background image

 

 

Chapter 2.  Complex PC Clean-up  

Using variants of 

complex PC clean-up

 described below, you can 

clean a 

large number of various 

Windows 

components

 that keep evidence of your 

PC activity. 

Vice versa, if you need to clean-up 

only a specific 

Windows 

component

, for 

example, last visited Internet pages, you should use one of the Acronis 
PrivacyExpert sections, described below (see Chapter 3 «Separate PC 
Components Clean-up»). Separate component clean-up is faster than any 
variant of complex PC clean-up. 

2.1 

Entire PC Clean-up 

If you need 

to clean a PC of 

any evidence

 of your activity, select the 

Entire 

PC clean-up

. Executing it, you’ll be able to clean 

all

 Windows 

components 

accessible by 

Acronis PrivacyExpert: 

1. clean 

Windows 

registry

 from user activity evidence; 

2. delete 

temporary files

 from standard Windows folders; 

3. delete 

any file types from user folders

 on any disks connected 

to the PC; 

4. clean 

Windows 

Recycle Bin

5. clean 

Windows 

swap file

;

 

6.  clean hard disk 

free space

7.  clean the last visited pages and 

last used documents 

list; 

8. delete 

the 

evidence of searching

 for files on connected disks, for 

networked computers, for information on the Internet; 

9. clean 

Internet cache

;

 

10. delete 

cookies

 

11. delete downloaded 

components

12. clean 

Internet history and last visited pages list

Entire PC clean-up is executed by a mouse-click on its name in the right part 
of the main window (for other execution methods see sections 1.6.3, 1.6.6). 

For detailed descriptions of what Acronis PrivacyExpert performs in every 
specific case (how and what files, folders, system or registry sections it cleans 
from what data) see the Chapter 3 «Separate PC Components Clean-up». 

Acronis PrivacyExpert 

23

 

Summary of Contents for PRIVACYEXPERT 2003

Page 1: ...User s Guide PrivacyExpert 2003 Compute with confidence www acronis com...

Page 2: ...it permission of the copyright holder Distribution of the work or derivative work in any standard paper book form for commercial purposes is prohibited unless prior permission is obtained from the cop...

Page 3: ...RITHMS 22 CHAPTER 2 COMPLEX PC CLEAN UP 23 2 1 ENTIRE PC CLEAN UP 23 2 2 SYSTEM CLEAN UP 24 2 3 INTERNET CLEAN UP 24 CHAPTER 3 SEPARATE PC COMPONENTS CLEAN UP 25 3 1 INTERNET COMPONENTS 25 3 1 1 INTER...

Page 4: ...files can be easily recovered under the Windows operating system to gain access to information a user would like to conceal 2 Windows and the most widespread browsers Internet Explorer and Netscape Na...

Page 5: ...f very private personal data might fall into hands of malicious persons to suit such ends as blackmail intimidation extortion and orout rightfraud Your work colleagues might potentially gain access to...

Page 6: ...cronis PrivacyExpert user s interface setting and executing different PC clean up variants Chapter 2 Complex PC Clean up If you need to perform a complex clean up of PC sections read section 2 1 Entir...

Page 7: ...s that have legally purchased and registered their copy of Acronis PrivacyExpert receive free technical support from Acronis If you have problems installing or using the system that you cannot be reso...

Page 8: ...rt the Acronis PrivacyExpert installation CD ROM into the CD ROM drive and run the program Please carefully follow all instructions shown in the installation wizard Having answered all the questions i...

Page 9: ...ce features a standard Windows XP icon graphical user interface GUI elements We will not describe details here but instead pay general attention to setting and executing clean up variants 1 6 1 The Ac...

Page 10: ...f three predefined complex PC clean up Ifyouneedtoperform 1 entire PC clean up including Windows system areas and sections related to working on the Internet execute EntirePCClean up 2 clean up of sec...

Page 11: ...as well as separate components clean up are executed manually or by schedule and are set universally see 1 6 3 Executing PC Clean up Manually 1 6 6 Executing Scheduled PC Clean up 1 6 4 Clean up diff...

Page 12: ...the context menu of a clean up variant by selecting Properties SettingPCcomponentclean upwiththeeditor Below you can see the opened settings editor featuring two groups of components to clean that be...

Page 13: ...m file type Internet browser etc Files setting 3 to save your settings click Apply To discard changes click Cancel IfyouneedtorestoreAcronisPrivacyExpertdefaultclean upsettings 1 select the component...

Page 14: ...d Address settings are common for components related to working on the Internet InternetBrowsers setting Acronis PrivacyExpert automatically finds all supported browsers installed on your PC and by de...

Page 15: ...ial Internet addresses is almost infinite You can enter any number of addresses like worldsoccer com or formula1 com separated by semicolon Ifyouneedto 1 clean up Internet cache last visited pages lis...

Page 16: ...ms and Appendix A Hard Disk Wiping algorithms The most secure algorithms are always very slow and vice versa the quickest algorithms provide less reliability and security Having mouse clicked a settin...

Page 17: ...mma and symbols and can have values similar to the following to delete all files from the Recycle Bin with any file names and extensions doc to delete files with specific extension a Microsoft documen...

Page 18: ...sult in removal of read txt readme txt read1 txt etc files while read doc readme doc etc will remain 3 delete only specific length filenames from the Recycle Bin system or user folder enter filename a...

Page 19: ...ng according to Windows rules see Files setting If you simply need to delete all local network computer search strings suitable in most cases 1 select FindComputerList 2 check the EnabletheFindCompute...

Page 20: ...reliably removed each day Acronis PrivacyExpert features a built in scheduler Invokingthescheduler Having mouse clicked a clean up variant in the right part of the Acronis PrivacyExpert main window an...

Page 21: ...n all of the above click Next and set additional execution settings on the 2nd scheduler page IfyouneedautomaticPCclean up 1 at PC startup set the switch on the 1st scheduler page to When my computers...

Page 22: ...that meet these national standards Acronis PrivacyExpert provides two far more powerful pre defined algorithms offered by top information security specialists 6 Peter Gutmann s algorithm 7 Bruce Schne...

Page 23: ...user activity evidence 2 delete temporaryfiles from standard Windows folders 3 delete any file types from user folders on any disks connected to the PC 4 clean Windows RecycleBin 5 clean Windows swap...

Page 24: ...be executed by mouse clicking the clean up variant in the right part of the main window for other execution methods see sections 1 6 3 1 6 6 For detailed descriptions of what Acronis PrivacyExpert pe...

Page 25: ...s PrivacyExpert can perform in specific cases Various execution and set up capabilities of PC and separate components clean up variants of Acronis PrivacyExpert are described in detail above see 1 6 3...

Page 26: ...on Each cached file has the Internet address property to track its origin It is therefore better to set the Address setting instead of Files when erasing Internet cache This enables you to delete file...

Page 27: ...tent Acronis PrivacyExpert enables you to delete unnecessary cookies You can keep the cookies you need as Acronis PrivacyExpert can choose what cookies to delete and what to leave safe What cookies ar...

Page 28: ...on a PC without the user s knowledge as various sites are visited ActiveX elements enable dynamic content on the web pages instead of just static viewing ActiveX elements can provide Internet access...

Page 29: ...is nearly impossible to fully control all ActiveX elements Ifyouwishtocontrolinstalleddownloadedcomponents 1 select DownloadedComponentsclean up in the settings editor 2 select Protected Components a...

Page 30: ...s lists differently depending on the page visiting method whether a user typed the address in the Address field or mouse clicked a link on the already opened page In some cases last visited pages are...

Page 31: ...ll visited Internet address lists whether they were manually typed or clicked Note that site address can be typed into the Open field of the Run window invoked from the Start menu Clicking OK in this...

Page 32: ...the windows and thus stored the contents of previous window in the swap file If the user closed the browser his her personal information has been very possibly stored in the swap file After swap file...

Page 33: ...described further deleting all temporary files from folders on any connected disks according to the provided Files value Setting the temporary files clean up you can provide Files value to destroy all...

Page 34: ...rely and unrecoverably destroys user files from specified folders using special algorithms see Data destruction algorithm and 1 7 Data Clean up Algorithms To delete user files Acronis PrivacyExpert en...

Page 35: ...lists etc are stored not only in the registry but also in its back up copy If you clean up the user data stored in the registry with Acronis PrivacyExpert and re boot the PC Windows will automaticall...

Page 36: ...er name including its domain name but can also be a partialcomputername Find computer strings stored in the registry Windows Explorer performs various file system navigation functions It also supports...

Page 37: ...etes the list that indicates your file search activity on computer disks from the Windows registry A file string may contain a full filename including its path or just a partial name Find files string...

Page 38: ...Selecting Documents from the Start menu you will find that Windows shows recently executed or opened files These can be images viewed Excel tables MP3 or WAV sound files etc To protect your privacy yo...

Page 39: ...The Open list lets you type in a name of a file folder network folder or Internet address Clicking OK you run the program application open file or connect to the selected site Windows keeps a history...

Page 40: ...el etc and folders are stored as links in the D Documents and Settings user name Recent folder Even if a file was deleted it is referenced from the Recent folder The link contains the file and folder...

Page 41: ...y requires specialized software and inexpensive hardware to read data deleted this way by analyzing magnetization of hard disk sectors residual magnetization of track sides and or by using current mag...

Page 42: ...Algorithm writing method Passes Record 1 American DoD 5220 22 M 4 1st pass randomly selected symbols to each byte of each sector 2 complementary to written during the 1st pass 3 random symbols again...

Page 43: ...iping see http www cs auckland ac nz pgut001 pubs secure_del html 7 B Schneier s algorithm 7 Bruce Schneier offers seven pass overwriting algorithm in his Applied Cryptography book 1st pass 0xFF 2st p...

Reviews: