Jump to content

ident

Experienced Members
  • Posts

    1,627
  • Joined

  • Last visited

Everything posted by ident

  1. It's very possible. All of the top of my head so feel free to correct, Just add a new shell entry in HKCR under exefile to associate CCleaner with only EXE files. Arguments, appPath and also " " + Chr(34) + "%1" + Chr(34) Then it's just a case of handling it in in GetCommandLineArgs() onstart up. Pointless? Very much so since CCleaner offers no ability other then to invoke the applications own Uninstaller.
  2. ident

    Softpedia

    Makes me wonder which morons write these.
  3. Sure you're not over doing it and was still at your laptop?
  4. What happen when ccleaner starts? just not open or closes? Have you tried uninstalling then reinstalling ccleaner? Are you saying you have located the temp file (69gb) but it wont let you delete it? If you have not found the large file download http://windirstat.info/download.php to locate the file.
  5. Seems like they will just be gold digging for what ever money they can get now since they are as famous as rock stars I'll get my coat...
  6. I have never once used ccleaners uninstaller. So why would i want it loaded?
  7. Mr Don, The only true way to destroy data making it unrecoverable is by completely destroying the magnetic platters in the hard drive. No software can do this. Criminal forensic data recovery cases done in a lab can(yes/no) lead to convictions from over written data. This is because hard drives write to magnetic data there's normally over spill of data either side of the data track. That level of data recovery is stupidly expensive. Mega ??? 99.999% of ccleaners do not, need not, or ever will have to worry about the mist that clouds around the possibility that a forensic scope can gather enough data from the over spill to seal a conviction. This is totally out of sight of what a PC clean up till should be used for.
  8. I heard it was aborted? Something about a miner problem.
  9. I'm sorry you felt the need to write all that out mr don but that's really off topic and adding totally confusing information for this particular user. 1 Pass is more the sufficient here. If you wish to read my views on the possible recovery on over written data, which has not actually come from the data it self but from the over spill of data either side of the data track then feel free to Here But that's all i will say on the matter in this topic. I'm sure we can both use are common sense here to realize when some one posts about secure browser cleaning they are not expected there data to be put under a forensic scope.
  10. Not much on google for cm, but if any one else knows it will be appreciated. 1) Can't get it to stay on top. I know putty allows this under behavior but can puttycm do this? 2)One shell, Two screens. Do i really need a separate connection for each? Double clicking on each stored SSH connection connects to the saved address will send different commands, screen -r 19076 or screen -r 26291 Is there away to use the one connection and tab both screens? 3)Can puttycm auto log into the saved connection
  11. I couldn't agree more with auto backing up registry changes by default. As long as this was customizable. But as alan said, system restore points, full registry back ups. Getting a little counter productive.
  12. What Nergal is saying is can you compare the before and after summery for us. analyze : show us whats said to be deleted Run : show us what was deleted His second part was saying are you making sure the browser process has terminated. Just because you can not see the browser does not mean it is still not running. CCleaner will skip certain task if said browser is open.
  13. 1 overpass is sufficient in making files not recoverable. 35 passes is out dated and a waste of time. There is lots of information if you search the forums about 35 passes.
  14. Are you sure you even downloaded ccleaner to begin with?
  15. Hello and welcome to the forum. You need to give us more information. There are many clever people on piriform but unfortunately none of us are mind readers. What files are not being removed on the first occasion? What is being removed on the second/third etc attempts. System OS can be useful. Also do not waste your time with any thing other then one simple over write when erasing data.
  16. Have a look maybe at what html files are associated with. Save a webpage - Right click properties - see what open with is set as
  17. Sorry no. I dont bother with logs. Why not just do what i suggested and be done with it?
  18. Alan: I wonder if it is to do with the logs are under all users? C:\Documents and Settings\All Users\Application Data\Alwil Software\Avast5\log
  19. I guess are group just have a completely different sense of humour. That is very tame considering some of the real life jokes we all play on each other.
  20. Im not a main opera user but is there not a fit page to width option? edit* right hand side statusbar. Click View - fit to width edit* http://my.opera.com/dude09/blog/2008/04/14/fit-to-width-for-all-tabs-at-once
  21. It's not hard at all. There is no great mystery. These people who fall for these emails are the same people who use the same password questions on every site. Hotmail secret question, I have countlessly breached these accounts on friends for a laugh. Once gained you can have access to paypal. How would you receive these alert emails if i had control of your account? You are assuming a user is sitting 24/7 by there pc What if they only checked once a week? Bit late by then since the money is gone.
  22. Better off using avast own delete feature. settings - maintenance -
×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.