Jump to content

ricktendo64

Experienced Members
  • Posts

    153
  • Joined

  • Last visited

Everything posted by ricktendo64

  1. I think it would be better to add this to the already existing playready entry...reason being is not everybody with ehome (media center) will get playready installed, it only installs if you have a TV tunver
  2. I found it, MS PlayReady is the culprit
  3. There is a PRDMOWrapper.log file in my %WinDir%\ehome and %WinDir%\system32 folders, I dont know what generates it but I guess its harmless to delete and maybe find a place into this INI
  4. You can create a shortcut or a recycle bin shell extension (whichever you prefer) that will run ccleaner w/ the cmdline that a_b posted that will clean and shutdown your computer
  5. %USERPROFILE%\AppData\Local is best changed back to %LocalAppData% [TuneUp Utilities 2011/2012 Reg Defrag Cleanup*] LangSecRef=3024 Detect=HKCU\Software\TuneUp\Utilities\10.0 Detect2=HKCU\Software\TuneUp\Utilities\12.0 Default=False FileKey1=%WinDir%\System32\config|SECURITY_tureg_old FileKey2=%WinDir%\System32\config|SOFTWARE_tureg_old FileKey3=%WinDir%\System32\config|SYSTEM_tureg_old FileKey4=%WinDir%\System32\config|DEFAULT_tureg_new.LOG1 FileKey5=%WinDir%\System32\config|DEFAULT_tureg_new.LOG2 FileKey6=%WinDir%\System32\config|SAM_tureg_new.LOG1 FileKey7=%WinDir%\System32\config|SAM_tureg_new.LOG2 FileKey8=%WinDir%\System32\config|SECURITY_tureg_new.LOG1 FileKey9=%WinDir%\System32\config|SECURITY_tureg_new.LOG2 FileKey10=%WinDir%\System32\config|SOFTWARE_tureg_new.LOG1 FileKey11=%WinDir%\System32\config|SOFTWARE_tureg_new.LOG2 FileKey12=%WinDir%\System32\config|SYSTEM_tureg_new.LOG1 FileKey13=%WinDir%\System32\config|SYSTEM_tureg_new.LOG2 FileKey14=%WinDir%\System32\config|DEFAULT_tureg_old FileKey15=%WinDir%\System32\config|SAM_tureg_old FileKey16=%WinDir%\ServiceProfiles\LocalService|NTUSER.DAT_tureg_old FileKey17=%WinDir%\ServiceProfiles\LocalService|NTUSER.DAT_tureg_new.LOG1 FileKey18=%WinDir%\ServiceProfiles\LocalService|NTUSER.DAT_tureg_new.LOG2 FileKey19=%WinDir%\ServiceProfiles\NetworkService|NTUSER.DAT_tureg_old FileKey20=%WinDir%\ServiceProfiles\NetworkService|NTUSER.DAT_tureg_new.LOG1 FileKey21=%WinDir%\ServiceProfiles\NetworkService|NTUSER.DAT_tureg_new.LOG2 Filekey22=%WinDir%\System32\config|COMPONENTS_tureg_old Filekey23=%WinDir%\System32\config|COMPONENTS_tureg_new.LOG1 Filekey24=%WinDir%\System32\config|COMPONENTS_tureg_new.LOG2 FileKey25=%LocalAppData%\Microsoft\Windows|USRCLASS.DAT_tureg_old FileKey26=%UserProfile%|NTUSER.DAT_tureg_new.LOG1 FileKey27=%UserProfile%|NTUSER.DAT_tureg_new.LOG2 FileKey28=%UserProfile%|NTUSER.DAT_tureg_old FileKey29=%SystemDrive%\Boot|BCD_tureg_new.LOG1 FileKey30=%SystemDrive%\Boot|BCD_tureg_new.LOG2 FileKey31=%SystemDrive%\Boot|BCD_tureg_old
  6. Disable/Enable hibernate with powercfg -h off|on
  7. Built in auto update feature for winapp2.ini would be nice, you could put the version+update url in the ini so ccleaner could compare the version of the on disk to the version of the one on the other end of the url
  8. New version of cc is out hopefully we will get a update to the ini with the skype db fix that erroneously deletes contacts list BTW what happened to my post about the use of "%programfiles%\common files" instead of "%commonprogramfiles%", it seems to have been deleted [Windows Live Messenger More*] ... FileKey8=%ProgramFiles%\Common Files\Windows Live\.cache|*.*|RECURSE
  9. I use IDA (Internet Download Accelerator) and I can tell you it does not have/need these files cleaned [internet Download Accelerator] ... DetectFile=%CommonAppData%\Speedbit\DAP ... FileKey7=%CommonAppData%\Speedbit\DAP\Log|*.* FileKey8=%CommonAppData%\Speedbit\DAP\temp|*.tmp FileKey9=%CommonAppData%\Speedbit\DAP\History|*.dat|RECURSE Speeddbit\DAP I think is for Download Accelerator Plus (completely different program)
  10. I hope they add registry wildcard next
  11. CCleaner v3.09 * Added wildcard support to folders.
  12. Its very nice but not nicer than the current one
  13. Plese read here, these are not needed because they are in embedded INI [Remote Desktop Connection More*] ; NOT NEEDED RegKey1=HKCU\Software\Microsoft\Terminal Server Client\Default|MRU0 RegKey2=HKCU\Software\Microsoft\Terminal Server Client\Default|MRU1 RegKey3=HKCU\Software\Microsoft\Terminal Server Client\Default|MRU2 RegKey4=HKCU\Software\Microsoft\Terminal Server Client\Default|MRU3 RegKey5=HKCU\Software\Microsoft\Terminal Server Client\Default|MRU4 RegKey6=HKCU\Software\Microsoft\Terminal Server Client\Default|MRU5 RegKey7=HKCU\Software\Microsoft\Terminal Server Client\Default|MRU6 RegKey8=HKCU\Software\Microsoft\Terminal Server Client\Default|MRU7 RegKey9=HKCU\Software\Microsoft\Terminal Server Client\Default|MRU8 RegKey10=HKCU\Software\Microsoft\Terminal Server Client\Default|MRU9
  14. Try it with %username% variable
  15. Yes, I notice you speak and have no clue what you are talking about Always gotta get your two cents in, even if its wrong
  16. AWESOME! You should also post all the internal CCleaner supported variables %Documents%, %MyDocuments%, etc.
  17. Is this missing a backslash after %CommonAppData%? [AOL 9.6*] Default=False DetectFile=%CommonAppData%AOL\C_AOL Desktop 9.6 LangSecRef=3022 FileKey1=%CommonAppData%AOL\C_AOL Desktop 9.6\spool|*.tmp FileKey2=%CommonAppData%AOL\C_AOL Desktop 9.6\bart|*.*|RECURSE BTW I just checked in official CCleaner INI and the new registry entries I added to Remote Desktop Connection are not needed
  18. I was referring to editing INI files [sections] Now that you mention it wildcard registry support would also be nice (like in the case of the MRU* I found/added to Remote Desktop Connection)
  19. Remote Desktop Connection (more cleaning entries) http://support.microsoft.com/kb/312169 [Remote Desktop Connection*] LangSecRef=3025 DetectFile=%WinDir%\System32\mstsc.exe Default=False FileKey1=%Documents%|*.rdp RegKey1=HKCU\Software\Microsoft\Terminal Server Client\Default|MRU0 RegKey2=HKCU\Software\Microsoft\Terminal Server Client\Default|MRU1 RegKey3=HKCU\Software\Microsoft\Terminal Server Client\Default|MRU2 RegKey4=HKCU\Software\Microsoft\Terminal Server Client\Default|MRU3 RegKey5=HKCU\Software\Microsoft\Terminal Server Client\Default|MRU4 RegKey6=HKCU\Software\Microsoft\Terminal Server Client\Default|MRU5 RegKey7=HKCU\Software\Microsoft\Terminal Server Client\Default|MRU6 RegKey8=HKCU\Software\Microsoft\Terminal Server Client\Default|MRU7 RegKey9=HKCU\Software\Microsoft\Terminal Server Client\Default|MRU8 RegKey10=HKCU\Software\Microsoft\Terminal Server Client\Default|MRU9 I extracted the VBS from the MSI "Fix it" installer, this is what it does/looks like Option Explicit On Error Resume Next Const HKEY_CURRENT_USER = &H80000001 Const strKeyPath = "Software\Microsoft\Terminal Server Client\Default" Const strComputer = "." Const REG_SZ = 1 Dim objReg , arrValueNames , arrValueTypes Dim i Set objReg=GetObject("winmgmts:{impersonationLevel=impersonate}!\\" & strComputer & "\root\default:StdRegProv") objReg.EnumValues HKEY_CURRENT_USER, strKeyPath , arrValueNames, arrValueTypes If Not IsNull(arrValueNames) Then For i=0 To UBound(arrValueNames) If arrValueTypes(i) = REG_SZ And InStr(arrValueNames(i),"MRU") = 1 Then objReg.DeleteValue HKEY_CURRENT_USER,strKeyPath,arrValueNames(i) End If Next End If Dim objShell : Set objShell = CreateObject("WScript.Shell") Dim objFSO : Set objFSO = CreateObject("Scripting.FileSystemObject") Dim strPathDefault strPathDefault = objShell.ExpandEnvironmentStrings("%USERPROFILE%") If Not IsNull(strPathDefault) Then If objFSO.FileExists(strPathDefault & "\Documents\Default.rdp") Then objFSO.DeleteFile(strPathDefault & "\Documents\Default.rdp") End If If objFSO.FileExists(strPathDefault & "\My Documents\Default.rdp") Then objFSO.DeleteFile(strPathDefault & "\My Documents\Default.rdp") End If End If Function MyVBScriptCA() If (Err.Number=0) Then 'return success MyVBScriptCA = 1 Else 'return cancel MyVBScriptCA = 2 End If End Function
  20. DUH! to try to make some $$$ to keep the program "FREE" Its not some mysterious app its chrome and its not like you cant opt out
  21. Thanks...heres one Resource Hacker (setup) the .GID file is created if you launch the HLP file [Resource Hacker*] LangSecRef=3024 DetectFile="%ProgramFiles%\Resource Hacker\ResHacker.exe" Default=False FileKey1=%ProgramFiles%\Resource Hacker|ResHacker.ini FileKey2=%ProgramFiles%\Resource Hacker|reshacker.GID
  22. [Temporary Setup Catalogs*] LangSecRef=3025 DetectFile=%WinDir%\SET3.tmp Default=False FileKey1=%WinDir%|SET*.tmp Explained what these are here
  23. CAT files that sign other files are officially stored (and you can find the duplicate files I mentioned installed) in %WinDir%\system32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}, you can then compare them with any MD5 file verifier on ANY language edition of XP and you will get the same results (MD5's will differ from language to language) You can also rename the TMP files to CAT and open them to see they are indeed CAT files (you can also right click them and see a digital signature tab) These catalog files are applied/installed during XP setup via the syssetup.inf ProductCatalogsToInstall section but for some reason they are not deleted after [ProductCatalogsToInstall] NT5INF.CAT, 1 NT5.CAT SP3.CAT NTPRINT.CAT NT5IIS.CAT MAPIMIG.CAT FP4.CAT IMS.CAT MSMSGS.CAT HPCRDP.CAT MW770.CAT wmerrenu.cat IASNT4.CAT MSTSWEB.CAT OEMBIOS.CAT tabletpc.cat mediactr.cat netfx.cat If you are still unsure they are junk then you can delete them, then run sigverif.exe to scan your entire HDD and see that many/most of the XP system files are still signed by the CAT's I list (SP3.CAT, NTPRINT.CAT, IMS.CAT) Your .net error is irrelevant to this subject
×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.