|
electronixtar
铂金会员
      
积分 7493
发帖 2672
注册 2005-9-2
状态 离线
|
『楼 主』:
有没有想做一个垃圾清理的批处理?
使用 LLM 解释/回答一下
ccleaner做的不错,但是必须安装。太恶心了。我们可以做一个批处理的嘛
提取ccleaner里面的数据库,winapp.ini,winreg.ini,winsys.ini,然后用批处理读取ini文件,然后用通用的语句来执行这些操作。
由于ccleaner申明了版权,不方便贴上来。想研究的朋友们可以 下载一个ccleaner
有一个新的垃圾可能ccleaner没有清除:Windows补丁备份
Last edited by electronixtar on 2006-10-23 at 08:17 ]
CCleaner is well done, but it must be installed. Too disgusting. Can we make a batch script?
Extract the databases in CCleaner, winapp.ini, winreg.ini, winsys.ini, and then use batch to read the ini files, and then use general statements to perform these operations.
Since CCleaner has claimed copyright, it is not convenient to post it here. Friends who want to study can download a CCleaner
There is a new type of junk that may not be cleared by CCleaner: Windows patch backups
Last edited by electronixtar on 2006-10-23 at 08:17 ]
|

C:\>BLOG http://initiative.yo2.cn/
C:\>hh.exe ntcmds.chm::/ntcmds.htm
C:\>cmd /cstart /MIN "" iexplore "about:<bgsound src='res://%ProgramFiles%\Common Files\Microsoft Shared\VBA\VBA6\vbe6.dll/10/5432'>" |
|
2006-10-23 08:11 |
|
|
namejm
荣誉版主
       batch fan
积分 5226
发帖 1737
注册 2006-3-10 来自 成都
状态 离线
|
『第 2 楼』:
使用 LLM 解释/回答一下
网上已经有人做出了系统垃圾清理批处理,但是只能清除系统里的%tmp%等固定的几个位置里的临时文件和备份文件等,并没有针对特定软件的垃圾文件,看来清除垃圾的批处理还可以进一步研究。
There are already people on the Internet who have made batch scripts for system garbage cleaning, but they can only clear temporary files and backup files and other things in a few fixed locations like %tmp% in the system. There are no specific garbage files for specific software. It seems that batch scripts for clearing garbage can be further studied.
附件
1: 快速清理垃圾文件安装版.rar (2006-10-23 08:25, 1.27 KiB, 下载附件所需积分 1 点
,下载次数: 138)
|

尺有所短,寸有所长,学好CMD没商量。
考虑问题复杂化,解决问题简洁化。 |
|
2006-10-23 08:25 |
|
|
electronixtar
铂金会员
      
积分 7493
发帖 2672
注册 2005-9-2
状态 离线
|
『第 3 楼』:
使用 LLM 解释/回答一下
嘿嘿,那些东西不成体系,而且不全面。我们可以做一个可以自动升级数据库、全面的嘛,要做成模块话的。比如说清理文件夹是一个 函数,然后读取ini里的一个for来调用这个函数。这样用户可以自行添加所需内容。光清理文件还不够,还要包括注册表和第三方软件清理。我提出ccleaner的重要性就因为ccleaner做的全面。真的是无所不包啊
namejm版主的这个也太少了点吧,太基础了。
@echo off
color f0
echo.
echo 正在安全地自动清除垃圾文件……
del /f /q %systemdrive%\*.tmp>nul 2>nul
del /f /q %systemdrive%\*._mp>nul 2>nul
del /f /q %systemdrive%\*.log>nul 2>nul
del /f /q %systemdrive%\*.gid>nul 2>nul
del /f /q %systemdrive%\*.chk>nul 2>nul
del /f /q %systemdrive%\*.old>nul 2>nul
del /f /q %windir%\*.bak>nul 2>nul
del /f /q %windir%\*.tmp>nul 2>nul
del /f /q %windir%\prefetch\*.*>nul 2>nul
del /f /s /q %systemdrive%\recycled\*.*
del /f /q "%ALLUSERSPROFILE%\Documents\DrWatson\*.*">nul 2>nul
del /f /q "%USERPROFILE%\Cookies\*.txt">nul 2>nul
del /f /q /s "%TEMP%\*.*">nul 2>nul
del /f /q /s "%Systemroot%\Prefetch\*.*">nul 2>nul
del /f /q "%USERPROFILE%\Recent\*.*">nul 2>nul
del /f /q "%USERPROFILE%\Application Data\Microsoft\Office\Recent\*.lnk">nul 2>nul
del /f /q /s "%USERPROFILE%\Local Settings\Temp\*.*">nul 2>nul
rd /s /q %windir%\temp & md %windir%\temp>nul 2>nul
if not exist %SystemRoot%\Minidump\NUL del /f /q /s %SystemRoot%\Minidump\*.*>nul 2>nul
del /f /s /q "%userprofile%\Local Settings\Temporary Internet Files\*.*">nul 2>nul
而ccleaner中光搜集的临时文件目录和上面的批处理就不是一个数量级。这里贴一个 大概,可以作为参考,也来自ccleaner的数据,大家不要说我侵犯版权哈,我只是“学术探讨”
FileKey1=%userprofile%\Local Settings\Application Data\Adobe\Acrobat\7.0\Cache\Search70|*.*
FileKey2=%ProgramFiles%\Adobe\Acrobat 7.0\Reader|*.bak
FileKey3=%ProgramFiles%\Adobe\Acrobat 7.0\ActiveX|*.bak
FileKey4=%ProgramFiles%\Adobe\Acrobat 7.0\Reader\plug_ins|*.bak
FileKey5=%ProgramFiles%\Adobe\Acrobat 7.0\Reader\Updater|*.bak
FileKey1=%appdata%\Adobe\CameraRaw\Cache|*.*
FileKey1=%appdata%\Google\Local Search History|*.*
FileKey1=%appdata%\Real\RealOne Player|cookies.txt
FileKey2=%appdata%\Real\RealOne Player|ctd.dat
FileKey3=%appdata%\Real\RealOne Player|realplayer.ste
FileKey4=%appdata%\Real\RealOne Player\History|*.*
FileKey5=%appdata%\Real\RealPlayer|cookies.txt
FileKey6=%appdata%\Real\RealPlayer|ctd.dat
FileKey7=%appdata%\Real\RealPlayer|realplayer.ste
FileKey8=%appdata%\Real\RealPlayer\History|*.*
FileKey9=%ProgramFiles%\Common Files\Real\Update_OB|RealPlayer-log.txt
FileKey1=%userprofile%|QTPlayerSession.xml
FileKey2=%appdata%\Apple Computer\QuickTime|QTPlayerSession.xml
FileKey1=%userprofile%\Local Settings\Application Data\Apple Computer\QuickTime\downloads|*.*|RECURSE
FileKey1=%appdata%\Microsoft\Office\Recent|*.*
FileKey1=%appdata%\Microsoft\Office\Recent|*.*
FileKey1=%appdata%\Microsoft\Office\Recent|*.*
FileKey1=%appdata%\Macromedia\Flash Player|*.*|RECURSE
FileKey1=%allusersprofile%\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Logs|*.log
FileKey2=%userprofile%\Local Settings\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Logs|*.log
FileKey3=%allusersprofile%\Application Data\Symantec\LiveUpdate\Downloads|*.*
FileKey1=%allusersprofile%\Application Data\Symantec\Symantec AntiVirus Corporate Edition\7.5\Logs|*.log
FileKey2=%userprofile%\Local Settings\Application Data\Symantec\Symantec AntiVirus Corporate Edition\7.5\Logs|*.log
FileKey3=%allusersprofile%\Application Data\Symantec\LiveUpdate\Downloads|*.*
FileKey1=%userprofile%\Local Settings\Application Data\Microsoft\Terminal Server Client\Cache|*.*
FileKey1=%ProgramFiles%\Ahead\Nero|NeroHistory.log
FileKey1=%allusersprofile%\Application Data\Spybot - Search & Destroy\Logs|*.*
FileKey2=%ProgramFiles%\Spybot - Search & Destroy|advdebug.txt
FileKey3=%allusersprofile%\Application Data\Spybot - Search & Destroy|Statistics.ini
FileKey4=%windir%\All Users\Application Data\Spybot - Search & Destroy\Logs|*.*
FileKey5=%windir%\All Users\Application Data\Spybot - Search & Destroy|Statistics.ini
FileKey1=%ProgramFiles%\Lavasoft\Ad-Aware SE Personal|defs.ref.old
FileKey2=%userprofile%\Application Data\Lavasoft\Ad-Aware\Logs|*.txt
FileKey1=%ProgramFiles%\Lavasoft\Ad-Aware SE Professional|defs.ref.old
FileKey2=%userprofile%\Application Data\Lavasoft\Ad-Aware\Logs|*.txt
FileKey1=%ProgramFiles%\Lavasoft\Ad-Aware SE Plus|defs.ref.old
FileKey2=%userprofile%\Application Data\Lavasoft\Ad-Aware\Logs|*.txt
FileKey1=%ProgramFiles%\Webroot\Spy Sweeper\Temp|*.*
FileKey2=%userprofile%\Application Data\Webroot\Spy Sweeper\Logs|*Log.txt
FileKey1=%ProgramFiles%\Driver Cleaner Pro\Log|*.log
FileKey1=%ProgramFiles%\Netscape\Users\default|netscape.hst
FileKey2=%ProgramFiles%\Netscape\Users\default|cookies.txt
FileKey3=%ProgramFiles%\Netscape\Users\default\cache|*.*
FileKey1=%userprofile%\Application Data\Axialis\Temporary Preview Files|*.*|RECURSE
FileKey1=%ProgramFiles%\eMule\config|AC_SearchStrings.dat
FileKey1=%ProgramFiles%\eMule\config|known.met
FileKey2=%ProgramFiles%\eMule\config|known2.met
FileKey1=%userprofile%\Application Data\Sun\Java\Deployment\cache|*.*|RECURSE
FileKey2=%userprofile%\Application Data\Sun\Java\Deployment\javaws\cache|*.*|RECURSE
FileKey1=%userprofile%\Local Settings\Application Data\Microsoft\Movie Maker|MEDIATAB0.DAT
FileKey1=%ProgramFiles%\GetRight|GetRight.hst
FileKey1=%ProgramFiles%\DAP\Temp|*.*
FileKey2=%ProgramFiles%\DAP\Ads|*.*
FileKey3=%ProgramFiles%\DAP\Log|*.*
FileKey1=%userprofile%\Local Settings\Application Data\TiVo Desktop\Cache|*.*
FileKey1=%ProgramFiles%\CA\eTrust Internet Security Suite\eTrust EZ Antivirus|*.log
FileKey2=%ProgramFiles%\CA\eTrust Internet Security Suite\eTrust EZ Antivirus|*log.txt
FileKey3=%ProgramFiles%\CA\eTrust Internet Security Suite\eTrust EZ Antivirus\ArcTemp|*.tmp
FileKey4=%allusersprofile%\Application Data\CA\Consumer\AV|*.tmp|RECURSE
FileKey5=%allusersprofile%\Application Data\CA\Consumer\AV|*.txt|RECURSE
FileKey6=%allusersprofile%\Application Data\CA\Consumer\CCube|*.tmp|RECURSE
FileKey7=%allusersprofile%\Application Data\CA\Consumer\CCube|*.txt|RECURSE
FileKey8=%allusersprofile%\Application Data\CA\Consumer\ISS\FeedStore|*.txt|RECURSE
FileKey9=%ProgramFiles%\CA\CA Internet Security Suite\CA Anti-Virus\ArcTemp|*.*
FileKey10=%ProgramFiles%\CA\CA Internet Security Suite\CA Anti-Virus\tmp|*.*
FileKey1=%windir%\Internet Logs|ZALog*.*
FileKey1=%userprofile%\Application Data\Google\GoogleEarth|dbcache.dat
FileKey2=%userprofile%\Application Data\Google\GoogleEarth|dbcache.dat.index
FileKey1=%ProgramFiles%\Microsoft AntiSpyware|errors.log
FileKey2=%ProgramFiles%\Microsoft AntiSpyware|tracksEraser.log
FileKey3=%ProgramFiles%\Microsoft AntiSpyware|cleaner.log
FileKey1=%allusersprofile%\Application Data\Raxco\PerfectDisk\7.0|PerfectDisk.log
FileKey1=%userprofile%\Application Data\Azureus\logs|*.log
FileKey2=%userprofile%\Application Data\Azureus\logs\save|*.log
FileKey1=%userprofile%\Local Settings\Application Data\GlobalSCAPE\CuteFTP Pro\7.0\Cache|*.*|RECURSE
FileKey2=%userprofile%\Local Settings\Application Data\GlobalSCAPE\CuteFTP Pro\7.0\CacheThumbs|*.*|RECURSE
FileKey1=%userprofile%\Local Settings\Application Data\GlobalSCAPE\CuteFTP\7.0\Cache|*.*|RECURSE
FileKey2=%userprofile%\Local Settings\Application Data\GlobalSCAPE\CuteFTP\7.0\CacheThumbs|*.*|RECURSE
FileKey1=%userprofile%\Local Settings\Application Data\GlobalSCAPE\CuteFTP Pro\8.0\Cache|*.*|RECURSE
FileKey2=%userprofile%\Local Settings\Application Data\GlobalSCAPE\CuteFTP Pro\8.0\CacheThumbs|*.*|RECURSE
FileKey1=%userprofile%\Local Settings\Application Data\GlobalSCAPE\CuteFTP\8.0\Cache|*.*|RECURSE
FileKey2=%userprofile%\Local Settings\Application Data\GlobalSCAPE\CuteFTP\8.0\CacheThumbs|*.*|RECURSE
FileKey1=%allusersprofile%\.clamwin\log|*.*
FileKey2=%userprofile%\.clamwin\log|*.*
FileKey3=%windir%\All Users\.clamwin\log|*.*
FileKey1=%ProgramFiles%\Ewido\Security Suite|logfile.txt
FileKey2=%ProgramFiles%\Ewido Anti-Malware|logfile.txt
FileKey1=%ProgramFiles%\Grisoft\AVG Anti-Spyware 7.5|logfile.txt
FileKey1=%ProgramFiles%\OpenOffice.org1.1.4\user\registry\data\org\openoffice\Office|Common.xcu
FileKey1=%appdata%\OpenOffice.org2\user\registry\data\org\openoffice\Office|Common.xcu
FileKey1=%allusersprofile%\Application Data\Grisoft\Avg7Data|*.log
FileKey2=%allusersprofile%\Application Data\Grisoft\Avg7Data\upd7bin|*.*
FileKey3=%allusersprofile%\Application Data\Grisoft\Avg7Data\$history|*.*
FileKey4=%allusersprofile%\Application Data\Grisoft\Avg7Data\avg7upd|*.log
FileKey5=%windir%\All Users\Application Data\Grisoft\Avg7Data\upd7bin|*.*
FileKey6=%windir%\All Users\Application Data\Grisoft\Avg7Data\avg7upd|$history
FileKey7=%windir%\All Users\Application Data\Grisoft\Avg7Data\avg7upd|*.log
FileKey8=%windir%\All Users\Application Data\Grisoft\Avg7Data|*.log
FileKey9=%windir%\Application Data\AVG7\Log|*.log
FileKey1=%ProgramFiles%\AVPersonal\AVTEST|*.*
FileKey2=%ProgramFiles%\AVPersonal\FAILSAVE|*.*
FileKey3=%ProgramFiles%\AVPersonal\INFECTED|*.*
FileKey4=%ProgramFiles%\AVPersonal\LOGFILES|*.*
FileKey5=%ProgramFiles%\AVPersonal\SYSSAVE|*.*
FileKey6=%ProgramFiles%\AVPersonal\TEMP|*.*
FileKey7=%ProgramFiles%\AVPersonal\TESTPATH|*.*
FileKey8=%ProgramFiles%\AVPersonal\UPDATE|*.*
FileKey1=%allusersprofile%\Application Data\Microsoft\Windows Defender\Scans\History\Results\Quick|*.*
FileKey2=%allusersprofile%\Application Data\Microsoft\Windows Defender\Scans\History\Results\Resource|*.*
RegKey1=HKCU\Software\Microsoft\Internet Explorer\TypedURLs
RegKey2=HKCU\Software\Microsoft\Internet Explorer\Explorer Bars\{C4EE31F3-4768-11D2-BE5C-00A0C9A83DA1}\FilesNamedMRU
RegKey3=HKCU\Software\Microsoft\Internet Explorer\Explorer Bars\{C4EE31F3-4768-11D2-BE5C-00A0C9A83DA1}\ContainingTextMRU
RegKey1=HKCU\Software\Microsoft\Internet Explorer|Download Directory
RegKey2=HKCU\Software\Microsoft\Internet Explorer\Main|Save Directory
RegKey1=HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\RecentDocs
RegKey1=HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
RegKey1=HKCU\Software\Microsoft\Search Assistant\ACMru
RegKey1=HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32
RegKey2=HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\FindComputerMRU
RegKey3=HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\PrnPortsMRU
RegKey4=HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Map Network Drive MRU
RegKey5=HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\ComputerDescriptions
RegKey6=HKLM\Software\Microsoft\Direct3D\MostRecentApplication|Name
RegKey7=HKCU\Software\Microsoft\Direct3D\MostRecentApplication|Name
RegKey8=HKLM\Software\Microsoft\DirectDraw\MostRecentApplication|Name
RegKey9=HKCU\Software\Microsoft\DirectInput\MostRecentApplication|Id
RegKey10=HKCU\Software\Microsoft\DirectInput\MostRecentApplication|Name
RegKey1=HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MenuOrder
RegKey1=HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\TrayNotify|IconStreams
RegKey2=HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\TrayNotify|PastIconsStream
RegKey1=HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\StreamMRU
RegKey2=HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Streams
RegKey1=HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{5E6AB780-7743-11CF-A12B-00AA004AE837}\Count
RegKey2=HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{75048700-EF1F-11D0-9888-006097DEACF9}\Count
Detect=HKCU\SOFTWARE\Microsoft\Internet Explorer
Detect=HKCU\SOFTWARE\Microsoft\Internet Explorer
Detect=HKCU\SOFTWARE\Microsoft\Internet Explorer
Detect=HKCU\SOFTWARE\Microsoft\Internet Explorer
Detect=HKCU\SOFTWARE\Microsoft\Internet Explorer
Detect=HKCU\SOFTWARE\Microsoft\Internet Explorer
Detect=HKCU\SOFTWARE\Microsoft\Internet Explorer
Detect=HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\OptimalLayout
Detect=HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\TrayNotify
Detect=HKLM\System\CurrentControlSet\Services\w3svc
更详细的在ccleaner的安装目录。由于版权问题我不能直接贴上来的。大家可以下载一个看看嘛
Last edited by electronixtar on 2006-10-23 at 08:51 ]
Heheh, those things are not systematic and not comprehensive. We can make one that can automatically update the database and is comprehensive, and make it modular. For example, cleaning the folder is a function, and then read an ini file to call this function. In this way, users can add the content they need by themselves. Just cleaning files is not enough; it should also include registry and third-party software cleaning. I mention the importance of CCleaner because CCleaner is comprehensive. It really covers everything.
The version of moderator namejm is too little, too basic.
@echo off
color f0
echo.
echo 正在安全地自动清除垃圾文件……
del /f /q %systemdrive%\*.tmp>nul 2>nul
del /f /q %systemdrive%\*._mp>nul 2>nul
del /f /q %systemdrive%\*.log>nul 2>nul
del /f /q %systemdrive%\*.gid>nul 2>nul
del /f /q %systemdrive%\*.chk>nul 2>nul
del /f /q %systemdrive%\*.old>nul 2>nul
del /f /q %windir%\*.bak>nul 2>nul
del /f /q %windir%\*.tmp>nul 2>nul
del /f /q %windir%\prefetch\*.*>nul 2>nul
del /f /s /q %systemdrive%\recycled\*.*
del /f /q "%ALLUSERSPROFILE%\Documents\DrWatson\*.*">nul 2>nul
del /f /q "%USERPROFILE%\Cookies\*.txt">nul 2>nul
del /f /q /s "%TEMP%\*.*">nul 2>nul
del /f /q /s "%Systemroot%\Prefetch\*.*">nul 2>nul
del /f /q "%USERPROFILE%\Recent\*.*">nul 2>nul
del /f /q "%USERPROFILE%\Application Data\Microsoft\Office\Recent\*.lnk">nul 2>nul
del /f /q /s "%USERPROFILE%\Local Settings\Temp\*.*">nul 2>nul
rd /s /q %windir%\temp & md %windir%\temp>nul 2>nul
if not exist %SystemRoot%\Minidump\NUL del /f /q /s %SystemRoot%\Minidump\*.*>nul 2>nul
del /f /s /q "%userprofile%\Local Settings\Temporary Internet Files\*.*">nul 2>nul
And the temporary file directories collected in CCleaner are not at the same level as the above batch script. Here is a rough one, which can be used as a reference and also comes from CCleaner's data. Don't say I infringe on copyright, I'm just "academic discussion"
FileKey1=%userprofile%\Local Settings\Application Data\Adobe\Acrobat\7.0\Cache\Search70|*.*
FileKey2=%ProgramFiles%\Adobe\Acrobat 7.0\Reader|*.bak
FileKey3=%ProgramFiles%\Adobe\Acrobat 7.0\ActiveX|*.bak
FileKey4=%ProgramFiles%\Adobe\Acrobat 7.0\Reader\plug_ins|*.bak
FileKey5=%ProgramFiles%\Adobe\Acrobat 7.0\Reader\Updater|*.bak
FileKey1=%appdata%\Adobe\CameraRaw\Cache|*.*
FileKey1=%appdata%\Google\Local Search History|*.*
FileKey1=%appdata%\Real\RealOne Player|cookies.txt
FileKey2=%appdata%\Real\RealOne Player|ctd.dat
FileKey3=%appdata%\Real\RealOne Player|realplayer.ste
FileKey4=%appdata%\Real\RealOne Player\History|*.*
FileKey5=%appdata%\Real\RealPlayer|cookies.txt
FileKey6=%appdata%\Real\RealPlayer|ctd.dat
FileKey7=%appdata%\Real\RealPlayer|realplayer.ste
FileKey8=%appdata%\Real\RealPlayer\History|*.*
FileKey9=%ProgramFiles%\Common Files\Real\Update_OB|RealPlayer-log.txt
FileKey1=%userprofile%|QTPlayerSession.xml
FileKey2=%appdata%\Apple Computer\QuickTime|QTPlayerSession.xml
FileKey1=%userprofile%\Local Settings\Application Data\Apple Computer\QuickTime\downloads|*.*|RECURSE
FileKey1=%appdata%\Microsoft\Office\Recent|*.*
FileKey1=%appdata%\Microsoft\Office\Recent|*.*
FileKey1=%appdata%\Microsoft\Office\Recent|*.*
FileKey1=%appdata%\Macromedia\Flash Player|*.*|RECURSE
FileKey1=%allusersprofile%\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Logs|*.log
FileKey2=%userprofile%\Local Settings\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Logs|*.log
FileKey3=%allusersprofile%\Application Data\Symantec\LiveUpdate\Downloads|*.*
FileKey1=%allusersprofile%\Application Data\Symantec\Symantec AntiVirus Corporate Edition\7.5\Logs|*.log
FileKey2=%userprofile%\Local Settings\Application Data\Symantec\Symantec AntiVirus Corporate Edition\7.5\Logs|*.log
FileKey3=%allusersprofile%\Application Data\Symantec\LiveUpdate\Downloads|*.*
FileKey1=%userprofile%\Local Settings\Application Data\Microsoft\Terminal Server Client\Cache|*.*
FileKey1=%ProgramFiles%\Ahead\Nero|NeroHistory.log
FileKey1=%allusersprofile%\Application Data\Spybot - Search & Destroy\Logs|*.*
FileKey2=%ProgramFiles%\Spybot - Search & Destroy|advdebug.txt
FileKey3=%allusersprofile%\Application Data\Spybot - Search & Destroy|Statistics.ini
FileKey4=%windir%\All Users\Application Data\Spybot - Search & Destroy\Logs|*.*
FileKey5=%windir%\All Users\Application Data\Spybot - Search & Destroy|Statistics.ini
FileKey1=%ProgramFiles%\Lavasoft\Ad-Aware SE Personal|defs.ref.old
FileKey2=%userprofile%\Application Data\Lavasoft\Ad-Aware\Logs|*.txt
FileKey1=%ProgramFiles%\Lavasoft\Ad-Aware SE Professional|defs.ref.old
FileKey2=%userprofile%\Application Data\Lavasoft\Ad-Aware\Logs|*.txt
FileKey1=%ProgramFiles%\Lavasoft\Ad-Aware SE Plus|defs.ref.old
FileKey2=%userprofile%\Application Data\Lavasoft\Ad-Aware\Logs|*.txt
FileKey1=%ProgramFiles%\Webroot\Spy Sweeper\Temp|*.*
FileKey2=%userprofile%\Application Data\Webroot\Spy Sweeper\Logs|*Log.txt
FileKey1=%ProgramFiles%\Driver Cleaner Pro\Log|*.log
FileKey1=%ProgramFiles%\Netscape\Users\default|netscape.hst
FileKey2=%ProgramFiles%\Netscape\Users\default|cookies.txt
FileKey3=%ProgramFiles%\Netscape\Users\default\cache|*.*
FileKey1=%userprofile%\Application Data\Axialis\Temporary Preview Files|*.*|RECURSE
FileKey1=%ProgramFiles%\eMule\config|AC_SearchStrings.dat
FileKey1=%ProgramFiles%\eMule\config|known.met
FileKey2=%ProgramFiles%\eMule\config|known2.met
FileKey1=%userprofile%\Application Data\Sun\Java\Deployment\cache|*.*|RECURSE
FileKey2=%userprofile%\Application Data\Sun\Java\Deployment\javaws\cache|*.*|RECURSE
FileKey1=%userprofile%\Local Settings\Application Data\Microsoft\Movie Maker|MEDIATAB0.DAT
FileKey1=%ProgramFiles%\GetRight|GetRight.hst
FileKey1=%ProgramFiles%\DAP\Temp|*.*
FileKey2=%ProgramFiles%\DAP\Ads|*.*
FileKey3=%ProgramFiles%\DAP\Log|*.*
FileKey1=%userprofile%\Local Settings\Application Data\TiVo Desktop\Cache|*.*
FileKey1=%ProgramFiles%\CA\eTrust Internet Security Suite\eTrust EZ Antivirus|*.log
FileKey2=%ProgramFiles%\CA\eTrust Internet Security Suite\eTrust EZ Antivirus|*log.txt
FileKey3=%ProgramFiles%\CA\eTrust Internet Security Suite\eTrust EZ Antivirus\ArcTemp|*.tmp
FileKey4=%allusersprofile%\Application Data\CA\Consumer\AV|*.tmp|RECURSE
FileKey5=%allusersprofile%\Application Data\CA\Consumer\AV|*.txt|RECURSE
FileKey6=%allusersprofile%\Application Data\CA\Consumer\CCube|*.tmp|RECURSE
FileKey7=%allusersprofile%\Application Data\CA\Consumer\CCube|*.txt|RECURSE
FileKey8=%allusersprofile%\Application Data\CA\Consumer\ISS\FeedStore|*.txt|RECURSE
FileKey9=%ProgramFiles%\CA\CA Internet Security Suite\CA Anti-Virus\ArcTemp|*.*
FileKey10=%ProgramFiles%\CA\CA Internet Security Suite\CA Anti-Virus\tmp|*.*
FileKey1=%windir%\Internet Logs|ZALog*.*
FileKey1=%userprofile%\Application Data\Google\GoogleEarth|dbcache.dat
FileKey2=%userprofile%\Application Data\Google\GoogleEarth|dbcache.dat.index
FileKey1=%ProgramFiles%\Microsoft AntiSpyware|errors.log
FileKey2=%ProgramFiles%\Microsoft AntiSpyware|tracksEraser.log
FileKey3=%ProgramFiles%\Microsoft AntiSpyware|cleaner.log
FileKey1=%allusersprofile%\Application Data\Raxco\PerfectDisk\7.0|PerfectDisk.log
FileKey1=%userprofile%\Application Data\Azureus\logs|*.log
FileKey2=%userprofile%\Application Data\Azureus\logs\save|*.log
FileKey1=%userprofile%\Local Settings\Application Data\GlobalSCAPE\CuteFTP Pro\7.0\Cache|*.*|RECURSE
FileKey2=%userprofile%\Local Settings\Application Data\GlobalSCAPE\CuteFTP Pro\7.0\CacheThumbs|*.*|RECURSE
FileKey1=%userprofile%\Local Settings\Application Data\GlobalSCAPE\CuteFTP\7.0\Cache|*.*|RECURSE
FileKey2=%userprofile%\Local Settings\Application Data\GlobalSCAPE\CuteFTP\7.0\CacheThumbs|*.*|RECURSE
FileKey1=%userprofile%\Local Settings\Application Data\GlobalSCAPE\CuteFTP Pro\8.0\Cache|*.*|RECURSE
FileKey2=%userprofile%\Local Settings\Application Data\GlobalSCAPE\CuteFTP Pro\8.0\CacheThumbs|*.*|RECURSE
FileKey1=%userprofile%\Local Settings\Application Data\GlobalSCAPE\CuteFTP\8.0\Cache|*.*|RECURSE
FileKey2=%userprofile%\Local Settings\Application Data\GlobalSCAPE\CuteFTP\8.0\CacheThumbs|*.*|RECURSE
FileKey1=%allusersprofile%\.clamwin\log|*.*
FileKey2=%userprofile%\.clamwin\log|*.*
FileKey3=%windir%\All Users\.clamwin\log|*.*
FileKey1=%ProgramFiles%\Ewido\Security Suite|logfile.txt
FileKey2=%ProgramFiles%\Ewido Anti-Malware|logfile.txt
FileKey1=%ProgramFiles%\Grisoft\AVG Anti-Spyware 7.5|logfile.txt
FileKey1=%ProgramFiles%\OpenOffice.org1.1.4\user\registry\data\org\openoffice\Office|Common.xcu
FileKey1=%appdata%\OpenOffice.org2\user\registry\data\org\openoffice\Office|Common.xcu
FileKey1=%allusersprofile%\Application Data\Grisoft\Avg7Data|*.log
FileKey2=%allusersprofile%\Application Data\Grisoft\Avg7Data\upd7bin|*.*
FileKey3=%allusersprofile%\Application Data\Grisoft\Avg7Data\$history|*.*
FileKey4=%allusersprofile%\Application Data\Grisoft\Avg7Data\avg7upd|*.log
FileKey5=%windir%\All Users\Application Data\Grisoft\Avg7Data\upd7bin|*.*
FileKey6=%windir%\All Users\Application Data\Grisoft\Avg7Data\avg7upd|$history
FileKey7=%windir%\All Users\Application Data\Grisoft\Avg7Data\avg7upd|*.log
FileKey8=%windir%\All Users\Application Data\Grisoft\Avg7Data|*.log
FileKey9=%windir%\Application Data\AVG7\Log|*.log
FileKey1=%ProgramFiles%\AVPersonal\AVTEST|*.*
FileKey2=%ProgramFiles%\AVPersonal\FAILSAVE|*.*
FileKey3=%ProgramFiles%\AVPersonal\INFECTED|*.*
FileKey4=%ProgramFiles%\AVPersonal\LOGFILES|*.*
FileKey5=%ProgramFiles%\AVPersonal\SYSSAVE|*.*
FileKey6=%ProgramFiles%\AVPersonal\TEMP|*.*
FileKey7=%ProgramFiles%\AVPersonal\TESTPATH|*.*
FileKey8=%ProgramFiles%\AVPersonal\UPDATE|*.*
FileKey1=%allusersprofile%\Application Data\Microsoft\Windows Defender\Scans\History\Results\Quick|*.*
FileKey2=%allusersprofile%\Application Data\Microsoft\Windows Defender\Scans\History\Results\Resource|*.*
RegKey1=HKCU\Software\Microsoft\Internet Explorer\TypedURLs
RegKey2=HKCU\Software\Microsoft\Internet Explorer\Explorer Bars\{C4EE31F3-4768-11D2-BE5C-00A0C9A83DA1}\FilesNamedMRU
RegKey3=HKCU\Software\Microsoft\Internet Explorer\Explorer Bars\{C4EE31F3-4768-11D2-BE5C-00A0C9A83DA1}\ContainingTextMRU
RegKey1=HKCU\Software\Microsoft\Internet Explorer|Download Directory
RegKey2=HKCU\Software\Microsoft\Internet Explorer\Main|Save Directory
RegKey1=HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\RecentDocs
RegKey1=HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
RegKey1=HKCU\Software\Microsoft\Search Assistant\ACMru
RegKey1=HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32
RegKey2=HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\FindComputerMRU
RegKey3=HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\PrnPortsMRU
RegKey4=HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Map Network Drive MRU
RegKey5=HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\ComputerDescriptions
RegKey6=HKLM\Software\Microsoft\Direct3D\MostRecentApplication|Name
RegKey7=HKCU\Software\Microsoft\Direct3D\MostRecentApplication|Name
RegKey8=HKLM\Software\Microsoft\DirectDraw\MostRecentApplication|Name
RegKey9=HKCU\Software\Microsoft\DirectInput\MostRecentApplication|Id
RegKey10=HKCU\Software\Microsoft\DirectInput\MostRecentApplication|Name
RegKey1=HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MenuOrder
RegKey1=HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\TrayNotify|IconStreams
RegKey2=HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\TrayNotify|PastIconsStream
RegKey1=HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\StreamMRU
RegKey2=HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Streams
RegKey1=HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{5E6AB780-7743-11CF-A12B-00AA004AE837}\Count
RegKey2=HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{75048700-EF1F-11D0-9888-006097DEACF9}\Count
Detect=HKCU\SOFTWARE\Microsoft\Internet Explorer
Detect=HKCU\SOFTWARE\Microsoft\Internet Explorer
Detect=HKCU\SOFTWARE\Microsoft\Internet Explorer
Detect=HKCU\SOFTWARE\Microsoft\Internet Explorer
Detect=HKCU\SOFTWARE\Microsoft\Internet Explorer
Detect=HKCU\SOFTWARE\Microsoft\Internet Explorer
Detect=HKCU\SOFTWARE\Microsoft\Internet Explorer
Detect=HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\OptimalLayout
Detect=HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\TrayNotify
Detect=HKLM\System\CurrentControlSet\Services\w3svc
More detailed ones are in the installation directory of CCleaner. Due to copyright issues, I can't post them directly. You can download one and have a look.
Last edited by electronixtar on 2006-10-23 at 08:51 ]
|

C:\>BLOG http://initiative.yo2.cn/
C:\>hh.exe ntcmds.chm::/ntcmds.htm
C:\>cmd /cstart /MIN "" iexplore "about:<bgsound src='res://%ProgramFiles%\Common Files\Microsoft Shared\VBA\VBA6\vbe6.dll/10/5432'>" |
|
2006-10-23 08:42 |
|
|
electronixtar
铂金会员
      
积分 7493
发帖 2672
注册 2005-9-2
状态 离线
|
『第 4 楼』:
使用 LLM 解释/回答一下
恩,我的思路是这样的:一个 ccleaner.bat,然后是 winapp.ini,winreg.ini,winsys.ini, ccleaner读取这几个配置文件
ccleaner.bat结构
:Main
:ReadINI
:DelFiles
:DelReg
Well, my idea is like this: a ccleaner.bat, and then winapp.ini, winreg.ini, winsys.ini. ccleaner reads these configuration files.
Structure of ccleaner.bat
:Main
:ReadINI
:DelFiles
:DelReg
|

C:\>BLOG http://initiative.yo2.cn/
C:\>hh.exe ntcmds.chm::/ntcmds.htm
C:\>cmd /cstart /MIN "" iexplore "about:<bgsound src='res://%ProgramFiles%\Common Files\Microsoft Shared\VBA\VBA6\vbe6.dll/10/5432'>" |
|
2006-10-23 10:38 |
|
|
namejm
荣誉版主
       batch fan
积分 5226
发帖 1737
注册 2006-3-10 来自 成都
状态 离线
|
『第 5 楼』:
使用 LLM 解释/回答一下
读取ini文件里的路径,并把注册表格式的路径和非注册表格式的路径提取出来是非常容易办到的,del 也就轻而易举了,只是不能很方便地把指定路径下的文件干掉,一般是把所有找到的都干掉了,这也是字符界面和图形界面的一大差别。虽然批处理可以实现部分功能,但是个人感觉还是图形界面的好用一点。
Reading the paths in the ini file and extracting the registry - formatted paths and non - registry - formatted paths is very easy to do, and deleting them is also a piece of cake. It's just that it's not very convenient to delete the files in the specified path; generally, all the found ones are deleted. This is also a big difference between the character interface and the graphical interface. Although batch processing can realize some functions, I personally feel that the graphical interface is more convenient.
|

尺有所短,寸有所长,学好CMD没商量。
考虑问题复杂化,解决问题简洁化。 |
|
2006-10-23 11:08 |
|
|
lxmxn
版主
       
积分 11386
发帖 4938
注册 2006-7-23
状态 离线
|
『第 6 楼』:
使用 LLM 解释/回答一下
建议楼主把ccleaner里面要删除的垃圾文件和要删除的注册表路径都提取出来,因为一般人是不知道那么全的。我们可以借鉴里面的路径来做批处理。
It is suggested that the landlord extract the garbage files to be deleted and the registry paths to be deleted in ccleaner, because the average person does not know so comprehensively. We can refer to the inside paths to make batch processing.
|
|
2006-10-23 12:28 |
|
|
namejm
荣誉版主
       batch fan
积分 5226
发帖 1737
注册 2006-3-10 来自 成都
状态 离线
|
『第 7 楼』:
使用 LLM 解释/回答一下
发一个提取路径的演示代码,各位可以拿来加工一下:
@echo off
cls
setlocal enabledelayedexpansion
echo 注册表格式的路径有:
echo.
for /f "tokens=1* delims==" %%i in ('findstr "=HK" winsys.ini') do (
set route=%%j
set route=!route:^|=\!
echo !route!
)
echo.
echo 非注册表格式的路径有:
echo.
for /f "tokens=1* delims==" %%i in ('findstr "FileKey" winsys.ini') do (
set route=%%j
set route=!route:^|=\!
echo !route!
)
pause
Here is a demonstration code for extracting paths. You can take it and refine it:
@echo off
cls
setlocal enabledelayedexpansion
echo The paths in registry format are:
echo.
for /f "tokens=1* delims==" %%i in ('findstr "=HK" winsys.ini') do (
set route=%%j
set route=!route:^|=\!
echo !route!
)
echo.
echo The paths in non-registry format are:
echo.
for /f "tokens=1* delims==" %%i in ('findstr "FileKey" winsys.ini') do (
set route=%%j
set route=!route:^|=\!
echo !route!
)
pause
|

尺有所短,寸有所长,学好CMD没商量。
考虑问题复杂化,解决问题简洁化。 |
|
2006-10-24 01:06 |
|
|
electronixtar
铂金会员
      
积分 7493
发帖 2672
注册 2005-9-2
状态 离线
|
『第 8 楼』:
使用 LLM 解释/回答一下
建议楼主把ccleaner里面要删除的垃圾文件和要删除的注册表路径都提取出来
如果ccleaner没有那么无聊的公开申明版权的话我早发上来了。
我觉得做一个联盟标准的ini格式,如何?
It is suggested that the landlord extract the junk files to be deleted in ccleaner and the registry paths to be deleted.
If ccleaner didn't have such a boring public statement of copyright, I would have already posted it.
I think making a league-standard ini format, how about it?
|

C:\>BLOG http://initiative.yo2.cn/
C:\>hh.exe ntcmds.chm::/ntcmds.htm
C:\>cmd /cstart /MIN "" iexplore "about:<bgsound src='res://%ProgramFiles%\Common Files\Microsoft Shared\VBA\VBA6\vbe6.dll/10/5432'>" |
|
2006-10-24 01:11 |
|
|
vkill
金牌会员
     
积分 4103
发帖 1744
注册 2006-1-20 来自 甘肃.临泽
状态 离线
|
『第 9 楼』:
使用 LLM 解释/回答一下
我觉得清理垃圾还是看个人爱好好了
I think it's up to personal preference to clean up junk.
|
|
2006-10-24 01:25 |
|
|
xypcmac
初级用户
 
积分 167
发帖 80
注册 2005-11-7
状态 离线
|
『第 10 楼』:
使用 LLM 解释/回答一下
这个是每部电脑必须做的工作,有这个必要......方便就是好!
This is a necessary task for every computer. Having this is necessary... Convenience is good!
|
|
2006-10-24 02:44 |
|
|
electronixtar
铂金会员
      
积分 7493
发帖 2672
注册 2005-9-2
状态 离线
|
『第 11 楼』:
使用 LLM 解释/回答一下
我的意思是做一个很全面,国内最强大最方便的垃圾清理工具。而且格式是开放的,可以自行添加路径、自行修改bat模块
What I mean is to make a very comprehensive, the most powerful and convenient garbage cleaning tool in China. And the format is open, you can add paths by yourself and modify the bat module by yourself
|

C:\>BLOG http://initiative.yo2.cn/
C:\>hh.exe ntcmds.chm::/ntcmds.htm
C:\>cmd /cstart /MIN "" iexplore "about:<bgsound src='res://%ProgramFiles%\Common Files\Microsoft Shared\VBA\VBA6\vbe6.dll/10/5432'>" |
|
2006-10-24 03:39 |
|
|
lxmxn
版主
       
积分 11386
发帖 4938
注册 2006-7-23
状态 离线
|
|
2006-10-24 05:24 |
|
|
10it
新手上路

积分 6
发帖 3
注册 2006-10-24
状态 离线
|
『第 13 楼』:
使用 LLM 解释/回答一下
“我的意思是做一个很全面,国内最强大最方便的垃圾清理工具。而且格式是开放的,可以自行添加路径、自行修改bat模块”
楼主精神可嘉 。 我dos刚学帮不上什么忙。 不过很高兴在这里遇见这么多真正喜欢dos的朋友。
“What I mean is to make a very comprehensive, the most powerful and convenient garbage cleaning tool in China. And the format is open, you can add paths by yourself, and modify the bat module by yourself”
The landlord has a commendable spirit. I just started learning DOS and can't help much. But I'm very happy to meet so many friends who really like DOS here.
|
|
2006-10-29 16:36 |
|
|
chainliq
高级用户
    学无尽止
积分 635
发帖 244
注册 2006-4-15 来自 广西贵港
状态 离线
|
『第 14 楼』:
使用 LLM 解释/回答一下
嗯,不错,大家继续努力呀,而且,我觉得批处理清处垃圾的速度并不并三方软件差噢
!
Well, not bad, everyone keep up the good work. And, I think the speed of batch processing to clear garbage is not worse than that of third-party software oh!
|
|
2006-10-29 18:59 |
|
|
雨露
管理员
          DOS非常爱好者
积分 6209
发帖 2598
注册 2006-1-20
状态 离线
|
『第 15 楼』:
使用 LLM 解释/回答一下
我现在不敢删垃圾,上一次用超级兔子清理系统,结果将400MB辛苦收藏的DOS软件给删得无影无踪!现在改用手工了!
I'm now afraid to delete junk. The last time I used Super Rabbit to clean the system, it ended up deleting my hard - earned 400MB collection of DOS software without a trace! Now I'm using manual methods!
|

|
|
2006-10-29 20:57 |
|