ZoneAlarm PC Tune-Up improves your computer’s speed and reliability by removing the items that can cause crashes, slow speeds, freezing, and impact the overall health of your computer. It consumes very little memory or hard drive space. These are the tasks it performs to optimize your computer's performance:
You can run ZoneAlarm PC Tune-Up manually in full mode or run individual tasks. You can also configure it to run automatically in the background whenever you start your computer, on a daily basis, on a weekly basis, or once a month.
There are two ways to run a full PC tuneup:
Perform Quick Scan - scans all areas, except for Windows/MS-DOS shortcuts
Status icon of each repaired problem changes to a check mark.
ZoneAlarm System Backup lets you create a system restore point, and to revert to a saved restore point at any time.
The computer reboots and the system is restored to the selected restore point.
You can configure these system restore options:
PC Tune-Up scans these areas of your computer for bad files and bad links:
Defragmentation removes fragmented old data and broken files, and saves valid data in consecutive locations, to optimize your PC's performance.
In the PC Tune-Up >> Registry Defrag screen, click Report.
In the screen that shows, see the information in these two tabs:
Some of ActiveX applications are not safe. They can be used to share information between different application. You can protect your computer from known malicious ActiveX applications.
In the PC Tune-Up >> Protect screen, click Unprotect All.
All rights reserved. This product and related documentation are protected by copyright and distributed under licensing restricting their use, copying, distribution, and decompilation. No part of this product or related documentation may be reproduced in any form or by any means without prior written authorization of Check Point. While every precaution has been taken in the preparation of this book, Check Point assumes no responsibility for errors or omissions. This publication and features described herein are subject to change without notice.
Use, duplication, or disclosure by the government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013 and FAR 52.227-19.
Refer to the Copyright page http://www.checkpoint.com/copyright.html for a list of our trademarks.
Refer to the Third Party copyright notices http://www.checkpoint.com/3rd_party_copyright.html for a list of relevant copyrights and third-party licenses.