Jump to content

Welcome to Geeks to Go - Register now for FREE

Need help with your computer or device? Want to learn new tech skills? You're in the right place!
Geeks to Go is a friendly community of tech experts who can solve any problem you have. Just create a free account and post your question. Our volunteers will reply quickly and guide you through the steps. Don't let tech troubles stop you. Join Geeks to Go now and get the support you need!

How it Works Create Account
Photo

My Search Engines working so slowly they are useless [Solved]


  • This topic is locked This topic is locked

#16
SydneyCarton

SydneyCarton

    Member

  • Topic Starter
  • Member
  • PipPip
  • 12 posts

Hi Dr M

Looking at the tree I posted yesterday, Apple is taking up 45GB of my C drive. All of that is Mobile Sync, which I guess is when I use iTunes and it backs up my phone. There are 2 files in there with long names, one of 9GB dating back to 2021 and the other of 36GB from June 2023, over a year ago. I hardly use iTunes any more. I have my iPhone photos stored in iCloud along with my contacts. I don't know if I need to back up anything more from my phone. It would be nice, but I think the space on my C drive is more important to me now. Would it be a good idea to get rid of the 45GB of Apple?

 

Here is the Check Disc result:

 

ListChkdskResult by SleepyDude v0.1.7 Beta | 21-09-2013

 
------< Log generate on 30/07/2024 5:12:57 PM >------
Category: 0
Computer Name: DESKTOP-OTB3QSE
Event Code: 1001
Record Number: 206366
Source Name: Microsoft-Windows-Wininit
Time Written: 07-30-2024 @ 07:39:08
Event Type: Information
User: 
Message: 
 
Checking file system on C:
The type of the file system is NTFS.
Volume label is OS.
 
A disk check has been scheduled.
Windows will now check the disk.                         
 
Stage 1: Examining basic file system structure ...
Cleaning up instance tags for file 0x70ed.
Cleaning up instance tags for file 0xa0a3.
Cleaning up instance tags for file 0xa29a.
Cleaning up instance tags for file 0x13207.
Cleaning up instance tags for file 0x32e36.
Cleaning up instance tags for file 0x4a02c.
  1296128 file records processed.                                                        
 
 
File verification completed.
 Phase duration (File record verification): 7.29 seconds.
  30163 large file records processed.                                   
 
 
 Phase duration (Orphan file record recovery): 0.00 milliseconds.
  0 bad file records processed.                                     
 
 
 Phase duration (Bad file record checking): 0.43 milliseconds.
 
Stage 2: Examining file name linkage ...
  27767 reparse records processed.                                      
 
 
  1788062 index entries processed.                                                       
 
 
Index verification completed.
 Phase duration (Index verification): 18.67 seconds.
  0 unindexed files scanned.                                        
 
 
 Phase duration (Orphan reconnection): 7.44 seconds.
  0 unindexed files recovered to lost and found.                    
 
 
 Phase duration (Orphan recovery to lost and found): 903.03 milliseconds.
  27767 reparse records processed.                                      
 
 
 Phase duration (Reparse point and Object ID verification): 87.09 milliseconds.
 
Stage 3: Examining security descriptors ...
Cleaning up 15978 unused index entries from index $SII of file 0x9.
Cleaning up 15978 unused index entries from index $SDH of file 0x9.
Cleaning up 15978 unused security descriptors.
CHKDSK is compacting the security descriptor stream
Security descriptor verification completed.
 Phase duration (Security descriptor verification): 382.76 milliseconds.
  245968 data files processed.                                           
 
 
 Phase duration (Data attribute verification): 0.45 milliseconds.
CHKDSK is verifying Usn Journal...
Usn Journal verification completed.
 
Stage 4: Looking for bad clusters in user file data ...
  1296112 files processed.                                                               
 
 
File data verification completed.
 Phase duration (User file recovery): 6.20 minutes.
 
Stage 5: Looking for bad, free clusters ...
  7100761 free clusters processed.                                                       
 
 
Free space verification is complete.
 Phase duration (Free space recovery): 0.00 milliseconds.
Correcting errors in the Volume Bitmap.
 
Windows has made corrections to the file system.
No further action is required.
 
 248928716 KB total disk space.
 218617136 KB in 631014 files.
    518780 KB in 245971 indexes.
         0 KB in bad sectors.
   1389752 KB in use by the system.
     65536 KB occupied by the log file.
  28403048 KB available on disk.
 
      4096 bytes in each allocation unit.
  62232179 total allocation units on disk.
   7100762 allocation units available on disk.
Total duration: 6.78 minutes (407331 ms).
 
Internal Info:
00 c7 13 00 f3 5c 0d 00 b4 46 14 00 00 00 00 00  .....\...F......
c2 37 00 00 b5 34 00 00 00 00 00 00 00 00 00 00  .7...4..........
 
-----------------------------------------------------------------------

  • 0

Advertisements


#17
DR M

DR M

    The Grecian Geek

  • Malware Removal
  • 4,258 posts

Hi, Sydney.

 

 

Would it be a good idea to get rid of the 45GB of Apple?

 

I can't answer to this question, since I don't know what the content of these 45GB is, as well as what you need and what you don't need. If you have what you need in the iCloud, then, you can delete it, I guess. 

 

As to the disk check, the result says:

 

Windows has made corrections to the file system.
No further action is required.
 
I would go for a regular backup of personal files from now on, just in case. You never know when a disk will fail completely. 
 
Is there any other question/issue/concern regarding this computer? 

  • 0

#18
SydneyCarton

SydneyCarton

    Member

  • Topic Starter
  • Member
  • PipPip
  • 12 posts

OK

If I decide not to delete the Apple backups and the C drive fills up again, should I just run cleanmgr again? I've used CC Cleaner in the past, but I imagine you're not too keen on that.

Yes, I'll start doing regular backups, good idea. The computer is quite old so I should be prepared.

SC


  • 0

#19
DR M

DR M

    The Grecian Geek

  • Malware Removal
  • 4,258 posts

Yes, you can use cleanmgr again. If you use CCleaner, do not use the registry cleaning option.
 
As to the backup, having in mind the results of the chkdsk utility and the computer's age, it is a must.

 

Well, we reached the end of this process now.


The following tool will remove the tools we used as well as reset system restore points:

Download KpRm by kernel-panik and save it to your desktop.

  • Right-click kprm_(version).exe and select Run as Administrator.
  • Read and accept the disclaimer.
  • When the tool opens, ensure all boxes under Actions are checked.
  • Under Delete Quarantines select Delete Now, then click Run.
  • Once complete, click OK.
  • A log will open in Notepad titled kprm-(date).txt.
  • Please copy and paste its contents in your next reply.

Note: If there is a warning about this tool, go on to download it, since it is a false/positive. Choose More info and continue from there.


  • 0

#20
SydneyCarton

SydneyCarton

    Member

  • Topic Starter
  • Member
  • PipPip
  • 12 posts
# Run at 1/08/2024 11:01:18 PM
# KpRm (Kernel-panik) version 2.17.0
# Run by Martin from C:\Users\Martin\Desktop
# Computer Name: DESKTOP-OTB3QSE
# OS: Windows 10 X64 (19045) (10.0.19045.4651) 
# Number of passes: 1
 
- Checked options -
 
    ~ Registry Backup
    ~ Delete Tools
    ~ Restore System Settings
    ~ UAC Restore
    ~ Delete Restore Points
    ~ Create Restore Point
    ~ Delete Quarantines
 
- Create Registry Backup -
 
   ~ [OK] Hive C:\WINDOWS\System32\config\SOFTWARE backed up
   ~ [OK] Hive C:\Users\Martin\NTUSER.dat backed up
 
     [OK] Registry Backup: C:\KPRM\backup\2024-08-01-23-01-18
 
- Delete Tools -
 
 
  ## FRST
     [OK] C:\Users\Martin\Desktop\Addition.txt deleted
     [OK] C:\Users\Martin\Desktop\Fixlog.txt deleted
     [OK] C:\Users\Martin\Desktop\FRST-OlderVersion deleted
     [OK] C:\Users\Martin\Desktop\FRST.txt deleted
     [OK] C:\Users\Martin\Desktop\FRST64.exe deleted
     [OK] C:\FRST deleted
 
- Restore System Settings -
 
     [OK] Reset WinSock
     [OK] FLUSHDNS
     [OK] Hide Hidden file.
     [OK] Show Extensions for known file types
     [OK] Hide protected operating system files
 
- Restore UAC -
 
     [OK] Set EnableLUA with default (1) value
     [OK] Set ConsentPromptBehaviorAdmin with default (5) value
     [OK] Set ConsentPromptBehaviorUser with default (3) value
     [OK] Set EnableInstallerDetection with default (0) value
     [OK] Set EnableSecureUIAPaths with default (1) value
     [OK] Set EnableUIADesktopToggle with default (0) value
     [OK] Set EnableVirtualization with default (1) value
     [OK] Set FilterAdministratorToken with default (0) value
     [OK] Set PromptOnSecureDesktop with default (1) value
     [OK] Set ValidateAdminCodeSignatures with default (0) value
 
- Clear Restore Points -
 
   ~ [OK] RP named Vuze restore point created at 07/27/2024 01:54:16 deleted
     [OK] All system restore points have been successfully deleted
 
- Create Restore Point -
 
     [OK] System Restore Point created
 
- Display System Restore Point -
 
   ~ [I] RP named KpRm created at 08/01/2024 13:31:39
 
-- KPRM finished in 55.81s --

  • 0

#21
DR M

DR M

    The Grecian Geek

  • Malware Removal
  • 4,258 posts

Great. :)
 
Since we are in the Malware Removal Forum, here are some final tips about your computer's security from now on:

Some of the following, are from Klein's (2005) article, So how did I get infected in the first place. Since then, the article has been reproduced or linked to in dozens of locations. As a result, many malware experts have continued updating it, to include current operating systems and software program information. My source is Security Garden, and I marked for you the following:

1. Keep your Windows updated!
It is important always to keep current with the latest security fixes from Microsoft. This can patch many of the security holes through which attackers can infect your computer.

2. Update 3rd Party Software Programs
Third Party software programs have long been targets for malware creators. It has been stated that "Adobe’s Reader and Flash and all versions of Java are together responsible for a total of 66 percent of the vulnerabilities in Windows systems exploited by malware.'' It's important to keep everything updated.

3. Update the browsers you use
Many malware infections install themselves by exploiting security holes in the Internet browser that you use. So... Keep them updated.

4. Be careful about what you download and what you open!

  • Many "freeware" programs come with an enormous amount of bundled spyware that will slow down your system, spawn pop-up advertisements, or just plain crash your browser or even Windows itself. Watch for pre-checked options such as toolbars that are not essential to the operation of the installed software.
  • Peer-to-peer (P2P) programs like Kazaa, BearShare, Imesh, Warez P2P, and others, allow the creation of a network enabling people to connect with other users and upload or download material in a fast efficient manner. BUT even if the P2P software you are using is "clean", a large percentage of the files served on the P2P network are likely to be infected.
  • Cracked or pirated programs are not only illegal, but also can make your computer a malware target. Have this in mind.
  • Do not open any files without being certain of what they are!

5. Avoid questionable web sites!
Visit web sites that are trustworthy and reputable. Many disreputable sites will attempt to install malware on your system through "drive-by" exploits just by visiting the site in your browser. Lyrics sites, free software sites (especially ones that target young children), cracked software sites, and pornography sites are some of the worst offenders. Also, never give out personal information of any sort online or click "OK" to a pop-up unless it is signed by a reputable company and you know what it is.

6. Registry cleaners/driver boosters/system optimizers
I do not recommend registry cleaners, system optimizers, driver boosters and the like. It is your computer and certainly your choice. However, please consider that modifying registry keys incorrectly can cause Windows instability, or make Windows unbootable. With registry cleaner and system optimization software programs, the potential is ever present to cause more problems than they claim to fix. Do note, however, that Microsoft does not support the use of registry cleaners. See Microsoft support policy for the use of registry cleaning utilities.

7. PC means personal computer!
Don't give access to your computer to friends or family who appear to be clueless about what they are doing.

8. Back-up your work!
Make back-ups of your personal files frequently. You never know when you'll have to reformat and start from scratch. You can always reformat and reinstall programs, but you cannot replace your data if you haven't made backups.

9. Must-Have Software
An anti-virus and an anti-spyware program is a necessity for the security of your computer. Be sure that you keep them updated, and that real time protection is enabled. You have now Kaspersky. Together with Malwarebytes, if you run it occasionally, depending on how often you use your computer, can keep you safe.

Happy safe computing. ZZZQehw.gif


I'm glad I was able to help you.


  • 0

#22
SydneyCarton

SydneyCarton

    Member

  • Topic Starter
  • Member
  • PipPip
  • 12 posts

Ευχαριστώ που με τακτοποιήσατε Dr M, η ευγενική βοήθειά σας είναι πολύτιμη

SC


  • 0

#23
DR M

DR M

    The Grecian Geek

  • Malware Removal
  • 4,258 posts

Ευχαριστώ που με τακτοποιήσατε Dr M, η ευγενική βοήθειά σας είναι πολύτιμη

SC

 

Oh, what a nice comment in Greek, Sydney! Thank you so much for this!

 

You are very welcome! Any time at your service!

 

Take care!


  • 0

#24
DR M

DR M

    The Grecian Geek

  • Malware Removal
  • 4,258 posts

Since this issue appears to be resolved ... this Topic has been closed. Glad we could help. :)

If you're the topic starter, and need this topic reopened, please contact a staff member with the address of the thread.

Everyone else, please, begin a New Topic.


  • 0






Similar Topics

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

As Featured On:

Microsoft Yahoo BBC MSN PC Magazine Washington Post HP