Jump to content

siliconman01

Experienced Members
  • Posts

    1,111
  • Joined

  • Last visited

Everything posted by siliconman01

  1. The code below needs a stronger detect string for ResumeMaker. The code shows up on systems that do not have ResumeMaker installed [ResumeMaker Logs*] LangSecRef=3021 Detect=HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders Default=False FileKey1=%CommonAppData%\Individual Software\ResumeMaker\R12|*.log
  2. Modified: [MS Word 2007 Document Building Blocks*] to [MS Word 2007/10/13 Document Building Blocks*] This code also applies to MS Office 2010 and 2013. [MS Word 2007/10/13 Document Building Blocks*] LangSecRef=3021 DetectFile=%AppData%\Microsoft\Document Building Blocks Default=False FileKey1=%AppData%\Microsoft\Document Building Blocks|*.*|RECURSE
  3. Corrected/Modified Entry [Belarc*]: Discovered that removing file Install.log damages the program uninstaller and it will not uninstall. Removed FileKey1 and FileKey5 from the post above.
  4. Modified Entry BelArc*: Belarc developers changed the name on one of its folders on the newest version of Belarc. Added FileKey5/6/7/8
  5. If time permits, how about an interium release of Winapp2.ini to include missed code of the last release and new code? Might help solidify the release of Winapp2.ini when the next version of CCleaner is issued.
  6. I find this "Take Ownership" context switch quite helpful in cases such as what you are experiencing. http://www.eightforu...indows-8-a.html IE10 settings such as in the attached picture will prevent such buildups of junk files for IE10
  7. And try: Control Panel>Internet Options>General Tab>Browsing history>Delete hot button. On the Delete Browsing History page, check mark or uncheck what you want the delete action to do or not do and then click on Delete. As suggestion: Uncheck "Preserve Favorites website data" Check "Temporary Internet files and website files" Check "Cookies and website data" Check "History" The last three items are at your choice. Repeat/Do this for every user account on the laptop. In other words sign on under each user account and perform the above.
  8. Modified Entry: [Quicken Logs*] Added FileKey4
  9. DEFINITELY do not include FileKey1=%ProgramFiles%\Intel|*.*|REMOVESELF. Removing this will damage a lot of systems with various Intel components used. There is already an Intel entry to take care of the FileKey1=%SystemDrive%\Intel*|*.*|REMOVESELF [intel Installation Logs*] LangSecRef=3024 Detect1=HKCU\Software\Intel Detect2=HKLM\Software\Intel Default=False FileKey1=%SystemDrive%\Intel*|*.*|REMOVESELF FileKey2=%UserProfile%\Intel\Logs|*log Also there is a NetGenie entry that can be modified to take care of the NetGenie entry above. Suggested Modification [NETGEAR Genie (logs)*] LangSecRef=3024 Detect1=HKLM\Software\NETGEAR Genie Default=False FileKey1=%LocalAppData%\NETGEARGenie\log|*.log to [NETGEAR Genie*] LangSecRef=3024 Detect=HKLM\Software\NETGEAR Genie Default=False FileKey1=%LocalAppData%\NETGEARGenie|*.txt FileKey2=%LocalAppData%\NETGEARGenie\log|*.log FileKey3=%LocalAppData%\NETGEARGenie\update_temp|*.*
  10. Thanks much. Hopefully the developers can resolve the issue. I will be more than happy to supply any further info and/or run any tests in an effort to identify the problem(s).
  11. Sent you a pm with the debug log attached. System is Windows 8 x64 Pro.
  12. Yes, I get the warning message on all machines when I check mark it.
  13. I turned on UAC and tried....no luck. Tried CCleaner "Run as Administrator", etc....no luck. Are you running with "elevated administrator" or with the unelevated administrator account? I'm running the unelevated.
  14. Yes, I can clear them manually. Always have been able to. The .bat file at the link below will clear all of the event viewer logs on Windows 7 and 8 (32/64 bit). It does have to be "Run as Administrator".....at least it does on my systems. I run with UAC turned off. http://www.sevenforu...lick-clear.html
  15. No matter what I do on the Windows 7 and/or Windows 8 computers, it does not clean out the Event logs. I am running under Administrator privileges on my User account on all systems. I even tried CCleaner with my Windows 7 system booted into Safe Mode....still no cleaning of the Event Viewer logs. And I'm showing event log entries as far back as 09-Jan-2013.
  16. JFI, the Symantec program SYMNRA.exe does not actually do any repair of Norton products. When a Norton user has a problem and reports it to Symantec, the techs often ask the user to download/install and then run SYMNRA.exe. The user is then supposed to regenerate the "problem". SymNRA.exe collects, builds and stores log files to help the techs identify what is going on. That is ALL SymNRA.exe does...is build and store log files. The user then stops SymNRA and uploads the log files to TinyURL into a Norton upload storage area for the techs to recover. So the user is left hanging with log files that can be quite large. The Symantec techs do not give a hoot whether the log files build up or are cleaned off. That's strictly up to the Norton user.
  17. Yes, I agree. I'm wondering if they need to be handled like Index.dat or set to be deleted on next reboot? This feature does not work on any of my computers which are running either Windows 7 x86 Pro or Windows 8 x64 Pro
  18. This new entry was missed ?? New Entry: [Amazon.com Software Downloads (Logs)*] The logs are created when you purchase and download software from Amazon.com. [Amazon.com Software Downloads (Logs)*] LangSecRef=3024 DetectFile=%Documents%\Amazon Downloader Logs Default=False FileKey1=%Documents%\Amazon Downloader Logs\|*.*|REMOVESELF
  19. This new entry was missed ?? New Entry: [Norton Error Repair Tool (Logs)*] This removes logs that are generated by Symantec's security products repair tool SymNRA.exe. This tool generates sizeable logs for submission to Symantec when debugging Norton products. [Norton Error Repair Tool (Logs)*] LangSecRef=3024 DetectFile=%Documents%\Symantec Default=False Warning=This removes Error Logs created by Norton's SymNRA log tool used for reporting bugs. FileKey1=%Documents%\Symantec\ErrLogs|*.zip FileKey2=%SystemDrive%\Symlogs|*.*|REMOVESELF
  20. This new entry was missed: New Entry: [TuneUp Utilities (CrashDumps)*] [TuneUp Utilities (CrashDumps)*] LangSecRef=3024 Detect=HKCU\Software\TuneUp Default=False Warning=This removes ALL crash/dump files saved by program TuneUp Utilities. FileKey1=%AppData%\TuneUp Software\TuneUp Utilities\CrashDumps|*.*
  21. This modification was missed: Modified Entry for [TuneUp Utilities Reg Defrag Cleanup*] to include TuneUp Utilities 2014. Added Detect4 [TuneUp Utilities Reg Defrag Cleanup*] LangSecRef=3024 Detect1=HKCU\Software\TuneUp\Utilities\10.0 Detect2=HKCU\Software\TuneUp\Utilities\12.0 Detect3=HKCU\Software\TuneUp\Utilities\13.0 Detect4=HKCU\Software\TuneUp\Utilities\14.0 Default=False FileKey1=%LocalAppData%\Microsoft\Windows|USRCLASS.DAT_tureg_new.LOG*;USRCLASS.DAT_tureg_old FileKey2=%SystemDrive%\Boot|BCD_tureg_new.LOG*;BCD_tureg_old FileKey3=%SystemDrive%\Documents and Settings\LocalService|NTUSER.DAT_tureg_new.LOG*;NTUSER.DAT_tureg_old FileKey4=%SystemDrive%\Documents and Settings\LocalService.NT*|NTUSER.DAT_tureg_new.LOG*;NTUSER.DAT_tureg_old FileKey5=%SystemDrive%\Documents and Settings\NetworkService|NTUSER.DAT_tureg_new.LOG*;NTUSER.DAT_tureg_old FileKey6=%SystemDrive%\Documents and Settings\NetworkService.NT*|NTUSER.DAT_tureg_new.LOG*;NTUSER.DAT_tureg_old FileKey7=%UserProfile%|NTUSER.DAT_tureg_new.LOG*;NTUSER.DAT_tureg_old FileKey8=%WinDir%\ServiceProfiles\LocalService|NTUSER.DAT_tureg_new.LOG*;NTUSER.DAT_tureg_old FileKey9=%WinDir%\ServiceProfiles\NetworkService|NTUSER.DAT_tureg_new.LOG*;NTUSER.DAT_tureg_old FileKey10=%WinDir%\System32\config|COMPONENTS_tureg_new.LOG*;COMPONENTS_tureg_old;DEFAULT_tureg_new.LOG*;DEFAULT_tureg_old;SAM_tureg_new.LOG*;SAM_tureg_old;SECURITY_tureg_new.LOG*;SECURITY_tureg_old;SOFTWARE_tureg_new.LOG*;SOFTWARE_tureg_old;SYSTEM_tureg_new.LOG*;SYSTEM_tureg_old;DRIVERS_tureg_new.LOG*;DRIVERS_tureg_old
  22. This applies to Windows 7 x86 Pro and Windows 8 x64 Pro and CCleaner V4.05 and V4.06. The Advanced>Windows Event Log does not removed any of the Event Viewer logs. I suspect that this is a permissions problem. A reboot does not remove them either. The Event Viewer shows hundreds of logs on my system and CCleaner finds 0 logs on Analyze and Clean
  23. Modified Entry [jv16 PowerTools Registry Compact Backups*]: Added DetectFile6 for jv16 PowerTools 2014 [jv16 PowerTools Registry Compact Backups*] LangSecRef=3024 DetectFile1=%ProgramFiles%\jv16 PowerTools 2009\jv16PT.exe DetectFile2=%ProgramFiles%\jv16 PowerTools 2010\jv16PT.exe DetectFile3=%ProgramFiles%\jv16 PowerTools 2011\jv16PT.exe DetectFile4=%ProgramFiles%\jv16 PowerTools 2012\jv16PT.exe DetectFile5=%ProgramFiles%\jv16 PowerTools 2013\jv16PT.exe DetectFile6=%ProgramFiles%\jv16 PowerTools 2014\jv16PT.exe Default=False Warning=This removes the registry hive backup files generated by jv16 PowerTools during a registry compaction. These files are not needed once the compaction is successfully completed. They can be safely deleted. NOTE that the system must be rebooted following a registry compaction completion in order for jv16 to release these files for deletion. FileKey1=%LocalAppData%\Microsoft\Windows|UsrClass.dat.jv16pt* FileKey2=%SystemDrive%\Documents and Settings\NetworkService|NTUSER.DAT.jv16pt* FileKey3=%SystemDrive%\Documents and Settings\LocalService|NTUSER.DAT.jv16pt* FileKey4=%SystemDrive%\Documents and Settings\NetworkService.NT*|NTUSER.DAT.jv16pt* FileKey5=%SystemDrive%\Documents and Settings\LocalService.NT*|NTUSER.DAT.jv16pt* FileKey6=%UserProfile%|NTUSER.DAT.jv16pt* FileKey7=%WinDir%\System32\config|Default.jv16pt*;software.jv16pt*;system.jv16pt*;SAM.jv16pt*;COMPONENTS.jv16pt* FileKey8=%WinDir%\ServiceProfiles\LocalService|NTUSER.DAT.jv16pt* FileKey9=%WinDir%\ServiceProfiles\NetworkService|NTUSER.DAT.jv16pt*
  24. New Entry: [snagit 11 Local Dumps (.dmp)*] [snagit 11 Local Dumps (.dmp)*] LangSecRef=3024 Detect=HKCU\Software\TechSmith\SnagIt\11 Default=False Warning=This will delete the local dump files (.dmp) automatically created SnagIt 11 if it encounters an error/crash. FileKey1=%LocalAppData%\TechSmith\Snagit\CrashDumps\|*.*
×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.