registered trademarks of Microsoft Corporation.
All other trademarks and copyrights referred to are the property of their
respective owners.
Distribution of substantively modified versions of this document is prohibited
without the explicit permission of the copyright holder.
Distribution of this work or derivative work in any standard (paper) book form
for commercial purposes is prohibited unless prior permission is obtained from
the copyright holder.
DOCUMENTATION IS PROVIDED «AS IS» AND ALL EXPRESS OR IMPLIED
CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY
IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR
PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT
THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID.
2
END-USER LICENSE AGREEMENT
BY ACCEPTING, YOU (ORIGINAL PURCHASER) INDICATE YOUR ACCEPTANCE OF THESE
TERMS. IF YOU DO NOT WISH TO ACCEPT THE PRODUCT UNDER THESE TERMS, YOU
MAY CHOOSE NOT TO ACCEPT BY SELECTING "I decline..." AND NOT INSTALLING THE
SOFTWARE.
1. The license is to the original purchaser only, and is not transferable without prior
written permission from Acronis.
2. The original purchaser may use the software on a single computer owned or leased
by the original purchaser. You may not use the software on more than one machine
even if you own or lease all of them, without the written consent of Acronis.
3. The original purchaser may not engage in, nor permit third parties to engage in, any
of the following:
A. Providing or permitting use of or disclosing the software to third parties.
B. Providing use of the software in a computer service business, network, timesharing or
multiple user arrangement to users who are not individually licensed by Acronis.
C. Making alterations or copies of any kind in the software (except as specifically
permitted above).
D. Attempting to un-assemble, de-compile or reverse engineer the software in any way.
E. Granting sublicenses, leases or other rights in the software to others.
F. Making copies or verbal or media translations of the users guide.
G. Making telecommunication data transmission of the software.
Acronis has the right to terminate this license if there is a violation of its terms or default
by the original purchaser. Upon termination for any reason, all copies of the software
must be immediately returned to Acronis, and the original purchaser shall be liable to
Acronis for any and all damages suffered as a result of the violation or default.
ENTIRE RISK
THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE SOFTWARE IS
WITH YOU THE PURCHASER. ACRONIS DOES NOT WARRANT THAT THE SOFTWARE OR
ITS FUNCTIONS WILL MEET YOUR REQUIREMENTS OR THAT THE OPERATION OF THE
SOFTWARE WILL BE UNINTERRUPTED OR ERROR FREE OR THAT ANY DEFECTS WILL
BE CORRECTED. NO LIABILITY FOR CONSEQUENTIAL DAMAGES — IN NO EVENT SHALL
ACRONIS OR ITS VENDORS BE LIABLE FOR ANY DAMAGES WHATSOEVER (INCLUDING,
WITHOUT LIMITATION, DAMAGES FOR THE LOSS OF BUSINESS PROFITS, BUSINESS
INTERRUPTION, LOSS OF BUSINESS INFORMATION, OR ANY OTHER PECUNIARY LOSS)
ARISING OUT OF THE USE OR INABILITY TO USE THE SOFTWARE, EVEN IF ACRONIS
HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Acronis Privacy Expert Suite is an integrated software suite that provides
confidentiality and protects standalone PCs or machines connected to the
Internet.
The following capabilities of Acronis Privacy Expert Suite ensure PC
confidentiality:
Clean-up of spyware that secretly operates on a user’s PC
Proactive protection from spyware threats
PC hard disk and Windows partition clean-up of any traces of user actions
Unwanted pop-up ad blocking for convenient Web browsing
Guaranteed confidential data destruction on selected hard disks or disk
partitions
Unlike other software, Acronis Privacy Expert Suite fully removes evidence of PC
usage through the use of guaranteed data destruction methods.
Introduction
It also increases PC performance by cleaning out temporary files.
Why is it necessary to keep PC work confidential?
Working with a PC creates a number of serious security problems for users:
While installing software on your PC, you might unknowingly install spyware
— programs that secretly change system settings, collect and transfer
personal information to external addresses, and perform other unwanted and
uncontrollable actions.
You have created and deleted many files on your computer. You do not want
anyone to view them. But is a deleted file really gone? No! The problem is
that deleted files can be easily recovered under the Windows operating
system to gain access to information a user would like to conceal.
Windows and the most widely used browsers, Internet Explorer and Netscape
Navigator, provide very weak protection on keeping trace Internet data
private.
While working with a PC, you leave thousands of bytes of evidence showing
your actions (records in various system files) that you don’t even know
about. This could include user names and passwords.
When replacing your old hard drive with a new, higher-capacity one, you
unwittingly leave lots of important and confidential information on the old
drive that can be recovered, even if you have reformatted it.
Acronis Privacy Expert Suite provides a solution to all of these problems. It
assures complete confidentiality of your PC and Internet actions and prevents
situations that threaten your computer and general security.
Besides methods corresponding to national standards, Acronis supports
predefined methods proposed by widely known and authoritative specialists in
the field of information security:
Peter Gutmann’s method – data on a hard disk is destroyed with 35 passes
Bruce Schneier’s method – data is destroyed with seven passes
The suite also supports simple but fast methods of information destruction that
zero all sectors on a single hard disk pass.
Another major feature of this version is the opportunity for you to create your
own methods for data destruction.
The most popular at the moment is the U.S. Standard, Department of
Defense 5220.22-M method. Therefore, Acronis Privacy Expert Suite utilizes it
by default for all user trace removal operations.
Detailed information on data destruction standards is given in Appendix A «Hard
Disk Wiping methods»of this guide.
What's new in Acronis Privacy Expert Suite 8.0?
Acronis Privacy Expert Suite has many new features that make it a fully
integrated software suite. They include:
User-friendly and simple wizards to quickly remove all traces of user actions
from PCs
Improved Spyware Removal Wizard
Spyware Shield – continuous spyware protection
Frequently updated spyware definitions base
Windows prefetchdirectory clean-up
System password clean-up
Applications traces clean-up
Additionally, improvements have been made to provide even more convenience.
Chapter 4«Internet Clean-up» — describes Web and
Chapter 5« System Clean-up» — offers detailed information on how to clean
Chapter 6«Application Traces Clean-up» — describes how to remove
Chapter 7«My privacy tools» — provides general information on additional
Chapter 8«Acronis Pop-up Blocker» — describes how to use the Acronis Pop-
Chapter 9«Acronis Drive Cleanser» — provides tools for guaranteed data
Appendix A«Hard Disk Wiping methods» — contains more detailed
Appendix B «Spyware threats glossary» — contains supplemental information
e-mail traces removal.
up your Windows system of all user traces
application usage traces from Windows using the Application Traces Clean-up Wizard.
tools and wizards that provide the means to completely delete data from
your PC, either with the suite installed, or just from a bootable diskette.
up Blocker.
destruction on selected drives or partitions.
information about methods of guaranteed confidential data destruction on a
PC hard disk.
on the most popular spyware and spyware parasites that Acronis Privacy
Expert Suite protects you from.
System requirements
To take full advantage of Acronis Privacy Expert Suite, you should have:
a PC-compatible computer with a Pentium CPU or equivalent
32 MB RAM
a floppy or a CD-RW drive
VGA monitor
a mouse (recommended)
Microsoft Windows 98/Me/NT/2000/XP/;
Microsoft Windows NT Server/2000 Server/2000 Advanced Server/Windows
2003 Server.
Microsoft Internet Explorer 4.0 or higher for correct Pop-up Blocker operation
Software use conditions
The conditions for use of Acronis Privacy Expert Suite are listed in the supplied
«License Agreement». The registration card that came with the software is your
proof that you legally purchased the suite. Each registration card has a unique
number.
Based on current legislation, the «License Agreement» is considered as a
contract between the user and software vendor. Violation of the contract may
lead to prosecution.
Illegal use or distribution of software is a violation of the law and will be
fast PC clean-up with limited security in mind, select any methods that
overwrite in a single pass, two passes or three passes
If you haven't set the common data destruction method yourself, Acronis
Privacy Expert Suite will default to the most popular and generally accepted one:
U.S. Standard, DoD 5220.22-M algorithm (See detailed information in
Appendix A«Hard Disk Wiping methods»).
2.5.3 Scheduled tasks
The scheduled clean-up (see section 0 «Scheduling tasks») might lead to errors
if data to be deleted is used by other programs.
You can set up Acronis Privacy Expert Suite for such situations by selecting from
the following variants:
Ignore
Retry
Cancel
Ask user
2.5.4 Explorer enhancements
Acronis Privacy Expert Suite provides an easy way to delete files quickly and
clean up folders through the Windows Explorer context menu.
To enable these options and to add the context menu commands, mark the
Enable Explorer Enhancements check-box.
The context menu also allows you to clean up the Windows Recycle Bin securely.
For that matter, clean-up preferences can not only include the data destruction
method, but also the destruction method wildcard. Scheduling tasks
Each PC clean-up variant of Acronis Privacy Expert Suite can be executed either
manuallyo r automatically as scheduled.
Having set PC clean-up as a daily procedure to be performed, for example, at
the end of a workday before powering off the PC, you can be sure that all
evidence of your PC and Internet activity will be removed each day.
Acronis Privacy Expert Suite features a built-in scheduler.
2.5.5 Invoking the scheduler
To set up the clean-up schedule, click the Schedule task sidebar button in the
Acronis Privacy Expert Suite main window.
Having invoked the Scheduler, you will need to select a clean-up variant to
perform at the selected time.
Having selected any variant, click Next to set additional parameters on the
second wizard page.
The scheduled clean-up might lead to errors if data to be deleted is used by other
programs.
You can set up Acronis Privacy Expert Suite for such situations. See section Global settings Æ Scheduled tasks.
2.6 Using the Log
The Log keeps track of all actions performed by Acronis Privacy Expert Suite. It
can provide you with a complete history and reasons for any problems that have
occurred.
Working with Acronis Privacy Expert Suite
Log view window
Log settings enables you to keep track with different degrees of detail. You can
select one of the following variants:
Everything
Important information – error and spyware messages
Nothing
There are many programs that, once on your PC, start working without your
knowledge. Such software can do such things as collect information or change
user settings for the Internet or your system. These programs are called
spyware. For more information on the main spyware types, see Appendix B of
this guide.
Acronis Privacy Expert Suite enables you to completely clean your PC of spyware
and protect it from future intrusions.
How spyware gets on your PC
One of the most common ways that spyware gets on your PC is from new
software installations, in particular freeware and shareware. When you install
such applications, they can implement software modules that collect information
on Web sites you visit, your PC configuration, etc.
Another common source of spyware is peer-to-peer networks, gaming portals
and other Web services.
Sometimes spyware is installed by commercial applications whose makers want
to collect additional information about users, their habits and preferences.
How to recognize spyware?
Though in many cases spyware works without users’ knowledge, there are signs
that you should watch for:
Hard drive LED is blinking even when no programs are run or documents
open
Your PC receives and sends unknown information via the Internet though you
aren’t using a Web browser or e-mail client
The home page setting of your browser has changed without your consent
When you work with certain programs or visit certain Web sites, you see ads
or pop-ups
If you notice some of these activities, you need to run Acronis Privacy Expert
Suite to find and eliminate spyware performing unauthorized operations on your
PC.
If you need to:
Find and remove any type of spyware from your PC, run Spyware removal
(see section 3.1.1 «Removing spyware with the Spyware Removal Wizard»)
Prevent spyware from getting on your PC, enable and set up Spyware
Using Acronis Privacy Expert Suite, you can find and remove spyware from your
PC. To do this, select and click Spyware removal in the main program window.
After that, you can either initiate spyware removal with the Spyware Removal Wizard at once, or set up this wizard.
In the Settings of this component, you can select the spyware type to clean up.
By default, it is set to remove any type of spyware.
3.1.1 Removing spyware with the Spyware Removal Wizard
To run the Spyware Removal Wizard, select Remove Spyware Now in
the Spyware Removal window.
Spyware Removal Wizard
After the wizard is run, your PC will be checked for spyware. The results will be
shown in the righthand part of the wizard window. You will see what spyware
applications are found and which files and registry keys are related to them: