Product Reviews

Never Lose a File Again

Undelete 2.0 protects data on Windows 2000 systems. 

Why would you want a file undelete utility when all of Windows' current versions already include the Recycle Bin? Because Executive Software's Undelete 2.0 does a better job than the Recycle Bin, and has a more flexible interface.

Among the features you'll find in Undelete:

  • Monitoring for file deletion from the command prompt, File Manager, and other programs that the Recycle Bin sometimes misses.

  • Restoration of files even after the Undelete Recovery Bin has been emptied.

  • Over-the-network recovery of files on other computers (server version only).
  • Emergency recovery by running Undelete directly from CD-ROM.

Undelete installs quickly using Windows Install technology, and replaces Win2K's Recycle Bin with its own Recovery Bin. You can open the Recovery Bin for a graphical look at deleted files, or use command-line utilities to work with contents. Recovering a deleted file is as simple as right-clicking on it and choosing Recover. You can choose to put the file back where it came from, or move it to another location for further inspection.

Undelete 2.0 replaces Win2K's Recycle Bin with its own Recovery Bin. (Click image to view larger version.)

Undelete also supports a search of the entire Recovery Bin for a particular file--useful when you remember a name or partial name but don't remember where the file was located. And, file recovery is fast and foolproof.

To download a trial version of Undelete 2.0 or order an online copy, visit Executive Software's Web site.

About the Author

Mike Gunderloy, MCSE, MCSD, MCDBA, is a former MCP columnist and the author of numerous development books.


  • How To Remove the Windows 10 Action Center

    Microsoft meant well with Windows 10's Action Center, but the constant pop-up notifications are often more annoying than helpful. Here's how to get rid of them.

  • Google IDs on Azure Active Directory B2B Service Now at 'General Availability'

    Microsoft announced on Wednesday that users of the Google identity and access service can use their personal log-in IDs with the Azure Active Directory B2B service to access resources as "guests."

  • Top 4 Overlooked Features of a Data Backup Strategy

    When it comes to implementing an airtight backup-and-recovery plan, these are the four must-have features that many enterprises nevertheless tend to forget.

  • Microsoft Bolsters Kubernetes with Azure Confidential Computing

    Microsoft on Tuesday announced various developments concerning the use of Kubernetes, an open source container orchestration solution fostered by Google.

comments powered by Disqus

Office 365 Watch

Sign up for our newsletter.

Terms and Privacy Policy consent

I agree to this site's Privacy Policy.