![ACRONIS PRIVACY EXPERT CORPORATE - Скачать руководство пользователя страница 5](http://html1.mh-extra.com/html/acronis/privacy-expert-corporate/privacy-expert-corporate_user-manual_2841332005.webp)
5.1
Product registration .................................................................................................. 29
5.2
Spyware database update........................................................................................ 29
5.2.1
Running Spyware Definitions Updates Wizard ................................................................... 29
5.2.2
Selecting remote computers to update spyware definitions................................................ 30
5.2.3
Selecting update mode....................................................................................................... 30
5.2.4
Setting the schedule........................................................................................................... 31
5.2.5
Entering user name and password ..................................................................................... 32
CHAPTER 6.
ACRONIS POP-UP BLOCKER ............................................................................ 33
6.1
What are pop-ups? ................................................................................................... 33
6.2
Acronis Pop-up Blocker ............................................................................................ 33
6.3
Acronis Pop-up Blocker local options....................................................................... 33
6.3.1
Acronis Pop-up Blocker general settings............................................................................ 34
6.3.2
Last visited pages............................................................................................................... 34
6.3.3
Blocked URLs .................................................................................................................... 34
6.3.4
White URLs ........................................................................................................................ 34
6.3.5
Black URLs ........................................................................................................................ 35
CHAPTER 7.
OTHER OPERATIONS......................................................................................... 36
7.1
Creating a bootable diskette or CD with Acronis Drive Cleanser ............................ 36
7.2
Data destruction with Acronis Drive Cleanser.......................................................... 36
APPENDIX A.
SPYWARE THREATS GLOSSARY.................................................................... 38
Adware .............................................................................................................................................. 38
Browser Helper Objects..................................................................................................................... 38
Browser hijackers .............................................................................................................................. 38
Commercial keylogger....................................................................................................................... 38
Dialers ............................................................................................................................................... 38
Exploit/Security holes ........................................................................................................................ 39
Remote Administration ...................................................................................................................... 39
Sniffers .............................................................................................................................................. 39
Spyware ............................................................................................................................................ 39
Toolbars ............................................................................................................................................ 39
Trojan Horses (Trojans) .................................................................................................................... 39
Copyright © Acronis, Inc., 2000-2005
5