MDGx MAX Speed WinDOwS
MDGx Windows 7/7 SP1/2008 R2
Tweaks, Fixes, Guides, Downloads + Links
Win7_Tweaks
WINDOWS7.TXT is part of MDGx MAX Speed WinDOwS ©Tricks + Secrets: W95-11D.EXE + W95-11D.ZIP
MDGx Windows 7/7 SP1/2008 R2 Tweaks, Fixes, Guides, Downloads + Links in plain text (ASCII) format
MDGx Windows 7/7 SP1/2008 R2 Tweaks, Fixes, Guides, Downloads + Links in PDF format

 HTML [this page]  TXT  PDF 

Translate this into your language

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@

            MDGx MAX Speed WinDOwS ©Tricks • Secrets • Bugs • Fixes
            ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯http://www.mdgx.com/¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
                             ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
	Windows 7/7 SP1/2008 R2 Tweaks, Fixes, Guides, Downloads + Links
	¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯



These topics refer strictly to all English retail/final/gamma/Gold/RTM/OEM
releases, versions, editions + builds [including previews, Service Packs
(SPs), updates + patches] 32-bit (x86) + 64-bit (x64) of these Microsoft
Windows operating systems (OSes)
- 7
http://en.wikipedia.org/wiki/Windows_7
http://en.wikipedia.org/wiki/Windows_7_editions
- Server 2008 R2
http://en.wikipedia.org/wiki/Windows_Server_2008_R2
unless specified otherwise:
http://www.mdgx.com/7.php
Also available as plain text/ASCII file (this file):
http://www.mdgx.com/WINDOWS7.TXT
Also available as PDF (Portable Document Format) document:
http://www.mdgx.com/WINDOWS7.pdf
Translate this file into your language: top right side -> click/touch down
arrow to expand drop down menu -> select desired language:
http://translate.google.com/?sl=en&tl=en&text=http%3A%2F%2Fwww.mdgx.com%2FWINDOWS7.TXT

BONUS:
More Windows 7/7 SP1 (clearly marked) tweaks, hacks, fixes, guides, links + tools (all included):
- MDGx "Win10 Block Tools (10_BLOCK)" in 10_BLOCK.TXT:
http://www.mdgx.com/xptoy.htm#10BLK
http://www.mdgx.com/10BLK/10_BLOCK.php
http://www.mdgx.com/10BLK/10_BLOCK.TXT
- MDGx "Windows 10/11 Tweaks, Fixes, Guides, Downloads + Links" in WIN10.TXT:
http://www.mdgx.com/10.php
http://www.mdgx.com/WIN10.TXT
- MDGx "Windows 8/8.1 Tweaks, Fixes, Guides, Downloads + Links" in WINDOWS8.TXT:
http://www.mdgx.com/8.php
http://www.mdgx.com/WINDOWS8.TXT
- MDGx "List of Useful Windows NTx Tools [free(ware)]" in TOOLS.TXT:
http://www.mdgx.com/tools.php
http://www.mdgx.com/TOOLS.TXT

FYI:
Windows NTx (based on Windows NT) = Windows NT4/2000/XP/2003/Vista/2008/7/8/8.1/2012/10/2016/2019/11/2022/newer
http://en.wikipedia.org/wiki/Windows_NT
Windows 9x (based on Windows 95) = Windows 95/95 OSR1/95 OSR2.x/98/98 SP1/98 SE(U)/ME
http://en.wikipedia.org/wiki/Windows_9x

    @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
    @@ ALWAYS BACKUP ALL YOUR OPERATING SYSTEM DRIVES TO A SAFE LOCATION @@
    @@          BEFORE ATTEMPTING TO MAKE ANY SYSTEM CHANGES !           @@
    @@     -> "Free(ware) WinDOwS Backup + Restore Tools" section in     @@
    @@                      SECRETS.TXT (included):                      @@
    @@               http://www.mdgx.com/secrets.htm#BKP                 @@
    @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@

WARNING: * Take EXTREME CAUTION when modifying/adjusting/customizing your
	 Registry/System/Startup files/configuration/settings!
	 Faulty changes may result in crashes/lockups/permanent data loss, or
	 might lead to having you REINSTALL your Operating System(s)!
	 YOU are the ONLY one responsible for ANY changes YOU make!
	 ALWAYS HAVE YOUR MOST RECENT SYSTEM BACKUP READY! ->
	 "Free(ware) WinDOwS Backup + Restore Tools" in SECRETS.TXT
	 (included):
	 http://www.mdgx.com/secrets.htm#BKP
	 * BACKUP YOUR REGISTRY BEFORE MAKING ANY CHANGES! -> "BACKUP/EXPORT +
	 RESTORE/IMPORT REGISTRY/REGISTRY KEY(S)" in WINDOWS7.TXT (this file):
 	 http://www.mdgx.com/7.php#:~:text=BACKUP%2FEXPORT%20%2B%20RESTORE%2FIMPORT%20REGISTRY%2FREGISTRY%20KEY%28S%29%20%21
	 * Some of these tricks + apps/programs/tools/scripts require
	 adequate/advanced knowledge about critical computing, operating
	 systems (OSes), registry, services, shared environments, networks,
	 cybersecurity, and other related subjects/disciplines:
	 http://en.wikipedia.org/wiki/Category:Microsoft_operating_systems
	 http://en.wikipedia.org/wiki/Windows_Registry
	 http://www.mdgx.com/reg.htm
	 http://en.wikipedia.org/wiki/Category:Windows_services
	 http://en.wikipedia.org/wiki/Real-time_computing
	 http://en.wikipedia.org/wiki/Enterprise_software
	 http://en.wikipedia.org/wiki/Shared_resource
	 http://en.wikipedia.org/wiki/Computer_network
	 http://en.wikipedia.org/wiki/Computer_security
	 http://en.wikipedia.org/wiki/Network_security

NOTES:	- These ©Tricks + Secrets have been tested on many computers, but with
	  NO guarantee they should also work for you.
	- Some of these tips I stumbled upon while browsing the Internet or
	  while helping others with WinDOwS problems, some were kindly sent in
	  by concerned readers (all authors/contributors are acknowledged and
	  reliable sources given proper credit), and some I discovered on my
	  own. Enjoy the ride.
	- Contributed tips (clearly marked) and other web sites mentioned here
	  do not necessarily reflect the opinion of the author + owner of
	  these files + of this web site.

IMPORTANT:
**********
http://www.mdgx.com/importnt.php
* Some of these files are archived in ZIP
[http://en.wikipedia.org/wiki/Zip_%28file_format%29], RAR
[http://en.wikipedia.org/wiki/RAR_%28file_format%29], 7Z
[http://en.wikipedia.org/wiki/7z] or CAB
[http://en.wikipedia.org/wiki/Cabinet_%28file_format%29] format. You need a
file decompression (unZIPping/unARChiving/unRARing) tool to extract their
contents. I recommend [free(ware)]:
- Windows 9x/NTx users: File Shrinkers 32-bit + 64-bit:
http://www.mdgx.com/toy.htm#ZIP
- Windows/WfWG 3.1x users: Info-ZIP WiZ 16-bit:
http://www.info-zip.org/WiZ.html#Win16
- DOS/MS-DOS/FreeDOS/DR-DOS/OpenDOS users: DOS ZIP/unZIP 16-bit tools:
http://www.mdgx.com/dos.htm#ZIP
* STAY SAFE -> Scan for viruses *all* files downloaded from the Internet:
http://www.mdgx.com/vir.htm
and *beware* of false positives (included):
http://www.mdgx.com/fp.php
http://www.mdgx.com/FALSPOSI.TXT
* Target Operating System(s)/software/hardware REQUIRED for installing
upgrades/patches/fixes/drivers!
* Installing Windows OS components/upgrades/patches/fixes/drivers/tools may
require you to be logged on with Administrative/Power User/Sysadmin
privileges.
* Windows Vista/newer users: right-click each file and select "Run as
Administrator" (temporary fix) or disable User Account Control (UAC)
(permanent fix) in:
- Windows 10/2016/2019/11/2022:
http://www.tenforums.com/tutorials/3577-user-account-control-uac-change-settings-windows-10-a.html
- Windows 8/2012/8.1/2012 R2:
http://www.eightforums.com/tutorials/5509-user-account-control-uac-change-settings-windows-8-a.html
- Windows 7/2008 R2:
http://www.petri.com/disable-uac-in-windows-7/
- Windows Vista/2008:
http://www.petri.com/disable_uac_in_windows_vista/
User Account Control (UAC) tweaking tools [free(ware)]:
- UAC Pass:
http://sites.google.com/site/freeavvarea/uac-pass/uac-pass/
- TweakUAC:
http://www.winability.com/tweak-uac/
- Disable UAC:
http://www.majorgeeks.com/files/details/disable_uac.html
FYI:
MDGx Tweaked + Customized File Manager (FM) installer FMNT32.EXE (free):
http://www.mdgx.com/xptoy.htm#FMNT
also installs "Disable User Account Control (UAC)" + "Enable User Account
Control (UAC)" items to Desktop right-click shell context menu.
* NEWest at the top -> OLDest at the bottom.
* Items labeled as "discontinued!": obsolete, unmaintained +/- abandoned.
* Most all software featured here is free(ware):
- Freeware:
http://en.wikipedia.org/wiki/Freeware
- Free:
http://en.wikipedia.org/wiki/Free_software
- Open Source:
http://en.wikipedia.org/wiki/Open-source_software
* I do not recommend any crippled/demo/limited/shareware/trialware/retail
software, except the few essentials on my *MUST HAVE* list:
http://www.mdgx.com/toy.htm
and only if I could not find any free(ware) alternative.
* Most unofficial Windows OSes (Hot)Fixes, Packs + Updates created using
official Microsoft IEAK {INF [http://www.mdgx.com/add.htm#INF] + SED
[http://www.mdgx.com/INF_web/cdfinfo.htm]} installer toolkit (free):
http://www.mdgx.com/add.htm#IEA
* Check back often for NEW tools + UPDATEs.
* FYI:
Certain MDGx.com [http://www.mdgx.com/] ancient/old(er),
deprecated/discontinued/obsolete/unneeded, deleted/moved/renamed web pages,
documents, files, directories/folders are most likely to have been
archived/saved for posterity by these entities, and may still be available for
free (gratis):
- Internet Archive (WayBack Machine) [2003 - 2023]:
http://web.archive.org/web/*/http://www.mdgx.com/
- archive.today (Webpage Capture) [2014 - 2022]:
http://archive.is/http://www.mdgx.com/
* MDGx.com archived/saved directories/folders + all their files:
- /files/ -> from 2021:
http://web.archive.org/web/20210506185314/http://www.mdgx.com/files/
- /spx/ -> from 2019:
http://web.archive.org/web/20210506152359/http://www.mdgx.com/spx/list.php
- /sbdrv/ -> from 2021:
http://www.mdgx.com/sbdrv/
* Please let me know if you discover any broken links:
http://www.mdgx.com/form.htm
* Thank you for your time and patience. ;-/
* Enjoy. ;-)

Please send me feedback online:
http://www.mdgx.com/form.htm
Thanks. ;-/

Must have + useful Windows NTx Software Programs [99.99% free(ware)] from TOOLS.TXT (included):
http://www.mdgx.com/tools.php
http://www.mdgx.com/TOOLS.TXT
Must have + useful Software Programs [99.99% free(ware)] from SOFTWARE.TXT (included):
- MDGx Windows NTx Extras:
http://www.mdgx.com/xptoy.htm
- MDGx 1000+ Windows NTx Power Toys + Tweaking Tools:
http://www.mdgx.com/toy.htm
- MDGx Windows NTx Web Browsers + Internet Power Toys:
http://www.mdgx.com/nettoys.htm


WINDOWS7.TXT Contents: [New ©tweaks added at the TOP]

BACKUP/EXPORT + RESTORE/IMPORT REGISTRY/REGISTRY KEY(S)
http://www.mdgx.com/7.php#:~:text=BACKUP%2FEXPORT%20%2B%20RESTORE%2FIMPORT%20REGISTRY%2FREGISTRY%20KEY%28S%29%20%21
Tweaks, Hacks + Fixes... UNconventional, UNdocumented, UNcensored ;-/
Updates/(Hot)Fixes/Patches + Windows Update (WU)
Turn OFF/Remove Windows 7/8/8.1 Adware, Spyware, Security Flaws + Repair/Restore Privacy
Turn OFF/Remove Windows 10 Adware, Spyware, Security Flaws + Repair/Restore Privacy -> WIN10.TXT (included):
http://www.mdgx.com/10.php
Everything About The Infamous (Not So) Trusted Installer
Task Scheduler Tweaks
Patch Windows 7
Customize BOOT Screens
Desktop Background/Wallpaper Tweaks + Free(ware) Tools
Free(ware) 7/8/8.1/10/11 Aero Tools + Tweaks
Free(ware) Windows 7 Replacement Apps + Tweaking Tools
Free(ware) Start Menu Shell Replacements
Turn OFF/ON User Account Control (UAC)
Free(ware) BOOT Tools + Tweaks
Windows Side-by-Side (WinSxS) Folder
Free(ware) Burn/Copy/Write/Install CDs/DVDs/BDs/USB Tools
OEM
Application (IN)Compatibility
Control Panel (CP) + Omnipotent/Master/Mega/'god mode' (OMg) Control Panel
Public Root DNS Servers
http://www.mdgx.com/7.php#:~:text=Public%20Root%20DNS%20Servers%20%5B%2A%5D
Internet + Web Browsers Tweaks, Fixes + Tools
http://www.mdgx.com/7.php#:~:text=Internet%20%2B%20Web%20Browsers%20Tweaks%2C%20Fixes%20%2B%20Tools%20%5BChromium%2FChrome%2C%20Firefox
Digital + Internet/Online Privacy, Safety + Security
http://www.mdgx.com/7.php#:~:text=Digital%20%2B%20Internet%2FOnline%20Privacy%2C%20Safety%20%2B%20Security%20%3D%20Your%20Top%20Priority
Chromium/Chrome/X-Chromium/Thorium/Brave/Vivaldi/Supermium Automated Clean-Up
Put A Pin In It!
XP -> 7/8/8.1 Easy Transfer Files + Settings
Turn OFF/ON Windows Features
Tweak Windows 7/7 SP1 Services
Turn OFF Action/Security Center + Notifications/Messages
Logon + Password Tweaks
Clock Sync
Turn OFF/ON Link Layer Topology Discovery (LLTD) + Quality of Service (QoS)
CMD, Commands, Environment + Console
Paging (Swap) File Tweaks
Windows (Defender) Firewall (WF) Tweaks + Tools
Turn OFF NVidia Telemetry
Java No Java
Save Files List -> Text
Maximize Your Internet/Network Traffic Speed = MTU
Windows 7/newer Reference, Resources + Free eBooks + Documentation
Free(ware), Open Source + Portable Software + Games @ MDGx.com
Tweak Windows 10/11 Services -> WIN10.TXT (included):
http://www.mdgx.com/10.php
Advanced Appearance (Metrics) Settings [AA(M)S] for Windows 7/newer -> WINDOWS8.TXT (included):
http://www.mdgx.com/8.php
Tweak, Customize + Repair Tools on the Internet [free(ware)] -> WIN10.TXT (included):
http://www.mdgx.com/10.php
Essential Add-ons, Components, Fixes, Updates, Tools + Games [free(ware)] -> WIN10.TXT (included):
http://www.mdgx.com/10.php
exFAT -> SECRETS.TXT (included):
http://www.mdgx.com/secrets.htm#XFAT

See also matching/related Windows NTx tweaks in WIN10.TXT, WINDOWS8.TXT,
DESKTOP.TXT, MYTIPS95.TXT, REGISTRY.TXT, TIPS2000.TXT, TIPS95.TXT, TIPSXP.TXT
(all included):
http://www.mdgx.com/newtip.htm
______________________________________________________________________________



BACKUP/EXPORT + RESTORE/IMPORT REGISTRY/REGISTRY KEY(S) !
http://www.mdgx.com/7.php#:~:text=BACKUP%2FEXPORT%20%2B%20RESTORE%2FIMPORT%20REGISTRY%2FREGISTRY%20KEY%28S%29%20%21



* Backup/Export/Save + Restore/Import/Load/Merge the entire Registry + separate Registry (hive) keys in Windows NTx
[2000/newer] 32-bit (x86) + 64-bit (x64) Operating Systems (OSes):
http://support.microsoft.com/help/322756/
http://neosmart.net/wiki/backup-restore-registry/
http://www.howtogeek.com/197785/how-to-backup-and-restore-the-windows-registry/
http://blog.netwrix.com/2018/10/30/how-to-back-up-and-restore-the-windows-registry/
http://www.winhelponline.com/blog/automatically-backup-registry-hives-windows-10/
http://www.minitool.com/data-recovery/backup-and-restore-registry.html
http://www.majorgeeks.com/content/page/how_to_back_up_or_restore_the_windows_registry.html
http://www.windowscentral.com/how-backup-entire-registry-windows-10/
http://theitbros.com/restore-windows-10-registry-from-backup-or-restore-point/
http://www.techbout.com/backup-registry-in-windows-10-47923/
Registry hive keys (hives):
http://learn.microsoft.com/windows/win32/sysinfo/registry-hives/
http://en.wikipedia.org/wiki/Windows_Registry#Keys_and_values
http://www.mdgx.com/reg.htm#RTS
1. From the graphical user interface (GUI) or from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE] using RegEdit
(%WinDir%\REGEDIT.EXE):
http://www.mdgx.com/reg.htm#RER
http://www.ss64.com/nt/regedit.html
[%WinDir% = usually C:\WINDOWS].
A. Backup/Export/Save entire Registry manually:
- From a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator ->
run this command -> press Enter (example):
REGEDIT.EXE /E REGISTRY.reg
- Right-click RegEdit (%WinDir%\REGEDIT.EXE) or its shortcut/link -> Run as Administrator -> make sure it points to
"Computer" [root, entire registry] -> click File -> click Export... -> under Export Registry File -> select the folder of
your choice -> type your choice of "File name:" (example: REGISTRY.reg) -> click Save -> exit RegEdit.
B. Restore/Import/Load/Merge entire Registry manually:
- From a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator ->
run this command -> press Enter (example using saved reg file above):
REGEDIT.EXE /S REGISTRY.reg
- Right-click RegEdit (%WinDir%\REGEDIT.EXE) or its shortcut/link -> Run as Administrator -> make sure it points to
"Computer" [root, entire registry] -> click File -> click Import... -> under Import Registry File -> select the folder where
your backed up .REG file(s) reside(s) -> highlight/select your backed up Registry (.HIV, .REG, etc) file(s) (in this
example: REGISTRY.reg) -> click Open separately for each file (if more than 1) -> click OK or press Enter -> exit RegEdit.
2. From a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE] using REG (%WinDir%\SYSTEM32\REG.EXE) command line tool:
http://www.mdgx.com/reg.htm#BNR
http://learn.microsoft.com/windows-server/administration/windows-commands/reg/
http://www.ss64.com/nt/reg.html
A. Backup/Export/Save separate Registry (hive) key(s) manually: right-click CMD shortcut/CMD.EXE -> Run as Administrator ->
run these commands -> press Enter after each line (example):
REG.EXE EXPORT "HKCR" HKCR.reg /y
REG.EXE EXPORT "HKCU" HKCU.reg /y
REG.EXE EXPORT "HKLM" HKLM.reg /y
REG.EXE EXPORT "HKU" HKU.reg /y
REG.EXE EXPORT "HKCC" HKCC.reg /y
Where
http://www.mdgx.com/reg.htm#RTS
HKCR = Classes Root Hive Key:
HKEY_CLASSES_ROOT
HKCU = Current User Hive Key:
HKEY_CURRENT_USER
HKLM = Local Machine Hive Key:
HKEY_LOCAL_MACHINE
HKU = Users Hive Key:
HKEY_USERS\.DEFAULT
HKCC = Current Configuration Hive Key:
HKEY_CURRENT_CONFIG
On 64-bit (x64) Windows NTx OSes these commands backup also the correspondent 64-bit registry hive keys (example): the
HKEY_LOCAL_MACHINE\SOFTWARE subkey is linked to the HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node subkey.
More info:
- MS DOCs: Registry Keys Affected by WoW64 on Windows 64-bit (x64) editions:
http://msdn.microsoft.com/library/aa384253.aspx
- Advanced INSTALLER: Wow6432Node Registry Key:
http://www.advancedinstaller.com/user-guide/registry-wow6432-node.html
- MDGx "Registry Structure" section in REGISTRY.TXT (included):
http://www.mdgx.com/reg.htm#RTS
B. Restore/Import/Load/Merge separate Registry (hive) key(s) manually (example using saved reg files above): locate saved
reg files [see above] -> right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run these commands -> press Enter after
each line (example):
REG.EXE IMPORT HKCR.reg /y
REG.EXE IMPORT HKCU.reg /y
REG.EXE IMPORT HKLM.reg /y
REG.EXE IMPORT HKU.reg /y
REG.EXE IMPORT HKCC.reg /y
Where
http://www.mdgx.com/reg.htm#RTS
HKCR = Classes Root Hive Key:
HKEY_CLASSES_ROOT
HKCU = Current User Hive Key:
HKEY_CURRENT_USER
HKLM = Local Machine Hive Key:
HKEY_LOCAL_MACHINE
HKU = Users Hive Key:
HKEY_USERS\.DEFAULT
HKCC = Current Configuration Hive Key:
HKEY_CURRENT_CONFIG
3. Using 3rd party Registry Backup/Restore tools [free(ware)]:
http://www.mdgx.com/toy.htm#FIX
http://www.raymond.cc/blog/backup-restore-whole-windows-registry-selected-hives/
http://www.tweaking.com/content/page/registry_backup.html
http://www.majorgeeks.com/mg/sortdate/registry.html
http://listoffreeware.com/list-of-best-free-registry-backup-software/
http://www.winhelponline.com/blog/automatically-backup-registry-hives-windows-10/
http://www.tweaking.com/content/page/registry_backup.html

* Windows Registry info, guides + tools [free(ware)]:
- MDGx "The Registry" chapter -> "Backup, Edit + Restore the Registry in Windows NTx OSes" topic -> "REG:" paragraph in
REGISTRY.TXT (included):
http://www.mdgx.com/reg.htm#BNR
- MDGx "Registry Editing Rules" section -> "Registry Editing Rules + RegEdit (REGEDIT.EXE) Guide" topic -> in REGISTRY.TXT
(included):
http://www.mdgx.com/reg.htm#RER
- MDGx "Free(ware) 9x/NTx System + Registry Fixers" section -> "Windows Registry Backup, Restore + Tweaking tools
[free(ware)]" topic in SOFTWARE.TXT (included):
http://www.mdgx.com/toy.htm#FIX
______________________________________________________________________________



Tweaks, Hacks + Fixes... UNconventional, UNdocumented, UNcensored ;-/



* FIX: Block/disable/stop/turn OFF Windows 7/newer + Windows Server 2008/newer LSASS (Local Security Authority Subsystem
Service) plain text/ASCII credentials/passwords exposure security vulnerability used by Mimikatz + similar hacking methods:
http://woshub.com/defending-windows-domain-against-mimikatz-attacks/
http://seniordba.wordpress.com/2021/04/12/defending-against-mimikatz-in-windows-10/
http://www.reliaquest.com/blog/credential-dumping-part-2-how-to-mitigate-windows-credential-stealing/
http://learn.microsoft.com/windows-server/security/credentials-protection-and-management/configuring-additional-lsa-protection/
http://admx.help/?Category=SecurityBaseline&Policy=Microsoft.Policies.PtH::Pol_PtH_WDigestAuthn
http://www.stigviewer.com/stig/windows_7/2016-12-19/finding/V-72753
http://en.wikipedia.org/wiki/Local_Security_Authority_Subsystem_Service
CAUTION:
********
This requires adequate/advanced knowledge about critical computing, operating systems, shared environments, networks,
cybersecurity.
http://www.mdgx.com/importnt.php
Recommended for multiuser/networked/enterprise/shared/server environments processing/storing/delivering
encrypted/protected/secure critical/private/sensitive/vital analysis/data/information.
Modifying settings below may affect proper operation of connected/networked computers/devices/servers,
components/features/functions, and/or your multiuser/networked/enterprise/shared/server environment(s) may experience
errors.
UPDATES:
********
MSKB KB3134228 MS16-014 Security Update 32-bit + 64-bit for Windows 7 SP1/2008 R2/8/8.1/2012/2012 R2/10/2016 32-bit (x86) +
64-bit (x64):
http://support.microsoft.com/help/3134228/
MSKB KB3134228 MS16-014 Security Advisory:
http://learn.microsoft.com/security-updates/securitybulletins/2016/ms16-014/
MSKB KB2871997 Security Update 32-bit + 64-bit for Windows 7 SP1/2008 R2/8/8.1/2012/2012 R2 32-bit (x86) + 64-bit (x64):
http://support.microsoft.com/help/2871997/
Microsoft Catalog Files for KB2871997 Update:
http://www.catalog.update.microsoft.com/search.aspx?q=KB2871997
MSKB KB2871997 Security Advisory:
http://learn.microsoft.com/security-updates/SecurityAdvisories/2016/2871997/
FIXES:
******
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa]
"RunAsPPL"=dword:1
"TokenLeakDetectDelaySecs"=dword:1e
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\WDigest]
"Negotiate"=dword:0
"UseLogonCredential"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa]
"RunAsPPL"=dword:1
"TokenLeakDetectDelaySecs"=dword:1e
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\SecurityProviders\WDigest]
"Negotiate"=dword:0
"UseLogonCredential"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Control\Lsa]
"RunAsPPL"=dword:1
"TokenLeakDetectDelaySecs"=dword:1e
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Control\SecurityProviders\WDigest]
"Negotiate"=dword:0
"UseLogonCredential"=dword:0
;
------End cut & paste here------
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text BATch (.bat) or CoMmanD (.cmd) script file containing the lines between Cut & Paste delimiters below
-> save it as plain text/ASCII file (Encode: -> ANSI) with the BAT (.bat) or CMD (.cmd) extension -> right-click it ->
Run as Administrator -> wait for completion.
-----Begin cut & paste here-----
@ECHO OFF
IF NOT "%OS%"=="Windows_NT" GOTO END
REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Control\Lsa" /v RunAsPPL /t REG_DWORD /d 1 /f
REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Control\Lsa" /v TokenLeakDetectDelaySecs /t REG_DWORD /d 1e /f
REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\WDigest" /v Negotiate /t REG_DWORD /d 0 /f
REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\WDigest" /v UseLogonCredential /t REG_DWORD /d 0 /f
REG.EXE ADD "HKLM\SYSTEM\ControlSet001\Control\Lsa" /v RunAsPPL /t REG_DWORD /d 1 /f
REG.EXE ADD "HKLM\SYSTEM\ControlSet001\Control\Lsa" /v TokenLeakDetectDelaySecs /t REG_DWORD /d 1e /f
REG.EXE ADD "HKLM\SYSTEM\ControlSet001\Control\SecurityProviders\WDigest" /v Negotiate /t REG_DWORD /d 0 /f
REG.EXE ADD "HKLM\SYSTEM\ControlSet001\Control\SecurityProviders\WDigest" /v UseLogonCredential /t REG_DWORD /d 0 /f
REG.EXE ADD "HKLM\SYSTEM\ControlSet002\Control\Lsa" /v RunAsPPL /t REG_DWORD /d 1 /f
REG.EXE ADD "HKLM\SYSTEM\ControlSet002\Control\Lsa" /v TokenLeakDetectDelaySecs /t REG_DWORD /d 1e /f
REG.EXE ADD "HKLM\SYSTEM\ControlSet002\Control\SecurityProviders\WDigest" /v Negotiate /t REG_DWORD /d 0 /f
REG.EXE ADD "HKLM\SYSTEM\ControlSet002\Control\SecurityProviders\WDigest" /v UseLogonCredential /t REG_DWORD /d 0 /f
:END
EXIT
------End cut & paste here------

* FIX: Windows 7/7 SP1 BypassESU Patch allows installing ESU (Extended Security Updates) [German]:
http://www.deskmodder.de/blog/2019/12/07/windows-7-erweiterte-sicherheitsupdates-esu-erhalten-wird-moeglich-sein/
Translated into English [by Google]:
https://www-deskmodder-de.translate.goog/blog/2019/12/07/windows-7-erweiterte-sicherheitsupdates-esu-erhalten-wird-moeglich-sein/?_x_tr_sl=de&_x_tr_tl=en
BypassESU:
http://github.com/arturolegovich/BypassESU-v9-AIO/
File:
http://gitlab.com/stdout12/adns/uploads/b5ad06702413b6bf6b1d5a1db8b086d4/BypassESU-v11.7z
BypassESU Guide:
http://trackerninja.codeberg.page/post/windows-7-esu-extended-security-updates/
BypassESU Guide [French, translation not allowed :-(]:
http://lecrabeinfo.net/windows-7-recevoir-les-mises-a-jour-de-securite-jusquen-2023.html
Windows 7 ESU Patching:
http://hackandpwn.com/windows-7-esu-patching/
Windows 7 ESU Bypass:
http://www.ghacks.net/2020/02/13/it-appears-that-the-windows-7-esu-bypass-is-indeed-working/
Bypass Windows 7 Extended Security Updates Eligibility:
http://forums-mydigitallife-net.translate.goog/threads/bypass-windows-7-extended-security-updates-eligibility.80606/
Windows 7 ESU (Extended Security Updates) FAQ:
http://learn.microsoft.com/troubleshoot/windows-client/windows-7-eos-faq/windows-7-extended-security-updates-faq/

* Fix Windows 7 Shut Down Bug:
http://www.lifehacker.com/1841581231/
http://esupport.quickheal.com/support/solutions/articles/23000020281/

* Fix Windows 7 Wallpaper Display Bug:
http://www.winaero.com/blog/microsoft-fixes-black-wallpaper-windows-7-bug-with-kb4539602/
http://www.lifehacker.com/1841274851/
FIX: Wallpaper set to Stretch is displayed as black:
http://support.microsoft.com/help/4539602/
created by Microsoft...
BUG: Windows 7 January 14 2020 Monthly Rollup:
http://support.microsoft.com/help/4534310/

* Fix Windows 7 Slow/Stuck "Checking for Updates" Bug:
http://www.reddit.com/r/windows/comments/4tx4s9/

* Migrate Windows 7 to a new SSD (SATA)/NVMe (PCIe) drive without reinstalling:
http://www.lifehacker.com/5837543/
MDGx "Free(ware) WinDOwS Backup + Restore Tools" section in SECRETS.TXT (included):
http://www.mdgx.com/secrets.htm#BKP

* Speed Up Windows Shutdown Process:
http://www.addictivetips.com/windows-tips/how-to-speed-up-windows-shutdown-process/

* Control How Long Windows Waits Before Killing Apps at Shutdown:
http://www.howtogeek.com/282062/control-how-long-windows-waits-before-killing-apps-at-shutdown/

* Always show full details in Explorer Copy/Move/Delete dialog box:
http://www.askvg.com/how-to-always-show-more-details-in-file-transfer-cut-copy-delete-dialog-box-in-windows-vista-and-7/
Install Open-Shell [Classic Shell fork] 32-bit + 64-bit Start Menu + button/icon/logo/orb, Explorer + IE enhancer, replacer,
supports custom skins, buttons/logos, highly customizable (free, open source):
http://open-shell.github.io/Open-Shell-Menu/
Open-Shell -> enable Open (Classic) Explorer Bar -> Classic Explorer Settings button -> File Operation tab -> enable Always
show more details -> Apply/OK.

* (Un)Hide/(re)assign/remove/(un)mount drive(s)/partition(s)/volume(s) in Windows 7/newer:
http://www.isumsoft.com/windows-10/hide-or-unhide-hard-disk-partition-in-windows-10.html
http://www.windowscentral.com/how-hide-entire-drive-prying-eyes-windows-10/

* Windows Registry keys involved in, linked to, and affected by WoW64 (Windows 32-bit on Windows 64-bit) 64-bit (x64) in
Windows NTx 64-bit (x64) OSes:
http://msdn.microsoft.com/library/aa384253.aspx
http://en.wikipedia.org/wiki/WoW64
WoW64 symbolic links (Wow6432Node):
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Classes
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\AppId
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppId
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\PROTOCOLS
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\PROTOCOLS
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Typelib
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Typelib
See MDGx "Registry Structure" chapter in REGISTRY.TXT (included) for more details:
http://www.mdgx.com/reg.htm#RTS

* Add/customize/substitute System, Dialog, Menus, Window, Icons, Taskbar + DOS Console (Command Prompt) Fonts (.fon, .ttf,
.otf) + tweak DPI (Dots Per Inch) Scaling to other than default [100%] in Windows 7/newer:
http://www.superuser.com/questions/163430/#1131693
Customize Windows 7 Font Face/Size + Taskbar Icons Size:
http://www.wikihow.com/Customize-the-Size-of-the-Windows-7-Taskbar-Icons/
http://blogs.msdn.microsoft.com/developingfordynamicsgp/2009/12/01/more-on-windows-7-bitmap-fonts-and-dpi-settings/
http://www.tenforums.com/tutorials/70839-change-menus-text-size-windows-10-a.html
Change Default System Fonts:
http://answers.microsoft.com/en-us/windows/forum/windows_7-desktop/how-to-change-system-default-font-in-all-parts/dfce15db-7337-420a-a42e-517521a8502e/
Change Dialog Boxes + Buttons Fonts:
http://www.sevenforums.com/tutorials/1175-fonts-change.html
Add Custom Fonts to DOS Console (Command Prompt):
http://www.thewindowsclub.com/add-custom-fonts-to-command-prompt/
Substitute any font with any other font:
http://social.technet.microsoft.com/forums/windows/en-us/12b37082-c4e6-4beb-9bfb-7b992ebc2a1a/
http://answers.microsoft.com/en-us/windows/forum/all/windows-10-taskbar-clock-broken-change-windows/3462b7b6-03fb-4e97-9b2d-430b09867248/
http://gist.github.com/jcherven/42b84294248674c29eb50cb711114315/
Use also [limited options :-(] Windows built-in Display Font Size and DPI tool [DpiScaling.exe] located in the
%WinDir%\SYSTEM32 directory/folder [%WinDir% = usually C:\WINDOWS].
View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]:
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command
PATH
-> press Enter.
See also "* Advanced Appearance (Metrics) Settings [AA(M)S] for Windows 7/newer:" section in WINDOWS8.TXT (included):
http://www.mdgx.com/8.php
http://www.mdgx.com/WINDOWS8.TXT
Right-click on improved WIN8_AAS.HTA (included, further customized) HTML Application (.HTA) file [right-click to save!]:
http://www.mdgx.com/WIN8_AAS.HTA
-> Run as Administrator [will open by default in Internet Explorer (IE) web browser] -> tweak to your heart content. ;-/
HTML Application (HTA):
http://en.wikipedia.org/wiki/HTML_Application
Change System Font using Winaero Tweaker (freeware) + Windows built-in Registry Editor [RegEdit.exe]:
http://www.winaero.com/change-system-font-windows-10/
Winaero Tweaker 32-bit + 64-bit for Windows 7/8/8.1/10/11 [select Portable at install time!]:
http://www.winaero.com/winaero-tweaker/
Download:
http://www.winaero.com/download-winaero-tweaker/
Winaero Tweaker Features:
http://www.winaero.com/the-list-of-winaero-tweaker-features/
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Fonts]
"Courier 10,12,15"="COURF.FON"
"MS Serif 8,10,12,14,18,24"="SERIFF.FON"
"MS Sans Serif 8,10,12,14,18,24"="SSERIFF.FON"
"Small Fonts"="SMALLF.FON"
"Small Fonts (120)"="SMALLF.FON"
;
------End cut & paste here------
I use these fonts substitutes on my 17 inch gaming laptop with 1080p screen resolution
http://www.mdgx.com/pc.htm#LAP
to replace system + fixed (raster) fonts. You can customize/tweak your favorite fonts/font pairs/substitutes according to
your needs, preferences and/or desktop/display/screen size (examples):
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\FontSubstitutes]
; "MS Shell Dlg"="Microsoft Sans Serif"
"MS Shell Dlg"="Segoe UI Bold (TrueType)"
; "MS Shell Dlg 2"="Tahoma"
"MS Shell Dlg 2"="Segoe UI Bold (TrueType)"
; "Segoe UI"=-
"Segoe UI"="Segoe UI Bold (TrueType)"
; "Segoe UI (TrueType)"=-
"Segoe UI (TrueType)"="Segoe UI Bold (TrueType)"
; "Arial"=-
"Arial"="Segoe UI Bold (TrueType)"
; "Tahoma"=-
"Tahoma"="Segoe UI Bold (TrueType)"
; "Helv"="MS Sans Serif"
"Helv"="Segoe UI Bold (TrueType)"
; "Helvetica"="Arial"
"Helvetica"="Segoe UI Bold (TrueType)"
; "Tms Rmn"="MS Serif"
"Tms Rmn"="Segoe UI Bold"
;
------End cut & paste here------
Lines above preceded by a semicolon followed by a space [; ] are disabled (comments), and represent backups of the original
registry values (see correspondent modified lines underneath).
I have added lines above ending with an equal sign followed by a minus sign [=-] so you can restore the original fonts by
removing their customized substitutes (see correspondent modified lines underneath).
To restore original fonts: remove the semicolon and the space [; ] -> save the file as plain text/ASCII file (Encode: ->
ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK to all prompts to
register/merge/import its information into your registry.
Log off/sign out -> log back on/sign back in into same user account for these changes to take effect.
Windows System Font (.fon) files for different DPI settings (examples):
125% DPI font file | 100% DPI font file
***************************************
SSERIFF.FON        | SSERIFE.FON
SSERIFFE.FON       | SSERIFEE.FON
SSERIFFG.FON       | SSERIFEG.FON
SSERIFFR.FON       | SSERIFER.FON
SSERIFFT.FON       | SSERIFET.FON
SSEF1255.FON       | SSEE1255.FON
SSEF1256.FON       | SSEE1256.FON
SSEF1257.FON       | SSEE1257.FON
SSEF874.FON        | SSEE874.FON
* MS Serif FON:
125% DPI font file | 100% DPI font file
***************************************
SERIFF.FON         | SERIFE.FON
SERIFFE.FON        | SERIFEE.FON
SERIFFG.FON        | SERIFEG.FON
SERIFFR.FON        | SERIFER.FON
SERIFFT.FON        | SERIFET.FON
SERF1255.FON       | SERE1255.FON
SERF1256.FON       | SERE1256.FON
SERF1257.FON       | SERE1257.FON
* Courier FON:
125% DPI font file | 100% DPI font file
***************************************
COURF.FON          | COURE.FON
COURFE.FON         | COUREE.FON
COURFG.FON         | COUREG.FON
COURFR.FON         | COURER.FON
COURFT.FON         | COURET.FON
COUF1255.FON       | COUE1255.FON
COUF1256.FON       | COUE1256.FON
COUF1257.FON       | COUE1257.FON
Add/modify/customize fonts used by DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE] + BATch (.bat)/CoMmanD (.cmd)
script files:
http://smallvoid.com/article/winnt-cmd-add-font.html
http://www.techrepublic.com/blog/windows-and-office/quick-tip-add-fonts-to-the-command-prompt/
http://www.howtogeek.com/howto/windows-vista/stupid-geek-tricks-enable-more-fonts-for-the-windows-command-prompt/
http://www.wikihow.com/Customize-the-Font-in-Windows-Command-Prompt/
FYI:
Some of the fonts listed here are available only in certain Windows NTx builds/editions/releases/versions.
Example:
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Console\TrueTypeFont]
"0"="Lucida Console"
"00"="Consolas"
"01"="Monotype"
"02"="OCR A Extended"
"03"="OCR A Std"
"04"="Segoe UI"
"05"="Segoe UI Bold"
"06"="Segoe UI Black"
"07"="Tahoma"
"08"="Verdana"
"09"="Fixedsys"
[HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Console\TrueTypeFont]
"0"="Lucida Console"
"00"="Consolas"
"01"="Monotype"
"02"="OCR A Extended"
"03"="OCR A Std"
"04"="Segoe UI"
"05"="Segoe UI Bold"
"06"="Segoe UI Black"
"07"="Tahoma"
"08"="Verdana"
"09"="Fixedsys"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows NT\CurrentVersion\Console\TrueTypeFont]
"0"="Lucida Console"
"00"="Consolas"
"01"="Monotype"
"02"="OCR A Extended"
"03"="OCR A Std"
"04"="Segoe UI"
"05"="Segoe UI Bold"
"06"="Segoe UI Black"
"07"="Tahoma"
"08"="Verdana"
"09"="Fixedsys"
;
------End cut & paste here------
Winaero Tweaker 32-bit + 64-bit for Windows 7/8/8.1/10/11 [select Portable at install time!]:
http://www.winaero.com/winaero-tweaker/
Download:
http://www.winaero.com/download-winaero-tweaker/
Winaero Tweaker Features:
http://www.winaero.com/the-list-of-winaero-tweaker-features/
Change display/icons/items/system/UI fonts using Winaero Tweaker:
http://www.winaero.com/change-system-font-windows-10/

* Tweak + fix Desktop, Explorer, interface (GUI, Shell, API), mouse/cursor + keyboard/input annoyances in Windows XP/newer:
MenuShowDelay -> "MENUSHOWDELAY" -> REGISTRY.TXT (included):
http://www.mdgx.com/last3.htm#MENUDELAY
TileWallpaper -> "STRETCH WALLPAPER" -> TIPS98.TXT (included):
http://www.mdgx.com/98-1.htm#STRETCH
CursorBlinkRate -> "BLINK... NOT!" -> REGISTRY.TXT (included):
http://www.mdgx.com/last3.htm#BLINK
NoAutoReturnToWelcome:
http://sourceforge.net/p/unattended/mailman/message/32062919/
WindowArrangementActive:
http://www.tenforums.com/tutorials/4343-turn-off-snap-windows-windows-10-a.html
MouseWheelRouting:
http://www.tenforums.com/tutorials/12816-turn-off-scroll-inactive-windows-windows-10-a.html
JointResize, SnapAssist + SnapFill:
http://superuser.com/questions/1516878/
DockMoving:
http://superuser.com/questions/1039039/
DockTargetMouseWidth:
http://superuser.com/questions/1462732/
NOTE:
Some of these settings are available only in Windows 8/newer.
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_CURRENT_USER\Control Panel\Desktop]
"DockMoving"="0"
"MenuShowDelay"="0"
"TileWallpaper"="0"
"CursorBlinkRate"="-1"
"NoAutoReturnToWelcome"="1"
"WindowArrangementActive"="0"
"MouseWheelRouting"=dword:2
[HKEY_USERS\.DEFAULT\Control Panel\Desktop]
"DockMoving"="0"
"MenuShowDelay"="0"
"TileWallpaper"="0"
"CursorBlinkRate"="-1"
"NoAutoReturnToWelcome"="1"
"WindowArrangementActive"="0"
"MouseWheelRouting"=dword:2
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced]
"JointResize"=dword:0
"SnapAssist"=dword:0
"SnapFill"=dword:0
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced]
"JointResize"=dword:0
"SnapAssist"=dword:0
"SnapFill"=dword:0
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced]
"JointResize"=dword:0
"SnapAssist"=dword:0
"SnapFill"=dword:0
[HKEY_CURRENT_USER\Control Panel\Mouse]
"DockTargetMouseWidth"=dword:0
[HKEY_USERS\.DEFAULT\Control Panel\Mouse]
"DockTargetMouseWidth"=dword:0
;
------End cut & paste here------

* Turn ON Write Cache (hardware dependent) + turn ON Writing (turn OFF Write Protect = write-cache buffer flush), Error
Checking, Legacy + Suspend functions (hardware dependent) to speed up all your
available/configured/connected/installed/linked/local/networked/remote/removable cards/devices/discs/disks/media/sticks
drives/partitions/volumes in Windows 7/newer:
http://www.lifewire.com/remove-write-4586905/
http://www.isumsoft.com/computer/format-write-protected-usb-drive-using-cmd.html
http://www.howtogeek.com/howto/windows-vista/registry-hack-to-disable-writing-to-usb-drives/
http://support.citrix.com/article/CTX236681/
http://www.tenforums.com/drivers-hardware/138212-change-removal-policy-defaults-current-all-future-drives.html
http://www.der-windows-papst.de/en/2015/06/02/harddisk-write-cache-festplatte-schreibcache-richtlinie/
http://learn.microsoft.com/windows/client-management/change-default-removal-policy-external-storage-media/
http://social.msdn.microsoft.com/Forums/WINDOWS/4e8f2618-0dc6-4ef6-b749-25b47b830797/
http://admx.help/?Category=Windows_10_2016&Policy=Microsoft.Policies.RemovableStorageAccess::Removable_Remote_Allow_Access
http://howandroidhelp.com/how-to-return-safely-remove-hardware-to-windows-taskbar/
Start button/icon/logo/menu/orb -> Control Panel (CP) OR Run... [hold WinKey + press R] -> type this command
CONTROL.EXE
-> press Enter -> All Control Panel Items -> Safely Remove Hardware (Plug/Unplug Removable Devices/Storage Media);
OR Run... [hold WinKey + press R] -> type this command
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL HotPlug.dll
-> press Enter -> check "Display device components" box: "HotPlugFlags" REG_DWORD value = 2 in registry (.reg) file below.
Control Panel executable [CONTROL.EXE] executable is located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually
C:\WINDOWS].
View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]:
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command
PATH
-> press Enter.
1st Things 1st:
***************
BACKUP YOUR REGISTRY BEFORE MAKING ANY CHANGES! -> See "BACKUP/EXPORT + RESTORE/IMPORT REGISTRY/REGISTRY KEY(S)" in
WINDOWS7.TXT (this file):
http://www.mdgx.com/7.php#:~:text=BACKUP%2FEXPORT%20%2B%20RESTORE%2FIMPORT%20REGISTRY%2FREGISTRY%20KEY%28S%29%20%21
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Applets\SysTray]
"HotPlugFlags"=dword:2
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Applets\SysTray]
"HotPlugFlags"=dword:2
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Applets\SysTray]
"HotPlugFlags"=dword:2
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\I/O System]
"AllowRemoteDASD"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager\I/O System]
"AllowRemoteDASD"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Control\Session Manager\I/O System]
"AllowRemoteDASD"=dword:1
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\RemovableStorageDevices]
"AllowRemoteDASD"=dword:1
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services\Client]
"fEnableUsbBlockDeviceBySetupClass"=dword:0
"fEnableUsbSelectDeviceByInterface"=dword:1
[-HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services\Client\UsbBlockDeviceBySetupClasses]
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services\Client\UsbSelectDeviceByInterfaces]
"1000"="{6bdd1fc6-810f-11d0-bec7-08002be2092f}"
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\StorageDevicePolicies]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Usb]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Storage\EnabledDenyGP]
"DenyAllGPState"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\StorageDevicePolicies]
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Storage\EnabledDenyGP]
"DenyAllGPState"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Control\StorageDevicePolicies]
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Control\Storage\EnabledDenyGP]
"DenyAllGPState"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\StorageManagement\SpacesSMP\ConnectedSubsystems\{00000000-0000-0000-0000-000000000000}]
"CacheEnabled"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\StorageManagement\SpacesSMP\ConnectedSubsystems\{00000000-0000-0000-0000-000000000000}]
"CacheEnabled"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Control\StorageManagement\SpacesSMP\ConnectedSubsystems\{00000000-0000-0000-0000-000000000000}]
"CacheEnabled"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0000]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0001]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0002]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0003]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0004]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0005]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0006]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0007]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0008]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0009]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0010]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0011]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0012]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0013]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0014]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0015]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0016]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0017]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0018]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0019]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0020]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0021]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0022]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0023]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0024]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0025]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0026]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0027]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0028]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0029]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0030]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0031]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0032]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0033]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0034]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0035]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0036]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0037]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0038]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0039]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0040]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0041]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0042]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0043]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0044]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0045]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0046]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0047]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0048]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0049]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0050]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0000]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0001]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0002]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0003]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0004]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0005]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0006]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0007]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0008]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0009]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0010]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0011]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0012]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0013]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0014]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0015]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0016]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0017]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0018]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0019]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0020]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0021]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0022]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0023]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0024]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0025]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0026]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0027]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0028]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0029]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0030]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0031]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0032]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0033]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0034]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0035]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0036]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0037]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0038]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0039]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0040]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0041]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0042]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0043]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0044]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0045]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0046]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0047]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0048]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0049]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0050]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
;
------End cut & paste here------
Open Device Manager: Start -> Run... [hold WinKey + press R] -> type:
DevMgmt.msc
or (in some cases):
MMC.EXE /S DevMgmt.msc
-> press Enter -> Disk Drives -> double-click on each drive/partition/volume name Properties -> Policies tab ->
Removal policy -> check "Better Performance" box (if applicable) -> Write-caching policy -> check "Enable write caching on
the device" box (if applicable) -> Apply/OK.
http://2.bp.blogspot.com/-rH-Np-Af7cU/VkwxreXVcjI/AAAAAAAAAKs/Vz2kGGCXxxY/s1600/Write-caching-policy.png
http://www.tenforums.com/attachments/tutorials/36596d1441816445-enable-disable-disk-write-caching-windows-10-a-write_cache-3.png
Device Manager DevCon [devcon.exe] 32-bit + 64-bit DOS console command line tool used to enable, disable, restart, update,
remove (groups of) hardware device drivers:
http://learn.microsoft.com/windows-hardware/drivers/devtest/devcon/
Available versions of DevCon 32-bit + 64-bit for Windows XP/newer 32-bit (x86) + 64-bit (x64):
http://superuser.com/questions/1002950/
DevCon Repository:
http://networchestration.wordpress.com/2016/07/11/how-to-obtain-device-console-utility-devcon-exe-without-downloading-and-installing-the-entire-windows-driver-kit-100-working-method/
DevCon-Installer:
http://github.com/Drawbackz/DevCon-Installer/
Download:
http://github.com/Drawbackz/DevCon-Installer/releases/latest/
For example DevCon [devcon.exe] installs as part of Windows Driver Kit (WDK) 7.1.0/newer:
http://learn.microsoft.com/windows-hardware/drivers/download-the-wdk/
WDK 7.1.0 ISO:
http://www.microsoft.com/download/details.aspx?id=11800
File [620 MB]:
http://download.microsoft.com/download/4/A/2/4A25C7D5-EFBE-4182-B6A9-AE6850409A78/GRMWDK_EN_7600_1.ISO
Install 7-Zip unZIPping/unARChiving/unRARing tool (free GPL):
http://www.7-zip.org/
Explorer -> right-click GRMWDK_EN_7600_1.ISO (see above) -> select 7-Zip -> select Open archive -> extract devcon.exe file
which matches your Windows NTx OS build/edition/release/update/version + bit strength [32-bit (x86) or 64-bit (x64)]
anywhere on your local storage drives/partitions/volumes -> move matching devcon.exe file to a directory/folder listed in
your system PATH.
View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]:
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command
PATH
-> press Enter.
Devcon.exe Commands:
http://learn.microsoft.com/windows-hardware/drivers/devtest/devcon-general-commands/
DEVCON Command Line Utility Alternative to Device Manager:
http://www.robvanderwoude.com/devcon.php
DEVCON.exe:
http://www.ss64.com/nt/devcon.html
Manage Windows Drivers at Command Prompt using DevCon:
http://www.thewindowsclub.com/devcon-manage-windows-drivers-cmd/
Run DevCon (devcon.exe) from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE ->
Run as Administrator -> run this command -> press Enter:
devcon.exe restart *usb*
You will see the list of all connected/local/removable USB devices (generic example):
----------snippity-snip----------
USB\VID_0000&PID_0000\00000000000000                        : Restarted
USB\ROOT_HUB00\0&00000000&0&0                               : Requires restart/reboot
etc...
The xxx device(s) are ready to be restarted. To restart/reset the devices, restart/reboot the system.
----------snippity-snip----------
Each device has a unique VID_xxxx + PID_xxx and/or ROOT_HUB_xx manufacturer/vendor ID number.
Open Registry Editor (RegEdit) [REGEDIT.EXE] located in the %WinDir% directory/folder [%WinDir% = usually C:\WINDOWS]:
right-click RegEdit or its shortcut/link -> Run as Administrator -> go to this registry subkey (generic, replace # numbers
with actual hardware IDs corresponding to connected/installed storage media devices):
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\SCSI\Device_Vendor_ID_#\Device_Model_ID_#\Device Parameters\Classpnp\
Replace each Device_Vendor_ID_# + Device_Model_ID_# above with your specific number(s) obtained from the devcon.exe list in
generic example above.
In this generic example:
VID_0000&PID_0000\00000000000000
the registry key you need (most likely) looks like this (generic example):
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\SCSI\VID_0000&PID_0000\00000000000000\Device Parameters\Classpnp\
In the right hand pane of this registry key you need to modify or create (if not present) these 3 registry values with these
exact names and with these exact numeric values after "dword:" [REG_DWORD value type]:
"UserRemovalPolicy"=dword:2
"UserWriteCacheSetting"=dword:1
"CacheIsPowerProtected"=dword:0
To create a new registry value (if not present): in the Registry Editor right hand pane -> right-click on an empty spot ->
select Value -> REG_DWORD -> right-click on each value newly created -> name it exactly as above, without typing any
quotation marks.
Repeat same steps 3 times in order to create + rename all 3 registry DWORD values above.
To modify the numeric/hex/bin/text/ASCII/ANSI/etc value of a registry value: in the Registry Editor right hand pane ->
double-click on each of the 3 DWORD values above -> type 2 or 1 or 0 to match exactly its numeric value with the respective
name of each of the 3 registry DWORD values.
Repeat same steps 3 times in order to modify the numeric values of all 3 registry DWORD values above.
Restart/reboot Windows for all changes to take effect.
DskCache [DSKCACHE.EXE] DOS console command line tool 32-bit Hotfix for Windows 2000/newer turns ON/OFF power failure
protection (+p/-p) [CacheIsPowerProtected DWORD value] + write cache (+w/-w) [UserWriteCacheSetting DWORD value] in the
registry for all connected/installed/local/network/removable drives/partitions/volumes:
http://web.archive.org/web/20140825143556/http://support.microsoft.com/kb/811392/
Download:
http://thehotfixshare.net/board/index.php?/files/file/1113-windows2000-kb811392-x86-enuexe/
File:
http://hotfixv4.trafficmanager.net/Windows%202000/sp5/Fix178740/2195/free/266264_ENU_i386_zip.exe
----------snippity-snip----------
DSKCACHE.EXE [+p|-p] [+w|-w] [/i|/s|Drive_Specifier]
Set [+] or Clear [-] the disk cache value:
 p  Power protected write cache (not supported on all OS versions).
 w  Write cache.
Drive selection (default is all drives):
 /i  IDE disks only.
 /s  SCSI (includes FC) disks only.
Drive_Specifier: Drive letter, volume name, or physical drive.
 Drive letter(s): c:, d:, etc.
 Volume name(s): \\?\Volume{8fc37c41-bdd3-11d5-b897-806d6172696f}\
 Physical drive(s): PhysicalDrive0, PhysicalDrive1, etc.
If using no options current settings for all fixed disks will be displayed.
----------snippity-snip----------
Turn ON power failure protection (+p) [CacheIsPowerProtected] + write cache (+w) [UserWriteCacheSetting] for all
connected/installed/local/network/removable drives/partitions/volumes (example):
DSKCACHE.EXE +p +w
p = power failure protection
w = write cache
+ = enabled
- = disabled
+w and -w switches correspond to Device Manager [hold WinKey + press R -> type DevMgmt.msc -> press Enter] -> Disk Drives ->
drive/partition/volume name Properties -> Policies tab -> Write-caching policy -> "Enable write caching on the device" check
box, which corresponds to write cache [UserWriteCacheSetting] Registry DWORD [REG_DWORD] value [1 = enabled | 0 = disabled]:
"UserWriteCacheSetting"=dword:1
+p and -p switches correspond to Device Manager [hold WinKey + press R -> type DevMgmt.msc -> press Enter] -> Disk Drives ->
drive/partition/volume name Properties -> Policies tab -> Write-caching policy ->
"Turn off Windows write-cache buffer flushing on the device" check box, which corresponds to power failure protection
[CacheIsPowerProtected] Registry DWORD [REG_DWORD] value [1 = enabled | 0 = disabled]:
"CacheIsPowerProtected"=dword:1
These 2 Registry values reside under this Registry Hive Key Local Machine (HKLM) subkey (generic, replace 0es with actual
hardware IDs of connected/installed/local/network/removable drives/partitions/volumes):
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\SCSI\VID_0000&PID_0000\00000000000000\Device Parameters\Classpnp\
"UserWriteCacheSetting"=dword:1
"CacheIsPowerProtected"=dword:1
More info:
http://www.tomshardware.com/reviews/ssd-performance-tweak,2911-5.html
http://devblogs.microsoft.com/oldnewthing/20100909-00/?p=12913

* Turn OFF Diagnostic Tracing [DiagTrack], Data Collection/Logging [DataCollection], Telemetry + Performance Counters in
Windows 7/newer:
NOTE:
*****
Some of the Diagnostic Tracing [DiagTrack] + Data Collection/Logging [DataCollection] settings [registry keys + values]
apply only to Windows 8/8.1/10/11!
http://www.tenforums.com/tutorials/7032-change-diagnostic-data-settings-windows-10-a.html
http://www.tenforums.com/tutorials/118019-enable-disable-delete-diagnostic-data-windows-10-a.html
http://pcauthorities.com/pc-speed/how-to-disable-performance-counters-in-windows-xp/
http://heimdalsecurity.com/en/windows-10-security-guide/privacy/
http://www.helpdeskgeek.com/windows-10/how-to-disable-windows-10-telemetry/
http://tosdr.org/#microsoft
http://tosdr.org/#microsoft-store
http://learn.microsoft.com/windows/privacy/windows-diagnostic-data/
http://privacy.microsoft.com/
Microsoft Extensible Performance Counter List (EXCTRLST.EXE) 32-bit tool displays, enables + disables extensible performance
counters for installed Dynamic Link Libraries (DLLs)/Services [616 KB]:
http://web.archive.org/web/20160722103758/http://download.microsoft.com/download/win2000platform/exctrlst/1.00.0.1/nt5/en-us/exctrlst_setup.exe
Explorer -> right-click exctrlst_setup.exe (see above) -> Run as Administrator -> Install Tool: EXCTRLST.EXE -> Next ->
complete installation -> right-click exctrlst.exe -> Run as Administrator -> scroll down and highlight 1 item at a time all
the way down to the bottom -> UNcheck every correspondent Performance Counter List box -> exit exctrlst.exe.
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\DataCollection]
"Allow Telemetry"=dword:0
"AllowTelemetry"=dword:0
"DisableDeviceDelete"=-
"MaxTelemetryAllowed"=-
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\DataCollection]
"Allow Telemetry"=dword:0
"AllowTelemetry"=dword:0
"DisableDeviceDelete"=-
"MaxTelemetryAllowed"=-
[-HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\DiagTrack\Security]
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\DiagTrack]
"LaunchProtected"=dword:0
"UserServiceFlags"=dword:0
"Start"=dword:4
[-HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\DiagTrack\Security]
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\DiagTrack]
"LaunchProtected"=dword:0
"UserServiceFlags"=dword:0
"Start"=dword:4
[-HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\DiagTrack\Security]
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\DiagTrack]
"LaunchProtected"=dword:0
"UserServiceFlags"=dword:0
"Start"=dword:4
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Diagnostics\DiagTrack]
"ShowedToastAtLevel"=dword:0
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Diagnostics\DiagTrack]
"ShowedToastAtLevel"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Diagnostics\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\.NET CLR Data\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\.NET CLR Networking\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\.NET CLR Networking 4.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\.NET Data Provider for Oracle\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\.NET Data Provider for SqlServer\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\.NET Memory Cache 4.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\.NETFramework\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\ASP.NET\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\ASP.NET_1.1.4322\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\ASP.NET_2.0.50727\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\ASP.NET_4.0.30319\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\aspnet_state\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\BITS\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\ESENT\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\Intel Storage Counters\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\Lsa\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\MSDTC\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\MSDTC Bridge 3.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\MSDTC Bridge 4.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\MSSCNTRS\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\PerfDisk\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\PerfNet\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\PerfOS\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\PerfProc\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\Psched\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\rdyboost\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\RemoteAccess\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\RSVP\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\ServiceModelEndpoint 3.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\ServiceModelEndpoint 4.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\ServiceModelOperation 3.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\ServiceModelOperation 4.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\ServiceModelService 3.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\ServiceModelService 4.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SMSvcHost 3.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SMSvcHost 4.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\Spooler\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\TapiSrv\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\Tcpip\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\TermService\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\UGatherer\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\UGTHRSVC\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\usbhub\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\Windows Workflow Foundation 3.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\Windows Workflow Foundation 4.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\WmiApRpl\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\WSearchIdxPi\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Diagnostics\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\.NET CLR Data\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\.NET CLR Networking\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\.NET CLR Networking 4.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\.NET Data Provider for Oracle\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\.NET Data Provider for SqlServer\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\.NET Memory Cache 4.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\.NETFramework\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\ASP.NET\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\ASP.NET_1.1.4322\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\ASP.NET_2.0.50727\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\ASP.NET_4.0.30319\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\aspnet_state\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\BITS\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\ESENT\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Intel Storage Counters\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Lsa\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\MSDTC\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\MSDTC Bridge 3.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\MSDTC Bridge 4.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\MSSCNTRS\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\PerfDisk\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\PerfNet\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\PerfOS\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\PerfProc\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Psched\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\rdyboost\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\RemoteAccess\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\RSVP\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\ServiceModelEndpoint 3.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\ServiceModelEndpoint 4.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\ServiceModelOperation 3.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\ServiceModelOperation 4.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\ServiceModelService 3.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\ServiceModelService 4.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\SMSvcHost 3.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\SMSvcHost 4.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Spooler\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\TapiSrv\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Tcpip\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\TermService\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\UGatherer\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\UGTHRSVC\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\usbhub\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Windows Workflow Foundation 3.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Windows Workflow Foundation 4.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\WmiApRpl\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\WSearchIdxPi\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Control\Diagnostics\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\.NET CLR Data\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\.NET CLR Networking\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\.NET CLR Networking 4.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\.NET Data Provider for Oracle\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\.NET Data Provider for SqlServer\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\.NET Memory Cache 4.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\.NETFramework\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\ASP.NET\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\ASP.NET_1.1.4322\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\ASP.NET_2.0.50727\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\ASP.NET_4.0.30319\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\aspnet_state\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\BITS\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\ESENT\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\Intel Storage Counters\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\Lsa\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\MSDTC\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\MSDTC Bridge 3.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\MSDTC Bridge 4.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\MSSCNTRS\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\PerfDisk\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\PerfNet\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\PerfOS\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\PerfProc\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\Psched\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\rdyboost\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\RemoteAccess\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\RSVP\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\ServiceModelEndpoint 3.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\ServiceModelEndpoint 4.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\ServiceModelOperation 3.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\ServiceModelOperation 4.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\ServiceModelService 3.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\ServiceModelService 4.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\SMSvcHost 3.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\SMSvcHost 4.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\Spooler\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\TapiSrv\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\Tcpip\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\TermService\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\UGatherer\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\UGTHRSVC\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\usbhub\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\Windows Workflow Foundation 3.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\Windows Workflow Foundation 4.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\WmiApRpl\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\WSearchIdxPi\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
;
------End cut & paste here------

* Turn OFF/disable, customize the creation of, delete/remove +/- change target directory/folder of crash (mini)dump memory
(stack) (temporary) log files (default names + locations listed here):
- %SystemDrive%\DumpStack.log.tmp [file];
- %SystemRoot%\MEMORY.DMP [file];
- %SystemRoot%\Minidump [directory/folder].
http://crashdmp.wordpress.com/use-cases/file-patching/
http://www.scribd.com/document/548461821/
http://forums.mydigitallife.net/threads/windows-11-creates-a-lot-of-empty-folders.84466/
http://www.windowscentral.com/how-clear-system-error-memory-dump-files-windows-10/
http://www.windowscentral.com/how-open-and-analyze-dump-error-files-windows-10/
http://www.howtogeek.com/196672/windows-memory-dumps-what-exactly-are-they-for/
http://learn.microsoft.com/troubleshoot/windows-server/performance/memory-dump-file-options/
http://learn.microsoft.com/troubleshoot/windows-client/performance/read-small-memory-dump-file/
TIP:
****
Windows NTx built-in/default/pre-installed/preset machine/system (apply to all users on the same machine) + local/user
(apply only to the current/logged on user) environment variables used for target system/user directories/folders:
http://www.ss64.com/nt/syntax-variables.html
http://pureinfotech.com/list-environment-variables-windows-10/
http://www.computerhope.com/issues/ch000549.htm
- %SystemDrive% = usually C:\ root.
- %SystemRoot% = usually C:\WINDOWS [same as %WinDir%].
- %WinDir% = usually C:\WINDOWS [same as %SystemRoot%].
CAUTION:
********
Windows operating system (OS) integrity, proper functionality + correct operation *depend* on the *validity* of *all* these
variables!
INvalid/wrong parameters can render Windows INoperable or/and UNbootable, and you may have to reinstall from scratch or
repair your operating system (OS), eventually using the original disc/media containing Windows Setup files!
Some of these variables can be added/customized/deleted/modified by using a Control Panel (CP)/Windows Settings (WS) tool:
Run... [hold WinKey + press R] -> type this command
SystemPropertiesAdvanced.exe
-> press Enter -> Advanced tab -> Environment Variables... button -> edit variables -> highlight respective line -> Edit
button -> change parameters -> OK -> OK.
View the list of all your Windows operating system (OS) environment variables from a DOS console command prompt
[%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command
SET
-> press Enter.
OR
Save it to a plain text/ASCII (.txt) file: from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD
shortcut/CMD.EXE -> Run as Administrator -> type same command above followed by the name of the file (in this example it
will be saved in C:\ root)
SET>C:\Windows_Environment_Variables.txt
-> press Enter -> use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to view saved text file contents.
Example of Windows Vista/newer list of relevant environment variables [replace all User_Name instances with your actual user
name]:
----------snippity-snip----------
ALLUSERSPROFILE=C:\ProgramData
APPDATA=C:\Users\PC\AppData\Roaming [OR: APPDATA=C:\Windows\system32\config\systemprofile\AppData\Roaming]
CommonProgramFiles=C:\Program Files\Common Files
CommonProgramFiles(x86)=C:\Program Files (x86)\Common Files [exists only in Windows 64-bit (x64)]
CommonProgramW6432=C:\Program Files\Common Files
ComSpec=C:\Windows\system32\cmd.exe
DriverData=C:\Windows\System32\Drivers\DriverData
HOMEDRIVE=C:
HOMEPATH=\WINDOWS\SYSTEM32 [OR: HOMEPATH=\Users\User_Name]
LOCALAPPDATA=C:\Users\PC\AppData\Local [OR: LOCALAPPDATA=C:\Windows\system32\config\systemprofile\AppData\Local]
OS=Windows_NT
ProgramData=C:\ProgramData
ProgramFiles=C:\Program Files
ProgramFiles(x86)=C:\Program Files (x86) [exists only in Windows 64-bit (x64)]
ProgramW6432=C:\Program Files
PSModulePath=%ProgramFiles%\WindowsPowerShell\Modules;C:\Windows\system32\WindowsPowerShell\v1.0\Modules
PUBLIC=C:\Users\Public
SystemDrive=C:
SystemRoot=C:\Windows
TEMP=C:\Users\PC\AppData\Local\Temp [OR: TEMP=C:\Windows\TEMP]
TMP=C:\Users\PC\AppData\Local\Temp [OR: TMP=C:\Windows\TEMP]
USERNAME=User_Name
USERPROFILE=C:\Users\User_Name [OR: USERPROFILE=C:\Windows\system32\config\systemprofile]
windir=C:\Windows
----------snippity-snip----------
By default automatic (crash) memory dumps can be triggered by operating system (OS) core, GUI (Graphical User Interface),
hardware, kernel, software, system BSoDs (Blue Screens of Death), conflicts, crashes, drivers, errors, failures,
incompatibilities, lockups, random/unexpected reboots/restarts/shut downs, faulty settings, etc.
http://www.mdgx.com/newtip14.htm#BSOD
http://en.wikipedia.org/wiki/Blue_screen_of_death
A. Customize memory dump logging events, operation, schedule, file size + location:
http://www.windowscentral.com/how-manage-crash-dump-settings-windows-10/
Run... [hold WinKey + press R] -> type this command
SystemPropertiesAdvanced.exe
-> press Enter -> Advanced tab -> Startup and Recovery -> Settings... button -> System failure -> check "Write an event to
the sysytem log" box -> check "Automatically restart" box -> Write debugging information -> select preferred option -> Dump
file: -> change environment variable [between %% characters] to any other valid option [see list above] -> check "Overwrite
any existing file" box -> UNcheck "Disable automatic deletion of memory dumps when disk space is low" box -> OK.
Use Windows built-in Event Viewer tool [eventvwr.msc] to view + diagnose conflicts, errors, crashes, failures, lockups,
problems, reboots, shut downs, etc.
http://www.minitool.com/news/open-event-viewer-windows-10.html
http://www.windowscentral.com/how-use-event-viewer-windows-10/
Event Viewer [eventvwr.msc] is located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually C:\WINDOWS].
Management Saved Console (.msc) script files are associated by default with and executed by Microsoft Management Console
(MMC.EXE) snap-in control tool, and most of them are located in the %WinDir%\SYSTEM32 folder [%WinDir% = usually
C:\WINDOWS].
http://en.wikipedia.org/wiki/Microsoft_Management_Console
B. Turn OFF/disable + delete/remove obsolete/unused memory dump log files (examples):
1. Delete them using PowerShell commands:
Right-click PowerShell shortcut or C:\WINDOWS\System32\WindowsPowerShell\v1.0\PowerShell.exe [default location] -> Run as
Administrator -> type these commands (examples)
Powershell.exe -EP Bypass -MTA -NOL -NONI -NOP -C "Remove-Item '%SystemDrive%\DumpStack.log.*' -Force -EA SilentlyContinue -Verbose"
Powershell.exe -EP Bypass -MTA -NOL -NONI -NOP -C "Remove-Item '%SystemRoot%\MEMORY.DMP' -Force -EA SilentlyContinue -Verbose"
-> press Enter after each line.
2. Turn them OFF using registry settings:
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\CrashControl]
"AutoReboot"=dword:1
"CrashDumpEnabled"=dword:0
"DumpFile"=hex(2):25,54,45,4d,50,25,5c,4d,45,4d,4f,52,59,2e,44,4d,50,00
"DumpLogLevel"=dword:0
"EnableLogFile"=dword:0
"LogEvent"=dword:0
"MinidumpDir"=hex(2):25,54,45,4d,50,25,5c,4d,69,6e,69,64,75,6d,70,00
"MinidumpsCount"=dword:0
"Overwrite"=dword:1
"DisplayParameters"=dword:1
"AlwaysKeepMemoryDump"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\CrashControl\StorageTelemetry]
"DeviceDumpEnabled"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\CrashControl]
"AutoReboot"=dword:1
"CrashDumpEnabled"=dword:0
"DumpFile"=hex(2):25,54,45,4d,50,25,5c,4d,45,4d,4f,52,59,2e,44,4d,50,00
"DumpLogLevel"=dword:0
"EnableLogFile"=dword:0
"LogEvent"=dword:0
"MinidumpDir"=hex(2):25,54,45,4d,50,25,5c,4d,69,6e,69,64,75,6d,70,00
"MinidumpsCount"=dword:0
"Overwrite"=dword:1
"DisplayParameters"=dword:1
"AlwaysKeepMemoryDump"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\CrashControl\StorageTelemetry]
"DeviceDumpEnabled"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Control\CrashControl]
"AutoReboot"=dword:1
"CrashDumpEnabled"=dword:0
"DumpFile"=hex(2):25,54,45,4d,50,25,5c,4d,45,4d,4f,52,59,2e,44,4d,50,00
"DumpLogLevel"=dword:0
"EnableLogFile"=dword:0
"LogEvent"=dword:0
"MinidumpDir"=hex(2):25,54,45,4d,50,25,5c,4d,69,6e,69,64,75,6d,70,00
"MinidumpsCount"=dword:0
"Overwrite"=dword:1
"DisplayParameters"=dword:1
"AlwaysKeepMemoryDump"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Control\CrashControl\StorageTelemetry]
"DeviceDumpEnabled"=dword:0
;
------End cut & paste here------

* Maximize 3D/DirectX/DirectX3D 3D/gaming/graphics/spatial/texture processing/rendering performance: decrease hardware lag +
turn OFF diagnostics, performance + tracing counters + timers in Windows 7/newer:
http://forums.guru3d.com/threads/from-red-to-green.387539/
http://www.ghacks.net/2013/04/18/try-changing-hpet-settings-to-improve-your-pcs-performance/
See also "* Turn OFF Diagnostic Tracing [DiagTrack], Data Collection/Logging [DataCollection], Telemetry + Performance
Counters..." section further above.
Turn OFF High Precision Event Timer (HPET) BIOS clock boot setting from a DOS console command prompt
[%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command
BCDEDIT.EXE /deletevalue useplatformclock
-> press Enter -> restart/reboot.
In case BCDEdit setting above doesn't help, or if HPET is needed by some hardware component/device or software
driver/program you are using:
Turn ON High Precision Event Timer (HPET) BIOS clock boot setting from a DOS console command prompt
[%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command
BCDEDIT.EXE /set useplatformclock true
-> press Enter -> restart/reboot.
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text BATch (.bat) or CoMmanD (.cmd) script file containing the lines between Cut & Paste delimiters below
-> save it as plain text/ASCII file (Encode: -> ANSI) with the BAT (.bat) or CMD (.cmd) extension -> right-click it ->
Run as Administrator -> wait for completion.
-----Begin cut & paste here-----
@ECHO OFF
IF NOT "%OS%"=="Windows_NT" GOTO END
REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Direct3D" /v PSGPNumThreads /t REG_DWORD /d 16 /f
REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Direct3D" /v EnableSC /t REG_DWORD /d 1 /f
REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Direct3D" /v ForceCritSec /t REG_DWORD /d 1 /f
REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Direct3D" /v MMXFastPath /t REG_DWORD /d 1 /f
REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Control\ACPI" /v AMLIGlobalHeapSize /t REG_DWORD /d 1048576 /f
REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v SystemPages /t REG_DWORD /d 4294967295 /f
REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v PagedPoolSize /t REG_DWORD /d 4294967295 /f
REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v SessionPoolSize /t REG_DWORD /d 60 /f
REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v SessionViewSize /t REG_DWORD /d 120 /f
REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v PoolUsageMaximum /t REG_DWORD /d 60 /f
REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Control\usbstor\054C00C1" /v MaximumTransferLength /t REG_DWORD /d 2097152 /f
REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Control\usbstor\05AC12xx" /v MaximumTransferLength /t REG_DWORD /d 2097152 /f
REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Control\usbstor\05AC13xx" /v MaximumTransferLength /t REG_DWORD /d 2097152 /f
REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Control\usbstor\05DCA431" /v MaximumTransferLength /t REG_DWORD /d 2097152 /f
REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Control\usbstor\058F6362" /v MaximumTransferLength /t REG_DWORD /d 2097152 /f
REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows" /v GDIProcessHandleQuota /t REG_DWORD /d 32768 /f
REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows" /v USERProcessHandleQuota /t REG_DWORD /d 32768 /f
REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Multimedia\SystemProfile\Tasks\Games" /v "Scheduling Category" /t REG_SZ /d High /f
REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Multimedia\SystemProfile\Tasks\Games" /v "SFIO Priority" /t REG_SZ /d High /f
REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Multimedia\SystemProfile\Tasks\Games" /v "Background Only" /t REG_SZ /d False /f
REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Multimedia\SystemProfile\Tasks\Games" /v "Priority" /t REG_DWORD /d 1 /f
REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Multimedia\SystemProfile\Tasks\Games" /v "GPU Priority" /t REG_DWORD /d 1 /f
REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Multimedia\SystemProfile\Tasks\Games" /v "Affinity" /t REG_DWORD /d 0 /f
:END
EXIT
------End cut & paste here------

* Increase Cached Icons numeric value to max(imum) in Desktop, Explorer, File Manager (FM) + 3rd party replacements/similar
tools in all Windows NTx editions -> "HARD DRIVE THRASHING" -> REGISTRY.TXT (included):
http://www.mdgx.com/newtip1.htm#THRASH
MDGx "File Manager + Windows Explorer/File Explorer Replacement Tools [free(ware)]" section in SOFTWARE.TXT (included):
http://www.mdgx.com/toy.htm#ENH
MDGx "Tweaked + Customized File Manager (FM) 32-bit" section in SOFTWARE.TXT (included):
http://www.mdgx.com/xptoy.htm#FMNT
Microsoft open source original File Manager (FM) 32-bit + 64-bit:
http://www.mdgx.com/xptoy.htm#FMMS
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer]
"Max Cached Icons"="65535"
;
------End cut & paste here------

* FIX: Repair Remote Procedure Call (RPC) Internet Protocol version 6 (IPv6)/server errors in Windows 7/newer:
http://www.helpdeskgeek.com/help-desk/how-to-fix-rpc-server-is-unavailable-error-in-windows/
http://www.hpc.mil/program-areas/networking-overview/2013-10-03-17-24-38/ipv6-knowledge-base-ip-transport/disabling-ipv6-in-microsoft-windows-8-and-server-2012/
http://techjourney.net/disable-turn-off-ipv6-support-in-windows-10-8-1-8-7-vista/
http://kb.iu.edu/d/baeg/
http://www.drivereasy.com/knowledge/rpc-server-is-unavailable-error-on-windows-10-fixed/
http://www.alphr.com/rpc-server-is-unavailable/
http://learn.microsoft.com/troubleshoot/windows-server/networking/configure-ipv6-in-windows/
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters]
"DisabledComponents"=dword:8
;
------End cut & paste here------
Restart/reboot Windows for this change to take effect.

* FIX: Refresh/reset (delete + rebuild) Explorer Icon Cache Database [IconCache.db + iconcache*.db] in Windows 7/newer:
http://www.thewindowsclub.com/rebuild-icon-clear-thumbnail-cache-windows-10/
http://www.thewindowsclub.com/rebuild-the-icon-cache-windows/
http://neosmart.net/wiki/clear-icons-cache/
http://www.windowscentral.com/how-reset-icon-cache-database-windows-10/
http://www.howtogeek.com/232779/how-to-rebuild-a-broken-icon-cache-in-windows-10/
http://appuals.com/rebuild-icon-cache-windows-11/
http://www.elevenforum.com/t/rebuild-icon-cache-in-windows-11.2049/
http://www.tenforums.com/tutorials/5645-rebuild-icon-cache-windows-10-a.html
File:
http://www.tenforums.com/attachments/tutorials/207993d1539300969-rebuild-icon-cache-windows-10-a-rebuild_icon_cache.bat
IconCache.db + iconcache*.db files reside in these local user directories/folders:
- %LocalAppData%\IconCache.db
- %UserProfile%\AppData\Local\IconCache.db
- %LocalAppData%\Microsoft\Windows\Explorer\iconcache*.db
- %UserProfile%\AppData\Local\Microsoft\Windows\Explorer\iconcache*.db
TIP:
****
Windows NTx built-in/default/pre-installed/preset machine/system (apply to all users on the same machine) + local/user
(apply only to the current/logged on user) environment variables used for target system/user directories/folders:
http://www.ss64.com/nt/syntax-variables.html
http://pureinfotech.com/list-environment-variables-windows-10/
http://www.computerhope.com/issues/ch000549.htm
- %LocalAppData% = usually %UserProfile%\AppData\Local [same as C:\Users\%UserName%\AppData\Local] OR
%WinDir%\SYSTEM32\Config\SystemProfile\AppData\Local .
- %ProgramData% = usually C:\ProgramData .
- %ProgramFiles% = usually C:\Program Files [exists in Windows 32-bit (x86) + Windows 64-bit (x64)].
- %ProgramFiles(x86)% = usually C:\Program Files (x86) [exists only in Windows 64-bit (x64)].
- %SystemDrive% = usually C:\ root.
- %SystemRoot% = usually C:\WINDOWS [same as %WinDir%].
- %UserName% = your user name.
- %UserProfile% = usually C:\Users\%UserName% .
- %WinDir% = usually C:\WINDOWS [same as %SystemRoot%].
CAUTION:
********
Windows operating system (OS) integrity, proper functionality + correct operation *depend* on the *validity* of *all* these
variables!
INvalid/wrong parameters can render Windows INoperable or/and UNbootable, and you may have to reinstall from scratch or
repair your operating system (OS), eventually using the original storage media containing Windows Setup files!
Some of these variables can be added/customized/deleted/modified by using a Control Panel (CP)/Windows Settings (WS) tool:
Run... [hold WinKey + press R] -> type this command
SystemPropertiesAdvanced.exe
-> press Enter -> Advanced tab -> Environment Variables... button -> edit variables -> highlight respective line -> Edit
button -> change parameters -> OK -> OK.
View the list of all your Windows operating system (OS) environment variables from a DOS console command prompt
[%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command
SET
-> press Enter.
OR
Save it to a plain text/ASCII (.txt) file: from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD
shortcut/CMD.EXE -> Run as Administrator -> type same command above followed by the name of the file (in this example it
will be saved in C:\ root)
SET>C:\Windows_Environment_Variables.txt
-> press Enter -> use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to view saved text file contents.
Example of Windows Vista/newer list of relevant environment variables [replace all User_Name instances with your actual user
name]:
----------snippity-snip----------
ALLUSERSPROFILE=C:\ProgramData
APPDATA=C:\Users\PC\AppData\Roaming [OR: APPDATA=C:\Windows\system32\config\systemprofile\AppData\Roaming]
CommonProgramFiles=C:\Program Files\Common Files
CommonProgramFiles(x86)=C:\Program Files (x86)\Common Files [exists only in Windows 64-bit (x64)]
CommonProgramW6432=C:\Program Files\Common Files
ComSpec=C:\Windows\system32\cmd.exe
DriverData=C:\Windows\System32\Drivers\DriverData
HOMEDRIVE=C:
HOMEPATH=\WINDOWS\SYSTEM32 [OR: HOMEPATH=\Users\User_Name]
LOCALAPPDATA=C:\Users\PC\AppData\Local [OR: LOCALAPPDATA=C:\Windows\system32\config\systemprofile\AppData\Local]
OS=Windows_NT
ProgramData=C:\ProgramData
ProgramFiles=C:\Program Files
ProgramFiles(x86)=C:\Program Files (x86) [exists only in Windows 64-bit (x64)]
ProgramW6432=C:\Program Files
PSModulePath=%ProgramFiles%\WindowsPowerShell\Modules;C:\Windows\system32\WindowsPowerShell\v1.0\Modules
PUBLIC=C:\Users\Public
SystemDrive=C:
SystemRoot=C:\Windows
TEMP=C:\Users\PC\AppData\Local\Temp [OR: TEMP=C:\Windows\TEMP]
TMP=C:\Users\PC\AppData\Local\Temp [OR: TMP=C:\Windows\TEMP]
USERNAME=User_Name
USERPROFILE=C:\Users\User_Name [OR: USERPROFILE=C:\Windows\system32\config\systemprofile]
windir=C:\Windows
----------snippity-snip----------

* FIX: Turn OFF annoying/nagging "Your Windows 7 PC is out of support" (full screen) pop-ups in Windows 7 with Service Pack
1 (SP1) + certain Microsoft Updates [example: KB4530734] installed:
http://nolabnoparty.com/en/windows-7-suppress-pc-is-out-of-support-warning/
http://www.askvg.com/tip-disable-your-windows-7-pc-is-out-of-support-full-screen-banner/
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\EOSNotify]
"DiscontinueEOS"=dword:1
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\EOSNotify]
"DiscontinueEOS"=dword:1
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\EOSNotify]
"DiscontinueEOS"=dword:1
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\EOSnotify.exe]
"Debugger"="systray.exe"
;
------End cut & paste here------

* FIX: Detect/diagnose/repair/troubleshoot internet/network connection errors using Windows Network Diagnostics, a.k.a.
Diagnostics Troubleshooting Wizard, a.k.a. DiagWizard, a.k.a. Microsoft Support Diagnostic Tool [MSDT.EXE] in Windows
7/newer:
http://learn.microsoft.com/windows-server/administration/windows-commands/msdt/
http://technet.microsoft.com/library/ee424379.aspx#available-troubleshooting-packs
http://www.elevenforum.com/t/run-troubleshooters-in-windows-11.3337/
http://www.thewindowsclub.com/how-to-run-a-troubleshooter-from-the-command-line-in-windows-10/
http://www.linksys.com/us/support-article?articleNum=135351
http://www.majorgeeks.com/content/page/how_to_use_the_microsoft_support_diagnostic_tool_system_diagnostic_report.html
Run MSDT.EXE from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as
Administrator -> type this command
MSDT.EXE -id NetworkDiagnosticsWeb -ep SystemSettings_Troubleshoot_L2 -skip true -elevated yes
-> press Enter -> follow the instructions to diagnose + repair internet/network connection(s) errors.
Microsoft Support Diagnostic Tool [MSDT.EXE] executable is located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% =
usually C:\WINDOWS].
View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]:
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command
PATH
-> press Enter.

* FIX: Fix Windows 7/newer, Windows Server 2008 R2/newer + MS Office XP/newer Activation Errors 0x8007232b + 0xc004f074:
http://www.techyuga.com/windows-activation-error-0x8007232b/
http://www.serverbrain.org/system-administration/disabling-automatic-kms-to-dns-publishing.html
http://appuals.com/how-to-fix-office-2016-activation-error-code-0xc004f074/
http://winpeaker.com/en/windows/0xc004f074-office-activation-error-2010-2013-2016/
More info:
http://github.com/MicrosoftDocs/windowsserverdocs/issues/4218/
MS DOCs: Registry Settings for Volume Activation:
http://learn.microsoft.com/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn502532(v=ws.11)
MS DOCs: Key Management Service (KMS) Activation -> Configuring DNS:
http://technet.microsoft.com/library/ff793405.aspx
MS DOCs: Activate Windows 7/newer using Key Management Service (KMS):
http://learn.microsoft.com/windows/deployment/volume-activation/activate-using-key-management-service-vamt/
Wikipedia: Key Management Service (KMS):
http://simple.wikipedia.org/wiki/Key_Management_Service
Wikipedia: MS Office Versions:
http://en.wikipedia.org/wiki/History_of_Microsoft_Office
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
; Windows 7/newer + Windows Server 2008 R2/newer:
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform]
"DisableDnsPublishing"=dword:1
; Windows XP/2003/Vista/2008 only:
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SL]
"DisableDnsPublishing"=dword:1
;
------End cut & paste here------

* Turn ON display of time seconds [00:00:??] in Taskbar Tray Clock in Windows 7/newer:
http://www.askvg.com/collection-of-windows-10-hidden-secret-registry-tweaks/
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced]
"ShowSecondsInSystemClock"=dword:1
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced]
"ShowSecondsInSystemClock"=dword:1
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced]
"ShowSecondsInSystemClock"=dword:1
;
------End cut & paste here------

* Delete/remove unnecessary/bloat files + directories/folders to free up space in Windows 7/newer:
http://www.techspot.com/guides/2240-windows-free-up-storage-space/
http://www.makeuseof.com/tag/delete-windows-files-folders/
http://www.houkconsulting.com/2019/07/freeing-disk-space-windows/

* Windows Desktop Gadgets (free):
http://gadgetsrevived.com/
http://win10gadgets.com/
http://win7gadgets.com/
http://www.gadgetskit.com/

* Create Scheduled Task to Run at Boot Time:
http://www.myboogpages.com/2009/02/how-to-create-a-scheduled-task-that-runs-at-boot-time.html

* Remove icon/link/shortcut arrow + UAC (User Account Control) shield overlay (+ add transparency) + pin them to
Taskbar/Start Menu in Windows 7/newer:
http://www.mydigitallife.info/workaround-to-remove-shortcut-arrow-make-transparent-in-windows-7-yet-can-pin-to-taskbar-or-start-menu/
http://www.winaero.com/remove-shortcut-arrow-overlay-in-windows-10/
http://superuser.com/questions/68345/
http://www.tenforums.com/tutorials/5645-rebuild-icon-cache-windows-10-a.html
http://windowsloop.com/remove-overlay-lock-icon-on-encrypted-files/
http://www.reddit.com/r/Windows10/comments/j4mr5y/
Winaero Tweaker 32-bit + 64-bit for Windows 7/8/8.1/10/11 [select Portable at install time!]:
http://www.winaero.com/winaero-tweaker/
Download:
http://www.winaero.com/download-winaero-tweaker/
Winaero Tweaker Features:
http://www.winaero.com/the-list-of-winaero-tweaker-features/
Winaero Tweaker removes icon overlay using transparent icon.

* Run BATch file as service:
http://www.serverfault.com/questions/226271/running-a-batch-file-as-a-system-service-in-windows-server-2003

* Windows 7 File Association Fixes:
http://www.winhelponline.com/blog/file-asso-fixes-for-windows-7/
http://www.winhelponline.com/blog/unassociate-file-types-windows-7-vista/
http://www.techsupportall.com/file-association-fixes/
http://www.techsupportall.com/file-association-fix-for-windows-7/
http://www.vistax64.com/threads/233243/

* Add programs (file associations) to right-click Open with... menu:
http://www.techrepublic.com/forums/discussions/using-open-with-does-not-work/

* Default Programs Editor (DPE) 32-bit adds/edits/removes right-click items, file associations, autoplay programs (apps):
http://www.defaultprogramseditor.com/
File:
http://www.defaultprogramseditor.com/files/DefaultProgramsEditor.zip
Requires Microsoft .NET Framework Redistributable (NFR) 3.5/newer:
http://www.mdgx.com/add.htm#NFR

* Fix Files/Folders Access Denied + other (similar) Errors:
http://support.microsoft.com/help/2623670/
http://www.thewindowsclub.com/access-is-denied-software-installation-windows/
http://www.stackoverflow.com/questions/8619541/
http://smallbusiness.chron.com/change-permissions-system32-drivers-50434.html
http://www.blogsdna.com/2159/how-to-take-ownership-grant-permissions-to-access-files-folder-in-windows-7.htm

* Take Ownership + Grant Permission right-click items in Windows Vista/newer:
http://www.techfleece.com/2011/05/15/how-to-take-ownership-of-files-or-folders-or-an-entire-hard-drive/
http://www.blogsdna.com/2159/
http://www.howtogeek.com/howto/windows-vista/add-take-ownership-to-explorer-right-click-menu-in-vista/

* (Re)Gain/(re)acquire/restore full permissions (run as SYSTEM) to edit protected/hidden/read-only registry (sub)keys in
Windows Vista/newer:
http://www.howtogeek.com/262464/how-to-gain-full-permissions-to-edit-protected-registry-keys/
Run the Registry Editor [RegEdit = %WinDir%\REGEDIT.EXE] with full SYSTEM level privileges to be able to
view/create/edit/rename/delete hidden/locked registry (sub)keys/values:
1. NirCmd 32-bit + 64-bit multi-function DOS console command line + GUI tool:
http://www.nirsoft.net/utils/nircmd.html
NirCmd 32-bit:
http://www.nirsoft.net/utils/nircmd.zip
NirCmd 64-bit:
http://www.nirsoft.net/utils/nircmd-x64.zip
NirCmd Guide:
http://nircmd.nirsoft.net/
Help:
http://www.nirsoft.net/utils/nircmd2.html
Download ZIP archive above that matches your Windows NTx OS bit strength [32-bit (x86) or 64-bit (x64)] + then
unZIP/extract NirCmd files.
2. Place (copy/move) all NirCmd files in a (sub)directory/(sub)folder of your choice (example):
C:\TOOLS\NirCmd
3. Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text CoMmanD (.cmd) script file containing the lines between Cut & Paste delimiters below -> save file as
REGEDIT.CMD (example) into the same (sub)directory/(sub)folder where NirCmd files reside (using C:\TOOLS\NirCmd from example
above):
-----Begin cut & paste here-----
@ECHO OFF
IF NOT "%OS%"=="Windows_NT" GOTO END
IF NOT EXIST C:\TOOLS\NirCmd\nircmd.exe GOTO END
IF NOT EXIST %WinDir%\REGEDIT.EXE GOTO END
C:\TOOLS\NirCmd\nircmd.exe elevatecmd runassystem %WinDir%\REGEDIT.EXE
:END
EXIT
------End cut & paste here------
This way from now on you can run RegEdit with full SYSTEM privileges from a convenient shortcut.
4. Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text VBScript (.vbs) script file containing the lines between Cut & Paste delimiters below -> save file as
REGEDIT.VBS (example) into the same (sub)directory/(sub)folder where NirCmd files reside (using C:\TOOLS\NirCmd from example
above):
-----Begin cut & paste here-----
Dim WshShell:Set WshShell=CreateObject("WScript.Shell")
WshShell.Run chr(34)&"C:\TOOLS\NirCmd\REGEDIT.CMD"&Chr(34),0,true
Set WshShell=Nothing
------End cut & paste here------
5. Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save file as REGEDIT.REG
(example) into the same (sub)directory/(sub)folder where NirCmd files reside (using C:\TOOLS\NirCmd from example above):
-----Begin cut & paste here-----
REGEDIT4
; Desktop right-click RegEdit as SYSTEM shortcut:
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Directory\Background\shell\regedit_sys]
@="Registry Editor (RegEdit) = SYSTEM"
"SuppressionPolicy"=dword:0
"Icon"="REGEDIT.EXE,0"
"NoWorkingDirectory"=""
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Directory\Background\shell\regedit_sys\command]
@="WSCRIPT.EXE /B /Nologo C:\\TOOLS\\NirCmd\\REGEDIT.VBS"
"IsolatedCommand"=-
; My Computer (machine/system wide/all users) Desktop RegEdit as SYSTEM shortcut:
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\regedit_sys]
@="Registry Editor (RegEdit) = SYSTEM"
"SuppressionPolicy"=dword:0
"Icon"="REGEDIT.EXE,0"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\regedit_sys\command]
@="WSCRIPT.EXE /B /Nologo C:\\TOOLS\\NirCmd\\REGEDIT.VBS"
"IsolatedCommand"=-
; My Computer (current/logged on user) Desktop RegEdit as SYSTEM shortcut:
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{59031A47-3F72-44A7-89C5-5595FE6B30EE}\shell\regedit_sys]
@="Registry Editor (RegEdit) = SYSTEM"
"SuppressionPolicy"=dword:0
"Icon"="REGEDIT.EXE,0"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{59031A47-3F72-44A7-89C5-5595FE6B30EE}\shell\regedit_sys\command]
@="WSCRIPT.EXE /B /Nologo C:\\TOOLS\\NirCmd\\REGEDIT.VBS"
"IsolatedCommand"=-
; Desktop right-click RegEdit as Current User shortcut:
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Directory\Background\shell\regedit]
@="Registry Editor (RegEdit) = Current User"
"SuppressionPolicy"=dword:0
"Icon"="REGEDIT.EXE,0"
"NoWorkingDirectory"=""
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Directory\Background\shell\regedit\command]
@="REGEDIT.EXE"
"IsolatedCommand"=-
; My Computer (machine/system wide/all users) Desktop RegEdit as Current User shortcut:
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\regedit]
@="Registry Editor (RegEdit) = Current User"
"SuppressionPolicy"=dword:0
"Icon"="REGEDIT.EXE,0"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\regedit\command]
@="REGEDIT.EXE"
"IsolatedCommand"=-
; My Computer (current/logged on user) Desktop RegEdit as Current User shortcut:
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{59031A47-3F72-44A7-89C5-5595FE6B30EE}\shell\regedit]
@="Registry Editor (RegEdit) = Current User"
"SuppressionPolicy"=dword:0
"Icon"="REGEDIT.EXE,0"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{59031A47-3F72-44A7-89C5-5595FE6B30EE}\shell\regedit\command]
@="REGEDIT.EXE"
"IsolatedCommand"=-
; Control Panel (CONTROL.EXE) RegEdit as SYSTEM shortcut:
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{77708248-f839-436b-8919-527c410f48b9}]
@="Registry Editor (RegEdit) = SYSTEM"
"InfoTip"="Starts Registry Editor (RegEdit) as SYSTEM"
"System.ControlPanel.Category"="5"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{77708248-f839-436b-8919-527c410f48b9}\DefaultIcon]
@="REGEDIT.EXE,0"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{77708248-f839-436b-8919-527c410f48b9}\shell\open\command]
@="WSCRIPT.EXE /B /Nologo C:\\TOOLS\\NirCmd\\REGEDIT.VBS"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{77708248-f839-436b-8919-527c410f48b9}\Elevation]
"Enabled"=dword:1
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ControlPanel\NameSpace\{77708248-f839-436b-8919-527c410f48b9}]
@="Add Registry Editor (RegEdit) as SYSTEM to Control Panel"
; Control Panel (CONTROL.EXE) RegEdit as Current User shortcut:
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{77708248-f839-436b-8919-527c410f48b8}]
@="Registry Editor (RegEdit) = Current User"
"InfoTip"="Starts Registry Editor (RegEdit) as Current User"
"System.ControlPanel.Category"="5"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{77708248-f839-436b-8919-527c410f48b8}\DefaultIcon]
@="REGEDIT.EXE,0"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{77708248-f839-436b-8919-527c410f48b8}\shell\open\command]
@="REGEDIT.EXE"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{77708248-f839-436b-8919-527c410f48b8}\Elevation]
"Enabled"=dword:1
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ControlPanel\NameSpace\{77708248-f839-436b-8919-527c410f48b8}]
@="Add Registry Editor (RegEdit) as Current User to Control Panel"
;
------End cut & paste here------
6. Desktop/Explorer -> go to C:\ drive -> TOOLS directory/folder -> NirCmd subdirectory/subfolder (using C:\TOOLS\NirCmd in
this example) -> right-click on REGEDIT.REG -> Run as Administrator -> answer Yes/OK to all prompts to register/merge/import
the information into your registry.
7. From now on you can run either "Registry Editor (RegEdit) = SYSTEM" (privileged) or
"Registry Editor (RegEdit) as Current User" (default) shortcuts from all these locations:
- Desktop [shell context menu] -> right-click.
- My Computer (machine/system wide/all users) [shell context menu] -> right-click.
- My Computer (current/logged on user) [shell context menu] -> right-click.
- Control Panel (CP) [list of shortcuts] -> Start -> Control Panel or Run... [hold WinKey + press R] -> type this command
control
-> press Enter.
Control Panel [CONTROL.EXE] executable is located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually C:\WINDOWS].
View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]:
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command
PATH
-> press Enter.

* Turn OFF HomeGroup + Network Function Discovery (optional) in Windows 7/newer:
http://www.howtogeek.com/howto/27091/how-to-disable-or-enable-the-homegroup-feature-in-windows-7/
http://support.microsoft.com/help/17145/
http://www.digitalcitizen.life/homegroup-feature-how-it-works/
http://www.howtogeek.com/9524/learning-windows-7-create-a-homegroup-join-a-new-computer-to-it/
CAUTION:
Disabling these services will turn OFF device/network/remote/shared files/folders/libraries sharing/printing features!
Disable these 2 HomeGroup services: HomeGroup Listener [HomeGroupListener] + HomeGroup Provider [HomeGroupProvider]:
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text BATch (.bat) or CoMmanD (.cmd) script file containing the lines between Cut & Paste delimiters below
-> save it as plain text/ASCII file (Encode: -> ANSI) with the BAT (.bat) or CMD (.cmd) extension -> right-click it ->
Run as Administrator -> wait for completion.
-----Begin cut & paste here-----
@ECHO OFF
IF NOT "%OS%"=="Windows_NT" GOTO END
:: Disable HomeGroup Listener [HomeGroupListener] service:
ECHO Y|NET.EXE STOP HomeGroupListener
SC.EXE CONFIG HomeGroupListener START= disabled
:: Disable HomeGroup Provider [HomeGroupProvider] service:
ECHO Y|NET.EXE STOP HomeGroupProvider
SC.EXE CONFIG HomeGroupProvider START= disabled
:END
EXIT
------End cut & paste here------
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B4FB3F98-C1EA-428d-A78A-D1F5659CBA93}]
"System.IsPinnedToNameSpaceTree"=dword:0
; WOW6432Node registry subkey exists only in Windows NTx 64-bit (x64):
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B4FB3F98-C1EA-428d-A78A-D1F5659CBA93}]
"System.IsPinnedToNameSpaceTree"=dword:0
[HKEY_CURRENT_USER\Software\Classes\CLSID\{B4FB3F98-C1EA-428d-A78A-D1F5659CBA93}]
"System.IsPinnedToNameSpaceTree"=dword:0
; WOW6432Node registry subkey exists only in Windows NTx 64-bit (x64):
[HKEY_CURRENT_USER\Software\Classes\Wow6432Node\CLSID\{B4FB3F98-C1EA-428d-A78A-D1F5659CBA93}]
"System.IsPinnedToNameSpaceTree"=dword:0
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\HomeGroup\SharingInProgress]
"SharingInProgress"=dword:0
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\HomeGroup]
"AlwaysStuffAlphaCreds"=dword:0
"ShareBannerCount"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\HomeGroupListener]
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\HomeGroupListener]
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\HomeGroupListener]
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\HomeGroupProvider]
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\HomeGroupProvider]
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\HomeGroupProvider]
"Start"=dword:4
;
------End cut & paste here------
Turn OFF these 2 HomeGroup related Function Discovery services (optional): Function Discovery Provider Host [fdPHost]
[%WinDir%\SYSTEM32\fdPHost.dll] + Function Discovery Resource Publication [FDResPub] [%WinDir%\SYSTEM32\fdrespub.dll]:
http://batcmd.com/windows/10/services/fdphost/
http://batcmd.com/windows/10/services/fdrespub/
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text BATch (.bat) or CoMmanD (.cmd) script file containing the lines between Cut & Paste delimiters below
-> save it as plain text/ASCII file (Encode: -> ANSI) with the BAT (.bat) or CMD (.cmd) extension -> right-click it ->
Run as Administrator -> wait for completion.
-----Begin cut & paste here-----
@ECHO OFF
IF NOT "%OS%"=="Windows_NT" GOTO END
:: Disable Function Discovery Provider Host [fdPHost] service:
ECHO Y|NET.EXE STOP fdPHost
SC.EXE CONFIG fdPHost START= disabled
:: Disable Function Discovery Resource Publication [FDResPub] service:
ECHO Y|NET.EXE STOP FDResPub
SC.EXE CONFIG FDResPub START= disabled
:END
EXIT
------End cut & paste here------
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\fdPHost]
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\fdPHost]
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\fdPHost]
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\FDResPub]
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\FDResPub]
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\FDResPub]
"Start"=dword:4
;
------End cut & paste here------

* Automatically install recommended drivers/updates for your hardware/devices:
http://support.microsoft.com/help/15054/

* .MSI/.MSP/.MSU Installer (%WinDir%\SYSTEM32\MSIEXEC.EXE) Command Line Options:
http://learn.microsoft.com/windows/desktop/msi/command-line-options/
http://msdn.microsoft.com/library/aa367988.aspx
http://msdn.microsoft.com/library/aa372024.aspx
http://helpnet.installshield.com/installshield21helplib/helplibrary/IHelpCmdLineMSI.htm
http://www.silentinstall.org/msiexec/

* Remove Breadcrumbs Bar from Explorer in Windows 7/newer:
http://twigstechtips.blogspot.com/2010/02/win7-remove-windows-explorer.html
http://www.winaero.com/show-full-path-address-bar-windows-10-file-explorer/

* Windows DOS console command (prompt) line, commands, command line tools + scripting:
http://learn.microsoft.com/windows-server/administration/windows-commands/windows-commands/
http://technet.microsoft.com/library/cc754340.aspx
http://learn.microsoft.com/windows-server/administration/windows-commands/cmd/
http://www.microsoft.com/download/details.aspx?id=56846
http://download.microsoft.com/download/5/8/9/58911986-D4AD-4695-BF63-F734CD4DF8F2/ws-commands.pdf
http://web.archive.org/web/20071014001728/http://technet2.microsoft.com:80/windowsserver/en/library/552ed70a-208d-48c4-8da8-2e27b530eac71033.mspx
http://www.bleepingcomputer.com/tutorials/windows-command-prompt-introduction/
http://www.ss64.com/nt/
http://www.ss64.com/nt/commands.html
http://www.ss64.com/nt/cmd.html
http://www.ss64.com/nt/run.html
http://www.ss64.com/nt/set.html
http://www.ss64.com/nt/setx.html
http://www.ionos.com/digitalguide/server/know-how/windows-cmd-commands/
http://www.bytescout.com/blog/windows-command-prompt-commands.html
http://www.c3scripts.com/tutorials/msdos/commands.html
http://www.robvanderwoude.com/
http://www.ccm.net/faq/403-command-prompts-for-windows/
http://www.lifewire.com/list-of-4092302/
http://www.lifewire.com/dos-commands-4070427/
http://en.wikipedia.org/wiki/List_of_DOS_commands

* Link Directory IDentifier (LDID)/DIRectory IDentifier (DIRID)/Decentralized IDentifier (DID)/Globally Unique IDentifier
(GUID)/Universaly Unique IDentifier (UUID) built-in/hard linked/encrypted 128-bit unique reference numbers used in Windows
API (Application Programming Interface) to identify for example system, localized + user special directories/folders
names/values in Windows 9x/NTx OSes (conventions used in INF/MSI installation/reference files/scripts, registry keys/values,
API/NET programming, driver/hardware/internet/networking identification, etc):
http://learn.microsoft.com/dotnet/api/system.environment.specialfolder/
http://learn.microsoft.com/windows-hardware/drivers/install/using-dirids/
http://learn.microsoft.com/windows/win32/shell/knownfolderid/
http://learn.microsoft.com/windows/win32/shell/csidl/
http://w3c-ccg.github.io/did-primer/
http://guid.one/guid/
http://en.wikipedia.org/wiki/Decentralized_identifier
http://en.wikipedia.org/wiki/Universally_unique_identifier
Examples of System (machine wide, all users) + User (only current/logged on user) special directories/folders registry
values [some are unique to specific Windows NTx OS builds/editions/releases/updates/versions]:
Desktop         {B4BFCC3A-DB2C-424C-B029-7FE99A87C641}
This PC         {0AC0837C-BBF8-452A-850D-79D08E667CA7}
Downloads       {374DE290-123F-4565-9164-39C4925E467B}
Documents       {FDD39AD0-238F-46AF-ADB4-6C85480369C7}
Local Downloads {7d83ee9b-2244-4e70-b1f5-5393042af1e4}
3D Objects      {31C0DD25-9439-4F12-BF41-7FF4EDA38722}
My Music        {4BD8D571-6D19-48D3-BE97-422220080E43}
Local Pictures  {0ddd015d-b06c-45d5-8c4c-f59713854639}
My Pictures     {33E28130-4E1E-4676-835A-98395C3BC3BB}
Local Music     {a0c69a99-21c8-4671-8703-7934162fcf1d}
My Video        {18989B1D-99B5-455B-841C-AB7C74E4DDFC}
Personal        {FDD39AD0-238F-46AF-ADB4-6C85480369C7}
Local Documents {f42ee2d3-909f-4907-8871-4c22fc0bf756}
Local Videos    {35286a68-3c57-41a1-bbb1-0eae73d76c95}
MDGx "INF Setup files" topic in SOFTWARE.TXT (included):
http://www.mdgx.com/add.htm#INF
MDGx "INF Guide" topic in SOFTWARE.TXT (included):
http://www.mdgx.com/INF_web/
Value	Destination Directory/Folder
————————————————————————————————————
01	Source Drive_Letter:\Pathname = the directory the INF file is installed from
10	Windows directory = equivalent to %WinDir%
11	System directory = equivalent to %WinDir%\SYSTEM32 for NT based (NTx) OSes and to %WinDir%\SYSTEM for Windows 9x/ME
12	Drivers directory = equivalent to %WinDir%\SYSTEM32\DRIVERS for NT based (NTx) OSes and to %WinDir%\SYSTEM\IoSubsys
	on Windows 9x/ME
17	INF file directory
18	Help directory
20	Fonts directory
21	Viewers directory
23	Color directory (ICM) = not used for installing printer drivers
24	Root directory of the system disk = root directory of disk on which Windows files are installed = example: if
	DIRID 10 is C:\WINDOWS then DIRID 24 is C:\ root
25	Shared directory
30	Root directory of the boot disk known as "ARC system partition" for NT based (NTx) OSes = may or may not be same
	directory as the one represented by DIRID 24
50	System directory for NT based (NTx) OSes = equivalent to %WinDir%\system = NT based (NTx) OSes only
51	Spool directory = not used for installing printer drivers: see Printer DIRIDs
52	Spool drivers directory = not used for installing Printer drivers
53	User profile directory
54	Directory where ntldr.exe and osloader.exe are located = NT based (NTx) OSes only
55	Print processors directory = not used for installing Printer drivers
-1	Absolute path (hard link)
More info:
http://en.wikipedia.org/wiki/Hard_link
http://en.wikipedia.org/wiki/Symbolic_link#Microsoft_Windows
http://en.wikipedia.org/wiki/Symbolic_link#Shell_objects
DIRID values from 16384 through 32767 are reserved for special Shell Folders.
Examples of special directories/folders DIRID values and their correspondent locations:
http://learn.microsoft.com/dotnet/api/system.environment.specialfolder/
http://en.wikipedia.org/wiki/Special_folder#List_of_special_folders
http://www.nirsoft.net/articles/find_special_folder_location.html
http://livecode.fandom.com/wiki/SpecialFolderPath
http://commandwindows.com/windows7-shell-commands.htm
http://johnkoerner.com/csharp/special-folder-values-on-windows-versus-mac/
Value	Shell Special Directory/Folder
——————————————————————————————————————
16406	All Users\Start Menu
16407	All Users\Start Menu\Programs
16408	All Users\Start Menu\Programs\Startup
16409	All Users\Desktop
16415	All Users\Favorites
16419	All Users\Application Data
16422	Program Files
16425	%WinDir%\SYSTEM32 = valid for Win32 user mode applications running under Windows 32-bit/x86 on Windows 64-bit/x64
(WoW64)
16426	Program Files = valid for Win32 user mode applications running under Windows 64-bit/x64 (WoW64)
16427	Program Files\Common
16428	Program Files\Common = valid for Win32 user mode applications running under Windows 64-bit/x64 (WoW64)
16429	All Users\Templates
16430	All Users\Documents
See also "XP -> 7/8/8.1 Easy Transfer Files + Settings" chapter + "* List of System (machine wide, all users) + User (only
current/logged on user) Shell Folders in Windows Vista/newer:" topic in WINDOWS7.TXT (this file) -> further below:
http://www.mdgx.com/7.php
http://www.mdgx.com/WINDOWS7.TXT

* Turn ON Automatic Logon [AutoAdminLogon registry REG_SZ (String) value] for (default) admin(istrator)/main/principal
user/owner/sysadmin + logon into your computer/device/portable automatically without the need for typing in your user name +
password every time (enable passwordless function) in Windows 7/newer:
http://www.partitionwizard.com/clone-disk/disable-login-screen-windows-10.html
http://learn.microsoft.com/troubleshoot/windows-server/user-profiles-and-logon/turn-on-automatic-logon/
http://quicklaunch.ucworkspace.com/support/solutions/articles/3000053152/
http://www.tenforums.com/tutorials/3539-sign-user-account-automatically-windows-10-startup.html
http://www.tenforums.com/tutorials/138564-enable-disable-passwordless-sign-microsoft-accounts.html
http://www.winaero.com/enable-passwordless-sign-in-for-microsoft-accounts/
http://mashtips.com/set-auto-login-windows-10/
http://support.microsoft.com/help/324737/
See also "BYPASS AUTOLOGON" topic in TIPS2000.TXT (included):
http://www.mdgx.com/2k1.htm#BAIW
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"AutoAdminLogon"="1"
; WOW6432Node registry subkey exists only in Windows NTx 64-bit (x64):
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon]
"AutoAdminLogon"="1"
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\PasswordLess\Device]
"DevicePasswordLessBuildVersion"=dword:2
; WOW6432Node registry subkey exists only in Windows NTx 64-bit (x64):
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\PasswordLess\Device]
"DevicePasswordLessBuildVersion"=dword:2
;
------End cut & paste here------
Autologon 32-bit + 64-bit GUI interface + DOS console command line (Autologon.exe 32-bit + Autologon64.exe 64-bit) tools
automate/configure/enable/disable Windows built-in auto-logon for users with Administrator level
credentials/privileges/rights:
http://learn.microsoft.com/sysinternals/downloads/autologon/
File:
http://download.sysinternals.com/files/AutoLogon.zip

* Turn OFF deprecated/obsolete Microsoft proprietary SMB (Server Message Block) 1.0 (SMB1) + CIFS (Common Internet File
System) file sharing support network protocols (which are disabled by default in Windows 8/newer + Windows Server 2012/newer
and replaced with newer SMB versions) due to (until recently!) unpatched security vulnerabilities in Windows 7/newer:
http://arstechnica.com/information-technology/2022/12/critical-windows-code-execution-vulnerability-went-undetected-until-now/
http://arstechnica.com/gadgets/2022/04/microsoft-enters-final-phase-of-disabling-smb1-file-sharing-in-windows-11/
http://learn.microsoft.com/windows-server/storage/file-server/troubleshoot/smbv1-not-installed-by-default-in-windows/
http://woshub.com/how-to-disable-smb-1-0-in-windows-10-server-2016/
http://en.wikipedia.org/wiki/Server_Message_Block
UPDATE:
List of all available Security Vulnerability Updates for all affected Windows NTx editions + versions:
http://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37958/#securityUpdates
Make sure all SMB1/CIFS protocols are disabled in Optional Windows Features Manager: Start -> Run... [hold WinKey + press R]
-> make sure it states "This task will be created with administrative privileges." -> type:
OptionalFeatures.exe
-> press Enter -> scroll down to SMB 1.0/CIFS File Sharing Support -> click all [+] signs to open submenu list -> make sure
to UNcheck all (3) square boxes -> click OK button.
Or in PowerShell: right-click PowerShell shortcut or C:\WINDOWS\System32\WindowsPowerShell\v1.0\PowerShell.exe [default
location] -> Run as Administrator -> run 1 of these commands -> press Enter after each line:
Uninstall-WindowsFeature -Name FS-SMB1 -Remove
OR:
Disable-WindowsOptionalFeature -Online -FeatureName SMB1Protocol -Remove
Verify to make sure all SMB1 protocols are disabled: from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]:
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter:
DISM.EXE /online /Get-Features /format:table | find "SMB1Protocol"
-> make sure all (4) messages show "Disabled".
DISM (Deployment Image Servicing and Management) [DISM.EXE] executable is located in the %WinDir%\SYSTEM32 directory/folder
[%WinDir% = usually C:\WINDOWS].
View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]:
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command
PATH
-> press Enter.

* Hide (currently) disabled/disconnected/empty/inactive/orphan/phantom/remote/removed/unavailable drives/partitions/volumes
in Explorer, File Manager (FM) + 3rd party replacements/similar tools and turn OFF "Could not reconnect all network drives"
notification:
http://www.sevenforums.com/tutorials/6969-drives-hide-show-empty-drives-computer-folder.html
http://www.tenforums.com/tutorials/145379-disable-could-not-reconnect-all-network-drives-notification-windows.html
http://www.winaero.com/blog/disable-could-not-reconnect-all-network-drives-notification-in-windows-10/
MDGx "Tweaked + Customized File Manager (FM) 32-bit" section in SOFTWARE.TXT (included):
http://www.mdgx.com/xptoy.htm#FMNT
Microsoft open source original File Manager (FM) 32-bit + 64-bit:
http://www.mdgx.com/xptoy.htm#FMMS
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced]
"HideDrivesWithNoMedia"=-
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced]
"HideDrivesWithNoMedia"=dword:1
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced]
"HideDrivesWithNoMedia"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\NetworkProvider]
"RestoreConnection"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\NetworkProvider]
"RestoreConnection"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Control\NetworkProvider]
"RestoreConnection"=dword:0
;
------End cut & paste here------

* Show (previously) disabled/disconnected/empty/inactive/orphan/phantom/remote/removed/unavailable drives/partitions/volumes
in Explorer, File Manager (FM) + 3rd party replacements/similar tools and turn ON "Could not reconnect all network drives"
notification:
http://www.sevenforums.com/tutorials/6969-drives-hide-show-empty-drives-computer-folder.html
http://www.tenforums.com/tutorials/145379-disable-could-not-reconnect-all-network-drives-notification-windows.html
http://www.winaero.com/blog/disable-could-not-reconnect-all-network-drives-notification-in-windows-10/
MDGx "Tweaked + Customized File Manager (FM) 32-bit" section in SOFTWARE.TXT (included):
http://www.mdgx.com/xptoy.htm#FMNT
Microsoft open source original File Manager (FM) 32-bit + 64-bit:
http://www.mdgx.com/xptoy.htm#FMMS
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced]
"HideDrivesWithNoMedia"=-
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced]
"HideDrivesWithNoMedia"=dword:0
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced]
"HideDrivesWithNoMedia"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\NetworkProvider]
"RestoreConnection"=-
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\NetworkProvider]
"RestoreConnection"=-
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Control\NetworkProvider]
"RestoreConnection"=-
;
------End cut & paste here------

* UNhide file/folder (directory)/protocol/shortcut/link extensions in Windows NTx (examples):
http://www.winaero.com/blog/show-hide-file-extensions-windows-10/
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Directory]
"AlwaysShowExt"=""
"EditFlags"=hex:01
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Drive]
"AlwaysShowExt"=""
"EditFlags"=hex:01
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Folder]
"AlwaysShowExt"=""
"EditFlags"=hex:01
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\*]
"AlwaysShowExt"=""
"EditFlags"=hex:01
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\exefile]
"AlwaysShowExt"=""
"EditFlags"=hex:01
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\dllfile]
"AlwaysShowExt"=""
"EditFlags"=hex:01
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{450D8FBA-AD25-11D0-98A8-0800361B1103}]
"AlwaysShowExt"=""
"EditFlags"=hex:01
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}]
"AlwaysShowExt"=""
"EditFlags"=hex:01
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{59031A47-3F72-44A7-89C5-5595FE6B30EE}]
"AlwaysShowExt"=""
"EditFlags"=hex:01
;
------End cut & paste here------

* Reorder files + directories/folders names alphabetically by their logical numeric value in Windows XP/newer:
http://www.tenforums.com/tutorials/91417-enable-disable-numerical-sorting-file-explorer-windows-10-a.html
http://admx.help/?Category=Windows_10_2016&Policy=Microsoft.Policies.WindowsExplorer::NoStrCmpLogical
http://web.archive.org/web/20150226105024/http://support.microsoft.com/kb/319827/
See "SYSTEM RESTRICTIONS" chapter in REGISTRY.TXT (included):
http://www.mdgx.com/newtip9.htm#RESTRICT
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer]
"NoStrCmpLogical"=dword:1
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]
"NoStrCmpLogical"=dword:1
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]
"NoStrCmpLogical"=dword:1
;
------End cut & paste here------

* Turn OFF/ON all AutoPlay [+ Display/PlayBack] settings for all
available/configured/connected/installed/linked/local/networked/remote/removable cards/devices/discs/disks/media/sticks
drives/partitions/volumes + apps/programs/software/services in Windows 7/newer:
http://www.top-password.com/blog/4-ways-to-disable-windows-10-autoplay/
http://www.winaero.com/disable-autoplay-for-all-drives-in-windows-10/
1. Control Panel (CP) or Windows Settings (WS):
- Windows 10/11 users:
Start button/icon/logo/menu/orb -> (Windows) Settings (WS) [gear icon] -> Devices -> AutoPlay.
OR: Run... [hold WinKey + press R] -> type this command:
EXPLORER.EXE ms-settings:autoplay
-> press Enter.
- Windows 7/8/8.1 users:
Start button/icon/logo/menu/orb -> Control Panel (CP) OR Run... [hold WinKey + press R] -> type this command:
CONTROL.EXE
-> press Enter -> All Control Panel Items -> AutoPlay.
OR: Run... [hold WinKey + press R] -> type this command:
CONTROL.EXE /name Microsoft.AutoPlay
-> press Enter.
Control Panel [CONTROL.EXE] executable is located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually C:\WINDOWS].
View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]:
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command
PATH
-> press Enter.
All Windows 7/newer users: customize settings +/- turn OFF/ON AutoPlay according to your needs/preferences.
2. Turn OFF AutoPlay [+ Display/PlayBack] globally on your computer for all
available/configured/connected/installed/linked/local/networked/remote/removable cards/devices/discs/disks/media/sticks
drives/partitions/volumes -> see "HIDE YOUR DRIVES!" topic in REGISTRY.TXT (included):
http://www.mdgx.com/newtip14.htm#HW9XD
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer]
"NoDriveTypeAutoRun"=dword:03ffffff
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]
"NoDriveTypeAutoRun"=dword:03ffffff
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]
"NoDriveTypeAutoRun"=dword:03ffffff
;
------End cut & paste here------
3. Turn OFF all AutoPlay [+ Display/PlayBack] settings for current (logged on/signed in) user + all other users (if more
than 1) using same computer/device/portable:
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers]
"DisableAutoplay"=dword:1
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers]
"DisableAutoplay"=dword:1
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers]
"DisableAutoplay"=dword:1
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\AutorunINFLegacyArrival]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\CameraAlternate]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\CameraAlternate\ShowPicturesOnArrival]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\HandleBDBurningOnArrival]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\HandleCDBurningOnArrival]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\HandleDVDBurningOnArrival]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\MixedContentOnArrival]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\PlayBluRayOnArrival]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\PlayCDAudioOnArrival]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\PlayDVDAudioOnArrival]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\PlayDVDMovieOnArrival]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\PlayEnhancedCDOnArrival]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\PlayEnhancedDVDOnArrival]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\PlayMusicFilesOnArrival]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\PlaySuperVideoCDMovieOnArrival]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\PlayVideoCDMovieOnArrival]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\PlayVideoFilesOnArrival]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\ShowPicturesOnArrival]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\StorageOnArrival]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\WPD\ImageSource]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\AutorunINFLegacyArrival]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\CameraAlternate]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\CameraAlternate\ShowPicturesOnArrival]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\HandleBDBurningOnArrival]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\HandleCDBurningOnArrival]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\HandleDVDBurningOnArrival]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\MixedContentOnArrival]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\PlayBluRayOnArrival]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\PlayCDAudioOnArrival]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\PlayDVDAudioOnArrival]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\PlayDVDMovieOnArrival]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\PlayEnhancedCDOnArrival]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\PlayEnhancedDVDOnArrival]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\PlayMusicFilesOnArrival]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\PlaySuperVideoCDMovieOnArrival]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\PlayVideoCDMovieOnArrival]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\PlayVideoFilesOnArrival]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\ShowPicturesOnArrival]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\StorageOnArrival]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\WPD\ImageSource]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\AutorunINFLegacyArrival]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\CameraAlternate]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\CameraAlternate\ShowPicturesOnArrival]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\HandleBDBurningOnArrival]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\HandleCDBurningOnArrival]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\HandleDVDBurningOnArrival]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\MixedContentOnArrival]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\PlayBluRayOnArrival]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\PlayCDAudioOnArrival]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\PlayDVDAudioOnArrival]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\PlayDVDMovieOnArrival]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\PlayEnhancedCDOnArrival]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\PlayEnhancedDVDOnArrival]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\PlayMusicFilesOnArrival]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\PlaySuperVideoCDMovieOnArrival]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\PlayVideoCDMovieOnArrival]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\PlayVideoFilesOnArrival]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\ShowPicturesOnArrival]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\StorageOnArrival]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\WPD\ImageSource]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\AutorunINFLegacyArrival]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\CameraAlternate]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\CameraAlternate\ShowPicturesOnArrival]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\HandleBDBurningOnArrival]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\HandleCDBurningOnArrival]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\HandleDVDBurningOnArrival]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\MixedContentOnArrival]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\PlayBluRayOnArrival]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\PlayCDAudioOnArrival]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\PlayDVDAudioOnArrival]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\PlayDVDMovieOnArrival]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\PlayEnhancedCDOnArrival]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\PlayEnhancedDVDOnArrival]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\PlayMusicFilesOnArrival]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\PlaySuperVideoCDMovieOnArrival]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\PlayVideoCDMovieOnArrival]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\PlayVideoFilesOnArrival]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\ShowPicturesOnArrival]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\StorageOnArrival]
@="MSTakeNoAction"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\WPD\ImageSource]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\AutorunINFLegacyArrival]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\CameraAlternate]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\CameraAlternate\ShowPicturesOnArrival]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\HandleBDBurningOnArrival]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\HandleCDBurningOnArrival]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\HandleDVDBurningOnArrival]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\MixedContentOnArrival]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\PlayBluRayOnArrival]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\PlayCDAudioOnArrival]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\PlayDVDAudioOnArrival]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\PlayDVDMovieOnArrival]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\PlayEnhancedCDOnArrival]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\PlayEnhancedDVDOnArrival]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\PlayMusicFilesOnArrival]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\PlaySuperVideoCDMovieOnArrival]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\PlayVideoCDMovieOnArrival]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\PlayVideoFilesOnArrival]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\ShowPicturesOnArrival]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\StorageOnArrival]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\WPD\ImageSource]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\AutorunINFLegacyArrival]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\CameraAlternate]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\CameraAlternate\ShowPicturesOnArrival]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\HandleBDBurningOnArrival]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\HandleCDBurningOnArrival]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\HandleDVDBurningOnArrival]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\MixedContentOnArrival]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\PlayBluRayOnArrival]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\PlayCDAudioOnArrival]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\PlayDVDAudioOnArrival]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\PlayDVDMovieOnArrival]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\PlayEnhancedCDOnArrival]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\PlayEnhancedDVDOnArrival]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\PlayMusicFilesOnArrival]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\PlaySuperVideoCDMovieOnArrival]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\PlayVideoCDMovieOnArrival]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\PlayVideoFilesOnArrival]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\ShowPicturesOnArrival]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\StorageOnArrival]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\WPD\ImageSource]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\AutorunINFLegacyArrival]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\CameraAlternate]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\CameraAlternate\ShowPicturesOnArrival]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\HandleBDBurningOnArrival]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\HandleCDBurningOnArrival]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\HandleDVDBurningOnArrival]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\MixedContentOnArrival]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\PlayBluRayOnArrival]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\PlayCDAudioOnArrival]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\PlayDVDAudioOnArrival]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\PlayDVDMovieOnArrival]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\PlayEnhancedCDOnArrival]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\PlayEnhancedDVDOnArrival]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\PlayMusicFilesOnArrival]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\PlaySuperVideoCDMovieOnArrival]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\PlayVideoCDMovieOnArrival]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\PlayVideoFilesOnArrival]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\ShowPicturesOnArrival]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\StorageOnArrival]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\WPD\ImageSource]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\AutorunINFLegacyArrival]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\CameraAlternate]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\CameraAlternate\ShowPicturesOnArrival]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\HandleBDBurningOnArrival]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\HandleCDBurningOnArrival]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\HandleDVDBurningOnArrival]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\MixedContentOnArrival]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\PlayBluRayOnArrival]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\PlayCDAudioOnArrival]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\PlayDVDAudioOnArrival]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\PlayDVDMovieOnArrival]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\PlayEnhancedCDOnArrival]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\PlayEnhancedDVDOnArrival]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\PlayMusicFilesOnArrival]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\PlaySuperVideoCDMovieOnArrival]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\PlayVideoCDMovieOnArrival]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\PlayVideoFilesOnArrival]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\ShowPicturesOnArrival]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\StorageOnArrival]
@="MSTakeNoAction"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\WPD\ImageSource]
@="MSTakeNoAction"
;
------End cut & paste here------

* Turn OFF annoying boot/logon/startup/launch sounds in Windows 7/newer:
http://www.tenforums.com/tutorials/61302-turn-off-startup-sound-windows-10-a.html
Winaero Tweaker 32-bit + 64-bit for Windows 7/8/8.1/10/11 [select Portable at install time!]:
http://www.winaero.com/winaero-tweaker/
Download:
http://www.winaero.com/download-winaero-tweaker/
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\LogonUI\BootAnimation]
"DisableStartupSound"=dword:1
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Authentication\LogonUI\BootAnimation]
"DisableStartupSound"=dword:1
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Authentication\LogonUI\BootAnimation]
"DisableStartupSound"=dword:1
;
------End cut & paste here------

* Turn OFF *all* annoying Desktop/Explorer/system/event/notification/app/program/scheduled task + boot/logon/startup/launch
sounds + rename/delete/disable the "Media" directory/folder in Windows 7/newer:
http://www.howtogeek.com/howto/windows-vista/turn-off-windows-explorer-click-sounds-in-windows-vista/
http://www.eightforums.com/threads/delete-windows-7-sound-schemes.79731/
http://freewindowsvistatutorials.com/whereIsSoundFolderLocationSystemSoundsMediaInWindows7.php
1. 1st backup these 2 registry subkeys + save them as REG files (see examples below): HKCU (Current User) "AppEvents" + HKU
.DEFAULT (Default User) "AppEvents": right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run these commands -> press
Enter after each line (example):
REG.EXE EXPORT "HKCU\AppEvents" HKCU_AppEvents.reg /y
REG.EXE EXPORT "HKU\.DEFAULT\AppEvents" HKU_DEF_AppEvents.reg /y
To restore original sounds events from registry files above (assuming you're running them from within their location,
otherwise you must add full path: drive letter + directory/folder name in front of them): right-click CMD shortcut/CMD.EXE ->
Run as Administrator -> run these commands -> press Enter after each line (example):
REG.EXE IMPORT HKCU_AppEvents.reg /y
REG.EXE IMPORT HKU_DEF_AppEvents.reg /y
2. Run Registry file below:
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[-HKEY_CURRENT_USER\AppEvents]
[-HKEY_USERS\.DEFAULT\AppEvents]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\LogonUI\BootAnimation]
"DisableStartupSound"=dword:1
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Authentication\LogonUI\BootAnimation]
"DisableStartupSound"=dword:1
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Authentication\LogonUI\BootAnimation]
"DisableStartupSound"=dword:1
;
------End cut & paste here------
3. Optional: if you plan never to use any Windows system events sounds in the future, you can safely rename or delete (to save
a little bit of space) [but back it up 1st!] the "Media" Windows subfolder which holds all Windows sound files (.mid, .rmi,
.wav): right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run these commands -> press Enter after each line (example):
- to rename it:
TAKEOWN.EXE /f "%WinDir%\Media" /r /d y
ICACLS.EXE "%WinDir%\Media" /grant:R Everyone:F /t /c /q
TASKKILL.EXE /IM TrustedInstaller.exe /F /T
REN "%WinDir%\Media" "Media.BKP"
- to delete it:
TAKEOWN.EXE /f "%WinDir%\Media" /r /d y
ICACLS.EXE "%WinDir%\Media" /grant:R Everyone:F /t /c /q
TASKKILL.EXE /IM TrustedInstaller.exe /F /T
RUNDLL32.EXE ADVPACK.DLL,DelNodeRunDLL32 "%WinDir%\Media"
OR instead of RUNDLL32.EXE command above:
RMDIR /S /Q "%WinDir%\Media"
ICACLS.EXE:
http://www.ss64.com/nt/icacls.html
http://learn.microsoft.com/windows-server/administration/windows-commands/icacls/
http://adamtheautomator.com/icacls/
TAKEOWN.EXE:
http://www.ss64.com/nt/takeown.html
http://learn.microsoft.com/windows-server/administration/windows-commands/takeown/

* Turn OFF laptop/netbook/notebook/portable built-in touchpad (mouse-like pointer hardware device) when connecting/using
bluetooth/external/USB/wireless mouse/pointing device in Windows 7/newer:
http://www.tenforums.com/tutorials/111633-disable-touchpad-when-mouse-connected-windows-10-a.html
http://answers.microsoft.com/en-us/windows/forum/all/how-to-disable-touchpad-when-connecting-the-mouse/5bbd5729-577f-474d-aca5-0900182f6367
http://www.makeuseof.com/ways-to-disable-touchpad-in-windows-10/
http://www.alphr.com/disable-touchpad-windows/
http://helpdeskgeek.com/windows-10/fix-cant-disable-touchpad-in-windows-10/
http://appuals.com/how-to-turn-off-touchpad-windows-10/
Your built-in touchpad Device Manager hardware device name may be different depending on brand + model.
Most touchpads are manufactured by ASUS, Elan, Intel, Precision, Synaptics (examples):
Start button/icon/logo/menu/orb -> Run... [hold WinKey + press R] -> type
DevMgmt.msc
-> press Enter -> Device Manager -> Human Interface Devices OR Mice and other pointing devices -> HID-compliant mouse [->
General tab -> Location: -> on... should be 1 of the devices listed here] OR (Intel) I2C HID Device, or ASUS Precision
Touchpad, or ELAN Touchpad, or ELAN Input Device, or Synaptics (SMBus) TouchPad, or Precision touchpad -> Driver tab ->
Disable Device -> OK.
Device Manager MMC (Microsoft Management Console) snap-in control [DevMgmt.msc] is located in the %WinDir%\SYSTEM32
directory/folder [%WinDir% = usually C:\WINDOWS].
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Elantech\Othersetting]
"DisableWhenDetectUSBMouse"=dword:1
[HKEY_CURRENT_USER\Software\Elantech\Othersetting]
"DisableWhenDetectUSBMouse"=dword:1
[HKEY_USERS\.DEFAULT\Elantech\Othersetting]
"DisableWhenDetectUSBMouse"=dword:1
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\PrecisionTouchPad]
"LeaveOnWithMouse"=dword:0
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\PrecisionTouchPad]
"LeaveOnWithMouse"=dword:0
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\PrecisionTouchPad]
"LeaveOnWithMouse"=dword:0
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\PrecisionTouchPad\Status]
"Enabled"=dword:0
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\PrecisionTouchPad\Status]
"Enabled"=dword:0
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\PrecisionTouchPad\Status]
"Enabled"=dword:0
[HKEY_LOCAL_MACHINE\SOFTWARE\Synaptics\SynTPEnh]
"DisableIntPDFeature"=dword:33
[HKEY_CURRENT_USER\Software\Synaptics\SynTPEnh]
"DisableIntPDFeature"=dword:33
[HKEY_USERS\.DEFAULT\Software\Synaptics\SynTPEnh]
"DisableIntPDFeature"=dword:33
;
------End cut & paste here------
Touchpad Blocker prevents accidental clicks + key presses on laptops/notebooks/portables equipped with touchpads by
automatically blocking mouse events:
http://www.softpedia.com/get/Desktop-Enhancements/Other-Desktop-Enhancements/Touchpad-Blocker.shtml
File:
http://www.majorgeeks.com/files/details/touchpad_blocker.html
Similar Tools:
http://www.raymond.cc/blog/touchfreeze-disables-laptop-touchpad-when-typing/
http://www.geckoandfly.com/7011/how-to-disable-your-acer-dell-hp-or-toshiba-laptops-touchpad-for-windows-and-ubuntu/

* Add app(lication)/EXEcutable (.exe)/program manifest support for all Windows Vista/newer builds/editions/releases/versions
in order to improve/increase/optimize compatibility with (partially) compatible/supported and eventually
incompatible/unsupported EXEcutables (.exe) built/coded/designed/programmed for different/older/previous Windows 9x/NTx
operating systems (OSes):
http://learn.microsoft.com/windows/win32/sysinfo/targeting-your-application-at-windows-8-1/
http://learn.microsoft.com/windows/compatibility/application-executable-manifest/
http://learn.microsoft.com/windows/win32/sbscs/application-manifests/
http://learn.microsoft.com/windows/win32/win7appqual/compatibility---application-manifest/
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create (if absent) or edit/modify (if already present) the .manifest file correspondent to your .exe file, which must
reside inside same directory/folder as your .exe file, and which should contain the lines between Cut & Paste delimiters
below the opening "" or "" tag (if present), and above the closing ""
tag (if present) -> save it as plain text/ASCII file (Encode: -> ANSI) with the same file name to match your executable
(.exe) file name, and followed by the manifest (.manifest) file extension (example): if executable (.exe) file is
"winfile.exe", its corresponding manifest (.manifest) file must be "winfile.exe.manifest" (case insensitive):
-----Begin cut & paste here-----














------End cut & paste here------
In this example I have used MDGx Tweaked + Customized File Manager (FM = WINFILE.EXE) 32-bit:
http://www.mdgx.com/xptoy.htm#FMNT
More info:
http://www.mdgx.com/fmnt32/fmnt32.php
Go to this page
http://www.mdgx.com/fmnt32/
-> scroll all the way down to WINFILE.EXE.manifest -> right-click its URL/URI address/item/link/scheme/shortcut
http://www.mdgx.com/fmnt32/WINFILE.EXE.manifest
-> Save link as... -> go to your web browser Downloads tab/window -> if using Chromium/Chrome [or fork/variant] go to
chrome://downloads/
OR if using Firefox [or fork/variant] go to
about:downloads
-> click Keep (if prompted to do so) -> click Keep anyway (if prompted to do so) -> go to your Downloads directory/folder
[default is %UserProfile%\Downloads or C:\Users\%UserName%\Downloads = where %UserName% is your user name] -> use
Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to view saved WINFILE.EXE.manifest (this example).

* Configure/Install/Tweak Dark (Night) Mode [High Contrast] + Dark (Night) Mode [Theme Patchers] Themes in Windows 7/8/8.1:
http://www.makeuseof.com/tag/10-dark-windows-themes-skins-reduce-eye-strain/
http://www.deviantart.com/creativ-xtreme/gallery/?set=40540051&offset=16
http://www.deviantart.com/ezio/art/418541637
http://www.winaero.com/light-dark-theme-windows-10/
http://download.microsoft.com/download/1/5/4/154E922A-7744-4474-A95A-5BDC043CDBBE/LightDarkNickBoyer.themepack
Themes Patchers, Styles + Tools:
- UltraUXThemePatcher 32-bit + 64-bit for Windows XP/Vista/7/8/8.1/10/11 patches UX (User eXperience) Theme system files
[uxtheme.dll, uxinit.dll, themeui.dll] to allow use of 3rd party/custom themes:
http://mhoefs.eu/software_uxtheme.php
UltraUXThemePatcher Guide:
http://setupgamer.info/how-to-install-custom-windows-10-themes-and-visual-styles-with-ultrauxthemepatcher/
UltraUXThemePatcher Tutorial:
http://www.tenforums.com/customization/76077-ultrauxthemepatcher-recover-black-grey-screen-windows-8-10-a.html
Windows 7/newer Themes:
http://www.majorgeeks.com/files/categories/themes.html
Windows 8/8.1 Themes:
http://www.deviantart.com/tag/windows8themes/
Windows 7 Themes:
http://www.deviantart.com/tag/windows7themes/
View + Remove All built-in Windows 10 Themes:
http://www.majorgeeks.com/content/page/how_to_view_and_remove_all_windows_10_themes.html
- SecureUxTheme for Windows 8.1/10 patches UX (User eXperience) Theme system files [uxtheme.dll, uxinit.dll, themeui.dll] to
allow use of 3rd party/custom themes:
http://github.com/namazso/SecureUxTheme/
Download:
http://github.com/namazso/SecureUxTheme/releases/latest/
SecureUxTheme Install Guide:
http://github.com/namazso/SecureUxTheme/wiki/Help:-Step-by-step-installing-SecureUxTheme-and-a-custom-theme/
Windows 7/newer Themes:
http://www.majorgeeks.com/files/categories/themes.html
Windows 8/8.1 Themes:
http://www.deviantart.com/tag/windows8themes/
View + Remove All built-in Windows 10 Themes:
http://www.majorgeeks.com/content/page/how_to_view_and_remove_all_windows_10_themes.html
- UxStyle for Windows 7/8/8.1/10 Preview:
http://www.uxstyle.com/
http://github.com/riverar/uxstyle/
UxStyle for Windows 8/8.1:
http://www.uxstyle.com/builds/UxStyle_sep23_x86_x64_possibly_bugged.zip
UxStyle for Windows 7/7 SP1:
http://www.uxstyle.com/builds/UxStyle_Core_jul13_bits.zip
Aero Theme for Windows 8/8.1:
http://simplexdesignsart.deviantart.com/art/Windows-Aero-536877982/
http://web.archive.org/web/20130402051457/http://xxinightxx.deviantart.com/art/Windows-7-Vs-REV-D-350491112/
File:
http://drive.google.com/uc?export=download&id=0B883uGPmNY72Sjk3dy1MTzBGVEE
http://web.archive.org/web/20130402051457/http://www.deviantart.com/download/350491112/windows_7_vs_rev_d_by_xxinightxx-d5so8o8.zip
Windows 8/8.1 Themes:
http://www.winaero.com/category/windows-8-themes/
- Open-Shell [Classic Shell fork] 32-bit + 64-bit Start Menu + button/icon/logo/orb, Explorer + IE enhancer, replacer,
supports custom skins, buttons/logos, highly customizable:
http://open-shell.github.io/Open-Shell-Menu/
ReadMe:
http://github.com/Open-Shell/Open-Shell-Menu/
Download:
http://github.com/Open-Shell/Open-Shell-Menu/releases/
Open-Shell Guides:
http://askleo.com/open-shell-regain-your-start-menu-in-windows-and-much-more/
http://www.techrepublic.com/article/how-to-use-open-shell-as-your-windows-10-start-menu/
Custom Start button/icon/logo/orb Tutorial:
http://coddec.github.io/Classic-Shell/www.classicshell.net/tutorials/buttontutorial.html
Custom Skin Tutorial:
http://coddec.github.io/Classic-Shell/www.classicshell.net/tutorials/skintutorial.html
Skins:
http://www.winaero.com/best-skins-for-classic-shells-start-menu/
http://www.classicshell.net/gallery/Start-Menu/skins/
http://www.classicshell.net/forum/viewforum.php?f=17
Start Buttons/Orbs:
http://www.classicshell.net/forum/viewforum.php?f=18
http://www.deviantart.com/w1ck3dmatt/art/Mega-Orb-Pack-150-start-orbs-259940654/
http://www.door2windows.com/customization/start-buttons/
Aero Glass mod [Windows 8/8.1 style UI] for Windows 8/8.1/10/11:
http://www.glass8.eu/
"If you only knew the power of the Dark Side." ;-/
http://www.youtube.com/watch?v=esEcwAWi6dk

* List of my all-time favorite + must-have tools [free(ware)]:
I use all these free(ware) programs + tools on all my computers + laptops (almost) every day for (too) many years: ;-/
- Thorium AVX2 (Chromium fork) 64-bit web browser:
http://www.mdgx.com/nettoys.htm#CHR
- Supermium (Chromium fork) 64-bit web browser:
http://www.mdgx.com/nettoys.htm#CHR
- X-Chromium (X-Launcher) Portable launcher:
http://www.winpenpack.com/en/download.php?view.1082
- Chromium/Chrome/X-Chromium/Thorium/Supermium Privacy, Safety + Security Extensions + (Java)Scripts:
http://www.mdgx.com/nettoys.htm#PRV
- Mercury AVX (Firefox fork) 64-bit web browser:
http://www.mdgx.com/nettoys.htm#MOZ
- Firefox Privacy, Safety + Security Add-ons + (Java)Scripts:
http://www.mdgx.com/nettoys.htm#PSF
- MDGx custom HOSTS file [frequently updated]:
http://www.mdgx.com/hosts.php
- 7-Zip 64-bit:
http://www.7-zip.org/
- Universal Extractor 2 (UniExtract2) 64-bit:
http://bioruebe.com/dev/uniextract/
- AutoRuns 64-bit:
http://learn.microsoft.com/sysinternals/downloads/autoruns/
- ServiWin 64-bit:
http://www.nirsoft.net/utils/serviwin.html
- NTFS Permissions Tools (NPT):
http://www.majorgeeks.com/files/details/ntfs_permissions_tools.html
- Default Programs Editor (DPE):
http://www.defaultprogramseditor.com/
- Classic Task Manager (TM) 64-bit:
http://www.winaero.com/how-to-restore-the-good-old-task-manager-in-windows-8/
- Open-Shell 64-bit:
http://open-shell.github.io/Open-Shell-Menu/
- 7+ Taskbar Tweaker (7TT) 64-bit:
http://ramensoftware.com/7-taskbar-tweaker/
- Winaero Tweaker 64-bit:
http://www.winaero.com/winaero-tweaker/
- Programmer's File Editor 32-bit (PFE32):
http://www.lancs.ac.uk/people/steveb/cpaap/pfe/
- IObit Unlocker:
http://www.iobit.com/iobit-unlocker.php
- grepWin 64-bit:
http://tools.stefankueng.com/grepWin.html
- T-Clock Redux 64-bit:
http://github.com/White-Tiger/T-Clock/
- TransparentMenu (TM):
http://www.moo0.com/software/TransparentMenu/
- TrayIcon:
http://www.mdgx.com/files/TI25.ZIP
- ClickOff:
http://johanneshuebner.com/quickcms/index.html%3Fde_downloads,2.html
- Wallpaper SlideShow LT:
http://www.gphotoshow.com/wallpaperss.htm
- MDGx File Manager (FM) 32-bit:
http://www.mdgx.com/xptoy.htm#FMNT
- Microsoft File Manager (FM) 64-bit:
http://www.mdgx.com/xptoy.htm#FMMS
- FreeCommander (FC) XE 32-bit:
http://www.freecommander.com/
- NexusFile:
http://www.xiles.app/
- NetMeter:
http://www.metal-machine.de/readerror/
- CurrPorts 64-bit:
http://www.nirsoft.net/utils/cports.html
- Network Activity Indicator (NAI) 64-bit:
http://www.itsamples.com/network-activity-indicator.html
- JPEGView 64-bit:
http://sourceforge.net/projects/jpegview/
- IrfanView 64-bit:
http://www.irfanview.com/
- Darktable 64-bit:
http://www.darktable.org/
- GIMP Portable 64-bit:
http://www.portableapps.com/apps/graphics_pictures/gimp_portable/
- XnView MP Portable 64-bit:
http://www.xnview.com/en/xnviewmp/#downloads
- IcoFX Portable:
http://www.portableapps.com/apps/graphics_pictures/icofx_portable/
- K-Lite Codec Pack (KLCP) Mega + Media Player Classic Home Cinema (MPC-HC) Lite 64-bit:
http://www.codecguide.com/download_k-lite_codec_pack_mega.htm
- MKVToolNix 64-bit:
http://www.mkvtoolnix.download/
- gMKVExtractGUI:
http://forum.doom9.org/showthread.php?t=170249
- HandBrake Portable 64-bit:
http://handbrake.fr/downloads.php
- Pazera Free Audio + Video Conversion Pack Portable 64-bit:
http://www.pazera-software.com/products/free-audio-video-pack/
- MKV Cutter:
http://www.videohelp.com/software/MKV-Cutter
- FFmpeg 64-bit:
http://www.ffmpeg.org/download.html#build-windows
- foobar2000 64-bit:
http://www.foobar2000.org/
- ReNamer 5.60:
http://files.fyxm.net/121/121773/renamer.zip
- Desktop Background Tuner (DBT) [from "Windows 8" folder]:
http://www.winaero.com/desktop-background-tuner/
- Swiss File Knife (SFK):
http://www.stahlworks.com/dev/swiss-file-knife.html
- NirCmd 64-bit:
http://www.nirsoft.net/utils/nircmd.html
- AdvancedRun 64-bit:
http://www.nirsoft.net/utils/advanced_run.html
- Calibre Portable 64-bit:
http://www.calibre-ebook.com/download_portable/
- Libre Office Portable:
http://www.portableapps.com/apps/office/libreoffice_portable/
- JDownloader2 (JD2):
http://www.jdownloader.org/
- Tixati Portable 64-bit:
http://www.tixati.com/download/portable.html
- FileZilla 64-bit:
http://www.filezilla-project.org/
More like these [all text (.txt) files included]:
- MDGx "List of Useful Windows NTx Tools" in TOOLS.TXT:
http://www.mdgx.com/tools.php
http://www.mdgx.com/TOOLS.TXT
- MDGx "1000+ Windows NTx Power Toys + Tweaking Tools" in SOFTWARE.TXT:
http://www.mdgx.com/toy.htm
- MDGx "Windows NTx Internet Power Toys" in SOFTWARE.TXT:
http://www.mdgx.com/nettoys.htm
- MDGx "Free(ware) Windows NTx Extras" in SOFTWARE.TXT:
http://www.mdgx.com/xptoy.htm
- MDGx "List of Digital Photography, Imaging + Video Tools for Windows NTx" in PHOTO.TXT:
http://www.mdgx.com/photo.php
http://www.mdgx.com/PHOTO.TXT

* MDGx "Group Policy Editor (GPE) fixes + tools (free)" topic in SOFTWARE.TXT (included):
http://www.mdgx.com/xptoy.htm#GPO

* MDGx "Group Policy Editor (gpedit.msc) Guide" topic in REGISTRY.TXT (included):
http://www.mdgx.com/reg.htm#ADM

* Useful, little known, hidden, undocumented, unknown registry + system hacks + tweaks to fix, improve + customize
Windows 7 + Windows Server 2008 R2:
http://forums.mydigitallife.net/forums/mdl-projects-and-applications.34/
http://www.howtogeek.com/5391/175-windows-7-tweaks-tips-and-how-to-articles/
http://www.techradar.com/us/news/computing-components/643861/
http://www.thecustomizewindows.com/2011/08/windows-7-right-click-menu-tipstricks-and-tutorials-index/
http://www.howtogeek.com/77614/best-windows-7-start-menu-and-taskbar-tips-and-tricks/
http://www.edy.es/dev/docs/windows-tricks/
http://www.majorgeeks.com/files/details/majorgeeks_registry_tweaks.html
http://github.com/MajorGeek/MajorGeeks-Windows-Tweaks/
http://www.majorgeeks.com/mg/sortdate/majorgeeks_registry_batch_file_tweaks.html
http://www.sevenforums.com/customization/23122-remove-favorites-libraries-homegroup-my-folder-2.html
http://www.helpdeskgeek.com/how-to/disable-snap-assist-in-windows-7-8-10/
http://windowsreport.com/tag/network/
http://www.intowindows.com/category/windows-7-guides/
http://www.isoftspot.com/
http://www.thewindowsclub.com/
http://www.winaero.com/blog/category/windows-7/
http://www.winaero.com/
http://www.mydigitallife.info/
http://www.sevenforums.com/
http://www.door2windows.com/download/
http://www.howtogeek.com/
http://www.tweaks.com/windows-7/
http://www.tweakhound.com/tweaking-windows-7/
http://sourcedaddy.com/windows-7/
http://www.askvg.com/category/windows-seven/
http://www.tweaks.com/
http://woshub.com/windows-7/
http://www.ghacks.net/category/windows/
http://www.blogsdna.com/
http://www.instantfundas.com/search/label/Windows%207
http://www.techdows.com/
http://www.techsupportalert.com/view/tips/
http://www.commandwindows.com/
MDGx "Comprehensive Windows Registry Guide" chapter in REGISTRY.TXT (included):
http://www.mdgx.com/reg.htm
MDGx "200+ Ways To Hack Your Windows 9x/NTx Registry" chapter in REGISTRY.TXT (included):
http://www.mdgx.com/reg.htm#RHC
MDGx "Windows 10/11 Tweaks, Fixes, Guides, Downloads + Links" chapter in WIN10.TXT (included):
http://www.mdgx.com/10.php
http://www.mdgx.com/WIN10.TXT
MDGx "Windows 8/8.1 Tweaks, Fixes, Guides, Downloads + Links" chapter in WINDOWS8.TXT (included):
http://www.mdgx.com/8.php
http://www.mdgx.com/WINDOWS8.TXT
NOTE:
Some of these hacks + tweaks apply also to Windows 8, 8.1, 10, 11.

* Windows 7 Transformation Packs + Themes:
http://winempyrean.net/category/shell-styles/
http://winempyrean.net/jarvis/
http://www.deviantart.com/#/art/Jarvis-Windows-7-Transformation-Pack-397222303

* Windows 7 Tutorials:
http://sites.google.com/a/rmprepusb.com/www/tutorials/
http://www.7tutorials.com/
http://unlockforus.blogspot.com/2008/11/tutorials.html
http://www.winhelponline.com/blog/
http://sector-seven.net/
http://www.technixupdate.com/tag/windows-7/

* Windows 7 system requirements:
http://support.microsoft.com/help/10737/
http://en.wikipedia.org/wiki/Windows_7#System_requirements

* Coulda... Shoulda... Woulda...
Operating system (OS) core/system features, functionality, operations, processes +/- programs/tools/games/etc
abandoned/banned/cancelled/changed/deprecated/discontinued/limited//obsolete/reduced/removed/restricted by Microsoft
in/from/out of Windows 7, and how to adapt/fix/port/repair/restore/upgrade, use better/similar, and/or work around/bring
back/restore (some of) them:
- MS Docs: Features and functionality removed in Windows client:
http://learn.microsoft.com/windows/whats-new/removed-features/
- MS Docs: Deprecated features for Windows client:
http://learn.microsoft.com/windows/whats-new/deprecated-features/
- Wikipedia: List of features removed/missing in Windows 7:
http://en.wikipedia.org/wiki/List_of_features_removed_in_Windows_7
- MSFN: List of software that doesn't support Windows 7 [+ how to make them work]:
http://www.msfn.org/board/index.php?showtopic=181987
- Techulator: Disadvantages of Windows 7:
http://www.techulator.com/resources/3311-Disadvantages-windows.aspx
- OS Today: What are the disadvantages of Windows 7?:
http://ostoday.org/windows/quick-answer-what-are-the-disadvantages-of-windows-7.html
- Wikipedia: Criticism of Windows:
http://en.wikipedia.org/wiki/Criticism_of_Microsoft_Windows
- MDGx Free(ware) "Win10/11 Block Tools (10_BLOCK)" -> 10_BLOCK.TXT (included):
http://www.mdgx.com/xptoy.htm#10BLK
http://www.mdgx.com/10BLK/10_BLOCK.php
http://www.mdgx.com/10BLK/10_BLOCK.TXT
- MDGx Free(ware) "List of Useful Windows NTx Tools" [apps/programs, games, screen savers, tools/utilities] -> TOOLS.TXT
(included):
http://www.mdgx.com/tools.php
http://www.mdgx.com/TOOLS.TXT
- MDGx Free(ware) "1000+ Windows 9x/NTx Power Toys + Tweaking Tools" -> SOFTWARE.TXT (included):
http://www.mdgx.com/toy.htm
- MDGx "Free(ware) Windows NTx Extras" -> SOFTWARE.TXT (included):
http://www.mdgx.com/xptoy.htm
______________________________________________________________________________



Updates/(Hot)Fixes/Patches + Windows Update (WU)



* NOTE:
*******
Microsoft Updates/Upgrades/Service Packs (SPs)/(Hot)Fixes/Patches/Drivers/etc listed here are for United States (US) English
[en-US] language Windows NTx Operating Systems (OSes) 32-bit (x86) + 64-bit (x64) builds/editions/releases/versions.
Microsoft Windows Updates (WU) are available for all supported languages.
http://learn.microsoft.com/windows/win32/intl/national-language-support/
Microsoft Updates Catalog lists Windows Updates (WU) in all supported languages:
http://www.catalog.update.microsoft.com/search.aspx?q=Windows%207%20Update
More info:
http://www.science.co.il/language/Locale-codes.php
http://en.wikipedia.org/wiki/Internationalization_and_localization

* Must uninstall/remove Windows 7/7 SP1 Updates/Upgrades/(Hot)Fixes/Patches/etc which expose/render vulnerable your
computer(s)/device(s) to:
- auditing,
- data/info/stats collection/logging,
- (diagnostic) tracking,
- fingerprinting,
- (geo)location detection/tracking,
- (geo)marketing,
- intrusion/invasion of privacy,
- "customer experience",
- personalized/targeted ad(vertisment)s/adware,
- promo(tion)s,
- spoofing,
- spying/spyware,
- surveillance,
- telemetry snooping ("phone home"),
- tracking,
- unwanted "offers",
- forced (unauthorized/without your knowledge/permission, behind your back!) upgrade to Windows 10 (GWX), among others:
http://www.mdgx.com/xptoy.htm#10BLK
http://github.com/keizerzilla/remove-windows7-telemetry/
http://github.com/nalal/Windows-Telemetry-Remover/
http://spreadprivacy.com/windows-7-privacy-tips/
http://web.archive.org/web/20180320070137/http://www.privacytools.io/#win10
http://gist.github.com/xvitaly/eafa75ed2cb79b3bd4e9/
http://www.addictivetips.com/windows-tips/a-complete-list-of-all-updates-you-should-uninstall-to-block-windows-10/
http://www.sevenforums.com/installation-setup/413301-reinstall-win7-what-updates-avoid-telemetry-winx-preparation-3.html
http://www.ghacks.net/2019/01/15/better-check-your-windows-7-pc-for-get-windows-10-gwx-traces/
Similar tools:
http://www.majorgeeks.com/mg/sortname/windows_10_fixes.html
July 2019 Windows 7 "security only" update installs telemetry snooping:
http://www.computerworld.com/article/3408496/new-windows-7-security-only-update-installs-telemetrysnooping-uh-feature.html
Block Telemetry in Windows 7/7 SP1 and 8.1:
http://www.ghacks.net/2017/02/11/blocking-telemetry-in-windows-7-and-8-1/
All Microsoft Updates/Upgrades/(Hot)Fixes/Patches/etc listed at the web sites above should be uninstalled (examples):
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text BATch (.bat) or CoMmanD (.cmd) script file containing the lines between Cut & Paste delimiters below
-> save it as plain text/ASCII file (Encode: -> ANSI) with the BAT (.bat) or CMD (.cmd) extension -> right-click it ->
Run as Administrator -> wait for completion.
-----Begin cut & paste here-----
@ECHO OFF
IF NOT "%OS%"=="Windows_NT" GOTO END
IF NOT EXIST %WinDir%\SYSTEM32\WUSA.EXE GOTO END
:: KB4507456: Security Only Update:
START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:4507456 /quiet /norestart
:: KB971033: Windows Activation Update:
START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:971033 /quiet /norestart
:: KB2952664: Get Windows 10 (GWX) Assistant:
START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:2952664 /quiet /norestart
:: KB2990214: Get Windows 10 (GWX):
START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:2990214 /quiet /norestart
:: KB3012973: Upgrade to Windows 10 Pro:
START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:3012973 /quiet /norestart
:: KB3021917: Performance Improvements Update:
START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:3021917 /quiet /norestart
:: KB3022345: Customer Experience and Diagnostic Telemetry Update:
START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:3022345 /quiet /norestart
:: KB3035583: Get Windows 10 (GWX) App:
START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:3035583 /quiet /norestart
:: KB3044374: Get Windows 10 (GWX) Update:
START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:3044374 /quiet /norestart
:: KB3068708: Customer Experience and Diagnostic Telemetry Update:
START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:3068708 /quiet /norestart
:: KB3075249: Telemetry Update:
START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:3075249 /quiet /norestart
:: KB3080149: Customer Experience and Diagnostic Telemetry Update:
START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:3080149 /quiet /norestart
:: KB3112343: Windows Update Client (WUC):
START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:3112343 /quiet /norestart
:: KB3083711: Windows Update Client (WUC):
START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:3083711 /quiet /norestart
:: KB3083325: Windows Update Client (WUC):
START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:3083325 /quiet /norestart
:: KB3075853: Windows Update Client (WUC):
START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:3075853 /quiet /norestart
:: KB3072318: OOBE Update to upgrade to Windows 10:
START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:3072318 /quiet /norestart
:: KB3065988: Windows Update Client (WUC):
START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:3065988 /quiet /norestart
:: KB3064683: OOBE Update to upgrade to Windows 10:
START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:3064683 /quiet /norestart
:: KB3058168: Activate Windows 10 from Hosts Update:
START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:3058168 /quiet /norestart
:: KB3050267: Windows Update Client (WUC):
START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:3050267 /quiet /norestart
:: KB2976978: Compatibility Update:
START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:2976978 /quiet /norestart
:: KB2977759: Compatibility Update:
START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:2977759 /quiet /norestart
:: KB3081954: Work Folders Update:
START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:3081954 /quiet /norestart
:: KB3123862: Upgrade Capability Update:
START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:3123862 /quiet /norestart
:: KB3138612: Windows Update Client (WUC):
START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:3138612 /quiet /norestart
:: KB3172605: July 2016 Update Rollup:
START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:3172605 /quiet /norestart
TIMEOUT /T 5 /NOBREAK
:END
EXIT
------End cut & paste here------
Restart/reboot.
WUSA (Windows Update Standalone Installer) [WUSA.EXE] executable is located in the %WinDir%\SYSTEM32 directory/folder
[%WinDir% = usually C:\WINDOWS].
View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]:
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command
PATH
-> press Enter.

* Windows Updates (WU) Catalog, Listings + Guides:
- Windows 7/7 SP1 Updates Catalog:
http://www.catalog.update.microsoft.com/search.aspx?q=%22Windows%207%22
Download desired/needed Update(s)/Fix(es)/Patch(es) to your local disk/media/storage device -> right-click each
.CAB/.EXE/.MSI/.MSP/.MSU file -> Run as Administrator -> follow on screen instructions -> restart/reboot (if prompted).
- ERPMan's Windows 7 System Updates Page:
http://erpman1.tripod.com/win7upd.html
- ERPMan's Windows 7 X64 & Server 2008 R2 X64 System Updates:
http://erpman1.tripod.com/w7x64upd.html
- THFS: List of Windows 7 + 7 SP1 Updates/(Hot)Fixes/Patches:
http://thehotfixshare.net/board/?/search/&q=%22Windows%207%22&type=downloads_file
- SevenForums: Windows 7/7 SP1 News:
http://www.sevenforums.com/news/
- Microsoft Security Advisories + Bulletins:
http://learn.microsoft.com/security-updates/
- Install Manually Offline CAB (.cab), EXE (.exe) + MSU (.msu) Updates:
http://woshub.com/manually-install-cab-msu-updates-windows/
- Windows 7/7 SP1 Updates/(Hot)Fixes/Patches History:
http://support.microsoft.com/help/4009469/
- Every Last Thing About Windows Update (WU) for Windows 7/newer:
http://www.makeuseof.com/tag/how-to-find-out-every-last-thing-about-windows-update/

* Windows 7/8/8.1/10 32-bit + 64-bit Updates disable Intel Broadwell + Haswell CPUs Meltdown/Spectre Variants "Branch target
injection vulnerability" errors/reboots after Intel CPU firmware update(s):
- MSKB KB4090007 Fix 32-bit + 64-bit for Windows 10/2016 32-bit (x86) + 64-bit (x64):
http://support.microsoft.com/help/4090007/
Microsoft Catalog Files for KB4090007 Update:
http://www.catalog.update.microsoft.com/search.aspx?q=KB4090007
- MSKB KB4078130 Fix 32-bit + 64-bit for Windows 7/2008 R2/8/20012/8.1/2012 R2/10/2016 32-bit (x86) + 64-bit (x64):
http://support.microsoft.com/help/4078130/
Microsoft Catalog File for KB4078130 Update:
http://www.catalog.update.microsoft.com/search.aspx?q=KB4078130
File:
http://download.windowsupdate.com/c/msdownload/update/software/crup/2018/01/kb4078130_b86f0bf2dc0866a0e117ed2d4a5302fab0493a7b.exe
Intel CPUs Updates:
http://newsroom.intel.com/news/intel-security-issue-update-addressing-reboot-issues/
Intel CPUs Info [PDF]:
http://newsroom.intel.com/wp-content/uploads/sites/11/2018/04/microcode-update-guidance.pdf
InSpectre for Windows 10/11 detects operating system (OS) ability to prevent Meltdown + Spectre vulnerability attacks
against Intel Broadwell + Haswell CPUs + necessity of installing respective update(s):
http://www.grc.com/inspectre.htm
File:
http://www.grc.com/files/InSpectre.exe

* Non-Volatile Memory Express (NVMe) native Drivers for Windows 7 SP1 32-bit (x86) + 64-bit (x64):
http://support.microsoft.com/help/2990941/
- NVMe Drivers 64-bit for Windows 7 SP1 64-bit (x64) [7 MB]:
http://conduant.zendesk.com/hc/en-us/articles/217205998-PXIe-DM-4M-2-Windows-Driver/
http://pcsupport.lenovo.com/us/en/downloads/ds105871
- NVMe Drivers 32-bit for Windows 7 SP1 32-bit (x86) [6 MB]:
http://conduant.zendesk.com/hc/en-us/articles/217205998-PXIe-DM-4M-2-Windows-Driver/
http://pcsupport.lenovo.com/us/en/downloads/ds105871
NVMe Drivers:
http://nvmexpress.org/drivers/windowsdrivers/
More info:
http://www.win-raid.com/t29f25-Recommended-AHCI-RAID-and-NVMe-Drivers.html
NVMe:
http://en.wikipedia.org/wiki/NVM_Express

* Required Windows 7 64-bit (x64) Updates for Thorium (hardware optimized Chromium fork) + Mercury (hardware optimized
Firefox fork) 64-bit web browsers enhanced hardware + software compatibility/support:
http://thorium.rocks/win7
- Windows 7 SP1/2008 R2 64-bit (x64) Servicing Stack Update 2019 KB4490628:
http://support.microsoft.com/help/4490628/
Download:
http://catalog.update.microsoft.com/search.aspx?q=4490628+x64
- Windows 7 SP1/2008 R2 64-bit (x64) SHA-2 Code Signing Support Update 2019 KB4474419:
http://support.microsoft.com/help/4474419/
Download:
http://catalog.update.microsoft.com/search.aspx?q=4474419+x64
Thorium [Th90] (Chromium fork) 64-bit hardware optimized web browser for Windows 7/newer 64-bit (x64) based on Chromium
code:
http://thorium.rocks/
- Thorium AVX repository:
http://github.com/Alex313031/Thorium-Win/
Thorium AVX latest build for Windows 10/11 [ZIP = full, Portable]:
http://github.com/Alex313031/Thorium-Win/releases/latest/
- Thorium AVX2 (+ 3D rendering + HD/VHD/UHD video playback) repository:
http://github.com/Alex313031/Thorium-Win/
Thorium AVX2 latest build for Windows 10/11 [ZIP = full, Portable]:
http://github.com/Alex313031/Thorium-Win/releases/latest/
Thorium latest build for Windows 7/8/8.1 [ZIP = full, Portable]:
http://github.com/Alex313031/thorium-win7/releases/latest/
Thorium Requirements:
- Multicore CPU: minimum Intel Core 2nd gen or AMD FX with built-in SSE4 (Streaming SIMD Extensions 4),
http://en.wikipedia.org/wiki/SSE4
AVX (Advanced Vector EXtensions)
http://en.wikipedia.org/wiki/Advanced_Vector_Extensions
+ AES (Advanced Encryption Standard)
http://en.wikipedia.org/wiki/Advanced_Encryption_Standard
enhancements/multimedia extensions/instructions.
- Graphics video controller with 3D rendering + OpenGL capabilities.
Thorium Optimizations:
http://thorium.rocks/optimizations
Mercury [Hg80 (Hydrargyrum)] AVX (Firefox fork) 64-bit hardware optimized + improved privacy web browser for Windows 7/newer
64-bit (x64) based on Firefox code:
http://thorium.rocks/mercury
Mercury repository:
http://github.com/Alex313031/Mercury/
Mercury latest build [ZIP = full, Portable]:
http://github.com/Alex313031/Mercury/releases/latest/
Mercury Requirements:
- Multicore CPU: minimum Intel Core 2nd gen or AMD FX with built-in SSE4 (Streaming SIMD Extensions 4),
http://en.wikipedia.org/wiki/SSE4
AVX (Advanced Vector EXtensions)
http://en.wikipedia.org/wiki/Advanced_Vector_Extensions
+ AES (Advanced Encryption Standard)
http://en.wikipedia.org/wiki/Advanced_Encryption_Standard
enhancements/multimedia extensions/instructions.
- Graphics video controller with 3D rendering + OpenGL capabilities.
Mercury Optimizations:
http://thorium.rocks/optimizations
Mercury Patches:
http://github.com/Alex313031/Mercury/blob/main/docs/PATCHES.md
Get a modern [see "Chromium + Chrome" topic in SOFTWARE.TXT (included)]
http://www.mdgx.com/nettoys.htm#CHR
and secure
http://www.mdgx.com/nettoys.htm#PRV
web browser.

* Windows 7 SP1 Remote Desktop Protocol (RDP) Remote Desktop Services (RDS) Remote Code (BlueKeep cryptocurrency miner)
Vulnerability Fix 32-bit + 64-bit for Windows 7 SP1 32-bit (x86) + 64-bit (x64):
http://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2019-0708
RDP/RDS Fixes:
http://www.catalog.update.microsoft.com/search.aspx?q=KB4499175
- RDP/RDS Fix 64-bit for Windows 7 SP1 64-bit (x64) [100 MB]:
http://download.windowsupdate.com/d/msdownload/update/software/secu/2019/05/windows6.1-kb4499175-x64_3704acfff45ddf163d8049683d5a3b75e49b58cb.msu
- RDP/RDS Fix 32-bit for Windows 7 SP1 32-bit (x86) [73 MB]:
http://download.windowsupdate.com/d/msdownload/update/software/secu/2019/05/windows6.1-kb4499175-x86_6f1319c32d5bc4caf2058ae8ff40789ab10bf41b.msu
More info:
http://support.microsoft.com/help/4499175/
Prevent BlueKeep cryptocurrency miner worm -> update RDS (CVE-2019-0708):
http://msrc-blog.microsoft.com/2019/05/14/prevent-a-worm-by-updating-remote-desktop-services-cve-2019-0708/

* Windows 7 SP1 System Update Readiness (SUR) tool 32-bit + 64-bit for Windows 7 SP1 32-bit (x86) + 64-bit (x64):
http://support.microsoft.com/help/947821/
- SUR 64-bit for Windows 7 SP1 64-bit (x64):
http://download.microsoft.com/download/E/8/D/E8DAA970-1036-447F-B5EA-716D4BA70EC5/Windows6.1-KB947821-v34-x64.msu
- SUR 32-bit for Windows 7 SP1 32-bit (x86):
http://download.microsoft.com/download/4/7/A/47A0F7B9-1F0F-41B0-AA42-00FD16337268/Windows6.1-KB947821-v34-x86.msu
Windows Update Errors in Windows Vista/2008/7 Fixed by System Update Readiness (SUR) tool:
http://support.microsoft.com/help/947821/
Fix Windows Update Error 00009C48 in Windows 7:
http://www.sevenforums.com/windows-updates-activation/213912-i-cant-update-windows-due-windows-up-date-error-00009c48.html

* Windows 7 SP1 Servicing Stack Update (SSU) 32-bit + 64-bit for Windows 7 SP1 32-bit (x86) + 64-bit (x64):
http://support.microsoft.com/help/3020369/
- SSU 64-bit for Windows 7 SP1 64-bit (x64) [10 MB]:
http://download.microsoft.com/download/5/D/0/5D0821EB-A92D-4CA2-9020-EC41D56B074F/Windows6.1-KB3020369-x64.msu
- SSU 32-bit for Windows 7 SP1 32-bit (x86) [8 MB]:
http://download.microsoft.com/download/C/0/8/C0823F43-BFE9-4147-9B0A-35769CBBE6B0/Windows6.1-KB3020369-x86.msu

* Windows 7 SP1 Monthly Rollup Update (MRU) 32-bit + 64-bit for Windows 7 SP1 32-bit (x86) + 64-bit (x64):
http://support.microsoft.com/help/4093118/
- MRU 64-bit for Windows 7 SP1 64-bit (x64) [219 MB]:
http://download.windowsupdate.com/d/msdownload/update/software/secu/2018/04/windows6.1-kb4093118-x64_5ea1778b896fcc764e0db8da7d094f62dc98d82f.msu
- MRU 32-bit for Windows 7 SP1 32-bit (x86) [131 MB]:
http://download.windowsupdate.com/c/msdownload/update/software/secu/2018/04/windows6.1-kb4093118-x86_2bbb81cd98fb80623b7afa3dcb2da73f28322ea3.msu

* Windows 7 SP1 Security Monthly Quality Rollup (SMQR) 32-bit + 64-bit for Windows 7 SP1 32-bit (x86) + 64-bit (x64):
http://support.microsoft.com/help/4503292/
SMQR Fixes:
http://www.catalog.update.microsoft.com/search.aspx?q=KB3033929
- SMQR 64-bit for Windows 7 SP1 64-bit (x64) [272 MB]:
http://catalog.s.download.windowsupdate.com/d/msdownload/update/software/secu/2019/06/windows6.1-kb4503292-x64_a35bb4ea16d1d529fde9abfe8a0c16e9061f74cd.msu
- SMQR 32-bit for Windows 7 SP1 32-bit (x86) [27 MB]:
http://catalog.s.download.windowsupdate.com/d/msdownload/update/software/secu/2015/02/windows6.1-kb3033929-x86_927e018113fe51250c57029635d46b89bf235920.msu

* Windows 7 SP1 Convenience Rollup Update (CRU) + VNIC.VBS VBScript 32-bit + 64-bit for Windows 7 SP1 32-bit (x86) + 64-bit
(x64):
http://support.microsoft.com/help/3125574/
- CRU 64-bit for Windows 7 SP1 64-bit (x64) [477 MB]:
http://download.windowsupdate.com/d/msdownload/update/software/updt/2016/05/windows6.1-kb3125574-v4-x64_2dafb1d203c8964239af3048b5dd4b1264cd93b9.msu
- CRU 32-bit for Windows 7 SP1 32-bit (x86) [317 MB]:
http://download.windowsupdate.com/d/msdownload/update/software/updt/2016/05/windows6.1-kb3125574-v4-x86_ba1ff5537312561795cc04db0b02fbb0a74b2cbd.msu

* Windows 7 SP1 Security Quality Rollups (SQR) 32-bit + 64-bit for Windows 7 SP1 32-bit (x86) + 64-bit (x64):
http://www.catalog.update.microsoft.com/search.aspx?q=Security+Quality+Rollup+Windows+7+SP1

* Windows 7 SP1 Stop Errors with Multiple CPUs TCPIP.SYS Hotfix 32-bit + 64-bit for Windows 7 SP1 32-bit (x86) + 64-bit
(x64):
http://support.microsoft.com/help/2905412/
Hotfix [request links in e-mail]:
http://support.microsoft.com/hotfix/kbhotfix?kbnum=2905412&kbln=en-us
- TCPIP.SYS Hotfix 64-bit for Windows 7 SP1 64-bit (x64):
http://hotfixv4.trafficmanager.net/Windows%207/Windows%20Server2008%20R2%20SP1/sp2/Fix476701/7600/free/470223_intl_x64_zip.exe
- TCPIP.SYS Hotfix 32-bit for Windows 7 SP1 32-bit (x86):
http://hotfixv4.trafficmanager.net/Windows%207/Windows%20Server2008%20R2%20SP1/sp2/Fix476701/7600/free/470191_intl_i386_zip.exe
All TCPIP.SYS Hotfixes for Windows 2000/newer:
http://www.mskbfiles.com/tcpip.sys.php

* Windows 7 Stop Errors with Large SATA HDD MSAHCI.SYS Hotfix:
http://support.microsoft.com/help/977178/
Hotfix [request links in e-mail]:
http://support.microsoft.com/hotfix/KBHotfix.aspx?kbnum=977178&kbln=en-us
- SATA HDD Hotfix 64-bit:
http://hotfixv4.trafficmanager.net/Windows%207/WindowsServer%202008%20R2/sp1/Fix306215/7600/free/404474_intl_x64_zip.exe
- SATA HDD Hotfix 32-bit:
http://hotfixv4.trafficmanager.net/Windows%207/WindowsServer%202008%20R2/sp1/Fix306215/7600/free/404472_intl_i386_zip.exe

* Windows 7 Registry Hive Ntkrnlpa.exe + Ntoskrnl.exe Hotfix:
http://support.microsoft.com/help/983544/
Hotfix [request links in e-mail]:
http://support.microsoft.com/en-us/hotfix/kbhotfix?kbnum=983544&kbln=en-US
- Registry Hive Hotfix 64-bit:
http://hotfixv4.trafficmanager.net/Windows%207/WindowsServer%202008%20R2/sp1/Fix322114/7600/free/413807_intl_x64_zip.exe
- Registry Hive Hotfix 32-bit:
http://hotfixv4.trafficmanager.net/Windows%207/WindowsServer%202008%20R2/sp1/Fix322114/7600/free/413805_intl_i386_zip.exe

* Windows 7/8/8.1 DirectX 9.0c (DX9c)/10.0 (DX10)/11.x (DX11) 32-bit + 64-bit:
http://www.mdgx.com/dx.htm#DX9

* Windows 7 SP1 DirectX (DX) Graphics Update:
http://support.microsoft.com/help/2028560/
- DX Graphics 64-bit:
http://download.microsoft.com/download/F/1/A/F1A02F0C-0F64-4E87-9BC1-EFA8CDE464FE/Windows6.1-KB2028560-v2-x64.msu
- DX Graphics 32-bit:
http://download.microsoft.com/download/9/7/6/976634BE-DC4D-4B7B-9567-209811D7AF14/Windows6.1-KB2028560-v2-x86.msu

* Windows 7 SP1 DirectX (DX) Direct3D (D3D) App Crash Full Screen Hotfix:
http://support.microsoft.com/help/2400157/
Hotfix [request links in e-mail]:
http://support.microsoft.com/en-us/hotfix/kbhotfix?kbnum=2400157&kbln=en-US
- DX D3D Hotfix 64-bit:
http://hotfixv4.trafficmanager.net/Windows%207/Windows%20Server2008%20R2%20SP1/sp2/Fix347381/7600/free/425610_intl_x64_zip.exe
- DX D3D Hotfix 32-bit:
http://hotfixv4.trafficmanager.net/Windows%207/Windows%20Server2008%20R2%20SP1/sp2/Fix347381/7600/free/425608_intl_i386_zip.exe

* Windows 7 SP1 Performance and Functionality Update (FPU):
http://support.microsoft.com/help/2454826/
- FPU 64-bit:
http://download.microsoft.com/download/D/B/D/DBD62263-2627-49CB-B675-AA1601EBE0BD/Windows6.1-KB2454826-v2-x64.msu
- FPU 32-bit:
http://download.microsoft.com/download/5/E/4/5E404378-9A5D-41AB-AFBA-1AC04F3B2A13/Windows6.1-KB2454826-v2-x86.msu

* FIX: Get back/restore Windows Help Viewer (WinHlp32), Windows Help (HLP) + Compiled HTML Help (CHM) functionality in
Windows 7/7 SP1 -> see MDGx "Restore/Update HTML Help (.CHM) + Windows Help (.HLP) Guides, Fixes + Tools" section in
SOFTWARE.TXT (included):
http://www.mdgx.com/add.htm#HHU
BUG:
In Windows Vista/newer you canNOT use Windows Help files (*.CNT, *.HLP) because Microsoft removed Windows Help 32-bit
(WinHlp32.exe) from these OSes. :-(
FIX:
Microsoft Windows Help 32-bit (WinHlp32.exe) for Windows 7/7 SP1 32-bit + 64-bit (English, right-click to save!):
http://support.microsoft.com/help/917607/
- WinHlp32.exe for Windows 7 64-bit (x64) [702 KB]:
http://download.microsoft.com/download/9/A/8/9A8FCFAA-78A0-49F5-8C8E-4EAE185F515C/Windows6.1-KB917607-x64.msu
- WinHlp32.exe for Windows 7 32-bit (x86) [688 KB]:
http://download.microsoft.com/download/9/A/8/9A8FCFAA-78A0-49F5-8C8E-4EAE185F515C/Windows6.1-KB917607-x86.msu
Registry fixes necessary to enable WinHlp32.exe macros, Intranet access + CHM (Compiled HTML Help) XML, XSL, CSS, JPG + PNG
functionality:
http://www.vistax64.com/tutorials/87497-help-support-vista.html
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
; WinHelp32 Macro FIX for Windows Vista/2008/7/8/8.1 32-bit (x86):
[HKEY_LOCAL_MACHINE\Software\Microsoft\WinHelp]
"AllowProgrammaticMacros"=dword:1
"AllowIntranetAccess"=dword:1
; WinHelp32 Macro FIX for Windows Vista/2008/7/8/8.1 64-bit (x64):
[HKEY_LOCAL_MACHINE\Software\Wow6432Node\Microsoft\WinHelp]
"AllowProgrammaticMacros"=dword:1
"AllowIntranetAccess"=dword:1
; HTML Help (CHM) FIX: XML, XSL, CSS, JPG + PNG for Windows Vista/2008/7/8/8.1:
[HKEY_LOCAL_MACHINE\Software\Classes\.xml]
@="xmlfile"
"Content Type"="text/xml"
"PerceivedType"="text"
[HKEY_LOCAL_MACHINE\Software\Classes\.xml\PersistentHandler]
@="{7E9D8D44-6926-426F-AA2B-217A819A5CCE}"
[HKEY_LOCAL_MACHINE\Software\Classes\.xsl]
@="xslfile"
"Content Type"="text/xml"
"PerceivedType"="text"
[HKEY_LOCAL_MACHINE\Software\Classes\.xsl\PersistentHandler]
@="{7E9D8D44-6926-426F-AA2B-217A819A5CCE}"
[HKEY_LOCAL_MACHINE\Software\Classes\.css]
@="CSSfile"
"Content Type"="text/css"
"PerceivedType"="text"
[HKEY_LOCAL_MACHINE\Software\Classes\.css\PersistentHandler]
@="{eec97550-47a9-11cf-b952-00aa0051fe20}"
[HKEY_LOCAL_MACHINE\Software\Classes\.png]
@="pngfile"
"PerceivedType"="image"
"Content Type"="image/png"
[HKEY_LOCAL_MACHINE\Software\Classes\.png\PersistentHandler]
@="{098f2470-bae0-11cd-b579-08002b30bfeb}"
[HKEY_LOCAL_MACHINE\Software\Classes\.jpg]
@="jpegfile"
"Content Type"="image/jpeg"
"PerceivedType"="image"
[HKEY_LOCAL_MACHINE\Software\Classes\.jpg\OpenWithProgids]
"jpegfile"=""
[HKEY_LOCAL_MACHINE\Software\Classes\.jpg\PersistentHandler]
@="{098f2470-bae0-11cd-b579-08002b30bfeb}"
;
------End cut & paste here------
Microsoft FixIt! WinHlp32.exe tools (English, right-click to save!):
- Enable macros FixIt! after installing WinHlp32.exe [964 KB]:
http://web.archive.org/web/20160314054228if_/http://download.microsoft.com/download/7/9/5/7955FD19-CE75-477A-A2BE-3B3E8BD20A04/MicrosoftFixit50105.msi
- Unblock .HLP FixIt! after installing WinHlp32.exe [964 KB]:
http://web.archive.org/web/20170610234444if_/http://download.microsoft.com/download/6/9/F/69FB8CEB-90AA-49EC-ADA5-09EF2A1ACB12/MicrosoftFixit50237.msi
- Windows Update (WU) Error 80070422 .HLP FixIt! after installing WinHlp32.exe [1 MB]:
http://web.archive.org/web/20170503080905if_/http://download.microsoft.com/download/3/5/0/35062C9F-980C-455D-9652-82A4B30888D2/MicrosoftFixit50776.msi

* USBView (USBView.exe):
http://learn.microsoft.com/windows-hardware/drivers/debugger/usbview/
Available as part of Windows 10 SDK for Windows 7 SP1/8/8.1/10:
http://developer.microsoft.com/windows/downloads/windows-10-sdk/
SETUP ONLY:
http://download.microsoft.com/download/8/C/3/8C37C5CE-C6B9-4CC8-8B5F-149A9C976035/windowssdk/winsdksetup.exe
Requires Universal C Runtime Update for Windows 7 SP1/8/8.1:
http://support.microsoft.com/help/2999226/
USBView.exe installed in:
- 64-bit Windows OS (x64):
C:\Program Files (x86)\Windows Kits\10\Debuggers
- 32-bit Windows OS (x86):
C:\Program Files\Windows Kits\10\Debuggers

* Windows 7 SP1/8/8.1 Universal C Runtime Update:
http://support.microsoft.com/help/2999226/
- Windows 8.1 64-bit:
http://download.microsoft.com/download/9/6/F/96FD0525-3DDF-423D-8845-5F92F4A6883E/Windows8.1-KB2999226-x64.msu
- Windows 8.1 32-bit:
http://download.microsoft.com/download/E/4/6/E4694323-8290-4A08-82DB-81F2EB9452C2/Windows8.1-KB2999226-x86.msu
- Windows 7 SP1 64-bit:
http://download.microsoft.com/download/1/1/5/11565A9A-EA09-4F0A-A57E-520D5D138140/Windows6.1-KB2999226-x64.msu
- Windows 7 SP1 32-bit:
http://download.microsoft.com/download/4/F/E/4FE73868-5EDD-4B47-8B33-CE1BB7B2B16A/Windows6.1-KB2999226-x86.msu

* Windows 7 SP1 Platform Update (PU):
http://support.microsoft.com/help/2670838/
- PU 64-bit:
http://download.microsoft.com/download/1/4/9/14936FE9-4D16-4019-A093-5E00182609EB/Windows6.1-KB2670838-x64.msu
- PU 32-bit:
http://download.microsoft.com/download/1/4/9/14936FE9-4D16-4019-A093-5E00182609EB/Windows6.1-KB2670838-x86.msu

* Windows 7 SP1 0x00000050 Stop Error after installing Platform Update (PU):
http://support.microsoft.com/help/2834140/
- PU Error Fix 64-bit:
http://download.microsoft.com/download/5/A/5/5A548BFE-ADC5-414B-B6BD-E1EC27A8DD80/Windows6.1-KB2834140-v2-x64.msu
- PU Error Fix 32-bit:
http://download.microsoft.com/download/F/1/4/F1424AD7-F754-4B6E-B0DA-151C7CBAE859/Windows6.1-KB2834140-v2-x86.msu

* FixIt! Windows Installer MSI/MSU Errors:
http://support.microsoft.com/help/2438651/
FixIt! problems that block programs from being installed/removed:
http://support.microsoft.com/help/17588/
File:
http://download.microsoft.com/download/7/E/9/7E9188C0-2511-4B01-8B4E-0A641EC2F600/MicrosoftProgram_Install_and_Uninstall.meta.diagcab
Repair MSI (Windows Installer) Automated Scripts:
http://www.tweaking.com/content/page/repair_msi_windows_installer.html
File:
http://www.majorgeeks.com/files/details/tweaking_com_repair_msi_(windows_installer).html
Microsoft .NET Framework (NetFX) Repair Tool:
http://support.microsoft.com/help/2698555/
Download:
http://www.microsoft.com/download/details.aspx?id=30135
File:
http://download.microsoft.com/download/2/B/D/2BDE5459-2225-48B8-830C-AE19CAF038F1/NetFxRepairTool.exe
FixIt! Windows Installer MSI/MSU Install Error 0x8007000D:
http://support.microsoft.com/help/2230957/
File:
http://download.microsoft.com/download/B/3/2/B3259ACE-2BFC-47D3-9627-A21372C1D4B5/MicrosoftFixit50485.msi
Fatal Error 0x80070643: Failed to install .NET/MSI package:
http://www.google.com/search?q=Error+0x80070643%3A+Failed+to+install+MSI+package
http://stackoverflow.com/questions/41720158/
http://www.windows101tricks.com/fix-error-0x80070643-failed-to-install-msi-package/
http://social.msdn.microsoft.com/Forums/vstudio/14ccc37f-d70a-454d-bea2-a0244394ac5e/
http://blogs.msdn.microsoft.com/vsnetsetup/2014/10/
http://support.microsoft.com/help/10164/
http://www.youtube.com/watch?v=0cBg_A5axNI

* FixIt! Disable "Test mode" message:
http://support.microsoft.com/help/2509241/
File:
http://download.microsoft.com/download/C/7/9/C796E9A8-E2F2-4281-9A53-9BF67BB259FC/MicrosoftFixit50756.msi

* Windows 7 Computer Stops Responding Randomly Hotfix:
http://support.microsoft.com/help/2265716/
Hotfix [request links in e-mail]:
http://support.microsoft.com/en-us/hotfix/kbhotfix?kbnum=2265716&kbln=en-us
File:
http://hotfixv4.trafficmanager.net/Windows%207/WindowsServer%202008%20R2/sp1/Fix322397/7600/free/417036_intl_i386_zip.exe

* Windows 7 SP1 Stop Error 0x00000050 in NTKRNLPA.EXE Hotfix:
http://support.microsoft.com/help/2516405/
Hotfix [request links in e-mail]:
http://support.microsoft.com/hotfix/KBHotfix.aspx?kbnum=2516405&kbln=en-us
- NTKRNLPA.EXE Hotfix 64-bit:
http://hotfixv4.trafficmanager.net/Windows%207/Windows%20Server2008%20R2%20SP1/sp2/Fix368160/7600/free/430477_intl_x64_zip.exe
- NTKRNLPA.EXE Hotfix 32-bit:
http://hotfixv4.trafficmanager.net/Windows%207/Windows%20Server2008%20R2%20SP1/sp2/Fix368160/7600/free/430476_intl_i386_zip.exe

* Windows 7 32-bit Variable %UserDomain% not resolved Profprov.dll + Profsvc.dll Hotfix:
http://support.microsoft.com/help/2664408/
Hotfix [request links in e-mail]:
http://support.microsoft.com/en-us/hotfix/kbhotfix?kbnum=2664408&kbln=en-us
File:
http://hotfixv4.trafficmanager.net/Windows%207/Windows%20Server2008%20R2%20SP1/sp2/Fix397022/7600/free/444149_intl_i386_zip.exe

* Windows 7/7 SP1 ROBOCOPY.EXE incorrectly skips files Hotfix:
http://support.microsoft.com/help/2680906/
Hotfix [request links in e-mail]:
http://support.microsoft.com/en-us/Hotfix/KbHotfix?kbnum=2680906&kbln=en-US
- ROBOCOPY.EXE Hotfix 64-bit:
http://hotfixv4.trafficmanager.net/Windows%207/Windows%20Server2008%20R2%20SP1/sp2/Fix396879/7600/free/445248_intl_x64_zip.exe
- ROBOCOPY.EXE Hotfix 32-bit:
http://hotfixv4.trafficmanager.net/Windows%207/Windows%20Server2008%20R2%20SP1/sp2/Fix396879/7600/free/445246_intl_i386_zip.exe

* Windows 7 Audiodg.exe Memory Leak Hotfix:
http://support.microsoft.com/help/981013/
Hotfix [request links in e-mail]:
http://support.microsoft.com/en-us/Hotfix/KbHotfix?kbnum=981013&kbln=en-US
- Audiodg.exe Hotfix 64-bit:
http://hotfixv4.trafficmanager.net/Windows%207/WindowsServer%202008%20R2/sp1/Fix307914/7600/free/409416_intl_x64_zip.exe
- Audiodg.exe Hotfix 32-bit:
http://hotfixv4.trafficmanager.net/Windows%207/WindowsServer%202008%20R2/sp1/Fix307914/7600/free/409414_intl_i386_zip.exe

* Windows 7/7 SP1 defective WaitToKillServiceTimeout Registry value Hotfix:
http://support.microsoft.com/help/2549760/
Hotfix [request links in e-mail]:
http://support.microsoft.com/en-us/Hotfix/KbHotfix?kbnum=2549760&kbln=en-US
- WaitToKillServiceTimeout Hotfix 64-bit:
http://hotfixv4.trafficmanager.net/Windows%207/Windows%20Server2008%20R2%20SP1/sp2/Fix367694/7600/free/435571_intl_x64_zip.exe
- WaitToKillServiceTimeout Hotfix 32-bit:
http://hotfixv4.trafficmanager.net/Windows%207/Windows%20Server2008%20R2%20SP1/sp2/Fix367694/7600/free/435569_intl_i386_zip.exe

* Windows 7/7 SP1 slow Startup (ReadyBoot) with many Restore Points Hotfix:
http://support.microsoft.com/help/2555428/
Hotfix [request links in e-mail]:
http://support.microsoft.com/en-us/Hotfix/KbHotfix?kbnum=2555428&kbln=en-US
- ReadyBoot Hotfix 64-bit:
http://hotfixv4.trafficmanager.net/Windows%207/Windows%20Server2008%20R2%20SP1/sp2/Fix368028/7600/free/433314_intl_x64_zip.exe
- ReadyBoot Hotfix 32-bit:
http://hotfixv4.trafficmanager.net/Windows%207/Windows%20Server2008%20R2%20SP1/sp2/Fix368028/7600/free/433313_intl_i386_zip.exe

* Windows 7/7 SP1 FSUTIL.EXE Hotfix/Update improves compatibility with Advanced Format Disk Drives (AFD):
http://support.microsoft.com/help/982018/
Download:
http://www.catalog.update.microsoft.com/search.aspx?q=KB982018
- FSUTIL.EXE Hotfix 64-bit:
http://download.windowsupdate.com/msdownload/update/software/updt/2011/04/windows6.1-kb982018-v3-x64_7853a1c9c63611e17cd2c923704bf2e924bdfe7b.msu
- FSUTIL.EXE Hotfix 32-bit:
http://download.windowsupdate.com/msdownload/update/software/updt/2011/04/windows6.1-kb982018-v3-x86_b009d84249f14d4eaae7aa522be37c38dd83531b.msu

* Windows 7/7 SP1 "Explorer.exe Server Execution Failed" Error:
http://support.microsoft.com/help/2444677/
- Hotfix 64-bit for Windows 7/7 SP1 64-bit (x64):
http://thehotfixshare.net/board/index.php?showtopic=15505
- Hotfix 32-bit for Windows 7/7 SP1 32-bit (x86):
http://thehotfixshare.net/board/index.php?showtopic=15506
Hotfix [request links in e-mail]:
http://support.microsoft.com/hotfix/kbhotfix?kbnum=2444677&kbln=en-us
Fix "Explorer.exe Server Execution Failed" Error in Windows 7/newer:
http://www.pcerror-fix.com/methods-repair-explorer-exe-server-execution-failed-windows-7-8-10/
http://support.microsoft.com/windows/fix-a-corrupted-user-profile-in-windows-1cf41c18-7ce3-12f9-8e1d-95896661c5c9
http://www.thewindowsclub.com/fix-explorer-exe-server-execution-failed-on-windows-7/
http://michlstechblog.info/blog/windows-explorer-exe-server-execution-failed/

* Windows 10 Universal C RunTime (UCRT) 32-bit + 64-bit for Windows Vista/2008/7 SP1/8/8.1/2012 32-bit (x86) + 64-bit (x64):
http://support.microsoft.com/help/3118401/
UCRT All in One [ZIP]:
http://download.microsoft.com/download/3/1/1/311C06C1-F162-405C-B538-D9DC3A4007D1/WindowsUCRT.zip
UCRT Separate Files [MSU Installer]:
http://www.catalog.update.microsoft.com/Search.aspx?q=3118401

* Microsoft PowerShell 32-bit + 64-bit cross-platform task automation, scripting language, configuration management
framework (.NET compatible) + interactive shell command line interface for Windows XP/newer 32-bit (x86) + 64-bit (x64)
(English, free, open source):
http://github.com/PowerShell/PowerShell/
- PowerShell 32-bit + 64-bit for Windows 7 SP1/newer 32-bit (x86) + 64-bit (x64) [20-100 MB]:
http://github.com/PowerShell/PowerShell/releases/
PowerShell Documentation:
http://learn.microsoft.com/powershell/
Required:
Windows 10 Universal C RunTime (UCRT) 32-bit + 64-bit for Windows Vista/2008/7 SP1/8/8.1/2012 32-bit (x86) + 64-bit (x64):
http://support.microsoft.com/help/3118401/
UCRT All in One [ZIP]:
http://download.microsoft.com/download/3/1/1/311C06C1-F162-405C-B538-D9DC3A4007D1/WindowsUCRT.zip
UCRT Separate Files [MSU Installer]:
http://www.catalog.update.microsoft.com/Search.aspx?q=3118401

* Extract files from .MSU installers and install them in automated mode:
http://blogs.msdn.microsoft.com/astebner/2008/03/11/knowledge-base-article-describing-how-to-extract-msu-files-and-automate-installing-them/
http://support.microsoft.com/help/934307/
Extract .MSU contents (example):
EXPAND.EXE -f:* "Q000000.msu" %temp%\Q000000
Then use extracted file (.XML) to install .MSU by using Package Manager (PkgMgr.exe), after renaming .XML file if needed
(example):
PKGMGR.EXE /n:%temp%\Q000000\Q000000.xml
Install .MSU directly using WUSA (Windows Update Standalone Installer) [WUSA.EXE] (example):
WUSA.EXE "Q000000.MSU" /quiet /norestart
WUSA (Windows Update Standalone Installer) [WUSA.EXE] executable is located in the %WinDir%\SYSTEM32 directory/folder
[%WinDir% = usually C:\WINDOWS].
View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]:
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command
PATH
-> press Enter.

* Toubleshoot: Missing Windows Installer Cache files:
http://www.thewindowsclub.com/missing-windows-installer-cache-files-rebuild

* Fix Windows 7/newer errors/problems generated by executables/programs that canNOT be installed or uninstalled:
http://support.microsoft.com/mats/Program_Install_and_Uninstall/
Troubleshooter:
http://download.microsoft.com/download/7/E/9/7E9188C0-2511-4B01-8B4E-0A641EC2F600/MicrosoftProgram_Install_and_Uninstall.meta.diagcab

* Microsoft FixIt! [ DISCONTINUED ! ]:
http://support.microsoft.com/fixit/
Download ALL FixIt! Files:
http://support.microsoft.com/help/2970908/
Portable Install [ RECOMMENDED ! ]:
http://web.archive.org/web/20200414041622if_/http://download.microsoft.com/download/E/2/3/E237A32D-E0A9-4863-B864-9E820C1C6F9A/MicrosoftFixit-portable.exe

* FixIt! Disable Network Adapter Power Management setting:
http://support.microsoft.com/help/2740020/
File:
http://download.microsoft.com/download/0/A/F/0AFE6980-A813-42DD-86EC-58BF7A6A7B1B/MicrosoftEasyFix55016.msi

* Troubleshoot Intel Network Adapters Power Management:
http://www.intel.com/content/www/us/en/support/articles/000005879/network-and-i-o/wireless-networking.html

* Stop Network Adapter from Getting Disabled in Windows 7:
http://www.addictivetips.com/windows-tips/stop-network-adapter-from-getting-disabled-in-windows-7/

* Turn ON/OFF + Enable/Disable/Restart/Reset Internet/Network Adapter/Connection/Interface/Profile using command line tools:
http://www.action1.com/kb/restarting-the-network-adapter-in-Windows.html
http://www.privateinternetaccess.com/forum/discussion/20296/torrenting-disconnect-s-my-internet/
http://stackoverflow.com/questions/19831023/

* Prevent Windows from Turning OFF USB Devices:
http://www.helpdeskgeek.com/how-to/prevent-windows-from-powering-off-usb-device/

* 5 Tools to Prevent Windows from Sleeping or Turning OFF the Display:
http://www.raymond.cc/blog/dont-sleep-prevent-windows-from-standby-shutdown-hibernate-and-restart/

* Keep Computer/Laptop Awake without Touching the Mouse or Keyboard:
http://www.technorms.com/41354/
Mouse Jiggler fakes mouse cursor movement to prevent power savings iddle detection triggers:
http://github.com/arkane-systems/mousejiggler/
Download:
http://github.com/arkane-systems/mousejiggler/releases/latest/
Requires Microsoft .NET Framework Redistributable (NFR) 2.0/newer:
http://www.mdgx.com/add.htm#NFR
Command:
MouseJiggle.exe -j -z -m
Coffee prevents standby/sleep during network/internet activity, changes power settings:
http://sourceforge.net/projects/coffee-sc/
Download:
http://sourceforge.net/projects/coffee-sc/files/

* Save/view/print list of installed Windows Updates (WU) from the command line:
http://www.rakhesh.com/windows/get-a-list-of-recently-installed-windows-updates-via-the-command-line/
Save updates list(s) to text file(s) (examples):
WMIC.EXE QFE>UPD_QFE.TXT
WMIC.EXE QFE LIST FULL>UPD_FULL.TXT
DISM.EXE /Online /Get-packages>UPD_LIST.TXT
DISM.EXE /Online /Get-Packages /Format:Table>UPD_TABLE.TXT
systeminfo.exe>UPD_INFO.TXT
View text file(s) using Notepad/similar/better free(ware) plain text/ASCII editor/viewer:
http://www.mdgx.com/toy.htm#TXT
DISM (Deployment Image Servicing and Management) [DISM.EXE] executable is located in the %WinDir%\SYSTEM32 directory/folder
[%WinDir% = usually C:\WINDOWS].
View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]:
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command
PATH
-> press Enter.
WMIC.exe executable is located in the %WinDir%\SYSTEM32\wbem directory/folder [%WinDir% = usually C:\WINDOWS], listed on
your system PATH.
View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]:
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command
PATH
-> press Enter.
WMIC (Windows Management Instrumentation Command):
http://learn.microsoft.com/windows/win32/wmisdk/wmic/
MS DOCs: WMIC:
http://technet.microsoft.com/library/bb742610.aspx
Dedoimedo: WMIC - The Windows secret weapon:
http://www.dedoimedo.com/computers/windows-wmic.html
ComputerHope: WMIC:
http://www.computerhope.com/wmic.htm
Rob van der Woude: WMIC:
http://www.robvanderwoude.com/wmic.php
quux: WMIC Snippets:
http://quux.wiki.zoho.com/WMIC-Snippets.html
SS64: WMIC.EXE:
http://www.ss64.com/nt/wmic.html
Wikipedia: WMI:
http://en.wikipedia.org/wiki/Windows_Management_Instrumentation

* Uninstall Internet Explorer 9 (IE9):
http://support.microsoft.com/help/2579295/
File:
http://support.microsoft.com/help/2970908/
Internet Explorer (IE) Uninstall command line:
FORFILES.EXE /P %WinDir%\Servicing\Packages /M Microsoft-Windows-InternetExplorer-*9.*.mum /c "CMD /C ECHO Uninstalling package @fname && START /W pkgmgr /up:@fname /norestart"

* Install/Uninstall Internet Explorer 9 (IE9) in/from Windows 7:
http://windows.microsoft.com/en-US/windows7/how-do-i-install-or-uninstall-internet-explorer-9/

* Uninstall Internet Explorer 10 (IE10) + Reinstall Internet Explorer 9 (IE9) in Windows 7:
http://news.softpedia.com/news/How-to-Remove-IE10-and-Get-Back-to-IE9-on-Windows-7-308998.shtml

* Install/Uninstall Internet Explorer 10 (IE10) in/from Windows 7:
http://www.sevenforums.com/tutorials/282216-internet-explorer-10-install-uninstall-windows-7-a.html

* Searching, Downloading and Installing Updates:
http://msdn.microsoft.com/library/windows/desktop/aa387102.aspx
Searching, Downloading and Installing Specific Updates:
http://msdn.microsoft.com/library/windows/desktop/aa387101.aspx
Using the Windows Update Agent API:
http://msdn.microsoft.com/library/windows/desktop/aa387287.aspx
Using WUA to Scan for Updates Offline:
http://msdn.microsoft.com/library/windows/desktop/aa387290.aspx
MSKB: Error code 0x80000FFFF when using Windows Update or Microsoft Update:
http://support.microsoft.com/help/946414/
MSKB: Latest version of Windows Update Agent (WUA):
http://support.microsoft.com/help/949104/
MSKB: Unable to install Updates:
http://support.microsoft.com/help/2509997/
SevenForums: Windows Update will not start:
http://www.sevenforums.com/windows-updates-activation/120431-windows-update-will-not-start.html#post1039097
SevenForums: Windows Update service not working:
http://www.sevenforums.com/windows-updates-activation/102472-windows-update-service-not-working.html
Fix WU:
http://www.softpedia.com/get/Tweak/System-Tweak/Fix-WU.shtml
MDGx "Windows Update Client (WUC) + Windows Update Agent (WUA)" topic in SOFTWARE.TXT (included):
http://www.mdgx.com/xptoy.htm#WUC

* Enable Windows Updates (WU) in Windows 7/8/8.1:
http://support.microsoft.com/help/4056895/
http://support.microsoft.com/help/4056894/
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\QualityCompat]
"cadca5fe-87d3-4b96-b7fb-a231484277cc"=dword:0
;
------End cut & paste here------

* Disable Windows Updates (WU), Windows Server Update Services (WSUS) + related Registry settings in Windows 7/8/8.1/10 +
Windows Server 2012/2016/2019/2022:
http://support.microsoft.com/help/328010/
http://github.com/vFense/vFenseAgent-win/wiki/Registry-keys-for-configuring-Automatic-Updates-&-WSUS/
http://www.smallvoid.com/article/winnt-automatic-updates-config.html
http://admx.help/HKLM/Software/Policies/Microsoft/WindowsStore
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate]
"DoNotConnectToWindowsUpdateInternetLocations"=dword:1
"AllowAutoWindowsUpdateDownloadOverMeteredNetwork"=dword:0
"BranchReadinessLevel"=dword:10
"ConfigureDeadlineForFeatureUpdates"=dword:1e
"ConfigureDeadlineForQualityUpdates"=dword:1e
"DeferFeatureUpdates"=dword:1
"DeferFeatureUpdatesPeriodInDays"=dword:16d
"DeferQualityUpdatesPeriodInDays"=dword:1e
"DeferQualityUpdates"=dword:1
"DeferUpgrade"=dword:1
"DeferUpgradePeriod"=dword:8
"DeferUpdatePeriod"=dword:4
"DisableOSUpgrade"=dword:1
"DisableWindowsUpdateAccess"=dword:1
"ElevateNonAdmins"=dword:1
"FlightCommitted"=dword:0
"FlightSettingsMaxPauseDays"=dword:99999999
"HideMCTLink"=dword:1
"InsiderProgramEnabled"=dword:0
"PauseDeferrals"=dword:1
"PauseFeatureUpdatesStartTime"="2015-05-05T05:05:05Z"
"PauseQualityUpdatesStartTime"="2015-05-05T05:05:05Z"
"PauseUpdatesExpiryTime"="2077-07-07T07:07:07Z"
"PauseFeatureUpdatesEndTime"="2077-07-07T07:07:07Z"
"PauseQualityUpdatesEndTime"="2077-07-07T07:07:07Z"
"RestartNotificationsAllowed"=dword:1
"TargetReleaseVersion"=dword:1
"TargetReleaseVersionInfo"=dword:0
"WUServer"="0.0.0.0"
"WUStatusServer"="0.0.0.0"
"UpdateServiceUrlAlternate"="0.0.0.0"
"ManagePreviewBuilds"=dword:1
"ManagePreviewBuildsPolicyValue"=dword:0
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU]
"AutoInstallMinorUpdates"=dword:0
"NoAutoUpdate"=dword:1
"NoAutoRebootWithLoggedOnUsers"=dword:1
"NoAUAsDefaultShutdownOption"=dword:1
"RebootRelaunchTimeout"=dword:3
"RebootRelaunchTimeoutEnabled"=dword:1
"UseWUServer"=dword:1
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update]
"NextSqmReportTime"="0"
"NextFeaturedUpdatesNotificationTime"="0"
"EnableFeaturedSoftware"=dword:0
"FeaturedUpdatesNotificationSeqNum"=dword:0
"FeaturedUpdatesNotificationSeqNumGenTime"="0"
"SetupWizardLaunchTime"="0"
"ForcedReboot"=dword:0
"AUOptions"=dword:1
"ConfigVer"=dword:1
"BalloonTime"="0"
"ScheduledInstallDay"=dword:0
"ScheduledInstallTime"=dword:0
"IncludeRecommendedUpdates"=dword:0
"NextDetectionTime"="0"
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer]
"NoWindowsUpdate"=dword:1
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]
"NoWindowsUpdate"=dword:1
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\OSUpgrade]
"AllowOSUpgrade"=dword:0
"ReservationsAllowed"=dword:0
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\OSUpgrade\State]
"OSUpgradeState"=dword:1
"OSUpgradeStateTimeStamp"="2015-05-05 05:05:05"
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsStore]
"DisableOSUpgrade"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\Setup\UpgradeNotification]
"UpgradeAvailable"=dword:0
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main]
"EnableAutoUpgrade"=dword:0
[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main]
"EnableAutoUpgrade"=dword:0
[HKEY_USERS\.DEFAULT\Software\Microsoft\Internet Explorer\Main]
"EnableAutoUpgrade"=dword:0
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Media Player]
"DisableAutoUpdate"=dword:1
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Internet Explorer\Infodelivery\Restrictions]
"NoUpdateCheck"=dword:1
;
------End cut & paste here------

* Portable Update (PortUp):
http://www.portableupdate.com/
PortUp:
http://www.portableupdate.com/public/PortUp.zip
PortUp DOCumentation:
http://www.portableupdate.com/docs/documentation.aspx

* Microsoft Windows Updates (WU) server:
http://windowsupdate.microsoft.com/

* Windows Server Update Services (WSUS) Offline Update tool:
http://download.wsusoffline.net/

* Start (run) WuauServ (Windows Updates Automatic Service) and configure it to start only when needed (on demand):
ECHO Y|NET.EXE START wuauserv
SC.EXE CONFIG wuauserv START= demand
Stop (exit) WuauServ (if running):
ECHO Y|NET.EXE STOP wuauserv

* Run Windows Automatic Updates (WUA):
WUAPP.EXE
Run WUA from the command line:
http://morgansimonsen.com/2010/12/14/automatic-updates-client-command-line-parameters/
http://www.ss64.com/nt/wuauclt.html
WUAUCLT.EXE

* Repair/Reinstall Windows Update (WU):
http://www.winhelp.us/reinstall-windows-update.html
File:
http://www.winhelp.us/files/MicrosoftFixit50202.msi

* Fix WU Utility:
http://www.thewindowsclub.com/repair-fix-windows-updates-with-fix-wu-utility/
File:
http://www.thewindowsclub.com/downloads/Fix%20WU.zip

* FixIt! Windows Update (WU):
http://support.microsoft.com/mats/windows_update/
FixIt! WU PORTABLE:
http://download.microsoft.com/download/E/2/3/E237A32D-E0A9-4863-B864-9E820C1C6F9A/MicrosoftFixit-portable.exe
FixIt! WU ONLINE:
http://download.microsoft.com/download/F/2/2/F22D5FDB-59CD-4275-8C95-1BE17BF70B21/WindowsUpdateDiagnostic.diagcab

* Repair Windows 7 Update Issues:
http://www.dell.com/support/troubleshooting/us/en/19/KCS/KcsArticles/ArticleView?docid=404587

* Hide/Restore Hidden Windows Updates in Windows 7/8/8.1:
http://www.sevenforums.com/tutorials/24376-windows-update-hide-restore-hidden-updates.html

* Windows Hotfix Downloader (WHDownloader.exe) for Windows 7/8/8.1:
http://forums.mydigitallife.net/threads/whdownloader-support-and-chat.44645/
File:
http://www.majorgeeks.com/files/details/windows_hotfix_downloader.html

* Windows Updates Downloader (WUD):
http://www.windowsupdatesdownloader.com/
Files:
http://www.windowsupdatesdownloader.com/ProgramFiles.aspx
Updates List (ULZ):
http://www.windowsupdatesdownloader.com/UpdateLists.aspx

* Windows Update Checker (KUC):
http://windows-update-checker.com/
Files:
http://windows-update-checker.com/download/

* TheHotfixShare (THS) Windows Hotfixes:
http://www.thehotfixshare.net/board/?autocom=downloads
THS forum membership is free.
THS Language Neutral Windows 7 Hotfix Downloads:
http://www.thehotfixshare.net/board/?autocom=downloads&showcat=136

* FixWin for Windows Vista/7:
http://www.thewindowsclub.com/repair-fix-windows-7-vista-problems-with-fixwin-utility/
File:
http://www.thewindowsclub.com/downloads/FixWin.zip
Guide:
http://www.windowsvalley.com/download-fixwin-utility-reform-your-windows/

* System Update Readiness (SUR) + Deployment Image Servicing and Management (DISM) tool (DISM.EXE) repairs WU errors,
(re)installs + verifies updates/(hot)fixes/patches in Windows Vista/7/newer:
http://support.microsoft.com/help/947821/
- DISM 64-bit for Windows 7 64-bit (x64):
http://www.microsoft.com/download/details.aspx?id=20858
File:
http://download.microsoft.com/download/E/8/D/E8DAA970-1036-447F-B5EA-716D4BA70EC5/Windows6.1-KB947821-v34-x64.msu
- DISM 32-bit for Windows 7 SP1 32-bit (x86):
http://www.microsoft.com/download/details.aspx?id=3132
File:
http://download.microsoft.com/download/4/7/A/47A0F7B9-1F0F-41B0-AA42-00FD16337268/Windows6.1-KB947821-v34-x86.msu
DISM (Deployment Image Servicing and Management) [DISM.EXE] executable is located in the %WinDir%\SYSTEM32 directory/folder
[%WinDir% = usually C:\WINDOWS].
View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]:
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command
PATH
-> press Enter.
Use DISM to fix Windows Update (WU) errors:
http://learn.microsoft.com/troubleshoot/windows-server/deployment/fix-windows-update-errors/
DISM command line options:
http://learn.microsoft.com/windows-hardware/manufacture/desktop/dism-global-options-for-command-line-syntax/
http://learn.microsoft.com/windows-hardware/manufacture/desktop/dism-operating-system-package-servicing-command-line-options/

* Turn OFF Internet File Association (Search web for unknown extension)
behind-your-back/disguised/forced/hidden/intrusive/invasive/subversive/unwanted/without-your-consent "feature" for safety
purposes in Windows NTx:
http://admx.help/?Category=Windows_10_2016&Policy=Microsoft.Policies.InternetCommunicationManagement::ShellNoUseInternetOpenWith_2
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer]
"NoInternetOpenWith"=dword:1
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]
"NoInternetOpenWith"=dword:1
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]
"NoInternetOpenWith"=dword:1
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System]
"NoInternetOpenWith"=dword:1
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System]
"NoInternetOpenWith"=dword:1
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\System]
"NoInternetOpenWith"=dword:1
;
------End cut & paste here------

* Windows 7 Internet Explorer 9 (IE9) Core Fonts Blurred Text Fix:
http://support.microsoft.com/help/2545698/
- IE9 Text Fix 64-bit:
http://download.microsoft.com/download/0/5/6/05675ADF-21AB-4476-8731-95182643D02C/Windows6.1-KB2545698-x64.msu
- IE9 Text Fix 32-bit:
http://download.microsoft.com/download/4/C/7/4C7D491B-6F78-4DB7-B87C-71777BF41E3F/Windows6.1-KB2545698-x86.msu

* Uninstall/Reinstall/Repair Internet Explorer (IE) [discontinued!] in Windows Vista/7/8/8.1/10:
http://learn.microsoft.com/troubleshoot/browsers/how-to-repair-or-reinstall-ie/
http://answers.microsoft.com/en-us/windows/forum/windows_7-windows_install-winsubother/windows-update-how-to-fix-some-settings-are/a5160e9d-21e8-4ecd-8218-6a6b88134748
1. Uninstall Internet Explorer (IE) from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD
shortcut/CMD.EXE -> Run as Administrator -> run one of these commands (run the 2nd in case the 1st doesn't work) -> press
Enter (after each line):
DISM.EXE /online /Disable-Feature /FeatureName:Internet-Explorer-Optional-amd64
FORFILES.EXE /P %WinDir%\servicing\Packages /M Microsoft-Windows-InternetExplorer-*11.*.mum /c "cmd.exe /c echo Uninstalling package @fname && start /w pkgmgr.exe /up:@fname /norestart"
DISM (Deployment Image Servicing and Management) [DISM.EXE] executable is located in the %WinDir%\SYSTEM32 directory/folder
[%WinDir% = usually C:\WINDOWS].
View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]:
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command
PATH
-> press Enter.
2. Reinstall Internet Explorer (IE) -> open Control Panel (CP)
CONTROL.EXE
-> Programs and Features -> Turn Windows features on or off -> Windows Features -> check Internet Explorer (11) box ->
Apply/OK.

* Windows 7 Application Compatibility Update (ACU):
http://support.microsoft.com/help/974332/
Windows 7 Application Compatibility List:
http://www.microsoft.com/download/details.aspx?id=2394
MDGx "Application Compatibility Toolkit (ACT)" topic in SOFTWARE.TXT (included):
http://www.mdgx.com/xptoy.htm#ACT

* Windows 7 Service Pack 1 (SP1):
http://support.microsoft.com/help/976932/
Windows 7 Service Pack 1 (SP1) Update:
http://support.microsoft.com/help/2533552/
Windows 7 Service Pack 1 (SP1) Guide:
http://windows.microsoft.com/windows7sp1/
Windows 7 Service Pack 1 (SP1) Downloads:
http://www.catalog.update.microsoft.com/search.aspx?q=KB976932
- Windows 7 SP1 64-bit for Windows 7 64-bit (x64) [900 MB]:
http://download.windowsupdate.com/msdownload/update/software/svpk/2011/02/windows6.1-kb976932-x64_74865ef2562006e51d7f9333b4a8d45b7a749dab.exe
- Windows 7 SP1 Update 64-bit for Windows 7 SP1 64-bit (x64):
http://download.windowsupdate.com/msdownload/update/software/crup/2011/05/windows6.1-kb2533552-x64_0ba5ac38d4e1c9588a1e53ad390d23c1e4ecd04d.msu
- Windows 7 SP1 32-bit for Windows 7 32-bit (x86) [500 MB]:
http://download.windowsupdate.com/msdownload/update/software/svpk/2011/02/windows6.1-kb976932-x86_c3516bc5c9e69fee6d9ac4f981f5b95977a8a2fa.exe
- Windows 7 SP1 Update 32-bit for Windows 7 SP1 32-bit (x86):
http://download.windowsupdate.com/msdownload/update/software/crup/2011/05/windows6.1-kb2533552-x86_f2061d1c40b34f88efbe55adf6803d278aa67064.msu

* Microsoft Security Essentials (MSE):
http://www.microsoft.com/security_essentials/

* Windows 7 Review:
http://www.activewin.com/reviews/software/operating-sys/windows7/

* Windows 7 ISOs:
http://www.mydigitallife.info/2009/11/10/windows-7-iso-x86-and-x64-official-direct-download-links-ultimate-professional-and-home-premium/

* Windows NT Backup Restore Utility for Windows 7:
http://support.microsoft.com/help/974674/
Hotfix [request links in e-mail]:
http://support.microsoft.com/hotfix/KBHotfix.aspx?kbnum=974674&kbln=en-us
http://www.microsoft.com/download/details.aspx?id=18924

* MDGx Windows 7/7 SP1 Components, Add-ons, Extras, (Hot)Fixes, Patches, Upgrades, Updates (all included):
- MDGx "Java Runtime Environment (JRE)" topic in SOFTWARE.TXT:
http://www.mdgx.com/add.htm#JAVA
- MDGx ".NET Framework Redistributable (NFR)" topic in SOFTWARE.TXT:
http://www.mdgx.com/add.htm#NFR
- MDGx "Visual Studio (VS) + Visual C++ (VC)" topic in SOFTWARE.TXT:
http://www.mdgx.com/add.htm#VS6
- MDGx "Windows Update Client (WUC) + Windows Update Agent (WUA)" topic in SOFTWARE.TXT:
http://www.mdgx.com/xptoy.htm#WUC
- MDGx "Application Compatibility Toolkit (ACT)" topic in SOFTWARE.TXT:
http://www.mdgx.com/xptoy.htm#ACT
- MDGx "Group Policy (GP)" topic in SOFTWARE.TXT:
http://www.mdgx.com/xptoy.htm#GPO
- MDGx "File Manager (FM)" topic in SOFTWARE.TXT:
http://www.mdgx.com/xptoy.htm#FMNT
- MDGx "Access Control Lists (ACL) + Ownership Tools" topic in SOFTWARE.TXT:
http://www.mdgx.com/xptoy.htm#ACL
- MDGx "NTFS Alternate Data Streams (ADS)" topic in SOFTWARE.TXT:
http://www.mdgx.com/xptoy.htm#ADS
- MDGx "Free(ware) Windows NTx Extras" topic in SOFTWARE.TXT:
http://www.mdgx.com/xptoy.htm#2KXP
______________________________________________________________________________



Turn OFF/Remove Windows 7/8/8.1 Adware, Spyware, Security Flaws + Repair/Restore Privacy



* MDGx "Turn OFF/Remove Windows 10 Adware, Spyware, Security Flaws + Repair/Restore Privacy" chapter in WIN10.TXT
(included):
http://www.mdgx.com/10.php
http://www.mdgx.com/WIN10.TXT

* Turn OFF/block/disable/remove/stop/repair Windows 7/8/8.1 dangerous/insecure/unsafe,
undesirable/unnecessary/unneeded/unused/useless, behind-my-back/disguised/forced/hidden/intrusive/invasive,
annoying/bloat/resources consuming, diagnostic tracking, telemetry ("phone home"), data collection/logging, customer
"experience", unwanted "offers", ad(ware)/spyware/surveillance/tracking, privacy/safety/security flaws/vulnerabilities:
- Fix Windows 7/8/8.1 privacy + disable spyware:
http://web.archive.org/web/20180323123837/http://fix10.isleaked.com/oldwindows.html
- Remove, Block and Prevent "Get Windows 10" (GWX) App for Enterprise Environments:
http://blogs.technet.com/b/charlesa_us/archive/2015/06/25/how-to-remove-block-and-prevent-quot-get-windows-10-quot-application-for-corporate-environments.aspx
- Manage connections from Windows Operating System components to Microsoft services:
http://technet.microsoft.com/library/mt577208.aspx
- Disable Telemetry and Data Collection in Windows 7/8/8.1:
http://www.askvg.com/tip-disable-telemetry-and-data-collection-on-windows-7-and-8/
- Disable Remote Registry (RemoteRegistry) service:
http://www.techrepublic.com/article/solutionbase-disabling-windows-xps-remote-registry-service/
______________________________________________________________________________



Everything About The Infamous (Not So) Trusted Installer



* Everything about TrustedInstaller:
************************************
Info, guides, fixes, workarounds + tweaks:
TrustedInstaller [TrustedInstaller.exe] executable is located in the %WinDir%\Servicing directory/folder [%WinDir% =
usually C:\WINDOWS] is Windows NTx [Vista/newer] Microsoft built-in user account [special "VIP" type user created by
Microsoft as "master overseer"] with privileged, above-admin, system-wide rights which performs automatic/unattended
behind-your-back/disguised/forced/hidden/intrusive/invasive/subversive/unwanted/without-your-consent functions/operations,
for example: downloads, updates, (re)installs/uninstalls, closes/executes/(re)starts/(re)schedules dynamic link libraries
(DLLs)/executables/services/tasks/scripts, modifies the Registry, system configuration files/scripts/tasks,
creates/copies/renames/modifies/moves/deletes files/folders, blocks/locks out the owner/administrators/legitimate
users/modifies/takes over files/folders ownership/permissions/attributes, reboots/restarts/shuts down Windows.
But you [as any logged in user with administrative rights ;-/] can "disguise"/"impersonate"/replace/substitute/switch as
different user, and run as TrustedInstaller in order to access/customize/modify/run any
disabled/forbidden/locked/unavailable Windows command, executable, file, directory/folder, function, process, registry
key/value, script, service, task, etc:
- Run Programs as TrustedInstaller to Write to Certain Registry Keys or Files:
http://www.winhelponline.com/blog/run-program-as-trustedinstaller-locked-registry-keys-files/
- Delete Files Protected by TrustedInstaller:
http://www.helpdeskgeek.com/windows-7/windows-7-how-to-delete-files-protected-by-trustedinstaller/
- TrustedInstaller Permission and CPU Fix:
http://howtoremove.guide/trustedinstaller-permission-cpu-fix-win7-win10/
- Execute programs as System/TrustedInstaller:
http://borncity.com/win/2017/02/22/windows-10-execute-programs-as-systemtrustedinstaller/
- The Art of Becoming TrustedInstaller:
http://www.tiraniddo.dev/2017/08/the-art-of-becoming-trustedinstaller.html
- Take ownership and get full access to files and directories/folders in Windows 10:
http://www.winaero.com/blog/how-to-take-ownership-and-get-full-access-to-files-and-folders-in-windows-10/
- What is TrustedInstaller.exe and should I remove it?:
http://windowsreport.com/what-is-trustedinstaller-exe/
- Get Permission from TrustedInstaller in Windows 7/newer:
http://www.partitionwizard.com/partitionmagic/you-require-permission-from-trustedinstaller.html
- TrustedInstaller Permission and CPU Fix:
http://howtoremove.guide/trustedinstaller-permission-cpu-fix-win7-win10/
- What Is TrustedInstaller? Why Does It Keep Me From Renaming Files?:
http://www.makeuseof.com/tag/what-is-trustedinstaller-and-why-does-it-keep-me-from-renaming-files/
- Fix: You require permission from trustedinstaller windows 10:
http://thegeekpage.com/fix-you-require-permission-from-trustedinstaller-windows-10/
- Windows 10 Home - Getting TrustedInstaller permission to edit and remove items:
http://answers.microsoft.com/en-us/windows/forum/windows_10-other_settings/windows-10-home-getting-trustedinstaller/6664a5f1-5c71-45fc-94be-805075db682a/
- COMPLETELY delete trustedinstaller:
http://social.technet.microsoft.com/forums/en-us/b6b1ee19-96a3-4b6a-b7af-166287c1b3c2/
- What is TrustedInstaller.exe in Windows 10/11?:
http://www.thewindowsclub.com/trustedinstaller-exe-windows-7/
- Restore TrustedInstaller ownership in Windows 10:
http://www.winaero.com/blog/how-to-restore-the-trustedinstaller-ownership-in-windows-10/

* Restore/Take control [take #1]:
*********************************
Run Registry Editor (%WinDir%\RegEdit.exe) [%WinDir% = usually C:\WINDOWS] as TrustedInstaller (highest available user
level) in order to be allowed to add/delete/edit/modify/rename any registry key/value using AdvancedRun.exe:
AdvancedRun.exe /EXEFilename "%windir%\REGEDIT.EXE" /RunAs 8 /Run
AdvancedRun [AdvancedRun.exe] 32-bit + 64-bit GUI interface + DOS console command line tool for Windows Vista/newer
32-bit + 64-bit runs any app/batch/command/executable/function/process/program/script/service/task/tool as
Administrator/SYSTEM/TrustedInstaller/any user with elevated/highest/protected privileges/rights, compatibility,
environment, ownership, permissions, priority, properties, useful for task automation in BATch (.BAT), CoMmanD (.CMD) +
Visual Basic Script (.VBS) files, highly customizable:
http://www.nirsoft.net/utils/advanced_run.html
AdvancedRun 64-bit:
http://www.nirsoft.net/utils/advancedrun-x64.zip
AdvancedRun 32-bit:
http://www.nirsoft.net/utils/advancedrun.zip
Run Programs as TrustedInstaller:
http://www.winhelponline.com/blog/run-program-as-trustedinstaller-locked-registry-keys-files/
See also "Turn OFF/Postpone/Block/Uninstall Windows Updates (WU)" chapter -> "WUB Brief Explanation:" section in WIN10.TXT
(included):
http://www.mdgx.com/10.php
http://www.mdgx.com/WIN10.TXT
Add "Run as TrustedInstaller" item to the right-click shell context menu for BATch (.bat), CoMmanD (.cmd), EXEcutables
(.exe) + Visual Basic Script (.vbs) files/shortcuts. You can add any other/all file formats following the same rules -> see
below.
In this example AdvancedRun.exe (see above) is located in the C:\TOOLS directory/folder.
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\batfile\shell\RunAsTrustInst]
@="Run as TrustedInstaller"
"SuppressionPolicy"=dword:0
"HasLUAShield"=""
"NoWorkingDirectory"=""
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\batfile\shell\RunAsTrustInst\command]
@="C:\\TOOLS\\AdvancedRun.exe /EXEFilename \"%1\" /RunAs 8 /Run"
"IsolatedCommand"=-
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\cmdfile\shell\RunAsTrustInst]
@="Run as TrustedInstaller"
"SuppressionPolicy"=dword:0
"HasLUAShield"=""
"NoWorkingDirectory"=""
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\cmdfile\shell\RunAsTrustInst\command]
@="C:\\TOOLS\\AdvancedRun.exe /EXEFilename \"%1\" /RunAs 8 /Run"
"IsolatedCommand"=-
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\exefile\shell\RunAsTrustInst]
@="Run as TrustedInstaller"
"SuppressionPolicy"=dword:0
"HasLUAShield"=""
"NoWorkingDirectory"=""
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\exefile\shell\RunAsTrustInst\command]
@="C:\\TOOLS\\AdvancedRun.exe /EXEFilename \"%1\" /RunAs 8 /Run"
"IsolatedCommand"=-
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\vbsfile\shell\RunAsTrustInst]
@="Run as TrustedInstaller"
"SuppressionPolicy"=dword:0
"HasLUAShield"=""
"NoWorkingDirectory"=""
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\vbsfile\shell\RunAsTrustInst\command]
@="C:\\TOOLS\\AdvancedRun.exe /EXEFilename \"%1\" /RunAs 8 /Run"
"IsolatedCommand"=-
;
------End cut & paste here------
From now on: Explorer/Desktop/Start button/icon/logo/menu/orb -> right-click a BATch (.bat), CoMmanD (.cmd), EXEcutable
(.exe), or Visual Basic Script (.vbs) file/shortcut -> select "Run as TrustedInstaller".

* Restore/Take control [take #2]:
*********************************
Access/execute/launch/open/run/start any possible file type (file extension) by adding "Run as TrustedInstaller" item to the
right-click shell context menu for *all* files types/extensions associated with a known/listed/registered
API (Application Programming Interface)/app(lication)/DLL (Dynamic Link Library)/EXEcutable
(.exe)/function/program/resident/script (.bat, .cmd, .hta, .reg, .vbs, .wsh, etc)/service/task -> see below.
In this example AdvancedRun.exe (see above) is located in the C:\TOOLS directory/folder, and represented as "C:\\TOOLS" in
the Registry (.reg) file below.
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\*\shell\RunAsTrustInst]
@="Run as TrustedInstaller"
"SuppressionPolicy"=dword:0
"HasLUAShield"=""
"NoWorkingDirectory"=""
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\*\shell\RunAsTrustInst\command]
@="C:\\TOOLS\\AdvancedRun.exe /EXEFilename \"%1\" /RunAs 8 /Run"
"IsolatedCommand"=-
;
------End cut & paste here------
From now on: Explorer/Desktop/Start button/icon/logo/menu/orb -> right-click any file type (any extension)/file shortcut ->
select "Run as TrustedInstaller".

* Restore/Take control [take #3]:
*********************************
Import/load/merge all data/information contained inside Registration Files (.reg) into the Registry [using RegEdit
(REGEDIT.EXE) located in the %WinDir% directory/folder = usually C:\WINDOWS] with TrustedInstaller privileges -> see below.
In this example AdvancedRun.exe (see above) is located in the C:\TOOLS directory/folder.
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\REGEDIT.EXE]
@="C:\\WINDOWS\\REGEDIT.EXE"
"Path"="C:\\WINDOWS"
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\AdvancedRun.exe]
@="C:\\TOOLS\\AdvancedRun.exe"
"Path"="C:\\TOOLS"
[HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers]
"C:\\TOOLS\\AdvancedRun.exe"="RUNASADMIN"
"C:\\WINDOWS\\REGEDIT.EXE"="RUNASADMIN"
"C:\\WINDOWS\\SYSTEM32\\regedt32.exe"="RUNASADMIN"
"C:\\WINDOWS\\SysWOW64\\regedit.exe"="RUNASADMIN"
"C:\\WINDOWS\\SysWOW64\\regedt32.exe"="RUNASADMIN"
[HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted]
"C:\\TOOLS\\AdvancedRun.exe"=dword:1
"C:\\WINDOWS\\REGEDIT.EXE"=dword:1
"C:\\WINDOWS\\SYSTEM32\\regedt32.exe"=dword:1
"C:\\WINDOWS\\SysWOW64\\regedit.exe"=dword:1
"C:\\WINDOWS\\SysWOW64\\regedt32.exe"=dword:1
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Applications\REGEDIT.EXE]
"NoOpenWith"=-
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Applications\REGEDIT.EXE\DefaultIcon]
@="REGEDIT.EXE,0"
; Restore default action: remove the semicolon [;] and the space [ ] in front of the
; commented/disabled @="REGEDIT.EXE \"%1\"" value below + add a semicolon [;] followed by a space [ ] in front of the
; active/enabled @="... AdvancedRun64..." value below:
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Applications\REGEDIT.EXE\shell\open\command]
; @="REGEDIT.EXE \"%1\""
@="C:\\TOOLS\\AdvancedRun.exe /EXEFilename \"C:\\WINDOWS\\REGEDIT.EXE\" /CommandLine \"%1\" /RunAs 8 /Run"
"NoOpenWith"=-
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\regedit]
@="Registration Entries"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\regedit\DefaultIcon]
@="REGEDIT.EXE,0"
; Restore default action: remove the semicolon [;] and the space [ ] in front of the
; commented/disabled @="REGEDIT.EXE \"%1\"" value below + add a semicolon [;] followed by a space [ ] in front of the
; active/enabled @="... AdvancedRun64..." value below:
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\regedit\shell\open\command]
; @="REGEDIT.EXE \"%1\""
@="C:\\TOOLS\\AdvancedRun.exe /EXEFilename \"C:\\WINDOWS\\REGEDIT.EXE\" /CommandLine \"%1\" /RunAs 8 /Run"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\REGEDIT.EXE]
@="Registration Entries"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\REGEDIT.EXE\DefaultIcon]
@="REGEDIT.EXE,0"
; Restore default action: remove the semicolon [;] and the space [ ] in front of the
; commented/disabled @="REGEDIT.EXE \"%1\"" value below + add a semicolon [;] followed by a space [ ] in front of the
; active/enabled @="... AdvancedRun64..." value below:
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\REGEDIT.EXE\shell\open\command]
; @="REGEDIT.EXE \"%1\""
@="C:\\TOOLS\\AdvancedRun.exe /EXEFilename \"C:\\WINDOWS\\REGEDIT.EXE\" /CommandLine \"%1\" /RunAs 8 /Run"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\regfile]
@="Registration Entries"
"EditFlags"=dword:1
"AlwaysShowExt"=""
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\regfile\DefaultIcon]
@="REGEDIT.EXE,0"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\regfile\shell\open]
@="Mer&ge"
; Restore default action: remove the semicolon [;] and the space [ ] in front of the
; commented/disabled @="REGEDIT.EXE \"%1\"" value below + add a semicolon [;] followed by a space [ ] in front of the
; active/enabled @="... AdvancedRun64..." value below:
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\regfile\shell\open\command]
; @="REGEDIT.EXE \"%1\""
@="C:\\TOOLS\\AdvancedRun.exe /EXEFilename \"C:\\WINDOWS\\REGEDIT.EXE\" /CommandLine \"%1\" /RunAs 8 /Run"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.reg]
@="regfile"
"PerceivedType"="system"
;
------End cut & paste here------
From now on: Desktop/Explorer/Start button/icon/logo/menu/orb, etc -> right-click any Registration File (.reg) -> select
"Merge" -> click Yes -> click OK.

* Turn OFF (Disable) TrustedInstaller | Turn back ON (Restore) TrustedInstaller:
********************************************************************************
Method I [the easiest way ;-/]:
*******************************
Turn OFF/disable the TrustedInstaller service [which starts the %WinDir%\servicing\TrustedInstaller.exe EXEcutable upon
every Windows (re)boot/(re)start and whenever the TrustedInstaller service is not running] from starting + running by
tweaking your registry:
http://learn.microsoft.com/troubleshoot/windows-client/deployment/windows-update-hangs-updates-uninstalled/
http://learn.microsoft.com/answers/questions/53649/
http://conetrix.com/blog/windows-updates-consistently-failing-after-15-minutes/
http://www.sysnative.com/forums/threads/windows-update-going-around-in-circles-telling-me-i-must-restart-my-computer.5804/
All of this can be done in 1 easy (double)-click step by running the Registry (.reg) file below.
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
; Built-in/default values are commented out (disabled) = preceded by a semicolon [;] + a space [ ].
; To replace any of these customized value(s) with the built-in/default one(s): add a semicolon [;] and a space [ ] in front
; of the active (enabled) line(s) you wish to disable/comment, and which begin with a quote mark ["], and delete/remove the
; semicolon [;] and the space [ ] present in front of the disabled one(s) in order to enable/activate it/them:
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\TrustedInstaller]
; "BlockTime"=dword:2a30
"BlockTime"=dword:0
; "BlockTimeIncrement"=dword:384
"BlockTimeIncrement"=dword:ffffffff
; "PreshutdownTimeout"=dword:36ee80
"PreshutdownTimeout"=dword:e10
; "Start"=dword:2
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\TrustedInstaller]
; "BlockTime"=dword:2a30
"BlockTime"=dword:0
; "BlockTimeIncrement"=dword:384
"BlockTimeIncrement"=dword:ffffffff
; "PreshutdownTimeout"=dword:36ee80
"PreshutdownTimeout"=dword:e10
; "Start"=dword:2
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\TrustedInstaller]
; "BlockTime"=dword:2a30
"BlockTime"=dword:0
; "BlockTimeIncrement"=dword:384
"BlockTimeIncrement"=dword:ffffffff
; "PreshutdownTimeout"=dword:36ee80
"PreshutdownTimeout"=dword:e10
; "Start"=dword:2
"Start"=dword:4
;
------End cut & paste here------
Explanation of all these Registry values, and step-by-step how to do this the hard way, manually, by hand [;-/]:
Open Registry Editor (RegEdit) [REGEDIT.EXE] located in the %WinDir% directory/folder [%WinDir% = usually C:\WINDOWS]:
right-click RegEdit or its shortcut/link -> Run as Administrator -> double-click -> scroll down 4 times [in the left hand
panel] until you arrive at your destination -> this registry key:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\TrustedInstaller
In the right hand panel:
1. Double-click "BlockTime" DWORD [REG_DWORD] to change its default value:
- hexadecimal: 2a30
- decimal: 10800 seconds = 180 minutes = 3 hours
to the minimum allowed value:
- hexadecimal: 0
- decimal: 0 seconds
2. Double-click "BlockTimeIncrement" DWORD [REG_DWORD] to change its default value:
- hexadecimal: 384
- decimal: 900 seconds = 15 minutes
to the maximum allowed value:
- hexadecimal: ffffffff
- decimal: 4294967295 seconds = 71582788 minutes = 1193046 hours = ~ 49710 days = ~ 136 years
3. Double-click "PreshutdownTimeout" DWORD [REG_DWORD] to change its default value:
- hexadecimal: 36ee80
- decimal: 3600000 seconds = 60000 minutes = 1000 hours = ~ 42 days
to a much smaller value:
- hexadecimal: e10
- decimal: 3600 seconds = 60 minutes = 1 hour
4. Double-click "Start" DWORD [REG_DWORD] to change its Automatic (Enabled) default value:
- hexadecimal: 2
- decimal: 2
to the Disabled (Blocked) value:
- hexadecimal: 4
- decimal: 4
Method I may need to be combined with Method II (below) to make sure it works 100% [;-/] -> keep reading...
Method II [the easy way]:
*************************
Turn OFF/disable the TrustedInstaller.exe executable by renaming its "servicing" directory/folder to something like
"servicing_OLD" (example), and then in case you'll need it whenever you wish to
change/install/repair/uninstall/update/upgrade an app/driver/game/program/software/tool/upgrade/Windows
add-on/component/feature/fix/patch/update/etc just turn ON/restore the TrustedInstaller.exe "servicing" directory/folder by
renaming it back to its original name:
A. Create a DOS console batch file with commands below:
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text BATch (.bat) or CoMmanD (.cmd) script file containing the lines between Cut & Paste delimiters below
-> save it as plain text/ASCII file (Encode: -> ANSI) with the BAT (.bat) or CMD (.cmd) extension -> right-click it ->
Run as Administrator -> wait for completion.
-----Begin cut & paste here-----
@ECHO OFF
IF NOT "%OS%"=="Windows_NT" GOTO END
TITLE "Turn OFF/disable TrustedInstaller -> RENAME %windir%\servicing 2 %windir%\servicing_OLD ..."
C:
CD\
TASKKILL.EXE /IM TrustedInstaller.exe /F /T
IF EXIST "%windir%\servicing" TAKEOWN.EXE /f "%windir%\servicing" /r /d y
IF EXIST "%windir%\servicing" ICACLS.EXE "%windir%\servicing" /grant:R Administrators:F SYSTEM:F /t /c /q
IF EXIST "%windir%\servicing" REN "%windir%\servicing" servicing_OLD
IF EXIST "%windir%\servicing_OLD" TAKEOWN.EXE /f "%windir%\servicing_OLD" /r /d y
IF EXIST "%windir%\servicing_OLD" ICACLS.EXE "%windir%\servicing_OLD" /grant:R Administrators:F SYSTEM:F /t /c /q
:END
EXIT
------End cut & paste here------
Save it as TrustdInstallr_OFF_RENAME_folder.cmd (example) on your Desktop or in any other location on your local
drive(s)/partition(s)/volume(s), and then create a Desktop shortcut for it -> right-click
TrustdInstallr_OFF_RENAME_folder.cmd (or its Desktop shortcut) -> Run as Administrator -> wait for completion.
B. Create a DOS console batch file with commands below:
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text BATch (.bat) or CoMmanD (.cmd) script file containing the lines between Cut & Paste delimiters below
-> save it as plain text/ASCII file (Encode: -> ANSI) with the BAT (.bat) or CMD (.cmd) extension -> right-click it ->
Run as Administrator -> wait for completion.
-----Begin cut & paste here-----
@ECHO OFF
IF NOT "%OS%"=="Windows_NT" GOTO END
TITLE "Turn ON/restore TrustedInstaller -> Rename %windir%\servicing_OLD 2 %windir%\servicing ..."
C:
CD\
IF EXIST "%windir%\servicing_OLD" TAKEOWN.EXE /f "%windir%\servicing_OLD" /r /d y
IF EXIST "%windir%\servicing_OLD" ICACLS.EXE "%windir%\servicing_OLD" /grant:R Administrators:F SYSTEM:F /t /c /q
TASKKILL.EXE /IM TrustedInstaller.exe /F /T
IF EXIST "%windir%\servicing_OLD" REN "%windir%\servicing_OLD" servicing
:END
EXIT
------End cut & paste here------
Save it as TrustdInstallr_ON_RESTORE_folder.cmd (example) on your Desktop or in any other location on your local
drive(s)/partition(s)/volume(s), and then create a Desktop shortcut for it -> right-click
TrustdInstallr_ON_RESTORE_folder.cmd (or its Desktop shortcut) -> Run as Administrator -> wait for completion.
ICACLS.EXE, TAKEOWN.EXE + TASKKILL.EXE executables (.exe) are located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% =
usually C:\WINDOWS].
View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]:
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command
PATH
-> press Enter.
OR
Save it to a plain text/ASCII (.txt) file: from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD
shortcut/CMD.EXE -> Run as Administrator -> type same command above followed by the name of the file (in this example it
will be saved in C:\ root)
PATH>C:\Windows_PATH_Directories.txt
-> press Enter -> use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to view saved text file contents.
Method III [the hard way ;-/]:
******************************
Turn OFF/rename TrustedInstaller.exe step-by-step [but 1st make a *BACKUP*!]:
A. Install IObit Unlocker 32-bit Explorer right-click context menu shell extension + GUI tool forces in-use files to unlock
so they can be copied, moved, deleted or renamed:
http://www.iobit.com/iobit-unlocker.php
File:
http://cdn.iobit.com/dl/unlocker-setup.exe
Guide:
http://www.winhelponline.com/blog/delete-a-stubborn-file-folder-in-windows/
Use IObit Unlocker executable [IObitUnlocker.exe] command line options, switches + parameters for unattended/automated BATch
files/jobs/scripts:
http://forums.iobit.com/topic/14855-command-line-arguments/
In this example IObitUnlocker.exe is installed [default option] in the "%ProgramFiles(x86)%\IObit\IObit Unlocker"
directory/folder [where %ProgramFiles(x86)% = usually "C:\Program Files (x86)"], found only on Windows NTx 64-bit (x64)
editions.
The Windows NTx 32-bit (x86) correspondent directory/folder is %ProgramFiles% = usually "C:\Program Files".
B. Extract executable [AdvancedRun.exe] from AdvancedRun ZIP archive below to match your Windows NTx OS bit strength [32-bit
(x86) or 64-bit (x64)]:
AdvancedRun [AdvancedRun.exe] 32-bit + 64-bit GUI interface + DOS console command line tool for Windows Vista/newer 32-bit +
64-bit runs any app/batch/command/executable/function/process/program/script/service/task/tool as
Administrator/SYSTEM/TrustedInstaller/any user with elevated/highest/protected privileges/rights, compatibility,
environment, ownership, permissions, priority, properties, useful for task automation in BATch (.BAT), CoMmanD (.CMD) +
Visual Basic Script (.VBS) files, highly customizable:
http://www.nirsoft.net/utils/advanced_run.html
AdvancedRun 64-bit:
http://www.nirsoft.net/utils/advancedrun-x64.zip
AdvancedRun 32-bit:
http://www.nirsoft.net/utils/advancedrun.zip
Run Programs as TrustedInstaller:
http://www.winhelponline.com/blog/run-program-as-trustedinstaller-locked-registry-keys-files/
In this example AdvancedRun.exe is located in the C:\TOOLS directory/folder.
C. Create a DOS console batch file with commands below:
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text BATch (.bat) or CoMmanD (.cmd) script file containing the lines between Cut & Paste delimiters below
-> save it as plain text/ASCII file (Encode: -> ANSI) with the BAT (.bat) or CMD (.cmd) extension -> right-click it ->
Run as Administrator -> wait for completion.
-----Begin cut & paste here-----
@ECHO OFF
IF NOT "%OS%"=="Windows_NT" GOTO END
C:\TOOLS\AdvancedRun.exe /EXEFilename "%ProgramFiles(x86)%\IObit\IObit Unlocker\IObitUnlocker.exe" /CommandLine "/Rename /Advanced %WinDir%\servicing\TrustedInstaller.exe TrustedInstaller_OLD.exe" /RunAs 8 /Run
:END
EXIT
------End cut & paste here------
Save it as Rename_TrustdInstallr.cmd (example) on your Desktop or in any other location on your local
drive(s)/partition(s)/volume(s), and then create a Desktop shortcut for it = important for fast access in the next step
below!
D. Turn OFF temporarily (for a few seconds, until you can rename it in the next step below) TrustedInstaller.exe:
hold Ctrl + Shift + press Esc -> Task Manager (TaskMgr.exe) -> Processes tab -> right-click TrustedInstaller.exe (-> End
task) -> click "End process".
E. As fast as possible [!]: Desktop -> right-click Rename_TrustdInstallr.cmd (or its Desktop shortcut) -> Run as
Administrator -> click OK when you see the IObit Unloker "Operation succeded." window -> done.
From now on you won't have to put up anymore with any TrustedInstaller annoyances, behind-your-back/blocked/forbidden
system/user functions/operations, lock outs, limitations, etc.
F. Restore TrustedInstaller.exe by renaming it back to its original name in case you'll need it whenever you wish to
change/install/repair/uninstall/update/upgrade an app/driver/game/program/software/tool/upgrade/Windows
add-on/component/feature/fix/patch/update/etc:
Perform again steps C. + E. above (D. is not needed), but this time use instead another DOS console batch file [example:
Restore_TrustdInstallr.cmd] to rename TrustedInstaller_OLD.exe back to its original name = TrustedInstaller.exe :
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text BATch (.bat) or CoMmanD (.cmd) script file containing the lines between Cut & Paste delimiters below
-> save it as plain text/ASCII file (Encode: -> ANSI) with the BAT (.bat) or CMD (.cmd) extension -> right-click it ->
Run as Administrator -> wait for completion.
-----Begin cut & paste here-----
@ECHO OFF
IF NOT "%OS%"=="Windows_NT" GOTO END
C:\TOOLS\AdvancedRun.exe /EXEFilename "%ProgramFiles(x86)%\IObit\IObit Unlocker\IObitUnlocker.exe" /CommandLine "/Rename /Advanced %WinDir%\servicing\TrustedInstaller_OLD.exe TrustedInstaller.exe" /RunAs 8 /Run
:END
EXIT
------End cut & paste here------
______________________________________________________________________________



Task Scheduler Tweaks



* Windows Vista/7: Run any BATch/script/program (in Task Scheduler) minimized and with custom icon:
http://answers.microsoft.com/en-us/windows/forum/windows_7-performance/make-windows-7-task-scheduler-run-a-batch-file/0573dc2e-4941-44a2-8304-264864e94f1a/
Windows 8/8.1/10/11: Run any BATch/script/program (in Task Scheduler) minimized and with custom icon:
http://answers.microsoft.com/en-us/windows/forum/windows_10-performance/make-windows-10-task-scheduler-run-a-batch-file/e00b2fb0-02ca-439f-b534-eb34541130a9/
Run applications/scripts minimized (from Task Scheduler):
http://forums.anandtech.com/threads/want-to-run-applications-minimized-at-log-in-from-task-scheduler.224581/
1. Create (if not present) C:\SCRIPTS directory/folder (example) from a DOS console command prompt
[%WinDir%\SYSTEM32\CMD.EXE]:
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run these commands -> press Enter after each line:
C:
CD\
MD SCRIPTS
2. Use Notepad to create C:\SCRIPTS\DEL_RECYCL_B1N.VBS VBScript file (example):
-----Begin cut & paste here-----
Dim WshShell:Set WshShell=CreateObject("WScript.Shell")
WshShell.Run chr(34)&"C:\SCRIPTS\DEL_RECYCL_B1N.CMD"&Chr(34),0
Set WshShell=Nothing
------End cut & paste here------
3. Use Notepad to create C:\SCRIPTS\DEL_RECYCL_B1N.CMD BATch file (example):
-----Begin cut & paste here-----
@ECHO OFF
IF NOT "%OS%"=="Windows_NT" GOTO END
COLOR 3B
TITLE "Delete all $Recycle.BIN directories/folders..."
ECHO.
ECHO 
ECHO Deleting $Recycle.BIN directories/folders on all drives/partitions/volumes...
ECHO 
ECHO.
C:
CD\
FOR %%i IN (C: D: E: F: G: H: I: J: K: L: M: N: O: P: Q: R: S: T: U: V: W: X: Y: Z:) DO IF EXIST "%%i\$RECYCLE.BIN" TAKEOWN.EXE /f "%%i\$RECYCLE.BIN" /r /d y >NUL 2>&1
FOR %%i IN (C: D: E: F: G: H: I: J: K: L: M: N: O: P: Q: R: S: T: U: V: W: X: Y: Z:) DO IF EXIST "%%i\$RECYCLE.BIN" ICACLS.EXE "%%i\$RECYCLE.BIN" /grant:r Everyone:F /t /c /q >NUL 2>&1
FOR %%i IN (C: D: E: F: G: H: I: J: K: L: M: N: O: P: Q: R: S: T: U: V: W: X: Y: Z:) DO IF EXIST "%%i\$RECYCLE.BIN" RUNDLL32.EXE ADVPACK.DLL,DelNodeRunDLL32 "%%i\$RECYCLE.BIN"
:END
EXIT
------End cut & paste here------
4. Add C:\SCRIPTS\DEL_RECYCL_B1N.VBS (example) to your custom Task Scheduler script -> run:
MMC.EXE /S taskschd.msc
5. Create a new Task -> Action tab -> highlight your task line -> click Edit... button -> Program/script box -> type
(example):
WSCRIPT.EXE
-> Add arguments box -> type (example):
/B /NoLogo C:\SCRIPTS\DEL_RECYCL_B1N.VBS
6. Customize and save your task to run whenever and however often you wish.
7. Optionally you can automate Task Scheduler to run C:\SCRIPTS\DEL_RECYCL_B1N.VBS every 30 minutes (example) from a DOS
console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run these
commands -> press Enter after each line:
ECHO Y|SCHTASKS.EXE /Create /TN "Delete_$Recycle.B1N_folders" /TR "WSCRIPT.EXE /B /NoLogo C:\SCRIPTS\DEL_RECYCL_B1N.VBS" /RU SYSTEM /RL HIGHEST /SC MINUTE /MO 30 /F
ECHO Y|SCHTASKS.EXE /Change /TN "Delete_$Recycle.B1N_folders" /RI 30 /RL HIGHEST /ENABLE

* Create scheduled task to be triggered by Windows service event using XML:
http://www.superuser.com/questions/502160/
http://blogs.technet.microsoft.com/askds/2011/09/26/advanced-xml-filtering-in-the-windows-event-viewer/
http://social.technet.microsoft.com/forums/windows/bae1e2c4-c60a-4f90-87b9-7b33e8d9660e/
http://msdn.microsoft.com/library/aa385231.aspx
http://social.technet.microsoft.com/forums/office/fac16f3c-d088-4d66-83d8-7139261dea83/
Wikipedia: XML:
http://en.wikipedia.org/wiki/XML
Run... [hold WinKey + press R] -> taskschd.msc -> Create Task... -> Trigger tab -> On an event -> Custom -> New Event Filter
-> XML tab -> Edit query manually -> Yes -> cut & paste (example):





Actions tab -> Start a program -> Program/script (example):
SC.EXE
Add argument (optional) (example):
STOP DNSCache
OK -> OK.
______________________________________________________________________________



Patch Windows 7



* Updated Physical Address Extension (PAE) Patch [ntkrnlpa.exe] for Windows 7 SP1 32-bit unlocks using installed RAM up to
128 GB:
http://www.wj32.org/wp/2011/02/23/pae-patch-updated-for-windows-7-sp1/
Updated Physical Address Extension (PAE) Patch [ntkrnlpa.exe] for Windows 8/8.1 32-bit unlocks using installed RAM up to 128
GB:
http://www.wj32.org/wp/2013/10/25/pae-patch-updated-for-windows-8-1/
Updated Physical Address Extension (PAE) Patch [ntkrnlpa.exe] for Windows 10 32-bit unlocks using installed RAM up to 128
GB:
http://www.wj32.org/wp/2016/02/01/pae-patch-updated-for-windows-10/
ReadyFor4GB PAE Patch [ntkrnlpa.exe] for Windows Vista/7/7 SP1 32-bit unlocks using installed RAM up to 128 GB:
- Chinese:
http://zh-deepxw.blogspot.com/2009/04/readyfor4gb.html
- English:
http://www.arstechnica.com/civis/viewtopic.php?f=15&t=49358
PAE RAMPatch [ntkrnlpa.exe] for Windows Vista/7/7 SP1 32-bit unlocks using installed RAM up to 128 GB:
http://www.bcastell.com/tech-articles/enabling-more-than-4-gb-of-ram-under-windows-7-32-bit/
File:
http://www.bcastell.com/wp-content/uploads/2012/09/win7-7600-4gb-patch.rar
PASSWORD:
nowarranty
These Patches work ONLY with 32-bit (x86) Windows NTx OSes!

* 4GB Patch for 32-bit EXEcutables (.exe) to use up to 4 GB of virtual RAM on Windows NTx 64-bit (x64) OSes:
http://www.ntcore.com/4gb_patch.php
File:
http://www.ntcore.com/files/4gb_patch.zip
This Patch works ONLY with 64-bit (x64) Windows NTx OSes + 32-bit (x86) EXEcutables!

* WUFUC for Windows 7/8/8.1 disables hardware detection, bypasses Windows Update (WU) "Unsupported Hardware" errors + allows
installing fixes/patches/updates:
http://web.archive.org/web/20211107030255/https://github.com/zeffy/wufuc/
File:
http://dl.thorium.rocks/files/win7/wufuc_v1.0.1.201-a52637d4.zip

* Windows 7 Patches: TCP/IP Limited Connections (TCPIP.SYS), Theme (UXTHEME.DLL), Terminal Server (TERMSRV.DLL) + Desktop
Watermark (USER32.DLL + USER32.DLL.mui):
http://deepxw.blogspot.com/
Windows 7 Desktop Watermark (USER32.DLL + USER32.DLL.mui) Patch:
http://deepxw.blogspot.com/2008/12/remove-watermark-v03-build-20081210.html
Desktop Watermark Patch Guide:
http://www.askvg.com/how-to-remove-windows-7-rc-watermark-build-info-from-desktop/

* UxStyle for Windows 7/8/8.1/10 Preview:
http://www.uxstyle.com/
http://github.com/riverar/uxstyle/
UxStyle for Windows 8/8.1:
http://www.uxstyle.com/builds/UxStyle_sep23_x86_x64_possibly_bugged.zip
UxStyle for Windows 7/7 SP1:
http://www.uxstyle.com/builds/UxStyle_Core_jul13_bits.zip
Aero Theme for Windows 8/8.1:
http://simplexdesignsart.deviantart.com/art/Windows-Aero-536877982/
http://web.archive.org/web/20130402051457/http://xxinightxx.deviantart.com/art/Windows-7-Vs-REV-D-350491112/
File:
http://drive.google.com/uc?export=download&id=0B883uGPmNY72Sjk3dy1MTzBGVEE
http://web.archive.org/web/20130402051457/http://www.deviantart.com/download/350491112/windows_7_vs_rev_d_by_xxinightxx-d5so8o8.zip
Windows 8/8.1 Themes:
http://www.winaero.com/category/windows-8-themes/

* UltraUXThemePatcher 32-bit + 64-bit for Windows XP/Vista/7/8/8.1/10/11 patches UX (User eXperience) Theme system files
[uxtheme.dll, uxinit.dll, themeui.dll] to allow use of 3rd party/custom themes:
http://mhoefs.eu/software_uxtheme.php
UltraUXThemePatcher Guide:
http://setupgamer.info/how-to-install-custom-windows-10-themes-and-visual-styles-with-ultrauxthemepatcher/
UltraUXThemePatcher Tutorial:
http://www.tenforums.com/customization/76077-ultrauxthemepatcher-recover-black-grey-screen-windows-8-10-a.html
Windows 7/newer Themes:
http://www.majorgeeks.com/files/categories/themes.html
Windows 11 Themes:
http://www.deviantart.com/tag/windows11themes/
Windows 10 Themes:
http://www.deviantart.com/tag/windows10themes/
http://www.deviantart.com/sagorpirbd/art/Aero-7-Themes-for-Win10-Final-523979941/
http://www.deviantart.com/niivu/art/Sweetness-for-Windows-10-826122176/
Windows 8/8.1 Themes:
http://www.deviantart.com/tag/windows8themes/
Windows 7 Themes:
http://www.deviantart.com/tag/windows7themes/
View + Remove All built-in Windows 10 Themes:
http://www.majorgeeks.com/content/page/how_to_view_and_remove_all_windows_10_themes.html

* Windows 7 Theme Source Patcher (7TSP):
http://www.xptsp.com/fixit/7tsp.php
7TSP Portable:
http://users.xptsp.com/fixit/programs/7tsp_GUI_v0.4_B(2015).exe
7TSP Installer:
http://users.xptsp.com/fixit/programs/7tsp_GUI_v0.4_B(2015)_Installer.exe
7TSP Icon Packs:
http://www.creativx.net/forums/7tsp-iconpacks/
7TSP requires Resource Hacker:
http://www.angusj.com/resourcehacker/
File:
http://www.angusj.com/resourcehacker/resource_hacker.zip

* GDIPP (Graphics Device Interface ++) 32-bit + 64-bit [unmaintained!] for Windows Vista/newer improves
anti-aliasing/rasterizing/smoothing rendering + clarity/readability of all Windows desktop/display/monitor/screen/system
fonts:
http://code.google.com/archive/p/gdipp/
http://github.com/CoolOppo/GDIPP/
- GDIPP 32-bit for Windows Vista/newer 32-bit (x86) [MSI Installer]:
http://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/gdipp/gdipp_x86_0.9.1.msi
- GDIPP 64-bit for Windows Vista/newer 64-bit (x64) [MSI Installer]:
http://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/gdipp/gdipp_x64_0.9.1.msi
GDIPP Guide:
http://www.makeuseof.com/tag/make-windows-fonts-look-like-mac-fonts/

* ReadyDriver Plus:
http://web.archive.org/web/20131029095655/http://www.citadelindustries.net/rdp.php
File:
http://web.archive.org/web/20131029095655/http://data.citadelindustries.net/setupreadydriverplus.exe

* Driver Signature Enforcement Overrider (DSEO):
http://www.ngohq.com/?page=dseo
File:
http://files.ngohq.com/ngo/dseo/dseo13b.exe

* Windows 7 Boot Updater changes animated boot logo:
http://www.coderforlife.com/projects/win7boot/
Guide:
http://www.intowindows.com/windows-7-boot-animation-updater-change-windows-7-boot-screen/
______________________________________________________________________________



Customize BOOT Screens



* Customize Windows 7 Boot Screen Guides:
http://www.techdows.com/2011/06/get-windows-8-betta-fish-boot-screen-for-windows-7.html
http://www.askvg.com/download-windows-8-rtm-boot-screen-windows-7/
http://www.door2windows.com/how-to-change-windows-7-boot-screen-animation/
Win7BootUpdater = MUST USE IT!:
http://www.coderforlife.com/projects/win7boot/
File:
http://www.coderforlife.com/projects/win7boot/downloads/
http://www.coderforlife.com/projects/win7boot/downloads/Win7BootUpdater2.exe
Extras:
http://www.coderforlife.com/projects/win7boot/extras/
Boot Screens:
http://www.coderforlife.com/projects/win7boot/bootskins/
http://www.deskmodder.de/phpBB3/viewtopic.php?f=220&t=13363
Custom Animations:
http://medi-dadu.deviantart.com/art/Win-Boot-Screen-16-9-277342889
Navi OS from SE Lain:
http://detechtive.deviantart.com/art/Win-7-boot-animation-Navi-OS-from-SE-Lain-280887190
Holographic:
http://ultimatedesktops.deviantart.com/art/Holographic-Boot-Skin-for-Windows-7-359440527
http://creativ-xtreme.deviantart.com/art/Holographic-Boot-Skin-for-Windows-7-359440527
Abstract:
http://detechtive.deviantart.com/art/Abstract-Bootscreen-w-resolution-fix-and-a-bonus-393047765
The Hatchling v2:
http://faziri.deviantart.com/art/The-Hatchling-v2-340304259
Blaupunkt v2:
http://tchiro.deviantart.com/art/Blau-punkt-v2-BootScreen-344602849
Pulse Blue:
http://tchiro.deviantart.com/art/Pulse-blue-Windows-7-BootScreen-321869645
Pulse Green:
http://tchiro.deviantart.com/art/Pulse-Windows-7-BootScreen-321814750
Molecule 16:9:
http://judian.deviantart.com/art/Molucule-Boot-Screen-16-9-312105328
L:
http://luttik.deviantart.com/art/L-bootloader-297223007
Earth 16:9:
http://medi-dadu.deviantart.com/art/Win-Boot-Screen-16-9-294257700
Gears:
http://creativ-xtreme.deviantart.com/art/gears-BootScreen-262299074
Stargate Logo:
http://fallenangelofdeath63.deviantart.com/art/Stargate-Boot-Theme-290423425
STARGATE:
http://zangio.deviantart.com/art/Win7-Boot-Animation-STARGATE-189992814
Starfleet Logo:
http://deskmodder.deviantart.com/art/Starfleetlogo-by-rufus721-269639178
Blue Plasma:
http://deskmodder.deviantart.com/art/BluePlasma-by-AxP-261661276
Nerd:
http://sachse.deviantart.com/art/Nerd-Bootscreen-260310482
DoTa Puck:
http://seva-tmplr.deviantart.com/art/WIN7-Boot-DoTa-Puck-196485118
Orb:
http://zangio.deviantart.com/art/Win7-Boot-Animation-Orb-188321689
Windows 8 ALPHA Fish:
http://misaki2009.deviantart.com/art/Windows-8-Bootscreen-quot-ALPHA-quot-214596752
Boot Screens:
http://creativ-xtreme.deviantart.com/gallery/36418593
http://kidofoundation.deviantart.com/gallery/
http://korruptninja.deviantart.com/gallery/
http://www.windows7bootscreens.com/bootscreen-22-orb/
______________________________________________________________________________



Desktop Background/Wallpaper Tweaks + Free(ware) Tools



* Next wallpaper slideshow -> right-click Desktop shortcut:
http://www.sevenforums.com/tutorials/161638-next-desktop-background-add-remove-desktop-context-menu.html
http://www.windowsvalley.com/remove-next-desktop-background-from-desktop-context-menu-of-windows-7/
http://www.intowindows.com/how-to-create-shortcut-key-to-switch-to-next-desktop-background-in-windows-7-and-windows-8/
NOTE:
This requires your wallpaper (Desktop Background) settings to cycle through a directory/folder containing at least 2 images.
1. Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create Next_Wallpaper.vbs VBScript file (example):
-----Begin cut & paste here-----
Dim WshShell:Set WshShell=WScript.CreateObject("WScript.Shell")
WshShell.SendKeys("^ ")
WshShell.SendKeys("+{F10}")
WshShell.SendKeys("n")
------End cut & paste here------
2. Run Next_Wallpaper.vbs (example):
WSCRIPT.EXE /B /NoLogo Next_Wallpaper.vbs
3. Right-click on an empty Desktop spot -> click "Next desktop background".
4. Make this permanent: use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a new Registry (.reg) file -> copy & paste text strings between Cut & Paste lines below -> save file as
Next_Wallpaper.reg (example).
5. Right-click on Next_Wallpaper.reg -> Run as Administrator -> answer Yes/OK to all prompts to register the information
into your Registry.
6. From now on you can right-click on an empty Desktop spot -> click "Next desktop background".
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\DesktopBackground\shellex\ContextMenuHandlers\DesktopSlideshow]
@="{0bf754aa-c967-445c-ab3d-d8fda9bae7ef}"
"Icon"="themecpl.dll,0"
"Position"="Bottom"
"MUIVerb"="Next &Wallpaper"
"SuppressionPolicy"=dword:0
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0bf754aa-c967-445c-ab3d-d8fda9bae7ef}]
@="SlideshowContextMenu"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0bf754aa-c967-445c-ab3d-d8fda9bae7ef}\InProcServer32]
@=hex(2):25,53,79,73,74,65,6d,52,6f,6f,74,25,5c,73,79,73,74,65,6d,33,32,5c,73,\
  74,6f,62,6a,65,63,74,2e,64,6c,6c,00
"ThreadingModel"="Apartment"
;
------End cut & paste here------

* Desktop Background Tuner (DBT) 32-bit:
http://www.winaero.com/desktop-background-tuner/
File:
http://www.winaero.com/download-desktop-background-tuner/
Extract DesktopBackgroundTuner.exe version which matches your Windows NTx OS edition from DesktopBackgroundTuner.zip
archive using an unZIPping/unARChiving/unRARing tool [free(ware)]
http://www.mdgx.com/toy.htm#ZIP
to the local drive/partition/volume + directory/folder of your choice:
- Windows XP/Vista/7 users: DesktopBackgroundTuner.exe from ZIP root [no name] folder;
- Windows 8/8.1/10/11 users: DesktopBackgroundTuner.exe from ZIP "Windows 8" folder.

* Any Wallpaper:
http://www.anyutils.com/anywall.php
File:
http://www.anyutils.com/download/anywall.exe
Requires Microsoft .NET Framework Redistributable (NFR) 2.0/newer (free):
http://www.mdgx.com/add.htm#NFR
Right-click Taskbar Icon -> Restore main window -> Options -> Choose a wallpaper position: Autofit.
Settings:
%UserProfile%\AppData\Local\AnyUtils\AnyWall\settings.xml

* Logon Background Changer (W7LBC):
http://www.julien-manici.com/windows_7_logon_background_changer/
File:
http://jmanici.blob.core.windows.net/download/Win7LogonBackgroundChanger_1_5_2.zip

* Logon Changer:
http://www.tweaks.com/software/tweakslogon/
File:
http://www.tweaks.com/software/tweakslogon/download/tweakslogon.zip

* Logon Screen Rotator (LSR):
http://www.lukepaynesoftware.com/lsrotator/
File:
http://www.lukepaynesoftware.com/downloads/lsr_4.4
LSR Guide:
http://www.door2windows.com/how-to-automatically-change-your-logon-screen-background-after-an-interval-of-time-in-windows-7/

* Wallpaper Slideshow LT:
http://www.gphotoshow.com/wallpaperss.htm
File:
http://www.gphotoshow.com/files/WallpaperSSLT.exe

* Aero Wallpaper Changer (AWC) for Windows 7 Home/Basic:
http://www.winaero.com/aerowallpaperchanger/
File:
http://www.winaero.com/download-aerowallpaperchanger-adds-cool-aero-color-effects-and-desktop-slideshow-to-windows-7-home-basic/

* Oceanis:
http://www.sevenforums.com/tutorials/47294-desktop-background-wallpaper-change-windows-7-starter.html
File:
http://dl2.sevenforums.com/dl/Oceanis_Change_Background_W7.zip

* Windows Wallpaper Changer:
http://sourceforge.net/projects/winwallchanger/
File:
http://sourceforge.net/projects/winwallchanger/files/

* List of Wallpaper Changers:
http://www.techsupportalert.com/content/best-free-wallpaper-changer.htm
______________________________________________________________________________



Free(ware) 7/8/8.1/10/11 Aero Tools + Tweaks



* TransparentMenu 32-bit + 64-bit adjusts transparency + assigns colors schemes to Windows + programs right-click menus:
http://www.moo0.com/software/TransparentMenu/
File:
http://www.moo0.com/software/TransparentMenu/download/free2/
Download:
http://www.softpedia.com/get/Desktop-Enhancements/Other-Desktop-Enhancements/Moo0-TransparentMenu.shtml
"%UserProfile%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Moo0 Transparent Menu 1.xx.lnk" shortcut
command line:
TransparentMenu.exe -startup
Setup (examples) -> right-click green "Moo0 Transparent Menu" Taskbar/Notification area icon:
- Menu Skin (affects system colors) -> UNcheck Change Highlight Colors Together -> Green Tea (Win7) or Charcoal Palette 3
(Win8/newer)
- Menu Transparency (%) -> 10%
- Start on System Boot -> checked.

* Aero Adjuster:
http://samusaranfreak.deviantart.com/art/Aero-Adjuster-261383189
File:
http://www.deviantart.com/download/261383189/aero_adjuster_by_samusaranfreak-d4bmck5.zip

* Winaero Tweaker 32-bit + 64-bit for Windows 7/8/8.1/10/11 [select Portable at install time!]:
http://www.winaero.com/winaero-tweaker/
Download:
http://www.winaero.com/download-winaero-tweaker/
Winaero Tweaker Features:
http://www.winaero.com/the-list-of-winaero-tweaker-features/
Examples: customizes manufacturer/OEM/vendor info, removes icon overlay using transparent icon.

* Switcher:
http://www.insentient.net/
File:
http://www.insentient.net/Files/Projects/Switcher/Switcher-2.0.0.2705.zip

* Aura Auto Colorization tool:
http://aura.codeplex.com/
http://www.askvg.com/aura-get-windows-8-aero-auto-colorization-feature-in-windows-vista-and-7/
http://www.door2windows.com/get-windows-8-auto-colorization-feature-in-windows-7vista-3/
File:
http://aura.codeplex.com/downloads/get/227648
http://angelwzr.deviantart.com/art/Aura-Beta-3-203960157
http://www.deviantart.com/download/203960157/aura_beta_2_by_angelwzr-d3dfknx.zip

* 7+ Taskbar Tweaker (7TT) 32-bit + 64-bit (Portable) for Windows 7/newer adds hidden + unavailable Taskbar tray settings
beyond Windows capabilities, highly customizable [select Portable at install time]:
http://ramensoftware.com/7-taskbar-tweaker/
http://tweaker.ramensoftware.com/
File [Install -> select Portable]:
http://ramensoftware.com/downloads/7tt_setup.exe
7+ Taskbar Tweaker (7TT) Portable:
http://www.portableapps.com/apps/utilitues/7plus-taskbar-tweaker-portable/
7+ Taskbar Tweaker (7TT) Guide:
http://www.winaero.com/get-a-classic-taskbar-in-windows-8-and-windows-7-that-works-like-xp/
7+ Taskbar Tweaker (7TT) Advanced Settings:
http://tweaker.ramensoftware.com/images/7-taskbar-tweaker.png
7+ Taskbar Tweaker (7TT) Repository:
http://github.com/m417z/7-Taskbar-Tweaker/
7+ Taskbar Tweaker (7TT) Windhawk tweak mods for Windows 11 Taskbar:
http://ramensoftware.com/windhawk-mods-for-the-windows-11-taskbar/
BUG:
7+ Taskbar Tweaker (7TT) does NOT (yet) support NEWer Windows 11 Taskbar:
http://ramensoftware.com/7-taskbar-tweaker-and-a-first-look-at-windows-11/
FIX:
Restore classic Taskbar tray in Windows 11:
http://ramensoftware.com/7-taskbar-tweaker-on-windows-11-with-windows-10s-taskbar/
http://www.winaero.com/winaero-tweaker-1-20-1-get-back-windows-10-start-menu-and-taskbar-in-windows-11/
1. Install Winaero Tweaker:
http://www.winaero.com/winaero-tweaker/
2. Open/run/start Winaero Tweaker.
3. Go to: Windows 11 -> Classic Start Menu and Taskbar -> check "Enable Classic Taskbar and Start menu" box -> click
"Sign out now" button.
4. Log on/sign in back into Windows 11 under same user name.
5. Open/run/start 7+ Taskbar Tweaker (7TT) -> customize/tweak settings according to your needs/preferences -> done.

* UxStyle for Windows 7/8/8.1/10 Preview:
http://www.uxstyle.com/
http://github.com/riverar/uxstyle/
UxStyle for Windows 8/8.1:
http://www.uxstyle.com/builds/UxStyle_sep23_x86_x64_possibly_bugged.zip
UxStyle for Windows 7/7 SP1:
http://www.uxstyle.com/builds/UxStyle_Core_jul13_bits.zip
Aero Theme for Windows 8/8.1:
http://simplexdesignsart.deviantart.com/art/Windows-Aero-536877982/
http://web.archive.org/web/20130402051457/http://xxinightxx.deviantart.com/art/Windows-7-Vs-REV-D-350491112/
File:
http://drive.google.com/uc?export=download&id=0B883uGPmNY72Sjk3dy1MTzBGVEE
http://web.archive.org/web/20130402051457/http://www.deviantart.com/download/350491112/windows_7_vs_rev_d_by_xxinightxx-d5so8o8.zip
Windows 8/8.1 Themes:
http://www.winaero.com/category/windows-8-themes/

* UltraUXThemePatcher 32-bit + 64-bit for Windows XP/Vista/7/8/8.1/10/11 patches UX (User eXperience) Theme system files
[uxtheme.dll, uxinit.dll, themeui.dll] to allow use of 3rd party/custom themes:
http://mhoefs.eu/software_uxtheme.php
UltraUXThemePatcher Guide:
http://setupgamer.info/how-to-install-custom-windows-10-themes-and-visual-styles-with-ultrauxthemepatcher/
UltraUXThemePatcher Tutorial:
http://www.tenforums.com/customization/76077-ultrauxthemepatcher-recover-black-grey-screen-windows-8-10-a.html
Windows 7/newer Themes:
http://www.majorgeeks.com/files/categories/themes.html
Windows 11 Themes:
http://www.deviantart.com/tag/windows11themes/
Windows 10 Themes:
http://www.deviantart.com/tag/windows10themes/
http://www.deviantart.com/sagorpirbd/art/Aero-7-Themes-for-Win10-Final-523979941/
http://www.deviantart.com/niivu/art/Sweetness-for-Windows-10-826122176/
Windows 8/8.1 Themes:
http://www.deviantart.com/tag/windows8themes/
Windows 7 Themes:
http://www.deviantart.com/tag/windows7themes/
View + Remove All built-in Windows 10 Themes:
http://www.majorgeeks.com/content/page/how_to_view_and_remove_all_windows_10_themes.html

* AeroRainbow for Windows 7/8/8.1/10/11:
http://www.winaero.com/aerorainbow/
File:
http://www.winaero.com/download.php?view.11

* Windows 7 Start button/icon/logo/orb Changer:
http://www.door2windows.com/windows-7-start-button-changer-change-your-windows-7-start-button-with-one-click/
File:
http://www.door2windows.com/download-freeware/?obsolete#Windows+7+Start+Orb+Changer
Guide:
http://www.intowindows.com/windows-7-start-orb-changer-lets-you-quickly-change-start-orb/

* MDGx Aero tools [free(ware)] -> "" section in TOOLS.TXT (included):
http://www.mdgx.com/tools.php
http://www.mdgx.com/TOOLS.TXT

* MDGx Windows NTx Tools -> "Free(ware) Windows NTx Extras" section in SOFTWARE.TXT (included):
http://www.mdgx.com/xptoy.htm

* MDGx "1000+ Windows NTx Power Toys + Tweaking Tools [99.99% Free(ware)]" section in SOFTWARE.TXT (included):
http://www.mdgx.com/toy.htm
______________________________________________________________________________



Free(ware) Windows 7 Replacement Apps + Tweaking Tools



* Vista Calculator (CALC.EXE):
http://www.askvg.com/get-windows-7-calculator-working-in-windows-vista/
http://www.askvg.com/get-windows-7-like-calculator-in-windows-xp/
http://grdcityboy.deviantart.com/art/Seven-Calculator-102484514
http://www.softpedia.com/reviews/windows/Windows-7-Calculator-Review-106024.shtml
http://www.7tutorials.com/windows-calculator-tool-geek-you/

* AeroCalc (Glass Theme):
http://www.door2windows.com/how-to-get-glass-calculator-in-windows-7vista/

* Notepad (Glass Theme):
http://www.door2windows.com/how-to-get-glass-notepad-in-windows-7vista/
Ribbon Notepad:
http://www.door2windows.com/get-notepad-with-ribbon-user-interface-in-windows-7vista/

* Command Prompt (Glass Theme):
http://www.door2windows.com/how-to-get-glass-command-prompt-in-windows-7vista/

* Ribbon Image Viewer:
http://www.door2windows.com/get-ribbon-user-interface-ui-image-viewer-in-windows-7vistaxp/

* Bubbles, Mystify, Ribbons, Lines + Aurora Screen Savers:
http://www.softpedia.com/get/Desktop-Enhancements/Screensavers/Vista-Screensaver-Ported-to-XP.shtml
Screen Savers Guides:
http://www.door2windows.com/tweak-bubbles-mystify-ribbons-lines-aurora-screensavers/
http://www.howtogeek.com/howto/15088/customize-the-default-screensavers-in-windows-7-and-vista/
http://www.winaero.com/comment.php?comment.news.9
http://www.tweaks.com/windows/39129/the-ultimate-windows-screensaver-tweaking-guide/

* XP Pipes (SSPIPES.SCR) Screen Saver:
http://www.bearblain.com/Downloads/sspipes.zip
http://www.mdgx.com/3dpipes.jpg

* 7Smoker Pro:
http://www.xp-smoker.com/7smokerpro.html
File:
http://www.majorgeeks.com/files/details/7smoker_pro.html

* Windows 7/newer tweaking tools [free(ware)]:
http://www.winaero.com/
http://www.wintools.info/
http://www.thewindowsclub.com/category/downloads/
http://www.nirsoft.net/utils/
http://www.sordum.org/
http://www.itsamples.com/software.html
http://www.mitec.cz/Data/XML/data_downloads.xml
http://learn.microsoft.com/sysinternals/
http://www.majorgeeks.com/
http://www.majorgeeks.com/mg/sortname/windows_7_8.html
http://www.intowindows.com/15-free-windows-8-1-customization-tweaking-tools/
http://www.nextofwindows.com/a-list-of-windows-8-tweaking-tools/
http://www.thewindowsclub.com/list-freeware-releases-from-the-windows-club/
http://www.softpedia.com/hubs/Tweak-Windows-8/
http://www.snapfiles.com/freeware/system/fwsystweak.html
http://www.mdgx.com/xptoy.htm
http://www.mdgx.com/toy.htm
http://www.mdgx.com/nettoys.htm
http://www.mdgx.com/fw.htm
http://www.mdgx.com/tools.php

* MDGx "Similar Windows 7/newer Anti-Spyware/Privacy Tools" section in 10_BLOCK.TXT (included):
http://www.mdgx.com/xptoy.htm#10BLK
http://www.mdgx.com/10BLK/10_BLOCK.php
http://www.mdgx.com/10BLK/10_BLOCK.TXT

* MDGx "Free(ware) Windows NTx Extras" section in SOFTWARE.TXT (included):
http://www.mdgx.com/xptoy.htm

* MDGx "1000+ Windows NTx Power Toys + Tweaking Tools [99.9% free(ware)]" section in SOFTWARE.TXT (included):
http://www.mdgx.com/toy.htm

* MDGx "List of Useful Windows NTx Tools [99.9% free(ware)]" in TOOLS.TXT (included):
http://www.mdgx.com/tools.php
http://www.mdgx.com/TOOLS.TXT
______________________________________________________________________________



Free(ware) Start Menu Shell Replacements



* Open-Shell [Classic Shell fork] 32-bit + 64-bit Start Menu + button/icon/logo/orb, Explorer + IE enhancer, replacer,
supports custom skins, buttons/logos, highly customizable (free, open source):
http://open-shell.github.io/Open-Shell-Menu/
ReadMe:
http://github.com/Open-Shell/Open-Shell-Menu/
Download:
http://github.com/Open-Shell/Open-Shell-Menu/releases/
Open-Shell Guides:
http://askleo.com/open-shell-regain-your-start-menu-in-windows-and-much-more/
http://www.techrepublic.com/article/how-to-use-open-shell-as-your-windows-10-start-menu/
Custom Start button/icon/logo/orb Tutorial:
http://coddec.github.io/Classic-Shell/www.classicshell.net/tutorials/buttontutorial.html
Custom Skin Tutorial:
http://coddec.github.io/Classic-Shell/www.classicshell.net/tutorials/skintutorial.html
Skins:
http://www.winaero.com/best-skins-for-classic-shells-start-menu/
http://www.classicshell.net/gallery/Start-Menu/skins/
http://www.classicshell.net/forum/viewforum.php?f=17
Start Buttons/Orbs:
http://www.classicshell.net/forum/viewforum.php?f=18
http://www.deviantart.com/w1ck3dmatt/art/Mega-Orb-Pack-150-start-orbs-259940654/
http://www.door2windows.com/customization/start-buttons/
Aero Glass mod [Windows 8/8.1 style UI] for Windows 8/8.1/10/11:
http://www.glass8.eu/
Open-Shell/Classic Shell Free(ware) Alternatives:
http://classicshell.sourceforge.net/alternatives.html
http://classic-shell.en.softonic.com/windows/alternatives/
http://www.alternativeto.net/software/classicshell/
http://www.makeuseof.com/tag/windows-start-menu-alternatives/
http://www.similarindex.com/classic-shell-alternatives/

* Power8 Start Menu replacer for Windows 8/8.1, works with Windows 7:
http://github.com/AgentMC/power8/
Download:
http://github.com/AgentMC/power8/releases/latest/

* Start Menu X Start Menu replacer [CRIPPLED freeware!] for Windows 7/newer:
http://www.startmenux.com/
File:
http://www.startmenux.com/StartMenuX_Setup_freeware.exe

* Pokki Start Menu replacer for Windows 8/8.1, works with Windows 7:
http://www.pokki.com/
File:
http://cdn.pokki.com/download/PokkiStartMenuInstaller.exe
______________________________________________________________________________



Turn OFF/ON User Account Control (UAC)



* FIX (Temporary): In Windows Vista/newer you must right-click each app/file/executable/program/installer/DOS console
(command prompt)/BATch (CoMmanD) file/icon/link/shortcut/script/screen saver/etc and select "Run as Administrator" every
time you're trying to use it in order to execute/run it/them the way they were intended, fully functional.
Otherwise a nagging dialog box will pop up and you will be prompted to Run.../Open/Save/etc them, or you won't be allowed to
execute/run them every time you (double-)click on them directly or their icons/links/shortcuts (.lnk), and you will notice
most of them will not execute/function/operate/run properly, and/or are crippled, exhibit abnormalities, limitations,
restrictions, and/or inappropriate behavior. ;-(
* FIX (Permanent): Turn OFF User Account Control (UAC):
- Windows 10/2016/2019/11/2022:
http://www.tenforums.com/tutorials/3577-user-account-control-uac-change-settings-windows-10-a.html
- Windows 8/2012/8.1/2012 R2:
http://www.eightforums.com/tutorials/5509-user-account-control-uac-change-settings-windows-8-a.html
- Windows 7/7 SP1/2008 R2:
http://petri.com/disable-uac-in-windows-7/
- Windows Vista/2008:
http://petri.com/disable_uac_in_windows_vista/
* IMPORTANT:
************
- Always make sure you have Administrative (admin, administrator, main/principal/power user, owner, sysadmin, SYSTEM)
privileges + rights for all computer(s)/device(s)/media in your environment (unless you are a user without administrative
privileges/rights in a business/enterprise/multiuser connected/networked/shared environment), and that you are using
approved/authorized/certified/legitimate/safe/scanned/secure/trustworthy apps/files/programs/software/etc, preferably
located + stored on your authorized/sanctioned local/personal storage device(s)/media.
- Always make sure all files acquired/copied/downloaded/installed/obtained/etc from external/remote/shared/other
sources/media/networks/internet/etc are approved/authorized/certified/legitimate/safe/scanned/secure/trustworthy.
- Always make sure to schedule your anti-virus/anti-malware app/program/service/software to check/scan [+ clean-up if
necessary] periodically all your computer(s)/device(s) + storage device(s)/media for malware/spyware/viruses.
http://www.mdgx.com/vir.htm

* UAC_OFF.REG Registry file disables all User Account Control (UAC) annoyances:
http://www.tenforums.com/user-accounts-family-safety/98737-standard-user-able-access-admin-folders.html
http://batcmd.com/windows/7/services/luafv/
http://parsons-technology.com/what-is-luafv/
http://learn.microsoft.com/windows-hardware/customize/desktop/unattend/microsoft-windows-lua-settings/
http://learn.microsoft.com/windows/security/identity-protection/user-account-control/user-account-control-group-policy-and-registry-key-settings/
http://learn.microsoft.com/windows/security/identity-protection/user-account-control/how-user-account-control-works/
http://learn.microsoft.com/windows/security/identity-protection/user-account-control/user-account-control-security-policy-settings/
http://learn.microsoft.com/openspecs/windows_protocols/ms-gpsb/9ad50fd3-4d8d-4870-9f5b-978ce292b9d8/
http://learn.microsoft.com/openspecs/windows_protocols/ms-gpsb/7c705718-f58e-4886-8057-37c8fd9aede1/
http://www.stigviewer.com/stig/windows_10/2020-06-15/finding/V-63827
http://admx.help/?Category=Windows_10_2016&Policy=Microsoft.Policies.Auditing::IncludeCmdLine
1st Things 1st:
***************
BACKUP YOUR REGISTRY BEFORE MAKING ANY CHANGES! -> See "BACKUP/EXPORT + RESTORE/IMPORT REGISTRY/REGISTRY KEY(S)" in
WINDOWS7.TXT (this file):
http://www.mdgx.com/7.php#:~:text=BACKUP%2FEXPORT%20%2B%20RESTORE%2FIMPORT%20REGISTRY%2FREGISTRY%20KEY%28S%29%20%21
WARNING:
********
If LUAfv service [provided by the %WinDir%\SYSTEM32\DRIVERS\luafv.sys driver] is disabled [.reg file below: "Start"=dword:4]
certain Windows components/features/functions will not work, and Windows Server users may experience errors in
multiuser/networked/shared/enterprise/server environments:
http://developpaper.com/windows-ad-error-message-resolution-uac-file-virtualization-service-failed-to-start-this-driver-is-blocked-from-loading/
http://www.wincert.net/windows-server/event-id-7000-uac-file-virtualization-error/
http://www.microsoftpressstore.com/articles/article.aspx?p=2228450&seqNum=9
http://www.programmersought.com/article/27216104324/
Examples:
- Internet Explorer (IE) [discontinued!] sandbox mode = DISABLED;
- Live/Metro/Screen/Start/Tile (Store) UWP (Universal Windows Platform) apps = DISABLED;
- certain Windows Server components + functions [unnecessary + wasteful of computing resources for Windows 7/newer
Basic/Core/Desktop/Education/Home/Premium/Pro(fessional)/Starter/Ultimate editions] = DISABLED.
CAUTION:
********
This requires adequate/advanced knowledge about critical computing, operating systems, shared environments, networks,
cybersecurity.
http://www.mdgx.com/importnt.php
Recommended for single user environments without any add-ons/components/extensions/extras/features/services which may
require specific configurations/items/properties/settings for proper operation.
Not recommended for multiuser/networked/shared/enterprise/server environments processing/storing/delivering
encrypted/protected/secure critical/private/sensitive/vital analysis/data/information.
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
; MUST restart/reboot after turning UAC ON or OFF !
; Disable User Account Control file virtualization (LUAfv) Service:
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\luafv]
"Start"=dword:4
; Disable ALL UAC settings:
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System]
"ConsentPromptBehaviorAdmin"=dword:0
"ConsentPromptBehaviorUser"=dword:1
"DisableStatusMessages"=dword:0
"DontDisplayLastUserName"=dword:0
"EnableInstallerDetection"=dword:0
"EnableLUA"=dword:0
"EnableSecureUIAPaths"=dword:0
"EnableUIADesktopToggle"=dword:1
"EnableVirtualization"=dword:1
"FilterAdministratorToken"=dword:0
"NoInternetOpenWith"=dword:1
"PromptOnSecureDesktop"=dword:0
"SCForceOption"=dword:0
"SynchronousMachineGroupPolicy"=dword:0
"SynchronousUserGroupPolicy"=dword:0
"ValidateAdminCodeSignatures"=dword:0
"VerboseStatus"=dword:0
;
------End cut & paste here------
Perform same steps for UAC_OFF.BAT BATch (.bat) file, which also disables UAC:
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text BATch (.bat) or CoMmanD (.cmd) script file containing the lines between Cut & Paste delimiters below
-> save it as plain text/ASCII file (Encode: -> ANSI) with the BAT (.bat) or CMD (.cmd) extension -> right-click it ->
Run as Administrator -> wait for completion.
-----Begin cut & paste here-----
@ECHO OFF
IF NOT "%OS%"=="Windows_NT" GOTO END
:: MUST restart/reboot after turning UAC ON or OFF !
:: Disable User Account Control file virtualization (LUAfv) Service:
ECHO Y|NET.EXE STOP luafv
SC.EXE CONFIG luafv START= disabled
:: Disable UAC:
REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v EnableLUA /t REG_DWORD /d 0 /f
:END
EXIT
------End cut & paste here------
Restart/reboot.

* UAC_ON.REG Registry file enables all User Account Control (UAC) annoyances:
http://www.tenforums.com/user-accounts-family-safety/98737-standard-user-able-access-admin-folders.html
http://learn.microsoft.com/windows/security/identity-protection/user-account-control/user-account-control-group-policy-and-registry-key-settings/
http://learn.microsoft.com/windows/security/identity-protection/user-account-control/how-user-account-control-works/
http://learn.microsoft.com/windows/security/identity-protection/user-account-control/user-account-control-security-policy-settings/
http://learn.microsoft.com/openspecs/windows_protocols/ms-gpsb/9ad50fd3-4d8d-4870-9f5b-978ce292b9d8/
http://learn.microsoft.com/openspecs/windows_protocols/ms-gpsb/7c705718-f58e-4886-8057-37c8fd9aede1/
http://www.stigviewer.com/stig/windows_10/2020-06-15/finding/V-63827
http://admx.help/?Category=Windows_10_2016&Policy=Microsoft.Policies.Auditing::IncludeCmdLine
CAUTION:
********
This requires adequate/advanced knowledge about critical computing, operating systems, shared environments, networks,
cybersecurity.
http://www.mdgx.com/importnt.php
Recommended for single user environments without any add-ons/components/extensions/extras/features/services which may
require specific configurations/items/properties/settings for proper operation.
Not recommended for multiuser/networked/shared/enterprise/server environments processing/storing/delivering
encrypted/protected/secure critical/private/sensitive/vital analysis/data/information.
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
; MUST restart/reboot after turning UAC ON or OFF !
; Enable User Account Control file virtualization (LUAfv) Service:
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\luafv]
"Start"=dword:2
; Enable ALL UAC settings:
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System]
"ConsentPromptBehaviorAdmin"=dword:2
; "ConsentPromptBehaviorUser"=dword:3
"ConsentPromptBehaviorUser"=dword:0
"DisableStatusMessages"=dword:1
"DontDisplayLastUserName"=dword:1
"EnableInstallerDetection"=dword:1
"EnableLUA"=dword:1
"EnableSecureUIAPaths"=dword:1
"EnableUIADesktopToggle"=dword:0
"EnableVirtualization"=dword:0
"FilterAdministratorToken"=dword:1
"NoInternetOpenWith"=dword:0
"PromptOnSecureDesktop"=dword:1
"SCForceOption"=dword:1
"SynchronousMachineGroupPolicy"=dword:1
"SynchronousUserGroupPolicy"=dword:1
"ValidateAdminCodeSignatures"=dword:1
"VerboseStatus"=dword:1
;
------End cut & paste here------
Perform same steps for UAC_ON.BAT BATch (.bat) file, which also enables UAC:
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text BATch (.bat) or CoMmanD (.cmd) script file containing the lines between Cut & Paste delimiters below
-> save it as plain text/ASCII file (Encode: -> ANSI) with the BAT (.bat) or CMD (.cmd) extension -> right-click it ->
Run as Administrator -> wait for completion.
-----Begin cut & paste here-----
@ECHO OFF
IF NOT "%OS%"=="Windows_NT" GOTO END
:: MUST restart/reboot after turning UAC ON or OFF !
:: Enable User Account Control file virtualization (LUAfv) Service:
ECHO Y|NET.EXE START luafv
SC.EXE CONFIG luafv START= auto
:: Enable UAC:
REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v EnableLUA /t REG_DWORD /d 1 /f
:END
EXIT
------End cut & paste here------
Restart/reboot.

* Elevate low/standard/Administrator level end/home/local/single user access/permissions/privileges/rights to
system wide/network/server Administrator/SYSTEM/Sysadmin level in Windows Vista/newer:
http://www.tenforums.com/user-accounts-family-safety/98737-standard-user-able-access-admin-folders.html
http://learn.microsoft.com/windows/security/identity-protection/user-account-control/user-account-control-group-policy-and-registry-key-settings/
http://learn.microsoft.com/windows/security/identity-protection/user-account-control/how-user-account-control-works/
http://learn.microsoft.com/windows/security/identity-protection/user-account-control/user-account-control-security-policy-settings/
http://learn.microsoft.com/openspecs/windows_protocols/ms-gpsb/9ad50fd3-4d8d-4870-9f5b-978ce292b9d8/
http://learn.microsoft.com/openspecs/windows_protocols/ms-gpsb/7c705718-f58e-4886-8057-37c8fd9aede1/
http://www.stigviewer.com/stig/windows_10/2020-06-15/finding/V-63827
http://admx.help/?Category=Windows_10_2016&Policy=Microsoft.Policies.Auditing::IncludeCmdLine
1st Things 1st:
***************
BACKUP YOUR REGISTRY BEFORE MAKING ANY CHANGES! -> See "BACKUP/EXPORT + RESTORE/IMPORT REGISTRY/REGISTRY KEY(S)" in
WINDOWS7.TXT (this file):
http://www.mdgx.com/7.php#:~:text=BACKUP%2FEXPORT%20%2B%20RESTORE%2FIMPORT%20REGISTRY%2FREGISTRY%20KEY%28S%29%20%21
CAUTION:
********
This requires adequate/advanced knowledge about critical computing, operating systems, shared environments, networks,
cybersecurity.
http://www.mdgx.com/importnt.php
Recommended for single user environments without any add-ons/components/extensions/extras/features/services which may
require specific configurations/items/properties/settings for proper operation.
Not recommended for multiuser/networked/shared/enterprise/server environments processing/storing/delivering
encrypted/protected/secure critical/private/sensitive/vital analysis/data/information.
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System]
"ConsentPromptBehaviorAdmin"=dword:0
"ConsentPromptBehaviorUser"=dword:3
"EnableFullTrustStartupTasks"=dword:1
"EnableInstallerDetection"=dword:0
"EnableLUA"=dword:0
"EnableSecureUIAPaths"=dword:0
"EnableUwpStartupTasks"=dword:1
"EnableUIADesktopToggle"=dword:1
"EnableVirtualization"=dword:1
"FilterAdministratorToken"=dword:1
"PromptOnSecureDesktop"=dword:0
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Audit]
"ProcessCreationIncludeCmdLine_Enabled"=dword:0
;
------End cut & paste here------
OR:
BATch (.bat)/CoMmanD (.cmd) script below 1st checks if the user has Administrator/SYSTEM/Sysadmin
access/permissions/privileges/rights, and only if condition is met it will run the script, otherwise it will abort and
exit (example):
http://stackoverflow.com/questions/14639743/
http://www.robvanderwoude.com/clevertricks.php
http://stackoverflow.com/questions/4051883/
http://superuser.com/questions/667607/
http://www.sevenforums.com/tutorials/11949-elevated-program-shortcut-without-uac-prompt-create.html
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text BATch (.bat) or CoMmanD (.cmd) script file containing the lines between Cut & Paste delimiters below
-> save it as plain text/ASCII file (Encode: -> ANSI) with the BAT (.bat) or CMD (.cmd) extension -> right-click it ->
Run as Administrator -> wait for completion.
-----Begin cut & paste here-----
@ECHO OFF
IF NOT "%OS%"=="Windows_NT" GOTO END
NET.EXE session
IF %ERRORLEVEL% EQU 0 (
ECHO.
ECHO 
ECHO You seem to have (Sys)Admin/SYSTEM privileges. Continue...
ECHO 
ECHO.
:: ECHO Press a key to continue...
:: PAUSE >NUL 2>&1
GOTO CNT
) ELSE (
ECHO.
ECHO 
ECHO Administrator/SYSTEM/Sysadmin *REQUIRED* to perform operations below !
ECHO Right-click this BATch/icon/shortcut + select "Run as Administrator",
ECHO OR log/sign back in as Administrator/SYSTEM/Sysadmin + then repeat step above.
ECHO 
ECHO.
ECHO Press a key to exit...
PAUSE >NUL 2>&1
GOTO END
EXIT /B 1
)
:CNT
ECHO.
ECHO 
ECHO Make sure you're familiar with all settings below *before* running
ECHO this script = see web pages at the top of this topic for info.
ECHO Abort if you need more time, then run this BATch again when ready.
ECHO 
ECHO.
ECHO * Press a key to continue, OR...
ECHO * Hold Ctrl + press Break/Pause -> press Y -> press Enter to abort...
PAUSE >NUL 2>&1
:: Admin Consent: 0 = Elevate without prompting | 1 = Prompt for credentials secure desktop | 2 = Prompt for consent secure
:: desktop | 3 = Prompt for credentials | 4 = Prompt for consent | 5 = Prompt for consent non-Windows binaries [DEFAULT]:
REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "ConsentPromptBehaviorAdmin" /t REG_DWORD /d 0 /f
:: User Consent: 0 = Automatically deny elevation requests | 1 = Prompt for credentials on secure desktop | 3 = Prompt for
:: credentials [DEFAULT]:
REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "ConsentPromptBehaviorUser" /t REG_DWORD /d 3 /f
:: Allow fully trusted startup tasks: 0 = Disabled | 1 = Enabled | 2 = Filtered (UAC) [DEFAULT]:
REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableFullTrustStartupTasks" /t REG_DWORD /d 1 /f
:: Detect app installs and prompt for elevation: 1 = Enabled [DEFAULT = Home] | 0 = Disabled [DEFAULT = Enterprise]:
REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableInstallerDetection" /t REG_DWORD /d 0 /f
:: Run all Admins in Admin approval mode: 0 = Disabled (UAC) | 1 = Enabled (UAC):
REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t REG_DWORD /d 0 /f
:: Elevate only UIAccess apps installed in secure locations: 0 = Disabled | 1 = Enabled [DEFAULT]:
REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableSecureUIAPaths" /t REG_DWORD /d 0 /f
:: Allow UWP (Universal Windows Platform) startup tasks: 0 = Disabled [DEFAULT] | 1 = Enabled | 2 = Filtered (UAC) [?]:
REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableUwpStartupTasks" /t REG_DWORD /d 1 /f
:: Allow UIAccess apps to prompt for elevation without secure desktop: 0 = Disabled [DEFAULT] | 1 = Enabled:
REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableUIADesktopToggle" /t REG_DWORD /d 1 /f
:: Enable virtualization: 0 = Disabled | 1 = Enabled [DEFAULT]:
REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableVirtualization" /t REG_DWORD /d 1 /f
:: Admin approval mode for built-in Admin account: 0 = Disabled [DEFAULT] | 1 = Enabled:
REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "FilterAdministratorToken" /t REG_DWORD /d 1 /f
:: Allow UIAccess apps to prompt for elevation without secure desktop: 0 = Disabled [DEFAULT] | 1 = Enabled:
REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "PromptOnSecureDesktop" /t REG_DWORD /d 0 /f
:: Command-line audit logging: 1 = Enable command-line audit logging | 0 = Disable command-line audit logging:
REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Audit" /v "ProcessCreationIncludeCmdLine_Enabled" /t REG_DWORD /d 0 /f
:END
EXIT
------End cut & paste here------
BATch (.bat)/CoMmanD (.cmd) script example bellow elevates user access/permissions/privileges/rights to "Run as
Administrator", and continues running it in the same session without exiting. Just replace [cut & paste] the 2 lines bellow
the ") ELSE (" line with your desired script code -> see comment line starting with a double colon [:: ]:
http://www.robvanderwoude.com/clevertricks.php
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text BATch (.bat) or CoMmanD (.cmd) script file containing the lines between Cut & Paste delimiters below
-> save it as plain text/ASCII file (Encode: -> ANSI) with the BAT (.bat) or CMD (.cmd) extension -> right-click it ->
Run as Administrator -> wait for completion.
-----Begin cut & paste here-----
@ECHO OFF
IF NOT "%OS%"=="Windows_NT" GOTO END
IF '%ERRORLEVEL%' NEQ '0' (
ECHO SET UAC=CreateObject^("Shell.Application"^)>"%TEMP%\runasadm.vbs"
ECHO UAC.ShellExecute "%~s0","","","runas",1>>"%TEMP%\runasadm.vbs"
"%TEMP%\runasadm.vbs"
DEL /F /Q "%TEMP%\runasadm.vbs"
EXIT /B
) ELSE (
:: Replace next 2 lines with script code you wish to run as Administrator:
PUSHD "%CD%"
CD /D "%~dp0"
)
:END
EXIT
------End cut & paste here------

* Turn OFF Secure (Dimmed) Desktop for User Account Control (UAC) prompt in Windows 7/newer:
http://msdn.microsoft.com/library/cc232766.aspx
http://www.tenforums.com/tutorials/112520-enable-disable-dimmed-secure-desktop-uac-prompt-windows.html
http://github.com/okieselbach/Intune/blob/master/DisablePromptOnSecureDesktop.ps1
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System]
"PromptOnSecureDesktop"=dword:0
;
------End cut & paste here------

* Change User Account Control (UAC) settings in Windows 7/newer:
- Disable Windows User Access Control (UAC):
http://www.keithholloway.net/blog/how-to-disable-windows-user-access-control-uac/
- Registry Tweaks to Customize User Account Control (UAC) Options in Windows Vista and Later:
http://www.askvg.com/how-to-tweak-user-account-control-uac-options-in-windows-vista-home-basic-home-premium/
- UAC and Application Run Levels:
http://www.slickit.ca/2009/05/uac-and-application-run-levels.html
- MSKB: Disable UAC Prompt for certain apps:
http://web.archive.org/web/20080103052016/http://support.microsoft.com/kb/946932
- MSKB: Disabling UAC Prompt for certain apps:
http://web.archive.org/web/20121225075400/http://kartones.net/blogs/kartones/archive/2008/01/21/kb946932-disabling-uac-prompt-for-certain-apps-not-that-useful.aspx
- Selectively disable UAC for trusted Windows Vista/7/newer apps:
http://www.techrepublic.com/blog/windows-and-office/selectively-disable-uac-for-your-trusted-vista-applications/
- MS DOCs: UAC Group Policy Settings and Registry Key Settings:
http://technet.microsoft.com/library/dd835564.aspx
- MSDN: FilterAdministratorToken Registry DWORD [REG_DWORD] value:
http://msdn.microsoft.com/library/cc232760.aspx
- MSDN: ConsentPromptBehaviorAdmin Registry DWORD [REG_DWORD] value:
http://msdn.microsoft.com/library/cc232761.aspx
- MSDN: ConsentPromptBehaviorUser Registry DWORD [REG_DWORD] value:
http://msdn.microsoft.com/library/cc232762.aspx
- MSDN: EnableInstallerDetection Registry DWORD [REG_DWORD] value:
http://msdn.microsoft.com/library/cc232763.aspx
- MSDN: ValidateAdminCodeSignatures Registry DWORD [REG_DWORD] value:
http://msdn.microsoft.com/library/cc232764.aspx
- MSDN: EnableLUA Registry DWORD [REG_DWORD] value:
http://msdn.microsoft.com/library/cc232765.aspx
- MSDN: PromptOnSecureDesktop Registry DWORD [REG_DWORD] value:
http://msdn.microsoft.com/library/cc232766.aspx
- MSDN: EnableVirtualization Registry DWORD [REG_DWORD] value:
http://msdn.microsoft.com/library/cc232767.aspx
- MSKB: PromptOnSecureDesktop Registry Value:
http://support.microsoft.com/help/975788/
- Configure Windows UAC prompt behavior for admins and users:
http://www.ghacks.net/2013/06/20/how-to-configure-windows-uac-prompt-behavior-for-admins-and-users/
- Changing How UAC Works (The Hard Way):
http://sourcedaddy.com/windows-7/changing-how-uac-works-the-hard-way.html
- Windows 7: User Account Control (UAC) Change Notification Settings:
http://www.sevenforums.com/tutorials/299-user-account-control-uac-change-notification-settings.html
- MSKB: Adjust User Account Control Settings in Windows 7/8/8.1:
http://support.microsoft.com/help/975787/

* Free(ware) User Account Control (UAC) tools:
- UAC Pass 32-bit + 64-bit:
http://sites.google.com/site/freeavvarea/uac-pass/uac-pass/
Download:
http://www.majorgeeks.com/files/details/uac_pass.html
- TweakUAC:
http://www.winability.com/tweak-uac/
Download:
http://www.majorgeeks.com/files/details/tweakuac.html
File:
http://www.winability.com/download/TweakUAC.exe
- Disable UAC:
http://www.majorgeeks.com/files/details/disable_uac.html

* Always Run as Administrator:
http://www.superuser.com/questions/204781/
A. Add User to Administrators Group + remove User from Users Group:
1. Log/sign in as Administrator -> Run... [hold WinKey + press R] -> type:
CONTROL.EXE userpasswords2
-> press Enter.
2. Your Account Name -> Properties -> Group Membership tab -> Administrators -> OK -> OK.
B. Disable Approval Mode:
http://www.askvg.com/how-to-tweak-user-account-control-uac-options-in-windows-vista-home-basic-home-premium/
http://www.tweakhound.com/vista/tweakguide/page_5.htm
http://msdn.microsoft.com/library/cc232771.aspx
1. Log/sign in as Administrator -> Run... [hold WinKey + press R] -> type:
SECPOL.MSC
-> press Enter.
2. Local Polices -> Security Options.
3. User Account Control (UAC): Switch to secure desktop when prompting for elevation -> Disable -> OK.
4. Must restart/reboot for these changes to take effect.

* Windows NTx NTFS Access Control List (ACL) ownership/access/elevation/permissions + run as Administrator free(ware) tools
-> "NTFS ACL + OWNER" -> TOOLS.TXT (included):
http://www.mdgx.com/tools.php
http://www.mdgx.com/TOOLS.TXT
MDGx "Access Control Lists (ACL) + Ownership Tools" [free(ware)] for Windows NTx" topic in SOFTWARE.TXT (included):
http://www.mdgx.com/xptoy.htm#ACL
______________________________________________________________________________



Free(ware) BOOT Tools + Tweaks



* MDGx "Free(ware) Windows Boot Managers" section in SOFTWARE.TXT (included):
http://www.mdgx.com/toy.htm#BOO

* MDGx "Free(ware) Windows Boot Tweakers" section in SOFTWARE.TXT (included):
http://www.mdgx.com/toy.htm#BINI

* MDGx "Free(ware) DOS Boot Managers" section in SOFTWARE.TXT (included):
http://www.mdgx.com/dos.htm#BTM

* MDGx "BOOT 7" + "RECOVERY" sections in TOOLS.TXT (included):
http://www.mdgx.com/tools.php
http://www.mdgx.com/TOOLS.TXT

* BellaVista 32-bit + 64-bit BOOT.INI, Boot Configuration Data (BCD) + BCDEdit.exe interface (GUI) tweaking tool:
http://www.zezula.net/en/fstools/bellavista.html
File:
http://www.zezula.net/download/bellavista_en.zip

* Visual BCD Editor (VBCDE) Boot Configuration Data (BCD) + BCDEdit.exe interface (GUI) tweaking tool:
http://www.boyans.net/
VBCDE Download:
http://www.boyans.net/DownloadVisualBCD.html
File:
http://www.boyans.net/VisualBcd/VisualBcd_0.9.3.1.msi
VBCDE DOCument:
http://www.boyans.net/VisualBCD_doc.htm
VBCDE Guide:
http://www.boyans.net/VBCD_HowTo.html

* Dual-Boot Repair (DBR) GUI tool repairs any Windows XP/newer multi-boot setup:
http://www.boyans.net/dual-boot-repair-windows-10.html
File:
http://www.boyans.net/dbr7/dbr-1.3.0.0.zip
Online Help:
http://www.boyans.net/DualBootRepairHelp.html
Repair Windows boot:
http://www.boyans.net/RepairWindows/repair-windows-boot.html
Requires Microsoft .NET Framework Redistributable (NFR) 2.0/newer (free):
http://www.mdgx.com/add.htm#NFR

* EasyBCD Community Edition 32-bit Boot Configuration Data (BCD), BCDEDIT.EXE + BOOT.INI interface (GUI) tweaking tool:
http://www.neosmart.net/EasyBCD/
File:
http://www.softpedia.com/get/System/OS-Enhancements/EasyBCD.shtml
EasyBCD Online DOCumentation:
http://www.neosmart.net/wiki/easybcd/

* MBRFix 32-bit + 64-bit DOS console command line MBR/EMBR [(Extended) Master Boot Record]
creator/editor/backup/repair/restore tool:
http://sysint.no/en/mbrfix/
File:
http://sysint.no/wp-content/uploads/mbrfix.zip
http://www.softpedia.com/get/System/Hard-Disk-Utils/MBRFix.shtml
MBR (Master Boot Record) Guide:
http://thestarman.pcministry.com/asm/mbr/#MBR
Wikipedia: Master Boot Record:
http://en.wikipedia.org/wiki/Master_boot_record
Wikipedia: Extended (Partition) Boot Record:
http://en.wikipedia.org/wiki/Extended_boot_record

* Stop Check Disk (ChkDsk) from Running at Startup:
http://www.top-password.com/blog/stop-check-disk-chkdsk-from-running-at-startup/
http://www.top-password.com/blog/how-to-manually-clear-or-set-dirty-bit-on-windows-volume/
http://learn.microsoft.com/windows-server/administration/windows-commands/chkntfs/
http://www.ss64.com/nt/chkntfs.html
Check Disk (ChkDsk) [CHKDSK.EXE] + Check NTFS (ChkNTFS) [CHKNTFS.EXE] executable DOS console command line tools are located
in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually C:\WINDOWS].
View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]:
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command
PATH
-> press Enter.
Exclude all drives/partitions/volumes from boot/startup check + turn OFF check NTFS disk/partition/volume AUTOCHK countdown
time: from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as
Administrator -> run these commands -> press Enter after each line:
CHKNTFS.EXE /X C: D: E: F: G: H: I: J: K: L: M: N: O: P: Q: R: S: T: U: V: W: X: Y: Z:
CHKNTFS.EXE /T:0
View these DOS console tools command line options, switches + parameters: from a DOS console command prompt
[%WinDir%\SYSTEM32\CMD.EXE] right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run these commands -> press Enter
after each line:
CHKDSK.EXE /?
CHKNTFS.EXE /?

* Turn ON Solid State memory Drive (SSD) TRIM Advanced Technology Attachment (ATA) command to maximize performance for all
available/configured/connected/installed/linked/local/networked/remote/removable physical/logical
cards/devices/discs/disks/media/sticks drives/partitions/volumes in Windows 7/newer using File System Utility (FSUtil)
[FSUTIL.EXE] command line tool:
http://learn.microsoft.com/windows-server/administration/windows-commands/fsutil/
http://learn.microsoft.com/windows-server/administration/windows-commands/fsutil-8dot3name/
http://learn.microsoft.com/windows-server/administration/windows-commands/fsutil-behavior/
http://www.ss64.com/nt/fsutil.html
http://www.commandwindows.com/fsutil.htm
TRIM ATA command:
http://en.wikipedia.org/wiki/Trim_(computing)
Troubleshoot Disks + File Systems:
http://technet.microsoft.com/library/bb457122.aspx
Windows 7/7 SP1 FSUTIL.EXE Hotfix/Update 32-bit + 64-bit improves compatibility with Advanced Format Disk Drives (AFD):
http://support.microsoft.com/help/982018/
Download:
http://www.catalog.update.microsoft.com/search.aspx?q=KB982018
- FSUTIL.EXE Hotfix 64-bit for Windows 7/7 SP1 64-bit (x64):
http://download.windowsupdate.com/msdownload/update/software/updt/2011/04/windows6.1-kb982018-v3-x64_7853a1c9c63611e17cd2c923704bf2e924bdfe7b.msu
- FSUTIL.EXE Hotfix 32-bit for Windows 7/7 SP1 32-bit (x86):
http://download.windowsupdate.com/msdownload/update/software/updt/2011/04/windows6.1-kb982018-v3-x86_b009d84249f14d4eaae7aa522be37c38dd83531b.msu
Advanced Format Disk (AF):
http://en.wikipedia.org/wiki/Advanced_Format
FSUTIL behavior command line options, switches + parameters:
http://technet.microsoft.com/library/cc785435.aspx
FSUtil quota command line options, switches + parameters:
http://technet.microsoft.com/library/cc788136.aspx
FSUtil resource command line options, switches + parameters:
http://technet.microsoft.com/library/ff621564.aspx
FSUtil usn command line options, switches + parameters:
http://technet.microsoft.com/library/cc788042.aspx
FSUtil fsinfo command line options, switches + parameters:
http://technet.microsoft.com/library/cc788080.aspx
FSUtil 8dot3name command line options, switches + parameters:
http://technet.microsoft.com/library/ff621566.aspx
FSUtil dirty command line options, switches + parameters:
http://technet.microsoft.com/library/cc788091.aspx
FSUtil file command line options, switches + parameters:
http://technet.microsoft.com/library/cc788058.aspx
Monitor Disk Space using FSUtil:
http://www.sqlservercentral.com/blogs/powersql-by-prashanth-jayaram/2016/09/27/sql-server-monitoring-disk-space-with-fsutil-command-line-utility/
Monitor File System using FSUtil:
http://tutorial.wmlcloud.com/windows_server/Windows-Server-2008-Server-Core---Monitoring-the-File-System-with-the-FSUtil-Command-(part-1)---Behavior,-Dirty---File.aspx
Some of the FSUtil command line parameters correspond to Registry DWORD [REG_DWORD] 32-bit values under the Hive Key Local
Machine (HKLM) FileSystem subkey:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\FileSystem
Examples:
FSUtil Parameter	Registry Value
—————————————————————————————————————————————————————————————
AllowExtChar		NtfsAllowExtendedCharacterIn8dot3Name
BugcheckOnCorrupt	NtfsBugcheckOnCorrupt
Disable8dot3		NtfsDisable8dot3NameCreation
DisableCompression	NtfsDisableCompression
DisableDeleteNotify	DisableDeleteNotification
DisableEncryption	NtfsDisableEncryption
DisableLastAccess	NtfsDisableLastAccessUpdate
EncryptPagingFile	NtfsEncryptPagingFile
MemoryUsage		NtfsMemoryUsage
FSUtil [FSUTIL.EXE] executable DOS console command line tool is located in the %WinDir%\SYSTEM32 directory/folder [%WinDir%
= usually C:\WINDOWS].
View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]:
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command
PATH
-> press Enter.
Turn ON SSD/NVMe TRIM ATA command
http://en.wikipedia.org/wiki/Trim_(computing)
to maximize performance for all local/removable physical/logical SSD/NVMe disks/partitions/volumes (if any), including the
boot disk/partition -> DisableDeleteNotify [ 0 = ON | 1 = OFF ]:
http://www.howtogeek.com/257196/how-to-check-if-trim-is-enabled-for-your-ssd-and-enable-it-if-it-isnt/
http://www.thomas-krenn.com/en/wiki/Optimize_Windows_for_SSDs
http://www.pchardwarehelp.com/guides/optimize-ssd-windows.php
http://www.howtogeek.com/256859/dont-waste-time-optimizing-your-ssd-windows-knows-what-its-doing/
From a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator ->
run these commands -> press Enter after each line (examples):
FSUTIL.EXE behavior set DisableDeleteNotify 0
FSUTIL.EXE behavior set AllowExtChar 1
FSUTIL.EXE behavior set BugcheckOnCorrupt 0
FSUTIL.EXE behavior set DisableCompression 0
FSUTIL.EXE behavior set DisableEncryption 0
FSUTIL.EXE behavior set DisableLastAccess 0
FSUTIL.EXE behavior set EncryptPagingFile 1
FSUTIL.EXE behavior set MemoryUsage 2
FSUTIL.EXE behavior set Disable8dot3 0
View FSUtil [FSUTIL.EXE] command line options, switches + parameters (examples): from a DOS console command prompt
[%WinDir%\SYSTEM32\CMD.EXE] right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run these commands -> press Enter
after each line:
FSUTIL.EXE
FSUTIL.EXE behavior set

* Turn OFF Maintain Objects List (MOL) global flag for local open files + turn OFF all local/removable physical/logical
disks/partitions/volumes performance counters:
http://learn.microsoft.com/windows-server/administration/windows-commands/openfiles/
http://learn.microsoft.com/windows-server/administration/windows-commands/diskperf/
http://www.ss64.com/nt/openfiles.html
Open Files (OpenFiles) [openfiles.exe] + Disk Performance (DiskPerf) [DISKPERF.EXE] executable DOS console command line
tools are located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually C:\WINDOWS].
From a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator ->
run these commands -> press Enter after each line:
openfiles.exe /Local OFF
DISKPERF.EXE -N
View these DOS console tools command line options, switches + parameters: from a DOS console command prompt
[%WinDir%\SYSTEM32\CMD.EXE] right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run these commands ->
press Enter after each line:
openfiles.exe /?
DISKPERF.EXE /?
See also "* Turn OFF Diagnostic Tracing [DiagTrack], Data Collection/Logging [DataCollection], Telemetry + Performance
Counters..." section further above.

* BootCfg [BOOTCFG.EXE] executable is located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually C:\WINDOWS]:
http://learn.microsoft.com/windows-server/administration/windows-commands/bootcfg/
View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]:
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command
PATH
-> press Enter.
Windows Recovery Console (WRC) command used to build or modify the BOOT.INI file in Windows 2000/XP/2003 ->
"Free(ware) Windows 9x/NTx Boot Tweakers" chapter -> SOFTWARE.TXT (included):
http://www.mdgx.com/toy.htm#BINI
BootCfg can be used to multi-boot with other operating systems (OSes) like Windows 9x/NTx, Linux, etc.
NOTE:
In Windows 2000/XP/2003 BootCfg is available only from within the Recovery Console.
View BootCfg [BOOTCFG.EXE] options, switches + parameters: from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter:
BOOTCFG.EXE /?

* Switch Windows Vista/7/7 SP1 Boot Disk drive/partition/volume letters using BcdBoot [BCDBOOT.EXE]:
http://www.hanselman.com/blog/SwitchingMyWindows7BootDiskFromDToCWithBCDBootRatherThanBCDEdit.aspx
http://social.technet.microsoft.com/forums/windows/1a909e7c-6ffe-48df-a179-6cba7256e836/
http://www.boyans.net/MoveWindows7BootFilesToAnotherDrive.html
BcdBoot is a Windows Vista/7/7 SP1 BCD boot file creation + repair command line tool.
BcdBoot [BCDBOOT.EXE] executable is available only in Windows Vista/7/7 SP1, and is located in the %WinDir%\SYSTEM32
directory/folder [%WinDir% = usually C:\WINDOWS].
View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]:
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command
PATH
-> press Enter.
View BcdBoot command line options, switches + parameters: from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command
BCDBOOT.EXE /?
-> press Enter.

* BcdEdit [BCDEDIT.EXE] executable is available only in Windows Vista/7/7 SP1, and is located in the %WinDir%\SYSTEM32
directory/folder [%WinDir% = usually C:\WINDOWS]:
View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]:
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command
PATH
-> press Enter.
Boot Configuration Data Store Editor.
BcdEdit Command Line Options:
http://technet.microsoft.com/library/cc709667.aspx
BcdEdit Guide:
http://diddy.boot-land.net/bcdedit/
BcdEdit commands:
http://diddy.boot-land.net/bcdedit/files/commands_list.htm
BcdEdit command line tool:
http://www.sevenforums.com/tutorials/2676-bcdedit-how-use.html
Use BcdEdit to dual-boot multiple Windows:
http://www.superuser.com/questions/511582/
Dual-boot Windows 7 and Linux using BcdEdit:
http://www.iceflatline.com/2009/09/how-to-dual-boot-windows-7-and-linux-using-bcdedit/
Load/Install Grub4Dos from Windows:
http://diddy.boot-land.net/grub4dos/files/install_windows.htm
BCDEDIT.EXE command line tool modifies the boot configuration data store.
The boot configuration data store contains boot configuration parameters and controls how the operating system is booted.
These parameters were previously in the Boot.ini file (in BIOS-based operating systems) or in the nonvolatile RAM entries
(in Extensible Firmware Interface-based operating systems).
You can use BcdEdit to add, delete, edit, and append entries in the boot configuration data store.
View BcdEdit [BCDEDIT.EXE] command line options, switches + parameters: from a DOS console command prompt
[%WinDir%\SYSTEM32\CMD.EXE] right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run these commands -> press Enter
after each line:
BCDEDIT.EXE /?
BCDEDIT.EXE /? TOPICS
BCDEDIT.EXE /? /createstore

* BootRec [BOOTREC.EXE] executable is available only in Windows Vista/7/7 SP1, and is located in the %WinDir%\SYSTEM32
directory/folder [%WinDir% = usually C:\WINDOWS]:
http://support.microsoft.com/help/927392/
View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]:
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command
PATH
-> press Enter.
You can use the Bootrec.exe tool in Windows Recovery Environment (Windows RE) to troubleshoot and repair certain
functions/items:
- master boot record (MBR).
- boot sector.
- Boot Configuration Data (BCD) store.
NOTE:
When you are troubleshooting startup issues by using Windows RE, you should
first try the Startup Repair option in the System Recovery Options dialog box.
If the Startup Repair option does not resolve the issue, or if you must
troubleshoot more steps manually, use BootRec.
To run BootRec you must boot from Windows RE:
1. Place Windows Vista/7/7 SP1 install disc/USB in the disc drive/USB port and start your computer.
2. Press a key when prompted.
3. Select language, time, currency, keyboard or input method and then click Next.
4. Click Repair your computer.
5. Click the operating system you want to repair and then click Next.
6. In System Recovery Options dialog box click Command Prompt.
7. Type Bootrec.exe and then press Enter.
NOTE:
To boot up from a Windows Vista/7/7 SP1 DVD/BD your computer must be configured to start from the DVD/BD drive.
Refer to your documentation/guidelines/manuals/readme files or contact the manufacturer/support/vendor for information.
NOTE:
Use BootRec to troubleshoot "Bootmgr Is Missing" issue.
If rebuilding the BCD does not resolve the startup issue, you can export and delete the BCD, and then run this option again.
This method makes sure BCD is completely rebuilt.
To do this type the following commands at the Windows RE command prompt:
bcdedit /export C:\BCD_Backup
c:
cd boot
attrib bcd -s -h -r
ren c:\boot\bcd bcd.old
bootrec /RebuildBcd
The /FixMbr option writes a Windows Vista/7/7 SP1 compatible MBR to the system partition.
This option does not overwrite the existing partition table.
Use this option when you must resolve MBR corruption issues, or when you have to remove non-standard code from the MBR.
The /FixBoot option writes a new boot sector to the system (boot) drive/partition/volume by using a boot sector compatible
with Windows Vista/7/7 SP1.
Use this option if 1 of the following conditions is true:
- The boot sector has been replaced with a non-standard Windows Vista/7/7 SP1 boot sector.
- The boot sector is damaged.
- An earlier Windows operating system has been installed after Windows Vista/7/7 SP1 was installed.
In this scenario the computer starts by using Windows NT Loader (NTLDR) instead of Windows Boot Manager (Bootmgr.exe).
The /ScanOs option scans all disks for installations compatible with Windows Vista/7/7 SP1.
Additionally, this option displays the entries currently not in the BCD store.
Use this option when there are Windows Vista/7/7 SP1 installations Boot Manager menu does not list.
The /RebuildBcd option scans all disks for installations compatible with Windows Vista/7/7 SP1.
Additionally, this option lets you select the installations you want to add to the BCD store.
Use this option when you must completely rebuild the BCD.
Startup Repair can automatically recover from most BCD problems.
If you prefer to manually analyze and repair problems, you can use BootRec by starting the System Recovery tools, and then
clicking Command Prompt in the System Recovery Options dialog box.
View BootRec [BOOTREC.EXE] command line options, switches + parameters: from a DOS console command prompt
[%WinDir%\SYSTEM32\CMD.EXE] right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter:
BOOTREC.EXE /?

* BootSect [BOOTSECT.EXE] executable is available only in Windows 7/7 SP1, and is located in the %WinDir%\SYSTEM32
directory/folder [%WinDir% = usually C:\WINDOWS]:
http://learn.microsoft.com/windows-hardware/manufacture/desktop/bootsect-command-line-options/
View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]:
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command
PATH
-> press Enter.
Boot sector restoration DOS console command line tool.
BOOTSECT.EXE {/help|/nt60|/nt52} {SYS|ALL|:} [/force] [/mbr]
BootSect updates the master boot code for hard disk partitions in order to switch between BOOTMGR and NTLDR.
You can use BootSect to restore the boot sector on your computer(s).
View BootSect [BOOTSECT.EXE] command line options, switches + parameters: from a DOS console command prompt
[%WinDir%\SYSTEM32\CMD.EXE] right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command
BOOTSECT.EXE /?
-> press Enter.
______________________________________________________________________________



Windows Side-by-Side (WinSxS) Folder



* Move/delete WinSxS directory/folder + files in Windows Vista/newer:
http://www.thewindowsclub.com/winsxs-folder-windows-7-8/
CAUTION:
1st backup/clone your entire Windows Operating System (OS), or create a fresh restore point!
PendMoves [pendmoves.exe + pendmoves64.exe] + MoveFile [movefile.exe + movefile64.exe] 32-bit + 64-bit command line tools
for Windows NTx unlock, display + delete in-use, protected + system files + schedule these operations for next reboot:
http://learn.microsoft.com/sysinternals/downloads/pendmoves/
File:
http://download.sysinternals.com/files/pendmoves.zip
MS DOCs: PendMoves + MoveFile:
http://technet.microsoft.com/magazine/2009.06.utilityspotlight.aspx
MS DOCs: PendMoves + MoveFile Tips:
http://technet.microsoft.com/magazine/dd370591.aspx
01. Download ZIP file above -> extract PendMoves.exe + MoveFile.exe using an unZIPping/unARChiving/unRARing tool
[free(ware)]
http://www.mdgx.com/toy.htm#ZIP
-> place them in a directory/folder listed in your system PATH.
View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]:
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command
PATH
-> press Enter.
02. Explorer -> C:\WINDOWS\WinSxS -> right-click on it -> Properties -> Security tab -> must list the owner of the
directory/folder user (who must be part of the Administrators group) -> must grant Administrator Full Control.
03. Start a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator
-> run this command to create a dummy (clone) directory/folder (example) -> press Enter:
MKDIR C:\WINDOWS\WinSxS.moved
04. Create a new junction (a.k.a. symbolic link):
MKLINK /J C:\WINDOWS\WinSxS.link WinSxS.moved
05. Delete WinSxS.moved directory:
RMDIR C:\WINDOWS\WinSxS.moved
06. Use MoveFile.exe (see above) to schedule renaming of WinSxS directory at next restart/reboot.
07. Start a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator
-> run this command -> press Enter:
MoveFile.exe C:\WINDOWS\WinSxS C:\WINDOWS\WinSxS.moved
This will rename your WinSxS directory/folder before Windows manages to get a lock on it.
08. Start a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator
-> run this command -> press Enter:
MoveFile.exe C:\WINDOWS\WinSxS.link C:\WINDOWS\WinSxS
This restores your new WinSxS directory/folder in order to avoid OS critical errors!
09. Start a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator
-> run this command -> press Enter:
PendMoves.exe
to view the 2 pending moves executed above.
10. Restart/reboot.
11. Upon restart/reboot the 2 rename/move operations will execute, and WinSxS directory will be unlocked + allowed to be
moved.
12. Start a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator
-> run this command -> press Enter:
DIR C:\WINDOWS\WinSxS*
You can see WinSxS.moved directory/folder contents and respective WinSxS junction created above.
If this doesn't work, *must* repeat steps above!
13. Explorer -> copy entire WinSxS.moved directory/folder to \Windows directory/folder on different drive/partition/volume
(D: for example).
14. Rename new directory/folder from WinSxS.moved back to WinSxS (original name).
15. Start a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator
-> run this command -> press Enter:
RMDIR C:\WINDOWS\WinSxS
16. Start a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator
-> run this command -> press Enter:
MKLINK /J C:\WINDOWS\WinSxS D:\Windows\WinSxS
17. Explorer -> browse to C:\WINDOWS\WinSxS -> should see all files, even if now they are physically located on different
drive/partition/volume (D: in this example).
18. Restart/reboot.
19. Now you should be able to delete C:\WINDOWS\WinSxS.moved to free some disk space.

* Move/delete Windows Updates (WU) Downloads directory/folder in Windows Vista/newer:
CAUTION:
1st backup/clone your entire Windows Operating System (OS), or create a fresh restore point!
Same process can be applied to Windows Updates (WU) list.
Installed Windows Updates are configured to download to
C:\WINDOWS\SoftwareDistribution
which in time will grow too large, and eventually take too much storage space.
Stop WU service [wuauserv] (if running) -> move/create a directory/folder junction (using MoveFile.exe -> see above)
http://download.sysinternals.com/files/pendmoves.zip
-> restart WU service [wuauserv] from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD
shortcut/CMD.EXE -> Run as Administrator -> run these commands -> press Enter after each line (example):
ECHO Y|NET.EXE STOP wuauserv
SC.EXE CONFIG wuauserv START= demand
MKDIR C:\WINDOWS\SoftwareDistribution_NEW
MKLINK /J C:\WINDOWS\SoftwareDistribution_OLD SoftwareDistribution_NEW
RMDIR C:\WINDOWS\SoftwareDistribution_NEW
MoveFile.exe C:\WINDOWS\SoftwareDistribution C:\WINDOWS\SoftwareDistribution_NEW
MoveFile.exe C:\WINDOWS\SoftwareDistribution_OLD C:\WINDOWS\SoftwareDistribution
ECHO Y|NET.EXE START wuauserv
May need to restart/reboot for all these changes to take effect.

* WinSxS frequently asked questions (FAQ):
http://learn.microsoft.com/archive/blogs/joscon/should-you-delete-files-in-the-winsxs-directory-and-whats-the-deal-with-vss/
Q:
Should you delete files inside \WinSxS directory? What's the deal with Volume Shadow Copy (VSS)?
A:
No.
Why? Because component store (\WinSxS) is needed to repair OS binaries in the event file(s) become corrupted, compromised or
missing.
Directories located under component store:
\WinSxS\Catalogs = Security catalogs for each manifest on the system;
\WinSxS\InstallTemp = Temporary location for install events;
\WinSxS\Manifests = Component manifest for each specific component used during operation to make sure files end up in proper
location;
\WinSxS\Temp = Temp directory used for various operations, pending renames;
\WinSxS\Backup = Backups of manifest files in case the copy in \WinSxS\Manifests becomes corrupted;
\WinSxS\Filemaps = File system mapping to a file location;
\WinSxS\ = Binary payloads for each specific component/device.
So long as files in the \Windows\SYSTEM32 directory are valid, most likely you wouldn't see any problems initially, the
machine would most likely operate properly.
However, the 1st time you attempt to update a binary, apply a service pack or service a component, it's going to fail
because the backing components needed don't exist anymore.
The way files end up in \System32 are via hardlinks.
This should help answer another question regarding how Volume Shadow Copy (VSS) is used in servicing.
Short answer: No. We use NTFS hardlinks to project the file to the file system from the component store.
That's why the \WinSxS directory is so important. The files there can be seen as the "authoritative" versions on the file
system.
When there is an issue and a binary needs to be replaced, running
SFC.EXE /SCANFILE
against it verifies the directories above and if the version doesn't match, it will re-project (deliver a fresh copy) it so
it stars working again.
View a hardlink from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as
Administrator -> run these commands -> press Enter after each line (example):
C:
CD\WINDOWS\SYSTEM32\Drivers
FSUTIL.EXE hardlink list ntfs.sys
which returns this output:
\Windows\System32\drivers\ntfs.sys
\Windows\WinSxS\amd64_microsoft-windows-ntfs_31bf3856ad364e35_6.1.7600.16385_none_02661b64369ca03a\ntfs.sys
You can see the NTFS file has a link to the \WinSxS directory and if that version of NTFS were to become corrupted, we could
go back to the component store and grab a new copy.
The \WinSxS backup directory exists in the event the version in the main directory has also become corrupted.
This is a good method of having decent OS protection without consuming a huge amount of space.
New servicing structure does remove the $NTUninstall$ directories/folders that were used in Windows NT4/2000/XP/2003.
Updates, if they are marked as removable, no longer contain that structure.
Instead updates are recommended to be removed via Control Panel (CP) -> Programs (and Features) -> (View) Installed Updates.
Updates can be removed via appropriate switches using DISM.EXE or PKGMGR.EXE, but the Control Panel (CP) method tends to be
cleaner.

* Dism++ -> select "Replaced WinSxS assemblies" -> click OK to cancel "Warning: these installed updates cannot be
uninstalled!" -> Scan -> Cleanup:
http://www.chuyu.me/en/
File:
http://gh.api.99988866.xyz/github.com/Chuyu-Team/Dism-Multi-language/releases/download/v10.1.1002.1/Dism++10.1.1002.1.zip
Documentation:
http://www.chuyu.me/en/Document.html

* Reduce size of WinSxS directory/folder using WinSxSLite:
http://www.dmitrybobrovsky.ru/2012/09/05/decrease-of-the-size-of-folder-winsxs-in-windows-7-or-how-to-use-winsxslite-bat/
http://sites.google.com/site/winsxslite/
NEWest:
http://github.com/zippy1981/Nuget-Packages-FerventCoder/raw/master/WinsxsLite1.88.zip
OLDer:
http://www.dmitrybobrovsky.ru/wp-content/uploads/files/winsxslite.zip

* Reduce size of WinSxS directory/folder using COMPCLN.EXE:
http://www.techrepublic.com/blog/tr-dojo/reduce-the-size-of-the-winsxs-folder-with-vsp1clnexe-and-compclnexe/
http://www.boshdirect.com/Blogs/Tech/how-to-reduce-size-of-winsxs.html

* Reduce size of WinSxS directory/folder by deleting some of the files:
http://blogs.technet.com/b/askcore/archive/2008/09/17/what-is-the-winsxs-directory-in-windows-2008-and-windows-vista-and-why-is-it-so-large.aspx
http://blogs.technet.com/b/joscon/archive/2010/08/06/should-you-delete-files-in-the-winsxs-directory-and-what-s-the-deal-with-vss.aspx
http://www.helpdeskgeek.com/windows-8/cleanup-the-winsxs-folder-in-windows-8-7/

* Reduce size of WinSxS directory/folder by deleting some of the duplicate files:
http://www.msfn.org/board/index.php?showtopic=109131

* Reduce size of WinSxS directory/folder by deleting some of the backup files:
http://technet.microsoft.com/library/dn251565.aspx

* Deployment Image Servicing and Management [DISM.EXE] executable is located in the %WinDir%\SYSTEM32 directory/folder
[%WinDir% = usually C:\WINDOWS] DOS console command line tool for component cleanup:
http://learn.microsoft.com/windows-hardware/manufacture/desktop/what-is-dism/
http://learn.microsoft.com/windows-hardware/manufacture/desktop/dism-image-management-command-line-options-s14/
View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]:
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command
PATH
-> press Enter.
First backup/clone your operating system drive/partition/volume to a safe location -> see "Free(ware) WinDOwS Backup +
Restore Tools" section in SECRETS.TXT (included):
http://www.mdgx.com/secrets.htm#BKP
Then from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator
-> run these 3 commands in this exact order -> press Enter after each line:
DISM.EXE /online /Cleanup-Image /StartComponentCleanup
DISM.EXE /online /Cleanup-Image /StartComponentCleanup /ResetBase
DISM.EXE /online /Cleanup-Image /SpSuperseded

* Microsoft Package Manager [PKGMGR.EXE] Command Line Options:
http://technet.microsoft.com/library/cc749465.aspx
Use Package Manager [PKGMGR.EXE] to Uninstall A Package:
http://support.microsoft.com/help/940410/

* Windows 7 64-bit (x64) vLite extreme removal:
http://www.msfn.org/board/index.php?showtopic=136837
______________________________________________________________________________



Free(ware) Burn/Copy/Write/Install CDs/DVDs/BDs/USB Tools



* MDGx "Free(ware) WinDOwS Backup + Restore Tools" section in SECRETS.TXT (included):
http://www.mdgx.com/secrets.htm#BKP

* MDGx "BACKUP" section in TOOLS.TXT (included):
http://www.mdgx.com/tools.php
http://www.mdgx.com/TOOLS.TXT

* MDGx "STORAGE" section in TOOLS.TXT (included):
http://www.mdgx.com/tools.php
http://www.mdgx.com/TOOLS.TXT

* WinBuilder:
http://reboot.pro/files/file/4-winbuilder/
http://reboot.pro/files/download/4-winbuilder/
WinBuilder Scripts:
http://reboot.pro/files/category/5-winbuilder/
WinBuilder Download Center = Scripts:
http://multipe.exec-se.de/
Create Windows 7 Live Install CD/DVD/BD/UHD/USB using WinBuilder:
http://www.instantfundas.com/2010/12/how-to-create-windows-7-live-cddvdusb.html
PEFactory WinBuilder add-on:
http://multipe.exec-se.de/Documentation/multiPE/PEF_index.htm

* Win7PE_SE:
http://reboot.pro/topic/12427-win7pe-se-release/
Win7PE SE Downloads [144 MB]:
http://w7pese.cwcodes.net/Compressed/
multiPE 62 script:
http://reboot.pro/files/file/61-multipe/

* Get Windows Automated Installation Kit (WAIK) Tools without downloading entire disc image (ISO):
http://www.msfn.org/board/index.php?showtopic=156869
File:
http://db.tt/2l5l22OE

* Create Windows 7 Bootable Install USB Drive disc image (ISO):
http://www.softlay.net/operating-system/create-windows-7-bootable-usb-install-disk-drive-iso.html

* Windows 7 Windows Automated Installation Kit (WAIK):
http://www.microsoft.com/en-us/download/confirmation.aspx?id=5753
Win7 WAIK ISO [1.7 GB]:
http://download.microsoft.com/download/8/E/9/8E9BBC64-E6F8-457C-9B8D-F6C9A16E6D6A/KB3AIK_EN.iso
Win7 WAIK ReadMe:
http://technet.microsoft.com/library/dd349350.aspx
Win7 SP1 WAIK Supplement:
http://www.microsoft.com/en-us/download/details.aspx?id=5188
Win7 SP1 WAIK Supplement ISO [1.3 GB]:
http://download.microsoft.com/download/0/4/C/04C805CC-4C04-4D76-BE80-7D67B951CF73/waik_supplement_en-us.iso

* YUMI (Your USB Multiboot Installer) Multiboot USB Creator for Windows 7/newer creates universal bootable USB drive from
multiple bootable ISO images of different operating systems (OSes):
http://www.pendrivelinux.com/yumi-multiboot-usb-creator/
YUMI Legacy BIOS USB boot only [NTFS or FAT32 only]:
http://www.pendrivelinux.com/yumi-multiboot-usb-creator/#YUMI-Legacy
YUMI exFAT BIOS + UEFI USB boot [exFAT only]:
http://www.pendrivelinux.com/yumi-multiboot-usb-creator/#YUMI-exFAT

* GImageX GUI for Windows Imaging:
http://www.autoitconsulting.com/site/software/gimagex/

* ei.cfg Removal Utility (Windows 7 Universal CD) Make Your Windows 7 Disc Universal:
http://www.technibble.com/ei-cfg-removal-utility-repair-tool-of-the-week/

* Windows disc image (ISO) Utilities:
http://code.kliu.org/misc/winisoutils/

* PEChecksum 32-bit + 64-bit command line tool updates Portable EXEcutable (PE) files (EXE, DLL, OCX, SYS, DRV, MUI) 32-bit
+ 64-bit signatures:
http://www.coderforlife.com/projects/utilities/#PEChecksum
PEChecksum 32-bit:
http://www.coderforlife.com/projects/utilities/PEChecksum.exe
PEChecksum 64-bit:
http://www.coderforlife.com/projects/utilities/PEChecksum64.exe

* Windows Graphics User Interface (GUI) + Tweaking Tools:
http://www.thewindowsclub.com/list-freeware-releases-from-the-windows-club/
http://www.winaero.com/
http://www.xptsp.com/
http://www.blogsdna.com/
http://www.xp-smoker.com/
Themes:
http://www.winaero.com/news.php?cat.2
Downloads:
http://www.winaero.com/download.php?list.2

* WinCDEmu 32-bit + 64-bit mounts CD/DVD/BD/UHD ISO/IMG images on HDD/SSD/USB:
http://wincdemu.sysprogs.org/
WinCDEmu Portable:
http://wincdemu.sysprogs.org/portable/
File:
http://wincdemu.sysprogs.org/download/

* WinFLASHTool writes raw CD/DVD/BD/UHD disk images to memory cards/discs/media/sticks:
http://winflashtool.sysprogs.com/
File:
http://www.sysprogs.com/files/WinFLASHTool/v2/WinFlashTool.exe
Download:
http://winflashtool.sysprogs.com/download/

* cdrtfe Audio/CD/XCD/VCD/DVD/BD/UHD ISO/bootable disc image burning tool:
http://cdrtfe.sourceforge.io/
http://sourceforge.net/projects/cdrtfe/
Download:
http://cdrtfe.sourceforge.io/cdrtfe/download_en.html
Portable:
http://sourceforge.net/projects/cdrtfe/files/cdrtfe%20portable/
cdrtfe Tools:
http://cdrtfe.sourceforge.io/tools/index_en.html
Download:
http://sourceforge.net/projects/cdrtools/
File:
http://sourceforge.net/projects/cdrtools/files/

* Sevenize:
http://www.sevenize.com/

* Completely Hide Windows 7 Shell, Logos, Icons, Start etc:
http://forum.arcadecontrols.com/index.php?topic=113896.0

* Completely hide Windows + Shell with 3rd party Front End GUI:
http://www.gameex.com/Community/InstantShellerandShellingGuide.aspx

* Windows 7 Boot Updater:
http://www.coderforlife.com/projects/win7boot/
______________________________________________________________________________



OEM



* OEM licensing terms:
http://web.archive.org/web/20141228133711/http://www.microsoft.com/oem/en/licensing/sblicensing/pages/licensing_faq.aspx
Original Equipment Manufacturer (OEM) versions of Windows 7 are identical to Full License Retail (FLR) except they...
- do not provide any free direct support from Microsoft.
- OEM licenses are tied to the 1st computer Windows is installed and activated on.
- all hardware upgrades are allowed except for different model/version motherboard upgrades.
- cannot be used to upgrade directly from an older Windows OS.
______________________________________________________________________________



Application (IN)Compatibility



* Application (program executable = .exe) Compatibility Info, Guides, Tips + Tools:
To DEP (Data Execution Prevention) or not to DEP... DisableNXShowUI:
http://techcommunity.microsoft.com/t5/ask-the-performance-team/to-dep-or-not-to-dep-8230/ba-p/373137/
Script Compatibility Layers in Windows XP:
http://web.archive.org/web/20111114000642/http://support.microsoft.com/?kbid=286705
Configure Compatibility tab:
http://www.intrntpirate.com/2012/03/29/configuring-the-compatibility-tab/
Use Windows Application Compatibility Mode (ACM):
http://technet.microsoft.com/library/bb456979.aspx
Use Compatibility Administration tool in Windows 7/newer:
http://learn.microsoft.com/windows/deployment/planning/using-the-compatibility-administrator-tool/
Use Compatibility Administration tool in Windows 7:
http://sourcedaddy.com/windows-7/using-the-compatibility-administrator.html
http://support.microsoft.com/help/317510/
http://technet.microsoft.com/library/cc749034.aspx
http://www.techrepublic.com/blog/windows-and-office/selectively-disable-uac-for-your-trusted-vista-applications/
Use Compatibility Administration tool in Windows XP:
http://technet.microsoft.com/library/bb456983.aspx
Get Rid of UAC Prompts using Application Compatibility Toolkit (ACT):
http://www.ghacks.net/2010/07/08/get-rid-of-uac-prompts-with-microsofts-application-compatibility-toolkit/
Fix Old Games using Application Compatibility Toolkit (ACT):
http://classicgamefixes.wixsite.com/home/act-toolkit/
Create Shim/Fix using Compatibility Administrator tool:
http://www.msigeek.com/4823/
Using Program Compatibility Mode in Windows 7/newer:
http://www.howtogeek.com/howto/10436/using-program-compatibility-mode-in-windows-7/
http://www.thewindowsclub.com/programs-compatibility-wizard-in-windows-7/
http://www.thewindowsclub.com/program-compatibility-troubleshooter-desktop-shortcut/
Run Program Compatibility Troubleshooter (PCT) [MSDT.EXE] from a DOS console command prompt -> right-click CMD
shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter:
MSDT.EXE -id PCWDiagnostic
Microsoft Support Diagnostic Tool [MSDT.EXE] executable is located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% =
usually C:\WINDOWS].
View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]:
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command
PATH
-> press Enter.
Use Compatibility Mode to Fix App Problems:
http://www.reviversoft.com/blog/2013/01/compatibility-mode/
Using RunAsHighest Fix:
http://technet.microsoft.com/library/dd638322.aspx
UAC (User Account Control) and Application Run Levels:
http://www.slickit.ca/2009/05/uac-and-application-run-levels.html
Disable UAC for certain apps:
http://web.archive.org/web/20080103052016/http://support.microsoft.com/kb/946932
Selectively disable UAC for trusted Windows Vista/7/newer apps:
http://www.techrepublic.com/blog/windows-and-office/selectively-disable-uac-for-your-trusted-vista-applications/
Exclude Programs from Program Compatibility Assistant (PCA):
http://support.microsoft.com/help/2545347/
Application Compatibility:
http://msdn.microsoft.com/library/bb757005.aspx
Application Compatibility: Program Compatibility Assistant (PCA):
http://msdn.microsoft.com/library/bb756937.aspx
Program Compatibility Assistant (PCA) - Part 2:
http://blogs.technet.microsoft.com/askperf/2007/10/05/the-program-compatibility-assistant-part-two/
Add/Remove Compatibility tab from Properties:
http://www.sevenforums.com/tutorials/237405-compatibility-tab-add-remove-properties.html

* Microsoft Windows 2000 SP4/XP/2003/Vista/2008/7/8/8.1/2012 Application Compatibility Toolkit (ACT) (English):
http://www.mdgx.com/xptoy.htm#ACT
ACT 5.6 [12.2 MB]:
http://web.archive.org/web/20180605103833if_/http://download.microsoft.com/download/D/3/3/D33A8F5D-A7E1-4BBE-B04D-7A688785A229/ApplicationCompatibilityToolkitSetup.exe
Requires Microsoft .NET Framework Redistributable (NFR) 3.5/newer (free):
http://www.mdgx.com/add.htm#NFR
More info:
http://support.microsoft.com/help/294895/

* AppCompatFlags "Layers" Registry REG_SZ [String] values + __COMPAT_LAYER [RunAsAdmin] environment variable modes +
parameters [case insensitive] in Windows XP/newer:
http://learn.microsoft.com/windows/deployment/planning/compatibility-fixes-for-windows-8-windows-7-and-windows-vista/
http://www.ss64.com/nt/syntax-elevate.html
http://www.ss64.com/nt/syntax-variables.html
http://techsupt.winbatch.com/webcgi/webbatch.exe?techsupt/tsleft.web+WinBatch/How~To+Control~Compatibility~Mode.txt
http://www.ss64.org/viewtopic.php?t=18
Complete list of Windows 10/11 [most are available in Windows XP/newer] compatibility values/modes + parameters for both
32-bit (x86) + 64-bit (x64) executables (.exe):
http://www.ss64.org/viewtopic.php?t=18
All Users (system wide) [HKLM Registry Hive Key]:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers
Current User (logged on user) [HKCU Registry Hive Key]:
HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers
All Users (any logged on user, when more than 1 user) [HKU .Default Registry Hive Key]:
HKEY_USERS\.DEFAULT\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers
Enumeration of multiple values is allowed on the same line: they must be separated by a space [ ] (if more than 1).
Meaning:
http://www.verboon.info/2011/03/running-an-application-as-administrator-or-in-compatibility-mode/
http://qtechbabble.wordpress.com/2016/08/23/run-application-in-compatibility-mode-from-command-line/
Values/Modes (examples):
Windows 8 RTM (Released To Manufacturing) = WIN8RTM
Windows 7 RTM (Released To Manufacturing) = WIN7RTM
Windows Server 2008 SP1 (Service Pack 1) = WINSRV08SP1
Windows Vista RTM (Released To Manufacturing) = VISTARTM
Windows Vista SP1 (Service Pack 1) = VISTASP1
Windows Vista SP2 (Service Pack 2) = VISTASP2
Windows XP SP3 (Service Pack 3) = WINXPSP3
Windows XP SP2 (Service Pack 2) = WINXPSP2
Windows Server 2003 SP1 (Service Pack 1) = WINSRV03SP1
Windows 2000 = WIN2000
Windows NT 4.0 SP5 (Service Pack 5) = NT4SP5
Windows 98/ME = WIN98
Windows 95 = WIN95
Run in 65536 colors (16-bit) = 16BITCOLOR
Run in 256 colors (8-bit) = 256COLOR
Run in 640x480 screen resolution = 640X480
Disable visual themes = DisableThemes
Disable desktop composition = DisableDWM
Disable display scaling on high DPI settings = HighDPIAware
Run this program as Administrator = RunAsAdmin
Enable program to work with SkyDrive/OneDrive = PlaceHolderFile
EveryOne-full [?]
AlcatelLayer
DisableCicero
DisabledXMaximizedWindowedMode
DisableNXHideUI
DisableNXShowUI
DisableThemes
ElevateCreateProcess
EnableNXShowUI
International
LUA
LUACleanUp
PlayerGetProcAddrExOverride
ProfilesSetup
RunAsInvoker
RunAsHighest
Use SetX [SETX.EXE] environment variable manager tool to add new compatibility layer variable [__COMPAT_LAYER] and set its
value for "Run as Administrator" level [RunAsAdmin] to the machine (system wide, all users) environment (example):
From a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator ->
type this command
SETX.EXE __COMPAT_LAYER "RunAsAdmin" /M
-> press Enter.
SetX [SETX.EXE] executable is located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually C:\WINDOWS].
Environment variables can be added/customized/deleted/modified by using a Control Panel (CP)/Windows Settings (WS) tool:
Run... [hold WinKey + press R] -> type this command
SystemPropertiesAdvanced.exe
-> press Enter -> Advanced tab -> Environment Variables... button -> System variables -> New... button -> Variable name: ->
type
__COMPAT_LAYER
-> Variable value: -> type
RunAsAdmin
-> press OK button -> close/exit SystemPropertiesAdvanced.exe.
View the list of all your Windows operating system (OS) environment variables from a DOS console command prompt
[%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command
SET
-> press Enter.
OR
Save it to a plain text/ASCII (.txt) file: from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD
shortcut/CMD.EXE -> Run as Administrator -> type same command above followed by the name of the file (in this example it
will be saved in C:\ root)
SET>C:\Windows_Environment_Variables.txt
-> press Enter -> use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to view saved text file contents.
Newly added environment variable above looks like this:
----------snippity-snip----------
__COMPAT_LAYER=RunAsAdmin
----------snippity-snip----------

* Program Compatibility Assistant (PCA) Service [PcaSvc]:
http://www.howtogeek.com/4161/disable-program-compatibility-assistant-in-windows-7-and-vista/
http://batcmd.com/windows/7/services/pcasvc/
Disabled (Manual = only loads upon demand when triggered):
ECHO Y|NET.EXE STOP PcaSvc
SC.EXE CONFIG PcaSvc START= demand
Enabled (Automatic = always loads with Windows upon boot/start):
ECHO Y|NET.EXE START PcaSvc
SC.EXE CONFIG PcaSvc START= auto

* Optimize/tweak Application Compatibility/Program Compatibility Assistant (PCA) registry settings:
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\AppCompat]
; http://www.windows-security.org/a9e1f3187a2d9e753e52bc92a558b867/remove-program-compatibility-property-page/
; http://www.sevenforums.com/tutorials/237405-compatibility-tab-add-remove-properties.html
"DisablePropPage"=dword:0
; http://www.windows-security.org/13372c6a0a2d392443dc146ceb94d720/turn-off-application-telemetry/
"AITEnable"=dword:0
; http://www.windows-security.org/7be7ad4dce7009d71a3061f872f610e0/turn-off-steps-recorder/
"DisableUAR"=dword:1
; http://www.windows-security.org/dc93a8ca81b69891762057593d8d2ccd/prevent-access-to-16-bit-applications/
"VDMDisallowed"=dword:0
; http://www.windows-security.org/a6c2ac5e5f13a880f6254303a16e20a4/turn-off-application-compatibility-engine/
"DisableEngine"=dword:0
; http://www.windows-security.org/6412ea982640d8a1dd2090387e2e5b29/turn-off-program-compatibility-assistant/
"DisablePCA"=dword:1
; http://www.windows-security.org/36ff6b13efb41d27cc12094bc252b9f3/turn-off-switchback-compatibility-engine/
"SbEnable"=dword:1
; WOW6432Node registry subkey exists only in Windows NTx 64-bit (x64):
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Policies\Microsoft\Windows\AppCompat]
; http://www.windows-security.org/a9e1f3187a2d9e753e52bc92a558b867/remove-program-compatibility-property-page/
; http://www.sevenforums.com/tutorials/237405-compatibility-tab-add-remove-properties.html
"DisablePropPage"=dword:0
; http://www.windows-security.org/13372c6a0a2d392443dc146ceb94d720/turn-off-application-telemetry/
"AITEnable"=dword:0
; http://www.windows-security.org/7be7ad4dce7009d71a3061f872f610e0/turn-off-steps-recorder/
"DisableUAR"=dword:1
; http://www.windows-security.org/dc93a8ca81b69891762057593d8d2ccd/prevent-access-to-16-bit-applications/
"VDMDisallowed"=dword:0
; http://www.windows-security.org/a6c2ac5e5f13a880f6254303a16e20a4/turn-off-application-compatibility-engine/
"DisableEngine"=dword:0
; http://www.windows-security.org/6412ea982640d8a1dd2090387e2e5b29/turn-off-program-compatibility-assistant/
"DisablePCA"=dword:1
; http://www.windows-security.org/36ff6b13efb41d27cc12094bc252b9f3/turn-off-switchback-compatibility-engine/
"SbEnable"=dword:1
;
------End cut & paste here------
______________________________________________________________________________



Control Panel (CP) + Omnipotent/Master/Mega/'god mode' (OMg) Control Panel



* Windows omnipotent/master/mega/'god mode' (OMg) Control Panel folder/shortcut (all Control Panel items enumerated in
bulleted list form):
http://en.wikipedia.org/wiki/Windows_Master_Control_Panel_shortcut
http://www.nogeekleftbehind.com/2010/01/16/more-windows-7-god-mode-hacks/
http://technet.microsoft.com/magazine/hh706157.aspx

* Add Control Panel (CP), omnipotent/master/mega/'god mode' (OMg) Control Panel, enable/disable User Account Control
(UAC), Open Console Command (CMD) Here as Administrator to Desktop right-click menu in Windows Vista/newer:
http://www.eightforums.com/tutorials/19706-control-panel-desktop-context-menu-create-windows-8-a.html

* Control Panel (CP) CLSID (GUID) keys, commands, directories/folders, items, links, scripts, shortcuts available using
Control [CONTROL.EXE], Explorer [EXPLORER.EXE] + RunDLL32 [RUNDLL32.EXE] in Windows Vista/7/newer:
http://en.wikipedia.org/wiki/Control_Panel_(Windows)#Standard_applets
http://learn.microsoft.com/windows/win32/shell/executing-control-panel-items/
http://docs.rainmeter.net/tips/launching-windows-special-folders/
http://www.tenforums.com/tutorials/86339-list-commands-open-control-panel-items-windows-10-a.html
http://renenyffenegger.ch/notes/Windows/control-panel/
http://www.sevenforums.com/tutorials/110919-clsid-key-list-windows-7-a.html
http://www.eightforums.com/threads/clsid-key-guid-shortcuts-list-for-windows-8.13591/
http://www.tenforums.com/tutorials/3123-clsid-key-guid-shortcuts-list-windows-10-a.html
http://www.thewindowsclub.com/shortcuts-shell-commands-clsid-windows-8/
http://www.geoffchappell.com/studies/windows/shell/explorer/cmdline.htm
http://www.howtogeek.com/257715/how-to-open-hidden-system-folders-with-windos-shell-command/
http://www.lifewire.com/command-line-2626060/
http://www.winaero.com/blog/control-panel-context-menu-windows-10/
http://www.thewindowsclub.com/remove-click-context-menu-items-editors/
http://www.tenforums.com/tutorials/6051-add-personalize-classic-context-menu-windows-10-a.html
http://www.techspot.com/guides/1670-windows-right-click-menu/
http://www.tenforums.com/tutorials/24451-add-bluetooth-context-menu-windows-10-a.html
http://www.majorgeeks.com/content/page/here_are_all_the_rundll32_commands_for_windows_10.html
http://www.winaero.com/windows-10-rundll32-command-list/
http://shortcutworld.com/Windows/win/Windows-Run-Commands_-Settings_-and-Start-Menu-Shortcuts
http://www.computerhope.com/issues/ch001870.htm
http://msdn.microsoft.com/library/windows/desktop/cc144191.aspx
http://support.microsoft.com/help/192806/
http://social.technet.microsoft.com/wiki/contents/articles/4486.accessing-the-control-panel-via-the-commandline.aspx
Syntax:
CONTROL.EXE , []
OR:
CONTROL.EXE /name  [/page ]
OR:
EXPLORER.EXE SHELL:::{CLSID/GUID key}[\::{optional CLSID/GUID key}]
OR:
RUNDLL32.EXE , []
All *.cpl, *.DLL, *.EXE files used here are located respectively in the %WinDir%, %WinDir%\SYSTEM32 + %WinDir%\SYSTEM32\wbem
directories/folders [%WinDir% = usually C:\WINDOWS], listed on your system PATH.
View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]:
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command
PATH
-> press Enter.
All these Control Panel (CP) commands can be used in DOS console BATch (.bat)/CoMmanD (.cmd) files, DOS console CoMmanD
prompt [CMD.EXE], directory/folder names, items, links, powershell, scripts, shortcuts, etc.
Below is a comprehensive list of Control, Explorer + RunDll32 Control Panel (CP) commands + directory/folder names.
Some may or may not be available or work properly depending on the specific Windows NTx OS(es)
build/edition/release/update/version +/- bit strength [32-bit (x86) or 64-bit (x64)] installed on your
computer(s)/device(s).
Control Panel (CP) items command lines, directory/folder names, options, switches + parameters:
- Omnipotent/master/mega/'god mode' (OMg) Control Panel (all Control Panel items categorized + enumerated in bulleted list
form):
as Folder:
@.{ED7BA470-8E54-465E-825C-99712043E01C}
as Command line:
EXPLORER.EXE SHELL:::{ED7BA470-8E54-465E-825C-99712043E01C}
- Control Panel -> All Control Panel Items -> System (About) [hold WinKey + press Pause/Break]:
http://www.winaero.com/open-classic-system-properties-in-windows-10-version-20h2/
http://www.askvg.com/tip-restore-and-get-back-classic-system-properties-in-windows-10/
as Folder:
@.{BB06C0E4-D293-4f75-8A90-CB05B6477EEE}
as Command line:
EXPLORER.EXE SHELL:::{BB06C0E4-D293-4f75-8A90-CB05B6477EEE}
- Control Panel behavior in Windows 7/newer:
as Folder:
Small icons:
@.{21EC2020-3AEA-1069-A2DD-08002B30309D}
Large icons:
@.{26EE0668-A00A-44D7-9371-BEB064C98683}
as Command line:
Small icons:
EXPLORER.EXE SHELL:::{21EC2020-3AEA-1069-A2DD-08002B30309D}
Large icons:
EXPLORER.EXE SHELL:::{26EE0668-A00A-44D7-9371-BEB064C98683}
- Control Panel -> All Control Panel Items -> Personalization -> Window Color and Appearance (Aero):
as Command line:
CONTROL.EXE /name Microsoft.Personalization /page pageColorization
as Command line:
EXPLORER.EXE SHELL:::{26EE0668-A00A-44D7-9371-BEB064C98683}\1\::{ED834ED6-4B5A-4bfe-8F11-A626DCB6A921}\pageColorization
- Control Panel -> All Control Panel Items -> Personalization -> Display:
http://www.winaero.com/how-to-open-old-display-settings-in-windows-10-two-ways/
as Command line:
- Windows 10:
CONTROL.EXE desk.cpl,Settings,@Settings
OR:
- Windows 7/8/8.1:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL desk.cpl
CONTROL.EXE /name Microsoft.Display
as Folder:
@.{C555438B-3C23-4769-A71F-B6D3D9B6053A}
as Command line:
EXPLORER.EXE SHELL:::{C555438B-3C23-4769-A71F-B6D3D9B6053A}
- Control Panel -> All Control Panel Items -> AutoPlay:
as Command line:
CONTROL.EXE /name Microsoft.AutoPlay
as Folder:
@.{9C60DE1E-E5FC-40f4-A487-460851A8D915}
as Command line:
EXPLORER.EXE SHELL:::{9C60DE1E-E5FC-40f4-A487-460851A8D915}
- Control Panel -> All Control Panel Items -> Printers (Classic):
as Command line:
EXPLORER.EXE shell:PrintersFolder
as Command line:
EXPLORER.EXE SHELL:::{21ec2020-3aea-1069-a2dd-08002b30309d}\::{2227a280-3aea-1069-a2de-08002b30309d}
- Control Panel -> All Control Panel Items -> Devices and Printers -> Bluetooth Devices (Windows 7/8/8.1) or Bluetooth
Settings (Windows 10/11):
as Command line: Bluetooth Settings -> tab:
Options:
CONTROL.EXE bthprops.cpl,,1
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL bthprops.cpl,,1
COM Ports:
CONTROL.EXE bthprops.cpl,,2
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL bthprops.cpl,,2
Hardware:
CONTROL.EXE bthprops.cpl,,3
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL bthprops.cpl,,3
Shared Folder:
CONTROL.EXE bthprops.cpl,,4
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL bthprops.cpl,,4
as Folder:
@.{28803F59-3A75-4058-995F-4EE5503B023C}
as Command line:
EXPLORER.EXE SHELL:::{28803F59-3A75-4058-995F-4EE5503B023C}
- Control Panel -> All Control Panel Items -> Network and Sharing Center -> Change adapter settings -> Your Connection
icon/item/link/shortcut -> drag connection name onto an empty Desktop spot or create shortcut [these examples may or may not
work on your computer(s) depending on your connection(s) type(s)/name(s)]:
as Folders:
@.{38A98528-6CBF-4CA9-8DC0-B1E1D10F7B1B}
@.{1fa9085f-25a2-489b-85d4-86326eedcd87}
@.{BA126ADB-2166-11D1-B1D0-00805FC1270E}
as Command lines:
EXPLORER.EXE SHELL:::{20D04FE0-3AEA-1069-A2D8-08002B30309D}\::{21EC2020-3AEA-1069-A2DD-08002B30309D}\::{38A98528-6CBF-4CA9-8DC0-B1E1D10F7B1B}
EXPLORER.EXE SHELL:::{38A98528-6CBF-4CA9-8DC0-B1E1D10F7B1B}
EXPLORER.EXE SHELL:::{1fa9085f-25a2-489b-85d4-86326eedcd87}
EXPLORER.EXE SHELL:::{BA126ADB-2166-11D1-B1D0-00805FC1270E}
Right-click on an empty Desktop spot -> New -> create: Shortcut [.lnk] or Folder.
- Control Panel -> All Control Panel Items -> Personalization -> Desktop Background:
as Command line:
EXPLORER.EXE SHELL:::{ED834ED6-4B5A-4bfe-8F11-A626DCB6A921} -Microsoft.Personalization\pageWallpaper
- Control Panel -> All Control Panel Items -> Programs (and Features) -> (View) Installed Updates:
as Folder:
@.{d450a8a1-9568-45c7-9c0e-b4f9fb4537bd}
as Command line:
EXPLORER.EXE SHELL:::{d450a8a1-9568-45c7-9c0e-b4f9fb4537bd}
- Task/Window Switcher [hold Alt + press Tab]:
RUNDLL32.EXE SHELL32.DLL,-10114
as Folder:
@.{3080F90E-D7AD-11D9-BD98-0000947B0257}
as Command line:
EXPLORER.EXE SHELL:::{3080F90E-D7AD-11D9-BD98-0000947B0257}
- Recycle Bin:
Control Panel -> All Control Panel Items -> Personalization -> Change Desktop Items -> check "Recycle Bin" box -> Apply/OK:
as Folder:
@.{645FF040-5081-101B-9F08-00AA002F954E}
as Command lines:
EXPLORER.EXE SHELL:::{645FF040-5081-101B-9F08-00AA002F954E}
EXPLORER.EXE shell:recyclebinfolder
- Troubleshooting (hardware + software problems):
Control Panel -> All Control Panel Items -> Troubleshooting -> Troubleshoot computer problems:
as Folder:
@.{C58C4893-3BE0-4B45-ABB5-A63E4B8C8651}
as Command lines:
EXPLORER.EXE SHELL:::{C58C4893-3BE0-4B45-ABB5-A63E4B8C8651}
EXPLORER.EXE SHELL:::{26EE0668-A00A-44D7-9371-BEB064C98683}\0\::{C58C4893-3BE0-4B45-ABB5-A63E4B8C8651}

FYI:
See Windows (File) Explorer [EXPLORER.EXE] command line options -> "EXPLORE YOUR ROOTS" in TIPS95.TXT (included):
http://www.mdgx.com/newtip22.htm#EYR

* Personalization:
——————————————————————————————————————————————————————————————————————————————
Font Size and DPI	DpiScaling.exe
Screen Resolution	CONTROL.EXE desk.cpl,Settings,@Settings
Screen Resolution	CONTROL.EXE /name Microsoft.Display /page Settings
Display			CONTROL.EXE desk.cpl,Settings,@Settings
Themes			CONTROL.EXE desk.cpl,Themes,@Themes
Screen Saver		CONTROL.EXE desk.cpl,screensaver,@screensaver
Multi Monitor		CONTROL.EXE desk.cpl,Monitor,@Monitor
Color Scheme		CONTROL.EXE /name Microsoft.Personalization /page pageColorization
Desktop Background	CONTROL.EXE /name Microsoft.Personalization /page pageWallpaper

* System Properties:
——————————————————————————————————————————————————————————————————————————————
Performance Options		SystemPropertiesPerformance.exe
Remote Access			SystemPropertiesRemote.exe
Computer Name			SystemPropertiesComputerName.exe
System Protection		SystemPropertiesProtection.exe
Advanced System Properties	SystemPropertiesAdvanced.exe
Hardware			SystemPropertiesHardware.exe
Data Execution Prevention	SystemPropertiesDataExecutionPrevention.exe

* Programs + Features:
——————————————————————————————————————————————————————————————————————————————
Add/Remove Programs	CONTROL.EXE /name Microsoft.ProgramsAndFeatures
Windows Features	OptionalFeatures.exe

* Regional + Language Options:
——————————————————————————————————————————————————————————————————————————————
Keyboard	CONTROL.EXE /name Microsoft.RegionalAndLanguageOptions /page /p:keyboard
Location	CONTROL.EXE /name Microsoft.RegionalAndLanguageOptions /page /p:location
Administrative	CONTROL.EXE /name Microsoft.RegionalAndLanguageOptions /page /p:administrative

* Folder:
——————————————————————————————————————————————————————————————————————————————
Folder searching	RUNDLL32.EXE SHELL32.DLL,Options_RunDLL 2
View			RUNDLL32.EXE SHELL32.DLL,Options_RunDLL 7
General			RUNDLL32.EXE SHELL32.DLL,Options_RunDLL 0
File associations	CONTROL.EXE /name Microsoft.DefaultPrograms /page pageFileAssoc

* Power:
——————————————————————————————————————————————————————————————————————————————
Edit current plan settings	CONTROL.EXE /name Microsoft.PowerOptions /page pagePlanSettings
System settings			CONTROL.EXE /name Microsoft.PowerOptions /page pageGlobalSettings
Create a power plan		CONTROL.EXE /name Microsoft.PowerOptions /page pageCreateNewPlan
Advanced Settings		CONTROL.EXE powercfg.cpl,,3

* Accessibility (Ease of Access):
——————————————————————————————————————————————————————————————————————————————
Ease of Access Center (EAC)	CONTROL.EXE /name Microsoft.EaseOfAccessCenter

* Control Panel (CP) canonical/module names/Globally Unique IDentifiers (GUIDs) in Windows Vista/newer:
http://learn.microsoft.com/windows/win32/shell/controlpanel-canonical-names/
——————————————————————————————————————————————————————————————————————————————
CONTROL.EXE desktop		Display Properties
CONTROL.EXE color		Display Properties Appearance tab
CONTROL.EXE date/time		Date and Time Properties
CONTROL.EXE international	Regional and Language Options
CONTROL.EXE mouse		Mouse Properties
CONTROL.EXE keyboard		Keyboard Properties
CONTROL.EXE printers		Printers and Faxes folder
CONTROL.EXE fonts		Fonts folder

* Control Panel (CP) canonical/module names/Globally Unique IDentifiers (GUIDs) in Windows 2000/newer:
——————————————————————————————————————————————————————————————————————————————
CONTROL.EXE folders		Folder (File Explorer) Options (General) View tab
CONTROL.EXE netware		Novell NetWare (if installed)
CONTROL.EXE telephony		Phone and Modem Options
CONTROL.EXE admintools		Administrative Tools folder
CONTROL.EXE schedtasks		Scheduled Tasks folder
CONTROL.EXE netconnections	Network Connections folder
CONTROL.EXE infrared		Infrared Monitor (if installed)
CONTROL.EXE userpasswords	User Accounts main menu
CONTROL.EXE userpasswords2	User Accounts accounts menu

* Control Panel tool             	Command [Control Panel applet (.cpl)]
——————————————————————————————————————————————————————————————————————————————
Accessibility Options          		CONTROL.EXE access.cpl
Add New Hardware               		CONTROL.EXE sysdm.cpl add new hardware
Add/Remove Programs            		CONTROL.EXE appwiz.cpl
Date/Time Properties           		CONTROL.EXE timedate.cpl
Display Properties             		CONTROL.EXE desk.cpl
FindFast                       		CONTROL.EXE findfast.cpl
Fonts Folder                   		CONTROL.EXE fonts
Internet Explorer Properties            CONTROL.EXE inetcpl.cpl
Joystick Properties            		CONTROL.EXE joy.cpl
Keyboard Properties            		CONTROL.EXE main.cpl keyboard
Microsoft Exchange (Windows Messaging)	CONTROL.EXE mlcfg32.cpl
Microsoft Mail Post Office     		CONTROL.EXE wgpocpl.cpl
Modem Properties               		CONTROL.EXE modem.cpl
Mouse Properties               		CONTROL.EXE main.cpl
Multimedia Properties          		CONTROL.EXE mmsys.cpl
Network Properties             		CONTROL.EXE netcpl.cpl
Password Properties            		CONTROL.EXE password.cpl
PC Card                        		CONTROL.EXE main.cpl pc card (PCMCIA)
Power Management (Windows 95)  		CONTROL.EXE main.cpl power
Power Management (Windows 98)  		CONTROL.EXE powercfg.cpl
Printers Folder                		CONTROL.EXE printers
Regional Settings              		CONTROL.EXE intl.cpl
Scanners and Cameras           		CONTROL.EXE sticpl.cpl
Sound Properties               		CONTROL.EXE mmsys.cpl sounds
System Properties              		CONTROL.EXE sysdm.cpl

* Access/execute/launch/open/run/start Control Panel (CP) items/folders/links/shortcuts + Windows APIs/core/GUI/shell/system
functions using RunDLL32 [RUNDLL32.EXE] + Shell32 [SHELL32.DLL] commands available in Windows Vista/7/newer (some are also
valid for Windows 2000/XP/2003):
http://www.windows7tips.com/rundll32-vista-windows-7.html
http://www.robvanderwoude.com/rundll.php
http://www.majorgeeks.com/content/page/the_ultimate_list_of_rundll32_commands_for_windows_1087.html
http://www.majorgeeks.com/content/page/here_are_all_the_rundll32_commands_for_windows_10.html
http://www.tenforums.com/tutorials/77458-rundll32-commands-list-windows-10-a.html
http://www.winaero.com/windows-11-control-panel-commands-to-open-applets-directly/
http://www.winaero.com/windows-10-rundll32-command-list/
http://www.thewindowsclub.com/rundll32-shortcut-commands-windows/
http://www.lifewire.com/command-line-commands-for-control-panel-applets-2626060/
http://web.archive.org/web/20150317044746/http://www.vlaurie.com/computers2/Articles/control.htm
http://web.archive.org/web/20150812103403/http://best-windows.vlaurie.com/rundll32.html
http://www.commandwindows.com/windows7-commands.htm
http://www.commandwindows.com/command3.htm
http://www.commandwindows.com/runline.htm
http://www.svolpi.ch/Windows/cmd.html
http://www.eightforums.com/threads/36567/
http://windows10dll.nirsoft.net/shell32_dll.html
Syntax:
RUNDLL32.EXE , []
All *.cpl, *.DLL, *.EXE files used here are located respectively in the %WinDir%, %WinDir%\SYSTEM32 + %WinDir%\SYSTEM32\wbem
directories/folders [%WinDir% = usually C:\WINDOWS], listed on your system PATH.
View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]:
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command
PATH
-> press Enter.
All these Control Panel (CP) commands can be used in DOS console BATch (.bat)/CoMmanD (.cmd) files, DOS console CoMmanD
prompt [CMD.EXE], directory/folder names, items, links, powershell, scripts, shortcuts, etc.
Below is a comprehensive list of RunDll32 Control Panel (CP) commands.
Some may or may not be available or work properly depending on the specific Windows NTx OS(es)
build/edition/release/update/version +/- bit strength [32-bit (x86) or 64-bit (x64)] installed on your
computer(s)/device(s):
Add/Change/Repair/Uninstall Add-ons, Drivers, Programs, Features, Tools:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL appwiz.cpl,,0
Personalization -> Display:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL desk.cpl
Personalization -> Desktop Background (Wallpaper):
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL desk.cpl,,@Desktop
Personalization -> Color and Appearance (Aero):
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL desk.cpl,Advanced,@Advanced
Personalization -> Screen Saver:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL desk.cpl,screensaver,@screensaver
Content Advisor:
RUNDLL32.EXE msrating.dll,RatingSetupUI
Control Panel:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL
Primary Graphics/Video Adapter/Controller:
RUNDLL32.EXE display.dll,ShowAdapterSettings
Secondary Graphics/Video Adapter/Controller (if any):
RUNDLL32.EXE display.dll,ShowAdapterSettings 1
Device Installation Settings:
RUNDLL32.EXE newdev.dll,DeviceInternetSettingUi
RUNDLL32.EXE newdev.dll,DeviceInternetSettingUi 2
Delete Internet Explorer (IE) temporary browsing, cache, cookies, history files + (sub)folders from the DOS console command
line using Windows system built-in command line tools:
http://www.winhelponline.com/blog/clear-ie-cache-command-line-rundll32/
http://www.superuser.com/questions/450014/
http://www.stackoverflow.com/questions/33447236/
http://social.msdn.microsoft.com/forums/ie/ce81943b-32b8-437b-b620-171c3d5893e7/
Delete Internet Explorer (IE) History:
RUNDLL32.EXE InetCpl.cpl,ClearMyTracksByProcess 1
Delete Internet Explorer (IE) Cookies:
RUNDLL32.EXE InetCpl.cpl,ClearMyTracksByProcess 2
Delete Internet Explorer (IE) Temporary Internet Files (TIF):
RUNDLL32.EXE InetCpl.cpl,ClearMyTracksByProcess 4
Delete Internet Explorer (IE) Favorites Cached Data (FCD) + History:
RUNDLL32.EXE InetCpl.cpl,ClearMyTracksByProcess 8
Delete Internet Explorer (IE) Form Data (FD):
RUNDLL32.EXE InetCpl.cpl,ClearMyTracksByProcess 16
Delete Internet Explorer (IE) Passwords:
RUNDLL32.EXE InetCpl.cpl,ClearMyTracksByProcess 32
Delete Internet Explorer (IE) Phishing Filter Data (PFD):
RUNDLL32.EXE InetCpl.cpl,ClearMyTracksByProcess 64
Delete Internet Explorer (IE) Web Page Recovery Data:
RUNDLL32.EXE InetCpl.cpl,ClearMyTracksByProcess 128
Delete All Internet Explorer (IE) browsing + Temporary Internet Files (TIF):
RUNDLL32.EXE InetCpl.cpl,ClearMyTracksByProcess 255
Delete All Internet Explorer (IE) browsing + Temporary Internet Files (TIF) without GUI:
RUNDLL32.EXE InetCpl.cpl,ClearMyTracksByProcess 256
Delete All Internet Explorer (IE) browsing + Temporary Internet Files (TIF) without using multi-threading delete (slower):
RUNDLL32.EXE InetCpl.cpl,ClearMyTracksByProcess 512
Delete Internet Explorer (IE) Private Mode Data (PMD):
RUNDLL32.EXE InetCpl.cpl,ClearMyTracksByProcess 1024
Delete Internet Explorer (IE) Tracking Data (TD):
RUNDLL32.EXE InetCpl.cpl,ClearMyTracksByProcess 2048
Delete Internet Explorer (IE) Add-ons Data (AoD):
RUNDLL32.EXE InetCpl.cpl,ClearMyTracksByProcess 4096
Delete All Internet Explorer (IE) Add-ons settings + data (AoSD):
RUNDLL32.EXE InetCpl.cpl,ClearMyTracksByProcess 4351
Delete Internet Explorer (IE) History + keep Favorites Cached Data (FCD):
RUNDLL32.EXE InetCpl.cpl,ClearMyTracksByProcess 8192
Delete Internet Explorer (IE) download History:
RUNDLL32.EXE InetCpl.cpl,ClearMyTracksByProcess 16384
Date and Time Properties:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL timedate.cpl
Ease of Access Center:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL access.cpl
Display Settings:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL access.cpl,,3
Device Manager:
RUNDLL32.EXE DEVMGR.DLL,DeviceManager_Execute
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL hdwwiz.cpl
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL hdwwiz.cpl,,0
Folder (File Explorer) Options -> (General) View tab:
RUNDLL32.EXE SHELL32.DLL,Options_RunDLL 0
OR:
CONTROL.EXE folders
Folder Options -> File Types (Windows Vista/7 only):
RUNDLL32.EXE SHELL32.DLL,Control_Options 2
Folder Options -> Search:
RUNDLL32.EXE SHELL32.DLL,Options_RunDLL 2
Folder Options -> View:
RUNDLL32.EXE SHELL32.DLL,Options_RunDLL 7
Forgotten Password Wizard:
RUNDLL32.EXE KEYMGR.DLL,PRShowSaveWizardExW
Devices and Printers -> Bluetooth Devices -> Bluetooth Settings:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL bthprops.cpl,,1
Devices and Printers -> Bluetooth Devices -> COM Ports:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL bthprops.cpl,,2
Devices and Printers -> Bluetooth Devices -> Hardware:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL bthprops.cpl,,3
Devices and Printers -> Bluetooth Devices -> Shared Folder:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL bthprops.cpl,,4
Devices and Printers -> (Set up USB) Game Controllers -> Joystick Properties:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL joy.cpl
Infrared (IR) Properties:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL irprops.cpl
Hibernate:
RUNDLL32.EXE POWRPROF.DLL,SetSuspendState
Internet Explorer (IE) Properties -> General:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL inetcpl.cpl
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL inetcpl.cpl,,0
Internet Explorer (IE) Properties -> Security:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL inetcpl.cpl,,1
Internet Explorer (IE) Properties -> Privacy:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL inetcpl.cpl,,2
Internet Explorer (IE) Properties -> Content:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL inetcpl.cpl,,3
Internet Explorer (IE) Properties -> Connections:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL inetcpl.cpl,,4
Internet Explorer (IE) Properties -> Programs:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL inetcpl.cpl,,5
Internet Explorer (IE) Properties -> Advanced:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL inetcpl.cpl,,6
Keyboard Properties:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL main.cpl @1
Lock Screen:
RUNDLL32.EXE USER32.DLL,LockWorkStation
Swap Left and Right Mouse Buttons:
RUNDLL32.EXE USER32.DLL,SwapMouseButton
Mouse Properties:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL main.cpl @0,0
Keyboard Properties:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL main.cpl keyboard
Map Network Drive Wizard:
RUNDLL32.EXE SHELL32.DLL,SHHelpShortcuts_RunDLL Connect
Network Connections:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL ncpa.cpl
Pen, Tablet and Touch:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL TabletPC.cpl
Pen, Tablet and Touch -> General:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL TabletPC.cpl @1,general
Pen, Tablet and Touch -> Buttons:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL TabletPC.cpl @1,buttons
Pen, Tablet and Touch -> Flicks:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL TabletPC.cpl @0,flicks
Pen, Tablet and Touch -> Touch:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL TabletPC.cpl @0,touch
Sync Center -> Offline Files:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL cscui.dll
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL cscui.dll,2
Organize Internet Explorer (IE) Favorites:
RUNDLL32.EXE SHDOCVW.DLL,DoOrganizeFavDlg
Open With -> replace FileName.ext with an actual file name + extension:
RUNDLL32.EXE SHELL32.DLL,OpenAs_RunDLL FileName.ext
Printer User Interface command line options, switches + parameters:
RUNDLL32.EXE PRINTUI.DLL,PrintUIEntry /?
Printer Management Folder:
RUNDLL32.EXE SHELL32.DLL,SHHelpShortcuts_RunDLL PrintersFolder
Power Options:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL powercfg.cpl
Process Idle Tasks (Windows XP/2003 only):
http://web.archive.org/web/20101218135715/http://www.microsoft.com/whdc/archive/benchmark.mspx
RUNDLL32.EXE ADVAPI32.DLL,ProcessIdleTasks
Regional and Language Options -> Formats:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL intl.cpl
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL intl.cpl,,0
Regional and Language Options -> Location:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL intl.cpl,,1
Regional and Language Options -> Administrative:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL intl.cpl,,2
Stored Usernames and Passwords:
RUNDLL32.EXE KEYMGR.DLL,KRShowKeyMgr
Safely Remove Hardware (Plug/Unplug Removable Devices/Storage Media):
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL HotPlug.dll
Sound Properties:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL mmsys.cpl,,0
System Properties -> Advanced:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL sysdm.cpl,,3
System Properties -> System Protection:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL sysdm.cpl,,4
System Properties -> Automatic Updates:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL sysdm.cpl,,5
System Properties -> Environment Variables...:
RUNDLL32.EXE sysdm.cpl,EditEnvironmentVariables
Taskbar and Start Menu/Orb Properties:
RUNDLL32.EXE SHELL32.DLL,Options_RunDLL 1
User Accounts:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL nusrmgr.cpl
Local User and Groups (Windows 7/newer only):
MMC.EXE /S lusrmgr.msc
Windows Security Center (WSC) -> Security and Maintenance:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL wscui.cpl
Windows -> About [winver.exe = Version information]:
RUNDLL32.EXE SHELL32.DLL,ShellAbout
OR:
RUNDLL32.EXE SHELL32.DLL,ShellAboutW
Windows Fonts Installation Folder:
RUNDLL32.EXE SHELL32.DLL,SHHelpShortcuts_RunDLL FontsFolder
Windows Firewall:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL firewall.cpl
Wireless Network Setup:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL NetSetup.cpl,@0,WNSW
3D Window (Task) Switcher = Flip3D (Aero) (Windows Vista/7 only):
RUNDLL32.EXE DwmApi.dll #105
Windows 16-Bit Emulation Control Panel (Windows 10 only):
http://www.fileinspect.com/fileinfo/ntvdmcpl-dll/
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL ntvdmcpl.dll
Windows To Go Startup Options (Windows 10 only):
RUNDLL32.EXE pwlauncher.dll,ShowPortableWorkspaceLauncherConfigurationUX
Syntax using Shell32 [SHELL32.DLL] functions:
RUNDLL32.EXE SHELL32.DLL,[#|-] []
DLL_Name.dll or Program_Name.exe has stopped working -> Close the program:
RUNDLL32.EXE SHELL32.DLL,#49
DLL_Name.dll or Program_Name.exe has stopped working -> Close the program:
RUNDLL32.EXE SHELL32.DLL,#50
DLL_Name.dll or Program_Name.exe has stopped working -> Close the program:
RUNDLL32.EXE SHELL32.DLL,#51
DLL_Name.dll or Program_Name.exe has stopped working -> Close the program:
RUNDLL32.EXE SHELL32.DLL,#52
Sign Out [unattended, no confirmation]:
RUNDLL32.EXE SHELL32.DLL,#54
DLL_Name.dll or Program_Name.exe has stopped working -> Close the program:
RUNDLL32.EXE SHELL32.DLL,#55
DLL_Name.dll or Program_Name.exe has stopped working -> Close the program:
RUNDLL32.EXE SHELL32.DLL,#56
DLL_Name.dll or Program_Name.exe has stopped working -> Close the program:
RUNDLL32.EXE SHELL32.DLL,#57
DLL_Name.dll or Program_Name.exe has stopped working -> Close the program:
RUNDLL32.EXE SHELL32.DLL,#58
You must restart your computer to apply these changes: Restart Now | Restart Later:
RUNDLL32.EXE SHELL32.DLL,#59
Run... [hold WinKey + press R]:
RUNDLL32.EXE SHELL32.DLL,#61
DLL_Name.dll or Program_Name.exe has stopped working -> Close the program:
RUNDLL32.EXE SHELL32.DLL,#62

* Use Microsoft Management Console (MMC) [MMC.EXE] snap-in control precompiled script files (.mmc) in Windows 2000/newer:
http://en.wikipedia.org/wiki/Microsoft_Management_Console
http://learn.microsoft.com/windows-server/administration/windows-commands/mmc/
http://msdn.microsoft.com/library/bb742441.aspx
http://msdn.microsoft.com/library/bb742442.aspx
http://www.ss64.com/nt/syntax-mmc.html
http://www.groovypost.com/tips/mmc-exe-windows-process-safe-virus/
http://www.ghacks.net/2017/06/10/windows-msc-files-overview/
http://www.mdgx.com/add.htm#MMC
Syntax:
MMC.EXE  \.
File paths, file names, file extensions + optional arguments/parameters are case insensitive.
MMC commands can be used in shortcuts, DOS console BATch (.bat)/CoMmanD (.cmd) files, scripts, powershell, etc.
MMC command line using /S (Silent) parameter (example):
MMC.EXE /S services.msc
NOTE:
Microsoft "quietly" discontinued the /S (Silent) MMC parameter from Windows 8/newer. :-(
By default *.msc files are associated with %WinDir%\SYSTEM32\MMC.EXE, therefore they can be run by themselves (example):
services.msc
unless you need to run them with specific command line arguments/parameters, in which case you need to use the MMC command
in front of the *.msc file name, and followed by respective parameter(s) (see example above).
Most *.msc files are located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually C:\WINDOWS], listed in your
system PATH.
View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]:
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command
PATH
-> press Enter.

* Administrative Tools [for .msc files + links -> see above]:
Administrative Tools = CONTROL.EXE admintools
Authorization Manager = azman.msc
Certificate Manager = certmgr.msc
Component Services = comexp.msc + dcomcnfg.exe
DirectX (DX) Diagnostic Tool = dxdiag.exe
Display Languages = lpksetup.exe
ODBC Data Source Administrator = odbcad32.exe
File Signature Verification Tool = sigverif.exe
Group Policy Editor (GPE) = gpedit.msc [Microsoft removed GPE from all Windows XP/newer Home + Starter editions! :-(]
http://www.mdgx.com/xptoy.htm#GPX
Add Hardware Wizard = hdwwiz.cpl
iSCSI Initiator = iscsicpl.exe
Iexpress (Internet Explorer Express) Wizard = iexpress.exe
Local Security Settings = secpol.msc
Microsoft Support Diagnostic Tool (MSDT) = msdt.exe
Microsoft Management Console (MMC) = mmc.exe
Print management = printmanagement.msc
Printer User Interface = printui.exe
Problems Steps Recorder (PSR) = psr.exe
People Near Me = p2phost.exe
Registry Editor (RegEdit) = regedit.exe or regedt32.exe
Resoure Monitor = resmon.exe
System Configuration Utility = msconfig.exe
Resultant Set of Policy (RSOP) = rsop.msc
SQL Server Client Configuration = cliconfg.exe
Task Manager (TM) = taskmgr.exe [also LaunchTM.exe in Windows 10/newer]
Trusted Platform Module (TPM) = tpm.msc
TPM Security Hardware = TpmInit.exe
Windows Remote Assistance (WRA) = msra.exe
Windows Share Folder Creation Wizard = shrpubw.exe
Windows Update Manager (WUM) = wusa.exe
Windows System Security Tool = syskey.exe
Windows Script Host Settings = wscript.exe
Windows Version = winver.exe
Windows (Defender) Firewall [W(D)F] with Advanced Security = wf.msc
Windows Memory Diagnostic = MdSched.exe
Windows Malicious Removal Tool (MRT) = mrt.exe

* Computer Management:
Management Saved Console (.msc) script files are associated by default with and executed by Microsoft Management Console
(MMC.EXE) snap-in control tool, and most of them are located in the %WinDir%\SYSTEM32 folder [%WinDir% = usually
C:\WINDOWS].
http://en.wikipedia.org/wiki/Microsoft_Management_Console
View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]:
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command
PATH
-> press Enter.
Command line (example):
MMC.EXE /S services.msc
Computer Management = compmgmt.msc or CompMgmtLauncher.exe
Task Scheduler = CONTROL.EXE schedtasks or taskschd.msc
Event Viewer = eventvwr.msc
Shared Folders = fsmgmt.msc
Local Users and Groups = lusrmgr.msc
Performance Monitor = perfmon.msc
Device Manager = devmgmt.msc
Disk Management = diskmgmt.msc
Windows Services = services.msc
Windows Management Infrastructure (WMI) = wmimgmt.msc

* Control Panel:
Control Panel = CONTROL.EXE
Action (Security) Center = wscui.cpl
AutoPlay = CONTROL.EXE /name Microsoft.AutoPlay
Backup and Restore = sdclt.exe
Create a System Repair disc = recdisc.exe
BDE Administrator = bdeadmin.cpl
Color Management = colorcpl.exe
Credential Manager = CONTROL.EXE /name Microsoft.CredentialManager
Credential Manager Stored User Names and Passwords = credwiz.exe
Date and Time Properties = timedate.cpl
Default Programs = CONTROL.EXE /name Microsoft.DefaultPrograms
Set Program Access and Computer Defaults = CONTROL.EXE appwiz.cpl,,3 or ComputerDefaults
Devices and Printers = CONTROL.EXE Printers
Devices and Printers Add a Device = DevicePairingWizard.exe
Display = dpiscaling.exe
Screen Resolution = desk.cpl
Display Color Calibration = dccw.exe
Cleartype Text Tuner = cttune.exe
Folders (File Explorer) Options (General) View tab = CONTROL.EXE Folders
Fonts = CONTROL.EXE Fonts
Getting Started = GettingStarted.exe
HomeGroup = CONTROL.EXE /name Microsoft.HomeGroup
Indexing Options = CONTROL.EXE /name Microsoft.IndexingOptions
Internet Explorer (IE) Properties = inetcpl.cpl
Keyboard = CONTROL.EXE keyboard
Location and Other Sensors = CONTROL.EXE /name Microsoft.LocationandOtherSensors
Location Notifications = LocationNotifications.exe
Mouse = CONTROL.EXE mouse or main.cpl or CONTROL.EXE main.cpl,,0
Network and Sharing Center = CONTROL.EXE /name Microsoft.NetworkandSharingCenter
Network Connections = CONTROL.EXE NetConnections or ncpa.cpl
Notification Area Icons = CONTROL.EXE /name Microsoft.NotificationAreaIcons
Parental Controls = CONTROL.EXE /name Microsoft.ParentalControls
Performance Information = CONTROL.EXE /name Microsoft.PerformanceInformationandTools
Personalization = CONTROL.EXE Desktop
Windows Color and Appearance (Aero) = CONTROL.EXE Color
Phone and Modem Options = telephon.cpl
Power Configuration = powercfg.cpl
Programs and Features = appwiz.cpl or CONTROL.EXE appwiz.cpl
Optional Features Manager = OptionalFeatures.exe or CONTROL.EXE appwiz.cpl,,2
Recovery = CONTROL.EXE /name Microsoft.Recovery
Regional and Language = intl.cpl
RemoteApp and Desktop Connections = CONTROL.EXE /name Microsoft.RemoteAppandDesktopConnections
Sound = mmsys.cpl
Personalization (Desktop Background, Themes, Colors, Appearance, Sounds, Screen Saver) = CONTROL.EXE desk.cpl,,2
Screen Saver (SS) = CONTROL.EXE desk.cpl,,1
Speech Properties = %WinDir%\SYSTEM32\Speech\SpeechUX\SpeechUXWiz.exe (Windows 10/11)
Speech Recognition = %WinDir%\Speech\Common\sapisvr.exe (Windosws 7/8/8.1)
Volume Mixer = sndvol.exe
System Properties = sysdm.cpl or hold WinKey + press Pause/Break
System Properties ComputerName tab = SystemPropertiesComputerName.exe
System Properties Hardware tab = SystemPropertiesHardware.exe
System Properties Advanced tab = SystemPropertiesAdvanced.exe
System Properties Performance Options = SystemPropertiesPerformance.exe
System Properties Data Execution Prevention = SystemPropertiesDataExecutionPrevention.exe
System Properties Protection tab = SystemPropertiesProtection.exe
System Properties Remote tab = SystemPropertiesRemote.exe
Windows Activation = slui.exe
Windows Activation Phone Numbers = slui.exe 4
Taskbar and Start Menu = CONTROL.EXE /name Microsoft.TaskbarandStartMenu
Program Compatibility Troubleshooter (PCT) (Diagnostics Troubleshooting Wizard) =
CONTROL.EXE /name Microsoft.Troubleshooting (MSDT.EXE -id PCWDiagnostic)
User Accounts = CONTROL.EXE /name Microsoft.UserAccounts
User Account Control (UAC) Settings = UserAccountControlSettings.exe
User Accounts / Windows domain version = netplwiz.exe or CONTROL.EXE Userpasswords2
Encryption File System = rekeywiz.exe
Windows Anytime Upgrade = WindowsAnytimeUpgradeui.exe
Windows Anytime Upgrade Results = WindowsAnytimeUpgradeResults.exe
Windows CardSpace = CONTROL.EXE /name Microsoft.cardspace
Windows (Defender) Firewall [W(D)F] = firewall.cpl or CONTROL.EXE /name Microsoft.WindowsFirewall
Windows Network Diagnostics (Diagnostics Troubleshooting Wizard) =
MSDT.EXE -id NetworkDiagnosticsWeb -ep SystemSettings_Troubleshoot_L2 -skip true -elevated yes
WindowsSideshow = CONTROL.EXE /name Microsoft.WindowsSideshow
Windows Update (WU) = CONTROL.EXE /name Microsoft.WindowsUpdate (CONTROL.EXE update) (wuapp.exe)
Windows Update (WU) -> Change Settings = CONTROL.EXE /name Microsoft.WindowsUpdate /page pageSettings

* Accessories:
Calculator = calc.exe
Command Prompt (DOS console) = cmd.exe
http://learn.microsoft.com/windows-server/administration/windows-commands/cmd/
Connect/project/switch to Network display/monitor/screen/projector = NetProj.exe
Presentation Settings = PresentationSettings.exe
Connect/project/switch to 2nd/other display/monitor/screen/projector = displayswitch.exe or hold WinKey + press P
Notepad = notepad.exe
Microsoft Paint = mspaint.exe
Remote Desktop Connection (RDC) = mstsc.exe
Run... [hold WinKey + press R] or run this command:
RUNDLL32.EXE SHELL32.DLL,#61
Snipping Tool = snippingtool.exe
Sound Recorder = soundrecorder.exe
Sticky Notes = StikyNot.exe
Sync(hronization) Center = mobsync.exe
Windows Mobility Center [laptops/notebooks/portables only] = mblctr.exe or hold WinKey + press X
Windows Explorer = explorer.exe or hold WinKey + press E
Wordpad = write.exe or wordpad.exe
Ease of Access Center (EAC) = utilman.exe or hold WinKey + press U
Magnifier = magnify.exe
Narrator = Narrator.exe
On Screen Keyboard (OSK) = osk.exe
Private Character Editor = eudcedit.exe
Character Map = charmap.exe
Digitizer Calibration Tool = tabcal.exe
Disk Cleanup Utility = cleanmgr.exe
Defragment User Interface = dfrgui.exe
Internet Explorer (IE) = iexplore.exe
Internet Explorer (IE) no add-ons = iexplore.exe -extoff
Internet Explorer (IE) no home page = iexplore.exe about:blank
Phone Dialer = dialer.exe
Printer Migration = PrintBrmUi.exe
Rating System = ticrf.exe
System Information = msinfo32.exe
System Restore = rstrui.exe
Windows Easy Transfer (Migration Wizard) = migwiz.exe
Windows Media Player (WMP) = wmplayer.exe
Windows DVD Player = dvdplay.exe [runs Windows Media Player (WMP) -> see above]
Windows Fax and Scan Cover Page Editor = fxscover.exe
Windows Fax and Scan = wfs.exe
Windows Image Acquisition (WIA, WMA) (scanners, copiers) = wiaacmgr.exe
Windows PowerShell = PowerShell.exe [C:\WINDOWS\System32\WindowsPowerShell\v1.0\PowerShell.exe = default location]
Example of "fully loaded" PowerShell command line:
PowerShell.exe -noExit -ExecutionPolicy Unrestricted -ImportSystemModules -Command Set-Location -literalPath '%V'
http://learn.microsoft.com/windows-server/administration/windows-commands/powershell/
http://learn.microsoft.com/powershell/module/microsoft.powershell.core/about/about_powershell_exe/
http://learn.microsoft.com/powershell/module/microsoft.powershell.security/set-executionpolicy/
http://www.ss64.com/ps/powershell.html
http://www.ss64.com/ps/
http://www.ss64.com/ps/syntax-elevate.html
Windows PowerShell ISE (Integrated Scripting Environment) = powershell_ise.exe
[C:\WINDOWS\System32\WindowsPowerShell\v1.0\PowerShell_ISE.exe = default location]
http://learn.microsoft.com/powershell/module/microsoft.powershell.core/about/about_powershell_ise_exe/
XPS (XML Paper Specification) Viewer = xpsrchvw.exe

* Other System (machine wide, all users) + User (only current/logged on user) Shell Folders:
Open Documents folder = Documents
Open Pictures folder = Pictures
Open Music folder = Music
Open Videos folder = Videos
Open Downloads folder = Downloads
Open Favorites folder = Favorites
Open Recent folder = Recent
Logs out of Windows = Logoff
Locks User Account = hold WinKey + press L

* List of System (machine wide, all users) + User (only current/logged on user) Shell Folders in Windows Vista/newer:
http://www.ss64.com/nt/shell.html
http://www.winhelponline.com/blog/shell-commands-to-access-the-special-folders/
http://www.winaero.com/list-of-shell-commands-in-windows-10/
http://www.tenforums.com/tutorials/3109-shell-commands-list-windows-10-a.html
http://www.techradar.com/news/computing/pc/shell-folders-the-best-kept-windows-time-saving-secret-464668/
These preset/hard linked System (machine wide, all users) + User (only current/logged on user) shell folders and their
locations are listed under these registry keys (some may not exist, depending on Windows NTx OS
build/edition/release/update/version):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders\Backup
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
See also "XP -> 7/8/8.1 Easy Transfer Files + Settings" chapter further below +
"* Link Directory IDentifier (LDID)/DIRectory IDentifier (DIRID)/Decentralized IDentifier (DID)" topic further above:
http://www.mdgx.com/7.php
http://www.mdgx.com/WINDOWS7.TXT
View their locations from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE ->
Run as Administrator -> run this command -> press Enter (example):
EXPLORER.EXE shell:AppData
To view the rest -> repeat this command by sustituting AppData with the string values listed below:
Shell Command 			Description
——————————————————————————————————————————————————————————————————————————————
shell:AccountPictures 		Account Pictures
shell:AddNewProgramsFolder 	Programs Control Panel item
shell:Administrative Tools 	Administrative Tools
shell:AppData 			C:\Users\%UserName%\Appdata\Roaming = %AppData%
shell:Application Shortcuts 	Modern Apps shortcuts
shell:AppsFolder 		Installed Modern Apps
shell:AppUpdatesFolder 		Installed Updates Control Panel item
shell:Cache 			Internet Explorer (IE) Cache [Temporary Internet Files (TIF)]
shell:CD Burning 		Temporary Burn
shell:ChangeRemoveProgramsFolder Uninstall Program Control Panel item
shell:Common Administrative Tools Administrative Tools for all users
shell:Common AppData 		C:\ProgramData = %ProgramData%
shell:Common Desktop 		Public Desktop = same for all users
shell:Common Documents 		Public Documents
shell:Common Programs 		All Users Programs = part of Start Menu + used by Start screen
shell:Common Start Menu 	All Users Start Menu
shell:Common Startup 		Startup = all users
shell:Common Templates 		Startup = new documents, templates (MS Office)
shell:CommonDownloads 		Public Downloads
shell:CommonMusic 		Public Music
shell:CommonPictures 		Public Pictures
shell:CommonRingtones 		Public Ringtones
shell:CommonVideo 		Public Videos
shell:ConflictFolder 		Control Panel\All Control Panel Items\Sync Center\Conflicts item
shell:ConnectionsFolder 	Control Panel\All Control Panel Items\Network Connections item
shell:Contacts 			Contacts = Address book
shell:ControlPanelFolder 	Control Panel
shell:Cookies			Internet Explorer (IE) Cookies
shell:CredentialManager 	C:\Users\%UserName%\AppData\Roaming\Microsoft\Credentials
shell:CryptoKeys 		C:\Users\%UserName%\AppData\Roaming\Microsoft\Crypto
shell:CSCFolder 		Offline files = Not valid in Windows 7/newer
shell:Desktop 			Desktop = different for each user
shell:Device Metadata Store 	C:\ProgramData\Microsoft\Windows\DeviceMetadataStore
shell:DocumentsLibrary 		Documents Library
shell:Downloads 		Downloads
shell:DpapiKeys 		C:\Users\%UserName%\AppData\Roaming\Microsoft\Protect
shell:Favorites 		Favorites
shell:Fonts 			C:\WINDOWS\Fonts = %WinDir%\Fonts
shell:Games 			Games Explorer item
shell:GameTasks 		C:\Users\%UserName%\AppData\Local\Microsoft\Windows\GameExplorer
shell:History 			C:\Users\%UserName%\AppData\Local\Microsoft\Windows\History = Internet Explorer (IE)
				browsing history
shell:HomeGroupCurrentUserFolder Home Group for current user
shell:HomeGroupFolder 		Home Group root
shell:ImplicitAppShortcuts 	C:\Users\%UserName%\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User
				Pinned\ImplicitAppShortcuts
shell:InternetFolder 		Internet Explorer (IE)
shell:Libraries 		Libraries
shell:Links 			Favorites = Explorer menu
shell:LocalAppData 		C:\Users\%UserName%\AppData\Local
shell:LocalAppDataLow 		C:\Users\%UserName%\AppData\LocalLow
shell:LocalizedResourcesDir 	Not valid in Windows 8/8.1/10
shell:MAPIFolder 		Microsoft Outlook
shell:MusicLibrary 		Music Library
shell:My Music			My Music (not Library)
shell:My Pictures 		My Pictures (not Library)
shell:My Video 			My Videos (not Library)
shell:MyComputerFolder 		Computer/Drives
shell:NetHood 			C:\Users\%UserName%\AppData\Roaming\Microsoft\Windows\Network Shortcuts
shell:NetworkPlacesFolder 	Network Places = Computers and Devices instaleld on respective network
shell:OEM Links 		May work only in Windows 8/8.1/10 OEM editions [?]
shell:Original Images 		Not functional in Windows 8/8.1/10
shell:Personal 			My Documents (not Library)
shell:PhotoAlbums 		Saved slideshows = Not implemented yet [?]
shell:PicturesLibrary 		Pictures Library
shell:Playlists 		Stored WMP Playlists
shell:PrintersFolder 		Classic Printers (not Devices and Printers)
shell:PrintHood 		C:\Users\%UserName%\AppData\Roaming\Microsoft\Windows\Printer Shortcuts
shell:Profile 			User profile = %UserProfile% = C:\Users\%UserName%
shell:ProgramFiles 		C:\Program Files = %ProgramFiles%
shell:ProgramFilesX86 		C:\Program Files (x86) = %ProgramFiles(x86)% = Windows 64-bit (x64) only
shell:ProgramFilesCommon 	C:\Program Files\Common Files
shell:ProgramFilesCommonX86 	C:\Program Files (x86)\Common Files = Windows 64-bit (x64) only
shell:Programs 			C:\Users\%UserName%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs = Per user Start
				Menu Programs
shell:Public 			C:\Users\Public
shell:PublicAccountPictures 	C:\Users\Public\AccountPictures
shell:PublicGameTasks 		C:\ProgramData\Microsoft\Windows\GameExplorer
shell:PublicLibraries 		C:\Users\Public\Libraries
shell:Quick Launch 		C:\Users\%UserName%\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch
shell:Recent 			Recent Items = Recent Documents
shell:RecordedTVLibrary 	Recorded TV Library
shell:RecycleBinFolder 		Recycle Bin
shell:ResourceDir 		C:\WINDOWS\Resources = %WinDir%\Resources stores visual styles
shell:Ringtones 		C:\Users\%UserName%\AppData\Local\Microsoft\Windows\Ringtones
shell:Roamed Tile Images 	Not implemented yet = reserved for future use [?]
shell:Roaming Tiles 		C:\Users\%UserName%\AppData\Local\Microsoft\Windows\RoamingTiles
shell:SavedGames 		Saved Games
shell:Screenshots 		Win+Print Screen screen shots
shell:Searches 			Saved Searches
shell:SearchHomeFolder 		Windows Search UI
shell:SendTo 			Items visible in Send to menu
shell:Start Menu 		C:\Users\%UserName%\AppData\Roaming\Microsoft\Windows\Start Menu = Logged on User Start Menu
shell:Startup 			Logged on User Startup
shell:SyncCenterFolder 		Control Panel\All Control Panel Items\Sync Center
shell:SyncResultsFolder 	Control Panel\All Control Panel Items\Sync Center\Sync Results
shell:SyncSetupFolder 		Control Panel\All Control Panel Items\Sync Center\Sync Setup
shell:System 			C:\WINDOWS\System32 = %WinDir%\System32
shell:SystemCertificates 	C:\Users\%UserName%\AppData\Roaming\Microsoft\SystemCertificates
shell:SystemX86 		C:\WINDOWS\SysWOW64 = %WinDir%\SysWOW64 = Windows 64-bit (x64) only
shell:Templates 		C:\Users\%UserName%\AppData\Roaming\Microsoft\Windows\Templates
shell:User Pinned 		C:\Users\%UserName%\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned =
				Pinned items
shell:UserProfiles 		C:\Users = Users profiles
shell:UserProgramFiles 		Not implemented yet = reserved for future use [?]
shell:UserProgramFilesCommon 	Not implemented yet = reserved for future use [?]
shell:UsersFilesFolder 		Current user profile
shell:UsersLibrariesFolder 	Libraries
shell:VideosLibrary 		Videos Library
shell:Windows			C:\WINDOWS = %WinDir%
TIP:
****
Windows NTx built-in/default/pre-installed/preset machine/system (apply to all users on the same machine) + local/user
(apply only to the current/logged on user) environment variables used for target system/user directories/folders:
http://www.ss64.com/nt/syntax-variables.html
http://pureinfotech.com/list-environment-variables-windows-10/
http://www.computerhope.com/issues/ch000549.htm
- %LocalAppData% = usually %UserProfile%\AppData\Local [same as C:\Users\%UserName%\AppData\Local] OR
%WinDir%\SYSTEM32\Config\SystemProfile\AppData\Local .
- %ProgramData% = usually C:\ProgramData .
- %ProgramFiles% = usually C:\Program Files [exists in Windows 32-bit (x86) + Windows 64-bit (x64)].
- %ProgramFiles(x86)% = usually C:\Program Files (x86) [exists only in Windows 64-bit (x64)].
- %SystemDrive% = usually C:\ root.
- %SystemRoot% = usually C:\WINDOWS [same as %WinDir%].
- %UserName% = your user name.
- %UserProfile% = usually C:\Users\%UserName% .
- %WinDir% = usually C:\WINDOWS [same as %SystemRoot%].
CAUTION:
********
Windows operating system (OS) integrity, proper functionality + correct operation *depend* on the *validity* of *all* these
variables!
INvalid/wrong parameters can render Windows INoperable or/and UNbootable, and you may have to reinstall from scratch or
repair your operating system (OS), eventually using the original storage media containing Windows Setup files!
Some of these variables can be added/customized/deleted/modified by using a Control Panel (CP)/Windows Settings (WS) tool:
Run... [hold WinKey + press R] -> type this command
SystemPropertiesAdvanced.exe
-> press Enter -> Advanced tab -> Environment Variables... button -> edit variables -> highlight respective line -> Edit
button -> change parameters -> OK -> OK.
View the list of all your Windows operating system (OS) environment variables from a DOS console command prompt
[%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command
SET
-> press Enter.
OR
Save it to a plain text/ASCII (.txt) file: from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD
shortcut/CMD.EXE -> Run as Administrator -> type same command above followed by the name of the file (in this example it
will be saved in C:\ root)
SET>C:\Windows_Environment_Variables.txt
-> press Enter -> use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to view saved text file contents.
Example of Windows Vista/newer list of relevant environment variables [replace all User_Name instances with your actual user
name]:
----------snippity-snip----------
ALLUSERSPROFILE=C:\ProgramData
APPDATA=C:\Users\PC\AppData\Roaming [OR: APPDATA=C:\Windows\system32\config\systemprofile\AppData\Roaming]
CommonProgramFiles=C:\Program Files\Common Files
CommonProgramFiles(x86)=C:\Program Files (x86)\Common Files [exists only in Windows 64-bit (x64)]
CommonProgramW6432=C:\Program Files\Common Files
ComSpec=C:\Windows\system32\cmd.exe
DriverData=C:\Windows\System32\Drivers\DriverData
HOMEDRIVE=C:
HOMEPATH=\WINDOWS\SYSTEM32 [OR: HOMEPATH=\Users\User_Name]
LOCALAPPDATA=C:\Users\PC\AppData\Local [OR: LOCALAPPDATA=C:\Windows\system32\config\systemprofile\AppData\Local]
OS=Windows_NT
ProgramData=C:\ProgramData
ProgramFiles=C:\Program Files
ProgramFiles(x86)=C:\Program Files (x86) [exists only in Windows 64-bit (x64)]
ProgramW6432=C:\Program Files
PSModulePath=%ProgramFiles%\WindowsPowerShell\Modules;C:\Windows\system32\WindowsPowerShell\v1.0\Modules
PUBLIC=C:\Users\Public
SystemDrive=C:
SystemRoot=C:\Windows
TEMP=C:\Users\PC\AppData\Local\Temp [OR: TEMP=C:\Windows\TEMP]
TMP=C:\Users\PC\AppData\Local\Temp [OR: TMP=C:\Windows\TEMP]
USERNAME=User_Name
USERPROFILE=C:\Users\User_Name [OR: USERPROFILE=C:\Windows\system32\config\systemprofile]
windir=C:\Windows
----------snippity-snip----------
______________________________________________________________________________



Public Root DNS Servers [*]
http://www.mdgx.com/7.php#:~:text=Public%20Root%20DNS%20Servers%20%5B%2A%5D



* Secure encrypted public Root DNS (Domain Name System) Servers = DNS over HTTPS (HyperText Transfer Protocol Secure) (DoH)
+ DNS over TLS (Transport Layer Security) (DoT) guidelines, listings, reviews, tips, providers, servers [free]:
http://www.privacyguides.org/advanced/dns-overview/
http://www.privacyguides.org/dns/#recommended-providers
http://dnscrypt.info/public-servers/
http://www.lifewire.com/free-and-public-dns-servers-2626062/
http://github.com/curl/curl/wiki/DNS-over-HTTPS/
http://www.privacytools.io/encrypted-dns/
http://twitgoo.com/best-free-dns-servers/
http://public-dns.info/
http://public-dns.info/nameserver/us.html
http://servers.opennicproject.org/
http://www.publicdns.xyz/
http://wiki.ipfire.org/dns/public-servers
http://www.tech-faq.com/public-dns-servers.html
http://adguard-dns.io/kb/general/dns-providers/
http://fmhy.pages.dev/storage/#dns-filters
http://fmhy.pages.dev/storage/#free-dns-servers
http://www.tweaks.com/windows/40339/
http://www.zdnet.com/blog/networking/fixing-dns-woes-for-comcast-users-and-everyone-else/

* Turn ON "Secure DNS" [DNS over HTTPS (DoH)] in your web browser:
- See "@ Chromium/Chrome web browsers + alternatives/derivatives/forks/variants" topic under "Digital + Internet/Online
Privacy, Safety + Security = Your Top Priority" chapter
http://www.mdgx.com/7.php#:~:text=Digital%20%2B%20Internet%2FOnline%20Privacy%2C%20Safety%20%2B%20Security%20%3D%20Your%20Top%20Priority
further below in WINDOWS7.TXT (this file):
http://www.mdgx.com/7.php
http://www.mdgx.com/WINDOWS7.TXT
- Turn ON Chromium/Chrome "Use Secure DNS" [DNS over HTTPS (DoH)] encrypted IP lookup feature:
http://support.google.com/chrome/answer/10468685/
- Configure DNS over HTTPS (DoH) "Enable Secure DNS" protection levels in Firefox:
http://support.mozilla.org/kb/dns-over-https/
- MDGx "Anonymous + Faster Surfing" solutions:
http://www.mdgx.com/links.htm#ANO

* DNS servers IP (Internet Protocol) addresses + URLs detection + leak tests:
http://www.mdgx.com/nettoys.htm#PSSGS
- Gibson Research Corporation (GRC): DNS Nameserver Spoofability Test -> Test Your IP(s) in Your Web Browser(s):
http://www.grc.com/dns/dns.htm
- Cloudflare Browsing Experience Security Check: Secure DNS, DNSSEC, TLS + Secure SNI (Server Name Indication) [Encrypted
Client Hello (ECH)] -> Test Your Web Browser(s):
http://www.cloudflare.com/ssl/encrypted-sni/
- IPLeak: IP/DNS Detect -> Test Your Web Browser(s):
http://ipleak.net/
- WebRTC IP leaks -> Test Your Web Browser(s):
http://diafygi.github.io/webrtc-ips/
- BrowserLeaks: DNS (Domain Name System) Leak Test -> Test Your Web Browser(s):
http://browserleaks.com/dns/
- Whoer: My IP, DNS Leak, Evercookie (Supercookie) + Port Scanner Tests:
http://whoer.net/
- Whoer: DNS Leak Test:
http://whoer.net/dns-leak-test/
- Cloudflare: Connection Information + Connectivity to Resolver IP Addresses:
http://1.1.1.1/help/

* Reference:
- Wikipedia: Root name server:
http://en.wikipedia.org/wiki/Root_name_server
- Wikipedia: Domain Name System (DNS):
http://en.wikipedia.org/wiki/Domain_Name_System
- Wikipedia: Secure Sockets Layer (SSL):
http://en.wikipedia.org/wiki/Transport_Layer_Security#SSL_1.0,_2.0,_and_3.0
- Wikipedia: Transport Layer Security (TLS):
http://en.wikipedia.org/wiki/Transport_Layer_Security
- Wikipedia: DNS over TLS (DoT):
http://en.wikipedia.org/wiki/DNS_over_TLS
- Wikipedia: DNS over HTTPS (DoH):
http://en.wikipedia.org/wiki/DNS_over_HTTPS
- Wikipedia: Hypertext Transfer Protocol Secure (HTTPS):
http://en.wikipedia.org/wiki/HTTPS
- Wikipedia: Domain Name System Security Extensions (DNSSEC):
http://en.wikipedia.org/wiki/Domain_Name_System_Security_Extensions
- Wikipedia: DNSCrypt:
http://en.wikipedia.org/wiki/DNSCrypt

* Cloudflare WARP Desktop client 64-bit for Windows 8.1/newer 64-bit (x64) [free Virtual Private Network (VPN) using public
root Domain Name System (DNS) servers]:
http://1.1.1.1/
Cloudflare WARP for Windows:
http://developers.cloudflare.com/warp-client/get-started/windows/
Cloudflare WARP for Linux:
http://developers.cloudflare.com/warp-client/get-started/linux/
Cloudflare WARP for macOS:
http://developers.cloudflare.com/warp-client/get-started/macos/
Cloudflare WARP for Android:
http://developers.cloudflare.com/warp-client/get-started/android/
Cloudflare WARP for iOS:
http://developers.cloudflare.com/warp-client/get-started/ios/
Use Cloudflare WARP VPN in combination with WireGuard:
http://www.andryou.com/2020/03/28/guide-using-cloudflares-warp-vpn-on-a-computer-mac-pc-linux/
WireGuard VPN (free, open source):
http://www.wireguard.com/
BrowserLeaks: DNS (Domain Name System) Leak Test:
http://browserleaks.com/dns/
Wikipedia: Virtual Private Network (VPN):
http://en.wikipedia.org/wiki/Virtual_private_network
Wikipedia: Domain Name System (DNS):
http://en.wikipedia.org/wiki/Domain_Name_System
See MDGx "* Web Browsers, Platforms, Computers + Devices Online Protection Guides + Tools for Privacy, Safety + Security:"
section further below under "Digital + Internet/Online Privacy, Safety + Security" chapter
http://www.mdgx.com/7.php#:~:text=Digital%20%2B%20Internet%2FOnline%20Privacy%2C%20Safety%20%2B%20Security%20%3D%20Your%20Top%20Priority
in WINDOWS7.TXT (this file):
http://www.mdgx.com/7.php
http://www.mdgx.com/WINDOWS7.TXT

* OpenVPN Cloud, Access Server + Connect client Virtual Private Network (VPN) system provides secure point-to-point or
site-to-site concurrent connections using OpenSSL (Secure Sockets Layer) encryption + Transport Layer Security (TLS)
protocol, highly customizable:
http://openvpn.net/
Free subscriptions for personal use = limited to:
- OpenVPN Cloud = maximum 3 concurrent connections.
- Access Server = maximum 2 concurrent connections.
Repository:
http://github.com/OpenVPN/openvpn/
OpenVPN Connect client 32-bit + 64-bit for Windows 7/newer 32-bit (x86) + 64-bit (x64) [MSI Installer]:
http://openvpn.net/client-connect-vpn-for-windows/
OpenVPN FAQs:
http://openvpn.net/vpn-server-resources/#faqs
OpenVPN Online Documentation:
http://openvpn.net/vpn-server-resources/
Wikipedia: Virtual Private Network (VPN):
http://en.wikipedia.org/wiki/Virtual_private_network
Wikipedia: OpenSSL:
http://en.wikipedia.org/wiki/OpenSSL
Wikipedia: Secure Sockets Layer (SSL):
http://en.wikipedia.org/wiki/Transport_Layer_Security#SSL_1.0,_2.0,_and_3.0
Wikipedia: Transport Layer Security (TLS):
http://en.wikipedia.org/wiki/Transport_Layer_Security

* Portmaster Free 64-bit for Windows 7/newer 64-bit (x64) port manager, firewall, filter, secure DNS, blocker, network
monitor, highly customizable:
http://safing.io/
File [Setup only!]:
http://updates.safing.io/latest/windows_amd64/packages/portmaster-installer.exe
Windows 7 64-bit (x64) requires Microsoft Security Monthly Quality Rollup (SMQR) KB4503292:
http://catalog.s.download.windowsupdate.com/d/msdownload/update/software/secu/2019/06/windows6.1-kb4503292-x64_a35bb4ea16d1d529fde9abfe8a0c16e9061f74cd.msu
More info @ MSKB:
http://support.microsoft.com/help/4503292/
Portmaster Documentation:
http://docs.safing.io/
Community Wiki:
http://wiki.safing.io/

* Pi-hole DOS console command line installer [PH4WSL1.cmd] for Windows 10/newer installs Linux Pi-hole DNS sinkhole on
Windows computers, highly customizable:
http://github.com/DesktopECHO/Pi-Hole-for-WSL1/
Download:
http://github.com/DesktopECHO/Pi-Hole-for-WSL1/raw/master/PH4WSL1.cmd
PH4WSL1.cmd install guide step-by-step:
http://www.reddit.com/r/pihole/comments/j39drp/
PH4WSL1.cmd ReadMe guide:
http://github.com/DesktopECHO/Pi-Hole-for-WSL1/#readme
Pi-hole DNS sinkhole for Linux:
http://github.com/pi-hole/pi-hole/
Pi-hole Blocklists:
http://firebog.net/
http://arstech.net/pi-hole-blocking-lists-2023/
http://github.com/topics/pihole-blocklists/
http://github.com/hagezi/dns-blocklists/
http://github.com/jacklul/pihole-updatelists/
DNS sinkhole:
http://en.wikipedia.org/wiki/DNS_sinkhole

* DNSCrypt Proxy clients for Windows NTx 32-bit + 64-bit use encrypted DNS protocol to authenticate + anonymize two way
traffic between DNS client and DNSCrypt enabled DNS resolver, prevents DNS spoofing, DDoS attacks:
http://dnscrypt.info/
More Info:
http://www.dnscrypt.org/
DNSCrypt Proxy:
http://github.com/DNSCrypt/dnscrypt-proxy/
Download [ZIP -> Installer EXE]:
http://github.com/dnscrypt/dnscrypt-proxy/releases/latest/
DNSCrypt Documentation:
http://github.com/DNSCrypt/dnscrypt-proxy/wiki/
DNSCrypt Clients + DNSCrypt Servers:
http://dnscrypt.info/implementations/
DNSCrypt Clients:
http://www.dnscrypt.org/#dnscrypt-windows
DNSCrypt Public Root DNS Servers:
http://dnscrypt.info/public-servers/
DNSCrypt:
http://en.wikipedia.org/wiki/DNSCrypt

* Unbound 32-bit + 64-bit for Windows 7/newer 32-bit (x86) + 64-bit (x64) validating, recursive + caching DNS resolver,
supports IPv6 (Internet Protocol version 6), DNSSEC (Domain Name System Security Extensions), NSEC (Next Secure Record), DNS
over TLS (DoT) + DNS over HTTPS (DoH) encryption + protocols:
http://nlnetlabs.nl/projects/unbound/
Download [Portable ZIP]:
http://nlnetlabs.nl/projects/unbound/download/
Unbound Repository:
http://github.com/NLnetLabs/unbound/
Unbound Documentation:
http://unbound.docs.nlnetlabs.nl/

* Privoxy GUI interface + DOS console command line non-caching HTTP/web proxy with advanced filtering for enhanced privacy +
safety, highly customizable:
http://www.privoxy.org/
Repository:
http://sourceforge.net/projects/ijbswa/
Download:
http://www.privoxy.org/sf-download-mirror/Win32/
http://sourceforge.net/projects/ijbswa/files/Win32/
Privoxy FAQ:
http://www.privoxy.org/faq/
Privoxy Online Manual:
http://www.privoxy.org/user-manual/
Proxy server:
http://en.wikipedia.org/wiki/Proxy_server

* Privaxy 32-bit + 64-bit DOS console command line MITM (Man In The Middle) HTTP(S) low level incoming + outgoing tunnel
proxy ad(ware)/malware/spying/surveillance/tracking blocker/filter:
http://github.com/Barre/privaxy/
Download:
http://github.com/Barre/privaxy/releases/latest/
Proxy server:
http://en.wikipedia.org/wiki/Proxy_server

* PeerBlock [ UNMAINTAINED ! ] Portable 32-bit + 64-bit for Windows XP/newer personal firewall blocks/filters incoming +
outgoing dangerous/deceptive/insecure/invasive/intrusive/subversive/unsafe IPs + ports [IPv4 only] from frequently updated +
user customized lists of blacklisted ad(ware)/malware/spying/surveillance/tracking hosts/IPs:
http://www.peerblock.com/
Download [Portable ZIP]:
http://code.google.com/archive/p/peerblock/downloads/
PeerBlock 64-bit for Windows Vista/newer 64-bit (x64):
http://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/peerblock/PeerBlock_r693__x64_Release_(Vista).zip
PeerBlock 32-bit for Windows Vista/newer 32-bit (x86):
http://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/peerblock/PeerBlock_r693__Win32_Release_(Vista).zip
PeerBlock Repository:
http://code.google.com/archive/p/peerblock/
http://sourceforge.net/projects/peerblock/
http://github.com/PeerBlock/peerblock/
I-Blocklist lists of blacklisted IPs [frequently updated]:
http://www.iblocklist.com/lists
Blocklists + Filterlists:
http://github.com/badmojr/1Hosts/
http://filterlists.com/
http://github.com/yokoffing/filterlists/
PeerBlock @ Wikipedia:
http://en.wikipedia.org/wiki/PeerBlock

* DNS Jumper (DNSJumper) tests + changes to fastest + closest public root DNS servers -> right-click DNSJumper.exe ->
Run as as Administrator -> click Benchmark button:
http://www.sordum.org/7952/dns-jumper-v2-2/
File:
http://www.sordum.org/files/downloads.php?dns-jumper

* Domain Name Speed (DNS) Benchmark (DNSBench) tests fastest + closest public root DNS servers -> right-click DNSBench.exe
-> Run as Administrator -> click Fastest DNS button -> click Start DNS test button:
http://www.grc.com/dns/benchmark.htm
File:
http://www.grc.com/files/DNSBench.exe

* Automate Windows XP/newer customization of NameServer registry String [REG_SZ] values to turn ON/enable/customize DoH (DNS
over HTTPS) using public root DNS servers from reliable/trusted entities (see links to servers further above, and providers
further below) in order to prevent privacy, safety + security breaches, dissemination, exposure, hacking, intrusions,
invasion, leaks, auditing, fingerprinting, phishing, malware, spyware, surveillance, tracking:
http://serverfault.com/questions/208490/
http://technet.microsoft.com/library/cc978468.aspx
http://learn.microsoft.com/troubleshoot/windows-client/networking/tcpip-and-nbt-configuration-parameters/
http://portforward.com/networking/static-win7.htm
http://www.windowscentral.com/how-change-your-pcs-dns-settings-windows-10/
http://www.howto-connect.com/change-dns-server-address-windows-11-4-methods/
Setup/change IPv4 (and IPv6 if applicable) public root DNS servers Registry entries (example using default home computer
internet connection name: "Local Area Network" (LAN) connection = modify to match your connection name if different, and to
use Cloudflare public root DNS servers): Open Notepad or your favorite similar/better free(ware) plain text/ASCII
editor/viewer
http://www.mdgx.com/toy.htm#TXT
-> copy & paste text strings between Cut & Paste lines below -> save BATch file as Root_DNS_Servers.bat (example):
- Windows 8, 8.1, 2012, 10, 2016, 2019, 11, 2022 + newer users: right-click on Root_DNS_Servers.bat -> select Open with ->
select Notepad or your favorite similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
(browse to executable if needed) -> remark (comment) all Windows XP... and Windows 7... NETSH.EXE lines by adding ":: "
(double colon + space) in front of them -> enable the 2 remarked (commented) Windows 8/newer NETSH.EXE lines by
deleting/removing the ":: " (double colon + space) in front of them -> save your file -> right-click on it -> Run as
Administrator -> restart/reboot.
- Windows 7 and 7 SP1 users: right-click on Root_DNS_Servers.bat -> Run as Administrator -> restart/reboot.
- Windows XP and 2003 users: right-click on Root_DNS_Servers.bat -> select Open with -> select Notepad or your favorite
similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
-> remark (comment) all Windows 7... and Windows 8... NETSH.EXE lines by adding ":: " (double colon + space) in front of
them -> enable the 2 remarked (commented) Windows XP/2003 NETSH.EXE lines by deleting/removing the ":: " (double colon +
space) in front of them -> save your file -> right-click on it -> Run... [hold WinKey + press R] -> run batch file below
[customize it first: change IP addresses below to your preferred public root DNS servers] -> restart/reboot.
-----Begin cut & paste here-----
@ECHO OFF
IF NOT "%OS%"=="Windows_NT" GOTO END
:: Cloudflare public root DNS servers (example):
:: * Windows 7/7 SP1 only:
NETSH.EXE interface ip set dns "Local Area Connection" static 1.1.1.1
NETSH.EXE interface ip add dns "Local Area Connection" 1.0.0.1 index=2
:: * Windows 8/newer only:
:: NETSH.EXE interface ipv4 set dns "Local Area Connection" static 1.1.1.1
:: NETSH.EXE interface ipv4 add dns "Local Area Connection" 1.0.0.1 index=2
:: * Windows XP/2003 only:
:: NETSH.EXE interface ip set address dns name="Local Area Connection" static 1.1.1.1
:: NETSH.EXE interface ip add address dns name="Local Area Connection" 1.0.0.1 index=2
:END
EXIT
------End cut & paste here------
BATch (.bat)/CoMmanD (.cmd) script files below (name it and save it as whatever you wish, just make sure it has the .bat or
.cmd extension) search the Registry database for the current/active internet/network connection, and adds/changes the public
root DNS servers (example using Cloudflare servers) to the matching NameServer registry value(s):
- Windows 7/7 SP1 users, including Windows Vista users:
-----Begin cut & paste here-----
@ECHO OFF
IF NOT "%OS%"=="Windows_NT" GOTO END
:: Windows 8/newer only:
FOR /F "skip=2 tokens=4*" %%a IN ('NetSh Interface IP Show Interfaces') DO (
CALL :Network_Adapter %%a "%%b"
)
:: PAUSE
EXIT /B
:Network_Adapter
:: %1=State
:: %2=Name (quoted); %~2=Name (unquoted)
IF %1==connected (
:: Run your commands here (example):
ECHO %2
:: Primary (1st, Preferred) public root DNS server (DNS1) [Cloudflare]:
NETSH.EXE interface ip set dnsservers %2 static 1.1.1.1
:: Secondary (2nd, Alternate) public root DNS server (DNS2) [Cloudflare]:
NETSH.EXE interface ip add dnsservers %2 1.0.0.1 index=2
:: In case you wish to reset to Windows original public root DNS servers -> delete double
:: colons + space [:: ] in front of NetSh command below -> run this batch file again:
:: NETSH.EXE int ip reset %2
)
:: PAUSE
EXIT /B
:END
EXIT
------End cut & paste here------
- Windows 8/newer users, including Windows 10 + 11 users:
-----Begin cut & paste here-----
@ECHO OFF
IF NOT "%OS%"=="Windows_NT" GOTO END
:: Windows 8/newer only:
FOR /F "skip=2 tokens=4*" %%a IN ('NetSh Interface IPv4 Show Interfaces') DO (
CALL :Network_Adapter %%a "%%b"
)
:: PAUSE
EXIT /B
:Network_Adapter
:: %1=State
:: %2=Name (quoted); %~2=Name (unquoted)
IF %1==connected (
:: Run your commands here (example):
ECHO %2
:: Primary (1st, Preferred) public root DNS server (DNS1) [Cloudflare]:
NETSH.EXE interface ipv4 set dnsservers %2 static 1.1.1.1
:: Secondary (2nd, Alternate) public root DNS server (DNS2) [Cloudflare]:
NETSH.EXE interface ipv4 add dnsservers %2 1.0.0.1 index=2
:: In case you wish to reset to Windows original public root DNS servers -> delete double
:: colons + space [:: ] in front of NetSh command below -> run this batch file again:
:: NETSH.EXE int ip reset %2
)
:: PAUSE
EXIT /B
:END
EXIT
------End cut & paste here------
To determine your active network interface ID
http://social.technet.microsoft.com/forums/bacc4f3d-54c2-4e99-931c-42a3cea2e67c/
from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator ->
run this command -> press Enter:
WMIC.EXE nicconfig get description,settingid
WMIC.EXE (Windows Management Instrumentation Command) executable is located in the %WinDir%\SYSTEM32\wbem directory/folder
[%WinDir% = usually C:\WINDOWS], listed on your system PATH.
View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]:
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command
PATH
-> press Enter.
WMIC (Windows Management Instrumentation Command):
http://learn.microsoft.com/windows/win32/wmisdk/wmic/
MS DOCs: WMIC:
http://technet.microsoft.com/library/bb742610.aspx
Dedoimedo: WMIC - The Windows secret weapon:
http://www.dedoimedo.com/computers/windows-wmic.html
ComputerHope: WMIC:
http://www.computerhope.com/wmic.htm
Rob van der Woude: WMIC:
http://www.robvanderwoude.com/wmic.php
quux: WMIC Snippets:
http://quux.wiki.zoho.com/WMIC-Snippets.html
SS64: WMIC.EXE:
http://www.ss64.com/nt/wmic.html
Wikipedia: Windows Management Instrumentation (WMI):
http://en.wikipedia.org/wiki/Windows_Management_Instrumentation
Example of output returned by running WMIC.EXE command above (each network adapter has a unique hardware ID, this is a
generic example):
Description				SettingID
Intel Ethernet Network Adapter I???-T?	{00000000-AAAA-1111-BBBB-222222222222}
Look at the NIC (Network Interface Controller) adapter name [under Description] you are using to connect to your internet
provider -> it is followed [under SettingID] by a Link Directory IDentifier (LDID) corresponding to the LDID from the
registry key below.
Your LDID number is different depending on your network adapter name/model/manufacturer and type of connection.
Generic example of NameServer registry String [REG_SZ] value for Ethernet network connection interface (each network adapter
has a unique hardware ID) using Cloudflare public root DNS servers:
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
; Cloudflare public root DNS servers (example):
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\Tcpip\Parameters\Interfaces\{00000000-AAAA-1111-BBBB-222222222222}]
"NameServer"="1.1.1.1,1.0.0.1"
------End cut & paste here------
You need to substitute generic ID above ["00000000-AAAA-1111-BBBB-222222222222"] with your actual Decentralized IDentifier
(DID) (hard link) string which corresponds to your active internet/network connection/interface present in your registry
under the "CurrentControlSet" Hive Key Local Machine (HKLM) subkey above.

* Turn ON/enable/customize DoH (DNS over HTTPS) using public root DNS servers from reliable/trusted entities (see links to
servers further above and providers further below) in order to prevent privacy, safety + security breaches, dissemination,
hacking, intrusions, invasion, leaks, fingerprinting, phishing, malware, spyware, tracking, auditing:
http://adguard-dns.io/en/public-dns.html
http://developers.cloudflare.com/1.1.1.1/setup/windows/
http://www.windowscentral.com/how-change-your-pcs-dns-settings-windows-10/
http://developers.google.com/speed/public-dns/docs/using/
- Windows 8/newer users, including Windows 10 + 11 users:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
http://support.opendns.com/hc/articles/228006907/
Start menu -> Control Panel -> Network and Sharing Center -> Active Networks -> click item right side of Connections: ->
"your Network Connection name" (typical examples): "Ethernet" (direct broadband modem connection), "Local Area Network" (LAN
= direct router connection) or "Wi-Fi" (high speed wireless connection) -> connection Status -> General tab -> Properties ->
scroll down -> select Internet Protocol Version 4 (TCP/IPv4) -> Properties -> General tab -> Use the following DNS server
addresses: -> type desired IP addresses (example using Cloudflare public root DNS servers),
http://www.mdgx.com/IPv4_Cloudflare_public_root_DNS_servers.jpg
Cloudflare Preferred (Primary, 1st) DNS Server (DNS1): 1.1.1.1
Cloudflare Alternate (Secondary, 2nd) DNS Server (DNS2): 1.0.0.1
and another example using AdGuard public root DNS servers
http://www.mdgx.com/IPv4_AdGuard_public_root_DNS_servers.jpg
AdGuard Preferred (Primary, 1st) DNS Server (DNS1): 94.140.14.14
AdGuard Alternate (Secondary, 2nd) DNS Server (DNS2): 94.140.15.15
-> select Internet Protocol Version 6 (TCP/IPv6) -> Properties -> General tab -> Use the following DNS server addresses: ->
type desired IP addresses (example using Cloudflare public root DNS servers),
http://www.mdgx.com/IPv6_Cloudflare_public_root_DNS_servers.jpg
Cloudflare Preferred (Primary, 1st) DNS Server (DNS1): 2606:4700:4700::1111
Cloudflare Alternate (Secondary, 2nd) DNS Server (DNS2): 2606:4700:4700::1001
and another example using AdGuard public root DNS servers.
http://www.mdgx.com/IPv6_AdGuard_public_root_DNS_servers.jpg
AdGuard Preferred (Primary, 1st) DNS Server (DNS1): 2a10:50c0::ad1:ff
AdGuard Alternate (Secondary, 2nd) DNS Server (DNS2): 2a10:50c0::ad2:ff
Click OK -> click OK -> exit all dialogs/prompts/windows -> restart/reboot.
- Windows 7/7 SP1 users, including Windows Vista users:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
http://www.sevenforums.com/tutorials/12421-local-area-connection-status-create-shortcut.html
Start menu -> Control Panel -> Network and Sharing Center -> View network status and tasks -> View Active networks -> click
item right side of Connections: -> "your Network Connection name" (typical examples): "Ethernet" (direct broadband modem
connection), "Local Area Network" (LAN = direct router connection) or "Wi-Fi" (Wi-Fi connection) -> connection Status ->
General tab -> Properties -> Connection Properties General tab -> scroll down -> select Internet Protocol Version 4
(TCP/IPv4) -> Properties -> Internet Protocol Version 4 (TCP/IPv4) Properties -> General tab -> scroll down -> select (x) ->
Use the following DNS server IP addresses: -> type desired IP addresses (example using Cloudflare public root DNS servers),
http://www.mdgx.com/IPv4_Cloudflare_public_root_DNS_servers.jpg
Cloudflare Preferred (Primary, 1st) DNS Server (DNS1): 1.1.1.1
Cloudflare Alternate (Secondary, 2nd) DNS Server (DNS2): 1.0.0.1
and another example using AdGuard public root DNS servers.
http://www.mdgx.com/IPv4_AdGuard_public_root_DNS_servers.jpg
AdGuard Preferred (Primary, 1st) DNS Server (DNS1): 94.140.14.14
AdGuard Alternate (Secondary, 2nd) DNS Server (DNS2): 94.140.15.15
Click OK -> click OK -> exit all dialogs/prompts/windows -> restart/reboot.
- Windows XP/2003 users:
~~~~~~~~~~~~~~~~~~~~~~~~
http://www.webnots.com/how-to-change-dns-server-ips-in-windows-xp/
Start menu -> Control Panel -> Network Connections -> select current connection -> "your Network Connection name" (typical
examples): "Local Area Network" (LAN = direct router connection) or "Wireless" (Wi-Fi connection) -> connection Status ->
General tab -> Properties -> Connection Properties General tab -> scroll down -> select Internet Protocol (TCP/IP) ->
Properties -> Internet Protocol Version (TCP/IP) Properties General tab -> scroll down -> select (x) -> Use the following
DNS server IP addresses: -> type desired IP addresses (example using Cloudflare public root DNS servers),
http://www.mdgx.com/IPv4_Cloudflare_public_root_DNS_servers.jpg
Cloudflare Preferred (Primary, 1st) DNS Server (DNS1): 1.1.1.1
Cloudflare Alternate (Secondary, 2nd) DNS Server (DNS2): 1.0.0.1
and another example using AdGuard public root DNS servers.
http://www.mdgx.com/IPv4_AdGuard_public_root_DNS_servers.jpg
AdGuard Preferred (Primary, 1st) DNS Server (DNS1): 94.140.14.14
AdGuard Alternate (Secondary, 2nd) DNS Server (DNS2): 94.140.15.15
Click OK -> click OK -> exit all dialogs/prompts/windows -> restart/reboot.
- Optional:
~~~~~~~~~~~
Recommended for all Windows XP/newer users:
A. Start menu -> Control Panel -> Network and Sharing Center -> Active Networks -> click item right side of Connections: ->
"your Network Connection name" icon/item -> Properties button -> Networking tab -> This connection is using the following
items: -> Internet Protocol Version 4 (TCP/IPv4) -> General tab -> Advanced... button -> DNS tab -> DNS server addresses, in
order of use: -> Add... x 2 -> Add button x 2 -> type x 2 IP addresses below (example using Cloudflare public root DNS
servers):
http://www.mdgx.com/IPv4_Cloudflare_public_root_DNS_servers.jpg
Cloudflare Preferred (Primary, 1st) DNS Server (DNS1): 1.1.1.1
Cloudflare Alternate (Secondary, 2nd) DNS Server (DNS2): 1.0.0.1
-> Apply/OK -> OK.
Another example using AdGuard public root DNS servers:
http://www.mdgx.com/IPv4_AdGuard_public_root_DNS_servers.jpg
AdGuard Preferred (Primary, 1st) DNS Server (DNS1): 94.140.14.14
AdGuard Alternate (Secondary, 2nd) DNS Server (DNS2): 94.140.15.15
B. Start menu -> Control Panel -> Network and Sharing Center -> Active Networks -> click item right side of Connections: ->
"your Network Connection name" icon/item -> Properties button -> Networking tab -> This connection is using the following
items: -> Internet Protocol Version 4 (TCP/IPv4) -> General tab -> Advanced... button -> WINS (Windows Internet Name
Service) tab -> check Enable LMHOSTS lookup box -> NetBIOS setting -> check Disable NetBIOS over TCP/IP box -> Apply/OK.
http://www.thewindowsclub.com/wp-content/uploads/2020/11/Disable-NetBIOS-over-TCP-IP.png
See also "Tweaks, Hacks + Fixes... UNconventional, UNdocumented, UNcensored ;-/" chapter -> "* Turn OFF unnecessary,
obsolete + unsafe TCP/IP NetBIOS (Network Basic Input/Output System) Helper service [lmhosts]" section in WIN10.TXT
(included):
http://www.mdgx.com/10.php
http://www.mdgx.com/WIN10.TXT
- Web Browsers:
~~~~~~~~~~~~~~~
Turn ON DoH (DNS over HTTPS) in your web browser using public root DNS servers:
http://developers.cloudflare.com/1.1.1.1/encryption/dns-over-https/encrypted-dns-browsers/
http://techcountless.com/change-dns-server-in-google-chrome/
http://support.google.com/chrome/answer/10468685/
http://www.tenforums.com/tutorials/145372-how-enable-disable-dns-over-https-doh-google-chrome.html
http://pureinfotech.com/enable-dns-over-https-chrome/
http://icpmoles.github.io/post/chrome-doh/
Turn ON/enable/customize DoH (DNS over HTTPS) in Chromium/Chrome web browsers & alternatives/derivatives/forks/variants
using public root DNS servers from reliable/trusted entities (see links to servers further above and providers further
below):
http://chromeenterprise.google/policies/?policy=BuiltInDnsClientEnabled
http://chromeenterprise.google/policies/?policy=DnsOverHttpsMode
http://chromeenterprise.google/policies/?policy=DnsOverHttpsTemplates
http://admx.help/?Category=Chrome&Policy=Google.Policies.Chrome::BuiltInDnsClientEnabled
http://admx.help/?Category=EdgeChromium&Policy=Microsoft.Policies.Edge::DnsOverHttpsMode
http://admx.help/?Category=ChromeOS&Policy=Google.Policies.ChromeOS::DnsOverHttpsTemplates
BEWARE:
*******
Edge web browsers collect, spy, surveil, track + send logged on/signed in members/subscribers/users' unique SID (Security
IDentifier) + web browser history [URLs (Uniform Resource Locator) = IPs, web addresses]
biometrics/data/fingerprint/information/stats, confidential/identifiable/personal/private/privileged preferences, user
choices/options/settings, to Microsoft + Microsoft 3rd party/affiliated/associated/leased/(sub)contracted/partner/subsidiary
cloud/network/internet/remote domains/servers/sites:
http://winbuzzer.com/2019/07/23/users-raise-privacy-concerns-as-edge-browser-caught-sending-full-urls-and-sid-to-microsoft-xcxwbn/
RECOMMENDED:
************
Install an independent/3rd party free, open source, safe, secure, uncrippled, unlocked, unrestricted, modern web browser
based on Chromium code with enhanced privacy, safety + security
http://www.mdgx.com/nettoys.htm#PRV
-> see "Free(ware) Windows 9x/NTx Web Browsers" chapter -> "Chromium + Chrome" section in SOFTWARE.TXT (included):
http://www.mdgx.com/nettoys.htm#CHR
Change/Set Windows 7 default web browser to Chromium/Chrome or Firefox:
http://www.groovypost.com/howto/change-default-browser-windows-7/
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome]
"BuiltInDnsClientEnabled"=dword:1
"DnsOverHttpsMode"="automatic"
"DnsOverHttpsTemplates"="https://dns.google/dns-query{?dns}"
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome\Recommended]
"BuiltInDnsClientEnabled"=dword:1
"DnsOverHttpsMode"="automatic"
"DnsOverHttpsTemplates"="https://dns.google/dns-query{?dns}"
[HKEY_CURRENT_USER\Software\Policies\Google\Chrome]
"BuiltInDnsClientEnabled"=dword:1
"DnsOverHttpsMode"="automatic"
"DnsOverHttpsTemplates"="https://dns.google/dns-query{?dns}"
[HKEY_CURRENT_USER\Software\Policies\Google\Chrome\Recommended]
"BuiltInDnsClientEnabled"=dword:1
"DnsOverHttpsMode"="automatic"
"DnsOverHttpsTemplates"="https://dns.google/dns-query{?dns}"
[HKEY_USERS\.DEFAULT\Software\Policies\Google\Chrome]
"BuiltInDnsClientEnabled"=dword:1
"DnsOverHttpsMode"="automatic"
"DnsOverHttpsTemplates"="https://dns.google/dns-query{?dns}"
[HKEY_USERS\.DEFAULT\Software\Policies\Google\Chrome\Recommended]
"BuiltInDnsClientEnabled"=dword:1
"DnsOverHttpsMode"="automatic"
"DnsOverHttpsTemplates"="https://dns.google/dns-query{?dns}"
;
------End cut & paste here------
- Routers + modem/router combos:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Recommended for all internet/network wired/wireless device/portable router + modem/router combo users to set up static IP
address public root DNS servers from reliable/trusted entitie/providers/servers (see links to servers further above and
providers further below) in order to prevent privacy, safety + security attacks, breaches, dissemination, hacking,
intrusion, invasion, leaks, phishing, malware, spyware, tracking:
http://developers.cloudflare.com/1.1.1.1/setup/router/
http://www.lifewire.com/how-to-2617995/
http://www.tp-link.com/support/faq/1712/
http://www.linksys.com/support-article?articleNum=316999
http://support.surfshark.com/hc/articles/360019705540/
http://blog.cloudflare.com/dns-over-tls-for-openwrt/
In this example I have used NETGEAR routers + Cloudflare public root DNS servers:
http://kb.netgear.com/30510/
http://www.mdgx.com/NETGEAR_router_AdGuard_public_root_DNS_servers.jpg
Example using Cloudflare public root DNS servers:
http://www.mdgx.com/NETGEAR_router_public_root_DNS_servers.jpg
Type your router IP local/private/reserved address in your web browser (typical example valid out of the box for most
routers + modem/router combos):
http://192.168.1.1/
-> press Enter -> type user name (default on many routers is "admin" unless changed by user) + password (if any, recommended
to always set up a strong password) to log on/sign in into your router built-in web browser interface (example): router Menu
(interface layout, options + wording vary depending on router brand/model/operating system/firmware version) -> Basic tab ->
Internet -> Domain Name Server (DNS) Address -> check Use these DNS Servers box -> type desired IP addresses in the square
boxes, but don't type the dots (example using Cloudflare public root DNS servers),
http://www.mdgx.com/NETGEAR_router_public_root_DNS_servers.jpg
Cloudflare Preferred (Primary, 1st) DNS Server (DNS1): 1.1.1.1
Cloudflare Alternate (Secondary, 2nd) DNS Server (DNS2): 1.0.0.1
and another example using AdGuard public root DNS servers
http://www.mdgx.com/NETGEAR_router_AdGuard_public_root_DNS_servers.jpg
AdGuard Preferred (Primary, 1st) DNS Server (DNS1): 94.140.14.14
AdGuard Alternate (Secondary, 2nd) DNS Server (DNS2): 94.140.15.15
-> Apply/Save changes -> reset/restart router or modem/router combo if needed.

* BUG + FIX:
DNS Client service [DNSCache] caches Domain Name System (DNS) names/hostnames (DNS Cache) which may slow down significantly
the processing of a large HOSTS [hosts] file with many IPs (for example my custom HOSTS file contains over 225000
hostname entries):
http://www.mdgx.com/hosts.php
FIXes:
- Disable Client Side DNS Caching in Windows NTx:
http://learn.microsoft.com/windows-server/networking/dns/troubleshoot/disable-dns-client-side-caching/
- Flush Windows DNS Cache:
http://www.thewindowsclub.com/flush-windows-dns-cache/
See "* FIX: Turn ON network discovery + detection of network(ed) computers + devices in Windows 7/newer:" section futther
below in WINDOWS7.TXT (this file)
http://www.mdgx.com/7.php
http://www.mdgx.com/WINDOWS7.TXT
to flush DNS cache using Windows built-in IPConfig [IPCONFIG.EXE] DOS console command line tool.
IPConfig [IPCONFIG.EXE] executable is located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually C:\WINDOWS].
View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]:
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command
PATH
-> press Enter.
- Stop (if already running) + then Restart DNS Client service [DNSCache]:
http://www.computerstepbystep.com/dns_client_service.html
Run these 2 DOS console CoMmanD line BATch (.CMD) files in this order:
1. STOP!DNS.CMD + only after that
2. STARTDNS.CMD.
Both these files are part of MDGx "Win10 Block Tools (10_BLOCK)" ZIP archive:
http://www.mdgx.com/10BLK/10_BLOCK.ZIP
MDGx "Win10 Block Tools (10_BLOCK)" ReadMe Guide -> 10_BLOCK.TXT (included):
http://www.mdgx.com/xptoy.htm#10BLK
http://www.mdgx.com/10BLK/10_BLOCK.php
http://www.mdgx.com/10BLK/10_BLOCK.TXT
Open STARTDNS.CMD + STOP!DNS.CMD (both included) in Notepad for details:
http://www.mdgx.com/10BLK/STARTDNS.CMD.TXT
http://www.mdgx.com/10BLK/STOP!DNS.CMD.TXT
See MDGx "HOSTS Files, Guides + Tools" -> "DNS Client Service" topic:
http://www.mdgx.com/hosts.php#N2
HOSTS [hosts] file is located in the %WinDir%\SYSTEM32\DRIVERS\ETC directory/folder [%WinDir% = usually C:\WINDOWS]:
http://www.mdgx.com/hosts.php#HG

* Determine your router or modem/router combo local/private/reserved IP address(es) in Windows XP/newer:
From a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator ->
run this command
IPCONFIG.EXE
-> press Enter -> Default Gateway IP address is usually the same or within same pool/range [address space] as your router or
router/modem combo IPv4 IP address. Example:
----------snippity-snip----------
Your network adapter connection type/connectoid/interface name:
IPv4 Address. . . . . . . . . . . : 192.168.1.2
Default Gateway . . . . . . . . . : 192.168.1.1
----------snippity-snip----------
IPConfig [IPCONFIG.EXE] executable is located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually C:\WINDOWS].
View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]:
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command
PATH
-> press Enter.

* Router + modem/router combo users:
Your router or modem/router combo should already have a pre-assigned/pre-configured/default/preset LAN (Local Area Network)
DNS server IP address which handles all DNS caching traffic (typical default example):
192.168.1.1
Router or modem/router combo caching DNS server will redirect all queries/requests to active/current
built-in/default/pre-assigned/pre-configured/preset ISP (Internet Service Provider) connection provider server(s) (if
unchanged) or custom (if re-assigned/changed/configured/customized/re-set) public root DNS IPs/server(s) -> see further
above available methods how to change step-by-step public root DNS servers for your internet/network connection(s).
Router or modem/router combo static local/private/reserved DNS IP address pool/range [address space] should be selected from
outside DHCP (Dynamic Host Configuration Protocol) pool/range [address space] in order to avoid any conflicts with
assigned/public/private/reserved/restricted IP address pools/ranges and most network setups (typical examples):
192.168.1.2 - 192.168.1.9
Full pool/range [address space] of built-in/default/pre-assigned/pre-configured/preset LAN (Local Area Network) DNS server
IP addresses:
192.168.0.0 - 192.168.255.255
Wikipedia: Dynamic Host Configuration Protocol (DHCP):
http://en.wikipedia.org/wiki/Dynamic_Host_Configuration_Protocol
Wikipedia: Localhost:
http://en.wikipedia.org/wiki/Localhost
Wikipedia: Local/Private/Reserved IP pools/ranges:
http://en.wikipedia.org/wiki/Private_network

* Upgrade compatible/supported/upgradeable internet/network wired/wireless router or modem/router combo
built-in/default/factory firmware to DD-WRT or OpenWRT firmware + enable/turn ON DNS over HTTPS (HyperText Transfer Protocol
Secure) (DoH) or DNS over TLS (Transport Layer Security) (DoT) security features on most basic/cheaper/older routers +
modem/router combos that do not have those features accessible/available out-of-the-box (example using Cisco/Linksys WRT54G2
router):
http://blogs.gurulabs.com/mike/2009/03/upgrading-a-cisco-linksys-wrt5.html
http://www.andryou.com/2020/04/23/guide-enabling-dns-over-tls-on-an-openwrt-router/
http://www.privacyguides.org/router/
WRT54G2 Set up web server behind router:
http://sanzon.wordpress.com/2008/04/04/setting-up-web-server-behind-router-wrt54g2/
WRT54G2 Static IP config and reconfig:
http://sanzon.wordpress.com/2008/04/09/wrt54g2-static-ip-configuration-and-reconfiguring-router/
WRT54G2 Assign Static IP(s):
http://www.superuser.com/questions/8574/
DD-WRT:
http://dd-wrt.com/
DD-WRT Supported Devices, Routers, Modem/Router Combos:
http://wiki.dd-wrt.com/wiki/index.php/Supported_Devices
DD-WRT Online DOCumentation:
http://dd-wrt.com/support/documentation/
Wikipedia: DD-WRT:
http://en.wikipedia.org/wiki/DD-WRT
OpenWRT:
http://openwrt.org/
OpenWRT Supported Devices, Routers, Modem/Router Combos:
http://openwrt.org/supported_devices
OpenWRT Online DOCumentation:
http://openwrt.org/docs/
Wikipedia: OpenWRT:
http://en.wikipedia.org/wiki/OpenWrt

@ Best free secure public root DNS IPs/providers/servers [almost all support standard encryption + security protocols]:
***********************************************************************************************************************
NOTE:
*****
I have selected these examples + made this classification based on trustworthy online analyses + reviews [see top of this
topic], personal experience, testing + preferences.

* Cloudflare secure public root DNS servers support encryption protocols for DoH (DNS over HTTPS) + DoT (DNS over TLS) =
these DNS servers block/filter/blacklist/protect against malicious + suspicious content, malware, phishing, spyware
[Blacklisters/Blockers/Filters]:
http://www.cloudflare.com/learning/dns/what-is-1.1.1.1/
http://www.cloudflare.com/learning/dns/dns-over-tls/
http://www.cloudflare.com/learning/access-management/what-is-dns-filtering/
Verify to make sure you're using Cloudflare public root DNS servers after setup:
http://1.1.1.1/help/
IPv4 servers:
1.1.1.1
1.0.0.1
IPv6 servers:
2606:4700:4700::1111
2606:4700:4700::1001
More info:
http://blog.cloudflare.com/warp-for-desktop/
http://www.publicdns.xyz/public/cloudflare.html
Logging + Privacy Policy:
http://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/
See "* Automate Windows XP/newer customization of NameServer registry String [REG_SZ] values" topic further above for
step-by-step guidelines to configure your current/active internet/network/private/wi-fi connection(s) in order to use
Cloudflare public root DNS servers.

* AdGuard secure public root DNS servers support encryption protocols for DoH (DNS over HTTPS), DoT (DNS over TLS), DNSCrypt
+ DNS over QUIC (DoQ):
http://adguard-dns.io/kb/public-dns/overview/
Go to Our server addresses [see above] -> Plain DNS -> Default servers [with different levels of protection depending on
specific DNS servers]:
http://adguard-dns.io/en/public-dns.html
En Garde! [Be Warned!]:
***********************
AdGuard free blockers/filters/protectors DNS servers are limited to maximum 300000 queries/month, after which they
automatically downgrade to plain, UNblocking/UNfiltered/UNprotected DNS servers!
- Blockers [default] = these DNS servers block/filter/blacklist/protect against ad(vertisment)s, spyware + trackers
[Blacklisters/Blockers/Filters]:
IPv4 servers:
94.140.14.14
94.140.15.15
IPv6 servers:
2a10:50c0::ad1:ff
2a10:50c0::ad2:ff
- Plain = these DNS servers do NOT block/filter/blacklist/protect against ad(vertisment)s, spyware, trackers, or any other
DNS requests [UNblocked/UNfiltered/UNprotected]:
IPv4 servers:
94.140.14.140
94.140.14.141
IPv6 servers:
2a10:50c0::1:ff
2a10:50c0::2:ff
- Family protectors = these DNS servers block/filter/blacklist/protect against ad(vertisment)s, spyware, trackers,
adult/inappropriate content, and enable Safe Search + Safe Mode (where possible) [Blacklisters/Blockers/Filters]:
IPv4 servers:
94.140.14.15
94.140.15.16
IPv6 servers:
2a10:50c0::bad1:ff
2a10:50c0::bad2:ff
AdGuard DNS Filters:
http://github.com/AdguardTeam/AdGuardDNS/
More info:
http://adguard-dns.io/en/welcome.html
Logging + Privacy Policy:
http://adguard.com/privacy/dns.html

* OpenDNS (Cisco) secure public root DNS servers support encryption protocols for DoH (DNS over HTTPS) + DoT (DNS over TLS)
[with different levels of protection depending on specific DNS servers]:
http://www.opendns.com/setupguide/
http://support.opendns.com/hc/articles/360038086532/
http://umbrella.cisco.com/blog/enhancing-support-dns-encryption-with-dns-over-https/
Verify to make sure you're using OpenDNS (Cisco) public root DNS servers after setup:
http://welcome.opendns.com/
- Umbrella/OpenDNS [default] = these DNS servers block/filter/blacklist/protect against malicious + suspicious content,
malware, phishing, spyware [Blacklisters/Blockers/Filters]:
IPv4 servers:
208.67.222.222
208.67.220.220
208.67.220.222
208.67.222.220
IPv6 servers:
2620:119:35::35
2620:119:53::53
- FamilyShield = these DNS servers block/filter/blacklist/protect against malicious + suspicious content, malware, phishing,
spyware + adult/inappropriate content [Blacklisters/Blockers/Filters]:
IPv4 servers:
208.67.222.123
208.67.220.123
IPv6 servers:
2620:119:35::123
2620:119:53::123
Install Guide:
http://use.opendns.com/
http://docs.umbrella.com/deployment-umbrella/docs/point-your-dns-to-cisco/
http://www.publicdns.xyz/public/opendns.html

* AhaDNS secure public root DNS servers with 0 [zero] logging support encryption protocols for DoH (DNS over HTTPS) [port
443], DoT (DNS over TLS) [port 853] + DNSSEC using encryption [DNSCrypt]:
http://ahadns.com/dns-over-https/
http://ahadns.com/dns-over-tls/
IPv4 servers:
5.2.75.75
45.67.219.208
IPv6 servers:
2a04:52c0:101:75::75
2a04:bdc7:100:70::70
AhaDNS public root DNS servers block/filter/blacklist/protect against ad(vertisment)s, malware, ransomware, telemetry,
trackers, viruses:
http://ahadns.com/faq/

* NextDNS secure public root DNS servers support encryption protocols for DoH (DNS over HTTPS) + DoT (DNS over TLS):
http://www.techlockdown.com/blog/nextdns-setup/
IPv4 servers:
- Primary:
45.90.28.190
45.90.28.232
- Secondary:
45.90.30.190
45.90.30.232
IPv6 servers:
2a07:a8c0::
2a07:a8c1::
NextDNS public root DNS servers block + filter ad(vertisment)s, malware, phishing, trackers + adult/inappropriate content
[with different levels of protection depending on specific DNS servers]:
http://help.nextdns.io/t/y4y3pz1/
http://tailscale.com/kb/1218/nextdns/
http://help.nextdns.io/t/y4hdbxa/
http://help.nextdns.io/t/h7yy7hy/
En Garde! [Be Warned!]:
***********************
NextDNS free blockers/filters/protectors DNS servers are limited to maximum 300000 queries/month, after which they
automatically downgrade to plain, UNblocking/UNfiltered/UNprotected DNS servers!
http://help.nextdns.io/t/p8hmvaw/
Logging + Privacy Policy:
http://nextdns.io/privacy/

* Google public root DNS servers support encryption protocols for DoH (DNS over HTTPS) + DoT (DNS over TLS)
[UNblocked/UNfiltered/UNprotected]:
http://developers.google.com/speed/public-dns/docs/using/
IPv4 servers:
8.8.8.8
8.8.4.4
IPv6 servers:
2001:4860:4860::8888
2001:4860:4860::8844
Install Guide:
http://developers.google.com/speed/public-dns/docs/using/
IP addresses used by Google:
http://www.lifewire.com/what-is-818153/
http://www.publicdns.xyz/public/google.html

* OpenNIC secure public root DNS servers support encryption protocols for DoH (DNS over HTTPS) + DoT (DNS over TLS)
[UNblocked/UNfiltered/UNprotected]:
http://www.opennic.org/
IPv4 servers:
52.173.73.208
45.56.117.118
IPv6 servers:
2a05:dfc7:5::53
2a05:dfc7:5353::53
OpenNIC public root DNS servers:
http://servers.opennicproject.org/
http://www.publicdns.xyz/public/opennic.html

* Quad9 secure public root DNS servers support encryption protocols for DoH (DNS over HTTPS) + DoT (DNS over TLS):
http://www.quad9.net/faq/
IPv4 servers:
9.9.9.9
149.112.112.112
IPv6 servers:
2620:fe::fe
2620:fe::9
http://www.publicdns.xyz/public/quad9.html
Logging + Privacy Policy:
http://www.quad9.net/privacy/policy/

* Level3 (CenturyLink) secure public root DNS servers support encryption protocols for DoH (DNS over HTTPS) + DoT (DNS over
TLS):
http://www.dnsserverlist.org/
IPv4 servers:
4.2.2.1
4.2.2.2
4.2.2.3
4.2.2.4
4.2.2.5
4.2.2.6
Level3 (CenturyLink) alternate public root DNS servers:
IPv4 servers:
209.244.0.3
209.244.0.4
http://www.publicdns.xyz/public/level3.html

* CenturyLink secure public root DNS servers support encryption protocols for DoH (DNS over HTTPS) + DoT (DNS over TLS):
http://www.centurylink.com/home/help/internet/dns.html
IPv4 servers:
205.171.3.26
205.171.2.26

* CleanBrowsing secure public root DNS servers support encryption protocols for DoH (DNS over HTTPS) + DoT (DNS over TLS):
http://cleanbrowsing.org/filters/
IPv4 servers:
185.228.168.9
185.228.168.10

* SafeDNS secure public root DNS servers support encryption protocols for DoH (DNS over HTTPS) + DoT (DNS over TLS):
http://www.safedns.com/en/guides/win7/
IPv4 servers:
195.46.39.39
195.46.39.40
http://www.publicdns.xyz/public/safedns.html

* Comodo secure DNS public root DNS servers support encryption protocols for DoH (DNS over HTTPS) + DoT (DNS over TLS):
http://www.comodo.com/secure-dns/
IPv4 servers:
8.26.56.26
8.20.247.20
http://www.publicdns.xyz/public/comodo-secure.html

* Advantage DNS (UltraDNS) secure public root DNS servers support encryption protocols for DoH (DNS over HTTPS) + DoT (DNS
over TLS):
http://www.neustar.biz/security/dns-services
IPv4 servers:
156.154.70.1
156.154.71.1

* Verisign secure public root DNS servers support encryption protocols for DoH (DNS over HTTPS) + DoT (DNS over TLS):
http://www.verisign.com/en_US/security-services/public-dns/
IPv4 servers:
64.6.64.6
64.6.65.6
IPv6 servers:
2620:74:1b::1:1
2620:74:1c::2:2
http://www.publicdns.xyz/public/verisign.html
______________________________________________________________________________



Internet + Web Browsers Tweaks, Fixes + Tools [Chromium/Chrome, Firefox + Internet Explorer (IE)]
http://www.mdgx.com/7.php#:~:text=Internet%20%2B%20Web%20Browsers%20Tweaks%2C%20Fixes%20%2B%20Tools%20%5BChromium%2FChrome%2C%20Firefox



* MDGx "Internet Power Toys [free(ware)]" section -> "Free(ware) Windows NTx Web Browsers" topic in SOFTWARE.TXT (included):
http://www.mdgx.com/nettoys.htm#NET

* MDGx "Internet Power Toys [free(ware)]" section -> "Free(ware) Windows NTx Internet Enhancers" topic in SOFTWARE.TXT
(included):
http://www.mdgx.com/nettoys.htm#DUN

* MDGx "Firewalls, Anti-Spyware + Internet Monitors [free(ware)]" section -> "Free(ware) Windows NTx Monitors, Firewalls +
Anti-Spyware" topic in SOFTWARE.TXT (included):
http://www.mdgx.com/fw.htm

* MDGx "List of Useful Windows NTx Tools [99.9% free(ware)]" -> "INTERNET" section in TOOLS.TXT (included):
http://www.mdgx.com/tools.php
http://www.mdgx.com/TOOLS.TXT

* Change/Set Windows 7 default web browser to Chromium/Chrome or Firefox:
http://www.groovypost.com/howto/change-default-browser-windows-7/

* Tweak Network Interface Controller (NIC) Ethernet settings for maximum performance + speed in Windows 7/newer:
http://windowsreport.com/best-ethernet-settings-for-gaming/
http://techgenix.com/advanced-network-adapter-driver-settings/
http://helpdesk.flexradio.com/hc/articles/202118518/
http://learn.microsoft.com/windows-server/networking/technologies/network-subsystem/net-sub-performance-tuning-nics/
http://www.digit.in/features/tech/tweak-network-adapter-properties-networking-ethernet-wifi-vpn-45243.html
http://steamcommunity.com/sharedfiles/filedetails/?id=727946014
http://www.speedguide.net/articles/3449/
http://www.peerwisdom.org/2013/04/03/large-send-offload-and-network-performance/
http://www.networkworld.com/article/2224722/jumbo-frames.html
http://netcraftsmen.com/just-say-no-to-jumbo-frames/
NetSh (Network Shell) tool [%WinDir%\SYSTEM32\NETSH.EXE]:
http://learn.microsoft.com/windows-server/networking/technologies/netsh/netsh/
http://technet.microsoft.com/library/bb490939.aspx
http://www.ss64.com/nt/netsh.html
http://adamtheautomator.com/netsh/
View all NetSh available options, parameters + switches: from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]:
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter:
NETSH.EXE /?
... And now let's dig deeper: ;-/
* Turn ON Receive Window Auto-Tuning + turn OFF Scaling Heuristics Transmission Control Protocol/Internet Protocol (TCP/IP)
parameters to increase/regain decreased speed/slow internet connection(s) in Windows XP/newer:
http://www.majorgeeks.com/content/page/how_to_fix_slow_internet_on_windows_10.html
http://blogs.technet.microsoft.com/networking/2016/08/11/an-update-on-windows-tcp-autotuninglevel/
http://www.techjourney.net/disable-tcp-receive-window-auto-tuning-fix-slow-internet-cannot-load-web-page-cannot-download-email/
http://learn.microsoft.com/troubleshoot/windows-server/networking/receive-window-auto-tuning-for-http/
http://pureinfotech.com/disable-window-auto-tuning-fix-slow-internet-speeds-windows-10/
http://www.speedguide.net/faq/339/
http://www.it-support.com.au/5-ways-to-improve-download-speed/2012/08/
http://therealhelper.blogspot.com/2017/09/you-can-actually-kill-lag-of-any-game.html
- Windows XP/Vista/7/7 SP1 users:
*********************************
1. Patch the TCPIP.SYS driver [%WinDir%\SYSTEM32\Drivers\TCPIP.SYS = original file will be backed up] using EvID4226 Limited
Connections Patch:
http://www.raymond.cc/blog/tcp-z-is-the-best-tcpip-half-open-connection-limited-patcher/
File:
http://www.raymond.cc/blog/download/did/205/
2. Restart/reboot Windows -> run these commands to turn ON TCP/IP Receive Window Auto-Tuning, turn OFF Scaling Heuristics +
turn ON Direct Cache Access (DCA) + NetDMA Direct Memory Access from a DOS console command prompt
[%WinDir%\SYSTEM32\CMD.EXE]:
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run these commands -> press Enter after each line:
NETSH.EXE interface tcp set global autotuning=normal
NETSH.EXE interface tcp set global dca=enabled netdma=enabled
NETSH.EXE interface tcp set heuristics disabled
NETSH.EXE interface tcp set heuristics wsh=disabled forcews=enabled
NETSH.EXE interface tcp set global rss=enabled chimney=enabled rsc=enabled nonsackrttresiliency=enabled
3. View your TCP/IP connection status parameters from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click
CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter:
NETSH.EXE interface tcp show global
Should be set to normal (Windows NTx default):
Receive Window Auto-Tuning Level    : normal
- Windows 8/8.1/10/11 users:
****************************
1. Run these commands to turn ON TCP/IP Receive Window Auto-Tuning, turn OFF Scaling Heuristics + turn ON Direct Cache
Access (DCA) + NetDMA Direct Memory Access from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD
shortcut/CMD.EXE -> Run as Administrator -> run these commands -> press Enter after each line:
NETSH.EXE interface tcp set global autotuninglevel=normal
NETSH.EXE interface tcp set global dca=enabled netdma=enabled
NETSH.EXE interface tcp set heuristics disabled
NETSH.EXE interface tcp set heuristics wsh=disabled forcews=enabled
NETSH.EXE interface tcp set global rss=enabled rsc=enabled nonsackrttresiliency=enabled
2. View your TCP/IP connection status parameters from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]:
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter:
NETSH.EXE interface tcp show global
Should be set to normal (Windows NTx default):
Receive Window Auto-Tuning Level    : normal
BUG:
****
Increase/regain your internet connection speed in case using (older/incompatible) modems/routers/devices/networks without
built-in support for TCP/IP Receive Window Auto-Tuning.
FIX:
****
1. Turn OFF Receive Window Auto-Tuning from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD
shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter:
- Windows XP/Vista/7/7 SP1 users:
NETSH.EXE interface tcp set global autotuning=disabled
- Windows 8/8.1/10/11 users:
NETSH.EXE interface tcp set global autotuninglevel=disabled
2. View your TCP/IP connection status parameters from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]:
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter:
NETSH.EXE interface tcp show global
Should be disabled:
Receive Window Auto-Tuning Level    : disabled
RESTORE:
********
In case your internet connection slows down after disabling Receive Window Auto-Tuning TCP/IP parameter:
1. Turn ON Windows Auto-Tuning from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD
shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter:
- Windows XP/Vista/7/7 SP1 users:
NETSH.EXE interface tcp set global autotuning=normal
- Windows 8/8.1/10/11 users:
NETSH.EXE interface tcp set global autotuninglevel=normal
2. View your TCP/IP connection status parameters from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click
CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter:
NETSH.EXE interface tcp show global
Should be set to normal (Windows NTx default):
Receive Window Auto-Tuning Level    : normal

* Turn OFF Internet Explorer (IE) 9/10/11 "Automatic (Forced) Upgrade" + turn ON "Block Tracking" (disable Geolocation
Detection):
http://unlockforus.blogspot.com/2012/09/do-not-allow-websites-to-get-your.html
http://support.microsoft.com/help/2843950/
http://www.eightforums.com/tutorials/7996-internet-explorer-10-auto-update-enable-disable.html
http://www.itninja.com/question/ie10-turn-off-auto-updates/
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Geolocation]
"BlockAllWebsites"=dword:1
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main]
"EnableAutoUpgrade"=dword:0
[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main]
"EnableAutoUpgrade"=dword:0
[HKEY_USERS\.DEFAULT\Software\Microsoft\Internet Explorer\Main]
"EnableAutoUpgrade"=dword:0
;
------End cut & paste here------

* Turn OFF Internet Explorer (IE) obsolete/useless Security Check:
http://www.windows-security.org/65c2e8edd3108cdb6fc985493bb2fa38/turn-off-the-security-settings-check-feature/
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Security]
"DisableSecuritySettingsCheck"=dword:1
[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Security]
"DisableSecuritySettingsCheck"=dword:1
;
------End cut & paste here------

* FIX: Turn OFF Open File Security Warning, turn ON parallel downloading of multiple files in all web browsers, turn OFF
Chromium/Chrome web browsers download restrictions & annoying prompt(s) for downloaded files location + FIX Chromium/Chrome
web browsers "Failed - virus scan failed" file download error messages:
http://support.microsoft.com/help/883260/
http://www.thewindowsclub.com/disable-open-file-security-warning-for-file/
http://www.sevenforums.com/tutorials/124367-open-file-security-warning-unblock-file.html
http://www.sevenforums.com/tutorials/182353-open-file-security-warning-enable-disable.html
http://www.sevenforums.com/tutorials/124427-open-file-security-warning-allow-prevent-unblock-file.html
http://www.itechfever.com/fix-google-chrome-virus-scan-failed-error/
http://www.guidingtech.com/top-ways-to-fix-virus-scan-failed-error-in-google-chrome/
http://www.wisecleaner.com/think-tank/266-How-to-enable-the-parallel-downloading-function-of-Google-Chrome.html
http://stackoverflow.com/questions/38511515/
http://technoresult.com/download-faster-google-chrome-using-parallel-downloading/
http://admx.help/?Category=Chrome&Policy=Google.Policies.Chrome::DownloadDirectory
Start -> Control Panel (CP) or Run... [hold WinKey + press R] -> type:
control.exe
-> press Enter -> Internet (Explorer) Properties (Options) [inetcpl.cpl] -> Security tab -> Custom level button -> scroll
down to Launching applications and unsafe files -> check Enable (not secure) box -> Apply/OK -> Yes.
CAUTION:
Make sure to scan for malware/spyware ALL files downloaded from the internet!
http://www.mdgx.com/vir.htm
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Attachments]
"ScanWithAntiVirus"=dword:1
"SaveZoneInformation"=dword:1
"HideZoneInfoOnProperties"=dword:0
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Attachments]
"ScanWithAntiVirus"=dword:1
"SaveZoneInformation"=dword:1
"HideZoneInfoOnProperties"=dword:0
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Attachments]
"ScanWithAntiVirus"=dword:1
"SaveZoneInformation"=dword:1
"HideZoneInfoOnProperties"=dword:0
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings]
"MaxConnectionsPer1_0Server"=dword:20
"MaxConnectionsPerServer"=dword:20
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"MaxConnectionsPer1_0Server"=dword:20
"MaxConnectionsPerServer"=dword:20
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"MaxConnectionsPer1_0Server"=dword:20
"MaxConnectionsPerServer"=dword:20
[HKEY_LOCAL_MACHINE\Software\Policies\Google\Chrome]
"DownloadRestrictions"=dword:0
"PromptForDownloadLocation"=dword:0
[HKEY_LOCAL_MACHINE\Software\Policies\Google\Chrome\Recommended]
"DownloadRestrictions"=dword:0
"PromptForDownloadLocation"=dword:0
[HKEY_CURRENT_USER\Software\Policies\Google\Chrome]
"DownloadRestrictions"=dword:0
"PromptForDownloadLocation"=dword:0
[HKEY_CURRENT_USER\Software\Policies\Google\Chrome\Recommended]
"DownloadRestrictions"=dword:0
"PromptForDownloadLocation"=dword:0
[HKEY_USERS\.DEFAULT\Software\Policies\Google\Chrome]
"DownloadRestrictions"=dword:0
"PromptForDownloadLocation"=dword:0
[HKEY_USERS\.DEFAULT\Software\Policies\Google\Chrome\Recommended]
"DownloadRestrictions"=dword:0
"PromptForDownloadLocation"=dword:0
;
------End cut & paste here------

* Turn ON Chromium/Chrome (or alternative/derivative/fork/variant), Firefox (or alternative/derivative/fork/variant), Opera
(or alternative/derivative/fork/variant), or your favorite/preferred web browser
http://www.mdgx.com/nettoys.htm#NET
as Default Browser [to replace built-in/default/forced/hardwired/locked/preset Edge or Internet Explorer (IE)] for file
extensions (.dhtml, .htm, .html, .php, .xhtml, .xml, etc), internet schemes/protocols (ftp:, http:, https:, magnet:,
mailto:, news:, etc)
http://www.w3.org/wiki/UriSchemes
+ URL/URI addresses/items/links/schemes/shortcuts (.url, .website, etc) in Windows 7/newer:
http://www.winhelponline.com/blog/open-url-shortcuts-different-browsers-right-click-menu/
http://answers.microsoft.com/en-us/windows/forum/windows_10-networking-winpc/how-do-i-get-url-files-to-open-in-chrome-not-ie/8e766fa8-eb8d-43a3-9945-3c43f5edf1fb/
http://support.google.com/chrome/a/answer/7009292/
http://en.wikipedia.org/wiki/Uniform_Resource_Identifier
Chromium/Chrome web browsers may need to install the .URL Handler extension:
http://chromewebstore.google.com/detail/url-handler/nhmccpjmdhejpfhafcfajkgifkmjhkgf
For example I use winPenPack X-Chromium (X-Launcher) Portable launcher which installs Chromium web browser [free, open
source]:
http://www.winpenpack.com/en/download.php?view.1082
Download:
http://sourceforge.net/projects/winpenpack/files/X-Chromium/releases/
In the examples below "winPenPack X-Chromium Launcher" [installed on my computers as C:\PORT\CHROME\X-Chromium.exe] becomes
default web browser for all these file extensions, internet schemes/protocols + URL/URI
addresses/items/links/schemes/shortcuts:
http://superuser.com/questions/1205914/
File extensions I have linked to Chromium (example):
.htm
.html
.shtm
.shtml
.url
.xht
.xhtm
.xhtml
Protocols:
http
https
mailto
Shortcuts:
.url
.website
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
; Used "winPenPack X-Chromium Launcher" [installed in C:\PORT\CHROME\X-Chromium.exe] in this example:
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ChromeHTML]
@="winPenPack X-Chromium Launcher"
"AppUserModelID"="winPenPack.X-ChromiumLauncher.Default"
"EditFlags"=dword:1
"FriendlyTypeName"="winPenPack X-Chromium Launcher"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ChromeHTML\Application]
"AppUserModelId"="winPenPack.X-ChromiumLauncher.Default"
"ApplicationName"="winPenPack X-Chromium Launcher"
"ApplicationDescription"="X-Chromium Portable Chromium Web Browser"
"ApplicationCompany"="winPenPack"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ChromeHTML\shell]
@="Open"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ChromeHTML\shell\open\command]
@="\"C:\\PORT\\CHROME\\X-Chromium.exe\" \"%1\""
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.URL]
@="urlfile"
"EditFlags"=dword:1
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.URL\shell]
@="Open"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.URL\shell\open\command]
@="\"C:\\PORT\\CHROME\\X-Chromium.exe\" \"%1\""
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\urlfile]
@="URL File"
"EditFlags"=dword:1
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\urlfile\shell]
@="Open"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\urlfile\shell\open\command]
@="\"C:\\PORT\\CHROME\\X-Chromium.exe\" \"%1\""
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\InternetShortcut]
@="InternetShortcut"
"NeverShowExt"=""
"EditFlags"=dword:1
"IsShortcut"=""
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\InternetShortcut\shell]
@="Open"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\InternetShortcut\shell\open\command]
@="\"C:\\PORT\\CHROME\\X-Chromium.exe\" \"%1\""
[HKEY_LOCAL_MACHINE\SOFTWARE\RegisteredApplications]
"winPenPack X-Chromium Launcher"="Software\\Clients\\StartMenuInternet\\winPenPack X-Chromium Launcher\\Capabilities"
[HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\winPenPack X-Chromium Launcher]
@="winPenPack X-Chromium Launcher"
[HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\winPenPack X-Chromium Launcher\Capabilities]
"ApplicationName"="winPenPack X-Chromium Launcher"
"ApplicationDescription"="Chromium is a fast web browser for Windows."
[HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\winPenPack X-Chromium Launcher\Capabilities\FileAssociations]
".htm"="ChromeHTML"
".html"="ChromeHTML"
".shtm"="ChromeHTML"
".shtml"="ChromeHTML"
".url"="ChromeHTML"
".website"="XChromium.exe_.website"
".xht"="ChromeHTML"
".xhtm"="ChromeHTML"
".xhtml"="ChromeHTML"
[HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\winPenPack X-Chromium Launcher\Capabilities\Startmenu]
"StartMenuInternet"="winPenPack X-Chromium Launcher"
[HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\winPenPack X-Chromium Launcher\Capabilities\URLAssociations]
"http"="ChromeHTML"
"https"="ChromeHTML"
"mailto"="ChromeHTML"
[HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\winPenPack X-Chromium Launcher\shell\open\command]
@="\"C:\\PORT\\CHROME\\X-Chromium.exe\" \"%1\""
;
------End cut & paste here------
Use a Visual Basic Script (VBScript) file (.vbs) to set your default web browser (X-Chromium in this example):
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text VBScript (.vbs) file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the VBS extension (.vbs) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to execute/run it.
-----Begin cut & paste here-----
Set WshShell=WScript.CreateObject("WScript.Shell")
' Set Default Web Browser in Windows Vista/newer:
WshShell.Run "%windir%\SYSTEM32\CONTROL.EXE /name Microsoft.DefaultPrograms /page pageDefaultProgram\pageAdvancedSettings?pszAppName=X-Chromium"
' Give Default Programs time to load (2 seconds in this case):
WScript.Sleep 2000
WshShell.AppActivate "Set Program Associations"
WshShell.SendKeys "{TAB}"
WshShell.SendKeys " "
WshShell.SendKeys "{TAB}"
WshShell.SendKeys "{TAB}"
WScript.Sleep 800
WshShell.SendKeys " "
Msgbox "Your Default Web Browser is X-Chromium (Portable Chromium)."
WScript.Quit
------End cut & paste here------
Execute/run VBS file above from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE
-> Run as Administrator -> type this command (example using X-Chromium above + VBS file named Def_Brow_X-Chrom.vbs)
CSCRIPT.EXE //NoLogo Def_Brow_X-Chrom.vbs
-> press Enter.
CSCRIPT.EXE executable is located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually C:\WINDOWS].
View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]:
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command
PATH
-> press Enter.

* Turn OFF/disable automatic/behind-your-back/unattended Google Chrome Update, Chrome Default Browser takeover + Google
Update services in Windows 7/newer:
http://support.google.com/chrome/a/answer/6350036/
http://superuser.com/questions/974766/
http://eddiejackson.net/wp/?p=17266
http://admx.help/?Category=GoogleUpdate&Policy=Google.Policies.Update::Pol_DefaultUpdatePolicy
http://admx.help/?Category=GoogleUpdate&Policy=Google.Policies.Update::Pol_AutoUpdateCheckPeriod
http://www.ghacks.net/2017/05/19/how-to-block-automatic-google-chrome-updates/
http://www.itninja.com/question/how-to-disable-updates-for-latest-chrome-enterprise-version-44-0-2403-130/
http://computergarage.org/disable-auto-update-google-chrome.html
http://www.chromium.org/administrators/policy-list-3/#DefaultBrowserSettingEnabled
http://admx.help/?Category=Chrome&Policy=Google.Policies.Chrome%3A%3ADefaultBrowserSettingEnabled
http://www.tenforums.com/attachments/browsers-email/120981d1486931502t-how-stop-google-chrome-not-your-default-browser-message-modification-info.jpg
http://www.tenforums.com/tutorials/5507-choose-default-apps-windows-10-a.html#option6
See topic above to use winPenPack X-Chromium (X-Launcher) Portable launcher (example) which installs Chromium web browser as
your default browser for file extensions, internet protocols + URL/URI addresses/items/links/schemes/shortcuts.
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Update]
"UpdateDefault"=dword:0
"AutoUpdateCheckPeriodMinutes"=dword:0
; WOW6432Node registry subkey exists only in Windows NTx 64-bit (x64):
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Policies\Google\Update]
"UpdateDefault"=dword:0
"AutoUpdateCheckPeriodMinutes"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\GoogleChromeElevationService]
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\GoogleChromeElevationService]
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\GoogleChromeElevationService]
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\gpupdate]
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\gpupdate]
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\gpupdate]
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\gpupdatem]
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\gpupdatem]
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\gpupdatem]
"Start"=dword:4
[HKEY_LOCAL_MACHINE\Software\Policies\Google\Chrome]
"DefaultBrowserSettingEnabled"=dword:0
[HKEY_CURRENT_USER\Software\Policies\Google\Chrome]
"DefaultBrowserSettingEnabled"=dword:0
[HKEY_USERS\.DEFAULT\Software\Policies\Google\Chrome]
"DefaultBrowserSettingEnabled"=dword:0
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Google Update"=-
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce]
"Google Update"=-
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnceEx]
"Google Update"=-
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices]
"Google Update"=-
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServicesOnce]
"Google Update"=-
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run]
"Google Update"=-
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce]
"Google Update"=-
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnceEx]
"Google Update"=-
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunServices]
"Google Update"=-
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunServicesOnce]
"Google Update"=-
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"Google Update"=-
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\RunOnce]
"Google Update"=-
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\RunOnceEx]
"Google Update"=-
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\RunServices]
"Google Update"=-
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\RunServicesOnce]
"Google Update"=-
;
------End cut & paste here------

* Determine, Configure + Tweak IPv6 in Windows 7/newer:
http://en.wikipedia.org/wiki/IPv6
http://learn.microsoft.com/troubleshoot/windows-server/networking/configure-ipv6-in-windows/
http://technet.microsoft.com/library/bb726944.aspx
http://technet.microsoft.com/library/bb726995.aspx
http://technet.microsoft.com/library/bb962076.aspx
http://serverfault.com/questions/234711/
http://www.whatsmydns.net/ipv6-to-ipv4/
MDGx "IPv6 Testing, Info + Links":
http://www.mdgx.com/modem.htm#IPV6
View all your computer/device active/current IPv6 IP addresses supplied by your network/internet provider from a DOS console
command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command ->
press Enter:
NETSH.EXE interface ipv6 show addresses
and their corresponding IPv4 IP addresses:
NETSH.EXE interface ipv4 show addresses
NetSh [NETSH.EXE] executable is located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually C:\WINDOWS].
View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]:
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command
PATH
-> press Enter.
NetSh:
http://www.ss64.com/nt/netsh.html
http://adamtheautomator.com/netsh/

* Chromium/Chrome:
******************
http://www.mdgx.com/7.php#:~:text=%2A%20Chromium%2FChrome%3A
MDGx "Free(ware) Windows 9x/NTx Web Browsers" chapter -> "Chromium + Chrome web browsers [free(ware)]" section ->
"Chromium + Chrome" topic in SOFTWARE.TXT (included):
http://www.mdgx.com/nettoys.htm#CHR
Change/Set Windows 7 default web browser to Chromium/Chrome or Firefox:
http://www.groovypost.com/howto/change-default-browser-windows-7/
RECOMMENDED:
- Chromium Precompiled EXEcutable [Installer EXE + Portable Archives ZIP/7z] 32-bit + 64-bit for Windows XP/newer 32-bit
(x86) + 64-bit (x64):
http://chromium.woolyss.com/
Degoogled/Ungoogled/stripped of Google ad(ware)/integration/spyware/surveillance/tracking code Chromium builds [clearly
labeled]:
http://github.com/ungoogled-software/ungoogled-chromium/blob/master/README.md
http://ungoogled-software.github.io/ungoogled-chromium-wiki/faq
Ungoogled Chromium precompiled binaries 32-bit + 64-bit for Windows 7/newer 32-bit (x86) + 64-bit (x64) [75-125 MB,
Installer ONLY EXE + Portable ZIP, NEWest at the top]:
http://ungoogled-software.github.io/ungoogled-chromium-binaries/
Ungoogled Chromium 64-bit for Windows 7/newer 64-bit (x64):
http://ungoogled-software.github.io/ungoogled-chromium-binaries/releases/windows/64bit/
Ungoogled Chromium 32-bit for Windows 7/newer 32-bit (x86):
http://ungoogled-software.github.io/ungoogled-chromium-binaries/releases/windows/32bit/
- Brave 32-bit + 64-bit web browser for Windows 7/newer 32-bit (x86) + 64-bit (x64) based on Chromium code [fork] with
improved privacy, safety + security and optimized speed:
http://brave.com/
Brave Repository:
http://github.com/brave/brave-browser/
Download [ZIP = full, Portable]:
http://github.com/brave/brave-browser/releases/latest/
- Vivaldi 32-bit + 64-bit web browser for Windows 7/newer 32-bit (x86) + 64-bit (x64) based on Chromium code [fork] with
enhanced privacy, safety + security:
http://vivaldi.com/
Download [EXE = Installer ONLY]:
http://vivaldi.com/download/
Vivaldi Portable -> run Installer EXE -> Install standalone:
http://help.vivaldi.com/desktop/install-update/standalone-version-of-vivaldi/
- Thorium 32-bit + 64-bit web browsers for Windows 7/newer 32-bit (x86) + 64-bit (x64) based on Chromium code [fork]
hardware 3D, rendering + video playback optimized:
http://thorium.rocks/
Download [ZIP = full, Portable]:
Thorium AVX2 64-bit for Windows 10/newer 64-bit (x64):
http://github.com/Alex313031/Thorium-Win/releases/latest/
Thorium AVX 64-bit for Windows 10/newer 64-bit (x64):
http://github.com/Alex313031/Thorium-Win/releases/latest/
Thorium SS3 64-bit for Windows 10/newer 64-bit (x64):
http://github.com/Alex313031/Thorium-SSE3/releases/latest/
Thorium SSE2 (Win32) 32-bit edition for Windows 7/newer 32-bit (x86) + Thorium SSE3, SSE4, AVX + AVX2 64-bit editions for
Windows 7/newer 64-bit (x64):
http://github.com/Alex313031/thorium-win7/releases/latest/
Thorium Requirements:
- Multicore CPU: minimum Intel Core 2nd gen or AMD FX with built-in SSE4 (Streaming SIMD Extensions 4),
http://en.wikipedia.org/wiki/SSE4
AVX (Advanced Vector EXtensions)
http://en.wikipedia.org/wiki/Advanced_Vector_Extensions
+ AES (Advanced Encryption Standard)
http://en.wikipedia.org/wiki/Advanced_Encryption_Standard
enhancements/multimedia extensions/instructions.
- Graphics video controller with 3D rendering + OpenGL capabilities.
Required Windows 7 64-bit (x64) Updates for Thorium 64-bit web browser enhanced hardware + software compatibility/support:
http://thorium.rocks/win7
- Windows 7 SP1/2008 R2 64-bit (x64) Servicing Stack Update 2019 KB4490628:
http://support.microsoft.com/help/4490628/
Download:
http://catalog.update.microsoft.com/search.aspx?q=4490628+x64
- Windows 7 SP1/2008 R2 64-bit (x64) SHA-2 Code Signing Support Update 2019 KB4474419:
http://support.microsoft.com/help/4474419/
Download:
http://catalog.update.microsoft.com/search.aspx?q=4474419+x64
- Supermium 32-bit + 64-bit web browsers for Windows 7/newer 32-bit (x86) + 64-bit (x64) based on Chromium code [fork]
optimized for speed + performance:
http://www.win32subsystem.live/supermium.html
Download [EXE = full, Installer +/- ZIP = full, Portable]:
http://github.com/win32ss/supermium/releases/latest/
- X-Chromium (X-Launcher) Portable launcher:
http://www.winpenpack.com/en/download.php?view.1082
Download [EXE = Installer, full]:
http://sourceforge.net/projects/winpenpack/files/X-Chromium/releases/
Either install Chromium precompiled stable releases 32-bit or 64-bit:
http://chromium.woolyss.com/
or extract all files from portable archive [zip or 7z] + copy to the destination of your choice Chromium portable stable
releases 32-bit or 64-bit to match the Windows NTx [7/newer] operating system(s) [OS(es)]
build/edition/release/update/version + bit strength [32-bit (x86) or 64-bit (x64)] you are using.
All Chromium + Chrome alternatives/derivatives/forks/variants users must have these 3 environment variables:
GOOGLE_API_KEY=NO
GOOGLE_DEFAULT_CLIENT_ID=NO
GOOGLE_DEFAULT_CLIENT_SECRET=NO
Right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run these commands -> press Enter after each line:
SETX.EXE GOOGLE_API_KEY "NO" /M
SETX.EXE GOOGLE_DEFAULT_CLIENT_ID "NO" /M
SETX.EXE GOOGLE_DEFAULT_CLIENT_SECRET "NO" /M
Google API Keys:
http://chromium.woolyss.com/#google-api-keys
http://www.chromium.org/developers/how-tos/api-keys/
MDGx "@ Chromium/Chrome/Brave/X-Chromium/Thorium/Vivaldi/Supermium Privacy, Safety + Security Settings, Extensions, Guides +
Solutions:" topic in SOFTWARE.TXT (included):
http://www.mdgx.com/nettoys.htm#PRV
MDGx collection of essential + useful Chromium/Chrome extensions + tweaks -> "CHROMIUM" section in TOOLS.TXT (included):
http://www.mdgx.com/tools.php#:~:text=CHROMIUM%20%5B%2A%5D
http://www.mdgx.com/TOOLS.TXT

* Firefox:
**********
http://www.mdgx.com/7.php#:~:text=%2A%20Firefox%3A
MDGx "Internet Power Toys: Firefox [free(ware)]" section in SOFTWARE.TXT (included):
http://www.mdgx.com/nettoys.htm#MOZ
Firefox Stable (candidate):
http://ftp.mozilla.org/pub/firefox/nightly/
Firefox Alpha 1:
http://ftp.mozilla.org/pub/firefox/nightly/latest-trunk/
Firefox Alpha 2:
http://ftp.mozilla.org/pub/firefox/nightly/latest-mozilla-aurora/
Firefox Beta:
http://ftp.mozilla.org/pub/firefox/nightly/
Firefox Portable Stable:
http://www.portableapps.com/apps/internet/firefox_portable/
Firefox Portable Beta + Nightly:
http://www.portableapps.com/apps/internet/firefox_portable/test/
- TOR (The Onion Router) Browser 32-bit + 64-bit web browser for Windows 7/newer 32-bit (x86) + 64-bit (x64) based on Gecko
code [fork] with enhanced anonymity, privacy, safety + security:
http://www.torproject.org/download/languages/
Make TOR Browser Portable -> Install EXE -> select desired local/removable media location:
http://tb-manual.torproject.org/make-tor-portable/
TOR Browser Portable [OLDer Installer EXE]:
http://github.com/garethflowers/tor-browser-portable/
Download:
http://github.com/garethflowers/tor-browser-portable/releases/latest/
TOR Browser online Manual:
http://tb-manual.torproject.org/
- Waterfox 64-bit hardware/CPU optimized + improved privacy web browser for Windows 7/newer 64-bit (x64) based on Gecko code
[fork]:
http://www.waterfox.net/
Download:
http://www.waterfox.net/download/
Waterfox FAQ:
http://www.waterfox.net/docs/faq/
- Pale Moon 32-bit + 64-bit hardware/CPU optimized web browser for Windows 7/newer 32-bit (x86) + 64-bit (x64) based on
Gecko code [fork]:
http://www.palemoon.org/
Download Portable + X-Launcher [Setup EXE or archived 7z]:
http://www.palemoon.org/download.shtml
Pale Moon FAQ + Help Forum:
http://forum.palemoon.org/viewforum.php?f=24
Pale Moon Extensions:
http://addons.palemoon.org/extensions/
- LibreWolf 64-bit web browser for Windows 7/newer 64-bit (x64) based on Gecko code [fork] with enhanced privacy, safety +
security:
http://librewolf.net/
LibreWolf Windows Installer:
http://librewolf.net/installation/windows/
LibreWolf Windows Releases:
http://gitlab.com/librewolf-community/browser/windows/-/releases/
LibreWolf Portable:
http://www.portableapps.com/apps/internet/librewolf-portable/
LibreWolf FAQ:
http://librewolf.net/docs/faq/
See WINDOWS7.TXT (this file) or go to:
http://www.mdgx.com/7.php
http://www.mdgx.com/WINDOWS7.TXT
-> "Internet + Web Browsers Tweaks, Fixes + Tools" chapter
http://www.mdgx.com/7.php#:~:text=Internet%20%2B%20Web%20Browsers%20Tweaks%2C%20Fixes%20%2B%20Tools%20%5BChromium%2FChrome%2C%20Firefox
-> "* Firefox : " section for more Firefox tips, downloads + links.
http://www.mdgx.com/7.php#:~:text=%2A%20Firefox%3A
MDGx "@ Firefox/TOR Browser/Mercury/Waterfox/Pale Moon/LibreWolf Privacy, Safety + Security Settings, Extensions, Guides +
Solutions:" topic in SOFTWARE.TXT (included):
http://www.mdgx.com/nettoys.htm#PSF
MDGx collection of essential Firefox/Mozilla add-ons + tweaks -> "FIREFOX" section in TOOLS.TXT (included):
http://www.mdgx.com/tools.php#:~:text=FIREFOX%20%5B%2A%5D
http://www.mdgx.com/TOOLS.TXT

* Internet Explorer (IE) web browser [discontinued from all NEWer Windows 10/2016/2019 builds/editions/releases/updates!]:
**************************************************************************************************************************
See MDGx "Internet Explorer (IE) 4/5/6/7/8/9/10/11 Essential FREE Fixes + Updates" chapter in SOFTWARE.TXT (included):
http://www.mdgx.com/ietoy.htm
R.I.P. Internet Explorer... :-)
http://www.cnn.com/2022/06/18/asia/internet-explorer-gravestone-viral-south-korea-intl-hnk/
RECOMMENDED:
************
Install an independent/3rd party free, open source, safe, secure, uncrippled, unlocked, unrestricted, modern web browser
based on Chromium code with enhanced privacy, safety + security
http://www.mdgx.com/nettoys.htm#PRV
-> see "Free(ware) Windows 9x/NTx Web Browsers" chapter -> "Chromium + Chrome" section in SOFTWARE.TXT (included):
http://www.mdgx.com/nettoys.htm#CHR

* Replace obsolete default proprietary Internet Explorer (IE) search engine with a better, safer, more secure alternative,
with enhanced privacy, less hard-to-disable/hard-to-find/hidden, unwanted ad(vertisment)s/"offers", spyware, annoyances,
behind-your-back/disguised/forced/without your approval/consent/knowledge/permission data collection/logging,
telemetry/"phone home", surveillance, tracking (examples):
- Google:
http://www.google.com/
- Neocities Metasearch Aggregator + Redirector [random SearXNG instance/server]:
http://searx.neocities.org/
- DuckDuckGo:
http://duckduckgo.com/
- Brave:
http://search.brave.com/
- Startpage:
http://www.startpage.com/
- Qwant:
http://www.qwant.com/
- More examples -> MDGx "100+ WWW (World Wide Web) Search Engines" [most have enhanced privacy, safety + security]:
http://www.mdgx.com/links.htm#WSE
+ make it the default:
http://www.itstillworks.com/change-bing-google-12283088.html
http://smallbusiness.chron.com/change-bing-google-70809.html
http://www.howtogeek.com/709072/how-to-switch-to-duckduckgo-a-private-search-engine/
http://www.howtogeek.com/710128/what-is-duckduckgo-meet-the-google-alternative-for-privacy/
In this example I have selected Neocities [http://searx.neocities.org/] as default search engine. You can change to any
other according to your needs/preferences -> see MDGx "100+ WWW (World Wide Web) Search Engines" [most have enhanced
privacy, safety + security]:
http://www.mdgx.com/links.htm#WSE
Obsolete Method:
****************
Start button/icon/logo/menu/orb -> Control Panel (CP) OR Run... [hold WinKey + press R] -> type this command:
control.exe
-> press Enter -> Internet (Explorer) Options (Properties) [inetcpl.cpl] -> Programs tab -> Manage Add-ons button ->
highlight Search Providers left side item -> Find more search providers link (URL) [ DISCONTINUED ! -> redirects to MS Edge
web page :-(]:
http://www.iegallery.com/
which redirects to [ DISCONTINUED ! -> redirects to MS Edge web page :-(]:
http://www.microsoft.com/iegallery/
-> new Internet Explorer (IE) browser window opens -> Add (click) link below Google logo (example) -> back to Programs tab
-> Manage Add-ons window -> highlight Search Providers left side item -> highlight Google right side item -> Set default
button -> highlight all other right side items except Google (if any) 1 at a time -> Remove button for each one -> confirm
deletion of each item -> check Prevent programs from suggesting changes to my default search provider box -> Close button.
Working Method:
***************
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
; Neocities random SearXNG Metasearch Aggregator + Redirector [http://searx.neocities.org/] used in this example:
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main]
"Default_Search_URL"="http://searx.neocities.org/"
"Default_Page_URL"="http://searx.neocities.org/"
"Start Page"="http://searx.neocities.org/"
"Search Page"="http://searx.neocities.org/"
"First Home Page"="http://searx.neocities.org/"
[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main]
"Default_Search_URL"="http://searx.neocities.org/"
"Default_Page_URL"="http://searx.neocities.org/"
"Start Page"="http://searx.neocities.org/"
"Search Page"="http://searx.neocities.org/"
"First Home Page"="http://searx.neocities.org/"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Internet Explorer\Main]
"Default_Search_URL"="http://searx.neocities.org/"
"Default_Page_URL"="http://searx.neocities.org/"
"Start Page"="http://searx.neocities.org/"
"Search Page"="http://searx.neocities.org/"
"First Home Page"="http://searx.neocities.org/"
;
------End cut & paste here------
More info -> all these MDGx topics (further below):
All these WWW (World Wide Web) search engines, some of whom have by default/preconfigured/preinstalled/out-of-the-box
enhanced anonymity/pseudonymity, privacy, safety + security features/functions/properties/protocols (further below):
- "@ Google search, (geo)location tracking, data, history, e-mail (Gmail), notifications + apps:"
- "@ YouTube (YT) [videos hosted by Google]:"
- "@ Bing Search, Live, Microsoft, MSN + Related/Shared Accounts, Services + Apps [owned by Microsoft]:"
- "@ Yahoo! (Y!) Search, Yahoo! Mail + Yahoo! News:"
- "@ DuckDuckGo (DDG) Search, Privacy Essentials + E-mail Protection:"
- "@ SearXNG Metasearch:"
- "@ SearX Metasearch:"
- "@ Startpage Search + Privacy Protection Add-on + Extension:"
- "@ Brave Search:"
- "@ Qwant Search:"
from the "Digital + Internet/Online Privacy, Safety + Security" chapter in WINDOWS7.TXT (this file):
http://www.mdgx.com/7.php#:~:text=Digital%20%2B%20Internet%2FOnline%20Privacy%2C%20Safety%20%2B%20Security%20%3D%20Your%20Top%20Priority
See also MDGx "100+ WWW (World Wide Web) Search Engines" [most have enhanced privacy, safety + security]:
http://www.mdgx.com/links.htm#WSE

* Flash [discontinued!]:
http://www.mdgx.com/nettoys.htm#SHFL
Flash STAND ALONE:
http://adobe-flash-player.apponic.com/11.2.202.235-141412/
All major web browsers blocked Flash -> Unblock Flash:
http://windowsreport.com/adobe-flash-content-was-blocked/
MUST UNcheck ALL McAfee/Symantec boxes B4 installing Flash !!!
Flash Player STAND ALONE:
http://fpdownload.macromedia.com/pub/flashplayer/updaters/30/flashplayer_30_sa.exe
Flash Player DEBUG STAND ALONE:
http://fpdownload.macromedia.com/pub/flashplayer/updaters/30/flashplayer_30_sa_debug.exe
Flash PepperFlash (PPAPI) for Chromium/Chrome STAND ALONE:
http://fpdownload.macromedia.com/pub/labs/flashruntimes/flashplayer/install_flash_player_ppapi.exe
Flash PepperFlash (PPAPI) for Chromium/Chrome STAND ALONE PORTABLE:
http://sourceforge.net/projects/thumbapps/files/Utilities/Adobe%20Flash%20Player/
http://effect8.ru/soft/media/adobe-flash-player-portable.html
Flash Netscape Plug-in (NPAPI) for Firefox STAND ALONE:
http://fpdownload.macromedia.com/pub/labs/flashruntimes/flashplayer/install_flash_player.exe
Flash ActiveX (AX) for Internet Explorer (IE) STAND ALONE:
http://fpdownload.macromedia.com/pub/labs/flashruntimes/flashplayer/install_flash_player_ax.exe
=> Flash SETUP ONLY:
http://get.adobe.com/flashplayer/
http://get.adobe.com/flashplayer/update/ppapi/
http://get.adobe.com/flashplayer/update/plugin/
http://get.adobe.com/flashplayer/otherversions/
MUST UNcheck ALL McAfee/Symantec boxes B4 installing Flash !!!
Flash PepperFlash (PPAPI) for Chromium/Chrome SETUP ONLY:
http://get.adobe.com/flashplayer/?fpchrome
http://admdownload.adobe.com/bin/live/flashplayer30pp_xa_install.exe
Flash Netscape Plug-in (NPAPI) for Firefox SETUP ONLY:
http://admdownload.adobe.com/bin/live/flashplayer30_xa_install.exe
Flash ActiveX (AX) for Internet Explorer (IE) SETUP ONLY:
http://admdownload.adobe.com/bin/live/flashplayer30ax_xa_install.exe
Internet Explorer 11.0 (IE11) Flash ActiveX (AX) 32-bit + 64-bit for Windows 8/8.1 32-bit + 64-bit:
http://helpx.adobe.com/flash-player/kb/flash-player-issues-windows-8.html
http://support.microsoft.com/help/4048951/
- IE11 Flash ActiveX (AX) 32-bit:
http://go.microsoft.com/fwlink/?linkid=328650
- IE11 Flash ActiveX (AX) 64-bit:
http://go.microsoft.com/fwlink/?linkid=328651
=> OLD Flash:
http://helpx.adobe.com/flash-player/kb/archived-flash-player-versions.html
http://www.filehippo.com/download_flashplayer/
http://www.oldapps.com/flash_player.php
Flash PepperFlash (PPAPI) for Chromium/Chrome Online Settings:
http://www.macromedia.com/support/documentation/en/flashplayer/help/settings_manager02.html
Chromium/Chrome Flash Help:
http://support.google.com/chrome/answer/6258784/
Use Flash with Chromium/Chrome:
http://helpx.adobe.com/flash-player/kb/flash-player-chromium.html
Install Flash Player Help:
http://helpx.adobe.com/flash-player.html

* Flash Player Stand Alone [discontinued!]:
Before installing OLDer Flash Player -> uninstall Flash Player (if any) -> restart/reboot.
Uninstall Flash Plug-in + ActiveX Control for Internet Explorer (IE):
http://www.adobe.com/?id=tn_14157
http://web.archive.org/web/20070503030542/http://www.adobe.com/cfusion/knowledgebase/index.cfm?id=tn_14157
If Flash Player for Internet Explorer (IE) installed -> you canNOT install OLDer versions.
Install OLDer Flash Player for Internet Explorer (IE):
http://helpx.adobe.com/flash-player/kb/install-earlier-flash-player-version.html
Flash Players 11.2.202.235 32-bit for Windows XP/2003/Vista/2008/7:
- Standalone: flashplayer11_2r202_235_win_sa_32bit.exe
- Internet Explorer: flashplayer11_2r202_235_winax_32bit.exe
- Internet Explorer: flashplayer11_2r202_235_winax_32bit.msi
- Netscape: flashplayer11_2r202_235_win_32bit.exe
- Netscape: flashplayer11_2r202_235_win_32bit.msi
- Uninstaller: uninstall_flashplayer11_2r202_235_win_32bit.exe
Flash Players 11.2.202.235 64-bit for Windows XP/2003/Vista/2008/7:
- Internet Explorer: flashplayer11_2r202_235_winax_64bit.exe
- Internet Explorer: flashplayer11_2r202_235_winax_64bit.msi
- Netscape: flashplayer11_2r202_235_win_64bit.exe
- Netscape: flashplayer11_2r202_235_win_64bit.msi
- Uninstaller: uninstall_flashplayer11_2r202_235_win_64bit.exe

* Flash Players + Savers/Downloaders [discontinued!]:
http://www.mdgx.com/nettoys.htm#FPSD
SWF Guide + Tools:
http://www.lifewire.com/swf-file-4138363/
SWF Tools: EXE to SWF Extractor:
http://swftools.sourceforge.net/exe-to-swf.html
File:
http://sourceforge.net/projects/swftools/files/eXe_To_SwF/eXeToSwF_Latest.zip
SWF Tools: SWF to EXE Converter:
http://swftools.sourceforge.net/swf-to-exe.html
File:
http://sourceforge.net/projects/swftools/files/SwF_To_eXe/Swf2eXe_Latest.zip
SWF Tools include Flash Player Projector Standalone 11.4.402.278 32-bit.
SWF -> EXE = Flash Player Projector Standalone 11.2.202.235 32-bit:
http://junebeetle.github.io/converter/executables/
File:
http://fpdownload.macromedia.com/get/flashplayer/installers/archive/fp_11.2.202.235_archive.zip
EXE -> SWF:
http://www.northcode.com/blog/Extract-SWF-files-from-Flash-Executables/
File:
http://www.northcode.com/free/exe2swf/exe2swf.exe
FLV Extract GUI (FLVExtract.exe) + command line (FLVExtractCL.exe) 32-bit tools:
http://www.moitah.net/
File:
http://www.moitah.net/download/latest/FLV_Extract.zip
SWFTools command line conversion, extraction + management SWF tools:
http://www.swftools.org/download.html

* Shockwave [discontinued!]:
http://www.mdgx.com/nettoys.htm#SHFL
http://codecpack.co/download/Shockwave_Player.html
Shockwave 32-bit Web Player + Plug-ins for Windows XP/newer + Apple, Google, Microsoft, Mozilla, Netscape + Opera 32-bit web
browsers:
- Shockwave SLIM:
http://fpdownload.macromedia.com/get/shockwave/default/english/win95nt/latest/Shockwave_Installer_Slim.exe
- Shockwave FULL [attempts to install ADWARE/SHAREWARE/TRIALWARE!]:
http://fpdownload.macromedia.com/get/shockwave/default/english/win95nt/latest/Shockwave_Installer_Full.exe
- Shockwave FULL for Internet Explorer (IE) [attempts to install ADWARE/SHAREWARE/TRIALWARE!]:
http://fpdownload.macromedia.com/get/shockwave/default/english/win95nt/latest/sw_lic_full_installer.msi
OLD Shockwave Versions:
http://www.filehippo.com/download_shockwave/
http://www.oldapps.com/shockwave.php

* Silverlight [discontinued!]:
http://www.mdgx.com/nettoys.htm#SVL

* CleanIETempFiles (CleanIETempFiles.exe) 32-bit command line tool deletes Internet Explorer (IE) 7/newer Cookies, History +
Temporary Internet Files (TIF):
http://blogs.msmvps.com/danielmartin/2011/03/11/191-c-243-mo-automatizar-la-eliminaci-243-n-de-temporales-de-internet-explorer/
File:
http://www.mdgx.com/files/CITF.ZIP
Executable [only]:
http://raw.githubusercontent.com/gliheng/Blackhole/master/data/bin/CleanIETempFiles.exe
Syntax (case insensitive):
-q	runs silent (Quiet = Q)
-c	deletes Cookies (C)
-h	deletes browsing History (H)
-t	deletes Temporary Internet Files (TIF = T)
Command line (example):
CleanIETempFiles.exe -c -h -t -q

* IEWebGL Plug-in for Internet Explorer (IE) 6/7/8/9/10:
http://github.com/iewebgl/iewebgl/
File:
http://raw.githubusercontent.com/iewebgl/iewebgl/master/WebSite2.0/Releases/iewebgl.exe
http://github.com/iewebgl/iewebgl/blob/master/WebSite2.0/Releases/iewebgl.exe?raw=true
http://github.com/iewebgl/iewebgl/blob/master/WebSite2.0/Releases/iewebgl.cab?raw=true
http://github.com/iewebgl/iewebgl/archive/master.zip
NOTE:
Internet Explorer (IE) 11 has WebGL code built-in and does NOT need IEWebGL!

* Best Free Wi-Fi Network Tools:
http://www.techsupportalert.com/best-free-wi-fi-network-finder-utility.htm

* NetworkInterfacesView 32-bit + 64-bit:
http://www.nirsoft.net/utils/network_interfaces.html
- NetworkInterfacesView 32-bit:
http://www.nirsoft.net/utils/networkinterfacesview.zip
- NetworkInterfacesView 64-bit:
http://www.nirsoft.net/utils/networkinterfacesview-x64.zip

* inSSIDer Wi-Fi network stats, benchmark, signal strength + security audit tool:
http://www.techspot.com/downloads/5936-inssider.html
File:
http://files01.tchspt.com/temp/inSSIDer-installer.msi

* NetSurveyor Wi-Fi 802.11 network stats, optimization + monitoring tool:
http://www.nutsaboutnets.com/netsurveyor-wifi-scanner/
File:
http://nutsaboutnets-downloads.s3.amazonaws.com/NetSurveyor-Setup.exe

* Wireless Network Watcher (WNetWatcher) 32-bit detects all network/internet connected devices:
http://www.nirsoft.net/utils/wireless_network_watcher.html
File:
http://www.nirsoft.net/utils/wnetwatcher.zip
Improve Your Wireless Network Performance Guide:
http://www.majorgeeks.com/content/page/how_to_improve_your_wireless_network_performance.html
______________________________________________________________________________



Digital + Internet/Online Privacy, Safety + Security = Your Top Priority
http://www.mdgx.com/7.php#:~:text=Digital%20%2B%20Internet%2FOnline%20Privacy%2C%20Safety%20%2B%20Security%20%3D%20Your%20Top%20Priority



* Know Your Rights + Protect Yourself/Yourselves = Basic education for all netizens/cybercitizens in the digital age:
*********************************************************************************************************************
General Information, Guidance, Solutions...

@ For everybody no matter where you live:
*****************************************
FYI [For Your Information]:
Wikipedia articles are available in many languages:
http://www.wikipedia.org/
List of Wikipedias by language group:
http://meta.wikimedia.org/wiki/List_of_Wikipedias_by_language_group
Translate this
http://www.mdgx.com/7.php
http://www.mdgx.com/WINDOWS7.TXT
http://www.mdgx.com/WINDOWS7.pdf
into your language [copy & paste 1 of the links above in the left side box]:
http://translate.google.com/
MDGx "Text/HTML/DOC/WWW Translation Engines":
http://www.mdgx.com/links.htm#TTE
*****************************************
- Wikipedia: Digital Privacy:
http://en.wikipedia.org/wiki/Digital_privacy
- Wikipedia: Personal Identifiable Information (Data):
http://en.wikipedia.org/wiki/Personal_data
- Wikipedia: Internet (Online) (data, digital, individual/personal, information) Privacy:
http://en.wikipedia.org/wiki/Internet_privacy
- Wikipedia: Information (Data) Privacy + Privacy Protection Legislation:
http://en.wikipedia.org/wiki/Information_privacy
- Wikipedia: Information (Data) Privacy -> all categories:
http://en.wikipedia.org/wiki/Category:Information_privacy
- Wikipedia: Privacy Laws:
http://en.wikipedia.org/wiki/Privacy_law
- Wikipedia: Information (Data) privacy laws:
http://en.wikipedia.org/wiki/Information_privacy_law
- Wikipedia: Net Neutrality:
http://en.wikipedia.org/wiki/Net_neutrality
- Wikipedia: Search Engine Privacy:
http://en.wikipedia.org/wiki/Search_engine_privacy
- Wikipedia: Privacy focused Search Engines + Web Browsers:
http://en.wikipedia.org/wiki/Internet_privacy#Privacy_focused_search_engines/browsers
- Wikipedia: Privacy concerns with social networking services (social media):
http://en.wikipedia.org/wiki/Privacy_concerns_with_social_networking_services
- Wikipedia: Internet (Online) privacy -> all categories:
http://en.wikipedia.org/wiki/Category:Internet_privacy
- Wikipedia: Internet (Online) (cyber, electronic, online) Safety:
http://en.wikipedia.org/wiki/Internet_safety
- Wikipedia: Internet (Online) Safety -> all categories:
http://en.wikipedia.org/wiki/Category:Internet_safety
- Wikipedia: Computer (cyber, data, digital, information, internet/online) Security:
http://en.wikipedia.org/wiki/Computer_security
- Wikipedia: Information Security (InfoSec):
http://en.wikipedia.org/wiki/Information_security
- Wikipedia: Data Security:
http://en.wikipedia.org/wiki/Data_security
- Wikipedia: Internet (Online) Security:
http://en.wikipedia.org/wiki/Internet_security
- Wikipedia: Computer Security -> all categories:
http://en.wikipedia.org/wiki/Category:Computer_security
- Common Types of Malicious Cyberattacks, Frauds, Hacks, Scams:
http://www.crowdstrike.com/cybersecurity-101/cyberattacks/most-common-types-of-cyberattacks/
- Wikipedia: Types of Cyberattacks, Frauds, Hacks, Scams -> all categories:
http://en.wikipedia.org/wiki/Category:Types_of_cyberattacks
- Wikipedia: Cyberattack:
http://en.wikipedia.org/wiki/Cyberattack
- Wikipedia: Internet (Online) Fraud:
http://en.wikipedia.org/wiki/Internet_fraud
- Wikipedia: Ad Fraud:
http://en.wikipedia.org/wiki/Ad_fraud
- Wikipedia: Click Fraud:
http://en.wikipedia.org/wiki/Click_fraud
- Wikipedia: Cyberbullying:
http://en.wikipedia.org/wiki/Cyberbullying
- Wikipedia: Cyberstalking:
http://en.wikipedia.org/wiki/Cyberstalking
- Wikipedia: Racism on The Internet (Online) (Cyber Racism):
http://en.wikipedia.org/wiki/Racism_on_the_Internet
- Wikipedia: Identity fraud:
http://en.wikipedia.org/wiki/Identity_fraud
- Wikipedia: Identity theft:
http://en.wikipedia.org/wiki/Identity_theft
- ZDNet: Cybersecurity 101: Protect your privacy from hackers, spies + the government:
http://www.zdnet.com/article/online-security-101-how-to-protect-your-privacy-from-hackers-spies-and-the-government/
Recognize, Avoid + Protect against Digital, Computer, E-mail, Internet, Online Breaches, Fraud, Hacks, Phishing, Scams:
- Avast: What Is A Scam: The Essential Guide to Staying Scam-Free:
http://www.avast.com/c-scam/
- Fortinet: Internet Fraud:
http://www.fortinet.com/resources/cyberglossary/internet-fraud/
- CISA (Cybersecurity and Infrastructure Security Agency) [U.S.A.]: Recognizing and Avoiding Email Scams [PDF]:
http://www.cisa.gov/uscert/sites/default/files/publications/emailscams_0905.pdf
- FTC (Federal Trade Commission) - Consumer Advice [U.S.A.]: How to Recognize and Avoid Phishing Scams:
http://consumer.ftc.gov/articles/how-recognize-and-avoid-phishing-scams/
- FTC (Federal Trade Commission) - Consumer Advice [U.S.A.]: How Websites and Apps Collect and Use Your Information:
http://consumer.ftc.gov/articles/how-protect-your-privacy-online/
- NPR (National Public Radio) [U.S.A.]: Your Technology Is Tracking You. Take These Steps For Better Online Privacy:
http://www.npr.org/2020/10/09/922262686/
- Bitdefender: How to Protect Your Online Privacy:
http://www.bitdefender.com/cyberpedia/how-to-protect-online-privacy/
- SafeWise: Internet Safety: How to Avoid Online Scams:
http://www.safewise.com/blog/internet-safety-avoid-online-scams/
- HowStuffWorks: How to Detect Online Scams:
http://electronics.howstuffworks.com/how-to-tech/how-to-detect-online-scams.htm
- TechTarget: Wireless Security: WEP, WPA, WPA2 + WPA3 differences:
http://www.techtarget.com/searchnetworking/feature/Wireless-encryption-basics-Understanding-WEP-WPA-and-WPA2/
- GlobalSign: Best Practices for Wireless Network Security:
http://www.globalsign.com/en/blog/12-best-practices-wireless-network-security/
- CISA (Cybersecurity and Infrastructure Security Agency) [U.S.A.]: Securing Wireless Networks:
http://www.cisa.gov/news-events/news/securing-wireless-networks/
- Wikipedia: Cybersecurity information technology list:
http://en.wikipedia.org/wiki/Cybersecurity_information_technology_list
- Wikipedia: Category: Internet (Online) Security:
http://en.wikipedia.org/wiki/Category:Internet_security
- IETF (Internet Engineering Task Force): Internet Security Glossary:
http://datatracker.ietf.org/doc/html/rfc4949/
- NIST (National Institute of Standards and Technology) - CSRC (Computer Security Resource Center) [U.S.A.]: Cybersecurity
+ Digital/Online Privacy Glossary:
http://csrc.nist.gov/glossary/

@ For all who live in the United States of America (U.S.A.) states + territories:
*********************************************************************************
- Personal Identifiable Information (Data) in the United States:
http://en.wikipedia.org/wiki/Personal_data#United_States
- Internet (Online) Privacy in the United States:
http://en.wikipedia.org/wiki/Internet_privacy#Internet_privacy_in_the_United_States
- Privacy Laws in the United States:
http://en.wikipedia.org/wiki/Privacy_laws_of_the_United_States
- Information privacy laws in the United States:
http://en.wikipedia.org/wiki/Information_privacy_law#United_States
- Net Neutrality in the United States:
http://en.wikipedia.org/wiki/Net_neutrality_in_the_United_States
http://www.mdgx.com/4net.htm
- Internet privacy laws: how your personal information is protected online:
http://legal.thomsonreuters.com/en/insights/articles/how-your-personal-information-is-protected-online/
- Wikipedia: Federal Trade Commission Act (FTCA):
http://en.wikipedia.org/wiki/Federal_Trade_Commission_Act_of_1914
- Wikipedia: Electronic Communications Privacy Act (ECPA):
http://en.wikipedia.org/wiki/Electronic_Communications_Privacy_Act
- Wikipedia: Computer Fraud and Abuse Act (CFAA):
https://en.wikipedia.org/wiki/Computer_Fraud_and_Abuse_Act
- Wikipedia: Children's Online Privacy Protection Act (COPPA):
http://en.wikipedia.org/wiki/Children%27s_Online_Privacy_Protection_Act
- Wikipedia: Controlling the Assault of Non-Solicited Pornography and Marketing Act (CAN-SPAM):
http://en.wikipedia.org/wiki/CAN-SPAM_Act_of_2003
- Wikipedia: Financial Services Modernization Act (GLBA):
http://en.wikipedia.org/wiki/Gramm%E2%80%93Leach%E2%80%93Bliley_Act
- Wikipedia: Fair and Accurate Credit Transactions Act (FACTA):
http://en.wikipedia.org/wiki/Fair_and_Accurate_Credit_Transactions_Act
- Wikipedia: California Consumer Privacy Act (CCPA):
http://en.wikipedia.org/wiki/California_Consumer_Privacy_Act
- American Data and Privacy Protection Act (ADPPA) [future law]:
http://arstechnica.com/tech-policy/2022/08/data-privacy-bill-would-give-you-more-control-over-info-collected-about-you/

@ English [EN] = For all who live in the European Union (E.U.) countries, nations, sovereignties, states + territories:
@ Ceština [CS]: Pro všechny, kterí žijí v zemích, suverenity + území Evropské Unie (E.U.):
@ Dansk [DA]: For alle, der bor i den Europæiske Unions (E.U.) lande, suveræniteter + territorier:
@ Deutsch [DE] = Für alle in den ländern, souveränitäten + territorien der Europäischen Union (E.U.):
@ Elliniká [EL]: Gia ólous ósoi zoun se chóres, kyriarchíes + edáfi tis Evropaïkís Énosis (E.E.):
@ Español [ES] = Para todos que viven en los países, soberanías + territorios de la Unión Europea (U.E.):
@ Français [FR] = Pour tous ceux qui vivent dans les pays, souverainetés + territoires de l'Union Européenne (U.E.):
@ Italiano [IT] = Per tutti che vivono nei paesi, sovranità + territori dell'Unione Europea (U.E.):
@ Nederlands [NL]: Voor iedereen die in de landen, soevereiniteiten + territoria van de Europese Unie (E.U.) woont:
@ Polski [PL]: Dla wszystkich, którzy mieszkaja w krajach, suwerennosci + terytoria Unii Europejskiej (U.E.):
@ Português [PT]: Para todos os que vivem nos países, soberanias + territórios da União Europeia (U.E.):
@ Româna [RO]: Pentru toti cei care locuiesc în tarile, suveranitatile + teritoriile Uniunii Europene (U.E.):
@ Svenska [SW]: För alla som bor i EU:s (E.U.) länder, suveräniteter + territorier:
http://en.wikipedia.org/wiki/European_Union#Member_states
http://en.wikipedia.org/wiki/Languages_of_the_European_Union#Official_EU_languages
***********************************************************************************************************************
FYI [For Your Information]:
Wikipedia articles are available in many languages:
http://www.wikipedia.org/
List of Wikipedias by language group:
http://meta.wikimedia.org/wiki/List_of_Wikipedias_by_language_group
Translate this
http://www.mdgx.com/7.php
http://www.mdgx.com/WINDOWS7.TXT
http://www.mdgx.com/WINDOWS7.pdf
into your language [copy & paste 1 of the links above in the left side box]:
http://translate.google.com/
MDGx "Text/HTML/DOC/WWW Translation Engines":
http://www.mdgx.com/links.htm#TTE
*****************************************
- Personal Identifiable Information (Data) in the European Union:
http://en.wikipedia.org/wiki/Personal_data#European_Union
- Internet (Online) Privacy in the European Union:
http://en.wikipedia.org/wiki/Internet_privacy#European_General_Data_protection_regulation
- Privacy Laws in the European Union:
http://en.wikipedia.org/wiki/Privacy_law#European_Union_(EU)
- Information privacy laws in the European Union:
http://en.wikipedia.org/wiki/Information_privacy_law#Europe
- Net Neutrality in the European Union:
http://en.wikipedia.org/wiki/Net_neutrality_in_the_European_Union
- Data protection + online privacy:
http://europa.eu/youreurope/citizens/consumers/internet-telecoms/data-protection-online-privacy/index_en.htm
- Data protection laws + rules:
http://ec.europa.eu/info/law/law-topic/data-protection/eu-data-protection-rules_en/
http://ec.europa.eu/info/law/law-topic/data-protection_en/
- General Data Protection Regulation (GDPR):
http://en.wikipedia.org/wiki/General_Data_Protection_Regulation
http://gdpr-info.eu/
- Data Protection Directive (DPD):
http://en.wikipedia.org/wiki/Data_Protection_Directive
http://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A31995L0046
- Google Translate:
http://translate.gogle.com/
- MDGx: "Text/HTML/DOC/WWW Translation Engines":
http://www.mdgx.com/links.htm#TTE

* E-mail, Accounts, Internet, Online Passwords:
***********************************************
Find out if your digital, internet/online accounts, blogs, forums, social media, alerts, apps, e-mails, enrollments,
memberships, subscriptions, etc credentials, passwords/passcodes/passkeys/passphrases/pins/secure/secret
codes/phrases/questions/(key)words have been breached/hacked/leaked, learn how to create better/stronger ones + how to
encrypt/protect your e-mails/messages:
http://www.geckoandfly.com/32570/
- gHacks: The Ultimate Online Privacy Test Resource List:
http://www.ghacks.net/2015/12/28/the-ultimate-online-privacy-test-resource-list/
- E-mail IP Leak:
http://emailipleak.com/
- E-mail Privacy Tester:
http://emailprivacytester.com/
- E-mail Trace:
http://www.ip-adress.com/trace_email/
- Has/Have My E-mail(s) Been Pwned?:
http://haveibeenpwned.com/
- Has/Have My Password(s) Been Pwned?:
http://haveibeenpwned.com/Passwords/
- LeakedSource = scan your e-mail(s) for breach(es):
http://www.leakedsource.com/
- Data Breach Check:
http://whatismyipaddress.com/breach-check/
- Avast Hack Check = scan your e-mail(s) password(s) for leak(s):
http://www.avast.com/hackcheck/
- Has your password leaked?:
http://cybernews.com/password-leak-check/
- How-To Geek: Strong [hard to crack] Passwords Guide:
http://www.howtogeek.com/195430/how-to-create-a-strong-password-and-remember-it/
- EFF (Electronic Frontier Foundation) SSD: Creating Strong Passwords:
http://ssd.eff.org/module/creating-strong-passwords/
- Privacy Guides: Introduction to Passwords:
http://www.privacyguides.org/basics/passwords-overview/
- ScamAdviser: Everything about Digital/Online Scams, Spam, Fakes, Fraud, Phishing, Theft:
http://www.scamadviser.com/
- Media Smarts [Canada]: Cyber Security: Spam, Scams, Frauds + Identity Theft:
http://mediasmarts.ca/digital-media-literacy/digital-issues/cyber-security/cyber-security-spam-scams-frauds-identity-theft/
- Investopedia: Watch Out for Internet Scams:
http://www.investopedia.com/articles/personal-finance/040115/watch-out-these-top-internet-scams.asp
- WebRoot: E-mail Phishing, Vishing & Other Types of Attacks:
http://www.webroot.com/us/en/resources/tips-articles/what-is-phishing/
- FTC (Federal Trade Commission) [U.S.A.]: Detect, Recognize + Avoid (E-mail) Phishing Scams:
http://consumer.ftc.gov/articles/how-recognize-and-avoid-phishing-scams/
- CISA (Cybersecurity and Infrastructure Security Agency) [U.S.A.]: Recognizing + Avoiding (E-mail) Scams [PDF]:
http://www.cisa.gov/sites/default/files/publications/emailscams_0905.pdf
- IT Governance [U.K.]: Detect Phishing E-mails:
http://www.itgovernance.co.uk/blog/5-ways-to-detect-a-phishing-email/
- Skipser: Why You Should Be Careful Clicking The Unsubscribe Button:
http://www.skipser.com/p/2/p/careful-while-unsubscribing-from-mailing-lists.html
- Privacy Guides: E-mail Security:
http://www.privacyguides.org/basics/email-security/
- How-To Geek: Best Free Ways to Send Encrypted E-mail + Secure Messages:
http://www.howtogeek.com/135638/the-best-free-ways-to-send-encrypted-email-and-secure-messages/
- Guru99: Best Free Secure (Encrypted) E-mail Account Providers:
http://www.guru99.com/secure-email-service-provider.html
- Encrypt E-mail Messages in Gmail, Yahoo, Outlook, iCloud + Your Device(s):
http://clean.email/blog/email-security/how-to-encrypt-email/
http://cybernews.com/secure-email-providers/how-to-encrypt-email/
http://www.cloudwards.net/how-to-encrypt-your-emails/
- TerraNova Security: Keep Social Media Passwords Secure:
http://terranovasecurity.com/how-to-create-a-strong-password-in-7-easy-steps/
- NirSoft: Windows, Windows Software + Online/Internet Password Recovery Tools [free(ware)]:
http://www.nirsoft.net/password_recovery_tools.html
- Major Geeks: Password Managers:
http://www.majorgeeks.com/files/categories/password_managers.html
- Wikipedia: Password strength:
http://en.wikipedia.org/wiki/Password_strength

* Malware, Virus + Spyware Scanning, Detection + Removal Info, Guides + Free(ware) Tools + FireWalls:
*****************************************************************************************************
- Wikipedia: Malware:
http://en.wikipedia.org/wiki/Malware
- Wikipedia: Spyware Removal:
http://en.wikipedia.org/wiki/Category:Spyware_removal
- Wikipedia: Anti-Virus Software:
http://en.wikipedia.org/wiki/Antivirus_software
- MDGx "Get Anti-Viral: Protect Yourself!" tools, guides + links:
http://www.mdgx.com/vir.htm
- MDGx "Get Anti-Viral = Protect Yourself !" -> "Free Online Malware + Spyware Scanners" section:
http://www.mdgx.com/vir.htm#SS
- MDGx "Get Anti-Viral = Protect Yourself !" -> "Free(ware) Anti-Virus Tools, Info + Links" section:
http://www.mdgx.com/vir.htm#TL
- MDGx "Get Anti-Viral = Protect Yourself !" -> "Free(ware) Anti-Virus Software for Windows NTx" section:
http://www.mdgx.com/vir.htm#AVS
- MDGx "Get Anti-Viral = Protect Yourself !" -> "Free(ware) Virus, Trojan, Worm, Rootkit + Malware Removal Tools" section:
http://www.mdgx.com/vir.htm#RMV
- MDGx "Free Online Privacy, Safety + Security Scanners":
http://www.mdgx.com/safety.htm
- STAY SAFE = Scan for viruses *all* files downloaded from the internet!:
http://www.mdgx.com/vir.htm#SS
- MDGx Beware of "False Positives" in FALSPOSI.TXT (included):
http://www.mdgx.com/fp.php
http://www.mdgx.com/FALSPOSI.TXT
- Wikipedia: Computer/Device/Portable fingerprint:
http://en.wikipedia.org/wiki/Device_fingerprint
- Wikipedia: Fingerprinting (computing):
http://en.wikipedia.org/wiki/Fingerprint_(computing)
- Wikipedia: FireWalls:
http://en.wikipedia.org/wiki/Firewall_(computing)
- Best free(ware) FireWalls for Windows NTx:
http://www.softwaretestinghelp.com/best-free-firewall/
http://www.lifewire.com/free-firewall-programs-4129270/
http://www.makeuseof.com/tag/free-firewalls-windows-compared/
- MDGx "FIREWALL" section in TOOLS.TXT (included):
http://www.mdgx.com/tools.php
http://www.mdgx.com/TOOLS.TXT
- MDGx "Free(ware) Windows 9x/NTx Firewalls, Anti-Spyware + Internet Monitors" chapter -> "Free(ware) Windows 9x/NTx
Anti-Spyware" section in SOFTWARE.TXT (included):
http://www.mdgx.com/fw.htm#ASP
- MDGx "Free(ware) Windows 9x/NTx Firewalls, Anti-Spyware + Internet Monitors" chapter -> "Free(ware) Windows 9x/NTx
Firewalls" section in SOFTWARE.TXT (included):
http://www.mdgx.com/fw.htm#FWL
- MDGx "HOSTS Files, Guides + Tools":
http://www.mdgx.com/hosts.php
Example of HOSTS file -> 10_BLOCK.TXT (included) -> "HOSTS" chapter [last 1 at the bottom]:
http://www.mdgx.com/10BLK/10_BLOCK.php#TXT

* Everything about HTTP/web/internet/browser Cookies:
*****************************************************
http://www.mdgx.com/7.php#:~:text=%2A%20Everything%20about%20HTTP%2Fweb%2Finternet%2Fbrowser%20Cookies%3A
- Privacy Policies: Browser Cookies: The Ultimate Guide:
http://www.privacypolicies.com/blog/browser-cookies-guide/
- HTML.com: Are You Using Cookies? This Ultimate Guide is for You:
http://html.com/resources/cookies-ultimate-guide/
- Cookie Central: What are cookies?:
http://www.cookiecentral.com/cm002.htm
- Cookie Central: The Unofficial Cookie FAQ:
http://www.cookiecentral.com/faq/
- Cookie Script: All You Need to Know About Third-Party Cookies:
http://cookie-script.com/all-you-need-to-know-about-third-party-cookies.html
- CookieYes: United States of America (U.S.A.) Cookie Laws:
http://www.cookieyes.com/knowledge-base/cookie-consent/are-there-cookie-laws-in-the-us/
- GDPR E.U.: European Union (E.U.) GDPR (General Data Protection Regulation) Cookie Law:
http://gdpr.eu/cookies/
- Vox: Why every website wants you to accept its cookies:
http://www.vox.com/recode/2019/12/10/18656519/
- Medium: Cookies Visualized: Everything you ever need to know about Web Cookies:
http://medium.com/from-the-scratch/cookies-visualized-c5f3b403dc65/
- FTC (Federal Trade Commission) [U.S.A.]: Internet Cookies:
http://www.ftc.gov/policy-notices/privacy-policy/internet-cookies/
- ProPrivacy: Block/Disable Cookies in all Web Browsers:
http://proprivacy.com/ruinmysearchhistory/how-to-block-cookies/
- How-To Geek: Block Third Party Cookies in Every Web Browser:
http://www.howtogeek.com/241006/how-to-block-third-party-cookies-in-every-web-browser/
- SlashGear: Block Cookie Banners On Every Website:
http://www.slashgear.com/1057908/
- Google Chromium/Chrome: Clear, Disable/Enable + Manage Cookies + 3rd party Cookies in Chromium/Chrome:
http://support.google.com/chrome/answer/95647/
- Google Chromium/Chrome: View, Edit + Delete Cookies:
http://developer.chrome.com/docs/devtools/storage/cookies/
- Mozilla Firefox: Cookies - Information that websites store on your computer:
http://support.mozilla.org/kb/cookies-information-websites-store-on-your-computer/
- Mozilla Firefox: Cookies and cache:
http://support.mozilla.org/products/firefox/protect-your-privacy/cookies/
- Mozilla Firefox: 3rd party Cookies and Firefox tracking protection:
http://support.mozilla.org/kb/third-party-cookies-firefox-tracking-protection/
- Microsoft Edge: Disable Cookies in Edge:
http://cookie-script.com/knowledge-base/disable-cookies-edge/
- Microsoft Edge: View, Edit + Delete Cookies:
http://learn.microsoft.com/microsoft-edge/devtools-guide-chromium/storage/cookies/
- Microsoft Internet Explorer (IE): Disable *All* Cookies (including 3rd party Cookies) in Internet Explorer (IE):
http://www.cookiesandyou.com/disable-cookies/windows/ie/
- Microsoft Internet Explorer (IE): Delete Cookie files in Internet Explorer (IE):
http://support.microsoft.com/topic/bca9446f-d873-78de-77ba-d42645fa52fc
- BrowserSpy: Cookie Information + Detect Cookies in Your Web Browser(s):
http://browserspy.dk/cookie.php
- CookieYes: Check Cookies in Your Web Browsers + on Your Devices Manually:
http://www.cookieyes.com/blog/how-to-check-cookies-on-your-website-manually/
- wikiHow: View Cookies in All Major Web Browsers:
http://www.wikihow.com/View-Cookies
- Google Account(s): Turn Cookies ON or OFF:
http://support.google.com/accounts/answer/61416/
- MakeUseOf (MUO): Supercookies (Evercookies): What Are Supercookies? Remove Them Properly:
http://www.makeuseof.com/tag/what-are-supercookies-and-why-are-they-dangerous/
- NordVPN: Supercookies (Evercookies): Definition + Removal:
http://nordvpn.com/blog/super-cookies-going-global/
- Mozilla Blog: Supercookies (Evercookies): Cookies + Supercookies Explained:
http://blog.mozilla.org/internet-culture/mozilla-explains-cookies-and-supercookies/
- CompariTech: Supercookies (Evercookies): Super Cookies + Remove Them:
http://www.comparitech.com/identity-theft-protection/supercookie/
- Cookie Law Info: Best free cookie checkers for websites:
http://www.cookielawinfo.com/free-cookie-checker-for-websites/
- ClearCookies BATch (.bat) file [ClearCookies.bat] deletes all stored cookies from most popular web browsers:
Chrome/Chromium, Firefox, Internet Explorer (IE), Opera, Safari:
http://github.com/CCrashZer0/ClearCookies/
File:
http://github.com/CCrashZer0/ClearCookies/blob/master/ClearCookies.bat
- CatOnMat: Batch files + command line tools to delete Cookies, Cache + History in all major web browsers:
http://www.catonmat.net/clear-privacy-ie-firefox-opera-chrome-safari/
- Wikipedia: HTTP/Web/Internet/Web Browser Cookies:
http://en.wikipedia.org/wiki/HTTP_cookie
- Wikipedia: Third (3rd) Party Cookies:
http://en.wikipedia.org/wiki/HTTP_cookie#Third-party_cookie
- Wikipedia: HTTP/Web/Internet/Web Browser Evercookies (Supercookies):
http://en.wikipedia.org/wiki/Evercookie

STRONGLY RECOMMENDED:
*********************
Enjoy your digital + internet/online live(s), protect your digital persona(s), enhance your online/personal privacy, safety,
security, avoid/block/disable/opt OUT of/stop/turn OFF dangerous/insecure/unsafe,
undesirable/unnecessary/unneeded/unused/useless,
behind-your-back/forced/disguised/hidden/intrusive/invasive/unauthorized/without your approval/consent/knowledge/permission,
annoying/bloat/resource consuming/wasting ad(vertisment)s/adware, cookies, hacking, phishing, viruses, malware, spyware,
surveillance, (geo)tracking, (diagnostic) tracking, telemetry ("phone home"), data/info collection/logging, (customer)
"experience", unwanted "offers", "promo(tion)s", "reminders", "suggestions", "trials", "updates", widgets in your Operating
System(s) [OSes], devices (phones, tablets, portables), e-mail, messaging, web browser(s) + online apps, chat rooms,
(social) media, forums, (web) sites, software, tools, games, enrollments, feeds, memberships, notifications, services,
subscriptions, etc.
Obviously, for-profit businesses want your money, and they'll do just about anything in order to get as much as possible.
That's why a lot of software/services advertisers/businesses/developers/manufacturers/vendors, even some of the ones you
think of as being dependable/reliable/trustworthy (attempt to) bundle, install, package and somehow sneak in annoying
bloatware, junk, unnecessary, unwanted, useless adware (advertisment banners, apps, pop-ups, scrollers, widgets), toolbars,
trackers, web browser add-ons, extensions (which constantly collect/harvest, track, and send your personal data, info,
history, preferences, search queries to their servers/sites/computers unauthorized, without your approval, consent,
knowledge or permission), crippled/limited features shareware/time limited/trial
apps/software/enrollments/memberships/services/subscriptions.
Here are a few things you can do to get rid of them effortlessly, in a nick of time, and they're all free... ;-/

* Web Browsers, Platforms, Computers + Devices Online Protection Guides + Tools for Privacy, Safety + Security:
***************************************************************************************************************
- MDGx: "100+ WWW (World Wide Web) Search Engines" [most have enhanced privacy, safety + security]:
http://www.mdgx.com/links.htm#WSE
- MDGx: "Anonymous + Faster Surfing":
http://www.mdgx.com/links.htm#ANO
- MDGx: "HOSTS Files, Guides + Tools":
http://www.mdgx.com/hosts.php
- MDGx: "Get Anti-Viral: Protect Yourself!" -> tools, guides + links:
http://www.mdgx.com/vir.htm
- MDGx: "Free(ware) Windows 9x/NTx Firewalls, Anti-Spyware + Internet Monitors" section in SOFTWARE.TXT (included):
http://www.mdgx.com/fw.htm
- FMHY: Ad Blockers, Anti-Virus, Privacy Tools, DNS, Proxies, VPNs, Encrypted E-mail, etc:
http://fmhy.pages.dev/adblockvpnguide/
- Cover Your Tracks (CYT) -> Test Your Web Browser(s):
http://coveryourtracks.eff.org/
- Simple Opt Out: From 100+ web sites who market, sell + share for profit your personal/private data/info:
http://simpleoptout.com/
- AdBlock Tester -> Test Your Web Browser(s):
http://adblock-tester.com/
- Test Ad Block -> Test Your Web Browser(s):
http://d3ward.github.io/toolz/adblock.html
- Can You Block It? Adblocker Test -> Test Your Web Browser(s):
https://canyoublockit.com/testing/
- AmIUnique: My browser fingerprint -> Test Your Web Browser(s):
http://amiunique.org/fingerprint/
- Device Info -> Test Your Web Browser(s):
http://www.deviceinfo.me/
- LocateJS: Check your location -> Test Your Web Browser(s):
http://locatejs.com/
- Gibson Research Corporation (GRC): DNS Nameserver Spoofability Test -> Test Your IP(s) in Your Web Browser(s):
http://www.grc.com/dns/dns.htm
- Cloudflare Browsing Experience Security Check: Secure DNS, DNSSEC, TLS + Secure SNI (Server Name Indication) [Encrypted
Client Hello (ECH)] -> Test Your Web Browser(s):
http://www.cloudflare.com/ssl/encrypted-sni/
- IPLeak: IP/DNS Detect -> Test Your Web Browser(s):
http://ipleak.net/
- WebRTC IP leaks -> Test Your Web Browser(s):
http://diafygi.github.io/webrtc-ips/
- TorZillaPrint (TZP) -> Test Your Web Browser(s) [requires Firefox/derivative/fork/variant 102/newer!]:
http://arkenfox.github.io/TZP/tzp.html
- Test Permission related UIs (User Interface) for web APIs (Application Programming Interface) -> Test Your Web Browser(s):
https://permission.site/
- BrowserLeaks: DNS (Domain Name System) Leak Test -> Test Your Web Browser(s):
http://browserleaks.com/dns/
- BrowserLeaks: Test Your Web Browser(s) for fingerprinting, geo(location), tracking, spying, spoofing, leaks, beacons,
auditing, scripting:
http://browserleaks.com/
- BrowserLeaks: Social Media Login Detection:
http://browserleaks.com/social/
- WebBrowserTools: Check online privacy, safety + security of your web browser(s):
http://webbrowsertools.com/
- Whoer: My IP, DNS Leak, Evercookie (Supercookie) + Port Scanner Tests:
http://whoer.net/
- Whoer: My IP Test:
http://whoer.net/
- Whoer: DNS Leak Test:
http://whoer.net/dns-leak-test/
- Whoer: Evercookie (Supercookie) Test:
http://whoer.net/evercookie/
- Whoer: Port Scanner:
http://whoer.net/port-scanner-online/
- PrivacyTests: Web Browsers Compared - Privacy Tests:
http://privacytests.org/
- Can I Use... Security Features [all web browsers]:
http://caniuse.com/?cats=Security
- How-To Geek: Optimize Chromium/Chrome for Maximum Privacy:
http://www.howtogeek.com/100361/how-to-optimize-google-chrome-for-maximum-privacy/
- Woolyss Chromium: Secure Preferences:
http://chromium.woolyss.com/#secure-preferences
- Woolyss Chromium: Privacy Guidelines:
http://chromium.woolyss.com/#privacy
- Privacy Tools: Best Privacy Web Browsers:
http://www.privacytools.io/private-browser/
- Privacy Tools: Best Privacy Web Browsers Add-ons + Extensions:
http://www.privacytools.io/privacy-browser-addons/
- Chromium/Chrome + Firefox Privacy Add-ons + Extensions:
http://wiki.archlinux.org/title/Browser_extensions#Privacy
- The Markup: Browsers, Extensions/Add-ons, Cookies, Tracking:
http://themarkup.org/ask-the-markup/2020/09/22/i-scanned-the-websites-i-visit-with-blacklight-and-its-horrifying-now-what/
- LifeWire: Browser Hijackers: Protect Yourselves:
http://www.lifewire.com/what-is-a-browser-hijacker-4777175/
- The Markup: High Privacy Cost of "Free" Websites:
http://themarkup.org/blacklight/2020/09/22/blacklight-tracking-advertisers-digital-privacy-sensitive-websites/
- Cover Your Tracks (CYT): Browsers, Trackers, Cookies, Fingerprinting:
http://coveryourtracks.eff.org/learn
- Cloudwards: Block Ads in Chromium/Chrome web browsers -> Ad-Free Browsing:
http://www.cloudwards.net/block-ads-on-chrome/
- GroovyPost: Block Ads in Firefox web browsers -> Ad-Free Browsing:
http://www.groovypost.com/howto/block-ads-in-firefox/
- Make Tech Easier (MTE): Social (3rd party/cross-site/external/federated/outsourced) Logins:
http://www.maketecheasier.com/are-social-logins-secure-private/
- Make Tech Easier (MTE): Strong Passwords:
http://www.maketecheasier.com/create-strong-password/
- Privacy Guides: Introduction to Passwords:
http://www.privacyguides.org/basics/passwords-overview/
- Privacy Guides: Common Threats:
http://www.privacyguides.org/basics/common-threats/
- Privacy Guides: Recommended Secure DNS (Domain Name System) Resolvers Providers:
http://www.privacyguides.org/dns/#recommended-providers
- MDGx: "Public Root DNS Servers" chapter in WINDOWS7.TXT (this file):
http://www.mdgx.com/7.php#:~:text=Public%20Root%20DNS%20Servers%20%5B%2A%5D
- ProPrivacy: The Ultimate Online Privacy Guide:
http://proprivacy.com/guides/the-ultimate-privacy-guide/
- Privacy Tools: Privacy Tools Software Alternatives and Encryption:
http://www.privacytools.io/
- Prism Break: Anti-Surveillance Hardware + Software [free(ware) + open source]:
http://prism-break.org/
- gHacks: The Ultimate Online Privacy Test Resource List:
http://www.ghacks.net/2015/12/28/the-ultimate-online-privacy-test-resource-list/
- MakeUseOf (MUO): Online Security Guide: 100+ Tips to Stay Safe Against Malware + Scams:
http://www.makeuseof.com/tag/online-security-tips/
- Global Privacy Control (GPC):
http://globalprivacycontrol.org/
- Privacy Guides: Privacy Tools [free(ware) + open source]:
http://www.privacyguides.org/tools/
- Spread Privacy: Protect your Privacy on your Devices:
http://spreadprivacy.com/tag/device-privacy-tips/
- Spread Privacy: Privacy Crash Course:
http://spreadprivacy.com/tag/privacy-newsletter/
- Techlore: Spreading privacy & security to the masses:
http://techlore.tech/
- EFF (Electronic Frontier Foundation): HTTPS Is Actually Everywhere:
http://www.eff.org/deeplinks/2021/09/https-actually-everywhere/
- EFF (Electronic Frontier Foundation): Do Not Track (DNT):
http://www.eff.org/issues/do-not-track/
- EFF (Electronic Frontier Foundation): Surveillance Self-Defense (SSD):
http://ssd.eff.org/
- EFF (Electronic Frontier Foundation) SSD: Fingerprinting Explained:
http://ssd.eff.org/module/what-fingerprinting/
- TOR Project Blog: Web Browser Fingerprinting: Introduction + Challenges:
http://blog.torproject.org/browser-fingerprinting-introduction-and-challenges-ahead/
- Firefox + Chromium compared: (In)Security Features:
http://madaidans-insecurities.github.io/firefox-chromium.html
- Wikipedia: Web Browser fingerprint:
http://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint
- Wikipedia: Fingerprinting (computing):
http://en.wikipedia.org/wiki/Fingerprint_(computing)
- Wikipedia: Web Browser sniffing:
http://en.wikipedia.org/wiki/Browser_sniffing
- Wikipedia: Web Browser user agent:
http://en.wikipedia.org/wiki/User_agent
- Turn OFF *all* Apps, Desktop, Platform + Web Push Notifications in web browsers:
Chromium/Chrome:
http://support.google.com/chrome/answer/3220216/
Firefox:
http://support.mozilla.org/kb/push-notifications-firefox/
Safari:
http://support.apple.com/guide/safari/customize-website-notifications-sfri40734/mac/
Edge:
http://blogs.windows.com/msedgedev/2016/05/16/web-notifications-microsoft-edge/
- Firefox privacy and security features:
http://support.mozilla.org/kb/firefox-privacy-and-security-features/
- Privacy and security settings:
http://support.mozilla.org/products/firefox/privacy-and-security/
- Protect your privacy:
http://support.mozilla.org/products/firefox/protect-your-privacy/
- "Private Browsing" (Incognito Mode) - Use Firefox without saving history:
http://support.mozilla.org/kb/private-browsing-use-firefox-without-history/
- Cookies and cache:
http://support.mozilla.org/products/firefox/protect-your-privacy/cookies/
- 3rd party Cookies and Firefox tracking protection:
http://support.mozilla.org/kb/third-party-cookies-firefox-tracking-protection/
- Firefox built-in Phishing and Malware Protection:
http://www.mozilla.org/firefox/phishing-protection/
- Change/Set Windows 10/11 default web browser to other than Edge [or Internet Explorer (IE)]:
http://www.avg.com/en/signal/set-your-default-browser/
- Make Chromium/Chrome your default web browser in Windows 10/11:
http://support.google.com/chrome/answer/95417/
- Make Firefox your default web browser in Windows 10/11:
http://support.mozilla.org/kb/how-change-your-default-browser-firefox-windows/
- Make Chromium/Chrome or alternative/derivative/fork/variant your default web browser in Windows 8/8.1:
http://www.solveyourtech.com/set-google-chrome-as-the-default-browser-in-windows-8/
- Make Firefox or alternative/derivative/fork/variant your default web browser in Windows 8/8.1:
http://support.mozilla.org/kb/setting-firefox-default-browser-does-not-work/
- Change/Set Windows 7 default web browser to Chromium/Chrome or Firefox:
http://www.groovypost.com/howto/change-default-browser-windows-7/
- Turn ON the Do Not Track (DNT) feature:
http://dnt.mozilla.org/
- Turn ON Global Privacy Control (GPC) in Firefox:
http://blog.mozilla.org/netpolicy/2021/10/28/implementing-global-privacy-control/
-> Global Privacy Control (GPC):
http://globalprivacycontrol.org/
- Best ad blockers:
http://addons.mozilla.org/blog/whats-the-best-ad-blocker-for-you/
- Best anti-trackers:
http://addons.mozilla.org/blog/top-anti-tracking-extensions/
- Enhanced Tracking Protection in Firefox for Desktop:
http://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop/
- Privacy & Security:
http://blog.mozilla.org/category/privacy-security/
- Mozilla Security:
http://www.mozilla.org/security/
- Startpage: Set up your Android for Privacy:
http://www.startpage.com/privacy-please/privacy-guides/how-to-set-up-your-android-for-privacy/
- Privacy Guides: Android OS, Settings + Apps:
http://www.privacyguides.org/android/
- ComputerWorld: The ultimate guide to privacy on Android:
http://www.computerworld.com/article/3545530/
- chrizel: iOS Security and Privacy Guide:
http://github.com/chrizel/iOS-Security-and-Privacy-Guide/
- Defending Digital: Apple iOS Security and Privacy Guide (for iPhone and iPad):
http://defendingdigital.com/apple-ios-security-privacy-guide/
- Smishing (cellular/mobile device SMS/text messaging phishing) + Defend Against It:
http://usa.kaspersky.com/resource-center/threats/what-is-smishing-and-how-to-defend-against-it/
- The Register: Kill Google AMP (Accelerated Mobile Pages) before it kills the web:
http://www.theregister.com/2017/05/19/open_source_insider_google_amp_bad_bad_bad/
- Wikipedia: Accelerated Mobile Pages (AMP):
http://en.wikipedia.org/wiki/Accelerated_Mobile_Pages
- Navigate the Tnternet using a VPN (Virtual Private Network):
http://cybernews.com/how-to-use-vpn/
- VPN Guide:
http://www.security.org/vpn/
- Complete VPN Beginner Guide:
http://www.privacyaffairs.com/beginners-guide-to-vpn/
- VPN Overview:
http://www.privacyguides.org/basics/vpn-overview/
- VPNs + VPN Providers for Consumers:
http://vpnoverview.com/vpn-information/what-is-a-vpn/
- Everything You Need to Know about VPNs:
http://restoreprivacy.com/vpn/
- Best Free VPN Providers:
http://vpnoverview.com/best-vpn/free-vpn/
- Best free VPN services:
http://www.tomsguide.com/best-picks/best-free-vpn/
- Best free VPNs:
http://www.techradar.com/vpn/best-free-vpn/
- Best free VPN list + some you should definitely avoid:
http://proprivacy.com/vpn/comparison/free-vpn-services/
- Free Public VPN Relay Servers:
http://www.vpngate.net/
- Best Pay-For VPN Services: 10+ All-Purpose Providers [monthly fees!]:
http://www.cloudwards.net/best-vpn/
- Cloudflare WARP Desktop client 64-bit for Windows 8.1/newer 64-bit (x64) [free Virtual Private Network (VPN) using public
root Domain Name System (DNS) servers]:
http://1.1.1.1/
Cloudflare WARP for Windows:
http://developers.cloudflare.com/warp-client/get-started/windows/
Cloudflare WARP for Linux:
http://developers.cloudflare.com/warp-client/get-started/linux/
Cloudflare WARP for macOS:
http://developers.cloudflare.com/warp-client/get-started/macos/
Cloudflare WARP for Android:
http://developers.cloudflare.com/warp-client/get-started/android/
Cloudflare WARP for iOS:
http://developers.cloudflare.com/warp-client/get-started/ios/
Use Cloudflare WARP VPN in combination with WireGuard:
http://www.andryou.com/2020/03/28/guide-using-cloudflares-warp-vpn-on-a-computer-mac-pc-linux/
WireGuard VPN (free, open source):
http://www.wireguard.com/
BrowserLeaks: DNS (Domain Name System) Leak Test:
http://browserleaks.com/dns/
Wikipedia: Virtual Private Network (VPN):
http://en.wikipedia.org/wiki/Virtual_private_network
Wikipedia: Domain Name System (DNS):
http://en.wikipedia.org/wiki/Domain_Name_System
- OpenVPN Cloud, Access Server + Connect client Virtual Private Network (VPN) system provides secure point-to-point or
site-to-site concurrent connections using OpenSSL (Secure Sockets Layer) encryption + Transport Layer Security (TLS)
protocol, highly customizable:
http://openvpn.net/
Free subscriptions for personal use = limited to:
- OpenVPN Cloud = maximum 3 concurrent connections.
- Access Server = maximum 2 concurrent connections.
Repository:
http://github.com/OpenVPN/openvpn/
OpenVPN Connect client 32-bit + 64-bit for Windows 7/newer 32-bit (x86) + 64-bit (x64) [MSI Installer]:
http://openvpn.net/client-connect-vpn-for-windows/
OpenVPN FAQs:
http://openvpn.net/vpn-server-resources/#faqs
OpenVPN Online Documentation:
http://openvpn.net/vpn-server-resources/
Wikipedia: Virtual Private Network (VPN):
http://en.wikipedia.org/wiki/Virtual_private_network
Wikipedia: OpenSSL:
http://en.wikipedia.org/wiki/OpenSSL
Wikipedia: Secure Sockets Layer (SSL):
http://en.wikipedia.org/wiki/Transport_Layer_Security#SSL_1.0,_2.0,_and_3.0
Wikipedia: Transport Layer Security (TLS):
http://en.wikipedia.org/wiki/Transport_Layer_Security
- Portmaster Free 64-bit for Windows 7/newer 64-bit (x64) port manager, firewall, filter, secure DNS, blocker, network
monitor, highly customizable:
http://safing.io/
File [Setup only!]:
http://updates.safing.io/latest/windows_amd64/packages/portmaster-installer.exe
Windows 7 64-bit (x64) requires Microsoft Security Monthly Quality Rollup (SMQR) KB4503292:
http://catalog.s.download.windowsupdate.com/d/msdownload/update/software/secu/2019/06/windows6.1-kb4503292-x64_a35bb4ea16d1d529fde9abfe8a0c16e9061f74cd.msu
More info @ MSKB:
http://support.microsoft.com/help/4503292/
Portmaster Documentation:
http://docs.safing.io/
Community Wiki:
http://wiki.safing.io/
- Pi-hole DOS console command line installer [PH4WSL1.cmd] for Windows 10/newer installs Linux Pi-hole DNS sinkhole on
Windows computers, highly customizable:
http://github.com/DesktopECHO/Pi-Hole-for-WSL1/
Download:
http://github.com/DesktopECHO/Pi-Hole-for-WSL1/raw/master/PH4WSL1.cmd
PH4WSL1.cmd install guide step-by-step:
http://www.reddit.com/r/pihole/comments/j39drp/
PH4WSL1.cmd ReadMe guide:
http://github.com/DesktopECHO/Pi-Hole-for-WSL1/#readme
Pi-hole DNS sinkhole for Linux:
http://github.com/pi-hole/pi-hole/
Pi-hole Blocklists:
http://firebog.net/
http://arstech.net/pi-hole-blocking-lists-2023/
http://github.com/topics/pihole-blocklists/
http://github.com/hagezi/dns-blocklists/
http://github.com/jacklul/pihole-updatelists/
DNS sinkhole:
http://en.wikipedia.org/wiki/DNS_sinkhole
- DNSCrypt Proxy clients for Windows NTx 32-bit + 64-bit use encrypted DNS protocol to authenticate + anonymize two way
traffic between DNS client and DNSCrypt enabled DNS resolver, prevents DNS spoofing, DDoS attacks:
http://dnscrypt.info/
More Info:
http://www.dnscrypt.org/
DNSCrypt Proxy:
http://github.com/DNSCrypt/dnscrypt-proxy/
Download [ZIP -> Installer EXE]:
http://github.com/dnscrypt/dnscrypt-proxy/releases/latest/
DNSCrypt Documentation:
http://github.com/DNSCrypt/dnscrypt-proxy/wiki/
DNSCrypt Clients + DNSCrypt Servers:
http://dnscrypt.info/implementations/
DNSCrypt Clients:
http://www.dnscrypt.org/#dnscrypt-windows
DNSCrypt Public Root DNS Servers:
http://dnscrypt.info/public-servers/
DNSCrypt:
http://en.wikipedia.org/wiki/DNSCrypt
- Unbound 32-bit + 64-bit for Windows 7/newer 32-bit (x86) + 64-bit (x64) validating, recursive + caching DNS resolver,
supports IPv6 (Internet Protocol version 6), DNSSEC (Domain Name System Security Extensions), NSEC (Next Secure Record), DNS
over TLS (DoT) + DNS over HTTPS (DoH) encryption + protocols:
http://nlnetlabs.nl/projects/unbound/
Download [Portable ZIP]:
http://nlnetlabs.nl/projects/unbound/download/
Unbound Repository:
http://github.com/NLnetLabs/unbound/
Unbound Documentation:
http://unbound.docs.nlnetlabs.nl/
- Privoxy GUI interface + DOS console command line non-caching HTTP/web proxy with advanced filtering for enhanced privacy +
safety, highly customizable:
http://www.privoxy.org/
Repository:
http://sourceforge.net/projects/ijbswa/
Download:
http://www.privoxy.org/sf-download-mirror/Win32/
http://sourceforge.net/projects/ijbswa/files/Win32/
Privoxy FAQ:
http://www.privoxy.org/faq/
Privoxy Online Manual:
http://www.privoxy.org/user-manual/
Proxy server:
http://en.wikipedia.org/wiki/Proxy_server
- Privaxy 32-bit + 64-bit DOS console command line MITM (Man In The Middle) HTTP(S) low level incoming + outgoing tunnel
proxy ad(ware)/malware/spying/surveillance/tracking blocker/filter:
http://github.com/Barre/privaxy/
Download:
http://github.com/Barre/privaxy/releases/latest/
Proxy server:
http://en.wikipedia.org/wiki/Proxy_server
- PeerBlock [ UNMAINTAINED ! ] Portable 32-bit + 64-bit for Windows XP/newer personal firewall blocks/filters incoming +
outgoing dangerous/deceptive/insecure/invasive/intrusive/subversive/unsafe IPs + ports [IPv4 only] from frequently updated +
user customized lists of blacklisted ad(ware)/malware/spying/surveillance/tracking hosts/IPs:
http://www.peerblock.com/
Download [Portable ZIP]:
http://code.google.com/archive/p/peerblock/downloads/
PeerBlock 64-bit for Windows Vista/newer 64-bit (x64):
http://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/peerblock/PeerBlock_r693__x64_Release_(Vista).zip
PeerBlock 32-bit for Windows Vista/newer 32-bit (x86):
http://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/peerblock/PeerBlock_r693__Win32_Release_(Vista).zip
PeerBlock Repository:
http://code.google.com/archive/p/peerblock/
http://sourceforge.net/projects/peerblock/
http://github.com/PeerBlock/peerblock/
I-Blocklist lists of blacklisted IPs [frequently updated]:
http://www.iblocklist.com/lists
Blocklists + Filterlists:
http://github.com/badmojr/1Hosts/
http://filterlists.com/
http://github.com/yokoffing/filterlists/
PeerBlock @ Wikipedia:
http://en.wikipedia.org/wiki/PeerBlock
- FSF: Ethical Tech Guide -> Recommended Devices/Hardware, Apps/Software + Services/Subscriptions:
http://www.fsf.org/givingguide/
- MDGx "Public Root DNS Servers" chapter in WINDOWS7.TXT (this file):
http://www.mdgx.com/7.php#:~:text=Public%20Root%20DNS%20Servers%20%5B%2A%5D
- MDGx "Internet Power Toys [free(ware)]" chapter -> "Free(ware) Windows NTx Web Browsers" section in SOFTWARE.TXT
(included):
http://www.mdgx.com/nettoys.htm#NET
- MDGx "@ Chromium/Chrome/Brave/X-Chromium/Thorium/Vivaldi/Supermium Privacy, Safety + Security Settings, Extensions, Guides
+ Solutions:" topic in SOFTWARE.TXT (included):
http://www.mdgx.com/nettoys.htm#PRV
- MDGx "@ Firefox/TOR Browser/Mercury/Waterfox/Pale Moon/LibreWolf Privacy, Safety + Security Settings, Extensions, Guides +
Solutions:" topic in SOFTWARE.TXT (included):
http://www.mdgx.com/nettoys.htm#PSF
RECOMMENDED:
************

@ Chromium/Chrome web browsers + alternatives/derivatives/forks/variants [*]:
*****************************************************************************
http://www.mdgx.com/7.php#:~:text=%40%20Chromium%2FChrome%20web%20browsers%20%2B%20alternatives%2Fderivatives%2Fforks%2Fvariants%20%5B%2A%5D
- MDGx "Free(ware) Windows 9x/NTx Web Browsers" chapter -> "Chromium + Chrome web browsers [free(ware)]" section ->
"Chromium + Chrome" topic in SOFTWARE.TXT (included):
http://www.mdgx.com/nettoys.htm#CHR
- MDGx "@ Chromium/Chrome/Brave/X-Chromium/Thorium/Vivaldi/Supermium Privacy, Safety + Security Settings, Extensions, Guides
+ Solutions:" topic in SOFTWARE.TXT (included):
http://www.mdgx.com/nettoys.htm#PRV
- MDGx "Web Browsers Links: Web Browsers, Tools + Tips on the Internet" [mostly free(ware)] in SOFTWARE.TXT (included):
http://www.mdgx.com/nettoys.htm#NET
Step-by-step Guide:
*******************
01. Replace (if applicable) Google Chrome web browser with a Google free [stripped of Google
ad(ware)/tracking/spyware/surveillance apps, "features", scripts + code] Chromium or 3rd party/independent
alternative/derivative/fork/variant Chromium based web browser (free, open source):
http://www.mdgx.com/nettoys.htm#CHR
RECOMMENDED:
- Chromium Precompiled EXEcutable [Installer EXE + Portable Archives ZIP/7z] 32-bit + 64-bit for Windows XP/newer 32-bit
(x86) + 64-bit (x64):
http://chromium.woolyss.com/
Degoogled/Ungoogled/stripped of Google ad(ware)/integration/spyware/surveillance/tracking code Chromium builds [clearly
labeled]:
http://github.com/ungoogled-software/ungoogled-chromium/blob/master/README.md
http://ungoogled-software.github.io/ungoogled-chromium-wiki/faq
Ungoogled Chromium precompiled binaries 32-bit + 64-bit for Windows 7/newer 32-bit (x86) + 64-bit (x64) [75-125 MB,
Installer ONLY EXE + Portable ZIP, NEWest at the top]:
http://ungoogled-software.github.io/ungoogled-chromium-binaries/
Ungoogled Chromium 64-bit for Windows 7/newer 64-bit (x64):
http://ungoogled-software.github.io/ungoogled-chromium-binaries/releases/windows/64bit/
Ungoogled Chromium 32-bit for Windows 7/newer 32-bit (x86):
http://ungoogled-software.github.io/ungoogled-chromium-binaries/releases/windows/32bit/
- Brave 32-bit + 64-bit web browser for Windows 7/newer 32-bit (x86) + 64-bit (x64) based on Chromium code [fork] with
improved privacy, safety + security and optimized speed:
http://brave.com/
Brave Repository:
http://github.com/brave/brave-browser/
Download [ZIP = full, Portable]:
http://github.com/brave/brave-browser/releases/latest/
- Vivaldi 32-bit + 64-bit web browser for Windows 7/newer 32-bit (x86) + 64-bit (x64) based on Chromium code [fork] with
enhanced privacy, safety + security:
http://vivaldi.com/
Download [EXE = Installer ONLY]:
http://vivaldi.com/download/
Vivaldi Portable -> run Installer EXE -> Install standalone:
http://help.vivaldi.com/desktop/install-update/standalone-version-of-vivaldi/
- Thorium 32-bit + 64-bit web browsers for Windows 7/newer 32-bit (x86) + 64-bit (x64) based on Chromium code [fork]
hardware 3D, rendering + video playback optimized:
http://thorium.rocks/
Download [ZIP = full, Portable]:
Thorium AVX2 64-bit for Windows 10/newer 64-bit (x64):
http://github.com/Alex313031/Thorium-Win/releases/latest/
Thorium AVX 64-bit for Windows 10/newer 64-bit (x64):
http://github.com/Alex313031/Thorium-Win/releases/latest/
Thorium SS3 64-bit for Windows 10/newer 64-bit (x64):
http://github.com/Alex313031/Thorium-SSE3/releases/latest/
Thorium SSE2 (Win32) 32-bit edition for Windows 7/newer 32-bit (x86) + Thorium SSE3, SSE4, AVX + AVX2 64-bit editions for
Windows 7/newer 64-bit (x64):
http://github.com/Alex313031/thorium-win7/releases/latest/
Thorium Requirements:
- Multicore CPU: minimum Intel Core 2nd gen or AMD FX with built-in SSE4 (Streaming SIMD Extensions 4),
http://en.wikipedia.org/wiki/SSE4
AVX (Advanced Vector EXtensions)
http://en.wikipedia.org/wiki/Advanced_Vector_Extensions
+ AES (Advanced Encryption Standard)
http://en.wikipedia.org/wiki/Advanced_Encryption_Standard
enhancements/multimedia extensions/instructions.
- Graphics video controller with 3D rendering + OpenGL capabilities.
Required Windows 7 64-bit (x64) Updates for Thorium 64-bit web browser enhanced hardware + software compatibility/support:
http://thorium.rocks/win7
- Windows 7 SP1/2008 R2 64-bit (x64) Servicing Stack Update 2019 KB4490628:
http://support.microsoft.com/help/4490628/
Download:
http://catalog.update.microsoft.com/search.aspx?q=4490628+x64
- Windows 7 SP1/2008 R2 64-bit (x64) SHA-2 Code Signing Support Update 2019 KB4474419:
http://support.microsoft.com/help/4474419/
Download:
http://catalog.update.microsoft.com/search.aspx?q=4474419+x64
- Supermium 32-bit + 64-bit web browsers for Windows 7/newer 32-bit (x86) + 64-bit (x64) based on Chromium code [fork]
optimized for speed + performance:
http://www.win32subsystem.live/supermium.html
Download [EXE = full, Installer +/- ZIP = full, Portable]:
http://github.com/win32ss/supermium/releases/latest/
- X-Chromium (X-Launcher) Portable launcher:
http://www.winpenpack.com/en/download.php?view.1082
Download [EXE = Installer, full]:
http://sourceforge.net/projects/winpenpack/files/X-Chromium/releases/
Either install Chromium precompiled stable releases 32-bit or 64-bit:
http://chromium.woolyss.com/
or extract all files from portable archive [zip or 7z] + copy to the destination of your choice Chromium portable stable
releases 32-bit or 64-bit to match the Windows NTx [7/newer] operating system(s) [OS(es)]
build/edition/release/update/version + bit strength [32-bit (x86) or 64-bit (x64)] you are using.
02. All Chromium + Chrome alternatives/derivatives/forks/variants users must have these 3 Windows environment variables
listed below: run these commands from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD
shortcut/CMD.EXE -> Run as Administrator -> run these commands -> press Enter after each line:
SETX.EXE GOOGLE_API_KEY "NO" /M
SETX.EXE GOOGLE_DEFAULT_CLIENT_ID "NO" /M
SETX.EXE GOOGLE_DEFAULT_CLIENT_SECRET "NO" /M
to avoid any Google apps/code/scripts annoying errors/messages/pop-ups while running Chromium or Chromium
alternatives/derivatives/forks/variants.
Google API Keys:
http://chromium.woolyss.com/#google-api-keys
http://www.chromium.org/developers/how-tos/api-keys/
03. Use Chromium/Chrome or alternative/derivative/fork/variant "Incognito Mode" (Private Browsing) to avoid cookies,
(geo)location, personalized/targeted ad(vertisment)s/adware, phone-home, surveillance, tracking,
banned/blocked/forbidden/limited/restricted areas/content/features, privacy/safety/security exposure/invasion/intrusion,
annoyances:
http://support.google.com/chrome/answer/95464/
http://www.techtimes.com/articles/38718/20150310/
http://www.online-tech-tips.com/computer-tips/12-ways-to-get-past-a-paywall/
BEWARE:
*******
Google admitted (together with other for-profit companies) it does track users even in Incognito Mode:
http://arstechnica.com/tech-policy/2024/01/chrome-updates-incognito-warning-to-admit-google-tracks-users-in-private-mode/
That's why you need additional independent, reliable methods + solutions in order to increase personal privacy + safety
protection:
- See "@ Chromium/Chrome/Brave/X-Chromium/Thorium/Vivaldi/Supermium Privacy, Safety + Security Settings, Extensions, Guides
+ Solutions:" section in SOFTWARE.TXT (included):
http://www.mdgx.com/nettoys.htm#PRV
- See "3. Digital + Internet/Online Privacy, Safety + Security Guides, Solutions + Tools [free(ware)]:" section in
SOFTWARE.TXT (included):
http://www.mdgx.com/nettoys.htm#PSSGS
- See "- Internet/Online Privacy, Safety + Security Tools [free(ware)]:" topic in SOFTWARE.TXT (included):
http://www.mdgx.com/nettoys.htm#PSSTF
Chromium/Chrome -> right-click desired URL/URI address/item/link/scheme/shortcut -> select "Open link in incognito window".
Go to "Extensions":
chrome://extensions/
-> for each of your installed extensions listed on the Extensions page that block ad(vertisment)s, malware, spying,
tracking, and protect against security, safety + privacy breaches/hacks/intrusions/invasions [see
"@ Chromium/Chrome/Brave/X-Chromium/Thorium/Vivaldi/Supermium Privacy, Safety + Security Settings, Extensions, Guides +
Solutions:" section in SOFTWARE.TXT (included)
http://www.mdgx.com/nettoys.htm#PRV
-> click "Details" button -> turn ON/slide right "Allow in Incognito":
http://img.webnots.com/2021/08/Enable-Allow-In-Incognito-Mode.png
04. Turn ON (encrypted) Secure DNS, a.k.a. DoH [DNS over HTTPS (DoH)] for all your Chromium/Chrome web browser lookup
instances [if supported by both your web browser(s) and respective IP addresses]:
http://support.google.com/chrome/answer/10468685/
Go to Settings -> Privacy and security -> Security
chrome://settings/security/
-> scroll down to Advanced -> "Select DNS provider" (newer web browser versions) -> turn ON/slide right "Use secure DNS"
(older browser versions) -> select your active/current internet/intranet/network/wi-fi/wireless connection/service provider
(which needs to be preconfigured to use either their own, or a choice of secure public root DNS servers -> see "Public Root
DNS Servers" chapter in WINDOWS7.TXT (this file)],
http://www.mdgx.com/7.php#:~:text=Public%20Root%20DNS%20Servers%20%5B%2A%5D
or select a different available/custom/installed/preferred service provider or secure public root DNS servers (if available
and/or applicable) from the drop down menu.
Be aware that certain DNS providers may require obtaining security keys, a pin number, fingerprint(s) of your operating
system and/or app(s)/software/web browser, a phone number, QR code, which in turn may require opening an account, some kind
of enrollment, membership, subscription, and some of them are not free [may require a 1 time payment, or periodic
fees/payments], or/and may require disclosure of certain confidential/identifiable/personal/private/privileged
biometrics/data/fingerprint/information/stats, like your e-mail address, (cellular/mobile) phone number, etc.
Typical built-in Chromium/Chrome list of secure public root DNS servers you can choose from (not all of them, or different
ones are available depending on your web browser version, operating system, custom settings like a proxy or VPN
provider/server, type of connection, service provider, etc):
- Cloudflare (1.1.1.1);
- CleanBrowsing (Family Filter);
- Custom -> type in your preferred secure DNS server provider (valid, correctly formatted URL address) -> see "Public Root
DNS Servers" chapter further above in WINDOWS7.TXT (this file);
http://www.mdgx.com/7.php#:~:text=Public%20Root%20DNS%20Servers%20%5B%2A%5D
- Google (Public DNS);
- NextDNS;
- OpenDNS.
Go to "Async DNS resolver" [flags setting]:
chrome://flags/#enable-async-dns
-> Disabled -> relaunch/restart your web browser.
Go to "Use DNS https alpn" [flags setting]:
chrome://flags/#use-dns-https-svcb-alpn
-> Disabled -> relaunch/restart your web browser.
Go to "Encrypted ClientHello" (ECH) [flags setting]:
chrome://flags/#encrypted-client-hello
-> Disabled -> relaunch/restart your web browser.
CAUTION:
********
- In case ANY/ALL of these 3 settings above are Enabled -> Chromium/Chrome will (eventually) manage (in certain situations)
to bypass custom/installed/(pre)set (secure) public DNS servers configured by using "Use secure DNS" customized settings
(see above), or by using 3rd party DNS extensions/app(lication)s/providers/scripts/services, like public root DNS servers,
Cloudflare, DNSCrypt, Unbound, BlackFog, Pi-hole + other similar (secure) DNS (Domain Name System)/DoH (DNS over HTTPS)/DoT
(DNS over TLS) add-ons/app(lication)s/extentions/programs/providers/scripts/services/software/tools.
More info:
http://bugdrivendevelopment.net/browser-ignore-internal-dns/
http://serverfault.com/questions/1122251/
http://www.blackfog.com/knowledge-base/disable-async-dns-on-google-chrome-for-windows/
http://chasersystems.com/blog/disabling-encrypted-clienthello-in-google-chrome-and-why/
- In case you have checked/confirmed/verified with your authorized/official
account/e-mail/enrollment/membership/service/social media/subscription administrator/manager/provider/supervisor/vendor to
make sure your secure DNS (Domain Name System)/DoH (DNS over HTTPS)/DoT (DNS over TLS)
add-on/app(lication)/configuration/extention/feature/program/option/script/service/setting/software/tool functions/performs
adequately/properly + safely/securely with Google Chrome Encrypted ClientHello (ECH) turned ON -> go to "Encrypted
ClientHello" (ECH) [flags setting]:
chrome://flags/#encrypted-client-hello
-> Enabled -> relaunch/restart your web browser.
More info:
http://support.mozilla.org/kb/faq-encrypted-client-hello/
http://blog.cloudflare.com/announcing-encrypted-client-hello/
BEWARE:
*******
- Additional/extra/supplemental permissions/privileges/rights, change/elevation of level/status, and/or fees may apply/be
necessary/required -> check with your administrator/management/service provider/sysadmin/vendor for details.
- In case your computer/console/device/terminal, environment/operating system, internet/intranet/network connection and/or
web browser(s) are administered/managed externally/remotely, especially in business/educational/enterprise/public/work
environments, or in case Parental Controls are turned on, most likely you won't be able to use the built-in Secure DNS
feature.
- In case you are not able to use the built-in Secure DNS feature -> see "Public Root DNS Servers" chapter further above in
WINDOWS7.TXT (this file) in order to use other free/gratis available options, some of whom may require
administrator/management/sysadmin permissions/privileges/rights or change/elevation of level/status, depending on your
specific environment:
http://www.mdgx.com/7.php#:~:text=Public%20Root%20DNS%20Servers%20%5B%2A%5D
05. Log OFF/sign OUT of all Google Mail (Gmail)/Chromium/Chrome/Google/etc account(s) (if any + if more than 1):
http://support.google.com/chrome/answer/9159867/
Then turn OFF Chromium/Chrome sign-in:
http://support.google.com/chrome/answer/185277/
Then log ON/sign IN to your Google Mail (Gmail)/Chromium/Chrome/Google/etc account(s) 1 at a time (if any + if more than 1):
http://accounts.google.com/
06. Go to "Activity controls":
http://myactivity.google.com/activitycontrols
and then to "My Google Activity":
http://myactivity.google.com/
and then to "Other/More Activity":
http://myactivity.google.com/more-activity
and then to "Your data in Search" (Search Controls):
http://myaccount.google.com/yourdata/search
and then to "Chrome history":
http://myactivity.google.com/page?page=chrome
-> delete all activities + history items + lists.
More info:
http://www.alphr.com/delete-all-google-activity/
07. Go to "Results about you" [still in beta testing phase, final version to be made available soon]:
http://myactivity.google.com/results-about-you/
log in into your Gmail/Google account(s) [1 at a time if more than 1] -> Get started -> Next -> Next -> Find results about
you -> fill in all required personal contact info boxes to match your previous contact info (if any) -> Continue -> follow
guidelines in order to review found results + remove approved requests.
More details:
http://www.cnbc.com/2023/10/28/how-to-delete-private-information-from-google-search-results.html
http://bgr.com/tech/how-to-remove-your-personal-info-from-google-search-results/
http://www.wired.com/story/remove-personal-info-from-google-search-results/
In case there are any identifiable/personal/private biometrics/contact/content/data/fingerprint/information/search
results/stats/etc distributed/found/leaked/posted/published/shared/etc online, especially unauthorized/without your
approval/consent/knowledge/permission -> request to have them all deleted and removed from all Google + Alphabet 3rd party,
affiliates, apps, businesses, memberships, partners, products, services, sites, subscriptions, subsidiaries, etc:
http://support.google.com/websearch/answer/12719076/
Request to remove your personal information on Google:
http://support.google.com/websearch/troubleshooter/9685456/
Content removal form:
http://support.google.com/websearch/contact/content_removal_form/
Report child/minor sexual abuse content:
http://support.google.com/?visit_id=638267960047336280-4079233850/
Resources for removing explicit/intimate confidential/identifiable/personal/private/privileged images/photos/pictures:
http://support.google.com/websearch/answer/13650142/
Outdated content removal tool:
http://support.google.com/websearch/answer/6349986/
Refresh Outdated Content tool:
http://support.google.com/webmasters/answer/7041154/
Request a refresh of outdated content in Google Search:
http://search.google.com/search-console/remove-outdated-content
Removals + SafeSearch reports tool:
http://support.google.com/webmasters/answer/9689846/
Get Answers/Help from Google Search Help Community:
http://support.google.com/websearch/community/
Content removal options outside Google Search:
http://support.google.com/websearch/answer/13652412/
Personal Content and Product Policies + Removal Requirements:
http://support.google.com/websearch/troubleshooter/3111061/
More info:
http://www.usatoday.com/story/tech/2023/08/04/google-users-alerts-search-result/70530494007/
http://www.theverge.com/2023/8/3/23817797/
http://blog.google/products/search/new-privacy-tools/
08. Go to "Security":
http://myaccount.google.com/security
and make sure to configure/customize/manage carefully *all* choices/features/settings in order to protect your privacy,
safety + security. Examples:
- set up strong (hard to crack/guess/hack) passwords/passcodes/passkeys/passphrases/pins/secure/secret
codes/phrases/questions/(key)words (if/where applicable, available + possible) -> for details + more information see
"Digital + Internet/Online Privacy, Safety + Security" chapter -> "E-mail, Accounts, Internet, Online Passwords" section
(further above) in WINDOWS7.TXT (this file):
http://www.mdgx.com/7.php#:~:text=Digital%20%2B%20Internet%2FOnline%20Privacy%2C%20Safety%20%2B%20Security%20%3D%20Your%20Top%20Priority
- set up 2 step verification, a.k.a. 2 (two)/multi factor authentication (2FA, TFA) (if/where applicable + available) by
submitting either a recovery cellular/mobile phone number or a 2nd (backup) recovery e-mail address, or both (if/where
applicable + available);
- review your recent security activity, alerts, notifications (if any):
http://myaccount.google.com/notifications
and in case of *any* out of place, fraudulous, malicious, unauthorized, unknown access/login into your account(s), security
breaches, suspicions activity, alerts, notifications, warnings, etc you should report them to Google, or to the respective
authorized/official account/e-mail/enrollment/membership/service/social media/subscription
administrator(s)/manager(s)/provider(s) as soon as possible:
http://support.google.com/accounts/answer/140921/
http://support.google.com/mail/answer/8253/
In case *any* out of place, fraudulous, malicious, unauthorized, unknown access/login, security breach or suspicious
activity has been confirmed *immediately* take appropriate/necessary measures (if/where applicable, available + possible):
change all affected/exposed/hacked passwords/passcodes/passkeys/passphrases/pins/secure/secret
codes/phrases/questions/(key)words, notify respective account/e-mail/enrollment/membership/service/social media/subscription
administrator(s)/manager(s)/provider(s), fix/improve/repair/reset existing safety/security
configuration/features/options/settings, and eventually add more safety/security
configuration(s)/features/layers/options/settings, etc.
Important information + guidelines:
http://www.loginradius.com/blog/identity/what-to-do-when-email-hacked/
http://www.theguardian.com/technology/2014/feb/03/what-to-do-email-hacked-how-to-prevent/
http://consumer.ftc.gov/articles/how-recover-your-hacked-email-or-social-media-account/
09. [!] This requires you to be connected/logged on/signed in with (1 of) your Google Mail (Gmail)/Chromium/Chrome/Google
online account(s) (if more than 1) OR provide your computer/device authentication ID/PIN (if any): go to "Password Manager"
-> "Password Checkup":
chrome://password-manager/checkup/?start=true
-> "Checked passwords for ??? sites and apps" -> click "Try again" button.
Go to Password Manager "Settings":
chrome://password-manager/settings/
(1) In case you are using Windows 10/11 with biometric authentication fingerprint/iris feature activated/installed/turned
ON: turn ON/slide right "Use Windows Hello when filling passwords" ["If you share this device with others, you can turn on
Windows Hello to verify that it's you whenever you use a saved password"].
More info:
http://www.wisecleaner.com/think-tank/498-How-to-Protect-Your-Passwords-in-Google-Chrome-with-Windows-Hello.html
(2) In case you do not use Windows 10/11 and/or have not activated/installed/do not use biometric authentication
fingerprint/iris feature: turn OFF/slide left "Use Windows Hello when filling passwords" ["If you share this device with
others, you can turn on Windows Hello to verify that it's you whenever you use a saved password"].
Alternatively: go to Google Chromium/Chrome "Password Manager" web page:
http://passwords.google.com/intro
-> click/touch "Go to Password Checkup" link:
http://passwords.google.com/checkup/start
-> click/touch "Check Passwords" button.
You can also change/customize (same as from within your Chromium/Chrome web browser interface) several auto fill/sign in +
password options/settings:
http://passwords.google.com/options
-> "Offer to save passwords", "Auto sign-in", "Password alerts", "Export passwords", "Import passwords".
More info:
- Change unsafe passwords in your Google Mail (Gmail)/Chromium/Chrome/Google Account(s):
http://support.google.com/accounts/answer/9457609/
- Save, manage + protect your passwords:
http://support.google.com/accounts/answer/6208650/
- Manage passwords:
http://support.google.com/chrome/answer/95606/
- Generate a password:
http://support.google.com/chrome/answer/7570435/
- Show, edit, delete or export saved passwords [export to CSV (.csv) file format]:
http://support.google.com/chrome/answer/95606/#zippy=%2Cshow-edit-delete-or-export-saved-passwords
- Import passwords with Chromium/Chrome [import from CSV (.csv) file format]:
http://support.google.com/chrome/answer/13068232/
10. Go to "Location Sharing":
http://myaccount.google.com/locationsharing
and turn OFF/disable/stop sharing your real-time (geo)location with anyone/anything on Google, and do the same for all their
3rd party, affiliates, businesses, memberships, partners, products, services, sites, subscriptions, subsidiaries, etc (if
any).
That is *unless* any of your accounts, apps, connections, interactions, memberships, services, subscriptions, etc depend on
this setting being turned ON.
11. Go to "Data & privacy":
http://myaccount.google.com/data-and-privacy
-> turn OFF/disable/stop any/all sharing your confidential/identifiable/personal/private/privileged
biometrics/data/fingerprint/information/stats you deem necessary to keep confidential, exclusive, private, to
yourself/yourselves, and/or limit/restrict sharing only with your well-known/trusted family members, friends, co-workers,
entities, people, circles, groups, etc.
12. Go to "Emails from Google":
http://myaccount.google.com/communication-preferences
-> turn OFF/block/disable/opt OUT of/stop all e-mails, features, newsletters, notifications, product tips, promo(tion)s,
reminders, special offers, etc.
That is *unless* any of your accounts, apps, connections, interactions, memberships, notifications, services, subscriptions,
etc depend on this setting being turned ON.
13. Go to "Third-party apps & services":
http://myaccount.google.com/connections
-> turn OFF/disable/stop *any* accounts, apps, connections, enrollments, interactions, memberships, notifications, services,
subscriptions, etc that look/seem deceptive, fraudulous, malicious, out of place, suspicious, unauthorized, unknown,
unneeded, unnecessary, untrustworthy, etc, and make sure to report them to Google as soon as possible:
http://support.google.com/accounts/answer/140921/
http://support.google.com/mail/answer/8253/
14. UNcheck all boxes/buttons, turn/slide OFF all switches/sliders + clear/delete all history/activity for "All time", for
"Older than 3 months" (most recent available), and related to all ad(vertisment)s, tracking, (geo)location, history,
activity, etc (if + where available).
http://support.google.com/accounts/answer/7660719/
More info:
http://www.techjunkie.com/automatically-delete-chrome-history-exit/
15. Go to "Privacy and security" -> "Safety check":
chrome://settings/privacy/
-> "Privacy Guide" ["Review key privacy and security controls"] -> "A guide of your privacy choices" ["Take a guided tour of
key privacy and security controls. For more options, go to individual settings"]:
chrome://settings/privacy/guide/?step=welcome
-> Next -> "Choose your search and browsing quality":
chrome://settings/privacy/guide/?step=msbb
-> turn OFF/slide left "Make searches and browsing better" to block/disable/opt OUT of/stop auditing, fingerprinting,
(geo)location, personalized/targeted ad(vertisment)s/adware, phone-home, surveillance, tracking, privacy/safety/security
exposure/invasion/intrusion, annoyances: "You'll get improved suggestions in the address bar", "URLs you visit are sent to
Google to predict what sites you might visit next" + "If you also share Chromium/Chrome usage reports, those reports include
the URLs you visit".
Then go -> Next:
chrome://settings/privacy/guide/?step=safeBrowsing
-> select "Enhanced protection" OR "Standard protection" -> for each of these 2 choices click/drop down/touch the down arrow
next to each selection so you can see more details and make an informed decision to properly suit your privacy needs +
preferences, because "Enhanced protection" comes with certain compromises/concessions/trade-offs -> see "The downsides to
Enhanced Safe Browsing" chapter:
http://www.cnet.com/tech/services-and-software/chrome-toughest-browser-security-what-you-give-up-enhanced-safe-browsing-mode/
More info:
http://www.quora.com/Is-it-safe-to-enable-Enhanced-protection-in-Google-Chrome/
http://arstechnica.com/gadgets/2024/03/google-says-chromes-new-real-time-url-scanner-wont-invade-your-privacy/
http://www.wired.com/story/how-to-use-google-chrome-enhanced-safety-mode/
BEWARE:
*******
Turning ON "Enhanced protection" (see above) "Requires browsing data to be sent to Google." -> see this page for details:
http://support.google.com/accounts/answer/11577602/
Therefore if you are careful/concerned/conscientious/informed about your internet/online privacy, you may prefer to check
"Standard protection" box instead, and also turn OFF/slide left "Help improve security on the web for everyone", which
"Sends URLs of some pages you visit, limited system information, and some page content to Google, to help discover new
threats and protect everyone on the web".
http://support.google.com/chrome/answer/96817/
More info:
http://www.ghacks.net/2013/11/09/disable-privacy-sensitive-features-google-chrome/
FYI:
****
In this case I prefer "Standard protection", and in order to strengthen internet browsing privacy, safety + security without
making compromises/concessions/trade-offs, I use some of these "Essential Free
Chromium/Chrome/Brave/X-Chromium/Thorium/Vivaldi/Supermium Privacy, Safety + Security Extensions" in SOFTWARE.TXT
(included):
http://www.mdgx.com/nettoys.htm#PRV
and some of these "- Internet/Online Privacy, Safety + Security Tools [free(ware)]:" in SOFTWARE.TXT (included):
http://www.mdgx.com/nettoys.htm#PSSTF
Older web browser versions -> go to "Security":
chrome://settings/security/
-> "Safe Browsing" -> check "Enhanced protection" OR at least "Standard protection" box.
http://support.google.com/chrome/answer/9890866/
16. Go to Privacy and Security -> Advanced:
chrome://settings/security/
-> turn ON/slide right "Always use secure connections" ["Upgrade navigations to HTTPS and warn you before loading sites that
don't support it"]
http://www.eff.org/deeplinks/2021/09/https-actually-everywhere/
-> turn ON/slide right "Encrypt the names of sites that you visit" ["Use a secure Domain Name System (DNS) to prevent people
with access to your Internet traffic from seeing which sites you visit"] -> turn ON/slide right "Warn you if passwords are
exposed in a data breach" ["Chrome/Chromium periodically checks your passwords against lists that have been published
online. When doing this, your passwords and usernames are encrypted, so they can't be read by anyone, including Google"].
More info:
http://support.google.com/chrome/answer/10311524/
http://support.google.com/chrome/thread/23534509/
http://arstechnica.com/gadgets/2019/12/googles-password-checkup-goes-mainstream-is-built-into-chrome-79/
17. Newer Chromium/Chrome web browser versions: go to Privacy and Security -> "Ads privacy":
chrome://settings/adPrivacy/
-> "Ad topics":
chrome://settings/adPrivacy/interests/
-> turn OFF/slide left "Ad topics" ["Topics of interest are based on your recent browsing history and are used by sites to
show you personalized ads"].
Then go to Privacy and Security -> "Ad privacy" -> "Site-suggested ads":
chrome://settings/adPrivacy/sites/
-> turn OFF/slide left "Site-suggested ads" ["Sites you visit can determine what you like and then suggest ads as you
continue browsing Sites"].
Then go to Privacy and Security -> "Ad privacy" -> "Ad measurement":
chrome://settings/adPrivacy/measurement/
-> turn OFF/slide left "Ad measurement" ["Sites and advertisers can measure the performance of their ads"].
More info:
http://www.androidpolice.com/how-to-disable-google-chromes-targeted-ad-tracking/
http://support.google.com/chrome/answer/13355898/
18. Go to "Cookies and other site data" -> "General settings":
chrome://settings/cookies/
also (previously) available under "Choose your third-party cookie preferences" (depending on your web browser version):
chrome://settings/privacy/guide/?step=cookies
-> check "Block (all) third-party cookies" box -> check "Block third-party cookies in Incognito" box -> turn OFF/slide left
"Allow related sites to see your activity in the group" ["A company can define a group of sites that can use cookies to
share your activity in the group"] (newer browser versions) -> skip "Privacy Sandbox" (see further below for details) ->
press Done.
Turn ON/slide right "Clear cookies and site data when you close all windows", which is the safest choice, unless some of
your digital/online/internet/intranet/network accounts/e-mail/enrollments/memberships/services/social
media/subscriptions/etc function and/or require otherwise, and/or in order to provide continuity, ease of use + to save
time, so you don't have to log/sign back on/in every single time after you access
again/execute/(re)launch/(re)open/(re)start/(re)run your web browser(s).
More info:
http://support.google.com/chrome/answer/95647/
CAUTION:
********
"Clear cookies and site data when you close all windows" option [also available as "Cookies and site data" under "Clear
browsing data" -> chrome://settings/clearBrowserData/ -> see topic #39 further below] will automatically log you OFF
from/sign you OUT of *all* your accounts (in case using any) you are currently logged on/signed into which deliver/are
linked to/provide accounts, alerts, apps, e-mails, enrollments, feeds/RSS, forums, memberships, notifications, promo(tion)s,
reminders, services, social media, subscriptions, widgets, etc.
Consequently after deleting all stored cookies you will have to log/sign back in into *all* your online/internet accounts
separately, one at a time (if any + if more than 1).
19. Turn OFF Journeys (newer browser versions)
http://chromestory.com/2022/03/how-to-disable-google-chrome-journeys/
-> go to "History":
chrome://history/
-> click once "Turn off journeys" left hand side item -> it should change to "Turn on journeys" (leave it alone) -> go to:
chrome://flags/
-> in the Search box type [multiple flags settings]:
journeys
-> press Enter -> Disabled -> all listed "History Journeys ??????" + "Side panel Journeys (??????)" flags
instances/options/settings one at a time -> relaunch/restart your web browser for all changes to take effect.
After doing all this "Turn off (on) journeys" left hand side item mentioned above has disappeared from "History":
chrome://history/
20. Turn OFF/disable Sync for *all* your Chromium/Chrome (Google) account(s) (if any + if more than 1), apps, activity,
autofill, bookmarks, data/information, extensions, (activity, browsing, search) history, location/(geo)tracking, (open)
tabs, (stored) passwords, settings, themes, etc to stop backing up/keeping/sending/storing your
confidential/identifiable/personal/private/privileged biometrics/data/fingerprint/information/stats to Google, Alphabet,
and/or 3rd party/affiliates/associates/branches/brands/companies/divisions/entities/parents/partners/subsidiaries
(cloud/network/remote) domains/servers/sites [you *must* be already logged on/signed in into your Google account(s) in order
to get access to Google Sync]:
http://chrome.google.com/sync
More info:
http://support.google.com/chrome/answer/185277/
http://en.wikipedia.org/wiki/Google_Sync
21. Go to "Privacy Sandbox" [currently in testing phase (?)]:
chrome://settings/privacySandbox
-> turn OFF/slide left "Privacy Sandbox trial" (older browser versions) OR "Trials" (newer browser versions).
Go to "Privacy Sandbox Ads APIs" [flags setting]:
chrome://flags/#privacy-sandbox-ads-apis
-> Disabled -> go to (newer browser versions) "Third-party Cookie Phase Out Facilitated Testing" [flags setting]:
chrome://flags/#tpc-phase-out-facilitated-testing
-> Disabled -> go to (newer browser versions) "Third-party Cookie Deprecation Trial Grants for Testing" [flags setting]:
chrome://flags/#third-party-cookie-deprecation-trial
-> Disabled -> go to (newer browser versions) "Third-party Cookie Grants Heuristics Testing" [flags setting]:
chrome://flags/#tpcd-heuristics-grants
-> Disabled -> go to (newer browser versions) "Enable reporting of Cookie Issues for legacy technology report" [flags
setting]:
chrome://flags/#legacy-tech-report-enable-cookie-issue-reports
-> Disabled -> go to (newer browser versions) "Privacy Sandbox Enrollment Overrides" [flags setting]:
chrome://flags/#privacy-sandbox-enrollment-overrides
-> Disabled -> go to (older browser versions) "Third-Party Cookie Deprecation Metadata Grants for Testing" [flags setting]:
chrome://flags/#tpcd-metadata-grants
-> Disabled -> relaunch/restart your web browser for all changes to take effect.
More info:
http://developer.chrome.com/blog/cookie-countdown-2023oct/
http://github.com/amaliev/3pcd-exemption-heuristics/blob/main/explainer.md
http://developer.chrome.com/en/docs/privacy-sandbox/chrome-testing/
http://developers.google.com/privacy-sandbox/
BEWARE:
*******
Privacy Sandbox is just another behind-your-back, covert, deceiving, hidden, subversive Google ad(vertisment), spying,
surveillance, tracking platform disguised as a new privacy "feature", when in fact its actual purpose is to open up a new
"Pandora's Box" of 3rd party cookies replacement/workaround spying/surveillance/tracker system conceived by Google, and
already supported by over 500 [!] for-profit ad(vertising)/spying/surveillance/tracking companies, with Google's intention
of installing it soon [final stable phase] in all future Chromium/Chrome web browsers editions/releases/versions.
More info:
http://www.eff.org/deeplinks/2023/09/how-turn-googles-privacy-sandbox-ad-tracking-and-why-you-should/
http://theconversation.com/google-chrome-know-213150/
http://arstechnica.com/gadgets/2023/09/googles-widely-opposed-ad-platform-the-privacy-sandbox-launches-in-chrome/
http://gizmodo.com/1850812404/
http://www.engadget.com/google-antitrust-suit-amended-chrome-privacy-sandbox-texas-193709103.html
http://blog.lukaszolejnik.com/data-protection-assessment-of-privacy-sandboxs-protected-audience-api/
See also "* Everything about HTTP/web/internet/browser Cookies:" section further above in WINDOWS7.TXT (this file):
http://www.mdgx.com/7.php#:~:text=%2A%20Everything%20about%20HTTP%2Fweb%2Finternet%2Fbrowser%20Cookies%3A
22. Turn OFF/slide left "FLoC" (Federated Learning of Cohorts) (older browser versions).
http://lifehacker.com/1847276073/
http://en.wikipedia.org/wiki/Federated_Learning_of_Cohorts
FLoC was actually used by ad(vertising)/spying/surveillance/tracking for-profit industry in order to covertly bypass 3rd
party cookies:
http://www.eff.org/deeplinks/2021/03/googles-floc-terrible-idea/
Am I FLoCed? -> Test Your Web Browser(s):
http://amifloced.org/
Fortunately newer Chromium/Chrome web browser versions discontinued obsolete/unsuccessful FLoC technology, but unfortunately
Google is under way of replacing it with a new, not so obvious one, called Topics.
http://techcrunch.com/2022/01/25/google-kills-off-floc-replaces-it-with-topics/
23. Better safe than sorry... in order to prevent the risk of your confidential/identifiable/personal/private/privileged
biometrics/data/fingerprint/information/stats from being found/hacked/stolen, and eventually distributed, leaked, posted,
published, shared, sold: go to "Payment methods":
chrome://settings/payments
-> turn OFF/slide left "Save and fill payment methods" ["Fills in payment forms with your saved payment methods"] -> turn
OFF/slide left "Allow sites to check if you have payment methods saved" -> turn ON/slide right "Always verify when using
autofill" ["When turned off, you may be asked occasionally to verify for security purposes"] -> look below the "Add" button
-> in case you see any cards, credit or payment methods listed there -> for each of them (if more than 1) click vertical
ellipsis (3 vertical dots, older browser versions: 3 bars) on the right side -> Delete -> Delete -> repeat these steps for
all (if any) items on this list.
24. Go to "Ad personalization":
http://myadcenter.google.com/personalizationoff?sasb=true&ref=ad-settings
formerly available at
http://adssettings.google.com/authenticated
-> click "Turn OFF personalized ads" box at the bottom of the page [formerly "Ad personalization is ON"] to read "Turn ON
personalized ads" [formerly "Ad personalization is OFF"].
25. Go to "Your AdChoices" a.k.a. "DAA Webchoices Browser Check":
http://optout.aboutads.info/
[formerly linked at web page above as "Control ad personalization on other websites & apps that use Google ad services"].
In case right side "Third-Party Cookie Check" square box displays a red "X", and in case the long list of
ad(vertising)/adware/spying/surveillance/tracking for profit companies/web sites that need to be opted OUT of is absent ->
you're all set.
In case there is a long list of ad(vertising)/adware/surveillance/tracking for profit companies/web sites that need to be
opted OUT of: wait a few seconds for browser detection to complete [may take a while! :-(] -> 100%.
Under "Opt OUT?" click "select ALL" (top right), or click "OPT OUT OF ALL" (bottom of page).
Wait a few seconds for browser detection to complete [total 140+ opt-OUT requests! :-(] -> 100%.
Click "View Updated Results" -> make sure *all* boxes have been UNchecked + all items turned OFF.
26. Go to "Ad personalization" [formerly "My Ad Center"]:
http://myadcenter.google.com/
http://myadcenter.google.com/personalizationoff
formerly available at
http://adssettings.google.com/
-> Personalized ads -> turn OFF (top of page right side) OR Turn OFF personalized ads (bottom of page center).
Go to "My Google Activity":
http://myactivity.google.com/myactivity
-> Delete activity by (left side) -> select All time -> Delete button -> turn OFF *all* activities:
- Web & App [+ Search] Activity,
- Location History,
- YouTube History,
and all other activities/histories/logs/tracking (if + where available).
OR go to "Activity controls" (same 3 choices as above):
http://myactivity.google.com/activitycontrols
-> Web & App [+ Search] Activity
http://myactivity.google.com/activitycontrols/webandapp
-> turn OFF.
Also UNcheck these 2 boxes: "Include Chrome history and activity from sites, apps and devices that use Google services" +
"Include voice and audio activity".
27. Go to "Location History":
http://myactivity.google.com/activitycontrols?settings=location
-> turn OFF.
Go to "YouTube History":
http://myactivity.google.com/product/youtube/
-> turn OFF "Saving your YouTube history" -> should say "NOT saving your YouTube history".
Then go to "YouTube History" activity controls:
http://myactivity.google.com/activitycontrols?settings=youtube
-> turn OFF -> UNcheck these 2 boxes: "Include the YouTube videos you watch" + "Include your searches on YouTube".
More info:
http://support.google.com/youtube/answer/57711/
http://support.google.com/chrome/answer/185277/
Go to "Personalized ads on sites and apps that partner with Google":
http://adssettings.google.com/partnerads
-> expand (click down arrow) "Related Google Account settings" -> UNcheck "Also save data in your Google Account from sites
and apps that partner with Google" box.
28. Go to "Your ad choices":
http://www.youronlinechoices.com/uk/your-ad-choices/
Turn OFF *all* individual companies/entities/web sites listed on that web page (if any).
29. Go to "Google News Settings":
http://news.google.com/settings
-> turn OFF/clear/delete "Hidden sources".
Under "My activity" -> click "View" -> go to:
http://myactivity.google.com/product/news/controls/
-> delete all activities/histories/tracking -> UNcheck *all* "Subsettings": "Include Chrome history and activity from sites,
apps and devices that use Google services" + "Include voice and audio activity" -> turn OFF "Web & App Activity".
30. Click vertical ellipsis (3 vertical dots, older browser versions: 3 bars) Menu (Customize and control Chromium/Chrome)
at the top right corner or go to "Settings":
chrome://settings/
-> go to "You and Google" (newer browser versions) or "People" (older browser versions) -> "Sync and Google services" (newer
browser versions) or "Sync" (older browser versions):
chrome://settings/syncSetup/
-> turn OFF/slide left "On - sync everything" (or similar, and if available).
NOTE:
*****
Sync, Password Checkup + as well as most all other Google related/partner/specific
add-ons/apps/enrollments/features/memberships/notifications/services/subscriptions require you to be connected/logged
on/signed in with (1 of) your Google Mail (Gmail)/Chromium/Chrome/Google online account(s) (if more than 1).
Many Chromium alternatives/derivatives/forks/variants (based on Chromium code) web browser(s) do *NOT* have Google API Keys
built-in!
Google API Keys:
http://chromium.woolyss.com/#google-api-keys
http://www.chromium.org/developers/how-tos/api-keys/
Under "Other Google services" turn OFF/slide left *all* available items (depending on your browser version): "Allow
Chromium/Chrome sign-in" ["By turning this off, you can sign in to Google sites such as Gmail, without signing in to
Chromium/Chrome"], "Autocomplete searches and URLs", "Make searches and browsing better" ["Sends URLs of pages that you
visit to Google"] + "Improve search suggestions" ["When you type in the address bar or search box, Supermium sends what you
type to your default search engine to get better suggestions"].
Older browser versions: go to "Settings":
chrome://settings/
-> click "Advanced settings" at the bottom -> "Privacy" -> UNcheck "Use a prediction service to help complete searches and
URLs typed in the address bar" box.
More info:
http://support.google.com/chrome/answer/9116376/
31. Go to "Background sync" ["After you leave a site, it can keep syncing to finish tasks, like uploading photos or sending
a chat message"]:
chrome://settings/content/backgroundSync/
-> check "Don't allow closed sites to finish sending or receiving data" box ["After closing a page, tasks you started might
not finish"].
http://support.google.com/chrome/answer/185277/
32. Click circular Sync profile menu icon (top right corner) -> turn OFF "Sync and personalize Chromium/Chrome across your
devices".
33. If using Google Mail (Gmail) and/or any other Google account(s)/membership(s)/subscription(s): turn OFF "Allow
Chromium/Chrome sign-in" which automatically logs you into all your Google account(s) (if you have more than 1) whenever you
sign in into your Google Mail (Gmail)/Google account(s) (if any), and every time you access
again/execute/(re)launch/(re)open/(re)start/(re)run your app(s)/web browser(s).
34. Turn OFF both "Autocomplete searches and URLs" + "Sends URLs of pages you visit to Google" (depending on your web
browser version).
http://support.google.com/chrome/answer/114836/
35. Click vertical ellipsis (3 vertical dots, older browser versions: 3 bars) Menu (Customize and control Chromium/Chrome) at
the top right corner -> Settings -> Advanced -> Privacy and security (older browser versions) or -> "Cookies and other site
data"
chrome://settings/cookies/
-> turn ON/check/slide right "Send a "Do Not Track" (DNT) request with your browsing traffic" (newer browser versions).
http://support.google.com/chrome/answer/2790761/
36. Go to "Location":
chrome://settings/content/location/
-> Default behavior -> UNcheck "Sites can ask for your location" box -> check "Don't allow sites to see your location" box.
http://support.google.com/chrome/answer/142065/
37. Go to "Notifications":
chrome://settings/content/notifications/
-> turn OFF/disable/opt OUT of/stop all Push Notifications -> check "Don't allow sites to send notifications", OR "Block
all: Turn OFF Ask before sending", OR turn OFF/slide left to read "Blocked" (depending on your web browser version).
http://support.google.com/chrome/answer/3220216/
More info:
http://www.makeuseof.com/tag/disable-notifications-chrome-firefox-safari/
38. Go to "Auto-verify":
chrome://settings/content/autoVerify/
-> turn ON/slide right "Auto-verify" ["Sites that you visit can verify that you're a real person and not a bot"] in order to
(eventually) bypass some of the annoying CAPTCHA prompts.
More info:
http://www.makeuseof.com/chrome-browse-without-captcha/
http://mashable.com/article/google-chrome-microsoft-edge-web-browsers-captcha-auto-verify/
39. Go to "Clear browsing data" [pop-up dialog window with multiple choices]:
chrome://settings/clearBrowserData/
-> Advanced tab -> Time range -> select "All time" -> check all boxes you deem necessary/see fit for your specific
choices/needs/preferences, and more importantly in order to preserve + protect your privacy/safety/security [if you're
seriously careful/concerned/conscientious you should check all of them ;-/] -> press "Clear data" button.
CAUTION:
********
"Clear cookies and site data" option [also available as "Clear cookies and site data when you close all windows" under
"Cookies and other site data" -> chrome://settings/cookies/ -> see respective topic further above] will automatically log
you OFF from/sign you OUT of *all* your accounts (in case using any) you are currently logged on/signed into which
deliver/are linked to/provide accounts, alerts, apps, e-mails, enrollments, feeds/RSS, forums, memberships, notifications,
promo(tion)s, reminders, services, social media, subscriptions, widgets, etc.
Consequently after deleting all stored cookies you will have to log on/sign back in into *all* your online/internet accounts
separately, one at a time (if any + if more than 1).
40. Go to "System":
chrome://settings/system/
-> turn OFF/slide left "Continue running background apps when Chromium/Chrome is closed".
41. Conceal/hide/mask local/private IP (Internet Protocol) addresses exposed by the WebRTC protocol RTCPeerConnection API
interface leaks (and used frequently by 3rd parties for spying/surveillance/tracking purposes) with mDNS (multicast Domain
Name System) hostnames: go to "Conceal local IP addresses with mDNS hostnames" [flags setting]:
chrome://flags/#enable-webrtc-hide-local-ips-with-mdns
-> Enabled -> relaunch/restart your web browser.
More info:
http://groups.google.com/g/discuss-webrtc/c/6stQXi72BEU/
http://en.wikipedia.org/wiki/WebRTC
http://en.wikipedia.org/wiki/Multicast_DNS
Alternatively you can install the WebRTC Leak Prevent Chromium/Chrome extension [free] which does basically the same:
http://chromewebstore.google.com/detail/webrtc-leak-prevent/eiadekoaikejlgdbkbdfeijglgfdalml
After enabling this workaround (using either method) you can test for WebRTC IP leaks:
http://diafygi.github.io/webrtc-ips/
42. Block/disable/stop/turn OFF Google Search [+ other Google/Alphabet apps, features, services, sites, etc] from
detecting/tracking and asking/insisting/prompting (over and over, from time to time) for your estimated/exact/precise
(geo)location (geographical) position:
A. Chromium/Chrome -> go to "Site settings":
chrome://settings/content/?search=location
-> scroll down to "Permissions" -> click/touch "Location" -> scroll down to "Default behavior" -> check "Don't allow sites
to see your location" box -> relaunch/restart your web browser.
B. Chromium/Chrome -> go to the particular web site (document, domain, file, page) which insists asking/prompting
for/detecting/tracking your (geo)location (typical example):
http://www.google.com/
-> right-click its URL/URI address/link/shortcut bar/box/space icon/lock symbol (omnibox) at the top left corner -> turn
OFF/slide left "Location".
Repeat same steps above for all desired web sites/documents/domains/files/pages.
More info:
http://www.reddit.com/r/chrome/comments/18lfn6l/
http://support.google.com/websearch/thread/240408580/
http://support.google.com/websearch/thread/249492098/
BEWARE:
*******
Most for-profit internet/online based businesses/companies/corporations use your (geo)location [usually in combination with
other uniquely identifiable/personal/private/privileged biometrics/data/fingerprint/information/stats] for
personalized/targeted ad(vertisment)s/adware, auditing, biometrics/data/fingerprint/information/stats collection/logging,
fingerprinting, (geo)marketing, intrusion/invasion of privacy, promo(tion)s, surveillance, spying, telemetry snooping
("phone home"), tracking, unwanted "offers", etc, despite the fact that in certain
countries/nations/regions/territories/unions such fraudulous/illegal methods have been already banned/forbidden/outlawed by
law/regulation.
More info:
http://en.wikipedia.org/wiki/Internet_geolocation
http://www.eff.org/tags/location-tracking/
http://www.eff.org/cases/geolocation-privacy/
http://medium.com/@ppreddy576/real-time-geolocation-data-is-vulnerable-to-surveillance-and-abuse-658a9554a007/
http://www.aclu.org/issues/privacy-technology/location-tracking/
CAUTION:
********
Turning OFF (geo)location detection/tracking may prevent certain apps, enrollments, features, memberships, services, etc
from providing full and/or proper functionality.
Consult their documentation, FAQs, help, guidelines, manuals, support, etc for specific details.
43. Go to "Performance":
chrome://settings/performance/
-> below "Speed" section -> turn ON/slide right "Preload pages" ["When on, Chromium/Chrome preloads pages, which makes
browsing and searching faster"] -> check "Standard preloading" box.
It is recommended to avoid checking/selecting "Extended preloading" box because some of your personal/private uniquely
identifiable biometrics/data/fingerprint/information/stats will be sent to Google [whose servers are being used for
proactive advanced/extended pre-caching/preloading: "More pages are preloaded. Pages may be preloaded through Google servers
when requested by other sites"], and to the respective web sites [and in many cases to other 3rd
party/cross-site/external/federated/outsourced (cloud) servers] who use locally stored [on your computer/device]
HTTP/web/internet/browser cookies, and in many cases other auditing, detection, fingerprinting, snooping, spying,
surveillance, tracking methods. Quote:
"Things to consider
If you allow cookies, Chromium/Chrome may use them when preloading.
When a site asks to privately preload links on their page, Chromium/Chrome uses Google servers. This hides your identity
from the preloaded site, but Google learns what sites get preloaded."
More info:
http://www.zdnet.com/home-and-office/work-life/need-google-chrome-to-load-pages-faster-enable-this-feature-to-speed-it-up/
http://privacyinternational.org/guide-step/4326/chrome-adjusting-settings-enhance-your-online-privacy/
44. Ungoogled Chromium (Chromium fork) + certain Chromium/Chrome recompiled (portable) binaries version 110/newer
http://github.com/ungoogled-software/ungoogled-chromium/
allow to turn OFF/disable by hand/manually the unique, personally identifiable, trackable machine ID it assigns by default
to all their web browers' users on Windows computers, and which can be easily tracked and spied on for behind your
back/forced/disguised/hidden/unauthorized/without your approval/consent/knowledge/permission ad(vertisment)s, deceptive,
dubious, fraudulous, spying, surveillance, tracking malicious purposes.
More info:
http://portapps.io/app/ungoogled-chromium-portable/#modifications
Ungoogled Chromium (Chromium fork stripped of Google ad(ware)/integration/spyware/tracking/surveillance code) 110/newer
http://ungoogled-software.github.io/ungoogled-chromium-binaries/
-> turn OFF machine ID -> go to [flags setting]:
chrome://flags/#disable-machine-id
-> Disabled -> relaunch/restart your web browser.
CAUTION:
********
Turning OFF machine ID disables *all* flags, settings, enrollments, features, extensions, memberships, services that depend
on it in order to function properly!
45. Install Chromium/Chrome (+ alternatives/derivatives/forks/variants) useful Extensions + Themes by hand/manually
including those delisted/discontinued/unavailable from reliable sources other than Chrome Web Store:
http://chrome-stats.com/
http://www.crx4chrome.com/
Install Chromium/Chrome extensions manually:
http://developer.chrome.com/docs/extensions/how-to/distribute/install-extensions/
http://certera.com/kb/how-to-manually-install-a-chrome-extension-in-2-ways/
http://howover.com/install-unpacked-extension-in-chrome/
46. Turn OFF/disable/stop Chromium/Chrome (+ alternatives/derivatives/forks/variants) +
apps/gadgets/scripts/syncing/tools/widgets from running in the background after all Chromium/Chrome (+
alternatives/derivatives/forks/variants) web browser dialogs/instances/tabs/windows have been closed/shutdown:
http://www.gtricks.com/chrome/how-to-stop-google-chrome-from-running-in-the-background-for-good/
http://www.webnots.com/how-to-stop-google-chrome-from-running-in-background/
http://www.technorms.com/22405/silence-chrome-disable-background-apps/
http://www.lifewire.com/stop-apps-4777510/
47. Turn OFF Google (geo)detection/(geo)location/snooping/spying/surveillance/(geo)tracking on all your
Android/Google/Chromium/Chrome/ChromeOS cellular/mobile/portable devices and computers/laptops/portables, unless it is
mandatory/necessary/required for your accounts, add-ons, alerts, apps, e-mails, enrollments, feeds, forums, games,
memberships, notifications, services, (social) media, software, subscriptions, (web) sites
needs/options/preferences/settings:
http://www.cnet.com/tech/services-and-software/youre-likely-being-tracked-by-google-turn-off-these-settings-to-stop-it/
48. See MDGx "@ Chromium/Chrome/Brave/X-Chromium/Thorium/Vivaldi/Supermium Privacy, Safety + Security Settings, Extensions,
Guides, Solutions + Tools:" topic in SOFTWARE.TXT (included):
http://www.mdgx.com/nettoys.htm#PRV
-> install free essential privacy/safety/security
ad-blocker/anti-malware/anti-phone-home/anti-spyware/anti-surveillance/anti-tracking extensions, script(let)s, tools
(examples):
http://www.mdgx.com/nettoys.htm#PRV
49. Install TamperMonkey extension:
http://chromewebstore.google.com/detail/tampermonkey/dhdgffkkebhmkfjojejmpbldmpobfkfo
OR uBlock Origin (uBO) extension [which supports most custom user (Java)Scripts (JS)/Scriptlets]:
http://chromewebstore.google.com/detail/ublock-origin/cjpalhdlnbpafiamejdnhcphjbkeiagm
+ useful privacy/safety/security ad-blocker/anti-malware/anti-phone-home/anti-spyware/anti-surveillance/anti-tracking user
JavaScript (JS) scripts/scriplets (examples):
- GreasyFork (Java)Scripts:
http://greasyfork.org/
- OpenUser (Java)Scripts:
http://openuserjs.org/
- GitHub (Java)Scripts:
http://gist.github.com/search?l=JavaScript&o=desc&q=%22%3D%3DUserScript%3D%3D%22&s=updated
- AdGuard Extra (Java)Script:
http://github.com/AdguardTeam/AdGuardExtra/
-> Install (Java)Script:
https://userscripts.adtidy.org/release/adguard-extra/1.0/adguard-extra.user.js
- Google Unlocked (Java)Script:
https://raw.githubusercontent.com/Ibit-to/google-unlocked/master/google-unlocked.user.js
-> Install instructions:
http://github.com/moderntribe/tampermonkey-scripts/
+ TamperMonkey FAQ:
http://www.tampermonkey.net/faq.php#Q102
- Anti-Adblock Killer | Reek (Java)Script:
http://reek.github.io/anti-adblock-killer/
-> Install (Java)Script:
https://raw.githubusercontent.com/reek/anti-adblock-killer/master/anti-adblock-killer.user.js
- AdsBypasser Full Edition (Java)Script:
http://adsbypasser.github.io/
-> Install (Java)Script:
https://adsbypasser.github.io/releases/adsbypasser.full.es7.user.js
Configure AdsBypasser:
http://adsbypasser.github.io/configure.html
Go to TamperMonkey Dashboard/Options local HTML page:
chrome-extension://dhdgffkkebhmkfjojejmpbldmpobfkfo/options.html
-> configure/install/manage/tweak TamperMonkey options/settings + JavaScript (JS) scripts/scriplets.
http://www.tampermonkey.net/faq.php
FYI:
Most custom user (Java)Scripts (JS)/Scriptlets are also supported by uBlock Origin (uBO) extension:
http://chromewebstore.google.com/detail/ublock-origin/cjpalhdlnbpafiamejdnhcphjbkeiagm
-> *best* ad(ware), cookies pop-ups, scripting, malware, phishing, pop-ups, spyware, tracking, hijacking, dialers, miners,
skimmers, social media, video sites, e-mail blocker/filter/remover:
http://www.cloudwards.net/best-pop-up-blockers/
uBlock Origin (uBO) Documentation:
http://github.com/gorhill/uBlock/?tab=readme-ov-file/#documentation
uBlock Origin (uBO) Guidelines for Enhanced Privacy, Safety + Security:
- Settings -> Privacy:
http://github.com/gorhill/uBlock/wiki/Dashboard:-Settings#privacy
- Dynamic Filtering -> Reduce privacy exposure:
http://github.com/gorhill/uBlock/wiki/Dynamic-filtering:-to-easily-reduce-privacy-exposure
- Dynamic Filtering -> Block 3rd party Iframe tags:
http://github.com/gorhill/uBlock/wiki/Dynamic-filtering:-Benefits-of-blocking-3rd-party-iframe-tags
Add to uBlock Origin (uBO) -> Filters for blocking mining, pop-ups, resource abuse, embedded URL trackers + anti-adblock
bypass -> Install Instructions:
http://github.com/bogachenko/fuckfuckadblock/wiki/Installation-instruction/
Examples:
- Filters for blocking pop-ups + anti-adblock bypass:
https://raw.githack.com/bogachenko/fuckfuckadblock/master/fuckfuckadblock.txt
- Filters for blocking browser based miners:
https://raw.githack.com/bogachenko/fuckfuckadblock/master/fuckfuckadblock-mining.txt
- Filters for blocking resource abuse:
https://raw.githubusercontent.com/uBlockOrigin/uAssets/master/filters/resource-abuse.txt
- ClearURLs filter for embedded URL trackers:
https://github.com/DandelionSprout/adfilt/raw/master/ClearURLs%20for%20uBo/clear_urls_uboified.txt
50. Relaunch/restart your web browser (if + when needed) for all changes to take effect.

@ Firefox/Mozilla web browsers + alternatives/derivatives/forks/variants:
*************************************************************************
http://www.mdgx.com/7.php#:~:text=%40%20Firefox%2FMozilla%20web%20browsers%20%2B%20alternatives%2Fderivatives%2Fforks%2Fvariants%3A
- MDGx "Free(ware) Windows 9x/NTx Web Browsers" chapter -> "Firefox + Mozilla web browsers [free(ware)]" section ->
"Firefox" topic in SOFTWARE.TXT (included):
http://www.mdgx.com/nettoys.htm#MOZ
- MDGx "@ Firefox/TOR Browser/Mercury/Waterfox/Pale Moon/LibreWolf Privacy, Safety + Security Settings, Extensions, Guides +
Solutions:" topic in SOFTWARE.TXT (included):
http://www.mdgx.com/nettoys.htm#PSF
- MDGx "Web Browsers Links: Web Browsers, Tools + Tips on the Internet" [mostly free(ware)] in SOFTWARE.TXT (included):
http://www.mdgx.com/nettoys.htm#NET
01. Go to:
http://support.mozilla.org/products/firefox/protect-your-privacy/
-> follow guidelines to turn OFF/opt OUT of all ad(vertisment)s, surveillance + tracking.
More info:
http://www.ghacks.net/2015/08/18/a-comprehensive-list-of-firefox-privacy-and-security-settings/
02. In the (URL/URI) address bar type
about:config
-> press Enter -> follow step-by-step guidelines from:
http://kb.mozillazine.org/About:config_entries#Privacy.
and from:
http://kb.mozillazine.org/About:config_entries#Security.
to add/change/delete desired/needed/recommended options/preferences/settings in order to enhance/strengthen your Firefox +
alternatives/derivatives/forks/variants (based on Firefox code) web browser(s) privacy, safety + security.
03. Turn OFF (Push) Notifications:
http://support.mozilla.org/kb/push-notifications-firefox/
More info:
http://www.makeuseof.com/tag/disable-notifications-chrome-firefox-safari/
04. Click/touch the 3 horizontal bars menu icon at the top right corner or in the (URL/URI) address bar type
about:preferences#privacy
-> press Enter -> Options -> Privacy & Security -> Notifications -> Settings -> check "Block new requests asking to allow
notifications" box -> Save Changes.
05. Use Firefox + alternatives/derivatives/forks/variants (based on Firefox code) web browser(s) "Private Browsing"
(Incognito Mode) to avoid cookies, (geo)location, personalized/targeted ad(vertisment)s/adware, phone-home, surveillance,
tracking, banned/blocked/forbidden/limited/restricted areas/content/features, privacy/safety/security
exposure/invasion/intrusion, annoyances:
http://support.mozilla.org/kb/private-browsing-use-firefox-without-history/
More info:
http://www.techtimes.com/articles/38718/20150310/
http://www.online-tech-tips.com/computer-tips/12-ways-to-get-past-a-paywall/
Firefox + alternatives/derivatives/forks/variants (based on Firefox code) web browser(s) -> right-click desired URL/URI
address/item/link/scheme/shortcut -> select "Open Link in New Private Window".
06. See MDGx "@ Firefox/TOR Browser/Mercury/Waterfox/Pale Moon/LibreWolf Privacy, Safety + Security Settings, Extensions,
Guides, Solutions + Tools:" topic in SOFTWARE.TXT (included):
http://www.mdgx.com/nettoys.htm#PSF
-> install free essential privacy/safety/security
ad-blocker/anti-malware/anti-phone-home/anti-spyware/anti-surveillance/anti-tracking add-ons (examples):
http://www.mdgx.com/nettoys.htm#PSF
07. Install TamperMonkey add-on:
http://addons.mozilla.org/firefox/addon/tampermonkey/
OR uBlock Origin (uBO) add-on [which supports most custom user (Java)Scripts (JS)/Scriptlets]:
http://addons.mozilla.org/firefox/addon/ublock-origin/
+ useful privacy/safety/security ad-blocker/anti-malware/anti-phone-home/anti-spyware/anti-surveillance/anti-tracking user
JavaScript (JS) scripts/scriplets (examples):
- GreasyFork (Java)Scripts:
http://greasyfork.org/
- OpenUser (Java)Scripts:
http://openuserjs.org/
- GitHub (Java)Scripts:
http://gist.github.com/search?l=JavaScript&o=desc&q=%22%3D%3DUserScript%3D%3D%22&s=updated
- AdGuard Extra (Java)Script:
http://github.com/AdguardTeam/AdGuardExtra/
-> Install (Java)Script:
https://userscripts.adtidy.org/release/adguard-extra/1.0/adguard-extra.user.js
- Google Unlocked (Java)Script:
https://raw.githubusercontent.com/Ibit-to/google-unlocked/master/google-unlocked.user.js
-> Install instructions:
http://github.com/moderntribe/tampermonkey-scripts/
+ TamperMonkey FAQ:
http://www.tampermonkey.net/faq.php#Q102
- Anti-Adblock Killer | Reek (Java)Script:
http://reek.github.io/anti-adblock-killer/
-> Install (Java)Script:
https://raw.githubusercontent.com/reek/anti-adblock-killer/master/anti-adblock-killer.user.js
- AdsBypasser Full Edition (Java)Script:
http://adsbypasser.github.io/
-> Install (Java)Script:
https://adsbypasser.github.io/releases/adsbypasser.full.es7.user.js
Configure AdsBypasser:
http://adsbypasser.github.io/configure.html
Go to TamperMonkey Dashboard/Options local HTML page -> configure/install/manage/tweak TamperMonkey options/settings +
JavaScript (JS) scripts/scriplets.
http://www.tampermonkey.net/faq.php
FYI:
Most custom user (Java)Scripts (JS)/Scriptlets are also supported by uBlock Origin (uBO) add-on:
http://addons.mozilla.org/firefox/addon/ublock-origin/
-> *best* ad(ware), cookies pop-ups, scripting, malware, phishing, pop-ups, spyware, tracking, hijacking, dialers, miners,
skimmers, social media, video sites, e-mail blocker/filter/remover:
http://www.cloudwards.net/best-pop-up-blockers/
uBlock Origin (uBO) Documentation:
http://github.com/gorhill/uBlock/?tab=readme-ov-file/#documentation
uBlock Origin (uBO) Guidelines for Enhanced Privacy, Safety + Security:
- Settings -> Privacy:
http://github.com/gorhill/uBlock/wiki/Dashboard:-Settings#privacy
- Dynamic Filtering -> Reduce privacy exposure:
http://github.com/gorhill/uBlock/wiki/Dynamic-filtering:-to-easily-reduce-privacy-exposure
- Dynamic Filtering -> Block 3rd party Iframe tags:
http://github.com/gorhill/uBlock/wiki/Dynamic-filtering:-Benefits-of-blocking-3rd-party-iframe-tags
Add to uBlock Origin (uBO) -> Filters for blocking mining, pop-ups, resource abuse, embedded URL trackers + anti-adblock
bypass -> Install Instructions:
http://github.com/bogachenko/fuckfuckadblock/wiki/Installation-instruction/
Examples:
- Filters for blocking pop-ups + anti-adblock bypass:
https://raw.githack.com/bogachenko/fuckfuckadblock/master/fuckfuckadblock.txt
- Filters for blocking browser based miners:
https://raw.githack.com/bogachenko/fuckfuckadblock/master/fuckfuckadblock-mining.txt
- Filters for blocking resource abuse:
https://raw.githubusercontent.com/uBlockOrigin/uAssets/master/filters/resource-abuse.txt
- ClearURLs filter for embedded URL trackers:
https://github.com/DandelionSprout/adfilt/raw/master/ClearURLs%20for%20uBo/clear_urls_uboified.txt
08. Relaunch/restart your web browser (if + when needed) for all changes to take effect.

@ Edge web browsers:
********************
See MDGx "On The Edge of A Hostile Takeover = Uninstall + Replace Edge While You Still Can" chapter in WIN10.TXT (included):
http://www.mdgx.com/10.php
http://www.mdgx.com/WIN10.TXT
BEWARE:
*******
Edge web browsers collect, spy, surveil, track + send logged on/signed in members/subscribers/users' unique SID (Security
IDentifier) + web browser history [URLs (Uniform Resource Locator) = IPs, web addresses]
biometrics/data/fingerprint/information/stats, confidential/identifiable/personal/private/privileged preferences, user
choices/options/settings, to Microsoft + Microsoft 3rd party/affiliated/associated/leased/(sub)contracted/partner/subsidiary
cloud/network/internet/remote domains/servers/sites:
http://winbuzzer.com/2019/07/23/users-raise-privacy-concerns-as-edge-browser-caught-sending-full-urls-and-sid-to-microsoft-xcxwbn/
STRONGLY RECOMMENDED:
*********************
In case you decide to keep + use Edge (for whatever reason, personal preference, or being forced due to certain business,
contract, employer, enrollment, job, licensing, membership, partnership, proprietary software, services, etc constraints,
limitations, requirements, etc) the *least* you can do in order to enhance/improve your privacy, safety + security, and to
block/disable/minimize/reduce/stop/turn OFF the ad(vertising)/adware, auditing, fingerprinting, spying, surveillance,
tracking, unwanted "offers"/promo(tion)s
behind-your-back/disguised/forced/harmful/hidden/intrusive/invasive/subversive/unwanted/without your
approval/consent/knowledge/permission compromising/dangerous/dubious/harmful/insecure/malicious/unsafe environment is to
install uBlock Origin (uBO) [free, open source add-on/extension for all Chromium based Edge web browsers]
http://microsoftedge.microsoft.com/addons/detail/odfafepnkmbhccpbejgmiehpchacaeak/
-> *best* ad(ware), scripting, malware, phishing, pop-ups, spyware, tracking, hijacking, dialers, miners, skimmers, social
media, video sites, e-mail blocker/filter/remover:
http://www.cloudwards.net/best-pop-up-blockers/
OR uBlock Origin Lite (uBOL) [MV3 compliant: http://www.theverge.com/2023/11/16/23964509/]
http://microsoftedge.microsoft.com/addons/detail/cimighlppcgcoapaliogpjjdehbnofhn/
uBlock Origin (uBO):
http://ublockorigin.com/
uBlock Origin (uBO) repository + source code:
http://github.com/gorhill/uBlock/
uBlock Origin (uBO) releases:
http://github.com/gorhill/uBlock/releases/latest/
uBlock Origin (uBO) Documentation:
http://github.com/gorhill/uBlock/?tab=readme-ov-file/#documentation
Add to uBlock Origin (uBO) -> Filters for blocking mining, pop-ups, resource abuse, embedded URL trackers + anti-adblock
bypass -> Install Instructions:
http://github.com/bogachenko/fuckfuckadblock/wiki/Installation-instruction/
Examples:
- Filters for blocking pop-ups + anti-adblock bypass:
https://raw.githack.com/bogachenko/fuckfuckadblock/master/fuckfuckadblock.txt
- Filters for blocking browser based miners:
https://raw.githack.com/bogachenko/fuckfuckadblock/master/fuckfuckadblock-mining.txt
- Filters for blocking resource abuse:
https://raw.githubusercontent.com/uBlockOrigin/uAssets/master/filters/resource-abuse.txt
- ClearURLs filter for embedded URL trackers:
https://github.com/DandelionSprout/adfilt/raw/master/ClearURLs%20for%20uBo/clear_urls_uboified.txt
Install TamperMonkey add-on/extension:
http://microsoftedge.microsoft.com/addons/detail/iikmkjmpaadaobahmlepeloendndfphd/
+ useful privacy/safety/security ad-blocker/anti-malware/anti-phone-home/anti-spyware/anti-surveillance/anti-tracking user
JavaScript (JS) scripts/scriplets (examples):
- AdGuard Extra (Java)Script:
http://github.com/AdguardTeam/AdGuardExtra/
-> Install (Java)Script:
https://userscripts.adtidy.org/release/adguard-extra/1.0/adguard-extra.user.js
- Google Unlocked (Java)Script:
https://raw.githubusercontent.com/Ibit-to/google-unlocked/master/google-unlocked.user.js
- Anti-Adblock Killer | Reek (Java)Script:
http://reek.github.io/anti-adblock-killer/
-> Install (Java)Script:
https://raw.githubusercontent.com/reek/anti-adblock-killer/master/anti-adblock-killer.user.js
- AdsBypasser Full Edition (Java)Script:
http://adsbypasser.github.io/
-> Install (Java)Script:
https://adsbypasser.github.io/releases/adsbypasser.full.es7.user.js
Configure AdsBypasser:
http://adsbypasser.github.io/configure.html
FYI:
Custom user (Java)Scripts (JS)/Scriptlets are also supported by uBlock Origin (uBO) add-on/extension:
http://microsoftedge.microsoft.com/addons/detail/odfafepnkmbhccpbejgmiehpchacaeak/
Useful privacy, safety + security Chromium based Edge Add-ons/Extensions:
- Ad(ware) Blockers:
http://microsoftedge.microsoft.com/addons/search/blocker/
- Anti-Malware:
http://microsoftedge.microsoft.com/addons/search/malware/
- Privacy:
http://microsoftedge.microsoft.com/addons/search/privacy/
- Protection:
http://microsoftedge.microsoft.com/addons/search/protection/
- Safety:
http://microsoftedge.microsoft.com/addons/search/safety/
- Security:
http://microsoftedge.microsoft.com/addons/search/security/

@ Internet Explorer (IE) web browser [discontinued from all NEWer Windows 10/2016/2019 builds/editions/releases/updates!]:
**************************************************************************************************************************
Microsoft DISCONTINUED primitive, obsolete, vulnerable, flawed, insecure Internet Explorer (IE) + replaced it with [+
crippled/disabled/impaired/limited/locked/unavailable basic/important/optional features/options/settings + added forced/hard
to disable/(almost) impossible to get rid of unneeded/unwanted Microsoft anti-competitive/centered/exclusive apps, features,
services, subscriptions + ad(ware)/spyware/surveillance/tracking] heavily modified Google Chromium (Canary developer
channel) based Edge proprietary web browser in all Windows 10/newer releases!
R.I.P. Internet Explorer... :-)
http://www.cnn.com/2022/06/18/asia/internet-explorer-gravestone-viral-south-korea-intl-hnk/
STRONGLY RECOMMENDED:
*********************
Therefore you should replace Internet Explorer (IE) as your default web browser with a better, modern, secure web browser.
Recommended independent/3rd party free, open source, safe, secure, uncrippled, unlocked, unrestricted, modern web browsers
(examples):
http://www.mdgx.com/nettoys.htm#NET
MDGx "Free(ware) Windows 9x/NTx Web Browsers" chapter -> "Chromium + Chrome web browsers [free(ware)]" section ->
"Chromium + Chrome" topic in SOFTWARE.TXT (included):
http://www.mdgx.com/nettoys.htm#CHR
RECOMMENDED:
- Chromium Precompiled EXEcutable [Installer EXE + Portable Archives ZIP/7z] 32-bit + 64-bit for Windows XP/newer 32-bit
(x86) + 64-bit (x64):
http://chromium.woolyss.com/
Degoogled/Ungoogled/stripped of Google ad(ware)/integration/spyware/surveillance/tracking code Chromium builds [clearly
labeled]:
http://github.com/ungoogled-software/ungoogled-chromium/blob/master/README.md
http://ungoogled-software.github.io/ungoogled-chromium-wiki/faq
Ungoogled Chromium precompiled binaries 32-bit + 64-bit for Windows 7/newer 32-bit (x86) + 64-bit (x64) [75-125 MB,
Installer ONLY EXE + Portable ZIP, NEWest at the top]:
http://ungoogled-software.github.io/ungoogled-chromium-binaries/
Ungoogled Chromium 64-bit for Windows 7/newer 64-bit (x64):
http://ungoogled-software.github.io/ungoogled-chromium-binaries/releases/windows/64bit/
Ungoogled Chromium 32-bit for Windows 7/newer 32-bit (x86):
http://ungoogled-software.github.io/ungoogled-chromium-binaries/releases/windows/32bit/
- Brave 32-bit + 64-bit web browser for Windows 7/newer 32-bit (x86) + 64-bit (x64) based on Chromium code [fork] with
improved privacy, safety + security and optimized speed:
http://brave.com/
Brave Repository:
http://github.com/brave/brave-browser/
Download [ZIP = full, Portable]:
http://github.com/brave/brave-browser/releases/latest/
- Vivaldi 32-bit + 64-bit web browser for Windows 7/newer 32-bit (x86) + 64-bit (x64) based on Chromium code [fork] with
enhanced privacy, safety + security:
http://vivaldi.com/
Download [EXE = Installer ONLY]:
http://vivaldi.com/download/
Vivaldi Portable -> run Installer EXE -> Install standalone:
http://help.vivaldi.com/desktop/install-update/standalone-version-of-vivaldi/
- Thorium 32-bit + 64-bit web browsers for Windows 7/newer 32-bit (x86) + 64-bit (x64) based on Chromium code [fork]
hardware 3D, rendering + video playback optimized:
http://thorium.rocks/
Download [ZIP = full, Portable]:
Thorium AVX2 64-bit for Windows 10/newer 64-bit (x64):
http://github.com/Alex313031/Thorium-Win/releases/latest/
Thorium AVX 64-bit for Windows 10/newer 64-bit (x64):
http://github.com/Alex313031/Thorium-Win/releases/latest/
Thorium SS3 64-bit for Windows 10/newer 64-bit (x64):
http://github.com/Alex313031/Thorium-SSE3/releases/latest/
Thorium SSE2 (Win32) 32-bit edition for Windows 7/newer 32-bit (x86) + Thorium SSE3, SSE4, AVX + AVX2 64-bit editions for
Windows 7/newer 64-bit (x64):
http://github.com/Alex313031/thorium-win7/releases/latest/
Thorium Requirements:
- Multicore CPU: minimum Intel Core 2nd gen or AMD FX with built-in SSE4 (Streaming SIMD Extensions 4),
http://en.wikipedia.org/wiki/SSE4
AVX (Advanced Vector EXtensions)
http://en.wikipedia.org/wiki/Advanced_Vector_Extensions
+ AES (Advanced Encryption Standard)
http://en.wikipedia.org/wiki/Advanced_Encryption_Standard
enhancements/multimedia extensions/instructions.
- Graphics video controller with 3D rendering + OpenGL capabilities.
Required Windows 7 64-bit (x64) Updates for Thorium 64-bit web browser enhanced hardware + software compatibility/support:
http://thorium.rocks/win7
- Windows 7 SP1/2008 R2 64-bit (x64) Servicing Stack Update 2019 KB4490628:
http://support.microsoft.com/help/4490628/
Download:
http://catalog.update.microsoft.com/search.aspx?q=4490628+x64
- Windows 7 SP1/2008 R2 64-bit (x64) SHA-2 Code Signing Support Update 2019 KB4474419:
http://support.microsoft.com/help/4474419/
Download:
http://catalog.update.microsoft.com/search.aspx?q=4474419+x64
- Supermium 32-bit + 64-bit web browsers for Windows 7/newer 32-bit (x86) + 64-bit (x64) based on Chromium code [fork]
optimized for speed + performance:
http://www.win32subsystem.live/supermium.html
Download [EXE = full, Installer +/- ZIP = full, Portable]:
http://github.com/win32ss/supermium/releases/latest/
- X-Chromium (X-Launcher) Portable launcher:
http://www.winpenpack.com/en/download.php?view.1082
Download [EXE = Installer, full]:
http://sourceforge.net/projects/winpenpack/files/X-Chromium/releases/
Either install Chromium precompiled stable releases 32-bit or 64-bit:
http://chromium.woolyss.com/
or extract all files from portable archive [zip or 7z] + copy to the destination of your choice Chromium portable stable
releases 32-bit or 64-bit to match the Windows NTx [7/newer] operating system(s) [OS(es)]
build/edition/release/update/version + bit strength [32-bit (x86) or 64-bit (x64)] you are using.
All Chromium + Chrome alternatives/derivatives/forks/variants users must have these 3 environment variables:
GOOGLE_API_KEY=NO
GOOGLE_DEFAULT_CLIENT_ID=NO
GOOGLE_DEFAULT_CLIENT_SECRET=NO
Right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run these commands -> press Enter after each line:
SETX.EXE GOOGLE_API_KEY "NO" /M
SETX.EXE GOOGLE_DEFAULT_CLIENT_ID "NO" /M
SETX.EXE GOOGLE_DEFAULT_CLIENT_SECRET "NO" /M
Google API Keys:
http://chromium.woolyss.com/#google-api-keys
http://www.chromium.org/developers/how-tos/api-keys/
MDGx "@ Chromium/Chrome/Brave/X-Chromium/Thorium/Vivaldi/Supermium Privacy, Safety + Security Settings, Extensions, Guides +
Solutions:" topic in SOFTWARE.TXT (included):
http://www.mdgx.com/nettoys.htm#PRV
MDGx collection of essential + useful Chromium/Chrome extensions + tweaks -> "CHROMIUM" section in TOOLS.TXT (included):
http://www.mdgx.com/tools.php#:~:text=CHROMIUM%20%5B%2A%5D
http://www.mdgx.com/TOOLS.TXT
But just in case you need/are constrained/forced to keep Internet Explorer (IE) for various reasons, for example
compatibility/requirements with older/proprietary software programs/scripts/documents/services (Microsoft Windows Server,
Office, Outlook, Live, Active Directory, Exchange, etc), obsolete web pages/sites and/or e-mail providers/servers using
obsolete/older server software/scripts, then you can improve and secure a little more the way Internet Explorer (IE) web
browser performs by following the tips listed here.
See MDGx "Internet Explorer (IE) 4/5/6/7/8/9/10/11 Essential FREE Fixes + Updates" chapter in SOFTWARE.TXT (included):
http://www.mdgx.com/ietoy.htm
R.I.P. Internet Explorer... :-)
http://www.cnn.com/2022/06/18/asia/internet-explorer-gravestone-viral-south-korea-intl-hnk/
RECOMMENDED:
************
Install an independent/3rd party free, open source, safe, secure, uncrippled, unlocked, unrestricted, modern web browser
based on Chromium code with enhanced privacy, safety + security
http://www.mdgx.com/nettoys.htm#PRV
-> see "Free(ware) Windows 9x/NTx Web Browsers" chapter -> "Chromium + Chrome" section in SOFTWARE.TXT (included):
http://www.mdgx.com/nettoys.htm#CHR
1. Go to:
http://choice.microsoft.com/opt-out
2. Turn OFF all ads:
- Personalized ads in this browser.
- Personalized ads wherever I use my Microsoft account.
3. Go to:
http://www.aboutads.info/choices/
4. UNcheck all boxes:
- "All Participating Companies".
- "Companies Customizing Ads For Your Browser".
5. Internet Explorer (IE) 9/10/11 "Block Tracking" (Geolocation Detection) + "Automatic (Forced) Upgrade":
http://unlockforus.blogspot.com/2012/09/do-not-allow-websites-to-get-your.html
http://support.microsoft.com/help/2843950/
http://www.eightforums.com/tutorials/7996-internet-explorer-10-auto-update-enable-disable.html
http://www.itninja.com/question/ie10-turn-off-auto-updates/
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Geolocation]
"BlockAllWebsites"=dword:1
[HKEY_USERS\.DEFAULT\Software\Microsoft\Internet Explorer\Geolocation]
"BlockAllWebsites"=dword:1
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main]
"EnableAutoUpgrade"=dword:0
[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main]
"EnableAutoUpgrade"=dword:0
[HKEY_USERS\.DEFAULT\Software\Microsoft\Internet Explorer\Main]
"EnableAutoUpgrade"=dword:0
;
------End cut & paste here------
6. Turn OFF primitive/obsolete Internet Explorer (IE) Security Check:
http://www.windows-security.org/65c2e8edd3108cdb6fc985493bb2fa38/turn-off-the-security-settings-check-feature/
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Security]
"DisableSecuritySettingsCheck"=dword:1
[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Security]
"DisableSecuritySettingsCheck"=dword:1
[HKEY_USERS\.DEFAULT\Software\Microsoft\Internet Explorer\Security]
"DisableSecuritySettingsCheck"=dword:1
;
------End cut & paste here------
7. Manage cookies in Internet Explorer (IE):
http://www.whatismybrowser.com/guides/clear-cache-history-cookies/internet-explorer
http://kb.wisc.edu/helpdesk/page.php?id=15141
http://support.microsoft.com/en-us/search?query=cookies%20in%20internet%20explorer
More info @ MDGx "Internet Explorer (IE) 11.0" section in SOFTWARE.TXT (included):
http://www.mdgx.com/ietoy.htm#IE11
Open E10BLOK.CMD (included) in Notepad for details:
http://www.mdgx.com/10BLK/E10BLOK.CMD.TXT
8. Install AdBlock Plus (ABP) for Internet Explorer (IE) (free, open source):
http://adblockplus.org/en/internet-explorer
9. Relaunch/restart your web browser (if + when needed) for all changes to take effect.
RECOMMENDED:
WINDOWS7.TXT (this file) contains more guides + tips on how to improve your life while still using Internet Explorer (IE) ->
please see respective topics (clearly marked).

* Turn OFF/Disable/Opt OUT of/Stop for Profit Web Sites + Social Media Invading Your Privacy + Enhance Safety + Security:
*************************************************************************************************************************
There are plenty of free choices/methods/options/settings available to turn OFF/block/disable/opt OUT of/stop
automatic/unattended behind-your-back/disguised/forced/hidden/intrusive/invasive/subversive/unwanted/without your
approval/consent/knowledge/permission dangerous/dubious/harmful/insecure/malicious/unsafe,
undesirable/unnecessary/unneeded/unused/useless, intrusions, invasion of privacy, tracking, spying, surveillance
compromising your safety + security (even if hidden, little known, and/or not obviously/properly
advertised/allowed/disclosed/established/legal/placed/set) designed/(pre)installed/set up by most for-profit ad(vertisment)
businesses, entities, web sites, social media, search engines, surveillance industry, and their associated, contracted,
(co)owned, operated, related, shared 3rd
party/affiliates/associates/branches/brands/companies/divisions/entities/parents/partners/subsidiaries who
lure/push/recommend/tempt you with accounts, alerts, apps, banners, cookies, e-mails, enrollments, feeds, memberships,
messages, notifications, pop-ups, promo(tion)s, reminders, subscriptions, crippled/time limited trials, updates, widgets,
etc, who distribute, disseminate, share and sell (even against your will, behind your back, and unauthorized/without your
approval/consent/knowledge/permission) your confidential/identifiable/personal/private/privileged
biometrics/data/fingerprint/information/stats to others like them, only to sell you more stuff [which does not constitute
requirement, necessity, you may not need, do not want, or can live without], and who constantly attempt to persuade you by
using deceptive, dubious, false, fraudulous, harmful, malicious means, methods, false pretenses, strategies to spend money
[you cannot afford, are needed for other, more important purposes, and/or do not have (access to)], or on [high interest,
especially when compounded over longer periods of time] credit/loan/scheduled time deferred/delayed payments, because as
everybody knows, credit is not cash... :-(
http://www.goodreads.com/quotes/25775/
http://www.youtube.com/watch?v=6ieKUvEiVR8&t=679s
Doing so will enhance/improve/maintain/preserve/repair/restore (a certain degree/level of) privacy, safety and security on
the internet and in the digital world, and most importantly will allow you and your computing/connected/digital/online +
real every day environment(s), persona(s) + live(s) to remain/stay safe as much as possible from breaches, hacking,
intrusions, invasion, malware, phishing, spyware, (geo)tracking, confidential/identifiable/personal/private/privileged
biometrics/data/fingerprint/information/stats auditing, beacons, break-ins, broadcast, dissemination, fingerprinting,
hacking, leaking, spoofing, etc.
Here are a few things you can do to get rid of them effortlessly in a nick of time, and they're all free... ;-/

@ WWW (World Wide Web) Search Engines with Best Anonymity, Privacy, Safety + Security:
**************************************************************************************
- Privacy Tools: Best Private Web Search Engines:
http://www.privacytools.io/private-search/
- Panda Security: Best Private Search Engines: Where to Search Without Being Tracked:
http://www.pandasecurity.com/en/mediacenter/security/best-private-search-enginges/
- Software Testing Help (STH): Best Private Search Engines: Secure Anonymous Search:
http://www.softwaretestinghelp.com/best-private-search-engines/
- MDGx Search Engines, Privacy + Net Tools:
http://www.mdgx.com/links.htm
- MDGx "100+ WWW (World Wide Web) Search Engines" [most have enhanced privacy, safety + security]:
http://www.mdgx.com/links.htm#WSE
- MDGx "FTP (File Transfer Protocol) Search Engines":
http://www.mdgx.com/links.htm#FSE
- MDGx "Anonymous + Faster Surfing":
http://www.mdgx.com/links.htm#ANO
- MDGx "Human Rights, Equality, Privacy + Fairness" [Sites Who Fight for Your Rights]:
http://www.mdgx.com/links.htm#HRC
- All these WWW (World Wide Web) search engines, some of whom have by default/preconfigured/preinstalled/out-of-the-box
enhanced anonymity/pseudonymity, privacy, safety + security features/functions/properties/protocols -> see below:
"@ Google search, (geo)location tracking, data, history, e-mail (Gmail), notifications + apps:"
"@ YouTube (YT) [videos hosted by Google]:"
"@ Bing Search, Live, Microsoft, MSN + Related/Shared Accounts, Services + Apps [owned by Microsoft]:"
"@ Yahoo! (Y!) Search, Yahoo! Mail + Yahoo! News:"
"@ DuckDuckGo (DDG) Search, Privacy Essentials + E-mail Protection:"
"@ SearXNG Metasearch:"
"@ SearX Metasearch:"
"@ Startpage Search + Privacy Protection Add-on + Extension:"
"@ Brave Search:"
"@ Qwant Search:"

@ Google search + (geo)location tracking, data, history, e-mail (Gmail), notifications + apps:
**********************************************************************************************
http://www.mdgx.com/7.php#:~:text=%40%20Google%20search%20%2B%20%28geo%29location%20tracking
- Turn OFF/block/disable/stop *all* Google and Google associated, contracted, (co)owned, operated, related, shared
3rd party/affiliates/associates/branches/brands/companies/divisions/entities/parents/partners/subsidiaries account(s),
alerts, apps, e-mails, enrollments, feeds, forums, memberships, news, notifications, products, promo(tion)s, reminders,
services, social media, subscriptions [if any] Data & Privacy options/preferences/settings that allow/enable/permit Google
and Google associated entities to access, follow, identify, keep, log, record, store, surveil, spy on, track, use
directly/indirectly for advertisment/marketing/monetization/profit/promotion/sales/surveillance your
confidential/identifiable/personal/private/privileged/unique activity, biometrics, data, fingerprints, (geo)location,
history, information, sharing, stats, tracks, trails, whereabouts without concern/respect/regard for customers/users'
personal privacy, safety or security, unless imposed/mandated/required by specific laws, norms, regulations and/or
rules, and only if/how/where/when applicable and/or enforceable:
http://myaccount.google.com/data-and-privacy
http://myactivity.google.com/activitycontrols
http://myactivity.google.com/more-activity
http://myactivity.google.com/activitycontrols/webandapp
http://myaccount.google.com/yourdata/search
http://adssettings.google.com/partnerads
http://www.youronlinechoices.com/uk/your-ad-choices/
http://myactivity.google.com/product/news/controls/
http://news.google.com/settings
- Remove personal information from Google:
http://support.google.com/websearch/thread/182504436/
- Remove your personal information from Google Search:
http://support.google.com/websearch/troubleshooter/3111061/
- Remove select personally identifiable info (PII) or doxxing content from Google Search:
http://support.google.com/websearch/answer/9673730/
- Remove images of minors from Google search results:
http://support.google.com/websearch/answer/10949130/
- Request to remove your personal information on Google:
http://support.google.com/websearch/troubleshooter/9685456/
- Remove personal info, personally identifiable info (PII) + content from Google search engine + apps:
http://support.google.com/search?q=remove+personally+identifiable+info+doxxing+content+from+google
- Stop Google from tracking and storing your locations:
http://www.techrepublic.com/article/how-to-stop-google-from-tracking-and-storing-your-locations/
- Turn OFF ad tracking in Google, Bing + Yahoo!:
http://www.searchenginewatch.com/2017/03/09/how-to-turn-off-ad-tracking-in-google-bing-and-yahoo/
- Disable Web Push Notifications in Google Chrome:
http://www.pushassist.com/knowledgebase/how-to-disable-web-push-notifications-in-google-chrome/
- Force Google to automatically delete the information it saves about what you do online:
http://www.cnbc.com/2019/05/08/how-to-stop-google-from-tracking-web-history.html
- Google knows everywhere you go, stop it from tracking you + delete the logs:
http://www.cnbc.com/2019/04/25/how-to-stop-google-from-storing-your-location-history.html
- Google collects information about many things you do online, stop it from tracking you:
http://www.cnbc.com/2019/05/01/how-to-stop-google-from-collecting-your-private-information.html
- Google Sees Everything You Do: Stop That:
http://www.lifewire.com/stop-google-4123866/
- Engadget: From its start Gmail conditioned us to trade privacy for free services:
http://www.engadget.com/from-its-start-gmail-conditioned-us-to-trade-privacy-for-free-services-120009741.html
- OpenPGP: Encrypt Your E-mail using PGP (Pretty Good Privacy):
http://www.openpgp.org/software/
- Report malicious software web sites:
http://safebrowsing.google.com/safebrowsing/report_badware/
- Report Phishing and Malware:
http://www.decentsecurity.com/malware-web-and-phishing-investigation/
- Gmail Confidential Mode: Send + open confidential e-mails + attachments:
http://support.google.com/mail/answer/7674059/
- Control Chromium/Chrome safety -> scroll down to the blue sections:
http://support.google.com/chrome/?#topic=7437824
- Chromium/Chrome privacy -> scroll down to the blue sections:
http://support.google.com/chrome/?#topic=9845306
- Chromium/Chrome Safe Browsing:
http://support.google.com/chrome/answer/9890866/
- Select Chromium/Chrome Privacy settings:
http://support.google.com/chrome/answer/114836/
- Chromium/Chrome Browse in private using "Incognito Mode" (Private Browsing):
http://support.google.com/chrome/answer/95464/
- Chromium/Chrome Safe Browsing practices:
http://www.google.com/chrome/privacy/#safe-browsing-practices
- Manage Chromium/Chrome Safety + Security:
http://support.google.com/chrome/answer/10468685/
- Clear, Disable/Enable + Manage Cookies + 3rd party Cookies in Chromium/Chrome:
http://support.google.com/chrome/answer/95647/
- Chromium/Chrome Remove unwanted ads, pop-ups & malware:
http://support.google.com/chrome/answer/2765944/
- Turn ON Chromium/Chrome "Send a 'Do Not Track' (DNT) request with your browsing traffic":
http://support.google.com/chrome/answer/2790761/
- Turn OFF *all* Apps, Desktop, Platform + Web Push Notifications in Chromium/Chrome:
http://support.google.com/chrome/answer/3220216/
- Browsers, Extensions/Add-ons, Cookies, Tracking:
http://themarkup.org/ask-the-markup/2020/09/22/i-scanned-the-websites-i-visit-with-blacklight-and-its-horrifying-now-what/
WARNING:
********
Unfortunately you must already have, or need to open a (new) YouTube, Gmail (Google mail) or Google account in order to be
allowed to change/disable/turn OFF many of these privacy, safety + security choices/options/preferences/settings (see
above).

@ YouTube (YT) [videos hosted by Google]:
*****************************************
Go to "YouTube History":
http://myactivity.google.com/product/youtube/
-> turn OFF "Saving your YouTube history" -> should say "NOT saving your YouTube history".
Then go to "YouTube History" activity controls:
http://myactivity.google.com/activitycontrols?settings=youtube
-> turn OFF -> UNcheck these 2 boxes: "Include the YouTube videos you watch" + "Include your searches on YouTube".
More info:
http://support.google.com/youtube/answer/57711/
http://support.google.com/chrome/answer/185277/
- The Verge: Protect your privacy on YouTube:
http://www.theverge.com/2019/4/19/18484802/
- LifeWire: YouTube Privacy Settings:
http://www.lifewire.com/youtube-privacy-settings-1082507/
- GHacks: Always use YouTube Privacy Enhanced Mode:
http://www.ghacks.net/2018/05/23/why-you-should-always-use-youtubes-privacy-enhanced-mode/
- Online Tech Tips: Watch YouTube Without Ads:
http://www.online-tech-tips.com/computer-tips/5-ways-to-watch-youtube-without-ads/
- GitHub: YouTube Video Ads Blocklist:
http://github.com/anudeepND/youtubeadsblacklist/
- YouTube: Account Privacy settings:
http://www.youtube.com/account_privacy/
- YouTube: Account Notifications:
http://www.youtube.com/account_notifications/
- YouTube: Account Playback and performance:
http://www.youtube.com/account_playback/
- YouTube: Privacy Controls:
http://www.youtube.com/howyoutubeworks/user-settings/privacy/
- Google YouTube: Privacy and safety center:
http://support.google.com/youtube/topic/2803240/
- Google YouTube: Protecting your identity:
http://support.google.com/youtube/answer/2801895/
- Google YouTube: Change video privacy settings:
http://support.google.com/youtube/answer/157177/
- Google YouTube: Browse YouTube while incognito on cellular/mobile devices:
http://support.google.com/youtube/answer/9040743/
- Google YouTube: Secure your YouTube account:
http://support.google.com/youtube/answer/9701986/
- Wikipedia: YouTube and Privacy:
http://en.wikipedia.org/wiki/YouTube_and_privacy
WARNING:
********
Unfortunately you must already have, or need to open a (new) YouTube, Gmail (Google mail) or Google account in order to be
allowed to change/disable/turn OFF many of these privacy, safety + security choices/options/preferences/settings (see
above).

@ Bing Search, Live, Microsoft, MSN + Related/Shared Accounts, Services + Apps [owned by Microsoft]:
****************************************************************************************************
Turn OFF/block/disable/stop *all* Microsoft Azure, Bing, Cortana, Edge, Hotmail, Live, MSN, Microsoft Start, OneDrive,
Outlook, SkyDrive, Windows Mail and Microsoft associated, contracted, (co)owned, operated, related, shared 3rd
party/affiliates/associates/branches/brands/companies/divisions/entities/parents/partners/subsidiaries account(s), alerts,
apps, e-mails, enrollments, feeds, forums, memberships, news, notifications, products, promo(tion)s, reminders, services,
social media, subscriptions [if any] Data & Privacy options/preferences/settings that allow/enable/permit Microsoft and
Microsoft associated entities to access, follow, identify, keep, log, record, store, surveil, spy on, track, use
directly/indirectly for advertisment/marketing/monetization/profit/promotion/sales/surveillance your
confidential/identifiable/personal/private/privileged/unique activity, data, info, history, (geo)location, sharing, stats,
tracks, trails, whereabouts without concern/respect/regard for customers/users' personal privacy, safety or security, unless
imposed/mandated/required by specific laws, norms, regulations and/or rules, and only if/how/where/when applicable and/or
enforceable:
Turn OFF ad tracking in Google, Bing/Live/Microsoft Start/MSN + Yahoo!:
http://www.searchenginewatch.com/2017/03/09/how-to-turn-off-ad-tracking-in-google-bing-and-yahoo/
Browser settings -> turn OFF/slide left "Get all notifications":
http://www.bing.com/profile/notifications/settings?service=3
Settings -> Personalization -> Images Feed Personalization [Allow Bing to use your activities to improve the image and video
recommendations experience] -> turn OFF/slide left:
http://www.bing.com/account/general/#personalization-section
Activity -> check right hand side box -> press "Clear" button:
http://www.bing.com/profile/history/
Clear your search history -> press "Clear all" button:
http://www.bing.com/profile/history/
Turn OFF/slide left all Experience Settings [Language & content + Feed settings] + Notification(s) [Notification settings:
news, notifications, badges, alerts]:
http://www.msn.com/en-us/feed/personalize/
http://www.msn.com/en-us/feed/personalize/notification/
http://www.msn.com/en-us/feed/personalize/settings/
Privacy settings in Microsoft products:
http://support.microsoft.com/topic/where-can-i-find-privacy-settings-in-microsoft-products-206f6928-2694-4adf-a50f-9edb95897d81
General privacy settings in Windows 10 + 11:
http://support.microsoft.com/windows/general-privacy-settings-in-windows-7c7f6a09-cebd-5589-c376-7f505e5bf65a
Change privacy settings in Windows 10 + 11:
http://support.microsoft.com/windows/change-privacy-settings-in-windows-55466b7b-14de-c230-3ece-6b75557c5227
Microsoft Account Privacy Settings:
http://account.microsoft.com/account/privacy
Microsoft Edge browsing activity for personalized advertising and experiences:
http://support.microsoft.com/microsoft-edge/microsoft-edge-browsing-activity-for-personalized-advertising-and-experiences-37aa831e-6372-238e-f33f-7cd3f0e53679
Microsoft Account -> Privacy -> Ad settings:
http://account.microsoft.com/privacy/ad-settings/signedout/
Disable Personalized Ads on Microsoft Sites, Apps + Services:
http://www.laptopmag.com/articles/disable-microsoft-personalized-ads/
Examples above use United States English [en-us]. Your language ID string may be different depending on your installed
Windows operating system (OS) primary/selected language, language preference(s) and/or geographical (geo)location:
http://learn.microsoft.com/cpp/c-runtime-library/language-strings/
WARNING:
********
Unfortunately you must already have, or need to open a (new) Microsoft account in order to be allowed to change most
privacy, safety + security choices/options/preferences/settings on Microsoft and/or associated, contracted, (co)owned,
operated, related, shared 3rd
party/affiliates/associates/branches/brands/companies/divisions/entities/parents/partners/subsidiaries accounts, alerts,
apps, e-mails, enrollments, feeds, memberships, messages, notifications, products, promo(tion)s, reminders, services,
subscriptions, trials, updates, widgets (see above):
http://account.microsoft.com/privacy/
http://account.microsoft.com/account/privacy
http://www.bing.com/account/general/

@ Yahoo! (Y!) Search, Yahoo! Mail + Yahoo! News:
************************************************
- Turn OFF ad tracking in Google, Bing + Yahoo!:
http://www.searchenginewatch.com/2017/03/09/how-to-turn-off-ad-tracking-in-google-bing-and-yahoo/
- Turn OFF Desktop notifications for Yahoo! Mail:
http://help.yahoo.com/kb/SLN26611.html
- Turn OFF notifications from Yahoo! Mail app:
http://en-global.help.yahoo.com/kb/account/enable-notifications-yahoo-mail-sln26439.html
- Turn OFF Yahoo! News Notifications:
http://800emailsupport.com/blog/turn-off-yahoo-news-notification/
WARNING:
********
Unfortunately you must already have, or need to open a (new) Yahoo! account in order to be allowed to change/disable/turn
OFF most of these privacy, safety + security choices/options/preferences/settings (see above).

@ DuckDuckGo (DDG) Search, Privacy Essentials + E-mail Protection:
******************************************************************
DuckDuckGo (DDG) search engine with enhanced privacy:
http://duckduckgo.com/
Disconnect Search (using DuckDuckGo):
http://search.disconnect.me/
Turn OFF/disable/opt OUT of/stop all DuckDuckGo (DDG) ad(vertisment)s, notifications, reminders, subscriptions, feedback,
requests, annoyances -> go to:
http://duckduckgo.com/settings/
-> All Settings -> General tab -> scroll down -> turn OFF/UNcheck all these boxes:
- "Advertisements";
- "Install DuckDuckGo" [this will also automatically turn OFF/disable next setting below];
- "Shows occasional reminders to add DuckDuckGo to your browser";
- "Privacy Newsletters";
- "Shows occasional reminders to sign up for the DuckDuckGo privacy newsletters";
- "Homepage Privacy Tips";
- "Help Improve DuckDuckGo".
DuckDuckGo Help Pages:
http://help.duckduckgo.com/duckduckgo-help-pages/
REMINDER:
*********
You may need to do this all over again once in a while/periodically, because DuckDuckGo may turn back ON/reenable some of
these settings (see above) behind your back/unauthorized/without your approval/consent/knowledge/permission (based on
expiring cookies). ;-(
DuckDuckGo: Google Alternative for Privacy:
http://www.howtogeek.com/710128/what-is-duckduckgo-meet-the-google-alternative-for-privacy/
Switch to DuckDuckGo, a Private Search Engine:
http://www.howtogeek.com/709072/how-to-switch-to-duckduckgo-a-private-search-engine/
Wikipedia: DuckDuckGo:
http://en.wikipedia.org/wiki/DuckDuckGo
Change Default Search Engine on All Browsers + Computers/Devices:
http://kinsta.com/blog/how-to-change-search-engine/
Add DuckDuckGo Search Engine to Your Browser:
http://www.tomsguide.com/how-to/how-to-use-duckduckgo/
DuckDuckGo Privacy Essentials:
http://github.com/duckduckgo/duckduckgo-privacy-extension/
DuckDuckGo E-mail Protection [@duck.com e-mail address, forwarding + blocks trackers -> requires DuckDuckGo extension, or
add-on, or app!]:
http://duckduckgo.com/email/
- Chromium/Chrome extension:
http://chromewebstore.google.com/detail/duckduckgo-privacy-essent/bkdgflcldnnnapblkhphbgpggdiikppg
- Firefox add-on:
http://addons.mozilla.org/firefox/addon/duckduckgo-for-firefox/
- Edge add-on:
http://microsoftedge.microsoft.com/addons/detail/caoacbimdbbljakfhgikoodekdnlcgpk/
- Safari app:
http://apps.apple.com/us/app/duckduckgo-privacy-for-safari/id1482920575/
- Android app:
http://duckduckgo.com/app/
DuckDuckGo E-mail Protection:
http://spreadprivacy.com/protect-your-inbox-with-duckduckgo-email-protection/

@ SearXNG Metasearch:
*********************
SearXNG [maintained + updated SearX fork] open source metasearch engine with enhanced privacy aggregated results from 70+
public search engines, services + sources, highly customizable (repository + source code):
http://github.com/searxng/searxng/
Users are neither tracked nor profiled, NO ad(vertisment)s/marketing/monetization/promo(tion)s/sales/surveillance/spying.
List of all SearXNG available online/preconfigured/preinstalled/ready-to-use public instances/servers:
http://searx.space/
SearX code + instances/servers repository:
http://github.com/searx/searx-instances/
Neocities redirects users to a random SearXNG instance/server:
http://searx.neocities.org/
Fast SearXNG instance/server [using searx.org as example]:
http://searx.org/
SearXNG Preferences [using searx.org as example, highly customizable]:
http://searx.org/preferences
SearXNG Search Syntax + Guide [using searx.org as example]:
http://searx.org/info/en/search-syntax
Neocities: Random SearXNG Metasearch Aggregator + Redirector [JavaScript ON (enabled)]:
http://searx.neocities.org/
Neocities: Random SearXNG Metasearch Aggregator + Redirector [JavaScript OFF (disabled)]:
http://searx.neocities.org/nojs
SearXNG Documentation:
http://docs.searxng.org/
Wikipedia: SearX + SearXNG:
http://en.wikipedia.org/wiki/Searx
Change Default Search Engine on All Browsers + Computers/Devices:
http://kinsta.com/blog/how-to-change-search-engine/
- Chromium/Chrome set your default search engine:
http://support.google.com/chrome/answer/95426/
- Change your default search engine in Firefox:
http://support.mozilla.org/kb/change-your-default-search-settings-firefox/
- Firefox add-on [using searx.be as instance/server]:
http://addons.mozilla.org/firefox/addon/searxng-search/

@ SearX Metasearch:
*******************
SearX [unmaintained = use SearXNG instead -> see above] open source metasearch engine with enhanced privacy aggregated
results from 70+ public search engines, services + sources, highly customizable (repository + source code):
http://github.com/searx/searx/
Users are neither tracked nor profiled, NO ad(vertisment)s/marketing/monetization/promo(tion)s/sales/surveillance/spying.
SearX code + instances/servers repository:
http://github.com/searx/searx-instances/
SearX [using searx.org as example]:
http://searx.org/
SearX Preferences [using searx.org as example, highly customizable]:
http://searx.org/preferences
SearX Search Syntax + Guide [using searx.org as example]:
http://searx.org/info/en/search-syntax
Neocities: Random SearXNG Metasearch Aggregator + Redirector [JavaScript ON (enabled)]:
http://searx.neocities.org/
Neocities: Random SearXNG Metasearch Aggregator + Redirector [JavaScript OFF (disabled)]:
http://searx.neocities.org/nojs
SearX Documentation:
http://searx.github.io/searx/
Wikipedia: SearX + SearXNG:
http://en.wikipedia.org/wiki/Searx
Change Default Search Engine on All Browsers + Computers/Devices:
http://kinsta.com/blog/how-to-change-search-engine/
- Chromium/Chrome set your default search engine:
http://support.google.com/chrome/answer/95426/
- Change your default search engine in Firefox:
http://support.mozilla.org/kb/change-your-default-search-settings-firefox/
- Firefox add-on [using searx.thegpm.org as instance/server]:
http://addons.mozilla.org/firefox/addon/search-searx/

@ Startpage Search + Privacy Protection Add-on + Extension:
***********************************************************
Startpage Search engine with enhanced privacy:
http://www.startpage.com/
Turn OFF/disable/opt OUT of/stop Startpage promo(tion)s, annoyances -> go to:
http://www.startpage.com/do/settings
-> turn OFF/slide left "Promotional messaging".
Change Default Search Engine on All Browsers + Computers/Devices:
http://kinsta.com/blog/how-to-change-search-engine/
Anonymous View by Startpage [English only!]:
http://www.startpage.com/en/anonymous-view/
Startpage Privacy Protection:
http://add.startpage.com/protection/
Wikipedia: Startpage:
http://en.wikipedia.org/wiki/Startpage.com
- Chromium/Chrome extension:
http://chromewebstore.google.com/detail/startpage-privacy-protect/cdkhedhmncjnpabolpjceohohlefegak
- Firefox add-on:
http://addons.mozilla.org/firefox/addon/startpage-privacy-protection/

@ Brave Search:
***************
Brave Search engine with enhanced privacy:
http://search.brave.com/
Turn OFF/disable/opt OUT of/stop Brave annoyances -> go to:
http://search.brave.com/settings/
-> scroll all the way down to the bottom of the page -> turn OFF/slide left "Anonymous usage metrics".
Wikipedia: Brave Search:
http://en.wikipedia.org/wiki/Brave_Search
Change Default Search Engine on All Browsers + Computers/Devices:
http://kinsta.com/blog/how-to-change-search-engine/
- Chromium/Chrome extension:
http://chromewebstore.google.com/detail/brave-search/jojedekgcncccnjhilimdojbfnfamkda
- Firefox add-on:
http://addons.mozilla.org/firefox/addon/brave-search/

@ Qwant Search:
***************
Qwant search engine with enhanced privacy:
http://www.qwant.com/
Qwant Junior search engine with enhanced child/family privacy + safety:
http://www.qwantjunior.com/
Users are neither tracked nor profiled, NO ad(vertisment)s/marketing/monetization/promo(tion)s/sales/surveillance.
About Qwant:
http://about.qwant.com/
Qwant Help:
http://help.qwant.com/
Wikipedia: Qwant:
http://en.wikipedia.org/wiki/Qwant
Change Default Search Engine on All Browsers + Computers/Devices:
http://kinsta.com/blog/how-to-change-search-engine/
- Chromium/Chrome extension:
http://chromewebstore.google.com/detail/qwant-viprivacy/hnlkiofnhhoahaiimdicppgemmmomijo
- Firefox add-on:
http://addons.mozilla.org/firefox/addon/qwantcom-for-firefox/

@ Ecosia Search:
****************
Ecosia search engine with enhanced privacy:
http://www.ecosia.org/
Turn OFF/disable/opt OUT of/stop/UNcheck Ecosia Notifications + Personalized search results -> go to:
http://www.ecosia.org/settings/
-> turn OFF/UNcheck "Personalized search results" + "Notifications" boxes.
Wikipedia: Ecosia:
http://en.wikipedia.org/wiki/Ecosia
Change Default Search Engine on All Browsers + Computers/Devices:
http://kinsta.com/blog/how-to-change-search-engine/
- Chromium/Chrome extension:
http://chromewebstore.google.com/detail/ecosia-the-search-engine/eedlgdlajadkbbjoobobefphmfkcchfk
- Firefox add-on:
http://addons.mozilla.org/firefox/addon/ecosia-the-green-search/

@ 100+ Search Engines:
**********************
MDGx "100+ WWW (World Wide Web) Search Engines" [most have enhanced privacy, safety + security]:
http://www.mdgx.com/links.htm#WSE
______________________________________________________________________________



Chromium/Chrome/X-Chromium/Thorium/Brave/Vivaldi/Supermium Automated Clean-Up



Automatically [eliminating laborious by hand/manual time consuming procedures, multiple steps, interruptions, interference,
etc] + quietly [with 0/minimum output by terminating command lines with " >NUL 2>&1" to render them invisible/quiet/silent]
clean-up/de-bloat by running a single DOS console command line BATch (.bat)/CoMmanD (.cmd) script (plain text) file, which
deletes/erases/removes/wipes out past activity, history, temporary, tracking +
annoying/bloat/suspicious/undesirable/unnecessary/unneeded/unsafe/unused/unwanted/useless files + directories/folders (some
of whom consume large amounts of storage space) created by Chromium, Google Chrome, Chrome Beta, Chrome Dev(eloper)
(Canary), X-Chromium (X-Launcher), Thorium, Brave, Vivaldi, Supermium + other similar
alternatives/derivatives/forks/variants web browsers based on free, open source Chromium code in Windows 7/newer.
BEWARE:
*******
Windows 10 users: my BATch (.bat)/CoMmanD (.cmd) clean-up/de-bloat script file does NOT work with
abandoned/discontinued/obsolete/OLDer/unsupported proprietary Microsoft Edge web browsers (pre-Chromium code based: all
OLDer Edge versions up to 78) files + directory/folder design/layout/structure.
http://www.verizon.com/support/knowledge-base-204588/
http://clear-my-cache.com/windows/microsoft-edge.html
NOTES:
******
- Windows 10 + 11 users of current/updated/NEWer/supported Microsoft Edge web browsers based on heavily modified Chromium
(Canary developer channel) free, open source code (all Edge versions 79 + newer): you can use the BATch (.bat)/CoMmanD
(.cmd) script from this forum
http://techcommunity.microsoft.com/t5/windows-11/example-batch-file-to-clear-browsing-history-on-microsoft-edge/m-p/3281775/
as example/template (+ you most likely need to adapt/customize/modify/update it to match your custom/particular/specific
file/directory/folder design/layout/structure + configuration/needs/preferences) to clean-up/de-bloat your Chromium based
Edge web browser(s).
- Firefox + Firefox based alternatives/derivatives/forks/variants free, open source code web browsers users: you can use
the BATch (.bat)/CoMmanD (.cmd) script from this forum
http://techcommunity.microsoft.com/t5/windows-11/example-batch-file-to-clear-browsing-history-on-microsoft-edge/m-p/3281775/highlight/true#M3276
as example/template (+ you most likely need to adapt/customize/modify/update it to match your custom/particular/specific
file/directory/folder design/layout/structure + configuration/needs/preferences) to clean-up/de-bloat your Firefox and/or
Firefox based alternative(s)/derivative(s)/fork(s)/variant(s) web browser(s) -> see "Free(ware) Windows 9x/NTx Web Browsers"
chapter -> "Firefox" section in SOFTWARE.TXT (included):
http://www.mdgx.com/nettoys.htm#MOZ
FYI:
****
To clear/delete/remove stored web browser cookies:
- See topic #18 ["18. Go to..."] -> part of "@ Chromium/Chrome web browsers + alternatives/derivatives/forks/variants"
section -> part of "Digital + Internet/Online Privacy, Safety + Security = Your Top Priority" chapter further above in
WINDOWS7.TXT (this file):
http://www.mdgx.com/7.php#:~:text=%40%20Chromium%2FChrome%20web%20browsers%20%2B%20alternatives%2Fderivatives%2Fforks%2Fvariants%20%5B%2A%5D
- See "* Everything about HTTP/web/internet/browser Cookies:" section further above in WINDOWS7.TXT (this file):
http://www.mdgx.com/7.php#:~:text=%2A%20Everything%20about%20HTTP%2Fweb%2Finternet%2Fbrowser%20Cookies%3A
- ClearCookies BATch (.bat) file [ClearCookies.bat] deletes all stored cookies from most popular web browsers:
Chrome/Chromium, Firefox, Internet Explorer (IE), Opera, Safari:
http://github.com/CCrashZer0/ClearCookies/
File:
http://github.com/CCrashZer0/ClearCookies/blob/master/ClearCookies.bat
1st Things 1st:
***************
1. Make a BACKUP copy/clone of all your web browser(s) user profile(s) directories/folders + files to a safe location before
running this DOS console command line BATch (.bat)/CoMmanD (.cmd) script plain text/ASCII file, which deletes/removes a lot
of files + directories/folders from your web browser(s) user profile(s).
FYI:
****
Here are the most popular/used Chromium, Chrome + Chromium alternatives/derivatives/forks/variants (based on Chromium code)
-> see "Free(ware) Windows 9x/NTx Web Browsers" chapter -> "Chromium + Chrome" section in SOFTWARE.TXT (included):
http://www.mdgx.com/nettoys.htm#CHR
built-in/default/preset web browser user profile locations in Windows Vista/newer, and all of them are covered in this BATch
(.bat)/CoMmanD (.cmd) clean-up/de-bloat script plain text/ASCII file (see further below):
- Chromium (original/unmodified/untouched stable Chromium code) 32-bit + 64-bit web browsers:
http://chromium.googlesource.com/chromium/src/+/master/docs/user_data_dir.md
and precompiled portable Chromium 32-bit + 64-bit web browsers:
http://chromium.woolyss.com/
%UserProfile%\AppData\Local\Chromium [%UserProfile% = C:\Users\User_Name]
%AppData%\Local\Chromium [%AppData% = C:\Users\User_Name\AppData]
User_Name is replaced with your actual user name.
http://renenyffenegger.ch/notes/Windows/dirs/Users/username/
Get Degoogled/Ungoogled/stripped of Google ad(ware)/integration/spyware/surveillance/tracking code Chromium builds [clearly
labeled, portable]:
http://ungoogled-software.github.io/ungoogled-chromium-binaries/
- Chrome Beta (original/unmodified/untouched Chromium test code) 32-bit + 64-bit web browsers:
http://chromium.googlesource.com/chromium/src/+/master/docs/user_data_dir.md
%UserProfile%\AppData\Local\Google\Chrome Beta [%UserProfile% = C:\Users\User_Name]
%AppData%\Local\Google\Chrome Beta [%AppData% = C:\Users\User_Name\AppData]
User_Name is replaced with your actual user name.
Get Chrome Beta:
http://www.google.com/chrome/beta/
- Chrome Dev(eloper) (Canary) (original/unmodified/untouched Chromium test code) 32-bit + 64-bit web browsers:
http://chromium.googlesource.com/chromium/src/+/master/docs/user_data_dir.md
%UserProfile%\AppData\Local\Google\Chrome SxS [%UserProfile% = C:\Users\User_Name]
%AppData%\Local\Google\Chrome SxS [%AppData% = C:\Users\User_Name\AppData]
User_Name is replaced with your actual user name.
Get Chrome Dev(eloper) (Canary):
http://www.google.com/chrome/dev/
- Google Chrome (Google modified Chromium stable code) 32-bit + 64-bit web browser:
http://support.google.com/chrome/a/answer/7349337/
%UserProfile%\AppData\Local\Google\Chrome [%UserProfile% = C:\Users\User_Name]
%AppData%\Local\Google\Chrome [%AppData% = C:\Users\User_Name\AppData]
User_Name is replaced with your actual user name.
Get Google Chrome:
http://support.google.com/chrome/answer/95346/
- Thorium (AVX)/Thorium AVX2 (hardware optimized Chromium forks) 64-bit web browsers:
http://support.google.com/chrome/a/answer/7349337/
%UserProfile%\AppData\Local\Thorium [%UserProfile% = C:\Users\User_Name]
%AppData%\Local\Thorium [%AppData% = C:\Users\User_Name\AppData]
User_Name is replaced with your actual user name.
Get Thorium AVX2 (3D rendering + HD/VHD/UHD video playback hardware optimized, portable):
http://github.com/Alex313031/Thorium-Win/releases/latest/
Get Thorium (CPU extensions hardware optimized, portable):
Thorium latest build for Windows 10/11 [ZIP = full, Portable]:
http://github.com/Alex313031/Thorium-Win/releases/latest/
Thorium newest build for Windows 7/8/8.1 [ZIP = full, Portable]:
http://github.com/Alex313031/thorium-win7/releases/latest/
- Brave (improved privacy, safety + security + optimized speed Chromium fork) 32-bit + 64-bit web browser:
http://community.brave.com/t/where-does-brave-store-its-data-files/53830/
%UserProfile%\AppData\Local\BraveSoftware [%UserProfile% = C:\Users\User_Name]
%AppData%\Local\BraveSoftware [%AppData% = C:\Users\User_Name\AppData]
User_Name is replaced with your actual user name.
Get Brave (portable):
http://github.com/brave/brave-browser/releases/latest/
- Vivaldi (enhanced privacy, safety + security Chromium fork) 32-bit + 64-bit web browser:
http://techdows.com/2015/06/find-vivaldi-browser-installed-location-or-path.html
%UserProfile%\AppData\Local\Vivaldi [%UserProfile% = C:\Users\User_Name]
%AppData%\Local\Vivaldi [%AppData% = C:\Users\User_Name\AppData]
User_Name is replaced with your actual user name.
Get Vivaldi (portable -> Install standalone):
http://vivaldi.com/download/
- Supermium (optimized speed + performance Chromium fork) 32-bit + 64-bit web browser:
http://www.win32subsystem.live/supermium.html
Get Supermium newest build [EXE = full, Installer +/- ZIP = full, Portable]:
http://github.com/win32ss/supermium/releases/latest/
%UserProfile%\AppData\Local\Supermium [%UserProfile% = C:\Users\User_Name]
%AppData%\Local\Supermium [%AppData% = C:\Users\User_Name\AppData]
User_Name is replaced with your actual user name.
- X-Chromium (X-Launcher) (winPenPack X-Software launcher portability/redirection tools + original/unmodified/untouched
Chromium code) 32-bit + 64-bit web browser:
http://www.winpenpack.com/en/page.php?26
X:\X-Software\User\Program_Name
Replace all generic letters + names [X:, X-Software, User + Program_Name above] with your actual X-Chromium (X-Launcher)
drive/partition/volume letter, base/main directory/folder name + user name (if any).
In this example I use C:\PORT\CHROME = replace it to match yours (if different) -> see DOS console command line BATch
(.bat)/CoMmanD (.cmd) file below.
Get X-Chromium (portable):
http://www.winpenpack.com/en/download.php?view.1082
2. Chromium/Chrome + alternatives/derivatives/forks/variants directory/folder structure/tree layout + default locations:
open (File) Explorer -> go to the directory (directories)/folder(s) where your Chromium based web browser(s) keep(s)
its/their user profile location(s) -> see 1. further above.
You can view/save/print any directory/folder tree structure: from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]:
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command (using Chromium in this example):
DIR "%UserProfile%\AppData\Local\Chromium" /A:D /B /S
OR:
DIR "%AppData%\Local\Chromium" /A:D /B /S
-> press Enter.
View DIR [Directory] built-in command options, switches + parameters: from a DOS console command prompt
[%WinDir%\SYSTEM32\CMD.EXE] right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter:
DIR /?
Save your DIR output screen as plain text/ASCII (.txt) file, you can view/edit/print using Notepad/similar/better free(ware)
plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
using same example above:
DIR "%UserProfile%\AppData\Local\Chromium" /A:D /B /S>%TEMP%\Chromium_User_Profile_tree.txt
OR:
DIR "%AppData%\Local\Chromium" /A:D /B /S>%TEMP%\Chromium_User_Profile_tree.txt
In this case Chromium_User_Profile_tree.txt is saved in your Temp(orary) [%TEMP%] directory/folder, usually
%UserProfile%\AppData\Local\Temp
OR:
%AppData%\Local\Temp
in Windows Vista/newer, where %UserProfile% = your actual user name.
View your default/preset (unless you changed it) system Temp(orary) [%TEMP%] directory/folder location: from a DOS console
command prompt [%WinDir%\SYSTEM32\CMD.EXE] right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command ->
press Enter:
PATH
Scroll down to these 2 environment variables (generic example):
TEMP=C:\Users\User_Name\AppData\Local\Temp
TMP=C:\Users\User_Name\AppData\Local\Temp
User_Name is replaced with your actual user name.
References:
- Chromium/Chrome User Data Directory:
http://chromium.googlesource.com/chromium/src/+/master/docs/user_data_dir.md
- Chromium OS Local & Remote Source Tree Layouts:
http://chromium.googlesource.com/chromiumos/docs/+/HEAD/source_layout.md
- Getting Around the Chromium Source Code Directory Structure:
http://www.chromium.org/developers/how-tos/getting-around-the-chrome-source-code/
- Structure of Chromium/Chrome User Profile data:
http://superuser.com/questions/951095/
- Chromium/Chrome directory/folder hierarchy/tree:
http://chromium.googlesource.com/chromium/src.git/+/78b64f6ab701b31e69dc822adde685ebe55c62b1/
- Chromium/Chrome Cookies and Network Data:
http://www.avanite.com/blog/chromium-cookies-and-network-data/
- Location of Chromium/Chrome history:
http://www.foxtonforensics.com/browser-history-examiner/chrome-history-location/
3. Test this DOS console command line BATch (.bat)/CoMmanD (.cmd) file (see further below) to make sure it works properly on
your Windows 7/newer computer(s)/device(s) and in your specific environment(s), because certain hardware/software/system
configurations/customizations/requirements/settings may need some of these files +/- directories/folders +/- have
changed/different locations.
4. After that customize/edit/modify it by opening it in Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
and comment/disable/remark the lines you see fit +/- don't wish to use according to your specific
configurations/customizations/needs/preferences/requirements/settings by adding a double colon and a space [:: ] in front of
each line, or you can delete/erase/remove them altogether, +/- add new ones to match your needs/preferences/settings.
REQUIREMENTS:
*************
1. Must (double-)click/execute/launch/open/run/start DOS console command line BATch (.bat)/CoMmanD (.cmd) file (further
below) as Administrator -> right-click it or its icon/item/link/shortcut -> select "Run as Administrator".
2. Make sure *none* of these EXEcutables (.exe files): Chrome.exe, Chromium.exe, X-Chromium.exe, Thorium.exe, Brave.exe
and/or Vivaldi.exe is/are open/running, not even in the background, minimized or on standby.
Execute/launch/open/run/start Task Manager:
http://www.wikihow.com/Open-Windows-Task-Manager/
http://www.howtogeek.com/66622/stupid-geek-tricks-6-ways-to-open-windows-task-manager/
Start -> Run... [hold WinKey + press R] -> type this command:
taskmgr.exe
-> press Enter or click OK.
Task Manager [TaskMgr.exe] executable is located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually C:\WINDOWS].
View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]:
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command
PATH
-> press Enter.
Windows 10/newer users (optional): execute/launch/open/run/start LaunchTM.exe the same way.
Launch Task Manager [LaunchTM.exe] executable is located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually
C:\WINDOWS].
Task Manager window -> click "Processes" tab -> scroll down and look for any of the Chromium/Chrome or/and
alternatives/derivatives/forks/variants EXEcutables (.exe) listed above.
In case you see any of the EXEcutables (.exe) listed above: right-click on each of them 1 at a time (if more than 1) ->
select "End Process Tree" as many times as necessary to make sure you close *all* instances, or if there is only 1 listed ->
select "End Process".
Therefore...
To be able to delete all files + directories/folders listed below 1st you *MUST* close/exit/shutdown completely *all*
open/running (even in the background)/idle/resident instances of Chrome, Chromium, X-Chromium (X-Launcher), Thorium, Brave,
Vivaldi and/or Supermium EXEcutables (.exe files), and *only* after that right-click (once again) this DOS console command
line BATch (.bat)/CoMmanD (.cmd) file or its icon/item/link/shortcut (in case you created 1) -> select "Run as
Administrator".
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text BATch (.bat) or CoMmanD (.cmd) script file containing the lines between Cut & Paste delimiters below
-> save it as plain text/ASCII file (Encode: -> ANSI) with the BAT (.bat) or CMD (.cmd) extension -> right-click it ->
Run as Administrator -> wait for completion.
-----Begin cut & paste here-----
@ECHO OFF
IF NOT "%OS%"=="Windows_NT" GOTO END
COLOR E4
TITLE "Delete Bloat/Suspicious/Unsafe/Useless (X-)Chrom(ium)/Brave/Thorium/Vivaldi/Supermium files + directories/folders..."
CD\
FOR /D %%g IN ("%ProgramFiles%\chrome_url_fetch*") DO IF EXIST "%ProgramFiles%\chrome_url_fetch*" RMDIR /S /Q "%%~g"
FOR /D %%g IN ("%ProgramFiles(x86)%\chrome_url_fetch*") DO IF EXIST "%ProgramFiles(x86)%\chrome_url_fetch*" RMDIR /S /Q "%%~g"
FOR /D %%g IN ("%ProgramData%\chrome_url_fetch*") DO IF EXIST "%ProgramData%\chrome_url_fetch*" RMDIR /S /Q "%%~g"
:: @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ Chromium @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
:: Chromium (Portable) [Chromium.exe] web browsers user profile base/main directory/folder =
:: %UserProfile%\AppData\Local\Chromium [where %UserProfile% is C:\Users\User_Name = User_Name is replaced with your actual
:: user name]:
TASKLIST.EXE>%TEMP%\CHROM_RUN!.TXT
FIND.EXE /I "CHROM" "%TEMP%\CHROM_RUN!.TXT" >NUL 2>&1
IF NOT ERRORLEVEL 1 GOTO NXT1
TAKEOWN.EXE /f "%UserProfile%\AppData\Local\Chromium" /r /d y >NUL 2>&1
ICACLS.EXE "%UserProfile%\AppData\Local\Chromium" /grant:R %UserName%:F Administrators:F /t /c /q >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Chromium\debug*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Chromium\*.corrupt" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Chromium\*crash*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Chromium\licens*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Chromium\about*.txt" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Chromium\CHANGELOG*.txt" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Chromium\*licens*.txt" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Chromium\*.bak" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Chromium\*.pma" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Chromium\BrowserMetric*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Chromium\BrowsingTopic*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Chromium\CrashpadMetric*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Chromium\Cach*.pak" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Chromium\*.old" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Chromium\*.tmp" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Chromium\LOCK" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Chromium\lockfil*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Chromium\LOG" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Chromium\chrome_shut*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Chromium\first_party_set*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Chromium\persisted_first_party_set*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Chromium\*-journal.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Chromium\User Data\Default\File System\00000*" >NUL 2>&1
DEL /F /Q "%UserProfile%\AppData\Local\Chromium\User Data\Default\Local Storage\leveldb\*.ldb" >NUL 2>&1
DEL /F /Q "%UserProfile%\AppData\Local\Chromium\User Data\Default\DownloadMetadata" >NUL 2>&1
DEL /F /Q "%UserProfile%\AppData\Local\Chromium\User Data\Default\History" >NUL 2>&1
DEL /F /Q "%UserProfile%\AppData\Local\Chromium\User Data\Default\InterestGroups" >NUL 2>&1
DEL /F /Q "%UserProfile%\AppData\Local\Chromium\User Data\Default\MediaDeviceSalts" >NUL 2>&1
DEL /F /Q "%UserProfile%\AppData\Local\Chromium\User Data\Default\PrivateAggregation" >NUL 2>&1
DEL /F /Q "%UserProfile%\AppData\Local\Chromium\User Data\Default\Visited Links" >NUL 2>&1
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\BrowserMetrics"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\component_crx_cache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Crash pad"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Crashpad"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\DeferredBrowserMetrics"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\DesktopSharingHub"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Floc"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\GraphiteDawnCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\GrShaderCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Local Traces"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\PnaclTranslationCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\PrivacySandboxAttestationsPreloaded"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\ShaderCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\System Profile"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\TpcdMetadata"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Webstore Downloads"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\AutofillStrikeDatabase"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\blob_storage"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\BudgetDatabase"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\Cache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\Code Cache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\commerce_subscription_db"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\coupon_db"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\Crash pad"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\Crashpad"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\data_reduction_proxy_leveldb"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\DawnCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\discounts_db"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\Download Service"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\Feature Engagement Tracker"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\GCM Store"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\GPUCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\GrShaderCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\optimization_guide_hint_cache_store"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\optimization_guide_model_and_features_store"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\optimization_guide_model_metadata_store"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\optimization_guide_prediction_model_downloads"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\PersistentOriginTrials"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\Platform Notifications"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\Search Logos"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\Segmentation Platform"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\Service Worker"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\Session Storage"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\Sessions"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\shared_proto_db"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\Thumbnails"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\VideoDecodeStats"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\Web Applications"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\WebrtcVideoStats"
:NXT1
:: @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ Chrome Beta @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
:: Chrome Beta web browser [Chrome.exe] user profile base/main directory/folder =
:: %UserProfile%\AppData\Local\Google\Chrome Beta [where %UserProfile% is C:\Users\User_Name = User_Name is replaced with
:: your actual user name]:
TASKLIST.EXE>%TEMP%\CHROM_RUN!.TXT
FIND.EXE /I "CHROM" "%TEMP%\CHROM_RUN!.TXT" >NUL 2>&1
IF NOT ERRORLEVEL 1 GOTO NXT2
TAKEOWN.EXE /f "%UserProfile%\AppData\Local\Google\Chrome Beta" /r /d y >NUL 2>&1
ICACLS.EXE "%UserProfile%\AppData\Local\Google\Chrome Beta" /grant:R %UserName%:F Administrators:F /t /c /q >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome Beta\debug*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome Beta\*.corrupt" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome Beta\*crash*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome Beta\licens*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome Beta\about*.txt" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome Beta\CHANGELOG*.txt" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome Beta\*licens*.txt" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome Beta\*.bak" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome Beta\*.pma" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome Beta\BrowserMetric*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome Beta\BrowsingTopic*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome Beta\CrashpadMetric*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome Beta\Cach*.pak" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome Beta\*.old" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome Beta\*.tmp" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome Beta\LOCK" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome Beta\lockfil*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome Beta\LOG" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome Beta\chrome_shut*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome Beta\first_party_set*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome Beta\persisted_first_party_set*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome Beta\*-journal.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\File System\00000*" >NUL 2>&1
DEL /F /Q "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\Local Storage\leveldb\*.ldb" >NUL 2>&1
DEL /F /Q "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\DownloadMetadata" >NUL 2>&1
DEL /F /Q "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\History" >NUL 2>&1
DEL /F /Q "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\InterestGroups" >NUL 2>&1
DEL /F /Q "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\MediaDeviceSalts" >NUL 2>&1
DEL /F /Q "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\PrivateAggregation" >NUL 2>&1
DEL /F /Q "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\Visited Links" >NUL 2>&1
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\BrowserMetrics"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\component_crx_cache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Crash pad"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Crashpad"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\DeferredBrowserMetrics"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\DesktopSharingHub"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Floc"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\GraphiteDawnCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\GrShaderCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Local Traces"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\PnaclTranslationCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\PrivacySandboxAttestationsPreloaded"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\ShaderCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\System Profile"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\TpcdMetadata"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Webstore Downloads"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\AutofillStrikeDatabase"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\blob_storage"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\BudgetDatabase"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\Cache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\Code Cache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\commerce_subscription_db"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\coupon_db"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\Crash pad"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\Crashpad"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\data_reduction_proxy_leveldb"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\DawnCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\discounts_db"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\Download Service"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\Feature Engagement Tracker"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\GCM Store"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\GPUCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\GrShaderCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\optimization_guide_hint_cache_store"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\optimization_guide_model_and_features_store"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\optimization_guide_model_metadata_store"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\optimization_guide_prediction_model_downloads"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\PersistentOriginTrials"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\Platform Notifications"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\Search Logos"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\Segmentation Platform"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\Service Worker"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\Session Storage"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\Sessions"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\shared_proto_db"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\Thumbnails"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\VideoDecodeStats"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\Web Applications"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\WebrtcVideoStats"
:NXT2
:: @@@@@@@@@@@@@@@@@@@@@@@ Chrome Dev(eloper) (Canary) @@@@@@@@@@@@@@@@@@@@@@@
:: Chrome Dev(eloper) (Canary) [Chrome.exe] web browser user profile base/main directory/folder =
:: %UserProfile%\AppData\Local\Google\Chrome SxS [where %UserProfile% is C:\Users\User_Name = User_Name is replaced with
:: your actual user name]:
TASKLIST.EXE>%TEMP%\CHROM_RUN!.TXT
FIND.EXE /I "CHROM" "%TEMP%\CHROM_RUN!.TXT" >NUL 2>&1
IF NOT ERRORLEVEL 1 GOTO NXT3
TAKEOWN.EXE /f "%UserProfile%\AppData\Local\Google\Chrome SxS" /r /d y >NUL 2>&1
ICACLS.EXE "%UserProfile%\AppData\Local\Google\Chrome SxS" /grant:R %UserName%:F Administrators:F /t /c /q >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome SxS\debug*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome SxS\*.corrupt" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome SxS\*crash*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome SxS\licens*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome SxS\about*.txt" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome SxS\CHANGELOG*.txt" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome SxS\*licens*.txt" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome SxS\*.bak" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome SxS\*.pma" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome SxS\BrowserMetric*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome SxS\BrowsingTopic*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome SxS\CrashpadMetric*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome SxS\Cach*.pak" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome SxS\*.old" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome SxS\*.tmp" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome SxS\LOCK" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome SxS\lockfil*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome SxS\LOG" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome SxS\chrome_shut*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome SxS\first_party_set*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome SxS\persisted_first_party_set*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome SxS\*-journal.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\File System\00000*" >NUL 2>&1
DEL /F /Q "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\Local Storage\leveldb\*.ldb" >NUL 2>&1
DEL /F /Q "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\DownloadMetadata" >NUL 2>&1
DEL /F /Q "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\History" >NUL 2>&1
DEL /F /Q "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\InterestGroups" >NUL 2>&1
DEL /F /Q "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\MediaDeviceSalts" >NUL 2>&1
DEL /F /Q "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\PrivateAggregation" >NUL 2>&1
DEL /F /Q "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\Visited Links" >NUL 2>&1
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\BrowserMetrics"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\component_crx_cache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Crash pad"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Crashpad"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\DeferredBrowserMetrics"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\DesktopSharingHub"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Floc"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\GraphiteDawnCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\GrShaderCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Local Traces"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\PnaclTranslationCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\PrivacySandboxAttestationsPreloaded"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\ShaderCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\System Profile"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\TpcdMetadata"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Webstore Downloads"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\AutofillStrikeDatabase"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\blob_storage"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\BudgetDatabase"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\Cache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\Code Cache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\commerce_subscription_db"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\coupon_db"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\Crash pad"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\Crashpad"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\data_reduction_proxy_leveldb"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\DawnCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\discounts_db"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\Download Service"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\Feature Engagement Tracker"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\GCM Store"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\GPUCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\GrShaderCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\optimization_guide_hint_cache_store"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\optimization_guide_model_and_features_store"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\optimization_guide_model_metadata_store"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\optimization_guide_prediction_model_downloads"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\PersistentOriginTrials"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\Platform Notifications"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\Search Logos"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\Segmentation Platform"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\Service Worker"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\Session Storage"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\Sessions"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\shared_proto_db"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\Thumbnails"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\VideoDecodeStats"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\Web Applications"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\WebrtcVideoStats"
:NXT3
:: @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ Google Chrome @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
:: Google Chrome [Chrome.exe] web browser user profile base/main directory/folder =
:: %UserProfile%\AppData\Local\Google\Chrome [where %UserProfile% is C:\Users\User_Name = User_Name is replaced with your
:: actual user name]:
TASKLIST.EXE>%TEMP%\CHROM_RUN!.TXT
FIND.EXE /I "CHROM" "%TEMP%\CHROM_RUN!.TXT" >NUL 2>&1
IF NOT ERRORLEVEL 1 GOTO NXT4
TAKEOWN.EXE /f "%UserProfile%\AppData\Local\Google\Chrome" /r /d y >NUL 2>&1
ICACLS.EXE "%UserProfile%\AppData\Local\Google\Chrome" /grant:R %UserName%:F Administrators:F /t /c /q >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome\debug*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome\*.corrupt" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome\*crash*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome\licens*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome\about*.txt" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome\CHANGELOG*.txt" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome\*licens*.txt" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome\*.bak" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome\*.pma" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome\BrowserMetric*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome\BrowsingTopic*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome\CrashpadMetric*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome\Cach*.pak" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome\*.old" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome\*.tmp" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome\LOCK" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome\lockfil*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome\LOG" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome\chrome_shut*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome\first_party_set*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome\persisted_first_party_set*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome\*-journal.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\File System\00000*" >NUL 2>&1
DEL /F /Q "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\*.ldb" >NUL 2>&1
DEL /F /Q "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\DownloadMetadata" >NUL 2>&1
DEL /F /Q "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\History" >NUL 2>&1
DEL /F /Q "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\InterestGroups" >NUL 2>&1
DEL /F /Q "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\MediaDeviceSalts" >NUL 2>&1
DEL /F /Q "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\PrivateAggregation" >NUL 2>&1
DEL /F /Q "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\Visited Links" >NUL 2>&1
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\BrowserMetrics"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\component_crx_cache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Crash pad"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Crashpad"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\DeferredBrowserMetrics"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\DesktopSharingHub"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Floc"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\GraphiteDawnCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\GrShaderCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Local Traces"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\PnaclTranslationCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\PrivacySandboxAttestationsPreloaded"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\ShaderCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\System Profile"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\TpcdMetadata"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Webstore Downloads"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\AutofillStrikeDatabase"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\blob_storage"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\Cache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\Code Cache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\coupon_db"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\Crash pad"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\Crashpad"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\DawnCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\discounts_db"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\Download Service"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\GCM Store"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\GPUCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\GrShaderCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_hint_cache_store"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_model_and_features_store"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_model_metadata_store"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\PersistentOriginTrials"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\Platform Notifications"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\Search Logos"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\Segmentation Platform"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\Service Worker"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\Session Storage"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\Sessions"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\Thumbnails"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\VideoDecodeStats"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\Web Applications"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\WebrtcVideoStats"
:NXT4
:: @@@@@@@@@@@@@@@@@@@@@@@@ Thorium (AVX)/Thorium AVX2 @@@@@@@@@@@@@@@@@@@@@@@
:: Thorium (AVX)/Thorium AVX2 (Portable) [Thorium.exe] web browsers user profile base/main directory/folder =
:: %UserProfile%\AppData\Local\Thorium [where %UserProfile% is C:\Users\User_Name = User_Name is replaced with your actual
:: user name]:
TASKLIST.EXE>%TEMP%\CHROM_RUN!.TXT
FIND.EXE /I "THORIUM" "%TEMP%\CHROM_RUN!.TXT" >NUL 2>&1
IF NOT ERRORLEVEL 1 GOTO NXT5
TAKEOWN.EXE /f "%UserProfile%\AppData\Local\Thorium" /r /d y >NUL 2>&1
ICACLS.EXE "%UserProfile%\AppData\Local\Thorium" /grant:R %UserName%:F Administrators:F /t /c /q >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Thorium\debug*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Thorium\*.corrupt" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Thorium\*crash*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Thorium\licens*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Thorium\about*.txt" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Thorium\CHANGELOG*.txt" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Thorium\*licens*.txt" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Thorium\*.bak" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Thorium\*.pma" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Thorium\BrowserMetric*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Thorium\BrowsingTopic*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Thorium\CrashpadMetric*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Thorium\Cach*.pak" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Thorium\*.old" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Thorium\*.tmp" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Thorium\LOCK" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Thorium\lockfil*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Thorium\LOG" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Thorium\chrome_shut*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Thorium\first_party_set*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Thorium\persisted_first_party_set*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Thorium\*-journal.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Thorium\User Data\Default\File System\00000*" >NUL 2>&1
DEL /F /Q "%UserProfile%\AppData\Local\Thorium\User Data\Default\Local Storage\leveldb\*.ldb" >NUL 2>&1
DEL /F /Q "%UserProfile%\AppData\Local\Thorium\User Data\Default\DownloadMetadata" >NUL 2>&1
DEL /F /Q "%UserProfile%\AppData\Local\Thorium\User Data\Default\History" >NUL 2>&1
DEL /F /Q "%UserProfile%\AppData\Local\Thorium\User Data\Default\InterestGroups" >NUL 2>&1
DEL /F /Q "%UserProfile%\AppData\Local\Thorium\User Data\Default\MediaDeviceSalts" >NUL 2>&1
DEL /F /Q "%UserProfile%\AppData\Local\Thorium\User Data\Default\PrivateAggregation" >NUL 2>&1
DEL /F /Q "%UserProfile%\AppData\Local\Thorium\User Data\Default\Visited Links" >NUL 2>&1
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\BrowserMetrics"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\component_crx_cache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Crash pad"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Crashpad"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\DeferredBrowserMetrics"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\DesktopSharingHub"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Floc"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\GraphiteDawnCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\GrShaderCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Local Traces"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\PnaclTranslationCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\PrivacySandboxAttestationsPreloaded"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\ShaderCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\System Profile"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\TpcdMetadata"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Webstore Downloads"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\AutofillStrikeDatabase"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\blob_storage"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\BudgetDatabase"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\Cache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\Code Cache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\commerce_subscription_db"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\coupon_db"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\Crash pad"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\Crashpad"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\data_reduction_proxy_leveldb"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\DawnCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\discounts_db"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\Download Service"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\Feature Engagement Tracker"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\GCM Store"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\GPUCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\GrShaderCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\optimization_guide_hint_cache_store"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\optimization_guide_model_and_features_store"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\optimization_guide_model_metadata_store"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\optimization_guide_prediction_model_downloads"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\PersistentOriginTrials"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\Platform Notifications"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\Search Logos"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\Segmentation Platform"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\Service Worker"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\Session Storage"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\Sessions"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\shared_proto_db"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\Thumbnails"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\VideoDecodeStats"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\Web Applications"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\WebrtcVideoStats"
:NXT5
:: @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ Brave @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
:: Brave (Portable) [Brave.exe] web browser user profile base/main directory/folder =
:: %UserProfile%\AppData\Local\BraveSoftware [where %UserProfile% is C:\Users\User_Name = User_Name is replaced with your
:: actual user name]:
TASKLIST.EXE>%TEMP%\CHROM_RUN!.TXT
FIND.EXE /I "BRAVE" "%TEMP%\CHROM_RUN!.TXT" >NUL 2>&1
IF NOT ERRORLEVEL 1 GOTO NXT6
TAKEOWN.EXE /f "%UserProfile%\AppData\Local\BraveSoftware" /r /d y >NUL 2>&1
ICACLS.EXE "%UserProfile%\AppData\Local\BraveSoftware" /grant:R %UserName%:F Administrators:F /t /c /q >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\BraveSoftware\debug*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\BraveSoftware\*.corrupt" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\BraveSoftware\*crash*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\BraveSoftware\licens*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\BraveSoftware\about*.txt" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\BraveSoftware\CHANGELOG*.txt" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\BraveSoftware\*licens*.txt" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\BraveSoftware\*.bak" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\BraveSoftware\*.pma" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\BraveSoftware\BrowserMetric*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\BraveSoftware\BrowsingTopic*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\BraveSoftware\CrashpadMetric*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\BraveSoftware\Cach*.pak" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\BraveSoftware\*.old" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\BraveSoftware\*.tmp" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\BraveSoftware\LOCK" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\BraveSoftware\lockfil*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\BraveSoftware\LOG" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\BraveSoftware\chrome_shut*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\BraveSoftware\first_party_set*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\BraveSoftware\persisted_first_party_set*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\BraveSoftware\*-journal.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\File System\00000*" >NUL 2>&1
DEL /F /Q "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\Local Storage\leveldb\*.ldb" >NUL 2>&1
DEL /F /Q "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\DownloadMetadata" >NUL 2>&1
DEL /F /Q "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\History" >NUL 2>&1
DEL /F /Q "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\InterestGroups" >NUL 2>&1
DEL /F /Q "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\MediaDeviceSalts" >NUL 2>&1
DEL /F /Q "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\PrivateAggregation" >NUL 2>&1
DEL /F /Q "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\Visited Links" >NUL 2>&1
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\BrowserMetrics"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\component_crx_cache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Crash pad"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Crashpad"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\DeferredBrowserMetrics"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\DesktopSharingHub"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Floc"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\GraphiteDawnCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\GrShaderCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Local Traces"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\PnaclTranslationCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\PrivacySandboxAttestationsPreloaded"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\ShaderCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\System Profile"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\TpcdMetadata"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Webstore Downloads"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\AutofillStrikeDatabase"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\blob_storage"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\BudgetDatabase"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\Cache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\Code Cache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\commerce_subscription_db"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\coupon_db"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\Crash pad"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\Crashpad"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\data_reduction_proxy_leveldb"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\DawnCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\discounts_db"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\Download Service"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\Feature Engagement Tracker"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\GCM Store"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\GPUCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\GrShaderCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\optimization_guide_hint_cache_store"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\optimization_guide_model_and_features_store"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\optimization_guide_model_metadata_store"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\optimization_guide_prediction_model_downloads"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\PersistentOriginTrials"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\Platform Notifications"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\Search Logos"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\Segmentation Platform"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\Service Worker"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\Session Storage"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\Sessions"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\shared_proto_db"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\Thumbnails"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\VideoDecodeStats"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\Web Applications"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\WebrtcVideoStats"
:NXT6
:: @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ Vivaldi @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
:: Vivaldi (Install standalone) [Vivaldi.exe] web browser user profile base/main directory/folder =
:: %UserProfile%\AppData\Local\Vivaldi [where %UserProfile% is C:\Users\User_Name = User_Name is replaced with your actual
:: user name]:
TASKLIST.EXE>%TEMP%\CHROM_RUN!.TXT
FIND.EXE /I "VIVALDI" "%TEMP%\CHROM_RUN!.TXT" >NUL 2>&1
IF NOT ERRORLEVEL 1 GOTO NXT7
TAKEOWN.EXE /f "%UserProfile%\AppData\Local\Vivaldi" /r /d y >NUL 2>&1
ICACLS.EXE "%UserProfile%\AppData\Local\Vivaldi" /grant:R %UserName%:F Administrators:F /t /c /q >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Vivaldi\debug*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Vivaldi\*.corrupt" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Vivaldi\*crash*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Vivaldi\licens*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Vivaldi\about*.txt" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Vivaldi\CHANGELOG*.txt" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Vivaldi\*licens*.txt" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Vivaldi\*.bak" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Vivaldi\*.pma" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Vivaldi\BrowserMetric*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Vivaldi\BrowsingTopic*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Vivaldi\CrashpadMetric*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Vivaldi\Cach*.pak" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Vivaldi\*.old" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Vivaldi\*.tmp" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Vivaldi\LOCK" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Vivaldi\lockfil*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Vivaldi\LOG" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Vivaldi\chrome_shut*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Vivaldi\first_party_set*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Vivaldi\persisted_first_party_set*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Vivaldi\*-journal.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\File System\00000*" >NUL 2>&1
DEL /F /Q "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\Local Storage\leveldb\*.ldb" >NUL 2>&1
DEL /F /Q "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\DownloadMetadata" >NUL 2>&1
DEL /F /Q "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\History" >NUL 2>&1
DEL /F /Q "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\InterestGroups" >NUL 2>&1
DEL /F /Q "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\MediaDeviceSalts" >NUL 2>&1
DEL /F /Q "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\PrivateAggregation" >NUL 2>&1
DEL /F /Q "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\Visited Links" >NUL 2>&1
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\BrowserMetrics"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\component_crx_cache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Crash pad"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Crashpad"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\DeferredBrowserMetrics"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\DesktopSharingHub"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Floc"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\GraphiteDawnCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\GrShaderCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Local Traces"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\PnaclTranslationCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\PrivacySandboxAttestationsPreloaded"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\ShaderCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\System Profile"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\TpcdMetadata"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Webstore Downloads"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\AutofillStrikeDatabase"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\blob_storage"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\BudgetDatabase"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\Cache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\Code Cache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\commerce_subscription_db"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\coupon_db"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\Crash pad"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\Crashpad"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\data_reduction_proxy_leveldb"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\DawnCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\discounts_db"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\Download Service"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\Feature Engagement Tracker"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\GCM Store"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\GPUCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\GrShaderCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\optimization_guide_hint_cache_store"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\optimization_guide_model_and_features_store"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\optimization_guide_model_metadata_store"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\optimization_guide_prediction_model_downloads"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\PersistentOriginTrials"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\Platform Notifications"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\Search Logos"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\Segmentation Platform"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\Service Worker"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\Session Storage"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\Sessions"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\shared_proto_db"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\Thumbnails"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\VideoDecodeStats"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\Web Applications"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\WebrtcVideoStats"
:NXT7
:: @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ Supermium @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
:: Supermium (Portable) [Chrome.exe] web browser user profile base/main directory/folder =
:: %UserProfile%\AppData\Local\Supermium [where %UserProfile% is C:\Users\User_Name = User_Name is replaced with your actual
:: user name]:
TASKLIST.EXE>%TEMP%\CHROM_RUN!.TXT
FIND.EXE /I "CHROME" "%TEMP%\CHROM_RUN!.TXT" >NUL 2>&1
IF NOT ERRORLEVEL 1 GOTO NXT8
TAKEOWN.EXE /f "%UserProfile%\AppData\Local\Supermium" /r /d y >NUL 2>&1
ICACLS.EXE "%UserProfile%\AppData\Local\Supermium" /grant:R %UserName%:F Administrators:F /t /c /q >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Supermium\debug*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Supermium\*.corrupt" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Supermium\*crash*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Supermium\licens*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Supermium\about*.txt" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Supermium\CHANGELOG*.txt" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Supermium\*licens*.txt" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Supermium\*.bak" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Supermium\*.pma" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Supermium\BrowserMetric*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Supermium\BrowsingTopic*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Supermium\CrashpadMetric*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Supermium\Cach*.pak" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Supermium\*.old" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Supermium\*.tmp" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Supermium\LOCK" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Supermium\lockfil*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Supermium\LOG" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Supermium\chrome_shut*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Supermium\first_party_set*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Supermium\persisted_first_party_set*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Supermium\*-journal.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Supermium\User Data\Default\File System\00000*" >NUL 2>&1
DEL /F /Q "%UserProfile%\AppData\Local\Supermium\User Data\Default\Local Storage\leveldb\*.ldb" >NUL 2>&1
DEL /F /Q "%UserProfile%\AppData\Local\Supermium\User Data\Default\DownloadMetadata" >NUL 2>&1
DEL /F /Q "%UserProfile%\AppData\Local\Supermium\User Data\Default\History" >NUL 2>&1
DEL /F /Q "%UserProfile%\AppData\Local\Supermium\User Data\Default\InterestGroups" >NUL 2>&1
DEL /F /Q "%UserProfile%\AppData\Local\Supermium\User Data\Default\MediaDeviceSalts" >NUL 2>&1
DEL /F /Q "%UserProfile%\AppData\Local\Supermium\User Data\Default\PrivateAggregation" >NUL 2>&1
DEL /F /Q "%UserProfile%\AppData\Local\Supermium\User Data\Default\Visited Links" >NUL 2>&1
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Supermium\User Data\BrowserMetrics"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Supermium\User Data\component_crx_cache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Supermium\User Data\Crash pad"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Supermium\User Data\Crashpad"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Supermium\User Data\DeferredBrowserMetrics"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Supermium\User Data\DesktopSharingHub"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Supermium\User Data\Floc"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Supermium\User Data\GraphiteDawnCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Supermium\User Data\GrShaderCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Supermium\User Data\Local Traces"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Supermium\User Data\PnaclTranslationCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Supermium\User Data\PrivacySandboxAttestationsPreloaded"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Supermium\User Data\ShaderCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Supermium\User Data\System Profile"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Supermium\User Data\TpcdMetadata"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Supermium\User Data\Webstore Downloads"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Supermium\User Data\Default\AutofillStrikeDatabase"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Supermium\User Data\Default\blob_storage"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Supermium\User Data\Default\BudgetDatabase"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Supermium\User Data\Default\Cache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Supermium\User Data\Default\Code Cache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Supermium\User Data\Default\commerce_subscription_db"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Supermium\User Data\Default\coupon_db"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Supermium\User Data\Default\Crash pad"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Supermium\User Data\Default\Crashpad"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Supermium\User Data\Default\data_reduction_proxy_leveldb"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Supermium\User Data\Default\DawnCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Supermium\User Data\Default\discounts_db"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Supermium\User Data\Default\Download Service"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Supermium\User Data\Default\Feature Engagement Tracker"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Supermium\User Data\Default\GCM Store"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Supermium\User Data\Default\GPUCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Supermium\User Data\Default\GrShaderCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Supermium\User Data\Default\optimization_guide_hint_cache_store"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Supermium\User Data\Default\optimization_guide_model_and_features_store"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Supermium\User Data\Default\optimization_guide_model_metadata_store"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Supermium\User Data\Default\optimization_guide_prediction_model_downloads"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Supermium\User Data\Default\PersistentOriginTrials"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Supermium\User Data\Default\Platform Notifications"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Supermium\User Data\Default\Search Logos"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Supermium\User Data\Default\Segmentation Platform"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Supermium\User Data\Default\Service Worker"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Supermium\User Data\Default\Session Storage"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Supermium\User Data\Default\Sessions"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Supermium\User Data\Default\shared_proto_db"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Supermium\User Data\Default\Thumbnails"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Supermium\User Data\Default\VideoDecodeStats"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Supermium\User Data\Default\Web Applications"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Supermium\User Data\Default\WebrtcVideoStats"
:NXT8
:: @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ X-Chromium @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
:: X-Chromium (X-Launcher) Portable launcher [X-Chromium.exe] running Chromium [chrome.exe] web browser base/main
:: directory/folder = C:\PORT\CHROME (example). *MUST* change drive/partition/volume letter +/- directories/folders names to
:: match yours (if different):
TASKLIST.EXE>%TEMP%\CHROM_RUN!.TXT
FIND.EXE /I "X-CHROM" "%TEMP%\CHROM_RUN!.TXT" >NUL 2>&1
IF NOT ERRORLEVEL 1 GOTO NXT9
TAKEOWN.EXE /f "C:\PORT\CHROME" /r /d y >NUL 2>&1
ICACLS.EXE "C:\PORT\CHROME" /grant:R %UserName%:F Administrators:F /t /c /q >NUL 2>&1
DEL /F /Q /S "C:\PORT\CHROME\debug*.*" >NUL 2>&1
DEL /F /Q /S "C:\PORT\CHROME\*.corrupt" >NUL 2>&1
DEL /F /Q /S "C:\PORT\CHROME\*crash*.*" >NUL 2>&1
DEL /F /Q /S "C:\PORT\CHROME\licens*.*" >NUL 2>&1
DEL /F /Q /S "C:\PORT\CHROME\about*.txt" >NUL 2>&1
DEL /F /Q /S "C:\PORT\CHROME\CHANGELOG*.txt" >NUL 2>&1
DEL /F /Q /S "C:\PORT\CHROME\*licens*.txt" >NUL 2>&1
DEL /F /Q /S "C:\PORT\CHROME\*.bak" >NUL 2>&1
DEL /F /Q /S "C:\PORT\CHROME\*.pma" >NUL 2>&1
DEL /F /Q /S "C:\PORT\CHROME\BrowserMetric*.*" >NUL 2>&1
DEL /F /Q /S "C:\PORT\CHROME\BrowsingTopic*.*" >NUL 2>&1
DEL /F /Q /S "C:\PORT\CHROME\CrashpadMetric*.*" >NUL 2>&1
DEL /F /Q /S "C:\PORT\CHROME\Cach*.pak" >NUL 2>&1
DEL /F /Q /S "C:\PORT\CHROME\*.old" >NUL 2>&1
DEL /F /Q /S "C:\PORT\CHROME\*.tmp" >NUL 2>&1
DEL /F /Q /S "C:\PORT\CHROME\LOCK" >NUL 2>&1
DEL /F /Q /S "C:\PORT\CHROME\lockfil*.*" >NUL 2>&1
DEL /F /Q /S "C:\PORT\CHROME\LOG" >NUL 2>&1
DEL /F /Q /S "C:\PORT\CHROME\chrome_shut*.*" >NUL 2>&1
DEL /F /Q /S "C:\PORT\CHROME\first_party_set*.*" >NUL 2>&1
DEL /F /Q /S "C:\PORT\CHROME\persisted_first_party_set*.*" >NUL 2>&1
DEL /F /Q /S "C:\PORT\CHROME\*-journal.*" >NUL 2>&1
DEL /F /Q /S "C:\PORT\CHROME\USER\CHROME\DEFAULT\File System\00000*" >NUL 2>&1
DEL /F /Q "C:\PORT\CHROME\USER\CHROME\DEFAULT\Local Storage\leveldb\*.ldb" >NUL 2>&1
DEL /F /Q "C:\PORT\CHROME\USER\CHROME\DEFAULT\DownloadMetadata" >NUL 2>&1
DEL /F /Q "C:\PORT\CHROME\USER\CHROME\DEFAULT\History" >NUL 2>&1
DEL /F /Q "C:\PORT\CHROME\USER\CHROME\DEFAULT\InterestGroups" >NUL 2>&1
DEL /F /Q "C:\PORT\CHROME\USER\CHROME\DEFAULT\MediaDeviceSalts" >NUL 2>&1
DEL /F /Q "C:\PORT\CHROME\USER\CHROME\DEFAULT\PrivateAggregation" >NUL 2>&1
DEL /F /Q "C:\PORT\CHROME\USER\CHROME\DEFAULT\Visited Links" >NUL 2>&1
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\BrowserMetrics"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\component_crx_cache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\Crash pad"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\Crashpad"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DeferredBrowserMetrics"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DesktopSharingHub"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\Floc"
RUNDLL32.EXE %windir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\GraphiteDawnCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\GrShaderCache"
RUNDLL32.EXE %windir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\Local Traces"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\PnaclTranslationCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\PrivacySandboxAttestationsPreloaded"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\ShaderCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\System Profile"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\TpcdMetadata"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\Webstore Downloads"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\AutofillStrikeDatabase"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\blob_storage"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\BudgetDatabase"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\Cache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\Code Cache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\commerce_subscription_db"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\coupon_db"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\Crash pad"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\Crashpad"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\data_reduction_proxy_leveldb"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\DawnCache"
RUNDLL32.EXE %windir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\discounts_db"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\Download Service"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\Feature Engagement Tracker"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\GCM Store"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\GPUCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\GrShaderCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\optimization_guide_hint_cache_store"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\optimization_guide_model_and_features_store"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\optimization_guide_model_metadata_store"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\optimization_guide_prediction_model_downloads"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\PersistentOriginTrials"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\Platform Notifications"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\Search Logos"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\Segmentation Platform"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\Service Worker"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\Session Storage"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\Sessions"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\shared_proto_db"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\Thumbnails"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\VideoDecodeStats"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\Web Applications"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\WebrtcVideoStats"
:: X-Chromium Temp (Temporary) directory/folder = %TEMP%\X-Chromium [where %TEMP% is by default
:: C:\Users\User_Name\AppData\Local\Temp = User_Name is replaced with your actual user name]:
TAKEOWN.EXE /f "%TEMP%\X-Chromium" /r /d y >NUL 2>&1
ICACLS.EXE "%TEMP%\X-Chromium" /grant:R %UserName%:F Administrators:F /t /c /q >NUL 2>&1
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%TEMP%\X-Chromium"
:NXT9
:: @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ The End @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
IF EXIST "%TEMP%\CHROM_RUN!.TXT" DEL /F /Q "%TEMP%\CHROM_RUN!.TXT" >NUL 2>&1
:END
:: EXIT
------End cut & paste here------
ADVPACK.DLL, ICACLS.EXE, RUNDLL32.EXE + TAKEOWN.EXE executables are located in the %WinDir%\SYSTEM32 directory/folder
[%WinDir% = usually C:\WINDOWS], listed in your system PATH.
View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]:
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command
PATH
-> press Enter.
Similar cleaning/debloating tools:
- BleachBit 32-bit + 64-bit bloat, obsolete, outdated, uninstalled, unnecessary, unneeded, unsafe, unused, unwanted,
useless, wasteful system + software directories/folders + files cleaner + remover, frees storage space, highly customizable:
http://www.bleachbit.org/
Download [Portable ZIP]:
http://www.bleachbit.org/download/windows/
BleachBit Features:
http://www.bleachbit.org/features/
BleachBit online Documentation:
http://docs.bleachbit.org/
- CCleaner Free [ CRIPPLED ! ] bloat, insecure, obsolete, outdated, uninstalled, unnecessary, unneeded, unsafe, unused,
unwanted, useless, wasteful system, registry + software directories/folders + files cleaner, fixer, remover + uninstaller
for Windows XP/newer:
http://www.ccleaner.com/ccleaner/download/
Download [Installer EXE + Portable ZIP]:
http://www.ccleaner.com/ccleaner/builds/
CCleaner Free Guide + Review:
http://www.lifewire.com/ccleaner-review-2625143/
More info, guides + tools:
- MDGx "Digital + Internet/Online Privacy, Safety + Security" chapter
http://www.mdgx.com/7.php#:~:text=Digital%20%2B%20Internet%2FOnline%20Privacy%2C%20Safety%20%2B%20Security%20%3D%20Your%20Top%20Priority
-> "@ Chromium/Chrome web browsers + alternatives/derivatives/forks/variants"
http://www.mdgx.com/7.php#:~:text=%40%20Chromium%2FChrome%20web%20browsers%20%2B%20alternatives%2Fderivatives%2Fforks%2Fvariants%20%5B%2A%5D
section in WINDOWS7.TXT (this file).
http://www.mdgx.com/7.php
http://www.mdgx.com/WINDOWS7.TXT
- MDGx collection of Chromium/Chrome web browsers -> "Chromium + Chrome" section in SOFTWARE.TXT (included):
http://www.mdgx.com/nettoys.htm#CHR
- MDGx collection of essential + useful Chromium/Chrome extensions + tweaks -> "CHROMIUM" section in TOOLS.TXT (included):
http://www.mdgx.com/tools.php#:~:text=CHROMIUM%20%5B%2A%5D
http://www.mdgx.com/TOOLS.TXT
______________________________________________________________________________



Put A Pin In It!



* Pin (stick) any file/executable/shortcut/link/URL/etc to Taskbar in Windows 7:
http://www.howtogeek.com/66670/from-the-tips-box-pin-any-file-to-the-taskbar/
1. Desktop -> right-click -> New -> Shortcut -> create an empty place holder file (example): New Text Document (.txt).
2. Rename this file extension (the group of letters after the last dot) from txt to exe.
3. Drag it onto the Taskbar to pin it.
4. Go to this directory/folder:
%UserName%\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar
5. Replace this empty file with a real shortcut to your actual file/executable/shortcut/link/URL/etc.
You must rename your newly created shortcut to match exactly the already pinned file name shortcut (if any)!
6. Force Taskbar icons to refresh: Task Manager -> restart Windows (File) Explorer, log/sign back in, or restart/reboot
Windows.

* Repair/customize Pin to Taskbar function + add more file types to the Pin to Taskbar right-click menu:
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{90AA3A4E-1CBA-4233-B8BB-535773D48449}]
@="Taskband Pin"
"ImplementsVerbs"="taskbarpin;taskbarunpin"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{90AA3A4E-1CBA-4233-B8BB-535773D48449}\InProcServer32]
@=hex(2):25,53,79,73,74,65,6d,52,6f,6f,74,25,5c,73,79,73,74,65,6d,33,32,5c,73,\
  68,65,6c,6c,33,32,2e,64,6c,6c,00
"ThreadingModel"="Apartment"
[HKEY_LOCAL_MACHINE\Software\Classes\*\shellex\ContextMenuHandlers\{90AA3A4E-1CBA-4233-B8BB-535773D48449}]
@="Taskband Pin"
[HKEY_LOCAL_MACHINE\Software\Classes\.lnk\shellex\ContextMenuHandlers\{90AA3A4E-1CBA-4233-B8BB-535773D48449}]
@="Taskband Pin"
[HKEY_LOCAL_MACHINE\Software\Classes\lnkfile\shellex\ContextMenuHandlers\{90AA3A4E-1CBA-4233-B8BB-535773D48449}]
@="Taskband Pin"
[HKEY_LOCAL_MACHINE\Software\Classes\.bat\shellex\ContextMenuHandlers\{90AA3A4E-1CBA-4233-B8BB-535773D48449}]
@="Taskband Pin"
[HKEY_LOCAL_MACHINE\Software\Classes\batfile\shellex\ContextMenuHandlers\{90AA3A4E-1CBA-4233-B8BB-535773D48449}]
@="Taskband Pin"
[HKEY_LOCAL_MACHINE\Software\Classes\.cmd\shellex\ContextMenuHandlers\{90AA3A4E-1CBA-4233-B8BB-535773D48449}]
@="Taskband Pin"
[HKEY_LOCAL_MACHINE\Software\Classes\cmdfile\shellex\ContextMenuHandlers\{90AA3A4E-1CBA-4233-B8BB-535773D48449}]
@="Taskband Pin"
[HKEY_LOCAL_MACHINE\Software\Classes\.php\shellex\ContextMenuHandlers\{90AA3A4E-1CBA-4233-B8BB-535773D48449}]
@="Taskband Pin"
[HKEY_LOCAL_MACHINE\Software\Classes\phpfile\shellex\ContextMenuHandlers\{90AA3A4E-1CBA-4233-B8BB-535773D48449}]
@="Taskband Pin"
[HKEY_LOCAL_MACHINE\Software\Classes\.hta\shellex\ContextMenuHandlers\{90AA3A4E-1CBA-4233-B8BB-535773D48449}]
@="Taskband Pin"
[HKEY_LOCAL_MACHINE\Software\Classes\htafile\shellex\ContextMenuHandlers\{90AA3A4E-1CBA-4233-B8BB-535773D48449}]
@="Taskband Pin"
[HKEY_LOCAL_MACHINE\Software\Classes\.htt\shellex\ContextMenuHandlers\{90AA3A4E-1CBA-4233-B8BB-535773D48449}]
@="Taskband Pin"
[HKEY_LOCAL_MACHINE\Software\Classes\httfile\shellex\ContextMenuHandlers\{90AA3A4E-1CBA-4233-B8BB-535773D48449}]
@="Taskband Pin"
[HKEY_LOCAL_MACHINE\Software\Classes\.reg\shellex\ContextMenuHandlers\{90AA3A4E-1CBA-4233-B8BB-535773D48449}]
@="Taskband Pin"
[HKEY_LOCAL_MACHINE\Software\Classes\regfile\shellex\ContextMenuHandlers\{90AA3A4E-1CBA-4233-B8BB-535773D48449}]
@="Taskband Pin"
[HKEY_LOCAL_MACHINE\Software\Classes\.txt\shellex\ContextMenuHandlers\{90AA3A4E-1CBA-4233-B8BB-535773D48449}]
@="Taskband Pin"
[HKEY_LOCAL_MACHINE\Software\Classes\txtfile\shellex\ContextMenuHandlers\{90AA3A4E-1CBA-4233-B8BB-535773D48449}]
@="Taskband Pin"
[HKEY_LOCAL_MACHINE\Software\Classes\Directory\shellex\ContextMenuHandlers\{90AA3A4E-1CBA-4233-B8BB-535773D48449}]
@="Taskband Pin"
[HKEY_LOCAL_MACHINE\Software\Classes\Drive\shellex\ContextMenuHandlers\{90AA3A4E-1CBA-4233-B8BB-535773D48449}]
@="Taskband Pin"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\MSILink\shellex\ContextMenuHandlers\{90AA3A4E-1CBA-4233-B8BB-535773D48449}]
@="Taskband Pin"
;
------End cut & paste here------

* Enable Pin to Taskbar/Start Menu right-click shell context menu items/links/shortcuts for
addresses/apps/files/folders/documents/items/links/schemes/shortcuts:
http://www.sevenforums.com/tutorials/5547-taskbar-pinned-programs-enable-disable.html
http://www.helpdeskgeek.com/windows-7/pin-to-taskbar-missing-in-windows-7/
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Explorer]
"NoPinningToTaskbar"=-
"TaskbarNoPinnedList"=-
[HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Explorer]
"NoPinningToTaskbar"=-
"TaskbarNoPinnedList"=-
[HKEY_USERS\.DEFAULT\Software\Policies\Microsoft\Windows\Explorer]
"NoPinningToTaskbar"=-
"TaskbarNoPinnedList"=-
;
------End cut & paste here------

* Pin to Taskbar: Add to/remove from right-click shell context menu in Windows 7:
http://www.sevenforums.com/tutorials/196235-pin-taskbar-add-remove-context-menu-windows-7-a.html

* Pin an External Drive to Taskbar in Windows 7:
http://www.howtogeek.com/howto/27903/how-to-pin-an-external-drive-to-the-windows-7-taskbar/

* Pin Special Items to Taskbar:
http://www.digitalcitizen.life/how-pin-special-windows-shortcuts-taskbar/
______________________________________________________________________________



XP -> 7/8/8.1 Easy Transfer Files + Settings



* Default System (machine wide, all users) + User (only current/logged on user)
built-in/default/forced/hardwired/locked/preset "special" directories/folders (hard links = LDIDs) names, locations,
equivalents + transition: Windows XP/2003 -> Windows Vista/2008/7/8/8.1/2012:
http://en.wikipedia.org/wiki/Special_folder
http://www.nirsoft.net/utils/special_folders_view.html
http://social.technet.microsoft.com/wiki/contents/articles/6083.windows-xp-folders-and-locations-vs-windows-7-and-vista.aspx
Most of these "special" directories/folders are valid, and can be found in Windows 10/2016/2019/11/2022/newer OSes.
Default Windows NTx installation drive/partition/volume is C -> C:\ = root directory/folder.

XP/2003:                 C:\Documents and Settings\All Users\Start Menu
Vista/2008/7/8/8.1/2012: C:\ProgramData\Microsoft\Windows\Start Menu

XP/2003:                 C:\Documents and Settings\%UserName%\Application Data\Microsoft\Internet Explorer\Quick Launch
Vista/2008/7/8/8.1/2012: C:\Users\%UserName%\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch

XP/2003:                 C:\Documents and Settings\All Users\Desktop
Vista/2008/7/8/8.1/2012: C:\Users\Public\Desktop

XP/2003:                 C:\Documents and Settings\All Users\Application Data\PROGRAM_NAME
Vista/2008/7/8/8.1/2012: C:\ProgramData\PROGRAM_NAME

XP/2003:                 C:\Documents and Settings\%UserName%\Application Data\PROGRAM_NAME
Vista/2008/7/8/8.1/2012: C:\Users\%UserName%\AppData\Local\PROGRAM_NAME

XP/2003:                 C:\Documents and Settings\All Users
Vista/2008/7/8/8.1/2012: C:\ProgramData

XP/2003:                 C:\Downloads
Vista/2008/7/8/8.1/2012: C:\Users\%UserName%\Downloads

XP/2003:                 C:\Users\%UserName%\Documents\My Pictures
Vista/2008/7/8/8.1/2012: C:\Users\%UserName%\Pictures

XP/2003:                 C:\Users\%UserName%\Documents\My Music
Vista/2008/7/8/8.1/2012: C:\Users\%UserName%\Music

XP/2003:                 C:\Documents and Settings\%UserName%\My Documents
Vista/2008/7/8/8.1/2012: C:\Users\%UserName%\Documents

XP/2003:                 C:\Documents and Settings\%UserName%\My Documents\My Music
Vista/2008/7/8/8.1/2012: C:\Users\%UserName%\Music

XP/2003:                 C:\Documents and Settings\%UserName%\My Documents\My Pictures
Vista/2008/7/8/8.1/2012: C:\Users\%UserName%\Pictures

XP/2003:                 C:\Documents and Settings\%UserName%\My Documents\My Videos
Vista/2008/7/8/8.1/2012: C:\Users\%UserName%\Videos

XP/2003:                 C:\Documents and Settings\%UserName%\Application Data
Vista/2008/7/8/8.1/2012: C:\Users\%UserName%\AppData\Roaming

XP/2003:                 C:\Documents and Settings\%UserName%\Local Settings
Vista/2008/7/8/8.1/2012: C:\Users\%UserName%\Local

XP/2003:                 C:\Documents and Settings\%UserName%\Start Menu
Vista/2008/7/8/8.1/2012: C:\Users\%UserName%\AppData\Roaming\Microsoft\Windows\Start Menu

XP/2003:                 C:\Documents and Settings\%UserName%\Templates
Vista/2008/7/8/8.1/2012: C:\Users\%UserName%\AppData\Roaming\Microsoft\Windows\Templates

XP/2003:                 C:\Documents and Settings\All Users\Start Menu
Vista/2008/7/8/8.1/2012: C:\ProgramData\Microsoft\Windows\Start Menu

XP/2003:                 C:\Documents and Settings\Default User
Vista/2008/7/8/8.1/2012: C:\Users\Default

See also "* Link Directory IDentifier (LDID)/DIRectory IDentifier (DIRID)/Decentralized IDentifier (DID)" +
"* List of System (machine wide, all users) + User (only current/logged on user) Shell Folders in Windows Vista/newer:"
topics in WINDOWS7.TXT (this file) further above:
http://www.mdgx.com/7.php
http://www.mdgx.com/WINDOWS7.TXT

* Windows Easy Transfer (WET) from XP/Vista to 7 [and beyond...]:
http://technet.microsoft.com/library/ff943667.aspx
- WET 32-bit for XP 32-bit:
http://www.microsoft.com/download/details.aspx?id=4503
- WET 64-bit for XP 64-bit:
http://www.microsoft.com/download/details.aspx?id=9926
- WET 32-bit for Vista 32-bit:
http://www.microsoft.com/download/details.aspx?id=14179
- WET 64-bit for Vista 64-bit:
http://www.microsoft.com/download/details.aspx?id=20483
- WET 32-bit for XP 32-bit (x86) + WET 64-bit for XP 64-bit (x64):
http://www.microsoft.com/download/details.aspx?id=7349
WET XP/Vista -> 7 Guide:
http://petri.com/transfer-user-files-and-settings-from-windows-xpvista-to-windows-7/
http://www.howtogeek.com/howto/3179/migrate-xp-to-windows-7-with-easy-transfer-and-a-usb-drive/

* Windows XP to 7 Hard Link Migration (HLM) of User Files + Settings:
http://www.microsoft.com/download/details.aspx?id=18913
HLM DOCument [DOC format, right-click to save]:
http://download.microsoft.com/download/8/9/D/89DC758B-3E81-42F6-84E1-E3E9AD790196/Windows%20XP%20to%20Windows%207%20Hard-Link%20Migration%20of%20User%20Files%20and%20Settings.docx
______________________________________________________________________________



Turn OFF/ON Windows Features



* Enable and Disable Windows Features in Windows XP/newer:
http://www.helpdeskgeek.com/how-to/enable-and-disable-windows-features/

* Remove Windows Features You Don't Need:
http://www.itprotoday.com/windows-7-tip-week-remove-windows-features-you-dont-need/

* Windows Features You Can Add or Remove:
http://www.digitalcitizen.life/what-are-those-windows-features-you-can-add-or-remove/

* Turn Windows 7 Features ON or OFF:
http://www.techsupportalert.com/content/how-turn-windows-7-features-or.htm
______________________________________________________________________________



Tweak Windows 7/7 SP1 Services



* Disable/(re)enable, stop/(re)start, clean/repair/restore + customize/optimize/tweak Windows 7/newer
interconnected/interdependent/interrelated services + drivers responsible for/contributing to/involved in/related to
dangerous/insecure/unsafe, undesirable/unnecessary/unneeded/unused/useless, automatic/unattended
behind-your-back/forced/disguised/hidden/intrusive/invasive/subversive/unwanted/without your
approval/consent/knowledge/permission, annoying/bloat/resources consuming, diagnostic tracking, telemetry ("phone home"),
data collection/logging, customer "experience", unwanted "offers", ad(ware)/spyware/surveillance/tracking,
privacy/safety/security flaws/vulnerabilities:
View/(Re)Start/Stop/(Re)Enable/Disable, set to Disabled/Manual/Automatic Windows Services + Drivers -> Start
button/icon/logo/menu/orb -> Run... [hold WinKey + press R] -> type this command
services.msc
-> press Enter -> (re)enable [Boot = 0, System = 1, Automatic (triggered) = 2, Automatic (Delayed Start) (triggered) = 2 or
Manual (triggered) = 3], disable [Disabled = 4], customize/optimize/tweak Windows (User) Services + Drivers after learning
about them -> continue reading...
Services.msc is located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually C:\WINDOWS].
Management Saved Console (.msc) script files are associated by default with and executed by Microsoft Management Console
(MMC.EXE) snap-in control tool, and most of them are located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually
C:\WINDOWS].
http://en.wikipedia.org/wiki/Microsoft_Management_Console
View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]:
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command
PATH
-> press Enter.
RegEdit.exe:
************
http://learn.microsoft.com/troubleshoot/windows-server/performance/windows-registry-advanced-users/
http://www.ss64.com/nt/regedit.html
http://www.mdgx.com/reg.htm#RER
http://www.windowscentral.com/how-start-and-stop-services-windows-10/
Certain services Microsoft deems mandatory they should be enabled and running at all times because they may either affect
proper functionality/operation [interconnected/interdependent/interrelated], or for their own purposes [see above for
details], but which may not (always) align/coincide with your needs/preferences are locked + protected, and therefore they
canNOT be stopped, disabled and/or modified/customized from within the services.msc interface due to Windows registry
protection lockups, no matter your user level/privileges/rights, even if logged in as Administrator/Owner/Sysadmin/SYSTEM.
In (most) such cases the most obvious solution is to do it by hand by using the Registry Editor (%WinDir%\RegEdit.exe)
[%WinDir% = usually C:\WINDOWS]:
Right-click RegEdit or its shortcut/link -> Run as Administrator -> go to this registry subkey:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services
and then to this (backup copy) registry subkey:
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services
and then to this (backup copy) registry subkey (if present):
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services
-> click left hand pane desired driver/service name registry subkey [example: DNSCache (DNS Client service)] (if present) ->
double-click right hand pane "Start" DWORD [REG_DWORD] registry value -> change its numeric value to any integer number
between 0 and 4 [see below for details] -> press OK -> exit RegEdit.
http://mistyprojects.co.uk/documents/TinyPXEServer/files/img/regedit2.jpg
http://cdn2.windowswally.com/wp-content/uploads/2015/09/RuntimeBroker.exe-Windows-10-regedit-TimeBroker-Windows-Wally.jpg
Repeat same steps for all 3 registry subkeys above: CurrentControlSet, ControlSet001 + ControlSet002 (if present).
"Start" valid registry DWORD [REG_DWORD] values:
http://smallvoid.com/article/winnt-services-regedit.html
- 0 [dword:00000000] = Boot;
- 1 [dword:00000001] = System;
- 2 [dword:00000002] = Automatic;
- 3 [dword:00000003] = Manual;
- 4 [dword:00000004] = Disabled.
MDGx: "Comprehensive Windows Registry Guide" [Intro Chapter] in REGISTRY.TXT (included):
http://www.mdgx.com/reg.htm#CWRG
NET.EXE, NETSH.EXE, REG.EXE, SC.EXE + WMIC.EXE:
***********************************************
Another option is to use (in combination or separately) these 5 Windows NTx DOS console command line tools:
- Net(work) Resources Manager [NET.EXE];
http://learn.microsoft.com/troubleshoot/windows-server/networking/net-commands-on-operating-systems/
http://www.ss64.com/nt/net-service.html
- Net(work) Sh(ell) [NETSH.EXE];
http://learn.microsoft.com/windows-server/networking/technologies/netsh/netsh-contexts/
http://learn.microsoft.com/windows-server/administration/windows-commands/netsh/
http://www.ss64.com/nt/netsh.html
- Reg(istry) Editor + Manager [REG.EXE];
http://learn.microsoft.com/windows-server/administration/windows-commands/reg/
http://www.ss64.com/nt/reg.html
http://www.mdgx.com/reg.htm#BNR
- S(ervice) C(ontrol) [C(onfiguration)] [SC.EXE];
http://learn.microsoft.com/windows/win32/services/controlling-a-service-using-sc/
http://learn.microsoft.com/windows-server/administration/windows-commands/sc-config/
http://www.ss64.com/nt/sc.html
- W(indows) M(anagement) I(nstrumentation) C(ommand) [WMIC.EXE].
http://learn.microsoft.com/windows/win32/wmisdk/wmic/
http://learn.microsoft.com/windows/win32/wmisdk/wmi-start-page/
http://www.ss64.com/nt/wmic.html
WMIC has been deprecated starting with Windows 10 21H1, correspondent Windows Server 2022 + all newer
builds/editions/releases/updates/versions:
http://learn.microsoft.com/windows/whats-new/deprecated-features/
NOTES:
******
All these executables (.exe) require you to be logged on, or must be executed/run with elevated
access/permissions/privileges/rights as Admin(istrator)/SYSTEM/Sysadmin:
http://www.ss64.com/nt/syntax-elevate.html
A. Temporary [per app(lication)/command/executable (.exe)/session] FIX:
Windows Vista/newer users -> start a DOS console command prompt session [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD
shortcut/CMD.EXE -> Run as Administrator.
OR
Use an elevation tool separately for each individual app(lication)/command/executable (.exe)/session [free(ware) examples]:
- AdvancedRun [AdvancedRun.exe] 32-bit + 64-bit GUI interface + DOS console command line tool for Windows Vista/newer
32-bit + 64-bit runs any app/batch/command/executable/function/process/program/script/service/task/tool as
Administrator/SYSTEM/TrustedInstaller/any user with elevated/highest/protected privileges/rights, compatibility,
environment, ownership, permissions, priority, properties, useful for task automation in BATch (.BAT), CoMmanD (.CMD) +
Visual Basic Script (.VBS) files, highly customizable:
http://www.nirsoft.net/utils/advanced_run.html
AdvancedRun 64-bit:
http://www.nirsoft.net/utils/advancedrun-x64.zip
AdvancedRun 32-bit:
http://www.nirsoft.net/utils/advancedrun.zip
Run Programs as SYSTEM:
http://www.winhelponline.com/blog/run-program-as-system-localsystem-account-windows/
Run Programs as TrustedInstaller:
http://www.winhelponline.com/blog/run-program-as-trustedinstaller-locked-registry-keys-files/
- SetACL [SetACL.exe 32-bit + SetACL.exe 64-bit] 32-bit + 64-bit DOS console command line tool for Windows Vista/newer
enables/disables/changes/elevates NTFS ACL permissions + ownership for local/remote files/(sub)directories, registry
(sub)keys, devices/objects/services:
http://helgeklein.com/setacl/
Download:
http://helgeklein.com/download/#download-setacl
SetACL Command Line Documentation:
http://helgeklein.com/setacl/documentation/command-line-version-setacl-exe/
SetACL Examples:
http://helgeklein.com/setacl/examples/
Wikipedia: SetACL:
http://en.wikipedia.org/wiki/SetACL
- Elevate [elevate.exe 32-bit + elevate.exe 64-bit] 1.3.0 32-bit + 64-bit DOS console command line tool runs any
app/batch/command/executable/function/process/program/script/service/task/tool as Administrator with
elevated/highest/protected privileges/rights, useful for task automation in BATch (.BAT), CoMmanD (.CMD) +
Visual Basic Script (.VBS) files:
http://code.kliu.org/misc/elevate/
File:
http://code.kliu.org/misc/elevate/elevate-1.3.0-redist.7z
- See also "NTFS ACL + OWNER" section in TOOLS.TXT (included):
http://www.mdgx.com/tools.php
http://www.mdgx.com/TOOLS.TXT
B. Permanent (per local/network user) FIX:
Disable User Account Control (UAC) in:
- Windows 10/2016/2019/11/2022:
http://www.tenforums.com/tutorials/3577-user-account-control-uac-change-settings-windows-10-a.html
- Windows 8/2012/8.1/2012 R2:
http://www.eightforums.com/tutorials/5509-user-account-control-uac-change-settings-windows-8-a.html
- Windows 7/2008 R2:
http://www.petri.com/disable-uac-in-windows-7/
- Windows Vista/2008:
http://www.petri.com/disable_uac_in_windows_vista/
User Account Control (UAC) tweaking tools [free(ware)]:
- UAC Pass:
http://sites.google.com/site/freeavvarea/uac-pass/uac-pass/
- TweakUAC:
http://www.winability.com/tweak-uac/
- Disable UAC:
http://www.majorgeeks.com/files/details/disable_uac.html
NET.EXE, NETSH.EXE, REG.EXE + SC.EXE executables (.exe) are located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% =
usually C:\WINDOWS].
WMIC.EXE executable (.exe) is located in the %WinDir%\SYSTEM32\WBEM directory/folder.
View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]:
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command
PATH
-> press Enter.
OR
Save it to a plain text/ASCII (.txt) file: from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD
shortcut/CMD.EXE -> Run as Administrator -> type same command above followed by the name of the file (in this example it
will be saved in C:\ root)
PATH>C:\Windows_PATH_Directories.txt
-> press Enter -> use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to view saved text file contents.
Example using same service above [DNSCache (DNS Client service)] -> stop + disable DNSCache service:
From a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator ->
type these commands in this specific order
ECHO Y|NET.EXE STOP DNSCache
SC.EXE CONFIG DNSCache START= disabled
REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\services\DNSCache" /v Start /t REG_DWORD /d 4 /f
-> press Enter after each line.
PowerShell.exe:
***************
http://learn.microsoft.com/powershell/module/microsoft.powershell.management/set-service/
http://www.ss64.com/ps/powershell.html
http://www.ss64.com/ps/
http://www.ss64.com/ps/set-service.html
http://www.windowscentral.com/how-start-and-stop-services-windows-10/
PowerShell [%WinDir%\SYSTEM32\WindowsPowerShell\v1.0\PowerShell.exe] is a task automation + configuration manager command
line shell environment + interpreter tool capable of using text/ASCII command line Script/BATch files (.ps1).
http://en.wikipedia.org/wiki/PowerShell
PowerShell requires Microsoft .NET Framework core + components, which are preinstalled on all Windows Vista/newer releases,
and (usually) updated automatically via Windows Update (WU) service [WuauServ]:
http://www.mdgx.com/add.htm#NFR
PowerShell is a better, more advanced alternative to the standard DOS console CoMmanD line prompt interpreter tool
[%WinDir%\SYSTEM32\CMD.EXE].
http://en.wikipedia.org/wiki/Cmd.exe
Start + Stop Drivers + Services manually in Windows 7/newer -> "How to Manage Services from PowerShell" section:
http://www.windowscentral.com/how-start-and-stop-services-windows-10/#section-how-to-manage-services-from-powershell
Windows NTx Services + Drivers Information, Reference, Guidelines, Tutorials, Customization, Optimization:
**********************************************************************************************************
- Windows 7 SP1 Services Configuration:
http://www.blackviper.com/service-configurations/black-vipers-windows-7-service-pack-1-service-configurations/
- Windows 7 Services Configuration:
http://www.blackviper.com/service-configurations/black-vipers-windows-7-service-configurations/
- Windows 7/7 SP1 Services:
http://batcmd.com/windows/7/services/
- Windows 7/7 SP1 Service Defaults:
http://revertservice.com/7/
- Windows Services Encyclopedia:
http://www.windows-security.org/windows-services-encyclopedia/
- Windows 7/7 SP1: Disabling Unneeded Services:
http://sourcedaddy.com/windows-7/disabling-unneeded-services.html
- Restore Default Services in Windows 7/newer:
http://www.majorgeeks.com/content/page/restore_or_verify_default_services_in_windows_7_10.html
- Windows 8/8.1 Services:
http://batcmd.com/windows/8/services/
- List of all Windows Services:
http://www.blackviper.com/windows-services/
- List of all Running, Stopped + Disable Windows Services:
http://www.thewindowsclub.com/extract-list-of-running-stopped-disabled-services/
- Windows 8.1 Services Configuration:
http://www.blackviper.com/service-configurations/black-vipers-windows-8-1-service-configurations/
- Windows 8 Services Configuration:
http://www.blackviper.com/service-configurations/black-vipers-windows-8-service-configurations/
- Windowss 7 Disable Unnecessary Services:
http://sites.google.com/site/100pricin/speeding-up-your-pc/disable-unnecessary-services/
- Windows Vista SP2 Services Configuration:
http://www.blackviper.com/service-configurations/black-vipers-windows-vista-service-pack-2-service-configurations/
- Windows XP SP3 Services Configuration:
http://www.blackviper.com/WinXP/servicecfg.htm
- Windows XP Services Guide:
http://web.archive.org/web/20171129164138/http://www.theeldergeek.com/services_guide.htm
- Windows XP Services Tweak Guide:
http://www.techspot.com/tweaks/winxp_services/
- Windows XP Services Removal Guide:
http://www.overclockersclub.com/guides/windows_xp_services/
- Windows 2000 SP4+ Services Configuration:
http://www.blackviper.com/WIN2K/servicecfg.htm
- Use Registry Editor to change Service state:
http://smallvoid.com/article/winnt-services-regedit.html
- Wikipedia: Windows Service:
http://en.wikipedia.org/wiki/Windows_service
- Wikipedia: List of Windows Services:
http://en.wikipedia.org/wiki/List_of_Microsoft_Windows_components#Services
Disable individual + interconnected/interdependent/interrelated services in groups +/- separately (if + where applicable):
http://en.wikipedia.org/wiki/List_of_Microsoft_Windows_components#Services
http://www.file.net/process/fmapp.exe.html
http://teckangaroo.com/what-is-connected-devices-platform-service/
http://www.thewindowsclub.com/what-is-connected-devices-platform-service-cdpsvc/
http://appuals.com/what-is-the-connected-devices-platform-service-and-should-it-be-disabled/
http://learn.microsoft.com/previous-versions/windows/desktop/qos/link-layer-topology-discovery-protocol/
http://social.technet.microsoft.com/Forums/en-US/f933e03b-e157-4a1d-9916-8cfeb11ad2fc/
http://www.newnettechnologies.com/disable-windows-services.html
http://www.poppelgaard.com/how-to-determine-usb-drivers-are-configured-correctly-on-the-online-plug-in/
See also:
- MDGx "Windows 10/11 Tweaks, Fixes, Guides, Downloads + Links" -> "Tweak Windows 10/11 Services" chapter in WIN10.TXT
(included):
http://www.mdgx.com/10.php
http://www.mdgx.com/WIN10.TXT
- MDGx "HOSTS Files, Guides + Tools" -> "NOTE 2: DNS Client Service" -> "More info:":
http://www.mdgx.com/hosts.php#N2
- MDGx "Windows NTx Services tweaking tools [free(ware)]" -> "SERVICES" section in TOOLS.TXT (included):
http://www.mdgx.com/tools.php
http://www.mdgx.com/TOOLS.TXT

* Autoruns 32-bit + 64-bit GUI interface (Autoruns.exe 32-bit + Autoruns64.exe 64-bit) + DOS console command line
(Autorunsc.exe 32-bit + Autorunsc64.exe 64-bit) registry + startup tools add/disable/edit/enable/rename/remove any/all
automated/built-in/default/forced/hardwired/locked/preset/unattended (auto)load/(auto)run entries: boot/logon/startup apps,
drivers, executables (.exe), gadgets (.gadget), loading/registered APIs/DLLs (.dll), programs, services, scripts (.bat,
.cmd, .reg, .vbs, etc), scheduled tasks (.job), highly customizable:
http://learn.microsoft.com/sysinternals/downloads/autoruns/
File:
http://download.sysinternals.com/files/Autoruns.zip

* ServiWin 32-bit + 64-bit displays, stops/(re)starts, pauses/continues + disables/(re)enables Windows services + drivers:
http://www.nirsoft.net/utils/serviwin.html
ServiWin 64-bit:
http://www.nirsoft.net/utils/serviwin-x64.zip
ServiWin 32-bit:
http://www.nirsoft.net/utils/serviwin.zip
Create complete Drivers + Services HTML Report(s):
ServiWin -> Help -> Run As Administrator [or hold Ctrl + press F11] -> View -> HTML Report - All Items.

* Windows Service Master (WSM) displays, stops/(re)starts, + uninstalls Windows services + drivers:
http://www.itsamples.com/windows-service-master.html
File:
http://www.itsamples.com/downloads/windows-service-master.zip

* Easy Service Optimizer (ESO) disables/stops unneeded/unnecessary/bloat services:
http://www.sordum.org/8637/
File:
http://www.sordum.org/files/easy-service-optimizer/eso.zip

* SrvMan 32-bit + 64-bit command line + front end GUI interface changes/creates/deletes Windows services + drivers:
http://sysprogs.com/legacy/tools/srvman/
File:
http://sysprogs.com/getfile/411/srvman-1.0.7z

* Mz Services Manager 32-bit + 64-bit:
http://www.mztweak.com/mzservicesmanager.html
File:
http://www.mztweak.com/download/mzservices.exe

* To tweak all available Windows services depending on your installed Windows NTx OS build/edition/release/update/version +
bit strength [32-bit (x86) or 64-bit (x64)]: right-click on SERVICES.HTA (included)
http://www.mdgx.com/SERVICES.HTA
-> Run as Administrator [will open by default in Internet Explorer (IE) web browser] -> scroll down the list -> tweak
available (listed) services: Automatic, Manual (Demand) or Disabled -> click "Save Changes" button.
To view a list of all running Windows services from within SERVICES.HTA: click "View SERV_LOG.TXT" button (will be saved by
default in the same directory/folder where SERVICES.HTA resides) -> double-click on SERV_LOG.TXT -> will open in your
Notepad/similar/better plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
associated with text (.txt) files as default program.
HTML Application (HTA):
http://en.wikipedia.org/wiki/HTML_Application
MDGx SERVICES.HTA = based on JSWare XPFix XPFixServ.hta script:
http://www.jsware.net/jsware/xpfix.php5
XPFix (freeware):
http://www.jsware.net/jsware/zips/fixpack.zip

* Save/view/print different types of lists + details for all/enabled/running/specific Windows Services from a DOS console or
PowerShell command line, and these tasks can be automated by running them as Administrator from within plain text BATch
(.bat) or CoMmanD (.cmd) script files:
http://learn.microsoft.com/powershell/module/microsoft.powershell.management/get-service/
http://www.shellhacks.com/windows-list-services-cmd-powershell/
http://www.thewindowsclub.com/extract-list-of-running-stopped-disabled-services/
http://serverfault.com/questions/203471/
Save your list(s) + details for all your enabled/disabled/manual/running/stopped services to text file(s) from a DOS console
command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run these commands
-> press Enter after each line (examples):
NET.EXE START>SVC_STARTED.TXT
WMIC.EXE SERVICE list full /format:list>SVC_FULL.TXT
WMIC.EXE SERVICE list>SVC_LIST.TXT
WMIC.EXE path Win32_Service where state='Running' get /format:csv>SVC_LIST.CSV
TASKLIST.EXE /SVC /FI "imagename eq svchost.exe">SVC_HOST.TXT
TASKLIST.EXE /SVC | FIND.EXE "svchost.exe">SVC_HOST2.TXT
TASKLIST.EXE /SVC>SVC_TASK.TXT
SC.EXE QUERY state= all|FINDSTR.EXE "DISPLAY_NAME STATE">SVC_STATE.TXT
SC.EXE QUERY type= service>SVC_ALL.TXT
WMIC.exe executable is located in the %WinDir%\SYSTEM32\wbem directory/folder [%WinDir% = usually C:\WINDOWS], listed on
your system PATH.
View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]:
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command
PATH
-> press Enter.
WMIC (Windows Management Instrumentation Command):
http://learn.microsoft.com/windows/win32/wmisdk/wmic/
MS DOCs: WMIC:
http://technet.microsoft.com/library/bb742610.aspx
Dedoimedo: WMIC - The Windows secret weapon:
http://www.dedoimedo.com/computers/windows-wmic.html
ComputerHope: WMIC:
http://www.computerhope.com/wmic.htm
Rob van der Woude: WMIC:
http://www.robvanderwoude.com/wmic.php
quux: WMIC Snippets:
http://quux.wiki.zoho.com/WMIC-Snippets.html
SS64: WMIC.EXE:
http://www.ss64.com/nt/wmic.html
Wikipedia: WMI:
http://en.wikipedia.org/wiki/Windows_Management_Instrumentation
You can also use PowerShell commands: right-click PowerShell shortcut or
C:\WINDOWS\System32\WindowsPowerShell\v1.0\PowerShell.exe [default location] -> Run as Administrator -> type these commands
(examples)
Get-Service | Where-Object {$_.Status -eq "Running"} | Out-File -filepath "SVC_RUNNING.TXT"
Get-Service | Where {$_.Status -eq "Running"} | Export-Csv -path "SVC_RUNNING.CSV"
Get-WmiObject win32_service | select Name, DisplayName, State, PathName | Export-Csv -path "SVC_RUN.CSV"
-> press Enter after each line.
All text files above will be saved by default in the directory/folder you're running these executables or DOS/PowerShell
consoles from, unless you've specified a different/specific destination. To change destination you need to add the full path
(drive letter + directory/folder name) in front of each text file (C:\Services used in this example):
NET.EXE START>C:\Services\SVC_STARTED.TXT
View all these ANSI/Unicode text files using Notepad/similar/better free(ware) plain text/ASCII editor/viewer:
http://www.mdgx.com/toy.htm#TXT

* Turn OFF Windows Enterprise Vista/newer + Windows Server 2008/newer BranchCache [PeerDistSvc] service used only for Wide
Area Network (WAN) bandwidth optimization if not deploying/maintaining/running/servicing a WAN network hosted on, or from
your business/enterprise/personal/private computer(s)/server(s):
http://learn.microsoft.com/windows-server/networking/branchcache/branchcache/
http://learn.microsoft.com/windows-server/networking/core-network-guide/cncg/bc-hcm/1-deploy-bc-hcm/
http://searchenterprisedesktop.techtarget.com/definition/Microsoft-Windows-BranchCache/
http://en.wikipedia.org/wiki/Wide_area_network
Disable BranchCache [PeerDistSvc] service from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD
shortcut/CMD.EXE -> Run as Administrator -> run these commands -> press Enter after each line:
ECHO Y|NET.EXE STOP PeerDistSvc
SC.EXE CONFIG PeerDistSvc START= disabled
OR:
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\PeerDistSvc]
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\PeerDistSvc]
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\PeerDistSvc]
"Start"=dword:4
;
------End cut & paste here------
______________________________________________________________________________



Turn OFF Action/Security Center + Notifications/Messages



* See also "* Turn OFF Windows 10/11 Push Notification Services (WNS) [WpnService + WpnUserService], automatic install,
Action Center" topic under "Turn OFF/Remove Windows 10 Adware, Spyware, Security Flaws + Repair/Restore Privacy" chapter in
WIN10.TXT (included):
http://www.mdgx.com/10.php
http://www.mdgx.com/WIN10.TXT
Most of those tweaks apply to Windows 7/8/8.1.

* Turn OFF/stop/disable Windows Security Center (WSC) service [wscsvc] from a DOS console command prompt
[%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run these commands -> press Enter
after each line:
ECHO Y|NET.EXE STOP wscsvc
SC.EXE CONFIG wscsvc START= disabled
REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\services\wscsvc" /v Start /t REG_DWORD /d 4 /f

* Turn OFF Action/Defender/Security Center + annoying balloon tips/security/taskbar/tile/toast
notifications/messages/pop-ups in Windows 7/newer:
http://www.tenforums.com/tutorials/105486-enable-disable-notifications-windows-security-windows-10-a.html
http://www.heelpbook.net/2019/windows-10-disable-notifications-and-notifications-balloons/
http://www.techrepublic.com/article/how-to-change-windows-10-toast-notifications-into-balloon-notifications/
http://www.askvg.com/secret-trick-to-disable-turn-off-annoying-feature-advertisement-balloon-notifications-in-windows-7/
http://admx.help/?Category=Windows_10_2016&Policy=Microsoft.Policies.TaskBar2::TaskbarNoNotification
http://www.groovypost.com/howto/windows-8-7-disable-notification-balloons-taskbar/
http://www.howtogeek.com/howto/windows-vista/disable-all-notification-balloons-in-windows-vista/
http://www.heelpbook.net/2019/windows-10-disable-notifications-and-notifications-balloons/
http://www.technorms.com/24581/
http://smallvoid.com/article/winnt-balloon-tip.html
http://superuser.com/questions/883745/
http://social.technet.microsoft.com/forums/en-us/c5b66543-5b2f-4399-946a-bbd4fa4baccc/
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer]
"DisableActionCenter"=dword:1
"DisableNotificationCenter"=dword:1
"DisableSearchBoxSuggestions"=dword:1
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer]
"DisableActionCenter"=dword:1
"DisableNotificationCenter"=dword:1
"DisableSearchBoxSuggestions"=dword:1
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer]
"DisableActionCenter"=dword:1
"DisableNotificationCenter"=dword:1
"DisableSearchBoxSuggestions"=dword:1
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Explorer]
"DisableActionCenter"=dword:1
"DisableNotificationCenter"=dword:1
"DisableSearchBoxSuggestions"=dword:1
"HideSCAHealth"=dword:1
[HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Explorer]
"DisableActionCenter"=dword:1
"DisableNotificationCenter"=dword:1
"DisableSearchBoxSuggestions"=dword:1
"HideSCAHealth"=dword:1
[HKEY_USERS\.DEFAULT\Software\Policies\Microsoft\Windows\Explorer]
"DisableActionCenter"=dword:1
"DisableNotificationCenter"=dword:1
"DisableSearchBoxSuggestions"=dword:1
"HideSCAHealth"=dword:1
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer]
"HideSCAHealth"=dword:1
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]
"HideSCAHealth"=dword:1
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]
"HideSCAHealth"=dword:1
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Svc]
"AntiVirusDisableNotify"=dword:1
"FirewallDisableNotify"=dword:1
"UpdatesDisableNotify"=dword:1
[HKEY_CURRENT_USER\Software\Microsoft\Security Center\Svc]
"AntiVirusDisableNotify"=dword:1
"FirewallDisableNotify"=dword:1
"UpdatesDisableNotify"=dword:1
[HKEY_USERS\.DEFAULT\Software\Microsoft\Security Center\Svc]
"AntiVirusDisableNotify"=dword:1
"FirewallDisableNotify"=dword:1
"UpdatesDisableNotify"=dword:1
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications]
"DisableEnhancedNotifications"=dword:1
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ImmersiveShell]
"UseActionCenterExperience"=dword:0
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\CloudContent]
"DisableSoftLanding"=dword:1
[HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Explorer]
"EnableLegacyBalloonNotifications"=dword:1
"NoBalloonFeatureAdvertisements"=dword:1
[HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Explorer]
"EnableLegacyBalloonNotifications"=dword:1
"NoBalloonFeatureAdvertisements"=dword:1
[HKEY_USERS\.DEFAULT\Software\Policies\Microsoft\Windows\Explorer]
"EnableLegacyBalloonNotifications"=dword:1
"NoBalloonFeatureAdvertisements"=dword:1
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer]
"TaskbarNoNotification"=dword:0
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]
"TaskbarNoNotification"=dword:0
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]
"TaskbarNoNotification"=dword:0
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced]
"EnableBalloonTips"=dword:0
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced]
"EnableBalloonTips"=dword:0
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced]
"EnableBalloonTips"=dword:0
;
------End cut & paste here------

* Turn ON Balloon Tips Taskbar Notifications/Messages in Windows 7/newer:
http://smallvoid.com/article/winnt-balloon-tip.html
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced]
"EnableBalloonTips"=dword:1
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced]
"EnableBalloonTips"=dword:1
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced]
"EnableBalloonTips"=dword:1
;
------End cut & paste here------

* Turn OFF all Action/Security Center (Automatic/Scheduled Maintenance) annoying check boxes/messages/notifications/pop-ups
in Windows 7/newer:
http://technet.microsoft.com/library/dd492018.aspx
http://learn.microsoft.com/previous-versions/technet-magazine/images/dd492018.alerts3.jpg.jpg
http://social.technet.microsoft.com/forums/en-us/w7itproui/thread/83dc3de6-70b7-450f-992c-60511e4a6c4f/
http://www.winaero.com/blog/registry-tweak-to-disable-action-center-notifications-in-windows-7/
http://www.thewindowsclub.com/automatic-maintenance-windows-8/
http://www.winhelponline.com/blog/automatic-maintenance-disable-schedule-windows-8-10/
http://www.hongkiat.com/blog/windows-action-center-message/
http://www.thewindowsclub.com/turn-off-security-and-maintenance-messages-in-windows-10/
http://www.tenforums.com/tutorials/40161-manually-start-stop-automatic-maintenance-windows-10-a.html
http://thegeekpage.com/manually-start-and-disable-automatic-maintenance-in-windows-10/
http://www.makeuseof.com/how-to-fix-windows-unable-to-run-automatic-maintenance-error/
http://www.isunshare.com/windows-10/turn-security-and-maintenance-messages-off-or-on-in-windows-10.html
Turn OFF/stop all automatic/scheduled maintenance + security actions/functions/tasks from a DOS console command prompt
[%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command:
MSchedExe.exe Stop
-> press Enter.
MicroSoft Schedule Executable (Automatic Maintenance) tool [MSchedExe.exe] is located in the %WinDir%\SYSTEM32
directory/folder [%WinDir% = usually C:\WINDOWS].
View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]:
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command
PATH
-> press Enter.
Start -> Control Panel (CP) or Run... [hold WinKey + press R] -> type this command
control
-> press Enter -> Action Center -> Maintenance -> right hand down arrow -> Automatic Maintenance -> Turn on messages about
Automatic Maintenance -> Change maintenance settings -> UNcheck "Allow scheduled maintenanace to wake up my computer at the
scheduled time" box -> Action Center -> Change Action Center settings -> Maintenance messages -> UNcheck
"Automatic Maintenance" box -> OK.
Start -> Control Panel (CP) or Run... [hold WinKey + press R] -> type this command
control
-> press Enter -> System and Security category -> Security and Maintenance -> Change Security and Maintenance settings ->
Turn messages on or off -> UNcheck all available (colored in black) Security messages and Maintenance messages boxes
[unfortunately some are unavailable/grayed out depending on specific OSes/policies/settings/restrictions ;-(] -> OK.
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\Maintenance]
"MaintenanceDisabled"=dword:1
[-HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Action Center]
[-HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center]
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{01979c6a-42fa-414c-b8aa-eee2c8202018}.check.100]
"CheckSetting"=hex:01,00,00,00,d0,8c,9d,df,01,15,d1,11,8c,7a,00,c0,4f,c2,97,eb,\
  01,00,00,00,a1,83,01,f4,91,88,0b,41,99,d1,cd,6e,b8,2a,4c,5d,00,00,00,00,02,\
  00,00,00,00,00,10,66,00,00,00,01,00,00,20,00,00,00,e2,97,b6,5b,6f,60,f3,7b,\
  cf,53,6b,b5,dd,de,0c,32,fb,f9,f1,c9,a8,85,75,4e,23,ce,3e,a7,8d,0e,21,cf,00,\
  00,00,00,0e,80,00,00,00,02,00,00,20,00,00,00,9b,6b,77,a4,52,21,2c,5e,09,d6,\
  47,f4,f5,02,52,bc,79,e8,ce,e2,7e,71,31,32,a3,15,6a,c0,4d,bf,d3,1e,b0,00,00,\
  00,9e,cc,3b,5a,c9,eb,a5,6b,aa,3b,f5,05,22,45,bd,ac,7d,03,ce,1b,58,ea,69,30,\
  ed,81,64,17,75,c5,ea,ea,04,51,ad,cb,bf,a3,e8,f8,f4,0b,f1,ed,49,db,04,ce,eb,\
  c0,da,d7,7e,bb,d6,81,86,66,23,70,b3,30,9c,5b,53,70,c6,04,d4,5a,67,39,27,4b,\
  7c,43,14,74,72,38,95,aa,53,1c,af,5d,44,42,61,09,27,01,14,54,b3,d8,f5,e5,d1,\
  5c,65,96,23,50,65,35,66,65,9a,e3,da,af,a4,73,e6,0d,39,17,87,4d,1a,40,67,df,\
  f9,51,ef,00,c5,63,d6,01,24,be,43,80,1c,b9,e2,92,dd,7a,e5,8e,5e,45,80,da,a7,\
  22,c8,65,85,04,0e,6d,1d,4b,44,99,52,70,a3,13,e1,d4,bd,da,8a,b0,27,31,5f,f2,\
  29,fb,40,00,00,00,0f,e8,43,32,cd,b1,1d,1d,fa,34,dd,6b,08,25,af,42,62,02,b9,\
  b7,fe,61,ec,60,98,37,23,8e,46,d9,b9,4f,56,dd,21,be,99,8f,5f,03,dc,e4,2d,81,\
  21,95,78,8c,2f,08,d2,4e,cc,27,9d,3f,1e,07,f2,fa,3c,72,8b,11
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{01979c6a-42fa-414c-b8aa-eee2c8202018}.check.101]
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{11CD958A-C507-4EF3-B3F2-5FD9DFBD2C78}.check.101]
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{852FB1F8-5CC6-4567-9C0E-7C330F8807C2}.check.100]
"CheckSetting"=hex:23,00,41,00,43,00,42,00,6c,00,6f,00,62,00,00,00,00,00,00,00,\
  00,00,00,00,01,00,00,00,00,00,00,00,00,00,00,00
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{852FB1F8-5CC6-4567-9C0E-7C330F8807C2}.check.101]
"CheckSetting"=hex:23,00,41,00,43,00,42,00,6c,00,6f,00,62,00,00,00,00,00,00,00,\
  00,00,00,00,01,00,00,00,00,00,00,00,00,00,00,00
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{945a8954-c147-4acd-923f-40c45405a658}.check.42]
"CheckSetting"=hex:01,00,00,00,d0,8c,9d,df,01,15,d1,11,8c,7a,00,c0,4f,c2,97,eb,\
  01,00,00,00,a1,83,01,f4,91,88,0b,41,99,d1,cd,6e,b8,2a,4c,5d,00,00,00,00,02,\
  00,00,00,00,00,10,66,00,00,00,01,00,00,20,00,00,00,19,0e,64,43,a7,00,37,cc,\
  24,94,48,4a,2f,79,3f,13,dc,b3,c1,11,80,fe,61,e4,1b,6b,dd,9b,41,f7,7e,03,00,\
  00,00,00,0e,80,00,00,00,02,00,00,20,00,00,00,ea,0c,21,40,a1,54,3d,98,be,f1,\
  ed,1f,99,a2,ba,63,23,41,ea,e8,a3,43,8d,ae,e8,8c,4f,d4,e8,3a,8a,26,30,00,00,\
  00,b1,00,f7,23,f2,4d,60,8d,f0,b1,6e,f1,6e,b5,c9,78,4f,ed,14,7f,5c,de,4c,e4,\
  04,1e,7e,75,b9,06,91,1d,90,50,7f,9a,ea,af,ed,80,76,e5,2b,72,18,b6,2d,1c,40,\
  00,00,00,90,5e,71,72,21,df,fd,63,3a,5b,ad,c8,fb,3d,64,54,3c,a3,2b,e6,c0,df,\
  24,c0,77,73,8b,11,9c,41,8e,0b,fe,a6,8c,53,d7,6b,88,e8,f2,b0,38,32,b2,7f,dd,\
  4f,cc,97,2d,0d,7a,27,6a,c5,7b,6d,8c,26,e0,46,17,24
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{A5268B8E-7DB5-465b-BAB7-BDCDA39A394A}.check.100]
"CheckSetting"=hex:01,00,00,00,d0,8c,9d,df,01,15,d1,11,8c,7a,00,c0,4f,c2,97,eb,\
  01,00,00,00,a1,83,01,f4,91,88,0b,41,99,d1,cd,6e,b8,2a,4c,5d,00,00,00,00,02,\
  00,00,00,00,00,10,66,00,00,00,01,00,00,20,00,00,00,ee,7c,38,98,5d,96,3f,0e,\
  57,4f,ff,44,e3,44,cc,7f,44,aa,43,a7,dd,0d,e4,9f,43,4c,4a,89,bd,9e,d6,70,00,\
  00,00,00,0e,80,00,00,00,02,00,00,20,00,00,00,50,ca,d8,2e,60,f7,f0,7d,ac,7c,\
  ea,2c,ca,42,fb,5e,1d,d3,aa,8c,b2,04,3f,3c,b4,ab,71,e6,fc,ca,e9,c3,30,00,00,\
  00,4a,a2,2c,d5,41,4b,db,ce,12,a4,d4,09,46,93,dc,56,cd,de,1e,a6,7c,96,ec,89,\
  a5,58,6c,75,2c,1d,26,de,07,11,0e,78,92,38,53,2c,d7,29,1b,f4,7d,8c,a7,5f,40,\
  00,00,00,0b,53,d6,4e,ed,cf,f0,45,61,82,6a,a8,43,61,68,45,b9,db,b7,66,e7,bc,\
  be,cb,de,61,47,7c,87,78,6d,86,02,9f,55,c4,79,d1,23,af,5d,02,98,8a,2e,1e,90,\
  97,1d,7b,5e,89,05,0c,8e,e8,1e,27,b9,bb,8a,7b,72,db
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.check.0]
"CheckSetting"=hex:01,00,00,00,d0,8c,9d,df,01,15,d1,11,8c,7a,00,c0,4f,c2,97,eb,\
  01,00,00,00,a1,83,01,f4,91,88,0b,41,99,d1,cd,6e,b8,2a,4c,5d,00,00,00,00,02,\
  00,00,00,00,00,10,66,00,00,00,01,00,00,20,00,00,00,d4,9a,ac,e0,26,2d,59,a0,\
  0a,44,ef,45,da,f6,cc,32,29,96,0a,a8,78,16,aa,3f,b4,47,af,75,7c,3f,1c,3b,00,\
  00,00,00,0e,80,00,00,00,02,00,00,20,00,00,00,9a,86,a6,87,00,84,58,01,25,5b,\
  79,f0,c8,c8,f1,85,9e,8f,f9,87,7b,81,69,df,28,1d,3f,d5,b1,c3,81,df,30,00,00,\
  00,5e,7d,46,e7,14,df,a6,d2,f2,6c,78,be,ab,97,b5,fd,89,56,2d,a5,4f,56,60,f5,\
  f6,db,18,dd,23,62,38,cc,79,c3,28,70,42,52,19,34,e0,19,5b,3a,ff,c3,cb,d4,40,\
  00,00,00,3a,2d,33,0c,59,9c,3d,e5,83,74,b4,dc,a8,49,38,44,aa,45,00,5b,7a,e0,\
  20,88,d3,67,8b,e5,48,d7,e9,79,10,0b,03,1e,ab,54,1f,24,a1,2f,0a,d3,8d,d5,36,\
  c0,45,7f,f9,55,43,71,53,d0,33,9e,cd,86,25,2c,6d,13
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{DAB69A6A-4D2A-4D44-94BF-E0091898C881}.check.100]
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.100]
"CheckSetting"=hex:01,00,00,00,d0,8c,9d,df,01,15,d1,11,8c,7a,00,c0,4f,c2,97,eb,\
  01,00,00,00,a1,83,01,f4,91,88,0b,41,99,d1,cd,6e,b8,2a,4c,5d,00,00,00,00,02,\
  00,00,00,00,00,10,66,00,00,00,01,00,00,20,00,00,00,93,86,7f,88,25,8c,28,ff,\
  12,39,7f,42,77,8e,46,d5,59,5b,a4,76,35,19,c7,87,98,10,b1,82,de,41,1d,30,00,\
  00,00,00,0e,80,00,00,00,02,00,00,20,00,00,00,fd,b3,73,53,df,86,fc,a7,27,47,\
  7b,88,c9,d2,c5,45,b4,ac,59,79,8a,0a,4d,ce,86,c4,55,fc,ee,47,d0,87,c0,00,00,\
  00,4a,f1,21,2f,78,91,0f,ac,18,54,e3,d8,ae,54,9a,af,62,c1,bd,57,2e,b4,a7,a3,\
  18,c0,8c,32,97,2c,f4,c9,2e,99,ad,86,6b,a4,12,3d,c3,87,ad,cb,30,0a,29,a9,db,\
  8e,f3,77,f7,e9,c2,9c,b6,dc,f5,78,64,50,b7,b3,32,24,4e,51,c7,73,8e,a9,0d,e1,\
  0c,12,ee,23,7d,0c,b0,a2,5f,88,5d,2c,f1,67,12,78,f2,04,10,95,b1,bc,c2,c2,b3,\
  4e,c7,78,33,ba,6d,ad,0e,58,ca,df,d4,40,f5,0c,33,dd,40,0d,fa,0e,5c,28,9a,ef,\
  e4,e9,c1,98,e3,af,3e,c1,de,8a,7d,f0,51,0d,d1,0d,69,da,b9,a2,8d,a1,e6,27,b6,\
  92,f9,25,8c,e1,90,1f,88,c9,37,c6,2e,b6,c3,3a,75,29,bf,b1,d3,b6,1e,ed,25,ec,\
  6b,66,15,0f,0d,a8,b5,3e,fe,0b,f8,bd,2a,9b,7b,da,f6,d7,40,00,00,00,b0,72,34,\
  cc,3e,fa,f5,30,42,1f,49,ee,f9,5b,46,06,9f,d1,42,3d,44,71,56,31,8c,d4,e1,bb,\
  56,ae,45,d4,4d,c9,f2,09,3f,74,38,5e,d2,f4,7e,dc,04,14,fd,d5,fc,70,c4,5c,10,\
  1a,ac,1f,61,64,5a,45,fb,db,d4,ec
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.101]
"CheckSetting"=hex:01,00,00,00,d0,8c,9d,df,01,15,d1,11,8c,7a,00,c0,4f,c2,97,eb,\
  01,00,00,00,a1,83,01,f4,91,88,0b,41,99,d1,cd,6e,b8,2a,4c,5d,00,00,00,00,02,\
  00,00,00,00,00,10,66,00,00,00,01,00,00,20,00,00,00,dd,2a,0c,dd,13,91,60,6a,\
  a9,97,de,a5,ba,bc,51,67,76,55,d5,7e,a3,37,3b,b1,5a,1c,b2,f3,92,6d,42,fb,00,\
  00,00,00,0e,80,00,00,00,02,00,00,20,00,00,00,df,a7,27,7a,99,16,f0,64,e5,67,\
  92,ba,2b,ff,20,28,4b,8a,ee,ad,de,f3,60,2d,a4,a1,51,91,ac,c9,78,c6,30,00,00,\
  00,ae,25,b6,95,e6,50,f1,eb,62,51,42,3e,2c,b0,3d,cc,52,a7,af,ca,76,8d,20,94,\
  bc,23,67,6b,21,ad,f3,cd,76,13,77,07,44,24,70,34,d9,2c,f6,69,51,26,e9,59,40,\
  00,00,00,dd,dc,47,be,c7,2a,60,af,73,88,c1,1a,17,cd,fd,c8,bb,ba,b1,83,41,d9,\
  83,7b,e2,e1,02,3e,98,82,68,da,b4,33,08,19,8a,d6,52,57,89,72,eb,71,49,26,b1,\
  b0,e9,79,0b,d2,8e,d8,6c,25,ca,e2,6c,e5,95,48,1e,11
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.102]
"CheckSetting"=hex:01,00,00,00,d0,8c,9d,df,01,15,d1,11,8c,7a,00,c0,4f,c2,97,eb,\
  01,00,00,00,a1,83,01,f4,91,88,0b,41,99,d1,cd,6e,b8,2a,4c,5d,00,00,00,00,02,\
  00,00,00,00,00,10,66,00,00,00,01,00,00,20,00,00,00,50,43,6c,78,43,64,b3,b1,\
  27,00,50,6a,2b,4b,af,34,d0,fc,8e,5f,21,3f,cd,e8,f2,7b,e4,00,68,18,68,50,00,\
  00,00,00,0e,80,00,00,00,02,00,00,20,00,00,00,20,5c,4c,a9,2d,ca,57,f5,03,b7,\
  7a,bd,40,93,cb,57,5c,1b,22,3b,be,e3,2e,ac,42,05,b3,db,2d,0e,c8,3f,c0,00,00,\
  00,07,a8,4e,ed,97,93,7e,ce,82,0b,ff,c9,15,cd,88,1d,cc,5a,7d,c7,6e,9a,c8,5e,\
  c1,7b,ca,b1,be,dd,8b,44,b2,93,06,6f,7a,24,91,42,79,af,25,57,84,27,bd,65,83,\
  ff,e4,a9,bd,22,fe,88,70,b1,98,a8,29,f7,ef,e4,b8,00,77,16,28,76,4e,77,04,93,\
  e5,42,b3,f1,06,2a,0c,66,29,b9,7f,55,18,68,ac,44,c9,94,10,80,5a,e2,06,0e,4c,\
  e6,72,0e,e2,41,8a,86,b8,64,bb,1e,84,20,35,11,d9,ac,22,d5,40,c3,38,74,cf,39,\
  18,5d,d0,8f,dc,c0,1c,56,9e,f5,71,40,af,2c,9e,a5,0e,64,18,fb,6c,87,14,72,a3,\
  26,de,70,da,7c,89,88,1e,5d,d7,eb,1f,a0,8e,e0,54,b4,6f,71,d3,ec,c7,03,dd,93,\
  df,56,01,c0,a2,02,bd,94,13,77,d9,e9,43,5a,8c,a8,58,54,40,00,00,00,9a,80,b6,\
  56,38,cb,d9,d0,3f,35,bd,3e,80,7f,1c,3e,a0,55,8c,b8,86,97,cd,37,e6,15,3a,be,\
  92,6c,0d,2d,d5,6c,f2,fe,fe,be,85,5e,61,38,2c,df,ea,95,20,71,6b,54,a1,64,c2,\
  ab,55,4a,9f,02,95,62,0c,db,2c,d0
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.103]
"CheckSetting"=hex:01,00,00,00,d0,8c,9d,df,01,15,d1,11,8c,7a,00,c0,4f,c2,97,eb,\
  01,00,00,00,a1,83,01,f4,91,88,0b,41,99,d1,cd,6e,b8,2a,4c,5d,00,00,00,00,02,\
  00,00,00,00,00,10,66,00,00,00,01,00,00,20,00,00,00,4d,55,53,40,ef,8f,10,36,\
  39,ae,1c,0d,10,f9,80,c8,20,3e,b9,0d,ff,84,8e,2e,36,85,de,cf,45,17,6c,1d,00,\
  00,00,00,0e,80,00,00,00,02,00,00,20,00,00,00,f9,93,5f,9c,d1,c3,fe,85,e1,68,\
  63,62,de,6e,93,f5,be,98,a6,d2,c5,c1,9a,2a,b7,10,42,cc,00,44,4e,35,c0,00,00,\
  00,16,4c,65,18,f5,45,89,04,5f,ba,f9,b7,95,d8,ed,13,c8,d0,12,65,be,eb,4d,e4,\
  08,ab,03,5f,35,e5,cf,1c,8d,ac,87,4f,fd,d4,f9,e3,1d,e8,eb,21,db,50,7f,b2,b8,\
  09,d9,b9,30,88,e1,c2,c3,b9,c8,27,96,9b,b7,97,47,77,17,8a,78,f3,53,bb,01,97,\
  88,2d,09,ed,45,ae,85,2c,73,cb,58,9f,33,9f,9a,94,e9,8c,cd,45,5d,b9,f1,46,9f,\
  59,15,7a,93,06,e3,2f,80,66,01,4b,f7,a4,83,d2,e5,bc,14,7e,ac,6a,67,5e,2b,01,\
  18,98,64,14,67,02,3f,a8,46,7b,1b,02,d1,8e,bd,20,ca,47,4b,10,44,e7,10,5b,93,\
  03,a7,6a,c6,71,3a,b8,23,25,52,09,94,d4,10,0c,ac,5b,07,ba,35,62,cd,80,1d,75,\
  dc,9b,ff,93,d6,a3,c4,80,20,f7,13,f5,a8,ed,2a,49,7d,97,40,00,00,00,da,46,de,\
  34,ca,77,5d,0c,1c,22,44,d5,63,db,32,e7,21,e3,7c,33,90,fe,b2,5e,9a,5a,eb,97,\
  01,ce,34,28,61,31,31,57,37,22,0a,d5,bd,0d,4d,5d,64,92,f1,f9,7e,5f,b3,ef,86,\
  50,23,89,03,0f,c9,4e,62,62,f2,85
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.104]
"CheckSetting"=hex:01,00,00,00,d0,8c,9d,df,01,15,d1,11,8c,7a,00,c0,4f,c2,97,eb,\
  01,00,00,00,a1,83,01,f4,91,88,0b,41,99,d1,cd,6e,b8,2a,4c,5d,00,00,00,00,02,\
  00,00,00,00,00,10,66,00,00,00,01,00,00,20,00,00,00,9e,a4,f2,e2,eb,85,47,db,\
  39,da,e1,fa,da,4d,30,6e,26,52,76,84,8d,ca,13,bb,d0,55,93,9a,ab,55,de,da,00,\
  00,00,00,0e,80,00,00,00,02,00,00,20,00,00,00,bd,39,4f,bb,23,43,4b,9d,13,6d,\
  b6,c3,28,a7,b1,0f,ae,c8,3d,7e,29,b9,1e,96,6d,99,15,87,33,d8,a2,7d,30,00,00,\
  00,34,d6,09,4e,22,cd,04,4b,14,38,76,96,36,3b,37,42,41,ee,a1,82,bc,8a,fd,22,\
  35,1d,b3,8f,04,0b,f4,46,30,0c,39,02,6e,7b,e8,ae,7e,f8,56,7f,dc,68,5d,5c,40,\
  00,00,00,79,8b,22,ff,81,23,92,b2,9b,9a,9b,41,91,f3,0e,7f,65,d4,e0,5b,ee,6b,\
  7d,b1,c8,59,f5,f2,0b,33,70,30,e3,3f,0b,99,4a,09,97,5e,90,8c,4c,ce,7b,62,07,\
  ce,74,7c,b0,21,7d,9f,2b,a0,b1,63,f8,06,ae,45,c2,66
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.106]
;
------End cut & paste here------
______________________________________________________________________________



Logon + Password Tweaks



* NOTE:
All these tweaks work with all Windows 7/newer + Server 2008/newer releases, and most even with Windows XP/newer + Server
2003/newer.

* WMIC.EXE DOS console command line tool:
Disable PasswordExpiryWarning DWORD [REG_DWORD] Registry value:
http://technet.microsoft.com/library/ee829687.aspx
Disable Password expiration for all accounts using WMIC.EXE command:
http://www.sevenforums.com/tutorials/73210-password-expiration-enable-disable.html
http://www.cocosenor.com/articles/windows-10/4-ways-to-disable-or-enable-windows-10-password-expiration-notification.html
Enable "Password never expires" network logon setting [disable PasswordExpiryWarning registry value] from a DOS console
command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command ->
press Enter:
WMIC.exe UserAccount set PasswordExpires=False
WMIC.exe executable is located in the %WinDir%\SYSTEM32\wbem directory/folder [%WinDir% = usually C:\WINDOWS], listed on
your system PATH.
View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]:
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command
PATH
-> press Enter.
WMIC (Windows Management Instrumentation Command):
http://learn.microsoft.com/windows/win32/wmisdk/wmic/
MS DOCs: WMIC:
http://technet.microsoft.com/library/bb742610.aspx
Dedoimedo: WMIC - The Windows secret weapon:
http://www.dedoimedo.com/computers/windows-wmic.html
ComputerHope: WMIC:
http://www.computerhope.com/wmic.htm
Rob van der Woude: WMIC:
http://www.robvanderwoude.com/wmic.php
quux: WMIC Snippets:
http://quux.wiki.zoho.com/WMIC-Snippets.html
SS64: WMIC.EXE:
http://www.ss64.com/nt/wmic.html
Wikipedia: WMI:
http://en.wikipedia.org/wiki/Windows_Management_Instrumentation

* NET.EXE DOS console command line tool:
http://www.ss64.com/nt/net.html
http://www.lifewire.com/net-user-command-2618097/
http://www.ghacks.net/2017/05/24/manage-windows-users-with-net-user/
NET.EXE executable is located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually C:\WINDOWS], listed on your
system PATH.
View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]:
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command
PATH
-> press Enter.
Syntax:
NET [ ACCOUNTS | COMPUTER | CONFIG | CONTINUE | FILE | GROUP | HELP |
      HELPMSG | LOCALGROUP | NAME | PAUSE | PRINT | SEND | SESSION |
      SHARE | START | STATISTICS | STOP | TIME | USE | USER | VIEW ]
Logon, Lockout + Password enforcement (Run as Administrator):
C:\>NET.EXE ACCOUNTS
Force user logoff how long after time expires?:       Never
Minimum password age (days):                          999
Maximum password age (days):                          Unlimited
Minimum password length:                              0
Length of password history maintained:                None
Lockout threshold:                                    Never
Lockout duration (minutes):                           0
Lockout observation window (minutes):                 0
Computer role:                                        WORKSTATION
Run as Administrator:
NET ACCOUNTS /?
http://www.ss64.com/nt/net-useradmin.html
http://support.microsoft.com/help/556003/
http://technet.microsoft.com/library/dd277400.aspx
Syntax:
NET ACCOUNTS
	[/FORCELOGOFF:{minutes|NO}]
	[/MINPWLEN:length]
	[/MAXPWAGE:{days|UNLIMITED}]
	[/MINPWAGE:days]
	[/UNIQUEPW:number]
	[/DOMAIN]
	[/lockoutwindow:(0-99999) MUST be = or > than "Lockout duration" number]
http://www.sevenforums.com/tutorials/72271-account-lockout-reset-invalid-logon-counter.html
	[/lockoutduration:(1-99999) MUST be = or < than "Lockout observation window" number]
http://www.sevenforums.com/tutorials/72258-account-lockout-duration-locked-out-user-accounts.html
Disable Password age, expiration + length restrictions + Lockout timeouts from a DOS console command prompt
[%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter:
NET.EXE ACCOUNTS /lockoutduration:0 /lockoutwindow:0 /MAXPWAGE:UNLIMITED /MINPWAGE:999 /FORCELOGOFF:NO
OR, alternatively, this command -> press Enter:
NET.EXE ACCOUNTS /lockoutduration:0 /lockoutwindow:0 /MINPWLEN:0 /MAXPWAGE:UNLIMITED /MINPWAGE:0 /FORCELOGOFF:NO

* Customized/Optimized WinLogon registry settings:
AutoAdminLogon:
http://learn.microsoft.com/troubleshoot/windows-server/user-profiles-and-logon/turn-on-automatic-logon/
CachedLogonsCount:
http://learn.microsoft.com/troubleshoot/windows-server/user-profiles-and-logon/cached-domain-logon-information/
DisableCAD:
http://support.microsoft.com/help/960271/
Notify, Shell + Userinit:
http://attack.mitre.org/techniques/T1547/004/
PasswordExpiryWarning:
http://technet.microsoft.com/library/ee829687.aspx
http://www.sevenforums.com/tutorials/73210-password-expiration-enable-disable.html
http://www.cocosenor.com/articles/windows-10/4-ways-to-disable-or-enable-windows-10-password-expiration-notification.html
ReportBootOk:
http://franck.kiechel.free.fr/dbr_eng/WinLogon.htm
ShutdownFlags:
http://learn.microsoft.com/openspecs/windows_protocols/ms-tsts/81c472be-2a71-424e-8bde-71e826a34c26/
NOTE:
Some of these settings apply only to Windows NTx 32-bit (x86) OSes.
Tweaked WinLogon Registry file (example):
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"Background"="0 0 0"
"DebugServerCommand"="no"
"Shell"="explorer.exe /select,explorer.exe"
"DefaultDomainName"=""
"DefaultUserName"=""
"DisableCAD"=dword:0
"AutoRestartShell"=dword:1
"CachedLogonsCount"="50"
"FirstLogon"=dword:0
"ForceUnlockLogon"=dword:0
"LegalNoticeCaption"=-
"LegalNoticeText"=-
"LogonType"=-
"PasswordExpiryWarning"=dword:fffffff3
"PowerdownAfterShutdown"="1"
"ShutdownWithoutLogon"="1"
"WinStationsDisabled"="0"
"ScRemoveOption"="0"
"ShutdownFlags"=dword:a
; "ShutdownFlags"=dword:2b
"EnableConcurrentSessions"=-
"AllowMultipleTSSessions"=-
"ParseAutoexec"=-
"ShowLogonOptions"=dword:0
; "IgnoreShiftOveride"=dword:0
"IgnoreShiftOveride"=-
"HibernationPreviouslyEnabled"=dword:0
"AutoAdminLogon"="1"
"AutoLogonCount"=-
"ReportControllerMissing"="false"
"ReportBootOk"="1"
"Welcome"="Your Account or Domain Name"
;
------End cut & paste here------
______________________________________________________________________________



Clock Sync



* Fix "Time difference too great" Time Sync Error:
http://www.raymond.cc/blog/auto-sync-pc-clock-on-windows-startup/
using one of the National Institute of Standards and Technology (NIST)
http://www.nist.gov/
NTP (Network Time Protocol) public servers (example):
time-b.nist.gov
List of NTP (Network Time Protocol) public servers:
http://tf.nist.gov/tf-cgi/servers.cgi
http://support.ntp.org/bin/view/Servers/NTPPoolServers
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time]
"Start"=dword:3
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\Config]
"MaxPosPhaseCorrection"=dword:ffffffff
"EventLogFlags"=dword:0
"MaxNegPhaseCorrection"=dword:ffffffff
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\Parameters]
"ServiceDllUnloadOnStop"=dword:1
"NtpServer"="time-b.nist.gov"
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\TimeProviders\NtpClient]
"RunOnVirtualOnly"=dword:0
"Enabled"=dword:1
"EventLogFlags"=dword:0
"SignatureAuthAllowed"=dword:1
"AllowNonstandardModeCombinations"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\TimeProviders\NtpServer]
"RunOnVirtualOnly"=dword:0
"Enabled"=dword:1
"EventLogFlags"=dword:0
"ChainDisable"=dword:0
"RequireSecureTimeSyncRequests"=dword:0
"AllowNonstandardModeCombinations"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\TimeProviders\VMICTimeProvider]
"RunOnVirtualOnly"=dword:0
"Enabled"=dword:1
"EventLogFlags"=dword:0
"AllowNonstandardModeCombinations"=dword:1
;
------End cut & paste here------

* Synchronize your computer clock with one of the NTP (Network Time Protocol) public servers [time-b.nist.gov in this
example], also listed (see above) under the "NtpServer" registry REG_SZ [String] value in Windows 7/newer:
http://www.guidingtech.com/3119/windows-clock-sync/
http://groups.google.com/forum/#!topic/alt.msdos.batch.nt/UpvUnYfxBkw/
http://www.netikka.net/tsneti/info/tscmd169.htm
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text BATch (.bat) or CoMmanD (.cmd) script file containing the lines between Cut & Paste delimiters below
-> save it as plain text/ASCII file (Encode: -> ANSI) with the BAT (.bat) or CMD (.cmd) extension -> right-click it ->
Run as Administrator -> wait for completion.
-----Begin cut & paste here-----
@ECHO OFF
IF NOT "%OS%"=="Windows_NT" GOTO END
:: (1) Start Windows Time Server [W32Time] NTP service:
SC.EXE CONFIG W32Time START= demand
ECHO Y|NET.EXE START W32Time
:: (2) Synchronize computer clock with NTP public server (example):
W32TM.EXE /config /manualpeerlist:time-b.nist.gov /syncfromflags:manual /update
W32TM.EXE /resync
:: (3) Stop Windows Time Server [W32Time] NTP service:
ECHO Y|NET.EXE STOP W32Time
SC.EXE CONFIG W32Time START= demand
:END
EXIT
------End cut & paste here------
NET.EXE, SC.EXE + W32TM.EXE executables DOS console command line tools are located in the %WinDir%\SYSTEM32 directory/folder
[%WinDir% = usually C:\WINDOWS], listed on your system PATH.
View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]:
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command
PATH
-> press Enter.

* Create a new Task (TaskSchd.msc) using batch file (.BAT or .CMD) above and schedule it to run periodically to sync your
computer clock unattended in the background in Windows 7/newer:
http://answers.microsoft.com/en-us/windows/forum/windows_7-performance/make-windows-7-task-scheduler-run-a-batch-file/0573dc2e-4941-44a2-8304-264864e94f1a/
http://answers.microsoft.com/en-us/windows/forum/windows_10-performance/make-windows-10-task-scheduler-run-a-batch-file/e00b2fb0-02ca-439f-b534-eb34541130a9/

* MS DOCs: Windows Time Service Tools + Settings:
http://technet.microsoft.com/library/cc773263.aspx
http://learn.microsoft.com/windows-server/networking/windows-time-service/Windows-Time-Service-Tools-and-Settings/

* Date/Time time server Simple Network Time Protocol (SNTP) synchronization client tools for Windows XP/newer [free(ware)]:
http://www.thewindowsclub.com/free-time-synchronization-software-windows/
http://www.raymond.cc/blog/auto-sync-pc-clock-on-windows-startup/
- Time Synchronizer:
http://www.itsamples.com/time-synchronizer.html
File:
http://www.itsamples.com/downloads/time-synchronizer.zip
- NetTime:
http://www.timesynctool.com/
- Dimension 4:
http://www.thinkman.com/dimension4/
Download:
http://www.thinkman.com/dimension4/download.htm
- Atomic Clock Sync (ACS):
http://www.worldtimeserver.com/atomic-clock/
- Time-Sync:
http://www.speed-soft.de/software/time_sync/
Download:
http://www.speed-soft.de/software/time_sync/details/download.php
- Neutron:
http://www.keir.net/neutron.html
File:
http://www.keir.net/download/neutron.zip

* Wikipedia: Time Server:
http://en.wikipedia.org/wiki/Time_server

* Wikipedia: Network Time Protocol (NTP):
http://en.wikipedia.org/wiki/Network_Time_Protocol
______________________________________________________________________________



Turn OFF/ON Link Layer Topology Discovery (LLTD) + Quality of Service (QoS)



Turn OFF/stop/disable Link Layer Discovery Protocol (LLDP), Link Layer Topology Discovery (LLTD) + Quality of Service (QoS)
networking/internet protocols, drivers, services + settings in Windows 7/newer (applies also to Windows XP, 2003 + Vista):
- Link-Layer Topology Discovery Mapper I/O driver [lltdio] = %WinDir%\SYSTEM32\DRIVERS\lltdio.sys ,
- Link-Layer Topology Discovery Mapper service [lltdsvc] = %WinDir%\SYSTEM32\lltdsvc.dll ,
- Link-Layer Topology Discovery Responder driver [rspndr] = %WinDir%\SYSTEM32\DRIVERS\rspndr.sys ,
- Microsoft LLDP Protocol Driver service [MsLldp] = %WinDir%\SYSTEM32\DRIVERS\mslldp.sys +
- QoS (Quality of Service) Packet Scheduler driver [Psched] = %WinDir%\SYSTEM32\DRIVERS\pacer.sys .
%WinDir% directory/folder = usually C:\WINDOWS -> listed on your system PATH.
http://www.windows-security.org/windows-service/quality-windows-audio-video-experience/
http://www.windows-security.org/windows-service/link-layer-topology-discovery-mapper/
http://learn.microsoft.com/windows/win32/services/services-and-redirected-drives/
http://helpdeskgeek.com/windows-10/4-fixes-when-you-cant-map-a-network-drive-in-windows-10/
http://learn.microsoft.com/previous-versions/windows/desktop/qos/link-layer-topology-discovery-protocol/
http://learn.microsoft.com/previous-versions/windows/desktop/qos/
http://batcmd.com/windows/10/services/lltdio/
http://batcmd.com/windows/10/services/lltdsvc/
http://batcmd.com/windows/10/services/rspndr/
http://batcmd.com/windows/10/services/mslldp/
http://batcmd.com/windows/10/services/psched/
http://en.wikipedia.org/wiki/Link_Layer_Topology_Discovery
http://en.wikipedia.org/wiki/Link_Layer_Discovery_Protocol
http://en.wikipedia.org/wiki/Quality_of_service
http://en.wikipedia.org/wiki/IPv4
http://en.wikipedia.org/wiki/IPv6

CAUTION:
********
Quality Windows Audio Video Experience [qWave] component driver
http://batcmd.com/windows/10/services/qwavedrv/
depends on these 2 drivers (among others):
http://www.windows-security.org/windows-service/quality-windows-audio-video-experience/
- Link-Layer Topology Discovery Mapper I/O driver [lltdio],
http://batcmd.com/windows/10/services/lltdio/
- QoS (Quality of Service) Packet Scheduler driver [Psched].
http://batcmd.com/windows/10/services/psched/

That's because basic broadband/cable/Ethernet/local/satellite/internet/network/LAN/WAN/NIC/Wi-Fi/wireless/etc stand alone
connections without any add-ons/components/extensions/extras/features/services that require any of the drivers + services
listed above, and without any connected/linked/networked/shared computers/consoles/devices/PCs/terminals need only 2 basic
internet protocols to function properly:
- Internet Protocol Version 4 (IPv4) +
- Internet Protocol version 6 (IPv6),
as listed in Control Panel (CP) [Windows XP/newer] and Windows Settings (WS) [Windows 10/newer] -> All Control Panel Items
-> Network and Sharing Center -> Change adapter settings -> Your active/current/enabled Connection icon/item/link/shortcut
-> right-click -> Properties -> Networking tab -> "This connection uses the following items:".
Optimizing your connection and ditching unnecessary/unused bloat allows your computers/devices/portables to perform faster,
preserve additional resources by saving CPU cycles, decreasing CPU load, saving memory space, minimizing
loadind/startup/operational/processing times, etc.
Added bonus: disabling unnecessary/unused networking/internet features/options usually translates into enhanced online
privacy, safety + security by closing available/potential (open) doors which could expose your
computer(s)/device(s)/portable(s) to breaches, hacking, malware, spying, etc.
This also implies you're not using and/or you don't care about any Microsoft and 3rd party for profit automatic/unattended
behind-your-back/forced/hidden/intrusive/invasive/subversive/unwanted/without your approval/consent/knowledge/permission,
annoying/bloat/resources consuming, undesirable/unnecessary/unneeded/unused/unwanted/useless ad(vertisment)s/adware,
add-ons, components, "features", enrollments, "experience", memberships, "offers", "trials", services, subscriptions
(examples): Store apps, proprietary software bundles/trials, Azure, Bing, Edge web browser, Hotmail, Live, Microsoft Start,
(MSN) Messenger, Office, OneDrive/SkyDrive, Outlook, Photos/Photo Viewer, Windows Essentials, Windows Insider Program (WIP),
Windows (Live) Mail, Windows Media Player (WMP), Windows Movie Maker (WMM).
You can always find cheaper [or even 100% free(ware)], better, improved alternatives, or similar products/services/software
available online (examples):
http://alternativeto.net/software/microsoft-office-suite/
http://alternativeto.net/software/windows-media-player/
http://alternativeto.net/software/windows-photo-viewer/
http://www.softwarehow.com/windows-mail-alternatives/
http://www.websiterating.com/cloud-storage/best-microsoft-onedrive-alternatives/
http://www.digitalcitizen.life/best-free-alternatives-windows-movie-maker/
Some of the bundled/forced/preset apps/programs/services are either buggy, flawed, still in development stages, interim,
pre-releases, previews, unfinished, untested (or incompletely tested), and some actually ask for cash/money, periodic paid
enrollment/membership/service/subscription fees, eventually at the end of their time limited deadline/expiration/trial
periods, or/and for as long as you choose to extend/maintain/pay for/purchase/subscribe to/support them.
Worse, most such programs ask for your confidential/identifiable/personal/private/privileged
biometrics/data/fingerprint/information/stats (which in many cases are/is not needed/mandated/necessary/required to ensure
proper functionality/operation/service), store it on their cloud/network/internet/remote servers/storage facilities (and
therefore expose it to potential breaches, hacking, malware, spying, tracking, etc), and very frequently lease/share/sell
your data for profit to other 3rd
party/affiliates/associates/branches/brands/companies/divisions/entities/parents/partners/subsidiaries.
See also these MDGx topics (all included):
- "Digital + Internet/Online Privacy, Safety + Security" chapter in WINDOWS7.TXT (this file):
http://www.mdgx.com/7.php#:~:text=Digital%20%2B%20Internet%2FOnline%20Privacy%2C%20Safety%20%2B%20Security%20%3D%20Your%20Top%20Priority
http://www.mdgx.com/WINDOWS7.TXT
- "Turn OFF/Remove Windows 7/8/8.1 Adware, Spyware, Security Flaws + Repair/Restore Privacy" chapter in WINDOWS7.TXT (this
file):
http://www.mdgx.com/7.php
http://www.mdgx.com/WINDOWS7.TXT
- "Turn OFF/Remove Windows 10 Adware, Spyware, Security Flaws + Repair/Restore Privacy" chapter in WIN10.TXT:
http://www.mdgx.com/10.php
http://www.mdgx.com/WIN10.TXT

CAUTION:
********
This requires adequate/advanced knowledge about critical computing, operating systems, shared environments, networks,
cybersecurity.
http://www.mdgx.com/importnt.php
Recommended for single user environments without any add-ons/components/extensions/extras/features/services which may
require specific configurations/items/properties/settings for proper operation.
Not recommended for multiuser/networked/shared/enterprise/server environments processing/storing/delivering
encrypted/protected/secure critical/private/sensitive/vital analysis/data/information.

Turn OFF LLTD from Control Panel (CP):
Start Menu/Orb -> Run... [hold WinKey + press R] -> type:
CONTROL.EXE /name Microsoft.NetworkAndSharingCenter
-> press Enter -> click left side "Change advanced sharing settings" link -> click "Network Profile" link (if prompted) ->
click down arrow next to "Private" profile (if needed) -> under "Network discovery" UNcheck (clear) "Turn on network
discovery" box.
CONTROL.EXE executable is located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually C:\WINDOWS].
View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]:
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command
PATH
-> press Enter.
Turn OFF all LLDP, LLTD + QoS drivers + services from your active/current/enabled network/internet connection Properties:
- Windows 7/7 SP1 users, including Windows Vista users:
Start Menu/Orb -> Control Panel (CP) -> Network and Sharing Center -> View network status and tasks -> View Active networks
-> click item right side of Connections: -> "your Network Connection name" (typical examples): "Ethernet" (direct broadband
modem connection), "Local Area Network" (LAN = direct router connection) or "Wi-Fi" (Wireless Fidelity connection) ->
connection Status -> General tab -> Properties -> Connection Properties General tab -> scroll down -> UNcheck (clear) all
these 4 boxes:
- "Link-Layer Topology Discovery Mapper I/O Driver",
- "Link-Layer Topology Discovery Responder",
- "Microsoft LLDP Protocol Driver" +
- "QoS Packet Scheduler"
-> click OK -> exit all dialogs/prompts/windows.
- Windows 8/newer users, including Windows 10 + 11 users:
Start Menu/Orb -> Control Panel (CP) -> Network and Sharing Center -> Active Networks -> click item right side of
Connections: -> "your Network Connection name" (typical examples): "Ethernet" (direct broadband modem connection), "Local
Area Network" (LAN = direct router connection) or "Wi-Fi" (Wireless Fidelity connection) -> connection Status -> General tab
-> Properties -> scroll down -> UNcheck (clear) all these 4 boxes:
- "Link-Layer Topology Discovery Mapper I/O Driver",
- "Link-Layer Topology Discovery Responder",
- "Microsoft LLDP Protocol Driver" +
- "QoS Packet Scheduler"
-> click OK -> exit all dialogs/prompts/windows.
Turn OFF all LLDP, LLTD + QoS drivers + services using a BATch (.bat)/CoMmanD (.cmd) file:
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text BATch (.bat) or CoMmanD (.cmd) script file containing the lines between Cut & Paste delimiters below
-> save it as plain text/ASCII file (Encode: -> ANSI) with the BAT (.bat) or CMD (.cmd) extension -> right-click it ->
Run as Administrator -> wait for completion.
-----Begin cut & paste here-----
@ECHO OFF
IF NOT "%OS%"=="Windows_NT" GOTO END
:: Turn OFF [Disabled] Link-Layer Topology Discovery Mapper I/O driver [lltdio]:
ECHO Y|NET.EXE STOP lltdio
SC.EXE CONFIG lltdio START= disabled
REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Services\lltdio" /v Start /t REG_DWORD /d 4 /f
:: Turn OFF [Disabled] Link-Layer Topology Discovery Mapper service [lltdsvc]:
ECHO Y|NET.EXE STOP lltdsvc
SC.EXE CONFIG lltdsvc START= disabled
REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Services\lltdsvc" /v Start /t REG_DWORD /d 4 /f
:: Turn OFF [Disabled] Link-Layer Topology Discovery Responder driver [rspndr]:
ECHO Y|NET.EXE STOP rspndr
SC.EXE CONFIG rspndr START= disabled
REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Services\rspndr" /v Start /t REG_DWORD /d 4 /f
:: Turn OFF [Disabled] Microsoft LLDP Protocol Driver service [MsLldp]:
ECHO Y|NET.EXE STOP MsLldp
SC.EXE CONFIG MsLldp START= disabled
REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Services\MsLldp" /v Start /t REG_DWORD /d 4 /f
:: Turn OFF [Disabled] QoS (Quality of Service) Packet Scheduler driver [Psched]:
ECHO Y|NET.EXE STOP Psched
SC.EXE CONFIG Psched START= disabled
REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Services\Psched" /v Start /t REG_DWORD /d 4 /f
:END
EXIT
------End cut & paste here------
REG.EXE, NET.EXE + SC.EXE executables DOS console command line tools are all located in the %WinDir%\SYSTEM32
directory/folder [%WinDir% = usually C:\WINDOWS].
View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]:
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command
PATH
-> press Enter.
Restart/reboot Windows for all these changes to take effect.
Turn OFF all LLDP, LLTD + QoS drivers + services using a Registry (.reg) file (optional):
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
; Turn OFF [Disabled] Link-Layer Topology Discovery Mapper I/O driver [lltdio]:
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\lltdio]
"LaunchProtected"=dword:0
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\lltdio]
"LaunchProtected"=dword:0
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\lltdio]
"LaunchProtected"=dword:0
"Start"=dword:4
; Turn OFF [Disabled] Link-Layer Topology Discovery Mapper service [lltdsvc]:
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\lltdsvc]
"LaunchProtected"=dword:0
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\lltdsvc]
"LaunchProtected"=dword:0
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\lltdsvc]
"LaunchProtected"=dword:0
"Start"=dword:4
; Turn OFF [Disabled] Link-Layer Topology Discovery Responder driver [rspndr]:
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\rspndr]
"LaunchProtected"=dword:0
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\rspndr]
"LaunchProtected"=dword:0
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\rspndr]
"LaunchProtected"=dword:0
"Start"=dword:4
; Turn OFF [Disabled] Microsoft LLDP Protocol Driver service [MsLldp]:
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\MsLldp]
"LaunchProtected"=dword:0
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\MsLldp]
"LaunchProtected"=dword:0
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\MsLldp]
"LaunchProtected"=dword:0
"Start"=dword:4
; Turn OFF [Disabled] QoS (Quality of Service) Packet Scheduler driver [Psched]:
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Psched]
"LaunchProtected"=dword:0
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Psched]
"LaunchProtected"=dword:0
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\Psched]
"LaunchProtected"=dword:0
"Start"=dword:4
;
------End cut & paste here------
Restart/reboot Windows for all these changes to take effect.

WARNING:
********
If all these interconnected/interdependent/interrelated drivers + services are turned OFF/disabled/stopped
networking/internet discovery, mapping + responder functions for available/connected/linked/remote/shared
clients/computers/devices/servers will not work, and you may experience errors +/- loss of functionality in
multiuser/networked/shared/enterprise/server environments which depend on these drivers + services.
Example: Xbox platform computers, connections, devices, servers + services need to use this protocol.
Refer to your documentation/guidelines/manuals/readme files or contact the manufacturer/support/vendor for information.
Turn ON/(re)enable/(re)start networking/internet discovery, mapping + responder step-by-step:
1. Turn ON all LLDP, LLTD + QoS drivers + services using a BATch (.bat)/CoMmanD (.cmd) file:
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text BATch (.bat) or CoMmanD (.cmd) script file containing the lines between Cut & Paste delimiters below
-> save it as plain text/ASCII file (Encode: -> ANSI) with the BAT (.bat) or CMD (.cmd) extension -> right-click it ->
Run as Administrator -> wait for completion.
-----Begin cut & paste here-----
@ECHO OFF
IF NOT "%OS%"=="Windows_NT" GOTO END
:: Turn ON [Automatic/Enabled] Link-Layer Topology Discovery Mapper I/O driver [lltdio]:
SC.EXE CONFIG lltdio START= enabled
ECHO Y|NET.EXE START lltdio
REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Services\lltdio" /v Start /t REG_DWORD /d 2 /f
:: Turn ON [Manual/Demand] Link-Layer Topology Discovery Mapper service [lltdsvc]:
SC.EXE CONFIG lltdsvc START= demand
ECHO Y|NET.EXE START lltdsvc
REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Services\lltdsvc" /v Start /t REG_DWORD /d 3 /f
:: Turn ON [Manual/Demand] Link-Layer Topology Discovery Responder driver [rspndr]:
SC.EXE CONFIG rspndr START= demand
ECHO Y|NET.EXE START rspndr
REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Services\rspndr" /v Start /t REG_DWORD /d 3 /f
:: Turn ON [System] QoS (Quality of Service) Packet Scheduler driver [Psched]:
SC.EXE CONFIG Psched START= system
ECHO Y|NET.EXE START Psched
REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Services\Psched" /v Start /t REG_DWORD /d 1 /f
:END
EXIT
------End cut & paste here------
REG.EXE, NET.EXE + SC.EXE executables DOS console command line tools are all located in the %WinDir%\SYSTEM32
directory/folder [%WinDir% = usually C:\WINDOWS].
View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]:
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command
PATH
-> press Enter.
2. Turn ON all LLDP, LLTD + QoS drivers + services using a Registry (.reg) file (optional):
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
; Turn ON [Automatic/Enabled] Link-Layer Topology Discovery Mapper I/O driver [lltdio]:
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\lltdio]
"LaunchProtected"=dword:0
"Start"=dword:2
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\lltdio]
"LaunchProtected"=dword:0
"Start"=dword:2
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\lltdio]
"LaunchProtected"=dword:0
"Start"=dword:2
; Turn ON [Manual/Demand] Link-Layer Topology Discovery Mapper service [lltdsvc]:
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\lltdsvc]
"LaunchProtected"=dword:0
"Start"=dword:3
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\lltdsvc]
"LaunchProtected"=dword:0
"Start"=dword:3
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\lltdsvc]
"LaunchProtected"=dword:0
"Start"=dword:3
; Turn ON [Manual/Demand] Link-Layer Topology Discovery Responder driver [rspndr]:
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\rspndr]
"LaunchProtected"=dword:0
"Start"=dword:3
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\rspndr]
"LaunchProtected"=dword:0
"Start"=dword:3
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\rspndr]
"LaunchProtected"=dword:0
"Start"=dword:3
; Turn ON [Automatic/Enabled] Microsoft LLDP Protocol Driver service [MsLldp]:
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\MsLldp]
"LaunchProtected"=dword:0
"Start"=dword:2
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\MsLldp]
"LaunchProtected"=dword:0
"Start"=dword:2
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\MsLldp]
"LaunchProtected"=dword:0
"Start"=dword:2
; Turn ON [System] QoS (Quality of Service) Packet Scheduler driver [Psched]:
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Psched]
"LaunchProtected"=dword:0
"Start"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Psched]
"LaunchProtected"=dword:0
"Start"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\Psched]
"LaunchProtected"=dword:0
"Start"=dword:1
;
------End cut & paste here------
3. Follow these steps to turn ON/(re)enable/(re)start networking/internet discovery:
http://www.technewstoday.com/how-to-turn-on-network-discovery/
http://www.zubairalexander.com/blog/unable-to-turn-on-network-discovery-on-windows-7-or-windows-8/
http://learn.microsoft.com/troubleshoot/windows-client/networking/cannot-turn-on-network-discovery/
http://www.lifewire.com/turn-on-off-network-discovery-in-windows-10-5116083/
Turn ON LLTD from Control Panel (CP):
Start Menu/Orb -> Run... [hold WinKey + press R] -> type:
CONTROL.EXE /name Microsoft.NetworkAndSharingCenter
-> press Enter -> click left side "Change advanced sharing settings" link -> click "Network Profile" link (if prompted) ->
click down arrow next to "Private" profile (if needed) -> under "Network discovery" check "Turn on network discovery" box.
CONTROL.EXE executable is located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually C:\WINDOWS].
View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]:
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command
PATH
-> press Enter.
Turn ON all LLDP, LLTD + QoS drivers + services from your active/current/enabled network/internet connection Properties:
- Windows 7/7 SP1 users, including Windows Vista users:
Start Menu/Orb -> Control Panel (CP) -> Network and Sharing Center -> View network status and tasks -> View Active networks
-> click item right side of Connections: -> "your Network Connection name" (typical examples): "Ethernet" (direct broadband
modem connection), "Local Area Network" (LAN = direct router connection) or "Wi-Fi" (Wi-Fi connection) -> connection Status
-> General tab -> Properties -> Connection Properties General tab -> scroll down -> check all these 4 boxes:
- "Link-Layer Topology Discovery Mapper I/O Driver",
- "Link-Layer Topology Discovery Responder",
- "Microsoft LLDP Protocol Driver" +
- "QoS Packet Scheduler"
-> click OK -> exit all dialogs/prompts/windows.
- Windows 8/newer users, including Windows 10 + 11 users:
Start Menu/Orb -> Control Panel (CP) -> Network and Sharing Center -> Active Networks -> click item right side of
Connections: -> "your Network Connection name" (typical examples): "Ethernet" (direct broadband modem connection), "Local
Area Network" (LAN = direct router connection) or "Wi-Fi" (Wi-Fi connection) -> connection Status -> General tab ->
Properties -> scroll down -> check all these 4 boxes:
- "Link-Layer Topology Discovery Mapper I/O Driver",
- "Link-Layer Topology Discovery Responder",
- "Microsoft LLDP Protocol Driver" +
- "QoS Packet Scheduler"
-> click OK -> exit all dialogs/prompts/windows.
4. Restart/reboot Windows for all these changes to take effect.

NOTE:
Older client/server computers/devices/terminals running Windows XP + Windows 2003 Server 32-bit (x86) + 64-bit (x64) need
this Hotfix so they can be discovered/found/mapped on the networks/internet by other clients/computers/devices/servers:
All Windows XP + Windows 2003 Server 32-bit (x86) + 64-bit (x64) KB922120 Hotfix for all supported editions + languages:
http://thehotfixshare.net/board/?/search/&q=KB922120
Windows XP SP2 32-bit (x86) Network Map Errors With Windows Vista/newer Link Layer Topology Discovery (LLTD) responder Fix:
http://web.archive.org/web/20071226071116/http://support.microsoft.com/kb/922120/
File [514 KB, English]:
http://web.archive.org/web/20070221043025if_/http://download.microsoft.com:80/download/0/5/f/05fc30db-e7af-4488-a3a8-23999328e4bd/WindowsXP-KB922120-v5-x86-ENU.exe
______________________________________________________________________________



CMD, Commands, Environment + Console



* Windows environment variables documentation, guides, tutorials:
http://learn.microsoft.com/windows/win32/procthread/environment-variables/
http://msdn.microsoft.com/library/windows/desktop/ms682653.aspx
http://www.ss64.com/nt/syntax-variables.html
http://www.ss64.com/nt/syntax-64bit.html
http://www.xahlee.info/mswin/env_var.html
http://www.tenforums.com/tutorials/3234-environment-variables-windows-10-a.html
http://www.sevenforums.com/performance-maintenance/136057-windows-7-environment-variables-list.html
http://www.howtogeek.com/51807/how-to-create-and-use-global-system-environment-variables/
http://www.makeuseof.com/tag/what-are-environment-variables-how-can-i-use-them-windows/
http://www.computerhope.com/jargon/e/envivari.htm
http://en.wikipedia.org/wiki/Environment_variable

* Execute (run) program/batch/script/process/service selectively depending on installed Windows NTx Operating System (OS)
bit strength: 32-bit (x86) or 64-bit (x64) (example):
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text BATch (.bat) or CoMmanD (.cmd) script file containing the lines between Cut & Paste delimiters below
-> save it as plain text/ASCII file (Encode: -> ANSI) with the BAT (.bat) or CMD (.cmd) extension -> right-click it ->
Run as Administrator -> wait for completion.
-----Begin cut & paste here-----
@ECHO OFF
IF NOT "%OS%"=="Windows_NT" GOTO END
IF NOT EXIST %WinDir%\SYSTEM32\REG.EXE GOTO END
IF NOT "%PROCESSOR_ARCHITECTURE%"=="AMD64" GOTO X86
REG.EXE DELETE "HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run" /v SunJavaUpdateSched /f
GOTO END
:X86
REG.EXE DELETE "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v SunJavaUpdateSched /f
:END
EXIT
------End cut & paste here------

* Add custom environment variables to the default list of SET commands (examples):
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text BATch (.bat) or CoMmanD (.cmd) script file containing the lines between Cut & Paste delimiters below
-> save it as plain text/ASCII file (Encode: -> ANSI) with the BAT (.bat) or CMD (.cmd) extension -> right-click it ->
Run as Administrator -> wait for completion.
-----Begin cut & paste here-----
@ECHO OFF
IF NOT "%OS%"=="Windows_NT" GOTO END
IF NOT EXIST %WinDir%\SYSTEM32\SETX.EXE GOTO END
SETX.EXE DIRCMD "/A:-D/B/O:GNE/-P/S"
SETX.EXE COPYCMD "/Y" /M
SETX.EXE DEVMGR_SHOW_DETAILS "1" /M
SETX.EXE DEVMGR_SHOW_NONPRESENT_DEVICES "1" /M
SETX.EXE FP_NO_HOST_CHECK "NO" /M
SETX.EXE GOOGLE_API_KEY "NO" /M
SETX.EXE GOOGLE_DEFAULT_CLIENT_ID "NO" /M
SETX.EXE GOOGLE_DEFAULT_CLIENT_SECRET "NO" /M
SETX.EXE windows_tracing_flags "0" /M
SETX.EXE windows_tracing_logfile "%TEMP%\CSILOG.LOG" /M
SETX.EXE deployment.expiration.check.enabled "false" /M
SETX.EXE SEE_MASK_NOZONECHECKS "1" /M
SETX.EXE __COMPAT_LAYER "RunAsAdmin" /M
:END
EXIT
------End cut & paste here------
Run CMD.EXE (as Administrator) -> type SET -> press Enter to view all installed SET environment variables (examples):
SET | MORE
or save list to plain text file:
SET>%TEMP%\ENVLIST.TXT
Example:
http://www.winaero.com/blog/how-to-see-names-and-values-of-environment-variables-in-windows-8-and-windows-7/
CMD.EXE [DOS console CoMmanD prompt EXEcutable] + SETX.EXE executables are located in the %WinDir%\SYSTEM32
directory/folder [%WinDir% = usually C:\WINDOWS], listed on your system PATH.
View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]:
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command
PATH
-> press Enter.
Google API Keys:
http://chromium.woolyss.com/#google-api-keys
http://www.chromium.org/developers/how-tos/api-keys/

* Environment variables Registry keys:
All Users (system wide) active key:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Environment
All Users (system wide) backup key #1:
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager\Environment
All Users (system wide) backup key #2:
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Control\Session Manager\Environment
Current User (logged on user) key:
HKEY_CURRENT_USER\Environment
Default User (all users) key:
HKEY_USERS\.DEFAULT\Environment
See MDGx "Registry Structure" chapter in REGISTRY.TXT (included) for more details:
http://www.mdgx.com/reg.htm#RTS
______________________________________________________________________________



Paging (Swap) File Tweaks



* Optimizing Memory Configuration:
http://technet.microsoft.com/library/cc938581.aspx
Memory Management:
http://technet.microsoft.com/library/cc951698.aspx
Enhance Windows Memory Management Through Registry:
http://www.registryrecycler.com/blog/2013/07/enhance-windows-memory-management-through-registry/
LargeSystemCache + PagedPoolSize + SystemPages registry values:
http://technet.microsoft.com/library/bb463205.aspx
PagedPoolQuota registry value:
http://technet.microsoft.com/library/cc759495.aspx
PagedPoolSize registry value:
http://technet.microsoft.com/library/cc738462.aspx
PoolUsageMaximum registry value:
http://support.microsoft.com/help/312362/
http://helpforsure.wordpress.com/tag/poolusagemaximum/
http://arcserve.zendesk.com/hc/en-us/articles/202808835-Insufficient-System-Resources-1450-/
SessionPoolSize + SessionViewSize registry values:
http://support.microsoft.com/help/840342/
ClearPageFileAtShutdown registry value:
http://support.microsoft.com/help/314834/
ClearPageFileAtShutdown FixIt! tool:
http://download.microsoft.com/download/C/1/D/C1DC29D4-FD75-400A-A661-F72D8C6976E1/MicrosoftFixit50463.msi
SecondLevelDataCache registry value:
http://archive.arstechnica.com/tweak/nt/L2-cache-1.html
PhysicalAddressExtension registry value [Windows 32-bit (x86) only]:
http://www.registryrecycler.com/blog/2013/07/enhance-windows-memory-management-through-registry/

* Change pagefile.sys file location to another drive/partition/volume (if available), management, initial + maximum sizes:
http://garvis.ca/2018/02/07/change-the-page-in-command-line/
Right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run these commands -> press Enter after each line (examples):
WMIC.EXE computersystem where name="%ComputerName%" set AutomaticManagedPagefile=False
WMIC.EXE pagefileset where name="D:\\pagefile.sys" set InitialSize=65536,MaximumSize=65536
WMIC.exe executable is located in the %WinDir%\SYSTEM32\wbem directory/folder [%WinDir% = usually C:\WINDOWS], listed on
your system PATH.
View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]:
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command
PATH
-> press Enter.
WMIC (Windows Management Instrumentation Command):
http://learn.microsoft.com/windows/win32/wmisdk/wmic/
MS DOCs: WMIC:
http://technet.microsoft.com/library/bb742610.aspx
Dedoimedo: WMIC - The Windows secret weapon:
http://www.dedoimedo.com/computers/windows-wmic.html
ComputerHope: WMIC:
http://www.computerhope.com/wmic.htm
Rob van der Woude: WMIC:
http://www.robvanderwoude.com/wmic.php
quux: WMIC Snippets:
http://quux.wiki.zoho.com/WMIC-Snippets.html
SS64: WMIC.EXE:
http://www.ss64.com/nt/wmic.html
Wikipedia: WMI:
http://en.wikipedia.org/wiki/Windows_Management_Instrumentation

* PAGEFILE.VBS for Windows Vista/7:
http://www.cluberti.com/blog/2010/06/17/pagefile-vbs-for-vistawin7-systems-may-work-on-xp2003-not-tested/comment-page-1/
pagefileconfig.vbs:
http://technet.microsoft.com/library/cc772827.aspx
http://ww.upgradenrepair.com/Software/Microsoft/Windows%20Server%202003/Library/P/pagefileconfigvbs.htm
______________________________________________________________________________



Windows (Defender) Firewall (WF) Tweaks + Tools



* MDGx "Tweaks, Hacks + Fixes... UNconventional, UNdocumented, UNcensored ;-/" chapter ->
"* FIX: MDGx customized/tweaked list of all Windows Defender Firewall (WDF) Inbound + Outbound Core Networking rules" topic
in WIN10.TXT (included) = most of them apply also to Windows 7/newer:
http://www.mdgx.com/10.php
http://www.mdgx.com/WIN10.TXT

* MDGx "XP/2003 FIREWALL GUIDE" chapter in TIPSXP.TXT (included) = most of these tricks + guidelines apply also to Windows
7/newer:
http://www.mdgx.com/xp2.htm#XFG

* MDGx "Free(ware) Windows 9x/NTx Monitors, Firewalls + Anti-Spyware" chapter -> "Firewalls" section in SOFTWARE.TXT
(included):
http://www.mdgx.com/fw.htm

* MDGx "Free(ware) Windows Firewalls Compared + Reviewed":
http://www.mdgx.com/modem.htm#FWC

* Execute/launch/open/run/start Windows (Defender) Firewall [W(D)F] with Advanced Security applet/tool in Windows 7/newer:
http://voyager.deanza.edu/~hso/cis170f/lecture/ch08/win08/advanced.html
http://www.digitalcitizen.life/manage-rules-windows-firewall-advanced-security/
1. Start button/icon/logo/menu/orb -> Windows Administrative Tools -> Windows Defender Firewall with Advanced Security.
2. Control Panel (CP) OR Start button/icon/logo/menu/orb -> Run... [hold WinKey + press R] -> type:
control.exe
-> OK/Enter -> System and Security -> Windows Defender Firewall (WDF) -> Advanced settings.
3. Start button/icon/logo/menu/orb -> Run... [hold WinKey + press R] -> type:
wf.msc
-> OK/Enter -> Windows Defender Firewall (WDF) with Advanced Security.

* Control/optimize/secure advanced Windows (Defender) Firewall [W(D)F] behavior using Network Shell (NetSh) [NETSH.EXE] DOS
console command line tool in Windows 7/newer:
http://learn.microsoft.com/troubleshoot/windows-server/networking/netsh-advfirewall-firewall-control-firewall-behavior/
http://support.microsoft.com/help/947709/
http://www.poftut.com/manage-windows-firewall-command-line-netsh-command/
http://www.ss64.com/nt/netsh.html
http://adamtheautomator.com/netsh/
http://www.tenforums.com/tutorials/70699-turn-off-windows-defender-firewall-windows-10-a.html
http://www.itninja.com/blog/view/how-to-add-firewall-rules-using-netsh-exe-advanced-way/
http://www.stigviewer.com/stig/microsoft_windows_server_2012_domain_controller/2013-07-25/finding/WN12-FW-000005
NetSh [NETSH.EXE] executable is located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually C:\WINDOWS].
View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]:
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command
PATH
-> press Enter.
Examples (globally for all connection/profile types, or separately for each connection/profile type):
Right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run these commands -> press Enter after each line:
NETSH.EXE advfirewall set allprofiles state on
NETSH.EXE advfirewall set currentprofile state on
NETSH.EXE advfirewall set domainprofile state on
NETSH.EXE advfirewall set privateprofile state on
NETSH.EXE advfirewall set publicprofile state on
NETSH.EXE advfirewall set allprofiles state on
NETSH.EXE advfirewall set allprofiles settings inboundusernotification disable
NETSH.EXE advfirewall set allprofiles settings unicastresponsetomulticast disable
These commands disable all Remote Assistance, Administration, Desktop + Management RPC (Remote Procedure Call)/E(P)MAP (End
Point Mapper) Windows Firewall (WF) rules (examples):
NETSH.EXE advfirewall firewall set rule group="Remote Assistance" new enable=no
NETSH.EXE advfirewall firewall set rule group="Remote Administration" new enable=no
NETSH.EXE advfirewall firewall set rule group="Remote Desktop" new enable=no
NETSH.EXE advfirewall firewall set rule group="Remote Management" new enable=no
NETSH.EXE advfirewall set allprofiles settings remotemanagement disable
To completely disable Windows Remote Assistance, Administration, Desktop + Management: Start -> Run...
[hold WinKey + press R] -> type:
CONTROL.EXE
press Enter -> System -> Remote Settings -> disable/UNcheck all check boxes/options -> Apply/OK.
More info:
http://www.thewindowsclub.com/windows-remote-assistance-in-windows-8/
http://www.tenforums.com/tutorials/116749-enable-disable-remote-assistance-connections-windows.html
Turn OFF (set to Disabled) these interconnected/interdependent/interrelated services:
Remote Access Auto Connection Manager [RasAuto]
Remote Access Connection Manager [RasMan]
Remote Registry [RemoteRegistry]
Routing and Remote Access [RemoteAccess]
Windows Remote Management (WS-Management) [WinRM]
Run... [hold WinKey + press R] -> type:
services.msc
-> press Enter -> double-click each service above -> Stop (if running) -> Startup type: -> Disabled -> Apply/OK.
OR (if above doesn't work):
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text BATch (.bat) or CoMmanD (.cmd) script file containing the lines between Cut & Paste delimiters below
-> save it as plain text/ASCII file (Encode: -> ANSI) with the BAT (.bat) or CMD (.cmd) extension -> right-click it ->
Run as Administrator -> wait for completion.
-----Begin cut & paste here-----
@ECHO OFF
IF NOT "%OS%"=="Windows_NT" GOTO END
ECHO Y|NET.EXE STOP RasAuto
SC.EXE CONFIG RasAuto START= disabled
ECHO Y|NET.EXE STOP RasMan
SC.EXE CONFIG RasMan START= disabled
ECHO Y|NET.EXE STOP RemoteRegistry
SC.EXE CONFIG RemoteRegistry START= disabled
ECHO Y|NET.EXE STOP RemoteAccess
SC.EXE CONFIG RemoteAccess START= disabled
ECHO Y|NET.EXE STOP WinRM
SC.EXE CONFIG WinRM START= disabled
REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Services\RasAuto" /v Start /t REG_DWORD /d 4 /f
REG.EXE ADD "HKLM\SYSTEM\ControlSet001\Services\RasAuto" /v Start /t REG_DWORD /d 4 /f
REG.EXE ADD "HKLM\SYSTEM\ControlSet002\Services\RasAuto" /v Start /t REG_DWORD /d 4 /f
REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Services\RasMan" /v Start /t REG_DWORD /d 4 /f
REG.EXE ADD "HKLM\SYSTEM\ControlSet001\Services\RasMan" /v Start /t REG_DWORD /d 4 /f
REG.EXE ADD "HKLM\SYSTEM\ControlSet002\Services\RasMan" /v Start /t REG_DWORD /d 4 /f
REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry" /v Start /t REG_DWORD /d 4 /f
REG.EXE ADD "HKLM\SYSTEM\ControlSet001\Services\RemoteRegistry" /v Start /t REG_DWORD /d 4 /f
REG.EXE ADD "HKLM\SYSTEM\ControlSet002\Services\RemoteRegistry" /v Start /t REG_DWORD /d 4 /f
REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Services\RemoteAccess" /v Start /t REG_DWORD /d 4 /f
REG.EXE ADD "HKLM\SYSTEM\ControlSet001\Services\RemoteAccess" /v Start /t REG_DWORD /d 4 /f
REG.EXE ADD "HKLM\SYSTEM\ControlSet002\Services\RemoteAccess" /v Start /t REG_DWORD /d 4 /f
REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Services\WinRM" /v Start /t REG_DWORD /d 4 /f
REG.EXE ADD "HKLM\SYSTEM\ControlSet001\Services\WinRM" /v Start /t REG_DWORD /d 4 /f
REG.EXE ADD "HKLM\SYSTEM\ControlSet002\Services\WinRM" /v Start /t REG_DWORD /d 4 /f
:END
EXIT
------End cut & paste here------
Restart/reboot Windows for these changes to take effect.
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
; * Turn OFF remote administration/assistance/desktop/management:
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Remote Assistance]
"CreateEncryptedOnlyTickets"=dword:1
"fAllowFullControl"=dword:0
"fAllowToGetHelp"=dword:0
"fEnableChatControl"=dword:0
"MaxTicketExpiry"=dword:0
"MaxTicketExpiryUnits"=dword:0
[HKEY_LOCAL_MACHINE\SOFTWARE\System\ControlSet001\Control\Remote Assistance]
"CreateEncryptedOnlyTickets"=dword:1
"fAllowFullControl"=dword:0
"fAllowToGetHelp"=dword:0
"fEnableChatControl"=dword:0
"MaxTicketExpiry"=dword:0
"MaxTicketExpiryUnits"=dword:0
[HKEY_LOCAL_MACHINE\SOFTWARE\System\ControlSet002\Control\Remote Assistance]
"CreateEncryptedOnlyTickets"=dword:1
"fAllowFullControl"=dword:0
"fAllowToGetHelp"=dword:0
"fEnableChatControl"=dword:0
"MaxTicketExpiry"=dword:0
"MaxTicketExpiryUnits"=dword:0
; * Turn OFF remote administration/assistance/desktop/management services:
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RasAuto]
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\RasAuto]
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\RasAuto]
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RasMan]
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\RasMan]
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\RasMan]
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RemoteRegistry]
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\RemoteRegistry]
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\RemoteRegistry]
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RemoteAccess]
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\RemoteAccess]
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\RemoteAccess]
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WinRM]
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\WinRM]
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\WinRM]
"Start"=dword:4
;
------End cut & paste here------
Restart/reboot Windows for these changes to take effect.
See also "* Turn OFF/disable Remote Assistance, Remote (Auto) Connection Manager, Remote Registry, Remote Management (WinRM)
+ uninstall Quick Assist in Windows 10/11:" topic in WIN10.TXT (included):
http://www.mdgx.com/10.php
http://www.mdgx.com/WIN10.TXT
To (re)enable all Remote Assistance, Administration, Desktop + Management WF rule(s) run these commands (example):
NETSH.EXE advfirewall firewall set rule group="Remote Assistance" new enable=yes
NETSH.EXE advfirewall firewall set rule group="Remote Administration" new enable=yes
NETSH.EXE advfirewall firewall set rule group="Remote Desktop" new enable=yes
NETSH.EXE advfirewall firewall set rule group="Remote Management" new enable=yes
NETSH.EXE advfirewall set allprofiles settings remotemanagement enable
and then (re)enable all Windows Remote Assistance, Administration, Desktop + Management options in Control Panel (see above)
-> System -> Remote Settings -> enable/check all check boxes/options -> Apply/OK.
Also, make sure all services that contain the word "remote" in their names are either on Automatic or Manual:
Start -> Run... [hold WinKey + press R] -> type:
services.msc
press Enter -> double-click on each service with "remote" in its name that is Disabled -> Startup type: -> select Manual
-> click Apply/OK.
Turn ON (set to Manual, when needed) these interconnected/interdependent/interrelated services:
Remote Access Auto Connection Manager [RasAuto]
Remote Access Connection Manager [RasMan]
Remote Registry [RemoteRegistry]
Routing and Remote Access [RemoteAccess]
Windows Remote Management (WS-Management) [WinRM]
Run... [hold WinKey + press R] -> type:
services.msc
-> press Enter -> double-click each service above -> Stop (if running) -> Startup type: -> Manual -> Apply/OK.
OR (if above doesn't work):
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text BATch (.bat) or CoMmanD (.cmd) script file containing the lines between Cut & Paste delimiters below
-> save it as plain text/ASCII file (Encode: -> ANSI) with the BAT (.bat) or CMD (.cmd) extension -> right-click it ->
Run as Administrator -> wait for completion.
-----Begin cut & paste here-----
@ECHO OFF
IF NOT "%OS%"=="Windows_NT" GOTO END
ECHO Y|NET.EXE STOP RasAuto
SC.EXE CONFIG RasAuto START= demand
ECHO Y|NET.EXE STOP RasMan
SC.EXE CONFIG RasMan START= demand
ECHO Y|NET.EXE STOP RemoteRegistry
SC.EXE CONFIG RemoteRegistry START= demand
ECHO Y|NET.EXE STOP RemoteAccess
SC.EXE CONFIG RemoteAccess START= demand
ECHO Y|NET.EXE STOP WinRM
SC.EXE CONFIG WinRM START= demand
REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Services\RasAuto" /v Start /t REG_DWORD /d 3 /f
REG.EXE ADD "HKLM\SYSTEM\ControlSet001\Services\RasAuto" /v Start /t REG_DWORD /d 3 /f
REG.EXE ADD "HKLM\SYSTEM\ControlSet002\Services\RasAuto" /v Start /t REG_DWORD /d 3 /f
REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Services\RasMan" /v Start /t REG_DWORD /d 3 /f
REG.EXE ADD "HKLM\SYSTEM\ControlSet001\Services\RasMan" /v Start /t REG_DWORD /d 3 /f
REG.EXE ADD "HKLM\SYSTEM\ControlSet002\Services\RasMan" /v Start /t REG_DWORD /d 3 /f
REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry" /v Start /t REG_DWORD /d 3 /f
REG.EXE ADD "HKLM\SYSTEM\ControlSet001\Services\RemoteRegistry" /v Start /t REG_DWORD /d 3 /f
REG.EXE ADD "HKLM\SYSTEM\ControlSet002\Services\RemoteRegistry" /v Start /t REG_DWORD /d 3 /f
REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Services\RemoteAccess" /v Start /t REG_DWORD /d 3 /f
REG.EXE ADD "HKLM\SYSTEM\ControlSet001\Services\RemoteAccess" /v Start /t REG_DWORD /d 3 /f
REG.EXE ADD "HKLM\SYSTEM\ControlSet002\Services\RemoteAccess" /v Start /t REG_DWORD /d 3 /f
REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Services\WinRM" /v Start /t REG_DWORD /d 3 /f
REG.EXE ADD "HKLM\SYSTEM\ControlSet001\Services\WinRM" /v Start /t REG_DWORD /d 3 /f
REG.EXE ADD "HKLM\SYSTEM\ControlSet002\Services\WinRM" /v Start /t REG_DWORD /d 3 /f
:END
EXIT
------End cut & paste here------
Restart/reboot Windows for these changes to take effect.
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RasAuto]
"Start"=dword:3
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\RasAuto]
"Start"=dword:3
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\RasAuto]
"Start"=dword:3
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RasMan]
"Start"=dword:3
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\RasMan]
"Start"=dword:3
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\RasMan]
"Start"=dword:3
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RemoteRegistry]
"Start"=dword:3
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\RemoteRegistry]
"Start"=dword:3
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\RemoteRegistry]
"Start"=dword:3
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RemoteAccess]
"Start"=dword:3
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\RemoteAccess]
"Start"=dword:3
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\RemoteAccess]
"Start"=dword:3
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WinRM]
"Start"=dword:3
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\WinRM]
"Start"=dword:3
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\WinRM]
"Start"=dword:3
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Remote Assistance]
"fAllowFullControl"=dword:1
"fAllowToGetHelp"=dword:1
"fEnableChatControl"=dword:1
;
------End cut & paste here------
Restart/reboot Windows for these changes to take effect.
To connect to a remote assistant/chat room/helper/network/provider/etc: Start -> Run... [hold WinKey + press R] -> type:
msra.exe
and follow the step-by-step instructions of the screen.
Windows Remote Assistance (MsRA) [MSRA.EXE] + Network Shell (NetSh) [NETSH.EXE] executables are located in the
%WinDir%\SYSTEM32 directory/folder [%WinDir% = usually C:\WINDOWS].
View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]:
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command
PATH
-> press Enter.
View firewall status for all connection types:
ECHO Y|NETSH.EXE advfirewall show allprofiles
View list of all IPv4 connection(s) (sub)interface(s):
NETSH.EXE interface ipv4 show subinterfaces
View all NetSh [NETSH.EXE] available command line options, switches + parameters:
NETSH.EXE /?

* Turn OFF/block unnecessary, obsolete, insecure/unsafe TCP/IP NetBIOS (Network Basic Input/Output System) Helper service
[lmhosts], NetBIOS Interface driver [NetBIOS], NetBT service [NetBT] + NetBIOS over TCP/IP (NetBT, NBT) protocols for
internet/network connections IF *not* using/connecting to/depending on network(s)/remote/shared computer(s)/server(s), +/-
not administering/deploying/maintaining/managing/running/servicing network(s)/server(s) using insecure/obsolete/outdated
NetBIOS/NetBT/NBT services, +/- sharing data/files/printers over internet/network(s) who connect to/depend on/use
NetBIOS/NetBT/NBT connection(s)/interface(s)/protocol(s) in Windows 7/newer:
http://en.wikipedia.org/wiki/NetBIOS_over_TCP/IP
http://windowsreport.com/how-to-disable-netbios/
http://support.microsoft.com/help/313314/
http://10dsecurity.com/saying-goodbye-netbios/
http://technet.microsoft.com/library/cc940063.aspx
http://support.hidemyass.com/hc/articles/202720396/
http://www.techrepublic.com/blog/it-security/the-problem-with-netbios/
http://www.thewindowsclub.com/how-to-disable-lmhosts-lookup-using-powershell-registry-or-adapter-properties/
http://forums.techguy.org/threads/locking-down-windows.829647/
http://batcmd.com/windows/10/services/lmhosts/
http://batcmd.com/windows/10/services/netbios/
http://batcmd.com/windows/10/services/netbt/
http://learn.microsoft.com/troubleshoot/windows-server/networking/disable-netbios-tcp-ip-using-dhcp/
http://learn.microsoft.com/troubleshoot/windows-server/networking/direct-hosting-of-smb-over-tcpip/
http://learn.microsoft.com/troubleshoot/windows-server/networking/configure-tcpip-networking-netbios-turn-off/
http://woshub.com/how-to-disable-netbios-over-tcpip-and-llmnr-using-gpo/
http://support.microsoft.com/help/832017/
http://learn.microsoft.com/windows-server/networking/technologies/wins/wins-top/
http://en.wikipedia.org/wiki/Windows_Internet_Name_Service
CAUTION:
********
This requires adequate/advanced knowledge about critical computing, operating systems, shared environments, networks,
cybersecurity.
http://www.mdgx.com/importnt.php
Recommended for single user environments without any add-ons/components/extensions/extras/features/services which may
require specific configurations/items/properties/settings for proper operation.
Not recommended for multiuser/networked/shared/enterprise/server environments which use these
features/functions/protocols/services.
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[-HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\lmhosts\Security]
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\lmhosts]
"LaunchProtected"=dword:0
"UserServiceFlags"=dword:0
"Start"=dword:4
[-HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NetBIOS\Security]
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NetBIOS]
"LaunchProtected"=dword:0
"UserServiceFlags"=dword:0
"Start"=dword:3
[-HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NetBT\Security]
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NetBT]
"LaunchProtected"=dword:0
"UserServiceFlags"=dword:0
"Start"=dword:3
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NetBT\Parameters]
"EnableLMHOSTS"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NetBT\Parameters\Interfaces]
"NetbiosOptions"=dword:2
[-HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\lmhosts\Security]
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\lmhosts]
"LaunchProtected"=dword:0
"UserServiceFlags"=dword:0
"Start"=dword:4
[-HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\NetBIOS\Security]
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\NetBIOS]
"LaunchProtected"=dword:0
"UserServiceFlags"=dword:0
"Start"=dword:3
[-HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\NetBT\Security]
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\NetBT]
"LaunchProtected"=dword:0
"UserServiceFlags"=dword:0
"Start"=dword:3
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\NetBT\Parameters]
"EnableLMHOSTS"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\NetBT\Parameters\Interfaces]
"NetbiosOptions"=dword:2
[-HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\lmhosts\Security]
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\lmhosts]
"LaunchProtected"=dword:0
"UserServiceFlags"=dword:0
"Start"=dword:4
[-HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\NetBIOS\Security]
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\NetBIOS]
"LaunchProtected"=dword:0
"UserServiceFlags"=dword:0
"Start"=dword:3
[-HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\NetBT\Security]
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\NetBT]
"LaunchProtected"=dword:0
"UserServiceFlags"=dword:0
"Start"=dword:3
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\NetBT\Parameters]
"EnableLMHOSTS"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\NetBT\Parameters\Interfaces]
"NetbiosOptions"=dword:2
;
------End cut & paste here------
Start button/icon/logo/menu/orb -> Run... [hold WinKey + press R] -> type this command:
CONTROL.EXE /name Microsoft.NetworkAndSharingCenter
OR:
Control Panel (CP) -> Network and Sharing Center -> Active Networks -> click item right side of Connections: ->
"your Internet/Network Connection name" icon/item -> Properties button -> Networking tab -> This connection is using the
following items: -> Internet Protocol Version 4 (TCP/IPv4) -> General tab -> Advanced... button -> WINS (Windows Internet
Name Service) tab -> UNcheck Enable LMHOSTS lookup box -> NetBIOS setting -> check Disable NetBIOS over TCP/IP box ->
Apply/OK.
http://www.thewindowsclub.com/wp-content/uploads/2020/11/Disable-NetBIOS-over-TCP-IP.png
IF *not* using/connecting to/depending on any network(s)/server(s)/printer(s) (see further above) using
insecure/obsolete/outdated NetBIOS (NetBT, NBT) protocol(s)/interface(s), you can create custom (new) Windows (Defender)
Firewall (WF) rules to block all TCP + UDP requests in both directions (in + out) for the 4 vulnerable local ports [137,
138, 139 + 445] used by NetBIOS (NetBT, NBT):
http://www.grc.com/port_137.htm
http://www.grc.com/port_138.htm
http://www.grc.com/port_139.htm
http://www.grc.com/port_445.htm
From a DOS console (command prompt) -> right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run these commands ->
press Enter after each line (examples):
NETSH.EXE advfirewall firewall add rule name="Block_NetBIOS_port_137_TCP_IN" protocol=tcp localport=137 dir=in action=block enable=yes
NETSH.EXE advfirewall firewall add rule name="Block_NetBIOS_port_137_TCP_OUT" protocol=tcp localport=137 dir=out action=block enable=yes
NETSH.EXE advfirewall firewall add rule name="Block_NetBIOS_port_137_UDP_IN" protocol=udp localport=137 dir=in action=block enable=yes
NETSH.EXE advfirewall firewall add rule name="Block_NetBIOS_port_137_UDP_OUT" protocol=udp localport=137 dir=out action=block enable=yes
NETSH.EXE advfirewall firewall add rule name="Block_NetBIOS_port_138_TCP_IN" protocol=tcp localport=138 dir=in action=block enable=yes
NETSH.EXE advfirewall firewall add rule name="Block_NetBIOS_port_138_TCP_OUT" protocol=tcp localport=138 dir=out action=block enable=yes
NETSH.EXE advfirewall firewall add rule name="Block_NetBIOS_port_138_UDP_IN" protocol=udp localport=138 dir=in action=block enable=yes
NETSH.EXE advfirewall firewall add rule name="Block_NetBIOS_port_138_UDP_OUT" protocol=udp localport=138 dir=out action=block enable=yes
NETSH.EXE advfirewall firewall add rule name="Block_NetBIOS_port_139_TCP_IN" protocol=tcp localport=139 dir=in action=block enable=yes
NETSH.EXE advfirewall firewall add rule name="Block_NetBIOS_port_139_TCP_OUT" protocol=tcp localport=139 dir=out action=block enable=yes
NETSH.EXE advfirewall firewall add rule name="Block_NetBIOS_port_139_UDP_IN" protocol=udp localport=139 dir=in action=block enable=yes
NETSH.EXE advfirewall firewall add rule name="Block_NetBIOS_port_139_UDP_OUT" protocol=udp localport=139 dir=out action=block enable=yes
NETSH.EXE advfirewall firewall add rule name="Block_NetBIOS_port_445_TCP_IN" protocol=tcp localport=445 dir=in action=block enable=yes
NETSH.EXE advfirewall firewall add rule name="Block_NetBIOS_port_445_TCP_OUT" protocol=tcp localport=445 dir=out action=block enable=yes
NETSH.EXE advfirewall firewall add rule name="Block_NetBIOS_port_445_UDP_IN" protocol=udp localport=445 dir=in action=block enable=yes
NETSH.EXE advfirewall firewall add rule name="Block_NetBIOS_port_445_UDP_OUT" protocol=udp localport=445 dir=out action=block enable=yes
Network Shell (NetSh) [NETSH.EXE] executable is located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually
C:\WINDOWS].
View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]:
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command
PATH
-> press Enter.
View all NetSh [NETSH.EXE] available command line options, switches + parameters:
NETSH.EXE /?

* Turn OFF/block all TCP + UDP requests in both directions (incoming + outgoing) for local port 135 used by E(P)MAP (End
Point Mapper) protocol for DCE (Distributed Computing Environment)/DCP (Deferred Procedure Call)/RPC (Remote Procedure Call)
Locator service, not needed if not administering/deploying/managing/maintaining/running/servicing network(s)/server(s) that
connect to/depend on/need/use this potocol/service, by creating custom (new) Windows Firewall (WF) rules:
http://whatportis.com/ports/135_microsoft-epmap/
http://www.grc.com/port_135.htm
http://www.speedguide.net/port.php?port=135
http://en.wikipedia.org/wiki/Port_135
http://learn.microsoft.com/windows/security/threat-protection/windows-firewall/create-inbound-rules-to-support-rpc/
http://learn.microsoft.com/troubleshoot/windows-server/networking/configure-rpc-dynamic-port-allocation-with-firewalls/
http://en.wikipedia.org/wiki/Deferred_Procedure_Call
http://en.wikipedia.org/wiki/DCE/RPC
http://en.wikipedia.org/wiki/Microsoft_RPC
http://en.wikipedia.org/wiki/Remote_procedure_call
http://en.wikipedia.org/wiki/Distributed_Computing_Environment
From a DOS console (command prompt) -> right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run these commands ->
press Enter after each line (examples):
NETSH.EXE advfirewall firewall add rule name="BLOCK_EMAP_port_135_TCP_IN" protocol=tcp localport=135 dir=in action=block enable=yes
NETSH.EXE advfirewall firewall add rule name="BLOCK_EMAP_port_135_TCP_OUT" protocol=tcp localport=135 dir=out action=block enable=yes
NETSH.EXE advfirewall firewall add rule name="BLOCK_EMAP_port_135_UDP_IN" protocol=udp localport=135 dir=in action=block enable=yes
NETSH.EXE advfirewall firewall add rule name="BLOCK_EMAP_port_135_UDP_OUT" protocol=udp localport=135 dir=out action=block enable=yes
See "* Control/optimize/secure advanced Windows Firewall (WF) behavior using Network Shell (NetSh) [NETSH.EXE] DOS console
command line tool in Windows 7/newer:" topic (further above) to disable all Remote Assistance, Administration, Desktop +
Management RPC/E(P)MAP Windows Firewall (WF) rules using Network Shell (NetSh) [NETSH.EXE] DOS console command line tool.
Network Shell (NetSh) [NETSH.EXE] executable is located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually
C:\WINDOWS].
View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]:
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command
PATH
-> press Enter.
View all NetSh [NETSH.EXE] available command line options, switches + parameters:
NETSH.EXE /?

* Configure/customize, import/export + restore default Windows (Defender) Firewall [W(D)F] rules in Windows 7/newer:
http://www.microsoftpressstore.com/articles/article.aspx?p=2224362&seqNum=2
http://github.com/metablaster/WindowsFirewallRuleset
http://www.winaero.com/export-and-import-specific-firewall-rule-in-windows-10/
http://woshub.com/windows-firewall-settings-group-policy/
http://www.dummies.com/computers/operating-systems/windows-10/how-to-change-windows-10-firewall-settings-to-allow-certain-programs/
http://www.thewindowsclub.com/how-to-backup-restore-reset-to-defaults-windows-7-firewall-settings/
http://www.winhelponline.com/blog/reset-firewall-defaults-restore-rules-advanced-security/
http://learn.microsoft.com/windows/security/threat-protection/windows-firewall/configure-windows-firewall-to-suppress-notifications-when-a-program-is-blocked/
http://www.xspdf.com/resolution/51904145.html
http://sourcedaddy.com/windows-7/configuring-windows-firewall-options.html
http://learn.microsoft.com/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/

* FIX: Block/stop Microsoft from tracking + spying on you behind your back using Windows (Defender) Firewall [W(D)F] custom
firewall rules in Windows 7/newer:
http://www.winaero.com/blog/stop-windows-10-spying-on-you-using-just-windows-firewall/
File:
http://www.winaero.com/download.php?view.1839
http://www.winaero.com/downloads/block_telemetry.zip
1. Use an unZIPping/unARChiving/unRARing tool [free(ware)]
http://www.mdgx.com/toy.htm#ZIP
to open "block_telemetry.zip" archive and extract "add rules.cmd" + "rules.ps1" into the same dedicated/empty
directory/folder.
2. Open Explorer/similar/replacement -> right-click "add rules.cmd" -> Run as Administrator -> wait for all W(D)F rules to
be created -> exit BATch CoMmanD script file.
3. Done.

* Turn ON DNS Client (DNS Cache) service for Windows Firewall Control (WFC) notifications + network discovery functions:
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text BATch (.bat) or CoMmanD (.cmd) script file containing the lines between Cut & Paste delimiters below
-> save it as plain text/ASCII file (Encode: -> ANSI) with the BAT (.bat) or CMD (.cmd) extension -> right-click it ->
Run as Administrator -> wait for completion.
-----Begin cut & paste here-----
@ECHO OFF
IF NOT "%OS%"=="Windows_NT" GOTO END
:: DNS Client caches Domain Name System names (DNS Cache service):
SC.EXE CONFIG DNSCache START= demand
ECHO Y|NET.EXE START DNSCache
:: DNS Cache can be flushed ONLY if DNS Cache service is running:
START /WAIT IPCONFIG.EXE /flushdns
:END
EXIT
------End cut & paste here------
IPConfig [IPCONFIG.EXE] executable is located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually C:\WINDOWS].
View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]:
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command
PATH
-> press Enter.
Windows Firewall Control (WFC) 32-bit + 64-bit for Windows 7/newer extends Windows (Defender) Firewall [W(D)F]
functionality + adds extra features, highly customizable:
http://www.binisoft.org/wfc.php
File:
http://www.binisoft.org/download/wfc6setup.exe
Requires Microsoft .NET Framework Redistributable (NFR) 4.5/newer:
http://www.mdgx.com/add.htm#NFR
MDGx 10_BLOCK DNS Cache service batch CoMmanD (.CMD) files (both included),
STARTDNS.CMD
STOP!DNS.CMD
are also available online [renamed as TeXT = .TXT]:
http://www.mdgx.com/10BLK/STARTDNS.CMD.TXT
http://www.mdgx.com/10BLK/STOP!DNS.CMD.TXT
If you prefer -> download them both to your computer/device -> rename .TXT extension to .CMD for both files -> right-click
on each 1 -> Run as Administrator.
STARTDNS.CMD + STOP!DNS.CMD = both detailed in 10_BLOCK.TXT (included):
http://www.mdgx.com/10BLK/10_BLOCK.php
http://www.mdgx.com/10BLK/10_BLOCK.TXT
MDGx "HOSTS Guide" -> "DNS Client Service":
http://www.mdgx.com/hosts.php#N2
Wikipedia: DNS caching:
http://en.wikipedia.org/wiki/Name_server#Caching_name_server

* FIX: Turn ON network discovery + detection of network(ed) computers + devices in Windows 7/newer:
http://answers.microsoft.com/en-us/windows/forum/all/why-do-i-get-the-message-network-discovery-is/a6964130-5f98-4640-a064-f59fae974ad3/
http://answers.microsoft.com/en-us/windows/forum/windows_10-networking/connecting-pcs-and-users-for-sharing/fb92e439-5dbc-4367-9857-1ef360e9ffdf/
http://www.tenforums.com/tutorials/49652-turn-off-network-discovery-windows-10-a.html
http://www.itechguides.com/windows-10-network-discovery/
http://www.wintips.org/fix-windows-10-network-computers-not-showing/
http://windowsreport.com/file-explorer-detect-network-devices-fix/
http://support.microsoft.com/help/2722035/
Enable + Start these Windows services:
DNS Client (Dnscache)
Function Discovery Provider Host (fdPHost)
Function Discovery Resource Publication (FDResPub)
HomeGroup Listener (HomeGroupListener)
HomeGroup Provider (HomeGroupProvider)
SSDP Discovery (SSDPSRV)
TCP/IP NetBIOS Helper (lmhosts)
UPnP Device Host (upnphost)
In case you're using a large HOSTS file with thousands (or even more) of redirected servers [like I do ;-/], the DNS Cache
service (if started) may take too long to process all the servers listed in the HOSTS file.
In such cases it is recommended to flush the DNS Cache -> see this command line (included in the BATch file below):
START /WAIT IPCONFIG.EXE /flushdns
IPConfig [IPCONFIG.EXE] executable is located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually C:\WINDOWS].
View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]:
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command
PATH
-> press Enter.
More info @ MDGx "HOSTS Files, Guides + Tools":
http://www.mdgx.com/hosts.php#N2
The HOSTS file is located in the %WinDir%\SYSTEM32\Drivers\ETC directory/folder [%WinDir% = usually C:\WINDOWS].
View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]:
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command
PATH
-> press Enter.
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text BATch (.bat) or CoMmanD (.cmd) script file containing the lines between Cut & Paste delimiters below
-> save it as plain text/ASCII file (Encode: -> ANSI) with the BAT (.bat) or CMD (.cmd) extension -> right-click it ->
Run as Administrator -> wait for completion.
-----Begin cut & paste here-----
@ECHO OFF
IF NOT "%OS%"=="Windows_NT" GOTO END
:: DNS Client caches Domain Name System names (DNS Cache service):
SC.EXE CONFIG DNSCache START= demand
ECHO Y|NET.EXE START DNSCache
:: DNS Cache can be flushed ONLY if DNS Cache service is running:
START /WAIT IPCONFIG.EXE /flushdns
:: Function Discovery Provider Host (fdPHost) service:
SC.EXE CONFIG fdPHost START= demand
ECHO Y|NET.EXE START fdPHost
:: Function Discovery Resource Publication (FDResPub) service:
SC.EXE CONFIG FDResPub START= demand
ECHO Y|NET.EXE START FDResPub
:: HomeGroup Listener (HomeGroupListener) service:
SC.EXE CONFIG HomeGroupListener START= demand
ECHO Y|NET.EXE START HomeGroupListener
:: HomeGroup Provider (HomeGroupProvider) service:
SC.EXE CONFIG HomeGroupProvider START= demand
ECHO Y|NET.EXE START HomeGroupProvider
:: SSDP Discovery (SSDPSRV) service:
SC.EXE CONFIG SSDPSRV START= demand
ECHO Y|NET.EXE START SSDPSRV
:: TCP/IP NetBIOS Helper (lmhosts) service:
SC.EXE CONFIG lmhosts START= demand
ECHO Y|NET.EXE START lmhosts
:: UPnP Device Host (upnphost) service:
SC.EXE CONFIG upnphost START= demand
ECHO Y|NET.EXE START upnphost
NETSH.EXE advfirewall firewall set rule group="Network Discovery" new enable=yes
:END
EXIT
------End cut & paste here------
IPConfig [IPCONFIG.EXE], Net(work) Resources Manager [NET.EXE], Net(work) Sh(ell) [NETSH.EXE] + S(ervice) C(ontrol)
[C(onfiguration)] [SC.EXE] executable are all located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually
C:\WINDOWS].
View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]:
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command
PATH
-> press Enter.

* Turn OFF/block Windows Update (WU) service [wuauserv] by creating Windows (Defender) Firewall [W(D)F] rules (example):
http://social.technet.microsoft.com/forums/lync/62b9fd5c-10b2-4266-bc15-fcf3e79d20d4/
In order for Windows Update (WU) to check whether an update is available and then approve to download the update file(s),
1st you need to create an Outbound Rule to block the WU service (wuauserv) pass through: Start button/icon/logo/menu/orb ->
Run... [hold WinKey + press R] -> type:
wf.msc
-> OK/Enter -> Windows (Defender) Firewall [W(D)F] with Advanced Security -> create new Outbound Rule to block
%SystemRoot%\SYSTEM32\svchost.exe
from passing through both ways (in + out) on behalf of Windows Update (WU) service [wuauserv]:
wuauserv
Name: Block wuauserv OUTBOUND
Group:
Profile: All
Enabled: Yes
Action: Block
Program: %SystemRoot%\SYSTEM32\svchost.exe
Local Address: Any
Remote Address: Any
Protocol: Any
Local Port: Any
Remote Port: Any
Allowed Computers: Any
Status: Ok
Service: wuauserv
Rule Source: Local Setting
Interface Type: All interface types
Excepted Computers: None
Description:
To close the outbound firewall:
Outbound connections -> Blocked (unless explicitly blocked by specific rule).
By default (built-in/preinstalled/preset firewall rules) everything is Allowed, so the outbound firewall is wide open.
TIP:
****
Windows NTx built-in/default/pre-installed/preset machine/system (apply to all users on the same machine) + local/user
(apply only to the current/logged on user) environment variables used for target system/user directories/folders:
http://www.ss64.com/nt/syntax-variables.html
http://pureinfotech.com/list-environment-variables-windows-10/
http://www.computerhope.com/issues/ch000549.htm
- %SystemRoot% = usually C:\WINDOWS [same as %WinDir%].
- %WinDir% = usually C:\WINDOWS [same as %SystemRoot%].
CAUTION:
********
Windows operating system (OS) integrity, proper functionality + correct operation *depend* on the *validity* of *all* these
variables!
INvalid/wrong parameters can render Windows INoperable or/and UNbootable, and you may have to reinstall from scratch or
repair your operating system (OS), eventually using the original storage media containing Windows Setup files!
Some of these variables can be added/customized/deleted/modified by using a Control Panel (CP)/Windows Settings (WS) tool:
Run... [hold WinKey + press R] -> type this command
SystemPropertiesAdvanced.exe
-> press Enter -> Advanced tab -> Environment Variables... button -> edit variables -> highlight respective line -> Edit
button -> change parameters -> OK -> OK.
View the list of all your Windows operating system (OS) environment variables from a DOS console command prompt
[%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command
SET
-> press Enter.
OR
Save it to a plain text/ASCII (.txt) file: from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD
shortcut/CMD.EXE -> Run as Administrator -> type same command above followed by the name of the file (in this example it
will be saved in C:\ root)
SET>C:\Windows_Environment_Variables.txt
-> press Enter -> use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to view saved text file contents.
Example of Windows Vista/newer list of relevant environment variables [replace all User_Name instances with your actual user
name]:
----------snippity-snip----------
ALLUSERSPROFILE=C:\ProgramData
APPDATA=C:\Users\PC\AppData\Roaming [OR: APPDATA=C:\Windows\system32\config\systemprofile\AppData\Roaming]
CommonProgramFiles=C:\Program Files\Common Files
CommonProgramFiles(x86)=C:\Program Files (x86)\Common Files [exists only in Windows 64-bit (x64)]
CommonProgramW6432=C:\Program Files\Common Files
ComSpec=C:\Windows\system32\cmd.exe
DriverData=C:\Windows\System32\Drivers\DriverData
HOMEDRIVE=C:
HOMEPATH=\WINDOWS\SYSTEM32 [OR: HOMEPATH=\Users\User_Name]
LOCALAPPDATA=C:\Users\PC\AppData\Local [OR: LOCALAPPDATA=C:\Windows\system32\config\systemprofile\AppData\Local]
OS=Windows_NT
ProgramData=C:\ProgramData
ProgramFiles=C:\Program Files
ProgramFiles(x86)=C:\Program Files (x86) [exists only in Windows 64-bit (x64)]
ProgramW6432=C:\Program Files
PSModulePath=%ProgramFiles%\WindowsPowerShell\Modules;C:\Windows\system32\WindowsPowerShell\v1.0\Modules
PUBLIC=C:\Users\Public
SystemDrive=C:
SystemRoot=C:\Windows
TEMP=C:\Users\PC\AppData\Local\Temp [OR: TEMP=C:\Windows\TEMP]
TMP=C:\Users\PC\AppData\Local\Temp [OR: TMP=C:\Windows\TEMP]
USERNAME=User_Name
USERPROFILE=C:\Users\User_Name [OR: USERPROFILE=C:\Windows\system32\config\systemprofile]
windir=C:\Windows
----------snippity-snip----------

* *Never* block/disable/disallow/prevent/stop/turn off *any* of these core/critical/essential/mandatory/vital Windows
Vista/newer apps/EXEcutables (.exe)/processes/programs/residents/services from accessing the internet/network(s):
Process Name	Process Path
**********************************************
lsass.exe	%WinDir%\SYSTEM32\lsass.exe
services.exe	%WinDir%\SYSTEM32\services.exe	 
svchost.exe	%WinDir%\SYSTEM32\svchost.exe
wininit.exe	%WinDir%\SYSTEM32\wininit.exe
%WinDir% = usually C:\WINDOWS .
BEWARE:
*******
If you do, Windows will *not* (re)boot/(re)start, become unusable, and/or you may even need to reinstall or repair install
your Operating System (OS)!

* Windows 7/7 SP1 built-in/default/preinstalled/preset Windows (Defender) Firewall [(W(D)F] rules (examples):
http://technet.microsoft.com/network/bb545423/
http://technet.microsoft.com/library/ee126090/
http://www.sevenforums.com/tutorials/525-windows-firewall-restore-default-settings.html
http://www.thewindowsclub.com/reset-windows-firewall-settings/
http://www.howtogeek.com/201658/how-to-reset-the-windows-firewall-rules-to-default/
http://www.howtogeek.com/112564/how-to-create-advanced-firewall-rules-in-the-windows-firewall/
AET = Allow Edge Traversal
BET = Block Edge Traversal
Core Networking = INBOUND:
**************************
01. Destination Unreachable (ICMPv6) [AET]
02. Destination Unreachable Fragmentation Needed (ICMPv4) [BET]
03. DHCP [BET]
04. DHCP IPv6 (DHCPv6) [BET]
05. IGMP [BET]
06. TPHTTPS (TCP) = Allows IPHTTPS tunneling technology to provide connectivity across HTTP proxies + firewalls [BET]
07. IPv6 = Required to permit IPv6 traffic for ISATAP (intra site automatic tunnel addressing protocol) and 6-to-4
tunneling services [BET]
08. Multicast Listener Done (ICMPv6) [BET]
09. Multicast Listener Query (ICMPv6) [BET]
10. Multicast Listener Report (ICMPv6) [BET]
11. Multicast Listener Report v2 (ICMPv6) [BET]
12. Neighbor Discovery Advertisement (ICMPv6) [AET]
13. Neighbor Discovery Solicitation (ICMPv6) [AET]
14. Packet Too Big (ICMPv6) [AET]
15. Parameter Problem (ICMPv6) [AET]
16. Router Advertisement (ICMPv6) [BET]
17. Router Solicitation (ICMPv6) [BET]
18. Teredo (UDP) = Allows Teredo edge traversal. Provides address assignment + autotunneling for IPv6 traffic for
IPv6/IPv4 host located behind an IPv4 NAT [BET]
19. Time Exceeded (ICMPv6) [AET]
Core Networking = OUTBOUND:
***************************
01. DNS (UDP)
02. DHCP
03. DHCP IPv6 (DHCPv6)
04. Group Policy (LSASS) [DOMAIN ONLY]
05. Group Policy (NP) [DOMAIN ONLY]
06. Group Policy (TCP) [DOMAIN ONLY]
07. IGMP
08. TPHTTPS (TCP)
09. IPv6
10. Multicast Listener Done (ICMPv6)
11. Multicast Listener Query (ICMPv6)
12. Multicast Listener Report (ICMPv6)
13. Multicast Listener Report v2 (ICMPv6)
14. Neighbor Discovery Advertisement (ICMPv6)
15. Neighbor Discovery Solicitation (ICMPv6)
16. Packet Too Big (ICMPv6)
17. Parameter Problem (ICMPv6)
18. Router Advertisement (ICMPv6)
19. Router Solicitation (ICMPv6)
20. Teredo (UDP)
21. Time Exceeded (ICMPv6)

* Free Firewall 32-bit + 64-bit for Windows 7/newer enhanced firewall tool, highly customizable:
http://www.evorim.com/free-firewall/
File:
http://www.evorim.com/download/freefirewall-setup.exe

* Firewall App Blocker (FAB) 32-bit + 64-bit for Windows 7/newer allows/blocks inbound + outbound app(lication)s/EXEcutables
(.exe)/programs, highly customizable:
http://www.sordum.org/8125/
File:
http://www.sordum.org/files/firewall-app-blocker/fab.zip

* Windows Firewall Control (WFC) 32-bit + 64-bit for Windows 7/newer extends Windows (Defender) Firewall [W(D)F]
functionality + adds extra features, highly customizable:
http://www.binisoft.org/wfc.php
File:
http://www.binisoft.org/download/wfc6setup.exe
Requires Microsoft .NET Framework Redistributable (NFR) 4.5/newer:
http://www.mdgx.com/add.htm#NFR
Enable DNS Client (DNS Cache) service for WFC notifications:
-----Begin cut & paste here-----
@ECHO OFF
IF NOT "%OS%"=="Windows_NT" GOTO END
:: DNS Client caches Domain Name System names (DNS Cache service):
SC.EXE CONFIG DNSCache START= auto
ECHO Y|NET.EXE START DNSCache
:: DNS cache can be flushed ONLY if DNS Cache service is running!
START /WAIT IPCONFIG.EXE /flushdns
:END
EXIT
------End cut & paste here------
IPConfig [IPCONFIG.EXE] executable is located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually C:\WINDOWS].
View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]:
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command
PATH
-> press Enter.
MDGx 10_BLOCK DNS Cache service batch CoMmanD (.CMD) files (both included),
STARTDNS.CMD
STOP!DNS.CMD
are also available online [renamed as TeXT = .TXT]:
http://www.mdgx.com/10BLK/STARTDNS.CMD.TXT
http://www.mdgx.com/10BLK/STOP!DNS.CMD.TXT
If you prefer -> download them both to your computer/device -> rename .TXT extension to .CMD for both files -> right-click
on each 1 -> Run as Administrator.
STARTDNS.CMD + STOP!DNS.CMD = both detailed in 10_BLOCK.TXT (included):
http://www.mdgx.com/10BLK/10_BLOCK.php
http://www.mdgx.com/10BLK/10_BLOCK.TXT
MDGx "HOSTS Guide" -> "DNS Client Service":
http://www.mdgx.com/hosts.php#N2
Wikipedia: DNS caching:
http://en.wikipedia.org/wiki/Name_server#Caching_name_server
______________________________________________________________________________



Turn OFF NVidia Telemetry



Turn OFF NVidia Telemetry, NVidia Data Collection + interconnected/interdependent/interrelated services bundled with NVidia
graphics drivers:
Download + install Disable Nvidia Telemetry tool [free, open source]:
http://github.com/NateShoffner/Disable-Nvidia-Telemetry/
File:
http://github.com/NateShoffner/Disable-Nvidia-Telemetry/releases/latest/
Disable Nvidia Telemetry Guide:
http://www.ghacks.net/2016/11/07/nvidia-telemetry-tracking/
http://forum.palemoon.org/viewtopic.php?t=15686&start=20
Right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run these commands -> press Enter after each line:
- Disable NVidia telemetry scheduled tasks commands:
SCHTASKS.EXE /change /TN NvTmMon_{B2FE1952-0186-46C3-BAEC-A80AA35AC5B8} /disable
SCHTASKS.EXE /change /TN NvTmRep_{B2FE1952-0186-46C3-BAEC-A80AA35AC5B8} /disable
SCHTASKS.EXE /change /TN NvTmRepOnLogon_{B2FE1952-0186-46C3-BAEC-A80AA35AC5B8} /disable
- Uninstall NVidia telemetry service command:
RUNDLL32.EXE "%ProgramFiles%\NVIDIA Corporation\Installer2\InstallerCore\NVI2.DLL",UninstallPackage NvTelemetryContainer
RUNDLL32.EXE + SCHTASKS.EXE executable are located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually
C:\WINDOWS], listed in your system PATH.
View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]:
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command
PATH
-> press Enter.
Add lines between Cut & Paste below to your %WinDir%\SYSTEM32\DRIVERS\ETC\HOSTS [and to your
%WinDir%\SysWOW64\DRIVERS\ETC\HOSTS if using Windows NTx 64-bit (x64)] file -> edit HOSTS using Notepad/similar plain text
editor:
http://www.mdgx.com/toy.htm#TXT
Edit HOSTS file in Windows 7/newer:
http://www.petri.com/edit-hosts-file-windows-7/
http://www.petri.com/edit-hosts-file-windows-8/
http://www.petri.com/easily-edit-hosts-file-windows-10/
http://www.petri.com/easily-edit-the-hosts-file-in-windows-11/
MDGx "HOSTS Files, Guides + Tools":
http://www.mdgx.com/hosts.php
-----Begin cut & paste here-----
##############################################################################
# MDGx HOSTS with > 225000 hostnames:
# http://www.mdgx.com/hosts.php
# HOSTS (plain text/ASCII ANSI encoded file) is located in %windir% [usually C:\WINDOWS] in Windows 9x or
# %windir%\SYSTEM32\DRIVERS\ETC in Windows NTx.
# Transmission Control Protocol/Internet Protocol (TCP/IP) maps Internet Protocol (IP) addresses (1st column) to
# corresponding hostnames (2nd column):
# http://en.wikipedia.org/wiki/Hosts_%28file%29
# Each entry must be on its own separate line. Columns must be separated by at least 1 space or tab.
# All lines starting with a pound/hash sign (#) are comments/remarks and are not processed.
# Domain Name System (DNS) itself handles localhost name resolution:
# http://en.wikipedia.org/wiki/Localhost
# All local host(s) lines must be listed at the top of the HOSTS file in this exact order:
# http://en.wikipedia.org/wiki/Multicast_address
# 1. Internet Protocol version 4 (IPv4).
# http://en.wikipedia.org/wiki/IPv4
# 2. Internet Protocol version 6 (IPv6).
# http://en.wikipedia.org/wiki/IPv6
# Lines below map IPv4 local protocols:
# http://en.wikipedia.org/wiki/Reserved_IP_addresses#IPv4
0.0.0.0 null
0.0.0.0 0.0.0.0
127.0.0.1 localhost
127.0.0.1 localhost.localdomain
127.0.0.1 localdomain
127.0.0.1 local
255.255.255.255 broadcasthost
# Lines below map IPv6 local protocols:
# http://en.wikipedia.org/wiki/Reserved_IP_addresses#IPv6
::0 null
::1 localhost
::1 ip6-localhost
::1 ip6-loopback
fe80::1%lo0 localhost
fe00::0 ip6-localnet
ff00::0 ip6-mcastprefix
ff02::1 ip6-allnodes
ff02::2 ip6-allrouters
ff02::3 ip6-allhosts
# WARNING:
# Some of the disabled sites in this file will attempt to HACK/INFECT/INSTALL malware/spyware +/- PHISH/SPY on
# your computer(s)/device(s) the moment you ENABLE and ACCESS them!
# http://www.mdgx.com/hosts.php#AB
# IPv4 hostnames below are disabled -> redirected to 0.0.0.0 (null).
# http://en.wikipedia.org/wiki/0.0.0.0
# Alternatively can be redirected to 127.0.0.1 (localhost), but will take longer to process with large number of
# HOSTS entries.
# http://en.wikipedia.org/wiki/Hostname
# To (re)enable/disable/edit/customize -> open HOSTS file as Administrator in Notepad/similar/better free(ware)
# plain text/ASCII editor
# http://www.mdgx.com/toy.htm#TXT
# -> comment/remark (precede each line with # followed by 1 space) or delete desired line(s) -> save it as HOSTS
# (no extension) -> refresh (F5)/restart your app(s)/browser(s)/service(s)/device(s) or reboot/restart if needed.
# Edit HOSTS file in Windows 7/newer:
# http://www.petri.com/easily-edit-the-hosts-file-in-windows-11/
# http://www.petri.com/easily-edit-hosts-file-windows-10/
# http://www.petri.com/edit-hosts-file-windows-8/
# http://www.petri.com/edit-hosts-file-windows-7/
##############################################################################
# Lines below disable NVidia automatic updates, data collection, surveillance, telemetry, tracking:
0.0.0.0 accounts.nvgs.nvidia.com
0.0.0.0 activation.gfe.nvidia.com
0.0.0.0 api.gfe.nvidia.com
0.0.0.0 assets.nvidiagrid.net
0.0.0.0 download.gfe.nvidia.com
0.0.0.0 events.gfe.nvidia.com
0.0.0.0 gfe.geforce.com
0.0.0.0 gfe.nvidia.com
0.0.0.0 gfwsl.geforce.com
0.0.0.0 images.nvidiagrid.net
0.0.0.0 rds-assets.nvidia.com
0.0.0.0 services.gfe.nvidia.com
0.0.0.0 telemetry.nvidia.com
0.0.0.0 telemetry.gfe.nvidia.com
##############################################################################
------End cut & paste here------
______________________________________________________________________________



Java No Java



* Oracle (Sun) Java Runtime Environment (JRE) Standard Edition (SE) 32-bit + 64-bit -> SOFTWARE.TXT (included):
http://www.mdgx.com/add.htm#JAVA

* Block/disable Java (out-of-date) prompts + automatic updates:
http://discussions.citrix.com/topic/363880-your-java-version-is-out-of-date-how-to-blockdisable/
http://www.itninja.com/question/can-t-suppress-java-1-8-upd-74-update-prompts/
Java network:
http://community.spiceworks.com/how_to/65130/
Java Auto Update:
http://www.java.com/en/download/help/java_update.xml
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\AppDataLow\Software\JavaSoft\DeploymentProperties]
"deployment.security.sandbox.awtwarningwindow"="false"
"deployment.expiration.decision"="never"
"deployment.expiration.decision.locked"="false"
"deployment.expiration.decision.suppression"="false"
"deployment.expiration.decision.suppression.locked"="false"
"deployment.expiration.check.enabled"="false"
"deployment.expiration.check.enabled.locked"="false"
"deployment.security.mixcode"="HIDE_RUN"
"deployment.security.jsse.hostmismatch.warning"="false"
"deployment.security.jsse.hostmismatch.warning.locked"="false"
"deployment.roaming.profile"="false"
"deployment.system.tray.icon"="false"
"deployment.webjava.enabled"="false"
; WOW6432Node registry subkey exists only in Windows NTx 64-bit (x64):
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\AppDataLow\Software\JavaSoft\DeploymentProperties]
"deployment.security.sandbox.awtwarningwindow"="false"
"deployment.expiration.decision"="never"
"deployment.expiration.decision.locked"="false"
"deployment.expiration.decision.suppression"="false"
"deployment.expiration.decision.suppression.locked"="false"
"deployment.expiration.check.enabled"="false"
"deployment.expiration.check.enabled.locked"="false"
"deployment.security.mixcode"="HIDE_RUN"
"deployment.security.jsse.hostmismatch.warning"="false"
"deployment.security.jsse.hostmismatch.warning.locked"="false"
"deployment.roaming.profile"="false"
"deployment.system.tray.icon"="false"
"deployment.webjava.enabled"="false"
[HKEY_LOCAL_MACHINE\SOFTWARE\Oracle\JavaDeploy]
"WebDeployJava"="disabled"
"deployment.modified.timestamp"="9999999999999"
"deployment.webjava.enabled"="false"
; WOW6432Node registry subkey exists only in Windows NTx 64-bit (x64):
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Oracle\JavaDeploy]
"WebDeployJava"="disabled"
"deployment.modified.timestamp"="9999999999999"
"deployment.webjava.enabled"="false"
[HKEY_LOCAL_MACHINE\SOFTWARE\JavaSoft]
"RegDeployStatus"="0"
; WOW6432Node registry subkey exists only in Windows NTx 64-bit (x64):
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\JavaSoft]
"RegDeployStatus"="0"
[HKEY_LOCAL_MACHINE\SOFTWARE\JreMetrics]
"DisableSponsors"="Y"
; WOW6432Node registry subkey exists only in Windows NTx 64-bit (x64):
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\JreMetrics]
"DisableSponsors"="Y"
[HKEY_LOCAL_MACHINE\SOFTWARE\JavaSoft\Java Update\Policy]
"EnableAutoUpdateCheck"=dword:0
"EnableJavaUpdate"=dword:0
"NotifyDownload"=dword:0
"NotifyInstall"=dword:0
"UpdateSchedule"=dword:0
[HKEY_LOCAL_MACHINE\SOFTWARE\JavaSoft\Java Update\Policy\jucheck]
"EnableAutoUpdateCheck"=dword:0
"EnableJavaUpdate"=dword:0
"NotifyDownload"=dword:0
"NotifyInstall"=dword:0
"UpdateSchedule"=dword:0
; WOW6432Node registry subkey exists only in Windows NTx 64-bit (x64):
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\JavaSoft\Java Update\Policy]
"EnableAutoUpdateCheck"=dword:0
"EnableJavaUpdate"=dword:0
"NotifyDownload"=dword:0
"NotifyInstall"=dword:0
"UpdateSchedule"=dword:0
; WOW6432Node registry subkey exists only in Windows NTx 64-bit (x64):
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\JavaSoft\Java Update\Policy\jucheck]
"EnableAutoUpdateCheck"=dword:0
"EnableJavaUpdate"=dword:0
"NotifyDownload"=dword:0
"NotifyInstall"=dword:0
"UpdateSchedule"=dword:0
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SunJavaUpdateSched"=-
; WOW6432Node registry subkey exists only in Windows NTx 64-bit (x64):
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run]
"SunJavaUpdateSched"=-
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run]
"SunJavaUpdateSched"=-
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Run]
"SunJavaUpdateSched"=-
;
------End cut & paste here------

* Customize (see above) deployment.properties plain text/ASCII file located in:
%UserProfile%\AppData\LocalLow\Sun\Java\Deployment
C:\Users\%UserName%\AppData\LocalLow\Sun\Java\Deployment
TIP:
****
Windows NTx built-in/default/pre-installed/preset machine/system (apply to all users on the same machine) + local/user
(apply only to the current/logged on user) environment variables used for target system/user directories/folders:
http://www.ss64.com/nt/syntax-variables.html
http://pureinfotech.com/list-environment-variables-windows-10/
http://www.computerhope.com/issues/ch000549.htm
- %UserProfile% = usually C:\Users\%UserName% .
- %WinDir% = usually C:\WINDOWS [same as %SystemRoot%].
View the list of all your Windows operating system (OS) environment variables from a DOS console command prompt
[%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command
SET
-> press Enter.
Right-click deployment.properties (see above) -> Open with... -> Notepad/similar/better free(ware) plain text/ASCII
editor/viewer
http://www.mdgx.com/toy.htm#TXT
-> Run as Administrator -> add/change/delete desired lines/values/strings -> save file.

* Add Java environment variable(s) to the list of SET commands (example):
http://www.ss64.com/nt/set.html
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text BATch (.bat) or CoMmanD (.cmd) script file containing the lines between Cut & Paste delimiters below
-> save it as plain text/ASCII file (Encode: -> ANSI) with the BAT (.bat) or CMD (.cmd) extension -> right-click it ->
Run as Administrator -> wait for completion.
-----Begin cut & paste here-----
@ECHO OFF
IF NOT "%OS%"=="Windows_NT" GOTO END
IF NOT EXIST %WinDir%\SYSTEM32\SETX.EXE GOTO END
SETX.EXE deployment.expiration.check.enabled "false" /M
:END
EXIT
------End cut & paste here------
______________________________________________________________________________



Save Files List -> Text



* Create, view, save, print, etc the list of all the files inside the drive/partition/volume or directory/folder of your
choice, and all their (sub)directories/(sub)folders, in descending Latin based alphabetical order,
http://en.wikipedia.org/wiki/Latin-script_alphabet
ordered by logical numeric value [0 -> 9 + A -> Z]:
http://web.archive.org/web/20150429091622/http://www.computing.net/answers/programming/log-file-date-and-time/18190.html
http://web.archive.org/web/20210506121738/http://www.intelliadmin.com/index.php/2007/02/create-a-date-and-time-stamp-in-your-batch-files/
http://www.serverfault.com/questions/16706/
http://www.techrepublic.com/forums/questions/dos-command-help/
http://www.ss64.com/nt/syntax-getdate.html
Usage:
1. Example: Highlight/select all (sub)folders and file(s), if more than 1 -> hold down Shift and left-click the 1st and then
the last (sub)folder/file on the list without releasing the Shift key.
NOTE:
In case you highlight/select more than 1 (sub)folder(s)/file(s) a separate text (.txt) file with different date + time
stamp(s) will be created in each of the selected (sub)folder(s), if more than 1.
2. Right-click on highlight/selection above -> select "Files &List –––> Text File: MM-DD-YYYY_(h)h-mm-ss.txt" -> go to the
(sub)directory/(sub)folder selected above, or to each of them if more than 1 -> now you can see a newly created text (.txt)
file -> right-click on it -> select Open or Edit -> will open in your Notepad/similar/better plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
associated with text (.txt) files as default program.
3. View/edit, rename, copy/move, print & save/delete this text file.
Explanation:
In Windows NTx time displays by default in 24 hours format.
Before 10:00 AM the hour display uses only 1 position to hold numbers from 0 to 9.
This is what it looks like by running the built-in DOS console TIME command (example):
1:14:16.57
with only 10 total available positions, as 1st 0 doesn't display.
After 10:00 AM time display increases to 11 total available positions (example):
11:15:18:33
with 2 positions for hour display.
For hours between 0 and 9 you need to use this TIME command:
%time:~1,1%.
For hours between 0 and 9 you need to use this text (.txt) file naming format (example):
File_Name_%date:~4,2%%date:~7,2%%date:~10,4%%time:~1,1%%time:~3,2%%time:~6,2%%time:~9,2%.txt
Where:
%time:~1,1% = hours
%time:~3,2% = minutes
%time:~6,2% = seconds
%time:~9.2% = milliseconds
From 10:00 AM to 24:00 [00:00 AM], when hour display occupies 2 positions, time display has 11 positions, in which case you
need to use this TIME command:
%time:~0,2%
Final code for file name display from 10:00 AM to 24:00 [00:00 AM] looks like this (example):
File_Name_%date:~4,2%%date:~7,2%%date:~10,4%%time:~0,2%%time:~3,2%%time:~6,2%%time:~9,2%.txt
The built-in DOS console DATE command displays in "Day mm/dd/yyyy" format, so current date looks like this (example):
Wed 07/07/2077
for a total of 14 positions, including spaces and demarcations/forward slashes.
DATE command format:
%date:~4,2% = month display with 2 digits
%date:~6,2% = day display with 2 digits
%date:~10,4% = year display with 4 digits
In case you prefer year display with only 2 digits use this format:
%date:~12,2%,
You can move any part of the DATE command around to customize presentation format to your liking/needs.
Example: if moving year section [%date:10,4%] up front, format changes to [yyyyddmm], and so on.
Example of BATch (.bat)/CoMmanD (.cmd) file used for time of day reference, or/and for BATch/CoMmanD job(s) to be
scheduled at different time(s) of day, say before and/or after 10:00 AM (example):
COPY /Y Old_File_Name.txt New_File_Name_%time:~0,2%%time:~3,2%%time:~6,2%_%date:~-10,2%%date:~-7,2%%date:~-4,4%.txt
You can also customize the built-in DOS console DIR command to list files in a different order (example):
DIR "%1" /A:-D /B /O:GNE /-P /S
View all available DIR command line options, switches + parameters -> type this command
DIR /?
-> press Enter.
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
; Reorder files + directories/folders names alphabetically by logical numeric value -> see further above, also online:
; http://www.mdgx.com/7.php
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer]
"NoStrCmpLogical"=dword:1
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Directory\shell\Files_List_2_Text]
@="Files &List –––> Text File: MM-DD-YYYY_(h)h-mm-ss.txt"
"Extended"=-
"NoWorkingDirectory"=""
"SuppressionPolicy"=dword:0
"Icon"="SHELL32.DLL,19"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Directory\shell\Files_List_2_Text\command]
@="CMD.EXE /C DIR \"%1\" /A:-D /B /O:GNE /-P /S>\"%1\"\\\"%%date:~-10,2%%-%%date:~-7,2%%-%%date:~-4,4%%_%%time:~1,1%%-%%time:~3,2%%-%%time:~6,2%%.txt\""
"IsolatedCommand"=-
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Drive\shell\Files_List_2_Text]
@="Files &List –––> Text File: MM-DD-YYYY_(h)h-mm-ss.txt"
"Extended"=-
"NoWorkingDirectory"=""
"SuppressionPolicy"=dword:0
"Icon"="SHELL32.DLL,19"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Drive\shell\Files_List_2_Text\command]
@="CMD.EXE /C DIR \"%1\" /A:-D /B /O:GNE /-P /S>\"%1\"\\\"%%date:~-10,2%%-%%date:~-7,2%%-%%date:~-4,4%%_%%time:~1,1%%-%%time:~3,2%%-%%time:~6,2%%.txt\""
"IsolatedCommand"=-
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\*\shell\Files_List_2_Text]
@="Files &List –––> Text File: MM-DD-YYYY_(h)h-mm-ss.txt"
"Extended"=-
"NoWorkingDirectory"=""
"SuppressionPolicy"=dword:0
"Icon"="SHELL32.DLL,19"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\*\shell\Files_List_2_Text\command]
@="CMD.EXE /C DIR \"%1\" /A:-D /B /O:GNE /-P /S>\"%1\"\\\"%%date:~-10,2%%-%%date:~-7,2%%-%%date:~-4,4%%_%%time:~1,1%%-%%time:~3,2%%-%%time:~6,2%%.txt\""
"IsolatedCommand"=-
;
------End cut & paste here------
______________________________________________________________________________



Maximize Your Internet/Network Traffic Speed = MTU



Tweak optimal Maximum Transmission Unit (MTU) used by your Internet Service Provider (ISP)/network host/provider to
maximize your internet/network connection/interface traffic speed in Windows 7/newer:
http://learn.microsoft.com/troubleshoot/windows-client/networking/change-default-mtu-size-for-ppp-vpn-connection/
http://learn.microsoft.com/answers/questions/535814/
http://www.maketecheasier.com/3-ways-to-increase-network-speed-via-registry-editor-windows/
http://myrandomtechblog.com/cryptomining/change-mtu-size-in-windows-10/
http://answers.microsoft.com/en-us/windows/forum/all/how-to-change-mtu-settings-in-windows-10/5c36c250-a0e8-47ee-b01c-de22139dc297/
http://www.networkworld.com/article/2224654/
http://www.techtarget.com/searchnetworking/definition/maximum-transmission-unit/
http://en.wikipedia.org/wiki/Maximum_transmission_unit
* Method 1 [the easiest way ;-/]:
*********************************
Test your MTU optimal numeric value [measured in bytes (octets)] in 1 step -> type a server IP in the IPv4 box (using
google.com IP: 142.250.69.238 in this example):
http://www.wikihow.com/Find-Proper-MTU-Size-for-Network
http://www.comparitech.com/net-admin/determine-mtu-size-using-ping/
http://www.tp-link.com/us/support/faq/190/
http://faq.draytek.com.au/2020/06/24/tools-available-to-detect-mtu-size/
In case you already have the optimal value of 1500 [the built-in/preset default/standard in Windows NTx OSes and most ISPs +
IPv4 networks] your MTU is already configured for maximum speed, and you don't need to do anything else, you're all set. ;-/
* Method 2 [the hard way ;-/]:
******************************
From a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator ->
run this command to view your Maximum Transmission Unit (MTU) value [the built-in/preset default/standard in Windows NTx
OSes and most ISPs + IPv4 networks] for your active internet/network Internet Protocol version 4 (IPv4) interface -> press
Enter:
NETSH.EXE interface ipv4 show subinterfaces
In my case: Interface = "Ethernet".
Network Shell (NetSh) [NETSH.EXE] executable DOS console command line tool is located in the %WinDir%\SYSTEM32
directory/folder [%WinDir% = usually C:\WINDOWS].
View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]:
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command
PATH
-> press Enter.
NETSH:
http://www.ss64.com/nt/netsh.html
From a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator ->
run this command by replacing "Ethernet" with the actual name of your active interface in order to set permanently the value
of your interface MTU parameter to 1472 (using same interface name from example above: Ethernet) -> press Enter:
NETSH.EXE interface ipv4 set subinterface Ethernet mtu=1472 store=persistent
Substitute Ethernet with your actual interface name revealed by running previous NetSh "show subinterfaces" command above.
1472 [bytes (octets)] actually translates to MTU=1500, because the "missing" 28 bytes are used by the Internet Control
Message Protocol (ICMP) header [8 bytes (octets)] + the Internet Protocol (IP) [20 (octets)]:
http://community.arubanetworks.com/browse/articles/blogviewer?blogkey=75a5f030-1e9e-49bd-82d2-9a7f99c5aa82
In case you see this message
Ok.
you already have the optimal value of 1500 [the built-in/preset default/standard in Windows NTx OSes and most ISPs + IPv4
networks], your MTU is already configured for maximum speed, and you don't need to do anything else, you're all set. ;-/
In case you see any other message your MTU value is other than 1472 [which corresponds to MTU=1500 -> see above] (in rare
cases, depending on certain internet/network providers/hosts), and therefore you need to determine its actual value, and set
it accordingly in your registry in order to maximize your connection/interface speed.
From a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator ->
run this command -> press Enter:
PING.EXE google.com -f -l 1472
wait a few seconds, and view the received message.
Ping [PING.EXE] executable DOS console command line tool is located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% =
usually C:\WINDOWS].
View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]:
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command
PATH
-> press Enter.
PING:
http://www.ss64.com/nt/ping.html
If you have received a "Reply" message (example):
Reply from 142.250.69.238: bytes=68 (sent 1472) time=14ms TTL=112
followed by
Packets: [...] Lost = 0 (0% loss),
then your MTU value is 1472 [which corresponds to MTU=1500 -> see above] [the built-in/preset default/standard in Windows
NTx OSes and most ISPs + IPv4 networks], and your MTU is already configured for maximum speed, and you don't need to do
anything else, you're all set. ;-/
Values for bytes (octets), time [measured in milliseconds = ms] + Time To Live (TTL) [measured in seconds] can be different
depending on many changing factors (examples): location, distance (number of hops) from pinged server, type of
connection/service, server, latency (lag), traffic health/status.
In case you receive a "fragmented" message
Packet needs to be fragmented but DF set
followed by (example)
Packets: [...] Lost = 4 (100% loss),
you should re-test again (a few more times if necessary) by lowering your MTU numeric value in small increments [2, 3, 4, 6]
until the result is replaced by a normal "Reply" message (example):
Reply from 142.250.69.238: bytes=68 (sent 1472) time=14ms TTL=112
In case the returned value is 1472 [which corresponds to MTU=1500 -> see above], then you already have the optimal value of
1500 [the built-in/preset default/standard in Windows NTx OSes and most ISPs + IPv4 networks], and your MTU is already
configured for maximum speed, and you don't need to do anything else, you're all set. ;-/
In case your returned value is other than 1472 [which corresponds to MTU=1500 -> see above], then you can determine and set
your optimal MTU value -> see "* Method 1 [the easiest way ;-/]:" further above.
You can set the optimal MTU value for your active internet/network connection type/connectoid/interface:
- by runing the NetSh "store=persistent" command -> see further above.
- OR by tweaking your registry -> see below:
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
; In this example MTU [32-bit DWORD (REG_DWORD) value] = 5dc [hexadecimal (base 16)] = 1500 [decimal (numeric) (base 10)],
; which is the built-in/preset default/standard in Windows NTx OSes and most ISPs + IPv4 networks:
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{00000000-AAAA-1111-BBBB-222222222222}]
"MTU"=dword:5dc
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{00000000-AAAA-1111-BBBB-222222222222}]
"MTU"=dword:5dc
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\Tcpip\Parameters\Interfaces\{00000000-AAAA-1111-BBBB-222222222222}]
"MTU"=dword:5dc
;
------End cut & paste here------
You need to substitute all "00000000-AAAA-1111-BBBB-222222222222" (generic) instances with your actual Decentralized
IDentifier (DID) (hard link) string which corresponds to your active internet/network connection/interface present in your
registry under the "CurrentControlSet" Hive Key Local Machine (HKLM) subkey above.
See "* Link Directory IDentifier (LDID)/DIRectory IDentifier (DIRID)/Decentralized IDentifier (DID)" topic further above:
http://www.mdgx.com/7.php
http://www.mdgx.com/WINDOWS7.TXT
More info:
Wikipedia: Time To Live (TTL):
http://en.wikipedia.org/wiki/Time_to_live
Wikipedia: Ping:
http://en.wikipedia.org/wiki/Ping_(networking_utility)
Wikipedia: NetSh:
http://en.wikipedia.org/wiki/Netsh
MDGx "Comprehensive Windows Registry Guide" chapter in REGISTRY.TXT (included):
http://www.mdgx.com/reg.htm
MTU tweaking tool [free(ware)]:
TCP Optimizer 32-bit tweaks TCP/IP parameters to maximize Internet performance:
http://www.speedguide.net/tcpoptimizer.php
File:
http://www.speedguide.net/files/TCPOptimizer.exe
TCP Optimizer Documentation:
http://www.speedguide.net/articles.php?category=99
______________________________________________________________________________



Windows 7/newer Reference, Resources + Free eBooks + Documentation



* Windows 7/newer Reference + Resources [English]:
- Windows 11:
http://en.wikipedia.org/wiki/Windows_11
- Category -> Windows 11:
http://en.wikipedia.org/wiki/Category:Windows_11
- Windows 11 Editions + Versions:
http://en.wikipedia.org/wiki/Windows_11#Versions
- Windows 11 Version History:
http://en.wikipedia.org/wiki/Windows_11_version_history
- List of features removed in Windows 11:
http://en.wikipedia.org/wiki/List_of_features_removed_in_Windows_11
- Criticism of Windows 11:
http://en.wikipedia.org/wiki/Windows_11#Reception
- Windows 10:
http://en.wikipedia.org/wiki/Windows_10
- Category -> Windows 10:
http://en.wikipedia.org/wiki/Category:Windows_10
- Windows 10 Editions + Versions:
http://en.wikipedia.org/wiki/Windows_10_editions
- Windows 10 Version History:
http://en.wikipedia.org/wiki/Windows_10_version_history
- List of features removed/missing in Windows 10:
http://en.wikipedia.org/wiki/List_of_features_removed_in_Windows_10
- Features + functionality removed in Windows 10:
http://learn.microsoft.com/windows/deployment/planning/windows-10-removed-features/
- Windows 10 features no longer developed:
http://learn.microsoft.com/windows/deployment/planning/windows-10-deprecated-features/
- Criticism of Windows 10:
http://en.wikipedia.org/wiki/Criticism_of_Windows_10
- Fix the Most Annoying Things in Windows 10:
http://www.pcmag.com/how-to/how-to-fix-the-most-annoying-things-in-windows-10/
- All the Useless Windows 10 Features Microsoft Should Remove:
http://www.howtogeek.com/437942/all-the-useless-windows-10-features-microsoft-should-remove/
- List of features removed or deprecated in Windows 10:
http://www.thewindowsclub.com/features-removed-in-windows-10/
- Windows 10 Problems, Issues with Solutions and Fixes:
http://www.thewindowsclub.com/windows-10-known-issues/
- Windows 10 Creators Update: new and removed features:
http://www.ghacks.net/2017/03/28/windows-10-creators-update-new-and-removed-features/
- List of features removed/missing in Windows 8/8.1:
http://en.wikipedia.org/wiki/List_of_features_removed_in_Windows_8
- Features and options removed/missing in Windows 8:
http://www.msfn.org/board/index.php?showtopic=156585
- 8 Features Microsoft Removed in Windows 8.1:
http://www.howtogeek.com/167610/8-features-microsoft-removed-in-windows-8.1/
- 5 core criticisms of Windows 8:
http://www.zdnet.com/article/five-core-criticisms-of-windows-8/
- Windows 8.1:
http://en.wikipedia.org/wiki/Windows_8.1
- Windows 8:
http://en.wikipedia.org/wiki/Windows_8
- Category -> Windows 8/8.1:
http://en.wikipedia.org/wiki/Category:Windows_8
- Windows 8 Editions + Versions:
http://en.wikipedia.org/wiki/Windows_8_editions
- Windows 7:
http://en.wikipedia.org/wiki/Windows_7
- Category -> Windows 7:
http://en.wikipedia.org/wiki/Category:Windows_7
- Features new to Windows 7:
http://en.wikipedia.org/wiki/Features_new_to_Windows_7
- List of features removed/missing in Windows 7:
http://en.wikipedia.org/wiki/List_of_features_removed_in_Windows_7
- List of software that doesn't support Windows 7 -> but you can make them work:
http://www.msfn.org/board/index.php?showtopic=181987
- Disadvantages of Windows 7:
http://www.techulator.com/resources/3311-Disadvantages-windows.aspx
- What are the disadvantages of Windows 7?:
http://ostoday.org/windows/quick-answer-what-are-the-disadvantages-of-windows-7.html
- Criticism of Windows:
http://en.wikipedia.org/wiki/Criticism_of_Microsoft_Windows
- Windows NT [NTx]:
http://en.wikipedia.org/wiki/Windows_NT
- Comparison of Windows versions:
http://en.wikipedia.org/wiki/Comparison_of_Microsoft_Windows_versions
- List of Windows versions:
http://en.wikipedia.org/wiki/List_of_Microsoft_Windows_versions
- List of Windows NT [NTx] family codenames:
http://en.wikipedia.org/wiki/List_of_Microsoft_codenames#Windows_NT_family

* Windows 7/newer eBooks, Guides, Tutorials + Documentation in PDF format [free, English]:
- Thiel College: Windows 10 Step by Step - 2nd Edition (2018) [PDF]:
http://www.thiel.edu/ee2assets/Win_10_Training_v1.pdf
- MS Press: Windows 10 IT Pro Essentials - Support Secrets (2016) [PDF]:
http://download.microsoft.com/download/9/3/7/937D982C-7697-4076-99FE-6856DA30B253/Microsoft_Press_ebook_Windows_10_Support_Secrets_PDF.PDF
- MS Press: Windows 10 IT Pro Essentials - Top 10 Tools (2016) [PDF]:
http://download.microsoft.com/download/7/3/8/7381E0E8-CE72-4366-9849-13B2BAFBBA3C/Microsoft_Press_ebook_Windows_10_Tools_8.5x11.pdf
- MS Press: Introducing Windows Server 2016 - Technical Preview (2016) [PDF]:
http://download.microsoft.com/download/7/1/B/71B9C665-6D2B-4154-AB7E-9CDC40647B57/697737_ebook_mobile_TechPreview.pdf
- MS Press: Introducing Windows 10 for IT Professionals - Technical Preview (2016) [PDF]:
http://download.microsoft.com/download/F/4/2/F42AE0AD-A9CB-4EE7-A209-D9A399604A72/Microsoft_Press_eBook_Introducing_Windows_10_PDF.pdf
- MS Press: Introducing Windows 10 for IT Professionals - Preview Edition (2015) [PDF]:
http://download.microsoft.com/download/D/2/B/D2B18586-8C4F-4F40-828D-99D96489152A/Microsoft_Press_eBook_Introducing_Windows_10_Preview_PDF.pdf
- Champlain College: Windows 10 Forensics (2015) [PDF]:
http://www.champlain.edu/documents/lcdi/windows%2010%20forensics.pdf
- MS Press: Windows 7 Step by Step (2010) [PDF]:
http://www.spumonte.com/files/PDFs/_PC%20Books_/Windows%207/MS%20Press%20-%20Windows%207%20Step%20by%20Step.pdf
- Windows Guides: Windows 7 The Pocket Guide (RC1) (2009) [PDF]:
http://www.spumonte.com/files/PDFs/_PC%20Books_/Windows%207/Windows%207%20-%20The%20Pocket%20Guide.pdf
- QUE: Learn Windows 7 (2011) [PDF]:
http://www.pearsoned.co.uk/media/learn_win_7_download.pdf
- WindowsVJ: Windows 7 Tips & Tricks (2009) [PDF]:
http://www.windowsvj.com/wpblog/downloads/Windows%207%20%20Tips%20&%20Trics%20%5BVasu%20Jain%5D.pdf
- Wiley: Windows 7 Secrets (2009) [PDF]:
http://muricmilorad.files.wordpress.com/2012/03/windows-7-secrets.pdf
- MakeUseOf (MUO): The Windows 7 Guide (2009) [PDF]:
http://manuals.makeuseof.com.s3.amazonaws.com/for-mobile/makeuseof_Windows_7_Guide_r2.pdf
- UDM: Windows 7 Quick Reference Guide (2008) [PDF]:
http://www.udmercy.edu/about/its/help/files/windows7.pdf
- TheLongClimb: Windows 7 Power Users Guide (2009) [PDF]:
http://web.archive.org/web/20111110041616/http://www.thelongclimb.com/books/win7powerfree.pdf
- MS Press: Windows 7 Resource Kit (2009) [PDF]:
http://jacermeno.files.wordpress.com/2010/06/microsoft-press-windows-7-resource-kit-oct-2009.pdf
- TheWindowsClub: Windows 7 A Beginner's Guide (2009) [ZIPped PDF]:
http://www.thewindowsclub.com/downloads/W7ebookpdf.zip
- Dokumen: Microsoft Windows Registry Guide - 2nd Edition (2005) [PDF]:
http://dokumen.tips/documents/microsoft-windows-registry-guide-2nd-edition-the-eyeeu-variousmicrosoft-windows.html
- winreg-kb: Windows Registry knowledge base (2022) [PDF]:
http://winreg-kb.readthedocs.io/_/downloads/en/latest/pdf/
- The Internal Structure of Windows Registry (2009) [PDF format]:
http://web.archive.org/web/20190819040818/http://amnesia.gtisc.gatech.edu/~moyix/suzibandit.ltd.uk/MSc/Registry%20Structure%20-%20Main%20V4.pdf
- The Windows NT Registry File Format (2009) [PDF format]:
http://www.sentinelchicken.com/data/TheWindowsNTRegistryFileFormat.pdf
- Windows Registry Forensics (2011) [PDF format]:
http://paper.bobylive.com/Security/Windows%20Registry%20Forensics%20%20Advanced%20Digital%20Forensic%20Analysis%20of%20the%20Windows%20Registry.pdf
- Computer-PDF: Windows 7/newer Tutorials [PDF]:
http://www.computer-pdf.com/operating-system/windows/
______________________________________________________________________________



Free(ware), Open Source + Portable Software + Games @ MDGx.com



* MDGx web pages (all included):
- "List of Useful Windows NTx Tools" in TOOLS.TXT:
http://www.mdgx.com/tools.php
http://www.mdgx.com/TOOLS.TXT
- "Windows NTx Power Toys" section in SOFTWARE.TXT:
http://www.mdgx.com/toy.htm
- "Power Toys on the Internet" section in SOFTWARE.TXT:
http://www.mdgx.com/toy.htm#PTL
- "Windows NTx Tools" section in SOFTWARE.TXT:
http://www.mdgx.com/xptoy.htm
- "Internet Power Toys" section in SOFTWARE.TXT:
http://www.mdgx.com/nettoys.htm
- "Firewalls + Network Toys" section in SOFTWARE.TXT:
http://www.mdgx.com/fw.htm
- "Free Online Privacy, Safety + Security Scanners" (online only):
http://www.mdgx.com/safety.htm
- "List of Digital Photography, Imaging + Video Tools for Windows NTx":
http://www.mdgx.com/photo.php
http://www.mdgx.com/PHOTO.TXT
- "Speed-Up + Benchmark Tools" section in SOFTWARE.TXT:
http://www.mdgx.com/speed.htm
- "Disk Partitioning, Formatting, Backup + Recovery Tools" section in SECRETS.TXT:
http://www.mdgx.com/secrets.htm#FDPT
- "WWW/FTP, HTML + Image Publishing Tools" (online only):
http://www.mdgx.com/html.htm
- "FREEbies: Software Sites" (online only):
http://www.mdgx.com/free.htm
- "PC Games":
http://www.mdgx.com/g.htm#GL

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
Back 2 Top
MDGx MAX Speed WinDOwS
MDGx