Jump to content

siliconman01

Experienced Members
  • Posts

    1,114
  • Joined

  • Last visited

Posts posted by siliconman01

  1. 9 hours ago, Winapp2.ini said:

    This change was made across all modules under the assumption that most people would usually want to download the latest. The default download setting now matches whether or not you have an internet connection.

    I actually just had the realization that this has likely had the affect of also inverting any commandline args for downloading (outside the download module) as I typed this response, so I've reverted the change on the development branch. You can find an executable with the behavior you want here: https://github.com/MoscaDotTo/Winapp2/blob/Branch1/winapp2ool/bin/Debug/winapp2ool.exe

    I'd also like some feedback on whether or not the non-ccleaner setting should be shown or if it should be behind a commandline arg (eg winapp2ool -ncc) which would set winapp2ool to non-ccleaner mode. The user facing change here would be that all the separate menu options for the non-ccleaner version would no longer be shown and the winapp2.ini options would select the appropriate file for your current mode. If for some reason someone wanted to still use the combined mode, I could leave support in for that through some other arg, but I would imagine there are not many people frequently interacting with both copies at the same time.

    In the near future I'm hoping to extend the commandline arg handling to better enable people to use winapp2ool however they want in a scripted fashion, which should hopefully eliminate the need for potentially confusing menu setups like this.

     

    IMO, the non-cleaner settings should not be displayed.  This provides an opportunity for a new user to make a mistake and potentially harm their system.  Winapp2ool-ncc command line activation sounds like a great idea.

  2. 40 minutes ago, APMichael said:

    Did you disable "Download" (2. Toggle Download)? It is now enabled by default and therefore Trim ignores your local winapp2.ini file.

    No, I did not.  Disabling it did do the trick.  Can we set the default on 2 back to Disabled.  This extra step to perform a TRIM is not at all self intuitive. 

  3. 10 hours ago, Winapp2.ini said:

    There is a major problem with the TRIM function in this version.  It does not honor SECTION=.  It trims out all the modules with SECTION=

    Example of valid but trimmed out module on my system:

    [8GadgetPack Windows 8/10 Language *]
    Section=US English Language
    Detect=HKCU\Software\8GadgetPack
    Default=False
    Warning=This deletes all languages EXCEPT the United States English language.
    FileKey1=%SystemDrive%\Program Files (x86)\Windows Sidebar\*|*.*|REMOVESELF
    FileKey2=%SystemDrive%\Program Files\Windows Sidebar\*|*.*|REMOVESELF
    ExcludeKey1=FILE|%SystemDrive%\Program Files (x86)\Windows Sidebar\8GadgetPack\|*.*
    ExcludeKey2=FILE|%SystemDrive%\Program Files (x86)\Windows Sidebar\en-us\|*.*
    ExcludeKey3=FILE|%SystemDrive%\Program Files (x86)\Windows Sidebar\Gadgets\|*.*
    ExcludeKey4=FILE|%SystemDrive%\Program Files (x86)\Windows Sidebar\Shared Gadgets\|*.*
    ExcludeKey5=FILE|%SystemDrive%\Program Files\Windows Sidebar\8GadgetPack\|*.*
    ExcludeKey6=FILE|%SystemDrive%\Program Files\Windows Sidebar\en-us\|*.*
    ExcludeKey7=FILE|%SystemDrive%\Program Files\Windows Sidebar\Gadgets\|*.*
    ExcludeKey8=FILE|%SystemDrive%\Program Files\Windows Sidebar\Shared Gadgets\|*.*

     

  4. Modified Entry:  [Extensions Databases *]

    This entry is causing problems with False Detections with the Malwarebytes Browser Extension for Chrome.  Reference the links below in Malwarebytes forum

    https://forums.malwarebytes.com/topic/241965-mbrowserextension-v1036-blocking-crystalmark-website/

    https://forums.malwarebytes.com/topic/241986-mbrowser-extension-v1036-blocking-united-bank-wv-website/

    https://forums.malwarebytes.com/topic/241942-browser-extension-v1036-blocking-cnn-videos/

    In the code, I commented out the lines associated with Chrome and the False Positives by the Malwarebytes Browser Extension for Chrome ceased on my primary computer system.  

     

    [Extensions Databases *]
    LangSecRef=3029
    Detect1=HKCU\Software\7Star\7Star
    Detect2=HKCU\Software\360Browser\Browser
    Detect3=HKCU\Software\Amigo
    Detect4=HKCU\Software\BraveSoftware\Brave-Browser
    Detect5=HKCU\Software\CentBrowser
    Detect6=HKCU\Software\ChromePlus
    Detect7=HKCU\Software\Chromium\PreferenceMACs
    Detect8=HKCU\Software\CocCoc\Browser
    Detect9=HKCU\Software\Comodo\Dragon
    Detect10=HKCU\Software\Coowon\Coowon
    Detect11=HKCU\Software\Epic Privacy Browser
    Detect12=HKCU\Software\Flock
    Detect13=HKCU\Software\Iridium
    Detect14=HKCU\Software\Opera Software
    Detect15=HKCU\Software\RockMelt
    Detect16=HKCU\Software\Slimjet
    Detect17=HKCU\Software\Superbird
    Detect18=HKCU\Software\Torch
    Detect19=HKCU\Software\Vivaldi
    Detect20=HKCU\Software\Yandex\YandexBrowser
    DetectFile=%AppData%\brave
    ;DetectFile2=%LocalAppData%\Google\Chrome*
    Default=False
    FileKey1=%AppData%\brave\IndexedDB|*.*|RECURSE
    FileKey2=%AppData%\Opera Software\Opera*\IndexedDB|*.*|RECURSE
    FileKey3=%LocalAppData%\7Star\7Star\User Data\*\IndexedDB|*.*|RECURSE
    FileKey4=%LocalAppData%\360Browser\Browser\User Data\*\IndexedDB|*.*|RECURSE
    FileKey5=%LocalAppData%\Amigo\User Data\*\IndexedDB|*.*|RECURSE
    FileKey6=%LocalAppData%\BraveSoftware\Brave-Browser\User Data\*\IndexedDB|*.*|RECURSE
    FileKey7=%LocalAppData%\CentBrowser\User Data\*\IndexedDB|*.*|RECURSE
    FileKey8=%LocalAppData%\Chromium\User Data\*\IndexedDB|*.*|RECURSE
    FileKey9=%LocalAppData%\CocCoc\Browser\User Data\*\IndexedDB|*.*|RECURSE
    FileKey10=%LocalAppData%\Comodo\Dragon\User Data\*\IndexedDB|*.*|RECURSE
    FileKey11=%LocalAppData%\Coowon\Coowon\User Data\*\IndexedDB|*.*|RECURSE
    FileKey12=%LocalAppData%\Epic Privacy Browser\User Data\*\IndexedDB|*.*|RECURSE
    FileKey13=%LocalAppData%\Flock\User Data\*\IndexedDB|*.*|RECURSE
    ;FileKey14=%LocalAppData%\Google\Chrome*\User Data\*\IndexedDB|*.*|RECURSE
    FileKey14=%LocalAppData%\Iridium\User Data\*\IndexedDB|*.*|RECURSE
    FileKey15=%LocalAppData%\MapleStudio\ChromePlus\User Data\*\IndexedDB|*.*|RECURSE
    FileKey16=%LocalAppData%\RockMelt\User Data\*\IndexedDB|*.*|RECURSE
    FileKey17=%LocalAppData%\Slimjet\User Data\*\IndexedDB|*.*|RECURSE
    FileKey18=%LocalAppData%\Superbird\User Data\*\IndexedDB|*.*|RECURSE
    FileKey19=%LocalAppData%\Torch\User Data\*\IndexedDB|*.*|RECURSE
    FileKey20=%LocalAppData%\Vivaldi\User Data\*\IndexedDB|*.*|RECURSE
    FileKey21=%LocalAppData%\Yandex\YandexBrowser\User Data\*\IndexedDB|*.*|RECURSE

    These are the files that Extensions Database is deleting and causing the False Positives.

     

    ExtensionDataBases.png

  5. Modified entry:  [AMD/ATI *]

    Added:  FileKey7=%ProgramFiles%\AMD\CIM\Log|*.log

    [AMD/ATI *]
    LangSecRef=3024
    Detect1=HKLM\Software\AMD
    Detect2=HKLM\Software\ATI
    Detect3=HKLM\Software\ATI Technologies
    DetectFile=%ProgramFiles%\ATI Technologies\ATI.ACE
    Default=False
    FileKey1=%CommonAppData%\AMD\Fuel|*.txt
    FileKey2=%CommonAppData%\AMD\KDB|*.log
    FileKey3=%LocalAppData%\AMD\Fuel|ClientProxyLog*.*
    FileKey4=%LocalAppData%\AMD\GLCache|*.*|RECURSE
    FileKey5=%LocalAppData%\ATI\ACE|*.txt
    FileKey6=%ProgramFiles%\AMD\amdkmpfd|*.*|REMOVESELF
    FileKey7=%ProgramFiles%\AMD\CIM\Log|*.log
    FileKey8=%ProgramFiles%\AMD\OverDrive|*.log
    FileKey9=%ProgramFiles%\ATI Technologies|*.log|RECURSE
    FileKey10=%ProgramFiles%\ATI Technologies|cccutil64.txt
    FileKey11=%ProgramFiles%\ATI\CIM\Reports|*.*
    FileKey12=%SystemDrive%\AMD|*.*|REMOVESELF
    FileKey13=%SystemDrive%\ATI|*.*|REMOVESELF
    FileKey14=%WinDir%\System32|CCCInstall*.log
    FileKey15=%WinDir%\SysWOW64|CCCInstall*.log

     

  6. Modified entry:   [Dell Logs *]

    Added:  FileKey14=%LocalAppData%\Dell\DellMobileConnect|*.log

    [Dell Logs *]
    LangSecRef=3024
    Detect1=HKLM\Software\Dell\MUP
    Detect2=HKLM\Software\Dell\UpdateService
    Detect3=HKLM\Software\PC-Doctor
    DetectFile1=%AppData%\Creative\DELL Webcam Center
    DetectFile2=%CommonAppData%\Dell
    DetectFile3=%LocalAppData%\Dell
    DetectFile4=%LocalAppData%\SupportSoft\DellSupportCenter
    DetectFile5=%ProgramFiles%\Dell*
    Default=False
    FileKey1=%AppData%\Creative\DELL Webcam Center|MO_Log.txt
    FileKey2=%AppData%\PCDr\*\Logs|*.*
    FileKey3=%CommonAppData%\Dell\*\Log|*.*
    FileKey4=%CommonAppData%\Dell\*\Logs|*.*
    FileKey5=%CommonAppData%\Dell\Drivers\*|*.tmp
    FileKey6=%CommonAppData%\Dell\Update|*.txt
    FileKey7=%CommonAppData%\Dell\UpdateService\Clients\Update|*.log
    FileKey8=%CommonAppData%\PCDr\*\Cache|*.xml
    FileKey9=%CommonAppData%\PCDr\*\Cache\archives|*.*|RECURSE
    FileKey10=%CommonAppData%\PCDr\*\Cache\BUMA|*.*
    FileKey11=%CommonAppData%\PCDr\*\Cache\DriverScan|*.*
    FileKey12=%CommonAppData%\PCDr\*\Logs|*.log
    FileKey13=%LocalAppData%\Dell\*\Log|*.*
    FileKey14=%LocalAppData%\Dell\DellMobileConnect|*.log
    FileKey15=%LocalAppData%\SupportSoft\DellSupportCenter\*\state\logs|*.*
    FileKey16=%ProgramFiles%\Dell*|*.log|RECURSE

     

  7. 7 hours ago, SMalik said:

    New Entry

    System should be restarted after wiping these caches.

    Works well in Windows Safe Mode.

    [Windows Start Cache *]
    DetectOS=10.0|
    LangSecRef=3025
    Detect=HKCU\Software\Microsoft\Windows
    Default=False
    FileKey1=%LocalAppData%\Microsoft\Windows\Caches|*.*|RECURSE
    FileKey2=%CommonAppData%\Microsoft\Windows\Caches|*.*|RECURSE
    FileKey3=%WinDir%\ServiceProfiles\LocalService\AppData\Local\Microsoft\Windows\Caches|*.*|RECURSE

    Sounds more like a candidate for Winapp3.ini

  8. 7 hours ago, SMalik said:

    Here is an entry that I use. It wipes locally stored user names and passwords. I think we should add it, maybe with a warning.

    [Credentials *]
    LangSecRef=3025
    Detect=HKCU\Software\Microsoft\Windows
    Default=False
    FileKey1=%LocalAppData%\Microsoft\Credentials|*.*|RECURSE
    FileKey2=%AppData%\Microsoft\Credentials|*.*|RECURSE
    FileKey3=%WinDir%\ServiceProfiles\LocalService\AppData\Local\Microsoft\Credentials|*.*|RECURSE
    FileKey4=%WinDir%\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Credentials|*.*|RECURSE

    What is the impact of deleting the files above?  Sounds a bit risky to me.   Winapp3.ini ??

  9. 12 hours ago, SMalik said:

    Revised Entries

    Changed DetectOS=6.2| to DetectOS=|6.2

    [ScreenShot Index *]
    DetectOS=|6.2
    LangSecRef=3025
    Detect=HKCU\Software\Microsoft\Windows
    Default=False
    Warning=This resets screenshot naming back to "Screenshot (1).png".
    RegKey1=HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer|ScreenshotIndex

    [Sharing MFU *]
    DetectOS=|6.2
    LangSecRef=3025
    Detect=HKCU\Software\Microsoft\Windows
    Default=False
    Warning=This will remove the frequently shared list. This does not remove the apps listed under sharing.
    RegKey1=HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\SharingMFU

    These changes prevent [ScreenShot Index *] and [Sharing MFU *] from displaying on Windows 10x64 Pro.  

  10. 12 hours ago, SMalik said:

    Revised Entry

    Added DetectOS=|6.1

    [Action Center *]
    DetectOS=|6.1
    LangSecRef=3025
    Detect=HKCU\Software\Microsoft\Windows
    Default=False
    FileKey1=%LocalAppData%\Microsoft\Windows\ActionCenterCache|*.*|RECURSE
    RegKey1=HKCU\Software\Microsoft\Windows\CurrentVersion\Action Center\Providers\EventLog
    RegKey2=HKCU\Software\Microsoft\Windows\CurrentVersion\Security and Maintenance\Providers\EventLog

    This change prevents [Action Center *] from showing up on Windows 10x64 Pro

     

    ActionCenterModified.png

    ActionCenterNotModified.png

  11. I suggest that the following be moved to Winapp3.ini.  I do not think most users of Winapp2.ini want it to reset all the web page icons in Chrome and/or Edge.   And it can cause users to have to do their own investigating as to why CCleaner is clearing out these icons....should they forget to uncheck these items.  Plus if you are like me and assist less "computer literate" users in why and how to use CCleaner with Winapp2.ini, it takes a personal explanation as to why these should be unchecked when Winapp2.ini is installed/updated.  

    [Bookmark Icons *]

    [Microsoft Edge Favorites Icons *]

  12. 18 hours ago, APMichael said:

    Question:

    Piriform has removed the font cache entry from CCleaner because it could cause a boot problem (if fast startup is enabled). Should we add the FileKeys of this entry to Winapp2.ini?

    
    [Font Cache]
    FileKey1=%WinDir%\System32|FNTCACHE.DAT
    FileKey2=%LocalAppData%|GDIPFONTCACHEV1.DAT
    FileKey3=%windir%\ServiceProfiles\LocalService\AppData\Local|FontCache*.dat

    It seems that FileKey1 is causing the problem, so we could remove it: https://forum.piriform.com/topic/52857-version-540/?tab=comments#comment-300971

    So you are suggesting that the code be....which looks good to me for Winapp2.ini.  It does look like there is a "permissions" issue, however, that prevents CCleaner from actually cleaning out these files.  

    [Font Cache *]
    FileKey2=%LocalAppData%|GDIPFONTCACHEV1.DAT
    FileKey3=%windir%\ServiceProfiles\LocalService\AppData\Local|FontCache*.dat
  13. 17 hours ago, APMichael said:

    Thank you for your modified entry.

    Wouldn't it be possible to use "log*.txt"? Or are there any important "log*.txt" files?

    Yes, it does appear that "log*.txt" would work.  The files "NvFBCPlugin|logError.txt, LogNvFBCPlugin.txt, LogPluginError.txt" are the only files that show up in this folder on my systems.  However, I do not use a LOT of the capabilities of the Nvidia software because I am not a gamer.  So I played it "safe" by cleaning only the files listed.  

  14. Modified entry:  [Nvidia *]

    Added FileKey6 and FileKey7

    FileKey6=%CommonAppData%\NVIDIA Corporation\NV_Cache|*.*
    FileKey7=%CommonAppData%\NVIDIA Corporation\NvFBCPlugin|logError.txt;LogNvFBCPlugin.txt;LogPluginError.txt

    [NVIDIA *]
    LangSecRef=3024
    Detect=HKLM\Software\NVIDIA Corporation
    Default=False
    FileKey1=%AppData%\NVIDIA\*Cache|*.*|RECURSE
    FileKey2=%CommonAppData%\NVIDIA|*.log;*.log_backup1;Resource.old;*.bak|RECURSE
    FileKey3=%CommonAppData%\NVIDIA Corporation|*.log;*bak;*log.*;*.old;*.stat|RECURSE
    FileKey4=%CommonAppData%\NVIDIA Corporation\Downloader|*.*|RECURSE
    FileKey5=%CommonAppData%\NVIDIA Corporation\GeForce Experience\Update|*.*|RECURSE
    FileKey6=%CommonAppData%\NVIDIA Corporation\NV_Cache|*.*
    FileKey7=%CommonAppData%\NVIDIA Corporation\NvFBCPlugin|logError.txt;LogNvFBCPlugin.txt;LogPluginError.txt
    FileKey8=%CommonAppData%\NVIDIA\NvBackend\Updatus\DownloadManager|*.*
    FileKey9=%CommonAppData%\NVIDIA\Updatus\DownloadManager|*.*
    FileKey10=%LocalAppData%\NVIDIA Corporation|*.log;*.bak;*.old|RECURSE
    FileKey11=%LocalAppData%\NVIDIA Corporation\*\CefCache|Cookies;Cookies-journal;QuotaManager;QuotaManager-journal
    FileKey12=%LocalAppData%\NVIDIA Corporation\*\CefCache\*Cache|*.*|RECURSE
    FileKey13=%LocalAppData%\NVIDIA\NvBackend|*.log;*.bak
    FileKey14=%LocalAppData%\VirtualStore\Program Files*\NVIDIA Corporation\NetworkAccessManager\Apache Group\Apache2\logs|*.*
    FileKey15=%LocalAppData%\VirtualStore\ProgramData\NVIDIA|*.log;*.log_backup1;Resource.old;*.bak|RECURSE
    FileKey16=%LocalAppData%\VirtualStore\ProgramData\NVIDIA Corporation|*.log;*bak;*log.*;*.old;*.stat|RECURSE
    FileKey17=%LocalAppData%\VirtualStore\ProgramData\NVIDIA Corporation\Downloader|*.*|RECURSE
    FileKey18=%LocalAppData%\VirtualStore\ProgramData\NVIDIA Corporation\GeForce Experience\Update|*.*|RECURSE
    FileKey19=%LocalAppData%\VirtualStore\ProgramData\NVIDIA Corporation\NetService|*.*|RECURSE
    FileKey20=%LocalAppData%\VirtualStore\ProgramData\NVIDIA\NvBackend\Updatus\DownloadManager|*.*
    FileKey21=%LocalAppData%\VirtualStore\ProgramData\NVIDIA\Updatus\DownloadManager|*.*
    FileKey22=%ProgramFiles%\NVIDIA Corporation\NetworkAccessManager\Apache Group\Apache2\logs|*.*
    FileKey23=%SystemDrive%\NvidiaLogging\GFExperience|GridClientLog.log*|RECURSE

     

  15. 2 hours ago, Winapp2.ini said:

    the tools folder and its now-deprecated contents are also removed from the repo, with the exception of the winappool executable and its version file for watershedding.

    Thanks very much for all your work and expertise on this extremely useful tool.  Happy holidays!:rolleyes::)

  16. 7 hours ago, SMalik said:

    This should be removed.

    [MSConfig *]
    LangSecRef=3025
    Detect=HKLM\Software\Microsoft\Shared Tools\MSConfig
    Default=False
    RegKey1=HKLM\Software\Microsoft\Shared Tools\MSConfig\ExpandFrom
    RegKey2=HKLM\Software\Microsoft\Shared Tools\MSConfig\ExpandTo
    RegKey3=HKLM\Software\Microsoft\Windows\CurrentVersion\Run|MSConfig

    Why should it be removed?  The MSConfig folder quite often gets left hanging empty when adding/removing programs.  

  17. 13 hours ago, SMalik said:

    Revised Entry

    Added: FileKey2

    [Direct3D Shader Cache *]
    LangSecRef=3025
    Detect=HKCU\Software\Microsoft\Windows
    Default=False
    FileKey1=%LocalAppData%\D3DSCache|*.*|RECURSE
    FileKey2=%WinDir%\System32\config\systemprofile\AppData\Local\D3DSCache|*.*|RECURSE

    Nix my post. -_-

  18. 2 hours ago, SMalik said:

    Revised Entry

    Changed LangSecRef from 3021 to 3023

    [CyberLink Media Cache *]
    LangSecRef=3023
    Detect=HKCU\Software\CyberLink
    Default=False
    FileKey1=%AppData%\CyberLink\MediaCache|*.*|RECURSE
    RegKey1=HKCU\Software\CyberLink\DSSharedMediaInfo\SharedInfoCache
    RegKey2=HKCU\Software\CyberLink\MediaCache\Data4
    RegKey3=HKCU\Software\CyberLink\MediaCache\Thumbnail4
    RegKey4=HKCU\Software\CyberLink\MediaCache5\Data5
    RegKey5=HKCU\Software\CyberLink\MediaCache5\Thumbnail5

    Should change the following Cyberlink items to " LangSecRef from 3021 to 3023", eh??

    [CyberLink Install Files *]

    [CyberLink Downloader *]

    [CyberLink Crash Files *]

     

     

×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.