background image

 

 

Windows usually keeps temporary files in a special folder. For example, 
C:\Windows\

Temp

 or D:\Documents and Settings\<user name>\Local 

Settings\

Temp

 folder. 

In this case, temporary files folder means a folder specified in the 

temp 

environment

 

variable. It is set by the Windows 

set 

command. You can 

check 

temp 

value by typing 

set 

temp in the command line. As a result, 

under Windows XP you will get a string like D:\Documents and 
Settings\<user name>\Local Settings\

Temp

Temporary files can usually be determined by their extensions. For example, 
they can be as follows: 

• 

*.bak, *.old

 – back-up copies, 

• 

*.gid

 – a temporary file, created when opening Windows help, 

• 

*.chk

 – files, created while disk is checked for lost clusters, 

• 

*.tmp, *.$*, *.~*, *.---, ~*.*

 – other temporary files, 

created by a variety of programs. 

Please note the above list is far from complete. 

 

Besides 

temporary files 

clean-up

Acronis PrivacyExpert offers to clean your 

user 

folders and files 

(described further), deleting all temporary files from folders 

on any 

connected disks

 according to the provided «Files» value. 

 

Setting the 

temporary files

 clean-up, you can provide *.* «Files» value to destroy 

all

 

files

 from the temporary files folder. 

3.2.4 

Hard Disks Free Space 

Disk free space

 clean-up allows you to destroy all data possibly stored in 

the hard disk drive’s free space sectors. 

Disk free space almost always contains information and data under the 
control of Windows.  

Windows does not actually remove anything when 

deleting a file

: its name 

is simply replaced with unusable characters for Windows in the File Allocation 
Table, (FAT). The file becomes invisible only for a user, and the 

cluster

 

chain with file data is considered free, but the information does not 
disappear from the hard disk sectors. It is actually very simple to recover 
deleted Windows files. There are numerous programs for doing this under 
either DOS and Windows. 

Formatting or deleting a partition also does not destroy information from the 
hard disk sectors. It can be read directly from them if needed. 

Acronis PrivacyExpert 

33

 

Summary of Contents for PRIVACYEXPERT 2003

Page 1: ...User s Guide PrivacyExpert 2003 Compute with confidence www acronis com...

Page 2: ...it permission of the copyright holder Distribution of the work or derivative work in any standard paper book form for commercial purposes is prohibited unless prior permission is obtained from the cop...

Page 3: ...RITHMS 22 CHAPTER 2 COMPLEX PC CLEAN UP 23 2 1 ENTIRE PC CLEAN UP 23 2 2 SYSTEM CLEAN UP 24 2 3 INTERNET CLEAN UP 24 CHAPTER 3 SEPARATE PC COMPONENTS CLEAN UP 25 3 1 INTERNET COMPONENTS 25 3 1 1 INTER...

Page 4: ...files can be easily recovered under the Windows operating system to gain access to information a user would like to conceal 2 Windows and the most widespread browsers Internet Explorer and Netscape Na...

Page 5: ...f very private personal data might fall into hands of malicious persons to suit such ends as blackmail intimidation extortion and orout rightfraud Your work colleagues might potentially gain access to...

Page 6: ...cronis PrivacyExpert user s interface setting and executing different PC clean up variants Chapter 2 Complex PC Clean up If you need to perform a complex clean up of PC sections read section 2 1 Entir...

Page 7: ...s that have legally purchased and registered their copy of Acronis PrivacyExpert receive free technical support from Acronis If you have problems installing or using the system that you cannot be reso...

Page 8: ...rt the Acronis PrivacyExpert installation CD ROM into the CD ROM drive and run the program Please carefully follow all instructions shown in the installation wizard Having answered all the questions i...

Page 9: ...ce features a standard Windows XP icon graphical user interface GUI elements We will not describe details here but instead pay general attention to setting and executing clean up variants 1 6 1 The Ac...

Page 10: ...f three predefined complex PC clean up Ifyouneedtoperform 1 entire PC clean up including Windows system areas and sections related to working on the Internet execute EntirePCClean up 2 clean up of sec...

Page 11: ...as well as separate components clean up are executed manually or by schedule and are set universally see 1 6 3 Executing PC Clean up Manually 1 6 6 Executing Scheduled PC Clean up 1 6 4 Clean up diff...

Page 12: ...the context menu of a clean up variant by selecting Properties SettingPCcomponentclean upwiththeeditor Below you can see the opened settings editor featuring two groups of components to clean that be...

Page 13: ...m file type Internet browser etc Files setting 3 to save your settings click Apply To discard changes click Cancel IfyouneedtorestoreAcronisPrivacyExpertdefaultclean upsettings 1 select the component...

Page 14: ...d Address settings are common for components related to working on the Internet InternetBrowsers setting Acronis PrivacyExpert automatically finds all supported browsers installed on your PC and by de...

Page 15: ...ial Internet addresses is almost infinite You can enter any number of addresses like worldsoccer com or formula1 com separated by semicolon Ifyouneedto 1 clean up Internet cache last visited pages lis...

Page 16: ...ms and Appendix A Hard Disk Wiping algorithms The most secure algorithms are always very slow and vice versa the quickest algorithms provide less reliability and security Having mouse clicked a settin...

Page 17: ...mma and symbols and can have values similar to the following to delete all files from the Recycle Bin with any file names and extensions doc to delete files with specific extension a Microsoft documen...

Page 18: ...sult in removal of read txt readme txt read1 txt etc files while read doc readme doc etc will remain 3 delete only specific length filenames from the Recycle Bin system or user folder enter filename a...

Page 19: ...ng according to Windows rules see Files setting If you simply need to delete all local network computer search strings suitable in most cases 1 select FindComputerList 2 check the EnabletheFindCompute...

Page 20: ...reliably removed each day Acronis PrivacyExpert features a built in scheduler Invokingthescheduler Having mouse clicked a clean up variant in the right part of the Acronis PrivacyExpert main window an...

Page 21: ...n all of the above click Next and set additional execution settings on the 2nd scheduler page IfyouneedautomaticPCclean up 1 at PC startup set the switch on the 1st scheduler page to When my computers...

Page 22: ...that meet these national standards Acronis PrivacyExpert provides two far more powerful pre defined algorithms offered by top information security specialists 6 Peter Gutmann s algorithm 7 Bruce Schne...

Page 23: ...user activity evidence 2 delete temporaryfiles from standard Windows folders 3 delete any file types from user folders on any disks connected to the PC 4 clean Windows RecycleBin 5 clean Windows swap...

Page 24: ...be executed by mouse clicking the clean up variant in the right part of the main window for other execution methods see sections 1 6 3 1 6 6 For detailed descriptions of what Acronis PrivacyExpert pe...

Page 25: ...s PrivacyExpert can perform in specific cases Various execution and set up capabilities of PC and separate components clean up variants of Acronis PrivacyExpert are described in detail above see 1 6 3...

Page 26: ...on Each cached file has the Internet address property to track its origin It is therefore better to set the Address setting instead of Files when erasing Internet cache This enables you to delete file...

Page 27: ...tent Acronis PrivacyExpert enables you to delete unnecessary cookies You can keep the cookies you need as Acronis PrivacyExpert can choose what cookies to delete and what to leave safe What cookies ar...

Page 28: ...on a PC without the user s knowledge as various sites are visited ActiveX elements enable dynamic content on the web pages instead of just static viewing ActiveX elements can provide Internet access...

Page 29: ...is nearly impossible to fully control all ActiveX elements Ifyouwishtocontrolinstalleddownloadedcomponents 1 select DownloadedComponentsclean up in the settings editor 2 select Protected Components a...

Page 30: ...s lists differently depending on the page visiting method whether a user typed the address in the Address field or mouse clicked a link on the already opened page In some cases last visited pages are...

Page 31: ...ll visited Internet address lists whether they were manually typed or clicked Note that site address can be typed into the Open field of the Run window invoked from the Start menu Clicking OK in this...

Page 32: ...the windows and thus stored the contents of previous window in the swap file If the user closed the browser his her personal information has been very possibly stored in the swap file After swap file...

Page 33: ...described further deleting all temporary files from folders on any connected disks according to the provided Files value Setting the temporary files clean up you can provide Files value to destroy all...

Page 34: ...rely and unrecoverably destroys user files from specified folders using special algorithms see Data destruction algorithm and 1 7 Data Clean up Algorithms To delete user files Acronis PrivacyExpert en...

Page 35: ...lists etc are stored not only in the registry but also in its back up copy If you clean up the user data stored in the registry with Acronis PrivacyExpert and re boot the PC Windows will automaticall...

Page 36: ...er name including its domain name but can also be a partialcomputername Find computer strings stored in the registry Windows Explorer performs various file system navigation functions It also supports...

Page 37: ...etes the list that indicates your file search activity on computer disks from the Windows registry A file string may contain a full filename including its path or just a partial name Find files string...

Page 38: ...Selecting Documents from the Start menu you will find that Windows shows recently executed or opened files These can be images viewed Excel tables MP3 or WAV sound files etc To protect your privacy yo...

Page 39: ...The Open list lets you type in a name of a file folder network folder or Internet address Clicking OK you run the program application open file or connect to the selected site Windows keeps a history...

Page 40: ...el etc and folders are stored as links in the D Documents and Settings user name Recent folder Even if a file was deleted it is referenced from the Recent folder The link contains the file and folder...

Page 41: ...y requires specialized software and inexpensive hardware to read data deleted this way by analyzing magnetization of hard disk sectors residual magnetization of track sides and or by using current mag...

Page 42: ...Algorithm writing method Passes Record 1 American DoD 5220 22 M 4 1st pass randomly selected symbols to each byte of each sector 2 complementary to written during the 1st pass 3 random symbols again...

Page 43: ...iping see http www cs auckland ac nz pgut001 pubs secure_del html 7 B Schneier s algorithm 7 Bruce Schneier offers seven pass overwriting algorithm in his Applied Cryptography book 1st pass 0xFF 2st p...

Reviews: