2011
Table Of Contents
- Acronis Internet Security 2011
- Table of Contents
- Getting Started
- Configuration and Management
- 9. General Settings
- 10. Antivirus Protection
- 10.1. Real-time Protection
- 10.2. On-demand Scanning
- 10.3. Configuring Scan Exclusions
- 10.4. Quarantine Area
- 11. Antiphishing Protection
- 12. Search Advisor
- 13. Antispam
- 14. Parental Control
- 15. Privacy Control
- 16. Firewall
- 17. Vulnerability
- 18. Chat Encryption
- 19. File Encryption
- 20. Game / Laptop Mode
- 21. Home Network
- 22. Update
- How To
- Troubleshooting and Getting Help
- 29. Troubleshooting
- 29.1. Scan Doesn't Start
- 29.2. I Can no Longer Use an Application
- 29.3. I Cannot Connect to the Internet
- 29.4. I Cannot Use a Printer
- 29.5. I Cannot Share Files with Another Computer
- 29.6. My Internet Is Slow
- 29.7. How to Update Acronis Internet Security on a Slow Internet Connection
- 29.8. Acronis Internet Security Services Are Not Responding
- 29.9. Antispam Filter Does Not Work Properly
- 30. Removing Malware from Your System
- 30.1. What to Do When Acronis Internet Security Finds Viruses on Your Computer?
- 30.2. If Your System Does Not Start
- 30.3. How Do I Clean a Virus in an Archive?
- 30.4. How Do I Clean a Virus in an E-Mail Archive?
- 30.5. What to Do When Acronis Internet Security Detected a Clean File as Infected?
- 30.6. How to Clean the Infected Files from System Volume Information
- 30.7. What Are the Password-Protected Files in the Scan Log?
- 30.8. What Are the Skipped Items in the Scan Log?
- 30.9. What Are the Over-Compressed Files in the Scan Log?
- 30.10. Why Did Acronis Internet Security Automatically Delete an Infected File?
- 31. Support
- 32. Useful Information
- 29. Troubleshooting
- Glossary
To edit a rule select it and click the Edit button or double-click it. A new window
will appear. Here you can change the name, description and parameters of the rule
(type, data and traffic). Click OK to save the changes.
15.3. Registry Control
A very important part of the Windows operating system is called the Registry. This
is where Windows keeps its settings, installed programs, user information and so
on.
The Registry is also used to define which programs should be launched
automatically when Windows is started. Viruses often use this in order to be
automatically launched when the user restarts his computer.
Registry Control keeps an eye on the Windows Registry - this is again useful for
detecting Trojan horses. It will alert you whenever a program will try to modify a
registry entry in order to be executed at Windows start-up. For more information,
please refer to “Registry Alerts” (p. 22).
To configure Registry Control:
1. Open Acronis Internet Security, click Options in the upper-right corner of the
window and choose Expert View.
2. Go to Privacy Control > Registry.
3. Select the corresponding check box to enable Registry Control.
Note
If the option cannot be configured, go to the Status tab and enable Privacy Control.
Managing Rules
To delete a rule, select it and click the Delete button.
15.4. Cookie Control
Cookies
are a very common occurrence on the Internet. They are small files stored
on your computer. Websites create these cookies in order to keep track of specific
information about you.
Cookies are generally made to make your life easier. For example they can help
the website remember your name and preferences, so that you don't have to enter
them on every visit.
But cookies can also be used to compromise your privacy, by tracking your surfing
patterns.
Privacy Control
93