delete

Mon
12
Sep
Dennis Faas's picture

'Delete Doctor 2.3', and 'Merge MP3 0.1k'

Delete Doctor 2.3 Delete Doctor lets you delete files that are difficult to delete, such as those left by viruses and Trojans, or files with corrupted file names. This program can also delete files like the "index.dat" files, which store Internet ... history, by scheduling them for deletion upon system restart. Select a file to delete from the built-in file browser or drag a file to the application's icon or window from Window's Explorer. http://www.diskcleaners.com Merge MP3 0.1k It is often necessary to merge multiple sound files into one recording. This need may arise for various ... (view more)

Fri
06
Aug
Dennis Faas's picture

Easy Duplicate Finder Review

Update 2010/10/04: The free trial download for Easy Duplicate Finder is at the bottom of this article. Click here to go there now , or continue reading our review. Note that the special discount ends Oct 29, 2010 at 11:59PM EST. Get it before it's ... gone! How many files are stored on your computer? Is it 10,000? How about 50,000 or 100,000? Of the files stored on your computer, how many of them are duplicates and which ones are safe to remove? Unless you're unusually interested in computer technology, you probably don't have any idea how many files are stored within your computer system -- let ... (view more)

Fri
17
Jul
Dennis Faas's picture

Deleting Bookmarks in MS Word 2007

Once you are finished editing your long document in MS Word, you will most likely want to delete any bookmarks you have created. Follow the steps below to learn how: Click the Insert tab on the Office Ribbon. In the Links section, click on Bookmark. ... Select the Bookmark you would like to delete. Click Delete. Poof! Your Bookmarks are now gone! When you become a member at CarolsCornerOffice.com, you have access to this and many, many more articles that include screenshots. Don't delay: visit us today! (view more)

Tue
22
Jan
Dennis Faas's picture

'Disk Investigator', and 'Delete Doctor'

Disk Investigator Disk Investigator helps you to discover all that is hidden on your computer's hard disk and can also help you to recover lost data. Display the true drive contents by bypassing the operating system and directly reading the raw ... drive sectors. View and search raw directories, files, clusters, and system sectors, verify the effectiveness of file and disk wiping programs, and undelete files. http://www.theabsolute.net/sware/dskinv.html Delete Doctor Delete files that are difficult to remove, such as those left by viruses and trojans, or files with corrupted names. This program ... (view more)

Thu
04
Jan
Dennis Faas's picture

Insert Comments: MS Word

Whether or not your document has been protected, you may want to comment on a document without adding to the text itself. Like sticky notes attached to a page, your comments stay apart from the main flow of the document. You place them in a separate ... pane, like footnotes. If you have the proper equipment, you can record an audio comment rather than typing text. If you type comments directly in the document, you may forget to remove them before the final print. Also, you cannot tell who made the comment. MS Word's comment feature records not only the comment but also the person who made it. Use ... (view more)

Wed
04
Oct
Dennis Faas's picture

Delete Rows and Columns: MS Word

You may think you can delete a row or column by selecting it and pressing Delete. But what that does is remove the text, leaving empty cells behind. To remove a row or column completely, you must select it and then choose a menu selection. Choose ... Table | Delete, and then specify Table, Columns, Rows, or certain cells. Right-click and choose Delete from the shortcut menu. If you have a row selected, the shortcut menu will say Delete Row; if you have a column selected, it will say Delete Column. When a column is deleted, the column widths may adjust themselves. The easiest way to delete an ... (view more)

Wed
13
Sep
Dennis Faas's picture

Viewing Section Breaks MS Word

Like page breaks, section breaks are best viewed in Normal or Outline view, where they are always visible. In Print Layout View, section breaks are visible only if your Show/Hide button is enabled. (Your Show/Hide button looks like a paragraph ... symbol and when it's activated you are able to see all non-printing characters). Deleting Section Breaks Section breaks can be deleted if necessary, but proceed with caution. When you delete a section break, you delete all the section-level formatting of the section above it. To delete a section break: Switch to Normal view, if necessary. Click directly ... (view more)

Mon
02
May
Dennis Faas's picture

Is it safe to Remove Files in the Windows Temp folder?

Infopackets Reader 'P.S. Liew' writes: " Dear Dennis, Over the years, my 'temp' folder in Windows [located at c:\windows\temp] has gathered quite a substantial amount of temporary, space-eating files as well as Internet browser history items such as ... cookies, cache and the like. I am contemplating whether or not I should delete these files in order to reclaim hard disk space, but prior to doing so, I would like to get some pointers from you as to which selection of files in this folder is safe to delete. Am I wrong to assume that it is safe to completely delete all files in c:\windows\ ... (view more)

Fri
21
May
Dennis Faas's picture

Outlook Places Recipients in Blocked Senders List

Infopackets Reader Ruth S. writes: " Dear Dennis, I use Outlook Express. Every time I receive an email, the sender's address ends up in my Blocked Senders List. The next time the person emails me again, it goes directly into my Deleted Items folder. ... I don't know why this keeps happening. Any ideas?" My response: I can honestly say that I have never encountered this problem before. At any rate, I have a few suggestions: 1. Clear your Blocked Senders List and Mail Rules. Open Outlook Express Click Tools -> Message Rules -> Blocked Senders List Delete all blocked senders entries ... (view more)

Tue
21
May
Dennis Faas's picture

Information Technology Abuse -- Privacy Issues (Part 2 of 2)

Abstract This article is a continuation of last week's issue of the Infopackets Gazette. This article presents an overview of current privacy issues, discusses potential methods in which an individual's privacy may be jeopardized, and examines ... specific countermeasures that can be used to protect private information. Information Technology Abuse -- Privacy Issues (Part 1 of 2) -- Third Layer: Firewalls, Web Filters, and Tracking Detection Firewalls: Any computer system that accesses the Internet should be equipped with a firewall to enable the user to detect and prevent unauthorized access to ... (view more)

Pages

Subscribe to RSS - delete