{"id":423,"date":"2013-04-15T02:43:34","date_gmt":"2013-04-15T06:43:34","guid":{"rendered":"http:\/\/main.jmah.net\/?p=423"},"modified":"2013-04-15T02:45:35","modified_gmt":"2013-04-15T06:45:35","slug":"temporary-internet-files","status":"publish","type":"post","link":"https:\/\/main.jmah.net\/?p=423","title":{"rendered":"Temporary Internet Files"},"content":{"rendered":"<p><a href=\"http:\/\/main.jmah.net\/wp-content\/uploads\/2013\/04\/IE.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft  wp-image-424\" alt=\"IE\" src=\"http:\/\/main.jmah.net\/wp-content\/uploads\/2013\/04\/IE.png\" width=\"213\" height=\"183\" \/><\/a>It is getting harder and harder to locate the temporary internet files for each new version of Windows and Internet Explorer. Most people know that temporary files, created while browsing the internet, are stored under some hidden folders (or specifically called \u2018Temporary Internet Files\u2019), the parent folder path will differ depending on the version of Windows\/IE.<\/p>\n<p>Even if you can find \u2018Temporary Internet Files\u2019 after turning on the settings to show hidden files and protected system files, you won\u2019t be able to see all temporary files. There are many ways to get around this but I\u2019ve found one of the simplest ways is to copy the above-mentioned folder to another location. All \u2018super hidden\u2019 folders and files will then be revealed.<\/p>\n<p>In case some files are locked by other open programs, preventing them to be copied, you may consider using some utilities such as <a href=\"http:\/\/www.runtime.org\/shadow-copy.htm\" target=\"_blank\">ShadowCopy <\/a>that will copy files even they are in use. (Note: the system at the discussion is running Windows 7 and Internet Explorer 9)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It is getting harder and harder to locate the temporary internet files for each new version of Windows and Internet Explorer. Most people know that temporary files, created while browsing the internet, are stored under some hidden folders (or specifically &hellip; <a href=\"https:\/\/main.jmah.net\/?p=423\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-423","post","type-post","status-publish","format-standard","hentry","category-research-information-technology"],"_links":{"self":[{"href":"https:\/\/main.jmah.net\/index.php?rest_route=\/wp\/v2\/posts\/423","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/main.jmah.net\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/main.jmah.net\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/main.jmah.net\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/main.jmah.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=423"}],"version-history":[{"count":4,"href":"https:\/\/main.jmah.net\/index.php?rest_route=\/wp\/v2\/posts\/423\/revisions"}],"predecessor-version":[{"id":427,"href":"https:\/\/main.jmah.net\/index.php?rest_route=\/wp\/v2\/posts\/423\/revisions\/427"}],"wp:attachment":[{"href":"https:\/\/main.jmah.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=423"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/main.jmah.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=423"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/main.jmah.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=423"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}