ITPATROL/PC Repair System



PC Repair System

PC Repair System, is an USB-based utility software tools that has been collected and distributed free. The PC Repair System has 17 softwares , including the USB menu system—DcoTMenu.

Except for the DcoTMenu, all softwares are already extracted to individual folder. The original distribution of the PC Repair System is in zip file.

The PC Repair System has been highly recommended by the tech-experts of Yahoo Tech because of its portability and performance.

All of the 37 softwares are stand-alone, meaning it can operate from the USB vault even without installation in your PC.

For a start, open by double clicking the “USB PC Repair System” folder after you have inserted the USB vault into your PC. Double Click the “DCoTMenu” icon (brown). This will place the DCoTMenu into your system tray where you can select the other softwares in a pull-up menu system.

If you opt not to use the DCoTMenu system, you will have to open each software folder and look for the start-up icon for each utility application. That would be tedious for you. So, I would suggest use the DCoTMenu which is conveniently located in your system stray.

The DCoTMenu will automatically close if you accidentally eject the USB vault from your PC.

Here’s the software description based on my experience after having tried it myself:

AUTOCOMPRESS (not tried)

• This software will scan your files for COMPRESSABILITY. It will compress and decompress files according to criteria set like modification, compression ratio and file size.

BRUTEBENCHMARK (not tried)

• simple, fast and relevant methods to check, save (and later compare) the performance of a processor, video card and hard disk. two-three relatively simple tests (but of real office/scientific application interest) are performed for each hardware category and a benchmark result is computed.

CCLEANER (tried/recommended)

• system optimization and privacy tool. It removes unused files from your system - allowing windows to run faster and freeing up valuable hard disk space. It also cleans traces of your online activities such as your internet history. But the best part is that it's fast (normally taking less that a second to run) and contains no spyware or adware! :)

• CLEANS THE FOLLOWING:

|[pi|INTERNET EXPLORER |

|c] |TEMPORARY FILES, URL HISTORY, COOKIES, AUTOCOMPLETE FORM HISTORY, INDEX.DAT. |

| | |

• FIREFOX

    TEMPORARY FILES, URL HISTORY, COOKIES, DOWNLOAD HISTORY.

• OPERA

    TEMPORARY FILES, URL HISTORY, COOKIES.

| |WINDOWS |

| |RECYCLE BIN, RECENT DOCUMENTS, TEMPORARY FILES AND LOG FILES. |

|[pi|REGISTRY CLEANER |

|c] |ADVANCED FEATURES TO REMOVE UNUSED AND OLD ENTRIES, INCLUDING FILE EXTENSIONS, ACTIVEX CONTROLS, CLASSIDS, PROGIDS, UNINSTALLERS, |

| |SHARED DLLS, FONTS, HELP FILES, APPLICATION PATHS, ICONS, INVALID SHORTCUTS AND MORE... ALSO COMES WITH A COMPREHENSIVE BACKUP FEATURE.|

|[pi| |

|c] |THIRD-PARTY APPLICATIONS |

| |REMOVES TEMP FILES AND RECENT FILE LISTS (MRUS) FROM MANY APPS INCLUDING MEDIA PLAYER, EMULE, KAZAA, GOOGLE TOOLBAR, NETSCAPE, MS |

| |OFFICE, NERO, ADOBE ACROBAT, WINRAR, WINACE, WINZIP AND MANY MORE... |

|[pi|100% SPYWARE FREE |

|c] |THIS SOFTWARE DOES NOT CONTAIN ANY SPYWARE, ADWARE OR VIRUSES. |

• IT CONTAINS TWO ESSENTIAL TOOLS:

1. FILE CLEANER

THIS REMOVES FILES THAT ARE NOT NEEDED BY YOUR SYSTEM, SUCH AS: TEMPORARY FILES, INTERNET CACHE FILES, LOG FILES, DELETED FILES IN THE RECYCLE BIN, AND MANY MORE. THE OPTIONS FOR WHAT TO REMOVE ARE COVERED BY THE FIRST TWO TABS ON THE LEFT OF THE MAIN WINDOW: WINDOWS AND APPLICATIONS.

2. REGISTRY CLEANER

THIS SCANS YOUR REGISTRY AND HIGHLIGHTS ISSUES THAT MAY BE CAUSING PROBLEMS. ONCE SCANNED YOU MAY SELECT THE ISSUES AND FIX THEM. YOU WILL BE OFFERED THE CHANCE THE BACKUP ANY CHANGES AS WELL. THE OPTIONS FOR WHAT TO SCAN ARE LISTED ON THE THIRD TAB “ISSUES” ON THE MAIN WINDOW.

• WHY SHOULD I CLEAN MY SYSTEM?

DO YOU REMEMBER HOW FAST YOUR COMPUTER WAS WHEN YOU FIRST GOT IT? THIS IS BECAUSE YOU HADN'T YET INSTALLED ALL THOSE DEMOS AND UTILITIES THAT YOU NO LONGER USE. MOST OF THESE PROGRAMS LEAVE BEHIND TEMPORARY FILES AND REGISTRY ENTRIES, EVEN WHEN UNINSTALLED!

ADDITIONALLY YOUR OPERATING SYSTEM RECORDS EVERY VISIT TO EVERY WEBSITE; EVERY TIME YOU OPEN A DOCUMENT, AND A LOT MORE. DO YOU WANT PEOPLE TO BE ABLE TO FIND OUT THIS INFORMATION?

EVEN IF YOU DON'T MIND OTHER PEOPLE KNOWING WHAT WEBSITES YOU VISIT, YOUR INTERNET BROWSER CAN SAVE PERSONAL INFORMATION ABOUT YOU, SUCH AS YOUR NAME, ADDRESS, DATE OF BIRTH, PASSWORDS AND CREDIT CARDS NUMBERS. LUCKILY CCLEANER WILL REMOVE ALL OF THESE.

CDMAGE (not tried)

• (for research!!)

COMMTEST (not tried)

• (for research)

DISKIMG (not tried)

• (for research)

DOUBLE KILLER (tried)

• SEARCHES FOR DUPLICATE FILES, DELETES OR MOVES IT.

• WARNING: BE CAREFUL IN DELETING SINCE IT PERMANENTLY DELETES THE FILES. DELETED FILES CAN NOT BE FOUND AT THE BIN. BETTER MOVE FIRST THE DUPLICATES TO ANOTHER FOLDER AND DELETE IT LATER AFTER YOU FOUND IT NOT AFFECTING ADVERSELY YOUR PC PERFORMANCE. HENCE, DELETED FILES CAN STILL BE REINSTALLED FROM THE RECYCLE BIN.

DRIVEIMAGE X ML (not tried)

• IS AN EASY TO USE AND RELIABLE PROGRAM FOR IMAGING AND BACKING UP PARTITIONS AND LOGICAL DRIVES.

• THE PROGRAM LETS YOU:

• BACKUP LOGICAL DRIVES AND PARTITIONS TO IMAGE FILES

• BROWSE THESE IMAGES

• RESTORE IMAGES TO THE SAME OR ANOTHER DRIVE

• COPY DIRECTLY FROM DRIVE TO DRIVE

DTASKMANAGER (not tried)

• (for research)

ENCOPY (not tried)

• (for research)

ERASER (not tried)

• ERASER IS AN ADVANCED SECURITY TOOL, WHICH ALLOWS YOU TO COMPLETELY REMOVE SENSITIVE DATA FROM YOUR HARD DISK BY OVERWRITING IT SEVERAL TIMES WITH CAREFULLY SELECTED PATTERNS.

• YOU CAN DRAG AND DROP FILES AND FOLDERS TO THE ON-DEMAND ERASER, USE THE CONVENIENT EXPLORER SHELL EXTENSION OR USE THE INTEGRATED SCHEDULER TO PROGRAM OVERWRITING OF UNUSED DISK SPACE OR, FOR EXAMPLE, BROWSER CACHE FILES TO HAPPEN REGULARLY, AT NIGHT, DURING YOUR LUNCH BREAK, AT WEEKENDS OR WHENEVER YOU LIKE.

• THE PATTERNS USED FOR OVERWRITING ARE BASED ON PETER GUTMANN'S PAPER "SECURE DELETION OF DATA FROM MAGNETIC AND SOLID-STATE MEMORY" AND THEY ARE SELECTED TO EFFECTIVELY REMOVE THE MAGNETIC REMNANTS FROM THE HARD DISK MAKING IT IMPOSSIBLE TO RECOVER THE DATA.

• OTHER METHODS INCLUDE THE ONE DEFINED IN THE NATIONAL INDUSTRIAL SECURITY PROGRAM OPERATING MANUAL OF THE US DEPARTMENT OF DEFENSE AND OVERWRITING WITH PSEUDORANDOM DATA.

• WHY USE IT? MOST PEOPLE HAVE SOME DATA THAT THEY WOULD RATHER NOT SHARE WITH OTHERS - PASSWORDS, PERSONAL INFORMATION, CLASSIFIED DOCUMENTS FROM WORK, FINANCIAL RECORDS, SELF-WRITTEN POEMS, THE LIST CAN BE CONTINUED FOREVER. PERHAPS YOU HAVE SAVED SOME OF THIS INFORMATION ON YOUR COMPUTER WHERE IT IS CONVENIENTLY AT YOUR REACH, BUT WHEN THE TIME COMES TO REMOVE THE DATA FROM YOUR HARD DISK, THINGS GET A BIT MORE COMPLICATED AND MAINTAINING YOUR PRIVACY IS NOT AS SIMPLE AS IT MAY HAVE SEEMED AT FIRST.

• NORMAL FILE DELETION IS INSECURE

• YOUR FIRST THOUGHT MAY BE THAT WHEN YOU DELETE A FILE, THE DATA IS GONE. NOT QUITE, WHEN YOU DELETE A FILE, THE OPERATING SYSTEM DOES NOT REALLY REMOVE THE FILE FROM THE DISK; IT ONLY REMOVES THE REFERENCE OF THE FILE FROM THE FILE SYSTEM TABLE. THE FILE REMAINS ON THE DISK AS LONG AS ANOTHER FILE IS CREATED OVER IT, AND EVEN AFTER THAT, IT MIGHT BE POSSIBLE TO RECOVER DATA BY STUDYING THE MAGNETIC FIELDS ON THE DISK PLATTER SURFACE. BEFORE THE FILE IS OVERWRITTEN, ANYONE CAN EASILY RETRIEVE IT WITH A DISK MAINTENANCE OR AN UNDELETE UTILITY.

• FOR EXAMPLE, IMAGINE THAT YOU HAVE BEEN SURFING ON THE WEB FOR A WHILE AND AFTERWARDS WISH TO CLEAR ANY TRACES REVEALING WHAT SITES YOU VISITED. YOU GO TO YOUR BROWSER’S PREFERENCES AND SELECT TO CLEAR THE CACHE AND THE HISTORY FILE, THE INFORMATION IS NOW GONE YOU THINK TO YOURSELF - WELL THINK AGAIN. THE BROWSER CACHE FILES CAN EASILY BE RESTORED WITH AN UNDELETE UTILITY AND YOUR PRIVACY IS ONCE AGAIN COMPROMISED.

• TO BE SURE THAT A FILE IS GONE, ITS CONTENTS MUST BE PROPERLY OVERWRITTEN BEFORE DELETING. AS SIMPLE AS IT SOUNDS, THERE ARE SEVERAL PROBLEMS IN SECURE FILE REMOVAL, MOSTLY CAUSED BY THE CONSTRUCTION OF A HARD DISK AND THE USE OF DATA ENCODING. THESE PROBLEMS HAVE BEEN TAKEN INTO CONSIDERATION WHEN ERASER WAS DESIGNED AND BECAUSE THIS INTUITIVE DESIGN YOU CAN SAFELY AND EASILY ERASE PRIVATE DATA FROM YOUR DISK.

• DELETED DATA CAN BE EASILY RECOVERED

• YOU HAVE MOST LIKELY ALREADY INSECURELY DELETED COUNTLESS AMOUNT OF FILES FROM YOUR DRIVE AND EVERY NOW AND THEN APPLICATIONS CREATE (AND INSECURELY DELETE) TEMPORARY FILES ON YOUR DRIVE CONTAINING SOME POSSIBLY SENSITIVE DATA THAT YOU WOULD RATHER NOT SHARE WITH OTHER PEOPLE. THIS DATA REMAINS ON YOUR DRIVE UNTIL IT GETS OVERWRITTEN AND CAN BE VIEWED WITH SIMPLE DISK UTILITY.

• THIS IS WHERE THE ERASING OF UNUSED DISK SPACE COMES IN HANDY. THE ERASING OF UNUSED DISK SPACE MEANS THAT ALL SPACE AVAILABLE ON YOUR DRIVE WILL BE OVERWRITTEN SO THAT DATA PREVIOUSLY SAVED ON IT CANNOT BE RESTORED. ERASER PROVIDES YOU A CONVENIENT WAY TO ERASE THE UNUSED DISK SPACE REGULARLY IN ORDER TO REMOVE THE REMAINS OF TEMPORARY FILES AND OTHER SENSITIVE INFORMATION YOU POSSIBLY HAVE HAD ON YOUR HARD DISK.

ERUNT (tried backing up but not on restoring)

• WITH THE INVENTION OF WINDOWS 95 MICROSOFT MADE THE WISE DECISION TO ORGANIZE ALL COMPUTER- AND APPLICATION-SPECIFIC DATA WHICH WAS SPREAD OVER COUNTLESS INI FILES BEFORE IN A CENTRALIZED WINDOWS DATABASE, CALLED THE SYSTEM "REGISTRY". THE REGISTRY IS ONE OF THE MOST IMPORTANT PARTS IN EVERY WINDOWS SYSTEM TODAY, WITHOUT WHICH THE OS WOULD NOT EVEN BOOT. AND SINCE THE REGISTRY IS QUITE SENSITIVE TO CORRUPTION, IT IS VERY ADVISABLE TO BACKUP ITS ACCORDING FILES FROM TIME TO TIME.

EXPLORE 2FSPE (not tried)

• (for research)

FILE ASSASSIN (not tried)

• HAS THE CAPABILITY TO REMOVE LOCKED MALWARE FROM YOUR SYSTEM. IT USES ADVANCED TECHNIQUES TO UNLOCK AND REMOVE THE FILE.

• (for further research)

FILEMON (not tried)

• AN APPLICATION THAT MONITORS AND DISPLAYS ALL FILE SYSTEM ACTIVITY ON A SYSTEM. IT HAS ADVANCED FILTERING AND SEARCH CAPABILITIES THAT MAKE IT A POWERFUL TOOL FOR EXPLORING THE WAY WINDOWS WORKS, SEEING HOW APPLICATIONS USE THE FILES AND DLLS, OR TRACKING DOWN PROBLEMS IN SYSTEM OR APPLICATION CONFIGURATIONS.

• FILEMON WORKS ON NT 4.0, WINDOWS 2000, WINDOWS XP, WINDOWS SERVER 2003, WINDOWS 95, WINDOWS 98 AND WINDOWS ME.

HASH (not tried)

• (for research)

HDDSCAN (tried)

• SCAN THE HARD DRIVES FOR BAD SECTORS

• (for further research)

ICEECC (not tried)

• ICE ECC IS A FILE VERIFICATION AND REPAIR TOOL. ICE ECC ALLOWS YOU TO PROTECT YOUR IMPORTANT FILES AND SENSITIVE DATA AGAINST DIGITAL CORRUPTION USING REED-SOLOMON CODES.

• DID YOU KNOW THAT A TYPICAL CD-R/DVD-R DISK CAN HOLD ITS DATA INTACT FOR ONLY A FEW YEARS? ICE ECC IS THE PERFECT SOLUTION TO THIS PROBLEM - BEFORE YOU STORE YOUR DATA, PROTECT IT AGAINST CORRUPTION WITH ICE ECC.

• ICE ECC IS EASY TO USE. TO PROTECT A FILE AGAINST CORRUPTION, JUST SELECT THE FILE/FILES/DIRECTORIES WITH THE PROGRAM BY NAVIGATING THE EXPLORER-STYLE WINDOW AND CLICK CREATE. THIS CREATES RECOVERY FILE/FILES OF THE ORIGINAL FILES. YOU CAN EASILY CONTROL THE SIZE AND NUMBER OF THE RECOVERY FILES.

• WHEN YOU WANT TO VERIFY WHETHER THE FILE HAS BEEN MODIFIED OR IF THE DATA IN IT HAS BEEN CORRUPTED, JUST SELECT THE APPROPRIATE .ECC FILE AND CLICK VERIFY. ICE ECC WILL THEN DO A FULL ANALYSIS OF THE FILE AND LET YOU KNOW IF IT HAS BEEN CORRUPTED, IN THAT CASE ICE ECC WILL AUTOMATICALLY RECOVER IT FOR YOU

ISO-BURNER (not tried)

• ACTIVE@ ISO BURNER IS A SIMPLE-TO-USE DIALOG-STYLE SOFTWARE TO BURN CD/DVD-ROM ISO IMAGES COMPATIBLE WITH THE ISO 9660 STANDARD. [BURN ISO FILE] COMMAND IS ADDED TO THE CONTEXT MENU FOR *.ISO FILE TYPE IN THE WINDOWS EXPLORER. AUTOMATED BURNING IS ALSO SUPPORTED.

LCISOCREATOR (not tried)

• (for research)

LSASECRETSVIEW (not tried)

• DESCRIPTION: LSASECRETSVIEW IS A SMALL UTILITY THAT DISPLAYS THE LIST OF ALL LSA SECRETS STORED IN THE REGISTRY ON YOUR COMPUTER.

THE LSA SECRETS KEY IS LOCATED UNDER kEY_LOCAL_MACHINE\SECURITY\POLICY\SECRETS AND MAY CONTAIN YOUR RAS/VPN PASSWORDS, AUTOLOGON PASSWORD, AND OTHER SYSTEM PASSWORDS/KEYS. \

• Using LSASecretsView: LSASECRETSVIEW DOESN'T REQUIRE ANY INSTALLATION PROCESS OR ADDITIONAL DLLS. JUST COPY THE EXECUTABLE FILE (LSASECRETSVIEW.EXE) TO ANY FOLDER YOU LIKE, AND RUN IT.

THE MAIN WINDOW OF LSASECRETSVIEW CONTAINS 2 PANES: THE UPPER PANE DISPLAYS THE LIST OF ALL LSA SECRET ENTRIES. WHEN YOU SELECT ONE OR MORE ITEMS IN THE UPPER PANE, THE LOWER PANE DISPLAYS THE LSA DATA OF THE SELECTED ITEMS, IN HEX AND ASCII FORMATS.

PATCHER (not tried)

• WITH PATCHER YOU CAN SIMPLY CREATE A PATCH FROM A TWO FILES(OLD AND NEW). A SIMILARITY OF FILES IS IMPORTANT. ONLY IF FILES IS SIMILAR, YOU MAY CREATE A SMALL FILE PATCH. PATCH IS CREATE FROM DIFFERENCES OF BOTH FILES. AND NATURALLY: YOU MAY CREATE NEW FILE FROM PATCH ONLY IF YOU HAVE A OLD FILE. IT'S A FUNDAMENTAL OF A PATCH

• (for further research)

PMMON (not tried)

• IT IS USE TO MONITOR POWER FOR BATTERY OR POWER SOURCE.

PROCESSEXPLORER (not tried)

• PROCESS EXPLORER IS AN ADVANCED PROCESS MANAGEMENT UTILITY THAT PICKS UP WHERE TASK MANAGER LEAVES OFF. IT WILL SHOW YOU DETAILED INFORMATION ABOUT A PROCESS INCLUDING ITS ICON, COMMAND-LINE, FULL IMAGE PATH, MEMORY STATISTICS, USER ACCOUNT, SECURITY ATTRIBUTES, AND MORE. WHEN YOU ZOOM IN ON A PARTICULAR PROCESS YOU CAN LIST THE DLLS IT HAS LOADED OR THE OPERATING SYSTEM RESOURCE HANDLES IT HAS OPEN. A SEARCH CAPABILITY ENABLES YOU TO TRACK DOWN A PROCESS THAT HAS A RESOURCE OPENED, SUCH AS A FILE, DIRECTORY OR REGISTRY KEY, OR TO VIEW THE LIST OF PROCESSES THAT HAVE A DLL LOADED.

• THE PROCESS EXPLORER DISPLAY CONSISTS OF TWO SUB-WINDOWS. THE TOP ALWAYS SHOWS A LIST OF THE CURRENTLY ACTIVE PROCESSES, INCLUDING THE NAMES OF THEIR OWNING ACCOUNTS, WHEREAS THE INFORMATION DISPLAYED IN THE BOTTOM WINDOW, WHICH YOU CAN CLOSE, DEPENDS ON THE MODE THAT PROCESS EXPLORER IS IN: IF IT IS IN HANDLE MODE YOU WILL SEE THE HANDLES THAT THE PROCESS SELECTED IN THE TOP WINDOW HAS OPENED; IF PROCESS EXPLORER IS IN DLL MODE YOU WILL SEE THE DLLS AND MEMORY-MAPPED FILES THAT THE PROCESS HAS LOADED.

• PROCESS EXPLORER ALSO HAS A POWERFUL SEARCH CAPABILITY THAT WILL QUICKLY SHOW YOU WHICH PROCESSES HAVE PARTICULAR HANDLES OPENED OR DLLS LOADED. THE UNIQUE CAPABILITIES OF PROCESS EXPLORER MAKE IT USEFUL FOR TRACKING DOWN DLL-VERSION PROBLEMS OR HANDLE LEAKS, AND PROVIDE INSIGHT INTO THE WAY WINDOWS AND APPLICATIONS WORK.

• YOU CAN OBTAIN EQUIVALENT COMMAND-LINE TOOLS, HANDLE AND LISTDLLS, AT THE SYSINTERNALS WEB site.

PRODUKEY (tried)

• ProduKey is a small utility that displays the ProductID and the CD-Key of MS-Office, Windows, Exchange Server, and SQL Server installed on your computer. You can view this information for your current running operating system, or for another operating system/computer - by using command-line options. This utility can be useful if you lost the product key of your Windows/Office, and you want to reinstall it on your computer

REGMON (not tried)

• IS AN APPLICATION THAT MONITORS AND DISPLAYS ALL REGISTRY ACTIVITY ON A SYSTEM. IT HAS ADVANCED FILTERING AND SEARCH CAPABILITIES THAT MAKE IT A POWERFUL TOOL FOR EXPLORING THE WAY WINDOWS WORKS, SEEING HOW APPLICATIONS USE THE REGISTRY, OR TRACKING DOWN PROBLEMS IN SYSTEM OR APPLICATION CONFIGURATIONS.

• REGMON WORKS ON WINDOWS 95, 98, ME, NT, 2000, XP AND .NET SERVER.

RESTORATION (tried)

• RESTORE FILES WHICH ARE DELETED FROM THE RECYCLE BIN OR DELETED WHILE HOLDING DOWN THE SHIFT KEY BY MISTAKE.

• CONVERSELY, THIS PROGRAM HAS ANOTHER FUNCTION THAT MAKES IT ALMOST IMPOSSIBLE TO RESTORE ALL DELETED FILES (DELETE COMPLETELY). YOU CAN USE IT AFTER DELETION OF CONFIDENTIAL DOCUMENTS, EMBARRASSING FILES AND SO ON. IT INDICATES ITS FOLDER LOCATION, SO YOU WILL KNOW WHO OPENED THAT FILE AND ERASED IT EVENTUALLY.

• YOU DON'T HAVE TO INSTALL IT, SO IT DOESN'T LEAVE ANY GARBAGE IN THE PC. (YOU CAN ALSO RUN IT FROM A FLOPPY DISK.)

ROOTKIT REVEALER (not tried)

• ROOTKITREVEALER IS AN ADVANCED ROOT KIT DETECTION UTILITY. IT RUNS ON WINDOWS NT 4 AND HIGHER AND ITS OUTPUT LISTS REGISTRY AND FILE SYSTEM API DISCREPANCIES THAT MAY INDICATE THE PRESENCE OF A USER-MODE OR KERNEL-MODE ROOTKIT.

• THE TERM ROOTKIT IS USED TO DESCRIBE THE MECHANISMS AND TECHNIQUES WHEREBY MALWARE, INCLUDING VIRUSES, SPYWARE, AND TROJANS, ATTEMPT TO HIDE THEIR PRESENCE FROM SPYWARE BLOCKERS, ANTIVIRUS, AND SYSTEM MANAGEMENT UTILITIES.  THERE ARE SEVERAL ROOTKIT CLASSIFICATIONS DEPENDING ON WHETHER THE MALWARE SURVIVES REBOOT AND WHETHER IT EXECUTES IN USER MODE OR KERNEL MODE.

SEQUOIA (not tried)

• (for research)

SIW (tried)

• SYSTEM INFORMATION FOR WINDOW. IT SCANS YOUR PC FOR SYSTEM DETAILS.

TWEAKUI (tried)

• TWEAK USER INTERFACE—FOR SETTING UP VARIOUS INTERFACE COMMANDS, SUCH AS MOUSE, KEYBOARD, ETC…

UNIEXTRACT (not tried)

• (for research)

VIRTUALCD (not tried)

• (for research)

WHATCHANGED (tried)

• Getting snapshots of files in the system. For Professional use.

WHYREBOOT (not tried)

• WHYREBOOT WILL TRY TO DETERMINE IF AN INSTALLER HAS REQUESTED POST-REBOOT FILE REPLACEMENT, OR OTHER PENDING OPERATIONS THAT MAY REQUIRE A REBOOT. MAINLY FOR THE CURIOUS, IT CAN BE HELPFUL IN DETERMINING WHETHER A REBOOT IS REALLY NECESSARY, OR AN INSTALLER IS JUST 'PLAYING IT SAFE' IN REQUIRING A REBOOT.

WIRELESS KEY VIEW( not tried)

• WIRELESSKEYVIEW RECOVERS ALL WIRELESS NETWORK KEYS (WEP/WPA) STORED IN YOUR COMPUTER BY THE 'WIRELESS ZERO CONFIGURATION' SERVICE OF WINDOWS XP. IT ALLOWS YOU TO EASILY SAVE ALL KEYS TO TEXT/HTML/XML FILE, OR COPY A SINGLE KEY TO THE CLIPBOARD.

................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download