Jump to content

siliconman01

Experienced Members
  • Posts

    1,111
  • Joined

  • Last visited

Everything posted by siliconman01

  1. The following code does not work with PDF ExchangeViewer (latest free version 2.5 (Build 191.0) on Windows 7. Not all requested registry keys are removed. [PDF-XChange Viewer*] LangSecRef=3021 Detect=HKCU\Software\Tracker Software\PDFViewer Default=False RegKey1=HKCU\Software\Tracker Software\PDFViewer\Documents\LastOpened RegKey2=HKCU\Software\Tracker Software\PDFViewer\Documents\LatestView\Bars RegKey3=HKCU\Software\Tracker Software\PDFViewer\Documents\LatestView\Panes Below is what I "think" it should be. Would someone please confirm. [PDF-XChange Viewer*] LangSecRef=3021 Detect=HKCU\Software\Tracker Software\PDFViewer Default=False RegKey1=HKCU\Software\Tracker Software\PDFViewer.IBrowser\Documents\LastOpened RegKey2=HKCU\Software\Tracker Software\PDFViewer.IBrowser\Documents\LastView\Bars RegKey3=HKCU\Software\Tracker Software\PDFViewer.IBrowser\Documents\LastView\Panes RegKey4=HKCU\Software\Tracker Software\PDFViewer\Documents\LastOpened RegKey5=HKCU\Software\Tracker Software\PDFViewer\Documents\LastView\Bars RegKey6=HKCU\Software\Tracker Software\PDFViewer\Documents\LastView\Panes
  2. For those using LightScribe CD/DVDs. [LightScribe (Logs)*] LangSecRef=3023 Detect=HKCU\Software\LightScribe Default=False FileKey1=%CommonAppData%\LightScribe\log\|*.xml
  3. Having CCleaner delete the Icon Cache will result in subtle problems with some programs. This is on Windows 7 x64 Professional and Windows 7 x86 Professional. For example, jv16 PowerTools has a debug option that stores a debug HTML on the desktop each time the jv16 program is executed IF the debug option is set active. If CCleaner has deleted IconCache.db, the icon for the jv16 debug HTML will not show up. A user has to right click on the desktop and select Refresh. Then the debug icon will appear. A system reboot will also expose the debug HTML icon. However, running CCleaner again with the icon cache cleaning set active will result in the same failure.
  4. I recommend that you combine the jv16 PowerTools 2009 and 2010 code with the following code which also includes 2011 currently in Beta testing. The registry compact files are the same irrespective of which version of jv16 being used. [jv16 PowerTools 2009/10/11**] LangSecRef=3024 DetectFile=%ProgramFiles%\jv16 PowerTools 2009\jv16PT.exe DetectFile=%ProgramFiles%\jv16 PowerTools 2010\jv16PT.exe DetectFile=%ProgramFiles%\jv16 PowerTools 2011\jv16PT.exe Default=False FileKey1=%userprofile%\|NTUSER.DAT.jv16pt_bak FileKey2=%userprofile%\|NTUSER.DAT.jv16pt_bak2 FileKey3=%userprofile%\|NTUSER.DAT.jv16pt_bak.LOG1 FileKey4=%userprofile%\|NTUSER.DAT.jv16pt_bak.LOG2 FileKey5=%LocalAppData%\Microsoft\Windows\|UsrClass.dat.jv16pt_bak FileKey6=%LocalAppData%\Microsoft\Windows\|UsrClass.dat.jv16pt_bak2 FileKey7=%LocalAppData%\Microsoft\Windows\|UsrClass.dat.jv16pt_bak.LOG1 FileKey8=%LocalAppData%\Microsoft\Windows\|UsrClass.dat.jv16pt_bak.LOG2 FileKey9=%windir%\system32\config\|Default.jv16pt_bak FileKey10=%windir%\system32\config\|Default.jv16pt_bak2 FileKey11=%windir%\system32\config\|Default.jv16pt_bak.LOG1 FileKey12=%windir%\system32\config\|Default.jv16pt_bak.LOG2 FileKey13=%windir%\system32\config\|software.jv16pt_bak.LOG1 FileKey14=%windir%\system32\config\|software.jv16pt_bak.LOG2 FileKey15=%windir%\system32\config\|software.jv16pt_bak FileKey16=%windir%\system32\config\|software.jv16pt_bak2 FileKey17=%windir%\system32\config\|system.jv16pt_bak FileKey18=%windir%\system32\config\|system.jv16pt_bak2 FileKey19=%windir%\system32\config\|system.jv16pt_bak.LOG1 FileKey20=%windir%\system32\config\|system.jv16pt_bak.LOG2 FileKey21=%windir%\System32\config\|SAM.jv16pt_bak FileKey22=%windir%\System32\config\|SAM.jv16pt_bak2 FileKey23=%windir%\System32\config\|SAM.jv16pt_bak.LOG1 FileKey24=%windir%\System32\config\|SAM.jv16pt_bak.LOG2 FileKey25=%windir%\System32\config\|COMPONENTS.jv16pt_bak FileKey26=%windir%\System32\config\|COMPONENTS.jv16pt_bak2 FileKey27=%windir%\System32\config\|COMPONENTS.jv16pt_bak.LOG1 FileKey28=%windir%\System32\config\|COMPONENTS.jv16pt_bak.LOG2 FileKey29=%windir%\ServiceProfiles\NetworkService\|NTUSER.DAT.jv16pt_bak FileKey30=%windir%\ServiceProfiles\NetworkService\|NTUSER.DAT.jv16pt_bak2 FileKey31=%windir%\ServiceProfiles\NetworkService\|NTUSER.DAT.jv16pt_bak.LOG1 FileKey32=%windir%\ServiceProfiles\NetworkService\|NTUSER.DAT.jv16pt_bak.LOG2 FileKey33=%windir%\ServiceProfiles\LocalService\|NTUSER.DAT.jv16pt_bak FileKey34=%windir%\ServiceProfiles\LocalService\|NTUSER.DAT.jv16pt_bak2 FileKey35=%windir%\ServiceProfiles\LocalService\|NTUSER.DAT.jv16pt_bak.LOG1 FileKey36=%windir%\ServiceProfiles\LocalService\|NTUSER.DAT.jv16pt_bak.LOG2
  5. Below is code for cleaning registry backups in TuneUp Utilities 2011 [TuneUp Utilities 2011 (Registry Backups)**] LangSecRef=3024 Detect=HKCR\.tu2011Code Default=False FileKey1=%AppData%\TuneUp Software\TU2011\Backups|*.rcb The existing TuneUp Utilities code in Winapp2.ini should be modified. [TuneUp Utilities (Registry Backups)*] LangSecRef=3024 DetectFile=%AppData%\TuneUp Software\TuneUp Utilities Default=False FileKey1=%AppData%\TuneUp Software\TuneUp Utilities\Backups|*.rcb Or I suppose you could combine these as: [TuneUp Utilities (Registry Backups)*] LangSecRef=3024 Detect=HKCU\Software\TuneUp Default=False FileKey1=%AppData%\TuneUp Software\TuneUp Utilities\Backups|*.rcb FileKey2=%AppData%\TuneUp Software\TU2011\Backups|*.rcb
  6. Jeez... That does exactly what I want to do. Thanks much for the tip, Andavari.
  7. I would like to see a special "Run Once" category be established in CCleaner for use with Winapp.ini and Winapp2.ini. The purpose of "Run Once" category would be to permit users to perform cleaning of specific files and then not to clean them again until the user manually checkmarks/specifies that CCleaner is to clean them again. For example: 1. User establishes a cleaning procedure named "jv16 2011 Backup Files" in WinApp2.ini for a series of backup files within jv16 2011. User specifies Default=False 2. User opens CCleaner>Applications and check marks "jv16 2011 Backup Files" which is under category RUN ONCE. 3. User runs CCleaner. CCleaner cleans the files specified by "jv16 2011 Backup Files" and then automatically unchecks "jv16 2011 Backup Files" under category RUN ONCE. 4. jv16 2011 Backup Files are not cleaned in subsequent runs of CCleaner until the user manually checks "jv16 2011 Backup Files" again.
  8. This will clear out an ~100 mbyte installer cache after installing iTunes 10.+ on Windows 7 x64 and x86. It should also work on Vista x64 and x86. It also clears log files. [itunes Apple Installer Cache & Logs**] Section=3023 Detect=HKCU\Software\Apple Computer, Inc.\iTunes Default=False Filekey1=%CommonAppData%\Apple\Installer Cache\|*.*|RECURSE| Filekey2=%CommonAppData%\Apple Computer\Installer Cache\|*.*|RECURSE| Filekey3=%AppData%\Apple Computer\Logs\|*.Log
  9. The built-in log removal for Malwarebytes Anti-Malware does not remove logs for the new MBAM v1.50 in beta testing as we speak. Below is log removal for v1.50, removing only logs. I think it is highly unsafe to also remove Quarantined items of MBAM via CCleaner....which the internal Malwarebytes does. [MalwareBytes' Anti-Malware 1.50 (Logs Only)**] Section=3024 Detect=HKCU\Software\Malwarebytes' Anti-Malware Default=False Filekey1=%CommonAppData%\Malwarebytes\Malwarebytes' Anti-Malware\Logs\|*.* Filekey2=%AppData%\Malwarebytes\Malwarebytes' Anti-Malware\Logs\|*.*
  10. The download link in the first post still goes to .box and is not downloadable.
  11. Yes, I know...appreciate the feedback. I want to do it just within specific 3rd party program folders that create random named subfolders and then leave them hanging around
  12. Thanks much Nergal. "ExcludeKey" permits me to remove several items from Options>Include/Exclude and use Winapp2.ini Is there a command that makes CCleaner remove/delete 0 byte subfolders within a folder?
  13. I agree 100% Belarc needs to be modified by adding a second DetectFile and FileKey2 for x64 systems [belarc*] LangSecRef=3024 DetectFile=%ProgramFiles%\Belarc\Advisor\System\NPBelv32.dll DetectFile=%ProgramFiles(x86)%\Belarc\Advisor\System\NPBelv32.dll Default=False Filekey1=%ProgramFiles%\Belarc\Advisor\INSTALL.Log Filekey2=%ProgramFiles(x86)%\Belarc\Advisor\INSTALL.Log I made a change to a couple of the ones I previously submitted. [Windows 7 QuickLaunch (QL Not Used)**] LangSecRef=3022 DetectOS=6.1 Default=False FileKey1=%AppData%\Microsoft\Internet Explorer\Quick Launch|*.lnk I used DetectOS to identify Windows 7 and changed the Section to Internet (3022) [JavaRa (Log)**] LangSecRef=3022 Detect=HKLM\Software\Wow6432Node\JavaRa Detect=HKLM\Software\JavaRa Default=False Filekey1=%SystemDrive%\|JavaRa.log I used %SystemDrive% instead of C:\and changed the Section to Internet (3022)
  14. It also would not move CCleaner embedded programs such as Windows Defender and Malwarebytes to the "new" section, correct?
  15. JMO... I wish that the CCleaner developers would create a new section under Applications: [4036 = Security] The following programs would fit this new category. Windows Defender Malwarebytes Anti Malware AntiVir Desktop TrojanHunter Hijackthis Wallwatcher A-squared Free Antivir Personal 8 Avira Rootkit Detection BitDefender 9 CounterSpy Giant AntiSpyware HostsMan Microsoft AntiMalware Scan Results Online Armor SpyDefense Spyware Doctor Spyware Terminator ZoneAlarm (and others embedded in CCleaner that may be showing up on others' systems)
  16. You are most welcome. I like a clean machine and Winapp2.ini is a major assist for this objective.
  17. For DisplayFusion (Mult-Monitor control) [*DisplayFusion (Debug Log)] LangSecRef=3024 Detect=HKCU\Software\Binary Fortress Software\DisplayFusion Default=False Filekey1=%AppData%\DisplayFusion\|DisplayFusion.log For Creative Soundblaster X-Fi XtremeMusic hardware (Support Software Updates) [*Creative Soundblaster X-Fi XtremeMusic (Cache & Logs)] LangSecRef=3024 Detect=HKLM\Software\CREATIVE TECH\Software Installed\Software Update Default=False FileKey1=%CommonAppData%\Creative\Software Update\Cache|*.*|REMOVESELF FileKey2=%CommonAppData%\Creative\Software Update\Log\|*.* PerfectDisk 11 Boot and Offline Defrag Logs [*PerfectDisk 11 (logs)] LangSecRef=3024 Detect=HKLM\Software\Raxco\PerfectDisk\11.0 Default=False FileKey1=%CommonAppData%\Raxco\PerfectDisk\11.0\|PDBootLog FileKey2=%CommonAppData%\Raxco\PerfectDisk\11.0\|PDBootLog.log I think there is an error in the code below: (KegKey3)
  18. Here are some additions. Note that I put the * in front of the name so that I can delineate those that are not currently in Winapp2.ini For the x64 version of SuperAntiSpyware [*SUPERAntiSpyware (More for x64)] LangSecRef=3024 DetectFile=%ProgramFiles%\Superantispyware\SASCore64.exe Default=False FileKey1=%CommonAppData%\!SASCORE\Applogs|*.SDB FileKey2=%CommonAppData%\!SASCORE|*.SDB FileKey3=%Appdata%\SuperantiSpyware.com\SUPERAntiSpyware\AppLogs|*.* NOTE: FileKey3 actually applies to all versions of SAS. You could add it into the SuperAntiSpyware component that is already part of Winapp2.ini. For Ashampoo Burning Studio 10 [*Ashampoo Burning Studio 10 (Logs)] LangSecRef=3024 Detect=HKCU\Software\Ashampoo\Ashampoo Burning Studio 10 Default=False FileKey1=%AppData%\Ashampoo\Ashampoo Burning Studio 10|backupmetainfo.xml FileKey2=%AppData%\Ashampoo\Ashampoo Burning Studio 10\Log|*.xml FileKey3=%AppData%\Ashampoo\Log|*.txt For Belarc [*Belarc (log)] LangSecRef=3024 Detect=HKCU\Software\Belarc\Advisor Default=False Filekey1=%ProgramFiles(x86)%\Belarc\Advisor\|INSTALL.Log Filekey2=%ProgramFiles%\Belarc\Advisor\INSTALL.log For Thumbsplus 8 [*ThumbsPlus 8] LangSecRef=3023 Detect=HKCU\Software\Cerious Software Inc. Default=False Filekey1=%AppData%\Thumbsplus|*.log Filekey2=%AppData%\Thumbsplus|*.bak For Windows 7 QuickLaunch (which is not used in Win 7) [*Windows 7 QuickLaunch (QL Not Used)] LangSecRef=3025 DetectFile=%ProgramFiles(x86)%\Internet Explorer\iexplore.exe DetectFile=%ProgramFiles%\Internet Explorer\iexplore.exe Default=False FileKey1=%AppData%\Microsoft\Internet Explorer\Quick Launch|*.lnk For TrojanHunter [*TrojanHunter (Scan Logs)] LangSecRef=3024 Detect=HKCU\Software\TrojanHunter Default=False FileKey1=%ProgramFiles(x86)%\TrojanHunter 5.3\Scan Reports|*.* FileKey2=%ProgramFiles%\TrojanHunter 5.3\Scan Reports|*.* For Hijackthis [*HijackThis (Backups)] LangSecRef=3024 DetectFile=%ProgramFiles(x86)%\Trend Micro\HijackThis\HijackThis.exe DetectFile=%ProgramFiles%\Trend Micro\HijackThis\HijackThis.exe Default=False FileKey1=%ProgramFiles(x86)%\Trend Micro\HijackThis\backups|*.* FileKey2=%ProgramFiles%\Trend Micro\HijackThis\backups|*.* For Microsoft Baseline Analyzer [*MS Baseline Analyzer (Cache)] LangSecRef=3024 DetectFile=%ProgramFiles%\Microsoft Baseline Security Analyzer 2\mbsa.exe Detect=HKLM\Software\Microsoft\Microsoft Baseline Security Analyzer Default=False FileKey1=%USERPROFILE%\AppData\Local\Microsoft\MBSA\Cache|*.* FileKey2=%USERPROFILE%\SecurityScans|*.mbsa For SnagIt 10 (Removal of saved captures) [*SnagIt 10 (Saved Captures)] LangSecRef=3024 Detect=HKCU\Software\TechSmith\SnagIt Default=False FileKey1=%USERPROFILE%\AppData\Local\TechSmith\SnagIt\DataStore|*.* FileKey2=%USERPROFILE%\AppData\Local\TechSmith\SnagIt\DataStore\AppIcons|*.* FileKey3=%USERPROFILE%\AppData\Local\TechSmith\SnagIt\DataStore\WebSiteIcons|*.* For X-NetStat [*X-NetStat (Logs)] LangSecRef=3024 DetectFile=%Program Files(x86)%\X-NetStat Professional\xns5.exe DetectFile=%Program Files%\X-NetStat Professional\xns5.exe Default=False FileKey1=%USERPROFILE%\AppData\Roaming\X-NetStat\Logs|*.* For WallWatcher [*WallWatcher (Logs)] LangSecRef=3024 DetectFile=%Program Files(x86)%\Wall Watcher\WallWatcher.exe DetectFile=%Program Files%\Wall Watcher\WallWatcher.exe Default=False FileKey1=%Program Files(x86)%\Wall Watcher\Logs|*.* FileKey2=%Program Files%\Wall Watcher\Logs|*.* For JavaRa [*JavaRa (Log)] LangSecRef=3024 Detect=HKLM\Software\Wow6432Node\JavaRa Detect=HKLM\Software\JavaRa Default=False Filekey1=C:\|JavaRa.log
  19. Yes, it does find all the files now from a PT 2010 registry compaction on Windows 7 x86 and x64 and I'm pretty sure it will work on Vista as well.
  20. The entries below will correct why winapp2.ini did not detect 2 of the 3 files above. The Break mark is missing. I don't see why these two are not working, however. Odd, I added these two FileKey entries and it now detects everything.
  21. Thanks for showing me my cockpit stupidity on Belarc The backup files are used only by the Registry Compact module of jv16 when it is performing the compact. Once the compact is completed, these files are useless. Jouni definitely does not intend them to be used by jv16 users for restoring a hive. I ran the jv16 addition to Winapp2. CCleaner is not finding 3 files even though they are in the list of Filekeys. This is on Windows 7 x64 Pro.
  22. Something appears to be amiss concerning adding new items to winapp2.ini on Windows 7 x86 and x64 Professional with CCleaner V3.00.1303. I added the following It detects that NPBelv32.dll is present and shows *Belarc under Applications>Utilities. I checkmark it and run Analyze. CCleaner does not show INSTALL.LOG as a file to clean. I have confirmed that INSTALL.Log is present in the specified location. I have tried this on both Windows 7 x64 Professional and Window 7 x86 Professional with the same results. It is properly finding items that were in Winapp2.ini when I upgraded CCleaner and is cleaning these. What stupid cockpit error am I overlooking? I was trying to set up the list of backup files to delete on jv16 PowerTools 2010 on Windows 7 and experienced the same problem.
  23. These are the potential backup files for Windows 7 x86 and x64 created by jv16 PowerTools 2010 Registry Compactor. c:\Windows\System32\config\SYSTEM.jv16pt_bak c:\Windows\System32\config\SYSTEM.jv16pt_bak2 c:\Windows\System32\config\SYSTEM.jv16pt_bak.LOG1 c:\Windows\System32\config\SYSTEM.jv16pt_bak.LOG2 c:\Windows\System32\config\SOFTWARE.jv16pt_bak c:\Windows\System32\config\SOFTWARE.jv16pt_bak2 c:\Windows\System32\config\SOFTWARE.jv16pt_bak.LOG1 c:\Windows\System32\config\SOFTWARE.jv16pt_bak.LOG2 c:\Windows\System32\config\DEFAULT.jv16pt_bak c:\Windows\System32\config\DEFAULT.jv16pt_bak2 c:\Windows\System32\config\DEFAULT.jv16pt_bak.LOG1 c:\Windows\System32\config\DEFAULT.jv16pt_bak.LOG2 c:\Windows\System32\config\SAM.jv16pt_bak c:\Windows\System32\config\SAM.jv16pt_bak2 c:\Windows\System32\config\SAM.jv16pt_bak.LOG1 c:\Windows\System32\config\SAM.jv16pt_bak.LOG2 c:\Windows\System32\config\COMPONENTS.jv16pt_bak c:\Windows\System32\config\COMPONENTS.jv16pt_bak2 c:\Windows\System32\config\COMPONENTS.jv16pt_bak.LOG1 c:\Windows\System32\config\COMPONENTS.jv16pt_bak.LOG2 c:\Windows\ServiceProfiles\NetworkService\NTUSER.DAT.jv16pt_bak c:\Windows\ServiceProfiles\NetworkService\NTUSER.DAT.jv16pt_bak2 c:\Windows\ServiceProfiles\NetworkService\NTUSER.DAT.jv16pt_bak.LOG1 c:\Windows\ServiceProfiles\NetworkService\NTUSER.DAT.jv16pt_bak.LOG2 c:\Windows\ServiceProfiles\LocalService\NTUSER.DAT.jv16pt_bak c:\Windows\ServiceProfiles\LocalService\NTUSER.DAT.jv16pt_bak2 c:\Windows\ServiceProfiles\LocalService\NTUSER.DAT.jv16pt_bak.LOG1 c:\Windows\ServiceProfiles\LocalService\NTUSER.DAT.jv16pt_bak.LOG2 c:\Users\"UserName"\NTUSER.DAT.jv16pt_bak c:\Users\"UserName"\NTUSER.DAT.jv16pt_bak2 c:\Users\"UserName"\NTUSER.DAT.jv16pt_bak.LOG1 c:\Users\"UserName"\NTUSER.DAT.jv16pt_bak.LOG2 c:\Users\"UserName"\AppData\Local\Microsoft\Windows\UsrClass.dat.jv16pt_bak c:\Users\"UserName"\AppData\Local\Microsoft\Windows\UsrClass.dat.jv16pt_bak2 c:\Users\"UserName"\AppData\Local\Microsoft\Windows\UsrClass.dat.jv16pt_bak.LOG1 c:\Users\"UserName"\AppData\Local\Microsoft\Windows\UsrClass.dat.jv16pt_bak.LOG2
  24. JFI, you can do this deletion within jv16 PT. Just open jv16, in the top menu go to Tools>Maintenance Program and select "Remove Registry Compactor Backups". It will locate all the registry compact backup files, display them and ask you if you want to delete them. These files vary based on Windows OS and what needs to be compacted.
  25. Malwarebytes is still part of the update download above.
×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.