My avira virus scanner is giving me an alert:
found HTML/STRATION in nalist.htm
in the c:userspublicejukebox folder? What's the nalist.html file for?
just the cached album list
no virus
EJ has always been virus free
Ok. I'm pacified.
btw: Why is that ejukebox folder in the folder c:userspublic ? As I noted the public folder is accessible from all pc within my home network. Means I
(or my son who wants to bother me) can delete the files in that folder from every pc. :-)
It needs to be public so that the auto lookup cover image cache can be accessible to all user accounts and EJ installs.
That way it saves disk space and doesn't re-download lookup images already downloaded. The rest is the cache unique to each install folder.
if the cache is deleted it will be recreated automatically as needed from data stored in your EJ database but EJ will be slower until everything has
been re-cached.
Quote: |
i don't think so
public was the only thing the UAC accepted
and like i said before i wanted to allow C:EJukebox C:EJukebox2 etc
i remember there i couldn't have EJ installed more than once or UAC would mix the files with the other install's files.
even if it could work from where you said i couldn't change it without making everyone have to re-cache
so i don't even want to think about changing it when there would be no benefit and only potential slowdown and disruption
I understand. Never touch a running system.
I'm still wondering how the other applications without administrator rights could handle the UAC? My assumption was that they don't need access to
'Crogram Files (x86)' and other protected folders. That they write into
the 'C:Users' area and in the 'C:UsersAll Users' ares. At least I can write within that folders without UAC warning or administrator confirmation.
But I'm not a windows developer. So I understand to less of the details.