Content.IE5

K

kaream

Re Content.IE5:

Assume a machine running XP, with 2 users: Alice & Bob.

Alice first opens My Computer, and opens the Folders tree on the left
side of the screen. She then opens Drive C: \ Documents and Settings \
Alice \ Local Settings \ Temporary Internet Files. Here she sees a lot
of cookies, but no subfolders.

Alice also opens Drive C: \ Documents and Settings \ Bob \ Local
Settings \ Temporary Internet Files. Here she sees no cookies, but
does find two folders, Content.IE5 and OLK2. Looking further, she
finds that while OLK2 is apparently empty, Content.IE5 contains roughly
20 or so subfolders, each with random 8-character alphanumeric names.
And each of these subfolders contains hundreds of files of all types:
css, gif, htc, htm, jpg, js, php, xml, etc.

Now it's Bob's turn. When he opens Documents and Settings \ Bob \
Local Settings \ Temporary Internet Files, he finds lots of cookies,
but no subfolders. Then he checks out Alice, and finds no cookies, but
he does see Alice's Content.IE5 and its subfolders, with all of Alice's
internet data files.

--------------------------------------------------------

If I've understood them correctly, some other commenters have claimed
that these are not "real" files. However, they do take up a lot of
disk space, and they can be copied to other folders for permanent
reference.

The easiest way that I've found to access your own internet data files,
again from the Folders view of My Computer, is as follows:
--rightclick Drive C:
--select Properties
--select Disk Cleanup
--highlight Temporary Internet Files
--select View Files.

This opens a new window displaying your own Content.IE5 and its
subfolders. Again, you can open a folders tree if you like, and
explore the contents of each subfolder. Individual data files can be
copied, deleted, etc.

For what it may be worth, when I was previously running Windows 2000 on
a single-user machine, Content.IE5 was not hidden from view; I could
see both the cookies in the main TIF folder, and Content.IE5 and its
subfolders and data files without having to make any sort of fancy
end-run like this.

Sorry, no email queries or replies.
 
W

Wesley Vogel

Content.IE5 is hidden and you have to know where to look to find your own
Content.IE5 folder.

Start | Run | Paste this in the box and click OK...

%homepath%\Local Settings\Temporary Internet Files\Content.IE5

Or...
Start | Run | Type: cleanmgr | OK | Highlight Temporary Internet Files |
View Files button

Or...

Start | Run | Type: %tmp% | Click OK |
You will probably have to click the Folders button on the Tool Bar.
Click: [+] Temporary Internet Files
Click: [+] Content.IE5
Click: Random named folders

--
Hope this helps. Let us know.

Wes
MS-MVP Windows Shell/User

In
 
K

kaream

From Wesley Vogel:

"Hope this helps. Let us know.

Wes
MS-MVP Windows Shell/User"

Wes, I hate to sound critical, but it's long been apparent that you
keep this same stock reply at hand, and append it to any and all
discussions of the Content.IE5 folder regardless of whether it
addresses the issues raised.

Yes, for those who may not have previously seen your suggestion
elsewhere, it undoubtedly can be helpful.

But here (as in several other threads) I have the impression that you
didn't even read the preceding posts before replying.

I would welcome your expert input here, but it would be more helpful to
the extent that it's relevant.
 
W

Wesley Vogel

What happened to Ted & Carol?

--
Hope this helps. Let us know.

Wes
MS-MVP Windows Shell/User

In
 
K

kaream

Carol has not yet made her appearance. We're a long way from needing
Ted.

quote:
Alice and Bob are conventional placeholder terms referring to common
archetypal characters used in explanations in fields such as
cryptography and physics. The names are used for convenience, since
explanations such as "Person A wants to send a message to person B"
rapidly become difficult to follow. The names are also said to be
politically correct, as they represent both genders. The concrete
motive for using such names was that it helps with writing because it
gives the personal pronouns unambiguous meanings. The specific names
were chosen to match the first letters of the alphabet.

In cryptography and computer security, there are a number of
widely-used names for the participants in discussions and presentations
about various protocols. The names are conventional, somewhat
self-suggestive, sometimes humorous, and are, more or less,
metasyntactic variables.

In typical implementations of these protocols, it is understood that
the actions attributed to characters such as Alice or Bob would not
normally be carried out by human parties directly, but rather by an
automated agent (such as a computer program) on their behalf.

List of characters
Alice and Bob. Generally Alice wants to send a message to Bob. These
names were invented by Ron Rivest for the 1978 Communications of the
ACM article presenting the RSA cryptosystem. (The 1977 technical report
on RSA did not yet use these names.) Rivest denies that these names
have any relation with the 1969 movie Bob & Carol & Ted & Alice as
occasionally suggested by others.
Carol, as a third participant in communications. Thereafter, we often
have Dave, a fourth participant, and so on alphabetically.
Eve, an eavesdropper, is a passive attacker. While she can listen in on
messages between Alice and Bob, she cannot modify them.
Isaac, an Internet Service Provider (ISP).
[etc]
 
K

kaream

From Wes, Dec 12, 11:22 am:

"Bob & Carol & Ted & Alice
http://www.imdb.com/title/tt0064100/"
From kaream, Dec 11, 10:46 pm, in quote from wikipedia:

"Rivest denies that these names have any relation with the 1969
movie Bob & Carol & Ted & Alice as occasionally suggested by others."


It always helps to read the prior posts. Is there any way we may now
start acting like grownups and return to a discussion of what can be
seen, and/or manipulated, in the TIF and Content.IE5 folders, by whom,
and how? Content.IE5 is a source of much confusion and dismay, and a
serious discussion would be helpful.
 
K

kaream

Well, perhaps I am confused. But certainly a good many other people
are as well, since new Google Groups Topics to the effect of "Help, I
can't find my Content.IE5 folder anywhere" appear with startling
frequency. I'm sure it's pointless to wonder WHY Microsoft allows
access to other users' Content.IE5 data files but not to your own, but
I'm still curious to know whether in a situation where there is a
single administrator controlling several users who do not have
administrative privileges, this glitch still holds true.
 
D

David Candy

In XP it shows you the file contents of other users TIFs. In Previous versions it did as it should and showed your TIF. Browsing to a TIF folder tells windows to start the TIF viewer.
 
K

kaream

Thanks, David. I take it you mean this occurs whether or not the user
viewing others' Content.IE5 folders and files has administrative
privileges.

What I find fascinating is that since TIF/ View Files in a Disk Cleanup
procedure opens a new window, if you jump from one window to the other,
in the first you see all the cookies, etc, in the main TIF folder but
not Content.IE5 or its subfolders, while in the new window you see ONLY
Content.IE5 with subfolders but NOT any of the many files residing in
the higher-level TIF.

And I continue to be amazed that Microsoft has set it up so that any
other user can not only see but also manipulate and potentially wreak
havoc in everyone else's internet data files, while they remain hidden
from view by their owner.
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top