When brb’s Uninstaller is started, its main window fills with installed applications.

Change View type
From the uninstaller toolbar you can change the way that the list of applications may be viewed. A fast and simple way to change that view is to click on the View button. Alternatively, you can use the drop-down button and click on the little arrow on its right side. This will show you the menu with all view options – Small Icon, Large Icon, List and Details. Click to enlarge

Uninstall application
To uninstall an application, simply select it from the list of installed applications and click on the “Uninstall” button in the uninstaller toolbar. Or, you can right-click on the selected item and then click the “Uninstall” command on the displayed menu.

The uninstall command will start the application’s own built-in uninstall module! brb’s Uninstaller is not directly involved in that part of the uninstall process. If errors occur during this initial uninstall process, contact the author or provider of the application!

brb’s Uninstaller augments the uninstallation process. It scans your hard disk before and after you uninstall an application. Therefore, you can remove additional unnecessary files, folders and registry keys that are usually left over, even if you had a broken installation. These unnecessary items will be highlighted by brb’s Uninstaller.

Remove Entry
To remove the name of an application from the list, simply select the name and click on the “Remove Entry” button of the uninstaller menu bar. Or, you can right-click on the selected item and then click the “Remove Entry” command on the displayed menu. This command will remove the entry from the uninstall section in the Registry. The next time you start the brb’s Uninstaller, this application will not appear in the list.

After an item is removed with “Remove Entry” command, a backup Registry file (*.reg) is made in the subdirectory – BackUps of your Revo uninstaller directory. The name of this backup file is the name of the deleted entry and a specified number. Double click on that file to recover deleted information in the Registry.

Some other commands are available if you right-click an application in the list of installed applications.

Download

[download id=”17″]

Explore More

How to prevent SQL Injection

SQL Injection: What It Is There was once a famous doctor that had it completely right: never trust your patients. Now this doctor may have only been a sitcom doctor

Password stealing using fake login page

It’s quite easy to construct a bogus login page and steal password. Let’s look at the methods used to construct a fake login screen and how hackers steal your password.

What is Buffer Overflows?

Buffer Overflows Buffer Overflows have been around since the very beginnings of the Von-Neuman architecture. They first gained widespread notoriety in 1988 with the Morris Internet worm. Unfortunately, the same