Jump to content

qsdewa

Experienced Members
  • Posts

    76
  • Joined

Posts posted by qsdewa

  1. [CloudShark Plugin for Wireshark*]
    LangSecRef=3024
    DetectFile=%AppData%\Wireshark\plugins\cloudshark
    Default=False
    FileKey1=%AppData%\Wireshark\plugins\cloudshark\tmp|*.*
    

    I can not figure out what is in this folder even after using the plugin in Wireshark. So you decide if to add or not to add.

  2. I launch CMD.EXE and use the "DOS" command MKLINK

    You need the /J argument.

    To see how to use it issue the command

    MKLINK /?

     

    This is a script I used before I abandoned Firefox in favor of the more dependable cousin Palemoon.

    @ECHO OFF
    XCOPY C:\Users\Alan\AppData\Local\Mozilla\Firefox\Profiles\9ajtpvt8.default D:\Junctions\FireFox\Local\Default /E /I
    PAUSE
    RD /S /Q C:\Users\Alan\AppData\Local\Mozilla\Firefox\Profiles\9ajtpvt8.default
    MKLINK /J C:\Users\Alan\AppData\Local\Mozilla\Firefox\Profiles\9ajtpvt8.default D:\Junctions\FireFox\Local\Default
    PAUSE
    RD /S /Q C:\Users\User\AppData\Local\Mozilla\Firefox\Profiles\e8qzuv4d.default
    MKLINK /J C:\Users\User\AppData\Local\Mozilla\Firefox\Profiles\e8qzuv4d.default D:\Junctions\FireFox\Local\Default
    PAUSE
    

    NB

    The first two PAUSE give the opportunity to use Windows Explorer and confirm that a duplicate "9ajtpvt8.default" has been successfully copied before the original is deleted.

     

    A more recent script for Palemoon is

    @ECHO OFF
    MD D:\Junctions\PaleMoon\
    FOR %%X IN (Alan User) DO FOR %%Y IN (Local Roaming) DO CALL :ALL %%X %%Y
    PAUSE
    GOTO :EOF
    
    :ALL
    SET LINK=C:\Users\%1\AppData\%2\Moonchild Productions\Pale Moon
    SET TARGET=D:\Junctions\PaleMoon\%1\%2\Pale Moon
    
    ECHO %LINK%
    ECHO %TARGET%
    XCOPY "%LINK%" "%TARGET%" /E /I /Q
    
    RENAME "%LINK%" Pale#Moon
    ECHO(
    MKLINK /J "%LINK%" "%TARGET%"
    ECHO(
    

    NB

    After running that script the original folders have been renamed as PALE#MOON,

    and after the script has been successful these PALE#MOON folders can be manually deleted,

    but if something went wrong with the script it is a simple job to remove the junctions and rename PALE#MOON back to "PALE MOON".

     

    Another approach I have used is Junction Link Magic

    http://www.rekenwond...m/linkmagic.htm

     

    This has the benefits that it has a Windows GUI and is far more user friendly than trying to understand "MKLINK /?".

     

    Very interesting. Thank You very much.

  3. Maybe is a bug or maybe is a suggestion. My firefox cache folder is customized in about:config and ccleaner don't read this value setting and select the default profile's folder.

    The key name is browser.cache.disk.parent_directory

     

    CCleaner does not read any values from any program. It uses rules for the standard paths to find for example the Firefox cache.

    This is the rule which CCleaner uses to delete Firefox cache:

    [Mozilla - Internet Cache]
    ID=2001
    LangSecRef=3026
    LangRef=3161
    Default=True
    SpecialDetect=DET_MOZILLA
    SpecialKey1=N_MOZ_CACHE
    

    There You can see that there is "SpecialKey". This means CCleaner searches for the standard paths (positions on hard drive) which are used for example by Firefox.

    Another example is the Skype rule:

    [skype]
    ID=2205
    LangSecRef=3022
    DetectFile=%ProgramFiles%\Skype\Phone\Skype.exe
    Default=True
    FileKey1=%AppData%\Skype|temp*
    

    So there You can see "Filekey1". There CCleaner searches for the unnecessary files left by Skype. These are the folders:

    Windows XP: C:\Documents and Settings\{username}\Application Data\Skype

    Windows Vista/7: C:\Users\{username}\AppData\Roaming\Skype

    It deletes the files which start with temp

     

    So if You change the standard path for example in Firefox, CCleaner will not be able to find the cached files.

     

    Now You have three possibilities:

    - You can change the browser.cache.disk.parent_directory key to his default value.

     

    - You can create Your own entry for CCleaner to delete the Firefox cache. Therefore see here (under "How to make your own Winapp2.ini entry" click "Show". There are some good explanations to).

     

    - Under "Options" and then "Include" add userspecific folder to CCleaner. Select "Add" and then choose the folder called cache, click "Ok" and then the same for the folder called jumpListCache. For both folders You have to select under "Options" "Include files and subfolders".

    Standard path for these folders is: %LocalAppData%\Mozilla\Firefox\Profiles\ and then your profile's name.

     

    Good luck

    qsdewa

     

    PS: If you have more questions post them here.

  4. Seems I also missed Captcha Brotherhood :(

     

    Yes, You missed it. http://forum.piriform.com/index.php?showtopic=32310&view=findpost&p=221965

     

    Did You miss the JDownloader updateLog.txt? http://forum.piriform.com/index.php?showtopic=32310&view=findpost&p=222417

     

     

    My question once again: How often is Winapp2.ini updatet (once per month or every some weeks or randomly)?

     

     

    WARNING about "Windows Media Player (Databases)*"

    This will remove ratings, play counts, last played, etc.

     

    etc.? Please a bit more specific. For example: Playlists too?

  5. qsdewa, please don't link to competitors if that's what that is.

    you'd be better served by telling us what is "some entries" tell us what you think needs additional cleaning.

    also please see my private message.

     

    Ok. I meant for example "Web Local Storages" and "Sandoxed Filesystem" which can be found in the options menu of Click&Clean (and yes, it seems to be a competitor). I do not know what the entries could be, because I tried to figure out some things (removing folders for example \AppData\Local\Chromium\User Data\Default\Local Storage) but it only broke my extenion settings and so in Chrome. So I hoped someone knows something.

  6. [phase-6*]
    LangSecRef=3021
    DetectFile=%UserProfile%\.phase-6
    Default=False
    FileKey1=%UserProfile%\.phase-6|window-position.txt|REMOVESELF
    

     

    [JDownloader*]
    LangSecRef=3022
    DetectFile=%ProgramFiles%\JDownloader
    Default=False
    FileKey1=%ProgramFiles%\JDownloader|updateLog.txt
    

    The detect used for the other entries (Detect=HKLM\Software\JDownloader) will be deleted by CCleaner's Registry Cleaner (at least on my computer).

     

    For the more advanced entries for power users:

     

    List of permanently allowed IP ranges in Peerblock:

    [Peerblock allowed IPs*]
    LangSecRef=3024
    DetectFile=%ProgramFiles%\Peerblock
    Default=False
    FileKey1=%ProgramFiles%\Peerblock\lists|permallow.p2b
    

    This will delete SumatraPDF settings but also the history (sorry that it is in german):

    [sumatraPDF*]
    LangSecRef=3024
    DetectFile=%AppData%\SumatraPDF
    Default=False
    FileKey1=%AppData%\SumatraPDF|sumatrapdfprefs.dat|REMOVESELF
    

     

     

    I have some questions too:

    1. How often is Winapp2.ini updatet (once per month or every some weeks or what)?

    2. When will the advanced entries for power users come back?

  7. I know that there is an option to add portable instances of Mozilla-based-browsers to CCleaner. This also functions for Chromium browsers. But it took a while since I found the How to and it is not comfortable at all.

     

    So I would be looking forward to an option in CCleaner to add portable instances of programs. It could be in the settings menu.

     

    This would be a good feature because for example I have 5 different instances of Firefox Portable and 3 different instances of Iron Portable installed. All for different purposes.

     

    Would be very nice to add this feature in a future version of CCleaner. Maybe later on other portable programs could be added to.

  8. NEW

    [Hard Drive Inspector Error Log*]
    LangSecRef=3024
    DetectFile=%CommonAppData%\AltrixSoft\Hard Drive Inspector
    Default=False
    FileKey1=%CommonAppData%\AltrixSoft\Hard Drive Inspector|log.err
    

    NEW

    [slimComputer Logs*]
    LangSecRef=3024
    DetectFile=%LocalAppData%\SlimWare Utilities Inc\SlimComputer
    Default=False
    FileKey1=%LocalAppData%\SlimWare Utilities Inc\SlimComputer\Logs|*.log
    

    Sorry for creating two posts. If you can and want, please merge them.

  9. [JDownloader Capatchas*] to [JDownloader Captchas*]

    Sorry for being a smart aleck.

    I have a question too: rtmpGUI creates a file named .swfinfo under %UserProfile% but no registry entries or other files.

    Maybe the rule can be like this?

    [rtmpGUI .swfinfo*]
    LangSecRef=3024
    DetectFile=%UserProfile%\.swfinfo
    Default=False
    FileKey1=%UserProfile%|.swfinfo
    

  10. NEW

    [captcha brotherhood*]
    LangSecRef=3024
    DetectFile=%LocalAppData%\Captcha_Brotherhood
    Default=False
    FileKey1=%LocalAppData%\Captcha_Brotherhood|solver_logFile.txt
    

    PS: No option to add portable programs like Cryptload?

  11. NEW

    [sUMo Log*]
    LangSecRef=3024
    Detect=HKCU\Software\KC Softwares\SUMo
    Default=False
    FileKey1=%AppData%\KC Softwares\SUMo|*.log
    

    or

    FileKey1=%AppData%\KC Softwares\SUMo|SUMo.log

     

    PS: Should or shouldn't this

     ... 

    thing be used?

  12. [sUPERAntiSpyware Quarantine*]
    LangSecRef=3024
    Detect=HKCU\SOFTWARE\SUPERAntiSpyware.com\SUPERAntiSpyware
    Default=False
    Warning=This will delete the files which SUPERAntiSpyware moved into quarantine. If you are not sure what this is about, uncheck this option.
    FileKey=%AppData%\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine|*.*
    

     

    The quarantined files of SUPERAntiSpyware. It does not work for me at the moment but I can not figure out what I missed. Maybe someone knows.

  13. :lol: I just about doubled over laughing. Reminds me of a quote from family guy:

     

    Meg: "This is so ironic!"

    Peter: "Meg! Your mother is not an iron!"

     

    That being said, I went ahead and made these:

     

    [DVDVideoSoft Backup*]
    LangSecRef=3024
    Detect=HKCU\Software\DVDVideoSoft
    Default=False
    FileKey1=%AppData%\DVDVideoSoft\Backup|*.*|RECURSE
    
    [DVDVideoSoft History*]
    LangSecRef=3024
    Detect=HKCU\Software\DVDVideoSoft
    Default=False
    FileKey1=%AppData%\DVDVideoSoft\*\History|*.*|RECURSE
    
    [DVDVideoSoft Logs*]
    LangSecRef=3024
    Detect=HKCU\Software\DVDVideoSoft
    Default=False
    FileKey1=%AppData%\DVDVideoSoft\Logs|*.*|RECURSE
    FileKey2=%AppData%\DVDVideoSoft\installation_logs|*.*|RECURSE
    

     

    Works fine. Thank You.

  14. "nope" is not an insult of any kind if that's what you thought it was. It simply means: No

     

    OOOHHHH...

    Than I am sorry I thought that. My german English is just too bad.

    So now this ended up in spamming I think.^^ Sorry for that.

  15. nope only spam posts are ever removed

     

    I am no nope. I just wanted to ask because on other forums old posts will be removed after they have been worked into the software so the thread won't get so big and cluttered.

  16. qsdewa, on 17 September 2012 - 07:58 PM, said:

    Cleaning rules for DVDVideoSoft Free Studio ( http://dvdvideosoft.com/ ). But I am not so advanced with the rules so I don't know so much about them

     

    [DVDVideoSoft*]

    LangSecRef=3024 (maybe)

    Detect/DetectFile=

    Default=False

    FileKey/RegKey

     

    All the folders I found are in %AppData%\DVDVideoSoft

    There are

    \backup

    \installation_logs

    \logs

    \setup

    \"program's name"\History

     

    Nergal, on 17 September 2012 - 08:21 PM, said:

    you need to provide an actual detect (usually a registry key). Something that's always there

    you need to provide an actual set of things to clean. If you need to, experiment (move things out of the folder see if it breaks the program, or it's ability to update).

    What exactly is it you want this entry to achieve? What junk is left behind? Does the program keep a list of recently opened or saved files? Find out where those are stored

    [DVDVideoSoft*]
    LangSecRef=3021
    DetectFile=%AppData%\DVDVideoSoft or HKCU\Software\DVDVideoSoft
    Default=False
    FileKey1=%AppData%\DVDVideoSoft\backup|*.*
    FileKey2=%AppData%\DVDVideoSoft\installation_logs|*.*
    FileKey3=%AppData%\DVDVideoSoft\logs|*.*
    FileKey4=%AppData%\DVDVideoSoft\setup|*.*
    FileKey5=%AppData%\DVDVideoSoft\*\History|*.*
    

    Hope this is right now.

     

    PS: Don't You remove old posts which have been worked into winapp2.ini?

  17. Cleaning rules for DVDVideoSoft Free Studio ( http://dvdvideosoft.com/ ). But I am not so advanced with the rules so I don't know so much about them.

     

     

    [DVDVideoSoft*]

    LangSecRef=3024 (maybe)

    Detect/DetectFile=

    Default=False

    FileKey/RegKey

     

    All the folders I found are in %AppData%\DVDVideoSoft

    There are

    \backup

    \installation_logs

    \logs

    \setup

    \"program's name"\History

×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.