-
Posts
414 -
Joined
-
Last visited
Posts posted by CSGalloway
-
-
Revised entry
[Adobe Acrobat DC*]
LangSecRef=3021
Detect1=HKLM\SOFTWARE\Adobe\Adobe Acrobat\DC
Detect2=HKCU\Software\Adobe\Acrobat Reader\DC
Default=False
FileKey1=%ProgramFiles%\Adobe\Acrobat DC\Setup Files|*.*|REMOVESELF
FileKey2=%CommonAppData%\Adobe\Setup|*.*|REMOVESELF
FileKey3=%LocalAppData%\Adobe\Acrobat|*.idx|RECURSE
FileKey4=%LocalAppData%\Adobe\Acrobat\DC\Cache|*.*
FileKey5=%LocalAppData%\Adobe\Acrobat\DC|UserCache.bin
RegKey1=HKCU\Software\Adobe\Adobe Acrobat\DC\AVConversionFromPDF
RegKey2=HKCU\Software\Adobe\Adobe Acrobat\DC\AVConversionToPDF
RegKey3=HKCU\Software\Adobe\Adobe Acrobat\DC\AVGeneral\cDockables
RegKey4=HKCU\Software\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles
RegKey5=HKCU\Software\Adobe\Adobe Acrobat\DC\AVGeneral\cToolbars
RegKey6=HKCU\Software\Adobe\Adobe Acrobat\DC\RememberedViews\cNoCategoryFiles
RegKey7=HKCU\Software\Adobe\Adobe Acrobat\DC\ShareIdentity
RegKey8=HKCU\Software\Adobe\Adobe Synchronizer\DC
Changed Detect= to Detect1 and added Detect2=
-
I have snipped 5 screen to get the whole Programs and Features list, which I have attached; Also attached the CCleaner install.txt -
The install.txt shows
HP Magic Canvas Hewlett-Packard 2/29/2012 124 MB 5.1.15.0
HP Magic Canvas Hewlett-Packard 2/29/2012 5.1.15.0
and
HP TouchSmart RecipeBox Hewlett-Packard 2/29/2012 43.6 MB 3.0.3830.27730
HP TouchSmart RecipeBox Hewlett-Packard 2/29/2012 3.0.3830.27730
but from one of the JPGs one can see both are onl listed once. Seems to be a bug in CCleaner,....
-
what about using the new location as detect and the old location as cleaning rule?
so then something like this:
[Old Windows Live Cache*]
LangSecRef=3021
Warning=This will remove Cache files for old installs of Windows Live - use with caution
DetectFile=%CommonProgramFiles%\Windows Live|.cache
Default=False
FileKey1=%LocalAppData%\Windows Live\.cache|*.*|RECURSE
Not tested...
-
A dummy cleaner that is used for detection purposes only but deletes nothing may be a workaround - although I've never tried that before.
I am not sure what you mean, in my case. I'd be interested in a sample please - when you or someone else has time....
-
The best way to check is to temporarily rename the folder (with all live apps killed) and see if all live products survive running afterwards. if the folder recreates on the first product you're pretty safe, but I'd still suggest test all the live software to be sure.
I wrote:
>>>>>>>>>>>>>>>>>>>
%UserProfile%\AppData\Local\Windows Live\.cache
Is it safe to remove the files in this folder? What are the positives and the drawbacks please?
C:\Users\username\AppData\Local\Windows Live\.cache
Mine has 34 files totaling 136 MBs....
I use Live Messenger, and Live Mail....
<<<<<<<<<<<<<<<<<<
to Microsoft Answers and got this back:
>>>>>>>>>>>>>>>>>>
That hidden folder contains the installers for all of the elements of older installations of the Windows (Live) Essentials suite. Later installations put these files at
C:\Program Files (x86)\Common Files\Windows Live\.cache
instead, so if you find a similar collection of folders and files there, you can safely delete the ones in the user profile.
If you completely remove the installer files for any of the programs, you'll probably not be able to repair or uninstall them easily.
<<<<<<<<<<<<<<<<<
And I guess there is no way to test for the existence of both folders in CCleaner?
-
I use Windows Live products. Anyone know if it's safe to delete:
%LocalAppData%\Windows Live\.cache|*.*
?? If so I can remove 34 items totaling 136 MBs...
-
New Entry: [jv16 PowerTools X Backup Files*]
Revised Entry to incorporate jv16 PowerTools X. Plus shortened name a bit.
[jv16 PowerTools X Backup Files*] LangSecRef=3024 DetectFile=%ProgramFiles%\jv16 PowerTools X\jv16PT.exe Default=False FileKey1=%ProgramFiles%\jv16 PowerTools X\Backups|*.*|RECURSE FileKey2=%ProgramFiles%\jv16 PowerTools X\Settings|UserActionLog.txt FileKey3=%LocalAppData%\VirtualStore\Program Files*\jv16 PowerTools X\Backups|*.*|RECURSE FileKey4=%LocalAppData%\VirtualStore\Program Files*\jv16 PowerTools X\Settings|UserActionLog.txt ExcludeKey1=FILE|%ProgramFiles%\jv16 PowerTools X\Backups\License.xbin_backup
[jv16 PowerTools Reg Compact Backups*] LangSecRef=3024 DetectFile1=%ProgramFiles%\jv16 PowerTools 2009\jv16PT.exe DetectFile2=%ProgramFiles%\jv16 PowerTools 2010\jv16PT.exe DetectFile3=%ProgramFiles%\jv16 PowerTools 2011\jv16PT.exe DetectFile4=%ProgramFiles%\jv16 PowerTools 2012\jv16PT.exe DetectFile5=%ProgramFiles%\jv16 PowerTools 2013\jv16PT.exe DetectFile6=%ProgramFiles%\jv16 PowerTools 2014\jv16PT.exe DetectFile7=%ProgramFiles%\jv16 PowerTools X\jv16PT.exe Default=False Warning=This removes the registry hive backup files generated by jv16 PowerTools during a registry compaction. These files are not needed once the compaction is successfully completed. They can be safely deleted. NOTE that the system must be rebooted following a registry compaction completion in order for jv16 to release these files for deletion. FileKey1=%LocalAppData%\Microsoft\Windows|UsrClass.dat.jv16pt* FileKey2=%SystemDrive%\Documents and Settings\NetworkService|NTUSER.DAT.jv16pt* FileKey3=%SystemDrive%\Documents and Settings\LocalService|NTUSER.DAT.jv16pt* FileKey4=%SystemDrive%\Documents and Settings\NetworkService.NT*|NTUSER.DAT.jv16pt* FileKey5=%SystemDrive%\Documents and Settings\LocalService.NT*|NTUSER.DAT.jv16pt* FileKey6=%UserProfile%|NTUSER.DAT.jv16pt* FileKey7=%WinDir%\System32\config|Default.jv16pt*;software.jv16pt*;system.jv16pt*;SAM.jv16pt*;COMPONENTS.jv16pt* FileKey8=%WinDir%\ServiceProfiles\LocalService|NTUSER.DAT.jv16pt* FileKey9=%WinDir%\ServiceProfiles\NetworkService|NTUSER.DAT.jv16pt*
Needs to include:
C:\Program Files (x86)\jv16 PowerTools X\Backups\00019A\91F61065-CF82.tmp
-
[Windows Live Setup Temp Files*]
LangSecRef=3022
Detect=HKLM\Software\Microsoft\Windows Live
Default=False
FileKey1=%CommonAppData%\Microsoft\WLSetup|*.tmp
FileKey2=%LocalAppData%\VirtualStore\ProgramData\Microsoft\WLSetup|*.tmp
FileKey3=%CommonProgramFiles%\Windows Live\.cache|*.tmp
: Added FileKey3
-
Yes RECURSE is needed.....
FileKey1 and new FileKey4 almost same..the different only RECURSE
if you have YM installed, you should check for FileKey2 also if its need RECURSE too
-
It might have helped if the original poster would have mentioned what FileKey4 was - would have saved a few messages....
And yes I concur that no FileKey should appear for anything under \storage folders\ - VERY BAD IDEA
After using this entry - did you wait for WLM to finish finding the emails? It seems not to have the problems you are experiencing -
-
[Yahoo Messenger Logs*]
LangSecRef=3022
Detect=HKCU\Software\Yahoo\pager
Default=False
FileKey1=%LocalAppData%\VirtualStore\*\Yahoo!\Messenger\logs|*.log
FileKey2=%ProgramFiles%\Yahoo!\Messenger|*.log
FileKey3=%LocalAppData%\VirtualStore\Program Files*\Yahoo!\Messenger\Cache|*.log;*.tmp
FileKey4=%LocalAppData%\VirtualStore\Program Files*\Yahoo!\Messenger\logs|*.log|RECURSE
ExcludeKey1=%ProgramFiles%\Yahoo!\Messenger\INSTALL.LOG
- Added FileKey4 - and tested...
-
Shouldn't FileKey4=%CommonAppData%\HP\Installer\Temp|*.*
in reference to http://forum.piriform.com/index.php?showtopic=32310&page=242&do=findComment&comment=259821 ?
-
After using this entry - did you wait for WLM to finish finding the emails? It seems not to have the problems you are experiencing -
Windows Live Mail WARNING!
Finally tracked this one down - recovered and imported Windows Live emails are routinely stored as *.eml files in various folders under "Storage Folders" - and the FileKey4 entry obliterates them completely leaving behind only an email header entry.
After almost a year of hearing friends and coworkers complain from time to time that their older emails were no longer readable, I finally tracked it down to this entry added in April 2014. Since no one noticed it at the time (new emails don't go into this folder), any backups made since April are useless in efforts to recover the lost data. Some people have lost years of email correspondence (a few lucky ones still had backups from before April).
Either remove the offending FileKey4 entry entirely or add an appropriate warning about the potential (I'd say almost certain) loss of emails!
-
CCleaner does not kill Disk Cleanup. I use Win 7 Home x64.
-
I guess mentioning other party tools is against the rules? Sorry.
| Shane has been travelling and hasn't had time to update the download on his end, where voldemort draws his magic from
I would assume he just replaces the old winapp2.ini with the newer one. Hence the actually link does not change. I have heard people are having troubles downloading other files like Trim.bat - so I think it's a access rule that is not correct...
-
On the old box, open ccleaner and options/advanced store settings in ini. Copy the ini to your new pc (optionally uncheck store in ini)
Where is the INI file stored and the name of it please?
-
The settings are stored in "HKCU\Software\Piriform\CCleaner" - could export from the old system and import to the new one....
-
I use {VOLDEMORT} and it wouldn't download the updated winapp2,ini so I had to finally use Chrome to download the INI to the desktop then move I to the CCleaner folder.
-
Well a solution that is not elegant - is to uninstall CCleaner then download fresh from www.piriform.com
-
Could it be System > Desktop Shortcuts was selected and it removed dead shortcuts - or maybe Windows > Icon Cache was selected?
Has DavidOptrics restarted the computer to see if the icons will reappear?
-
i checked my XP,7 and 8 with chrome installed and i can't find this folder %CommonProgramFiles%\Microsoft\ART\Backup\Google Chrome\
searching through the internet i only see threads of infected people with unwanted toolbar
i don't know if this folder related to the unwanted toolbar or not but you better perform an antimalware scan just incase you're infected
You have to use CMD as administrator then search for the folder -
-
It would help if you'd just edit it out of your post of winapp2.ini entries you submitted, that way Winapp2.ini (person) doesn't accidentally include it when he updates and it could save the casual lurker from copying it and using it at their dismay.
Done.....
-
Well then do not include the entry in winapp2.ini - thanks
-
I thought BAK files were backups and safe to delete. And anyway:
10/17/2002 20:23 8,200 OPA11.BAK
3/20/2013 14:22 11,094 opa11.dat
so I thought OFFICE would be using the .DAT file and not the .BAK one...
Winapp2.ini additions
in CCleaner
Posted
Why is mine not a good idea? It does not show up on mine if I don't fix the detects - I'm using Win7 x64.