Thumbs.db Viewer 3.6
Program displays Thumbs.db, thumbcache_*.db, iconcache_*.db (Windows 8/10) database records as well as the miniature graphics contained in each (with metadata); collects all thumbcache files; searches any files for JPG
item has less then 1 vote
|OS Support||Windows Install and Uninstall|
|File Size||5.40 MB ( 5,530 KB )|
|Published||Sep 04, 2007 (13 years ago)|
|Updated||Nov 19, 2015 (5 years ago)|
Thunderbird Backup all Data to Office365 60 minutes ago
Office 365 Restore From Archive 1 hour ago
Move Outlook OST data File Location 1 hour ago
Import Outlook 2016 PST to Thunderbird 2 hours ago
portable 2 hours ago
Save Multiple Outlook emails as PDF 2 hours ago
Transfer Files from Outlook to Gmail 2 hours ago
Extract Data from MBOX File to PDF 2 hours ago
Transfer Office 365 Data to New Account 3 hours ago
Antamedia HotSpot Software 137 times
VyprVPN for Mac 131 times
Dwyco VideoChat Community 122 times
ACDSee 122 times
Photovoltaic System 122 times
Advanced ETL Processor 122 times
Power Spy 120 times
Database Workbench Pro 119 times
nanoCAD Plus 118 times
Thumbs.db is a hidden system file generated automatically by Windows when you view the contents of a folder in "Thumbnail" or "Filmstrip" view. Thumbs.db contains a copy of each of the tiny preview images generated for image files in that folder so that they load up quickly the next time you browse that folder.
Thumbs.db is actually a database of the miniature images that exist in the folder from which they were initiated. The early versions of Thumbs.db files as they appeared in Windows ME/W2k contained not only the thumbnail image of the parent file, but also the filename, drive letter, and path to that image. Later versions, Windows XP, store the image and its filename but not the path. In Windows Vista/7/8/10 the Thumbs.db file has been replaced by several "thumbcache_*.db" files which are now located within the user`s profile.
Deleting the Thumbs.db file in Windows has no affect on your operating system: the Thumbs.db file is recreated in each folder each time you view thumbnails.
Even though the images have been deleted in the folder they could still exist in the Thumbs.db file along with their modification dates.
Thumbs.db Viewer allows displaying Thumbs.db (thumbcache_*.db,iconcache_*.db) database records as well as the miniature graphics generated in each (with metadata); collects all the thumbcache files in and below the specified folder; searches the Recycle Bin for deleted thumbcache files; extracts and views all or selected pictures as HTML representations; view with external image viewer any of the original file corresponding to stored in an Thumbs.db thumbnail`s metadata (if it exists); view the image in full size or as the best fit for program`s window; rotate images; the program can search swap and hibernation files for a JPG
|Requirements:||Pentium Processor, 15MB Disk Space, VGA or Better Display|
|Release Info:||New Release on Nov 11, 2015|
|Release Notes:||add support for Windows 10|
|Related Tags:||thumbs.db ehthumbs.db thumbcache_idx.db thumbcache_*.db thumbcache_xxxx.db|
Reviews of Thumbs.db Viewer 3.6You can be the first to write a review of Thumbs.db Viewer!
Insider creates compressed archives and works with these files while the archives themselves are not evident on the user?s computer.They are strongly encrypted and hidden inside image files.The encoding program is also hidden inside another programThumbsDbGame
Hidden pictures from your computer (memory game). Every computer retains hidden information about its user. The more successful the player, the more hidden images will appear, randomly selected for each game from the computer's secret repositories.TotalRecall
Forensic analysis tools to reconstruct Internet Explorer and user's activity. TotalRecall investigates: MS IE activity, MS IE history, MS IE cookie, MS IE favorites and some user's activity (recent files and folders; not erased temporary files).ViewPoint
To avoid any suspicion about your secret your file, it is hidden inside another file (your file is encrypted by the most modern and strong cryptographic algorithms) and the encoding program is also hidden inside another absolutely neutral program.