Detailed instructions for use are in the User's Guide.
[. . . ] User's Guide
Acronis Privacy Expert Suite 9. 0
Compute with confidence
www. acronis. com
Copyright © Acronis, Inc. , 2000-2005. Windows and MS-DOS are registered trademarks of Microsoft Corporation. All other trademarks and copyrights referred to are the property of their respective owners. Distribution of substantively modified versions of this document is prohibited without the explicit permission of the copyright holder. [. . . ] All malicious software found will be automatically checked for removal. If you, want to leave some malicious applications or their components, uncheck them in the resulting list. This option gives you the ability to keep those programs and/or settings. )
24
Copyright © Acronis, Inc. , 2000-2005
Malicious software removal and Malware shield
After you finish forming the list of malicious software to be removed, click Next. In the next window, you will see the final script of malicious software removal operations.
Malicious software removal operations final script
To execute the script, click Proceed. After malicious software clean-up is finished, you will see a summary that will state the amount of malicious software applications removed.
In Windows normal mode some malicious applications are usually stay hidden so you can not see them and track their work. Therefore, we recommend you to launch the Malicious Software Wizard in Windows safe mode periodically in addition to scanning malware in normal mode. To run Windows in safe mode press <F8> key after your computer starts (restarts) but before Windows launches.
3. 1. 2 Setting up the Malicious Software Wizard
To set up the Malicious Software Wizard, select Configure Malware Removal Options in the Malware Removal window.
Selecting scanning mode
There are two modes of searching for malware: Smart scanning mode used by default. In this case, the suite searches for malware only in the most likely locations, including system, user profile and temporary files folders, as well as in the system registry. This variant could take much more time depending on the capacity of your hard disks.
Copyright © Acronis, Inc. , 2000-2005
25
Malicious software removal and Malware shield
Malicious software scanning modes
Setting up Deep scanning mode
If you selected Deep scanning mode, you can manually select disks and folders in which to search for malware:
Disk and folders selection
Saving settings
All Malicious Software Wizard settings will be active until you change them.
3. 2
Malicious software protection
Acronis Privacy Expert Suite not only allows you to remove malicious software, but also prevent it from getting on your PC in the first place. This is provided by
26
Copyright © Acronis, Inc. , 2000-2005
Malicious software removal and Malware shield
Acronis Malware shield -- a special tool that monitors your system for suspicious applications and components.
3. 2. 1 Enabling Malware shield
To enable Malware shield, select Start Programs Acronis Malware shield Acronis Malware shield. After Malware shield is enabled, you will see its icon in the system tray. To disable Malware shield right click the Acronis Malware shield icon in the system tray and select Disable Acronis Malware shield.
3. 2. 2 Setting up Malware shield
You can configure the Malware shield settings. To do so, right click on the Acronis Malware shield icon in the system tray and select Acronis Malware Shield Options.
Setting up the system protection level
You can set up the Protection Level monitoring your system for malicious software and applications: Low protection level monitors only all running processes and notifies you if a process is described in malicious software database. Medium protection level monitors all running processes and notifies you if a process is described in malicious software database. It also prevents suspicious processes from launching at Windows startup, prevents Web browser settings from hijacking and protects ActiveX components settings. It includes all Medium level protections and also protects all processes and Windows system files. This is the recommended setting for experienced users.
Copyright © Acronis, Inc. , 2000-2005
27
Malicious software removal and Malware shield
System protection level
To view and/or customize options of the selected protection level click Options.
General settings
In the General settings window, you can enable Acronis Malware Shield protecting your system and running at system startup.
General settings window
Having set up all settings, you can apply changes by clicking Apply button. Use Cancel button to if you do not want changes to be applied.
28
Copyright © Acronis, Inc. , 2000-2005
Malicious software removal and Malware shield
Process analyzing
You can enable/disable analyzing of the running processes by checking the corresponding parameter.
Process analyzing
Registry protection
In the Registry protection section, you can enable/disable: Browser settings protection from hijacking by suspicious applications Preventing suspicious software and processes from launching at system startup Protection of the ActiveX components settings Preventing application from sharing resources or changing settings of shared resources
Copyright © Acronis, Inc. , 2000-2005
29
Malicious software removal and Malware shield
Registry protection
Memory protection
In the Memory protection section, you can enable/disable: Process' thread access protection from other processes Process' virtual memory protection from trying to get access to any other process memory Process terminating protection
30
Copyright © Acronis, Inc. , 2000-2005
Malicious software removal and Malware shield
Process protection
File protection
In the File protection section, you can enable/disable protection your system files, critical to Windows work.
Specified rules
The Specified rules section contains a list of protection rules that you specified. You can remove selected rule by clicking Remove or use Clear all to remove all entries.
Copyright © Acronis, Inc. , 2000-2005
31
Malicious software removal and Malware shield
Specified rules
History
The History section contents a list of all events occurred, so you can view and analyze it. Use Clear all button to remove all list entries.
History window
Show alerts
You can select an unresolved alert (or group of alerts), view its description and choose an action to be taken with it.
32 Copyright © Acronis, Inc. , 2000-2005
Malicious software removal and Malware shield
To extend the chosen action to all other alerts of the same activity type check the Propagate this action to all alerts of the same activity type parameter. You can also choose how to apply specified action (Once, This time and specify the permanent rule or This time and always until the process is restarted).
Alert window
You can close Alert window, outing off rule creation. As a result the Malware Shield's pictogram in the system tray will start to blink, notifying that you have unresolved alerts. [. . . ] Logical zeros (0x00 numbers) to each byte of each sector for 6th to 4th security level systems. Randomly selected symbols (numbers) to each byte of each sector for 3rd to 1st security level systems. It's based on his theory of hard disk information wiping (see http://www. cs. auckland. ac. nz/~pgut001 /pubs/secure_del. html). Bruce Schneier offers a seven-pass overwriting method in his Applied Cryptography book. [. . . ]