2011

Table Of Contents
28. How Do I Update Acronis Internet Security Using a Proxy
Server? .................................................................. 148
Troubleshooting and Getting Help ............................... 149
29. Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150
29.1. Scan Doesn't Start . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150
29.2. I Can no Longer Use an Application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150
29.3. I Cannot Connect to the Internet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151
29.4. I Cannot Use a Printer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152
29.5. I Cannot Share Files with Another Computer . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153
29.6. My Internet Is Slow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154
29.7. How to Update Acronis Internet Security on a Slow Internet Connection . . . . 155
29.8. Acronis Internet Security Services Are Not Responding . . . . . . . . . . . . . . . . . . . 155
29.9. Antispam Filter Does Not Work Properly . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156
29.9.1. Legitimate Messages Are Marked as [spam] . . . . . . . . . . . . . . . . . . . . . . . 156
29.9.2. Many Spam Messages Are Not Detected . . . . . . . . . . . . . . . . . . . . . . . . . . . 159
29.9.3. Antispam Filter Does Not Detect Any Spam Message . . . . . . . . . . . . . . . . 162
30. Removing Malware from Your System . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164
30.1. What to Do When Acronis Internet Security Finds Viruses on Your
Computer? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164
30.2. If Your System Does Not Start . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165
30.3. How Do I Clean a Virus in an Archive? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166
30.4. How Do I Clean a Virus in an E-Mail Archive? . . . . . . . . . . . . . . . . . . . . . . . . . . . 167
30.5. What to Do When Acronis Internet Security Detected a Clean File as
Infected? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168
30.6. How to Clean the Infected Files from System Volume Information . . . . . . . . . 168
30.7. What Are the Password-Protected Files in the Scan Log? . . . . . . . . . . . . . . . . . 169
30.8. What Are the Skipped Items in the Scan Log? . . . . . . . . . . . . . . . . . . . . . . . . . . . 170
30.9. What Are the Over-Compressed Files in the Scan Log? . . . . . . . . . . . . . . . . . . . 170
30.10. Why Did Acronis Internet Security Automatically Delete an Infected File? . . 170
31. Support ............................................................. 171
32. Useful Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172
32.1. How Do I Remove Other Security Solutions? . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172
32.2. How Do I Restart in Safe Mode? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172
32.3. Am I Using a 32 bit or a 64 bit Version of Windows? . . . . . . . . . . . . . . . . . . . . . 173
32.4. How Do I Find Out My Proxy Settings? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173
32.5. How Do I Enable / Disable the Real Time Protection? . . . . . . . . . . . . . . . . . . . . . 174
32.6. How Do I Display Hidden Objects in Windows? . . . . . . . . . . . . . . . . . . . . . . . . . . 175
Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176
vii