2011
Table Of Contents
- Acronis Internet Security 2011
- Table of Contents
- Getting Started
- Configuration and Management
- 9. General Settings
- 10. Antivirus Protection
- 10.1. Real-time Protection
- 10.2. On-demand Scanning
- 10.3. Configuring Scan Exclusions
- 10.4. Quarantine Area
- 11. Antiphishing Protection
- 12. Search Advisor
- 13. Antispam
- 14. Parental Control
- 15. Privacy Control
- 16. Firewall
- 17. Vulnerability
- 18. Chat Encryption
- 19. File Encryption
- 20. Game / Laptop Mode
- 21. Home Network
- 22. Update
- How To
- Troubleshooting and Getting Help
- 29. Troubleshooting
- 29.1. Scan Doesn't Start
- 29.2. I Can no Longer Use an Application
- 29.3. I Cannot Connect to the Internet
- 29.4. I Cannot Use a Printer
- 29.5. I Cannot Share Files with Another Computer
- 29.6. My Internet Is Slow
- 29.7. How to Update Acronis Internet Security on a Slow Internet Connection
- 29.8. Acronis Internet Security Services Are Not Responding
- 29.9. Antispam Filter Does Not Work Properly
- 30. Removing Malware from Your System
- 30.1. What to Do When Acronis Internet Security Finds Viruses on Your Computer?
- 30.2. If Your System Does Not Start
- 30.3. How Do I Clean a Virus in an Archive?
- 30.4. How Do I Clean a Virus in an E-Mail Archive?
- 30.5. What to Do When Acronis Internet Security Detected a Clean File as Infected?
- 30.6. How to Clean the Infected Files from System Volume Information
- 30.7. What Are the Password-Protected Files in the Scan Log?
- 30.8. What Are the Skipped Items in the Scan Log?
- 30.9. What Are the Over-Compressed Files in the Scan Log?
- 30.10. Why Did Acronis Internet Security Automatically Delete an Infected File?
- 31. Support
- 32. Useful Information
- 29. Troubleshooting
- Glossary
28. How Do I Update Acronis Internet Security Using a Proxy
Server? .................................................................. 148
Troubleshooting and Getting Help ............................... 149
29. Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150
29.1. Scan Doesn't Start . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150
29.2. I Can no Longer Use an Application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150
29.3. I Cannot Connect to the Internet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151
29.4. I Cannot Use a Printer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152
29.5. I Cannot Share Files with Another Computer . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153
29.6. My Internet Is Slow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154
29.7. How to Update Acronis Internet Security on a Slow Internet Connection . . . . 155
29.8. Acronis Internet Security Services Are Not Responding . . . . . . . . . . . . . . . . . . . 155
29.9. Antispam Filter Does Not Work Properly . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156
29.9.1. Legitimate Messages Are Marked as [spam] . . . . . . . . . . . . . . . . . . . . . . . 156
29.9.2. Many Spam Messages Are Not Detected . . . . . . . . . . . . . . . . . . . . . . . . . . . 159
29.9.3. Antispam Filter Does Not Detect Any Spam Message . . . . . . . . . . . . . . . . 162
30. Removing Malware from Your System . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164
30.1. What to Do When Acronis Internet Security Finds Viruses on Your
Computer? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164
30.2. If Your System Does Not Start . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165
30.3. How Do I Clean a Virus in an Archive? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166
30.4. How Do I Clean a Virus in an E-Mail Archive? . . . . . . . . . . . . . . . . . . . . . . . . . . . 167
30.5. What to Do When Acronis Internet Security Detected a Clean File as
Infected? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168
30.6. How to Clean the Infected Files from System Volume Information . . . . . . . . . 168
30.7. What Are the Password-Protected Files in the Scan Log? . . . . . . . . . . . . . . . . . 169
30.8. What Are the Skipped Items in the Scan Log? . . . . . . . . . . . . . . . . . . . . . . . . . . . 170
30.9. What Are the Over-Compressed Files in the Scan Log? . . . . . . . . . . . . . . . . . . . 170
30.10. Why Did Acronis Internet Security Automatically Delete an Infected File? . . 170
31. Support ............................................................. 171
32. Useful Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172
32.1. How Do I Remove Other Security Solutions? . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172
32.2. How Do I Restart in Safe Mode? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172
32.3. Am I Using a 32 bit or a 64 bit Version of Windows? . . . . . . . . . . . . . . . . . . . . . 173
32.4. How Do I Find Out My Proxy Settings? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173
32.5. How Do I Enable / Disable the Real Time Protection? . . . . . . . . . . . . . . . . . . . . . 174
32.6. How Do I Display Hidden Objects in Windows? . . . . . . . . . . . . . . . . . . . . . . . . . . 175
Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176
vii