Pownce Refugees

Keeping the community alive, post Pownce

Derek Schauland outlines the basics of CCleaner for keeping your computer optimized and helping you get rid of the mess that piles up from Internet surfing, old applications, and other fragments.
Product Spotlight: CCleaner
Date: January 8th, 2010
Author: Derek Schauland

Keeping your computer moving like the day it was purchased keeps getting more difficult with new viruses, malware, and all the other “interesting” software that shows up on the Internet. CCleaner is a freeware utility that helps keep computers cleaned up and running at their peak by identifying and getting rid of problem cookies, uninstalled program leftovers, and other fragments that clog up your system.

I am not usually one to constantly worry about cookies and other things, but thought I would give CCleaner a test run once I found that it can be scheduled to run as a task. Automation of regular maintenance is a key feature in my opinion.

Supported operating systems:

Windows 7
Windows Vista
Windows XP
Windows 2000
Hardware requirements:

CCleaner is a PC-only utility and does not work on Macintosh systems.

Who’s it for?
CCleaner is a tool for any Internet user who wants to keep their PC running well without a lot of extra effort. The scanning process can take a few minutes to complete, but is pretty much hands off once started.

What problem does it solve?
Runaway cookies and applications slowly degrade performance. For users who don’t want to search out things on their own and get into the guts of their computer’s registry, CCleaner offers a simple, hands-off method of cleaning up the messes inherent in using the Internet and uninstalling old applications.

Standout features
Uninstallation: CCleaner can be used to remove applications from your PC
Registry Integrity inspection: CCleaner will inspect the data in the registry for orphan keys and data and allow it to be corrected.
Startup Items: Enable or disable startup items
Secure file deletion: CCleaner supports several levels of file removal including simple overwrites, the Department of Defense standard that uses three passes, the National Security Agency standard that uses seven passes, and the Gutmann algorithm, which uses a 35-pass method of overwriting removed files.
Figure A

Clean up browser and system items.
Figure B

Manage Startup items, Applications, and System Restore Items.
Figure C

Clean up registry items.
Bottom line for business
A simple way to maintain a clean and optimized system is a great benefit to organizations and their users. I would recommend the application be used from a flash drive as needed by IT pros, but also be explained to end users so they can, if they choose, install the application on their home computers to improve performance.

Douglas Beard

Views: 16


You need to be a member of Pownce Refugees to add comments!

Join Pownce Refugees

© 2017   Created by Heidi Cool.   Powered by

Report an Issue  |  Terms of Service