2011

Table Of Contents
4. Wait for the boot process to complete. This may take a while.
5. As soon as the boot process has completed, the Acronis Internet Security
signatures are updated automatically and a scan of all detected hard disk
partitions is started. You should wait for the scan to finish.
6. Your hard disk partitions will appear on the desktop. To view the contents of a
disk in a window similar to Windows Explorer, double-click it.
Note
When working with the Acronis Rescue CD, you will deal with Linux-type partition
names. Disks that were not labeled under Windows will appear as
[LocalDisk-0] probably corresponding to the (C:) Windows-type partition,
[LocalDisk-1] corresponding to (D:) and so on.
7. Plug the removable device into an USB port on your computer. In a few moments
a window will appear showing the contents of the device.
8. You can copy files and folders as you would normally do in the Windows
environment.
If this information was not helpful, you can contact Acronis Internet Security for
support as described in section
Support (p. 171).
30.3. How Do I Clean a Virus in an Archive?
An archive is a file or a collection of files compressed under a special format to
reduce the space on disk necessary for storing the files.
Some of these formats are open formats, thus providing Acronis Internet Security
the option to scan inside them and then take appropriate actions to remove them.
Other archive formats are partially or fully closed, and Acronis Internet Security can
only detect the presence of viruses inside them, but is not able to take any other
actions.
If Acronis Internet Security notifies you that a virus has been detected inside an
archive and no action is available, it means that removing the virus is not possible
due to restrictions on the archive’s permission settings.
Here is how you can clean a virus stored in an archive:
1. Identify the archive that includes the virus by performing a Deep System Scan
of the system.
2. Turn off the Acronis Internet Security real-time antivirus protection.
3. Go to the location of the archive and decompress it using an archiving application,
like WinZip.
4. Identify the infected file and delete it.
Removing Malware from Your System
166