Necrosaro
Active Member
Thank you for answering my question. Will take a look at options and see what works best for me.Yes, it has a setting to replace TM.
Thank you for answering my question. Will take a look at options and see what works best for me.Yes, it has a setting to replace TM.
Got autoruns...it is worth it such a helpful program for us geeky guys and galsI prefer the simplicity of w7 TM for general use but have ProExp to hand, its better than w7TM at shutting down running hung processes.
Grab the latest Sysinternals Suite, it has all their utilities, you never know when you'll need them.
Autoruns is well worth having
Run it Elevated. Or run Everything search Elevated from POwer Run and delete the files from there, i havnt tried that with those files but it works with other system files.reiconcache from sordum tools is not working for my case.
This is one of my errrr moments when I see a blank shortcut icon. Isn't distributed link tracking client service suppose to keep shortcuts from getting bonked?Guys, what is the best way to rebuild icon cache to fix blank icons?
reiconcache from sordum tools is not working for my case.
Its not the shortcut getting bonked, its the shortcuts icon that is getting bonked because default icon cache size is wayyyyy too low and it keeps having to overwrite itself.This is one of my errrr moments when I see a blank shortcut icon. Isn't distributed link tracking client service suppose to keep shortcuts from getting bonked?
That works honky doryOops, me bad
Code:Windows Registry Editor Version 5.00 ;Increase Icon Cache Size To 51.2MB [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer] "Max Cached Icons"="51200"
That works honky dory
I havnt seen that mentioned either. Ive reset my cache to 0MB, cleared icon cache files, restarted and created new shortcuts, all is good so far.you can actually stop iconcache.db from being created (no more corruption issues!), just change Clanger's registry key to 0. The funny thing is I've never seen that suggested anywhere before
For almost two years, Microsoft officials botched a key Windows defense, an unexplained lapse that left customers open to a malware infection technique that has been especially effective in recent months.
Microsoft officials have steadfastly asserted that Windows Update will automatically add new software drivers to a blocklist designed to thwart a well-known trick in the malware infection playbook. The malware technique—known as BYOVD, short for "bring your own vulnerable driver"—makes it easy for an attacker with administrative control to bypass Windows kernel protections. Rather than writing an exploit from scratch, the attacker simply installs any one of dozens of third-party drivers with known vulnerabilities. Then the attacker exploits those vulnerabilities to gain instant access to some of the most fortified regions of Windows.
It turns out, however, that Windows was not properly downloading and applying updates to the driver blocklist, leaving users vulnerable to new BYOVD attacks.