Assume a machine running XP, with 2 users: Alice & Bob.
Alice first opens My Computer, and opens the Folders tree on the left
side of the screen. She then opens Drive C: \ Documents and Settings \
Alice \ Local Settings \ Temporary Internet Files. Here she sees a lot
of cookies, but no subfolders.
Alice also opens Drive C: \ Documents and Settings \ Bob \ Local
Settings \ Temporary Internet Files. Here she sees no cookies, but
does find two folders, Content.IE5 and OLK2. Looking further, she
finds that while OLK2 is apparently empty, Content.IE5 contains roughly
20 or so subfolders, each with random 8-character alphanumeric names.
And each of these subfolders contains hundreds of files of all types:
css, gif, htc, htm, jpg, js, php, xml, etc.
Now it's Bob's turn. When he opens Documents and Settings \ Bob \
Local Settings \ Temporary Internet Files, he finds lots of cookies,
but no subfolders. Then he checks out Alice, and finds no cookies, but
he does see Alice's Content.IE5 and its subfolders, with all of Alice's
internet data files.
--------------------------------------------------------
If I've understood them correctly, some other commenters have claimed
that these are not "real" files. However, they do take up a lot of
disk space, and they can be copied to other folders for permanent
reference.
The easiest way that I've found to access your own internet data files,
again from the Folders view of My Computer, is as follows:
--rightclick Drive C:
--select Properties
--select Disk Cleanup
--highlight Temporary Internet Files
--select View Files.
This opens a new window displaying your own Content.IE5 and its
subfolders. Again, you can open a folders tree if you like, and
explore the contents of each subfolder. Individual data files can be
copied, deleted, etc.
For what it may be worth, when I was previously running Windows 2000 on
a single-user machine, Content.IE5 was not hidden from view; I could
see both the cookies in the main TIF folder, and Content.IE5 and its
subfolders and data files without having to make any sort of fancy
end-run like this.
Sorry, no email queries or replies.
"Drew Tognola" wrote:
> For a moment I had a flashback to my English SAT test, or was that the math
> part of the test? Only kidding of course.
> Drew
> "kaream" <kar...@nmia.com> wrote.............................................................................................................................................................................................................................
> On a two-user (Alice and Bob) machine running XP, first open My
> Computer, and open the Folders tree on the left side of the screen.
<snip>
Is there a question in all this?
--
Rock
MS MVP Windows - Shell/User
No. And I apologize for not being more clear. In reading through
quite a few threads posted concerning the Content.IE5 folder I've found
some good and useful information, and some that I thought was
incomplete, misleading, difficult to understand, involving
unnecessarily complex procedures, and/or just plain wrong. My own post
here might well be criticized for any or perhaps all of these same
problems.
I may not have looked far enough afield, but I haven't yet seen anyone
else point out that while Alice can see her own cookies but not her own
internet data files, she can see Bob's internet data files but not his
cookies -- and vice versa. Whatever Microsoft's reasoning in setting
XP up this way, it strikes me as being a serious bug.
Contrary to what some respondents seem to have asserted, internet data
files in the Content.IE5 subfolders CAN be deleted, copied, moved, run,
etc, and selectively rather than all or none. And they do consume a
considerable amount of disk space.
I can understand that some users prefer to access a hidden folder via
the Start | Run | [etc] procedure, where you must type in the action
required, but for me (and I suspect for many others) it is simpler and
more intuitive to approach this visually with Windows Explorer, where
you can simply point and click on the desired action.
Start | Run | Paste this in the box and click OK...
%homepath%\Local Settings\Temporary Internet Files\Content.IE5
Or...
Start | Run | Type: cleanmgr | OK | Highlight Temporary Internet Files |
View Files button
Or...
Start | Run | Type: %tmp% | Click OK |
You will probably have to click the Folders button on the Tool Bar.
Click: [+] Temporary Internet Files
Click: [+] Content.IE5
Click: Random named folders
--
Hope this helps. Let us know.
Wes
MS-MVP Windows Shell/User
In news:1134199080....@g47g2000cwa.googlegroups.com,
kaream <kar...@nmia.com> hunted and pecked:
"Hope this helps. Let us know.
Wes
MS-MVP Windows Shell/User"
Wes, I hate to sound critical, but it's long been apparent that you
keep this same stock reply at hand, and append it to any and all
discussions of the Content.IE5 folder regardless of whether it
addresses the issues raised.
Yes, for those who may not have previously seen your suggestion
elsewhere, it undoubtedly can be helpful.
But here (as in several other threads) I have the impression that you
didn't even read the preceding posts before replying.
I would welcome your expert input here, but it would be more helpful to
the extent that it's relevant.
--
Hope this helps. Let us know.
Wes
MS-MVP Windows Shell/User
In news:1134333745....@g44g2000cwa.googlegroups.com,
kaream <kar...@nmia.com> hunted and pecked:
>
>From Wikipedia, http://en.wikipedia.org/wiki/Alice_and_Bob:
quote:
Alice and Bob are conventional placeholder terms referring to common
archetypal characters used in explanations in fields such as
cryptography and physics. The names are used for convenience, since
explanations such as "Person A wants to send a message to person B"
rapidly become difficult to follow. The names are also said to be
politically correct, as they represent both genders. The concrete
motive for using such names was that it helps with writing because it
gives the personal pronouns unambiguous meanings. The specific names
were chosen to match the first letters of the alphabet.
In cryptography and computer security, there are a number of
widely-used names for the participants in discussions and presentations
about various protocols. The names are conventional, somewhat
self-suggestive, sometimes humorous, and are, more or less,
metasyntactic variables.
In typical implementations of these protocols, it is understood that
the actions attributed to characters such as Alice or Bob would not
normally be carried out by human parties directly, but rather by an
automated agent (such as a computer program) on their behalf.
List of characters
Alice and Bob. Generally Alice wants to send a message to Bob. These
names were invented by Ron Rivest for the 1978 Communications of the
ACM article presenting the RSA cryptosystem. (The 1977 technical report
on RSA did not yet use these names.) Rivest denies that these names
have any relation with the 1969 movie Bob & Carol & Ted & Alice as
occasionally suggested by others.
Carol, as a third participant in communications. Thereafter, we often
have Dave, a fourth participant, and so on alphabetically.
Eve, an eavesdropper, is a passive attacker. While she can listen in on
messages between Alice and Bob, she cannot modify them.
Isaac, an Internet Service Provider (ISP).
[etc]
quote:
The diagram above shows a stereotypical sequence of events that takes
place when Alice sends an e-mail to Bob.
[etc]
What I do not know is whether in a situation where a single
administrator controls many other users on separate computers, the TIF
folder, with Content.IE5 and its subfolders, behave exactly the same
way as I've described. But in reading other posts submitted by people
apparently in this position, I'm guessing that one's own Content.IE5 is
always hidden. Do non-administrators always have access to everyone
else's Content.IE5, other than their own, as I assumed?
I also assume that, as on my own system, Alice can not only see but
also has the capability of manipulating the files in Bob's Content.IE5
subfolders -- and, again, vice versa.
I presume we're all familiar with the concept of metasyntactic
variables.
--
Hope this helps. Let us know.
Wes
MS-MVP Windows Shell/User
In news:1134374234.2...@g47g2000cwa.googlegroups.com,
kaream <kar...@nmia.com> hunted and pecked:
Affirmative Spock, you've just asked it.
- Winux P
"Bob & Carol & Ted & Alice
http://www.imdb.com/title/tt0064100/"
>From kaream, Dec 11, 10:46 pm, in quote from wikipedia:
"Rivest denies that these names have any relation with the 1969
movie Bob & Carol & Ted & Alice as occasionally suggested by others."
It always helps to read the prior posts. Is there any way we may now
start acting like grownups and return to a discussion of what can be
seen, and/or manipulated, in the TIF and Content.IE5 folders, by whom,
and how? Content.IE5 is a source of much confusion and dismay, and a
serious discussion would be helpful.
--
--------------------------------------------------------------------------------------------------
Goodbye Web Diary
http://margokingston.typepad.com/harry_version_2/2005/12/thank_you_and_g.html#comments
=================================================
"kaream" <kar...@nmia.com> wrote in message news:1134422249.0...@z14g2000cwz.googlegroups.com...
--
--------------------------------------------------------------------------------------------------
Goodbye Web Diary
http://margokingston.typepad.com/harry_version_2/2005/12/thank_you_and_g.html#comments
=================================================
"kaream" <kar...@nmia.com> wrote in message news:1134430379.2...@o13g2000cwo.googlegroups.com...
What I find fascinating is that since TIF/ View Files in a Disk Cleanup
procedure opens a new window, if you jump from one window to the other,
in the first you see all the cookies, etc, in the main TIF folder but
not Content.IE5 or its subfolders, while in the new window you see ONLY
Content.IE5 with subfolders but NOT any of the many files residing in
the higher-level TIF.
And I continue to be amazed that Microsoft has set it up so that any
other user can not only see but also manipulate and potentially wreak
havoc in everyone else's internet data files, while they remain hidden
from view by their owner.