2. Junk file cleaning (the browser supports IE, Firefox, Chrome, system temporary files, application temporary files, scanning user-defined files, and supporting repeated erasure to prevent recovery when deleting).
3. Registry cleaning (history, ActiveX, drivers, services, COM errors)
4. Fast disk sorting (sorting within 2 minutes, much faster than system sorting)
5. Delete file search (find previously deleted files and restore them)
6. Process management (running programs can be displayed in a tree structure, including forced shutdown programs)
7. Network defense (Cookies tracking defense, more than 5,000 websites are blacklisted)
8. Service management (showing the services in the system, which can be uninstalled, deleted and stopped)
9. Network management (showing the networked programs in the system, and closing the connection and closing the programs)
10. Start-up management (display all possible automatic running items of the system, with hundreds)
1 1. Driver list (displays all drivers loaded in the system, and their digital signatures can be detected).
12. Uninstall programs (all installed programs are displayed, and software can be forcibly uninstalled).
13.CPU utilization, CPU temperature
14. Upload and download network traffic display
15. Empty folder scanning (scanning all empty folders under the partition)
16. Empty file scanning (scans all files of size 0 under the specified partition)
17. File shredding (supports repeated erasure of FBI standards up to 30 times)
18. Disk erasure (erasing deleted files to prevent recovery)
19. Registry backup and recovery (unlimited backup of the registry is supported, and the registry can be recovered at any time)
20. Registry sorting (empty entries in the registry can be compressed to reduce the volume of the registry)
2 1. Duplicate file search (find duplicate files in the system, such as downloading the same movie for many times, and deleting one of them can save a lot of disk space).
22.MBR backup and recovery
23. disk analysis (which folders occupy the most disk space, disk analysis can tell you)
24. File encryption and decryption (good module)
25. Host file editor (view and edit host file)
26. Super browser (Trojan horse can easily hide itself, and you can't see it in the resource manager that comes with Windows. With a super browser, you can see any hidden file).
27. Trojan horse detector (analyze the results returned by comparing NTFS and FAt32 with Windows API, and soon the Trojan horse will have nowhere to hide).
28. Super registry browser (by analyzing the registry file by yourself, it is easy to see the different results from the Windows registry).
29. System information (see detailed system information)
30. System report (save all information of the system with one click)
People's eyes can only see the front 180 degrees, and the role of friends is to help you see the back 180 degrees. Amigo means friend in Spanish and Portuguese, and 360Amigo means a friend who cares about you 360 degrees. Is a friend you can trust with confidence.
360Amigo system speedup is a free system optimization product from Britain. It has only been released for half a year, and the number of users has reached nearly 500,000. 360Amigo not only comes with a short and pithy shadow system, which can instantly protect the system disk from any virus, but also has the strongest file and registry junk scanning engine in the world, which can sort out disk fragments in a few minutes or even dozens of seconds, and can also restore deleted files, automatically optimize startup options, report startup time, kill Trojans, manage applications, manage services, set planned tasks, and provide network defense. CPU temperature display, network upload and download traffic monitoring, registry sorting backup, MBR, host backup and restore, empty folder scanning, duplicate file scanning and other functions. The most important thing is that it also comes with a super dense disk, which uses an encryption algorithm that can't be cracked for 654.38 million years, ensuring the data security of the dense disk. 360Amigo is an all-Chinese operating interface, which supports mainstream operating systems such as WindowsXP/2003/Vista/7/2008, and also strongly supports 64-bit operating systems. It is really a rare system acceleration software of 20 1 1. There are more than 20 language files and help files, and the whole software is only an incredible 2MB. After reading the list of powerful functions below, you will have a deeper impression on the super performance of this software.
1. system sandbox (similar to shadow system, you can enter the system sandbox with one click without restarting, and the whole system disk is replaced by the shadow in memory, which is not afraid of any virus infection and invasion).
2. Startup optimization (helps you optimize all startup items, including automatic startup items, Windows services, and task planning, so that the system can start faster and more easily. The new version supports delayed loading of boot startup items).
3. Self-startup firewall (monitoring all modifications to self-startup items in the system, automatically displaying new self-startup items, and deleting unnecessary ones).
4. Super-dense disk (create encrypted partition quickly, use the latest virtual partition technology with 256 encryption algorithm, 654.38+ a real real-time encryption scheme that can't be decrypted in one million years, Edison Chen lamented that this software didn't come out earlier! )
5. Junk file cleaning (browser supports IE, Firefox, Chrome, system temporary files, Windows updates, a large number of third-party application temporary files, Cookies and history. In addition, it also supports the scanning of custom files, supports repeated erasure to prevent recovery when deleting, and the scanning result is many times that of CCleaner).
6. Registry cleaning (recognized as the strongest registry cleaning component in history, the scanning result is many times that of CCleaner. Do not believe you try, absolutely shocking registry error scanning engine).
7. Fast disk sorting (it takes 10 second and 1 minute for the files to be sorted in the analysis system, which is much faster than the disk sorting in the Windows system).
8. Search and restore deleted files (even if the files deleted on Windows are deleted from the recycle bin, they can still be found on the disk. This function is to scan and restore previously deleted files, and supports fuzzy search of file time, file name, file type and other combinations).
9.CPU utilization rate, CPU temperature (supports most notebook computers, uses the algorithm provided by Microsoft to obtain the CPU temperature of the system, and does not need to install any driver on the hardware port to detect).
10. process management (different from the process manager that comes with Windows, this function can display the running programs in a tree structure, that is, it can clearly display the parent process relationship of a process, as well as CPU utilization, memory utilization, file attributes, digital signatures, etc. And the user can forcibly close the programs in the list).
1 1. network defense (intelligent defense tracks Cookies to help users resist more than 5,000 blacklists of web pages and automatically filter more than 5,000 ActiveX components, so that you can always be protected during the whole online process).
12. Service management (display the services in the system, automatically filter the kernel services of Microsoft, uninstall, delete and stop any services).
13. Network management (shows networking programs in the system, including TCP connections and UDP ports, so that users can see at a glance which programs in the system are networking, and users can disconnect TCP connections or close programs).
14. startup management (ordinary startup management program can only display the automatic running items in the registry, but this software can display all possible automatic running items in the system, up to hundreds, much more than Microsoft's famous automatic running, and users can delete startup items freely).
15. Driver list (Rootkit mostly relies on drivers to enter the user kernel. Which drivers run in my system? This function can display all drivers that have been loaded in the system, and can detect their digital signatures and publishing companies, so that users can know their own kernel drivers like the palm of their hand)
16. uninstall programs (if you want to know which programs are installed on your system, then this function can help you. It displays all installed programs, and supports users to uninstall the software forcibly. Users can modify the uninstall instructions of the software, including deleting any dead links that cannot be uninstalled.
17. Upload and download network traffic display (display the upload speed and download speed of the current user system in real time, so that any behavior of quietly transmitting data behind your back is under your control).
18. Empty folder scanning (Windows system will produce many useless empty folders in the system after long-term operation, and these folders not only waste disk space, but also affect the use speed of the system after excessive accumulation, so this function allows you to scan all empty folders on the hard disk, and users can delete any scanned empty folders at will).
19. empty file scanning (in addition to empty folders, empty files with size of 0 in the system are also a burden, which not only occupies file records, but also affects the performance of the system. This feature allows users to scan all files with size 0 on the disk).
20. File shredding (files deleted in Windows can be easily scanned and recovered by many file recovery tools. This function can make the files and folders that need to be deleted completely disappear from your disk by supporting up to 30 times of repeated erasure of FBI standards).
2 1. Disk Erase (Files deleted in Windows can be easily scanned and recovered by many file recovery tools. This function can erase the idle data on the disk, smash all previously deleted files (including unused files), and prevent the deleted files from being restored.
22. Registry backup and recovery (Registry is the core component of Windows system, and it is a very good habit to back up the registry regularly. This function supports unlimited backup of the registry and arbitrary recovery of the registry).
23. the arrangement of the registry (the registry is the core component of the Windows system, but in order to give consideration to efficiency, there is a small flaw in the registry design, that is, the deleted items in the registry will always occupy the space of the registry. This function allows users to compress empty entries in the registry, reduce the volume of the registry, and make your system run faster and smoother.
24. Find duplicate files (in many cases, the disk space of the system is occupied by duplicate files, such as downloading the same movie or MP3 for many times, and deleting one of them can save a lot of disk space. This function can find duplicate files on disk and support users to delete these duplicate files).
25.MBR backup and restore (MBR-based viruses have also become popular, and it is also a good habit to back up MBR frequently. This function supports analyzing whether the MBR is the same as the backup MBR. If they are different, the user may be infected with the Bootkit virus. At this point, MBR can be restored to its previous state by clicking a button. )
26. Disk analysis (which folders or files occupy the most disk space? Windows itself does not provide this basic function. Now the disk analysis function can tell you which files (folders) occupy most of your space according to the disk analysis, and get a list of oversized files larger than 10MB, and you can delete any of them.
27. File encryption and decryption (use AES 256 algorithm to encrypt and decrypt files, and support password prompt, support encryption and decryption of oversized files)
28.Hosts file editor (Hosts file is an important part of Windows system, and many viruses and Trojans will infect this file. This function supports viewing, editing, backing up and restoring host files).
29. Super file browser (Rootkit Trojan can easily hide itself, which can't be seen in the resource manager that comes with Windows, and these files can't be detected through the common API. Super browser can see any hidden files and folders by analyzing the file system itself, and show which files are hidden by comparing with the information obtained by API. )
30. Trojan horse detector (Rootkit Trojan horse is easy to hide itself, you can't see it in the resource manager that comes with Windows, and you can't detect these files through the common API. By analyzing NTFS and FAt32 and comparing the results returned by Windows API, the super browser quickly made Rootkit Trojan have nowhere to hide.
3 1. Super Registry Browser (you can easily see different results from Windows Registry by analyzing the registry files yourself).
32. System information (view detailed system information, including hardware, software, Windows updates, * * * folders, etc. )
33. System report (save all information of the system with one click, including software, network, services, drivers, system information and startup items. You can share this information with your Daniel friends to help you analyze whether there are security risks in your system.
34. Repair the network (LSP)(LSP has always been an important hiding place for many viruses and Trojans. Deleting these viruses directly will make your system network unusable, so you need to use this function to repair your network, and it also provides the functions of backing up LSP and restoring LSP.
35. system physical examination (system physical examination can check the important parts of your system, so that users can know which parts of their system have problems and which parts need improvement and correction. Regular systematic physical examination is as important as physical examination)
36. Super copy (you can copy any locked file or hidden file, even if there is driver protection, you can't escape the result of being copied by us. Don't use it to do bad things)
37. Boot report (it can tell you when to boot, report how many programs, services and drivers are loaded after booting, and can quantitatively display the list of programs loaded when booting. )
38. Automatic backup (Since the first operation, the software has automatically backed up your LSP, MBR and Hosts files. If the system breaks down at any time, these backed-up data can save your system from danger.