-->

05 November 2011

SPEED UP YOUR PC-Amigo System Speedup


360Amigo System Speedup can quickly identify and fix a wide range of errors and speeds up your slow PC. Detects and removes all unused files in your PC from faulty software installs/ uninstalls, it optimizes your Windows for faster start-up times and stops malicious processes from running on your PC. It also cleans traces of your online activities such as your Internet history, cookies, temporary files, logs, invalid links and much more. let's meet on But the best part is that it's small, fast and furious (normally taking less than a minute to run). 360Amigo System Speedup will get the most out of your PC and make it like new again. Both beginners and experienced users will enjoy the available features and options. With the click of a button all common computer errors can be fixed. How does it do this? In a nutshell, 360Amigo System Speedup offers a Registry Cleaner to detect and remove all bad entries from the PC, it optimizes Windows for faster start-up times and stops runaway Processes that may take up all of the processors' cycles.

360Amigo System Speedup includes a System Cleaner, a System Optimizer and a wide range of System Tools designed exclusively to boost PC performance. Also includes a Junk Files Cleaner to remove unused files and traces of online activities, such as browser history, cookies, temporary files, logs, invalid links and many more. The best part is that it's small (less than 3Mb), fast and furious (normally taking less than a minute to scan and fix).

360Amigo System Speedup is designed to fix PC problems quickly and cheaply, extending the life of your computer by years. You no longer need to have the cost and inconvenience of purchasing a new computer. 360Amigo System Speedup offers new multi-functional utilities essential for today's improved computers.

System Cleaner:

* One-Click Solution

* System Scan Scheduler

* Clean junk data and free up disk space

* Fix the common problems instantly

* Clean Registry Errors

* Clean hidden privacy exposing traces

* Permanently delete private data

System Optimizer:

* Check disks at startup

* Provides a complete list of Internet connections running

* Stop unused and malicious computer processes

* Remove unneeded programs from startup

* Provides Defragmentation for files and folders

Disk Tools:

* Uninstalls unneeded programs

* Provides a list of installed Drivers

* Provides information about your entire computer system

* Provides File Recovery
 
* Manages/ Deletes System Restore Points 

PASSWORD PROTECT USB DRIVES-USB Secure

 Where there is a USB Drive, there has to be USB Secure! USB Secure can password protect USB drives. Protection is PC independent, doesn't require installation and doesn't require administrator rights at the other end. Never again worry about lost or stolen USB drives if you have protected it with USB Secure. USB Secure works with all types of portable media like USB Flash drives, Thumb drives, Memory sticks, External drives and Memory Cards.
 
USB Secure helps you password protect USB drive, thumb drive, memory stick, pen drive, jump drive, flash drive and external hard drive. It supports plug and play and runs automatically once a USB drive is plugged in, asking you the password for it. USB Secure is hassle free and it doesnt need a rocket scientist to master.
 
USB drives are the most popular way to move data from one PC to another. They are small in size but can carry gigabytes of data. They are easy to use, convenient, affordable, but at the same time they pose a security risk and can be easily lost, stolen or misplaced. A secure USB drive i.e., a password protected USB drive is a must these days as the data that it contains may cost you millions of dollars if stolen or lost.
 
You can easily lock USB drives with USB Secure and can also password protect memory sticks and all other external storage devices with just a single mouse click. An easy to use setup program will guide you to put the program on your USB drive. It can automatically detect all such drives currently plugged into your PC. After installing simply run the software, set and confirm a password, protect USB drive and sit back and relax!
 
Its not necessary to run the software every time you want to protect USB drive; you can simply choose Protect This USB Drive option from the Windows Autoplay that pops up every time you plug in your USB drive. You can also double click the USB drive in your PC to launch the program. To un protect your secure USB drive, click Un protect and enter correct password to access your data again.
 
Another great feature of USB Secure is that it doesnt require any Administrator rights to run and therefore there is no need to install it at the other end to retrieve the password protected data. The program also supports plug & play and asks for a password immediately when the drive is plugged in. Password protect USB drive and other portable media with USB Secure.

RUN PROGRAMS ISOLATEDLY-SANDBOXIE

Sandboxie is a proprietary sandbox-based isolation program developed by Ronen Tzur, for 32-bit Windows NT-based operating systems. It creates a sandbox-like isolated operating environment in which applications can be run or installed without permanently modifying the local or mapped drive. An isolated virtual environment allows controlled testing of untrusted programs and web surfing.
 
Sandboxie runs your programs in an isolated space which prevents them from making permanent changes to other programs and data in your computer. When you run a program on your computer, data flows from the hard disk to the program via read operations. The data is then processed and displayed, and finally flows back from the progam to the hard disk via write operations. Sandboxie changes the rules such that write operations do not make it back to your hard disk.
 
Intercept changes to both your files and registry settings, making it virtually impossible for any software to reach outside the sandbox.
 
Traps cached browser items into the sandbox as a by-product of normal operation, so when you throw away the sandbox, all the history records and other side-effects of your browsing disappear as well.


Benefits of the Isolated Sandbox:
 
Secure Web Browsing: Running your Web browser under the protection of Sandboxie means that all malicious software downloaded by the browser is trapped in the sandbox and can be discarded trivially.
 
Enhanced Privacy: Browsing history, cookies, and cached temporary files collected while Web browsing stay in the sandbox and don't leak into Windows.
 
Secure E-mail: Viruses and other malicious software that might be hiding in your email can't break out of the sandbox and can't infect your real system.
Windows Stays Lean: Prevent wear-and-tear in Windows by installing software into an isolated sandbox.

AMD CATALYST DRIVERS{11.6b RC with mobility (8.862)}


Catalyst - a suite of proprietary drivers for video production AMD, offering a wide range of features and reliable health monitoring cards AMD Radeon. The package includes Display Driver, ATI Integrated Driver, Catalyst Control Center, Catalyst Control Center and other utilities.

Video:
ATI Radeon HD 6900, HD 6800, HD 6310, HD 6300M, HD 6250
ATI Radeon HD 5900, HD 5800, HD 5700, HD 5600, HD 5500, HD 5400.
ATI Radeon HD 4890, HD 4870 X2, HD 4850 X2, HD 4800, HD 4700, HD 4670, HD 4650, HD 4600, HD 4550, HD 4350.
ATI Radeon HD 3800, HD 3600, HD 3400.
ATI Radeon HD 2900, HD 2600, HD 2400.
ATI All-in-Wonder HD, ATI Theater HD 750, ATI Theater 650, ATI Theater 600.
ATI Radeon HD 4290, HD 4250, HD 4200, HD 3300, HD 3200, HD 3100, HD 3000.
AMD FireStream 9350, AMD FireStream 9270, AMD FireStream 9250, AMD FireStream 9170.
ATI Mobility Radeon HD 5800, HD 5700, HD 5600, HD 5400, HD 5100, HD 4800, HD 4600, HD 4500, HD 4200, HD 4100, HD 3800, HD 3600, HD 3400, HD 3200, 3100, HD 2700, HD 2600, HD 2400, ATI PowerXpress.
 
Note:
The final version of the assembly room was 11.6 8,861
This assembly is beta.RC 8.862
About the program:
Released: 2011
OS: Windows Vista / 7

GROW A FISH IN YOUR PC-JEFFS FISH


YOU CAN GROW A FISH IN YOUR PC.IT WILL SWIM ACROSS YOUR DESKTOP AND ADDS SOME BEAUTY TO YOUR DESKTOP
 
This program was made with Multimedia Fusion, from Clickteam allows you to left-click and bring up an option menu, while a right-click scares the fish and makes him run away.


04 November 2011

WINDOWS 8 NEW TIPS


Have a look at some of the best Windows 8 Tips and tricks:

Launch another application/Search box pop-up

In order to launch another application, simply hit the “Windows key” and begin typing the name of the app you want to launch. The same search window can be viewed by pressing Win+F with any presses, and taps on any one of them to run it.
Otherwise, continue to press the “Windows key” and at the same time hit R to launch the old Run box, and enter anything you want and open it easily!

Shutdown metro apps

Metro applications don’t boast a “Close” key, and this is premeditated: applications are eliminated when you toggle to something else, and are involuntarily eliminated nevertheless if you want the resources.
To keep your system fresh however, you can always shut them yourself. Push down “Ctrl+Alt+Esc” to open the Task Manager, right-click the extra application and choose “End Task”.

Toggling of tasks

The Metro screen of Windows 8 doesn’t include a taskbar; hence you’ll soon be unable to follow the process and the applications you’ve been running. So as to keep a track of things simply press “Alt+Tab”. Hitting “Win+Tab” will toggle from one existing application to the next, and on a touch-screen, swiping constantly from the left also rounds through running applications.

Shutdown your system

In order to shut down your system from Metro, retrieve the Settings dialog (navigate the mouse cursor to the bottom-left spot of the screen and tap on Settings, or simply hold down the Windows key and hit I), hit the Power icon, then Shut Down.
The other way around, in the desktop, press Alt+F4, and select the Shut Down, Restart, Switch User or Log Off option (as required)

Traditional Internet explorer

If you hit the Internet Explorer Metro pane, it will appear in a full-screen version. Some might prefer this but if you wish to have the same old traditional IE interface, then launch the desktop and run it, otherwise simply hold down the Windows key and press 1.

Run as Administrator

A number of programs require you to run them with Administrator privileges in order to function well. Right-click one of your pinned applications, tap on Advanced, and if it’s correct for this application, “Run as Administrator” option will appear.

Restore Hibernate/Sleep options

Options for Hibernate/Sleep won’t show in the Windows 8 shutdown dialogs by default, still you can restore them.
In order to do so, launch the Power Options applet (powercfg.cpl) and tap on “Choose what the power buttons do” in the left-hand board.
If you a “Change settings that are current unavailable” link appears, tap on it, tick mark the Sleep and Hibernate options, then hit Save Changes, and the new options should now display in your shutdown dialogs.

Key shortcuts in Windows 8

The Metro interface in Windows 8 is mainly intended for touch-screens, but it does also support majority of the previous Windows key shortcuts, many of which are at this instant more handy than ever.
Keyboard combination: Function
  • Win + C: shows the “Charms”: the Settings, Devices, Share and Search options
  • Win + D: open the desktop
  • Win + E: opens Explorer
  • Win + F: opens Search
  • Win + I: opens Settings
  • Win + L: locks your system
  • Win + P: toggle your display to a second display or projector
  • Win + R: opens the Run box
  • Win + U: launches the Ease of Access Centre
  • Win + W: hunts your system settings (for e.g. type POWER for links to all power-allied options)
  • Win + Z: shows the right-click context menu when in a full-screen Metro application
  • Win + +: zooms in
  • Win + –: zooms out
  • Win + Tab: toggle between running apps

Log-in automatically

Simply continue to press the Windows key, hit R, type netplwiz and hit Enter to open the User Accounts dialog. Then un-check the “Users must enter a user name and password to use this computer” box and hit OK.
Now insert the user name and password of the account that you’d prefer to be logged in involuntarily, then tap on OK, reboot your system for changes to take effect, and you won’t be asked for your login particulars again!

Shutdown shortcuts in Windows 8

Open the desktop application, right-click on a blank space of the desktop and tap on New > Shortcut.
  • Command: Function
  • shutdown.exe -s -t 00: shuts down your system
  • shutdown.exe -h -t 00: puts into hibernate mode, and click Next.
Next type in a shortcut name for e.g. Hibernate, and hit Finish.
Now right-click the shortcut and choose Pin to Taskbar, or copy the shortcut to the C:\Users\\AppData\Roaming\Microsoft\Windows\Start Menu\Programs folder.
Now continue to press the Windows key and push F to open Search. Next type the name of the shortcut, tap on Applications under the search box, and it must show on the left side.
Lastly, right-click the application, choose Pin and it must show on the far right of the Metro screen, simply pull it wherever you want!

Bring back the traditional Start menu

Open REGEDIT and browse to HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer.
Double-click RPEnabled, and modify it from 1 to 0 to confiscate Metro, the new Task Manager, Start menu and other.
On the other hand, set RPEnabled to 2 so as to eliminate Metro, bring back the Start menu.

Install Windows 8 using a USB flash drive

If you want to install Windows 8 from a USB flash drive, more willingly than a DVD drive, then the Windows 7 USB/DVD Download Tool comes handy and functions properly, as reported. Simply direct the program at your Windows 8 ISO file and it’ll generate a bootable Windows 8 installer on the USB drive. Viola!

64-bit IE for 64-bit Windows 8

Tap on Tools > Internet Options > Security, select the security zone you’d like to modify, and tick mark Enable 64-bit Mode. Hit OK, restart and you’re done!

Windows 8 SmartScreen

Continue to press the Windows key, and R, type “control.exe” and hit Enter to open the traditional Control Panel.
Launch the Action Centre applet, and tap on “Change SmartScreen” Settings. Modify it according to your needs or just toggle SmartScreen off in general and tap on OK to complete.

Use USB drives to backup

Attach your USB to your Windows 8 PC, select “Configure this drive for backup using File History” from the options, and your documents, contacts, favorites and desktop stuff will instantly be backed up, by default!

Touch Keyboard customization in Windows 8

The integrated Touch keyboard in Windows 8 will assist you and often comes handy in various situations but if such things oppose your way then you can toggle the relevant attribute off by just heading over to the Control Panel > General and modify the keyboard according to your needs.

Simplify the Search in Windows 8

If you want to simplify the search results in Windows 8 then head over to the Control Panel on the Metro screen, choose Search, select which applications you don’t want to incorporate.

Set an image password

Windows 8 lets you create an image password, where you can pick a picture, then sketch on it in a blend of taps, lines and circles, and the person who would be able to replicate this same pattern will be able to log on. Head over to Control Panel > Users > Create a Picture Password and set your own picture password!

Sync selectively in Windows 8

If the synchronizing feature in Windows 8 isn’t suitable for you then customize it from the Metro Control Panel by just tapping on Sync PC Settings and choose your ideal options.

Ultimate control panel

If you need the complete/ultimate Control Panel then tap on “More Settings” to see all the previous applets.
The other way around, simply continue to press the Windows key, push R, type Control.exe and hit Enter to open the complete Control Panel directly.

Hide the Ribbon in Windows 8

If you want to hide the ribbon in Windows 8, continue to press the Windows key, push R, type gpedit.msc and hit Enter.
Enlarge the Computer Configuration > Administrative Templates > Windows Components > Windows Explorer section of the hierarchy.
Double-click “Start Windows Explorer with the Ribbon minimized”, arrange the value to Enabled and tap on OK.
From now on the ribbon won’t be displayed by default. If you want to see it again, then tap on the Down arrow to the left of the Help icon, and it will appear!

Display the Folder Options in Windows 8

The Folder Options has moved once more, therefore the Tools menu won’t appear any longer, but if you tap File > Change Folder and Search Options then the traditional dialog will show.
Otherwise, you can still open it from the traditional Control Panel. Just continue to press the Windows key, press R, type Control.exe and hit Enter to open the Control Panel, select “Large icons” in the View By list, and tap on “Folder Options” to open the dialog.

Mount ISO files in Windows 8

Right-click an ISO file in Explorer, tap on Mount and you can view it as an implicit drive, open the files it encloses, or insert more if you wish to.

Run 16-bit applications in Windows 8

If you want to run a 16-bit application in Windows 8 then open the standard desktop Control Panel, launch the 16-bit Application Support applet and tap on Enable.

Bring back the traditional Task Manager

If you want to restore the old-style task manager then, just continue to press the Windows key, push R, type “TaskMGR” and hit Enter to open it. (Typing TM will open the new edition of the Task manager!)

Restart Explorer in Windows 8

If Explorer malfunctions/hangs at some point, then just press Ctrl+Alt+Esc simultaneously, and choose Explorer in the directory and tap on Restart.

Virtual installation issues

Use the newest edition of VirtualBox, and the issues should be fixed!

Troubleshoot performance problems in Windows 8

If your Windows 8 system works slowly, then the new Task Manager could be your best friend to solve the problem.
Press Ctrl+Shift+Esc simultaneously to open it or right-click the taskbar and choose Start Task Manager.
Head over to the Processes tab and kill those processes which you don’t require, while the App History dialog displays which application is the most energy-drainer of all. Eliminate them according to your need!

LIST OF WINDOWS 8 NEW FEATURES


HERE IS A LIST OF NEW FEATURES AVAILABLE IN WINDOWS 8.AS PER THE ANTICIPATION WINDOWS 8 IS CRAFTED MAGNIFICENTLY WITH PERFECTION WHICH LEAD COMPUTING TO NEXT LEVEL.

App Bar. A toolbar user interface element in tailored "Metro-style" applications that is typically hidden until needed and houses commands, which are generally user interface elements like buttons and other graphical controls. 

Charms. A set of five icons, available from the so-called Edge UI, which appears when you swipe into the interior of the screen from the right side of the screen. These icons include Search, Share, Start, Devices, and Settings.

Client Hyper-V. A hypervisor-based virtualization platform used to run entire OSes (and associated applications) in a guest environment under the Windows host. Hyper-V was previously available only in Windows Server and replaces Windows Virtual PC.

Connected Standby. A new power management mode for ARM-based versions of Windows 8 that allow the PC to operate in a very low power mode for very long periods of non-use.

Contracts. A new aspect of the WinRT (Windows Run Time) development model that provides communications capabilities between separately and independently developed (Metro-style) apps. Similar but more powerful to the Windows clipboard from two decades ago, Contracts provide a number of useful services including Search and Share. 

Early Load Anti-Malware. A new security feature in Windows 8 that loads the OS's integrated anti-malware functionality into the boot process in order to prevent any malware to be injected into the OS during the boot process. This happens after secured boot.

Flip. The process by which you visually flip through the available running Metro-style apps and Windows desktop by flicking right from the leftmost edge of the screen. Flicking and holding will result in a Snap, and the division of the screen into two zones, Snap View and Fill View. (See Snap.)

Glyphs. The icons that appear on the new Windows 8 lock screen, including network, power, and so on.
Groups. Sections of tiles on the Start screen that are visually grouped and can optionally be named. You can move entire groups of tiles around the Start screen as needed.

Internet Explorer 10. The new version of Microsoft's web browser, which will be available in a tailored version (or Metro-style app), and in a traditional desktop version.

Lock screen. The Windows 8 welcome screen, which appears when the computer first boots. It features the time, date, and a series of notification glyphs.

Multi-monitor. Windows 8 provides new multi-monitor capabilities for both the Start screen and the classic Windows desktop.

Picker. A tailored app user interface that provides the capabilities of a File Open dialog in classic Windows. It incorporates a basket for holding multiple items, which can be derived from any number of sources, including the local file system and various online services.

Picture password. A new method of logging in to Windows that involves a photo and a series of touch gestures and swipes.

PIN password. A new method of logging in to Windows that involves a four digit numeric password, as per a Windows Phone handset.

Progress ring. The new Windows 8 progress indicator.

Refresh Your PC. A new service in Windows 8 that automatically backs up all of your photos, music, videos, and other personal files, your customizations, and your tailored ("Metro-style") apps, reinstall Windows from scratch, and then reapplies everything back to the system. This process only takes 4 to 5 minutes.

Reset Your PC. A new service in Windows 8 that returns your PC to its factory clean state by wiping it out and reinstalling Windows. This feature is also called Push Button Reset.

Search. A Windows 8 Contract that provides searching capabilities, be it for apps, settings, files, or whatever. Search is globally accessible from the Search charm in the edge UI on the right edge of the screen.

Secondary Tile. A special kind of Start screen tile that is created from within an app. For example, an address book app would have its own tile, but it could optionally provide you with the ability to create a secondary tile from any one of your contacts so that you could access that contact more easily and directly from the Start screen.

Secured boot. A new security feature of Windows 8 that requires a modern UEFI-style BIOS and checks the boot signatures of each hardware device before the PC will boot. If an unknown or compromised device is attached before boot time, the PC will not boot.

Semantic zoom. A process whereby the user employs two fingers on the screen of a Windows 8 PC to pinch onscreen elements (or "reverse pinch" them) to enable a secondary display. On the Windows 8 Start screen, you can use semantic zoom to view the entire (multiscreen) display on a single screen, and arrange and rename onscreen elements like groups.

Sensors. Windows 8 supports a wide range of device sensors, including accelerometer, inclinometer, gyrometer, compass, ambient-light, and orientation/simple orientation.

Share. A Windows 8 Contract that allows one app to share information with another. For example, a photo app might use Share to provide a way to share pictures online. Share is globally accessible from the Share charm in the edge UI on the right edge of the screen.

SmartScreen. A Windows 8 security technology that prevents malware from infecting your system using behavioral and manual, reputation-based methods. Microsoft previously provided this functionality in its IE browser, but is extending it to the Windows Explorer in Windows 8.

Snap. The process by which two apps can be displayed, or docked, side-by-side in Windows 8. These apps can consists of two Metro-style apps or one Metro style app and one legacy Windows app. When in this mode, the leftmost app, which is said to occupy the Snap View, takes up about 30 percent of the onscreen real estate, while the rightmost app, said to occupy the Fill View, takes up the rest. You can change the space each occupies by dragging on the dividing line between them and flip their positions, so that the Fill View is on the left and the Snap View is on the right.

Start screen. The new Windows 8 shell, or user experience, which involves an immersive, full-screen user interface, tailored full-screen apps, and a new runtime environment called Windows Run Time (WinRT).

Task Manager. An update to the application, processes, services, performance, networking, and user management tool from previous Windows versions that provides startup app management and other new features. 

Tiles. User interface elements found in the Windows 8 Start screen that replace icons and represents applications and other items. Windows 8 tiles can be small (square) or large (rectangular) and present "live" information to the user. They are thus sometimes called Live Tiles. Tiles are said to be "pinned" to the Start screen; when removed they are "unpinned." (This does not delete the application.)

Windows Defender. An upgraded version of the Defender tool that provides anti-virus functionality in addition to its previous anti-malware functionality. (Thus, this tool now effectively replaces Microsoft Security Essentials as well.)

Windows Run Time (WinRT). A new runtime environment for tailored ("Metro-style") apps that launch from the Windows 8 Start screen.

Windows Store. Microsoft's online store for Windows 8 applications, which will consist of both Metro-style apps and traditional applications. Users can install Metro-style apps on up to five Windows PCs. But for legacy applications, the Windows Store will not enforce a licensing model on app developers, and Microsoft will not demand a fee for each sold app. Trial versions of Metro-style apps will be available. 

Windows To Go. A new method of running Windows 8 from a USB key (or other external memory) rather than from a fixed hard drive. This allows for a portable version of Windows, and corporations can use this feature to create temporary Windows installs that return to a clean state when the user logs off.

Windows Update. Microsoft's software updating service is updated in Windows 8 to not interrupt users and try to avoid unnecessary reboots.

CHANGE BUILT-IN LIBRARY ICONS IN WINDOWS 8

 In Windows 8, finally, you can arbitrarily change the icon for custom libraries. Note, however, that this capability extends only to custom libraries, and not the built-in libraries (still Documents, Music, Pictures, and Videos). And while that’s a shame, power users will still appreciate being able to customize their custom libraries with a new icon.

Simply click Start –> Run (or WinKey + R), type explorer %AppData%\Microsoft\Windows\Libraries and click the OK button. This will open a new Explorer window showing us the raw Library metadata files (.library-ms). Drag the library into your favorite text editor (or simply Notepad) and locate the XML element <iconReference>. Edit the value within to meet your needs, save, and restart Explorer. (You can safely terminate Explorer in Windows 8 by holding the CTRL and SHIFT keys while right-clicking the Taskbar.)->You’re done!

ADVANCED TASK MANAGER

Security Task Manager displays detailed information about all running processes (applications, DLLs, BHOs, and services). For each process, it improves on Windows Task Manager, providing a security risk rating, a process description, file path, CPU usage graph, start time, embedded hidden functions (for example keyboard monitoring, autostart entry, and browser supervision or manipulation), and process type, such as visible window, systray program, DLL, and IE plug-in.

The security risk rating indicates the likelihood of the process being potential spyware, malware, a Trojan, or keylogger. It also deletes traces of your Internet and computer activity, prevents keyboard input monitoring, and warns you when the registry is changed.

FREE DOWNLOAD ADVANCED UNINSTALLER


Advanced Uninstaller PRO is the ultimate uninstaller for Windows. You can uninstall programs quickly and completely using its simple and intuitive interface. The Installation Monitor included in the program can watch all the actions that a program performs on your computer while it installs. Advanced Uninstaller PRO remembers these changes so later you can completely uninstall that program, making sure nothing is left behind.
 
This tool can remove any program without a trace. Advanced Uninstaller PRO can also remove a lot of items that other uninstallers can't even touch. It can repair broken registry entries, clean non-functional Start Menu shortcuts, uninstall annoying browser toolbars, plugins and hijackers, remove fonts and get rid of startup programs that run in your system tray and slow down your computer.
Features:
 
  • Easily uninstall applications and programs. The program starts a lot faster than the Control Panel Add/Remove applet, and has a handy quick search function.
  • Uninstall, disable and enable Control Panel icons.
  • Disable or delete the programs that run at startup.
  • Remove items left behind in the Add/Remove section after program uninstall.
  • Manage the fonts installed on your computer.
  • Hide, show or sort your Start menu shortcuts. Automatically find and delete the non-working shortcuts on your desktop and Start menu.
  • Uninstall Internet Explorer toolbars, plug-ins and BHOs (Browser Helper Objects).
  • Find and delete garbage and temporary files.
  • Delete the recently open files list of programs such as Microsoft Office, Windows Media Player, ICQ, MSN, WinZip, RealPlayer, Kazaa, Morpheus, WinAmp, etc.
  • Delete the Internet history trail (information about the pages you visited, addresses you typed, cookies, etc).

LOCK ALL DOCUMENTS ON YOUR PC-DocLock



We all have files on our computer that contain sensitive and personal information, such as tax returns, financial documents, medical records, photos, videos or other items we simply don't want our children, roommate, work IT guy or others who may come into contact with our computer to see. How do you make certain these important files remain safe and secure?
 
docLock allows you to password protect any file or folder on your computer with ease. Need to take your secure file with you? docLock makes it simple to transport via disk or portable drive for use on any PC. Keep sensitive information completely secure from anyone who may access your computer and keep your personal information in your control at all times.
Features of docLock:
  
Securely Lock Files, Folders, Documents
docLock allows you to select the files, folders, documents, photos, videos, Zip files, PDFs and other files you wish to lock and password protect. Secure only the files you wish to keep safe.
 
Protect Against Lost or Stolen Personal Information
docLock allows you a simple way to password protect any personal or sensitive information. Protect yourself against identity theft, financial loss and privacy invasion.
 
Simple to Use
Install and run in minutes. Follow the Getting Started screen to lock your first file in a matter of seconds. No need to read help files, documentation, user manuals, or call the neighborhood computer guru to get started.
 
Drag and Drop Locking/Unlocking Technology
Lock/Unlock a document at lightning speed with 3 shortcut options; 1) drag and drop the file to docLock, 2) right click the file and choose to Lock/Unlock, or 3) browse to your desired file. So quick!
 
Compact File Size
docLock is 5 MB in file size, most security software is around 100MB, which means docLock saves the valuable computer resources you need to run programs or surf the web.
 
Share/Email Locked Files
docLock allows you to share any locked file via email, disk or portable drive with a friend as long as they have the password you created. Feel confident the recipient will be the only one able to access the file.
 
Portable Version
Take any locked file with you for use on ANY computer by creating a portable version with a simple click of your mouse. Save your files to memory sticks, USB drives, flash drives, external hard drives, or any other device you use to carry or store files.
 
Complements all Security Software
docLock works with all security and PDF software. Add an additional layer of protection to your Anti Virus, Anti Malware, Anti Spyware, Firewall and PDF Software by locking your files.
 
Password Generator
docLock makes creating a strong password for you a snap. It will automatically generate a password containing letters, upper and lower case, numbers, and symbols, ensuring the greatest password protection over any locked files. Ensure your passwords are impossible to crack.
 
Conceal Passwords in Photos
Sometimes passwords are hard to remember, remember a photo instead. To make your life easier, docLock can hide your password in any photo you choose (JPEG, Bitmap, or PNG file). Simply choose any password and then tell docLock to hide the password in the photo of your dog Sparky, when you are ready to unlock the file simply choose the picture of Sparky and your file will unlock.
 
Manage Passwords
Change a locked files password at any time. Just choose the file in which you want to make the password change and select a new password. Updating passwords is easy and helps to maintain ultimate security.
 
Secure Delete
Often times a deleted file will still be recoverable from your hard drive. docLock Secure Delete makes it easy to remove files so they will be completely unrecoverable.
 
Clean Free Space
docLock will clean all free space on your computer drives. This helps ensure deleted items remain unrecoverable and your computer continues to run smoothly by removing remnants of old files.
 
WiFi Document Security
Connect to any WiFi network whether at the local coffee shop, traveling through an airport or hotel, with complete piece of mind knowing that even snoops cannot view or read your locked files. Your information is always kept private and in your control when you are on the go.
 
Military Grade Security
Computer users of all levels can now use the same security technology military and government agencies use every day to secure their most secret files. You dont need to be a rocket scientist to use the same underlying technology the government uses.
 
Advanced Features
For those who want to really take it to the next level, choose from 8 different encryption algorithms, for complete and total control of all your locked files and folders. Included are; BlowFish, Cast 128, 3Des, Des, Gost, RC2, Rijnadael, and Twofish. Keep in mind it would take significantly longer than the age of the universe to crack a 128 bit key, which is already automatically set within docLock. This ensures your locked files remain completely secure.