Products ] Services ] Reputable Sources ] Defining Affordable ] Promotions ] Doing Business ] Business-Class ] Feedback ] FAQ ] Search ]
[Technical Support] [Case Resources]


Online Utilities


COVID-19 (Coronavirus) Update:

Logitree is here to help your business get through these difficult times.

Contact a Logitree technician for free assistance with business-critical issues* over the phone and/or Internet, worldwide, for the duration of this pandemic.


Multihomed Route Selector

Does your computer have multiple Internet connections?  Does your Internet traffic get routed through the desired connection?  If not, this utility is a simple solution that allows you to choose the network adapter through which Internet traffic is routed.

  1. Establish all Internet connections
  2. Download the 32-bit or 64-bit Multihomed Route Selector utility, as applicable to your computer's architecture, to a known location
  3. Navigate to that location and right-click on the file named "RouteSelector.exe", then select Properties
  4. Check "Unblock" box or click "Unblock" button as applicable, then click OK
  5. Right-click on the file named "RouteSelector.exe", then select "Run as Administrator" and provide administrative credentials
  6. Depending on your computer's speed, after anywhere from a few seconds to approximately 30 seconds, you will be presented with a list of network adapters and prompted to choose the adapter through which you wish to route Internet traffic.  Once you have identified the desired adapter by its associated information, such as IP address, Description, or DNSName, type the value for the corresponding Index and press Enter.
  7. You can verify that Internet traffic is now routed through this adapter by running a tracert command.

System Requirements:
Live Internet connection, Windows® 7, SP1 or later, PowerShell™ v3.0 or later

Windows Update History

Have you found that when using the built-in interface for reviewing Windows® Updates that have been installed on your computer, you can't export or copy the list?  This utility dumps the history of Windows® Updates into two files in .csv format to the local file system or UNC location of your choice:  one includes those updates that were installed manually and the other includes those updates that were installed automatically.

  1. Download the 32-bit or 64-bit Windows Update History utility, as applicable to your computer's architecture, to a known location
  2. Navigate to that location and right-click on the file named "WindowsUpdateHistory.exe", then select Properties
  3. Check "Unblock" box or click "Unblock" button as applicable, then click OK
  4. Right-click on the file named "WindowsUpdateHistory.exe", then select "Open"
  5. After a few seconds, you will be prompted to provide the path where the .csv files will be saved
  6. You can view the results in a spreadsheet

System Requirements:
Live Internet connection, Windows® 7, SP1 or later, PowerShell™ v3.0 or later

Get Windows Product Key

If your computer is running Windows® 8 or later, and the firmware is UEFI-based, the Windows® Product Key is stored in the motherboard firmware.  If the motherboard fails, the Windows® Product Key is no longer retrievable.  Without having the Windows® Product Key saved elsewhere, you will likely incur the cost of another Windows® operating system license when rebuilding the computer.  This utility allows you to retrieve your Windows® Product Key from computers with UEFI- and BIOS-based firmware alike, for safekeeping.  It also reports the edition and version of the Windows® operating system your computer is running.

  1. Download the 32-bit or 64-bit Get Windows Product Key utility, as applicable to your computer's architecture, to a known location
  2. Navigate to that location and right-click on the file named "GetWindowsProductKey.exe", then select Properties
  3. Check "Unblock" box or click "Unblock" button as applicable, then click OK
  4. Right-click on the file named "GetWindowsProductKey.exe", then select "Open"
  5. Your Windows® Product Key will be displayed in a notepad window

System Requirements:
Live Internet connection, Windows Vista® or later, PowerShell™ v2.0 or later

Analyze E-mail Headers

Have you received a suspicious e-mail?  Take the first step in sleuthing by analyzing its header with this utility.  If there are attached e-mails, it separates the header of the parent e-mail into headers for the parent and each of the attached e-mails, and submits them to mxtoolbox.com for further parsing, one-by-one.

  1. Save the header for the e-mail(s) in question in a text file
  2. Download the 32-bit or 64-bit Analyze E-mail Headers utility, as applicable to your computer's architecture, to a known location
  3. Navigate to that location and right-click on the file named "AnalyzeHeaders.exe", then select Properties
  4. Check "Unblock" box or click "Unblock" button as applicable, then click OK
  5. Right-click on the file named "AnalyzeHeaders.exe", then select "Open"
  6. After a few seconds, you will be prompted to provide the path and filename for the text file you created in step 1
  7. An Internet Explorer window will open, displaying the parsed header results provided by mxtoolbox.com

System Requirements:
Live Internet connection, Windows® 7, SP1 or later, PowerShell™ v3.0 or later
 

Deduplicate Files

Have you ended up with what you suspect are duplicate files?  This utility identifies duplicate files based on their SHA-256 hashes (regardless of differences in filenames) and provides you with options for getting rid of them.

  1. Download the 32-bit or 64-bit File Deduplicator utility, as applicable to your computer's architecture, to a known location
  2. Navigate to that location and right-click on the file named "FileDeduplicator.exe", then select Properties
  3. Check "Unblock" box or click "Unblock" button as applicable, then click OK
  4. Right-click on the file named "FileDeduplicator.exe", then select "Open"
  5. After a short pause, you will be prompted to browse to and select the 1st folder you suspect contains duplicates. A log file detailing all deletions will be created in this folder.
  6. You will be prompted whether you would like to specify a 2nd folder to compare against the first, or just compare the 1st against itself.
  7. If you chose to specify a 2nd folder, you will be prompted to browse to and select the 2nd folder you suspect contains duplicates.
  8. You will be prompted whether you would like to scan the specified folder(s) recursively (as deep as the existing folder structure), or just a single folder deep.
  9. You will be prompted whether you would like to have all duplicates automatically moved to the Recycle Bin or be prompted to move one or the other (or neither) duplicate to the Recycle Bin
  10. You will be prompted whether you would like to delete folders if they are empty after removing duplicate files from them (although these will be permanently deleted, restoring from the Recycle Bin any files that were in these folders will recreate them).

Notes:

  • All deletions are 'soft', meaning the affected files are moved to the Recycle Bin, allowing you to undo the effects of the script by restoring from the Recycle Bin.
  • Log files are created in the format "file-deduplication-log YYYY-MM-DDTHH-mm-SS.txt", and placed in the first folder selected for detection of duplicate files
  • Duplicate shortcuts will not be deleted, as their hashes are inherently different

System Requirements:
Live Internet connection, Windows® 7, SP1 or later, PowerShell™ v3.0 or later 

Keep VPN Alive

Have you found that the redial option in the built-in Windows VPN client falls short of its expectations? This utility allows you to establish the connection and automatically remain connected through thick and thin. You can even put a shortcut to this in your Startup folder to have it establish a connection automatically upon logging on to Windows.

  1. Download the 32-bit or 64-bit Keep VPN Alive utility, as applicable to your computer's architecture, to a known location

  2. Navigate to that location and right-click on the file named "keepVPNalive.exe", then select Properties

  3. Check "Unblock" box or click "Unblock" button as applicable, then click OK
    Right-click on the file named "keepVPNalive.exe", then select "Open"

  4. After a short pause, you will be prompted to enter the ID of the VPN connection to which you would like to connect (these are obtained from the phonebooks of the currently logged-on user as well as the public (shared) phonebook on your computer).

  5. You will be prompted whether you would like to be prompted for credentials or use those of the currently logged-on user.

  6. You will be prompted how long you would like the utility to wait between connection tests.

System Requirements:
Live Internet connection, Windows® 7, SP1 or later, PowerShell™ v3.0 or later 

Authentic PowerShell™ versions can be obtained from microsoft.com:
v2.0
v3.0
v4.0
v5.0
v5.1


Up ]

*Eligibility for business-critical status will be evaluated on a case-by-case basis, in Logitree's sole discretion.  You will have the option of obtaining technical support for issues deemed NOT to be business-critical, which will be billed at Logitree's normal rates.

Logitree invites you to schedule a free initial on-site system analysis.  Your precise needs will be identified, as well as the appropriate solution and its cost.

Contact Information

Telephone
    +1 (888) Logitree
    +1 (949) 240-3570

Mailing Address
     PO Box 3376, Dana Point, CA 92629

E-mail
    Technical Support: ts@logitree.com
    Sales: sales@logitree.com
    Management: maxx@logitree.com
    Customer Service: cs@logitree.com

Please note that if a default e-mail client is not configured for the system you are using, you will not be able to send e-mail to the addresses referenced in this site by clicking on their links.  In this case, you can copy and paste the address into your e-mail client (web-based or otherwise).  If you have no e-mail capabilities whatsoever, you can use this form (secure) to request information or provide feedback. 


©1997-2020, Logitree Inc.
Windows®, Windows Phone®, and Windows Vista® are registered trademarks of Microsoft Corporation in the United States and other countries
PowerShell is a trademark of Microsoft Corporation in the United States and other countries
iOS is a trademark or registered trademark of Cisco in the U.S. and other countries and is used under license by Apple Inc.
Apple®, Mac® and macOS® are registered trademarks of Apple Inc., registered in the United States and other countries
Blackberry®  is a registered trademark of Blacberry Limited in the United States and other countries
Linux® is the registered trademark of Linus Torvalds in the United States and other countries
Android and Chrome OS are trademarks of Google Inc.