Re: ccleaner new version


Kevin <kleeva5@...>
 

The only special feature I found from buying a pro license is that you can contact the makers,  wupee!

 

E-mail is golden!!!
Kevin Lee

 

From: Shaun Everiss
Sent: Sunday, September 2, 2018 12:02 PM
To: nvda@nvda.groups.io
Subject: Re: [nvda] ccleaner new version

 

Well I would have prefured to be honest that I could buy a licence to

use ccleaner without any monitering as an on demand thing.

 

I don't care to buy pro, I don't need the features, I really don't.

 

I do think though that if they keep being to aggressive well who knows.

 

 

 

On 9/2/2018 8:49 PM, Brian's Mail list account via Groups.Io wrote:

> The problem is that the aggressive Avast people took over PiReform and

> I understand the old team were not particularly happy about this. In

> fact the malware was not bad, but I suspect was done deliberately by

> the disgruntled people who no doubt were getting the  chop..

> It has scanned OK and now they have at least given people the ability

> to turn off the snooping, at least we assume they have come clean

> completely as obviously the free version had to be subsidised by

> collecting metrics from the users.

> The real power bits of ccleaner for me are the ability to look at

> browser add ons,  and tasks and start up items and toggle them, also

> to see what system restore points are set and to remove old ones.

> Brian

> bglists@...

> Sent via blueyonder.

> Please address personal E-mail to:-

> briang1@..., putting 'Brian Gaff'

> in the display name field.

> ----- Original Message ----- From: "Desert Moon" <desert.moon@...>

> To: <nvda@nvda.groups.io>

> Sent: Sunday, September 02, 2018 7:25 AM

> Subject: Re: [nvda] ccleaner new version

> Hello,

> Not a big fan of products like CCleaner. In September of 2017, it was

> widely reported that the backdoor was being exploited to have malware

> implanted. And another report last December:

> The actual malware detected in CCleaner was found to contain malicious

> code: the attackers implanted their code in a legitimate product that

> received a legitimate certificate.

> Who knows when or if the above will happen again. Use the product at

> your own risk.

> --

> Desert

>

> .

 

 

 

Join nvda@nvda.groups.io to automatically receive all group messages.