ricktendo64
-
Posts
153 -
Joined
-
Last visited
Posts posted by ricktendo64
-
-
Do you use/have installed MediaPortal? Probably something to do with that software.
I found it, MS PlayReady is the culprit
-
There is a PRDMOWrapper.log file in my %WinDir%\ehome and %WinDir%\system32 folders, I dont know what generates it but I guess its harmless to delete and maybe find a place into this INI
-
You can create a shortcut or a recycle bin shell extension (whichever you prefer) that will run ccleaner w/ the cmdline that a_b posted that will clean and shutdown your computer
-
%USERPROFILE%\AppData\Local is best changed back to %LocalAppData%
[TuneUp Utilities 2011/2012 Reg Defrag Cleanup*] LangSecRef=3024 Detect=HKCU\Software\TuneUp\Utilities\10.0 Detect2=HKCU\Software\TuneUp\Utilities\12.0 Default=False FileKey1=%WinDir%\System32\config|SECURITY_tureg_old FileKey2=%WinDir%\System32\config|SOFTWARE_tureg_old FileKey3=%WinDir%\System32\config|SYSTEM_tureg_old FileKey4=%WinDir%\System32\config|DEFAULT_tureg_new.LOG1 FileKey5=%WinDir%\System32\config|DEFAULT_tureg_new.LOG2 FileKey6=%WinDir%\System32\config|SAM_tureg_new.LOG1 FileKey7=%WinDir%\System32\config|SAM_tureg_new.LOG2 FileKey8=%WinDir%\System32\config|SECURITY_tureg_new.LOG1 FileKey9=%WinDir%\System32\config|SECURITY_tureg_new.LOG2 FileKey10=%WinDir%\System32\config|SOFTWARE_tureg_new.LOG1 FileKey11=%WinDir%\System32\config|SOFTWARE_tureg_new.LOG2 FileKey12=%WinDir%\System32\config|SYSTEM_tureg_new.LOG1 FileKey13=%WinDir%\System32\config|SYSTEM_tureg_new.LOG2 FileKey14=%WinDir%\System32\config|DEFAULT_tureg_old FileKey15=%WinDir%\System32\config|SAM_tureg_old FileKey16=%WinDir%\ServiceProfiles\LocalService|NTUSER.DAT_tureg_old FileKey17=%WinDir%\ServiceProfiles\LocalService|NTUSER.DAT_tureg_new.LOG1 FileKey18=%WinDir%\ServiceProfiles\LocalService|NTUSER.DAT_tureg_new.LOG2 FileKey19=%WinDir%\ServiceProfiles\NetworkService|NTUSER.DAT_tureg_old FileKey20=%WinDir%\ServiceProfiles\NetworkService|NTUSER.DAT_tureg_new.LOG1 FileKey21=%WinDir%\ServiceProfiles\NetworkService|NTUSER.DAT_tureg_new.LOG2 Filekey22=%WinDir%\System32\config|COMPONENTS_tureg_old Filekey23=%WinDir%\System32\config|COMPONENTS_tureg_new.LOG1 Filekey24=%WinDir%\System32\config|COMPONENTS_tureg_new.LOG2 FileKey25=%LocalAppData%\Microsoft\Windows|USRCLASS.DAT_tureg_old FileKey26=%UserProfile%|NTUSER.DAT_tureg_new.LOG1 FileKey27=%UserProfile%|NTUSER.DAT_tureg_new.LOG2 FileKey28=%UserProfile%|NTUSER.DAT_tureg_old FileKey29=%SystemDrive%\Boot|BCD_tureg_new.LOG1 FileKey30=%SystemDrive%\Boot|BCD_tureg_new.LOG2 FileKey31=%SystemDrive%\Boot|BCD_tureg_old
-
Disable/Enable hibernate with
powercfg -h off|on
-
Built in auto update feature for winapp2.ini would be nice, you could put the version+update url in the ini so ccleaner could compare the version of the on disk to the version of the one on the other end of the url
-
New version of cc is out hopefully we will get a update to the ini with the skype db fix that erroneously deletes contacts list
BTW what happened to my post about the use of "%programfiles%\common files" instead of "%commonprogramfiles%", it seems to have been deleted
[Windows Live Messenger More*] ... FileKey8=%ProgramFiles%\Common Files\Windows Live\.cache|*.*|RECURSE
-
I use IDA (Internet Download Accelerator) and I can tell you it does not have/need these files cleaned
[internet Download Accelerator] ... DetectFile=%CommonAppData%\Speedbit\DAP ... FileKey7=%CommonAppData%\Speedbit\DAP\Log|*.* FileKey8=%CommonAppData%\Speedbit\DAP\temp|*.tmp FileKey9=%CommonAppData%\Speedbit\DAP\History|*.dat|RECURSE
Speeddbit\DAP I think is for Download Accelerator Plus (completely different program)
-
I hope they add registry wildcard next
-
CCleaner v3.09 * Added wildcard support to folders.
-
Its very nice but not nicer than the current one
-
Plese read here, these are not needed because they are in embedded INI
[Remote Desktop Connection More*] ; NOT NEEDED RegKey1=HKCU\Software\Microsoft\Terminal Server Client\Default|MRU0 RegKey2=HKCU\Software\Microsoft\Terminal Server Client\Default|MRU1 RegKey3=HKCU\Software\Microsoft\Terminal Server Client\Default|MRU2 RegKey4=HKCU\Software\Microsoft\Terminal Server Client\Default|MRU3 RegKey5=HKCU\Software\Microsoft\Terminal Server Client\Default|MRU4 RegKey6=HKCU\Software\Microsoft\Terminal Server Client\Default|MRU5 RegKey7=HKCU\Software\Microsoft\Terminal Server Client\Default|MRU6 RegKey8=HKCU\Software\Microsoft\Terminal Server Client\Default|MRU7 RegKey9=HKCU\Software\Microsoft\Terminal Server Client\Default|MRU8 RegKey10=HKCU\Software\Microsoft\Terminal Server Client\Default|MRU9
-
[MAL Updater Image Cache*] LangSecRef=3023 DetectFile=%ProgramFiles%\Mal Updater 2\MalUpdater.exe Default=False FileKey1=%AppData%\Mal Updater\AnimePics|*.* FileKey2=%AppData%\Mal Updater\MangaPics|*.* FileKey3=%AppData%\Mal Updater\SeasonData|*.* [MAL Updater Logs*] LangSecRef=3023 DetectFile=%ProgramFiles%\Mal Updater 2\MalUpdater.exe Default=False FileKey1=%AppData%\Mal Updater\Users|*.log|RECURSE
The logs rule was a bit tricky, because the logs actually are in %AppData%\Mal Updater\Users\USERNAME\ (for example: Users\rctgamer3\AnimeLogNotes.log).
Is using RECURSE the best way to do it? No other files should be deleted other than the .log files.
Try it with %username% variable
-
@CSGalloway
I found your previous post painfully obscure.
It was NOT immediately obvious what you were on about.
Yes, I notice you speak and have no clue what you are talking about
Always gotta get your two cents in, even if its wrong
-
I added a nice little "How-To" to the first post... thoughts?
AWESOME!
You should also post all the internal CCleaner supported variables %Documents%, %MyDocuments%, etc.
-
Is this missing a backslash after %CommonAppData%?
[AOL 9.6*] Default=False DetectFile=%CommonAppData%AOL\C_AOL Desktop 9.6 LangSecRef=3022 FileKey1=%CommonAppData%AOL\C_AOL Desktop 9.6\spool|*.tmp FileKey2=%CommonAppData%AOL\C_AOL Desktop 9.6\bart|*.*|RECURSE
BTW I just checked in official CCleaner INI and the new registry entries I added to Remote Desktop Connection are not needed
[Remote Desktop]ID=2063
LangSecRef=3025
Detect=HKCU\Software\Microsoft\Terminal Server Client
Default=True
FileKey1=%localappdata%\Microsoft\Terminal Server Client\Cache|*.*
RegKey1=HKCU\Software\Microsoft\Terminal Server Client\Default
ExcludeKey1=REG|HKCU\Software\Microsoft\Terminal Server Client\Default\AddIns
-
I was referring to editing INI files [sections]
Now that you mention it wildcard registry support would also be nice (like in the case of the MRU* I found/added to Remote Desktop Connection)
-
Anyway of NOT deleting the .INI file to preserve settings, only editing it to remove MRU stuff example
UniExtract.ini
[uniExtract Preferences] globalprefs=1 history=1 appendext=1 removetemp=1 removedupe=1 warnexecute=1 debugdir=%temp% [File History] 0=C:\Users\Ricardo\Desktop\wpi.msi 3=F:\Microsoft\Drivers\Se7en\INF_allOS_9.1.1.1014_PV.exe 5=F:\Microsoft\Drivers\Se7en\INF_allOS_9.1.2.1008_PV.exe 6=C:\Users\Ricardo\Downloads\wintv7setup.exe 7=C:\Users\Ricardo\Documents\Projects\dotNETMaker\dotNETfx\DNF11\netfx.msi 8=C:\Users\Ricardo\Desktop\Seven Remix XP 2.41.exe 9=C:\Users\Ricardo\Downloads\EP0000156866.exe 2=F:\Microsoft\Drivers\Se7en\INF_allOS_9.2.0.1021_PV.exe 1=F:\wpi\Install\SkypeSetup.msi 4=F:\Microsoft\Drivers\Se7en\INF_allOS_9.1.2.1007_PV.exe [Directory History] 0=C:\Users\Ricardo\Desktop\wpi 3=F:\Microsoft\Drivers\Se7en\INF_allOS_9.1.1.1014_PV 5=F:\Microsoft\Drivers\Se7en\INF_allOS_9.1.2.1008_PV 6=C:\Users\Ricardo\Downloads\wintv7setup 7=C:\Users\Ricardo\Documents\Projects\dotNETMaker\dotNETfx\DNF11\netfx 8=C:\Users\Ricardo\Desktop\Seven Remix XP 2.41 9=C:\Users\Ricardo\Downloads\EP0000156866 2=F:\Microsoft\Drivers\Se7en\INF_allOS_9.2.0.1021_PV 1=F:\wpi\Install\SkypeSetup 4=F:\Microsoft\Drivers\Se7en\INF_allOS_9.1.2.1007_PV
Code could go something like
[universal Extractor*] LangSecRef=3021 DetectFile=%ProgramFiles%\Universal Extractor\UniExtract.exe Default=False ; This will delete all that is present under a ini section FileKey1=%ProgramFiles%\Universal Extractor|UniExtract.ini|File History,* ; This will delete only a specified value (8=*) FileKey2=%ProgramFiles%\Universal Extractor|UniExtract.ini|Directory History,8
Its just a rough example to show you what I mean, you guys may know better how to code winapp2.ini
We are working on adding support to clean various types of document/content. INI files will be one of them! Coming soon!
Any progress on this front?
-
Remote Desktop Connection (more cleaning entries)
http://support.microsoft.com/kb/312169
[Remote Desktop Connection*] LangSecRef=3025 DetectFile=%WinDir%\System32\mstsc.exe Default=False FileKey1=%Documents%|*.rdp RegKey1=HKCU\Software\Microsoft\Terminal Server Client\Default|MRU0 RegKey2=HKCU\Software\Microsoft\Terminal Server Client\Default|MRU1 RegKey3=HKCU\Software\Microsoft\Terminal Server Client\Default|MRU2 RegKey4=HKCU\Software\Microsoft\Terminal Server Client\Default|MRU3 RegKey5=HKCU\Software\Microsoft\Terminal Server Client\Default|MRU4 RegKey6=HKCU\Software\Microsoft\Terminal Server Client\Default|MRU5 RegKey7=HKCU\Software\Microsoft\Terminal Server Client\Default|MRU6 RegKey8=HKCU\Software\Microsoft\Terminal Server Client\Default|MRU7 RegKey9=HKCU\Software\Microsoft\Terminal Server Client\Default|MRU8 RegKey10=HKCU\Software\Microsoft\Terminal Server Client\Default|MRU9
I extracted the VBS from the MSI "Fix it" installer, this is what it does/looks like
Option Explicit On Error Resume Next Const HKEY_CURRENT_USER = &H80000001 Const strKeyPath = "Software\Microsoft\Terminal Server Client\Default" Const strComputer = "." Const REG_SZ = 1 Dim objReg , arrValueNames , arrValueTypes Dim i Set objReg=GetObject("winmgmts:{impersonationLevel=impersonate}!\\" & strComputer & "\root\default:StdRegProv") objReg.EnumValues HKEY_CURRENT_USER, strKeyPath , arrValueNames, arrValueTypes If Not IsNull(arrValueNames) Then For i=0 To UBound(arrValueNames) If arrValueTypes(i) = REG_SZ And InStr(arrValueNames(i),"MRU") = 1 Then objReg.DeleteValue HKEY_CURRENT_USER,strKeyPath,arrValueNames(i) End If Next End If Dim objShell : Set objShell = CreateObject("WScript.Shell") Dim objFSO : Set objFSO = CreateObject("Scripting.FileSystemObject") Dim strPathDefault strPathDefault = objShell.ExpandEnvironmentStrings("%USERPROFILE%") If Not IsNull(strPathDefault) Then If objFSO.FileExists(strPathDefault & "\Documents\Default.rdp") Then objFSO.DeleteFile(strPathDefault & "\Documents\Default.rdp") End If If objFSO.FileExists(strPathDefault & "\My Documents\Default.rdp") Then objFSO.DeleteFile(strPathDefault & "\My Documents\Default.rdp") End If End If Function MyVBScriptCA() If (Err.Number=0) Then 'return success MyVBScriptCA = 1 Else 'return cancel MyVBScriptCA = 2 End If End Function
-
DUH! to try to make some $$$ to keep the program "FREE"
Its not some mysterious app its chrome and its not like you cant opt out
-
Thanks...heres one
Resource Hacker (setup) the .GID file is created if you launch the HLP file
[Resource Hacker*] LangSecRef=3024 DetectFile="%ProgramFiles%\Resource Hacker\ResHacker.exe" Default=False FileKey1=%ProgramFiles%\Resource Hacker|ResHacker.ini FileKey2=%ProgramFiles%\Resource Hacker|reshacker.GID
-
Will there be a update today
-
[Temporary Setup Catalogs*] LangSecRef=3025 DetectFile=%WinDir%\SET3.tmp Default=False FileKey1=%WinDir%|SET*.tmp
Explained what these are here
-
CAT files that sign other files are officially stored (and you can find the duplicate files I mentioned installed) in %WinDir%\system32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}, you can then compare them with any MD5 file verifier on ANY language edition of XP and you will get the same results (MD5's will differ from language to language)
You can also rename the TMP files to CAT and open them to see they are indeed CAT files (you can also right click them and see a digital signature tab)
These catalog files are applied/installed during XP setup via the syssetup.inf ProductCatalogsToInstall section but for some reason they are not deleted after
[ProductCatalogsToInstall] NT5INF.CAT, 1 NT5.CAT SP3.CAT NTPRINT.CAT NT5IIS.CAT MAPIMIG.CAT FP4.CAT IMS.CAT MSMSGS.CAT HPCRDP.CAT MW770.CAT wmerrenu.cat IASNT4.CAT MSTSWEB.CAT OEMBIOS.CAT tabletpc.cat mediactr.cat netfx.cat
If you are still unsure they are junk then you can delete them, then run sigverif.exe to scan your entire HDD and see that many/most of the XP system files are still signed by the CAT's I list (SP3.CAT, NTPRINT.CAT, IMS.CAT)
Your .net error is irrelevant to this subject
Winapp2.ini additions
in CCleaner
Posted
I think it would be better to add this to the already existing playready entry...reason being is not everybody with ehome (media center) will get playready installed, it only installs if you have a TV tunver