UVK Help - Home section
After launching UVK, the Home page is displayed, like the picture below.
Note that you can launch UVK by pressing the following set of keys: Ctrl + Alt + U.
The UVK's Home page, also known as Main menu is the user interface normally displayed when you launch the application. It consists of a window containing 24 buttons.
Each one of these buttons will take you to the corresponding UVK section, or module. The section you're taken to will have a return button, usually named Home, which will bring you back to the starting point again.
This simple procedure allows you to navigate through all the UVK's features without the need of a permanent side/top bar having all the buttons, which would constantly use a large ammount of precious space in the GUI.
The disposition of the buttons is organized in three sections:
The five small buttons at the top will jump to
application related features.
The six buttons in the left bottom area of the window refer to system repair and optimization features.
The twelve buttons in the right side refer to malware removal and system information features.
Below is the list of actions you can perform after clicking the corresponding button in the welcome screen.
Improve system performance and reduce registry size by removing
invalid registry keys and values.
Improve the Windows shell's responsiveness by removing invalid shortcuts.
Free up hard disk space by removing unnecessary (junk) files and old restore points.
Export the list of items found to a text file.
Defragment the Windows registry.
Create system restore points and register the system files.
Cleanup all temporary files and browsers cache.
Backup and restore the Windows registry.
Uninstall several programs at once, and in automated mode, if
Force uninstall of stubborn programs.
Add custom uninstall entries to the uninstall list.
Get information about the uninstall entry.
Delete the uninstall entry without uninstalling the program.
Change the uninstall entry's icon.
Verify the uninstall file's signature.
Get the uninstall file's VirusTotal report.
Open the file system location of the program's folder or the uninstaller file.
Open the uninstall entry's help/info url.
Hide Microsoft signed files from the list.
Change the way the uninstall entries are dysplayed in the list.
And much more...
user accounts in your system, including buil-in accounts.
Easily add new user accounts, and simmultaneously set their password, privilege level and associated picture.
Remove user accounts in two clicks.
Change or remove the password for any user account.
Change the picture associated with any user account.
Auto-logon a user account.
Hide a user account from the welcome screen.
Enable, disable user accounts and much more.
most vulnerable registry and file system areas from being infected.
Prevent adding programs to the windows startup and logon.
Prevent creating/deleting browser helper objects, Internet explorer toolbars and search providers.
Prevent modifying the internet settings and the Internet explorer startup pages.
Prevent executing files in specific directories.
Backup and restore the Windows registry.
computer with more than fifty exclusive fixes: Register system dlls,
enable and repair Windows update, clear dns cache and the hosts
file, reset user default registry settings, fix installation
problems, empty all browsers cache, reset security settings,
defragment and optimize the hard drives, install Java, Flash,
DirectX, .Net Framework, Fix the WMI and the system restore, delete
all restore points, fix the windows shell, reset the user shell
folders and much more.
Automate the most popular malware removal tools: MalwareBytes AntiMalware, Super AntiSpyware, Rogue Killer, Kaspersky TDSSKiller, Avast! aswMBR, AdwCleaner, Junkware Removal Tool and Avast! Browser Cleanup .
Create your own apps, which can automatically download and run files.
Create professional html reports of all the actions performed in this section.
Import/Export everything to a file, allowing you to run the desired fixes and apps with a couple of clicks.
remove adware for all the users in your system in less than two
Detect and remove browser toolbars, ad-ons, plugins, unwanted search providers and hijacked home pages, and also potentially unwanted programs (PUP's).
Detect and remove Internet browser hijackers, such as malicious extensions and ad-ons, hijacked shortcuts and infected startup pages and search engins. Support for nearly all browsers has been recently added.
Filter all the running processes by their executable path.
Select and manage several processes at once.
Kill several processes with the same path at once.
Kill processes and delete the parent files simultaneously.
Kill several processes using special filters.
Delete the whole parent directory of a process.
Pause and resume processes.
Verify the processes files signatures.
Search information about a process over the internet.
Get the VirusTotal report of the running files.
Open the running files location.
View the running files properties.
Manage the services running in a specific process.
loaded memory modules.
Search information about the memory modules over the internet.
Verify the memory modules files signatures.
Filter the modules list. You can hide system protected files, all Microsoft files, or all digitally signed files.
Get the VirusTotal report of the memory modules.
Open the memory modules file locations.
View the memory modules file properties.
Delete infected memory objects using two diferent methods.
entries, scheduled tasks and the corresponding files simultaneously.
Select and manage several autorun entries at once.
Verify the autorun entries file signatures.
Filter the autoruns list. You can hide system protected files, all Microsoft files, or all digitally signed files.
Search information about a autorun entry file over the internet.
Get the VirusTotal report of the autorun files.
Jump to the registry key where the autorun entry is located.
Open the autorun entries file locations.
View the autorun entries file properties.
Maximizable window in this section for a more comfortable view.
services or drivers, and the corresponding files simultaneously.
Perform all common service management tasks: Stop, start, pause, resume services, and set their startup type.
Select and manage several services or drivers at once.
Stop all non Microsoft services.
Filter the services list. You can hide system protected files, all Microsoft files, or all digitally signed files.
Verify the services/drivers file signatures.
Search information about a service/driver file over the internet.
Get the VirusTotal report of the service/driver file.
Jump to the registry key where the service/driver is located.
Open the service/driver file location.
View the service file properties.
Jump to the service's process in the Process manager.
Maximizable window in this section for a more comfortable view.
scan a drive or folder for alternate data streams.
Search information about the streams over the internet.
Verify the ADS files signatures.
Read the streams contents.
Get the MD5 VirusTotal report of the streams.
Open the streams file locations.
Delete one, several or all the streams found.
and folders even if they're being used by applications.
Delete running executable files.
Delete files and folders you can't normally delete from the Windows explorer.
Delete the files permanently or move them to the recycle bin.
Replace or copy files.
Expand compressed files.
Replace files even if they are loaded in the memory.
Perform a full
analysis of your system and save it to a text file that you can send
to a friend or professional, post in a forum, or analyze it
Choose the areas you want to scan and show in the log.
Choose whether to show Microsoft signed files in the log.
Choose where to save the log.
Choose whether to verify the scanned files digital signatures.
Search for recently created files, and write them to the log.
Perform other custom scans, such as retrieving specific information on files, folders, registry entries, or automatically get the VirusTotal analysis result for a file.
computer by pasting lines from the UVK log to delete corresponding
registry entries and files.
Use custom commands to download files, execute programs, delete or add registry entries, terminate processes, delete files and folders, run cmd batch scripts, register system files, run the UVK Fixes and much more.
Create system restore points, empty the recycle bin and all users temporary folders.
Create and run scripts that perform complete system repair, maintenance and optimization.
Automatically run any of the UVK fixes or scans.
Windows or third party tools such as the registry editor, msconfig,
the decice manager, the windows console, the task manager, Blue
screen viewer, Windows installer cleanup tool, .NET framework
cleanup tool and much more, all in one click.
Quickly enable/disable Windows features such as the administrator account, the user account control, the system restore, the hibernation, view hidden files and much more.
Repair the file associations that are most commonly corrupted by malware: exe, com, msi, bat, cmd, reg and vbs.
Prevent those file associations from being infected/corrupted.
Backup user profiles.
Unlock locked folders.
Open a file or internet location.
Retrieve al sorts of information on any file.
Generate VirusTotal reports, deny or grant access, or perform an sfc scan for any file.
Search information on files and registry entries over the internet.
Grant access or prevent changes to registry keys.
Enumerate all the restore points.
Select and delete one or several restore points.
Create system restore points.
Enable or disable the system restore.
information that can be very useful specially if you're going to
reinstall windows or if you need to diagnose a performance or
hardware problem. This includes the processor, memory and page file
usage, OS and office product keys, and hardware, software and user
Export this info to a comprehensive html file.
registry for several text strings simultaneously.
Display the matched keys and values for eact string in a separate group.
Securely remove the selected keys/values by performing a backup before removal.
Forced removal of the selected keys/values.
Password protect running UVK.
Change the program's preferences.
Cancel check the system drive or reset the user default settings on reboot.
Run the Log analyzer, check for updates, report a bug or send a comment.
Customize the UVK's interface by choosing one from 11 available skins.
application reports to your email address.
Send the application reports to your FTP server.
Choose which files to embed in the report.
Clicking the Help button or pressing F1 will bring you to this page.
Clicking the About button will display a dialog box showing information about the current UVK version and the product activation, as well as options to purchase and install a UVK license.