Antivirus utility AVZ. AVZ - Utility for the treatment of viruses and recovery of the system download program AVZ for Windows 10

AVZ - a free anti-virus application for a computer running Windows was created by a Russian, our compatriot Oleg Zaitsev.

Download AVZ free tool to protect your computer from many different threats, virus software and other. Antivirus will provide you with the ability to use your own scripts, this advantage will be most appreciated by corporate network administrators. Based on all above, you can confidently declare that AVZ will become an excellent shield for your system.

You can download AVZ for free from the official site and the latest version, the archive with anti-virus databases is updated once a day.

History is silent about what prompted him to create an AVZ utility, but his creation to this day enjoys a good success. The author wanted to create something universal, because as it is known, from year to year, hackers try to invent new bypass of antivirus programs, so Oleg has tried to develop a new identification algorithm, namely, to create a utility that will identify a viral application for other features than others Similar programs.

Therefore, AVZ can detect malware not only on identity in signature bases, as well as on the characteristic modification of files and other changes in the registry. The utility has everything necessary to search and remove viruses - its list includes a scanner, the ability to send suspicious files to quarantine, supporting heuristic analysis.

However, it is better to use the application as an assistant to the main anti-virus package, since popular antiviruses like NOD32 or Kaspersky Anti-Virus update antivirus bases almost every day, which means that very reliable protection will be guaranteed from this side. In turn, AVZ will force the main antivirus, and catch the viruses who managed to bypass the signatures identification. The developer of the program itself claims that his creation is focused on the disposal of Trojan programs and utilities for remote tracking PC, so the utility will not return to normal operations infectious files.


AVZ anti-virus utility is designed to detect and delete:
  • Spyware and Adware Modules are the main purpose of the utility
  • DIALER (Trojan.dialer)
  • Trojan programs
  • Backdoor modules
  • Network and postal worms
  • Trojanspy, TrojandownLoader, Trojandropper
The utility is a direct analogue of Trojanhunter and Lavasoft Ad-Aware 6 programs. The primary task of the program is to remove Spyware and Trojan programs.
The features of the AVZ utility (in addition to the typical signature scanner) is:
  • Heuristic System Check Firmware. Firmware is searching for well-known Spyware and viruses by indirect features - based on the registry analysis, files on the disk and in memory.
  • Updated Safe File Base. It includes digital signatures of tens of thousands of system files and files of well-known secure processes. The base is connected to all AVZ systems and works on the "own / alien" principle - the secure files are not entered into quarantine, the deletion and output and output are locked for them, the base is used by anti-tat, the file search system, various analyzers. In particular, the built-in processes manager highlights secure processes and services in color, searching for disk files can be excluded from the search for well-known files (which is very useful when searching for the Disk Trojan programs);
  • Built-in RootKit detection system. Search Rootkit is coming without applying signatures Based on the study of basic system libraries for intercepting their functions. AVZ can not only detect Rootkit, but also to correctly lock the operation of the Usermode Rootkit for its process and Kernelmode Rootkit at the system level. RootKit contractions applies to all AVZ service functions, as a result, the AVZ scanner can detect disguised processes, the search system in the registry "sees" the masked keys, etc. Anti-troops is equipped with an analyzer that detects the processes and services disguised by Rootkit. One of the main features of the Rootkit counteraction system is its performance in Win9x (the common opinion on Rootkit's absence, working on the Win9x platform is deeply erroneous - hundreds of Trojan programs intercepting the API functions for masking their presence to distort the operation of the API functions or tracking their use). Another feature is a universal detection and blocking system Kernelmode Rootkit, workable under Windows NT, Windows 2000 Pro / Server, XP, XP SP1, XP SP2, Windows 2003 Server, Windows 2003 Server SP1
  • Keyboard Spy Detector (Keylogger) and Trojan DLL. Search Keylogger and Trojan DLL is based on the system analysis without applying the signature databasethat allows you to confidently detect in advance unknown Trojan Dll and Keylogger;
  • Neuroenalyzer. The AVZ signature analyzer comes with a neuroemologist, which allows you to study suspicious files with a neural network. Currently, neurallet is used in the keylogger detector.
  • Built-in WINSOCK SPI / LSP Settings Analyzer. Allows you to analyze the settings, diagnose possible errors in setting up and produce automatic treatment. The ability to automatically diagnose and treatment is useful for novice users (in utilities of type LSPFIX there is no automatic treatment). To study SPI / LSP manually in the program there is a special LSP / SPI settings manager. The WinSOCK SPI / LSP analyzer is applied to the action of antiooker;
  • Built-in Process Manager, Services and Drivers. Designed to explore running processes and downloaded libraries, running services and drivers. The operation of the processes of processes is subject to the action of anti-troops (as a result - he "sees" processes masked by rootkit). Process Manager is associated with the secure AVZ database, identified safe and system files are highlighted by color;
  • Built-in utility for searching for disk files. Allows you to search for a file on various criteria, the search system features exceed the system search capabilities. The operation of the search system is subject to the action of anti-troops (as a result - the search "sees" files masked by roottite and can delete them), the filter allows you to exclude from the search results files identified by AVZ as secure. The search results are available as a text protocol and in the form of a table in which you can mark the group of files for subsequent removal or quarantine removal or room.
  • Built-in utility for data search in the registry. Allows you to search for keys and parameters for a specified sample, the search results are available as a text protocol and in the form of a table in which you can mark multiple keys to export or delete them. The search for the search system extends the action of anti-troops (as a result - the search for "sees" the registry keys masked by rootkit and can delete them)
  • Built-in Open Port Analyzer TCP / UDP. It disseminates the action of anti-troops, in Windows XP, the process is displayed for each port. The analyzer relies on the renewed database of ports of famous Trojan / Backdoor programs and well-known system services. Search ports of Trojan programs is included in the main system check algorithm - when suspicious ports are detected in the protocol, warnings are displayed indicating what Trojan programs are peculiar to the use of this port
  • Built-in common resource analyzer, network sessions and open files. Works in Win9x and NT / W2K / XP.
  • Built-in Analyzer DOWNLOADED PROGRAM FILES (DPF) - Displays the DPF elements, connected to all AVZ Sustems.
  • System recovery firmware. Firmware is carried out to restore Internet Explorer settings, program startup options and other system parameters damaged by malicious programs. Recovery starts manually, the parameters restored are specified by the user.
  • Heuristic deletion of files. Its essence is that if the malicious files were removed during treatment and this option is enabled, the system is automatic, covering classes, BHO, IE and Explorer extensions, all available AVZ types of autorun, WinLogon, SPI / LSP, etc. . All found links to the remote file are automatically cleaned with information in the protocol of information that specifically and where it was cleaned. For this cleaning, the microprogram engine of the treatment of the system is actively used;
  • Check archives. Starting from version 3.60 AVZ supports checking archives and composite files. At the moment, the archives of the format of ZIP, RAR, CAB, GZIP, TAR are checked; email letters and MHT files; CHM archives
  • Check and treatment of NTFS streams. NTFS Checking Flows In Avz Starting from version 3.75
  • Control scripts. Allow the administrator to write a script that performs a set of specified operations on the user's PC. Scripts allow you to apply AVZ in the corporate network, including its launch during the system loading.
  • Process Analyzer. The analyzer uses neural networks and analysis firmware, it turns on when the extended analysis is turned on at the maximum level of heuristics and is designed to search for suspicious processes in memory.
  • Avzguard system.It is intended to combat difficult malicious programs, besides AVZ, protect the applications specified by the user, for example, other anti-spyware and antivirus programs.
  • Direct Disk Access System To work with locked files. Works on FAT16 / FAT32 / NTFS, supported on all NT ruler operating systems, allows a scanner to analyze blocked files and placing them into quarantine.
  • Driver monitoring processes and AVZPM drivers. Designed to track start and stopping processes and download / unload drivers to search for masking drivers and detecting distortions in describing processes and drivers structures created by DKOM rootkitams.
  • Driver Boot Cleaner. Designed to clean the system (delete files, drivers and services, registry keys) from Kernelmode. Cleaning operation can be performed both in the process of rebooting the computer and during treatment.

Each user came across the problems of the system associated with the activities of viruses and malicious software. Problems from them are very serious. Sometimes it is necessary to completely reinstall the system, and may fail the operation of the equipment. But not always need to seek help from specialists. Many problems are solved independently. Here will come to the rescue AVZ Antivirus. Consider in detail how to work with it.

What is this program

AVZ does not work in real time as antiviruses installed on the PC. It does not have to install it. Utility in Russian. Do not conflict with antiviruses installed in the system. I have a Smart Security. At the same time, the utility works great. No need to turn off the constant antivirus.

When to use it

AVZ removes adware, spyware and troja viruses. If you notice that the PC does not work as usual: freezes, slowly loaded software, does not turn off, try working with AVZ. Even if everything works as it should, periodically scatter the PC to this utility.

How to download and install

Download from the official site the latest version: http://z-oleg.com/avz4.zip

The latest version includes support for Windows 10

The downloaded archive is retrieved to the "AVZ4" folder. If you want, change her name to another. Next, run by clicking on avz.exe file.

Before starting work, update the databases. In the window that opens find the update icon.

For Windows 7/10, to work correctly correctly, run it on behalf of the administrator. To do this, on the executable AVZ.exe file, right-click. Next, select the corresponding item.

What to do before work

AVZ is a utility to eliminate problems resulting from viruses. Therefore, before starting work, launch, for example, a disposable utility. It will get rid of viruses, and AVZ will correct violations and delete the files created by the virus. Perform a cleaning system after removal.

How to use

Run the utility. The main window of the program consists of three tabs:

On the first tab of the Search Area, highlight that scanned on HDD. There will be three options slightly below. Check the ticks opposite them. This will allow you to perform a heuristic analysis, scanning running processes, determine the malicious software.

File type

In this tab, select Scan. If a simple check occurs, check the item "potentially dangerous". If there are many viruses - "all files". The utility other than simple documents works with archives. In this tab, configure this check. Remove the checkbox opposite the archive check.

Search parameters

A slider will appear at the top. Move it up to enable keyboard interceptor check. The end result should be as in the figure.
Next, configure which action if you have a virus:

The check will start, the result of which will be displayed in the area called "Protocol". After a short period of time (depending on the amount of information being checked), scanning will end. Next, the program will indicate the scanning time and the threats found.

If the threats are found, look at them by clicking on the button marked in the figure below.
In the presence of suspicious objects, the program will write the path to them, description, type. Here you can move it to Quarantine to delete.

System functions

In addition to checking for viruses and malicious software, AVZ performs many functions. Let's talk about the most useful. To access them, click on the file. The context menu opens with all the functions.
Consider the most important.

System Study

The function will collect information about the system. This is a technical and hardware. These include: system files, protocols, processes. By clicking on the "Study" link, a new window will open, where you specify the utility. What information should be collected. By installing everything you need, click on the "Start".

In a new window, the program will propose to save the document. It contains the selected HTML format information. Opened by any browser. Next, click "Save".

Scan will begin. After completing it, you can see the selected information.

Restoration

These functions can return OS elements to the initial state and remove the settings. Malicious software wants to prohibit access to the "Registry Editor" or "Dispatcher". Attempts to add parameters to the HOSTS system file. The restore option unlocks these items. To start, click on it, and check the actions that you want to produce. I noted 11, 13, 17 option. Next click on "Run".

Scripts

In the list of parameters located in the "File" menu, there are functions that work with scripts. This is "execute", "standard".
By clicking on the "Standard" window with a list of ready-made scripts. Tick \u200b\u200bthe checkboxes. Next, click on "Run".

Another option will launch the editor. Write the script yourself, or download from PC. Next, click the "Run" button.

Quarantine and Infected Option

By clicking on this item, view the potentially dangerous elements discovered by the utility during scanning.
Delete files (if found), or restore if not dangerous.
In order for the potentially dangerous software to be placed in quarantine, check the relevant items in the settings.

Services

To see the list of services offered by the program, click on the appropriate line "Service".
Consider the most used.

Process Manager

It displays all executable files operating in the system. In a new window, look at their description, and the path to them.

If necessary, complete the process. Select it from the list, and click on the button with a black cross. It is right from the window.

This is replacing the dispatcher installed in the system. Of particular value is if it is blocked by the virus.

Service Manager and Drivers

The second service is listed. Clicking on which the window will open where to select the service using the switch: Services, drivers all. Choose the desired item after which it turns off, stop or delete.

Manager autorun

Use it to configure program settings for scattering together with the system. To turn off, remove the checkbox opposite the selected item. Recording can be completely removed. To do this, click the button on which the black cross is drawn.

After deletion, restore will not work. Therefore, check carefully not to erase important entries.

Hosts file manager

If the virus prescribed its values \u200b\u200bin this file and blocked access, use this option. The new window will display its contents. Nothing will work out. Only delete. This is done using a black cross button.

Running utilities

The program allows you to work with claimed applications. To do this, switch "SERVICE" - "System". By clicking on the system utilities, you can:


Avzguard

If a virus started, which fails to delete, use the AvzGuard function. It adds a malicious software to the list of not trusted, which cannot be performed. To activate, click on the AvzGuard line.

I want to note that I have this function and AVZPM does not work, as these technologies are not supported by 64-bit versions of the WINDOVS family. Read more about it in the official technical documentation at: http://z-oleg.com/secur/avz_doc/index.html?t_install.htm..

Output

I recommend all the user to download AVZ. Periodically launch the utility to search for viruses. Its main task is to remove spyware, trojans and spyware. But this does not mean that it is not necessary to use antiviruses that protect PCs in real time.

Many users set antiviruses to their own computer for safe operation. Built-in anti-virus modules that are installed in browsers in the form of extensions cannot protect the user from all varieties of threats and fraudulent programs. Some users set an antivirus program with a full package of functions that will protect the user from phishing and fraudsters. Newbies enjoy simpler programs to find viruses or set antivirus scanners. Antivirus is available for download by reference specified at the bottom of the page.
Antivirus utility AVZ - powerful anti-virus scanner, To find Trojanov, Spyware and other viruses in the Windows operating system. The program finds and neutralizes program files or running programs. The utility is struggling with Bekdor viruses, advar and spaying, and also finds loaders a dialer. AVZ checks mail for worms and network viruses. Installation packs with advar viruses The program recognizes primarily an anivial utility makes priority for such types of viruses.
The program is able to detect the loaders of the malicious software Troyan Dialer, Troyan Dropper, TrojanDeader and Trojanpay. AVZ Anti-Virus has a large base of tools for the treatment of viruses. Special components of antivirus cure threats and eliminate the infection of RAM. Heuristic analysis allows you to find threats in free mode. When the program is running, but the user did not press the virus search, the defense still works. Antivirus AVZ. Uses a large number of tools for analyzing programs so that viruses and threats do not penetrate the computer's RAM. The utility is analyzed by all Internet ports and the boot folder of the program. Booth Cracker analyzes and checks the work of programs. The program has a lot of additional modules that provide security in the operating system and increase computer performance.

AVZ is used to scan, subsequent removal of such elements:

  • postal, network worms;
  • adware, Adware modules (antivirus priority orientation);
  • trojanov;
  • modules Backdoor;
  • trojan.dialer type loaders;
  • malicious components like Trojandropper, TrojandownLoader, Trojanspy.
The attending AVZ module is included in the assemblies of some operating systems. The program is embedded in the loading menu of the installation disk and allows you to check the system for viruses before installing the new operating system. AVZ Antivirus can be downloaded from any software portal or go to the official site to download the latest version of the program. The utility was created in Russian. The program interface is simple and convenient. AVZ works on new generation operating systems.

Avz Zaitseva free download

Download free AVZ in Russian New version For Windows 7, 8 and Windows 10. Download the program file from the official site. Our site is following all program updates so that you have the latest version of Avz Zaitseva.

Tweet

There are universal as the Swiss program knife. The hero of my article is just such a "wagon". Name it AVZ. (Antivirus Zaitseva). With the help of this free You can catch antivirus and viruses, and the system is optimized, and correct the problems.

AVZ features

The fact that this is an antivirus program, I already told in. About the operation of AVZ as a disposable antivirus (more precisely, Anti-Court) well described in Help to her, I will show you a different side of the program: checking and restoring settings.

What can "fix" using AVZ:

  • Restore program launch (.exe, .com, .pif files)
  • Reset Internet Explorer settings to standard
  • Restore desktop settings
  • Remove rights restrictions (for example, if the virus has blocked the launch of programs)
  • Remove the banner or window that appears before logging in
  • Remove viruses that can run along with any program
  • Unlock task manager and registry editor (if the virus forbade their launch)
  • Clear file
  • Disable autorun programs from flash drives and disks
  • Delete unnecessary files from hard disk
  • Repair problems with the desktop
  • And much more

Also, it is also possible to check for the security of the Windows setup (in order to better protect against viruses), as well as optimize the system, cleaned the autoload.

The AVZ download page is located.

The program is free.

First secure your Windows from careless actions

Avz program has highly Many features affecting the Windows work. it dangerousBecause in case of an error, trouble can happen. Please carefully read the text and help before doing something. The author of the article is not responsible for your actions.

To be able to "return as it was" after carelessly with AVZ, I wrote this chapter.

This is a mandatory step, in essence, the creation of a "waste path" in case of careless actions - thanks to the recovery point, you can restore the settings, the Windows registry to an earlier state.

Windows Recovery System is a mandatory component of all versions of Windows, starting with Windows ME. It is a pity that it is usually not remembered and losing time, reinstalling Windows and programs, although it was possible to click on the mouse and avoid all the problems a couple of times.

If there are serious damages (for example, part of the system files are deleted), then the system recovery does not help. In other cases, if you incorrectly configured Windows, "namudrili" with the registry, put the program from which Windows is not loaded, incorrectly used the AVZ program - "System Restore" should help.

After you, AVZ creates in its folder subfolder with backups:

/ Backup. - There are stored backups of the registry.

/ Infected. - Copies of remote viruses.

/ Quarantine. - Copies of suspicious files.

If, after the AVZ work, problems began (for example, you thoughtlessly used the AVZ tool "Recovery System" and the Internet stopped working) and the Windows system restores did not roll out the changes made, you can open the backup copies of the registry from the folder Backup.

How to create a recovery point

We go B. Start - Control Panel - System - System Protection:

Click "System Protection" in the System window.

Press the "Create" button.

The process of creating a recovery point may take a tet of minutes. Then the window will appear:

The recovery point will be created. By the way, they are automatically created when installing programs and drivers, but not always. Therefore, before dangerous actions (setting, cleaning system), it is better to create a recovery point once again so that in the event of a misfortune to praise yourself for prudency.

How to restore a computer using the recovery point

There are two options for starting the system recovery - from under the running Windows and using a disk with the installation.

Option 1 - If Windows starts

We go B. Start - All Programs - Standard - Service - Restoration of the System:

Run Select another recovery point and click Further.A list of recovery points opens. Choose the one that needs:

The computer will automatically reboot. After downloading all the settings, its registry and part of important files will be restored.

Option 2 - If Windows does not load

Need a "installation" disk with Windows 7 or Windows 8. Where to get it (or download), I wrote in.

Loading from the disk (how to load from the boot disks, it is written) and choose:

Select "System Restore" instead of installing Windows

Repairing system after viruses or inept action with computer

Until all actions, get rid of viruses, for example, with. Otherwise, it will not be a sense - fixed settings The launched virus will break again.

Running program restore

If the virus has blocked the launch of any programs, then AVZ will help you. Of course, you need to still start the AVZ itself, but it is pretty easy:

First we go B. Control Panel - We put any view of the view, except the category - Folders settings - View - Remove daw with Hide extensions for registered file types - OK.Now each file shows expansion - Multiple characters after the last point in the name. Programs are usually .exe and .com.. To start the AVZ antivirus on the computer, where the program starts is prohibited, rename the extension in CMD or PIF:

Then AVZ starts. Then in the window itself click File - :

It should be noted items:

1. Restore the parameters of startup.exe, .com, .pif files (actually solves the program launching problem)

6. Deleting all POLICIES (restrictions) of the current user (In some rare cases, this item also helps solve the problem of launching programs if the virus caught a very harmful)

9. Removing system processes debuggers (It is very advisable to note this item, because even if you checked the antivirus system, something could remain from the virus. It also helps if the desktop does not appear when the system starts)

, I confirm the action, a window appears with the text "System Restore". After remains to restart the computer - the problem with the launch of the programs will be solved!

Restore Desktop Start

A fairly frequent problem - when the system starts, the desktop does not appear.

Run Desktop You can: Press Ctrl + Alt + Del, run the task manager, click there File - New Task (Run ...) - We enter explorer.exe.:

OK - The desktop will start. But this is only a temporary solution to the problem - the next time you turn on the computer will have to repeat it again.

To do not do so every time you need to restore the program launch key explorer ("Explorer", which is responsible for the standard viewing of the contents of the folders and the operation of the desktop). In AVZ click File - and celebrate the item

Perform marked operations, confirm the action, click OK. Now when you start the computer, the desktop will start normally.

Unlock Task Manager and Registry Editor

If the virus has blocked the launch of the two above programs, you can remove the ban via the AVZ program window. Just tick the two items:

11. Unlock task dispatcher

17. Unlock registry editor

And press Perform marked operations.

Internet problems (VKontakte sites, classmates and antivirus sites do not open)

This component is able to check the four categories of problems with varying degrees of danger (each degree is characterized by the number of settings):

System problems - This includes security settings. Voting the checkbox found items and clicking the button Fix marked problemsSome loopholes for viruses will be blocked. There is also the reverse side of the medal - improving safety, comfort is reduced. For example, if you prohibit autorun from interchangeable media and CD-ROM, when inserting flash drives and disks will not appear window with an action selection (see the content, start the player, etc.) - you have to open the computer window and run the display of the disk content manually. That is, viruses will not start automatically, and the convenient tip will not appear. Depending on Windows settings, each will see its list of system vulnerabilities here.

Browser Settings and Twigs - Internet Explorer security settings are checked. As far as I know, the settings of other browsers (Google Chrome, Opera, Mozilla Firefox and others) are not checked. Even if you do not use Internet Explorer to work with the Internet, I advise you to start checking - the components of this browser are often used in various programs and are a potential "security hole", which should be closed.

Cleaning system - Partially duplicates the previous category, but does not affect the place where the data is stored on the user's actions.

I recommend checking my system in categories System problems and Browser Settings and TwigsBy choosing the degree of danger The problems of moderate severity. If the viruses did not touch the settings, then most likely you will be offered only one item - "Automotion with interchangeable media" (flash drives) is allowed. If you put a tank and thus prohibit the autorun programs from the flash drives, then you will at least partly secure your computer from viruses distributed on flash drives. Further defense is achieved only with and working.

Cleaning the system from unnecessary files

Programs AVZ. Clean the computer from unnecessary files. If the computer does not have a hard disk cleaning program, AVZ will come down, the benefit of the capabilities of many:

Read more about items:

  1. Clear PREFETCH cache - Clearing the folder with information about which files to load in advance to quickly launch programs. The option is useless, because Windows itself completely successfully monitors the prefetch folder and cleans it when required.
  2. Delete Windows log files - You can clear a variety of databases and files that store various records about the events occurring in the operating system. The option is useful if you need to release a tenth-other megabytes on the hard disk. That is, the benefit of using meager, the option is useless.
  3. Delete memory dump files - If you have critical errors, Windows interrupts its work and shows the BSOD (blue screen of death), at the same time saving information about running programs and drivers to a file for subsequent analysis by special programs to identify the culprit of the failure. The option is almost useless, as it allows you to win just a dozen megabytes of free space. Clearing memory dump files does not harm.
  4. Clear List Recent Documents - Oddly enough, the option clears the list of recent documents. This list is in the Start menu. Clearing the list can be performed manually by pressing the right button on this item in the Start menu and selecting "Clear Latest List." The option is useful: I was noticed that cleaning the list of recent documents allows the Start menu to display your menus a little faster. The system will not hurt.
  5. Clearing Temp folder - Holy Grail for those who seek the reason for the disappearance of a free space on a C: disk. The fact is that in the TEMP folder, many programs store files for temporary use, forgetting then to "remove". Typical example - archivers. Unpack the files there and forget delete. Clearing the Temp folder system does not harm, the place can free a lot (in particular cases, the winnings of the free space reaches fifty gigabytes!).
  6. Adobe Flash Player - Clearing Time Files - Flash player can save files for temporary use. You can delete them. Sometimes (rarely) option helps in the fight against Flash Player glitches. For example, with video and audio playback on VKontakte website. There is no harm to use.
  7. Cleaning Casha Terminal Customer - As far as I know, this option clears the Windows component temporary files called "Connecting to a remote desktop" (remote access to computers via RDP protocol). Option it seems Harm does not cause, places frees with a dozen megabytes at best. There is no sense to use.
  8. IIS - Deleting HTTP error log - long explain what it is. I will only say that the IIS magazine cleaning option is better not to include. In any case, harm does not cause, benefit too.
  9. Macromedia Flash Player. - item duplicates "Adobe Flash Player - Clearing Time Files"But addresses the pretty ancient versions of the flash player.
  10. Java - Cleaning Kesha - gives a win in a couple of megabytes on the hard disk. I do not use programs on Java, so the consequences of the inclusion of the option did not check. I do not advise you to include.
  11. Cleaning basket - The purpose of this item is absolutely clear from its name.
  12. Delete system updates setting protocols - Windows maintains a log of installed updates. Enabling this option clears the log. The option is useless, because there is no winning space.
  13. Delete Windows Update Protocol - Similar to the previous item, but other files are deleted. Also a useless option.
  14. Clear MountPoints Base - If you do not create icons with them in the computer window when connecting a flash drive or hard disk, this option can help. I advise you to include only if you have problems with connecting flash drives and disks.
  15. Internet Explorer - Cleaning Kesha - Clears Internet Explorer temporary files. The option is safe and useful.
  16. Microsoft Office - Cleaning Kesha - Clears the temporary files of Microsoft Office programs - Word, Excel, PowerPoint and others. You can not check the security option, because I do not have Microsoft Office.
  17. Cleaning Kesha Recording System for CD - Useful option that allows you to delete the files you prepared to record on discs.
  18. Clearing TEMP system folder - Unlike the user folder TEMP (see paragraph 5), cleaning this folder is not always safe, and the place is usually released a bit. I do not advise you.
  19. MSI - Clearing Config.msi folder - This folder stores various files created by software installers. The folder has a large amount if the installation programs incorrectly completed their work, so the CONFIG.MSI folder cleansing is justified. However, I warn you - there may be problems with removing programs using.msi installers (for example, Microsoft Office).
  20. Clear task scheduler protocols - Windows task scheduler stores a log where writes information about the tasks performed. I do not recommend including this item, because there are no benefits, it will add problems - Windows task scheduler is a pretty buggy component.
  21. Delete Windows Installation Protocols - Winning Places is insignificant, no sense to delete.
  22. Windows - Cleaning Kesha Icons - Useful if you have problems with labels. For example, when the desktop appears, the icons do not appear immediately. The inclusion of the option on the stability of the system will not affect.
  23. Google Chrome - Cleaning Kesha - very useful option. Google Chrome stores copies of the pages in the folder allotted for this to quickly open sites (pages are loaded from the hard disk instead of downloading via the Internet). Sometimes the size of this folder reaches seigigabytes. Cleaning is useful due to the release of the place on the hard disk, the stability is neither Windows, nor Google Chrome does not affect.
  24. Mozilla Firefox - Clearing CrashReports folder - Each time the Firefox browser happens a problem and it is easy to easily close, the report files are created. This option deletes report files. The winning of the free space reaches a couple of dozen megabytes, that is, the sense of the option is not enough, but there is. The stability of Windows and Mozilla Firefox does not affect.

Depending on the installed programs, the number of items will be different. For example, if an Opera browser is installed, it will be possible to clean it and its cache too.

Cleaning the list of autorun programs

The correct way to speed up the enabling of the computer and the speed of its operation is the cleaning of the autorun list. If unnecessary programs are not started, the computer will not only be enabled faster, but also work faster too - due to the released resources that will not take the launched in the background of the program.

AVZ is able to view almost all loopholes in Windows through which programs are run. You can view the autorun list in the Tools Manager - Auto-Run Manager:

An ordinary user of such powerful functionality is absolutely nothing, so I urge do not disable everything in a row. Enough to see only two points - Folders autorun and RUN *.

AVZ displays autorun not only of your user, but also all other profiles:

In chapter RUN * It is better not to disable the programs in the section Hkey_users. - It can break the work of other user profiles and the operating system itself. In chapter Folders autorun You can disable everything that you do not need.

Green marked lines identified by antivirus as well-known. This includes both Windows system programs and extraneous programs that have a digital signature.

Black marked all other programs. This does not mean that such programs are viruses or something like that, simply not all programs have a digital signature.

Do not forget to stretch the first sewer column so that the program name is visible. The usual tick removal will temporarily disable the autorun of the program (you can then put a tank again), selection of the item and pressing the button with a black cross will delete the record forever (or until the program will write itself back to the autorun).

The question arises: how to determine what can be turned off, and what not? There are two ways to solve:

First, there is common sense: by name.exe program file, you can make a decision. For example, the Skype program when installing creates an entry for automatic start when the computer is turned on. If you do not need it - remove a tick from the point ending with Skype.exe. By the way, many programs (and Skype among them) are able to remove themselves from autoload, it is enough to remove the daw from the corresponding item in the settings of the program itself.

Secondly, you can search for information about the program on the Internet. Based on the information obtained, it remains to make a decision: remove it from autorun or not. AVZ simplifies the search for information about items: just click right-click on the item and select your favorite search engine:

Disconnecting unnecessary programs, you will noticeably speed up the launch of the computer. However, everything is not desirable to disable everything - it is fraught with the fact that you lose the layout indicator, turn off the antivirus, etc.

Disconnect only those programs that you know exactly - they are not needed in autorun.

Outcome

In principle, what I wrote about in the article, akin to scoring nails by a microscope - the AVZ program is suitable for optimizing Windows, but actually it is a complex and powerful tool suitable for performing a variety of tasks. However, to use AVZ to the full coil, you need to thoroughly know Windows, so you can start with a small one - namely, what I told about above.

If you have any questions or comments - under articles there is a block of comments, where you can write to me. I follow the comments and try to answer you as quickly as possible.