No announcement yet.


This topic is closed.
This is a sticky topic.
  • Filter
  • Time
  • Show
Clear All
new posts

  • #16
    Acronyms in IObit

    Some abbreviations/Acronyms used in IObit Products
    (Best course of action is to write out the acronym at least first time you use it in every thread)

    AFAIC As far as I'm concerned
    AFAIK As far as I know
    ADSL Asymmetric Digital Subscriber Line
    AKA Also Known As
    AMD Advanced Micro Devices
    ARP Address Resolution Protocol
    AS Anti-Spyware
    ASAP Automatic Switching And Processing
    ASAP As Soon As Possible
    ASC Advanced System Care
    ATM Adobe Type Manager
    atm at the moment
    ATP Analyze Tool Pack
    AV Anti-Virus
    AWC Advanced Windows Care (Now called Advanced System Care)
    BBS Bulletin Board System, Bios Boot Specification
    BBcode Bulletin Board Code (e.g. a smiley or brackets or another possibility)
    BHO Browser Helper Object
    BIOS Basic Input/Output System
    BITS Background Intelligent Transfer Service
    BMP BitMaP (File Format), Batch Message Processing, Basic Multilingual Plane
    BSOD Blue Screen Of Death
    BT Bus Terminator, Bit Test
    BTW By The Way
    BUS Broadcast and Unknown Server
    BW BandWidth (digital) measured in bits per second (binary), Byte = 8 bit
    BW BandWidth (frequency) measured in Hertz - usually KHz/MHz/GHz (cycles per second)
    CCI Completely Clean Install (My own suggestion )
    clsid class identifier
    CMD Command
    COM COMmand File extension, Component Object Model, COMmunication port (Serial port)
    CP Control Panel (IObit Forum)
    CPU Central Processing Unit
    CXI Common X-windows Interface
    DAC Device Access Code, Digital to Analog Converter, Discretionary Access/Data Acquisition Control
    DAP Download Accelerator Plus, Data Access Page, Directory Access Protocol, Dynamic Application Partitioning
    DCOM Distributed Component Object Model
    DIY Do It Yourself
    DIVx Digital Videoexpress
    DLL Dynamic Link Library, Dynamic Link Loader
    DM Desktop or Document Management, Disconnect Mode, Distributed Memory, Debugger Module
    DNS Domain Name System, Digital Nervous System
    DOG Digital Original Gene
    DOS Disk Operating System
    DPI Dots Per Inch (Resolution Measurement), Distributed Protocol Interface, Digital Phone Interface
    DSL Digital Subscriber Line, Dialogue Scripting/Dynamic Simulation Language, Distributed Service Logic
    DVD Digital Versatile Disk, Digital Video Disk
    EDGE Enhanced Data-rate for Gsm Evolution
    ENIS European Network (of) Innovative Schools
    EULA End User License Agreement
    FAT File Allocation Table
    FiOS Fiber Optic Service
    fps frames per second
    FWIW For What It's Worth
    fx. for example
    FYI For Your Information
    GB Giga Bytes (2^30 bytes or sometimes 10^9 bytes), Game_Booster (IObit)
    GIF Graphical Interchange File Format
    GPRS General Packet Radio Service
    GSM Global System for Mobile communications, Global Shared Memory
    GUI Graphical User Interface
    HD Hard Disk, Hard Density
    HIPS Host Intrusion Prevention System
    HKCU Handle to Registry Key Current User
    Hz Hertz - electromagnetic wave (one cycle per second) K=1000, M=million, G=10^9
    IAT Intelligent Agent Technology, Information Access Technology, Internet Appliance Toolkit, Import Address Table
    ICQ I Seek You (communication program)
    ID IDentifier
    IDE Integrated Drive Electronics, Integrated Development Environment, Interactive Design/Engineering/Enhancement
    IE Internet Explorer
    IMHO In My Humble Opinion
    IMO In My Opinion
    IObit Intelligently Optimized bit(s) (my own suggestion )
    ISDN Integrated Services Digital Network
    IP Internet Protocol, Information Provider, Instruction Pointer
    ISP Internet Service Provider
    JPE Jump if Parity Even
    JPEG Joint Photographic Experts Group
    JPG JPeG File extension
    KB Kilo Bytes (2^10 bytes or sometimes10^3 bytes), Knowledge Base
    LAN Local Access or Area Network
    LNG Language (File extension)
    LOL Laughing Out Loud, Lots Of Love
    LUI Local User Interface, Language User Interface (speech recognition technology), Logical User Identifier
    LV Logical Volume, Low Voltage
    MAC MACro File extension, Mandatory Access Control, Move Add Change
    MAC Address Media Access Control Address
    MAD Microsoft Active Directory, Mutual Assured Destruction
    MB Mega Bytes (2^20 bytes or sometimes10^6 bytes)
    MBR Master Boot Record
    MFT Master File Table
    MIME Multipurpose Internet Mail Extensions
    MMX MultiMedia eXtensions
    MODEM MOdulator/DEModulator
    MPEG Motion Picture Expert Group
    MPG Motion Picture (expert) Group
    MRU Most Recently Used, Maximum Receive Unit
    MSG Message (.msg - message file extention)
    MTU Maximum Transmission Unit
    MUI Multimedia User Interface
    NA Not Applicable, Not Available
    nbsp non-breaking space (hard space) (Alt+0160)
    NTFS New Technology File System
    OEM Original Equipment Manufacturer
    OMG Object Management Group
    OMG Oh My God
    OP Original Poster
    OS Operating System
    OSI Open Systems Interconnection, Open Source Initiative
    OTOH On The Other Hand
    OTT Over The Top
    PAE Physical Address Extension
    PC Personal Computer, Printed Circuit, Program Counter
    PCI Peripheral Component Interconnect
    PDF Portable Document Format, Printer Description File, Processor Defined Function
    PE Phase Encoding, Portable Executable file format, Parity Error or Even
    PID Personal IDentifier, Process or Product IDentifier, Proportional Integral Derivative
    PM Private Message (IObit Forum)
    PNG Portable Network Graphics File format
    PSD PhotoShop Drawing File extension, Postal Security Device, Programmer's Supplementary Documents
    PUP Potentially Unwanted Program
    QT Quick Time
    QUT Questionable User Terminology (My own suggestion )
    RAD Rapid Access Disk, Rapid Application Development
    RAM Random Access Memory
    RAR Resource Adapters aRchive (compression file format)
    RC Release Candidate
    RMW Read Modify Write
    rtl Raster Transfer Language, Register Transfer Language or Transistor Logic, Run Time Library
    RZ Return to Zero
    SA Source Address, Service Agent, Security Association
    SCSI Small Computer System Interface
    SDSL Symmetric Digital Subscriber Line
    SFC System File Checker
    SID Security IDentifier, Serial Input Data, System or Station IDentification
    SMART Self-Monitoring Analysis and Reporting Technology
    SMBIOS System Management Basic Input Output System
    SOA Service Oriented Architecture, Start Of Authority
    SOHO Small Office/Home Office
    SP Service Pack, Stack Pointer, Sequence or SignalProcessor
    SSL Secure Sockets Layer, Synthesizer Specification Language
    TAI Threat Analysis Index
    TAI Think About It
    TC Test Control, Transmission Control or Convergence, Technical Committee
    TCP Transmission Control Protocol, Tape-Carrier Package
    THX Thanks, Thank you
    TIFF Tagged Image File Format
    TIF Tagged Image File extension
    TM Traffic Management, Transaction Manager or Monitor, Transmission and Multiplexing
    TNT The News Toolkit, TriNitroToluene
    TTL Time To Live, Transistor-Transistor Logic
    TxIA Thanks In Advance
    TYIA Thank You In Advance
    UAC Universal Access Control, User Access Control
    UDP User Datagram Protocol
    UI User Interface, Unix International
    UPNP Universal Plug aNd Play
    UPS Uninterrupted Power Supply
    URL Uniform Resource Locator
    USB Universal Serial Bus
    VBA Visual Basic for Applications
    WDK Windows Development Kit
    WFP Windows File Protection
    WLAN Wide Local Access or Area Network
    WOT Web Of Trust
    WYSBYGI What You See Before You Get It
    WYSIWYG What You See Is What You Get
    xDSL (all types of) Digital Subscriber Line
    XML eXtensible Markup Language
    ZAC Z's Are Calling, (the "sack's" are calling -time for bed)
    ZIP Compression file format, Zigzag Inline Package, Zone Improvement Plan Postal code

    x^y means x raised to the power of y where y is the exponent
    Please edit and expand as you see fit
    RMW (Read Modify Write)

    I have made chat abbreviations blue

    太阳山 (solbjerg)
    Ceterum censeo Usage of IObit Products esse legendum
    (Furthermore I think that Usage of IObit Products must be read)
    Itemized subjects Table of content
    In relation to defragmentation Think about defragmentation
    Clean Install concept Clean Install
    Introduction to the Forum Forum Guidelines


    • #17
      About Help in the Forum

      Forum Help

      Help in the Forum is for the most part given by other users that have an idea for a solution or some advice they think pertinent.
      There are a few employees from IObit that look in from time to time and give advice or post new information, but they have other duties as well.
      When asking for help in the Forum it is really a good idea to tell what the problem is
      Describe it as extensively as possible and please give information about your computer too! Which Operating System, configuration and the like.
      Before asking for help please read as much about the problem as you can in other threads and posts in the Forum - use the seach function!
      If you can't find something that covers the problem you are having, then describe it in the post you are creating.
      In what circumstances it appeared - was it after a first time install or was it an over the top install. Was it during or after the first run - or was it something that happened after some other program installation. Please also tell whether you have the program(s) running automatically in the background - and which ones! It is also very helpful for the assisting user to have information about what settings you have in the program.
      In short as much useful information as possible about the problem.
      This will make it easier to decide on a course of action.
      Please post in the relevant "General Forum", that is to say don't post a SmartDefrag question in other general forums than SmartDefrag, and likewise for the other forums -except in the Lounge forum, where you can post comments on other subjects.
      Thank you!

      It is a good idea to read this thread, USAGE of IOBIT PRODUCTS to get to know the program.

      IMPORTANT NOTE: Please have a look at Information about Forum leaders, and. View Forum Leaders .

      IObit Guy , Tim Xue , BBAdmin , Krissy, Joanne, cicely, lambo, itobe, Jessie - IObit PR, ivy, hxin, eric.long, Lily2000, Alicia, JohnnyZ, skyxj are from IObit, and the rest is users trying to help the IObit products users in this Forum.

      Please feel free to add, edit or extend this description
      RMW (Read Modify Write)

      太阳山 (solbjerg)
      Ceterum censeo Usage of IObit Products esse legendum
      (Furthermore I think that Usage of IObit Products must be read)
      Itemized subjects Table of content
      In relation to defragmentation Think about defragmentation
      Clean Install concept Clean Install
      Introduction to the Forum Forum Guidelines


      • #18
        False Positive Alerts about IObit Products by Security Programs

        If you come across to a warning from Security Programs about IObit products, please check the concerned file in the following site:

        After receiving the report, you can share the information in the Forum.

        See the comment in the post by Tim Xue, the author of ASC here .

        (False Positives are files that are flagged as malware - virus/spyware - by an anti-virus application, without in fact being malware)

        The solution for the recent false positive unins000.msg from McAfee is described here:


        Last edited by enoskype; Mar. 4th, 2010, 16:02.

        - Beauty lies in the eye of the beholder and belongs to the man who can appreciate it. -


        • #19
          IObit Security 360

          IObit Security 360 is an advanced malware & spyware removal utility that detects, removes and protects your PC from various of potential spyware, adware, trojans, keyloggers, bots, worms, and hijackers. With the unique "Dual-Core" engine and the heuristic malware detection, IObit Security 360 detects the most complex and deepest spyware and malware in a very fast and efficient way. IObit Security 360 has a real-time malware protection and frequent automatic updating for prevention of zero-day security threats. IObit Security 360 can work with your Antivirus for a superior PC security.

          NB Newest version is not beta anymore (no longer beta now version 1.0)(September.2009)

          IObit Security 360

          The first thing to do before running a scan is as always to check the settings in the program.

          General settings
          Here you can choose to Minimize to system tray when progam is closed
          Your preference
          And/or to Execute at Windows startup
          Your preference

          Thank you Maxxwire

          Context Menu
          Here you can choose if you want to have "Scan with IObit Security 360" and "Unlock&Delete" available in your right click menu.

          Scan Settings
          Scan Extension
          You can choose between "Scan all files" or "Use Smart Extension" (Scanning)
          Your preference

          Scan parameters
          Scan Process priority
          You can use Low or Normal or High
          Your preference

          Max Scan file Size
          Here you can choose the max file size that is to be scanned 10/20/50/100 MB
          I haven't yet seen any change in performance by choosing any of them.
          100 MB in reality means >100 MB (unlimited)

          Quarantine files when removing them
          This option can either be ticked or unticked. By default it is ticked.

          Automatic Scan
          Here you can choose between:
          Perform computer scan at a scheduled time
          Perform computer scan when system is idle (Recommended)
          Disable automatic scan
          Your preference

          Smart scan
          Full Scan
          Custom scan
          Under custom scan you can choose to scan "System Area", "User Profile", or "My Documents" or you can choose to scan whichever disk(s) you have.
          Here you can configure your shedule(s)
          Just fill in the options

          Quarantine List
          Here you can either "Restore" or "Delete" a quarantined item.

          Ignore List
          Here you can remove (Restore) an item you have previously placed in the ignore list.
          It will be found again and you can then either let the program "clean" it (Delete it) or place it in the ignore list again by clicking ignore.

          Choose between:

          Update programs and database automatically (Recommended)

          Perform updating at a scheduled time

          Check for Updates when program starts

          Your preference

          If you choose Schedule you can configure your schedule(s) in the window that comes up.

          Here you can either tick or untick the option to have balloon tip shown.
          Your preference

          Here you can configure the proxy settings if you need them

          Take a look in enoskype's informative posts about network settings

          Network Connection speed
          Start/Control Panel/Network Connections - right click your Internet gateway and choose Status.

          Here you can choose either:

          High level
          Monitor and stop all threats. Pop up a window for each threat, asking the user to choose the actions.

          Recommended level
          Monitor and stop dangerous threats only, with few pop-ups.

          Here you can choose to:

          Enable DOG
          DOG (Digital Original Gene) is a novel heuristic malware detection algorithm, that evaluates key attributes relating to software making, distribution and advertising. Various factors are considered before determining that a program is malicious. For instance, if the program is published by a notorious vendor. The main function of DOG is to enhance detection of zero day threats.

          Enabled by default

          User Interface
          Here you can choose the Transparency level
          Your preference

          And in the box you can choose your preferred language.
          Security holes
          Security holes are possible vulnerabilities in your system.
          (e.g. if the scan finds that one of your passwords is weak it will flag it as a security hole. What parameters it uses here I do not know)
          For the time being this application can only be used in English based OS setup computers.

          Changing settings in the Opening window
          Just click the green ON and it will change to OFF or vice versa
          An example of personal settings is described by enoskype:
          In posts #2 & #5 in Recommended Scan Settings? thread.

          Description of IObit Security 360 settings will be expanded as needed and links to informative posts will be added under each section if any exists

          Glossary of some Malware Terms:

          AdSpy: Adware/Spyware, software that displays advertising or software that sends the usersí personal data to a third party without their knowledge or consent.

          Adware: Adware (or spyware) is a small program that is designed to show advertisements (in various form and degrees of intrusiveness) on your computer. It often reports personal information back to its owners. As a result your sense of privacy can be violated.

          Backdoor: A backdoor is a small malicious program that is used to gain access to a computer by bypassing the computer access security mechanisms. It gives the attacker almost unlimited rights. While it can be used to spy on a user, it is mainly used to install other malware on the system.

          BHO: Browser Helper Objects are small programs that extend the functionality of Microsoft Internet Explorer. Many toolbars shown in Internet Explorer are BHOs. Spyware and browser hijackers frequently use BHOs to integrate themselves with Internet Explorer, and to display advertisements, capture data, etc. BHOs are often installed by small ActiveX-based files.

          Browser Hijacker: Browser Hijackers are programs that attempt to alter homepage, searchpage and/or other browser settings. Some also install additional files that change these settings back on every restart (if you should try to revert to your old settings). Browser Hijackers may be installed by ActiveX controls on webpages.

          Dialer: Certain services available in the internet have to be paid for. Genuine dialers are only installed on the userís computer subject to the userís consent, which must be given via a completely unambiguous and clearly visible labeling or request. Fraudulent dialers install themselves on computers unnoticed, by dubious means or even with deceptive intent and set the computer up to dial up through their number, so as to make money from the calls.

          Dropper: A dropper is a component that has been designed to "install" some sort of malware (virus, backdoor, etc) to a target system. A few other malware files code compressed inside the dropper in such a way as to avoid detection by virus scanners. So detection of the whole dropper package is needed.

          Heuristic: A technique designed to detect malware by empirical means but without having the specific data.

          Hijacker: Hijacking is a type of network security attack in which the attacker takes control of a communication - just as an airplane hijacker takes control of a flight - between two entities and masquerades as one of them.

          Malware: A generic name for all types of malicious programs: adware, backdoors, rogues, trojans, viruses and worms.

          Misleading: The program reports false or exaggerated system security threats on the computer. The user is then prompted to pay for a full license of the application in order to remove the threats.

          PHISH: Phishing is the criminally fraudulent process of attempting to acquire information such as usernames, passwords and credit card details by masquerading as a trustworthy entity (usually: popular social web sites, auction sites, online payment processors or IT administrators) ?in an electronic communication. Phishing is typically carried out by e-mail or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.

          Rogue: A rogue program is a malicious program that is disguised, for instance, as trustworthy anti-spyware programs or registry cleaners. But these programs are only put on the market to scare you into buying these programs because they make exaggerated claims about the safety of your computer or, worse still, give erroneous scan results or put their own malware in your system.

          Rogueware: Rogueware are meaningful files which in reality can be quite malicious. The most common type of Rogueware are fake anti virus/adware/spyware progams that once installed, say you have lots of viruses/malware installed and in order for the program to remove them you must pay for the full version. In the past, these programs typically spread by advertising on other sites with banners saying things like "1023 Viruses detected on your computer! Click here to fix it now!".

          Rootkit: A rootkit is a software system that consists of a program or combination of several programs designed to hide or obscure the fact that a system has been compromised.

          Spambot: A spambot is an automated computer program designed to assist in the sending of spam.

          Spyware: Spyware is a type of malware that is installed surreptitiously on personal computers to collect information about users, their computer or browsing habits without their informed consent.

          Tracking cookies: Tracking cookie is a small string of text stored on a user's computer by a web browser. A cookie consists of one or more name-value pairs containing bits of information such as user preferences, shopping cart contents, the identifier for a server-based session, or other data used by websites.

          Trojan: A Trojan (or Trojan horse) is a small malicious program that pretends to have a particular function, but that only shows its real purpose after execution and that purpose is often destructive. Trojans cannot multiply themselves, which differentiates them from viruses and worms.

          Unwanted: The program reports false or exaggerated system security threats on the computer. The user is then prompted to pay for a full license of the application in order to remove the threats.

          Virus: A virus is a small malicious program that multiplies and is capable to attach itself to other programs after being executed. It then causes an infection and causes various degrees of damage to your computer.

          Worm: A worm is often characterized as a malicious application that will use a host machine to infect other machines. Therefore worms can create enormous damage on networks with multiple computers.

          太阳山 (solbjerg)
          Ceterum censeo Usage of IObit Products esse legendum
          (Furthermore I think that Usage of IObit Products must be read)
          Itemized subjects Table of content
          In relation to defragmentation Think about defragmentation
          Clean Install concept Clean Install
          Introduction to the Forum Forum Guidelines


          • #20

            Here we will add those subjects which doesn't fit into any other category or if there isn't room for more explanation in the post where it ought to have been.

            With all the security they have added to Windows XP SP2 and SP3 and Vista it is more necessary than ever to unblock the install file before installing.
            The best way to achieve that is to download the install file to your computer and save it in a folder called for example "Install-Program Downloads".
            You then go to the downloaded file - right click on it - choose Properties - and in the lower right-hand corner click 1 Unblock and then 2 Apply and then 3 OK.

            Then install the program. Your Operating System now knows that this program is allowed.

            The added benefit of having the "Install-Program Downloads" folder is that you always have the previous version at hand if there is something that doesn't work to your satisfaction in the newest version of the program.

            On account of missing space in the appropriate place for this description, I have placed it here too.

            -(WM)Cookies manager
            Here you can view your cookies and delete/exclude/refresh some or all of them by putting/removing a checkmark in the box
            %userprofile%\cookies in Run to view the cookie folder
            The default setting doesn't show you the cookies folder in Explorer, it can be shown by choosing to have Protected Operative System files shown - you have to untick that option in your folder settings to achieve that.
            But the command %userprofile%\cookies circumvents this.


            Shortcut Fixer

            There seems to be a problem in Vista (64) and in Windows 7 with this application.
            Thanks to Graham Newey there is now these two links to guide you


            Disk Cleaner

            Even the largest hard disk fills up at some point. With today's Internet connections and the constantly growing range of downloads, this happens more quickly than most users would like it to. IObit DiskCleaner helps you find unnecessary files and recover this space.

            Disk Cleaner can help you find unnecessary files on you computer, but you must check each category under Details to see if there are any you need before deleting them.
            They will be deleted to the Recycle bin, from where they can be restored unless your settings are instant deletion or if you run a cleaning operation that also cleans the recycle bin before having checked if everything works as it should. Be careful
            Please read about Disk Explorer too under Additional Utilities in this thread, much of the same functions and same advice applies here.

            Thanks Mentorron

            Turbo Boost
            If you click on the button shown in your Start Up window of ASC you will see this window:

            If you click Config Turbo Boost (as you always ought to do) you will see this window:

            Turbo Boost can help you optimize and speed up computer by temporarily shutting down unnecessary background processes and services, cleaning RAM, and intensifying processor performance.
            This is what it does by default (you can select what you want it to do)
            Disable application compatibility cache
            Disable Windows Update
            Disable Aero Glass effect
            Disable keyboard hotkeys
            Disable printer support
            Disable Ready Boost
            Disable scanner and DC support
            Disable scheduled tasks
            Disable viewing other computers on LAN
            Disable file sharing over the network
            Disable tablet input support
            Disable Sharing Media to other media devices
            Disable proxy auto-discovery (Windows7)

            It works much the same as GameBooster, but you have more options in Gamebooster.

            IObit Uninstaller
            In the Menu line You can choose Uninstall with the options Standard or Advanced
            The logical choice is the Advanced option (you don't need this program for the standard way)
            Forced Uninstall command means that you can choose the application you want to uninstall by inserting the address of the program/application you want to uninstall.
            Gives you the option to "Export your list of applications" - "Manage your Log files" - or "View your Restore points"
            On the left You have the options:
            All program - self-explanatory
            Toolbars - List of Toollbars that you can choose to uninstall as you wish
            Recently Installed - List of the latest programs/applications installed
            Large Programs - List of large programs on the computer (Beware! some of them are essential for the functioning of the computer)
            Rarely used - self-explanatory
            Windows Updates - List of Windows Updates (if the need should arise for uninstalling any of those)

            Performance Monitor
            Performance monitoring has been added to the possibilities in the program.
            It decides from looking at the status of the program which level the performance currently has.
            There are some "pitfalls along the way.
            First go into the settings and decide whether you want to let it start up with Windows when you open the computer.
            Next decide if you want the cleaning to to be a Deep registry cleaning (only available in the pro version)
            Next in the main window under status decide whether you want the Deep Care to be Off or On (this is done by clicking on "On" or "Off" they will then change to the opposite)
            Some have had trouble keeping the level at A
            You should realize that the application reacts to the status of both the Quick Care and the Deep Care, so if a Quick care doesn't give you an A you should try a full Deep Care.
            Sometimes though it looks as if the performance monitor has to be closed and then restarted for the application to react to the new level of cleanliness
            in the program folder you have a file called Pmonitor.exe clicking that icon will start the Pmonitor (a shortcut can be sent to the desktop)
            If you grow tired of looking at the level box on the desktop you can just right click it and choose close.

            Advice regarding the maintenance of the computer provided by Alpensopath:

            Attached Files
            太阳山 (solbjerg)
            Ceterum censeo Usage of IObit Products esse legendum
            (Furthermore I think that Usage of IObit Products must be read)
            Itemized subjects Table of content
            In relation to defragmentation Think about defragmentation
            Clean Install concept Clean Install
            Introduction to the Forum Forum Guidelines


            • #21
              Originally posted by enoskype
              Hi Admins and Mods.

              We can use this post to keep the Usage of IObit Products at the top of the section

              Hi enoskype
              You mean just bump it - and then delete completely the previous bump?

              Yes Sir, that's it.

              Now I have deleted my two post. Next bumping post can be deletable, so this post describes it all.

              Ha-ha And I have removed them completely
              Last edited by enoskype; Feb. 14th, 2010, 02:08. Reason: EDIT:
              太阳山 (solbjerg)
              Ceterum censeo Usage of IObit Products esse legendum
              (Furthermore I think that Usage of IObit Products must be read)
              Itemized subjects Table of content
              In relation to defragmentation Think about defragmentation
              Clean Install concept Clean Install
              Introduction to the Forum Forum Guidelines


              • #22
                Here is the post for the bump, and to be deleted at next bump.
                太阳山 (solbjerg)
                Ceterum censeo Usage of IObit Products esse legendum
                (Furthermore I think that Usage of IObit Products must be read)
                Itemized subjects Table of content
                In relation to defragmentation Think about defragmentation
                Clean Install concept Clean Install
                Introduction to the Forum Forum Guidelines


                • #23

                  The next bump post. What and why am I bumping as the thread is sticky and closed? Dang it... soft deleting previous bump post by
                  Solbjerg... as instructed. (the thread is over 2 1/2 years old prior to Solbjerg's now deleted post)
                  Some editing has been done from time to time without this necessarily being reflected in the dates shown
                  Everything was explained in post # 21 (a lot of deleted bumps have taken place since then)

                  Live long and prosper!

                  [EDIT] Don't understand so restoring.

                  Hi Melvin
                  Actually there was no reason to bump the thread at this time - I had already done so.
                  What would be good though is to add a description on how to use ASC6, it has a totally different interface and the use of the program is also slightly different from the previous versions. There may also be other posts that need a little updating

                  EDIT: Bumping was done to bring USAGE of IOBIT PRODUCTS thread to the top of the threads in Usage of IObit Products section and to make it seen on the Main Forum page for attracting more attention to the users to find it more easily.
                  Last edited by solbjerg; Dec. 2nd, 2012, 09:17. Reason: Suggestion!