Virustotal uploader v2.212/22/2023 Secure Deletion – This option utilizes Sysinternals SDelete.exe to securely delete files.Unlock File – Applies techniques to attempt to unlock a locked/in-use file such as a DLL for example.Add to Malware List – This adds file system objects to the Pre-MalwareScan blacklisting, and also deletes them.within the host operating system,) and if so, it compares various attributes to the file in question. It checks to see if the same file exists on your TBC (i.e. While you’re browsing the file system of the attached/offline hard drive, if you run across an unknown DLL or such, you can choose this. Check Existence on TBC – What? A TBC is what I call a “Tech Bench Computer” and this function is useful if you’re running d7 in offline mode, if you’ve attached an infected HDD to your TBC for scanning/removal.Delete not Recycle – Same as above, but doesn’t attempt to place the object in the Recycle Bin.This option does send the object to the Recycle Bin. Delete and Record – Deletes the file using d7’s delete methods and records the deleted file to a report.Delete Options – Installs the two items below.RENAMED, then creates a dummy directory (or vice versa) to prevent the file from being recreated. RENAMED – Renames the file first, with the extension. Register / Unregister – Register/Unregister any applicable file with regsvr32.exe.Command Prompt Here – This should be self explanatory!.Open in Notepad (All File Types) – Opens any file in Notepad.Take Ownership/Permissions – Take ownership (AND assign yourself permissions) of the file or directory (and it’s contents).It also optionally saves parameter history! Run with Parameters – A nifty function to use command line parameters (switches) with any executable without having to open a command prompt.Copy Path to Clipboard – Copies the path/filename of the selected dir/file to the clipboard!.Same as “Open File Location” in built-in with Windows 7. Find Target File (WinXP/Vista) – Use on a shortcut, this opens the target in Explorer.Search Registry – Search the registry for the selected file name.Find Dups – Find duplicate files based on MD5 hash. If it is in a user profile directory, my code removes the username from the path. Google with Full Path – Same as above, with the path of the file included.Google This – Google search for the file name.Work with File – A single context menu item designed to replace ALL of the others, for those who want all the functionality without all the clutter.Here are the items added, with a short explanation. They are more properly referred to as Context Menus for Explorer, when d7 is loaded by default it installs these on the live machine. Tech Directory (Search for local/remote PC Repair).dSupportSuite: White-label Automated Maintenance.dUninstaller (for Scripting App Removals).dAffinity, CPU Affinity and Priority Tool.CryptoPrevent Anti-Malware (FREE/Paid Available).
0 Comments
Leave a Reply.AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |