Suite from
the Programs menu. The main window is a Windows dialog box split into two parts.
The right part contains grouped lists of main PC clean-up variants that the user
can execute with Acronis Privacy Expert Suite.
The left part of the window called the sidebar – an element first introduced in Windows XP – contains the following sections:
Clean-up – to perform upon objects in the right part of the window
Edit – for changing properties and names of objects in the right part of the
window
Tools – included in
of additional security and clean-up capabilities against spyware threats and
pop-up windows. Also the Tools section includes a number of wizards for
additional user convenience
Settings – enabling fine suite tuning and log access
Details – brief context help regarding either software component
the Acronis Privacy Expert Suite and providing a number
The Acronis Privacy Expert Suite main window
12
r
j
g
Clean-up variants are executed, set, scheduled and renamed with the help of corresponding items of the main menu, toolbar, sidebar and context menus.

2.3 Logical software organization: sections

Logically, Acronis Privacy Expert Suite consists of several parts, each enabling
users to perform various tasks:
(1) specific variants of complex PC clean-up from PC activity evidence (2) clean up separate components (System components, Internet components,
Spyware components)
(3) Tools

2.3.1 Complex PC clean-up

In the One Click clean-up section, shown by default in the right part of the main window, users have access to icons of four predefined complex PC clean-ups.
If you need to perform:
1. entire PC clean-up, including Windows system areas and sections related to
working on the Internet, execute Entire PC clean-up;
2. clean-up of sections related to working on the Internet, execute Internet clean-
up;
3. Windows system section and user files/folders clean-up, execute System
clean-up.
4. Clean your PC up from spyware, select Spyware clean-up.
Attention! Described clean-up variants are fully set up by default and ready fo
immediate work
ma
ority of users could take advantage of them without understanding all the advanced
settin
s, and contain everything necessary for most users. Any of these variants can be
executed by a click of the mouse!
after Acronis Privacy Expert Suite is installed. They were created so the
2.3.2 Cleaning separate system components
Internet components and System components sections allow you to perform
a quick clean-up of separate system components after you take specific actions at
your PC.
For example, you need to clean up the browser cache to get rid of garbage after visiting a dubious-content site and remove its URL from the list of visited sites, etc. This takes much less time than a complex clean-up.
If you need to perform:
Chapter 2 Working with Acronis Privacy Expert Suite
13
1. a quick clean-up of only separate components of Windows system sections and separate user files/folders, execute one of the clean-up variants from the Components section.
2. a quick clean-up of only separate Windows components related to working on the Internet, execute a variant from the I n t e r n e t components section.
3. a quick clean up of only particular Windows components that might be threatened by spyware and parasites, select one of the Spyware clean-up variants.
Separate components clean-up takes less time than a complex clean-up of the entire Windows area.
All PC clean-up variants, as well as separate components clean-up, are executed
manually or by schedule and are set universally (see the section 2.4 Acronis
Privacy Expert Suite global settings)

2.3.3 Additional cleanup tools

You will find additional cleanup and security tools in the Tools section that eliminate
unwanted components.
1. To block unwanted pop-ups on websites, select Acronis Privacy Expert Pop-
up Blocker
2. To clean the paging file, select Paging File Cleaner
3. To destroy data on a selected partition or disk securely and permanently,
select Acronis Drive Cleanser
4. To permanently delete selected files or folders, select the File Shredder.

2.4 Acronis Privacy Expert Suite global settings

If you regularly use Acronis Privacy Expert Suite, you can provide custom preferences for typical situations.
The global settings window can be invoked in different ways:
From the Tools sidebar
From the Tools submenu of the main menu
By clicking the Edit global settings icon on the Toolbar
2.4.1 General preferences
of the Acronis Privacy Expert Suite main window
14

The general preferences section contains the following items:

Ask Before Clean-up -- When this is flagged, the software will ask for your
confirmation before each component, group of components or system as a
whole is cleaned up.
Treat shortcuts as separate files -- When this is flagged, the shortcut target
will be left untouched. Otherwise target files will be deleted along with the shortcuts.
Acronis Privacy Expert Suite
2.4.2 Scheduled tasks
The scheduled clean-up (see the section 2.13 Executing scheduled PC clean-up)
might lead to errors if data to be deleted is used by other programs.
You can set up Acronis Privacy Expert Suite for such situations by selecting from the following variants:
Ignore
Retry
Cancel
Ask user

2.5 Executing PC clean-up manually

There are three ways to manually execute complex PC and component clean-
up.
PC or separate component clean-up, previously selected from the right part of the main window, can be executed by:
mouse-clicking Start Now! in the main window sidebar
selecting Clean-up Æ Start Now! from the main menu
selecting Start Now! from the task context menu
If you can’t see clean-up variants or components to clean in the workspace, scroll down to make them visible.

2.6 Using File Shredder

The File Shredder enables users to select files and folders quickly in order to
destroy them permanently.
This wizard features the familiar Windows Explorer interface, ensuring that it is easy to use.
To run the folders/files cleaner, do one of the following:
Select File Shredder in the Tools section of Acronis Privacy Expert Suite
sidebar
Select Tools Æ File Shredder in the main menu
Chapter 2 Working with Acronis Privacy Expert Suite
15
Using File Shredder

2.7 Folders/files clean-up through the context menu

Acronis Privacy Expert Suite provides an easy way to quickly delete files and
clean up folders through the Windows Explorer context menu. This requires you
to:
select the necessary files or folder with the mouse or the Tab button
click the right mouse button or the context menu button on the keyboard
in the invoked window, select Wipe with Acronis Privacy Expert Suite.
After this, the suite will securely delete the selected file or clean up the selected folder (leaving the folder itself untouched).
With the help of the context menu, you can also set up the clean-up preferences and select a data destruction method (for more details see the section 2.10.1
«Data destruction method» setting).
16
Acronis Privacy Expert Suite
Folders/files clean-up through the context menu
The context menu also allows you to securely clean up the Windows Recycle Bin. At that, clean-up preferences can not only include the data destruction method,
but also the destruction wildcard.
2.8 Clean-up settings
By changing clean-up settings, you can set Acronis Privacy Expert Suite for your personal needs. For example, you can select an method of guaranteed data destruction that suits your needs by speed and reliability; enter the type of temporary files to clean; directly select browser used; disable separate component clean-up; etc. This will enable the software to clean your PC at
maximum speed and performance.
Settings are described below.

2.8.1 Clean-up settings editor

Having selected a clean-up variant by mouse-clicking from the right part of the main window, and then Properties from the sidebar Edit list, you invoke the
settings editor. You can also do this by selecting a clean-up variant and Clean­up Æ Properties from the main menu. Finally, the settings editor can be invoked
from the context menu of a clean-up variant by selecting Properties.

2.8.2 Setting PC component clean-up with the editor

Below you can see the opened settings editor, featuring two groups of
components to clean that belong to the Entire PC clean-up. These include:
Internet clean-up – this group includes clean-up of sections related to
working on the Internet
System clean-up – this group includes Windows system section and user
files/folders clean-up
Spyware clean-up – includes spyware threat clean-up tools
Grouped PC components to clean are described later (see Chapter 4 «Separate PC components clean-up»).
If you need to set up component clean-up:
Select the component from the left part of the editor and check the
1.
Enable <component name> box.
The description of a component to clean
2. Set component clean-up; for this consecutively select each
component clean-up setting and set it up as necessary (selecting/entering clean-up method, file type, Internet browser, etc.).
Chapter 2 Working with Acronis Privacy Expert Suite
17
«Files» setting
3. To save your settings, click Apply . To discard changes, click Cancel.
If you need to restore Acronis Privacy Expert Suite default clean-up settings:
1. Select the component tree root — Settings.
2. In the right part of the editor, click
Restore Defaults.
Restoring Acronis Privacy Expert Suite default settings

2.9 Separate components clean-up settings

Having selected a specific component to clean from the editor, you open the list
of its clean-up settings.
18
Each component to clean has in Acronis Privacy Expert Suite several settings (from 1 to 3 depending on a component).
Below are settings common for a number of components. Specific settings of separate
components are described in Chapter 4 «Separate PC components clean-up».
Acronis Privacy Expert Suite
Loading...
+ 42 hidden pages