Thread: New Updater
View Single Post
  #51  
Unread 02-23-2014, 09:40 AM
Kaldran Kaldran is offline
A Griffon
 
Join Date: Nov 2004
Server: Valor
Posts: 358
Default

Quote:
Originally Posted by Denavin View Post
Does anybody read the post in this fourm? I am not the only one that has had a problem with a system cleaners breaking the updater. Read post #44 Therendil has also had a system cleaner break the updater so its not just my system.

Ok fine you don't think its the updater. But I never had a problem till you changed the updater to this new one. I have used Kaspersky's Rescue Disk 10 to do a boot level scan and found NOTHING!!!

But when I run CCleaner or Iobit Advanced SystemCare which both have a registry cleaning function then Profit updater will not work and I must move the install location to get it to work again. Then the next time I clean my system I again have to move the instlation location. I am having to move it at least once a week or every time I use a system cleaner.

It is NOT a virus....

It is NOT mallware....

It is a problem with where and how Profit updater stores its keys and other configuration info that is either being put in a volital location or not tied to a program so that when I run a system cleaner there is nothing that can be associated with the updater thus it is being deleted. Only guessing here, I do not know what is being deleted or from where.

If you can give me the locations of all the configuration variables and their registry keys then I may be able to find what and where things are going wrong. Since I do not know the names or location of registry keys or other configuration variables it is hard for me to do my own investigation. I have searched but I am hunting blind. I would rather not DUMP Profit and goto somthing else but since I am getting very little help here I may be forced to do just that.

I am angry because first of all I do not like trying to trouble shoot via fourms. Then when I do the answers I get are not only way off the mark they make assumptions that are in no way correct.

Stop assuming that my systme is infected with a virus.
Download CCleaner and / or Iobit Advanced SystemCare they are both free and run the tests yourself then you wont need to know my system. Do this and see if you can duplicate the error, if not then please supply me with the info I requested so I can do my own investigation.

Sorry for the rant....
Quote:
Originally Posted by Denavin View Post
Yes I also use CCleaner but I will not tell it to leave Java crap in the temp folder since Java is an open back door to my system, it all goes. Instead fix the updater.

Yay!! There are inteligent poeple on this fourm who understand how winstupid works after all. Somebody finaly read what I said instead of assuming that it was a virus / mallware!!
I actually do not feel like investing much more time into this as you already got all information needed.

As per post #41 settings are stored in the registry (HKEY_CURRENT_USER\Software\JavaSoft\Prefs\de\pala\updater) via Javas Preferences implementation for Windows.

The application uses %temp% at runtime to extract and launch itself. This is because of the classloader is keeping up a file lock on accessed files which would make self updating not work.

I will certainly not install any system cleaning software, as they tend to break things badly (as shown). Windows is capable of cleaning up temporary files itself and on modern systems with Gigs and Gigs of RAM there is absolutely no need to clean up the registry. Also the cleaner cannot know which keys belong to which software as there simply is no hard link between software and registry keys and no way to find abandoned data.

And to quote myself:

Quote:
Originally Posted by Kaldran View Post
Just jumping in quickly to note that there are no security concerns with Java applications themselves, just with the browser plugins. They are usually restricted and do not allow system access. However due to several bugs you can inject malicious code which is not restricted by this sandbox anymore.

Local installed java applications do have system access anyways (up to the users current rights level), so if they want to manipulate your system, they can do that like any other application can do.

Actually it would be way harder to infect your system with a Java application, as there is no easy way to elevate user rights (showing the UAC prompt for admin access) from within the Java VM.
Reply With Quote