2011
Table Of Contents
- Acronis Internet Security 2011
- Table of Contents
- Getting Started
- Configuration and Management
- 9. General Settings
- 10. Antivirus Protection
- 10.1. Real-time Protection
- 10.2. On-demand Scanning
- 10.3. Configuring Scan Exclusions
- 10.4. Quarantine Area
- 11. Antiphishing Protection
- 12. Search Advisor
- 13. Antispam
- 14. Parental Control
- 15. Privacy Control
- 16. Firewall
- 17. Vulnerability
- 18. Chat Encryption
- 19. File Encryption
- 20. Game / Laptop Mode
- 21. Home Network
- 22. Update
- How To
- Troubleshooting and Getting Help
- 29. Troubleshooting
- 29.1. Scan Doesn't Start
- 29.2. I Can no Longer Use an Application
- 29.3. I Cannot Connect to the Internet
- 29.4. I Cannot Use a Printer
- 29.5. I Cannot Share Files with Another Computer
- 29.6. My Internet Is Slow
- 29.7. How to Update Acronis Internet Security on a Slow Internet Connection
- 29.8. Acronis Internet Security Services Are Not Responding
- 29.9. Antispam Filter Does Not Work Properly
- 30. Removing Malware from Your System
- 30.1. What to Do When Acronis Internet Security Finds Viruses on Your Computer?
- 30.2. If Your System Does Not Start
- 30.3. How Do I Clean a Virus in an Archive?
- 30.4. How Do I Clean a Virus in an E-Mail Archive?
- 30.5. What to Do When Acronis Internet Security Detected a Clean File as Infected?
- 30.6. How to Clean the Infected Files from System Volume Information
- 30.7. What Are the Password-Protected Files in the Scan Log?
- 30.8. What Are the Skipped Items in the Scan Log?
- 30.9. What Are the Over-Compressed Files in the Scan Log?
- 30.10. Why Did Acronis Internet Security Automatically Delete an Infected File?
- 31. Support
- 32. Useful Information
- 29. Troubleshooting
- Glossary
The user is informed whenever an activity is blocked through a specific alert message
(for example, a standard alert web page, e-mail or instant message). Detailed
information is provided so that the user can find out why the activity was blocked.
5.7. Privacy Control Alerts
Privacy Control provides advanced users with some extra features to protect their
privacy. You will be prompted for action through specific alert windows if you choose
to enable any of these components:
● Registry Control - asks for your permission whenever a program tries to modify
a registry entry in order to be executed at Windows start-up.
● Cookie Control - asks for your permission whenever a new website tries to set a
cookie.
● Script Control - asks for your permission whenever a website tries to activate a
script or other active content.
5.7.1. Registry Alerts
If you enable Registry Control, you will be prompted for permission whenever a new
program tries to modify a registry entry in order to be executed at Windows start-up.
You can see the program that is trying to modify Windows Registry.
Note
Acronis Internet Security will usually alert you when you install new programs that
need to run after the next startup of your computer. In most cases, these programs
are legitimate and can be trusted.
If you do not recognize the program and if it seems suspicious, click Block to prevent
it from modifying Windows Registry. Otherwise, click Allow to permit the
modification.
Based on your answer, a rule is created and listed in the rules table. The same action
is applied whenever this program tries to modify a registry entry.
For more information, please refer to
“Registry Control” (p. 93).
5.7.2. Script Alerts
If you enable Script Control, you will be prompted for permission whenever a new
web site tries to run a script or other active content.
You can see the name of the resource.
Click Yes or No and a rule will be created, applied and listed in the rules table. The
same action will be applied automatically whenever the respective site tries to run
active content.
Alerts and Pop-ups
22