2011
Table Of Contents
- Acronis Internet Security 2011
- Table of Contents
- Getting Started
- Configuration and Management
- 9. General Settings
- 10. Antivirus Protection
- 10.1. Real-time Protection
- 10.2. On-demand Scanning
- 10.3. Configuring Scan Exclusions
- 10.4. Quarantine Area
- 11. Antiphishing Protection
- 12. Search Advisor
- 13. Antispam
- 14. Parental Control
- 15. Privacy Control
- 16. Firewall
- 17. Vulnerability
- 18. Chat Encryption
- 19. File Encryption
- 20. Game / Laptop Mode
- 21. Home Network
- 22. Update
- How To
- Troubleshooting and Getting Help
- 29. Troubleshooting
- 29.1. Scan Doesn't Start
- 29.2. I Can no Longer Use an Application
- 29.3. I Cannot Connect to the Internet
- 29.4. I Cannot Use a Printer
- 29.5. I Cannot Share Files with Another Computer
- 29.6. My Internet Is Slow
- 29.7. How to Update Acronis Internet Security on a Slow Internet Connection
- 29.8. Acronis Internet Security Services Are Not Responding
- 29.9. Antispam Filter Does Not Work Properly
- 30. Removing Malware from Your System
- 30.1. What to Do When Acronis Internet Security Finds Viruses on Your Computer?
- 30.2. If Your System Does Not Start
- 30.3. How Do I Clean a Virus in an Archive?
- 30.4. How Do I Clean a Virus in an E-Mail Archive?
- 30.5. What to Do When Acronis Internet Security Detected a Clean File as Infected?
- 30.6. How to Clean the Infected Files from System Volume Information
- 30.7. What Are the Password-Protected Files in the Scan Log?
- 30.8. What Are the Skipped Items in the Scan Log?
- 30.9. What Are the Over-Compressed Files in the Scan Log?
- 30.10. Why Did Acronis Internet Security Automatically Delete an Infected File?
- 31. Support
- 32. Useful Information
- 29. Troubleshooting
- Glossary
15. Privacy Control
Acronis Internet Security monitors dozens of potential “hotspots” in your system
where spyware might act, and also checks any changes made to your system and
software. It is effective in blocking Trojan horses and other tools installed by hackers,
who try to compromise your privacy and send your personal information, like credit
card numbers, from your computer to the hacker.
Privacy Control includes these components:
● Identity Control - helps you make sure that your personal information is not sent
from your computer without your consent. It scans the e-mail and instant messages
sent from your computer, as well as any data sent via web pages, and blocks any
piece of information protected by the Identity Control rules you have created.
● Registry Control - asks for your permission whenever a program tries to modify
a registry entry in order to be executed at Windows start-up.
● Cookie Control - asks for your permission whenever a new website tries to set a
cookie.
● Script Control - asks for your permission whenever a website tries to activate a
script or other active content.
By default, only Identity Control is enabled. You must configure appropriate Identity
Control rules to prevent the unauthorized sending of confidential information. For
more information, please refer to “Configuring Identity Control” (p. 90).
The other components of Privacy Control are interactive. If you enable them, you
will be prompted, through alert windows, to allow or block specific actions when
you browse new web sites or install new software. This is why they are usually used
by advanced users.
15.1. Configuring Protection Level
The protection level helps you easily enable or disable the Privacy Control
components.
To configure the protection level:
1. Open Acronis Internet Security, click Options in the upper-right corner of the
window and choose Expert View.
2. Go to Privacy Control > Status.
3. Make sure Privacy Control is enabled.
4. There are two options:
● Drag the slider along the scale to set the appropriate protection level. Click
Default Level to position the slider at the default level.
Privacy Control
88