Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.


Top Programs to Optimize your System

  • Please log in to reply
4 replies to this topic

#1 junga


  • Members
  • 48 posts
  • Local time:08:44 PM

Posted 29 November 2010 - 11:43 PM

I have been doing some research for Programs that help Optimize your Computer in Anyway. These are what I have so far:

1. Any reliable AV programs
2. TuneUp Utilities 2011 - Provides multiple services to optimize computer
3. TeraCopy - Increases speed of data transfer via flash drives, externals.
4. VLC - versatile, basic media player. No need to have any
5. Hijackthis - I've known Hijackthis program since 1999 believe it or not. Im no tech savy so my experiences with this program aren't good lol.
6. TCPOptimizer. Optimizes internet connection in client side

What are some programs some of you guys have that you can recommend to help optimize your computer?

BC AdBot (Login to Remove)


#2 1002 Richard S

1002 Richard S

  • Members
  • 277 posts
  • Gender:Male
  • Location:Sussex, UK.
  • Local time:12:44 AM

Posted 30 November 2010 - 07:53 AM

... and these are why I'd stay away from numbers 2 and 6 on your list:



The Registry is an enormous database and all this “Cleaning” really doesn’t amount to much…I’ve said this before, but I liken it to “sweeping out one parking space in a parking lot the size of Montana” … a registry “tweak” here and there is desirable or even necessary sometimes, but random “cleaning”, especially for the novice, is inviting disaster.

"There are some good "tweaking tools" around as well, but you shouldn't use these if you don't have basic knowledge about the registry and Windows in general. Only delete keys if you're certain that they can be deleted. Disable services if you're certain that you don't need them, let it set policies if you understand what they do etc.."

#3 boopme


    To Insanity and Beyond

  • Global Moderator
  • 73,573 posts
  • Gender:Male
  • Location:NJ USA
  • Local time:07:44 PM

Posted 30 November 2010 - 11:00 AM

Line 5 is out...

IMPORTANT NOTE: HijackThis is an advanced enumerator (similar in some respects to a registry editor) that is used to display certain areas of the Windows registry where the majority of malware reside. HijackThis will scan these areas of your system and then create a log to help diagnose the presence of undetected malware in known hiding places. However, since HijackThis only scans certain areas of your system/registry, a log may not always show all the malware on your system and other investigative tools need to be used. Most of the log entries are required to run a computer and removing essential ones can potentially cause serious damage such as loss of Internet connectivity or problems with your operating system which could preventing it from starting. Using HijackThis requires advanced knowledge about the Windows Operating System and relies on trained experts to interpret the log entries and investigate them in order to determine what needs to be fixed.

And just because you "fixed" something with HijackThis, that does not mean you have a clean system. There are specific files and folders which must be deleted afterwards. HijackThis does not delete them. Futher, removing entries in HijackThis before the problem is properly identified can make the malware undetectable to other detection and removal tools. Full system scanning tools like SUPERAntispywre, Malwarebytes' Anti-Malware, Spybot S&D and SpySweeper will remove the registry entries as well as the related files which results in a more complete removal process. HijackThis this should only be used to clean up the entries left behind, after you have properly removed the malware.

Since HijackThis is a powerful tool that requires advanced knowledge about the Operating System and can cause system damage if incorrect instructions are given, only designated trained experts are allowed to help people with using HijackThis. If you do not have advanced knowledge about computers or training in the use of this tool, you should NOT fix anything using HijackThis without consulting a expert as to what to fix.

With that said, there are tutorials available for advanced users which will help you understand more clearly about the use of HijackThis and what it does. {{Credit our quietman7}}
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#4 Eyesee


    Bleepin Teck Shop

  • BC Advisor
  • 3,545 posts
  • Gender:Male
  • Location:In the middle of Kansas
  • Local time:07:44 PM

Posted 30 November 2010 - 05:54 PM

In my experiences, most programs that purport to optimize a system flat dont and typically cause more problems than they are worth. They are the first things that I uninstall and a lot of times performance instantly becomes considerably better. Go figure!!

A good AV program (not Norton or McAfee) Malwarebytes AntiMalware and SuperAntiSpyware are essential
In the beginning there was the command line.

#5 BDH92


  • Members
  • 8 posts
  • Gender:Male
  • Local time:07:44 PM

Posted 02 March 2011 - 07:40 PM

I've found that CCleaner is really nice for speeding up your computer every so often and works very quickly. Also for security purposes, Secunia's Personal Software Inspector (PSI) Helps keep your programs up to date eliminating vulnerabilities.

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users