Revo Uninstaller Pro gives you six handy and powerful tools to clean up and maintain your system. You can access them by clicking the Tools button in the lower part of the Commands Panel.
A brand new Windows computer has relatively few applications set to auto start when first switched on. As you install new software, some will self-set to start with your computer. System programs, antivirus software, and firewalls must be run at Windows startup to keep your system running smoothly, but most others rarely need to start automatically. Just look at all the icons in your system tray. When an application is started, it consumes memory (RAM) and CPU time. This impacts upon your computer’s performance.
Revo Uninstaller Pro’s Autorun Manager gives you control over which processes, services, and scheduled tasks can start with Windows. It lets you search for details about your auto-starting programs including publisher, description, launch path, and whether the process is currently running. You can also directly access Google with just 2 clicks, all designed to help decide whether to enable or disable the process.
Right click on a column header to show or hide any of them before you print details.
Use the Search field in the upper part of the Commands Panel to filter the programs list by name, launch path, or publisher. The program list will be filtered in real-time as you type. When searching, the status bar will display the number of found programs that match the search criteria.
The most common task will be to Enable or Disable an application from auto starting. Simply check or uncheck the box in front of the application name. Job done.
The alternative is to Remove a program. This will both disable and remove it from the list.
NOTE: It is recommended to simply Disable a program and watch for unwanted consequences before deleting. The process is easily reversed (just check the box again). Remove a program only if you are certain it will not have a negative impact.
Click More commands to access additional options.
To export to an XLS file, you must have Microsoft Excel installed and working properly.
Set auto start for:
Select to auto-start from:
NOTE: It is accessible from Windows Explorer:
NOTE: The AppData folder is hidden so you may need to show the hidden files and folders.
Additionally, you can right click to bring up a context menu for any Autorun item. These are the available commands:
Many Windows applications create junk files. Such files are normally deleted as soon as they become unnecessary, by the application that created them. However, they can remain on your hard drive if the program that created them was terminated unexpectedly or if it was not programmed to delete said files, or if there was a system crash, etc. Accumulation of junk files takes up disk space, and may also impact on system performance.
Junk Files Cleaner lets you find and remove unnecessary files from your computer.
You can select which drives to scan, and what type of file extension to scan for. The most common temporary and junk files extensions are built-in, but you can also add whatever extensions you wish. You can manually add a specific folder (Options -> Junk Files Cleaner -> Include), whose content will then be considered junk and will be removed at every scan.
If you do not want to scan a whole drive, just select a specific folder. To do so, use the Scan Folder… button/text, just above the list of drives. As soon as you select a folder, the scanning will begin.
Available commands for the Junk Files Cleaner:
Right clicking a junk file will bring up a context menu with the following commands:
Many useful tools and components are bundled with every Windows operating system. Some have complex command line options whilst others are difficult to access. Windows Tools gives you a fast – one-click access to a maximum nineteen Windows tools, which you can use in your daily routine.
Also, you can easily add your own tool here using the Add button. You can edit a custom tool by selecting it, and clicking the Edit button, and you can delete it by right clicking it, and selecting Delete.
|Vista||7||8(Pro)||8.1||10||11||Server 2012 R2|
|6||TCP/IP Netstat Command||✓||✓||✓||✓||✓||✓||✓||✓||✓||✓||✓||✓|
|11||Group Policy||✓||✓||✓||✓||✓||✓||✓||✓ (Pro)||✓||✓||✓||✓|
|12||Add/Remove Windows Components||✓||✓||✓||✓||✓||✓||✓||✓||✓||✓||✓|
|13||Microsoft Windows Malicious Software Removal Tool||✓||✓||✓||✓||✓||✓||✓||✓||✓||✓|
|14||Windows Backup and Restore||✓||✓||✓||✓||✓||✓||✓||✓||✓||✓||✓|
|17||System File Checker||✓||✓||✓||✓||✓||✓||✓||✓||✓||✓||✓||✓|
|21||Fush DNS cache||✓||✓||✓||✓||✓||✓||✓||✓||✓||✓||✓||✓|
System Restore lets you revert your computer to a previous state if a problem occurs, without losing any personal data files (including documents, images, videos, music, browsing history, drawings, favorites, e-mails, etc.).
System Restore creates snapshots of the most vital areas of the system, called Restore Points. They are created both daily and when significant system events occur (for example: when a program or driver is installed, when Windows updates are installed, etc.). You can also create Restore Points manually.
NOTE: By default, Revo Uninstaller Pro creates a Windows Restore Point at the start of any uninstall operation (before deleting any data).
Network Information is used to display all current TCP/IP network configuration values, refresh Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS) settings, Displays the full TCP/IP configuration for all adapters including IP address, MAC address, subnet mask, default gateway, Windows Internet Naming Service (WINS) and DNS configuration. Adapters can represent physical interfaces, such as installed network adapters, or logical interfaces, such as dial-up connections.
Security Center is used to check the security status of your computer’s firewall, virus protection software, and automatic Windows updates. If a problem is detected with any of them (for example if your antivirus program is out of date), the Security Center alerts you and provides recommendations on how to better protect your computer.
System Properties lets you:
System Information collects and displays system configuration information for local and remote computers. This includes information about hardware configurations, computer components, and software, including signed and unsigned drivers.
The TCP/IP Netstat Command displays all active TCP connections and the TCP and UDP ports, on which the computer is listening, and displays the executables involved in creating each connection or listening port. In this case, the executable name is in [ ] at the bottom, on top is the component it called, and so forth until TCP/IP was reached. In other words, this command shows which applications are using which port to connect to the Internet, and which applications are listening for incoming connections.
On-Screen Keyboard is a virtual keyboard, shown on the screen, allowing users with mobility impairments to type data using a pointing device or joystick. You can also use On-Screen Keyboard if you think that there is a keylogger installed on your computer, and all the keys you type are being recorded, as it eliminates the possibility of recording typed keys. The On-Screen Keyboard can also be used as a temporary/emergency workaround, if you do not have a real keyboard for the moment but you need to be able to type.
Disk Defragmenter analyzes local volumes and consolidates fragmented files and folders so that each occupies a single, contiguous space on the volume. As a result, your system can access files and folders and save new ones more efficiently. By consolidating your files and folders, Disk Defragmenter also consolidates a volume’s free space, making it less likely that new files will be fragmented. The process of consolidating fragmented files and folders is called defragmentation. After defragmentation, your hard disk drive will be well arranged and your system will work faster.
A service is a type of application that runs in the background. Services typically provide features such as client/server applications, Web servers, database servers, and other server-based applications to users, both locally and across a network. You can use the Services component to:
Shared Folders is used to manage shared resources over a network, control user access permissions, session activity, shared resource properties, and to view a summary of connections and resources, uses for local and remote computers. With Shared Folders, you can:
Group Policy is a component that includes policy settings for user configurations, which affect users, and for computer configurations, which affect computers (all users). Group Policy settings define the various components of the user’s desktop environment that a system administrator needs to manage, for example, the programs that are available to users, the programs that appear on the user’s desktop, and options for the Start menu. To create a specific desktop configuration for a particular group of users, use the Group Policy snap-in.
Add/Remove Windows Components (also known as Windows Feature) helps you manage installed Windows components on your computer. After Windows is installed, you can use the Add/Remove Windows Components (Windows Features) to add a Windows component that was not included in the original installation, or to remove an existing Windows component that you no longer require.
The Microsoft Windows Malicious Software Removal Tool checks your computer for infections by specific, prevalent malicious software, and helps remove any infections found. This malicious software includes viruses, worms, and Trojan horses. When the detection and removal process is complete, the tool displays a report describing the outcome, including, if any malicious software was detected and removed.
Windows Backup and Restore lets you make backup copies of personal data files for all users of the computer. You can let Windows choose what to back up or you can select the individual folders, libraries, and drives you want to back up.
It also lets you create a system image which includes Windows and your system settings, programs, and files. You can use a system image to restore the contents of your computer should your hard drive or computer ever stop working.
Task Scheduler helps you schedule automated tasks that perform actions at a specific time, or when a certain event occurs. It provides the ability to schedule the launch of programs or scripts at pre-defined times, or after specified time intervals. Task Scheduler maintains a library of all scheduled tasks, providing an organized view of the tasks and a convenient way to manage them.
Check Disk opens a command prompt window to execute the chkdsk.exe Windows command. Check Disk verifies the logical integrity of the file system on the Windows volume. Check Disk checks for problems related to bad sectors, lost clusters, cross-linked files, and directory errors. These types of problems can be caused by system crashes or freezes, power glitches, incorrectly turning off a computer, etc.
System File Checker allows you to scan for and restore corruptions in Windows system files, verifying their versions. If it finds a problem, it will attempt to replace the problematic files from the Windows DLL Cache. If the file is not in the Windows DLL Cache or the DLL Cache is corrupted, you may be prompted to insert the Windows installation disk.
Disk Cleanup is a computer maintenance utility designed to free up disk space on your computer hard drive. It allows users to removes files that are no longer needed or that can be safely deleted like temporary, cache, and log files created by the operating system and other programs.
Resource Monitor displays information about the use of hardware (CPU, memory, disk, and network) and software (file handles and modules) resources in real time. This tool helps you find how much of resources are being put to use at the moment or used over time through a graphical representation. This way, you can check the performance counters of specific resource and decide a course of action to improve the performance of the computer.
DISM is a command-line tool, as implemented in Revo Uninstaller Pro’s Windows Tools, performs a general scan for corruption, and attempts repairs of common issues it finds within the system image of the operating system.
The flush DNS cache command may help if you are having trouble accessing a web page or using an online service, as it is possible be that your device has cached an out of date DNS record that needs to be manually cleared or reset.
The DirectX Diagnostic Tool displays a wealth of information about DirectX, and also lets you perform basic diagnostic tests on the DirectX system. It is used to collect information about devices to help troubleshoot with DirectX sound and video related problems.
The History Cleaner tool consists of three modules – Browsers Cleaner, Windows Cleaner, and Microsoft Office Cleaner. Each is accessible from a tab at the top of the main window of History Cleaner. Use the Clear button when a specific cleaner is active, or the Clear All button for all 3 cleaners combined.
Browsers Cleaner – Your browser makes a detailed record of every web site you visit. A simple press of a button in your browser window lets anyone see what you have been browsing on the web. Temporary internet files include images, videos, audio files, etc., plus all the web pages you have visited. Browsers Cleaner erases web site history for the following browsers: Edge, Internet Explorer, Firefox, Google Chrome, and Opera. Deleting this history will also free up space on your hard disk.
Check the desired options for the browser history you want to clean and then click the Clear or Clear All buttons in the Commands Panel. You can also check or uncheck all options for one or all browsers by right clicking, and selecting the appropriate setting.
Available options for Windows Cleaner are:
Check the desired options you want to clean and then click the Clear or Clear All buttons in the Commands Panel. You can also check or uncheck all options by right clicking and selecting the appropriate setting.
NOTE: Remember, the Clear All button will cleanse all 3 history modules in one go.
Deleting files and folders from the Recycle Bin does not mean that they are gone forever. They are simply marked as deleted but not physically erased. Your “deleted” data may be confidential, but can still be easily retrieved using standard recovery tools or undelete programs – even many years later.
Evidence Remover will eliminate any possibility of data retrieval from your hard drive(s). It will permanently erase previously “deleted” files and folders still left physically on your hard disk. No matter what recovery tool (free, professional, expensive, whatever) may be subsequently employed, the result will always be the same – data erased with Evidence Remover is impossible to recover.
To erase previously deleted files and folders, simply check the drive from which those files were deleted, then click the Execute button in the Commands Panel. Once started, you will see a window with a progress bar and the estimated time remaining for the operation. You have the option to Pause/Resume the process.
The process can be slow, because the data is randomly overwritten three times. The overall speed depends upon:
During the process, the free disk space decreases because Evidence Remover creates a huge file, and writes random data in it. That huge file is deleted at the end of the process – the free disk space is restored.
As detailed in Evidence Remover, simply deleting files and emptying the Recycle Bin does not mean they are gone forever.
Deleting files in Windows just means that they are marked as such, and the space allocated to them up until that point then becomes available for other use. This is because if Windows had to physically erase all deleted files, it would take a long time and slow down your computer. There are also many system, temporary, and other files which are unimportant so making them unrecoverable would be waste of resources. Unrecoverable Delete physically only erases those files and folders that you select, but will take longer than a simple Windows delete.
So to securely delete your selected files and folders and be sure that no one, with any recovery tool (free, professional, expensive, whatever) will retrieve them, use Unrecoverable Delete. The result will always be the same – the erased data is impossible to recover.
Unrecoverable Delete has the following commands:
IMPORTANT: You can cancel the process but the files erased before cancellation will be unrecoverable, so please be careful when selecting the files and folders you want to erase.
The window of the Unrecoverable Delete tool supports drag and drop of files and folders. Because Revo Uninstaller has administrative privileges, programs with lower privileges cannot drop files and folders in it. For example, if you run Windows explorer or any other file manager with a standard user account (not as administrator), you will not be able to drag and drop files in Unrecoverable Delete tool.