Name Link Description

Total Page:16

File Type:pdf, Size:1020Kb

Name Link Description Name Link Description Rufus https://rufus.akeo.ie/ Create bootable USB drives the easy way Super Micro http://www.supermicro.com/support/ This is your one-stop area for access to product-specific resources resources/ including BIOS, Drivers, Manuals and Memory Compatibility Lists. Please choose from the following options: CCleaner http://download.cnet.com/CCleaner/? CCleaner is a freeware system optimization, privacy and cleaning tool. It tag=main;dlStartKitList removes unused files from your system allowing Windows to run faster and freeing up valuable hard disk space. It also cleans traces of your online activities such as your Internet history. Additionally it contains a fully featured registry cleaner. Glary http://download.cnet.com/Glary- Glary Utilities is a comprehensive system cleaner and performance booster Utilities/3000-2094_4- for your PC that includes an excellent suite of tools. You can take 10508531.html?tag=main;dlStartKit advantage of 1-Click Maintenance, or pick and choose the operations you'd List like the app to perform, all through its streamlined and intuitive interface. Kaspersky http://download.cnet.com/Kaspersky- Kaspersky Virus Removal Tool automatically removes viruses, Trojans, Virus Virus-Removal-Tool-2015/3000- rootkits, adware, or spyware. Removal 2239_4-76079830.html?tag=main;lsr Tool 2015 Tweaking.co http://www.bleepingcomputer.com/d A free suite of administration tools and system monitors that allows a user m ownload/tweakingcom-technicians- to quickly perform diagnostics on a computer. These tools allows for Technicians toolbox/ quickly fixing common problems on a computer or diagnosing what could Toolbox be causing them. It should be noted that this free version is only available for non-commercial users. BlueScreen http://www.bleepingcomputer.com/d A useful, free, portable application that allows you to view minidump files View ownload/bluescreenview/ that are created when Windows stops and displays a "blue screen of death". The program will show each minidump individually, with information such as the minidump's filename, the date/time of that crash and the minidump's creation. It will also show the basic crash information such as a Bug Check Code and 4 parameters. The details of the driver or module that possibly caused the crash is reported; this includes the filename, product name, file description, and file version of the driver/module. The program is portable, which means it does not need to be installed on the system before it can be used and that there are no keys added to the registry. When downloaded, all the user has to do is unzip the program files, then run the executable file. Since it is portable, the program can be used from a USB key. The program can also output the minidump information to a text file, which can be used in the forums to help diagnose blue screens. Hardware http://www.bleepingcomputer.com/d A program that lists all installed hardware devices on your computer and Identify ownload/hardware-identify/ displays information about each device. Using this information you can quickly determine if your driver is old and needs to be updated. This program is also useful when you are upgrading various components and are not sure what devices are installed in your system. Using Hardware Identify you can quickly see all components installed in your computer. Recuva http://www.bleepingcomputer.com/d A file recovery program that can search a hard drive or a particular folder ownload/recuva/ for deleted files and attempt to restore them. When using Recuva you can specify the types of files that you wish to recover and either scan a particular hard drive or a particular folder. If a file is able to be restored, Recuva will list them and allow you to restore them. Speccy http://www.bleepingcomputer.com/d A tool that provides detailed information about the hardware components ownload/speccy/ and operating system of the computer it is run on. This information is extremely valuable when you want to upgrade existing hardware, find out what specific hardware is installed on your computer, and whether or not the current hardware matches the system requirements for a software you are installing. Autoruns http://www.bleepingcomputer.com/d A free Sysinternals tool from Microsoft that enumerates all the programs ownload/autoruns/ that automatically start on a Windows machine. You can then examine this list of programs to see if they should be running or should be disabled. Disabling unnecessary startups allows your computer to run more efficiently by reducing CPU usage and memory consumption. Malwarebyt http://www.bleepingcomputer.com/d A backup service that not only creates a backup of your data in the cloud, es Secure ownload/malwarebytes-secure- but also scans your computer files for malware before they are backed up. Backup backup/ With most backup services, the backup software uploads your files and data without first checking them for infections. If in the future you download these files to a new computer and use them you run the risk of being infected. By using Malwarebytes Secure Backup you are assured that the files you upload to the backup server will be clean and infection free. This allows you to recover them as needed or share them with family or friends without the risk of becoming infected. Show http://www.bleepingcomputer.com/d A small utility that will display all hidden folders, and files if you wish, on Hidden ownload/show-hidden/ your computer. This program will scan all of your fixed and removable drives for folders and files that have the Hidden attribute. When Show Hidden is finished it will create a log that contains a list of all the hidden files and folders that were found. Show Hidden is useful if you are concerned that your computer was accessed without your permission or knowledge. Using this tool you can quickly scan your computer for hidden files and folders that an unauthorized users or hacker created to store their tools or other files. Using the generated log file, you can quickly determine if any of the folders look suspicious or out of place and then investigate further. Process http://www.bleepingcomputer.com/d A system resources monitoring tool for Windows operating systems. It Explorer ownload/process-explorer/ follows the general lead of the built-in Windows Task Manager tool, but extends the feature set greatly. These expanded features allow profiling and modification of the real-time state of the system and grants access to otherwise inaccessible or hard to come by information such as showing which thread within a process is running, global searches for file and other open handles, parent-child relationships among processes, and other process-level minutia. Wireshark https://www.wireshark.org/download A network monitoring tool. 1.2.6 .html Spybot http://www.safer- Spyware detection and removal Search & networking.org/private/ Destroy ProduKey http://www.nirsoft.net/utils/product_ A small utility that displays the ProductID and the CD-Key of Microsoft cd_key_viewer.html Office (Microsoft Office 2003, Microsoft Office 2007), Windows (Including Windows 7 and Windows Vista), Exchange Server, and SQL Server installed on your computer. You can view this information for your current running operating system, or for another operating system/computer - by using command-line options. This utility can be useful if you lost the product key of your Windows/Office, and you want to reinstall it on your computer. AdwCleaner https://toolslib.net/downloads/viewdo A free removal tool for: Adware, PUP/LPI, Toolbars, & Hijackers. It works wnload/1-adwcleaner/ with a Search and Delete mode. It can be easily uninstalled using the mode "Uninstall". It's compatible with Windows XP, Vista, 7, 8, 8.1 in 32 & 64 bits. YDSSKiller http://usa.kaspersky.com/downloads/ Developed by Kaspersky Lab, TDSSKiller is a FREE handy tool that can TDSSKiller quickly detect and remove both known and unknown rootkits, which are programs that can hide the presence of malware in your system. JRT http://www.bleepingcomputer.com/d Junkware Removal Tool is a security utility that searches for and removes ownload/junkware-removal-tool/ common adware, toolbars, and potentially unwanted programs (PUPs) from your computer. A common tactics among freeware publishers is to offer their products for free, but bundle them with PUPs in order to earn revenue. This tool will help you remove these types of programs. Combo Fix http://www.bleepingcomputer.com/d ComboFix is a program, created by sUBs, that scans your computer for ownload/combofix/ known malware, and when found, attempts to clean these infections automatically. In addition to being able to remove a large amount of the most common and current malware, ComboFix also displays a report that can be used by trained helpers to remove malware that is not automatically removed by the program. MBAR https://www.malwarebytes.org/antiro Malwarebytes Anti-Rootkit BETA is cutting edge technology for detecting otkit/ and removing the nastiest malicious rootkits Hirens Boot http://www.hirensbootcd.org/downlo A bootable software CD containing a number of diagnostic programs such CD ad/ as partitioning agents, system performance benchmarks, disk cloning and imaging tools, data recovery tools, MBR tools, BIOS tools, and many others for fixing various computer problems. JDisk http://www.jgoodies.com/%20freewa JDisk Report shows Storage usage (JDiskReport requires Java 6 or later, Report re/jdiskreport/ Java 7 is recommended. Make sure Java is installed, before you install JDiskReport. The tool has been tested on Windows, Mac, and Linux; it runs also on Solaris and other Java enabled operating systems.) .
Recommended publications
  • A New Generation of Hard Disk Recovery Software
    EASEUS Data Recovery Wizard Free Edition – A New Generation of Hard Disk Recovery Software NEW YORK CITY, N.Y., June 29 (SEND2PRESS NEWSWIRE) — EASEUS Data Recovery Wizard Free Edition, the innovative and leading data recovery software, has proven itself to be the first world-wide free hard disk recovery software and a new generation in its category since its release. Totally free and providing powerful features that no other free data recovery software like Recuva™ and Pandora™ have, even some commercial ones, it is the most popular and feature-rich hard disk recovery freeware for Windows today. With the use of computers continuing to increase, hard disk recovery is not a welcome task, but something that is very important for our business and daily life. Those who have computers know data loss is a common possibility because of accidental deletion, format, partition damage or loss, software crash, computer virus infection, power failure, etc. Whatever the cause, quality free hard disk recovery software is a preferable remedy to data loss and to get those lost files back quickly and easily. EASEUS Data Recovery Wizard Free Edition, the professional and comprehensive Windows disk recovery software, helps recover deleted or lost files easily from hard drive disks or other storage media whenever needed, and is tops in other areas due to: * Totally free and with powerful features of commercial ones; * Unformat files with original file name and storage paths; * FAT/NTFS Partition recovery when partitions are deleted or damaged; * Recover files from dynamic disk and RAID; * Recover lost files from Linux (EXT2/EXT3) files system under Windows; * Recover files from all kinds of storage media like external hard drive, USB disk, SD card, memory card; * Continue data recovery process at any time you want.
    [Show full text]
  • Symantec Report on Rogue Security Software July 08 – June 09
    REPORT: SYMANTEC ENTERPRISE SECURITY SYMANTEC REPORT: Symantec Report on Rogue Security Software July 08 – June 09 Published October 2009 Confidence in a connected world. White Paper: Symantec Enterprise Security Symantec Report on Rogue Security Software July 08 – June 09 Contents Introduction . 1 Overview of Rogue Security Software. 2 Risks . 4 Advertising methods . 7 Installation techniques . 9 Legal actions and noteworthy scam convictions . 14 Prevalence of Rogue Security Software . 17 Top reported rogue security software. 17 Additional noteworthy rogue security software samples . 25 Top rogue security software by region . 28 Top rogue security software installation methods . 29 Top rogue security software advertising methods . 30 Analysis of Rogue Security Software Distribution . 32 Analysis of Rogue Security Software Servers . 36 Appendix A: Protection and Mitigation. 45 Appendix B: Methodologies. 48 Credits . 50 Symantec Report on Rogue Security Software July 08 – June 09 Introduction The Symantec Report on Rogue Security Software is an in-depth analysis of rogue security software programs. This includes an overview of how these programs work and how they affect users, including their risk implications, various distribution methods, and innovative attack vectors. It includes a brief discussion of some of the more noteworthy scams, as well as an analysis of the prevalence of rogue security software globally. It also includes a discussion on a number of servers that Symantec observed hosting these misleading applications. Except where otherwise noted, the period of observation for this report was from July 1, 2008, to June 30, 2009. Symantec has established some of the most comprehensive sources of Internet threat data in the world through the Symantec™ Global Intelligence Network.
    [Show full text]
  • Gedownloade Software
    KIJK SOMS UIT MET UPDATEN !!! 2 e CD zie onderaan! GEDOWNLOADE SOFTWARE Ace Utilities 5 TROJAN!!!!!!!! Advanced System Care Pro 3.4.0 Advanced System Optimizer 3.0.6 Any Video Converter 2.7.7 Pro Ashampoo Internet Accelerator 3 Ashampoo Winoptimizer 6.24 Auslogics Boost Speed 4.5.1.4 Clean My PC 4.2.3 Error Repair Pro 4.0.5 Glary Soft Utilities Pro 2.17 Lavasoft Ad-Aware 2009 Pro Limewire Pro 5.1.4 Final Microsoft Windows XP Pro with SP 3 MS Office 2007 PC Washer 2.2.1 Power Video Converter 2.2.15 Ramsaver Raxco Perfect Disk 10 Raxco Perfect Speed PC Optimizer 2.0.0.104 Registry Booster 2010 Registry First Aid Platinum 7.1.1.1 Registry Winner 5.5.9.4 Speedconnect 7.5 Tune-Up 2010 Winzip Pro Final CD 3 PC Optimizer Pro 4.5.44 PC Tools Registry Mechanic 9.0 RamSaver Pro Registry Ace 1.0 Probleem met Patch Registry Clean Expert 4.7.6 Registry Easy 4.6 GOED PROGRAMMA! RegistryFix 7.1 Registry Tidy 2009 Registry Vac 5.0.1.26 UITSTEKEND !!! Serials Grabber 1.1 Softflyers Speed Video Converter Trojan Remover 30 dagen geldig wel update mogelijk! (SCANT ELKE DAG) Ultra Optimizer 2.0.0 UITSTEKEND!!! Ultra Video Converter 44.0827 Uniblue Driver Scanner 2009 (hoort bij Powersuite) Uniblue Registry Booster 2010 versie 4.5.0.17 Uniblue Speed Up My PC! Versie 3.5 Very PDF to Word Converter versie 3jkkkjk Webroot Windows Washer 6.5.5.155 RETAILVERSION!!! Wintools Pro 10.0.1 Winutilities 9.1 YL Computing Winutilities Wise Registry Cleaner Pro 4.83 YL Computing Winutilities 9.1 XP Antispy CD 4 1 Million Serial Keys Advanced System Care Pro 3.2.0 Any Video
    [Show full text]
  • Comodo Cloud Scanner User Guide
    Comodo Cloud Scanner Software Version 2.0 User Guide Guide Version 2.0.092611 Comodo Security Solutions 525 Washington Blvd. Jersey City, NJ 07310 Comodo Cloud Scanner - User Guide Table of Contents 1.Comodo Cloud Scanner - Introduction.................................................................................................................................... 3 1.1.System Requirements ........................................................................................................................................................ 4 1.2.Installing Comodo Cloud Scanner....................................................................................................................................... 5 1.3.Starting Comodo Cloud Scanner......................................................................................................................................... 9 1.4.The Main Interface.............................................................................................................................................................. 9 2.Scanning Your System............................................................................................................................................................ 11 2.1.Summary of the Scanning Process................................................................................................................................... 11 2.2.Scanning Full System.......................................................................................................................................................
    [Show full text]
  • December 8.2006 Ari Schwartz Alissa Cooper Center for Democracy
    CORR CRONIN MICHELSON BAUMGARDNER & PREECE LLP PAUL R. RASKIN Attorney at Law December 8.2006 Via Facsimile to (202) 637-0968 and First Class Mail Ari Schwartz Alissa Cooper Center For Democracy & Technology 634 Eve Street N W # 1 100 Washington DC, 20006 Re: Sol'twireOnli~ie.coni Dear Mr. Scliwariz and Ms. Cooper We represent SoftwareOt~liiie.com.We write to bring to your attention misleading characterizations of certain litigation published on the Center For Democracy & Technology's website. The litigation is State of Washington v. Software0nline.com. It is discussed on the "Spyware Enforcement - State" portion of your website under the "Consumer Privacy" Section (located at: http://~v~vw.cdt.or.~privacy/sp~are/20060626spvware-e1iSorcciiici~t-state.pl~p).Your website's niiscategorization of this matter as a "spyware case" and "spyware enforcement" creates the potential for serious damage to SoftwareOnli~ie.coi~i'sbrand, goodwill. and business prospects. SoftwarcOnl~nevoluntarily settled Consumer Protection Act claims brought by the Washington Attorney General's Office on April 1 1, 2006 The complaint filed by the State of Washington against Sott\\areO~iIinecon1 and the judgment voluntarily entered by S~ft~~~~~reOiiIiiiecoiii clo not co11ta111 cla~nisunder anti-spyware statiites or laws If yoii go to the Washington Stale Attorney General's website (located at ww w.atr.wa.yov) and type the word 'spyware" in the sciirchbox, you will not find any references to Sof'twarcOnlinc corn Further. if you search through press releases on the WSAG website, you will see that the Attorney General reports the Secure Computer action filed on January 25, 2006 as the "first lawsuit under the btate-s new conipiitcr sppvarc act" (m hup ww 'ity \\ '1 ~ov/ielcases/2006!rcl Spyware Lawsuit 0 12506 html) and the Movie Land Art Schwart7 Al issa Cooper December 8.
    [Show full text]
  • How to Know What Drivers to Download
    how to know what drivers to download How do I find the hard drive type and specifications? If you'd like to view detailed information about your hard disk drives, solid-state drives, or external storage devices attached to your computer, we recommend the methods below. System Information in Windows 10. In Windows 10, you can view information about your hardware (including disks) using the System Information utility . To open the System Information utility in Windows 10: Press the Windows key, type System Information , and press Enter . Or, you can use the Run box to open the System Information utility. Press the Windows key + R keyboard shortcut. In the Run box, type msinfo32 . Press Enter or click OK . In the System Information window that opens, in the left window pane, you'll see a list of hardware categories. Expand Components , then Storage . Then, choose Drives , Disks , or any category you'd like to view. Earlier versions of Microsoft Windows. In earlier versions of Microsoft Windows, you can open the System Information utility by following the steps below. Click Start and then click the Programs folder. Click Accessories and then the System Information or System Tools folder. Open the System Information file. In the System Information window, click the + symbol next to Components . Click the + next to Storage and click Drives . In the right-side of the window, you see information about the hard drive including its capacity and serial number. IBM-compatible users. IBM-compatible users can usually enter the computer's BIOS setup to view additional information about their hard drive.
    [Show full text]
  • This Month ————— the Library Online-What You Never New Was
    The New Orleans Personal Computer Club Newsletter MotherBoard Volume 28, Issue 4 April 7, 2010 This Month Things, Thinglets & Thingassoes ————— By Jack Lewtschuk, Columnist, Monterey Bay Users Group, PC (MBUG-PC), Califor- The nia mbug-pc newsletter, January 2010 http://www.mbug.org/ Library Blacklion (at) royal.net Online: What You Never The Bad Guys are after Your Money New was There! Well, that’s nothing new. Speaker Just as knowing the “computer language” is good to assist communica- tion when seeking help or offering help to others, so is knowing the Ricardo G. Mesa definition of words to describe cybercrime. Just to better understand the nomenclature of cyber assaults, one has to be able to understand the lingo. I researched the Internet (some (Continued on page 2) Inside this issue: This Month at the NOPCC Things, Thinglets & The Library Online-What You Never Thingassoes 1 New was There! This month at NOPCc 1 5 Advertisements Ricardo G. Mesa, IT Network Administrator for the Jef- ferson Parish Library, will discuss internet resources Calendar of Events 6 available to library card holders, including Library NOPCC Directory Technology, Library Services, Google Scholar, Library Databases, Ancestry, Learning Express, EBSCO, Gale Group and Home Help (Brainfuse) PAGE 2 MOTHERBOARD Volume 28, Issue 4 (Continued from page 1) very helpful “e-letters”) and came up with this handy list: “Adware” A piece of software that displays advertisements on a computer after the software is installed. Adware can be benign, as in the case of a free program that displays ads in a manner that is This column left blank.
    [Show full text]
  • Download Date 24/09/2021 14:31:55
    To Upgrade or Not To Upgrade Application Item Type Thesis Authors Francisco, Neil Download date 24/09/2021 14:31:55 Link to Item http://hdl.handle.net/20.500.12648/1799 To Upgrade or Not To Upgrade Application __________________________ A Master's Thesis Project Presented to the Department of Communication and Information Design __________________________ In Partial Fulfillment of the Requirements for the Master of Science Degree State University of New York Polytechnic Institute By Neil Francisco May 2021 TO UPGRADE OR NOT TO UPGRADE SUNY POLYTECHNIC INSTITUTE DEPARTMENT OF INFORMATION DESIGN AND TECHNOLOGY CERTIFICATE OF APPROVAL Approved and recommended for acceptance as a thesis in partial fulfillment of the requirements for the degree of Master of Science in Information Design and Technology. ____________________June 11, 2021 DATE ________________________________ Dr. Kathryn Stam Thesis Advisor ____________________ DATE ________________________________ Dr. Ryan Lizardi Second Reader 2 TO UPGRADE OR NOT TO UPGRADE ABSTRACT New Technology consists of new hardware devices, computational workflows, digital advances, and information systems. As technology continues to evolve over the years, this never-ending cycle of new devices and experiences will always be present amongst consumers. Traditionally, new hardware devices are intriguing because they are designed to improve our access to information, media, and a connection to the digital world, but does this mean our previous-gen devices are no longer valuable? This project involves creating a prototype application designed for both computer and mobile interfaces to help improve the accessibility to information and the overall user experience with an older device. The “To Upgrade or Not To Upgrade” app will inform end-users of their older technological device specifications and suggest hardware/software methods to unlock their full potential.
    [Show full text]
  • Datasheets Datasheet
    PROFESSIONAL DATASHEETSDATASHEET Get that fresh ‘new PC’ feeling back with CCleaner Professional If your PC is slow, crashing or running out of hard drive space, CCleaner Professional is the solution. Its patented cleaner clears the clutter from your hard drive, removes junk from the Windows Registry, and protects your privacy by removing tracking cookies and browser history. All without touching your documents, music, videos and other files. If you have more than one person using your PC, CCleaner Professional can clean multiple user profiles. With system monitoring it keeps an eye on your system in the background and cleans when needed. It updates itself automatically, so you’ve always got the latest version. And if you have any questions, our priority technical support team has answers. Regain your PC’s speed, stability and privacy with CCleaner Professional. CCLEANER PROFESSIONAL HIGHLIGHTS 1. CCleaner Professional analyzes PCs to see what can be cleaned. You decide when and what to clean. 2. The patented Registry cleaner locates and fixes problems in the Windows Registry so that Windows remains stable on your PC. 3. CCleaner Professional removes tracking cookies, while keeping the cookies you need to access web-based applications like Gmail and Facebook. MADE BY For more information contact [email protected] www.piriform.com PROFESSIONAL DATASHEET CCLEANER PROFESSIONAL: A FASTER, MORE RELIABLE PC – INSTANTLY Make your PC last longer CCleaner Professional speeds up your PC and recovers hard drive space. It’s like getting a brand-new PC for a fraction of the cost. Easy to use If you can use email, you can use CCleaner Professional.
    [Show full text]
  • How to Clean My Pc Completely Free
    How to clean my pc completely free click here to download Sadly, it's become increasingly common to advertise that a registry or other PC cleaner program is free to "download" even though the all important "cleaning" part will cost you. Fortunately, among the hundreds you'll find in a search, there are several very good, completely free PC cleaner tools available. The other tools in Free Windows Cleanup Tool let you clean up computer usage traces in popular programs, remove temporary files, empty recent document lists (all of which will help you recover valuable disk space), and also check start-up programs and fix Registry errors – creating a full backup beforehand just in case. When I set my computer options for best performance it really did speed up. Amazing. Maybe it doesn't look. www.doorway.ru - How To Make Your Computer Run Faster For Free Sick of all those. Essential PC cleaning software. Keep your PC clean and running like new with CleanMyPC. It scans your whole computer to clean up junk files, speed up your PC, and boost its performance. CleanMyPC is more than a PC cleaner — it's an essential tool that cares for your computer. Free Download Buy Now. Auslogics Registry Cleaner is one of the best free computer registry cleaners available on the market. It will clean and Absolutely FREE. This program is totally free with no term limitations for home or commercial use. Free regular updates included. Is Registry Cleaner enough to get my computer performing at its best? 5 ways to spring clean your PC or laptop.
    [Show full text]
  • Using Speccy to Report on Your Computer Components
    Using Speccy to Report on Your Computer Components Ronald Ross [email protected] Today we’re going to have a look at what I consider to be a useful Windows reporting utility. I’ll be talking about Speccy, which is put out by Piriform. As is usual for many free software packages, you can also pay for personal and business support, but with Speccy there doesn’t seem to be much need for paid support. You can download both free and supported versions of Speccy at: http://www.piriform.com/speccy We won’t go through the download and install process, since it’s pretty self explanatory after clicking on the link above. Let’s just launch the tool and have a look at what it can show us. We will have a look at the outputs from both Windows XP and also Windows 7 in this document. In the screen shot above, we see summary information for a Windows XP, 32-bit machine. Each of the items listed in the left hand panel can be drilled down into for expanded information. Before we have a more detailed look at some of the components we see summarized, it might be useful to look at some of the general features of Speccy. Above we see that it is possible to take a full snapshot of a machine’s information. This snapshot can be reloaded later by Speccy for analysis, or comparison with some other snapshot. It’s also possible to publish the snapshot to a webpage with the Publish Snapshot… menu choice.
    [Show full text]
  • Defraggler Windows 10 Download Free - Reviews and Testimonials
    defraggler windows 10 download free - Reviews and Testimonials. It's great to hear that so many people have found Defraggler to be the best defrag tool available. Here's what people are saying in the media: "Defraggler is easy to understand and performs its job well. if you want to improve computer performance, this is a great place to start." Read the full review. LifeHacker. "Freeware file defragmentation utility Defraggler analyzes your hard drive for fragmented files and can selectively defrag the ones you choose. The graphical interface is darn sweet." Read the full review. PC World. "Defraggler will show you all your fragmented files. You can click one to see where on the disk its various pieces lie, or defragment just that one. This can be useful when dealing with very large, performance critical files such as databases. Piriform Defraggler is free, fast, marginally more interesting to watch than the default, and has useful additional features. What's not to like?" Read the full review. - Features. Most defrag tools only allow you to defrag an entire drive. Defraggler lets you specify one or more files, folders, or the whole drive to defragment. Safe and Secure. When Defraggler reads or writes a file, it uses the exact same techniques that Windows uses. Using Defraggler is just as safe for your files as using Windows. Compact and portable. Defraggler's tough on your files – and light on your system. Interactive drive map. At a glance, you can see how fragmented your hard drive is. Defraggler's drive map shows you blocks that are empty, not fragmented, or needing defragmentation.
    [Show full text]