On July 24, 2021 at 08:31, Ernie said...
Yep! I ended up creating this PowerShell file:
reg delete "HKEY_CURRENT_USER\Software\Universal Remote Control, Inc\Complete Control Program\Recent File List" /f
& "C:\Program Files (x86)\Universal Remote Control, Inc\Complete Control Program\ccp.exe"
exit 0
I saved it as
C:\Program Files (x86)\Universal Remote Control, Inc\Complete Control Program\ccp.ps1
and edited the start menu icon so the so the "Target" says:
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass -File "C:\Program Files (x86)\Universal Remote Control, Inc\Complete Control Program\CCP.ps1"You have to first find the icon in the Start Menu, right-click and hit "Open File Location", then right-click the Shortcut and hit "Properties".
So at least it is partially automated.
Just to add some additional info - I was able to install my 2009 edition of CCP in a Windows 7 VM on my intel Mac. Then I ran through the huge update and backed up the "URCFrame.exe" file.
I then ran the next update, which breaks the PowerShell hack. So I replaced the "URCFrame.exe" file with the previous version and the PowerShell hack works again. 👍
I imagine this method should keep most of us going for a fair while.