When brb’s Uninstaller is started, its main window fills with installed applications.

Change View type
From the uninstaller toolbar you can change the way that the list of applications may be viewed. A fast and simple way to change that view is to click on the View button. Alternatively, you can use the drop-down button and click on the little arrow on its right side. This will show you the menu with all view options – Small Icon, Large Icon, List and Details. Click to enlarge

Uninstall application
To uninstall an application, simply select it from the list of installed applications and click on the “Uninstall” button in the uninstaller toolbar. Or, you can right-click on the selected item and then click the “Uninstall” command on the displayed menu.

The uninstall command will start the application’s own built-in uninstall module! brb’s Uninstaller is not directly involved in that part of the uninstall process. If errors occur during this initial uninstall process, contact the author or provider of the application!

brb’s Uninstaller augments the uninstallation process. It scans your hard disk before and after you uninstall an application. Therefore, you can remove additional unnecessary files, folders and registry keys that are usually left over, even if you had a broken installation. These unnecessary items will be highlighted by brb’s Uninstaller.

Remove Entry
To remove the name of an application from the list, simply select the name and click on the “Remove Entry” button of the uninstaller menu bar. Or, you can right-click on the selected item and then click the “Remove Entry” command on the displayed menu. This command will remove the entry from the uninstall section in the Registry. The next time you start the brb’s Uninstaller, this application will not appear in the list.

After an item is removed with “Remove Entry” command, a backup Registry file (*.reg) is made in the subdirectory – BackUps of your Revo uninstaller directory. The name of this backup file is the name of the deleted entry and a specified number. Double click on that file to recover deleted information in the Registry.

Some other commands are available if you right-click an application in the list of installed applications.

Download

[download id=”17″]

Explore More

What Damage Can Hackers Do?

Hackers like to subvert computer security without permission. They are cyber criminals. This can mean gaining access to a computer across the Internet for illicit purposes. They might engage in

You’ve Hired a Hacker (Section 5)

Section 5: What does that mean? 5.1: My hacker doesn’t speak English. At least, I don’t think so. Your hacker is a techie, and knows a number of powerful concepts

Open University Malaysia (OUM)’s Web Vulnerability

PlanetCreator had informed OUM’s XSS Vulnerability CODE http://www.planetcreator.net/2009/11/critical-xss-vulnerability-on-open-university-malaysia/ But nobody cares , How come they all wana do like this so shit! Where is OUM’s Wemaster? Sleeping @ Camp? Yeah,