Imo the registry should only keep system settings - not program settings - and should be loaded into ram at boot. It should only be modified under special circumstances such as actual program install or system modification, not during routine use. Finally - because it is delicate and vulnerable - it should be automatically safeguarded by the OS using backups, modification confirmation, and fault checking.
You should be able to uninstall a program just by removing its folder I wonder if they mess with the registry much, or even the system as a whole? The idea of portable apps is so they DON"t install in the registry. Linux allows very FEW programs to interact directly with the kernel. I think this is how it should be. This is what actually happens with Microsoft programs.. As a consequence, you get system instability and a lack of security.
The [minor] benefit, is a [slight] increase in speed. Now if I have sold you on this idea why not make your own portable software? There are many places on the net to acquire this information but here is one good way. I know that there are workarounds for all of these. This is just for the novice user, not the intermediate portable apper!
Lets face it. When you use a computer that is not your own, you feel uncomfortable. You wish that it had the applications that your home computer had. Well meet your savior! Installrite InstallRite can be found free of charge at Epsilon Squared web site www. Here's how it works. Share More sharing options Followers 0. Recommended Posts. Posted June 5, Link to comment Share on other sites More sharing options MCT Posted June 5, Posted June 6, Posted June 11, Oh well i'll excuse my noobieness this time for not knowing how to repack exactly manualy i never tried it P.
Yeah great tool in most of the cases. But it doesn't work for internet download manager. I've tryed several times and didn't work. It could be me or the program or installrite. Posted June 14, Might be a simple fix. It would be nice if it asked for all necessary information before taking the snapshot, so it could do all the time-consuming tasks without interaction. You can launch a comparison by configuring InstallWatch to detect when an installation is starting.
I'm not sure how that works, but it dutifully detected my daughter installing the "Dora the Explorer Backpack Adventure" - it took the snapshot, launched the interactive installation process, and then did the analysis after the installation completed, frustrating my 4-year-old all the while, but giving me a nice real-world test.
And third, the mechanism I used most often - you can ask InstallWatch manually to take a snapshot at any time. Then do whatever you want on the system, and when you're done, kick off the "Analyze" phase to generate the comparison.
This is the mechanism that opens up the tool to a number of different uses, and is the only way to check an uninstallation process. I can't help but throw in a little folklore. While I was searching for background information about InstallWatch, I came across the Jargon File definition for "epsilon squared. Gavin Stark tells me, "We chose this name since in the industry we are small fries compared to the big players such as Microsoft or Symantec, etc. Vol 25, No. A : Vol 25, No.
This document is an industrial compilation designed and created exclusively for educational use and is distributed under the Softpanorama Content License. Original materials copyright belong to respective owners. Quotes are made for educational purposes only in compliance with the fair use doctrine.
We are making such material available to advance understanding of computer science, IT technology, economic, scientific, and social issues. We believe this constitutes a 'fair use' of any such copyrighted material as provided by section of the US Copyright Law according to which such material can be distributed without profit exclusively for research and educational purposes.
Grammar and spelling errors should be expected. The site contain some broken links as it develops like a living tree You can use PayPal to to buy a cup of coffee for authors of this site Disclaimer:.
The statements, views and opinions presented on this web page are those of the author or referenced source and are not endorsed by, nor do they necessarily reflect, the opinions of the Softpanorama society. We do not warrant the correctness of the information provided or its fitness for any purpose.
The site uses AdSense so you need to be aware of Google privacy policy. You you do not want to be tracked by Google please disable Javascript for this site. This site is perfectly usable without Javascript. Unix Administration. Red Hat. Toxic Managers.
Integrity Checkers. Perl-based Integrity checkers. Registry M nitoring. The file details stored match those of the file currently stored on disk. The file details stored do not match those of the file currently stored on disk. The file could not be checked e.
The file has not yet been checked to see if it has changed or not. A key to be used for HMAC operations. Check files in loaded list requires "-load" to be present. Do not show main dialog, but do show integrity check report when complete. Do not show main dialog, or any other dialogs unless something goes wrong e. Quit after carrying out command line instructions i. Google matched content.
You can use PayPal to to buy a cup of coffee for authors of this site. I had of these problems sometimes Removing too much stuff while cleaning the MSI, or not enough Just make one again to see if the results changes. If not Rating comments in this legacy AppDeploy message board thread won't reorder them, so that the conversation will remain readable. Answer this question. Posted by:. Don't be a Stranger!
Sign up! View more:. Software Deployment Questions. Powershell script for enabling location services not running?
0コメント