Feeds

PC tune-up software: does it really work?

Part Two: Windows Vista

  • alert
  • submit to reddit

Choosing a cloud hosting partner with confidence

Conclusion

PC Tools told us the market for these “utility tools” has suffered a slight decline in recent years, due to basic tools being increasingly bundled with operating systems. The value of premium tools can be difficult to see, since we found the one-button optimisation wizards and registry fixing functions didn’t improvement performance significantly - at least, not without affecting functionality.

PC speed-up software

We experienced two crashes when testing with TuneUp in Vista, and none with the other apps

You will, however, get a boost by using the more detailed tools to switch off unused services and forgotten programs, although this is one way of reducing functionality. When we were testing the apps on Windows XP, we found we could shave a good 18 seconds off our startup time with every tune-up application on test by laboriously turning off unused programs and services, but with Vista this improved by 44 seconds after we selected 14 programs and services that we weren’t using any more, or had never used.

Meddling with the registry and Windows services is a tricky game, with Desktop Maestro in particular coming a cropper several times by pushing performance in the wrong direction. The other applications represent less of a risk and, besides, you can always restore an old registry if things go wrong.

Ultimately, we can say if you’re trying to reduce your Windows start-up time, extra Ram will help if you don’t have a lot - 512MB, say - while tune-up applications may help you find more performance if you have 2GB or more. ®

Verdict: Windows Vista Apps

Tune-up Utilities 2009
Rating 65%
Price £30
More Info Tune-up

CCleaner
Rating 65%
Price Free
More Info CCleaner

PC Tools Desktop Maestro 3
Rating 40%
Price £40
More Info PC Tools

Avanquest Fix-it Utilities 9
Rating 40%
Price £30
More Info Avanquest

Iolo System Mechanic 9
Rating 40%
Price £30
More Info Iolo

Internet Security Threat Report 2014

More from The Register

next story
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Whistling Google: PLEASE! Brussels can only hurt Europe, not us
And Commish is VERY pro-Google. Why should we worry?
Microsoft: Your Linux Docker containers are now OURS to command
New tool lets admins wrangle Linux apps from Windows
Soz, web devs: Google snatches its Wallet off the table
Killing off web service in 3 months... but app-happy bonkers are fine
First in line to order a Nexus 6? AT&T has a BRICK for you
Black Screen of Death plagues early Google-mobe batch
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.