Revo Uninstaller Pro gives you six handy and powerful tools to clean up and maintain your system. You can access them by clicking the Tools button in the lower part of the Commands Panel.
The Autorun Manager gives you control over the startup process of your operating system by allowing you to select which processes, services, and scheduled tasks are allowed to start with Windows. With this tool, you can not only enable or disable applications from automatically starting, but also get more information about them, like publisher, description, launch path, and whether it is currently running. If this information is not enough to decide whether to enable or disable the program, you can get more information about the publisher and the executable file name directly from Google with only a couple of clicks.
When you buy a brand new computer, it has no or few applications, which are set to start with Windows. As you keep installing new software, some of it will set itself to start with your computer. You can see some of them in the system tray (the area in the Taskbar near the clock) as small icons. Often such applications are messengers, adware, optimizers, and other applications you do not need to start automatically.
When an application is started, it takes resources such as memory (RAM), CPU time, etc. The amount of these resources depends on the started application, but no matter how much resources it takes, it adds up as you run more and more programs.
If you want a program to start automatically with Windows, a common place to put it is in the Startup folder of the Start Menu.
Some applications like antivirus, firewalls, ant other and system programs must be started on Windows startup to keep your system running smoothly. Get as much information for an auto-starting program as possible, and decide whether to enable or disable it.
You can right click on a column header and choose which columns to show or hide some of the columns. That way you can also choose what to print.
Using the Search field in the upper right part of the Commands Panel, you can filter the browser extension list by name, launch path, or publisher. The program list will be filtered in real-time as you type. When searching, the status bar will display the number of found programs that match the search criteria.
The most common task you would need to do is to Enable or Disable an application from auto starting with Windows. This can be done with a single click; all you have to do is to uncheck/check the check the box in front of the application name. Another option is to Remove a program. This will not only disable it but also remove it from the list. Generally, it is recommended that you first simply Disable a program by unchecking it, as it is easily reversible – checking it again. Remove a program only if you are certain it will not have negative consequences. There are several commands that you can access from the More commands:
To export to an XLS file, you must have Microsoft Excel installed and working properly.
Set auto start for:
Select to auto-start from:
the AppData folder is hidden so you may need to show the hidden files and folders.
You can also bring up a context menu for an item if you right click. These are the available commands:
The Junk Files Cleaner allows you to find and remove various types of junk and unnecessary files from your computer. Many Windows applications create junk files. Normally, such files are deleted by the application that had created them as soon they become unnecessary. However, sometimes they can remain on your hard drive if the program that created them was terminated unexpectedly, or it was not programed to delete said files, or there was a system crash, etc. The accumulation of such files takes up disk space, and may also sometimes impact system performance.
With the Junk Files Cleaner you can select which of your drives to scan, and what extension of files to scan for. The most common temporary and junk files extensions are built-in, but you can also add whatever extensions you want. It is also possible to manually add a specific folders (in the Options -> Junk Files Cleaner -> Include), whose content will be considered junk and will be emptied at every scan.
If you do not want to scan a whole drive, you can select only a particular folder. To do that, use the Scan Folder… button/text, just above the list of drives, and as soon as you select a folder, the scanning will begin.
Available commands for the Junk Files Cleaner:
Right clicking a junk file will bring up a context menu with the following commands:
There are many handy and useful tools and components bundled with every Windows operating system. Some of them have complex command line options; others are difficult to access. The Windows Tools section in Revo Uninstaller Pro gives you a fast – one-click access to more than ten Windows tools, which you can use in your daily routine. Some tools depend on the which version of Windows you are running.
Windows Windows Tools |
Vista | 7 | 8(Pro) | 8.1 | 10 | Server 2012 R2 | ||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
№ | x86 | x64 | x86 | x64 | x86 | x64 | x86 | x64 | x86 | x64 | x64 | |
1 | System Restore | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | |
2 | Network Diagnostics | |||||||||||
3 | Network Infromation | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
4 | Security Center | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | |
5 | System Properties | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
6 | System Information | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
7 | TCP/IP Netstat Command | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
8 | On-Screen Keyboard | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
9 | Disk Defragmenter | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
10 | Services | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
11 | Shared Folders | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
12 | Group Policy | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ (Pro) | ✓ | ✓ | ✓ |
13 | Add/Remove Windows Components | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | |
14 | Microsoft Windows Malicious Software Removal Tool | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ||
15 | Windows Backup and Restore | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | |
16 | Task Scheduler | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
17 | Check Disk | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
18 | System File Checker | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
18 | Disk Cleanup | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
20 | Resource Monitor | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
System Restore can be used to restore your computer to a previous state if a problem occurs, without losing your personal data files (such as Microsoft Word documents, browsing history, drawings, favorites, e-mails, etc.). System Restore creates snapshots of the most vital areas of the system, called Restore Points. These Restore Points allow you to revert the system back to a specific state. They are created daily and at significant system events (such as when an application or driver is installed, when Windows updates are installed, etc.). You can also create Restore Points manually.
Network Diagnostics is used to gather and display information about your computer’s hardware, operating system, Internet configuration and network, etc. With the Network Diagnostics tool, you can perform a scan of your system, test network connectivity, and whether or not your network-related programs and services are functional. The information it gathers can be helpful when given to a support person trying to troubleshoot an issue you are having. This tool is available only on Windows XP.
Network Information is used to display all current TCP/IP network configuration values, refresh Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS) settings, Displays the full TCP/IP configuration for all adapters including IP address, MAC address, subnet mask, default gateway, Windows Internet Naming Service (WINS) and DNS configuration. Adapters can represent physical interfaces, such as installed network adapters, or logical interfaces, such as dial-up connections.
Security Center is used to check the security status of your computer’s firewall, virus protection software, and automatic Windows updates. If a problem is detected with any of them (for example if your antivirus program is out of date), the Security Center alerts you and provides recommendations on how to better protect your computer.
System Properties is used for the following:
System Information collects and displays system configuration information for local and remote computers. This includes information about hardware configurations, computer components, and software, including signed and unsigned drivers.
The TCP/IP Netstat Command displays all active TCP connections and the TCP and UDP ports, on which the computer is listening, and displays the executables involved in creating each connection or listening port. In this case, the executable name is in [ ] at the bottom, on top is the component it called, and so forth until TCP/IP was reached. In other words, this command shows which applications are using which port to connect to the Internet, and which applications are listening for incoming connections.
On-Screen Keyboard is a virtual keyboard, shown on the screen, allowing users with mobility impairments to type data using a pointing device or joystick. You can also use On-Screen Keyboard if you think that there is a keylogger installed on your computer, and all the keys you type are being recorded, as it eliminates the possibility of recording typed keys. The On-Screen Keyboard can also be used as a temporary/emergency workaround, if you do not have a real keyboard for the moment but you need to be able to type.
Disk Defragmenter analyzes local volumes and consolidates fragmented files and folders so that each occupies a single, contiguous space on the volume. As a result, your system can access files and folders and save new ones more efficiently. By consolidating your files and folders, Disk Defragmenter also consolidates a volume’s free space, making it less likely that new files will be fragmented. The process of consolidating fragmented files and folders is called defragmentation. After defragmentation, your hard disk drive will be well arranged and your system will work faster.
A service is a type of application that runs in the background. Services typically provide features such as client/server applications, Web servers, database servers, and other server-based applications to users, both locally and across a network. You can use the Services component to:
Shared Folders is used to manage shared resources over a network, control user access permissions, session activity, shared resource properties, and to view a summary of connections and resources, uses for local and remote computers. With Shared Folders, you can:
Group Policy is a component that includes policy settings for user configurations, which affect users, and for computer configurations, which affect computers (all users). Group Policy settings define the various components of the user’s desktop environment that a system administrator needs to manage, for example, the programs that are available to users, the programs that appear on the user’s desktop, and options for the Start menu. To create a specific desktop configuration for a particular group of users, use the Group Policy snap-in.
Add/Remove Windows Components (also known as Windows Feature) helps you manage installed Windows components on your computer. After Windows is installed, you can use the Add/Remove Windows Components (Windows Features) to add a Windows component that was not included in the original installation, or to remove an existing Windows component that you no longer require.
The Microsoft Windows Malicious Software Removal Tool checks your computer for infections by specific, prevalent malicious software, and helps remove any infections found. This malicious software includes viruses, worms, and Trojan horses. When the detection and removal process is complete, the tool displays a report describing the outcome, including, if any malicious software was detected and removed.
Windows Backup and Restore allows you to make copies of data files for all people who use the computer, and provides you with the ability to create a system image. You can let Windows choose what to back up or you can select the individual folders, libraries, and drives you want to back up. A system image includes Windows and your system settings, programs, and files. You can use a system image to restore the contents of your computer if your hard drive or computer ever stops working.
Task Scheduler helps you schedule automated tasks that perform actions at a specific time, or when a certain event occurs. It provides the ability to schedule the launch of programs or scripts at pre-defined times, or after specified time intervals. Task Scheduler maintains a library of all scheduled tasks, providing an organized view of the tasks and a convenient way to manage them.
Check Disk opens a command prompt window to execute the chkdsk.exe Windows command. Check Disk verifies the logical integrity of the file system on the Windows volume. Check Disk checks for problems related to bad sectors, lost clusters, cross-linked files, and directory errors. These types of problems can be caused by system crashes or freezes, power glitches, incorrectly turning off a computer, etc.
System File Checker allows you to scan for and restore corruptions in Windows system files, verifying their versions. If it finds a problem, it will attempt to replace the problematic files from the Windows DLL Cache. If the file is not in the Windows DLL Cache or the DLL Cache is corrupted, you may be prompted to insert the Windows installation disk.
System File Checker allows you to scan for and restore corruptions in Windows system files, verifying their versions. If it finds a problem, it will attempt to replace the problematic files from the Windows DLL Cache. If the file is not in the Windows DLL Cache or the DLL Cache is corrupted, you may be prompted to insert the Windows installation disk.
Resource Monitor displays information about the use of hardware (CPU, memory, disk, and network) and software (file handles and modules) resources in real time. This tool helps you find how much of resources are being put to use at the moment or used over time through a graphical representation. This way, you can check the performance counters of specific resource and decide a course of action to improve the performance of the computer.
The History Cleaner tool combines three other cleaning tools – Browsers Cleaner, Windows Cleaner, and Microsoft Office Cleaner. Each of them is accessible from a tab located on the top of the main window of the History Cleaner. They can be used separately using the Clear button when a cleaner is active, or the history of all cleaners can be cleared at once if you click the Clear All button.
Depending on the history setting, you want to clean, and the browser you have, you have to check the desired options, and click the Clear or Clear All buttons in the Commands Panel. You can also quickly check or uncheck all options by right clicking, and selecting the appropriate option.
Deleting your files and folders does not mean that they are gone forever. When you empty the Recycle Bin, your files and folders are just marked as deleted but they are not physically erased. There is a chance to recover deleted data from 10 years or older computers, and this data may be very important or confidential. You can easily get back your important documents and other files that you have deleted using any recovery tool or un-delete program. This is where the Evidence Remover comes in. The Evidence Remover will eliminate all chances to get data back from your hard drive(s). It will forever erase files and folders that are already deleted, but left physically on your hard disk. No matter what tool you or somebody else uses to recover data, including professional and expensive recovery tools, the result will always be the same — the data erased with Evidence Remover is impossible to recover. To erase already deleted files and folders, you have to check the drive from which those files were deleted, then you have to click the Execute button in the Commands Panel. Once you start the procedure, you will see a window with a progress bar and the estimated remaining time of the operation. You will also have the option to Pause/Resume the process. The process can be slow, because the data is overwritten randomly three times. The overall speed depends on:
During the process, the free disk space decreases because Evidence Remover creates a huge file, and writes random data in it. That huge file is deleted at the end of the process – the free disk space is restored.
If you want to securely delete a file or folder, and to be sure that no one, with any tool, could be able to recover that file or folder, then use Unrecoverable Delete. Deleting files and emptying Windows Recycle Bin does not mean they are gone forever. They are still on your hard drive, but marked as deleted. Anyone with a file recovery tool (free or commercial), could recover deleted data easily. Revo Uninstaller Pro’s Unrecoverable Delete tool makes this impossible, even if you try to do that with the most advanced and expensive tool on the market. Deleting files in Windows means that they are marked as deleted, and the space they allocated up until that point is free to use. This is because if Windows has to physically erase all deleted files, it will take time and will slow down your computer. There is also a lot of system, temporary, and other files which are a unimportant so making them unrecoverable would be waste of resources. Unrecoverable Delete physically erases all files and folders that you choose, which is why it takes more time than simple deletion. Unrecoverable Delete has the following commands:
The window of the Unrecoverable delete tool supports drag and drop of files and folders. Because Revo Uninstaller has administrative privileges, programs with lower privileges cannot drop files and folders in it. For example, if you run Windows explorer or any other file manager with a standard user account (not as administrator), you will not be able to drag and drop files in Unrecoverable delete tool.
We use cookies to improve content and ensure you get the best experience on our website.
By continuing to browse our website you agree to our privacy policy.
For more information please view our Privacy & Cookie Policy