No announcement yet.


This topic is closed.
This is a sticky topic.
  • Filter
  • Time
  • Show
Clear All
new posts

  • Melvin_Deal

    The next bump post. What and why am I bumping as the thread is sticky and closed? Dang it... soft deleting previous bump post by
    Solbjerg... as instructed. (the thread is over 2 1/2 years old prior to Solbjerg's now deleted post)
    Some editing has been done from time to time without this necessarily being reflected in the dates shown
    Everything was explained in post # 21 (a lot of deleted bumps have taken place since then)

    Live long and prosper!

    [EDIT] Don't understand so restoring.

    Hi Melvin
    Actually there was no reason to bump the thread at this time - I had already done so.
    What would be good though is to add a description on how to use ASC6, it has a totally different interface and the use of the program is also slightly different from the previous versions. There may also be other posts that need a little updating

    EDIT: Bumping was done to bring USAGE of IOBIT PRODUCTS thread to the top of the threads in Usage of IObit Products section and to make it seen on the Main Forum page for attracting more attention to the users to find it more easily.
    Last edited by solbjerg; Dec. 2nd, 2012, 09:17. Reason: Suggestion!

    Leave a comment:

  • solbjerg
    Here is the post for the bump, and to be deleted at next bump.

    Leave a comment:

  • solbjerg
    Originally posted by enoskype
    Hi Admins and Mods.

    We can use this post to keep the Usage of IObit Products at the top of the section

    Hi enoskype
    You mean just bump it - and then delete completely the previous bump?

    Yes Sir, that's it.

    Now I have deleted my two post. Next bumping post can be deletable, so this post describes it all.

    Ha-ha And I have removed them completely
    Last edited by enoskype; Feb. 14th, 2010, 02:08. Reason: EDIT:

    Leave a comment:

  • solbjerg

    Here we will add those subjects which doesn't fit into any other category or if there isn't room for more explanation in the post where it ought to have been.

    With all the security they have added to Windows XP SP2 and SP3 and Vista it is more necessary than ever to unblock the install file before installing.
    The best way to achieve that is to download the install file to your computer and save it in a folder called for example "Install-Program Downloads".
    You then go to the downloaded file - right click on it - choose Properties - and in the lower right-hand corner click 1 Unblock and then 2 Apply and then 3 OK.

    Then install the program. Your Operating System now knows that this program is allowed.

    The added benefit of having the "Install-Program Downloads" folder is that you always have the previous version at hand if there is something that doesn't work to your satisfaction in the newest version of the program.

    On account of missing space in the appropriate place for this description, I have placed it here too.

    -(WM)Cookies manager
    Here you can view your cookies and delete/exclude/refresh some or all of them by putting/removing a checkmark in the box
    %userprofile%\cookies in Run to view the cookie folder
    The default setting doesn't show you the cookies folder in Explorer, it can be shown by choosing to have Protected Operative System files shown - you have to untick that option in your folder settings to achieve that.
    But the command %userprofile%\cookies circumvents this.


    Shortcut Fixer

    There seems to be a problem in Vista (64) and in Windows 7 with this application.
    Thanks to Graham Newey there is now these two links to guide you

    Disk Cleaner

    Even the largest hard disk fills up at some point. With today's Internet connections and the constantly growing range of downloads, this happens more quickly than most users would like it to. IObit DiskCleaner helps you find unnecessary files and recover this space.

    Disk Cleaner can help you find unnecessary files on you computer, but you must check each category under Details to see if there are any you need before deleting them.
    They will be deleted to the Recycle bin, from where they can be restored unless your settings are instant deletion or if you run a cleaning operation that also cleans the recycle bin before having checked if everything works as it should. Be careful
    Please read about Disk Explorer too under Additional Utilities in this thread, much of the same functions and same advice applies here.
    Thanks Mentorron

    Turbo Boost
    If you click on the button shown in your Start Up window of ASC you will see this window:

    If you click Config Turbo Boost (as you always ought to do) you will see this window:

    Turbo Boost can help you optimize and speed up computer by temporarily shutting down unnecessary background processes and services, cleaning RAM, and intensifying processor performance.
    This is what it does by default (you can select what you want it to do)
    Disable application compatibility cache
    Disable Windows Update
    Disable Aero Glass effect
    Disable keyboard hotkeys
    Disable printer support
    Disable Ready Boost
    Disable scanner and DC support
    Disable scheduled tasks
    Disable viewing other computers on LAN
    Disable file sharing over the network
    Disable tablet input support
    Disable Sharing Media to other media devices
    Disable proxy auto-discovery (Windows7)

    It works much the same as GameBooster, but you have more options in Gamebooster.

    IObit Uninstaller
    In the Menu line You can choose Uninstall with the options Standard or Advanced
    The logical choice is the Advanced option (you don't need this program for the standard way)
    Forced Uninstall command means that you can choose the application you want to uninstall by inserting the address of the program/application you want to uninstall.
    Gives you the option to "Export your list of applications" - "Manage your Log files" - or "View your Restore points"
    On the left You have the options:
    All program - self-explanatory
    Toolbars - List of Toollbars that you can choose to uninstall as you wish
    Recently Installed - List of the latest programs/applications installed
    Large Programs - List of large programs on the computer (Beware! some of them are essential for the functioning of the computer)
    Rarely used - self-explanatory
    Windows Updates - List of Windows Updates (if the need should arise for uninstalling any of those)

    Performance Monitor
    Performance monitoring has been added to the possibilities in the program.
    It decides from looking at the status of the program which level the performance currently has.
    There are some "pitfalls along the way.
    First go into the settings and decide whether you want to let it start up with Windows when you open the computer.
    Next decide if you want the cleaning to to be a Deep registry cleaning (only available in the pro version)
    Next in the main window under status decide whether you want the Deep Care to be Off or On (this is done by clicking on "On" or "Off" they will then change to the opposite)
    Some have had trouble keeping the level at A
    You should realize that the application reacts to the status of both the Quick Care and the Deep Care, so if a Quick care doesn't give you an A you should try a full Deep Care.
    Sometimes though it looks as if the performance monitor has to be closed and then restarted for the application to react to the new level of cleanliness
    in the program folder you have a file called Pmonitor.exe clicking that icon will start the Pmonitor (a shortcut can be sent to the desktop)
    If you grow tired of looking at the level box on the desktop you can just right click it and choose close.

    Advice regarding the maintenance of the computer provided by Alpensopath:
    Attached Files

    Leave a comment:

  • solbjerg
    IObit Security 360

    IObit Security 360 is an advanced malware & spyware removal utility that detects, removes and protects your PC from various of potential spyware, adware, trojans, keyloggers, bots, worms, and hijackers. With the unique "Dual-Core" engine and the heuristic malware detection, IObit Security 360 detects the most complex and deepest spyware and malware in a very fast and efficient way. IObit Security 360 has a real-time malware protection and frequent automatic updating for prevention of zero-day security threats. IObit Security 360 can work with your Antivirus for a superior PC security.

    NB Newest version is not beta anymore (no longer beta now version 1.0)(September.2009)

    IObit Security 360

    The first thing to do before running a scan is as always to check the settings in the program.

    General settings
    Here you can choose to Minimize to system tray when progam is closed
    Your preference
    And/or to Execute at Windows startup
    Your preference
    Thank you Maxxwire

    Context Menu
    Here you can choose if you want to have "Scan with IObit Security 360" and "Unlock&Delete" available in your right click menu.

    Scan Settings
    Scan Extension
    You can choose between "Scan all files" or "Use Smart Extension" (Scanning)
    Your preference

    Scan parameters
    Scan Process priority
    You can use Low or Normal or High
    Your preference

    Max Scan file Size
    Here you can choose the max file size that is to be scanned 10/20/50/100 MB
    I haven't yet seen any change in performance by choosing any of them.
    100 MB in reality means >100 MB (unlimited)

    Quarantine files when removing them
    This option can either be ticked or unticked. By default it is ticked.

    Automatic Scan
    Here you can choose between:
    Perform computer scan at a scheduled time
    Perform computer scan when system is idle (Recommended)
    Disable automatic scan
    Your preference

    Smart scan
    Full Scan
    Custom scan
    Under custom scan you can choose to scan "System Area", "User Profile", or "My Documents" or you can choose to scan whichever disk(s) you have.
    Here you can configure your shedule(s)
    Just fill in the options

    Quarantine List
    Here you can either "Restore" or "Delete" a quarantined item.

    Ignore List
    Here you can remove (Restore) an item you have previously placed in the ignore list.
    It will be found again and you can then either let the program "clean" it (Delete it) or place it in the ignore list again by clicking ignore.

    Choose between:

    Update programs and database automatically (Recommended)

    Perform updating at a scheduled time

    Check for Updates when program starts

    Your preference

    If you choose Schedule you can configure your schedule(s) in the window that comes up.

    Here you can either tick or untick the option to have balloon tip shown.
    Your preference

    Here you can configure the proxy settings if you need them

    Take a look in enoskype's informative posts about network settings

    Network Connection speed
    Start/Control Panel/Network Connections - right click your Internet gateway and choose Status.

    Here you can choose either:

    High level
    Monitor and stop all threats. Pop up a window for each threat, asking the user to choose the actions.

    Recommended level
    Monitor and stop dangerous threats only, with few pop-ups.

    Here you can choose to:

    Enable DOG
    DOG (Digital Original Gene) is a novel heuristic malware detection algorithm, that evaluates key attributes relating to software making, distribution and advertising. Various factors are considered before determining that a program is malicious. For instance, if the program is published by a notorious vendor. The main function of DOG is to enhance detection of zero day threats.

    Enabled by default

    User Interface
    Here you can choose the Transparency level
    Your preference

    And in the box you can choose your preferred language.
    Security holes
    Security holes are possible vulnerabilities in your system.
    (e.g. if the scan finds that one of your passwords is weak it will flag it as a security hole. What parameters it uses here I do not know)
    For the time being this application can only be used in English based OS setup computers.

    Changing settings in the Opening window
    Just click the green ON and it will change to OFF or vice versa
    An example of personal settings is described by enoskype:
    In posts #2 & #5 in Recommended Scan Settings? thread.

    Description of IObit Security 360 settings will be expanded as needed and links to informative posts will be added under each section if any exists

    Glossary of some Malware Terms:

    AdSpy: Adware/Spyware, software that displays advertising or software that sends the users’ personal data to a third party without their knowledge or consent.

    Adware: Adware (or spyware) is a small program that is designed to show advertisements (in various form and degrees of intrusiveness) on your computer. It often reports personal information back to its owners. As a result your sense of privacy can be violated.

    Backdoor: A backdoor is a small malicious program that is used to gain access to a computer by bypassing the computer access security mechanisms. It gives the attacker almost unlimited rights. While it can be used to spy on a user, it is mainly used to install other malware on the system.

    BHO: Browser Helper Objects are small programs that extend the functionality of Microsoft Internet Explorer. Many toolbars shown in Internet Explorer are BHOs. Spyware and browser hijackers frequently use BHOs to integrate themselves with Internet Explorer, and to display advertisements, capture data, etc. BHOs are often installed by small ActiveX-based files.

    Browser Hijacker: Browser Hijackers are programs that attempt to alter homepage, searchpage and/or other browser settings. Some also install additional files that change these settings back on every restart (if you should try to revert to your old settings). Browser Hijackers may be installed by ActiveX controls on webpages.

    Dialer: Certain services available in the internet have to be paid for. Genuine dialers are only installed on the user’s computer subject to the user’s consent, which must be given via a completely unambiguous and clearly visible labeling or request. Fraudulent dialers install themselves on computers unnoticed, by dubious means or even with deceptive intent and set the computer up to dial up through their number, so as to make money from the calls.

    Dropper: A dropper is a component that has been designed to "install" some sort of malware (virus, backdoor, etc) to a target system. A few other malware files code compressed inside the dropper in such a way as to avoid detection by virus scanners. So detection of the whole dropper package is needed.

    Heuristic: A technique designed to detect malware by empirical means but without having the specific data.

    Hijacker: Hijacking is a type of network security attack in which the attacker takes control of a communication - just as an airplane hijacker takes control of a flight - between two entities and masquerades as one of them.

    Malware: A generic name for all types of malicious programs: adware, backdoors, rogues, trojans, viruses and worms.

    Misleading: The program reports false or exaggerated system security threats on the computer. The user is then prompted to pay for a full license of the application in order to remove the threats.

    PHISH: Phishing is the criminally fraudulent process of attempting to acquire information such as usernames, passwords and credit card details by masquerading as a trustworthy entity (usually: popular social web sites, auction sites, online payment processors or IT administrators) ?in an electronic communication. Phishing is typically carried out by e-mail or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.

    Rogue: A rogue program is a malicious program that is disguised, for instance, as trustworthy anti-spyware programs or registry cleaners. But these programs are only put on the market to scare you into buying these programs because they make exaggerated claims about the safety of your computer or, worse still, give erroneous scan results or put their own malware in your system.

    Rogueware: Rogueware are meaningful files which in reality can be quite malicious. The most common type of Rogueware are fake anti virus/adware/spyware progams that once installed, say you have lots of viruses/malware installed and in order for the program to remove them you must pay for the full version. In the past, these programs typically spread by advertising on other sites with banners saying things like "1023 Viruses detected on your computer! Click here to fix it now!".

    Rootkit: A rootkit is a software system that consists of a program or combination of several programs designed to hide or obscure the fact that a system has been compromised.

    Spambot: A spambot is an automated computer program designed to assist in the sending of spam.

    Spyware: Spyware is a type of malware that is installed surreptitiously on personal computers to collect information about users, their computer or browsing habits without their informed consent.

    Tracking cookies: Tracking cookie is a small string of text stored on a user's computer by a web browser. A cookie consists of one or more name-value pairs containing bits of information such as user preferences, shopping cart contents, the identifier for a server-based session, or other data used by websites.

    Trojan: A Trojan (or Trojan horse) is a small malicious program that pretends to have a particular function, but that only shows its real purpose after execution and that purpose is often destructive. Trojans cannot multiply themselves, which differentiates them from viruses and worms.

    Unwanted: The program reports false or exaggerated system security threats on the computer. The user is then prompted to pay for a full license of the application in order to remove the threats.

    Virus: A virus is a small malicious program that multiplies and is capable to attach itself to other programs after being executed. It then causes an infection and causes various degrees of damage to your computer.

    Worm: A worm is often characterized as a malicious application that will use a host machine to infect other machines. Therefore worms can create enormous damage on networks with multiple computers.


    Leave a comment:

  • enoskype
    False Positive Alerts about IObit Products by Security Programs

    If you come across to a warning from Security Programs about IObit products, please check the concerned file in the following site:

    After receiving the report, you can share the information in the Forum.

    See the comment in the post by Tim Xue, the author of ASC here .

    (False Positives are files that are flagged as malware - virus/spyware - by an anti-virus application, without in fact being malware)

    The solution for the recent false positive unins000.msg from McAfee is described here:


    Last edited by enoskype; Mar. 4th, 2010, 16:02.

    Leave a comment:

  • solbjerg
    About Help in the Forum

    Forum Help

    Help in the Forum is for the most part given by other users that have an idea for a solution or some advice they think pertinent.
    There are a few employees from IObit that look in from time to time and give advice or post new information, but they have other duties as well.
    When asking for help in the Forum it is really a good idea to tell what the problem is
    Describe it as extensively as possible and please give information about your computer too! Which Operating System, configuration and the like.
    Before asking for help please read as much about the problem as you can in other threads and posts in the Forum - use the seach function!
    If you can't find something that covers the problem you are having, then describe it in the post you are creating.
    In what circumstances it appeared - was it after a first time install or was it an over the top install. Was it during or after the first run - or was it something that happened after some other program installation. Please also tell whether you have the program(s) running automatically in the background - and which ones! It is also very helpful for the assisting user to have information about what settings you have in the program.
    In short as much useful information as possible about the problem.
    This will make it easier to decide on a course of action.
    Please post in the relevant "General Forum", that is to say don't post a SmartDefrag question in other general forums than SmartDefrag, and likewise for the other forums -except in the Lounge forum, where you can post comments on other subjects.
    Thank you!

    It is a good idea to read this thread, USAGE of IOBIT PRODUCTS to get to know the program.

    IMPORTANT NOTE: Please have a look at Information about Forum leaders, and. View Forum Leaders .

    IObit Guy , Tim Xue , BBAdmin , Krissy, Joanne, cicely, lambo, itobe, Jessie - IObit PR, ivy, hxin, eric.long, Lily2000, Alicia, JohnnyZ, skyxj are from IObit, and the rest is users trying to help the IObit products users in this Forum.

    Please feel free to add, edit or extend this description
    RMW (Read Modify Write)


    Leave a comment:

  • solbjerg
    Acronyms in IObit

    Some abbreviations/Acronyms used in IObit Products
    (Best course of action is to write out the acronym at least first time you use it in every thread)

    AFAIC As far as I'm concerned
    AFAIK As far as I know
    ADSL Asymmetric Digital Subscriber Line
    AKA Also Known As
    AMD Advanced Micro Devices
    ARP Address Resolution Protocol
    AS Anti-Spyware
    ASAP Automatic Switching And Processing
    ASAP As Soon As Possible
    ASC Advanced System Care
    ATM Adobe Type Manager
    atm at the moment
    ATP Analyze Tool Pack
    AV Anti-Virus
    AWC Advanced Windows Care (Now called Advanced System Care)
    BBS Bulletin Board System, Bios Boot Specification
    BBcode Bulletin Board Code (e.g. a smiley or brackets or another possibility)
    BHO Browser Helper Object
    BIOS Basic Input/Output System
    BITS Background Intelligent Transfer Service
    BMP BitMaP (File Format), Batch Message Processing, Basic Multilingual Plane
    BSOD Blue Screen Of Death
    BT Bus Terminator, Bit Test
    BTW By The Way
    BUS Broadcast and Unknown Server
    BW BandWidth (digital) measured in bits per second (binary), Byte = 8 bit
    BW BandWidth (frequency) measured in Hertz - usually KHz/MHz/GHz (cycles per second)
    CCI Completely Clean Install (My own suggestion )
    clsid class identifier
    CMD Command
    COM COMmand File extension, Component Object Model, COMmunication port (Serial port)
    CP Control Panel (IObit Forum)
    CPU Central Processing Unit
    CXI Common X-windows Interface
    DAC Device Access Code, Digital to Analog Converter, Discretionary Access/Data Acquisition Control
    DAP Download Accelerator Plus, Data Access Page, Directory Access Protocol, Dynamic Application Partitioning
    DCOM Distributed Component Object Model
    DIY Do It Yourself
    DIVx Digital Videoexpress
    DLL Dynamic Link Library, Dynamic Link Loader
    DM Desktop or Document Management, Disconnect Mode, Distributed Memory, Debugger Module
    DNS Domain Name System, Digital Nervous System
    DOG Digital Original Gene
    DOS Disk Operating System
    DPI Dots Per Inch (Resolution Measurement), Distributed Protocol Interface, Digital Phone Interface
    DSL Digital Subscriber Line, Dialogue Scripting/Dynamic Simulation Language, Distributed Service Logic
    DVD Digital Versatile Disk, Digital Video Disk
    EDGE Enhanced Data-rate for Gsm Evolution
    ENIS European Network (of) Innovative Schools
    EULA End User License Agreement
    FAT File Allocation Table
    FiOS Fiber Optic Service
    fps frames per second
    FWIW For What It's Worth
    fx. for example
    FYI For Your Information
    GB Giga Bytes (2^30 bytes or sometimes 10^9 bytes), Game_Booster (IObit)
    GIF Graphical Interchange File Format
    GPRS General Packet Radio Service
    GSM Global System for Mobile communications, Global Shared Memory
    GUI Graphical User Interface
    HD Hard Disk, Hard Density
    HIPS Host Intrusion Prevention System
    HKCU Handle to Registry Key Current User
    Hz Hertz - electromagnetic wave (one cycle per second) K=1000, M=million, G=10^9
    IAT Intelligent Agent Technology, Information Access Technology, Internet Appliance Toolkit, Import Address Table
    ICQ I Seek You (communication program)
    ID IDentifier
    IDE Integrated Drive Electronics, Integrated Development Environment, Interactive Design/Engineering/Enhancement
    IE Internet Explorer
    IMHO In My Humble Opinion
    IMO In My Opinion
    IObit Intelligently Optimized bit(s) (my own suggestion )
    ISDN Integrated Services Digital Network
    IP Internet Protocol, Information Provider, Instruction Pointer
    ISP Internet Service Provider
    JPE Jump if Parity Even
    JPEG Joint Photographic Experts Group
    JPG JPeG File extension
    KB Kilo Bytes (2^10 bytes or sometimes10^3 bytes), Knowledge Base
    LAN Local Access or Area Network
    LNG Language (File extension)
    LOL Laughing Out Loud, Lots Of Love
    LUI Local User Interface, Language User Interface (speech recognition technology), Logical User Identifier
    LV Logical Volume, Low Voltage
    MAC MACro File extension, Mandatory Access Control, Move Add Change
    MAC Address Media Access Control Address
    MAD Microsoft Active Directory, Mutual Assured Destruction
    MB Mega Bytes (2^20 bytes or sometimes10^6 bytes)
    MBR Master Boot Record
    MFT Master File Table
    MIME Multipurpose Internet Mail Extensions
    MMX MultiMedia eXtensions
    MODEM MOdulator/DEModulator
    MPEG Motion Picture Expert Group
    MPG Motion Picture (expert) Group
    MRU Most Recently Used, Maximum Receive Unit
    MSG Message (.msg - message file extention)
    MTU Maximum Transmission Unit
    MUI Multimedia User Interface
    NA Not Applicable, Not Available
    nbsp non-breaking space (hard space) (Alt+0160)
    NTFS New Technology File System
    OEM Original Equipment Manufacturer
    OMG Object Management Group
    OMG Oh My God
    OP Original Poster
    OS Operating System
    OSI Open Systems Interconnection, Open Source Initiative
    OTOH On The Other Hand
    OTT Over The Top
    PAE Physical Address Extension
    PC Personal Computer, Printed Circuit, Program Counter
    PCI Peripheral Component Interconnect
    PDF Portable Document Format, Printer Description File, Processor Defined Function
    PE Phase Encoding, Portable Executable file format, Parity Error or Even
    PID Personal IDentifier, Process or Product IDentifier, Proportional Integral Derivative
    PM Private Message (IObit Forum)
    PNG Portable Network Graphics File format
    PSD PhotoShop Drawing File extension, Postal Security Device, Programmer's Supplementary Documents
    PUP Potentially Unwanted Program
    QT Quick Time
    QUT Questionable User Terminology (My own suggestion )
    RAD Rapid Access Disk, Rapid Application Development
    RAM Random Access Memory
    RAR Resource Adapters aRchive (compression file format)
    RC Release Candidate
    RMW Read Modify Write
    rtl Raster Transfer Language, Register Transfer Language or Transistor Logic, Run Time Library
    RZ Return to Zero
    SA Source Address, Service Agent, Security Association
    SCSI Small Computer System Interface
    SDSL Symmetric Digital Subscriber Line
    SFC System File Checker
    SID Security IDentifier, Serial Input Data, System or Station IDentification
    SMART Self-Monitoring Analysis and Reporting Technology
    SMBIOS System Management Basic Input Output System
    SOA Service Oriented Architecture, Start Of Authority
    SOHO Small Office/Home Office
    SP Service Pack, Stack Pointer, Sequence or SignalProcessor
    SSL Secure Sockets Layer, Synthesizer Specification Language
    TAI Threat Analysis Index
    TAI Think About It
    TC Test Control, Transmission Control or Convergence, Technical Committee
    TCP Transmission Control Protocol, Tape-Carrier Package
    THX Thanks, Thank you
    TIFF Tagged Image File Format
    TIF Tagged Image File extension
    TM Traffic Management, Transaction Manager or Monitor, Transmission and Multiplexing
    TNT The News Toolkit, TriNitroToluene
    TTL Time To Live, Transistor-Transistor Logic
    TxIA Thanks In Advance
    TYIA Thank You In Advance
    UAC Universal Access Control, User Access Control
    UDP User Datagram Protocol
    UI User Interface, Unix International
    UPNP Universal Plug aNd Play
    UPS Uninterrupted Power Supply
    URL Uniform Resource Locator
    USB Universal Serial Bus
    VBA Visual Basic for Applications
    WDK Windows Development Kit
    WFP Windows File Protection
    WLAN Wide Local Access or Area Network
    WOT Web Of Trust
    WYSBYGI What You See Before You Get It
    WYSIWYG What You See Is What You Get
    xDSL (all types of) Digital Subscriber Line
    XML eXtensible Markup Language
    ZAC Z's Are Calling, (the "sack's" are calling -time for bed)
    ZIP Compression file format, Zigzag Inline Package, Zone Improvement Plan Postal code

    x^y means x raised to the power of y where y is the exponent
    Please edit and expand as you see fit
    RMW (Read Modify Write)

    I have made chat abbreviations blue


    Leave a comment:

  • solbjerg
    Useful commands in "Run"

    Some useful commands

    The Windows key + R Opens the Run command box *
    The Windows Key + F Opens Search *
    The Windows Key + F1 Opens Help & Support *
    The Windows key + Pause/Break Opens System Settings *

    Some useful commands to be used from "Run"
    (They may not work in all environments, but they work in Windows XP)

    appwiz.cpl Opens Add/Remove Programs *
    calc Opens Calculator *
    certmgr.msc Opens Certificate Manager
    charmap Opens Character Map *
    chkdsk Checks the primary drive (only minor repair - no restart required) *
    chkdsk /f Checks the primary drive (settings and files repaired after restart) *
    chkdsk /r Checks the primary drive (settings/files/empty space repaired after restart)*
    cleanmgr Opens Windows Disk Cleaner
    cmd Opens Command Prompt Window *
    compmgmt.msc Opens Computer Management
    control Opens Control Panel *
    control.exe folders Opens Folder Options (notice space between "exe folders") *
    control.exe netconnections Opens NetWork connections (notice space between "exe netconnections")
    control.exe schedtasks Sends you to Scheduled tasks (notice space between "exe schedtasks")
    desk.cpl Opens Properties for the Desktop *
    devmgmt.msc Device Manager *
    dfrg.msc Opens Windows Defrag
    drwtsn32 Doctor Watson configurations
    drwatson Drwatson checks for errors
    dxdiag Directx diagnostics *
    eventvwr.msc Opens Event viewer *
    eudcedit Program for creating user defined characters
    explorer Opens Windows Explorer *
    iexplore Opens Internet Explorer *
    firewall.cpl Opens Windows Firewall (tabs: General-Exceptions-Advanced)
    inetcpl.cpl Opens Internet Settings (in control panel) *
    intl.cpl Opens International Settings (language, currency - ) *
    magnify Opens Magnifying Utility
    main.cpl Opens Mouse settings
    mmc Opens Microsoft Management Console
    mmsys.cpl Opens Sound Settings
    mrt Opens Malware Removal Tool (Microsoft)
    msconfig Opens System configuration program *
    msinfo32 Opens System Information *
    mspaint Opens Paint
    narrator Opens Microsoft Reader
    notepad Opens NotePad
    ntbackup Opens the BackUp Utility (if installed) *
    osk Opens On Screen Keyboard
    perfmon Opens Performance Monitor
    regedit Opens Registry edit *
    restore Opens Restore windows where you can choose rstrui.exe application *
    schedlgu.txt Opens the scheduled tasks log
    services.msc Opens Services *
    sfc /scannow Scans Computer for missing/wrong files *
    sndrec32 Opens Windows Sound Recorder
    syncapp Let's you Create a Briefcase (can be used as an updated restore file)
    sysdm.cpl Opens System Settings * Windows key + Pause/Break works too!
    sysedit Opens System Editor *
    taskmgr Opens Taskmanager *
    Tasks =Opens Sheduled tasks
    wiaacmgr Opens Windows Picture Scanner
    winver Shows you the Windows Version
    wordpad Opens WordPad
    wscui.cpl Windows Security Center
    wuaucpl.cpl Windows Automatic Update (Schedule)
    wupdmgr Opens Windows Update
    %systemroot%\system32\dllcache\wab.exe Opens Windows Address book
    %SystemRoot%\system32\restore\rstrui.exe Opens Windows System Restore *
    C:\Program Files\IObit\IObit SmartDefrag\IObit SmartDefrag.exe Takes you to the program Smart Defrag
    C:\WINDOWS\Tasks Opens the Windows Tasks Folder
    %userprofile%\cookies Opens the cookie folder *
    %userprofile%\sendto Opens the SendTo folder, where you can add a shortcut to your right click. * (

    You can find almost anything on the computer from run by writing c or c: or c:\ or %systemroot% or %userprofile% and then chosing from the drop down menu.

    If WordPad doesn't open, you can place a copy of the file (WordPad.exe) in system32, then it does.

    Opening Properties for Taskbar and Start Menu is done by right clicking the Start button and choosing Properties

    Several of the commands are discussed in more detail elsewhere in this thread

    If you want to have the Run commands available, you have to exclude the cleaning of Run history from the Sweeping options in ASC

    If Run isn't shown in your Start Menu - right click Start and choose Properties - under the tab Start Menu click the button Options and place a tick in the Run option.

    Tasklist "Print"
    There is a command in command prompt using tasklist, but it does not work in XP Home.
    C:\Documents and Settings\"User Name">tasklist > "%userprofile%\desktop\t.txt"
    that will generate a file on your desktop to copy the content from and insert in your forum post or simply attach the file to the post. It works in XP Pro though - do not know about later versions, you will have to try yourselves.
    I think it is possible to use tasklist /v also instead of just tasklist
    /v stands for verbose.

    * What I see as the most useful commands

    Please add other useful commands
    RMW (Read Modify Write)

    Generating a list of content by using the Command prompt
    For example: If you need to see or send a list of the content in your Program folder/directory you can use the command prompt to generate it.
    dir /b "C:\Programs" > "Desktop\Programs.txt"
    dir /b/p "C:\Programs\IObit\Advanced SystemCare 5" > "Desktop\h.txt"

    Copy the above string - open your command prompt - right click in the window and paste the copy - hit enter.
    Then you will have that text file sitting on your desktop waiting for what you want to do with it.
    You can exchange programs with fx. Documents" or Documents\Pictures" if these are the ones you want to generate a list for.

    You can generate a list of Ports on your computer by writing netstat -a (notice space before -a) in your command prompt
    Thank you demitris

    Network Connection speed
    Start/Control Panel/Network Connections - right click your Internet gateway and choose Status.
    Or Start/Network Connections - right click your Internet gateway and choose Status.

    Booting in Safe Mode


    Leave a comment:

  • solbjerg
    Search in the Forum

    Search in the forum can assist you in finding articles useful to yourself in a faster and easier manner than searching through the whole forum.
    It is done by clicking the menu point Search
    In the line below there is a search option that lets you search in the all of the 4 forums you can be in.
    (It would have been nice if it was possible to search for more than one word here too - to narrow down the possible posts)

    This however is possible in Advanced Search!

    The search word has to be at least 4 characters long
    You can either search for threads or posts!
    If you do not find anything relating to your wish - try another word for the same.
    Or try the advanced search option!
    In the advanced search do not use words with less than 4 characters -
    fx. "Usage of IObit Products" should be written "Usage IObit Products"

    About using the forum

    RMW (Read Modify Write)
    Attached Files

    Leave a comment:

  • enoskype
    Valuable Informative Links


    Forum Rule

    Usage of ASC 3 & SD
    USAGE of IOBIT PRODUCTS by solbjerg. 太阳山
    Support The address in the forum


    Usage of extra skins for ASC 3
    Designing New Skins for ASC (Part 1)
    Designing New Skins for ASC (Part 2)

    Moving Smart Defrag around
    Move Smart Defrag Just like ASC

    Safely removing portable hard drives without exiting SmartDefrag or using "Unlocker".
    Remove portable safely

    Clean uninstall tool for IObit Products (BitRemover) in sticky thread:

    Description on how to use the application JavaRa by wozofoz
    Thank you woz - great work!!

    Fred de Vries' Weblog of list of AV and AS Uninstallers. A very useful collection.

    1-click Super shortcuts for games in Game Booster by member Grue.

    System File Checker (sfc)

    How to create a path for the sfc /scannow command

    How to perform Check Disk in Windows XP (chkdsk)

    Description of the Windows XP Recovery Console for advanced users

    Running Beta Software

    Your Security!

    Think about Defragmentation!!!

    Get to System Restore settings by writing the following command in "Run"

    Services can be reached by writing the following command in "Run"

    Dealing with startup items using Autoruns by Sysinternals

    Informative link to Prefetch description (Provided by JustDave)

    Forgotten Adminstrator password in Wndows:

    Services can be reached by writing services.msc in "Run"
    The services list can be exported to a file and sent attached for others to check.
    This is done from the icon in the tool line.
    Recommended settings can be downloaded from the internet.
    (several exists depending upon the preference of the writer, but they are usually explained - and you can choose your own preference from that or go with the recommended Microsoft setting)
    The settings in your computer will show up in System Optimization as "problems" if your own settings differ from IObit settings and you will have to place the "problem" in the "Ignore List" if you want to keep your own settings.

    Windows System Restore
    Get to System Restore settings by writing the following command in "Run"

    "Let Windows choose the best settings for your computer"
    This window can be reached by writing sysdm.cpl in "Run" or
    The Windows key + Pause/Break Opens System Settings and then you choose the tab Advanced and the button Performance - Settings
    Or you can right click My Computer, choose Properties - the tab Advanced and the button "Settings" in the Performance section.
    This can sometimes restore settings that the System Optimize has changed, but you will then have to place that "problem" in the Ignore List the next time you run System Optimize.
    There are further possibilities in that window if you want to experiment a bit.

    Leave a comment:

  • solbjerg
    Screenshots and Attachments in the Forum

    A picture can say more than many words, therefore there is often a request for providing a screenshot.
    On your keyboard there is a key called PrintScreen often abbreviated to "Prt Scr". When you press this key it will "take a picture" of what is seen on your screen (desktop), If you hold down the Alt key while pressing the "Prt Scr" a picture of the window on top (activated window) of the screen is copied.
    This you can save in for example your picture folder or your desktop.
    The default picture folder is usually located in Documents/Pictures
    If you need to convert the picture into .jpg you can do this in Paint usually located in Start/Accessories/Paint by opening the picture there and then saving it as a .jpg picture or perhaps a .png picture.
    (the reason I mention these two extensions (formats) is that they enable you to attach the largest (KB-wise) pictures in the post)
    For other (large) files it is advisable to send them as zipped files

    This brings us to

    There is also often a request for providing more information in the form of an attachment.
    When you are creating/answering a post you might want to provide your readers with a screenshot or some other file.
    This is done by going below the writing window to Additional Options and under "Attachments" click on the button "Manage Attachments", - this brings you to a dialog window where you can "Upload a file from your computer" - you then find the file in question on your computer and Upload it. It will then become an attachment in your post.
    Please make sure that the file to be attached is not larger in size than shown in the dialog window.
    :grin: 太阳山 Thank you enoskype!

    This was written because I noticed that some members didn't know how to do this.

    RMW (Read Modify Write)

    P.s. If you want to have the attachment shown as a picture directly in the post, you will have to first open the attachment in your post (after your first save) and then copy the address in the address line. Then you will have to Edit your post and in an appropriate place click on Insert picture - in the box that comes up you then insert the address you copied previously.

    If you want to remove your Attachment (ZIP or Image etc):

    • Click Edit at the bottom of your post
    • Click Go Advanced
    • Scroll down and click Manage Attachments
    • Under the heading Current attachments you will see your Attachment
    • Click Remove (on the right)
    • When removed click Close this window
    • Click Save Changes

    Provided by wozofoz - thank you my friend

    If you want to attach a screenshot and this screenshot contains much text the considerate way to do this is to change the interface language to English before taking the screenshot in order for the majority of other members to be able to read it.
    It is mostly in instances with much text that this would be really helpful.
    Please also make sure that the screenshot is sharp enough to read and if possible make it able to show magnification.
    Thank you!!


    Leave a comment:

  • solbjerg
    About Translation

    Translating language files:

    Currently ASC language file has 7406 (version 3.7) English words that have to be translated into your own language if you want to add your native language to the list..
    No small job!
    Just to make you aware of what you are taking on!

    Currently SmartDefrag language file has 928 (version 2.01) English words that have to be translated into your own language if you want to add your native language to the list..
    Much easier, right!

    Currently Game Booster language file has 405 (version 1.51) English words that have to be translated into your own language if you want to add your native language to the list..
    Even easier, right!

    Currently IObit Unlocker language file has 212 (version beta 2. ?) English words that have to be translated into your own language if you want to add your native language to the list..
    Even easier, right!

    Currently IObit Security 360 language file has 2858 (ver.1.50) English words that have to be translated into your own language if you want to add your native language to the list..
    Not quite as easy!

    Currently IObit Toolbox language file has 11418 (ver. 1.1) English words that have to be translated into your own language if you want to add your native language to the list..
    This is quite a job!!

    Currently Advanced System Care v.4 has 4409 (v.4.0.1) English words that have to be translated into your own language if you want to add your native language to the list..
    This is a medium sized job!! :smile:
    (To make it a fully functional translation with the Toolbox additional applications - the Toolbox has to be translated too, I think (11418 words)!! Which makes it a very large job!!)

    Currently Advanced System Care v.5 has 4695 (v.5. beta 2.1) English words that have to be translated into your own language if you want to add your native language to the list..
    This is a medium sized job!! To make it a fully functional translation with the Toolbox additional applications - the Toolbox has to be translated too, I think (11418 words)!! Which makes it a very large job!!)

    Currently IObit Malware Fighter (IMF) has 1444 (v.1.1) English words that have to be translated into your own language if you want to add your native language to the list..
    This is a medium sized job!!

    Currently IObit Uninstaller has 501 (18-08-2011) English words that have to be translated into your own language if you want to add your native language to the list..
    Quite easy job!

    Only translate the words to the right of =
    And then send the translated language file to IObit ,

    I find using Excel the easiest, I copy the content of the English language file and open Excel: click on A1 and then ctrl+v, then click on F1 and ctrl+v
    Then I translate the English words after = into my native language in the F column, using the A column as reference.
    (when finished I save a copy in Unicode format of the translated file in Notepad)

    After you have translated the file you place it in the language folder in the program (rename the "native language".txt → "native language".lng)
    and check it by running the program. Some translations might not fit in the available space and you will have to find another word/description - possibly an abbreviation to make it fit the allotted space.
    (After this you can send it!)

    If you use notepad for translation, there is a verification tool by Tim Xue in this post.
    You can downlod it from:
    Choose the English.lng for the left pane and your Nativelanguage.lng for the right pane and click compare.

    New language tool is in Language Checking Tool thread.

    Translated ASC 3 Language files can be found here. You can also post language files in your language there.
    Translated ASC 3 Help files can be found here. You can also post help files in your language there.
    Translated Smart Defrag language files can be found here. You can also post language files in your language there.
    Translated Game Booster language files can be found here. You can also post language files in your language there.
    Translated IObit Security 360 language files can be found here. You can also post language files in your language there.
    Translated IObit Security 360 Help files can be found here. You can also post help files in your language there.
    Translated IObit Toolbox Language files can be found here (NEW). You can also post language files in your language there.

    enoskype! Thank you!
    RMW (Read Modify Write)
    :grin: 太阳山

    p.s. There have been some problems with some local language characters in the past - I hope this is solved now. If you do run into trouble with some special characters - then try saving the language file in unicode coding and send that to IObit with an explanation.
    → (Alt+8594 or Unicode Hex+2192) Can often be written by Alt+26 →


    NOTE: According to the new plan by IObit, all the language translation threads for all IObit products are gone to Multi-language Translations sub-section under General Forums section. enoskype

    Leave a comment:

  • enoskype
    Additional Utilities

    Disk Check (chkdsk)
    This application will scan your volume for errors, a short description is shown when you click the icon.
    It does the same as the command chkdsk does if written in Run
    or the same as you get if you right click C:/Properties/the tab Function and click the button Check Now and the button Start - without a checkmark in any boxes.

    The command chkdsk /f in Run or chkdsk C: /f will check the C: volume for errors after a restart. (the disk name chkdsk C: may be changed to the disk you want to check)
    (same as if you checkmark the top box in C:/Properties/the tab Function - disk control)

    chkdsk /r or chkdsk C: /r in Run will check the same as the switch /f + that it will check the free space for errors too.
    (same as if you checkmark both boxes in C:/Properties/the tab Function-disk control)
    Chkdsk in Windows can repair problems related to bad sectors, lost clusters, cross-linked files, and directory errors.
    It will also recover files from the bad sector if there is any and flag the bad sector as not to be used.
    You can find out what is done by chkdsk going to Event Viewer. Here is the link, describing how you can go there. Thanks to garybear for the images!
    Thank you enoskype

    System File Checker (sfc)
    This application will check your system files for errors, a short description is shown when you click the icon.
    The same thing that happens if you write sfc /scannow in Run
    (Take a look in Windows Help&Support for further commands and switches)

    Scans all protected system files immediately.
    Scans all protected system files at the next system start.
    Scans all protected system files at every start.
    Cancels all pending scans of protected system files.
    Enables WFP for normal operation. (Windows File Protection)
    Purges the file cache and scans all protected system files immediately.
    Sets the file cache size, in megabytes.
    Replaces incorrect file versions without prompting the user.
    Displays this list in the command prompt
    Applies to Windows 7 - Thank you sunny staines

    System Backup (ntbackup)
    This application backs up your important files and settings, a short description is shown when you click the icon.
    You can run this too through Run by writing ntbackup or ntbackup.exe in run.
    (if this function isn't installed you will need your install cd to install it) (XP Home)
    (Exists as standard in XP Pro)
    You can read about it too in Windows Help&Support

    Game Booster
    Game Booster is designed to help optimize your PC for smoother, more responsive game play in the latest PC games with the touch of a button.
    It works by temporarily shutting down background services, cleaning RAM, and intensifying processor performance to make your Gaming PC!

    "Designed to help optimize your PC for smoother, more responsive game play in the latest PC games with the touch of a button, Game Booster helps achieve the performance edge previously only available to highly technical enthusiasts. It works by temporarily shutting down background processes, cleaning RAM, and intensifying processor performance. That means you can keep all the features of Microsoft® Windows Vista® and XP® ready for when you need them, but turn them off when you are ready to get down to serious business – gaming. Game Booster makes it simpler to enjoy the latest games and take your experience to a new level. All systems go!"

    When you are in Gaming Mode, this program can not be closed until you change to Normal Mode.

    Please be aware that GameBooster only assists you in choosing what services to close down temporarily - you have to check the list to see if there are some services you do not want closed down and exclude those from closing down by deselecting them in the list!

    Problems with Sup_GameBooster.exe

    You open the ASC folder usually located in C:/programs/AdvancedSystemCare
    Delete/ or rename the Sup_Gamebooster.exe (fx. Old_Sup_Gamebooster.exe) lying there and paste the one you have unzipped from enoskype's link.

    Multi-language is supported in GameBooster
    This means that you now can add your native language to the Language folder in the program
    Translated Game Booster language files can be found here . You can also post language files in your language there.
    Or send the translated file to: Game Booster Translation

    How to add services to Game Booster!!!
    Please read this post

    Games Super Shortcuts for Game Booster!!!
    Please see Suggestion for Game Booster. SUPERSHORTCUTS ! thread and download GB1.exe from THIS post.

    Cloned Files Finder
    Cloned Files Finder starts with a guide where you can select which volume(s) to check.
    You just click "Next", and in the next window select what kind of check you want to perform and if you want a size limit.

    You can also exclude file types you do not want to check by placing a checkmark or not in the appropriate check box.
    When you click "Next" here it will perform the check and show you the cloned/duplicate files it found. You then have to check very carefully if any of the cloned/duplicate files are needed before deleting them.

    They will go to the Recycle bin and can be restored from there as long as you do not clean it - either yourself or by a scan - or by an automatic cleaning that haven't excluded the Recycle bin from the cleaning/sweep.

    Please pay heed to the warnings that are shown in the application!!

    Internet Booster
    (formerly called FirefoxTCP/IP Optimize)(take a look in previous post)

    Services can be reached by writing services.msc in "Run"
    The services list can be exported to a file and sent attached for others to check.
    This is done from the icon in the tool line.
    Recommended settings can be downloaded from the internet.
    (several exists depending upon the preference of the writer, but they are usually explained - and you can choose your own preference from that or go with the recommended Microsoft setting)
    The settings in your computer will show up in System Optimization as "problems" if your own settings differ from IObit Optimization settings and you will have to place the "problem" in the "Ignore List" if you want to keep your own settings.

    Windows System Restore
    Get to System Restore settings by writing the following command in "Run"

    Returnil Virtual System

    Thank you Coldmoon!

    "Let Windows choose the best settings for your computer"
    This window can be reached by writing sysdm.cpl in "Run" and then choosing the tab Advanced and the button Performance - Settings
    Or you can right click My Computer, choose Properties - the tab Advanced and the button Settings in the Performance section.

    RMW (Read Modify Write)

    Leave a comment:

  • solbjerg
    ASC Utilities

    ASC provides some extra tools to assist you in repairing, optimizing and cleaning. (The one in (parentheses) may exist in older versions)
    They are shown under the button Utilities and under three tabs
    "Tune Up", "Security" and "Admin Tools"

    Tune Up:
    Disk Cleaner
    Here you can select which volume to check
    It will show you 5 categories, mark one and click on details in order to go through them and decide if there is any that you do not need or that you want to move to another location by right clicking on the file and choose "go to folder" find the file snip it and place it in the location you prefer (for example a folder you call old files). Be prudent!
    Deleted files will be sent to Backup or to the recycle bin from where you can restore them as long as you do not empty the recycle bin.

    Driver Update
    Driver update will present you with available drivers for your applications
    This is fine as it gives you the location where you can download it from
    But be careful and check first. Some of the drivers may also be so new that they haven't been validated by Micosoft yet, which means that they often won't be installed - find and update that which has been validated even if it isn't the brand new one, at least that is my recommandation.

    FireFoxTCP Optimizer
    For examples of TCP Optimization please read this thread and this thread
    Transmission Control Protocol/Internet Protocol (TCP/IP)
    Some settings in this application isn't easy for non-technical users to understand, but follow the excellent advice of enoskype in the links he provides.

    This applications sends you to the program SmartDefrag, - if you have it installed.
    Read about SmartDefrag in another post in this thread!

    IObit Registry Defrag
    This application will defrag your registry database.
    Adequately explained in the window.
    Close all running applications prior to running this function - also your anti-virus application.
    (The screen will darken while this is going on - wait - have patience and do not mess with the process)

    Shortcut Fixer
    This application will find obsolete shortcuts from for example uninstalled files and programs, or from moved programs.
    In short - shortcuts from any file or program that hasn't a "parent" anymore
    (Instead of deleting them you might repair the shortcuts one by one)

    Adequately explained in the window.
    Click Settings to choose how you want to run the application.
    Remember that if you have chosen to let it run automatically, it will be in your systemtray and can interfere with uninstallation if it isn't exited
    It will continually show you the current memory status unless you have chosen not to have it in your systemtray. (You may have to make it's properties "Always shown")
    (this is done by right clicking on the Start button and choosing properties and the tab Taskbar and then Customized)

    Submit New
    It sends you to this site:
    Where you can read what it is about
    Mainly working together with other companies that have something to offer for free.

    (Software Informer)
    You can find details in: .

    Driver BackUp
    This utility backs up the drivers you choose
    Just put a checkmark to all or the ones you choose

    IE Security Assistant
    Here you can remove items in "IE Extentions", "IE add-in"
    (In some of the sub-menues you can also view the Properties)

    Under the Option "IE Settings" (this shows possible hi-jacked settings) you can restore the settings to Default by clicking that button.

    Admin Tools:
    Auto ShutDown
    Here you can choose to either Auto ShutDown your computer or to Restart your computer at a scheduled time.
    Just choose one of the options and configure the schedule.
    (If you want/need to use this function)

    Context Menu Manager
    This utility allows you to delete item(s) in your right click menu.
    There are 3 tabs - in "Shell extention" tab you can even be sent to The Registry Database and edit the key (this should only be done by those that know what they are doing)

    Under the tab "New" it shows you the menu under the command New in your right click menu - and the option to remove a command you do not think you need.

    Under the tab "Send To" you have the option of removing a right click command option from the list.
    (Would have been nice if there also were an opportunity to be sent to the folder where you could add a right click command to your option in the right click menu)
    %userprofile%\sendtoIt sends you to the folder SendTo where you click on Files/New and then navigate to the file you want to add a shortcut for in your right click.

    Disk Explorer
    This application allows you to view and sort through the files on your computer.
    They are sorted as follows
    File types
    Video files
    Music files
    Image files
    Document files
    Rubbish files
    Other files (miscellaneous)
    You can view them by clicking the appropriate button
    (And take the action you find prudent according to your wishes)

    Top 100
    Which shows you the largest 100 files on your computer
    Basicly it can be used to determine which uninstallation would give you back the most free space.
    But do not - I say NOT - delete files out of hand. Several of them are needed for the Operating System to work.

    Clone files
    This application finds files that have the same name and size on your computer (duplicates) and you can then decide if you need them or not.
    But be very, very careful! especially post 9
    Cloned Files Finder (now to be found in Additional Utilities)

    Restore center
    The restore center shows you the latest 20 restore point for ASC Care operation - if you go by default settings - in the right hand of the window, and you can choose to go back to the latest restore date if something untoward has happened.
    In the left side it gives you the opportunity to

    Create a restore point
    - which will then be shown in the Windows System Restore facility.

    View System Restore
    - which will send you to the dialog page in Windows System Restore facility

    - which will send you to the setting for ASC

    Software UnInstaller
    This application sends you to Software UnInstaller in Windows manager
    The same as you will get if you go through Control Panel/Add-Remove programs.
    This uninstaller often leaves "leftovers" behind (i.e. the program folder)
    A free application that can be used to uninstall and clean up could be "Revo UnInstaller".

    StartUp Manager
    Many times when you install new programs, they are set up to run silently in the background from the system tray. Some of these need to run (ex: anti virus, firewall, ect.) but many do not and can be started when needed from desktop icon. If you have too many programs running all the time it can slow down computer. In startup manager, you can uncheck the boxes of the ones you do not want to run at startup (Do not delete the entries unless they are old ones you no longer have.). If you uncheck one and discover that you really do need it to run, you can go back and re-check the entry to allow at startup. If you are not sure, you can select an entry, then click “online search” to go to for clues about that entry.

    System Information
    This application gives you the fundamental basic information about you computer.
    This can be exported to a .txt file or to a .html file which you can attach to a message for investigation purposes - should the need arise.
    Click on "File" in menu line and choose either .txt or .html

    Windows Manager
    In Windows Manager you have the possibility to view "Process Manager", "System Service", "TCP/UDP" (Transmission Control Protocol/User Datagram Protocol), "Software UnInstaller" and "Cookie Manager"

    -(WM)Process Manager
    Here you can either refresh or terminate a process
    (You get more options by using the Job list (Taskmanager) or Ctrl+Alt+Delete)
    Taskmanager (taskmgr in Run)

    -(WM)System Service
    Here you get an easy overview of what services you have running.
    You can right click on the items choose Properties and in the window then choose either Automatic, Manual or Deactivated
    You can also refresh each setting
    (Several recommandations exists - you could choose to go with the recommended Microsoft OS (Operating System) settings, - all can be found on the internet)

    -(WM)TCP/UDP (Transmission Control Protocol/User Datagram Protocol)
    Here you can view which protocol is running, its address and its status

    -(WM)Software UnInstaller
    Easy overview of programs you have on your computer that can be uninstalled (shows you the program version too) basicly the same as Add/Remove Programs in Control panel.

    -(WM)Cookies manager
    Here you can view your cookies and delete/exclude/refresh some or all of them by putting/removing a checkmark in the box
    %userprofile%\cookies in Run to view the cookie folder

    Please add relevant informative links to the descriptions

    RMW (Read Modify Write)


    Leave a comment: