Jump to content

siliconman01

Experienced Members
  • Posts

    1,117
  • Joined

  • Last visited

Posts posted by siliconman01

  1. This new entry was missed ??

     

    New Entry: [Norton Error Repair Tool (Logs)*] This removes logs that are generated by Symantec's security products repair tool SymNRA.exe. This tool generates sizeable logs for submission to Symantec when debugging Norton products.

     

    [Norton Error Repair Tool (Logs)*]
    LangSecRef=3024
    DetectFile=%Documents%\Symantec
    Default=False
    Warning=This removes Error Logs created by Norton's SymNRA log tool used for reporting bugs.
    FileKey1=%Documents%\Symantec\ErrLogs|*.zip
    FileKey2=%SystemDrive%\Symlogs|*.*|REMOVESELF
    

  2. This new entry was missed:

     

    New Entry: [TuneUp Utilities (CrashDumps)*]

     

    [TuneUp Utilities (CrashDumps)*]
    LangSecRef=3024
    Detect=HKCU\Software\TuneUp
    Default=False
    Warning=This removes ALL crash/dump files saved by program TuneUp Utilities.
    FileKey1=%AppData%\TuneUp Software\TuneUp Utilities\CrashDumps|*.*
    

  3. This modification was missed:

     

    Modified Entry for [TuneUp Utilities Reg Defrag Cleanup*] to include TuneUp Utilities 2014. Added Detect4

     

    [TuneUp Utilities Reg Defrag Cleanup*]

    LangSecRef=3024

    Detect1=HKCU\Software\TuneUp\Utilities\10.0

    Detect2=HKCU\Software\TuneUp\Utilities\12.0

    Detect3=HKCU\Software\TuneUp\Utilities\13.0

    Detect4=HKCU\Software\TuneUp\Utilities\14.0

    Default=False

    FileKey1=%LocalAppData%\Microsoft\Windows|USRCLASS.DAT_tureg_new.LOG*;USRCLASS.DAT_tureg_old

    FileKey2=%SystemDrive%\Boot|BCD_tureg_new.LOG*;BCD_tureg_old

    FileKey3=%SystemDrive%\Documents and Settings\LocalService|NTUSER.DAT_tureg_new.LOG*;NTUSER.DAT_tureg_old

    FileKey4=%SystemDrive%\Documents and Settings\LocalService.NT*|NTUSER.DAT_tureg_new.LOG*;NTUSER.DAT_tureg_old

    FileKey5=%SystemDrive%\Documents and Settings\NetworkService|NTUSER.DAT_tureg_new.LOG*;NTUSER.DAT_tureg_old

    FileKey6=%SystemDrive%\Documents and Settings\NetworkService.NT*|NTUSER.DAT_tureg_new.LOG*;NTUSER.DAT_tureg_old

    FileKey7=%UserProfile%|NTUSER.DAT_tureg_new.LOG*;NTUSER.DAT_tureg_old

    FileKey8=%WinDir%\ServiceProfiles\LocalService|NTUSER.DAT_tureg_new.LOG*;NTUSER.DAT_tureg_old

    FileKey9=%WinDir%\ServiceProfiles\NetworkService|NTUSER.DAT_tureg_new.LOG*;NTUSER.DAT_tureg_old

    FileKey10=%WinDir%\System32\config|COMPONENTS_tureg_new.LOG*;COMPONENTS_tureg_old;DEFAULT_tureg_new.LOG*;DEFAULT_tureg_old;SAM_tureg_new.LOG*;SAM_tureg_old;SECURITY_tureg_new.LOG*;SECURITY_tureg_old;SOFTWARE_tureg_new.LOG*;SOFTWARE_tureg_old;SYSTEM_tureg_new.LOG*;SYSTEM_tureg_old;DRIVERS_tureg_new.LOG*;DRIVERS_tureg_old

  4. This applies to Windows 7 x86 Pro and Windows 8 x64 Pro and CCleaner V4.05 and V4.06.

     

    The Advanced>Windows Event Log does not removed any of the Event Viewer logs. I suspect that this is a permissions problem. A reboot does not remove them either. The Event Viewer shows hundreds of logs on my system and CCleaner finds 0 logs on Analyze and Clean

  5. Modified Entry [jv16 PowerTools Registry Compact Backups*]: Added DetectFile6 for jv16 PowerTools 2014

     

    [jv16 PowerTools Registry Compact Backups*]
    LangSecRef=3024
    DetectFile1=%ProgramFiles%\jv16 PowerTools 2009\jv16PT.exe
    DetectFile2=%ProgramFiles%\jv16 PowerTools 2010\jv16PT.exe
    DetectFile3=%ProgramFiles%\jv16 PowerTools 2011\jv16PT.exe
    DetectFile4=%ProgramFiles%\jv16 PowerTools 2012\jv16PT.exe
    DetectFile5=%ProgramFiles%\jv16 PowerTools 2013\jv16PT.exe
    DetectFile6=%ProgramFiles%\jv16 PowerTools 2014\jv16PT.exe
    Default=False
    Warning=This removes the registry hive backup files generated by jv16 PowerTools during a registry compaction. These files are not needed once the compaction is successfully completed. They can be safely deleted. NOTE that the system must be rebooted following a registry compaction completion in order for jv16 to release these files for deletion.
    FileKey1=%LocalAppData%\Microsoft\Windows|UsrClass.dat.jv16pt*
    FileKey2=%SystemDrive%\Documents and Settings\NetworkService|NTUSER.DAT.jv16pt*
    FileKey3=%SystemDrive%\Documents and Settings\LocalService|NTUSER.DAT.jv16pt*
    FileKey4=%SystemDrive%\Documents and Settings\NetworkService.NT*|NTUSER.DAT.jv16pt*
    FileKey5=%SystemDrive%\Documents and Settings\LocalService.NT*|NTUSER.DAT.jv16pt*
    FileKey6=%UserProfile%|NTUSER.DAT.jv16pt*
    FileKey7=%WinDir%\System32\config|Default.jv16pt*;software.jv16pt*;system.jv16pt*;SAM.jv16pt*;COMPONENTS.jv16pt*
    FileKey8=%WinDir%\ServiceProfiles\LocalService|NTUSER.DAT.jv16pt*
    FileKey9=%WinDir%\ServiceProfiles\NetworkService|NTUSER.DAT.jv16pt*
    

  6. New Entry: [snagit 11 Local Dumps (.dmp)*]

     

    [snagit 11 Local Dumps (.dmp)*]
    LangSecRef=3024
    Detect=HKCU\Software\TechSmith\SnagIt\11
    Default=False
    Warning=This will delete the local dump files (.dmp) automatically created SnagIt 11 if it encounters an error/crash.
    FileKey1=%LocalAppData%\TechSmith\Snagit\CrashDumps\|*.*
    

  7. New Entry: [Amazon.com Software Downloads (Logs)*]

    The logs are created when you purchase and download software from Amazon.com.

     

    [Amazon.com Software Downloads (Logs)*]
    LangSecRef=3024
    DetectFile=%Documents%\Amazon Downloader Logs
    Default=False
    FileKey1=%Documents%\Amazon Downloader Logs\|*.*|REMOVESELF
    

  8. New Entry: [Norton Error Repair Tool (Logs)*] This removes logs that are generated by Symantec's security products repair tool SymNRA.exe. This tool generates sizeable logs for submission to Symantec when debugging Norton products.

     

    [Norton Error Repair Tool (Logs)*]
    LangSecRef=3024
    DetectFile=%Documents%\Symantec
    Default=False
    Warning=This removes Error Logs created by Norton's SymNRA log tool used for reporting bugs. 
    FileKey1=%Documents%\Symantec\ErrLogs|*.zip
    FileKey2=%SystemDrive%\Symlogs|*.*|REMOVESELF
    

  9. New Entry: [TuneUp Utilities (CrashDumps)*]

     

    [TuneUp Utilities (CrashDumps)*]
    LangSecRef=3024
    Detect=HKCU\Software\TuneUp
    Default=False
    Warning=This removes ALL crash/dump files saved by program TuneUp Utilities.
    FileKey1=%AppData%\TuneUp Software\TuneUp Utilities\CrashDumps|*.*
    

  10. Modified Entry for [TuneUp Utilities Reg Defrag Cleanup*] to include TuneUp Utilities 2014. Added Detect4

     

    [TuneUp Utilities Reg Defrag Cleanup*]

    LangSecRef=3024

    Detect1=HKCU\Software\TuneUp\Utilities\10.0

    Detect2=HKCU\Software\TuneUp\Utilities\12.0

    Detect3=HKCU\Software\TuneUp\Utilities\13.0

    Detect4=HKCU\Software\TuneUp\Utilities\14.0

    Default=False

    FileKey1=%LocalAppData%\Microsoft\Windows|USRCLASS.DAT_tureg_new.LOG*;USRCLASS.DAT_tureg_old

    FileKey2=%SystemDrive%\Boot|BCD_tureg_new.LOG*;BCD_tureg_old

    FileKey3=%SystemDrive%\Documents and Settings\LocalService|NTUSER.DAT_tureg_new.LOG*;NTUSER.DAT_tureg_old

    FileKey4=%SystemDrive%\Documents and Settings\LocalService.NT*|NTUSER.DAT_tureg_new.LOG*;NTUSER.DAT_tureg_old

    FileKey5=%SystemDrive%\Documents and Settings\NetworkService|NTUSER.DAT_tureg_new.LOG*;NTUSER.DAT_tureg_old

    FileKey6=%SystemDrive%\Documents and Settings\NetworkService.NT*|NTUSER.DAT_tureg_new.LOG*;NTUSER.DAT_tureg_old

    FileKey7=%UserProfile%|NTUSER.DAT_tureg_new.LOG*;NTUSER.DAT_tureg_old

    FileKey8=%WinDir%\ServiceProfiles\LocalService|NTUSER.DAT_tureg_new.LOG*;NTUSER.DAT_tureg_old

    FileKey9=%WinDir%\ServiceProfiles\NetworkService|NTUSER.DAT_tureg_new.LOG*;NTUSER.DAT_tureg_old

    FileKey10=%WinDir%\System32\config|COMPONENTS_tureg_new.LOG*;COMPONENTS_tureg_old;DEFAULT_tureg_new.LOG*;DEFAULT_tureg_old;SAM_tureg_new.LOG*;SAM_tureg_old;SECURITY_tureg_new.LOG*;SECURITY_tureg_old;SOFTWARE_tureg_new.LOG*;SOFTWARE_tureg_old;SYSTEM_tureg_new.LOG*;SYSTEM_tureg_old;DRIVERS_tureg_new.LOG*;DRIVERS_tureg_old

     

  11.  

     

    The ExcludeKey1 addition to Windows SCM Logs* still not resolve the basic issue of this code causing Windows Scheduled Tasks to re-run any scheduled task that has the option "Run task as soon as possible after a scheduled start is missed" activated. The logs in the SCM folder are used to control this option.

     

    I strongly recommend that Windows SCM Logs* not be re-added to Winapp2.ini.

  12. As per the file size, it is 2.95 GB. I wiped the file from the directory and no issues at all. After wiping the file I reclaimed approx 3 GB on the hard disk!

     

    It is very tempting to remove reserve.tmp; however, I am going to wait until after Windows 8.1 is installed. If the file is still there, I most likely will save it on a flash drive and delete it from Winsys.

  13. Seeing as that linked page states "it's not really as big as it says" and other such admonitions I'd say leave it alone

     

    There are a few other web pages referencing this file and stating to NOT remove it. I agree with Nergal's recommendation.

  14. 2014 Norton Products Released. Changed name on [Norton Internet Security 2012/13/14 Dumps*]

     

    [Norton Internet Security 2012/13/14 Dumps*]
    LangSecRef=3024
    DetectFile=%CommonAppData%\Norton\LocalDumps
    Default=False
    FileKey1=%CommonAppData%\Norton\LocalDumps|*.dmp
    

  15. I am assuming that you have Winapp2.ini installed for CCleaner (be sure that you have the latest version of Winapp2.ini installed if you are running Winapp2.ini). On the applications tab, uncheck

     

    Windows 7/8 QuickLaunch*

    Windows QuickLaunch DiagnosedApplications*

    Windows QuickLaunch ImplicitAppShortcuts*

  16. Below is the exact cleaning code for NVIDIA as it is set up in CCleaner V4.05

     

    [NVIDIA]
    ID=2357
    LangSecRef=3024
    Detect=HKCU\Software\NVIDIA Corporation
    Default=True
    FileKey1=%SystemDrive%\NVIDIA|*.*|REMOVESELF
    FileKey2=%SystemDrive%\NV|*.*|REMOVESELF
    

     

    These folders are nothing more than the extracted files from the Nvidia installer. This extraction occurs when users download a nVidia graphics update and then run the installer. The installer extracts the files to the %SystemDrive%\Nvidia (or NV) folder. It then installs the new nVidia files and completes the update. Once the update is completed, the extracted files in %SystemDrive%\Nvidia (or NV) are no longer needed or used. Deleting them has no negative affect on a user's system.

     

    If you feel uncomfortable with removing with file, back it up first on a CD or Flash Drive. Then let CCleaner remove the folder. Reboot your computer and you will find that everything still works just fine. I've done this when my computers had Windows XP, then Vista, then Windows 7, and now Windows 8.

  17. WFM on Windows 7 so I figured I'd hide it from Windows 8. Admittedly, I didn't test the DetectOS and even after 3 years the formatting confuses me..

     

    What exactly is it doing to your windows 7 CCleaner_Fan?

     

    Here is the way I've analzyed that format to work.....using Windows 8 as an example

     

    DetectOS=6.2 = Show only on Windows 8

    DetectOS=|6.2 = Show on Windows 8 and earlier versions of Windows, but not on versions later than Windows 8

    DetectOS=6.2| = Show on Windows 8 and later versions of Windows

     

    There is no option that states "Show on all versions (earlier and later versions) except Windows 8". So if you want code to show on all versions but the latest version of Windows which is Windows 8, you would set it as DetectOS=|6.1 which says show on Windows 7 and earlier versions but not on Windows 8 or later.

     

    There needs to be a format that states "show on all versions but the specified version". For example:

    DetectOS=|6.2| = could say "Show on all versions earlier than Windows 8, all versions later than Windows 8, but do not show on Windows 8.

  18. The Nvidia in CCleaner as well as the "just removed" Nvidia entry in Winapp2.ini below

     

    [Nvidia Graphics Driver Installation Files*]

    LangSecRef=3023

    Detect=HKCU\Software\NVIDIA Corporation

    Default=False

    FileKey1=%SystemDrive%\Nvidia|*.*|REMOVESELF

     

    are the same. This folder is nothing more than the extracted files from the Nvidia installer. This extraction occurs when users download a nVidia graphics update and then run the installer. The installer extracts the files to the %SystemDrive%\Nvidia folder. It then installs the new nVidia files and completes the update. Once the update is completed, the extracted files in %SystemDrive%\Nvidia are no longer needed or used. Deleting them has no negative affect on a user's system.

     

    At one time the entry below was included in Winapp2.ini

     

    [Nvidia Graphics Driver Installation Files*]

    LangSecRef=3023

    Detect=HKCU\Software\NVIDIA Corporation

    Default=False

    Warning=You will not be able to do an uninstall of your drivers without first reinstalling them.

    FileKey1=%SystemDrive%\Nvidia|*.*|REMOVESELF

    FileKey2=%ProgramFiles%\NVIDIA Corporation\Installer2|*.*|RECURSE

     

    FileKey2 was the entry that was causing problems with removing Nvidia graphics file because it was removing an huge folder named Installer2 which has the uninstaller.exe file in it. FileKey2 was removed a few months back and the warning was removed as well. If users have not updated Winapp2.ini since that error was discovered then they could definitely run into a problem with using CCleaner.

     

    I am running 326.80 (which is a beta version of nVidia graphics for my NVIDIA GeForce GTX 650 graphics card) on my Windows 8 x64 Professional systems. And CCleaner V4.05 cleaning has done nothing to negatively impact the nVidia graphics software.

  19. New Entry: jv16 PowerTools 2014

    jv16 PowerTools 2014 is in the RC1 phase so I suggest that its cleaning code be added to Winapp2.ini

     

    [jv16 PowerTools 2014 Backup Files*]

    LangSecRef=3024

    DetectFile=%ProgramFiles%\jv16 PowerTools 2014\jv16PT.exe

    Default=False

    FileKey1=%ProgramFiles%\jv16 PowerTools 2014\Backups|*.*|RECURSE

    FileKey2=%ProgramFiles%\jv16 PowerTools 2014\Settings|UserActionLog.txt

    ExcludeKey1=FILE|%ProgramFiles%\jv16 PowerTools 2014\Backups\License.xbin_backup

  20. This also applies to IE 11. Changed name from [internet Explorer 10*] to [internet Explorer 10/11*]

     

    [internet Explorer 10/11*]

    LangSecRef=3022

    DetectFile=%LocalAppData%\Microsoft\Windows\WebCache

    Default=False

    FileKey1=%LocalAppData%\Microsoft\SmartScreen|*.tmp

    FileKey2=%LocalAppData%\Microsoft\Vault\*|*.vcrd

    FileKey3=%LocalAppData%\Microsoft\Windows\AppCache|*.*|RECURSE

    FileKey4=%LocalAppData%\Microsoft\Windows\WebCache|*.*|RECURSE

    FileKey5=%LocalAppData%\Microsoft\Windows\WebCache.old|*.*|REMOVESELF

    FileKey6=%LocalLowAppData%\Microsoft\Windows\AppCache|*.*|RECURSE

  21. New addition of App LifeCam

     

    [LifeCam*]
    LangSecRef=3031
    Detect=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.LifeCamDashboard_8wekyb3d8bbwe
    DetectFile=%LocalAppData%\Packages\Microsoft.LifeCamDashboard_8wekyb3d8bbwe
    Default=False
    FileKey1=%LocalAppData%\Packages\Microsoft.LifeCamDashboard_*\AC\INetCache|*.*|RECURSE
    FileKey2=%LocalAppData%\Packages\Microsoft.LifeCamDashboard_*\AC\INetCookies|*.*|RECURSE
    FileKey3=%LocalAppData%\Packages\Microsoft.LifeCamDashboard_*\AC\INetHistory|*.*|RECURSE
    FileKey4=%LocalAppData%\Packages\Microsoft.LifeCamDashboard_*\AC\PRICache|*.*
    FileKey5=%LocalAppData%\Packages\Microsoft.LifeCamDashboard_*\AC\Temp|*.*
    FileKey6=%LocalAppData%\Packages\Microsoft.LifeCamDashboard_*\TempState|*.*|RECURSE
    

     

    Also a language addition for US English edit on LifeCam

     

    [LifeCam (Lng)*]

    Section=US English Language

    Detect=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.LifeCamDashboard_8wekyb3d8bbwe

    DetectFile=%LocalAppData%\Packages\Microsoft.LifeCamDashboard_8wekyb3d8bbwe

    Warning=This deletes all languages EXCEPT the United States English language.

    Default=False

    FileKey1=%ProgramFiles%\Microsoft LifeCam\DriverComponents\de-DE\|*.*|REMOVESELF

    FileKey2=%ProgramFiles%\Microsoft LifeCam\DriverComponents\el-GR\|*.*|REMOVESELF

    FileKey3=%ProgramFiles%\Microsoft LifeCam\DriverComponents\es-ES\|*.*|REMOVESELF

    FileKey4=%ProgramFiles%\Microsoft LifeCam\DriverComponents\fr-FR\|*.*|REMOVESELF

    FileKey5=%ProgramFiles%\Microsoft LifeCam\DriverComponents\it-IT\|*.*|REMOVESELF

    FileKey6=%ProgramFiles%\Microsoft LifeCam\DriverComponents\ja-JP\|*.*|REMOVESELF

    FileKey7=%ProgramFiles%\Microsoft LifeCam\DriverComponents\ko-KR\|*.*|REMOVESELF

    FileKey8=%ProgramFiles%\Microsoft LifeCam\DriverComponents\pt-BR\|*.*|REMOVESELF

    FileKey9=%ProgramFiles%\Microsoft LifeCam\DriverComponents\pt-PT\|*.*|REMOVESELF

    FileKey10=%ProgramFiles%\Microsoft LifeCam\DriverComponents\ru-RU\|*.*|REMOVESELF

    FileKey11=%ProgramFiles%\Microsoft LifeCam\DriverComponents\zh-CN\|*.*|REMOVESELF

    FileKey12=%ProgramFiles%\Microsoft LifeCam\DriverComponents\zh-TW\|*.*|REMOVESELF

  22. It is my recommendation that CCleaner be restricted so that only one copy of CCleaner can be in RAM memory running at any point in time. At the present time, multiple copies of CCleaner can be loaded in RAM. IMO, this is a CCleaner bug that should be fixed.

     

    On my systems, I have CCleaner /auto pinned to the taskbar. I sometimes accidentally click on the CCleaner icon in the taskbar while CCleaner is already running. This starts a second copy of CCleaner running in RAM. I use Winapp2.ini which makes CCleaner load slower. Therefore the CPU usage of 2 copies of CCleaner loading//running can be as high as 85%.

  23. New App Network Speed Test by Microsoft

     

    [Network Speed Test*]
    LangSecRef=3031
    Detect=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.NetworkSpeedTest_8wekyb3d8bbwe
    DetectFile=%LocalAppData%\Packages\Microsoft.NetworkSpeedTest_8wekyb3d8bbwe
    Default=False
    FileKey1=%LocalAppData%\Packages\Microsoft.NetworkSpeedTest_*\AC\INetCache|*.*|RECURSE
    FileKey2=%LocalAppData%\Packages\Microsoft.NetworkSpeedTest_*\AC\INetCookies|*.*|RECURSE
    FileKey3=%LocalAppData%\Packages\Microsoft.NetworkSpeedTest_*\AC\INetHistory|*.*|RECURSE
    FileKey4=%LocalAppData%\Packages\Microsoft.NetworkSpeedTest_*\AC\Microsoft\CLR_v4.0*\UsageLogs|*.*|RECURSE
    FileKey5=%LocalAppData%\Packages\Microsoft.NetworkSpeedTest_*\AC\PRICache|*.*
    FileKey6=%LocalAppData%\Packages\Microsoft.NetworkSpeedTest_*\AC\Temp|*.*
    FileKey7=%LocalAppData%\Packages\Microsoft.NetworkSpeedTest_*\TempState|*.*|RECURSE
    

×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.