comment

on GlassWire Network Security Monitor & Firewall's page

from Streuner, (08 june 2017)

After using the program for so long, it stops measuring the data. Although I watch YouTube videos, Face or download a movie, the application marks 0kb and does not display an active graphic. In some occasions the problem is solved by re-installing, but there comes a moment that does not work since it does not measure traffic or anything.

comment

on AdwCleaner's page

from janjanssens, (31 december 2016)

Thanks to the programmers that developed AdwareCleaner. Now my pc is free from popups (SetupWizard) it was hard to find a program to make my pc normal again.

comment

on AdwCleaner's page

from GEGEPING, (19 august 2016)

Plein de faux positifs surement car non nettoyés au reboot avec cette nouvelle version.

La précédente version ne montrait rien.

Attendons une prochaine MAJ de la database ou du logiciel?

En tout cas, il m'a bien aidé, donc soyons indulgent pour la résolution du pb.

comment

on AdwCleaner's page

from 3ogdy, (17 august 2016)

I really appreciate what you do with this program. It's one hell of a program. I do have a suggestion, though:
I've noticed that, the more up-to-date it is, the slower it becomes...it takes quite some time for it to scan a system, despite using SSDs.
Could you split the scanning process among 4+ cores of the CPU so that the scanning speed is improved? Could you give the software 4 instances with Affinity specifically set to a CPU core? I believe doing that may improve its scanning time, especially on SSDs (which are usually the ones holding the entire Windows installation -> and this last one is what most infection target (Users folder, Windows, Program Data...)

Thank you again for your work on this great tool! No wonder it has so many millions of downloads

comment

on AdwCleaner's page

from ****, (16 august 2016)

version 6.0 .
Adwcleaner finds a threat in file web data located in C:\Users\User Name\AppData\Local\Google\Chrome\User Data\Default . The value is Search Provider and data is search.babylon.com.
I deleted it several times and it still can't be removed, even I deleted the whole Web data file.

comment

on AdwCleaner's page

from langere, (15 august 2016)

Version 6.0. After scanning, Adwcleaner finds in the Chrome tab: Value: "startup_url" and data "hxxp://search.conduit.com/...". Although I select the Clean button, this value and data remain after the cleaning process and reboot.

comment

on AdwCleaner's page

from ****, (14 august 2016)

Hmm… Not nice. AdwCleaner 6.000 found registry keys:
HKLM\SOFTWARE\Classes\FWTools.FWUtil
HKLM\SOFTWARE\Classes\FWTools.FWUtil.1
HKLM\SOFTWARE\Classes\SQLActiveScriptHost
HKLM\SOFTWARE\Classes\SWNGRE.uiMeshDecoWizardPage_c

and sure cleaned them out.

After reboot I looked up what a heck those keys was about and found they are all FloXpress utility in SolidWorks 2014. I’m using this program last 2 years and never had any problems with program nor viruses. Now SolidWorks crashes when starting FloXpress… So sad…

Check everything before you cleaning with AdwCleaner 6.000 !

comment

on AdwCleaner's page

from Dypsis, (09 may 2016)

I have a couple of false positives to report that keep getting flagged, but shouldn't be.

1. Under Scheduled Tasks, RunAsStdUser Task is C:\Program Files\GPSoftware\Directory Opus\dopus.exe
This is a legit Directory Opus entry.

2. Under Shortcuts, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\TeraByte Unlimited\TeraByte OSD Tool Suite Pro\Ready To Run Scripts\INISTART - Reset Windows Startup.lnk
This is a legit Terabyte Image for Windows shortcut.

comment

on AdwCleaner's page

from ****, (20 april 2016)

AdwCleaner 5.112 reports the database is corrupt. I've downloaded multiple times directly from https://toolslib.net/downloads/finish/1/
Please check the posted file and advise.

comment

on AdwCleaner's page

from UncleSam, (08 april 2016)

Добрый день, большое спасибо за замечательную программу AdwCleaner. И просьба сделать в программе проверку *.lnk файлов браузеров (не только Internet Explorer) по пути c:\Users\***\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\, c:\Users\***\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\StartMenu\, c:\Users\***\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\, c:\Users\***\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\, поскольку в свойствах *.lnk после вирусов часто подменяется путь на другой. Спасибо за внимание.