Tag Archives: Windows

Glary Utilities 2.52 – A Free Collection of System Tools and Utilities – In 2 Flavors

imageGlary Utilities Free (last updated Jan. 9, 2013), is a reasonably complete set of system tools with which even a relative newcomer to the computing game can tweak, repair, optimize and improve system performance. Since discovering Glary Utilities years ago, it has remained my go-to application for system maintenance and cleanup.

With a graphical user interface arranged in a clean straightforward manner, you can quickly find the tool you’re looking for: disk cleaner, uninstall manager, secure file deletion, memory optimizer, registry cleaner, duplicate file finder, tracks eraser, empty folder finder; a very convenient feature for those of us who like to test drive new software.

Installation: YIKES!!!!

image_thumb[38]

You can avoid all of the above (strongly recommended), by selecting the Slim Version – no toolbar. Alternatively, choose either of the two Portable Versions as per the following screen shot – no toolbar.

image_thumb[31]

I suspect that there may be users who see the advantages of installing a Toolbar such as the one offered as part of this installation package. Quite frankly though, I’ve yet to meet one. For a taste of my views on Toolbars please see – We Don’t Want No Stinkin’ Toolbar!

For users who are comfortable with a “one click” solution – Glary Utilities covers the basics nicely.

image_thumb[37]

Results: running the Standard Version installed on an SSD HD. Scan time – 2 minutes and 8 seconds.

image_thumb[12]

Results: running the Portable Version from a Flash drive. Scan time – 2 minutes and 8 seconds.

image_thumb[34]

Dig a little deeper: The hands-on crowd can dig into the individual Modules and clean and massage their machine to their heart’s content.

image_thumb[15]

image_thumb[18]

Users can even avoid the frustration of having to hunt down a number of standard Windows tools by selecting the appropriate tool from the System Tools menu.

image_thumb[21]

You can comfortably fine tune the application using the clear and precise Settings Menu. While the “Settings” menu is often the last item to be looked at following an application installation, it should be at the top of the “to do list” prior to running any new application. Unpleasant surprises can be avoided with a little prep work – first.

Of particular interest, to those of us who work with files using a “context menu”, Glary Utilities has a nice selection of new items which will be added to Windows Explorer.

image_thumb[24]

There are those who will take comfort in an included “Restore Center” but, a more prudent course to follow is – prior to completing any significant system changes – take the time to generate a manual Restore Point.

image_thumb[27]

Fast facts:

Disk Cleaner – Removes junk data from your disks and recovers disk space

Registry Cleaner – Scans and cleans up your registry to improve your system’s performance.

Shortcuts Fixer – Corrects the errors in your start menu & desktop shortcuts

Uninstall Manager – Uninstalls programs completely that you don’t need any more

Startup Manager – Manages programs which run automatically on startup

Memory Optimizer – Monitors and optimizes free memory in the background

Context Menu Manager – Manages the context-menu entries for files, folders…

Tracks Eraser – Erases all the traces,evidences,cookies,internet history and more

File Shredder – Erases files permanently so that no one can recover them

Internet Explorer Assistant – Manages Internet Explorer Add-ons and restores hijacked settings

File Encrypter and Decrypter – Protects your files from unauthorized access and use.

Disk Analysis – Shows you the disk space usage of your files and folders

Duplicate Files Finder – Searches for space-wasting and error producing duplicate files

Empty Folders Finder – Finds and removes empty folders in your windows

File Splitter and Joiner – Splits large files into smaller manageable files, and then rejoin them.

Process Manager – Monitors programs that run on your PC and stop spyware and Trojans.

Windows Standard Tools – Provides direct access to the useful windows default functions.

Current Version: 2.52.0.1698.

File Size: 8.59 MB.

Release Date: Jan. 9, 2013.

System requirements: Windows 8, 7, 2000, XP, Vista. 32/64bit versions.

Languages: 23 Languages.

Download at: Glarysoft

9 Comments

Filed under 64 Bit Software, Computer Tune Up Utilities, downloads, Freeware, Integrated Tune Up Solutions, System Utilities

System Explorer and System Security Guard – A Review

https://i1.wp.com/careeroptionscoach.com/wp-content/uploads/2012/03/iStock_000013997777XSmall-focus-magnifying-glass.jpgDepending on which version of Windows Task Manager you use, you may find that it provides you with usable information – or not. Windows Task Manager is most commonly used to display information on all processes running on your computer, as well as advising you of the CPU and memory usage stats for a given process. Additional selective information on running applications, performance, local area connection and information on users, is also available.

But, back to running processes for a moment. What if you need additional information on a running process – or, processes? How, for example, would you determine which processes are safe if you rely on Windows Task Manager?

Running Windows Task Manager in Windows 8 (a major improvement over previous versions), as I’ve done for the following example, is not particularly useful since the only option is a raw online search. Which, in a real sense, is a hit and miss affair. Give it a try with your version of Windows Task Manager – you might be surprised to see just how cumbersome it is.

image

Instead, taking advantage of one of the built-in features in the freeware application, System Explorer, is a much more appropriate solution. In the following example, the selected process can easily be checked at VirusTotal, and at VirusScan, directly from within System Explorer.

image

It’s unlikely however, that you’ll have to take this extra step – since System Explorer has been designed to automatically rate, and provide details on processes that are listed in the developer’s extensive database.

image

Further information can be obtained by clicking on the “See More Details” link which will open the database reference at the developer’s site, as shown below.

image

System Explorer is not a one-trick pony since it has the capacity to provide detailed information on Tasks, Processes, Modules, Startups, IE Add-ons, Uninstallers, Windows, Services, Drivers, Connections and Opened Files. For this review I’ve focused on the security aspect and next up is System Explorer’s “Security Scan” which is easily launched from the GUI.

image

As you can see in the following screen capture – running processes are checked online against the developer’s extensive database.

image

The following screen capture shows a small portion of the 808 processes compared against the developer’s database.

image

Additional information on any specific process can easily be obtained by clicking on the “Details” link, as illustrated below.

image

One aspect of this application which I found intriguing is the “History” function. Running this function allows the user to view and develop information on currently running processes as well as those process running earlier but which are no longer running.

image

System requirements: Windows XP, Vista, Win 7.

Download at: System Explorer Net

Note: also available in a portable version that is just right for geeks on the go.

System Security Guard

System Security Guard, in a broad sense, is very much like the “Security Scan” built into System Explorer. System Security Guard however, as a stand alone small security utility, is designed to run at system startup and automatically scan running processes. As well, all new processes, as they are launched, are scanned.

The results of the initial run with System Security Guard shown below.

image

For this review I set the application to run at startup, and the following graphic represents the results following a week or so of automatic running. You’ll note that the application has identified 4 “Threat Files” – which, in reality, is the same file which has been flagged 4 times (each time the application was launched).

image

The application (CurrPorts), was flagged for good reason since it behaves in a way similar to that of a remote access Trojan. That is – it connects to the Internet in a peculiar way.

image

For illustrative purposes only, I ran the file against the developer’s database. However, since I use this application frequently throughout the day, I’m aware that this is a safe program.

image

System requirements: Windows XP, Vista and Win 7.

Download at: the developer’s site.

A big “Thank You” to regular reader Charlie L. for referring me to these applications.

8 Comments

Filed under downloads, Freeware, Malware Protection, System Utilities, Windows Task Manager Replacement

Free ToolWiz Care – The Competition Might Need To Worry

Toolwiz CareYou’ve heard it all before – this application “is a free tool set designed to speed up your PC and give your system full care”, or some variation of this. Occasionally, this statement might reasonably describe a freeware utility application – but, more often than not, hype is the operative word and user expectations are not met.

Toolwiz Care, described by the developers as “a free tool set designed to speed up your PC and give your system full care”, does not disappoint. This application is feature packed, and includes a wide range of tools that an average computer user should find powerful, efficient, and effective.

I’ve run with Toolwiz Care, off and on, for a month or so, and found that by and large, it lives up to the developer’s claims.

Installation is fast and very straightforward. The user may choose selected languages including –  English, Chinese, French, Hungarian, Korean, Polish, Spanish and Russian.

image

First up is a quick system checkup – the “Checkup Settings” menu will allow you to set preference parameters as shown below. Clicking on any of the following screen  captures will expand the shot to its original size.

image

On this run, 67 fixable issues were found. I’ll point out that since I normally run a tight lean test machine, I choose not to accept all of the recommended fixes.

image

Next up, I took a peek at the “Speedup” applet. Again, I’ll point out that this test machine has been tweaked to the max so, you’ll notice that many of the suggestions for improvement will be “skipped” – the application has already determined this. On a typical machine however, I think an average user will benefit.

image

The Tools menu is most impressive and, having run all of the available tools successfully, I have to give this feature set a huge “thumbs up”. Having quick access to such powerful tools, should be a major advantage for a typical user.

image

The App Manager provides access to the Uninstall feature (not shown), but what I found most intriguing was, the listing of suggested freeware software for the user’s consideration. As it turns out, virtually all of the suggested software has received high marks, in previous reviews, here on this site.

image

For those who like to run in a virtual environment while surfing the Internet, the developer’s have kept you in mind with the inclusion of a “one click simple” virtual “Time Freeze” component.

image

I’ll go offside just for a moment. You may have noticed that an “Eye Care” feature can be selected which is designed to remind those of us who spend much of the day starting at a Monitor, to take a short break. The following screen capture is an example of the 2/3 reminders launched, as I was writing this post.

image

Finally, if you choose to auto-start this application on Windows startup – the application will place a floating toolbar (see below), on the desktop for convenience.

image

Fast Facts:

Time Freeze – Keeps your system safe and protect your computer from unwanted changes.

Eyes Care – Protects your eyes with scheduled warning

Virtual Safe – Creates a virtual safe which works like a regular drive where you can store files. The files stored in it are encrypted and cannot be accessed without the right password.

Game Booster – Concentrates every system resource for gaming purpose. It temporarily shuts background processes and other unnecessary Windows services & cleans out the RAM.

Password Manager – Helps you create secure passwords that are extremely difficult to crack or guess. Also it can help you to manage your password, account and other private information.

Password Generator – Creates highly secure passwords with upper and lower case letters, numbers and punctuation symbols.

Duplicate File Finder – Allows you to scan all duplicate files in specified path. You can remove some of them and free up your disk space.

File Undelete – Ensures recovery of data permanently deleted from the Recycle Bin or with the help of SHIFT + DELETE key.

Disk Doctor – Helps you to check your hard disk both in I/O access and file system and give you a full report for the checking.

Disk Cleaner – Cleans your hard disk from temporary files like those in the system temporary folder and the Recycle Bin.

Registry Cleaner – Makes the PC system more stable by cleaning out the bad Registry entries.

Registry Backup and Restore – Helps you to backup or restore your Registry with a simple click

Registry Defrager – Rebuilds PC’s Registry, making the entire system run quicker and smoother.

Privacy Cleaner – Protects the user’s privacy by deleting all activity history and surfing traces.

Fast Defrag – Defragments the hard drive with it’s smart engine, keep the PC running efficiently and prevent the formation of other fragmented files.

Checkup Module – Provides a full report of user’s PC system and allows the user to fix all problems with one simple click.

Startup Report – Provides a easy to read report that shows the start-up time of user’s system. It offers a detailed list of the processes loaded since booting.

Startup Optimizer – Allows the user to disable or delay the loading of any startup entries. It also provides the users with suggestions of standard processes.

System requirements: Windows XP (32 bit), Vista, Win 7, Win 8 (32 bit and 64 bit). I tested this application on Windows 8 Consumer Preview.

Languages: English, Chinese, French, Hungarian, Korean, Polish, Spanish and Russian languages.

Download at: ToolWiz Care

Credit where credit is due – a big “thank you” to my good buddy Rick Robinette over at What’s On My PC, for turning me on to this application.

20 Comments

Filed under 64 Bit Software, Computer Tune Up Utilities, downloads, Freeware, Software, System Utilities

Time For Tor? – An Open Source Anonymous Surfing Application

imageOver the years, I’ve posted more than a few articles on anonymous surfing and the applications, generally free, which makes that possible.

I’ve noted, over that time, that the majority of readers of these article have a Middle East IP – particularly Iran. Little wonder, when one considers the human rights violations committed by this regime. Remaining anonymous online in Iran, could literally be the difference between life and death.

A typical email from an Iranian reader:

Dear Bill

I live in Iran – I need to know news about my hometown, but in Iran we are faced with filtering…very hard filtering. It makes me depressed, but one of my friends introduced your website to me and told me you can help me.

If you think that the crazies who rule Iran, and Syria – just 2 of these Middle East dysfunctional societies), where Internet usage is scrutinized on an individual basis – are the only unhinged and delusional nutters Internet users have to deal with – you’re wrong.

The erosion of fundamental rights and freedoms, including the right to surf the Internet without government oversight, seems to be happening at an ever increasing pace – everywhere.

In a previous article on anonymous Internet surfing tools (October, 2010), I wrote – “Thankfully, I live in a part of the world where Government censorship of my Internet activities is a non-issue; the Canadian government does not restrict my access to any part of the Internet.

I wish I could go on to say, that I live in a part of the world where the Government has NO interest in my Internet activities, But that, unfortunately, would be like wishing on a star – and, equally as effective.

While I have no faith whatsoever, that those in power will continue to use the gathered information in a restricted, and appropriate fashion – it’s not something that I dwell on. After all, there is nothing I can do about it – so, I’m forced to slot it into my comfort zone.

In the past week however, I’ve been ripped out of my comfort zone, as have most other Canadians, who have revolted against legislation proposed by the quasi-fascist Conservative Party of Canada – the current political party in power (a government elected by only 26% of eligible Canadian voters) – led by Stephen Harper, a fundamentalist Christian, and his minion Vic Toews – another fundamentalist Christian .

In 2008, Toews was divorced by his wife of 30 years, after it was discovered that he had fathered a child with a younger woman – who may have been his child’s babysitter. Just one more example of the “moral right” practicing its favorite pastime – hypocrisy.

Public Safety Minister Vic Toews faced a fierce online backlash over Bill C-30, which would require internet service providers to turn over client information to law enforcement agencies without a warrant.<br />
Public Safety Minister Vic Toews faced a fierce online backlash over Bill C-30, which would require internet service providers to turn over client information to law enforcement agencies without a warrant. (Fred Chartrand/Canadian Press)

The proposed legislation would create  a mandatory surveillance regime. Simply put – unfettered government surveillance directed at Canadian Internet users.

The backlash against this perverted legislation was both immediate, and overwhelming. Canadians have made it clear – they will not allow themselves to be figuratively handcuffed. Frankly, I’ve never seen a political backlash remotely like it. The typically mild mannered and polite Canadian is angry, disgusted, and hell-bent on ensuring this abomination of a legislative bill – never sees the light of day.

Still, until Harper and his gang of throwbacks to the Cro-Magnon era, are thrown out on their asses in the next general election, you might consider adding an anonymous surfing application to your toolbox.

The use of anonymous surfing applications is not restricted to breaking through obstructive Internet barriers of course. There are more obvious reasons, you may have for anonymous surfing, including – surfing in internet cafes, public terminals in libraries, or hotel business centers.

In fact, you may want to surf anonymously on any PC where you don’t want to leave traces of your private surfing activities to ensure protection from snooping web sites, annoying advertisers, employers, rogue police services, or curious family members.

One of the most popular anonymous surfing applications  (with good reason), is TOR – a VPN (a virtual private network) that encrypts via an SSH tunnel, in order to safeguard your Internet connection and, protect your anonymity properly.

In this post I won’t review Tor, since I’ve done so a number of times previously. Instead I’ll direct you to the following.

From the site:

What is Tor?

Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis.

Tor works with many of your existing applications, including web browsers, instant messaging clients, remote login, and other applications based on the TCP protocol.

Overview 

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. Tor provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy.

Individuals use Tor to keep websites from tracking them and their family members, or to connect to news sites, instant messaging services, or the like when these are blocked by their local Internet providers. Tor’s hidden services let users publish web sites and other services without needing to reveal the location of the site. Individuals also use Tor for socially sensitive communication: chat rooms and web forums for rape and abuse survivors, or people with illnesses.

Journalists use Tor to communicate more safely with whistleblowers and dissidents. Non-governmental organizations (NGOs) use Tor to allow their workers to connect to their home website while they’re in a foreign country, without notifying everybody nearby that they’re working with that organization.

Groups such as Indymedia recommend Tor for safeguarding their members’ online privacy and security. Activist groups like the Electronic Frontier Foundation (EFF) recommend Tor as a mechanism for maintaining civil liberties online. Corporations use Tor as a safe way to conduct competitive analysis, and to protect sensitive procurement patterns from eavesdroppers.

Tor is suitable for installation on Windows, Mac OS X, Linux, BSD, Unix, and Android.

For more information and download, visit the Tor Home Page.

12 Comments

Filed under Anonymous Surfing, downloads, Freeware, Interconnectivity, Open Source, Personal Perspective, Surveillance

Four Windows Boot Optimization Tips You Can Trust

Guest post by: Tibor Schiemann, President and Managing Director, TuneUp.

Does it take an eternity for your PC to boot up? Have you trolled the web for some tips on improving it? Unfortunately, there are some really bad tuning advices out there, but here are four Windows boot optimization tweaks you can definitely trust.

Turn off unnecessary start-up programs. Third-party applications can slow things down quite a bit depending on your system, so go through the list of start-up entries and get rid of the programs you’ll never use or need. This won’t just help improve boot time; it should also reduce the number of annoying pop-ups informing you to take various actions.

image

I actually tested this tip by disabling 19 start-up entries on one system and 25 start-up entries on another. It was surprising to see that neither machine had significant improvements in terms of boot time, but I noticed that my systems were much more responsive right after logging on and during general use. This is because disk usage significantly decreased once these start-up entries were turned off.

Since much less is going on during the boot-up process with the start-up entries disabled, you can start working with your computer much more quickly after logging on. You’ll also regain both CPU and RAM resources, which will help speed up the applications you’re actively working with. While you probably won’t notice a huge improvement in boot time like in my test, this tip will help you be more productive and conserve system resources.

Disable devices in Device Manager. PCs and laptops come with several built-in devices or other components that you may not need, such as a Bluetooth transmitter, an Ethernet adapter, a web camera or a sound chip. Windows does not need to reserve interrupt requests (IRQs) and memory resources and load up drivers if the devices are disabled, so turning them off should improve boot time.

image

I again put this tip to the test and used Device Manager to turn off several devices, including a webcam, virtual DVD drives and all USB ports and controllers. Boot time went down by a couple of seconds on both of my test machines once the devices were disabled. This tip also had a neat side effect—it helped me preserve battery power on the laptops.

Get more RAM for your PC. This is always a good thing to do, but does it really help improve boot time if you’re just upgrading from 1 GB to 2 GB or from 2 GB to 4 GB? Since core Windows system files, drivers and basic services all amount to less than 1 GB, boot time shouldn’t be affected. However, more RAM should drastically reduce swapping memory to the disk.

I used msconfig to limit the total memory used by my test systems and see how upgrading RAM affected boot time. As expected, the computers’ start-up times steadily improved as more GBs of RAM was added, and on an Asus tablet (Core i5, 4 GB of RAM, SSD drive), boot time decreased noticeably.

image

Tweak your BIOS, which may slow down boot time due to unnecessary checks or settings. To combat this, set boot priority to your hard disk, for example, and disable booting from your DVD drive, USB port or network; by doing so, you should be able to shave a couple of seconds off your system’s boot time.

Try to find the “Boot” category in your BIOS, and set your PC to look only for a bootable operating system on your hard disk. But, don’t forget to set it back in case you decide to install a new operating system or run a USB rescue environment. Also, try to find the “Quick Boot” option and set it to “Enabled” to skip the boot analysis of hardware components.

These are the four most effective (and safe) ways of improving Windows’ boot time. Visit the TuneUp Blog about Windows (http://blog.tune-up.com), where we’ve sifted through misleading optimization tips and tuning information, to learn more and make sure that you are maximizing PC performance.

12 Comments

Filed under Computer Maintenance, Education, Guest Writers, System Tweaks, TuneUp Utilities

Download Free Norton Identity Safe Beta – Simple, Secure, Password Management For Windows, iOS, And Android

imageFair or not, I look upon weak password control – which leads to a catastrophe – as a self-inflicted injury. According to Norton research – 45 % of us re-use the same, easy to remember password, across multiple sites. Which, virtually assures, that should a hacker gain access to such a password – the door is now open for illegal access to all accounts. A catastrophe waiting in the wings.

I understand the dilemma. Complicated, in other words, safe passwords are often hard to remember, whereas easy passwords, in other words, unsafe passwords, are generally easy to remember. And, a single password is surely easier to remember than a series of passwords, simple or not.

What a troublesome problem!

Good news:

Today, Norton will release Norton Identity Safe Beta – the free public beta of a service which will allow you to secure and synchronize logins, passwords, credit cards, and other web form information across PCs, iOS and Android devices – using the cloud.

As an added bonus, Norton Safe Search is included.  Safe Search bumps up a user’s confidence level since a user can easily see (from search results), if a website is safe before visiting the site.

Norton Identity Safe setup walkthrough.

Consider very carefully as to whether “Remember Password” is appropriate in your situation.

image

Pay close attention to the password requirements.

image

Almost finished.

image

On completion, a web page will open with the following. From what I can see in this early test – since the application seems to rely on the Toolbar for access – you must accept. In Firefox, for example the Toolbar can be controlled through Tools – Add-ons.

image

Not quite finished. It’s time to check your inbox – confirm your email address. Click on the link………

image

and – finished!

image

Norton Identity Safe Home:

image

Norton Identity Safe Fast facts:

Simplified password management – Eliminates the hassle of remembering multiple logins and passwords, as users only need to remember one master password for quick, secure access to their favorite sites.

Streamlined user experience – Shows users their logins with thumbnail images, allowing them to log in to a desired site by clicking on the image, or for mobile and tablet users, by simply touching the screen.

Share Via – Allows users to safely share online content by sending URLs through email and social networking plugins, directly from Norton Identity Safe beta.

Automatic login synchronization across devices – Enables users to store a password on one device, and easily log in from another device – wherever they go.

Supported browsers:

image

Download at: Norton Identity Safe

Note: Norton Identity Safe Mobile Edition beta application, must be installed on mobile devices to access Norton Identity Safe.  The mobile applications complement the PC client, which must be downloaded and installed prior to installing the mobile applications.

Note:  If you have Norton Internet Security or Norton 360, you already have Norton Identity Safe installed.

Norton let me know of the pending release of Identity Safe Beta, yesterday. So, you’ll understand, this is not a review – but rather, a heads-up.

If you choose to download Identity Safe, I would be most interested in your personal observations as to functionality and value.

Helpful hints – here are some guidelines on choosing a strong password:

Make sure your password contains a minimum of 8 characters.

Use upper and lower case, punctuation marks and numbers.

Use a pass phrase (a sentence), if possible. For example, I use an 18 alpha character pass phrase (upper and lower case), supplemented with 4 numeric characters on this site. And, only on this site.

Since brute force dictionary attacks are common, do not use single word passwords that are words in a dictionary.

Use a different password for each sign-in site.

If you have difficulty in devising a strong password/s, take a look at Random.org’s – Random Password Generator – a very cool free password tool.

15 Comments

Filed under Android, Anti-Malware Tools, Beta Software, Cloud Computing Applications, Connected Devices, Don't Get Hacked, downloads, Freeware, Norton

Free Menu Uninstaller Pro 1.30 – Uninstall Applications From The Context (Right Click) Menu

imageIf you’re a power user, and a fan of the right click context menu, then you might consider adding MenuUninstaller Pro to your setup.

MenuUninstaller Pro is a free Context Menu alternative to the Windows Add or Remove Programs applet, which will allow you to quickly uninstall an application without having to search out an application’s native uninstaller (assuming there is one).

I’ve reviewed this application several times but, there have been significant improvements to this freebie since I last looked at MenuUninstaller.

Installing:

A not unfamiliar sight – Consider carefully as to whether installation is in your best interest.

image

Should you choose not to install the Babylon Toolbar, the setup executable for this component will still be installed to a temp file. This type of behavior is much more common in freeware applications than users realize and, unless a HIPS component  flashes a warning – it’s probable that you will not be aware of what’s happening in the background.

Illustrated – PC Tools Firewall popup.

image

This is not harmful behavior. If you like you can open the file, using Notepad, for example, to take a quick peek.

image

Notepad view – it’s not necessary for you to read machine language. Generally, there is sufficient information (in plain old English), which will allow you to get a handle on what you’re dealing with.

image

A quick walkthrough:

In the following example, I’ve right clicked on the selected programs icon (EaseUS Todo Backup)  on the Desktop, then clicked on “Uninstall”.

image

Previous users of this app will notice a huge improvement in the user interface, with access to substantial information not available in previously reviewed versions.

image

If you follow the same removal process, you will be asked for confirmation (a just in case moment).

image  image

Fast facts:

Full software & Registry information view.

Open Installation folder.

Browse to support /about/update page.

Export Software & Registry information to a text file.

Find any software installed on your computer in a sec, just start to write few first letters of the software name and you will see it.

Categorized views will help you to decide what programs to remove by dividing software into categories:

Large software size view

Last Install Date view

Software Updates view

Export software list into a csv file and open it in Microsoft Excel. This file can be used to calculate software size, manage history and create charts & graphs.

Save time by uninstalling a batch of programs. Just select the programs you want to remove and start uninstall. You will also see the software size you about to remove.

To prevent other users from uninstall your software by mistake (using Menu-uninstaller pro), there is a lock mechanism that ensures your safety.

System requirements: Windows XP, Vista, Win 7 (32/64 Bit).

Available languages: Deutsch, English, French, Hebrew, Italian, Japanese, Russian.

Download at: Developer’s site (LeizerSoft).

Menu Uninstaller Pro can be launched without access though the context menu.

image

Menu Uninstaller Pro – A quick video overview:

6 Comments

Filed under downloads, Freeware, Uninstall Managers, Uninstall Tools, Utilities

Security Precautions For Your New Christmas PC

imageWe are now officially in the “Holiday Season”, (the “Christmas Season”, to we traditionalists), so along with those visions of sugar plum fairies dancing in your head, you just might have visions of a super hot, quad core beast, that you can rip the wrapping off – after Santa has dropped down your chimney.

So if you’ve been good this year, and Santa does drop off that new screaming machine, no doubt you’ll want to put it through its paces right away. But before you test drive this new machine, there are some fundamental precautions you need to take.

Patch your operating system:

image

Download and install all available patches, and service packs – if applicable, by connecting to Windows Update. Security Gurus will tell you that 50% of unpatched, and unprotected systems, will be infected with malicious code within 12 minutes of being connected to the Internet. Believe it!

Install a Firewall:

image

Windows 7 comes with a vastly improved Firewall – substantially better than in previous versions of the operating system. Still, many techies consider third party applications more effective.

There are a number of free firewalls that are worth considering. The following are three that do the job particularly well. (Choose only one)

Comodo Firewall Pro:

Comodo Firewall protects your system by defeating hackers and restricting unauthorized programs from accessing the Internet. I ran with this application for 18 months during a long term test, and I felt very secure.

PC Tools Firewall Plus:

PC Tools Firewall Plus is my Firewall of choice. It installed easily, set up quickly, and did not caused any conflicts on my test machine despite my sometimes esoteric running requirements. The default settings are well thought out, and provide excellent protection for less experience users.

ZoneAlarm Free Firewall:

ZoneAlarm’s default settings are well thought out, and provide excellent protection for less experience users particularly. Experienced users on the other hand, can tinker to their hearts content, customizing and tweaking the application to meet their specific requirements.

Install anti-virus software:

image

There is no doubt that an unprotected computer will become infected by viruses and malware within minutes of first being connected to the Internet. There are many free versions of anti-virus software available, and the programs listed below have a well justified reputation. (Choose only one – although Immunet Protect will run successfully as a companion application).

Avira AntiVir Personal:

This anti-virus program offers comprehensive protection with an easy to use interface. In the time that I have been testing Avira I have been impressed with its performance, and I have come to rely on it as my primary anti-virus program on an XP Pro system. I highly recommend this one.

Panda Cloud Antivirus:

I’ve been testing the Beta version of Panda Cloud Antivirus since the end of April 2009, off and on, and I’ve been pleasantly surprised with it’s performance, particularly the light use of system resources. This application is definitely not a resource hog, and I found it outstanding at recognizing and blocking malware threats.

Immunet Free Antivirus:

Immunet Protect is a lightweight cloud based antivirus application, (available in both a free, and a fee version), designed to add a layer of protection while working in partnership with the most popular antimalware solutions. You’ll find Immunet straightforward to install, and easy to run without complication.

Install Anti-spyware and Adware Software:

image

It’s not only a virus that can put your computer down for the count, but a multitude of nasties freely floating on the Internet. Listed below are a number of free programs that offer very good protection against malware.

Microsoft Security Essentials:

Microsoft Security Essentials, which incorporates antivirus, antispyware and rootkit protection, all under one roof, was released by Microsoft as a free  replacement application for Windows Live OneCare. Microsoft Security Essentials is easy to set up and run, particularly for new users. And, the interface is positively simple offering Quick Scan, Full Scan, or Custom Scan.

Spybot Search and Destroy:

Spybot Search & Destroy can detect and remove a multitude of adware files and modules from your computer. Spybot also can clean program and Web-usage tracks from your system, which is especially useful if you share your computer. Modules chosen for removal can be sent directly to the included file shredder, ensuring complete elimination from your system.

ThreatFire:

ThreatFire blocks mal-ware, including zero-day threats, by analyzing program behavior and it does a stellar job. Again, this is one of the security applications that forms part of my front line defenses. I have found it to have high success rate at blocking mal-ware based on analysis of behavior. I highly recommend this one!

Additional security protection:

image

Web of Trust (WOT):

WOT is a free Internet Browser add-on which tests web sites you are visiting for spyware, spam, viruses, browser exploits, unreliable online shops, phishing, and online scams, helping you avoid unsafe web sites.

SpywareBlaster:

SpywareBlaster prevents ActiveX-based spyware, adware, dialers, and browser hijackers from installing on your system by disabling the CLSIDs (a system used by software applications to identify a file or other item), of spyware ActiveX controls. As well, SpywareBlaster can block spyware/tracking cookies and restrict the actions of spyware/adware/tracking sites in Internet Explorer, Firefox, and other browsers.

WinPatrol:

With WinPatrol, in your system tray, you can monitor system areas that are often changed by malicious programs. You can monitor your startup programs and services, cookies and current tasks. Should you need to, WinPatrol allows you to terminate processes and enable, or disable, startup programs. There are additional features that make WinPatrol a very powerful addition to your security applications.

SpyShelter:

SpyShelter is an anti-keylogging, anti-spyware program that protects your data from Keylogging and spy programs: known, unknown, and under-development. It detects and blocks dangerous and malicious programs, to help ensure that your data cannot be stolen by cyber criminals.

Note: Keep in mind however, that even the best layered protection strategy will not make up for lack of experience, and intuitiveness, when surfing the Internet. So, I’ll repeat what I have said here, many times – “knowledge, awareness, and experience are critical ingredients in the escalating battle, against cybercriminals.”

This list is not exhaustive by any means, but it is a good place to start.

A final note: You may find that your new PC is loaded with preinstalled “trial” software. This is the type of thing that drives users buggy, since trying to figure out how to get rid of trialware is not as easy as it should be. But don’t fret.

Take a look at – Free PC Decrapifier – Bloatware Begone! – a free application designed to specifically uninstall these annoyances

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

4 Comments

Filed under 64 Bit Software, Anti-Malware Tools, Don't Get Hacked, downloads, Free Anti-malware Software, Freeware, Malware Protection, Software, Windows Tips and Tools

Is Linux Only For Techies?

Currently, I’m running a dual boot system – Windows 8 Developer and Ubuntu Linux – so much for the rumor that Microsoft has locked out dual booting Linux on Windows 8.

In fact, I’ve been running dual boot systems for years – various flavors of Windows, and Linux. I wouldn’t, for example, do my online banking in any OS other than Linux. So, I’m comfortable with the idea that I can offer my opinion on how “hard” or how “easy” it is, to run with Linux.

I like to think that my opinion is an “educated” opinion. An opinion based on long term usage and direct observation. So, it definitely burns my ass when I read fluff from Windows bloggers who pass judgment on Linux and who, without the benefit of personal knowledge, go into a “let’s trash Linux” mode.

In 30+ years of real world computing,  I have met only a handful of techies who have an accurate understanding of how a typical user computes – how a typical user experiences computing. An understanding based on – here’s that terrible word again – observation.

Instead, the “I just know” phrase, as to how a typical user computes, is often offered in place of evidence based opinion. A follow up query such as “OK, but HOW do you know?”, invariably leads to a shake of the head and an “I just know that’s all” rapid response.

This throwaway response puts me in mind of the years I spent in management consulting, when a “how would your customers rate your service delivery” query for example, would invariably be met with a “Oh hey – terrific, terrific”, comeback.

We’ll skip ahead to  the inevitable “How do you know?”, and I’m sure you can guess the answer – “we just know”. More often than not, a series of customer centric focus groups would reveal that a company had a massively misplaced perception of how customers really viewed service delivery. I refer to this only to illustrate the point that perception does not always line up with reality – despite the often quoted “perception is reality”.

One particular “I just know” statement, I hear repeatedly from fellow techies is – Linux is only for techies. But, is it? Nor from where I sit it’s not. I suspect that this fallacy is based on (amongst a host of misperceptions), the mistaken view that Linux is primarily a command line driven operating system. Something it decidedly is not.

Sure, if a user is a command line fanatic in Windows (as a DOS 1 veteran, I understand the attraction), then that preference can easily be carried over into Linux. But, that’s not how a typical user interacts with an operating system – not in Windows and not in Linux.

Ubuntu Linux for example, is built around an intuitive point and click user interface which is similar in layout, and function, to Windows – including Windows XP. Certainly more instinctive, and vastly more functional, than the new Windows 8 Metro GUI shown below.

image

To be fair – the classic Windows Desktop is accessible through the Metro GUI in Windows 8. Here’s a screenshot of my classic Desktop running in Windows 8.

image

Contrast the Windows Desktop shown above, with the following OLD Linux Desktop layout (March 2007). Point and click simple – similar in layout and functionality to the previously shown Windows Desktop.

image

Here are a couple of Ubuntu Desktops I currently run. Simple, functional, and efficient.

image

image

Alternative Linux Desktops are readily available, so that a transition to a Linux based operating system can be more or less, a seamless move for an average user. Admittedly, there are some issues new Linux users will encounter in making a change from Windows. But, these are essentially “where do I click” issues – not issues that require techie based skills.

A number of alternative Desktops are shown below.

Enlightenment

image

Fluxbox

image

KDE

image

There’s no doubt Windows and Linux are not the same operating system under the hood. But, average users don’t look under the hood of an OS – not in Windows – not in Linux.

Average users simple want to point and click, and Linux based operating systems, by and large, allow them to do just that. To propose otherwise is disingenuous and suggests an uninformed basis for comparison.

If you’d like to get an handle on just how easy it is to run Ubuntu, you can download Ubuntu and run it alongside your current Windows system – just as if it was a normal Windows application. It’s a fabulous way to get a taste of Linux. Did I mention that it’s free?

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

29 Comments

Filed under 64 Bit Software, downloads, Freeware, Linux, Open Source, Operating Systems, Ubuntu, Windows 8

Download Miro – An HD Open Source Internet TV Platform And So Much More

imageThere continues to be much discussion in Tech media circles, on the benefits of  getting rid of expensive Cable TV where prices seem to be skyrocketing (I just got another $2 a month bump this week), and focusing instead on the multiple alternatives which the Internet now supports.

Given that your computer screen is, in reality, a high-definition display, you can easily enjoy Internet sourced videos in HD full screen. Pretty neat – especially if you have a wide screen LCD display.

Miro (last updated August 16, 2011), is a free (open source), Internet TV platform and Video Player (and so much more), that can certainly even out your path in breaking your reliance on Cable TV – and, the costs that go with it. Miro, in fact, might well be the perfect tool to help with your transition.

In my view, Miro is one of the most underappreciated open source applications available on the Internet. It never fails to amaze me how less deserving “media players”, which are often hyped to the max, can generate more downloads than this superb application.

Not only can Miro play virtually any video in HD, including, QuickTime, WMV, MPEG, AVI, and XVID, but on top of that this application, which sports major changes from previous editions, is effectively a media management center.  I must admit, I was more than a little surprised at how effective Miro is in this role.

For example, the application quickly, smoothly, and effectively, located my music files after prompting me to select a search path. Playback controls are typical and playlists are easily created.

Click on graphic to expand to original size.

image

The core of the program however, is the well designed video features including built-in Torrent download capabilities.

Click on graphic to expand to original size.

image

In the following example I downloaded a 1.4 GB movie using the Torrent client. The test torrent download  took full advantage of my Internet settings – 1.7 MB per second.

Click on graphic to expand to original size.

image

Playback of the downloaded file was a bit of a treat really. Definitely HD; smooth; quality sound.

Click on graphic to expand to original size.

image

image

Additional features include the ability to sync media to multiple devices –  including Android phones and tablets. Better yet, Miro will even convert video files to the right format to play on your phone.

Click on graphic to expand to original size.

image

Getting the application just right to meet your specific needs, using the Settings menu is straightforward and uncomplicated.

Click on graphic to expand to original size.

image

Fast facts:

Works with your current music library – It’s very easy to switch from iTunes to Miro– without any copying. Just point Miro to your music and video folders and those files will appear. If you don’t like Miro (impossible!), nothing’s changed.

Converts and syncs to Android – You’d have to be crazy to use a music player that doesn’t sync to your phone. Miro is simply the best music and video player for Android phones and tablets.

Download and play almost any video – Do you still use separate programs to download, play music, play videos, and sync to your phone? Miro plays almost any video or music format and downloads from YouTube, podcasts, Amazon, and bittorrent.

Convert any video – You can convert almost any video with Miro into mp4/h264, with presets for almost any device you can think of (including iPhones, iPods, iPads, Android phones, and more).

Share Your Media on your Network – When two Miro’s are on the same Wi-Fi network, they can stream and transfer music and videos to each other. It’s the easiest way to watch a video or play music upstairs if the file is downstairs.

Ultra-fast torrent downloading – Miro has some of the fastest bittorrent downloading in the world, built in. Try us head-to-head with any bittorrent application!

Open-source – don’t lock yourself in – Unlike some other media players, Miro is not trying to run your life. Not only is Miro 100% free and open-source, it’s made by a non-profit organization. You don’t need to be locked down by one corporation to have a great media experience.

Buy Music and Apps inside Miro – The Amazon MP3 store is built-in to Miro. Buy, download, and listen, seamlessly. Buy Android apps from the Amazon or Google app stores and they will sync to your device.

There are many more features in Miro that can be quickly covered in a short review. I haven’t, for example, covered the easy way to stream and share music and video on your local/home network, using Miro. Checkout the publisher’s features page.

This program continues to receive high praise from video geeks, and it’s worth considering as an addition to your entertainment applications.

System requirements: Windows 7, Vista, XP, Mac, Linux. (I have not tested this application in 64 bit – but, I understand 64 bit support is available).

Download at: Miro

User Manual for Miro 4.0 (last updated June 30, 2011), available here.

A caveat: During the install process, pay particular attention so that you don’t install items you may not want (Yahoo Toolbar/homepage) .

image

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

4 Comments

Filed under 64 Bit Software, Digital Media, downloads, Freeware, High Definition Video Players, Internet TV, Linux, Mac OS X, Media Players, Multimedia Tools, Open Source, Software, Video Apps, Windows Tips and Tools