When brb’s Uninstaller is started, its main window fills with installed applications.

Change View type
From the uninstaller toolbar you can change the way that the list of applications may be viewed. A fast and simple way to change that view is to click on the View button. Alternatively, you can use the drop-down button and click on the little arrow on its right side. This will show you the menu with all view options – Small Icon, Large Icon, List and Details. Click to enlarge

Uninstall application
To uninstall an application, simply select it from the list of installed applications and click on the “Uninstall” button in the uninstaller toolbar. Or, you can right-click on the selected item and then click the “Uninstall” command on the displayed menu.

The uninstall command will start the application’s own built-in uninstall module! brb’s Uninstaller is not directly involved in that part of the uninstall process. If errors occur during this initial uninstall process, contact the author or provider of the application!

brb’s Uninstaller augments the uninstallation process. It scans your hard disk before and after you uninstall an application. Therefore, you can remove additional unnecessary files, folders and registry keys that are usually left over, even if you had a broken installation. These unnecessary items will be highlighted by brb’s Uninstaller.

Remove Entry
To remove the name of an application from the list, simply select the name and click on the “Remove Entry” button of the uninstaller menu bar. Or, you can right-click on the selected item and then click the “Remove Entry” command on the displayed menu. This command will remove the entry from the uninstall section in the Registry. The next time you start the brb’s Uninstaller, this application will not appear in the list.

After an item is removed with “Remove Entry” command, a backup Registry file (*.reg) is made in the subdirectory – BackUps of your Revo uninstaller directory. The name of this backup file is the name of the deleted entry and a specified number. Double click on that file to recover deleted information in the Registry.

Some other commands are available if you right-click an application in the list of installed applications.

Download

[download id=”17″]

Explore More

Stealth, dangerous and still un-armed!

W.32Downadup.C, the third variant of the Conficker virus is more aggressive and trying to be stealth by disabling the security software installed on the machine. The new variant is focusing

Critical XSS Vulnerability in Thanyawzin – Myanmar Online Friends Community http://www.thanyawzin.com/

PlanetCreator has reported another Critical XSS Vulnerability in Thanyawzin – Myanmar Online Friends Community http://www.thanyawzin.com/ Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications

Tracking Down A BotNet

This will not be very long, nor will I go into excessive amounts of detail into the tools and steps required. The purpose of this paper is simply to help