Keys to add

Discussion in 'MRU Blaster Forum' started by UTSRelativity, Jul 23, 2003.

Thread Status:
Not open for further replies.
  1. Microsoft Office Document Imaging 11:

    HKEY_CURRENT_USER\Software\Microsoft\MSPaper 11.0\Persist File Name
    HKEY_CURRENT_USER\Software\Microsoft\MSPaper 11.0\Recent File List

    Remote Desktop Connection:

    HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Default
     
  2. HKLM

    HKLM Registered Member

    Joined:
    Jul 9, 2003
    Posts:
    5
    I hope this is one of the places to post new keys to add to MRU-blaster and to find out if a key in the registry is really MRU.

    Whell I have found this key:

    HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\RestartCommands

    I am running Win98 SE.

    It is not affected by MRU Blaster .
    It has binary values named 0,1,2,... and at the end one more binary value named "Count"

    I have found it to have from 4 to 8 values after observing it for a few days.
    Couldn't find anything on the Microsoft site but the best guess I can make is that it stores some sort of information of any open windows at the time the computer was restarded (probably by a program performing an installation).It must be usefull but why It keeps a history of events and doesn't delete the entire key after the PC has started?

    I hope you can understand my English and my spelling.

    By the way the latest update of MRU-blaster fixed the problems with the scheduler and the plugins. Thanks, keep the good programming.
     
  3. thebrix

    thebrix Guest

    A nice simple one to add ... for Textpad 4.x it should remove all keys under:

    HKEY_CURRENT_USER\Software\Helios\TextPad 4\Recent File List

    and

    HKEY_CURRENT_USER\Software\Helios\TextPad 4\Recent Strings
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.