MDGx MAX Speed WinDOwS
MDGx Windows 7/7 SP1/2008 R2
Tweaks, Fixes, Guides, Downloads + Links
WINDOWS7.TXT is part of MDGx MAX Speed WinDOwS ©Tricks + Secrets: W95-11D.EXE + W95-11D.ZIP
MDGx Windows 7/7 SP1/2008 R2 Tweaks, Fixes, Guides, Downloads + Links in plain text (ASCII) format

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@

            MDGx MAX Speed WinDOwS ゥTricks キ Secrets キ Bugs キ Fixes
            ッッッッッッッッッッッッッッッッッhttp://www.mdgx.com/ッッッッッッッッッッッッッッッッッッ
                             ッッッッッッッッッッッッッッッッッッッッ
	Windows 7/7 SP1/2008 R2 Tweaks, Fixes, Guides, Downloads + Links
	ッッッッッッッッッッッッッッッッッッッッッッッッッッッッッッッッッッッッッッッッッッッッッッッッッッッッッッッッッッッッッッッッ



These topics refer strictly to all English retail/final/gamma/Gold/RTM/OEM
releases, versions, editions + builds [including previews, Service Packs
(SPs), updates + patches] 32-bit (x86) + 64-bit (x64) of these Microsoft
Windows operating systems (OSes)
- 7
http://en.wikipedia.org/wiki/Windows_7
http://en.wikipedia.org/wiki/Windows_7_editions
- Server 2008 R2
http://en.wikipedia.org/wiki/Windows_Server_2008_R2
unless specified otherwise:
http://www.mdgx.com/7.php
Also available as plain text/ASCII file (this file):
http://www.mdgx.com/WINDOWS7.TXT
BONUS:
More Windows 7/7 SP1 (clearly marked) tweaks, hacks, fixes, guides, links + tools (all included):
- MDGx "Win10 Block Tools (10_BLOCK)" in 10_BLOCK.TXT:
http://www.mdgx.com/xptoy.htm#10BLK
http://www.mdgx.com/10BLK/10_BLOCK.php
http://www.mdgx.com/10BLK/10_BLOCK.TXT
- MDGx "Windows 10/11 Tweaks, Fixes, Guides, Downloads + Links" in WIN10.TXT:
http://www.mdgx.com/10.php
http://www.mdgx.com/WIN10.TXT
- MDGx "Windows 8/8.1 Tweaks, Fixes, Guides, Downloads + Links" in WINDOWS8.TXT:
http://www.mdgx.com/8.php
http://www.mdgx.com/WINDOWS8.TXT
- MDGx "List of Useful Windows NTx Tools [free(ware)]" in TOOLS.TXT:
http://www.mdgx.com/tools.php
http://www.mdgx.com/TOOLS.TXT

FYI:
Windows NTx = Windows NT4/2000/XP/2003/Vista/2008/7/8/8.1/2012/10/2016/2019/11/2022/newer
Windows 9x = Windows 95/95 OSR1/95 OSR2.x/98/98 SP1/98 SE(U)/ME

    @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
    @@ ALWAYS BACKUP ALL YOUR OPERATING SYSTEM DRIVES TO A SAFE LOCATION @@
    @@          BEFORE ATTEMPTING TO MAKE ANY SYSTEM CHANGES !           @@
    @@     -> "Free(ware) WinDOwS Backup + Restore Tools" section in     @@
    @@                      SECRETS.TXT (included):                      @@
    @@               http://www.mdgx.com/secrets.htm#BKP                 @@
    @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@

WARNING: * Take EXTREME CAUTION when modifying/adjusting/customizing your
	 Registry/System/Startup files/configuration/settings!
	 Faulty changes may result in crashes/lockups/permanent data loss, or
	 might lead to having you REINSTALL your Operating System(s)!
	 YOU are the ONLY one responsible for ANY changes YOU make!
	 ALWAYS HAVE YOUR MOST RECENT SYSTEM BACKUP READY! ->
	 "Free(ware) WinDOwS Backup + Restore Tools" in SECRETS.TXT
	 (included):
	 http://www.mdgx.com/secrets.htm#BKP
	 * BACKUP YOUR REGISTRY BEFORE MAKING ANY CHANGES! -> "BACKUP/EXPORT +
	 RESTORE/IMPORT REGISTRY/REGISTRY KEY(S)" in WINDOWS7.TXT (this file):
 	 http://www.mdgx.com/7.php#:~:text=BACKUP%2FEXPORT%20%2B%20RESTORE%2FIMPORT%20REGISTRY%2FREGISTRY%20KEY%28S%29%20%21
	 * Some of these tricks + apps/programs/tools/scripts require
	 adequate/advanced knowledge about critical computing, operating
	 systems (OSes), registry, services, shared environments, networks,
	 cybersecurity, and other related subjects/disciplines:
	 http://en.wikipedia.org/wiki/Category:Microsoft_operating_systems
	 http://en.wikipedia.org/wiki/Windows_Registry
	 http://www.mdgx.com/reg.htm
	 http://en.wikipedia.org/wiki/Category:Windows_services
	 http://en.wikipedia.org/wiki/Real-time_computing
	 http://en.wikipedia.org/wiki/Enterprise_software
	 http://en.wikipedia.org/wiki/Shared_resource
	 http://en.wikipedia.org/wiki/Computer_network
	 http://en.wikipedia.org/wiki/Computer_security
	 http://en.wikipedia.org/wiki/Network_security

NOTES:	- These ゥTricks + Secrets have been tested on many computers, but with
	  NO guarantee they should also work for you.
	- Some of these tips I stumbled upon while browsing the Internet or
	  while helping others with WinDOwS problems, some were kindly sent in
	  by concerned readers (all authors/contributors are acknowledged and
	  reliable sources given proper credit), and some I discovered on my
	  own. Enjoy the ride.
	- Contributed tips (clearly marked) and other web sites mentioned here
	  do not necessarily reflect the opinion of the author + owner of
	  these files + of this web site.

Please send me feedback online:
http://www.mdgx.com/form.htm

Must have + useful Windows NTx Software Programs [99.99% free(ware)] from TOOLS.TXT (included):
http://www.mdgx.com/tools.php
http://www.mdgx.com/TOOLS.TXT
Must have + useful Software Programs [99.99% free(ware)] from SOFTWARE.TXT (included):
- MDGx Windows NTx Extras:
http://www.mdgx.com/xptoy.htm
- MDGx 1000+ Windows NTx Power Toys + Tweaking Tools:
http://www.mdgx.com/toy.htm
- MDGx Windows NTx Web Browsers + Internet Power Toys:
http://www.mdgx.com/nettoys.htm


WINDOWS7.TXT Contents: [New ゥtweaks added at the TOP]

BACKUP/EXPORT + RESTORE/IMPORT REGISTRY/REGISTRY KEY(S)
http://www.mdgx.com/7.php#:~:text=BACKUP%2FEXPORT%20%2B%20RESTORE%2FIMPORT%20REGISTRY%2FREGISTRY%20KEY%28S%29%20%21
Tweaks, Hacks + Fixes... UNconventional, UNdocumented, UNcensored ;-/
Updates/(Hot)Fixes/Patches + Windows Update (WU)
Turn OFF/Remove Windows 7/8/8.1 Adware, Spyware, Security Flaws + Repair/Restore Privacy
Turn OFF/Remove Windows 10 Adware, Spyware, Security Flaws + Repair/Restore Privacy -> WIN10.TXT (included):
http://www.mdgx.com/10.php
Everything About The Infamous (Not So) Trusted Installer
Task Scheduler Tweaks
Patch Windows 7
Customize BOOT Screens
Desktop Background/Wallpaper Tweaks + Free(ware) Tools
Free(ware) 7/8/8.1/10/11 Aero Tools + Tweaks
Free(ware) Windows 7 Replacement Apps + Tweaking Tools
Free(ware) Start Menu Shell Replacements
Turn OFF/ON User Account Control (UAC)
Free(ware) BOOT Tools + Tweaks
Windows Side-by-Side (WinSxS) Folder
Free(ware) Burn/Copy/Write/Install CDs/DVDs/BDs Tools
OEM
Application (IN)Compatibility
Control Panel (CP) + Omnipotent/Master/Mega/'god mode' (OMg) Control Panel
Public Root DNS Servers
http://www.mdgx.com/7.php#:~:text=Public%20Root%20DNS%20Servers%20%5B%2A%5D
Internet + Web Browsers Tweaks, Fixes + Tools
http://www.mdgx.com/7.php#:~:text=Internet%20%2B%20Web%20Browsers%20Tweaks%2C%20Fixes%20%2B%20Tools%20%5BChromium%2FChrome%2C%20Firefox
Digital + Internet/Online Privacy, Security + Safety
http://www.mdgx.com/7.php#:~:text=Digital%20%2B%20Internet%2FOnline%20Privacy%2C%20Security%20%2B%20Safety%20%3D%20Your%20Top%20Priority
Chromium/Chrome/X-Chromium/Thorium/Brave/Vivaldi Automated Clean-Up
Put A Pin In It!
XP -> 7/8/8.1 Easy Transfer Files + Settings
Turn OFF/ON Windows Features
Tweak Windows 7/7 SP1 Services
Turn OFF Action/Security Center + Notifications/Messages
Logon + Password Tweaks
Clock Sync
Turn OFF/ON Link Layer Topology Discovery (LLTD) + Quality of Service (QoS)
CMD, Commands, Environment + Console
Paging (Swap) File Tweaks
Windows (Defender) Firewall (WF) Tweaks + Tools
Turn OFF NVidia Telemetry
Java No Java
Save Files List -> Text
Maximize Your Internet/Network Traffic Speed = MTU
Windows 7/8/8.1/10/11 Wikipedia Resources + Free eBooks
Free(ware), Open Source + Portable Software + Games @ MDGx.com
Tweak Windows 10/11 Services -> WIN10.TXT (included):
http://www.mdgx.com/10.php
Advanced Appearance (Metrics) Settings [AA(M)S] for Windows 7/newer -> WINDOWS8.TXT (included):
http://www.mdgx.com/8.php
Tweak, Customize + Repair Tools on the Internet [free(ware)] -> WIN10.TXT (included):
http://www.mdgx.com/10.php
exFAT -> SECRETS.TXT (included):
http://www.mdgx.com/secrets.htm#XFAT
See also matching/related Windows NTx tweaks in DESKTOP.TXT, MYTIPS95.TXT,
REGISTRY.TXT, TIPS2000.TXT, TIPS95.TXT, TIPSXP.TXT (all included):
http://www.mdgx.com/newtip.htm
______________________________________________________________________________



BACKUP/EXPORT + RESTORE/IMPORT REGISTRY/REGISTRY KEY(S) !
http://www.mdgx.com/7.php#:~:text=BACKUP%2FEXPORT%20%2B%20RESTORE%2FIMPORT%20REGISTRY%2FREGISTRY%20KEY%28S%29%20%21



* Backup/Export/Save + Restore/Import/Load/Merge the entire Registry + separate Registry (hive) keys in Windows NTx
[2000/newer] 32-bit (x86) + 64-bit (x64) Operating Systems (OSes):
http://support.microsoft.com/help/322756/
http://neosmart.net/wiki/backup-restore-registry/
http://www.howtogeek.com/197785/
http://blog.netwrix.com/2018/10/30/how-to-back-up-and-restore-the-windows-registry/
http://www.winhelponline.com/blog/automatically-backup-registry-hives-windows-10/
http://www.minitool.com/data-recovery/backup-and-restore-registry.html
http://www.majorgeeks.com/content/page/how_to_back_up_or_restore_the_windows_registry.html
http://www.windowscentral.com/how-backup-entire-registry-windows-10/
http://theitbros.com/restore-windows-10-registry-from-backup-or-restore-point/
http://www.techbout.com/backup-registry-in-windows-10-47923/
Registry hive keys (hives):
http://docs.microsoft.com/windows/win32/sysinfo/registry-hives/
http://en.wikipedia.org/wiki/Windows_Registry#Keys_and_values
http://www.mdgx.com/reg.htm#RTS
1. From the graphical user interface (GUI) or from a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE) using RegEdit
(%WinDir%\REGEDIT.EXE):
http://www.mdgx.com/reg.htm#RER
http://www.ss64.com/nt/regedit.html
[%WinDir% = usually C:\WINDOWS].
A. Backup/Export/Save entire Registry manually:
- From a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE): right-click CMD shortcut/CMD.EXE -> Run as Administrator ->
run this command -> press Enter (example):
REGEDIT.EXE /E REGISTRY.reg
- Right-click RegEdit (%WinDir%\REGEDIT.EXE) or its shortcut/link -> Run as Administrator -> make sure it points to
"Computer" [root, entire registry] -> click File -> click Export... -> under Export Registry File -> select the folder of
your choice -> type your choice of "File name:" (example: REGISTRY.reg) -> click Save -> exit RegEdit.
B. Restore/Import/Load/Merge entire Registry manually:
- From a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE): right-click CMD shortcut/CMD.EXE -> Run as Administrator ->
run this command -> press Enter (example using saved reg file above):
REGEDIT.EXE /S REGISTRY.reg
- Right-click RegEdit (%WinDir%\REGEDIT.EXE) or its shortcut/link -> Run as Administrator -> make sure it points to
"Computer" [root, entire registry] -> click File -> click Import... -> under Import Registry File -> select the folder where
your backed up .REG file(s) reside(s) -> highlight/select your backed up Registry (.HIV, .REG, etc) file(s) (in this
example: REGISTRY.reg) -> click Open separately for each file (if more than 1) -> click OK or press Enter -> exit RegEdit.
2. From a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE) using REG (%WinDir%\SYSTEM32\REG.EXE) command line tool:
http://www.mdgx.com/reg.htm#BNR
http://docs.microsoft.com/windows-server/administration/windows-commands/reg/
http://www.ss64.com/nt/reg.html
A. Backup/Export/Save separate Registry (hive) key(s) manually: right-click CMD shortcut/CMD.EXE -> Run as Administrator ->
run these commands -> press Enter after each line (example):
REG.EXE EXPORT "HKCR" HKCR.reg /y
REG.EXE EXPORT "HKCU" HKCU.reg /y
REG.EXE EXPORT "HKLM" HKLM.reg /y
REG.EXE EXPORT "HKU" HKU.reg /y
REG.EXE EXPORT "HKCC" HKCC.reg /y
Where
http://www.mdgx.com/reg.htm#RTS
HKCR = Classes Root Hive Key:
HKEY_CLASSES_ROOT
HKCU = Current User Hive Key:
HKEY_CURRENT_USER
HKLM = Local Machine Hive Key:
HKEY_LOCAL_MACHINE
HKU = Users Hive Key:
HKEY_USERS\.DEFAULT
HKCC = Current Configuration Hive Key:
HKEY_CURRENT_CONFIG
On 64-bit (x64) Windows NTx OSes these commands backup also the correspondent 64-bit registry hive keys (example): the
HKEY_LOCAL_MACHINE\SOFTWARE subkey is linked to the HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node subkey.
More info:
- MS DOCs: Registry Keys Affected by WoW64 on Windows 64-bit (x64) editions:
http://msdn.microsoft.com/library/aa384253.aspx
- Advanced INSTALLER: Wow6432Node Registry Key:
http://www.advancedinstaller.com/user-guide/registry-wow6432-node.html
- MDGx "Registry Structure" section in REGISTRY.TXT (included):
http://www.mdgx.com/reg.htm#RTS
B. Restore/Import/Load/Merge separate Registry (hive) key(s) manually (example using saved reg files above): locate saved
reg files [see above] -> right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run these commands -> press Enter after
each line (example):
REG.EXE IMPORT HKCR.reg /y
REG.EXE IMPORT HKCU.reg /y
REG.EXE IMPORT HKLM.reg /y
REG.EXE IMPORT HKU.reg /y
REG.EXE IMPORT HKCC.reg /y
Where
http://www.mdgx.com/reg.htm#RTS
HKCR = Classes Root Hive Key:
HKEY_CLASSES_ROOT
HKCU = Current User Hive Key:
HKEY_CURRENT_USER
HKLM = Local Machine Hive Key:
HKEY_LOCAL_MACHINE
HKU = Users Hive Key:
HKEY_USERS\.DEFAULT
HKCC = Current Configuration Hive Key:
HKEY_CURRENT_CONFIG
3. Using 3rd party Registry Backup/Restore tools [free(ware)]:
http://www.mdgx.com/toy.htm#FIX
http://www.raymond.cc/blog/backup-restore-whole-windows-registry-selected-hives/
http://www.tweaking.com/content/page/registry_backup.html
http://www.majorgeeks.com/mg/sortdate/registry.html
http://listoffreeware.com/list-of-best-free-registry-backup-software/
http://www.winhelponline.com/blog/automatically-backup-registry-hives-windows-10/
http://www.tweaking.com/content/page/registry_backup.html

* Windows Registry info, guides + tools [free(ware)]:
- MDGx "The Registry" chapter -> "Backup, Edit + Restore the Registry in Windows NTx OSes" topic -> "REG:" paragraph in
REGISTRY.TXT (included):
http://www.mdgx.com/reg.htm#BNR
- MDGx "Registry Editing Rules" section -> "Registry Editing Rules + RegEdit (REGEDIT.EXE) Guide" topic -> in REGISTRY.TXT
(included):
http://www.mdgx.com/reg.htm#RER
- MDGx "FREE WINDOWS SYSTEM + REGISTRY FIXERS" section -> "Windows Registry Backup, Restore + Tweaking tools [free(ware)]"
topic in SOFTWARE.TXT (included):
http://www.mdgx.com/toy.htm#FIX
______________________________________________________________________________



Tweaks, Hacks + Fixes... UNconventional, UNdocumented, UNcensored ;-/



* FIX: Block/disable/stop/turn OFF Windows 7/8/8.1/10 + Windows Server 2008/2012/2016 LSASS (Local Security Authority
Subsystem Service) plain text/ASCII credentials/passwords exposure security vulnerability used by Mimikatz + similar hacking
methods:
http://woshub.com/defending-windows-domain-against-mimikatz-attacks/
http://seniordba.wordpress.com/2021/04/12/defending-against-mimikatz-in-windows-10/
http://www.reliaquest.com/blog/credential-dumping-part-2-how-to-mitigate-windows-credential-stealing/
http://learn.microsoft.com/windows-server/security/credentials-protection-and-management/configuring-additional-lsa-protection/
http://admx.help/?Category=SecurityBaseline&Policy=Microsoft.Policies.PtH::Pol_PtH_WDigestAuthn
http://www.stigviewer.com/stig/windows_7/2016-12-19/finding/V-72753
http://en.wikipedia.org/wiki/Local_Security_Authority_Subsystem_Service
CAUTION:
********
This requires adequate/advanced knowledge about critical computing, operating systems, shared environments, networks,
cybersecurity.
Recommended for multiuser/networked/enterprise/server environments processing/storing/delivering encrypted/protected/secure
critical/private/sensitive/vital analysis/data/information.
Modifying settings below may affect proper operation of connected/networked computers/devices/servers,
components/features/functions, and/or your multiuser/networked/enterprise/server environment(s) may experience errors.
UPDATES:
********
MSKB KB3134228 MS16-014 Security Update 32-bit + 64-bit for Windows 7 SP1/2008 R2/8/8.1/2012/2012 R2/10/2016 32-bit (x86) +
64-bit (x64):
http://support.microsoft.com/help/3134228/
MSKB KB3134228 MS16-014 Security Advisory:
http://learn.microsoft.com/security-updates/securitybulletins/2016/ms16-014/
MSKB KB2871997 Security Update 32-bit + 64-bit for Windows 7 SP1/2008 R2/8/8.1/2012/2012 R2 32-bit (x86) + 64-bit (x64):
http://support.microsoft.com/help/2871997/
Microsoft Catalog Files for KB2871997 Update:
http://www.catalog.update.microsoft.com/search.aspx?q=KB2871997
MSKB KB2871997 Security Advisory:
http://learn.microsoft.com/security-updates/SecurityAdvisories/2016/2871997/
FIXES:
******
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa]
"RunAsPPL"=dword:1
"TokenLeakDetectDelaySecs"=dword:1e
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\WDigest]
"Negotiate"=dword:0
"UseLogonCredential"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa]
"RunAsPPL"=dword:1
"TokenLeakDetectDelaySecs"=dword:1e
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\SecurityProviders\WDigest]
"Negotiate"=dword:0
"UseLogonCredential"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Control\Lsa]
"RunAsPPL"=dword:1
"TokenLeakDetectDelaySecs"=dword:1e
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Control\SecurityProviders\WDigest]
"Negotiate"=dword:0
"UseLogonCredential"=dword:0
;
------End cut & paste here------
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text BATch (.bat) or CoMmanD (.cmd) script file containing the lines between Cut & Paste delimiters below
-> save it as plain text/ASCII file (Encode: -> ANSI) with the BAT (.bat) or CMD (.cmd) extension -> right-click it ->
Run as Administrator -> wait for completion.
-----Begin cut & paste here-----
@ECHO OFF
IF NOT "%OS%"=="Windows_NT" GOTO END
REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Control\Lsa" /v RunAsPPL /t REG_DWORD /d 1 /f
REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Control\Lsa" /v TokenLeakDetectDelaySecs /t REG_DWORD /d 1e /f
REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\WDigest" /v Negotiate /t REG_DWORD /d 0 /f
REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\WDigest" /v UseLogonCredential /t REG_DWORD /d 0 /f
REG.EXE ADD "HKLM\SYSTEM\ControlSet001\Control\Lsa" /v RunAsPPL /t REG_DWORD /d 1 /f
REG.EXE ADD "HKLM\SYSTEM\ControlSet001\Control\Lsa" /v TokenLeakDetectDelaySecs /t REG_DWORD /d 1e /f
REG.EXE ADD "HKLM\SYSTEM\ControlSet001\Control\SecurityProviders\WDigest" /v Negotiate /t REG_DWORD /d 0 /f
REG.EXE ADD "HKLM\SYSTEM\ControlSet001\Control\SecurityProviders\WDigest" /v UseLogonCredential /t REG_DWORD /d 0 /f
REG.EXE ADD "HKLM\SYSTEM\ControlSet002\Control\Lsa" /v RunAsPPL /t REG_DWORD /d 1 /f
REG.EXE ADD "HKLM\SYSTEM\ControlSet002\Control\Lsa" /v TokenLeakDetectDelaySecs /t REG_DWORD /d 1e /f
REG.EXE ADD "HKLM\SYSTEM\ControlSet002\Control\SecurityProviders\WDigest" /v Negotiate /t REG_DWORD /d 0 /f
REG.EXE ADD "HKLM\SYSTEM\ControlSet002\Control\SecurityProviders\WDigest" /v UseLogonCredential /t REG_DWORD /d 0 /f
:END
EXIT
------End cut & paste here------

* Fix Windows 7 Shut Down Bug:
http://www.lifehacker.com/1841581231/
http://esupport.quickheal.com/support/solutions/articles/23000020281/

* Fix Windows 7 Wallpaper Display Bug:
http://www.winaero.com/blog/microsoft-fixes-black-wallpaper-windows-7-bug-with-kb4539602/
http://www.lifehacker.com/1841274851/
FIX: Wallpaper set to Stretch is displayed as black:
http://support.microsoft.com/help/4539602/
created by Microsoft...
BUG: Windows 7 January 14 2020 Monthly Rollup:
http://support.microsoft.com/help/4534310/

* Fix Windows 7 Slow/Stuck "Checking for Updates" Bug:
http://www.reddit.com/r/windows/comments/4tx4s9/

* Migrate Windows 7 to a new SSD (SATA)/NVMe (PCIe) drive without reinstalling:
http://www.lifehacker.com/5837543/
MDGx "Free(ware) WinDOwS Backup + Restore Tools" section in SECRETS.TXT (included):
http://www.mdgx.com/secrets.htm#BKP

* Speed Up Windows Shutdown Process:
http://www.addictivetips.com/windows-tips/how-to-speed-up-windows-shutdown-process/

* Control How Long Windows Waits Before Killing Apps at Shutdown:
http://www.howtogeek.com/282062/control-how-long-windows-waits-before-killing-apps-at-shutdown/

* Always show full details in Explorer Copy/Move/Delete dialog box:
http://www.askvg.com/how-to-always-show-more-details-in-file-transfer-cut-copy-delete-dialog-box-in-windows-vista-and-7/
Install Open-Shell [Classic Shell fork] (free, open source):
http://open-shell.github.io/Open-Shell-Menu/
Open-Shell -> enable Open (Classic) Explorer Bar -> Classic Explorer Settings button -> File Operation tab -> enable Always
show more details -> Apply/OK.

* (Un)Hide/(re)assign/remove/(un)mount drive(s)/partition(s)/volume(s) in Windows 7/newer:
http://www.isumsoft.com/windows-10/hide-or-unhide-hard-disk-partition-in-windows-10.html
http://www.windowscentral.com/how-hide-entire-drive-prying-eyes-windows-10/

* Windows Registry keys involved in, linked to, and affected by WoW64 (Windows 32-bit on Windows 64-bit) 64-bit (x64) in
Windows NTx 64-bit (x64) OSes:
http://msdn.microsoft.com/library/aa384253.aspx
http://en.wikipedia.org/wiki/WoW64
WoW64 symbolic links (Wow6432Node):
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Classes
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\AppId
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppId
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\PROTOCOLS
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\PROTOCOLS
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Typelib
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Typelib
See MDGx "Registry Structure" chapter in REGISTRY.TXT (included) for more details:
http://www.mdgx.com/reg.htm#RTS

* Add/Customize System, Dialog, Icons, Taskbar + DOS Console (Command Prompt) Fonts (.fon, .ttf, .otf) + tweak DPI (Dots Per
Inch) Scaling to other than default [100%] in Windows 7/newer:
http://www.superuser.com/questions/163430/#1131693
Customize Windows 7 Font Face/Size + Taskbar Icons Size:
http://www.wikihow.com/Customize-the-Size-of-the-Windows-7-Taskbar-Icons/
http://blogs.msdn.microsoft.com/developingfordynamicsgp/2009/12/01/more-on-windows-7-bitmap-fonts-and-dpi-settings/
Change Default System Fonts:
http://answers.microsoft.com/en-us/windows/forum/windows_7-desktop/how-to-change-system-default-font-in-all-parts/dfce15db-7337-420a-a42e-517521a8502e/
Change Dialog Boxes + Buttons Fonts:
http://www.sevenforums.com/tutorials/1175-fonts-change.html
Add Custom Fonts to DOS Console (Command Prompt):
http://www.thewindowsclub.com/add-custom-fonts-to-command-prompt/
Use also [limited options :-(] Windows built-in Display Font Size and DPI tool [DpiScaling.exe] located in the
%WinDir%\SYSTEM32 folder [%WinDir% = usually C:\WINDOWS].
View all directories/folders listed in your system PATH from a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE):
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter:
PATH
See also "* Advanced Appearance (Metrics) Settings [AA(M)S] for Windows 7/newer:" section in WINDOWS8.TXT (included):
http://www.mdgx.com/8.php
http://www.mdgx.com/WINDOWS8.TXT
Right-click on improved WIN8_AAS.HTA (included, further customized) HTML Application (.HTA) file, also available here
[right-click to save!]
http://www.mdgx.com/WIN8_AAS.HTA
-> Run as Administrator [will open by default in Internet Explorer (IE) web browser] -> tweak to your heart content. ;-/
HTML Application (HTA):
http://en.wikipedia.org/wiki/HTML_Application
Change System Font using Winaero Tweaker (freeware) + Windows built-in Registry Editor [RegEdit.exe]:
http://www.winaero.com/change-system-font-windows-10/
Winaero Tweaker 32-bit + 64-bit for Windows 7/8/8.1/10/11 [select Portable at install time!]:
http://www.winaero.com/winaero-tweaker/
Download:
http://www.winaero.com/download-winaero-tweaker/
File:
http://www.winaero.com/downloads/winaerotweaker.zip
Winaero Tweaker Features:
http://www.winaero.com/the-list-of-winaero-tweaker-features/
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Fonts]
"Courier 10,12,15"="COURF.FON"
"MS Serif 8,10,12,14,18,24"="SERIFF.FON"
"MS Sans Serif 8,10,12,14,18,24"="SSERIFF.FON"
"Small Fonts"="SMALLF.FON"
"Small Fonts (120)"="SMALLF.FON"
;
------End cut & paste here------
Log off/sign out -> log back on/sign in into your same user account for these changes to take effect.
Windows System Font (.fon) files for different DPI settings (examples):
125% DPI font file | 100% DPI font file
***************************************
SSERIFF.FON        | SSERIFE.FON
SSERIFFE.FON       | SSERIFEE.FON
SSERIFFG.FON       | SSERIFEG.FON
SSERIFFR.FON       | SSERIFER.FON
SSERIFFT.FON       | SSERIFET.FON
SSEF1255.FON       | SSEE1255.FON
SSEF1256.FON       | SSEE1256.FON
SSEF1257.FON       | SSEE1257.FON
SSEF874.FON        | SSEE874.FON
* MS Serif FON:
125% DPI font file | 100% DPI font file
***************************************
SERIFF.FON         | SERIFE.FON
SERIFFE.FON        | SERIFEE.FON
SERIFFG.FON        | SERIFEG.FON
SERIFFR.FON        | SERIFER.FON
SERIFFT.FON        | SERIFET.FON
SERF1255.FON       | SERE1255.FON
SERF1256.FON       | SERE1256.FON
SERF1257.FON       | SERE1257.FON
* Courier FON:
125% DPI font file | 100% DPI font file
***************************************
COURF.FON          | COURE.FON
COURFE.FON         | COUREE.FON
COURFG.FON         | COUREG.FON
COURFR.FON         | COURER.FON
COURFT.FON         | COURET.FON
COUF1255.FON       | COUE1255.FON
COUF1256.FON       | COUE1256.FON
COUF1257.FON       | COUE1257.FON

* Turn ON Write Cache (hardware based) + turn OFF Write Protect (write-cache buffer flush), Error Checking, Legacy + Suspend
functions (hardware dependent) to speed up all your connected/installed/local/network/remote/removable
HDD/SSD/NVMe/M.2/USB/card/stick/etc drives/partitions/volumes in Windows 7/newer:
http://www.lifewire.com/remove-write-4586905/
http://www.isumsoft.com/computer/format-write-protected-usb-drive-using-cmd.html
http://www.howtogeek.com/howto/windows-vista/registry-hack-to-disable-writing-to-usb-drives/
http://support.citrix.com/article/CTX236681/
http://www.tenforums.com/drivers-hardware/138212-change-removal-policy-defaults-current-all-future-drives.html
http://www.der-windows-papst.de/en/2015/06/02/harddisk-write-cache-festplatte-schreibcache-richtlinie/
http://docs.microsoft.com/windows/client-management/change-default-removal-policy-external-storage-media/
http://social.msdn.microsoft.com/Forums/WINDOWS/4e8f2618-0dc6-4ef6-b749-25b47b830797/
http://admx.help/?Category=Windows_10_2016&Policy=Microsoft.Policies.RemovableStorageAccess::Removable_Remote_Allow_Access
http://howandroidhelp.com/how-to-return-safely-remove-hardware-to-windows-taskbar/
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
; Control Panel (CP) [control.exe] -> Safely Remove Hardware (Plug/Unplug Removable Devices):
; RUNDLL32.EXE SHELL32.DLL,Control_RunDLL HotPlug.dll
; -> check Display device components box [HotPlugFlags REG_DWORD = 2]:
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Applets\SysTray]
"HotPlugFlags"=dword:2
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Applets\SysTray]
"HotPlugFlags"=dword:2
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Applets\SysTray]
"HotPlugFlags"=dword:2
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\StorageDevicePolicies]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Usb]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Storage\EnabledDenyGP]
"DenyAllGPState"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\StorageDevicePolicies]
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Storage\EnabledDenyGP]
"DenyAllGPState"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Control\StorageDevicePolicies]
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Control\Storage\EnabledDenyGP]
"DenyAllGPState"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\StorageManagement\SpacesSMP\ConnectedSubsystems\{00000000-0000-0000-0000-000000000000}]
"CacheEnabled"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\StorageManagement\SpacesSMP\ConnectedSubsystems\{00000000-0000-0000-0000-000000000000}]
"CacheEnabled"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Control\StorageManagement\SpacesSMP\ConnectedSubsystems\{00000000-0000-0000-0000-000000000000}]
"CacheEnabled"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0000]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0001]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0002]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0003]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0004]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0005]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0006]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0007]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0008]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0009]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0010]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0011]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0012]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0013]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0014]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0015]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0016]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0017]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0018]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0019]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0020]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0021]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0022]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0023]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0024]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0025]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0026]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0027]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0028]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0029]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0030]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0031]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0032]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0033]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0034]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0035]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0036]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0037]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0038]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0039]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0040]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0041]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0042]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0043]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0044]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0045]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0046]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0047]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0048]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0049]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0050]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0000]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0001]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0002]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0003]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0004]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0005]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0006]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0007]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0008]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0009]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0010]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0011]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0012]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0013]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0014]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0015]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0016]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0017]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0018]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0019]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0020]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0021]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0022]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0023]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0024]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0025]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0026]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0027]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0028]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0029]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0030]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0031]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0032]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0033]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0034]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0035]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0036]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0037]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0038]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0039]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0040]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0041]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0042]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0043]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0044]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0045]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0046]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0047]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0048]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0049]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0050]
"ErrorCheckingEnabled"=dword:0
"LegacyCheckingEnabled"=dword:0
"HcDisableSelectiveSuspend"=dword:1
"DisableSelectiveSuspend"=dword:1
"EnableSelectiveSuspend"=dword:0
"WriteProtect"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\I/O System]
"AllowRemoteDASD"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager\I/O System]
"AllowRemoteDASD"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Control\Session Manager\I/O System]
"AllowRemoteDASD"=dword:1
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\RemovableStorageDevices]
"AllowRemoteDASD"=dword:1
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services\Client]
"fEnableUsbBlockDeviceBySetupClass"=dword:0
"fEnableUsbSelectDeviceByInterface"=dword:1
[-HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services\Client\UsbBlockDeviceBySetupClasses]
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services\Client\UsbSelectDeviceByInterfaces]
"1000"="{6bdd1fc6-810f-11d0-bec7-08002be2092f}"
;
------End cut & paste here------
Open Device Manager: Start -> Run... [hold WinKey + press R] -> type:
DevMgmt.msc
or (in some cases):
MMC.EXE /S DevMgmt.msc
-> press Enter -> Disk Drives -> double-click on each drive/partition/volume name Properties -> Policies tab ->
Removal policy -> check "Better Performance" box (if applicable) -> Write-caching policy -> check "Enable write caching on
the device" box (if applicable) -> OK/Apply.
http://2.bp.blogspot.com/-rH-Np-Af7cU/VkwxreXVcjI/AAAAAAAAAKs/Vz2kGGCXxxY/s1600/Write-caching-policy.png
http://www.tenforums.com/attachments/tutorials/36596d1441816445-enable-disable-disk-write-caching-windows-10-a-write_cache-3.png
Device Manager DevCon [devcon.exe] 32-bit + 64-bit DOS console command line tool used to enable, disable, restart, update,
remove (groups of) hardware device drivers:
http://learn.microsoft.com/windows-hardware/drivers/devtest/devcon/
Available versions of DevCon 32-bit + 64-bit for Windows XP/newer 32-bit (x86) + 64-bit (x64):
http://superuser.com/questions/1002950/
DevCon Repository:
http://networchestration.wordpress.com/2016/07/11/how-to-obtain-device-console-utility-devcon-exe-without-downloading-and-installing-the-entire-windows-driver-kit-100-working-method/
DevCon-Installer:
http://github.com/Drawbackz/DevCon-Installer/
Download:
http://github.com/Drawbackz/DevCon-Installer/releases/latest/
For example DevCon [devcon.exe] installs as part of Windows Driver Kit (WDK) 7.1.0/newer:
http://learn.microsoft.com/windows-hardware/drivers/download-the-wdk/
WDK 7.1.0 ISO:
http://www.microsoft.com/download/details.aspx?id=11800
File [620 MB]:
http://download.microsoft.com/download/4/A/2/4A25C7D5-EFBE-4182-B6A9-AE6850409A78/GRMWDK_EN_7600_1.ISO
Install 7-Zip unZIPping/unARChiving/unRARing tool (free GPL):
http://www.7-zip.org/
Explorer -> right-click GRMWDK_EN_7600_1.ISO (see above) -> select 7-Zip -> select Open archive -> extract devcon.exe file
which matches your Windows NTx OS build/edition/release/update/version + bit strength [32-bit (x86) or 64-bit (x64)]
anywhere on your local storage drives/partitions/volumes -> move matching devcon.exe file to a directory/folder listed in
your system PATH.
View all directories/folders listed in your system PATH from a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE):
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter:
PATH
Devcon.exe Commands:
http://learn.microsoft.com/windows-hardware/drivers/devtest/devcon-general-commands/
DEVCON Command Line Utility Alternative to Device Manager:
http://www.robvanderwoude.com/devcon.php
DEVCON.exe:
http://www.ss64.com/nt/devcon.html
Manage Windows Drivers at Command Prompt using DevCon:
http://www.thewindowsclub.com/devcon-manage-windows-drivers-cmd/
Run DevCon (devcon.exe) from a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE): right-click CMD shortcut/CMD.EXE ->
Run as Administrator -> run this command -> press Enter:
devcon.exe restart *usb*
You will see the list of all connected/local/removable USB devices (generic example):
----------snippity-snip----------
USB\VID_0000&PID_0000\00000000000000                        : Restarted
USB\ROOT_HUB00\0&00000000&0&0                               : Requires restart/reboot
etc...
The xxx device(s) are ready to be restarted. To restart/reset the devices, restart/reboot the system.
----------snippity-snip----------
Each device has a unique VID_xxxx + PID_xxx and/or ROOT_HUB_xx manufacturer/vendor ID number.
Open Registry Editor (RegEdit) [REGEDIT.EXE] located in the %WinDir% folder [%WinDir% = usually C:\WINDOWS]: right-click
RegEdit or its shortcut/link -> Run as Administrator -> go to this registry key (generic, replace # numbers with actual
hardware IDs corresponding to connected/installed storage media devices):
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\SCSI\Device_Vendor_ID_#\Device_Model_ID_#\Device Parameters\Classpnp\
Replace each Device_Vendor_ID_# + Device_Model_ID_# above with your specific number(s) obtained from the devcon.exe list in
generic example above.
In this generic example:
VID_0000&PID_0000\00000000000000
the registry key you need (most likely) looks like this (generic example):
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\SCSI\VID_0000&PID_0000\00000000000000\Device Parameters\Classpnp\
In the right hand pane of this registry key you need to modify or create (if not present) these 3 registry values with these
exact names and with these exact numeric values after "dword:" [REG_DWORD value type]:
"UserRemovalPolicy"=dword:2
"UserWriteCacheSetting"=dword:1
"CacheIsPowerProtected"=dword:0
To create a new registry value (if not present): in the Registry Editor right hand pane -> right-click on an empty spot ->
select Value -> REG_DWORD -> right-click on each value newly created -> name it exactly as above, without typing any
quotation marks.
Repeat same steps 3 times in order to create + rename all 3 registry DWORD values above.
To modify the numeric/hex/bin/text/ASCII/ANSI/etc value of a registry value: in the Registry Editor right hand pane ->
double-click on each of the 3 DWORD values above -> type 2 or 1 or 0 to match exactly its numeric value with the respective
name of each of the 3 registry DWORD values.
Repeat same steps 3 times in order to modify the numeric values of all 3 registry DWORD values above.
Restart/reboot Windows for all changes to take effect.
DskCache [DSKCACHE.EXE] DOS console command line tool 32-bit Hotfix for Windows 2000/newer turns ON/OFF power failure
protection (+p/-p) [CacheIsPowerProtected DWORD value] + write cache (+w/-w) [UserWriteCacheSetting DWORD value] in the
registry for all connected/installed/local/network/removable drives/partitions/volumes:
http://web.archive.org/web/20140825143556/http://support.microsoft.com/kb/811392/
Download:
http://thehotfixshare.net/board/index.php?/files/file/1113-windows2000-kb811392-x86-enuexe/
File:
http://hotfixv4.trafficmanager.net/Windows%202000/sp5/Fix178740/2195/free/266264_ENU_i386_zip.exe
----------snippity-snip----------
DSKCACHE.EXE [+p|-p] [+w|-w] [/i|/s|Drive_Specifier]
Set [+] or Clear [-] the disk cache value:
 p  Power protected write cache (not supported on all OS versions).
 w  Write cache.
Drive selection (default is all drives):
 /i  IDE disks only.
 /s  SCSI (includes FC) disks only.
Drive_Specifier: Drive letter, volume name, or physical drive.
 Drive letter(s): c:, d:, etc.
 Volume name(s): \\?\Volume{8fc37c41-bdd3-11d5-b897-806d6172696f}\
 Physical drive(s): PhysicalDrive0, PhysicalDrive1, etc.
If using no options current settings for all fixed disks will be displayed.
----------snippity-snip----------
Turn ON power failure protection (+p) [CacheIsPowerProtected] + write cache (+w) [UserWriteCacheSetting] for all
connected/installed/local/network/removable drives/partitions/volumes (example):
DSKCACHE.EXE +p +w
p = power failure protection
w = write cache
+ = enabled
- = disabled
+w and -w switches correspond to Device Manager [hold WinKey + press R -> type DevMgmt.msc -> press Enter] -> Disk Drives ->
drive/partition/volume name Properties -> Policies tab -> Write-caching policy -> "Enable write caching on the device" check
box, which corresponds to write cache [UserWriteCacheSetting] Registry DWORD [REG_DWORD] value [1 = enabled | 0 = disabled]:
"UserWriteCacheSetting"=dword:1
+p and -p switches correspond to Device Manager [hold WinKey + press R -> type DevMgmt.msc -> press Enter] -> Disk Drives ->
drive/partition/volume name Properties -> Policies tab -> Write-caching policy ->
"Turn off Windows write-cache buffer flushing on the device" check box, which corresponds to power failure protection
[CacheIsPowerProtected] Registry DWORD [REG_DWORD] value [1 = enabled | 0 = disabled]:
"CacheIsPowerProtected"=dword:1
These 2 Registry values reside under this Registry Hive Key Local Machine (HKLM) subkey (generic, replace 0es with actual
hardware IDs of connected/installed/local/network/removable drives/partitions/volumes):
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\SCSI\VID_0000&PID_0000\00000000000000\Device Parameters\Classpnp\
"UserWriteCacheSetting"=dword:1
"CacheIsPowerProtected"=dword:1
More info:
http://www.tomshardware.com/reviews/ssd-performance-tweak,2911-5.html
http://devblogs.microsoft.com/oldnewthing/20100909-00/?p=12913

* Turn OFF Diagnostic Tracing [DiagTrack], Data Collection/Logging [DataCollection], Telemetry + Performance Counters in
Windows 7/newer:
NOTE:
Some of the Diagnostic Tracing [DiagTrack] + Data Collection/Logging [DataCollection] settings [registry keys + values]
apply only to Windows 8/8.1/10/11!
http://www.tenforums.com/tutorials/7032-change-diagnostic-data-settings-windows-10-a.html
http://www.tenforums.com/tutorials/118019-enable-disable-delete-diagnostic-data-windows-10-a.html
http://pcauthorities.com/pc-speed/how-to-disable-performance-counters-in-windows-xp/
http://heimdalsecurity.com/en/windows-10-security-guide/privacy/
http://www.helpdeskgeek.com/windows-10/how-to-disable-windows-10-telemetry/
http://tosdr.org/#microsoft
http://tosdr.org/#microsoft-store
http://docs.microsoft.com/windows/privacy/windows-diagnostic-data/
http://privacy.microsoft.com/
Microsoft Extensible Performance Counter List (EXCTRLST.EXE) 32-bit tool displays, enables + disables extensible performance
counters for installed Dynamic Link Libraries (DLLs)/Services [616 KB]:
http://web.archive.org/web/20160722103758/http://download.microsoft.com/download/win2000platform/exctrlst/1.00.0.1/nt5/en-us/exctrlst_setup.exe
Explorer -> right-click exctrlst_setup.exe (see above) -> Run as Administrator -> Install Tool: EXCTRLST.EXE -> Next ->
complete installation -> right-click exctrlst.exe -> Run as Administrator -> scroll down and highlight 1 item at a time all
the way down to the bottom -> UNcheck every correspondent Performance Counter List box -> exit exctrlst.exe.
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\DataCollection]
"Allow Telemetry"=dword:0
"AllowTelemetry"=dword:0
"DisableDeviceDelete"=-
"MaxTelemetryAllowed"=-
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\DataCollection]
"Allow Telemetry"=dword:0
"AllowTelemetry"=dword:0
"DisableDeviceDelete"=-
"MaxTelemetryAllowed"=-
[-HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\DiagTrack\Security]
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\DiagTrack]
"LaunchProtected"=dword:0
"UserServiceFlags"=dword:0
"Start"=dword:4
[-HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\DiagTrack\Security]
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\DiagTrack]
"LaunchProtected"=dword:0
"UserServiceFlags"=dword:0
"Start"=dword:4
[-HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\DiagTrack\Security]
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\DiagTrack]
"LaunchProtected"=dword:0
"UserServiceFlags"=dword:0
"Start"=dword:4
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Diagnostics\DiagTrack]
"ShowedToastAtLevel"=dword:0
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Diagnostics\DiagTrack]
"ShowedToastAtLevel"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Diagnostics\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\.NET CLR Data\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\.NET CLR Networking\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\.NET CLR Networking 4.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\.NET Data Provider for Oracle\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\.NET Data Provider for SqlServer\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\.NET Memory Cache 4.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\.NETFramework\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\ASP.NET\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\ASP.NET_1.1.4322\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\ASP.NET_2.0.50727\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\ASP.NET_4.0.30319\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\aspnet_state\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\BITS\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\ESENT\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\Intel Storage Counters\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\Lsa\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\MSDTC\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\MSDTC Bridge 3.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\MSDTC Bridge 4.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\MSSCNTRS\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\PerfDisk\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\PerfNet\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\PerfOS\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\PerfProc\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\Psched\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\rdyboost\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\RemoteAccess\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\RSVP\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\ServiceModelEndpoint 3.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\ServiceModelEndpoint 4.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\ServiceModelOperation 3.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\ServiceModelOperation 4.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\ServiceModelService 3.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\ServiceModelService 4.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SMSvcHost 3.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SMSvcHost 4.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\Spooler\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\TapiSrv\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\Tcpip\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\TermService\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\UGatherer\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\UGTHRSVC\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\usbhub\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\Windows Workflow Foundation 3.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\Windows Workflow Foundation 4.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\WmiApRpl\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\WSearchIdxPi\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Diagnostics\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\.NET CLR Data\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\.NET CLR Networking\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\.NET CLR Networking 4.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\.NET Data Provider for Oracle\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\.NET Data Provider for SqlServer\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\.NET Memory Cache 4.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\.NETFramework\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\ASP.NET\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\ASP.NET_1.1.4322\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\ASP.NET_2.0.50727\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\ASP.NET_4.0.30319\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\aspnet_state\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\BITS\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\ESENT\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Intel Storage Counters\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Lsa\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\MSDTC\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\MSDTC Bridge 3.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\MSDTC Bridge 4.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\MSSCNTRS\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\PerfDisk\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\PerfNet\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\PerfOS\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\PerfProc\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Psched\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\rdyboost\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\RemoteAccess\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\RSVP\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\ServiceModelEndpoint 3.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\ServiceModelEndpoint 4.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\ServiceModelOperation 3.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\ServiceModelOperation 4.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\ServiceModelService 3.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\ServiceModelService 4.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\SMSvcHost 3.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\SMSvcHost 4.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Spooler\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\TapiSrv\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Tcpip\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\TermService\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\UGatherer\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\UGTHRSVC\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\usbhub\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Windows Workflow Foundation 3.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Windows Workflow Foundation 4.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\WmiApRpl\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\WSearchIdxPi\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Control\Diagnostics\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\.NET CLR Data\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\.NET CLR Networking\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\.NET CLR Networking 4.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\.NET Data Provider for Oracle\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\.NET Data Provider for SqlServer\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\.NET Memory Cache 4.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\.NETFramework\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\ASP.NET\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\ASP.NET_1.1.4322\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\ASP.NET_2.0.50727\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\ASP.NET_4.0.30319\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\aspnet_state\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\BITS\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\ESENT\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\Intel Storage Counters\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\Lsa\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\MSDTC\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\MSDTC Bridge 3.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\MSDTC Bridge 4.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\MSSCNTRS\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\PerfDisk\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\PerfNet\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\PerfOS\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\PerfProc\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\Psched\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\rdyboost\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\RemoteAccess\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\RSVP\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\ServiceModelEndpoint 3.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\ServiceModelEndpoint 4.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\ServiceModelOperation 3.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\ServiceModelOperation 4.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\ServiceModelService 3.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\ServiceModelService 4.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\SMSvcHost 3.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\SMSvcHost 4.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\Spooler\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\TapiSrv\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\Tcpip\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\TermService\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\UGatherer\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\UGTHRSVC\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\usbhub\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\Windows Workflow Foundation 3.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\Windows Workflow Foundation 4.0.0.0\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\WmiApRpl\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\WSearchIdxPi\Performance]
"DisableDiagnosticTracing"=dword:1
"Disable Performance Counters"=dword:1
;
------End cut & paste here------

* Maximize 3D/DirectX/DirectX3D 3D/gaming/graphics/spatial/texture processing/rendering performance: decrease hardware lag +
turn OFF diagnostics, performance + tracing counters + timers in Windows 7/newer:
http://forums.guru3d.com/threads/from-red-to-green.387539/
http://www.ghacks.net/2013/04/18/try-changing-hpet-settings-to-improve-your-pcs-performance/
See also "* Turn OFF Diagnostic Tracing [DiagTrack], Data Collection/Logging [DataCollection], Telemetry + Performance
Counters..." section further above.
Turn OFF High Precision Event Timer (HPET) BIOS clock boot setting from a DOS console command prompt
(%WinDir%\SYSTEM32\CMD.EXE): right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter:
BCDEDIT.EXE /deletevalue useplatformclock
Restart/reboot.
In case BCDEdit setting above doesn't help, or if HPET is needed by some hardware device or software program you are using:
Turn ON High Precision Event Timer (HPET) BIOS clock boot setting from a DOS console command prompt
(%WinDir%\SYSTEM32\CMD.EXE): right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter:
BCDEDIT.EXE /set useplatformclock true
Restart/reboot.
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text BATch (.bat) or CoMmanD (.cmd) script file containing the lines between Cut & Paste delimiters below
-> save it as plain text/ASCII file (Encode: -> ANSI) with the BAT (.bat) or CMD (.cmd) extension -> right-click it ->
Run as Administrator -> wait for completion.
-----Begin cut & paste here-----
@ECHO OFF
IF NOT "%OS%"=="Windows_NT" GOTO END
REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Direct3D" /v PSGPNumThreads /t REG_DWORD /d 16 /f
REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Direct3D" /v EnableSC /t REG_DWORD /d 1 /f
REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Direct3D" /v ForceCritSec /t REG_DWORD /d 1 /f
REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Direct3D" /v MMXFastPath /t REG_DWORD /d 1 /f
REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Control\ACPI" /v AMLIGlobalHeapSize /t REG_DWORD /d 1048576 /f
REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v SystemPages /t REG_DWORD /d 4294967295 /f
REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v PagedPoolSize /t REG_DWORD /d 4294967295 /f
REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v SessionPoolSize /t REG_DWORD /d 60 /f
REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v SessionViewSize /t REG_DWORD /d 120 /f
REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v PoolUsageMaximum /t REG_DWORD /d 60 /f
REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Control\usbstor\054C00C1" /v MaximumTransferLength /t REG_DWORD /d 2097152 /f
REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Control\usbstor\05AC12xx" /v MaximumTransferLength /t REG_DWORD /d 2097152 /f
REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Control\usbstor\05AC13xx" /v MaximumTransferLength /t REG_DWORD /d 2097152 /f
REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Control\usbstor\05DCA431" /v MaximumTransferLength /t REG_DWORD /d 2097152 /f
REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Control\usbstor\058F6362" /v MaximumTransferLength /t REG_DWORD /d 2097152 /f
REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows" /v GDIProcessHandleQuota /t REG_DWORD /d 32768 /f
REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows" /v USERProcessHandleQuota /t REG_DWORD /d 32768 /f
REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Multimedia\SystemProfile\Tasks\Games" /v "Scheduling Category" /t REG_SZ /d High /f
REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Multimedia\SystemProfile\Tasks\Games" /v "SFIO Priority" /t REG_SZ /d High /f
REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Multimedia\SystemProfile\Tasks\Games" /v "Background Only" /t REG_SZ /d False /f
REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Multimedia\SystemProfile\Tasks\Games" /v "Priority" /t REG_DWORD /d 1 /f
REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Multimedia\SystemProfile\Tasks\Games" /v "GPU Priority" /t REG_DWORD /d 1 /f
REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Multimedia\SystemProfile\Tasks\Games" /v "Affinity" /t REG_DWORD /d 0 /f
:END
EXIT
------End cut & paste here------

* Increase Cached Icons numeric value to max(imum) in Desktop, Explorer, File Manager (FM) + 3rd party replacements/similar
tools in all Windows NTx editions -> "HARD DRIVE THRASHING" -> REGISTRY.TXT (included):
http://www.mdgx.com/newtip1.htm#THRASH
MDGx "File Manager + Windows Explorer/File Explorer Replacement Tools [free(ware)]" section in SOFTWARE.TXT (included):
http://www.mdgx.com/toy.htm#ENH
MDGx "Tweaked + Customized File Manager (FM) 32-bit" section in SOFTWARE.TXT (included):
http://www.mdgx.com/xptoy.htm#FMNT
Microsoft open source original File Manager (FM) 32-bit + 64-bit:
http://www.mdgx.com/xptoy.htm#FMMS
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer]
"Max Cached Icons"="65535"
;
------End cut & paste here------

* FIX: Repair Remote Procedure Call (RPC) Internet Protocol version 6 (IPv6)/server errors in Windows 7/newer:
http://www.helpdeskgeek.com/help-desk/how-to-fix-rpc-server-is-unavailable-error-in-windows/
http://www.hpc.mil/program-areas/networking-overview/2013-10-03-17-24-38/ipv6-knowledge-base-ip-transport/disabling-ipv6-in-microsoft-windows-8-and-server-2012/
http://techjourney.net/disable-turn-off-ipv6-support-in-windows-10-8-1-8-7-vista/
http://kb.iu.edu/d/baeg/
http://www.drivereasy.com/knowledge/rpc-server-is-unavailable-error-on-windows-10-fixed/
http://www.alphr.com/rpc-server-is-unavailable/
http://docs.microsoft.com/troubleshoot/windows-server/networking/configure-ipv6-in-windows/
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters]
"DisabledComponents"=dword:8
;
------End cut & paste here------
Restart/reboot Windows for this change to take effect.

* FIX: Refresh/reset (delete + rebuild) Explorer Icon Cache Database [IconCache.db + iconcache*.db] in Windows 7/newer:
http://www.thewindowsclub.com/rebuild-icon-clear-thumbnail-cache-windows-10/
http://www.thewindowsclub.com/rebuild-the-icon-cache-windows/
http://neosmart.net/wiki/clear-icons-cache/
http://www.windowscentral.com/how-reset-icon-cache-database-windows-10/
http://www.howtogeek.com/232779/how-to-rebuild-a-broken-icon-cache-in-windows-10/
http://appuals.com/rebuild-icon-cache-windows-11/
http://www.elevenforum.com/t/rebuild-icon-cache-in-windows-11.2049/
http://www.tenforums.com/tutorials/5645-rebuild-icon-cache-windows-10-a.html
File:
http://www.tenforums.com/attachments/tutorials/207993d1539300969-rebuild-icon-cache-windows-10-a-rebuild_icon_cache.bat
IconCache.db + iconcache*.db files reside in these local user folders:
- %LocalAppData%\IconCache.db
- %UserProfile%\AppData\Local\IconCache.db
- %LocalAppData%\Microsoft\Windows\Explorer\iconcache*.db
- %UserProfile%\AppData\Local\Microsoft\Windows\Explorer\iconcache*.db
Where %LocalAppData% = %WinDir%\SYSTEM32\Config\SystemProfile\AppData\Local folder.
Where %WinDir% = usually C:\WINDOWS folder.
Where %UserProfile% = usually C:\Users\%UserName% folder.
Where %UserName% = your user name folder.

* FIX: Turn OFF annoying/nagging "Your Windows 7 PC is out of support" (full screen) pop-ups in Windows 7 with
Service Pack 1 (SP1) + certain Microsoft Updates [example: KB4530734] installed:
http://nolabnoparty.com/en/windows-7-suppress-pc-is-out-of-support-warning/
http://www.askvg.com/tip-disable-your-windows-7-pc-is-out-of-support-full-screen-banner/
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\EOSNotify]
"DiscontinueEOS"=dword:1
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\EOSNotify]
"DiscontinueEOS"=dword:1
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\EOSNotify]
"DiscontinueEOS"=dword:1
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\EOSnotify.exe]
"Debugger"="systray.exe"
;
------End cut & paste here------

* FIX: Detect/diagnose/repair/troubleshoot internet/network connection errors using Windows Network Diagnostics, a.k.a.
Diagnostics Troubleshooting Wizard, a.k.a. DiagWizard, a.k.a. Microsoft Support Diagnostic Tool [MSDT.EXE] in Windows
7/newer:
http://docs.microsoft.com/windows-server/administration/windows-commands/msdt/
http://technet.microsoft.com/library/ee424379.aspx#available-troubleshooting-packs
http://www.elevenforum.com/t/run-troubleshooters-in-windows-11.3337/
http://www.thewindowsclub.com/how-to-run-a-troubleshooter-from-the-command-line-in-windows-10/
http://www.linksys.com/us/support-article?articleNum=135351
http://www.majorgeeks.com/content/page/how_to_use_the_microsoft_support_diagnostic_tool_system_diagnostic_report.html
Run MSDT.EXE from a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE): right-click CMD shortcut/CMD.EXE -> Run as
Administrator -> run this command -> press Enter:
MSDT.EXE -id NetworkDiagnosticsWeb -ep SystemSettings_Troubleshoot_L2 -skip true -elevated yes
-> follow the instructions to diagnose + repair internet/network connection(s) errors.
Microsoft Support Diagnostic Tool [MSDT.EXE] is located in the %WinDir%\SYSTEM32 folder [%WinDir% = usually C:\WINDOWS].
View all directories/folders listed in your system PATH from a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE):
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter:
PATH

* FIX: Fix Windows 7/newer, Windows Server 2008 R2/newer + MS Office XP/newer Activation Errors 0x8007232b + 0xc004f074:
http://www.techyuga.com/windows-activation-error-0x8007232b/
http://www.serverbrain.org/system-administration/disabling-automatic-kms-to-dns-publishing.html
http://appuals.com/how-to-fix-office-2016-activation-error-code-0xc004f074/
http://winpeaker.com/en/windows/0xc004f074-office-activation-error-2010-2013-2016/
More info:
http://github.com/MicrosoftDocs/windowsserverdocs/issues/4218/
MS DOCs: Registry Settings for Volume Activation:
http://learn.microsoft.com/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn502532(v=ws.11)
MS DOCs: Key Management Service (KMS) Activation -> Configuring DNS:
http://technet.microsoft.com/library/ff793405.aspx
MS DOCs: Activate Windows 7/newer using Key Management Service (KMS):
http://learn.microsoft.com/windows/deployment/volume-activation/activate-using-key-management-service-vamt/
Wikipedia: Key Management Service (KMS):
http://simple.wikipedia.org/wiki/Key_Management_Service
Wikipedia: MS Office Versions:
http://en.wikipedia.org/wiki/History_of_Microsoft_Office
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
; Windows 7/newer + Windows Server 2008 R2/newer:
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform]
"DisableDnsPublishing"=dword:1
; Windows XP/2003/Vista/2008 only:
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SL]
"DisableDnsPublishing"=dword:1
;
------End cut & paste here------

* Turn ON display of time seconds [00:00:??] in Taskbar Tray Clock in Windows 7/newer:
http://www.askvg.com/collection-of-windows-10-hidden-secret-registry-tweaks/
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced]
"ShowSecondsInSystemClock"=dword:1
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced]
"ShowSecondsInSystemClock"=dword:1
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced]
"ShowSecondsInSystemClock"=dword:1
;
------End cut & paste here------

* Delete/remove unnecessary/bloat files + folders to free up space in Windows 7/newer:
http://www.techspot.com/guides/2240-windows-free-up-storage-space/
http://www.makeuseof.com/tag/delete-windows-files-folders/
http://www.houkconsulting.com/2019/07/freeing-disk-space-windows/

* Windows Desktop Gadgets (free):
http://gadgetsrevived.com/
http://win10gadgets.com/
http://win7gadgets.com/
http://www.gadgetskit.com/

* Create Scheduled Task to Run at Boot Time:
http://www.myboogpages.com/2009/02/how-to-create-a-scheduled-task-that-runs-at-boot-time.html

* Remove icon/shortcut arrow overlay (+ add transparency) + pins to Taskbar/Start Menu in Windows 7:
http://www.mydigitallife.info/workaround-to-remove-shortcut-arrow-make-transparent-in-windows-7-yet-can-pin-to-taskbar-or-start-menu/
Winaero Tweaker 32-bit + 64-bit for Windows 7/8/8.1/10/11 [select Portable at install time!]:
http://www.winaero.com/winaero-tweaker/
Download:
http://www.winaero.com/download-winaero-tweaker/
File:
http://www.winaero.com/downloads/winaerotweaker.zip
Winaero Tweaker Features:
http://www.winaero.com/the-list-of-winaero-tweaker-features/
Winaero Tweaker removes icon overlay using transparent icon.

* Run BATch file as service:
http://www.serverfault.com/questions/226271/running-a-batch-file-as-a-system-service-in-windows-server-2003

* Windows 7 File Association Fixes:
http://www.winhelponline.com/blog/file-asso-fixes-for-windows-7/
http://www.winhelponline.com/blog/unassociate-file-types-windows-7-vista/
http://www.techsupportall.com/file-association-fixes/
http://www.techsupportall.com/file-association-fix-for-windows-7/
http://www.vistax64.com/threads/233243/

* Add programs (file associations) to right-click Open with... menu:
http://www.techrepublic.com/forums/discussions/using-open-with-does-not-work/

* Default Programs Editor (DPE) 32-bit adds/edits/removes right-click items, file associations, autoplay programs (apps):
http://www.defaultprogramseditor.com/
File:
http://www.defaultprogramseditor.com/files/DefaultProgramsEditor.zip
Requires Microsoft .Net Framework Redistributable (NFR) 3.5/newer:
http://www.mdgx.com/add.htm#NFR

* Fix Files/Folders Access Denied + other (similar) Errors:
http://support.microsoft.com/help/2623670/
http://www.thewindowsclub.com/access-is-denied-software-installation-windows/
http://www.stackoverflow.com/questions/8619541/
http://smallbusiness.chron.com/change-permissions-system32-drivers-50434.html
http://www.blogsdna.com/2159/how-to-take-ownership-grant-permissions-to-access-files-folder-in-windows-7.htm

* Take Ownership + Grant Permission right-click items in Windows Vista/newer:
http://www.techfleece.com/2011/05/15/how-to-take-ownership-of-files-or-folders-or-an-entire-hard-drive/
http://www.blogsdna.com/2159/
http://www.howtogeek.com/howto/windows-vista/add-take-ownership-to-explorer-right-click-menu-in-vista/

* (Re)Gain/(re)acquire full permissions (run as SYSTEM) to edit protected/hidden registry (sub)keys in Windows
Vista/newer:
http://www.howtogeek.com/262464/how-to-gain-full-permissions-to-edit-protected-registry-keys/
Run the Registry Editor [RegEdit = %WinDir%\REGEDIT.EXE] with full SYSTEM level privileges to be able to
view/create/edit/rename/delete hidden/locked registry (sub)keys/values:
1. NirCmd 32-bit + 64-bit multi-function DOS console command line + GUI tool:
http://www.nirsoft.net/utils/nircmd.html
NirCmd 32-bit:
http://www.nirsoft.net/utils/nircmd.zip
NirCmd 64-bit:
http://www.nirsoft.net/utils/nircmd-x64.zip
NirCmd Guide:
http://nircmd.nirsoft.net/
Help:
http://www.nirsoft.net/utils/nircmd2.html
Download ZIP archive above that matches your Windows NTx OS bit strength [32-bit (x86) or 64-bit (x64)] + then
unZIP/extract NirCmd files.
2. Place (copy/move) all NirCmd files in a (sub)directory/(sub)folder of your choice (example):
C:\TOOLS\NirCmd
3. Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text CoMmanD (.cmd) script file containing the lines between Cut & Paste delimiters below -> save file as
REGEDIT.CMD (example) into the same (sub)directory/(sub)folder where NirCmd files reside (using C:\TOOLS\NirCmd from example
above):
-----Begin cut & paste here-----
@ECHO OFF
IF NOT "%OS%"=="Windows_NT" GOTO END
IF NOT EXIST C:\TOOLS\NirCmd\nircmd.exe GOTO END
IF NOT EXIST %WinDir%\REGEDIT.EXE GOTO END
C:\TOOLS\NirCmd\nircmd.exe elevatecmd runassystem %WinDir%\REGEDIT.EXE
:END
EXIT
------End cut & paste here------
This way from now on you can run RegEdit with full SYSTEM privileges from a convenient shortcut.
4. Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text VBScript (.vbs) script file containing the lines between Cut & Paste delimiters below -> save file as
REGEDIT.VBS (example) into the same (sub)directory/(sub)folder where NirCmd files reside (using C:\TOOLS\NirCmd from example
above):
-----Begin cut & paste here-----
Dim WshShell:Set WshShell=CreateObject("WScript.Shell")
WshShell.Run chr(34)&"C:\TOOLS\NirCmd\REGEDIT.CMD"&Chr(34),0,true
Set WshShell=Nothing
------End cut & paste here------
5. Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save file as REGEDIT.REG
(example) into the same (sub)directory/(sub)folder where NirCmd files reside (using C:\TOOLS\NirCmd from example above):
-----Begin cut & paste here-----
REGEDIT4
; Desktop right-click RegEdit as SYSTEM shortcut:
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Directory\Background\shell\regedit_sys]
@="Registry Editor (RegEdit) = SYSTEM"
"SuppressionPolicy"=dword:0
"Icon"="REGEDIT.EXE,0"
"NoWorkingDirectory"=""
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Directory\Background\shell\regedit_sys\command]
@="WSCRIPT.EXE /B /Nologo C:\\TOOLS\\NirCmd\\REGEDIT.VBS"
"IsolatedCommand"=-
; My Computer (machine/system wide/all users) Desktop RegEdit as SYSTEM shortcut:
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\regedit_sys]
@="Registry Editor (RegEdit) = SYSTEM"
"SuppressionPolicy"=dword:0
"Icon"="REGEDIT.EXE,0"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\regedit_sys\command]
@="WSCRIPT.EXE /B /Nologo C:\\TOOLS\\NirCmd\\REGEDIT.VBS"
"IsolatedCommand"=-
; My Computer (current/logged on user) Desktop RegEdit as SYSTEM shortcut:
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{59031A47-3F72-44A7-89C5-5595FE6B30EE}\shell\regedit_sys]
@="Registry Editor (RegEdit) = SYSTEM"
"SuppressionPolicy"=dword:0
"Icon"="REGEDIT.EXE,0"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{59031A47-3F72-44A7-89C5-5595FE6B30EE}\shell\regedit_sys\command]
@="WSCRIPT.EXE /B /Nologo C:\\TOOLS\\NirCmd\\REGEDIT.VBS"
"IsolatedCommand"=-
; Desktop right-click RegEdit as Current User shortcut:
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Directory\Background\shell\regedit]
@="Registry Editor (RegEdit) = Current User"
"SuppressionPolicy"=dword:0
"Icon"="REGEDIT.EXE,0"
"NoWorkingDirectory"=""
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Directory\Background\shell\regedit\command]
@="REGEDIT.EXE"
"IsolatedCommand"=-
; My Computer (machine/system wide/all users) Desktop RegEdit as Current User shortcut:
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\regedit]
@="Registry Editor (RegEdit) = Current User"
"SuppressionPolicy"=dword:0
"Icon"="REGEDIT.EXE,0"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\regedit\command]
@="REGEDIT.EXE"
"IsolatedCommand"=-
; My Computer (current/logged on user) Desktop RegEdit as Current User shortcut:
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{59031A47-3F72-44A7-89C5-5595FE6B30EE}\shell\regedit]
@="Registry Editor (RegEdit) = Current User"
"SuppressionPolicy"=dword:0
"Icon"="REGEDIT.EXE,0"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{59031A47-3F72-44A7-89C5-5595FE6B30EE}\shell\regedit\command]
@="REGEDIT.EXE"
"IsolatedCommand"=-
; Control Panel (CONTROL.EXE) RegEdit as SYSTEM shortcut:
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{77708248-f839-436b-8919-527c410f48b9}]
@="Registry Editor (RegEdit) = SYSTEM"
"InfoTip"="Starts Registry Editor (RegEdit) as SYSTEM"
"System.ControlPanel.Category"="5"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{77708248-f839-436b-8919-527c410f48b9}\DefaultIcon]
@="REGEDIT.EXE,0"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{77708248-f839-436b-8919-527c410f48b9}\shell\open\command]
@="WSCRIPT.EXE /B /Nologo C:\\TOOLS\\NirCmd\\REGEDIT.VBS"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{77708248-f839-436b-8919-527c410f48b9}\Elevation]
"Enabled"=dword:1
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ControlPanel\NameSpace\{77708248-f839-436b-8919-527c410f48b9}]
@="Add Registry Editor (RegEdit) as SYSTEM to Control Panel"
; Control Panel (CONTROL.EXE) RegEdit as Current User shortcut:
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{77708248-f839-436b-8919-527c410f48b8}]
@="Registry Editor (RegEdit) = Current User"
"InfoTip"="Starts Registry Editor (RegEdit) as Current User"
"System.ControlPanel.Category"="5"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{77708248-f839-436b-8919-527c410f48b8}\DefaultIcon]
@="REGEDIT.EXE,0"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{77708248-f839-436b-8919-527c410f48b8}\shell\open\command]
@="REGEDIT.EXE"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{77708248-f839-436b-8919-527c410f48b8}\Elevation]
"Enabled"=dword:1
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ControlPanel\NameSpace\{77708248-f839-436b-8919-527c410f48b8}]
@="Add Registry Editor (RegEdit) as Current User to Control Panel"
;
------End cut & paste here------
6. Desktop/Explorer -> go to C:\ drive -> TOOLS directory/folder -> NirCmd subdirectory/subfolder (using C:\TOOLS\NirCmd in
this example) -> right-click on REGEDIT.REG -> Run as Administrator -> answer Yes/OK to all prompts to register/merge/import
the information into your registry.
7. From now on you can run either "Registry Editor (RegEdit) = SYSTEM" (privileged) or
"Registry Editor (RegEdit) as Current User" (default) shortcuts from all these locations:
- Desktop [context menu] -> right-click.
- My Computer (machine/system wide/all users) [context menu] -> right-click.
- My Computer (current/logged on user) [context menu] -> right-click.
- Control Panel (CP) [list of shortcuts] -> Start -> Control Panel or Run... [hold WinKey + press R] -> type:
control
-> press Enter.
Control Panel executable [CONTROL.EXE] is located in the %WinDir%\SYSTEM32 folder [%WinDir% = usually C:\WINDOWS].
View all directories/folders listed in your system PATH from a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE):
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter:
PATH

* Turn OFF HomeGroup + Network Function Discovery (optional) in Windows 7/newer:
http://www.howtogeek.com/howto/27091/how-to-disable-or-enable-the-homegroup-feature-in-windows-7/
MSKB: HomeGroup explained from start to finish:
http://support.microsoft.com/help/17145/
Digital Citizen: What is the Homegroup and how does it work:
http://www.digitalcitizen.life/homegroup-feature-how-it-works/
How-To Geek: Everything You Need to Know About Using HomeGroups in Windows:
http://www.howtogeek.com/howto/9524/
CAUTION:
Disabling these services will turn OFF device/network/remote files/folders/libraries sharing/printing features!
Disable these 2 HomeGroup services: HomeGroup Listener [HomeGroupListener] + HomeGroup Provider [HomeGroupProvider]:
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text BATch (.bat) or CoMmanD (.cmd) script file containing the lines between Cut & Paste delimiters below
-> save it as plain text/ASCII file (Encode: -> ANSI) with the BAT (.bat) or CMD (.cmd) extension -> right-click it ->
Run as Administrator -> wait for completion.
-----Begin cut & paste here-----
@ECHO OFF
IF NOT "%OS%"=="Windows_NT" GOTO END
:: Disable HomeGroup Listener (HomeGroupListener) service:
ECHO Y|NET.EXE STOP HomeGroupListener
SC.EXE CONFIG HomeGroupListener START= disabled
:: Disable HomeGroup Provider (HomeGroupProvider) service:
ECHO Y|NET.EXE STOP HomeGroupProvider
SC.EXE CONFIG HomeGroupProvider START= disabled
:END
EXIT
------End cut & paste here------
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B4FB3F98-C1EA-428d-A78A-D1F5659CBA93}]
"System.IsPinnedToNameSpaceTree"=dword:0
; Windows NTx 64-bit (x64) only:
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B4FB3F98-C1EA-428d-A78A-D1F5659CBA93}]
"System.IsPinnedToNameSpaceTree"=dword:0
[HKEY_CURRENT_USER\Software\Classes\CLSID\{B4FB3F98-C1EA-428d-A78A-D1F5659CBA93}]
"System.IsPinnedToNameSpaceTree"=dword:0
; Windows NTx 64-bit (x64) only:
[HKEY_CURRENT_USER\Software\Classes\Wow6432Node\CLSID\{B4FB3F98-C1EA-428d-A78A-D1F5659CBA93}]
"System.IsPinnedToNameSpaceTree"=dword:0
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\HomeGroup\SharingInProgress]
"SharingInProgress"=dword:0
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\HomeGroup]
"AlwaysStuffAlphaCreds"=dword:0
"ShareBannerCount"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\HomeGroupListener]
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\HomeGroupProvider]
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\HomeGroupListener]
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\HomeGroupProvider]
"Start"=dword:4
;
------End cut & paste here------
Turn OFF these 2 HomeGroup related Function Discovery services (optional): Function Discovery Provider Host [fdPHost]
[%WinDir%\SYSTEM32\fdPHost.dll] + Function Discovery Resource Publication [FDResPub] [%WinDir%\SYSTEM32\fdrespub.dll]:
http://batcmd.com/windows/10/services/fdphost/
http://batcmd.com/windows/10/services/fdrespub/
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text BATch (.bat) or CoMmanD (.cmd) script file containing the lines between Cut & Paste delimiters below
-> save it as plain text/ASCII file (Encode: -> ANSI) with the BAT (.bat) or CMD (.cmd) extension -> right-click it ->
Run as Administrator -> wait for completion.
-----Begin cut & paste here-----
@ECHO OFF
IF NOT "%OS%"=="Windows_NT" GOTO END
:: Disable Function Discovery Provider Host (fdPHost) service:
ECHO Y|NET.EXE STOP fdPHost
SC.EXE CONFIG fdPHost START= disabled
:: Disable Function Discovery Resource Publication (FDResPub) service:
ECHO Y|NET.EXE STOP FDResPub
SC.EXE CONFIG FDResPub START= disabled
:END
EXIT
------End cut & paste here------
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\fdPHost]
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\FDResPub]
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\fdPHost]
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\FDResPub]
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\fdPHost]
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\FDResPub]
"Start"=dword:4
;
------End cut & paste here------

* Automatically install recommended drivers/updates for your hardware/devices:
http://support.microsoft.com/help/15054/

* Add + Customize Fonts from a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE):
http://smallvoid.com/article/winnt-cmd-add-font.html
http://www.techrepublic.com/blog/windows-and-office/quick-tip-add-fonts-to-the-command-prompt/
http://www.howtogeek.com/howto/windows-vista/stupid-geek-tricks-enable-more-fonts-for-the-windows-command-prompt/
http://www.wikihow.com/Customize-the-Font-in-Windows-Command-Prompt/

* .MSI/.MSP/.MSU Installer (%WinDir%\SYSTEM32\MSIEXEC.EXE) Command Line Options:
http://docs.microsoft.com/windows/desktop/msi/command-line-options/
http://msdn.microsoft.com/library/aa367988.aspx
http://msdn.microsoft.com/library/aa372024.aspx
http://helpnet.installshield.com/installshield21helplib/helplibrary/IHelpCmdLineMSI.htm
http://www.silentinstall.org/msiexec/

* Remove Breadcrumbs Bar from Explorer in Windows 7/newer:
http://twigstechtips.blogspot.com/2010/02/win7-remove-windows-explorer.html
http://www.winaero.com/show-full-path-address-bar-windows-10-file-explorer/

* List of DOS console (command prompt) Commands:
http://docs.microsoft.com/windows-server/administration/windows-commands/windows-commands/
http://www.microsoft.com/download/details.aspx?id=56846
http://download.microsoft.com/download/5/8/9/58911986-D4AD-4695-BF63-F734CD4DF8F2/ws-commands.pdf
http://web.archive.org/web/20071014001728/http://technet2.microsoft.com:80/windowsserver/en/library/552ed70a-208d-48c4-8da8-2e27b530eac71033.mspx
http://www.c3scripts.com/tutorials/msdos/commands.html
http://www.ss64.com/nt/
http://www.lifewire.com/list-of-4092302/
http://www.bytescout.com/blog/windows-command-prompt-commands.html
http://www.ionos.com/digitalguide/server/know-how/windows-cmd-commands/
http://www.ccm.net/faq/403-command-prompts-for-windows/

* Link Directory IDentifier (LDID)/DIRectory IDentifier (DIRID)/Decentralized IDentifier (DID)/Globally Unique IDentifier
(GUID)/Universaly Unique IDentifier (UUID) built-in/hard linked/encrypted 128-bit unique reference numbers used in Windows
Application Programming Interface (API) to identify for example system, localized + user special directories/folders
names/values in Windows 9x/NTx OSes (conventions used in INF/MSI installation/reference files/scripts, registry keys/values,
API/NET programming, driver/hardware/internet/networking identification, etc):
http://docs.microsoft.com/dotnet/api/system.environment.specialfolder/
http://docs.microsoft.com/windows-hardware/drivers/install/using-dirids/
http://docs.microsoft.com/windows/win32/shell/knownfolderid/
http://docs.microsoft.com/windows/win32/shell/csidl/
http://w3c-ccg.github.io/did-primer/
http://guid.one/guid/
http://en.wikipedia.org/wiki/Decentralized_identifier
http://en.wikipedia.org/wiki/Universally_unique_identifier
Examples of system + user special folders registry values [some are unique to specific Windows NTx OS
builds/editions/releases/updates/versions]:
Desktop         {B4BFCC3A-DB2C-424C-B029-7FE99A87C641}
This PC         {0AC0837C-BBF8-452A-850D-79D08E667CA7}
Downloads       {374DE290-123F-4565-9164-39C4925E467B}
Documents       {FDD39AD0-238F-46AF-ADB4-6C85480369C7}
Local Downloads {7d83ee9b-2244-4e70-b1f5-5393042af1e4}
3D Objects      {31C0DD25-9439-4F12-BF41-7FF4EDA38722}
My Music        {4BD8D571-6D19-48D3-BE97-422220080E43}
Local Pictures  {0ddd015d-b06c-45d5-8c4c-f59713854639}
My Pictures     {33E28130-4E1E-4676-835A-98395C3BC3BB}
Local Music     {a0c69a99-21c8-4671-8703-7934162fcf1d}
My Video        {18989B1D-99B5-455B-841C-AB7C74E4DDFC}
Personal        {FDD39AD0-238F-46AF-ADB4-6C85480369C7}
Local Documents {f42ee2d3-909f-4907-8871-4c22fc0bf756}
Local Videos    {35286a68-3c57-41a1-bbb1-0eae73d76c95}
MDGx "INF Setup files" topic in SOFTWARE.TXT (included):
http://www.mdgx.com/add.htm#INF
MDGx "INF Guide" topic in SOFTWARE.TXT (included):
http://www.mdgx.com/INF_web/
Value	Destination Directory/Folder
覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧
01	Source Drive_Letter:\Pathname = the directory the INF file is installed from
10	Windows directory = equivalent to %WinDir%
11	System directory = equivalent to %WinDir%\SYSTEM32 for NT based (NTx) OSes and to %WinDir%\SYSTEM for Windows 9x/ME
12	Drivers directory = equivalent to %WinDir%\SYSTEM32\DRIVERS for NT based (NTx) OSes and to %WinDir%\SYSTEM\IoSubsys
	on Windows 9x/ME
17	INF file directory
18	Help directory
20	Fonts directory
21	Viewers directory
23	Color directory (ICM) = not used for installing printer drivers
24	Root directory of the system disk = root directory of disk on which Windows files are installed = example: if DIRID 10
	is C:\WINDOWS then DIRID 24 is C:\ root
25	Shared directory
30	Root directory of the boot disk known as "ARC system partition" for NT based (NTx) OSes = may or may not be same
	directory as the one represented by DIRID 24
50	System directory for NT based (NTx) OSes = equivalent to %WinDir%\system = NT based (NTx) OSes only
51	Spool directory = not used for installing printer drivers: see Printer DIRIDs
52	Spool drivers directory = not used for installing Printer drivers
53	User profile directory
54	Directory where ntldr.exe and osloader.exe are located = NT based (NTx) OSes only
55	Print processors directory = not used for installing Printer drivers
-1	Absolute path (hard link)
More info:
http://en.wikipedia.org/wiki/Hard_link
http://en.wikipedia.org/wiki/Symbolic_link#Microsoft_Windows
http://en.wikipedia.org/wiki/Symbolic_link#Shell_objects
DIRID values from 16384 through 32767 are reserved for special Shell Folders.
Examples of special folders DIRID values and their correspondent locations:
http://docs.microsoft.com/dotnet/api/system.environment.specialfolder/
http://en.wikipedia.org/wiki/Special_folder#List_of_special_folders
http://www.nirsoft.net/articles/find_special_folder_location.html
http://livecode.fandom.com/wiki/SpecialFolderPath
http://commandwindows.com/windows7-shell-commands.htm
http://johnkoerner.com/csharp/special-folder-values-on-windows-versus-mac/
Value	Shell Special Directory/Folder
覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧
16406	All Users\Start Menu
16407	All Users\Start Menu\Programs
16408	All Users\Start Menu\Programs\Startup
16409	All Users\Desktop
16415	All Users\Favorites
16419	All Users\Application Data
16422	Program Files
16425	%WinDir%\SYSTEM32 = valid for Win32 user mode applications running under Windows 32-bit/x86 on Windows 64-bit/x64 (WoW64)
16426	Program Files = valid for Win32 user mode applications running under Windows 64-bit/x64 (WoW64)
16427	Program Files\Common
16428	Program Files\Common = valid for Win32 user mode applications running under Windows 64-bit/x64 (WoW64)
16429	All Users\Templates
16430	All Users\Documents
See also "XP -> 7/8/8.1 Easy Transfer Files + Settings" chapter + "List of System + User Shell Folders in Windows
Vista/newer:" topic further below:
http://www.mdgx.com/7.php
http://www.mdgx.com/WINDOWS7.TXT

* Turn ON Automatic Logon for default/main user/owner/administrator in Windows 7/newer:
http://quicklaunch.ucworkspace.com/support/solutions/articles/3000053152/
http://www.tenforums.com/tutorials/3539-sign-user-account-automatically-windows-10-startup.html
http://mashtips.com/set-auto-login-windows-10/
http://support.microsoft.com/help/324737/
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"AutoAdminLogon"="1"
;
------End cut & paste here------

* Turn OFF obsolete/deprecated Microsoft proprietary SMB (Server Message Block) 1.0 (SMB1) + CIFS (Common Internet File System)
file sharing support network protocols (which are disabled by default in Windows 8/newer + Windows Server 2012/newer and
replaced with newer SMB versions) due to unpatched security vulnerabilities in Windows 7/newer:
http://arstechnica.com/gadgets/2022/04/microsoft-enters-final-phase-of-disabling-smb1-file-sharing-in-windows-11/
http://docs.microsoft.com/windows-server/storage/file-server/troubleshoot/smbv1-not-installed-by-default-in-windows/
http://woshub.com/how-to-disable-smb-1-0-in-windows-10-server-2016/
http://en.wikipedia.org/wiki/Server_Message_Block
Make sure all SMB1/CIFS protocols are disabled in Optional Windows Features Manager: Start -> Run... [hold WinKey + press R]
-> make sure it states "This task will be created with administrative privileges." -> type:
OptionalFeatures.exe
-> press Enter -> scroll down to SMB 1.0/CIFS File Sharing Support -> click all [+] signs to open submenu list -> make sure to
UNcheck all (3) square boxes -> click OK button.
Or in PowerShell: right-click PowerShell shortcut or C:\WINDOWS\System32\WindowsPowerShell\v1.0\PowerShell.exe [default
location] -> Run as Administrator -> run 1 of these commands -> press Enter after each line:
Uninstall-WindowsFeature 鋒ame FS-SMB1 乏emove
OR:
Disable-WindowsOptionalFeature -Online -FeatureName SMB1Protocol -Remove
Verify to make sure all SMB1 protocols are disabled: from a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE):
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter:
DISM.EXE /online /Get-Features /format:table | find "SMB1Protocol"
-> make sure all (4) messages show "Disabled".

* Hide (currently) disabled/disconnected/empty/inactive/orphan/phantom/remote/removed/unavailable drives/partitions/volumes
in Explorer, File Manager (FM) + 3rd party replacements/similar tools and turn OFF "Could not reconnect all network drives"
notification:
http://www.sevenforums.com/tutorials/6969-drives-hide-show-empty-drives-computer-folder.html
http://www.tenforums.com/tutorials/145379-disable-could-not-reconnect-all-network-drives-notification-windows.html
http://www.winaero.com/blog/disable-could-not-reconnect-all-network-drives-notification-in-windows-10/
MDGx "Tweaked + Customized File Manager (FM) 32-bit" section in SOFTWARE.TXT (included):
http://www.mdgx.com/xptoy.htm#FMNT
Microsoft open source original File Manager (FM) 32-bit + 64-bit:
http://www.mdgx.com/xptoy.htm#FMMS
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced]
"HideDrivesWithNoMedia"=-
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced]
"HideDrivesWithNoMedia"=dword:1
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced]
"HideDrivesWithNoMedia"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\NetworkProvider]
"RestoreConnection"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\NetworkProvider]
"RestoreConnection"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Control\NetworkProvider]
"RestoreConnection"=dword:0
;
------End cut & paste here------

* Show (previously) disabled/disconnected/empty/inactive/orphan/phantom/remote/removed/unavailable drives/partitions/volumes
in Explorer, File Manager (FM) + 3rd party replacements/similar tools and turn ON "Could not reconnect all network drives"
notification:
http://www.sevenforums.com/tutorials/6969-drives-hide-show-empty-drives-computer-folder.html
http://www.tenforums.com/tutorials/145379-disable-could-not-reconnect-all-network-drives-notification-windows.html
http://www.winaero.com/blog/disable-could-not-reconnect-all-network-drives-notification-in-windows-10/
MDGx "Tweaked + Customized File Manager (FM) 32-bit" section in SOFTWARE.TXT (included):
http://www.mdgx.com/xptoy.htm#FMNT
Microsoft open source original File Manager (FM) 32-bit + 64-bit:
http://www.mdgx.com/xptoy.htm#FMMS
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced]
"HideDrivesWithNoMedia"=-
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced]
"HideDrivesWithNoMedia"=dword:0
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced]
"HideDrivesWithNoMedia"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\NetworkProvider]
"RestoreConnection"=-
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\NetworkProvider]
"RestoreConnection"=-
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Control\NetworkProvider]
"RestoreConnection"=-
;
------End cut & paste here------

* UNhide file/folder (directory)/protocol/shortcut/link extensions in Windows NTx (examples):
http://www.winaero.com/blog/show-hide-file-extensions-windows-10/
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Directory]
"AlwaysShowExt"=""
"EditFlags"=hex:01
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Drive]
"AlwaysShowExt"=""
"EditFlags"=hex:01
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Folder]
"AlwaysShowExt"=""
"EditFlags"=hex:01
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\*]
"AlwaysShowExt"=""
"EditFlags"=hex:01
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\exefile]
"AlwaysShowExt"=""
"EditFlags"=hex:01
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\dllfile]
"AlwaysShowExt"=""
"EditFlags"=hex:01
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{450D8FBA-AD25-11D0-98A8-0800361B1103}]
"AlwaysShowExt"=""
"EditFlags"=hex:01
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}]
"AlwaysShowExt"=""
"EditFlags"=hex:01
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{59031A47-3F72-44A7-89C5-5595FE6B30EE}]
"AlwaysShowExt"=""
"EditFlags"=hex:01
;
------End cut & paste here------

* Reorder files + folders names alphabetically by logical numeric value in Windows XP/newer:
http://www.tenforums.com/tutorials/91417-enable-disable-numerical-sorting-file-explorer-windows-10-a.html
http://admx.help/?Category=Windows_10_2016&Policy=Microsoft.Policies.WindowsExplorer::NoStrCmpLogical
http://web.archive.org/web/20150226105024/http://support.microsoft.com/kb/319827/
See also "SYSTEM RESTRICTIONS" chapter in REGISTRY.TXT (included):
http://www.mdgx.com/newtip9.htm#RESTRICT
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer]
"NoStrCmpLogical"=dword:1
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]
"NoStrCmpLogical"=dword:1
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]
"NoStrCmpLogical"=dword:1
;
------End cut & paste here------

* Turn OFF boot/logon/startup/launch sounds in Windows 7/newer:
http://www.tenforums.com/tutorials/61302-turn-off-startup-sound-windows-10-a.html
Winaero Tweaker 32-bit + 64-bit for Windows 7/8/8.1/10/11 [select Portable at install time!]:
http://www.winaero.com/winaero-tweaker/
Download:
http://www.winaero.com/download-winaero-tweaker/
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\LogonUI\BootAnimation]
"DisableStartupSound"=dword:1
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Authentication\LogonUI\BootAnimation]
"DisableStartupSound"=dword:1
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Authentication\LogonUI\BootAnimation]
"DisableStartupSound"=dword:1
;
------End cut & paste here------

* Turn OFF *all* desktop/explorer/system/event/notification/app/program/etc sounds + rename/delete the "Media"
directory/folder in Windows 7/newer:
http://www.howtogeek.com/howto/windows-vista/turn-off-windows-explorer-click-sounds-in-windows-vista/
http://www.eightforums.com/threads/delete-windows-7-sound-schemes.79731/
http://freewindowsvistatutorials.com/whereIsSoundFolderLocationSystemSoundsMediaInWindows7.php
1. 1st backup these 2 registry subkeys + save them as REG files (see examples below): HKCU (Current User) "AppEvents" + HKU
.DEFAULT (Default User) "AppEvents": right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run these commands -> press
Enter after each line (example):
REG.EXE EXPORT "HKCU\AppEvents" HKCU_AppEvents.reg /y
REG.EXE EXPORT "HKU\.DEFAULT\AppEvents" HKU_DEF_AppEvents.reg /y
To restore original sounds events from registry files above (assuming you're running them from within their location,
otherwise you must add full path: drive letter + directory/folder name in front of them): right-click CMD shortcut/CMD.EXE ->
Run as Administrator -> run these commands -> press Enter after each line (example):
REG.EXE IMPORT HKCU_AppEvents.reg /y
REG.EXE IMPORT HKU_DEF_AppEvents.reg /y
2. Run Registry file below:
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[-HKEY_CURRENT_USER\AppEvents]
[-HKEY_USERS\.DEFAULT\AppEvents]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\LogonUI\BootAnimation]
"DisableStartupSound"=dword:1
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Authentication\LogonUI\BootAnimation]
"DisableStartupSound"=dword:1
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Authentication\LogonUI\BootAnimation]
"DisableStartupSound"=dword:1
;
------End cut & paste here------
3. Optional: if you plan never to use any Windows system events sounds in the future, you can safely rename or delete (to save
a little bit of space) [but back it up 1st!] the "Media" Windows subfolder which holds all Windows sound files (.mid, .rmi,
.wav): right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run these commands -> press Enter after each line (example):
- to rename it:
TAKEOWN.EXE /f "%WinDir%\Media" /r /d y
ICACLS.EXE "%WinDir%\Media" /grant:R Everyone:F /t /c /q
TASKKILL.EXE /IM TrustedInstaller.exe /F /T
REN "%WinDir%\Media" "Media.BKP"
- to delete it:
TAKEOWN.EXE /f "%WinDir%\Media" /r /d y
ICACLS.EXE "%WinDir%\Media" /grant:R Everyone:F /t /c /q
TASKKILL.EXE /IM TrustedInstaller.exe /F /T
RUNDLL32.EXE ADVPACK.DLL,DelNodeRunDLL32 "%WinDir%\Media"
OR instead of RUNDLL32.EXE command above:
RMDIR /S /Q "%WinDir%\Media"
ICACLS.EXE:
http://www.ss64.com/nt/icacls.html
http://docs.microsoft.com/windows-server/administration/windows-commands/icacls/
http://adamtheautomator.com/icacls/
TAKEOWN.EXE:
http://www.ss64.com/nt/takeown.html
http://docs.microsoft.com/windows-server/administration/windows-commands/takeown/

* Add app(lication)/program manifest support for all Windows Vista/newer editions/versions to partially
compatible/incompatible, designed for previous operating systems (OSes), older, partially compatible/incompatible +
supported/unsupported EXEcutables (.exe):
http://learn.microsoft.com/windows/win32/sysinfo/targeting-your-application-at-windows-8-1/
http://learn.microsoft.com/windows/compatibility/application-executable-manifest/
http://learn.microsoft.com/windows/win32/sbscs/application-manifests/
http://learn.microsoft.com/windows/win32/win7appqual/compatibility---application-manifest/
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create (if absent) or edit/modify (if already present) the .manifest file correspondent to your .exe file, which must
reside inside same directory/folder as your .exe file, and which should contain the lines between Cut & Paste delimiters
below the opening "" or "" tag (if present), and above the closing ""
tag (if present) -> save it as plain text/ASCII file (Encode: -> ANSI) with the same file name to match your executable
(.exe) file name, and followed by the manifest (.manifest) file extension (example): if executable (.exe) file is
"winfile.exe", its corresponding manifest (.manifest) file must be "winfile.exe.manifest" (case insensitive):
-----Begin cut & paste here-----














------End cut & paste here------
In this example I have used MDGx Tweaked + Customized File Manager (FM = WINFILE.EXE) 32-bit:
http://www.mdgx.com/xptoy.htm#FMNT
More info:
http://www.mdgx.com/fmnt32/fmnt32.php
Go to this page
http://www.mdgx.com/fmnt32/
-> scroll all the way down to WINFILE.EXE.manifest -> right-click its URL link
http://www.mdgx.com/fmnt32/WINFILE.EXE.manifest
-> Save link as... -> go to your web browser Downloads tab/window [if using Chromium/Chrome/a Chromium fork/variant go to
chrome://downloads/ or if using Firefox/a Firefox fork/variant go to about:downloads] -> click Keep (if prompted to do so)
-> click Keep anyway (if prompted to do so) -> go to your Downloads directory/folder [default is %UserProfile%\Downloads or
C:\Users\%UserName%\Downloads = where %UserName% is your user name] -> use Notepad/similar/better free(ware) plain
text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to view saved WINFILE.EXE.manifest (this example).

* MDGx "Group Policy Editor (GPE) fixes + tools (free)" section in SOFTWARE.TXT (included):
http://www.mdgx.com/xptoy.htm#GPO

* Useful, little known, hidden, undocumented, unknown registry + system hacks + tweaks to fix, improve + customize
Windows 7/newer:
http://forums.mydigitallife.net/forums/mdl-projects-and-applications.34/
http://www.howtogeek.com/howto/5391/
http://www.techradar.com/us/news/computing-components/643861/
http://www.thecustomizewindows.com/2011/08/windows-7-right-click-menu-tipstricks-and-tutorials-index/
http://www.howtogeek.com/77614/best-windows-7-start-menu-and-taskbar-tips-and-tricks/
http://www.edy.es/dev/docs/windows-tricks/
http://www.majorgeeks.com/files/details/majorgeeks_registry_tweaks.html
http://github.com/MajorGeek/MajorGeeks-Windows-Tweaks/
http://www.majorgeeks.com/mg/sortdate/majorgeeks_registry_batch_file_tweaks.html
http://www.sevenforums.com/customization/23122-remove-favorites-libraries-homegroup-my-folder-2.html
http://www.helpdeskgeek.com/how-to/disable-snap-assist-in-windows-7-8-10/
http://www.thesystemmaster.com/windows7_annoyances.php
http://windowsreport.com/tag/network/
http://www.isoftspot.com/
http://www.thewindowsclub.com/
http://www.winaero.com/blog/category/windows-7/
http://www.winaero.com/
http://www.mydigitallife.info/
http://www.sevenforums.com/
http://www.door2windows.com/download/
http://www.howtogeek.com/
http://www.tweaks.com/windows-7/
http://www.tweakhound.com/tweaking-windows-7/
http://www.sourcedaddy.com/windows-7/
http://www.askvg.com/category/windows-seven/
http://www.tweaks.com/
http://www.ghacks.net/category/windows/
http://www.blogsdna.com/
http://www.techfeb.com/category/windows-7/
http://www.instantfundas.com/search/label/Windows%207
http://www.webtlk.com/list-of-how-to-windows-7/
http://www.techdows.com/
http://www.techsupportalert.com/view/tips/
http://www.winbeginners.com/
http://www.commandwindows.com/

* Windows 7 Transformation Packs + Themes:
http://winempyrean.net/category/shell-styles/
http://winempyrean.net/jarvis/
http://www.deviantart.com/#/art/Jarvis-Windows-7-Transformation-Pack-397222303

* Windows 7 Tutorials:
http://sites.google.com/a/rmprepusb.com/www/tutorials/
http://www.7tutorials.com/
http://unlockforus.blogspot.com/2008/11/tutorials.html
http://www.winhelponline.com/blog/
http://sector-seven.net/
http://www.technixupdate.com/tag/windows-7/

* Windows 7 system requirements:
http://support.microsoft.com/help/10737/
http://en.wikipedia.org/wiki/Windows_7#System_requirements

* Coulda... Shoulda... Woulda...
Proper core/system operation, functionality, features +/- programs/tools/games/etc
abandoned/banned/cancelled/changed/deprecated/discontinued/limited/reduced/removed by Microsoft in/from Windows 7 and how to
adapt/fix/port/repair/restore/work around/bring back (some of) them:
- Wikipedia: List of features removed/missing in Windows 7:
http://en.wikipedia.org/wiki/List_of_features_removed_in_Windows_7
- MSFN: List of software that doesn't support Windows 7 [+ how to make them work]:
http://www.msfn.org/board/index.php?showtopic=181987
- Techulator: Disadvantages of Windows 7:
http://www.techulator.com/resources/3311-Disadvantages-windows.aspx
- OS Today: What are the disadvantages of Windows 7?:
http://ostoday.org/windows/quick-answer-what-are-the-disadvantages-of-windows-7.html
- Wikipedia: Criticism of Windows:
http://en.wikipedia.org/wiki/Criticism_of_Microsoft_Windows
Get free(ware) adapted/fixed/old/ported/repaired/restored apps/programs, games, screen savers + tools -> TOOLS.TXT
(included):
http://www.mdgx.com/tools.php
http://www.mdgx.com/TOOLS.TXT
______________________________________________________________________________



Updates/(Hot)Fixes/Patches + Windows Update (WU)



* NOTE:
Microsoft Updates/Upgrades/Service Packs (SPs)/(Hot)Fixes/Patches/Drivers/etc listed here are for United States (US) English
[en-US] Windows NTx Operating Systems (OSes) 32-bit (x86) + 64-bit (x64) builds/editions/releases/versions.
See Microsoft web pages for information how to download Windows updates in other languages.
http://www.science.co.il/language/Locale-codes.php
Microsoft Updates Catalog lists Windows Updates (WU) in all available languages:
http://www.catalog.update.microsoft.com/search.aspx?q=Windows%207%20Update

* Must uninstall Windows 7/7 SP1 Updates/Upgrades/(Hot)Fixes/Patches/etc which expose your computer(s) to:
- intrusion/invasion of privacy,
- telemetry snooping ("phone home"),
- data collection/logging,
- diagnostic tracking,
- (geo)tracking,
- "customer experience",
- unwanted "offers",
- spyware,
- ad(vertisment)s/adware,
- promotions,
- forced (without your knowledge, behind your back!) upgrade to Windows 10 (GWX), among others:
http://www.mdgx.com/xptoy.htm#10BLK
http://web.archive.org/web/20180320070137/http://www.privacytools.io/#win10
http://gist.github.com/xvitaly/eafa75ed2cb79b3bd4e9/
http://www.addictivetips.com/windows-tips/a-complete-list-of-all-updates-you-should-uninstall-to-block-windows-10/
http://www.sevenforums.com/installation-setup/413301-reinstall-win7-what-updates-avoid-telemetry-winx-preparation-3.html
http://www.ghacks.net/2019/01/15/better-check-your-windows-7-pc-for-get-windows-10-gwx-traces/
Similar tools:
http://www.majorgeeks.com/mg/sortname/windows_10_fixes.html
July 2019 Windows 7 "security only" update installs telemetry snooping:
http://www.computerworld.com/article/3408496/new-windows-7-security-only-update-installs-telemetrysnooping-uh-feature.html
Block Telemetry in Windows 7/7 SP1 and 8.1:
http://www.ghacks.net/2017/02/11/blocking-telemetry-in-windows-7-and-8-1/
All Microsoft Updates/Upgrades/(Hot)Fixes/Patches/etc listed at the web sites above should be uninstalled:
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text BATch (.bat) or CoMmanD (.cmd) script file containing the lines between Cut & Paste delimiters below
-> save it as plain text/ASCII file (Encode: -> ANSI) with the BAT (.bat) or CMD (.cmd) extension -> right-click it ->
Run as Administrator -> wait for completion.
-----Begin cut & paste here-----
@ECHO OFF
IF NOT "%OS%"=="Windows_NT" GOTO END
IF NOT EXIST %WinDir%\SYSTEM32\WUSA.EXE GOTO END
:: KB4507456: Security Only Update:
START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:4507456 /quiet /norestart
:: KB971033: Windows Activation Update:
START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:971033 /quiet /norestart
:: KB2952664: Get Windows 10 (GWX) Assistant:
START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:2952664 /quiet /norestart
:: KB2990214: Get Windows 10 (GWX):
START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:2990214 /quiet /norestart
:: KB3012973: Upgrade to Windows 10 Pro:
START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:3012973 /quiet /norestart
:: KB3021917: Performance Improvements Update:
START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:3021917 /quiet /norestart
:: KB3022345: Customer Experience and Diagnostic Telemetry Update:
START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:3022345 /quiet /norestart
:: KB3035583: Get Windows 10 (GWX) App:
START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:3035583 /quiet /norestart
:: KB3044374: Get Windows 10 (GWX) Update:
START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:3044374 /quiet /norestart
:: KB3068708: Customer Experience and Diagnostic Telemetry Update:
START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:3068708 /quiet /norestart
:: KB3075249: Telemetry Update:
START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:3075249 /quiet /norestart
:: KB3080149: Customer Experience and Diagnostic Telemetry Update:
START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:3080149 /quiet /norestart
:: KB3112343: Windows Update Client (WUC):
START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:3112343 /quiet /norestart
:: KB3083711: Windows Update Client (WUC):
START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:3083711 /quiet /norestart
:: KB3083325: Windows Update Client (WUC):
START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:3083325 /quiet /norestart
:: KB3075853: Windows Update Client (WUC):
START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:3075853 /quiet /norestart
:: KB3072318: OOBE Update to upgrade to Windows 10:
START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:3072318 /quiet /norestart
:: KB3065988: Windows Update Client (WUC):
START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:3065988 /quiet /norestart
:: KB3064683: OOBE Update to upgrade to Windows 10:
START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:3064683 /quiet /norestart
:: KB3058168: Activate Windows 10 from Hosts Update:
START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:3058168 /quiet /norestart
:: KB3050267: Windows Update Client (WUC):
START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:3050267 /quiet /norestart
:: KB2976978: Compatibility Update:
START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:2976978 /quiet /norestart
:: KB2977759: Compatibility Update:
START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:2977759 /quiet /norestart
:: KB3081954: Work Folders Update:
START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:3081954 /quiet /norestart
:: KB3123862: Upgrade Capability Update:
START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:3123862 /quiet /norestart
:: KB3138612: Windows Update Client (WUC):
START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:3138612 /quiet /norestart
:: KB3172605: July 2016 Update Rollup:
START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:3172605 /quiet /norestart
TIMEOUT /T 5 /NOBREAK
:END
EXIT
------End cut & paste here------
Restart/reboot.

* Windows Updates (WU) Catalog, Listings + Guides:
- Windows 7/7 SP1 Updates Catalog:
http://www.catalog.update.microsoft.com/search.aspx?q=%22Windows%207%22
Download desired/needed Update(s)/Fix(es)/Patch(es) to your local disk/media/storage device -> right-click each
.CAB/.EXE/.MSI/.MSP/.MSU file -> Run as Administrator -> follow on screen instructions -> restart/reboot (if prompted).
- ERPMan's Windows 7 System Updates Page:
http://erpman1.tripod.com/win7upd.html
- ERPMan's Windows 7 X64 & Server 2008 R2 X64 System Updates:
http://erpman1.tripod.com/w7x64upd.html
- THFS: List of Windows 7 + 7 SP1 Updates/(Hot)Fixes/Patches:
http://thehotfixshare.net/board/?/search/&q=%22Windows%207%22&type=downloads_file
- SevenForums: Windows 7/7 SP1 News:
http://www.sevenforums.com/news/
- Microsoft Security Advisories + Bulletins:
http://docs.microsoft.com/security-updates/
- Install Manually Offline CAB (.cab), EXE (.exe) + MSU (.msu) Updates:
http://woshub.com/manually-install-cab-msu-updates-windows/
- Windows 7/7 SP1 Updates/(Hot)Fixes/Patches History:
http://support.microsoft.com/help/4009469/
- Every Last Thing About Windows Update (WU) for Windows 7/newer:
http://www.makeuseof.com/tag/how-to-find-out-every-last-thing-about-windows-update/
- Unofficial Patch for Windows 7/7 SP1 Extended Security Updates (ESU) [German]:
http://www.deskmodder.de/blog/2019/12/07/windows-7-erweiterte-sicherheitsupdates-esu-erhalten-wird-moeglich-sein/
Machine translation by Google Translate [English]:
https://www-deskmodder-de.translate.goog/blog/2019/12/07/windows-7-erweiterte-sicherheitsupdates-esu-erhalten-wird-moeglich-sein/?_x_tr_sl=de&_x_tr_tl=en

* Windows 7/8/8.1/10 32-bit + 64-bit Updates disable Intel Broadwell + Haswell CPUs Meltdown/Spectre Variants "Branch target
injection vulnerability" errors/reboots after Intel CPU firmware update(s):
- MSKB KB4090007 Fix 32-bit + 64-bit for Windows 10/2016 32-bit (x86) + 64-bit (x64):
http://support.microsoft.com/help/4090007/
Microsoft Catalog Files for KB4090007 Update:
http://www.catalog.update.microsoft.com/search.aspx?q=KB4090007
- MSKB KB4078130 Fix 32-bit + 64-bit for Windows 7/2008 R2/8/20012/8.1/2012 R2/10/2016 32-bit (x86) + 64-bit (x64):
http://support.microsoft.com/help/4078130/
Microsoft Catalog File for KB4078130 Update:
http://www.catalog.update.microsoft.com/search.aspx?q=KB4078130
File:
http://download.windowsupdate.com/c/msdownload/update/software/crup/2018/01/kb4078130_b86f0bf2dc0866a0e117ed2d4a5302fab0493a7b.exe
Intel CPUs Updates:
http://newsroom.intel.com/news/intel-security-issue-update-addressing-reboot-issues/
Intel CPUs Info [PDF]:
http://newsroom.intel.com/wp-content/uploads/sites/11/2018/04/microcode-update-guidance.pdf
InSpectre for Windows 10/11 detects operating system (OS) ability to prevent Meltdown + Spectre vulnerability attacks
against Intel Broadwell + Haswell CPUs + necessity of installing respective update(s):
http://www.grc.com/inspectre.htm
File:
http://www.grc.com/files/InSpectre.exe

* Non-Volatile Memory Express (NVMe) native Drivers for Windows 7 SP1 32-bit (x86) + 64-bit (x64):
http://support.microsoft.com/help/2990941/
- NVMe Drivers 64-bit for Windows 7 SP1 64-bit (x64) [7 MB]:
http://conduant.zendesk.com/hc/en-us/articles/217205998-PXIe-DM-4M-2-Windows-Driver/
http://pcsupport.lenovo.com/us/en/downloads/ds105871
- NVMe Drivers 32-bit for Windows 7 SP1 32-bit (x86) [6 MB]:
http://conduant.zendesk.com/hc/en-us/articles/217205998-PXIe-DM-4M-2-Windows-Driver/
http://pcsupport.lenovo.com/us/en/downloads/ds105871
NVMe Drivers:
http://nvmexpress.org/drivers/windowsdrivers/
More info:
http://www.win-raid.com/t29f25-Recommended-AHCI-RAID-and-NVMe-Drivers.html
NVMe:
http://en.wikipedia.org/wiki/NVM_Express

* Required Windows 7 64-bit (x64) Updates for Thorium 64-bit web browser enhanced hardware + software compatibility/support:
http://thorium.rocks/win7
- Windows 7 SP1/2008 R2 64-bit (x64) Servicing Stack Update 2019 KB4490628:
http://support.microsoft.com/help/4490628/
Download:
http://catalog.update.microsoft.com/search.aspx?q=4490628
- Windows 7 SP1/2008 R2 64-bit (x64) SHA-2 Code Signing Support Update 2019 KB4474419:
http://support.microsoft.com/help/4474419/
Download:
http://catalog.update.microsoft.com/search.aspx?q=4474419
Thorium [Th90] (Chromium fork) 64-bit hardware optimized web browser for Windows 7/newer 64-bit (x64) based on Chromium
code:
http://thorium.rocks/
Thorium repository:
http://github.com/Alex313031/Thorium-Win/
Thorium latest build [ZIP = full, Portable]:
http://github.com/Alex313031/Thorium-Win/releases/latest/
Thorium Requirements:
- Multicore CPU: minimum Intel Core 2nd gen or AMD FX with built-in SSE4 (Streaming SIMD Extensions 4), AVX (Advanced Vector
EXtensions) + AES (Advanced Encryption Standard) enhancements/multimedia extensions/instructions.
- Graphics video controller with 3D rendering + OpenGL capabilities.
Thorium Optimizations:
http://thorium.rocks/optimizations
Get a modern [see "Chromium + Chrome" topic in SOFTWARE.TXT (included)]
http://www.mdgx.com/nettoys.htm#CHR
and secure
http://www.mdgx.com/nettoys.htm#PRV
web browser.

* Windows 7 SP1 Remote Desktop Protocol (RDP) Remote Desktop Services (RDS) Remote Code (BlueKeep cryptocurrency miner)
Vulnerability Fix 32-bit + 64-bit for Windows 7 SP1 32-bit (x86) + 64-bit (x64):
http://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2019-0708
RDP/RDS Fixes:
http://www.catalog.update.microsoft.com/search.aspx?q=KB4499175
- RDP/RDS Fix 64-bit for Windows 7 SP1 64-bit (x64) [100 MB]:
http://download.windowsupdate.com/d/msdownload/update/software/secu/2019/05/windows6.1-kb4499175-x64_3704acfff45ddf163d8049683d5a3b75e49b58cb.msu
- RDP/RDS Fix 32-bit for Windows 7 SP1 32-bit (x86) [73 MB]:
http://download.windowsupdate.com/d/msdownload/update/software/secu/2019/05/windows6.1-kb4499175-x86_6f1319c32d5bc4caf2058ae8ff40789ab10bf41b.msu
More info:
http://support.microsoft.com/help/4499175/
Prevent BlueKeep cryptocurrency miner worm -> update RDS (CVE-2019-0708):
http://msrc-blog.microsoft.com/2019/05/14/prevent-a-worm-by-updating-remote-desktop-services-cve-2019-0708/

* Windows 7 SP1 System Update Readiness (SUR) tool 32-bit + 64-bit for Windows 7 SP1 32-bit (x86) + 64-bit (x64):
http://support.microsoft.com/help/947821/
- SUR 64-bit for Windows 7 SP1 64-bit (x64):
http://download.microsoft.com/download/E/8/D/E8DAA970-1036-447F-B5EA-716D4BA70EC5/Windows6.1-KB947821-v34-x64.msu
- SUR 32-bit for Windows 7 SP1 32-bit (x86):
http://download.microsoft.com/download/4/7/A/47A0F7B9-1F0F-41B0-AA42-00FD16337268/Windows6.1-KB947821-v34-x86.msu
Windows Update Errors in Windows Vista/2008/7 Fixed by System Update Readiness (SUR) tool:
http://support.microsoft.com/help/947821/
Fix Windows Update Error 00009C48 in Windows 7:
http://www.sevenforums.com/windows-updates-activation/213912-i-cant-update-windows-due-windows-up-date-error-00009c48.html

* Windows 7 SP1 Servicing Stack Update (SSU) 32-bit + 64-bit for Windows 7 SP1 32-bit (x86) + 64-bit (x64):
http://support.microsoft.com/help/3020369/
- SSU 64-bit for Windows 7 SP1 64-bit (x64) [10 MB]:
http://download.microsoft.com/download/5/D/0/5D0821EB-A92D-4CA2-9020-EC41D56B074F/Windows6.1-KB3020369-x64.msu
- SSU 32-bit for Windows 7 SP1 32-bit (x86) [8 MB]:
http://download.microsoft.com/download/C/0/8/C0823F43-BFE9-4147-9B0A-35769CBBE6B0/Windows6.1-KB3020369-x86.msu

* Windows 7 SP1 Monthly Rollup Update (MRU) 32-bit + 64-bit for Windows 7 SP1 32-bit (x86) + 64-bit (x64):
http://support.microsoft.com/help/4093118/
- MRU 64-bit for Windows 7 SP1 64-bit (x64) [219 MB]:
http://download.windowsupdate.com/d/msdownload/update/software/secu/2018/04/windows6.1-kb4093118-x64_5ea1778b896fcc764e0db8da7d094f62dc98d82f.msu
- MRU 32-bit for Windows 7 SP1 32-bit (x86) [131 MB]:
http://download.windowsupdate.com/c/msdownload/update/software/secu/2018/04/windows6.1-kb4093118-x86_2bbb81cd98fb80623b7afa3dcb2da73f28322ea3.msu

* Windows 7 SP1 Security Monthly Quality Rollup (SMQR) 32-bit + 64-bit for Windows 7 SP1 32-bit (x86) + 64-bit (x64):
http://support.microsoft.com/help/4503292/
SMQR Fixes:
http://www.catalog.update.microsoft.com/search.aspx?q=KB3033929
- SMQR 64-bit for Windows 7 SP1 64-bit (x64) [272 MB]:
http://catalog.s.download.windowsupdate.com/d/msdownload/update/software/secu/2019/06/windows6.1-kb4503292-x64_a35bb4ea16d1d529fde9abfe8a0c16e9061f74cd.msu
- SMQR 32-bit for Windows 7 SP1 32-bit (x86) [27 MB]:
http://catalog.s.download.windowsupdate.com/d/msdownload/update/software/secu/2015/02/windows6.1-kb3033929-x86_927e018113fe51250c57029635d46b89bf235920.msu

* Windows 7 SP1 Convenience Rollup Update (CRU) + VNIC.VBS VBScript 32-bit + 64-bit for Windows 7 SP1 32-bit (x86) + 64-bit (x64):
http://support.microsoft.com/help/3125574/
- CRU 64-bit for Windows 7 SP1 64-bit (x64) [477 MB]:
http://download.windowsupdate.com/d/msdownload/update/software/updt/2016/05/windows6.1-kb3125574-v4-x64_2dafb1d203c8964239af3048b5dd4b1264cd93b9.msu
- CRU 32-bit for Windows 7 SP1 32-bit (x86) [317 MB]:
http://download.windowsupdate.com/d/msdownload/update/software/updt/2016/05/windows6.1-kb3125574-v4-x86_ba1ff5537312561795cc04db0b02fbb0a74b2cbd.msu

* Windows 7 SP1 Security Quality Rollups (SQR) 32-bit + 64-bit for Windows 7 SP1 32-bit (x86) + 64-bit (x64):
http://www.catalog.update.microsoft.com/search.aspx?q=Security+Quality+Rollup+Windows+7+SP1

* Windows 7 SP1 Stop Errors with Multiple CPUs TCPIP.SYS Hotfix 32-bit + 64-bit for Windows 7 SP1 32-bit (x86) + 64-bit (x64):
http://support.microsoft.com/help/2905412/
Hotfix [request links in e-mail]:
http://support.microsoft.com/hotfix/kbhotfix?kbnum=2905412&kbln=en-us
- TCPIP.SYS Hotfix 64-bit for Windows 7 SP1 64-bit (x64):
http://hotfixv4.trafficmanager.net/Windows%207/Windows%20Server2008%20R2%20SP1/sp2/Fix476701/7600/free/470223_intl_x64_zip.exe
- TCPIP.SYS Hotfix 32-bit for Windows 7 SP1 32-bit (x86):
http://hotfixv4.trafficmanager.net/Windows%207/Windows%20Server2008%20R2%20SP1/sp2/Fix476701/7600/free/470191_intl_i386_zip.exe
All TCPIP.SYS Hotfixes for Windows 2000/newer:
http://www.mskbfiles.com/tcpip.sys.php

* Windows 7 Stop Errors with Large SATA HDD MSAHCI.SYS Hotfix:
http://support.microsoft.com/help/977178/
Hotfix [request links in e-mail]:
http://support.microsoft.com/hotfix/KBHotfix.aspx?kbnum=977178&kbln=en-us
- SATA HDD Hotfix 64-bit:
http://hotfixv4.trafficmanager.net/Windows%207/WindowsServer%202008%20R2/sp1/Fix306215/7600/free/404474_intl_x64_zip.exe
- SATA HDD Hotfix 32-bit:
http://hotfixv4.trafficmanager.net/Windows%207/WindowsServer%202008%20R2/sp1/Fix306215/7600/free/404472_intl_i386_zip.exe

* Windows 7 Registry Hive Ntkrnlpa.exe + Ntoskrnl.exe Hotfix:
http://support.microsoft.com/help/983544/
Hotfix [request links in e-mail]:
http://support.microsoft.com/en-us/hotfix/kbhotfix?kbnum=983544&kbln=en-US
- Registry Hive Hotfix 64-bit:
http://hotfixv4.trafficmanager.net/Windows%207/WindowsServer%202008%20R2/sp1/Fix322114/7600/free/413807_intl_x64_zip.exe
- Registry Hive Hotfix 32-bit:
http://hotfixv4.trafficmanager.net/Windows%207/WindowsServer%202008%20R2/sp1/Fix322114/7600/free/413805_intl_i386_zip.exe

* Windows 7/8/8.1 DirectX 9.0c (DX9c)/10.0 (DX10)/11.x (DX11) 32-bit + 64-bit:
http://www.mdgx.com/dx.htm#DX9

* Windows 7 SP1 DirectX (DX) Graphics Update:
http://support.microsoft.com/help/2028560/
- DX Graphics 64-bit:
http://download.microsoft.com/download/F/1/A/F1A02F0C-0F64-4E87-9BC1-EFA8CDE464FE/Windows6.1-KB2028560-v2-x64.msu
- DX Graphics 32-bit:
http://download.microsoft.com/download/9/7/6/976634BE-DC4D-4B7B-9567-209811D7AF14/Windows6.1-KB2028560-v2-x86.msu

* Windows 7 SP1 DirectX (DX) Direct3D (D3D) App Crash Full Screen Hotfix:
http://support.microsoft.com/help/2400157/
Hotfix [request links in e-mail]:
http://support.microsoft.com/en-us/hotfix/kbhotfix?kbnum=2400157&kbln=en-US
- DX D3D Hotfix 64-bit:
http://hotfixv4.trafficmanager.net/Windows%207/Windows%20Server2008%20R2%20SP1/sp2/Fix347381/7600/free/425610_intl_x64_zip.exe
- DX D3D Hotfix 32-bit:
http://hotfixv4.trafficmanager.net/Windows%207/Windows%20Server2008%20R2%20SP1/sp2/Fix347381/7600/free/425608_intl_i386_zip.exe

* Windows 7 SP1 Performance and Functionality Update (FPU):
http://support.microsoft.com/help/2454826/
- FPU 64-bit:
http://download.microsoft.com/download/D/B/D/DBD62263-2627-49CB-B675-AA1601EBE0BD/Windows6.1-KB2454826-v2-x64.msu
- FPU 32-bit:
http://download.microsoft.com/download/5/E/4/5E404378-9A5D-41AB-AFBA-1AC04F3B2A13/Windows6.1-KB2454826-v2-x86.msu

* Windows Vista/newer Windows Help (.HLP) + Compiled HTML Help (.CHM) WinHlp32.exe Fix:
http://www.mdgx.com/add.htm#HHU

* USBView (USBView.exe):
http://docs.microsoft.com/windows-hardware/drivers/debugger/usbview/
Available as part of Windows 10 SDK for Windows 7 SP1/8/8.1/10:
http://developer.microsoft.com/windows/downloads/windows-10-sdk/
SETUP ONLY:
http://download.microsoft.com/download/8/C/3/8C37C5CE-C6B9-4CC8-8B5F-149A9C976035/windowssdk/winsdksetup.exe
Requires Universal C Runtime Update for Windows 7 SP1/8/8.1:
http://support.microsoft.com/help/2999226/
USBView.exe installed in:
- 64-bit Windows OS (x64):
C:\Program Files (x86)\Windows Kits\10\Debuggers
- 32-bit Windows OS (x86):
C:\Program Files\Windows Kits\10\Debuggers

* Windows 7 SP1/8/8.1 Universal C Runtime Update:
http://support.microsoft.com/help/2999226/
- Windows 8.1 64-bit:
http://download.microsoft.com/download/9/6/F/96FD0525-3DDF-423D-8845-5F92F4A6883E/Windows8.1-KB2999226-x64.msu
- Windows 8.1 32-bit:
http://download.microsoft.com/download/E/4/6/E4694323-8290-4A08-82DB-81F2EB9452C2/Windows8.1-KB2999226-x86.msu
- Windows 7 SP1 64-bit:
http://download.microsoft.com/download/1/1/5/11565A9A-EA09-4F0A-A57E-520D5D138140/Windows6.1-KB2999226-x64.msu
- Windows 7 SP1 32-bit:
http://download.microsoft.com/download/4/F/E/4FE73868-5EDD-4B47-8B33-CE1BB7B2B16A/Windows6.1-KB2999226-x86.msu

* Windows 7 SP1 Platform Update (PU):
http://support.microsoft.com/help/2670838/
- PU 64-bit:
http://download.microsoft.com/download/1/4/9/14936FE9-4D16-4019-A093-5E00182609EB/Windows6.1-KB2670838-x64.msu
- PU 32-bit:
http://download.microsoft.com/download/1/4/9/14936FE9-4D16-4019-A093-5E00182609EB/Windows6.1-KB2670838-x86.msu

* Windows 7 SP1 0x00000050 Stop Error after installing Platform Update (PU):
http://support.microsoft.com/help/2834140/
- PU Error Fix 64-bit:
http://download.microsoft.com/download/5/A/5/5A548BFE-ADC5-414B-B6BD-E1EC27A8DD80/Windows6.1-KB2834140-v2-x64.msu
- PU Error Fix 32-bit:
http://download.microsoft.com/download/F/1/4/F1424AD7-F754-4B6E-B0DA-151C7CBAE859/Windows6.1-KB2834140-v2-x86.msu

* FixIt! Windows Installer MSI/MSU Errors:
http://support.microsoft.com/help/2438651/
FixIt! problems that block programs from being installed/removed:
http://support.microsoft.com/help/17588/
File:
http://download.microsoft.com/download/7/E/9/7E9188C0-2511-4B01-8B4E-0A641EC2F600/MicrosoftProgram_Install_and_Uninstall.meta.diagcab
Repair MSI (Windows Installer) Automated Scripts:
http://www.tweaking.com/content/page/repair_msi_windows_installer.html
File:
http://www.majorgeeks.com/files/details/tweaking_com_repair_msi_(windows_installer).html
Microsoft .NET Framework (NetFX) Repair Tool:
http://support.microsoft.com/help/2698555/
Download:
http://www.microsoft.com/download/details.aspx?id=30135
File:
http://download.microsoft.com/download/2/B/D/2BDE5459-2225-48B8-830C-AE19CAF038F1/NetFxRepairTool.exe
FixIt! Windows Installer MSI/MSU Install Error 0x8007000D:
http://support.microsoft.com/help/2230957/
File:
http://download.microsoft.com/download/B/3/2/B3259ACE-2BFC-47D3-9627-A21372C1D4B5/MicrosoftFixit50485.msi
Fatal Error 0x80070643: Failed to install .NET/MSI package:
http://www.google.com/search?q=Error+0x80070643%3A+Failed+to+install+MSI+package
http://stackoverflow.com/questions/41720158/
http://www.windows101tricks.com/fix-error-0x80070643-failed-to-install-msi-package/
http://social.msdn.microsoft.com/Forums/vstudio/14ccc37f-d70a-454d-bea2-a0244394ac5e/
http://blogs.msdn.microsoft.com/vsnetsetup/2014/10/
http://support.microsoft.com/help/10164/
http://www.youtube.com/watch?v=0cBg_A5axNI

* FixIt! Disable "Test mode" message:
http://support.microsoft.com/help/2509241/
File:
http://download.microsoft.com/download/C/7/9/C796E9A8-E2F2-4281-9A53-9BF67BB259FC/MicrosoftFixit50756.msi

* Windows 7 Computer Stops Responding Randomly Hotfix:
http://support.microsoft.com/help/2265716/
Hotfix [request links in e-mail]:
http://support.microsoft.com/en-us/hotfix/kbhotfix?kbnum=2265716&kbln=en-us
File:
http://hotfixv4.trafficmanager.net/Windows%207/WindowsServer%202008%20R2/sp1/Fix322397/7600/free/417036_intl_i386_zip.exe

* Windows 7 SP1 Stop Error 0x00000050 in NTKRNLPA.EXE Hotfix:
http://support.microsoft.com/help/2516405/
Hotfix [request links in e-mail]:
http://support.microsoft.com/hotfix/KBHotfix.aspx?kbnum=2516405&kbln=en-us
- NTKRNLPA.EXE Hotfix 64-bit:
http://hotfixv4.trafficmanager.net/Windows%207/Windows%20Server2008%20R2%20SP1/sp2/Fix368160/7600/free/430477_intl_x64_zip.exe
- NTKRNLPA.EXE Hotfix 32-bit:
http://hotfixv4.trafficmanager.net/Windows%207/Windows%20Server2008%20R2%20SP1/sp2/Fix368160/7600/free/430476_intl_i386_zip.exe

* Windows 7 32-bit Variable %UserDomain% not resolved Profprov.dll + Profsvc.dll Hotfix:
http://support.microsoft.com/help/2664408/
Hotfix [request links in e-mail]:
http://support.microsoft.com/en-us/hotfix/kbhotfix?kbnum=2664408&kbln=en-us
File:
http://hotfixv4.trafficmanager.net/Windows%207/Windows%20Server2008%20R2%20SP1/sp2/Fix397022/7600/free/444149_intl_i386_zip.exe

* Windows 7/7 SP1 ROBOCOPY.EXE incorrectly skips files Hotfix:
http://support.microsoft.com/help/2680906/
Hotfix [request links in e-mail]:
http://support.microsoft.com/en-us/Hotfix/KbHotfix?kbnum=2680906&kbln=en-US
- ROBOCOPY.EXE Hotfix 64-bit:
http://hotfixv4.trafficmanager.net/Windows%207/Windows%20Server2008%20R2%20SP1/sp2/Fix396879/7600/free/445248_intl_x64_zip.exe
- ROBOCOPY.EXE Hotfix 32-bit:
http://hotfixv4.trafficmanager.net/Windows%207/Windows%20Server2008%20R2%20SP1/sp2/Fix396879/7600/free/445246_intl_i386_zip.exe

* Windows 7 Audiodg.exe Memory Leak Hotfix:
http://support.microsoft.com/help/981013/
Hotfix [request links in e-mail]:
http://support.microsoft.com/en-us/Hotfix/KbHotfix?kbnum=981013&kbln=en-US
- Audiodg.exe Hotfix 64-bit:
http://hotfixv4.trafficmanager.net/Windows%207/WindowsServer%202008%20R2/sp1/Fix307914/7600/free/409416_intl_x64_zip.exe
- Audiodg.exe Hotfix 32-bit:
http://hotfixv4.trafficmanager.net/Windows%207/WindowsServer%202008%20R2/sp1/Fix307914/7600/free/409414_intl_i386_zip.exe

* Windows 7/7 SP1 defective WaitToKillServiceTimeout Registry value Hotfix:
http://support.microsoft.com/help/2549760/
Hotfix [request links in e-mail]:
http://support.microsoft.com/en-us/Hotfix/KbHotfix?kbnum=2549760&kbln=en-US
- WaitToKillServiceTimeout Hotfix 64-bit:
http://hotfixv4.trafficmanager.net/Windows%207/Windows%20Server2008%20R2%20SP1/sp2/Fix367694/7600/free/435571_intl_x64_zip.exe
- WaitToKillServiceTimeout Hotfix 32-bit:
http://hotfixv4.trafficmanager.net/Windows%207/Windows%20Server2008%20R2%20SP1/sp2/Fix367694/7600/free/435569_intl_i386_zip.exe

* Windows 7/7 SP1 slow Startup (ReadyBoot) with many Restore Points Hotfix:
http://support.microsoft.com/help/2555428/
Hotfix [request links in e-mail]:
http://support.microsoft.com/en-us/Hotfix/KbHotfix?kbnum=2555428&kbln=en-US
- ReadyBoot Hotfix 64-bit:
http://hotfixv4.trafficmanager.net/Windows%207/Windows%20Server2008%20R2%20SP1/sp2/Fix368028/7600/free/433314_intl_x64_zip.exe
- ReadyBoot Hotfix 32-bit:
http://hotfixv4.trafficmanager.net/Windows%207/Windows%20Server2008%20R2%20SP1/sp2/Fix368028/7600/free/433313_intl_i386_zip.exe

* Windows 7/7 SP1 FSUTIL.EXE Hotfix/Update improves compatibility with Advanced Format Disk Drives (AFD):
http://support.microsoft.com/help/982018/
Download:
http://www.catalog.update.microsoft.com/search.aspx?q=KB982018
- FSUTIL.EXE Hotfix 64-bit:
http://download.windowsupdate.com/msdownload/update/software/updt/2011/04/windows6.1-kb982018-v3-x64_7853a1c9c63611e17cd2c923704bf2e924bdfe7b.msu
- FSUTIL.EXE Hotfix 32-bit:
http://download.windowsupdate.com/msdownload/update/software/updt/2011/04/windows6.1-kb982018-v3-x86_b009d84249f14d4eaae7aa522be37c38dd83531b.msu

* Windows 7/7 SP1 "Explorer.exe Server Execution Failed" Error:
http://support.microsoft.com/help/2444677/
- Hotfix 64-bit for Windows 7/7 SP1 64-bit (x64):
http://thehotfixshare.net/board/index.php?showtopic=15505
- Hotfix 32-bit for Windows 7/7 SP1 32-bit (x86):
http://thehotfixshare.net/board/index.php?showtopic=15506
Hotfix [request links in e-mail]:
http://support.microsoft.com/hotfix/kbhotfix?kbnum=2444677&kbln=en-us
Fix "Explorer.exe Server Execution Failed" Error in Windows 7/newer:
http://www.pcerror-fix.com/methods-repair-explorer-exe-server-execution-failed-windows-7-8-10/
http://support.microsoft.com/windows/fix-a-corrupted-user-profile-in-windows-1cf41c18-7ce3-12f9-8e1d-95896661c5c9
http://www.thewindowsclub.com/fix-explorer-exe-server-execution-failed-on-windows-7/
http://michlstechblog.info/blog/windows-explorer-exe-server-execution-failed/

* Microsoft PowerShell 32-bit + 64-bit cross-platform task automation, scripting language, configuration management framework
(.NET compatible) + interactive shell command line interface for Windows XP/newer 32-bit (x86) + 64-bit (x64) (English, free,
open source):
http://github.com/PowerShell/PowerShell/
- PowerShell 32-bit + 64-bit for Windows 7 SP1/newer 32-bit (x86) + 64-bit (x64) [20-100 MB]:
http://github.com/PowerShell/PowerShell/releases/
Windows 7 SP1/8/8.1/2012 32-bit + 64-bit require Windows 10 Universal C Runtime (CRT) 32-bit + 64-bit:
http://www.microsoft.com/download/details.aspx?id=50410
File [8 MB]:
http://download.microsoft.com/download/3/1/1/311C06C1-F162-405C-B538-D9DC3A4007D1/WindowsUCRT.zip
PowerShell Documentation:
http://docs.microsoft.com/powershell/

* Extract files from .MSU installers and install them in automated mode:
http://blogs.msdn.microsoft.com/astebner/2008/03/11/knowledge-base-article-describing-how-to-extract-msu-files-and-automate-installing-them/
http://support.microsoft.com/help/934307/
Extract .MSU contents (example):
EXPAND.EXE -f:* "Q000000.msu" %temp%\Q000000
Then use extracted file (.XML) to install .MSU by using Package Manager (PkgMgr.exe), after renaming .XML file if needed (example):
PKGMGR.EXE /n:%temp%\Q000000\Q000000.xml
Install .MSU directly using Windows Update Standalone Installer (WUSA.exe) (example):
WUSA.EXE "Q000000.MSU" /quiet /norestart

* Toubleshoot: Missing Windows Installer Cache files:
http://www.thewindowsclub.com/missing-windows-installer-cache-files-rebuild

* Fix Windows 7/newer errors/problems generated by executables/programs that canNOT be installed or uninstalled:
http://support.microsoft.com/mats/Program_Install_and_Uninstall/
Troubleshooter:
http://download.microsoft.com/download/7/E/9/7E9188C0-2511-4B01-8B4E-0A641EC2F600/MicrosoftProgram_Install_and_Uninstall.meta.diagcab

* Microsoft FixIt! [ DISCONTINUED ! ]:
http://support.microsoft.com/fixit/
Download ALL FixIt! Files:
http://support.microsoft.com/help/2970908/
Portable Install [ RECOMMENDED ! ]:
http://web.archive.org/web/20200414041622if_/http://download.microsoft.com/download/E/2/3/E237A32D-E0A9-4863-B864-9E820C1C6F9A/MicrosoftFixit-portable.exe

* FixIt! Disable Network Adapter Power Management setting:
http://support.microsoft.com/help/2740020/
File:
http://download.microsoft.com/download/0/A/F/0AFE6980-A813-42DD-86EC-58BF7A6A7B1B/MicrosoftEasyFix55016.msi

* Troubleshoot Intel Network Adapters Power Management:
http://www.intel.com/content/www/us/en/support/articles/000005879/network-and-i-o/wireless-networking.html

* Stop Network Adapter from Getting Disabled in Windows 7:
http://www.addictivetips.com/windows-tips/stop-network-adapter-from-getting-disabled-in-windows-7/

* Turn ON/OFF + Enable/Disable/Restart/Reset Internet/Network Adapter/Connection/Interface/Profile using command line tools:
http://www.action1.com/kb/restarting-the-network-adapter-in-Windows.html
http://www.privateinternetaccess.com/forum/discussion/20296/torrenting-disconnect-s-my-internet/
http://stackoverflow.com/questions/19831023/

* Prevent Windows from Turning OFF USB Devices:
http://www.helpdeskgeek.com/how-to/prevent-windows-from-powering-off-usb-device/

* 5 Tools to Prevent Windows from Sleeping or Turning OFF the Display:
http://www.raymond.cc/blog/dont-sleep-prevent-windows-from-standby-shutdown-hibernate-and-restart/

* Keep Computer/Laptop Awake without Touching the Mouse or Keyboard:
http://www.technorms.com/41354/
Mouse Jiggler fakes mouse cursor movement to prevent power savings iddle detection triggers:
http://github.com/arkane-systems/mousejiggler/
Download:
http://github.com/arkane-systems/mousejiggler/releases/latest/
Requires Microsoft .Net Framework Redistributable (NFR) 2.0/newer:
http://www.mdgx.com/add.htm#NFR
Command:
MouseJiggle.exe -j -z -m
Coffee prevents standby/sleep during network/internet activity, changes power settings:
http://sourceforge.net/projects/coffee-sc/
Download:
http://sourceforge.net/projects/coffee-sc/files/

* Save/view/print list of installed Windows Updates (WU) from the command line:
http://www.rakhesh.com/windows/get-a-list-of-recently-installed-windows-updates-via-the-command-line/
Save updates list(s) to text file(s) (examples):
WMIC.EXE QFE>UPD_QFE.TXT
WMIC.EXE QFE LIST FULL>UPD_FULL.TXT
DISM.EXE /Online /Get-packages>UPD_LIST.TXT
DISM.EXE /Online /Get-Packages /Format:Table>UPD_TABLE.TXT
systeminfo.exe>UPD_INFO.TXT
View text file(s) using Notepad/similar/better free(ware) plain text/ASCII editor/viewer:
http://www.mdgx.com/toy.htm#TXT
WMIC.exe is located in the %WinDir%\SYSTEM32\wbem folder [%WinDir% = usually C:\WINDOWS], listed on your system PATH.
View all directories/folders listed in your system PATH from a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE):
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter:
PATH
WMIC (Windows Management Instrumentation Command):
http://docs.microsoft.com/windows/win32/wmisdk/wmic/
MS DOCs: WMIC:
http://technet.microsoft.com/library/bb742610.aspx
Dedoimedo: WMIC - The Windows secret weapon:
http://www.dedoimedo.com/computers/windows-wmic.html
ComputerHope: WMIC:
http://www.computerhope.com/wmic.htm
Rob van der Woude: WMIC:
http://www.robvanderwoude.com/wmic.php
quux: WMIC Snippets:
http://quux.wiki.zoho.com/WMIC-Snippets.html
SS64: WMIC.EXE:
http://www.ss64.com/nt/wmic.html
Wikipedia: WMI:
http://en.wikipedia.org/wiki/Windows_Management_Instrumentation

* Uninstall Internet Explorer 9 (IE9):
http://support.microsoft.com/help/2579295/
File:
http://support.microsoft.com/help/2970908/
Internet Explorer (IE) Uninstall command line:
FORFILES.EXE /P %WinDir%\Servicing\Packages /M Microsoft-Windows-InternetExplorer-*9.*.mum /c "CMD /C ECHO Uninstalling package @fname && START /W pkgmgr /up:@fname /norestart"

* Install/Uninstall Internet Explorer 9 (IE9) in/from Windows 7:
http://windows.microsoft.com/en-US/windows7/how-do-i-install-or-uninstall-internet-explorer-9/

* Uninstall Internet Explorer 10 (IE10) + Reinstall Internet Explorer 9 (IE9) in Windows 7:
http://news.softpedia.com/news/How-to-Remove-IE10-and-Get-Back-to-IE9-on-Windows-7-308998.shtml

* Install/Uninstall Internet Explorer 10 (IE10) in/from Windows 7:
http://www.sevenforums.com/tutorials/282216-internet-explorer-10-install-uninstall-windows-7-a.html

* Searching, Downloading and Installing Updates:
http://msdn.microsoft.com/library/windows/desktop/aa387102.aspx
Searching, Downloading and Installing Specific Updates:
http://msdn.microsoft.com/library/windows/desktop/aa387101.aspx
Using the Windows Update Agent API:
http://msdn.microsoft.com/library/windows/desktop/aa387287.aspx
Using WUA to Scan for Updates Offline:
http://msdn.microsoft.com/library/windows/desktop/aa387290.aspx
MSKB: Error code 0x80000FFFF when using Windows Update or Microsoft Update:
http://support.microsoft.com/help/946414/
MSKB: Latest version of Windows Update Agent (WUA):
http://support.microsoft.com/help/949104/
MSKB: Unable to install Updates:
http://support.microsoft.com/help/2509997/
SevenForums: Windows Update will not start:
http://www.sevenforums.com/windows-updates-activation/120431-windows-update-will-not-start.html#post1039097
SevenForums: Windows Update service not working:
http://www.sevenforums.com/windows-updates-activation/102472-windows-update-service-not-working.html
Fix WU:
http://www.softpedia.com/get/Tweak/System-Tweak/Fix-WU.shtml
MDGx "Windows Update Client (WUC) + Windows Update Agent (WUA)" topic in SOFTWARE.TXT (included):
http://www.mdgx.com/xptoy.htm#WUC

* Enable Windows Updates (WU) in Windows 7/8/8.1:
http://support.microsoft.com/help/4056895/
http://support.microsoft.com/help/4056894/
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\QualityCompat]
"cadca5fe-87d3-4b96-b7fb-a231484277cc"=dword:0
;
------End cut & paste here------

* Disable Windows Updates (WU), Windows Server Update Services (WSUS) + related Registry settings in Windows 7/8/8.1/10 +
Windows Server 2012/2016/2019/2022:
http://support.microsoft.com/help/328010/
http://github.com/vFense/vFenseAgent-win/wiki/Registry-keys-for-configuring-Automatic-Updates-&-WSUS/
http://www.smallvoid.com/article/winnt-automatic-updates-config.html
http://admx.help/HKLM/Software/Policies/Microsoft/WindowsStore
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate]
"DoNotConnectToWindowsUpdateInternetLocations"=dword:1
"AllowAutoWindowsUpdateDownloadOverMeteredNetwork"=dword:0
"BranchReadinessLevel"=dword:10
"ConfigureDeadlineForFeatureUpdates"=dword:1e
"ConfigureDeadlineForQualityUpdates"=dword:1e
"DeferFeatureUpdates"=dword:1
"DeferFeatureUpdatesPeriodInDays"=dword:16d
"DeferQualityUpdatesPeriodInDays"=dword:1e
"DeferQualityUpdates"=dword:1
"DeferUpgrade"=dword:1
"DeferUpgradePeriod"=dword:8
"DeferUpdatePeriod"=dword:4
"DisableOSUpgrade"=dword:1
"DisableWindowsUpdateAccess"=dword:1
"ElevateNonAdmins"=dword:1
"FlightCommitted"=dword:0
"FlightSettingsMaxPauseDays"=dword:99999999
"HideMCTLink"=dword:1
"InsiderProgramEnabled"=dword:0
"PauseDeferrals"=dword:1
"PauseFeatureUpdatesStartTime"="2015-05-05T05:05:05Z"
"PauseQualityUpdatesStartTime"="2015-05-05T05:05:05Z"
"PauseUpdatesExpiryTime"="2077-07-07T07:07:07Z"
"PauseFeatureUpdatesEndTime"="2077-07-07T07:07:07Z"
"PauseQualityUpdatesEndTime"="2077-07-07T07:07:07Z"
"RestartNotificationsAllowed"=dword:1
"TargetReleaseVersion"=dword:1
"TargetReleaseVersionInfo"=dword:0
"WUServer"="0.0.0.0"
"WUStatusServer"="0.0.0.0"
"UpdateServiceUrlAlternate"="0.0.0.0"
"ManagePreviewBuilds"=dword:1
"ManagePreviewBuildsPolicyValue"=dword:0
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU]
"AutoInstallMinorUpdates"=dword:0
"NoAutoUpdate"=dword:1
"NoAutoRebootWithLoggedOnUsers"=dword:1
"NoAUAsDefaultShutdownOption"=dword:1
"RebootRelaunchTimeout"=dword:3
"RebootRelaunchTimeoutEnabled"=dword:1
"UseWUServer"=dword:1
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update]
"NextSqmReportTime"="0"
"NextFeaturedUpdatesNotificationTime"="0"
"EnableFeaturedSoftware"=dword:0
"FeaturedUpdatesNotificationSeqNum"=dword:0
"FeaturedUpdatesNotificationSeqNumGenTime"="0"
"SetupWizardLaunchTime"="0"
"ForcedReboot"=dword:0
"AUOptions"=dword:1
"ConfigVer"=dword:1
"BalloonTime"="0"
"ScheduledInstallDay"=dword:0
"ScheduledInstallTime"=dword:0
"IncludeRecommendedUpdates"=dword:0
"NextDetectionTime"="0"
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer]
"NoWindowsUpdate"=dword:1
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]
"NoWindowsUpdate"=dword:1
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\OSUpgrade]
"AllowOSUpgrade"=dword:0
"ReservationsAllowed"=dword:0
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\OSUpgrade\State]
"OSUpgradeState"=dword:1
"OSUpgradeStateTimeStamp"="2015-05-05 05:05:05"
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsStore]
"DisableOSUpgrade"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\Setup\UpgradeNotification]
"UpgradeAvailable"=dword:0
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main]
"EnableAutoUpgrade"=dword:0
[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main]
"EnableAutoUpgrade"=dword:0
[HKEY_USERS\.DEFAULT\Software\Microsoft\Internet Explorer\Main]
"EnableAutoUpgrade"=dword:0
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Media Player]
"DisableAutoUpdate"=dword:1
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Internet Explorer\Infodelivery\Restrictions]
"NoUpdateCheck"=dword:1
;
------End cut & paste here------

* Portable Update (PortUp):
http://www.portableupdate.com/
PortUp:
http://www.portableupdate.com/public/PortUp.zip
PortUp DOCumentation:
http://www.portableupdate.com/docs/documentation.aspx

* Microsoft Windows Updates (WU) server:
http://windowsupdate.microsoft.com/

* Windows Server Update Services (WSUS) Offline Update tool:
http://download.wsusoffline.net/

* Start (run) WuauServ (Windows Updates Automatic Service) and configure it to start only when needed (on demand):
ECHO Y|NET.EXE START wuauserv
SC.EXE CONFIG wuauserv START= demand
Stop (exit) WuauServ (if running):
ECHO Y|NET.EXE STOP wuauserv

* Run Windows Automatic Updates (WUA):
WUAPP.EXE
Run WUA from the command line:
http://morgansimonsen.com/2010/12/14/automatic-updates-client-command-line-parameters/
http://www.ss64.com/nt/wuauclt.html
WUAUCLT.EXE

* Repair/Reinstall Windows Update (WU):
http://www.winhelp.us/reinstall-windows-update.html
File:
http://www.winhelp.us/files/MicrosoftFixit50202.msi

* Fix WU Utility:
http://www.thewindowsclub.com/repair-fix-windows-updates-with-fix-wu-utility/
File:
http://www.thewindowsclub.com/downloads/Fix%20WU.zip

* FixIt! Windows Update (WU):
http://support.microsoft.com/mats/windows_update/
FixIt! WU PORTABLE:
http://download.microsoft.com/download/E/2/3/E237A32D-E0A9-4863-B864-9E820C1C6F9A/MicrosoftFixit-portable.exe
FixIt! WU ONLINE:
http://download.microsoft.com/download/F/2/2/F22D5FDB-59CD-4275-8C95-1BE17BF70B21/WindowsUpdateDiagnostic.diagcab

* Repair Windows 7 Update Issues:
http://www.dell.com/support/troubleshooting/us/en/19/KCS/KcsArticles/ArticleView?docid=404587

* Hide/Restore Hidden Windows Updates in Windows 7/8/8.1:
http://www.sevenforums.com/tutorials/24376-windows-update-hide-restore-hidden-updates.html

* Windows Hotfix Downloader (WHDownloader.exe) for Windows 7/8/8.1:
http://forums.mydigitallife.net/threads/whdownloader-support-and-chat.44645/
File:
http://www.majorgeeks.com/files/details/windows_hotfix_downloader.html

* Windows Updates Downloader (WUD):
http://www.windowsupdatesdownloader.com/
Files:
http://www.windowsupdatesdownloader.com/ProgramFiles.aspx
Updates List (ULZ):
http://www.windowsupdatesdownloader.com/UpdateLists.aspx

* Windows Update Checker (KUC):
http://windows-update-checker.com/
Files:
http://windows-update-checker.com/download/

* TheHotfixShare (THS) Windows Hotfixes:
http://www.thehotfixshare.net/board/?autocom=downloads
THS forum membership is free.
THS Language Neutral Windows 7 Hotfix Downloads:
http://www.thehotfixshare.net/board/?autocom=downloads&showcat=136

* FixWin for Windows Vista/7:
http://www.thewindowsclub.com/repair-fix-windows-7-vista-problems-with-fixwin-utility/
File:
http://www.thewindowsclub.com/downloads/FixWin.zip
Guide:
http://www.windowsvalley.com/download-fixwin-utility-reform-your-windows/

* System Update Readiness (SUR) + Deployment Image Servicing and Management (DISM) tool (DISM.EXE) repairs WU errors, (re)installs
+ verifies updates/(hot)fixes/patches in Windows Vista/7/newer:
http://support.microsoft.com/help/947821/
- DISM 64-bit for Windows 7 64-bit (x64):
http://www.microsoft.com/download/details.aspx?id=20858
File:
http://download.microsoft.com/download/E/8/D/E8DAA970-1036-447F-B5EA-716D4BA70EC5/Windows6.1-KB947821-v34-x64.msu
- DISM 32-bit for Windows 7 SP1 32-bit (x86):
http://www.microsoft.com/download/details.aspx?id=3132
File:
http://download.microsoft.com/download/4/7/A/47A0F7B9-1F0F-41B0-AA42-00FD16337268/Windows6.1-KB947821-v34-x86.msu
DISM.EXE is included with all Windows Vista/7/newer editions, and located in the %WinDir%\SYSTEM32 folder [%WinDir% = usually
C:\WINDOWS].
View all directories/folders listed in your system PATH from a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE):
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter:
PATH
Use DISM to fix Windows Update (WU) errors:
http://docs.microsoft.com/troubleshoot/windows-server/deployment/fix-windows-update-errors/
DISM command line options:
http://docs.microsoft.com/windows-hardware/manufacture/desktop/dism-global-options-for-command-line-syntax/
http://docs.microsoft.com/windows-hardware/manufacture/desktop/dism-operating-system-package-servicing-command-line-options/

* Turn OFF Internet File Association (Search web for unknown extension) hidden/behind-your-back/without-your-consent/unwanted
"feature" for safety purposes in Windows NTx:
http://admx.help/?Category=Windows_10_2016&Policy=Microsoft.Policies.InternetCommunicationManagement::ShellNoUseInternetOpenWith_2
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer]
"NoInternetOpenWith"=dword:1
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]
"NoInternetOpenWith"=dword:1
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]
"NoInternetOpenWith"=dword:1
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System]
"NoInternetOpenWith"=dword:1
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System]
"NoInternetOpenWith"=dword:1
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\System]
"NoInternetOpenWith"=dword:1
;
------End cut & paste here------

* Windows 7 Internet Explorer 9 (IE9) Core Fonts Blurred Text Fix:
http://support.microsoft.com/help/2545698/
- IE9 Text Fix 64-bit:
http://download.microsoft.com/download/0/5/6/05675ADF-21AB-4476-8731-95182643D02C/Windows6.1-KB2545698-x64.msu
- IE9 Text Fix 32-bit:
http://download.microsoft.com/download/4/C/7/4C7D491B-6F78-4DB7-B87C-71777BF41E3F/Windows6.1-KB2545698-x86.msu

* Uninstall/Reinstall/Repair Internet Explorer (IE) [discontinued!] in Windows Vista/7/8/8.1/10:
http://docs.microsoft.com/troubleshoot/browsers/how-to-repair-or-reinstall-ie/
http://answers.microsoft.com/en-us/windows/forum/windows_7-windows_install-winsubother/windows-update-how-to-fix-some-settings-are/a5160e9d-21e8-4ecd-8218-6a6b88134748
1. Uninstall Internet Explorer (IE) from a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE): right-click CMD shortcut/CMD.EXE
-> Run as Administrator -> run one of these commands (run the 2nd in case the 1st doesn't work) -> press Enter (after each line):
DISM.EXE /online /Disable-Feature /FeatureName:Internet-Explorer-Optional-amd64
FORFILES.EXE /P %WinDir%\servicing\Packages /M Microsoft-Windows-InternetExplorer-*11.*.mum /c "cmd.exe /c echo Uninstalling package @fname && start /w pkgmgr.exe /up:@fname /norestart"
2. Reinstall Internet Explorer (IE) -> open Control Panel (CP)
CONTROL.EXE
-> Programs and Features -> Turn Windows features on or off -> Windows Features -> check Internet Explorer (11) box -> Apply/OK.

* Windows 7 Application Compatibility Update (ACU):
http://support.microsoft.com/help/974332/
Windows 7 Application Compatibility List:
http://www.microsoft.com/download/details.aspx?id=2394
MDGx "Application Compatibility Toolkit (ACT)" topic in SOFTWARE.TXT (included):
http://www.mdgx.com/xptoy.htm#ACT

* Windows 7 Service Pack 1 (SP1):
http://support.microsoft.com/help/976932/
Windows 7 Service Pack 1 (SP1) Update:
http://support.microsoft.com/help/2533552/
Windows 7 Service Pack 1 (SP1) Guide:
http://windows.microsoft.com/windows7sp1/
Windows 7 Service Pack 1 (SP1) Downloads:
http://www.catalog.update.microsoft.com/search.aspx?q=KB976932
- Windows 7 SP1 64-bit for Windows 7 64-bit (x64) [900 MB]:
http://download.windowsupdate.com/msdownload/update/software/svpk/2011/02/windows6.1-kb976932-x64_74865ef2562006e51d7f9333b4a8d45b7a749dab.exe
- Windows 7 SP1 Update 64-bit for Windows 7 SP1 64-bit (x64):
http://download.windowsupdate.com/msdownload/update/software/crup/2011/05/windows6.1-kb2533552-x64_0ba5ac38d4e1c9588a1e53ad390d23c1e4ecd04d.msu
- Windows 7 SP1 32-bit for Windows 7 32-bit (x86) [500 MB]:
http://download.windowsupdate.com/msdownload/update/software/svpk/2011/02/windows6.1-kb976932-x86_c3516bc5c9e69fee6d9ac4f981f5b95977a8a2fa.exe
- Windows 7 SP1 Update 32-bit for Windows 7 SP1 32-bit (x86):
http://download.windowsupdate.com/msdownload/update/software/crup/2011/05/windows6.1-kb2533552-x86_f2061d1c40b34f88efbe55adf6803d278aa67064.msu

* Microsoft Security Essentials (MSE):
http://www.microsoft.com/security_essentials/

* Windows 7 Review:
http://www.activewin.com/reviews/software/operating-sys/windows7/

* Windows 7 ISOs:
http://www.mydigitallife.info/2009/11/10/windows-7-iso-x86-and-x64-official-direct-download-links-ultimate-professional-and-home-premium/

* Windows NT Backup Restore Utility for Windows 7:
http://support.microsoft.com/help/974674/
Hotfix [request links in e-mail]:
http://support.microsoft.com/hotfix/KBHotfix.aspx?kbnum=974674&kbln=en-us
http://www.microsoft.com/download/details.aspx?id=18924

* MDGx Windows 7/7 SP1 Components, Add-ons, Extras, (Hot)Fixes, Patches, Upgrades, Updates (all included):
- MDGx "Java Runtime Environment (JRE)" topic in SOFTWARE.TXT:
http://www.mdgx.com/add.htm#JAVA
- MDGx ".NET Framework Redistributable (NFR)" topic in SOFTWARE.TXT:
http://www.mdgx.com/add.htm#NFR
- MDGx "Visual Studio (VS) + Visual C++ (VC)" topic in SOFTWARE.TXT:
http://www.mdgx.com/add.htm#VS6
- MDGx "Windows Update Client (WUC) + Windows Update Agent (WUA)" topic in SOFTWARE.TXT:
http://www.mdgx.com/xptoy.htm#WUC
- MDGx "Application Compatibility Toolkit (ACT)" topic in SOFTWARE.TXT:
http://www.mdgx.com/xptoy.htm#ACT
- MDGx "Group Policy (GP)" topic in SOFTWARE.TXT:
http://www.mdgx.com/xptoy.htm#GPO
- MDGx "File Manager (FM)" topic in SOFTWARE.TXT:
http://www.mdgx.com/xptoy.htm#FMNT
- MDGx "Access Control Lists (ACL) + Ownership Tools" topic in SOFTWARE.TXT:
http://www.mdgx.com/xptoy.htm#ACL
- MDGx "NTFS Alternate Data Streams (ADS)" topic in SOFTWARE.TXT:
http://www.mdgx.com/xptoy.htm#ADS
- MDGx "Free(ware) Windows NTx Extras" topic in SOFTWARE.TXT:
http://www.mdgx.com/xptoy.htm#2KXP
______________________________________________________________________________



Turn OFF/Remove Windows 7/8/8.1 Adware, Spyware, Security Flaws + Repair/Restore Privacy



* MDGx "Turn OFF/Remove Windows 10 Adware, Spyware, Security Flaws + Repair/Restore Privacy" chapter in WIN10.TXT (included):
http://www.mdgx.com/10.php
http://www.mdgx.com/WIN10.TXT

* Turn OFF/block/disable/remove/stop/repair Windows 7/8/8.1 dangerous/insecure/unsafe,
undesirable/unnecessary/unneeded/unused/useless, forced/behind-my-back/hidden/intrusive/invasive, annoying/bloat/resources
consuming, diagnostic tracking, telemetry ("phone home"), data collection/logging, customer "experience", unwanted "offers",
ad(vertisment)s/adware/spyware, security flaws/vulnerabilities + restore privacy:
- Fix Windows 7/8/8.1 privacy + disable spyware:
http://web.archive.org/web/20180323123837/http://fix10.isleaked.com/oldwindows.html
- Remove, Block and Prevent "Get Windows 10" (GWX) App for Enterprise Environments:
http://blogs.technet.com/b/charlesa_us/archive/2015/06/25/how-to-remove-block-and-prevent-quot-get-windows-10-quot-application-for-corporate-environments.aspx
- Manage connections from Windows Operating System components to Microsoft services:
http://technet.microsoft.com/library/mt577208.aspx
- Disable Telemetry and Data Collection in Windows 7/8/8.1:
http://www.askvg.com/tip-disable-telemetry-and-data-collection-on-windows-7-and-8/
- Disable Remote Registry (RemoteRegistry) service:
http://www.techrepublic.com/article/solutionbase-disabling-windows-xps-remote-registry-service/
______________________________________________________________________________



Everything About The Infamous (Not So) Trusted Installer



* Everything about TrustedInstaller:
************************************
Info, guides, fixes, workarounds + tweaks:
TrustedInstaller [TrustedInstaller.exe] is located in the %WinDir%\Servicing folder [%WinDir% = usually C:\WINDOWS] is Windows NTx
[Vista/newer] Microsoft built-in user account [special "VIP" type user created by Microsoft as "master overseer"] with privileged,
above-admin, system-wide rights which performs
automatic/unattended/forced/hidden/intrusive/invasive/unwanted/behind-your-back/without-your-consent functions/operations, for
example: downloads, updates, (re)installs/uninstalls, closes/executes/(re)starts/(re)schedules dynamic link libraries
(DLLs)/executables/services/tasks/scripts, modifies the Registry, system configuration files/scripts/tasks,
creates/copies/renames/modifies/moves/deletes files/folders, blocks/locks out the owner/administrators/legitimate
users/modifies/takes over files/folders ownership/permissions/attributes, reboots/restarts/shuts down Windows.
But you [as any logged in user with administrative rights ;-/] can "disguise"/"impersonate"/replace/substitute/switch as different
user, and run as TrustedInstaller in order to access/customize/modify/run any disabled/forbidden/locked/unavailable Windows
command, executable, file, folder, function, process, registry key/value, script, service, task, etc:
- Run Programs as TrustedInstaller to Write to Certain Registry Keys or Files:
http://www.winhelponline.com/blog/run-program-as-trustedinstaller-locked-registry-keys-files/
- Delete Files Protected by TrustedInstaller:
http://www.helpdeskgeek.com/windows-7/windows-7-how-to-delete-files-protected-by-trustedinstaller/
- TrustedInstaller Permission and CPU Fix:
http://howtoremove.guide/trustedinstaller-permission-cpu-fix-win7-win10/
- Execute programs as System/TrustedInstaller:
http://borncity.com/win/2017/02/22/windows-10-execute-programs-as-systemtrustedinstaller/
- The Art of Becoming TrustedInstaller:
http://www.tiraniddo.dev/2017/08/the-art-of-becoming-trustedinstaller.html
- Take ownership and get full access to files and folders in Windows 10:
http://www.winaero.com/blog/how-to-take-ownership-and-get-full-access-to-files-and-folders-in-windows-10/
- What is TrustedInstaller.exe and should I remove it?:
http://windowsreport.com/what-is-trustedinstaller-exe/
- Get Permission from TrustedInstaller in Windows 7/newer:
http://www.partitionwizard.com/partitionmagic/you-require-permission-from-trustedinstaller.html
- TrustedInstaller Permission and CPU Fix:
http://howtoremove.guide/trustedinstaller-permission-cpu-fix-win7-win10/
- What Is TrustedInstaller? Why Does It Keep Me From Renaming Files?:
http://www.makeuseof.com/tag/what-is-trustedinstaller-and-why-does-it-keep-me-from-renaming-files/
- Fix: You require permission from trustedinstaller windows 10:
http://thegeekpage.com/fix-you-require-permission-from-trustedinstaller-windows-10/
- Windows 10 Home - Getting TrustedInstaller permission to edit and remove items:
http://answers.microsoft.com/en-us/windows/forum/windows_10-other_settings/windows-10-home-getting-trustedinstaller/6664a5f1-5c71-45fc-94be-805075db682a/
- COMPLETELY delete trustedinstaller:
http://social.technet.microsoft.com/forums/en-us/b6b1ee19-96a3-4b6a-b7af-166287c1b3c2/
- What is TrustedInstaller.exe in Windows 10/11?:
http://www.thewindowsclub.com/trustedinstaller-exe-windows-7/
- Restore TrustedInstaller ownership in Windows 10:
http://www.winaero.com/blog/how-to-restore-the-trustedinstaller-ownership-in-windows-10/

* Restore/Take control [take #1]:
*********************************
Run Registry Editor (%WinDir%\RegEdit.exe) [%WinDir% = usually C:\WINDOWS] as TrustedInstaller (highest available user
level) in order to be allowed to add/delete/edit/modify/rename any registry key/value using AdvancedRun.exe:
AdvancedRun.exe /EXEFilename "%windir%\REGEDIT.EXE" /RunAs 8 /Run
AdvancedRun [AdvancedRun.exe] 32-bit + 64-bit GUI interface + DOS console command line tool for Windows Vista/newer
32-bit + 64-bit runs any app/batch/command/executable/function/process/program/script/service/task/tool as
Administrator/SYSTEM/TrustedInstaller/any user with elevated/highest/protected privileges/rights, compatibility,
environment, ownership, permissions, priority, properties, useful for task automation in BATch (.BAT), CoMmanD (.CMD) +
Visual Basic Script (.VBS) files, highly customizable:
http://www.nirsoft.net/utils/advanced_run.html
AdvancedRun 64-bit:
http://www.nirsoft.net/utils/advancedrun-x64.zip
AdvancedRun 32-bit:
http://www.nirsoft.net/utils/advancedrun.zip
Run Programs as TrustedInstaller:
http://www.winhelponline.com/blog/run-program-as-trustedinstaller-locked-registry-keys-files/
See also "Turn OFF/Postpone/Block/Uninstall Windows Updates (WU)" chapter -> "WUB Brief Explanation:" section in WIN10.TXT
(included):
http://www.mdgx.com/10.php
http://www.mdgx.com/WIN10.TXT
Add "Run as TrustedInstaller" item to the right-click shell context menu for BATch (.bat), CoMmanD (.cmd), EXEcutables (.exe)
+ Visual Basic Script (.vbs) files/shortcuts. You can add any other/all file formats following the same rules -> see below.
In this example AdvancedRun.exe (see above) is located in the C:\TOOLS folder.
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\batfile\shell\RunAsTrustInst]
@="Run as TrustedInstaller"
"SuppressionPolicy"=dword:0
"HasLUAShield"=""
"NoWorkingDirectory"=""
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\batfile\shell\RunAsTrustInst\command]
@="C:\\TOOLS\\AdvancedRun.exe /EXEFilename \"%1\" /RunAs 8 /Run"
"IsolatedCommand"=-
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\cmdfile\shell\RunAsTrustInst]
@="Run as TrustedInstaller"
"SuppressionPolicy"=dword:0
"HasLUAShield"=""
"NoWorkingDirectory"=""
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\cmdfile\shell\RunAsTrustInst\command]
@="C:\\TOOLS\\AdvancedRun.exe /EXEFilename \"%1\" /RunAs 8 /Run"
"IsolatedCommand"=-
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\exefile\shell\RunAsTrustInst]
@="Run as TrustedInstaller"
"SuppressionPolicy"=dword:0
"HasLUAShield"=""
"NoWorkingDirectory"=""
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\exefile\shell\RunAsTrustInst\command]
@="C:\\TOOLS\\AdvancedRun.exe /EXEFilename \"%1\" /RunAs 8 /Run"
"IsolatedCommand"=-
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\vbsfile\shell\RunAsTrustInst]
@="Run as TrustedInstaller"
"SuppressionPolicy"=dword:0
"HasLUAShield"=""
"NoWorkingDirectory"=""
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\vbsfile\shell\RunAsTrustInst\command]
@="C:\\TOOLS\\AdvancedRun.exe /EXEFilename \"%1\" /RunAs 8 /Run"
"IsolatedCommand"=-
;
------End cut & paste here------
From now on: Explorer/Desktop/Start button/logo/menu/orb -> right-click a BATch (.bat), CoMmanD (.cmd), EXEcutable (.exe), or
Visual Basic Script (.vbs) file/shortcut -> select "Run as TrustedInstaller".

* Restore/Take control [take #2]:
*********************************
Access/execute/open/run any possible file type (file extension) by adding "Run as TrustedInstaller" item to the right-click
shell context menu for *all* files types/extensions associated with a known/listed/registered
API (Application Programming Interface)/app(lication)/DLL (Dynamic Link Library)/EXEcutable
(.exe)/function/program/resident/script (.bat, .cmd, .hta, .reg, .vbs, .wsh, etc)/service/task -> see below.
In this example AdvancedRun.exe (see above) is located in the C:\TOOLS folder, and represented as "C:\\TOOLS" in the Registry
(.reg) file below.
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\*\shell\RunAsTrustInst]
@="Run as TrustedInstaller"
"SuppressionPolicy"=dword:0
"HasLUAShield"=""
"NoWorkingDirectory"=""
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\*\shell\RunAsTrustInst\command]
@="C:\\TOOLS\\AdvancedRun.exe /EXEFilename \"%1\" /RunAs 8 /Run"
"IsolatedCommand"=-
;
------End cut & paste here------
From now on: Explorer/Desktop/Start button/logo/menu/orb -> right-click any file type (any extension)/file shortcut -> select
"Run as TrustedInstaller".

* Restore/Take control [take #3]:
*********************************
Import/load/merge all data/information contained inside Registration Files (.reg) into the Registry [using RegEdit (REGEDIT.EXE)
located in the %WinDir% folder = usually C:\WINDOWS] with TrustedInstaller privileges -> see below.
In this example AdvancedRun.exe (see above) is located in the C:\TOOLS folder.
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\REGEDIT.EXE]
@="C:\\WINDOWS\\REGEDIT.EXE"
"Path"="C:\\WINDOWS"
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\AdvancedRun.exe]
@="C:\\TOOLS\\AdvancedRun.exe"
"Path"="C:\\TOOLS"
[HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers]
"C:\\TOOLS\\AdvancedRun.exe"="RUNASADMIN"
"C:\\WINDOWS\\REGEDIT.EXE"="RUNASADMIN"
"C:\\WINDOWS\\SYSTEM32\\regedt32.exe"="RUNASADMIN"
"C:\\WINDOWS\\SysWOW64\\regedit.exe"="RUNASADMIN"
"C:\\WINDOWS\\SysWOW64\\regedt32.exe"="RUNASADMIN"
[HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted]
"C:\\TOOLS\\AdvancedRun.exe"=dword:1
"C:\\WINDOWS\\REGEDIT.EXE"=dword:1
"C:\\WINDOWS\\SYSTEM32\\regedt32.exe"=dword:1
"C:\\WINDOWS\\SysWOW64\\regedit.exe"=dword:1
"C:\\WINDOWS\\SysWOW64\\regedt32.exe"=dword:1
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Applications\REGEDIT.EXE]
"NoOpenWith"=-
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Applications\REGEDIT.EXE\DefaultIcon]
@="REGEDIT.EXE,0"
; Restore default action: remove the semicolon [;] and the space [ ] in front of the commented/disabled @="REGEDIT.EXE \"%1\""
; value below + add a semicolon [;] followed by a space [ ] in front of the active/enabled @="... AdvancedRun64..." value below:
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Applications\REGEDIT.EXE\shell\open\command]
; @="REGEDIT.EXE \"%1\""
@="C:\\TOOLS\\AdvancedRun.exe /EXEFilename \"C:\\WINDOWS\\REGEDIT.EXE\" /CommandLine \"%1\" /RunAs 8 /Run"
"NoOpenWith"=-
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\regedit]
@="Registration Entries"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\regedit\DefaultIcon]
@="REGEDIT.EXE,0"
; Restore default action: remove the semicolon [;] and the space [ ] in front of the commented/disabled @="REGEDIT.EXE \"%1\""
; value below + add a semicolon [;] followed by a space [ ] in front of the active/enabled @="... AdvancedRun64..." value below:
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\regedit\shell\open\command]
; @="REGEDIT.EXE \"%1\""
@="C:\\TOOLS\\AdvancedRun.exe /EXEFilename \"C:\\WINDOWS\\REGEDIT.EXE\" /CommandLine \"%1\" /RunAs 8 /Run"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\REGEDIT.EXE]
@="Registration Entries"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\REGEDIT.EXE\DefaultIcon]
@="REGEDIT.EXE,0"
; Restore default action: remove the semicolon [;] and the space [ ] in front of the commented/disabled @="REGEDIT.EXE \"%1\""
; value below + add a semicolon [;] followed by a space [ ] in front of the active/enabled @="... AdvancedRun64..." value below:
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\REGEDIT.EXE\shell\open\command]
; @="REGEDIT.EXE \"%1\""
@="C:\\TOOLS\\AdvancedRun.exe /EXEFilename \"C:\\WINDOWS\\REGEDIT.EXE\" /CommandLine \"%1\" /RunAs 8 /Run"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\regfile]
@="Registration Entries"
"EditFlags"=dword:1
"AlwaysShowExt"=""
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\regfile\DefaultIcon]
@="REGEDIT.EXE,0"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\regfile\shell\open]
@="Mer&ge"
; Restore default action: remove the semicolon [;] and the space [ ] in front of the commented/disabled @="REGEDIT.EXE \"%1\""
; value below + add a semicolon [;] followed by a space [ ] in front of the active/enabled @="... AdvancedRun64..." value below:
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\regfile\shell\open\command]
; @="REGEDIT.EXE \"%1\""
@="C:\\TOOLS\\AdvancedRun.exe /EXEFilename \"C:\\WINDOWS\\REGEDIT.EXE\" /CommandLine \"%1\" /RunAs 8 /Run"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.reg]
@="regfile"
"PerceivedType"="system"
;
------End cut & paste here------
From now on: Desktop/Explorer/Start button/logo/menu/orb, etc -> right-click any Registration File (.reg) -> select "Merge" ->
click Yes -> click OK.

* Turn OFF (Disable) TrustedInstaller | Turn back ON (Restore) TrustedInstaller:
********************************************************************************
Method I [the easiest way ;-/]:
*******************************
Turn OFF/disable the TrustedInstaller service [which starts the %WinDir%\servicing\TrustedInstaller.exe EXEcutable upon every
Windows (re)boot/(re)start and whenever the TrustedInstaller service is not running] from starting + running by tweaking your
registry:
http://docs.microsoft.com/troubleshoot/windows-client/deployment/windows-update-hangs-updates-uninstalled/
http://docs.microsoft.com/answers/questions/53649/
http://conetrix.com/blog/windows-updates-consistently-failing-after-15-minutes/
http://www.sysnative.com/forums/threads/windows-update-going-around-in-circles-telling-me-i-must-restart-my-computer.5804/
All of this can be done in 1 easy (double)-click step by running the Registry (.reg) file below.
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
; Built-in/default values are commented out (disabled) = preceded by a semicolon [;] + a space [ ].
; To replace any of these customized value(s) with the built-in/default one(s): add a semicolon [;] and a space [ ] in front
; of the active (enabled) line(s) you wish to disable/comment, and which begin with a quote mark ["], and delete/remove the
; semicolon [;] and the space [ ] present in front of the disabled one(s) in order to enable/activate it/them:
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\TrustedInstaller]
; "BlockTime"=dword:2a30
"BlockTime"=dword:0
; "BlockTimeIncrement"=dword:384
"BlockTimeIncrement"=dword:ffffffff
; "PreshutdownTimeout"=dword:36ee80
"PreshutdownTimeout"=dword:e10
; "Start"=dword:2
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\TrustedInstaller]
; "BlockTime"=dword:2a30
"BlockTime"=dword:0
; "BlockTimeIncrement"=dword:384
"BlockTimeIncrement"=dword:ffffffff
; "PreshutdownTimeout"=dword:36ee80
"PreshutdownTimeout"=dword:e10
; "Start"=dword:2
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\TrustedInstaller]
; "BlockTime"=dword:2a30
"BlockTime"=dword:0
; "BlockTimeIncrement"=dword:384
"BlockTimeIncrement"=dword:ffffffff
; "PreshutdownTimeout"=dword:36ee80
"PreshutdownTimeout"=dword:e10
; "Start"=dword:2
"Start"=dword:4
;
------End cut & paste here------
Explanation of all these Registry values, and step-by-step how to do this the hard way, manually, by hand [;-/]:
Open Registry Editor (RegEdit) [REGEDIT.EXE] located in the %WinDir% folder [%WinDir% = usually C:\WINDOWS]: right-click
RegEdit or its shortcut/link -> Run as Administrator -> double-click + then scroll down 4 times [in the left hand panel]
until you arrive at your destination -> this registry key:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\TrustedInstaller
In the right hand panel:
1. Double-click "BlockTime" DWORD [REG_DWORD] to change its default value:
- hexadecimal: 2a30
- decimal: 10800 seconds = 180 minutes = 3 hours
to the minimum allowed value:
- hexadecimal: 0
- decimal: 0 seconds
2. Double-click "BlockTimeIncrement" DWORD [REG_DWORD] to change its default value:
- hexadecimal: 384
- decimal: 900 seconds = 15 minutes
to the maximum allowed value:
- hexadecimal: ffffffff
- decimal: 4294967295 seconds = 71582788 minutes = 1193046 hours = ~ 49710 days = ~ 136 years
3. Double-click "PreshutdownTimeout" DWORD [REG_DWORD] to change its default value:
- hexadecimal: 36ee80
- decimal: 3600000 seconds = 60000 minutes = 1000 hours = ~ 42 days
to a much smaller value:
- hexadecimal: e10
- decimal: 3600 seconds = 60 minutes = 1 hour
4. Double-click "Start" DWORD [REG_DWORD] to change its Automatic (Enabled) default value:
- hexadecimal: 2
- decimal: 2
to the Disabled (Blocked) value:
- hexadecimal: 4
- decimal: 4
Method I may need to be combined with Method II (below) to make sure it works 100% [;-/] -> keep reading...
Method II [the easy way]:
*************************
Turn OFF/disable the TrustedInstaller.exe executable by renaming its "servicing" folder to something like "servicing_OLD"
(example), and then in case you'll need it whenever you wish to change/install/repair/uninstall/update/upgrade an
app/driver/game/program/software/tool/upgrade/Windows add-on/component/feature/fix/patch/update/etc just turn ON/restore
the TrustedInstaller.exe "servicing" folder by renaming it back to its original name:
A. Create a DOS console batch file with commands below:
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text BATch (.bat) or CoMmanD (.cmd) script file containing the lines between Cut & Paste delimiters below
-> save it as plain text/ASCII file (Encode: -> ANSI) with the BAT (.bat) or CMD (.cmd) extension -> right-click it ->
Run as Administrator -> wait for completion.
-----Begin cut & paste here-----
@ECHO OFF
IF NOT "%OS%"=="Windows_NT" GOTO END
TITLE "Turn OFF/disable TrustedInstaller -> RENAME %windir%\servicing 2 %windir%\servicing_OLD ..."
C:
CD\
TASKKILL.EXE /IM TrustedInstaller.exe /F /T
IF EXIST "%windir%\servicing" TAKEOWN.EXE /f "%windir%\servicing" /r /d y
IF EXIST "%windir%\servicing" ICACLS.EXE "%windir%\servicing" /grant:R Administrators:F SYSTEM:F /t /c /q
IF EXIST "%windir%\servicing" REN "%windir%\servicing" servicing_OLD
IF EXIST "%windir%\servicing_OLD" TAKEOWN.EXE /f "%windir%\servicing_OLD" /r /d y
IF EXIST "%windir%\servicing_OLD" ICACLS.EXE "%windir%\servicing_OLD" /grant:R Administrators:F SYSTEM:F /t /c /q
:END
EXIT
------End cut & paste here------
Save it as TrustdInstallr_OFF_RENAME_folder.cmd (example) on your Desktop or in any other location on your local
drive(s)/partition(s)/volume(s), and then create a Desktop shortcut for it -> right-click TrustdInstallr_OFF_RENAME_folder.cmd
(or its Desktop shortcut) -> Run as Administrator -> wait for completion.
B. Create a DOS console batch file with commands below:
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text BATch (.bat) or CoMmanD (.cmd) script file containing the lines between Cut & Paste delimiters below
-> save it as plain text/ASCII file (Encode: -> ANSI) with the BAT (.bat) or CMD (.cmd) extension -> right-click it ->
Run as Administrator -> wait for completion.
-----Begin cut & paste here-----
@ECHO OFF
IF NOT "%OS%"=="Windows_NT" GOTO END
TITLE "Turn ON/restore TrustedInstaller -> Rename %windir%\servicing_OLD 2 %windir%\servicing ..."
C:
CD\
IF EXIST "%windir%\servicing_OLD" TAKEOWN.EXE /f "%windir%\servicing_OLD" /r /d y
IF EXIST "%windir%\servicing_OLD" ICACLS.EXE "%windir%\servicing_OLD" /grant:R Administrators:F SYSTEM:F /t /c /q
TASKKILL.EXE /IM TrustedInstaller.exe /F /T
IF EXIST "%windir%\servicing_OLD" REN "%windir%\servicing_OLD" servicing
:END
EXIT
------End cut & paste here------
Save it as TrustdInstallr_ON_RESTORE_folder.cmd (example) on your Desktop or in any other location on your local
drive(s)/partition(s)/volume(s), and then create a Desktop shortcut for it -> right-click TrustdInstallr_ON_RESTORE_folder.cmd
(or its Desktop shortcut) -> Run as Administrator -> wait for completion.
Method III [the hard way ;-/]:
******************************
Turn OFF/rename TrustedInstaller.exe step-by-step [but 1st make a *BACKUP*!]:
A. Install IObit Unlocker 32-bit Explorer right-click context menu shell extension + GUI tool forces in-use files to unlock so
they can be copied, moved, deleted or renamed:
http://www.iobit.com/iobit-unlocker.php
File:
http://cdn.iobit.com/dl/unlocker-setup.exe
Guide:
http://www.winhelponline.com/blog/delete-a-stubborn-file-folder-in-windows/
Use IObit Unlocker executable [IObitUnlocker.exe] command line options, switches + parameters for unattended/automated BATch
files/jobs/scripts:
http://forums.iobit.com/topic/14855-command-line-arguments/
In this example IObitUnlocker.exe is installed [default option] in the "%ProgramFiles(x86)%\IObit\IObit Unlocker" folder [where
%ProgramFiles(x86)% = usually "C:\Program Files (x86)"], found only on Windows NTx 64-bit (x64) editions.
The Windows NTx 32-bit (x86) correspondent folder is %ProgramFiles% = usually "C:\Program Files".
B. Extract executable [AdvancedRun.exe] from AdvancedRun ZIP archive below to match your Windows NTx OS bit strength [32-bit (x86)
or 64-bit (x64)]:
AdvancedRun [AdvancedRun.exe] 32-bit + 64-bit GUI interface + DOS console command line tool for Windows Vista/newer 32-bit + 64-bit
runs any app/batch/command/executable/function/process/program/script/service/task/tool as Administrator/SYSTEM/TrustedInstaller/any
user with elevated/highest/protected privileges/rights, compatibility, environment, ownership, permissions, priority, properties,
useful for task automation in BATch (.BAT), CoMmanD (.CMD) + Visual Basic Script (.VBS) files, highly customizable:
http://www.nirsoft.net/utils/advanced_run.html
AdvancedRun 64-bit:
http://www.nirsoft.net/utils/advancedrun-x64.zip
AdvancedRun 32-bit:
http://www.nirsoft.net/utils/advancedrun.zip
Run Programs as TrustedInstaller:
http://www.winhelponline.com/blog/run-program-as-trustedinstaller-locked-registry-keys-files/
In this example AdvancedRun.exe is located in the C:\TOOLS folder.
C. Create a DOS console batch file with commands below:
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text BATch (.bat) or CoMmanD (.cmd) script file containing the lines between Cut & Paste delimiters below
-> save it as plain text/ASCII file (Encode: -> ANSI) with the BAT (.bat) or CMD (.cmd) extension -> right-click it ->
Run as Administrator -> wait for completion.
-----Begin cut & paste here-----
@ECHO OFF
IF NOT "%OS%"=="Windows_NT" GOTO END
C:\TOOLS\AdvancedRun.exe /EXEFilename "%ProgramFiles(x86)%\IObit\IObit Unlocker\IObitUnlocker.exe" /CommandLine "/Rename /Advanced %WinDir%\servicing\TrustedInstaller.exe TrustedInstaller_OLD.exe" /RunAs 8 /Run
:END
EXIT
------End cut & paste here------
Save it as Rename_TrustdInstallr.cmd (example) on your Desktop or in any other location on your local
drive(s)/partition(s)/volume(s), and then create a Desktop shortcut for it = important for fast access in the next step below!
D. Turn OFF temporarily (for a few seconds, until you can rename it in the next step below) TrustedInstaller.exe:
hold Ctrl + Shift + press Esc -> Task Manager (TaskMgr.exe) -> Processes tab -> right-click TrustedInstaller.exe (-> End task)
-> click "End process".
E. As fast as possible [!]: Desktop -> right-click Rename_TrustdInstallr.cmd (or its Desktop shortcut) -> Run as Administrator
-> click OK when you see the IObit Unloker "Operation succeded." window -> done.
From now on you won't have to put up anymore with any TrustedInstaller annoyances, behind-your-back/blocked/forbidden
system/user functions/operations, lock outs, limitations, etc.
F. Restore TrustedInstaller.exe by renaming it back to its original name in case you'll need it whenever you wish to
change/install/repair/uninstall/update/upgrade an app/driver/game/program/software/tool/upgrade/Windows
add-on/component/feature/fix/patch/update/etc:
Perform again steps C. + E. above (D. is not needed), but this time use instead another DOS console batch file [example:
Restore_TrustdInstallr.cmd] to rename TrustedInstaller_OLD.exe back to its original name = TrustedInstaller.exe :
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text BATch (.bat) or CoMmanD (.cmd) script file containing the lines between Cut & Paste delimiters below
-> save it as plain text/ASCII file (Encode: -> ANSI) with the BAT (.bat) or CMD (.cmd) extension -> right-click it ->
Run as Administrator -> wait for completion.
-----Begin cut & paste here-----
@ECHO OFF
IF NOT "%OS%"=="Windows_NT" GOTO END
C:\TOOLS\AdvancedRun.exe /EXEFilename "%ProgramFiles(x86)%\IObit\IObit Unlocker\IObitUnlocker.exe" /CommandLine "/Rename /Advanced %WinDir%\servicing\TrustedInstaller_OLD.exe TrustedInstaller.exe" /RunAs 8 /Run
:END
EXIT
------End cut & paste here------
______________________________________________________________________________



Task Scheduler Tweaks



* Windows Vista/7: Run any BATch/script/program (in Task Scheduler) minimized and with custom icon:
http://answers.microsoft.com/en-us/windows/forum/windows_7-performance/make-windows-7-task-scheduler-run-a-batch-file/0573dc2e-4941-44a2-8304-264864e94f1a/
Windows 8/8.1/10/11: Run any BATch/script/program (in Task Scheduler) minimized and with custom icon:
http://answers.microsoft.com/en-us/windows/forum/windows_10-performance/make-windows-10-task-scheduler-run-a-batch-file/e00b2fb0-02ca-439f-b534-eb34541130a9/
Run applications/scripts minimized (from Task Scheduler):
http://forums.anandtech.com/threads/want-to-run-applications-minimized-at-log-in-from-task-scheduler.224581/
1. Create (if not present) C:\SCRIPTS folder (example) from a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE):
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run these commands -> press Enter after each line:
C:
CD\
MD SCRIPTS
2. Use Notepad to create C:\SCRIPTS\DEL_RECYCL_B1N.VBS VBScript file (example):
-----Begin cut & paste here-----
Dim WshShell:Set WshShell=CreateObject("WScript.Shell")
WshShell.Run chr(34)&"C:\SCRIPTS\DEL_RECYCL_B1N.CMD"&Chr(34),0
Set WshShell=Nothing
------End cut & paste here------
3. Use Notepad to create C:\SCRIPTS\DEL_RECYCL_B1N.CMD BATch file (example):
-----Begin cut & paste here-----
@ECHO OFF
IF NOT "%OS%"=="Windows_NT" GOTO END
COLOR 3B
TITLE "Delete all $Recycle.BIN folders..."
ECHO.
ECHO 
ECHO Deleting $Recycle.BIN folders on all drives/partitions/volumes...
ECHO 
ECHO.
C:
CD\
FOR %%i IN (C: D: E: F: G: H: I: J: K: L: M: N: O: P: Q: R: S: T: U: V: W: X: Y: Z:) DO IF EXIST "%%i\$RECYCLE.BIN" TAKEOWN.EXE /f "%%i\$RECYCLE.BIN" /r /d y >NUL 2>&1
FOR %%i IN (C: D: E: F: G: H: I: J: K: L: M: N: O: P: Q: R: S: T: U: V: W: X: Y: Z:) DO IF EXIST "%%i\$RECYCLE.BIN" ICACLS.EXE "%%i\$RECYCLE.BIN" /grant:r Everyone:F /t /c /q >NUL 2>&1
FOR %%i IN (C: D: E: F: G: H: I: J: K: L: M: N: O: P: Q: R: S: T: U: V: W: X: Y: Z:) DO IF EXIST "%%i\$RECYCLE.BIN" RUNDLL32.EXE ADVPACK.DLL,DelNodeRunDLL32 "%%i\$RECYCLE.BIN" >NUL 2>&1
:END
EXIT
------End cut & paste here------
4. Add C:\SCRIPTS\DEL_RECYCL_B1N.VBS (example) to your custom Task Scheduler script -> run:
MMC.EXE /S taskschd.msc
5. Create a new Task -> Action tab -> highlight your task line -> click Edit... button -> Program/script box -> type (example):
WSCRIPT.EXE
-> Add arguments box -> type (example):
/B /NoLogo C:\SCRIPTS\DEL_RECYCL_B1N.VBS
6. Customize and save your task to run whenever and however often you wish.
7. Optionally you can automate Task Scheduler to run C:\SCRIPTS\DEL_RECYCL_B1N.VBS every 30 minutes (example) from a DOS console
command prompt (%WinDir%\SYSTEM32\CMD.EXE): right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run these commands ->
press Enter after each line:
ECHO Y|SCHTASKS.EXE /Create /TN "Delete_$Recycle.B1N_folders" /TR "WSCRIPT.EXE /B /NoLogo C:\SCRIPTS\DEL_RECYCL_B1N.VBS" /RU SYSTEM /RL HIGHEST /SC MINUTE /MO 30 /F
ECHO Y|SCHTASKS.EXE /Change /TN "Delete_$Recycle.B1N_folders" /RI 30 /RL HIGHEST /ENABLE

* Create scheduled task to be triggered by Windows service event using XML:
http://www.superuser.com/questions/502160/
http://blogs.technet.microsoft.com/askds/2011/09/26/advanced-xml-filtering-in-the-windows-event-viewer/
http://social.technet.microsoft.com/forums/windows/bae1e2c4-c60a-4f90-87b9-7b33e8d9660e/
http://msdn.microsoft.com/library/aa385231.aspx
http://social.technet.microsoft.com/forums/office/fac16f3c-d088-4d66-83d8-7139261dea83/
Wikipedia: XML:
http://en.wikipedia.org/wiki/XML
Run... [hold WinKey + press R] -> taskschd.msc -> Create Task... -> Trigger tab -> On an event -> Custom -> New Event Filter -> XML tab ->
Edit query manually -> Yes -> cut & paste (example):





Actions tab -> Start a program -> Program/script (example):
SC.EXE
Add argument (optional) (example):
STOP sppsvc
OK -> OK.
______________________________________________________________________________



Patch Windows 7



* Updated Physical Address Extension (PAE) Patch [ntkrnlpa.exe] for Windows 7 SP1 32-bit unlocks using installed RAM up to 128 GB:
http://www.wj32.org/wp/2011/02/23/pae-patch-updated-for-windows-7-sp1/
Updated Physical Address Extension (PAE) Patch [ntkrnlpa.exe] for Windows 8/8.1 32-bit unlocks using installed RAM up to 128 GB:
http://www.wj32.org/wp/2013/10/25/pae-patch-updated-for-windows-8-1/
Updated Physical Address Extension (PAE) Patch [ntkrnlpa.exe] for Windows 10 32-bit unlocks using installed RAM up to 128 GB:
http://www.wj32.org/wp/2016/02/01/pae-patch-updated-for-windows-10/
ReadyFor4GB PAE Patch [ntkrnlpa.exe] for Windows Vista/7/7 SP1 32-bit unlocks using installed RAM up to 128 GB:
- Chinese:
http://zh-deepxw.blogspot.com/2009/04/readyfor4gb.html
- English:
http://www.arstechnica.com/civis/viewtopic.php?f=15&t=49358
PAE RAMPatch [ntkrnlpa.exe] for Windows Vista/7/7 SP1 32-bit unlocks using installed RAM up to 128 GB:
http://www.bcastell.com/tech-articles/enabling-more-than-4-gb-of-ram-under-windows-7-32-bit/
File:
http://www.bcastell.com/wp-content/uploads/2012/09/win7-7600-4gb-patch.rar
PASSWORD:
nowarranty
These Patches work ONLY with 32-bit (x86) Windows NTx OSes!

* 4GB Patch for 32-bit EXEcutables (.exe) to use up to 4 GB of virtual RAM on Windows NTx 64-bit (x64) OSes:
http://www.ntcore.com/4gb_patch.php
File:
http://www.ntcore.com/files/4gb_patch.zip
This Patch works ONLY with 64-bit (x64) Windows NTx OSes + 32-bit (x86) EXEcutables!

* Windows 7 Patches: TCP/IP Limited Connections (TCPIP.SYS), Theme (UXTHEME.DLL), Terminal Server (TERMSRV.DLL) + Desktop Watermark
(USER32.DLL + USER32.DLL.mui):
http://deepxw.blogspot.com/
Windows 7 Desktop Watermark (USER32.DLL + USER32.DLL.mui) Patch:
http://deepxw.blogspot.com/2008/12/remove-watermark-v03-build-20081210.html
Desktop Watermark Patch Guide:
http://www.askvg.com/how-to-remove-windows-7-rc-watermark-build-info-from-desktop/

* UxStyle for Windows 7/8/8.1/10 Preview:
http://www.uxstyle.com/
http://github.com/riverar/uxstyle/
UxStyle for Windows 8/8.1:
http://www.uxstyle.com/builds/UxStyle_sep23_x86_x64_possibly_bugged.zip
UxStyle for Windows 7/7 SP1:
http://www.uxstyle.com/builds/UxStyle_Core_jul13_bits.zip
Aero Theme for Windows 8/8.1:
http://simplexdesignsart.deviantart.com/art/Windows-Aero-536877982/
http://web.archive.org/web/20130402051457/http://xxinightxx.deviantart.com/art/Windows-7-Vs-REV-D-350491112/
File:
http://drive.google.com/uc?export=download&id=0B883uGPmNY72Sjk3dy1MTzBGVEE
http://web.archive.org/web/20130402051457/http://www.deviantart.com/download/350491112/windows_7_vs_rev_d_by_xxinightxx-d5so8o8.zip
Windows 8/8.1 Themes:
http://www.winaero.com/category/windows-8-themes/

* Windows 7 Theme Source Patcher (7TSP):
http://www.xptsp.com/fixit/7tsp.php
7TSP Portable:
http://users.xptsp.com/fixit/programs/7tsp_GUI_v0.4_B(2015).exe
7TSP Installer:
http://users.xptsp.com/fixit/programs/7tsp_GUI_v0.4_B(2015)_Installer.exe
7TSP Icon Packs:
http://www.creativx.net/forums/7tsp-iconpacks/
7TSP requires Resource Hacker:
http://www.angusj.com/resourcehacker/
File:
http://www.angusj.com/resourcehacker/resource_hacker.zip

* ReadyDriver Plus:
http://web.archive.org/web/20131029095655/http://www.citadelindustries.net/rdp.php
File:
http://web.archive.org/web/20131029095655/http://data.citadelindustries.net/setupreadydriverplus.exe

* Driver Signature Enforcement Overrider (DSEO):
http://www.ngohq.com/?page=dseo
File:
http://files.ngohq.com/ngo/dseo/dseo13b.exe

* Windows 7 Boot Updater changes animated boot logo:
http://www.coderforlife.com/projects/win7boot/
Guide:
http://www.intowindows.com/windows-7-boot-animation-updater-change-windows-7-boot-screen/
______________________________________________________________________________



Customize BOOT Screens



* Customize Windows 7 Boot Screen Guides:
http://www.techdows.com/2011/06/get-windows-8-betta-fish-boot-screen-for-windows-7.html
http://www.techfeb.com/customize-windows-7-boot-screen/
http://www.askvg.com/download-windows-8-rtm-boot-screen-windows-7/
http://www.door2windows.com/how-to-change-windows-7-boot-screen-animation/
Win7BootUpdater = MUST USE IT!:
http://www.coderforlife.com/projects/win7boot/
File:
http://www.coderforlife.com/projects/win7boot/downloads/
http://www.coderforlife.com/projects/win7boot/downloads/Win7BootUpdater2.exe
Extras:
http://www.coderforlife.com/projects/win7boot/extras/
Boot Screens:
http://www.coderforlife.com/projects/win7boot/bootskins/
http://www.deskmodder.de/phpBB3/viewtopic.php?f=220&t=13363
Custom Animations:
http://medi-dadu.deviantart.com/art/Win-Boot-Screen-16-9-277342889
Navi OS from SE Lain:
http://detechtive.deviantart.com/art/Win-7-boot-animation-Navi-OS-from-SE-Lain-280887190
Holographic:
http://ultimatedesktops.deviantart.com/art/Holographic-Boot-Skin-for-Windows-7-359440527
http://creativ-xtreme.deviantart.com/art/Holographic-Boot-Skin-for-Windows-7-359440527
Abstract:
http://detechtive.deviantart.com/art/Abstract-Bootscreen-w-resolution-fix-and-a-bonus-393047765
The Hatchling v2:
http://faziri.deviantart.com/art/The-Hatchling-v2-340304259
Blaupunkt v2:
http://tchiro.deviantart.com/art/Blau-punkt-v2-BootScreen-344602849
Pulse Blue:
http://tchiro.deviantart.com/art/Pulse-blue-Windows-7-BootScreen-321869645
Pulse Green:
http://tchiro.deviantart.com/art/Pulse-Windows-7-BootScreen-321814750
Molecule 16:9:
http://judian.deviantart.com/art/Molucule-Boot-Screen-16-9-312105328
L:
http://luttik.deviantart.com/art/L-bootloader-297223007
Earth 16:9:
http://medi-dadu.deviantart.com/art/Win-Boot-Screen-16-9-294257700
Gears:
http://creativ-xtreme.deviantart.com/art/gears-BootScreen-262299074
Stargate Logo:
http://fallenangelofdeath63.deviantart.com/art/Stargate-Boot-Theme-290423425
STARGATE:
http://zangio.deviantart.com/art/Win7-Boot-Animation-STARGATE-189992814
Starfleet Logo:
http://deskmodder.deviantart.com/art/Starfleetlogo-by-rufus721-269639178
Blue Plasma:
http://deskmodder.deviantart.com/art/BluePlasma-by-AxP-261661276
Nerd:
http://sachse.deviantart.com/art/Nerd-Bootscreen-260310482
DoTa Puck:
http://seva-tmplr.deviantart.com/art/WIN7-Boot-DoTa-Puck-196485118
Orb:
http://zangio.deviantart.com/art/Win7-Boot-Animation-Orb-188321689
Windows 8 ALPHA Fish:
http://misaki2009.deviantart.com/art/Windows-8-Bootscreen-quot-ALPHA-quot-214596752
Boot Screens:
http://creativ-xtreme.deviantart.com/gallery/36418593
http://kidofoundation.deviantart.com/gallery/
http://korruptninja.deviantart.com/gallery/
http://www.windows7bootscreens.com/bootscreen-22-orb/
______________________________________________________________________________



Desktop Background/Wallpaper Tweaks + Free(ware) Tools



* Next wallpaper slideshow -> right-click Desktop shortcut:
http://www.techfeb.com/change-your-windows-wallpaper-with-next-wallpaper-from-windows-right-click-menu/
http://www.sevenforums.com/tutorials/161638-next-desktop-background-add-remove-desktop-context-menu.html
http://www.windowsvalley.com/remove-next-desktop-background-from-desktop-context-menu-of-windows-7/
http://www.intowindows.com/how-to-create-shortcut-key-to-switch-to-next-desktop-background-in-windows-7-and-windows-8/
NOTE:
This requires your wallpaper (Desktop Background) settings to cycle through a folder containing at least 2 images.
1. Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create Next_Wallpaper.vbs VBScript file (example):
-----Begin cut & paste here-----
Dim WshShell:Set WshShell=WScript.CreateObject("WScript.Shell")
WshShell.SendKeys("^ ")
WshShell.SendKeys("+{F10}")
WshShell.SendKeys("n")
------End cut & paste here------
2. Run Next_Wallpaper.vbs (example):
WSCRIPT.EXE /B /NoLogo Next_Wallpaper.vbs
3. Right-click on an empty Desktop spot -> click "Next desktop background".
4. Make this permanent: use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a new Registry (.reg) file -> copy & paste text strings between Cut & Paste lines below -> save file as
Next_Wallpaper.reg (example).
5. Right-click on Next_Wallpaper.reg -> Run as Administrator -> answer Yes/OK to all prompts to register the information into
your Registry.
6. From now on you can right-click on an empty Desktop spot -> click "Next desktop background".
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\DesktopBackground\shellex\ContextMenuHandlers\DesktopSlideshow]
@="{0bf754aa-c967-445c-ab3d-d8fda9bae7ef}"
"Icon"="themecpl.dll,0"
"Position"="Bottom"
"MUIVerb"="Next &Wallpaper"
"SuppressionPolicy"=dword:0
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0bf754aa-c967-445c-ab3d-d8fda9bae7ef}]
@="SlideshowContextMenu"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0bf754aa-c967-445c-ab3d-d8fda9bae7ef}\InProcServer32]
@=hex(2):25,53,79,73,74,65,6d,52,6f,6f,74,25,5c,73,79,73,74,65,6d,33,32,5c,73,\
  74,6f,62,6a,65,63,74,2e,64,6c,6c,00
"ThreadingModel"="Apartment"
;
------End cut & paste here------

* Desktop Background Tuner (DBT) 32-bit:
http://www.winaero.com/desktop-background-tuner/
File:
http://www.winaero.com/download-desktop-background-tuner/
Extract DesktopBackgroundTuner.exe version which matches your Windows NTx OS edition from DesktopBackgroundTuner.zip
archive using an unZIPping/unARChiving/unRARing tool [free(ware)]
http://www.mdgx.com/toy.htm#ZIP
to the local drive/partition/volume + directory/folder of your choice:
- Windows XP/Vista/7 users: DesktopBackgroundTuner.exe from ZIP root [no name] folder;
- Windows 8/8.1/10/11 users: DesktopBackgroundTuner.exe from ZIP "Windows 8" folder.

* Any Wallpaper:
http://www.anyutils.com/anywall.php
File:
http://www.anyutils.com/download/anywall.exe
Requires Microsoft .Net Framework Redistributable (NFR) 2.0/newer (free):
http://www.mdgx.com/add.htm#NFR
Right-click Taskbar Icon -> Restore main window -> Options -> Choose a wallpaper position: Autofit.
Settings:
%UserProfile%\AppData\Local\AnyUtils\AnyWall\settings.xml

* Logon Background Changer (W7LBC):
http://www.julien-manici.com/windows_7_logon_background_changer/
File:
http://jmanici.blob.core.windows.net/download/Win7LogonBackgroundChanger_1_5_2.zip

* Logon Changer:
http://www.tweaks.com/software/tweakslogon/
File:
http://www.tweaks.com/software/tweakslogon/download/tweakslogon.zip

* Logon Screen Rotator (LSR):
http://www.lukepaynesoftware.com/lsrotator/
File:
http://www.lukepaynesoftware.com/downloads/lsr_4.4
LSR Guide:
http://www.door2windows.com/how-to-automatically-change-your-logon-screen-background-after-an-interval-of-time-in-windows-7/

* Wallpaper Slideshow LT:
http://www.gphotoshow.com/wallpaperss.htm
File:
http://www.gphotoshow.com/files/WallpaperSSLT.exe

* Aero Wallpaper Changer (AWC) for Windows 7 Home/Basic:
http://www.winaero.com/aerowallpaperchanger/
File:
http://www.winaero.com/download-aerowallpaperchanger-adds-cool-aero-color-effects-and-desktop-slideshow-to-windows-7-home-basic/

* Oceanis:
http://www.sevenforums.com/tutorials/47294-desktop-background-wallpaper-change-windows-7-starter.html
File:
http://dl2.sevenforums.com/dl/Oceanis_Change_Background_W7.zip

* Windows Wallpaper Changer:
http://sourceforge.net/projects/winwallchanger/
File:
http://sourceforge.net/projects/winwallchanger/files/

* List of Wallpaper Changers:
http://www.techsupportalert.com/content/best-free-wallpaper-changer.htm
______________________________________________________________________________



Free(ware) 7/8/8.1/10/11 Aero Tools + Tweaks



* TransparentMenu 32-bit + 64-bit adjusts transparency + assigns colors schemes to Windows + programs right-click menus:
http://www.moo0.com/software/TransparentMenu/
File:
http://www.moo0.com/software/TransparentMenu/download/free2/
Download:
http://www.softpedia.com/get/Desktop-Enhancements/Other-Desktop-Enhancements/Moo0-TransparentMenu.shtml
"%UserProfile%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Moo0 Transparent Menu 1.22.lnk" shortcut command line:
TransparentMenu.exe -startup
Setup (examples) -> right-click green "Moo0 Transparent Menu" Taskbar/Notification area icon:
- Menu Skin (affects system colors) -> UNcheck Change Highlight Colors Together -> Green Tea (Win7) or Charcoal Palette 3
(Win8/newer)
- Menu Transparency (%) -> 10%
- Start on System Boot -> checked.

* Aero Adjuster:
http://samusaranfreak.deviantart.com/art/Aero-Adjuster-261383189
File:
http://www.deviantart.com/download/261383189/aero_adjuster_by_samusaranfreak-d4bmck5.zip

* Winaero Tweaker 32-bit + 64-bit for Windows 7/8/8.1/10/11 [select Portable at install time!]:
http://www.winaero.com/winaero-tweaker/
Download:
http://www.winaero.com/download-winaero-tweaker/
File:
http://www.winaero.com/downloads/winaerotweaker.zip
Winaero Tweaker Features:
http://www.winaero.com/the-list-of-winaero-tweaker-features/
Examples: customizes manufacturer/OEM/vendor info, removes icon overlay using transparent icon.

* Switcher:
http://www.insentient.net/
File:
http://www.insentient.net/Files/Projects/Switcher/Switcher-2.0.0.2705.zip

* Aura Auto Colorization tool:
http://aura.codeplex.com/
http://www.askvg.com/aura-get-windows-8-aero-auto-colorization-feature-in-windows-vista-and-7/
http://www.door2windows.com/get-windows-8-auto-colorization-feature-in-windows-7vista-3/
File:
http://aura.codeplex.com/downloads/get/227648
http://angelwzr.deviantart.com/art/Aura-Beta-3-203960157
http://www.deviantart.com/download/203960157/aura_beta_2_by_angelwzr-d3dfknx.zip

* 7+ Taskbar Tweaker (7TT) 32-bit + 64-bit for Windows 7/newer adds Taskbar tray settings otherwise unavailable, beyond
Windows capabilities, highly customizable [select Portable at install time!]:
http://ramensoftware.com/7-taskbar-tweaker/
http://tweaker.ramensoftware.com/
File:
http://ramensoftware.com/downloads/7tt_setup.exe
7+ Taskbar Tweaker (7TT) Guide:
http://www.winaero.com/get-a-classic-taskbar-in-windows-8-and-windows-7-that-works-like-xp/
7+ Taskbar Tweaker (7TT) Repository:
http://github.com/m417z/7-Taskbar-Tweaker/
Windhawk tweak mods for Windows 11 Taskbar:
http://ramensoftware.com/windhawk-mods-for-the-windows-11-taskbar/
7+ Taskbar Tweaker (7TT) does NOT support Windows 11 Taskbar:
http://ramensoftware.com/7-taskbar-tweaker-and-a-first-look-at-windows-11/

* UxStyle for Windows 7/8/8.1/10 Preview:
http://www.uxstyle.com/
http://github.com/riverar/uxstyle/
UxStyle for Windows 8/8.1:
http://www.uxstyle.com/builds/UxStyle_sep23_x86_x64_possibly_bugged.zip
UxStyle for Windows 7/7 SP1:
http://www.uxstyle.com/builds/UxStyle_Core_jul13_bits.zip
Aero Theme for Windows 8/8.1:
http://simplexdesignsart.deviantart.com/art/Windows-Aero-536877982/
http://web.archive.org/web/20130402051457/http://xxinightxx.deviantart.com/art/Windows-7-Vs-REV-D-350491112/
File:
http://drive.google.com/uc?export=download&id=0B883uGPmNY72Sjk3dy1MTzBGVEE
http://web.archive.org/web/20130402051457/http://www.deviantart.com/download/350491112/windows_7_vs_rev_d_by_xxinightxx-d5so8o8.zip
Windows 8/8.1 Themes:
http://www.winaero.com/category/windows-8-themes/

* AeroRainbow for Windows 7/8/8.1/10/11:
http://www.winaero.com/aerorainbow/
File:
http://www.winaero.com/download.php?view.11

* Windows 7 Start button/logo/orb Changer:
http://www.door2windows.com/windows-7-start-button-changer-change-your-windows-7-start-button-with-one-click/
File:
http://www.door2windows.com/download-freeware/?obsolete#Windows+7+Start+Orb+Changer
Guide:
http://www.intowindows.com/windows-7-start-orb-changer-lets-you-quickly-change-start-orb/

* MDGx Aero tools [free(ware)] -> "AERO 7/8/8.1/10/11" section in TOOLS.TXT (included):
http://www.mdgx.com/tools.php
http://www.mdgx.com/TOOLS.TXT

* MDGx Windows NTx Tools -> "Free(ware) Windows NTx Extras" section in SOFTWARE.TXT (included):
http://www.mdgx.com/xptoy.htm

* MDGx "1000+ Windows NTx Power Toys + Tweaking Tools [99.99% Free(ware)]" section in SOFTWARE.TXT (included):
http://www.mdgx.com/toy.htm
______________________________________________________________________________


Free(ware) Windows 7 Replacement Apps + Tweaking Tools


* Vista Calculator (CALC.EXE):
http://www.askvg.com/get-windows-7-calculator-working-in-windows-vista/
http://www.askvg.com/get-windows-7-like-calculator-in-windows-xp/
http://grdcityboy.deviantart.com/art/Seven-Calculator-102484514
http://www.softpedia.com/reviews/windows/Windows-7-Calculator-Review-106024.shtml
http://www.7tutorials.com/windows-calculator-tool-geek-you/

* AeroCalc (Glass Theme):
http://www.door2windows.com/how-to-get-glass-calculator-in-windows-7vista/

* Notepad (Glass Theme):
http://www.door2windows.com/how-to-get-glass-notepad-in-windows-7vista/
Ribbon Notepad:
http://www.door2windows.com/get-notepad-with-ribbon-user-interface-in-windows-7vista/

* Command Prompt (Glass Theme):
http://www.door2windows.com/how-to-get-glass-command-prompt-in-windows-7vista/

* Ribbon Image Viewer:
http://www.door2windows.com/get-ribbon-user-interface-ui-image-viewer-in-windows-7vistaxp/

* Bubbles, Mystify, Ribbons, Lines + Aurora Screen Savers:
http://www.softpedia.com/get/Desktop-Enhancements/Screensavers/Vista-Screensaver-Ported-to-XP.shtml
Screen Savers Guides:
http://www.door2windows.com/tweak-bubbles-mystify-ribbons-lines-aurora-screensavers/
http://www.howtogeek.com/howto/15088/customize-the-default-screensavers-in-windows-7-and-vista/
http://www.winaero.com/comment.php?comment.news.9
http://www.tweaks.com/windows/39129/the-ultimate-windows-screensaver-tweaking-guide/

* XP Pipes (SSPIPES.SCR) Screen Saver:
http://www.bearblain.com/Downloads/sspipes.zip
http://www.mdgx.com/3dpipes.jpg

* 7Smoker Pro:
http://www.xp-smoker.com/7smokerpro.html
File:
http://www.majorgeeks.com/files/details/7smoker_pro.html

* Windows 7/newer tweaking tools [free(ware)]:
http://www.winaero.com/
http://www.wintools.info/
http://www.thewindowsclub.com/category/downloads/
http://www.nirsoft.net/utils/
http://www.sordum.org/
http://www.itsamples.com/software.html
http://www.mitec.cz/Data/XML/data_downloads.xml
http://docs.microsoft.com/sysinternals/
http://www.majorgeeks.com/
http://www.majorgeeks.com/mg/sortname/windows_7_8.html
http://www.intowindows.com/15-free-windows-8-1-customization-tweaking-tools/
http://www.nextofwindows.com/a-list-of-windows-8-tweaking-tools/
http://www.thewindowsclub.com/list-freeware-releases-from-the-windows-club/
http://www.softpedia.com/hubs/Tweak-Windows-8/
http://www.snapfiles.com/freeware/system/fwsystweak.html
http://www.mdgx.com/xptoy.htm
http://www.mdgx.com/toy.htm
http://www.mdgx.com/nettoys.htm
http://www.mdgx.com/fw.htm
http://www.mdgx.com/tools.php
______________________________________________________________________________



Free(ware) Start Menu Shell Replacements



* Open-Shell Start Menu + button/logo/orb replacer 32-bit + 64-bit [Classic Shell fork] (free, open source):
http://open-shell.github.io/Open-Shell-Menu/
ReadMe:
http://github.com/Open-Shell/Open-Shell-Menu/
Download:
http://github.com/Open-Shell/Open-Shell-Menu/releases/latest/
Open-Shell Guides:
http://askleo.com/open-shell-regain-your-start-menu-in-windows-and-much-more/
http://www.techrepublic.com/article/how-to-use-open-shell-as-your-windows-10-start-menu/
Custom Start button/logo/orb Tutorial:
http://coddec.github.io/Classic-Shell/www.classicshell.net/tutorials/buttontutorial.html
Custom Skin Tutorial:
http://coddec.github.io/Classic-Shell/www.classicshell.net/tutorials/skintutorial.html
Skins:
http://www.winaero.com/best-skins-for-classic-shells-start-menu/
http://www.classicshell.net/gallery/Start-Menu/skins/
http://www.classicshell.net/forum/viewforum.php?f=17
Start Buttons/Orbs:
http://www.classicshell.net/forum/viewforum.php?f=18
http://www.deviantart.com/w1ck3dmatt/art/Mega-Orb-Pack-150-start-orbs-259940654/
http://www.door2windows.com/customization/start-buttons/
Aero Glass mod [Windows 8/8.1 style UI] for Windows 8/8.1/10/11:
http://www.glass8.eu/
Open-Shell/Classic Shell Free(ware) Alternatives:
http://classicshell.sourceforge.net/alternatives.html
http://classic-shell.en.softonic.com/windows/alternatives/
http://www.alternativeto.net/software/classicshell/
http://www.makeuseof.com/tag/windows-start-menu-alternatives/
http://www.similarindex.com/classic-shell-alternatives/

* Power8 Start Menu replacer for Windows 8/8.1, works with Windows 7:
http://github.com/AgentMC/power8/
Download:
http://github.com/AgentMC/power8/releases/latest/

* Start Menu X Start Menu replacer [CRIPPLED freeware!] for Windows 7/newer:
http://www.startmenux.com/
File:
http://www.startmenux.com/StartMenuX_Setup_freeware.exe

* Pokki Start Menu replacer for Windows 8/8.1, works with Windows 7:
http://www.pokki.com/
File:
http://cdn.pokki.com/download/PokkiStartMenuInstaller.exe
______________________________________________________________________________



Turn OFF/ON User Account Control (UAC)



* FIX (Temporary): In Windows Vista/newer you must right-click each app/file/executable/program/installer/DOS console (command
prompt)/BATch (CoMmanD) file/icon/link/shortcut/script/screen saver/etc and select "Run as Administrator" every time you're
trying to use it in order to execute/run it/them the way they were intended, fully functional.
Otherwise a nagging dialog box will pop up and you will be prompted to Run.../Open/Save/etc them, or you won't be allowed to
execute/run them every time you (double-)click on them directly or their icons/links/shortcuts (.lnk), and you will notice
most of them will not execute/function/operate/run properly, and/or are crippled, exhibit abnormalities, limitations,
restrictions, and/or inappropriate behavior. ;-(
* FIX (Permanent): Turn OFF User Account Control (UAC):
- Windows 10/2016/2019/11/2022:
http://www.tenforums.com/tutorials/3577-user-account-control-uac-change-settings-windows-10-a.html
- Windows 8/2012/8.1/2012 R2:
http://www.eightforums.com/tutorials/5509-user-account-control-uac-change-settings-windows-8-a.html
- Windows 7/7 SP1/2008 R2:
http://petri.com/disable-uac-in-windows-7/
- Windows Vista/2008:
http://petri.com/disable_uac_in_windows_vista/
* IMPORTANT:
- Always make sure you have Administrative (admin, administrator, main/power user, owner, sysadmin, SYSTEM) privileges for all
computer(s)/device(s) in your environment, and that you are using
approved/authorized/certified/legitimate/safe/scanned/secure/trustworthy apps/files/programs/software/etc, preferably located
on your local/personal storage device(s)/media.
- Always make sure all files acquired/copied/downloaded/installed/obtained/etc from external/remote/other
sources/networks/internet/etc are approved/authorized/certified/legitimate/safe/scanned/secure/trustworthy.
- Always make sure to check/scan periodically all your computer(s)/device(s) + storage device(s)/media for malware/spyware.
http://www.mdgx.com/vir.htm

* UAC_OFF.REG Registry file disables all User Account Control (UAC) annoyances:
http://www.tenforums.com/user-accounts-family-safety/98737-standard-user-able-access-admin-folders.html
http://batcmd.com/windows/7/services/luafv/
http://parsons-technology.com/what-is-luafv/
http://docs.microsoft.com/windows-hardware/customize/desktop/unattend/microsoft-windows-lua-settings/
http://docs.microsoft.com/windows/security/identity-protection/user-account-control/user-account-control-group-policy-and-registry-key-settings/
http://docs.microsoft.com/windows/security/identity-protection/user-account-control/how-user-account-control-works/
http://docs.microsoft.com/windows/security/identity-protection/user-account-control/user-account-control-security-policy-settings/
http://docs.microsoft.com/openspecs/windows_protocols/ms-gpsb/9ad50fd3-4d8d-4870-9f5b-978ce292b9d8/
http://docs.microsoft.com/openspecs/windows_protocols/ms-gpsb/7c705718-f58e-4886-8057-37c8fd9aede1/
http://www.stigviewer.com/stig/windows_10/2020-06-15/finding/V-63827
http://admx.help/?Category=Windows_10_2016&Policy=Microsoft.Policies.Auditing::IncludeCmdLine
BACKUP YOUR REGISTRY BEFORE MAKING ANY CHANGES! -> See "BACKUP/EXPORT + RESTORE/IMPORT REGISTRY/REGISTRY KEY(S)" in
WINDOWS7.TXT (this file):
http://www.mdgx.com/7.php#:~:text=BACKUP%2FEXPORT%20%2B%20RESTORE%2FIMPORT%20REGISTRY%2FREGISTRY%20KEY%28S%29%20%21
WARNING:
********
If LUAfv service [provided by the %WinDir%\SYSTEM32\DRIVERS\luafv.sys driver] is disabled [.reg file below: "Start"=dword:4]
certain Windows components/features/functions will not work, and Windows Server users may experience errors in
multiuser/networked/enterprise/server environments:
http://developpaper.com/windows-ad-error-message-resolution-uac-file-virtualization-service-failed-to-start-this-driver-is-blocked-from-loading/
http://www.wincert.net/windows-server/event-id-7000-uac-file-virtualization-error/
http://www.microsoftpressstore.com/articles/article.aspx?p=2228450&seqNum=9
http://www.programmersought.com/article/27216104324/
Examples:
- Internet Explorer (IE) [discontinued!] sandbox mode = DISABLED;
- Metro/Tile/Store/Universal Windows Platforms (UWP) apps = DISABLED;
- certain Windows Server components + functions = DISABLED.
CAUTION:
********
This requires adequate/advanced knowledge about critical computing, operating systems, shared environments, networks,
cybersecurity.
Recommended for single user environments without any add-ons/components/extensions/extras/optional features/services which
may require specific configurations/items/properties/settings for proper operation.
Not recommended for multiuser/networked/enterprise/server environments processing/storing/delivering
encrypted/protected/secure critical/private/sensitive/vital analysis/data/information.
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
; MUST restart/reboot after turning UAC ON or OFF !
; Disable User Account Control file virtualization (LUAfv) Service:
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\luafv]
"Start"=dword:4
; Disable ALL UAC settings:
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System]
"ConsentPromptBehaviorAdmin"=dword:0
"ConsentPromptBehaviorUser"=dword:1
"DisableStatusMessages"=dword:0
"DontDisplayLastUserName"=dword:0
"EnableInstallerDetection"=dword:0
"EnableLUA"=dword:0
"EnableSecureUIAPaths"=dword:0
"EnableUIADesktopToggle"=dword:1
"EnableVirtualization"=dword:1
"FilterAdministratorToken"=dword:0
"NoInternetOpenWith"=dword:1
"PromptOnSecureDesktop"=dword:0
"SCForceOption"=dword:0
"SynchronousMachineGroupPolicy"=dword:0
"SynchronousUserGroupPolicy"=dword:0
"ValidateAdminCodeSignatures"=dword:0
"VerboseStatus"=dword:0
;
------End cut & paste here------
Perform same steps for UAC_OFF.BAT BATch (.bat) file, which also disables UAC:
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text BATch (.bat) or CoMmanD (.cmd) script file containing the lines between Cut & Paste delimiters below
-> save it as plain text/ASCII file (Encode: -> ANSI) with the BAT (.bat) or CMD (.cmd) extension -> right-click it ->
Run as Administrator -> wait for completion.
-----Begin cut & paste here-----
@ECHO OFF
IF NOT "%OS%"=="Windows_NT" GOTO END
:: MUST restart/reboot after turning UAC ON or OFF !
:: Disable User Account Control file virtualization (LUAfv) Service:
ECHO Y|NET.EXE STOP luafv
SC.EXE CONFIG luafv START= disabled
:: Disable UAC:
REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v EnableLUA /t REG_DWORD /d 0 /f
:END
EXIT
------End cut & paste here------
Restart/reboot.

* UAC_ON.REG Registry file enables all User Account Control (UAC) annoyances:
http://www.tenforums.com/user-accounts-family-safety/98737-standard-user-able-access-admin-folders.html
http://docs.microsoft.com/windows/security/identity-protection/user-account-control/user-account-control-group-policy-and-registry-key-settings/
http://docs.microsoft.com/windows/security/identity-protection/user-account-control/how-user-account-control-works/
http://docs.microsoft.com/windows/security/identity-protection/user-account-control/user-account-control-security-policy-settings/
http://docs.microsoft.com/openspecs/windows_protocols/ms-gpsb/9ad50fd3-4d8d-4870-9f5b-978ce292b9d8/
http://docs.microsoft.com/openspecs/windows_protocols/ms-gpsb/7c705718-f58e-4886-8057-37c8fd9aede1/
http://www.stigviewer.com/stig/windows_10/2020-06-15/finding/V-63827
http://admx.help/?Category=Windows_10_2016&Policy=Microsoft.Policies.Auditing::IncludeCmdLine
CAUTION:
********
This requires adequate/advanced knowledge about critical computing, operating systems, shared environments, networks,
cybersecurity.
Recommended for single user environments without any add-ons/components/extensions/extras/optional features/services which
may require specific configurations/items/properties/settings for proper operation.
Not recommended for multiuser/networked/enterprise/server environments processing/storing/delivering
encrypted/protected/secure critical/private/sensitive/vital analysis/data/information.
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
; MUST restart/reboot after turning UAC ON or OFF !
; Enable User Account Control file virtualization (LUAfv) Service:
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\luafv]
"Start"=dword:2
; Enable ALL UAC settings:
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System]
"ConsentPromptBehaviorAdmin"=dword:2
; "ConsentPromptBehaviorUser"=dword:3
"ConsentPromptBehaviorUser"=dword:0
"DisableStatusMessages"=dword:1
"DontDisplayLastUserName"=dword:1
"EnableInstallerDetection"=dword:1
"EnableLUA"=dword:1
"EnableSecureUIAPaths"=dword:1
"EnableUIADesktopToggle"=dword:0
"EnableVirtualization"=dword:0
"FilterAdministratorToken"=dword:1
"NoInternetOpenWith"=dword:0
"PromptOnSecureDesktop"=dword:1
"SCForceOption"=dword:1
"SynchronousMachineGroupPolicy"=dword:1
"SynchronousUserGroupPolicy"=dword:1
"ValidateAdminCodeSignatures"=dword:1
"VerboseStatus"=dword:1
;
------End cut & paste here------
Perform same steps for UAC_ON.BAT BATch (.bat) file, which also enables UAC:
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text BATch (.bat) or CoMmanD (.cmd) script file containing the lines between Cut & Paste delimiters below
-> save it as plain text/ASCII file (Encode: -> ANSI) with the BAT (.bat) or CMD (.cmd) extension -> right-click it ->
Run as Administrator -> wait for completion.
-----Begin cut & paste here-----
@ECHO OFF
IF NOT "%OS%"=="Windows_NT" GOTO END
:: MUST restart/reboot after turning UAC ON or OFF !
:: Enable User Account Control file virtualization (LUAfv) Service:
ECHO Y|NET.EXE START luafv
SC.EXE CONFIG luafv START= auto
:: Enable UAC:
REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v EnableLUA /t REG_DWORD /d 1 /f
:END
EXIT
------End cut & paste here------
Restart/reboot.

* Elevate low/standard/Administrator level end/home/local/single user access/permissions/privileges/rights to
system wide/network/server Administrator/SYSTEM/Sysadmin level in Windows Vista/newer:
http://www.tenforums.com/user-accounts-family-safety/98737-standard-user-able-access-admin-folders.html
http://docs.microsoft.com/windows/security/identity-protection/user-account-control/user-account-control-group-policy-and-registry-key-settings/
http://docs.microsoft.com/windows/security/identity-protection/user-account-control/how-user-account-control-works/
http://docs.microsoft.com/windows/security/identity-protection/user-account-control/user-account-control-security-policy-settings/
http://docs.microsoft.com/openspecs/windows_protocols/ms-gpsb/9ad50fd3-4d8d-4870-9f5b-978ce292b9d8/
http://docs.microsoft.com/openspecs/windows_protocols/ms-gpsb/7c705718-f58e-4886-8057-37c8fd9aede1/
http://www.stigviewer.com/stig/windows_10/2020-06-15/finding/V-63827
http://admx.help/?Category=Windows_10_2016&Policy=Microsoft.Policies.Auditing::IncludeCmdLine
CAUTION:
********
This requires adequate/advanced knowledge about critical computing, operating systems, shared environments, networks,
cybersecurity.
Recommended for single user environments without any add-ons/components/extensions/extras/optional features/services which
may require specific configurations/items/properties/settings for proper operation.
Not recommended for multiuser/networked/enterprise/server environments processing/storing/delivering
encrypted/protected/secure critical/private/sensitive/vital analysis/data/information.
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System]
"ConsentPromptBehaviorAdmin"=dword:0
"ConsentPromptBehaviorUser"=dword:3
"EnableFullTrustStartupTasks"=dword:1
"EnableInstallerDetection"=dword:0
"EnableLUA"=dword:0
"EnableSecureUIAPaths"=dword:0
"EnableUwpStartupTasks"=dword:1
"EnableUIADesktopToggle"=dword:1
"EnableVirtualization"=dword:1
"FilterAdministratorToken"=dword:1
"PromptOnSecureDesktop"=dword:0
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Audit]
"ProcessCreationIncludeCmdLine_Enabled"=dword:0
;
------End cut & paste here------
OR:
BATch (.bat)/CoMmanD (.cmd) script below 1st checks if the user has Administrator/SYSTEM/Sysadmin
access/permissions/privileges/rights, and only if condition is met it will run the script, otherwise it will abort and
exit (example):
http://stackoverflow.com/questions/14639743/
http://www.robvanderwoude.com/clevertricks.php
http://stackoverflow.com/questions/4051883/
http://superuser.com/questions/667607/
http://www.sevenforums.com/tutorials/11949-elevated-program-shortcut-without-uac-prompt-create.html
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text BATch (.bat) or CoMmanD (.cmd) script file containing the lines between Cut & Paste delimiters below
-> save it as plain text/ASCII file (Encode: -> ANSI) with the BAT (.bat) or CMD (.cmd) extension -> right-click it ->
Run as Administrator -> wait for completion.
-----Begin cut & paste here-----
@ECHO OFF
IF NOT "%OS%"=="Windows_NT" GOTO END
NET.EXE session
IF %ERRORLEVEL% EQU 0 (
ECHO.
ECHO 
ECHO You seem to have (Sys)Admin/SYSTEM privileges. Continue...
ECHO 
ECHO.
:: ECHO Press a key to continue...
:: PAUSE >NUL 2>&1
GOTO CNT
) ELSE (
ECHO.
ECHO 
ECHO Administrator/SYSTEM/Sysadmin *REQUIRED* to perform operations below !
ECHO Right-click this BATch/icon/shortcut + select "Run as Administrator",
ECHO OR log/sign back in as Administrator/SYSTEM/Sysadmin + then repeat step above.
ECHO 
ECHO.
ECHO Press a key to exit...
PAUSE >NUL 2>&1
GOTO END
EXIT /B 1
)
:CNT
ECHO.
ECHO 
ECHO Make sure you're familiar with all settings below *before* running
ECHO this script = see web pages at the top of this topic for info.
ECHO Abort if you need more time, then run this BATch again when ready.
ECHO 
ECHO.
ECHO * Press a key to continue, OR...
ECHO * Hold Ctrl + press Break/Pause -> press Y -> press Enter to abort...
PAUSE >NUL 2>&1
:: Admin Consent: 0 = Elevate without prompting | 1 = Prompt for credentials secure desktop | 2 = Prompt for consent secure desktop
:: | 3 = Prompt for credentials | 4 = Prompt for consent | 5 = Prompt for consent non-Windows binaries [DEFAULT]:
REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "ConsentPromptBehaviorAdmin" /t REG_DWORD /d 0 /f
:: User Consent: 0 = Automatically deny elevation requests | 1 = Prompt for credentials on secure desktop | 3 = Prompt for credentials [DEFAULT]:
REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "ConsentPromptBehaviorUser" /t REG_DWORD /d 3 /f
:: Allow fully trusted startup tasks: 0 = Disabled | 1 = Enabled | 2 = Filtered (UAC) [DEFAULT]:
REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableFullTrustStartupTasks" /t REG_DWORD /d 1 /f
:: Detect app installs and prompt for elevation: 1 = Enabled [DEFAULT = Home] | 0 = Disabled [DEFAULT = Enterprise]:
REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableInstallerDetection" /t REG_DWORD /d 0 /f
:: Run all Admins in Admin approval mode: 0 = Disabled (UAC) | 1 = Enabled (UAC):
REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t REG_DWORD /d 0 /f
:: Elevate only UIAccess apps installed in secure locations: 0 = Disabled | 1 = Enabled [DEFAULT]:
REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableSecureUIAPaths" /t REG_DWORD /d 0 /f
:: Allow UWP startup tasks: 0 = Disabled [DEFAULT] | 1 = Enabled | 2 = Filtered (UAC) [?]:
REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableUwpStartupTasks" /t REG_DWORD /d 1 /f
:: Allow UIAccess apps to prompt for elevation without secure desktop: 0 = Disabled [DEFAULT] | 1 = Enabled:
REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableUIADesktopToggle" /t REG_DWORD /d 1 /f
:: Enable virtualization: 0 = Disabled | 1 = Enabled [DEFAULT]:
REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableVirtualization" /t REG_DWORD /d 1 /f
:: Admin approval mode for built-in Admin account: 0 = Disabled [DEFAULT] | 1 = Enabled:
REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "FilterAdministratorToken" /t REG_DWORD /d 1 /f
:: Allow UIAccess apps to prompt for elevation without secure desktop: 0 = Disabled [DEFAULT] | 1 = Enabled:
REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "PromptOnSecureDesktop" /t REG_DWORD /d 0 /f
:: Command-line audit logging: 1 = Enable command-line audit logging | 0 = Disable command-line audit logging:
REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Audit" /v "ProcessCreationIncludeCmdLine_Enabled" /t REG_DWORD /d 0 /f
:END
EXIT
------End cut & paste here------
BATch (.bat)/CoMmanD (.cmd) script example bellow elevates user access/permissions/privileges/rights to "Run as Administrator",
and continues running it in the same session without exiting. Just replace [cut & paste] the 2 lines bellow the ") ELSE (" line
with your desired script code -> see comment line starting with a double colon [:: ]:
http://www.robvanderwoude.com/clevertricks.php
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text BATch (.bat) or CoMmanD (.cmd) script file containing the lines between Cut & Paste delimiters below
-> save it as plain text/ASCII file (Encode: -> ANSI) with the BAT (.bat) or CMD (.cmd) extension -> right-click it ->
Run as Administrator -> wait for completion.
-----Begin cut & paste here-----
@ECHO OFF
IF NOT "%OS%"=="Windows_NT" GOTO END
IF '%ERRORLEVEL%' NEQ '0' (
ECHO SET UAC=CreateObject^("Shell.Application"^)>"%TEMP%\runasadm.vbs"
ECHO UAC.ShellExecute "%~s0","","","runas",1>>"%TEMP%\runasadm.vbs"
"%TEMP%\runasadm.vbs"
DEL /F /Q "%TEMP%\runasadm.vbs"
EXIT /B
) ELSE (
:: Replace next 2 lines with script code you wish to run as Administrator:
PUSHD "%CD%"
CD /D "%~dp0"
)
:END
EXIT
------End cut & paste here------

* Turn OFF Secure (Dimmed) Desktop for User Account Control (UAC) prompt in Windows 7/newer:
http://msdn.microsoft.com/library/cc232766.aspx
http://www.tenforums.com/tutorials/112520-enable-disable-dimmed-secure-desktop-uac-prompt-windows.html
http://github.com/okieselbach/Intune/blob/master/DisablePromptOnSecureDesktop.ps1
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System]
"PromptOnSecureDesktop"=dword:0
;
------End cut & paste here------

* Change User Account Control (UAC) settings in Windows 7/newer:
- Disable Windows User Access Control (UAC):
http://www.keithholloway.net/blog/how-to-disable-windows-user-access-control-uac/
- Registry Tweaks to Customize User Account Control (UAC) Options in Windows Vista and Later:
http://www.askvg.com/how-to-tweak-user-account-control-uac-options-in-windows-vista-home-basic-home-premium/
- UAC and Application Run Levels:
http://www.slickit.ca/2009/05/uac-and-application-run-levels.html
- MSKB: Disable UAC Prompt for certain apps:
http://web.archive.org/web/20080103052016/http://support.microsoft.com/kb/946932
- MSKB: Disabling UAC Prompt for certain apps:
http://web.archive.org/web/20121225075400/http://kartones.net/blogs/kartones/archive/2008/01/21/kb946932-disabling-uac-prompt-for-certain-apps-not-that-useful.aspx
- Selectively disable UAC for trusted Windows Vista/7/newer apps:
http://www.techrepublic.com/blog/windows-and-office/selectively-disable-uac-for-your-trusted-vista-applications/
- MS DOCs: UAC Group Policy Settings and Registry Key Settings:
http://technet.microsoft.com/library/dd835564.aspx
- MSDN: FilterAdministratorToken Registry DWORD [REG_DWORD] value:
http://msdn.microsoft.com/library/cc232760.aspx
- MSDN: ConsentPromptBehaviorAdmin Registry DWORD [REG_DWORD] value:
http://msdn.microsoft.com/library/cc232761.aspx
- MSDN: ConsentPromptBehaviorUser Registry DWORD [REG_DWORD] value:
http://msdn.microsoft.com/library/cc232762.aspx
- MSDN: EnableInstallerDetection Registry DWORD [REG_DWORD] value:
http://msdn.microsoft.com/library/cc232763.aspx
- MSDN: ValidateAdminCodeSignatures Registry DWORD [REG_DWORD] value:
http://msdn.microsoft.com/library/cc232764.aspx
- MSDN: EnableLUA Registry DWORD [REG_DWORD] value:
http://msdn.microsoft.com/library/cc232765.aspx
- MSDN: PromptOnSecureDesktop Registry DWORD [REG_DWORD] value:
http://msdn.microsoft.com/library/cc232766.aspx
- MSDN: EnableVirtualization Registry DWORD [REG_DWORD] value:
http://msdn.microsoft.com/library/cc232767.aspx
- MSKB: PromptOnSecureDesktop Registry Value:
http://support.microsoft.com/help/975788/
- Configure Windows UAC prompt behavior for admins and users:
http://www.ghacks.net/2013/06/20/how-to-configure-windows-uac-prompt-behavior-for-admins-and-users/
- Changing How UAC Works (The Hard Way):
http://www.sourcedaddy.com/windows-7/changing-how-uac-works-the-hard-way.html
- Windows 7: User Account Control (UAC) Change Notification Settings:
http://www.sevenforums.com/tutorials/299-user-account-control-uac-change-notification-settings.html
- MSKB: Adjust User Account Control Settings in Windows 7/8/8.1:
http://support.microsoft.com/help/975787/

* Free(ware) User Account Control (UAC) tools:
- UAC Pass 32-bit + 64-bit:
http://sites.google.com/site/freeavvarea/uac-pass/uac-pass/
Download:
http://www.majorgeeks.com/files/details/uac_pass.html
- TweakUAC:
http://www.winability.com/tweak-uac/
Download:
http://www.majorgeeks.com/files/details/tweakuac.html
File:
http://www.winability.com/download/TweakUAC.exe
- Disable UAC:
http://www.majorgeeks.com/files/details/disable_uac.html

* Run always as Administrator:
http://www.superuser.com/questions/204781/
A. Add User to Administrators Group + remove User from Users Group:
1. Log/sign in as Administrator -> Run... [hold WinKey + press R] -> type:
CONTROL.EXE userpasswords2
-> press Enter.
2. Your Account Name -> Properties -> Group Membership tab -> Administrators -> OK -> OK.
B. Disable Approval Mode:
http://www.askvg.com/how-to-tweak-user-account-control-uac-options-in-windows-vista-home-basic-home-premium/
http://www.tweakhound.com/vista/tweakguide/page_5.htm
http://msdn.microsoft.com/library/cc232771.aspx
1. Log/sign in as Administrator -> Run... [hold WinKey + press R] -> type:
SECPOL.MSC
-> press Enter.
2. Local Polices -> Security Options.
3. User Account Control (UAC): Switch to secure desktop when prompting for elevation -> Disable -> OK.
4. Must restart/reboot for these changes to take effect.

* Windows NTx NTFS Access Control List (ACL) ownership/access/elevation/permissions + run as Administrator free(ware) tools
-> "NTFS ACL + OWNER" -> TOOLS.TXT (included):
http://www.mdgx.com/tools.php
http://www.mdgx.com/TOOLS.TXT
MDGx "Access Control Lists (ACL) + Ownership Tools" [free(ware)] for Windows NTx" topic in SOFTWARE.TXT (included):
http://www.mdgx.com/xptoy.htm#ACL
______________________________________________________________________________



Free(ware) BOOT Tools + Tweaks



* MDGx "Free(ware) Windows Boot Managers" section in SOFTWARE.TXT (included):
http://www.mdgx.com/toy.htm#BOO

* MDGx "Free(ware) Windows Boot Tweakers" section in SOFTWARE.TXT (included):
http://www.mdgx.com/toy.htm#BINI

* MDGx "Free(ware) DOS Boot Managers" section in SOFTWARE.TXT (included):
http://www.mdgx.com/dos.htm#BTM

* BellaVista 32-bit + 64-bit BOOT.INI, Boot Configuration Data (BCD) + BCDEdit.exe interface (GUI) tweaking tool:
http://www.zezula.net/en/fstools/bellavista.html
File:
http://www.zezula.net/download/bellavista_en.zip

* Visual BCD Editor (VBCDE) Boot Configuration Data (BCD) + BCDEdit.exe interface (GUI) tweaking tool:
http://www.boyans.net/
VBCDE Download:
http://www.boyans.net/DownloadVisualBCD.html
File:
http://www.boyans.net/VisualBcd/VisualBcd_0.9.3.1.msi
VBCDE DOCument:
http://www.boyans.net/VisualBCD_doc.htm
VBCDE Guide:
http://www.boyans.net/VBCD_HowTo.html

* Dual-Boot Repair (DBR) GUI tool repairs any Windows XP/newer multi-boot setup:
http://www.boyans.net/dual-boot-repair-windows-10.html
File:
http://www.boyans.net/dbr7/dbr-1.3.0.0.zip
Online Help:
http://www.boyans.net/DualBootRepairHelp.html
Repair Windows boot:
http://www.boyans.net/RepairWindows/repair-windows-boot.html
Requires Microsoft .Net Framework Redistributable (NFR) 2.0/newer (free):
http://www.mdgx.com/add.htm#NFR

* EasyBCD Community Edition 32-bit Boot Configuration Data (BCD), BCDEDIT.EXE + BOOT.INI interface (GUI) tweaking tool:
http://www.neosmart.net/EasyBCD/
File:
http://www.softpedia.com/get/System/OS-Enhancements/EasyBCD.shtml
EasyBCD Online DOCumentation:
http://www.neosmart.net/wiki/easybcd/

* MBRFix 32-bit + 64-bit command line MBR/EMBR create/backup/restore/repair tool:
http://www.sysint.no/mbrfix/
File:
http://www.sysint.no/wp-content/uploads/2018/02/mbrfix.zip
http://www.softpedia.com/get/System/Hard-Disk-Utils/MBRFix.shtml

* Stop Check Disk (ChkDsk) from Running at Startup:
http://www.top-password.com/blog/stop-check-disk-chkdsk-from-running-at-startup/
http://www.top-password.com/blog/how-to-manually-clear-or-set-dirty-bit-on-windows-volume/
http://docs.microsoft.com/windows-server/administration/windows-commands/chkntfs/
http://www.ss64.com/nt/chkntfs.html
Check Disk (ChkDsk) [CHKDSK.EXE] + Check NTFS (ChkNTFS) [CHKNTFS.EXE] DOS console command line tools are both located in the
%WinDir%\SYSTEM32 folder [%WinDir% = usually C:\WINDOWS].
View all directories/folders listed in your system PATH from a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE):
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter:
PATH
Exclude all drives/partitions/volumes from boot/startup check + turn OFF check NTFS disk/partition/volume AUTOCHK countdown time:
from a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE): right-click CMD shortcut/CMD.EXE -> Run as Administrator ->
run these commands -> press Enter after each line:
CHKNTFS.EXE /X C: D: E: F: G: H: I: J: K: L: M: N: O: P: Q: R: S: T: U: V: W: X: Y: Z:
CHKNTFS.EXE /T:0
View these DOS console tools command line options, switches + parameters: from a DOS console command prompt
(%WinDir%\SYSTEM32\CMD.EXE) right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run these commands -> press Enter after
each line:
CHKDSK.EXE /?
CHKNTFS.EXE /?

* Turn ON Solid State memory Drive (SSD) TRIM Advanced Technology Attachment (ATA) command to maximize performance for all
local/removable physical/logical SSD/NVMe/M.2/USB/cards/sticks/etc disks/partitions/volumes in Windows 7/7 SP1/8/8.1/10/11 using
File System Utility (FSUtil) [FSUTIL.EXE] command line tool:
http://docs.microsoft.com/windows-server/administration/windows-commands/fsutil/
http://docs.microsoft.com/windows-server/administration/windows-commands/fsutil-8dot3name/
http://docs.microsoft.com/windows-server/administration/windows-commands/fsutil-behavior/
http://www.ss64.com/nt/fsutil.html
http://www.commandwindows.com/fsutil.htm
TRIM ATA command:
http://en.wikipedia.org/wiki/Trim_(computing)
Troubleshoot Disks + File Systems:
http://technet.microsoft.com/library/bb457122.aspx
Windows 7/7 SP1 FSUTIL.EXE Hotfix/Update 32-bit + 64-bit improves compatibility with Advanced Format Disk Drives (AFD):
http://support.microsoft.com/help/982018/
Download:
http://www.catalog.update.microsoft.com/search.aspx?q=KB982018
- FSUTIL.EXE Hotfix 64-bit for Windows 7/7 SP1 64-bit (x64):
http://download.windowsupdate.com/msdownload/update/software/updt/2011/04/windows6.1-kb982018-v3-x64_7853a1c9c63611e17cd2c923704bf2e924bdfe7b.msu
- FSUTIL.EXE Hotfix 32-bit for Windows 7/7 SP1 32-bit (x86):
http://download.windowsupdate.com/msdownload/update/software/updt/2011/04/windows6.1-kb982018-v3-x86_b009d84249f14d4eaae7aa522be37c38dd83531b.msu
Advanced Format Disk (AF):
http://en.wikipedia.org/wiki/Advanced_Format
FSUTIL behavior command line options, switches + parameters:
http://technet.microsoft.com/library/cc785435.aspx
FSUtil quota command line options, switches + parameters:
http://technet.microsoft.com/library/cc788136.aspx
FSUtil resource command line options, switches + parameters:
http://technet.microsoft.com/library/ff621564.aspx
FSUtil usn command line options, switches + parameters:
http://technet.microsoft.com/library/cc788042.aspx
FSUtil fsinfo command line options, switches + parameters:
http://technet.microsoft.com/library/cc788080.aspx
FSUtil 8dot3name command line options, switches + parameters:
http://technet.microsoft.com/library/ff621566.aspx
FSUtil dirty command line options, switches + parameters:
http://technet.microsoft.com/library/cc788091.aspx
FSUtil file command line options, switches + parameters:
http://technet.microsoft.com/library/cc788058.aspx
Monitor Disk Space using FSUtil:
http://www.sqlservercentral.com/blogs/powersql-by-prashanth-jayaram/2016/09/27/sql-server-monitoring-disk-space-with-fsutil-command-line-utility/
Monitor File System using FSUtil:
http://tutorial.wmlcloud.com/windows_server/Windows-Server-2008-Server-Core---Monitoring-the-File-System-with-the-FSUtil-Command-(part-1)---Behavior,-Dirty---File.aspx
Some of the FSUtil command line parameters correspond to Registry DWORD [REG_DWORD] 32-bit values under the Hive Key Local Machine
(HKLM) FileSystem subkey:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\FileSystem
Examples:
FSUtil Parameter	Registry Value
覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧
AllowExtChar		NtfsAllowExtendedCharacterIn8dot3Name
BugcheckOnCorrupt	NtfsBugcheckOnCorrupt
Disable8dot3		NtfsDisable8dot3NameCreation
DisableCompression	NtfsDisableCompression
DisableDeleteNotify	DisableDeleteNotification
DisableEncryption	NtfsDisableEncryption
DisableLastAccess	NtfsDisableLastAccessUpdate
EncryptPagingFile	NtfsEncryptPagingFile
MemoryUsage		NtfsMemoryUsage
FSUtil [FSUTIL.EXE] DOS console command line tool is located in the %WinDir%\SYSTEM32 folder [%WinDir% = usually C:\WINDOWS].
View all directories/folders listed in your system PATH from a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE):
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter:
PATH
Turn ON SSD/NVMe TRIM ATA command
http://en.wikipedia.org/wiki/Trim_(computing)
to maximize performance for all local/removable physical/logical SSD/NVMe disks/partitions/volumes (if any), including the
boot disk/partition -> DisableDeleteNotify [ 0 = ON | 1 = OFF ]:
http://www.howtogeek.com/257196/how-to-check-if-trim-is-enabled-for-your-ssd-and-enable-it-if-it-isnt/
http://www.thomas-krenn.com/en/wiki/Optimize_Windows_for_SSDs
http://www.pchardwarehelp.com/guides/optimize-ssd-windows.php
http://www.howtogeek.com/256859/
From a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE): right-click CMD shortcut/CMD.EXE -> Run as Administrator ->
run these commands -> press Enter after each line (examples):
FSUTIL.EXE behavior set DisableDeleteNotify 0
FSUTIL.EXE behavior set AllowExtChar 1
FSUTIL.EXE behavior set BugcheckOnCorrupt 0
FSUTIL.EXE behavior set DisableCompression 0
FSUTIL.EXE behavior set DisableEncryption 0
FSUTIL.EXE behavior set DisableLastAccess 0
FSUTIL.EXE behavior set EncryptPagingFile 1
FSUTIL.EXE behavior set MemoryUsage 2
FSUTIL.EXE behavior set Disable8dot3 0
View FSUtil [FSUTIL.EXE] command line options, switches + parameters (examples): from a DOS console command prompt
(%WinDir%\SYSTEM32\CMD.EXE) right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run these commands -> press Enter after
each line:
FSUTIL.EXE
FSUTIL.EXE behavior set

* Turn OFF Maintain Objects List (MOL) global flag for local open files + turn OFF all local/removable physical/logical
disks/partitions/volumes performance counters:
http://docs.microsoft.com/windows-server/administration/windows-commands/openfiles/
http://docs.microsoft.com/windows-server/administration/windows-commands/diskperf/
http://www.ss64.com/nt/openfiles.html
Open Files (OpenFiles) [openfiles.exe] + Disk Performance (DiskPerf) [DISKPERF.EXE] DOS console command line tools are located
in the %WinDir%\SYSTEM32 folder [%WinDir% = usually C:\WINDOWS].
From a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE): right-click CMD shortcut/CMD.EXE -> Run as Administrator ->
run these commands -> press Enter after each line:
openfiles.exe /Local OFF
DISKPERF.EXE -N
View these DOS console tools command line options, switches + parameters: from a DOS console command prompt
(%WinDir%\SYSTEM32\CMD.EXE) right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run these commands ->
press Enter after each line:
openfiles.exe /?
DISKPERF.EXE /?
See also "* Turn OFF Diagnostic Tracing [DiagTrack], Data Collection/Logging [DataCollection], Telemetry + Performance
Counters..." section further above.

* BootCfg [BOOTCFG.EXE] is located in the %WinDir%\SYSTEM32 folder [%WinDir% = usually C:\WINDOWS]:
http://learn.microsoft.com/windows-server/administration/windows-commands/bootcfg/
View all directories/folders listed in your system PATH from a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE):
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter:
PATH
Windows Recovery Console (WRC) command used to build or modify the BOOT.INI file in Windows 2000/XP/2003 ->
"FREE Windows 9x/NTx Boot Tweakers" -> SOFTWARE.TXT (included):
http://www.mdgx.com/toy.htm#BINI
BootCfg can be used to multi-boot with other operating systems (OSes) like Windows 9x/NTx, Linux, etc.
NOTE:
In Windows 2000/XP/2003 BootCfg is available only from within the Recovery Console.
View BootCfg [BOOTCFG.EXE] options, switches + parameters: from a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE)
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter:
BOOTCFG.EXE /?

* Switch Windows Vista/7/7 SP1 Boot Disk drive/partition/volume letters using BcdBoot [BCDBOOT.EXE]:
http://www.hanselman.com/blog/SwitchingMyWindows7BootDiskFromDToCWithBCDBootRatherThanBCDEdit.aspx
http://social.technet.microsoft.com/forums/windows/1a909e7c-6ffe-48df-a179-6cba7256e836/
http://www.boyans.net/MoveWindows7BootFilesToAnotherDrive.html
BcdBoot is a Windows Vista/7/7 SP1 BCD boot file creation + repair command line tool.
BcdBoot [BCDBOOT.EXE] is available only in Windows Vista/7/7 SP1, and is located in the %WinDir%\SYSTEM32 folder
[%WinDir% = usually C:\WINDOWS].
View all directories/folders listed in your system PATH from a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE):
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter:
PATH
View BcdBoot command line options, switches + parameters: from a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE)
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter:
BCDBOOT.EXE /?

* BcdEdit [BCDEDIT.EXE] is available only in Windows Vista/7/7 SP1, and is located in the %WinDir%\SYSTEM32 folder
[%WinDir% = usually C:\WINDOWS]:
View all directories/folders listed in your system PATH from a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE):
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter:
PATH
Boot Configuration Data Store Editor.
BcdEdit Command Line Options:
http://technet.microsoft.com/library/cc709667.aspx
BcdEdit Guide:
http://diddy.boot-land.net/bcdedit/
BcdEdit commands:
http://diddy.boot-land.net/bcdedit/files/commands_list.htm
BcdEdit command line tool:
http://www.sevenforums.com/tutorials/2676-bcdedit-how-use.html
Use BcdEdit to dual-boot multiple Windows:
http://www.superuser.com/questions/511582/
Dual-boot Windows 7 and Linux using BcdEdit:
http://www.iceflatline.com/2009/09/how-to-dual-boot-windows-7-and-linux-using-bcdedit/
Load/Install Grub4Dos from Windows:
http://diddy.boot-land.net/grub4dos/files/install_windows.htm
BCDEDIT.EXE command line tool modifies the boot configuration data store.
The boot configuration data store contains boot configuration parameters and controls how the operating system is booted.
These parameters were previously in the Boot.ini file (in BIOS-based operating systems) or in the nonvolatile RAM entries
(in Extensible Firmware Interface-based operating systems).
You can use BcdEdit to add, delete, edit, and append entries in the boot configuration data store.
View BcdEdit [BCDEDIT.EXE] command line options, switches + parameters: from a DOS console command prompt
(%WinDir%\SYSTEM32\CMD.EXE) right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run these commands -> press Enter
after each line:
BCDEDIT.EXE /?
BCDEDIT.EXE /? TOPICS
BCDEDIT.EXE /? /createstore

* BootRec [BOOTREC.EXE] is available only in Windows Vista/7/7 SP1, and is located in the %WinDir%\SYSTEM32 folder
[%WinDir% = usually C:\WINDOWS]:
http://support.microsoft.com/help/927392/
View all directories/folders listed in your system PATH from a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE):
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter:
PATH
You can use the Bootrec.exe tool in Windows Recovery Environment (Windows RE) to troubleshoot and repair certain
functions/items:
- master boot record (MBR).
- boot sector.
- Boot Configuration Data (BCD) store.
NOTE:
When you are troubleshooting startup issues by using Windows RE, you should
first try the Startup Repair option in the System Recovery Options dialog box.
If the Startup Repair option does not resolve the issue, or if you must
troubleshoot more steps manually, use BootRec.
To run BootRec you must boot from Windows RE:
1. Place Windows Vista/7/7 SP1 install disc/USB in the disc drive/USB port and start your computer.
2. Press a key when prompted.
3. Select language, time, currency, keyboard or input method and then click Next.
4. Click Repair your computer.
5. Click the operating system you want to repair and then click Next.
6. In System Recovery Options dialog box click Command Prompt.
7. Type Bootrec.exe and then press Enter.
NOTE:
To boot up from a Windows Vista/7/7 SP1 DVD/BD your computer must be configured to start from the DVD/BD drive.
Refer to your documentation/guidelines/manuals/readme files or contact the manufacturer/support/vendor for information.
NOTE:
Use BootRec to troubleshoot "Bootmgr Is Missing" issue.
If rebuilding the BCD does not resolve the startup issue, you can export and delete the BCD, and then run this option again.
This method makes sure BCD is completely rebuilt.
To do this type the following commands at the Windows RE command prompt:
bcdedit /export C:\BCD_Backup
c:
cd boot
attrib bcd -s -h -r
ren c:\boot\bcd bcd.old
bootrec /RebuildBcd
The /FixMbr option writes a Windows Vista/7/7 SP1 compatible MBR to the system partition.
This option does not overwrite the existing partition table.
Use this option when you must resolve MBR corruption issues, or when you have to remove non-standard code from the MBR.
The /FixBoot option writes a new boot sector to the system (boot) drive/partition/volume by using a boot sector compatible
with Windows Vista/7/7 SP1.
Use this option if 1 of the following conditions is true:
- The boot sector has been replaced with a non-standard Windows Vista/7/7 SP1 boot sector.
- The boot sector is damaged.
- An earlier Windows operating system has been installed after Windows Vista/7/7 SP1 was installed.
In this scenario the computer starts by using Windows NT Loader (NTLDR) instead of Windows Boot Manager (Bootmgr.exe).
The /ScanOs option scans all disks for installations compatible with Windows Vista/7/7 SP1.
Additionally, this option displays the entries currently not in the BCD store.
Use this option when there are Windows Vista/7/7 SP1 installations Boot Manager menu does not list.
The /RebuildBcd option scans all disks for installations compatible with Windows Vista/7/7 SP1.
Additionally, this option lets you select the installations you want to add to the BCD store.
Use this option when you must completely rebuild the BCD.
Startup Repair can automatically recover from most BCD problems.
If you prefer to manually analyze and repair problems, you can use BootRec by starting the System Recovery tools, and then
clicking Command Prompt in the System Recovery Options dialog box.
View BootRec [BOOTREC.EXE] command line options, switches + parameters: from a DOS console command prompt
(%WinDir%\SYSTEM32\CMD.EXE) right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter:
BOOTREC.EXE /?

* BootSect [BOOTSECT.EXE] is available only in Windows 7/7 SP1, and is located in the %WinDir%\SYSTEM32 folder
[%WinDir% = usually C:\WINDOWS]:
http://learn.microsoft.com/windows-hardware/manufacture/desktop/bootsect-command-line-options/
View all directories/folders listed in your system PATH from a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE):
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter:
PATH
Boot sector restoration DOS console command line tool.
BOOTSECT.EXE {/help|/nt60|/nt52} {SYS|ALL|:} [/force] [/mbr]
BootSect updates the master boot code for hard disk partitions in order to switch between BOOTMGR and NTLDR.
You can use BootSect to restore the boot sector on your computer(s).
View BootSect [BOOTSECT.EXE] command line options, switches + parameters: from a DOS console command prompt
(%WinDir%\SYSTEM32\CMD.EXE) right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter:
BOOTSECT.EXE /?
______________________________________________________________________________



Windows Side-by-Side (WinSxS) Folder



* Move/delete WinSxS directory/folder + files in Windows Vista/newer:
http://www.thewindowsclub.com/winsxs-folder-windows-7-8/
CAUTION:
1st backup/clone your entire Windows Operating System (OS), or create a fresh restore point!
PendMoves [pendmoves.exe + pendmoves64.exe] + MoveFile [movefile.exe + movefile64.exe] 32-bit + 64-bit command line tools
for Windows NTx unlock, display + delete in-use, protected + system files + schedule these operations for next reboot:
http://docs.microsoft.com/sysinternals/downloads/pendmoves/
File:
http://download.sysinternals.com/files/pendmoves.zip
MS DOCs: PendMoves + MoveFile:
http://technet.microsoft.com/magazine/2009.06.utilityspotlight.aspx
MS DOCs: PendMoves + MoveFile Tips:
http://technet.microsoft.com/magazine/dd370591.aspx
01. Download ZIP file above -> extract PendMoves.exe + MoveFile.exe using an unZIPping/unARChiving/unRARing tool
[free(ware)]
http://www.mdgx.com/toy.htm#ZIP
-> place them in a directory/folder listed in your system PATH.
View all directories/folders listed in your system PATH from a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE):
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter:
PATH
02. Explorer -> C:\WINDOWS\WinSxS -> right-click on it -> Properties -> Security tab -> must list the owner of the
directory/folder user (who must be part of the Administrators group) -> must grant Administrator Full Control.
03. Start a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE): right-click CMD shortcut/CMD.EXE -> Run as Administrator
-> run this command to create a dummy (clone) directory/folder (example) -> press Enter:
MKDIR C:\WINDOWS\WinSxS.moved
04. Create a new junction (a.k.a. symbolic link):
MKLINK /J C:\WINDOWS\WinSxS.link WinSxS.moved
05. Delete WinSxS.moved directory:
RMDIR C:\WINDOWS\WinSxS.moved
06. Use MoveFile.exe (see above) to schedule renaming of WinSxS directory at next restart/reboot.
07. Start a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE): right-click CMD shortcut/CMD.EXE -> Run as Administrator
-> run this command -> press Enter:
MoveFile.exe C:\WINDOWS\WinSxS C:\WINDOWS\WinSxS.moved
This will rename your WinSxS directory/folder before Windows manages to get a lock on it.
08. Start a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE): right-click CMD shortcut/CMD.EXE -> Run as Administrator
-> run this command -> press Enter:
MoveFile.exe C:\WINDOWS\WinSxS.link C:\WINDOWS\WinSxS
This restores your new WinSxS directory/folder in order to avoid OS critical errors!
09. Start a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE): right-click CMD shortcut/CMD.EXE -> Run as Administrator
-> run this command -> press Enter:
PendMoves.exe
to view the 2 pending moves executed above.
10. Restart/reboot.
11. Upon restart/reboot the 2 rename/move operations will execute, and WinSxS directory will be unlocked + allowed to be
moved.
12. Start a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE): right-click CMD shortcut/CMD.EXE -> Run as Administrator
-> run this command -> press Enter:
DIR C:\WINDOWS\WinSxS*
You can see WinSxS.moved directory/folder contents and respective WinSxS junction created above.
If this doesn't work, *must* repeat steps above!
13. Explorer -> copy entire WinSxS.moved directory/folder to \Windows directory/folder on different drive/partition/volume
(D: for example).
14. Rename new directory/folder from WinSxS.moved back to WinSxS (original name).
15. Start a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE): right-click CMD shortcut/CMD.EXE -> Run as Administrator
-> run this command -> press Enter:
RMDIR C:\WINDOWS\WinSxS
16. Start a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE): right-click CMD shortcut/CMD.EXE -> Run as Administrator
-> run this command -> press Enter:
MKLINK /J C:\WINDOWS\WinSxS D:\Windows\WinSxS
17. Explorer -> browse to C:\WINDOWS\WinSxS -> should see all files, even if now they are physically located on different
drive/partition/volume (D: in this example).
18. Restart/reboot.
19. Now you should be able to delete C:\WINDOWS\WinSxS.moved to free some disk space.

* Move/delete Windows Updates (WU) Downloads directory/folder in Windows Vista/newer:
CAUTION:
1st backup/clone your entire Windows Operating System (OS), or create a fresh restore point!
Same process can be applied to Windows Updates (WU) list.
Installed Windows Updates are configured to download to
C:\WINDOWS\SoftwareDistribution
which in time will grow too large, and eventually take too much storage space.
Stop WU service [wuauserv] (if running) -> move/create a directory/folder junction (using MoveFile.exe -> see above)
http://download.sysinternals.com/files/pendmoves.zip
-> restart WU service [wuauserv] from a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE): right-click CMD
shortcut/CMD.EXE -> Run as Administrator -> run these commands -> press Enter after each line (example):
ECHO Y|NET.EXE STOP wuauserv
SC.EXE CONFIG wuauserv START= demand
MKDIR C:\WINDOWS\SoftwareDistribution_NEW
MKLINK /J C:\WINDOWS\SoftwareDistribution_OLD SoftwareDistribution_NEW
RMDIR C:\WINDOWS\SoftwareDistribution_NEW
MoveFile.exe C:\WINDOWS\SoftwareDistribution C:\WINDOWS\SoftwareDistribution_NEW
MoveFile.exe C:\WINDOWS\SoftwareDistribution_OLD C:\WINDOWS\SoftwareDistribution
ECHO Y|NET.EXE START wuauserv
May need to restart/reboot for all these changes to take effect.

* WinSxS frequently asked questions (FAQ):
http://docs.microsoft.com/archive/blogs/joscon/should-you-delete-files-in-the-winsxs-directory-and-whats-the-deal-with-vss/
Q:
Should you delete files inside \WinSxS directory? What's the deal with Volume Shadow Copy (VSS)?
A:
No.
Why? Because component store (\WinSxS) is needed to repair OS binaries in the event file(s) become corrupted, compromised or
missing.
Directories located under component store:
\WinSxS\Catalogs = Security catalogs for each manifest on the system;
\WinSxS\InstallTemp = Temporary location for install events;
\WinSxS\Manifests = Component manifest for each specific component used during operation to make sure files end up in proper
location;
\WinSxS\Temp = Temp directory used for various operations, pending renames;
\WinSxS\Backup = Backups of manifest files in case the copy in \WinSxS\Manifests becomes corrupted;
\WinSxS\Filemaps = File system mapping to a file location;
\WinSxS\ = Binary payloads for each specific component/device.
So long as files in the \Windows\SYSTEM32 directory are valid, most likely you wouldn't see any problems initially, the
machine would most likely operate properly.
However, the 1st time you attempt to update a binary, apply a service pack or service a component, it's going to fail
because the backing components needed don't exist anymore.
The way files end up in \System32 are via hardlinks.
This should help answer another question regarding how Volume Shadow Copy (VSS) is used in servicing.
Short answer: No. We use NTFS hardlinks to project the file to the file system from the component store.
That's why the \WinSxS directory is so important. The files there can be seen as the "authoritative" versions on the file
system.
When there is an issue and a binary needs to be replaced, running
SFC.EXE /SCANFILE
against it verifies the directories above and if the version doesn't match, it will re-project (deliver a fresh copy) it so
it stars working again.
View a hardlink from a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE): right-click CMD shortcut/CMD.EXE -> Run as
Administrator -> run these commands -> press Enter after each line (example):
C:
CD\WINDOWS\SYSTEM32\Drivers
FSUTIL.EXE hardlink list ntfs.sys
which returns this output:
\Windows\System32\drivers\ntfs.sys
\Windows\WinSxS\amd64_microsoft-windows-ntfs_31bf3856ad364e35_6.1.7600.16385_none_02661b64369ca03a\ntfs.sys
You can see the NTFS file has a link to the \WinSxS directory and if that version of NTFS were to become corrupted, we could
go back to the component store and grab a new copy.
The \WinSxS backup directory exists in the event the version in the main directory has also become corrupted.
This is a good method of having decent OS protection without consuming a huge amount of space.
New servicing structure does remove the $NTUninstall$ folders that we have become accustomed to in Windows NT4/2000/XP/2003.
Updates, if they are marked as removable, no longer contain that structure.
Instead, updates are recommended to be removed via Control Panel (CP) -> Programs (and Features) -> (View) Installed
Updates.
Updates can be removed via appropriate switches using DISM.EXE or PKGMGR.EXE, but the Control Panel (CP) method tends to be
cleaner.

* Dism++ -> select "Replaced WinSxS assemblies" -> click OK to cancel "Warning: these installed updates cannot be
uninstalled!" -> Scan -> Cleanup:
http://www.chuyu.me/en/
File:
http://gh.api.99988866.xyz/github.com/Chuyu-Team/Dism-Multi-language/releases/download/v10.1.1002.1/Dism++10.1.1002.1.zip
Documentation:
http://www.chuyu.me/en/Document.html

* Reduce size of WinSxS directory/folder using WinSxSLite:
http://www.dmitrybobrovsky.ru/2012/09/05/decrease-of-the-size-of-folder-winsxs-in-windows-7-or-how-to-use-winsxslite-bat/
http://sites.google.com/site/winsxslite/
NEWest:
http://github.com/zippy1981/Nuget-Packages-FerventCoder/raw/master/WinsxsLite1.88.zip
OLDer:
http://www.dmitrybobrovsky.ru/wp-content/uploads/files/winsxslite.zip

* Reduce size of WinSxS directory/folder using COMPCLN.EXE:
http://www.techrepublic.com/blog/tr-dojo/reduce-the-size-of-the-winsxs-folder-with-vsp1clnexe-and-compclnexe/
http://www.boshdirect.com/Blogs/Tech/how-to-reduce-size-of-winsxs.html

* Reduce size of WinSxS directory/folder by deleting some of the files:
http://blogs.technet.com/b/askcore/archive/2008/09/17/what-is-the-winsxs-directory-in-windows-2008-and-windows-vista-and-why-is-it-so-large.aspx
http://blogs.technet.com/b/joscon/archive/2010/08/06/should-you-delete-files-in-the-winsxs-directory-and-what-s-the-deal-with-vss.aspx
http://www.helpdeskgeek.com/windows-8/cleanup-the-winsxs-folder-in-windows-8-7/

* Reduce size of WinSxS directory/folder by deleting some of the duplicate files:
http://www.msfn.org/board/index.php?showtopic=109131

* Reduce size of WinSxS directory/folder by deleting some of the backup files:
http://technet.microsoft.com/library/dn251565.aspx

* Deployment Image Servicing and Management [DISM.EXE] is located in the %WinDir%\SYSTEM32 folder [%WinDir% = usually
C:\WINDOWS] DOS console command line tool for component cleanup:
http://docs.microsoft.com/windows-hardware/manufacture/desktop/what-is-dism/
http://docs.microsoft.com/windows-hardware/manufacture/desktop/dism-image-management-command-line-options-s14/
View all directories/folders listed in your system PATH from a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE):
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter:
PATH
First backup/clone your operating system drive/partition/volume to a safe location -> see "Free(ware) WinDOwS Backup +
Restore Tools" section in SECRETS.TXT (included):
http://www.mdgx.com/secrets.htm#BKP
Then from a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE): right-click CMD shortcut/CMD.EXE -> Run as Administrator
-> run these 3 commands in this exact order -> press Enter after each line:
DISM.EXE /online /Cleanup-Image /StartComponentCleanup
DISM.EXE /online /Cleanup-Image /StartComponentCleanup /ResetBase
DISM.EXE /online /Cleanup-Image /SpSuperseded

* Microsoft Package Manager [PKGMGR.EXE] Command Line Options:
http://technet.microsoft.com/library/cc749465.aspx
Use Package Manager [PKGMGR.EXE] to Uninstall A Package:
http://support.microsoft.com/help/940410/

* Windows 7 64-bit (x64) vLite extreme removal:
http://www.msfn.org/board/index.php?showtopic=136837
______________________________________________________________________________



Free(ware) Burn/Copy/Write/Install CDs/DVDs/BDs Tools



* Create Windows 7 Live CD/DVD/USB using WinBuilder:
http://www.instantfundas.com/2010/12/how-to-create-windows-7-live-cddvdusb.html

* WinBuilder:
http://reboot.pro/files/file/4-winbuilder/
http://reboot.pro/files/download/4-winbuilder/
WinBuilder Scripts:
http://reboot.pro/files/category/5-winbuilder/
WinBuilder Download Center = Scripts:
http://multipe.exec-se.de/

* Win7PE_SE:
http://reboot.pro/topic/12427-win7pe-se-release/
Win7PE SE Downloads [144 MB]:
http://w7pese.cwcodes.net/Compressed/
multiPE 62 script:
http://reboot.pro/files/file/61-multipe/

* Get Windows Automated Installation Kit (WAIK) Tools without downloading entire disc image (ISO):
http://www.msfn.org/board/index.php?showtopic=156869
File:
http://db.tt/2l5l22OE

* Create Windows 7 Bootable Install USB Drive disc image (ISO):
http://www.softlay.net/operating-system/create-windows-7-bootable-usb-install-disk-drive-iso.html

* Windows 7 Windows Automated Installation Kit (WAIK):
http://www.microsoft.com/en-us/download/confirmation.aspx?id=5753
Win7 WAIK ISO [1.7 GB]:
http://download.microsoft.com/download/8/E/9/8E9BBC64-E6F8-457C-9B8D-F6C9A16E6D6A/KB3AIK_EN.iso
Win7 WAIK ReadMe:
http://technet.microsoft.com/library/dd349350.aspx
Win7 SP1 WAIK Supplement:
http://www.microsoft.com/en-us/download/details.aspx?id=5188
Win7 SP1 WAIK Supplement ISO [1.3 GB]:
http://download.microsoft.com/download/0/4/C/04C805CC-4C04-4D76-BE80-7D67B951CF73/waik_supplement_en-us.iso

* GImageX GUI for Windows Imaging:
http://www.autoitconsulting.com/site/software/gimagex/

* ei.cfg Removal Utility (Windows 7 Universal CD) Make Your Windows 7 Disc Universal:
http://www.technibble.com/ei-cfg-removal-utility-repair-tool-of-the-week/

* Windows disc image (ISO) Utilities:
http://code.kliu.org/misc/winisoutils/

* PEFactory WinBuilder add-on:
http://multipe.exec-se.de/Documentation/multiPE/PEF_index.htm

* PEChecksum 32-bit + 64-bit command line tool updates Portable EXEcutable (PE) files (EXE, DLL, OCX, SYS, DRV, MUI)
32-bit + 64-bit signatures:
http://www.coderforlife.com/projects/utilities/#PEChecksum
PEChecksum 32-bit:
http://www.coderforlife.com/projects/utilities/PEChecksum.exe
PEChecksum 64-bit:
http://www.coderforlife.com/projects/utilities/PEChecksum64.exe

* Windows Graphics User Interface (GUI) + Tweaking Tools:
http://www.thewindowsclub.com/list-freeware-releases-from-the-windows-club/
http://www.winaero.com/
http://www.xptsp.com/
http://www.blogsdna.com/
http://www.xp-smoker.com/
Themes:
http://www.winaero.com/news.php?cat.2
Downloads:
http://www.winaero.com/download.php?list.2

* WinCDEmu 32-bit + 64-bit mounts CD/DVD/BD ISO/IMG images on HDD/SSD/USB:
http://wincdemu.sysprogs.org/
WinCDEmu Portable:
http://wincdemu.sysprogs.org/portable/
File:
http://wincdemu.sysprogs.org/download/

* WinFLASHTool writes raw CD/DVD/BD disk images to memory cards/sticks:
http://winflashtool.sysprogs.com/
File:
http://www.sysprogs.com/files/WinFLASHTool/v2/WinFlashTool.exe
Download:
http://winflashtool.sysprogs.com/download/

* cdrtfe Audio/CD/XCD/VCD/DVD/BD/UHD ISO/bootable disc image burning tool:
http://cdrtfe.sourceforge.io/
http://sourceforge.net/projects/cdrtfe/
Download:
http://cdrtfe.sourceforge.io/cdrtfe/download_en.html
Portable:
http://sourceforge.net/projects/cdrtfe/files/cdrtfe%20portable/
cdrtfe Tools:
http://cdrtfe.sourceforge.io/tools/index_en.html
Download:
http://sourceforge.net/projects/cdrtools/
File:
http://sourceforge.net/projects/cdrtools/files/

* Sevenize:
http://www.sevenize.com/

* Completely Hide Windows 7 Shell, Logos, Icons, Start etc:
http://forum.arcadecontrols.com/index.php?topic=113896.0

* Completely hide Windows + Shell with 3rd party Front End GUI:
http://www.gameex.com/Community/InstantShellerandShellingGuide.aspx

* Windows 7 Boot Updater:
http://www.coderforlife.com/projects/win7boot/
______________________________________________________________________________



OEM



* OEM licensing terms:
http://web.archive.org/web/20141228133711/http://www.microsoft.com/oem/en/licensing/sblicensing/pages/licensing_faq.aspx
Original Equipment Manufacturer (OEM) versions of Windows 7 are identical to Full License Retail (FLR) except they...
- do not provide any free direct support from Microsoft.
- OEM licenses are tied to the 1st computer Windows is installed and activated on.
- all hardware upgrades are allowed except for different model/version motherboard upgrades.
- cannot be used to upgrade directly from an older Windows OS.
______________________________________________________________________________



Application (IN)Compatibility



* Application Compatibility Info, Guides + Tips:
To DEP or not to DEP... DisableNXShowUI:
http://blogs.technet.com/b/askperf/archive/2008/06/17/to-dep-or-not-to-dep.aspx
Script Compatibility Layers in Windows XP:
http://web.archive.org/web/20111114000642/http://support.microsoft.com/?kbid=286705
Configure "Compatibility" tab:
http://www.intrntpirate.com/2012/03/29/configuring-the-compatibility-tab/
Use Windows Application Compatibility Mode (ACM):
http://technet.microsoft.com/library/bb456979.aspx
Use Compatibility Administration tool in Windows 10:
http://docs.microsoft.com/windows/deployment/planning/using-the-compatibility-administrator-tool/
Use Compatibility Administration tool in Windows 7:
http://www.sourcedaddy.com/windows-7/using-the-compatibility-administrator.html
http://support.microsoft.com/help/317510/
http://technet.microsoft.com/library/cc749034.aspx
http://www.techrepublic.com/blog/windows-and-office/selectively-disable-uac-for-your-trusted-vista-applications/
Use Compatibility Administration tool in Windows XP:
http://technet.microsoft.com/library/bb456983.aspx
Get Rid of UAC Prompts using Application Compatibility Toolkit (ACT):
http://www.ghacks.net/2010/07/08/get-rid-of-uac-prompts-with-microsofts-application-compatibility-toolkit/
Fix Old Games using Application Compatibility Toolkit (ACT):
http://classicgamefixes.wixsite.com/home/act-toolkit/
Create Shim/Fix using Compatibility Administrator tool:
http://www.msigeek.com/4823/
Using Program Compatibility Mode in Windows 7/newer:
http://www.howtogeek.com/howto/10436/using-program-compatibility-mode-in-windows-7/
http://www.thewindowsclub.com/programs-compatibility-wizard-in-windows-7/
http://www.thewindowsclub.com/program-compatibility-troubleshooter-desktop-shortcut/
Program Compatibility Troubleshooter (PCT):
MSDT.EXE -id PCWDiagnostic
Microsoft Support Diagnostic Tool [MSDT.EXE] is located in the %WinDir%\SYSTEM32 folder [%WinDir% = usually C:\WINDOWS].
View all directories/folders listed in your system PATH from a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE):
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter:
PATH
Use Compatibility Mode to Fix App Problems:
http://www.reviversoft.com/blog/2013/01/compatibility-mode/
Using RunAsHighest Fix:
http://technet.microsoft.com/library/dd638322.aspx
UAC and Application Run Levels:
http://www.slickit.ca/2009/05/uac-and-application-run-levels.html
Disable UAC for certain apps:
http://web.archive.org/web/20080103052016/http://support.microsoft.com/kb/946932
Selectively disable UAC for trusted Windows Vista/7/newer apps:
http://www.techrepublic.com/blog/windows-and-office/selectively-disable-uac-for-your-trusted-vista-applications/
Exclude Programs from Program Compatibility Assistant (PCA):
http://support.microsoft.com/help/2545347/
Application Compatibility:
http://msdn.microsoft.com/library/bb757005.aspx
Application Compatibility: Program Compatibility Assistant (PCA):
http://msdn.microsoft.com/library/bb756937.aspx
Program Compatibility Assistant (PCA) - Part 2:
http://blogs.technet.microsoft.com/askperf/2007/10/05/the-program-compatibility-assistant-part-two/
Add/Remove Compatibility tab from Properties:
http://www.sevenforums.com/tutorials/237405-compatibility-tab-add-remove-properties.html

* Microsoft Windows 2000 SP4/XP/2003/Vista/2008/7/8/8.1/2012 Application Compatibility Toolkit (ACT) (English):
http://www.mdgx.com/xptoy.htm#ACT
ACT 5.6 [12.2 MB]:
http://web.archive.org/web/20180605103833if_/http://download.microsoft.com/download/D/3/3/D33A8F5D-A7E1-4BBE-B04D-7A688785A229/ApplicationCompatibilityToolkitSetup.exe
Requires Microsoft .Net Framework Redistributable (NFR) 3.5/newer (free):
http://www.mdgx.com/add.htm#NFR

* AppCompatFlags "Layers" Registry REG_SZ (String) values are case insensitive:
All Users (system wide) [HKLM Registry Hive Key]:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers
Current User (logged on user) [HKCU Registry Hive Key]:
HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers
All Users (any logged on user, when more than 1 user) [HKU .Default Registry Hive Key]:
HKEY_USERS\.DEFAULT\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers
Enumeration of multiple values is allowed on the same line: they must be separated by a space [ ] if more than 1.
Meaning:
http://www.verboon.info/2011/03/running-an-application-as-administrator-or-in-compatibility-mode/
http://qtechbabble.wordpress.com/2016/08/23/run-application-in-compatibility-mode-from-command-line/
Windows Vista = VISTARTM
Windows Vista SP1 = VISTASP1
Windows Vista SP2 = VISTASP2
Windows XP SP3 = WINXPSP3
Windows XP SP2 = WINXPSP2
Windows 2000 = WIN2000
Windows 98/ME = WIN98
Windows 95 = WIN95
Run in 65536 colors (16-bit) = 16BITCOLOR
Run in 256 colors (8-bit) = 256COLOR
Run in 640x480 screen resolution = 640X480
Disable visual themes = DisableThemes
Disable desktop composition = DisableDWM
Disable display scaling on high DPI settings = HighDPIAware
Run this program as Administrator = RunAsAdmin
Enable program to work with SkyDrive = PlaceHolderFiles
List of parameters:
EveryOne-full (?)
16BITCOLOR
256COLOR
640X480
AlcatelLayer
DisableCicero
DisabledXMaximizedWindowedMode
DisableDWM
DisableNXHideUI
DisableNXShowUI
DisableThemes
ElevateCreateProcess
EnableNXShowUI
HighDPIAware
International
LUA
LUACleanUp
PlaceHolderFiles
PlayerGetProcAddrExOverride
ProfilesSetup
RunAsAdmin
RunAsInvoker
RunAsHighest
VISTARTM
VISTASP1
VISTASP2
WIN95
WIN98
NT4SP5
WIN2000
WIN7RTM
WIN8RTM
WINSRV03SP1
WINSRV08SP1
WINXPSP2
WINXPSP3

* Program Compatibility Assistant (PCA) Service [PcaSvc]:
http://www.howtogeek.com/howto/4161/
Disabled:
ECHO Y|NET.EXE STOP PcaSvc
SC.EXE CONFIG PcaSvc START= demand
Enabled:
ECHO Y|NET.EXE START PcaSvc
SC.EXE CONFIG PcaSvc START= auto

* Optimize/tweak Application Compatibility/Program Compatibility Assistant (PCA) registry settings:
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\AppCompat]
; http://www.windows-security.org/a9e1f3187a2d9e753e52bc92a558b867/remove-program-compatibility-property-page/
; http://www.sevenforums.com/tutorials/237405-compatibility-tab-add-remove-properties.html
"DisablePropPage"=dword:0
; http://www.windows-security.org/13372c6a0a2d392443dc146ceb94d720/turn-off-application-telemetry/
"AITEnable"=dword:0
; http://www.windows-security.org/7be7ad4dce7009d71a3061f872f610e0/turn-off-steps-recorder/
"DisableUAR"=dword:1
; http://www.windows-security.org/dc93a8ca81b69891762057593d8d2ccd/prevent-access-to-16-bit-applications/
"VDMDisallowed"=dword:0
; http://www.windows-security.org/a6c2ac5e5f13a880f6254303a16e20a4/turn-off-application-compatibility-engine/
"DisableEngine"=dword:0
; http://www.windows-security.org/6412ea982640d8a1dd2090387e2e5b29/turn-off-program-compatibility-assistant/
"DisablePCA"=dword:1
; http://www.windows-security.org/36ff6b13efb41d27cc12094bc252b9f3/turn-off-switchback-compatibility-engine/
"SbEnable"=dword:1
; Windows NTx 64-bit (x64) only:
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Policies\Microsoft\Windows\AppCompat]
; http://www.windows-security.org/a9e1f3187a2d9e753e52bc92a558b867/remove-program-compatibility-property-page/
; http://www.sevenforums.com/tutorials/237405-compatibility-tab-add-remove-properties.html
"DisablePropPage"=dword:0
; http://www.windows-security.org/13372c6a0a2d392443dc146ceb94d720/turn-off-application-telemetry/
"AITEnable"=dword:0
; http://www.windows-security.org/7be7ad4dce7009d71a3061f872f610e0/turn-off-steps-recorder/
"DisableUAR"=dword:1
; http://www.windows-security.org/dc93a8ca81b69891762057593d8d2ccd/prevent-access-to-16-bit-applications/
"VDMDisallowed"=dword:0
; http://www.windows-security.org/a6c2ac5e5f13a880f6254303a16e20a4/turn-off-application-compatibility-engine/
"DisableEngine"=dword:0
; http://www.windows-security.org/6412ea982640d8a1dd2090387e2e5b29/turn-off-program-compatibility-assistant/
"DisablePCA"=dword:1
; http://www.windows-security.org/36ff6b13efb41d27cc12094bc252b9f3/turn-off-switchback-compatibility-engine/
"SbEnable"=dword:1
;
------End cut & paste here------
______________________________________________________________________________



Control Panel (CP) + Omnipotent/Master/Mega/'god mode' (OMg) Control Panel



* Windows omnipotent/master/mega/'god mode' (OMg) Control Panel folder/shortcut (all Control Panel items enumerated in
bulleted list form):
http://en.wikipedia.org/wiki/Windows_Master_Control_Panel_shortcut
http://www.nogeekleftbehind.com/2010/01/16/more-windows-7-god-mode-hacks/
http://technet.microsoft.com/magazine/hh706157.aspx

* Add Control Panel (CP), omnipotent/master/mega/'god mode' (OMg) Control Panel, enable/disable User Account Control
(UAC), Open Console Command (CMD) Here as Administrator to Desktop right-click menu in Windows Vista/newer:
http://www.eightforums.com/tutorials/19706-control-panel-desktop-context-menu-create-windows-8-a.html

* Control Panel (CP) CLSID (GUID) keys, commands, shortcuts + folders in Windows 7/newer (examples):
http://en.wikipedia.org/wiki/Control_Panel_(Windows)#Standard_applets
http://docs.microsoft.com/windows/win32/shell/executing-control-panel-items/
http://docs.rainmeter.net/tips/launching-windows-special-folders/
http://www.sevenforums.com/tutorials/110919-clsid-key-list-windows-7-a.html
http://www.eightforums.com/threads/clsid-key-guid-shortcuts-list-for-windows-8.13591/
http://www.tenforums.com/tutorials/3123-clsid-key-guid-shortcuts-list-windows-10-a.html
http://www.thewindowsclub.com/shortcuts-shell-commands-clsid-windows-8/
http://www.geoffchappell.com/studies/windows/shell/explorer/cmdline.htm
http://www.howtogeek.com/257715/
http://www.lifewire.com/command-line-2626060/
http://www.winaero.com/blog/control-panel-context-menu-windows-10/
http://www.thewindowsclub.com/remove-click-context-menu-items-editors/
http://www.tenforums.com/tutorials/6051-add-personalize-classic-context-menu-windows-10-a.html
http://www.techspot.com/guides/1670-windows-right-click-menu/
http://www.tenforums.com/tutorials/24451-add-bluetooth-context-menu-windows-10-a.html
http://shortcutworld.com/Windows/win/Windows-Run-Commands_-Settings_-and-Start-Menu-Shortcuts
http://www.computerhope.com/issues/ch001870.htm
http://msdn.microsoft.com/library/windows/desktop/cc144191.aspx
http://support.microsoft.com/help/192806/
http://social.technet.microsoft.com/wiki/contents/articles/4486.accessing-the-control-panel-via-the-commandline.aspx
Control Panel (CP) items command lines, options, switches + parameters:
- Omnipotent/master/mega/'god mode' (OMg) Control Panel (all Control Panel items categorized + enumerated in bulleted list
form):
as Folder:
@.{ED7BA470-8E54-465E-825C-99712043E01C}
as Shortcut:
EXPLORER.EXE SHELL:::{ED7BA470-8E54-465E-825C-99712043E01C}
- Control Panel -> All Control Panel Items -> System (About) [hold WinKey + press Pause/Break]:
as Folder:
@.{BB06C0E4-D293-4f75-8A90-CB05B6477EEE}
as Shortcut:
EXPLORER.EXE SHELL:::{BB06C0E4-D293-4f75-8A90-CB05B6477EEE}
- Control Panel behavior in Windows 7/newer:
as Folder:
Small icons:
@.{21EC2020-3AEA-1069-A2DD-08002B30309D}
Large icons:
@.{26EE0668-A00A-44D7-9371-BEB064C98683}
as Shortcut:
Small icons:
EXPLORER.EXE SHELL:::{21EC2020-3AEA-1069-A2DD-08002B30309D}
Large icons:
EXPLORER.EXE SHELL:::{26EE0668-A00A-44D7-9371-BEB064C98683}
- Control Panel -> All Control Panel Items -> Personalization -> Window Color and Appearance (Aero):
as Command line:
CONTROL.EXE /name Microsoft.Personalization /page pageColorization
as Shortcut:
EXPLORER.EXE SHELL:::{26EE0668-A00A-44D7-9371-BEB064C98683}\1\::{ED834ED6-4B5A-4bfe-8F11-A626DCB6A921}\pageColorization
- Control Panel -> All Control Panel Items -> AutoPlay:
as Command line:
CONTROL.EXE /name Microsoft.AutoPlay
as Folder:
@.{9C60DE1E-E5FC-40f4-A487-460851A8D915}
as Shortcut:
EXPLORER.EXE SHELL:::{9C60DE1E-E5FC-40f4-A487-460851A8D915}
- Control Panel -> All Control Panel Items -> Printers (Classic):
as Command line:
EXPLORER.EXE shell:PrintersFolder
as Shortcut:
EXPLORER.EXE SHELL:::{21ec2020-3aea-1069-a2dd-08002b30309d}\::{2227a280-3aea-1069-a2de-08002b30309d}
- Control Panel -> All Control Panel Items -> Devices and Printers -> Bluetooth Devices (Windows 7/8/8.1) or Bluetooth
Settings (Windows 10/11):
as Command line: Bluetooth Settings -> tab:
Options:
CONTROL.EXE bthprops.cpl,,1
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL bthprops.cpl,,1
COM Ports:
CONTROL.EXE bthprops.cpl,,2
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL bthprops.cpl,,2
Hardware:
CONTROL.EXE bthprops.cpl,,3
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL bthprops.cpl,,3
Shared Folder:
CONTROL.EXE bthprops.cpl,,4
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL bthprops.cpl,,4
as Folder:
@.{28803F59-3A75-4058-995F-4EE5503B023C}
as Shortcut:
EXPLORER.EXE SHELL:::{28803F59-3A75-4058-995F-4EE5503B023C}
- Control Panel -> All Control Panel Items -> Network and Sharing Center -> Change adapter settings -> Your Connection
icon/item/link/shortcut -> drag connection name onto an empty Desktop spot or create shortcut [these examples may or may not
work on your computer(s) depending on your connection(s) type(s)/name(s)]:
as Folders:
@.{38A98528-6CBF-4CA9-8DC0-B1E1D10F7B1B}
@.{1fa9085f-25a2-489b-85d4-86326eedcd87}
@.{BA126ADB-2166-11D1-B1D0-00805FC1270E}
as Shortcuts:
EXPLORER.EXE SHELL:::{20D04FE0-3AEA-1069-A2D8-08002B30309D}\::{21EC2020-3AEA-1069-A2DD-08002B30309D}\::{38A98528-6CBF-4CA9-8DC0-B1E1D10F7B1B}
EXPLORER.EXE SHELL:::{38A98528-6CBF-4CA9-8DC0-B1E1D10F7B1B}
EXPLORER.EXE SHELL:::{1fa9085f-25a2-489b-85d4-86326eedcd87}
EXPLORER.EXE SHELL:::{BA126ADB-2166-11D1-B1D0-00805FC1270E}
Right-click on an empty Desktop spot -> New -> create: Shortcut [.lnk] or Folder.
- Control Panel -> All Control Panel Items -> Personalization -> Desktop Background:
as Shortcut:
EXPLORER.EXE SHELL:::{ED834ED6-4B5A-4bfe-8F11-A626DCB6A921} -Microsoft.Personalization\pageWallpaper
- Control Panel -> All Control Panel Items -> Programs (and Features) -> (View) Installed Updates:
as Folder:
@.{d450a8a1-9568-45c7-9c0e-b4f9fb4537bd}
as Shortcut:
EXPLORER.EXE SHELL:::{d450a8a1-9568-45c7-9c0e-b4f9fb4537bd}
- Task/Window Switcher [hold Alt + press Tab]:
RUNDLL32.EXE SHELL32.DLL,-10114
as Folder:
@.{3080F90E-D7AD-11D9-BD98-0000947B0257}
as Shortcut:
EXPLORER.EXE SHELL:::{3080F90E-D7AD-11D9-BD98-0000947B0257}
- Recycle Bin:
Control Panel -> All Control Panel Items -> Personalization -> Change Desktop Items -> check "Recycle Bin" box -> Apply/OK.
as Folder:
@.{645FF040-5081-101B-9F08-00AA002F954E}
as Shortcuts:
EXPLORER.EXE SHELL:::{645FF040-5081-101B-9F08-00AA002F954E}
EXPLORER.EXE shell:recyclebinfolder

FYI:
See Windows (File) Explorer [EXPLORER.EXE] command line options -> "EXPLORE YOUR ROOTS" in TIPS95.TXT (included):
http://www.mdgx.com/newtip22.htm#EYR

* Personalization:
覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧
Font Size and DPI	DpiScaling.exe
Screen Resolution	CONTROL.EXE desk.cpl,Settings,@Settings
Screen Resolution	CONTROL.EXE /name Microsoft.Display /page Settings
Display			CONTROL.EXE desk.cpl,Settings,@Settings
Themes			CONTROL.EXE desk.cpl,Themes,@Themes
Screen Saver		CONTROL.EXE desk.cpl,screensaver,@screensaver
Multi Monitor		CONTROL.EXE desk.cpl,Monitor,@Monitor
Color Scheme		CONTROL.EXE /name Microsoft.Personalization /page pageColorization
Desktop Background	CONTROL.EXE /name Microsoft.Personalization /page pageWallpaper

* System Properties:
覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧
Performance Options		SystemPropertiesPerformance.exe
Remote Access			SystemPropertiesRemote.exe
Computer Name			SystemPropertiesComputerName.exe
System Protection		SystemPropertiesProtection.exe
Advanced System Properties	SystemPropertiesAdvanced.exe
Hardware			SystemPropertiesHardware.exe
Data Execution Prevention	SystemPropertiesDataExecutionPrevention.exe

* Programs + Features:
覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧
Add/Remove Programs	CONTROL.EXE /name Microsoft.ProgramsAndFeatures
Windows Features	OptionalFeatures.exe

* Regional + Language Options:
覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧
Keyboard	CONTROL.EXE /name Microsoft.RegionalAndLanguageOptions /page /p:keyboard
Location	CONTROL.EXE /name Microsoft.RegionalAndLanguageOptions /page /p:location
Administrative	CONTROL.EXE /name Microsoft.RegionalAndLanguageOptions /page /p:administrative

* Folder:
覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧
Folder searching	RUNDLL32.EXE SHELL32.DLL,Options_RunDLL 2
View			RUNDLL32.EXE SHELL32.DLL,Options_RunDLL 7
General			RUNDLL32.EXE SHELL32.DLL,Options_RunDLL 0
File associations	CONTROL.EXE /name Microsoft.DefaultPrograms /page pageFileAssoc

* Power:
覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧
Edit current plan settings	CONTROL.EXE /name Microsoft.PowerOptions /page pagePlanSettings
System settings			CONTROL.EXE /name Microsoft.PowerOptions /page pageGlobalSettings
Create a power plan		CONTROL.EXE /name Microsoft.PowerOptions /page pageCreateNewPlan
Advanced Settings		CONTROL.EXE powercfg.cpl,,3

* Accessibility (Ease of Access):
覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧
Ease of Access Center (EAC)	CONTROL.EXE /name Microsoft.EaseOfAccessCenter

* Control Panel (CP) canonical/module names/Globally Unique IDentifiers (GUIDs) in Windows Vista/newer:
http://docs.microsoft.com/windows/win32/shell/controlpanel-canonical-names/
覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧
CONTROL.EXE desktop		Display Properties
CONTROL.EXE color		Display Properties Appearance tab
CONTROL.EXE date/time		Date and Time Properties
CONTROL.EXE international	Regional and Language Options
CONTROL.EXE mouse		Mouse Properties
CONTROL.EXE keyboard		Keyboard Properties
CONTROL.EXE printers		Printers and Faxes folder
CONTROL.EXE fonts		Fonts folder

* Control Panel (CP) canonical/module names/Globally Unique IDentifiers (GUIDs) in Windows 2000/newer:
覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧
CONTROL.EXE folders		Folder Options
CONTROL.EXE netware		Novell NetWare (if installed)
CONTROL.EXE telephony		Phone and Modem Options
CONTROL.EXE admintools		Administrative Tools folder
CONTROL.EXE schedtasks		Scheduled Tasks folder
CONTROL.EXE netconnections	Network Connections folder
CONTROL.EXE infrared		Infrared Monitor (if installed)
CONTROL.EXE userpasswords	User Accounts main menu
CONTROL.EXE userpasswords2	User Accounts accounts menu

* Control Panel tool             	Command
覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧
Accessibility Options          		CONTROL.EXE access.cpl
Add New Hardware               		CONTROL.EXE sysdm.cpl add new hardware
Add/Remove Programs            		CONTROL.EXE appwiz.cpl
Date/Time Properties           		CONTROL.EXE timedate.cpl
Display Properties             		CONTROL.EXE desk.cpl
FindFast                       		CONTROL.EXE findfast.cpl
Fonts Folder                   		CONTROL.EXE fonts
Internet Explorer Properties            CONTROL.EXE inetcpl.cpl
Joystick Properties            		CONTROL.EXE joy.cpl
Keyboard Properties            		CONTROL.EXE main.cpl keyboard
Microsoft Exchange (Windows Messaging)	CONTROL.EXE mlcfg32.cpl
Microsoft Mail Post Office     		CONTROL.EXE wgpocpl.cpl
Modem Properties               		CONTROL.EXE modem.cpl
Mouse Properties               		CONTROL.EXE main.cpl
Multimedia Properties          		CONTROL.EXE mmsys.cpl
Network Properties             		CONTROL.EXE netcpl.cpl
Password Properties            		CONTROL.EXE password.cpl
PC Card                        		CONTROL.EXE main.cpl pc card (PCMCIA)
Power Management (Windows 95)  		CONTROL.EXE main.cpl power
Power Management (Windows 98)  		CONTROL.EXE powercfg.cpl
Printers Folder                		CONTROL.EXE printers
Regional Settings              		CONTROL.EXE intl.cpl
Scanners and Cameras           		CONTROL.EXE sticpl.cpl
Sound Properties               		CONTROL.EXE mmsys.cpl sounds
System Properties              		CONTROL.EXE sysdm.cpl

* Using RunDLL32 [RUNDLL32.EXE] commands in Windows Vista/newer:
http://www.windows7tips.com/rundll32-vista-windows-7.html
http://www.robvanderwoude.com/rundll.php
http://www.majorgeeks.com/content/page/the_ultimate_list_of_rundll32_commands_for_windows_1087.html
http://www.majorgeeks.com/content/page/here_are_all_the_rundll32_commands_for_windows_10.html
http://www.tenforums.com/tutorials/77458-rundll32-commands-list-windows-10-a.html
http://web.archive.org/web/20150317044746/http://www.vlaurie.com/computers2/Articles/control.htm
http://web.archive.org/web/20150812103403/http://best-windows.vlaurie.com/rundll32.html
http://www.commandwindows.com/windows7-commands.htm
http://www.commandwindows.com/command3.htm
http://www.commandwindows.com/runline.htm
http://www.svolpi.ch/Windows/cmd.html
http://www.eightforums.com/threads/36567/
Syntax:
RUNDLL32.EXE , 
All *.cpl, *.DLL, *.EXE files listed below are located in the %WinDir%\SYSTEM32\wbem folder [%WinDir% = usually C:\WINDOWS],
listed on your system PATH.
View all directories/folders listed in your system PATH from a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE):
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter:
PATH
RunDLL32 commands can be used in shortcuts, DOS console BATch (.bat)/CoMmanD (.cmd) files, scripts, powershell, etc.
Comprehensive list of RunDLL32 Control Panel (CP) commands.
Some may or may not work depending on the specific Windows NTx OS(es) build/edition/release/update/version + bit strength
[32-bit (x86) or 64-bit (x64)] installed on your computer(s):
Add/Remove/Uninstall Programs + Features:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL appwiz.cpl,,0
Personalization -> Desktop Background (Wallpaper):
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL desk.cpl,,@Desktop
Personalization -> Color and Appearance (Aero):
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL desk.cpl,Advanced,@Advanced
Personalization -> Screen Saver:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL desk.cpl,screensaver,@screensaver
Content Advisor:
RUNDLL32.EXE msrating.dll,RatingSetupUI
Control Panel:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL
Device Installation Settings:
RUNDLL32.EXE newdev.dll,DeviceInternetSettingUi
RUNDLL32.EXE newdev.dll,DeviceInternetSettingUi 2
Delete Internet Explorer (IE) temporary browsing, cache, cookies, history files from the DOS console command line using
Windows system built-in command line tools:
http://www.winhelponline.com/blog/clear-ie-cache-command-line-rundll32/
http://www.superuser.com/questions/450014/
http://www.stackoverflow.com/questions/33447236/
http://social.msdn.microsoft.com/forums/ie/ce81943b-32b8-437b-b620-171c3d5893e7/
Delete Internet Explorer (IE) History:
RUNDLL32.EXE InetCpl.cpl,ClearMyTracksByProcess 1
Delete Internet Explorer (IE) Cookies:
RUNDLL32.EXE InetCpl.cpl,ClearMyTracksByProcess 2
Delete Internet Explorer (IE) Temporary Internet Files (TIF):
RUNDLL32.EXE InetCpl.cpl,ClearMyTracksByProcess 4
Delete Internet Explorer (IE) Favorites Cached Data (FCD) + History:
RUNDLL32.EXE InetCpl.cpl,ClearMyTracksByProcess 8
Delete Internet Explorer (IE) Form Data (FD):
RUNDLL32.EXE InetCpl.cpl,ClearMyTracksByProcess 16
Delete Internet Explorer (IE) Passwords:
RUNDLL32.EXE InetCpl.cpl,ClearMyTracksByProcess 32
Delete Internet Explorer (IE) Phishing Filter Data (PFD):
RUNDLL32.EXE InetCpl.cpl,ClearMyTracksByProcess 64
Delete Internet Explorer (IE) Web Page Recovery Data:
RUNDLL32.EXE InetCpl.cpl,ClearMyTracksByProcess 128
Delete All Internet Explorer (IE) browsing + Temporary Internet Files (TIF):
RUNDLL32.EXE InetCpl.cpl,ClearMyTracksByProcess 255
Delete All Internet Explorer (IE) browsing + Temporary Internet Files (TIF) without GUI:
RUNDLL32.EXE InetCpl.cpl,ClearMyTracksByProcess 256
Delete All Internet Explorer (IE) browsing + Temporary Internet Files (TIF) without using multi-threading delete:
RUNDLL32.EXE InetCpl.cpl,ClearMyTracksByProcess 512
Delete Internet Explorer (IE) Private Mode Data (PMD):
RUNDLL32.EXE InetCpl.cpl,ClearMyTracksByProcess 1024
Delete Internet Explorer (IE) Tracking Data (TD):
RUNDLL32.EXE InetCpl.cpl,ClearMyTracksByProcess 2048
Delete Internet Explorer (IE) Add-ons Data (AoD):
RUNDLL32.EXE InetCpl.cpl,ClearMyTracksByProcess 4096
Delete All Internet Explorer (IE) Add-ons settings + data (AoSD):
RUNDLL32.EXE InetCpl.cpl,ClearMyTracksByProcess 4351
Delete Internet Explorer (IE) History + keep Favorites Cached Data (FCD):
RUNDLL32.EXE InetCpl.cpl,ClearMyTracksByProcess 8192
Delete Internet Explorer (IE) download History:
RUNDLL32.EXE InetCpl.cpl,ClearMyTracksByProcess 16384
Date and Time Properties:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL timedate.cpl
Ease of Access Center:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL access.cpl
Display Settings:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL access.cpl,,3
Device Manager:
RUNDLL32.EXE DEVMGR.DLL,DeviceManager_Execute
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL hdwwiz.cpl
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL hdwwiz.cpl,,0
Folder Options -> General:
RUNDLL32.EXE SHELL32.DLL,Options_RunDLL 0
Folder Options -> File Types (Windows Vista/7 only):
RUNDLL32.EXE SHELL32.DLL,Control_Options 2
Folder Options -> Search:
RUNDLL32.EXE SHELL32.DLL,Options_RunDLL 2
Folder Options -> View:
RUNDLL32.EXE SHELL32.DLL,Options_RunDLL 7
Forgotten Password Wizard:
RUNDLL32.EXE KEYMGR.DLL,PRShowSaveWizardExW
Devices and Printers -> Bluetooth Devices -> Bluetooth Settings:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL bthprops.cpl,,1
Devices and Printers -> Bluetooth Devices -> COM Ports:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL bthprops.cpl,,2
Devices and Printers -> Bluetooth Devices -> Hardware:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL bthprops.cpl,,3
Devices and Printers -> Bluetooth Devices -> Shared Folder:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL bthprops.cpl,,4
Devices and Printers -> (Set up USB) Game Controllers -> Joystick Properties:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL joy.cpl
Infrared (IR) Properties:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL irprops.cpl
Hibernate:
RUNDLL32.EXE POWRPROF.DLL,SetSuspendState
Internet Explorer (IE) Properties -> General:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL inetcpl.cpl
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL inetcpl.cpl,,0
Internet Explorer (IE) Properties -> Security:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL inetcpl.cpl,,1
Internet Explorer (IE) Properties -> Privacy:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL inetcpl.cpl,,2
Internet Explorer (IE) Properties -> Content:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL inetcpl.cpl,,3
Internet Explorer (IE) Properties -> Connections:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL inetcpl.cpl,,4
Internet Explorer (IE) Properties -> Programs:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL inetcpl.cpl,,5
Internet Explorer (IE) Properties -> Advanced:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL inetcpl.cpl,,6
Keyboard Properties:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL main.cpl @1
Lock Screen:
RUNDLL32.EXE USER32.DLL,LockWorkStation
Swap Left and Right Mouse Buttons:
RUNDLL32.EXE USER32.DLL,SwapMouseButton
Mouse Properties:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL main.cpl @0,0
Keyboard Properties:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL main.cpl keyboard
Map Network Drive Wizard:
RUNDLL32.EXE SHELL32.DLL,SHHelpShortcuts_RunDLL Connect
Network Connections:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL ncpa.cpl
Pen, Tablet and Touch:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL TabletPC.cpl
Pen, Tablet and Touch -> General:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL TabletPC.cpl @1,general
Pen, Tablet and Touch -> Buttons:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL TabletPC.cpl @1,buttons
Pen, Tablet and Touch -> Flicks:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL TabletPC.cpl @0,flicks
Pen, Tablet and Touch -> Touch:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL TabletPC.cpl @0,touch
Sync Center -> Offline Files:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL cscui.dll
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL cscui.dll,2
Organize Internet Explorer (IE) Favorites:
RUNDLL32.EXE SHDOCVW.DLL,DoOrganizeFavDlg
Open With -> replace FileName.ext with an actual file name + extension:
RUNDLL32.EXE SHELL32.DLL,OpenAs_RunDLL FileName.ext
Printer User Interface command line options, switches + parameters:
RUNDLL32.EXE PRINTUI.DLL,PrintUIEntry /?
Printer Management Folder:
RUNDLL32.EXE SHELL32.DLL,SHHelpShortcuts_RunDLL PrintersFolder
Power Options:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL powercfg.cpl
Process Idle Tasks (Windows XP/2003 only):
http://web.archive.org/web/20101218135715/http://www.microsoft.com/whdc/archive/benchmark.mspx
RUNDLL32.EXE ADVAPI32.DLL,ProcessIdleTasks
Regional and Language Options -> Formats:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL intl.cpl
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL intl.cpl,,0
Regional and Language Options -> Location:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL intl.cpl,,1
Regional and Language Options -> Administrative:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL intl.cpl,,2
Usernames and Passwords:
RUNDLL32.EXE KEYMGR.DLL,KRShowKeyMgr
Safely Remove Hardware (Plug/Unplug Removable Devices):
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL HotPlug.dll
Sound Properties:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL mmsys.cpl,,0
System Properties -> Advanced:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL sysdm.cpl,,3
System Properties -> System Protection:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL sysdm.cpl,,4
System Properties -> Automatic Updates:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL sysdm.cpl,,5
System Properties -> Environment Variables...:
RUNDLL32.EXE sysdm.cpl,EditEnvironmentVariables
Taskbar and Start Menu/Orb Properties:
RUNDLL32.EXE SHELL32.DLL,Options_RunDLL 1
User Accounts:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL nusrmgr.cpl
Local User and Groups (Windows 7/newer only):
MMC.EXE /S lusrmgr.msc
Windows Security Center (WSC) -> Security and Maintenance:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL wscui.cpl
Windows -> About:
RUNDLL32.EXE SHELL32.DLL,ShellAboutW
Windows Fonts Installation Folder:
RUNDLL32.EXE SHELL32.DLL,SHHelpShortcuts_RunDLL FontsFolder
Windows Firewall:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL firewall.cpl
Wireless Network Setup:
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL NetSetup.cpl,@0,WNSW
3D Window (Task) Switcher = Flip3D (Aero) (Windows Vista/7 only):
RUNDLL32.EXE DwmApi.dll #105
Windows 16-Bit Emulation Control Panel (Windows 10 only):
http://www.fileinspect.com/fileinfo/ntvdmcpl-dll/
RUNDLL32.EXE SHELL32.DLL,Control_RunDLL ntvdmcpl.dll
Windows To Go Startup Options (Windows 10 only):
RUNDLL32.EXE pwlauncher.dll,ShowPortableWorkspaceLauncherConfigurationUX

* Use Microsoft Management Console (MMC) [MMC.EXE] snap-in control (.msc) precompiled script files in Windows 2000/newer:
http://en.wikipedia.org/wiki/Microsoft_Management_Console
http://docs.microsoft.com/windows-server/administration/windows-commands/mmc/
http://msdn.microsoft.com/library/bb742441.aspx
http://msdn.microsoft.com/library/bb742442.aspx
http://www.ss64.com/nt/syntax-mmc.html
http://www.groovypost.com/tips/mmc-exe-windows-process-safe-virus/
http://www.ghacks.net/2017/06/10/windows-msc-files-overview/
http://www.mdgx.com/add.htm#MMC
Syntax:
MMC.EXE  \.
File paths, file names, file extensions + optional arguments/parameters are case insensitive.
MMC commands can be used in shortcuts, DOS console BATch (.bat)/CoMmanD (.cmd) files, scripts, powershell, etc.
MMC command line using /S (Silent) parameter (example):
MMC.EXE /S services.msc
NOTE:
Microsoft "quietly" discontinued the /S (Silent) MMC parameter from Windows 8/newer. :-(
By default *.msc files are associated with %WinDir%\SYSTEM32\MMC.EXE, therefore they can be run by themselves (example):
services.msc
unless you need to run them with specific command line arguments/parameters, in which case you need to use the MMC command
in front of the *.msc file name, and followed by respective parameter(s) (see example above).
Most *.msc files are located in the %WinDir%\SYSTEM32 folder [%WinDir% = usually C:\WINDOWS], listed in your system PATH.
View all directories/folders listed in your system PATH from a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE):
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter:
PATH

* Administrative Tools [for .msc files + links -> see above]:
Administrative Tools = CONTROL.EXE admintools
Authorization Manager = azman.msc
Certificate Manager = certmgr.msc
Component Services = comexp.msc + dcomcnfg.exe
DirectX (DX) Diagnostic Tool = dxdiag.exe
Display Languages = lpksetup.exe
ODBC Data Source Administrator = odbcad32.exe
File Signature Verification Tool = sigverif.exe
Group Policy Editor (GPE) = gpedit.msc [Microsoft removed GPE from all Windows XP/newer Home + Starter editions! :-(]
Add Hardware Wizard = hdwwiz.cpl
iSCSI Initiator = iscsicpl.exe
Iexpress (Internet Explorer Express) Wizard = iexpress.exe
Local Security Settings = secpol.msc
Microsoft Support Diagnostic Tool (MSDT) = msdt.exe
Microsoft Management Console (MMC) = mmc.exe
Print management = printmanagement.msc
Printer User Interface = printui.exe
Problems Steps Recorder (PSR) = psr.exe
People Near Me = p2phost.exe
Registry Editor (RegEdit) = regedit.exe or regedt32.exe
Resoure Monitor = resmon.exe
System Configuration Utility = msconfig.exe
Resultant Set of Policy (RSOP) = rsop.msc
SQL Server Client Configuration = cliconfg.exe
Task Manager (TM) = taskmgr.exe [also LaunchTM.exe in Windows 10/newer]
Trusted Platform Module (TPM) = tpm.msc
TPM Security Hardware = TpmInit.exe
Windows Remote Assistance (WRA) = msra.exe
Windows Share Folder Creation Wizard = shrpubw.exe
Windows Update Manager (WUM) = wusa.exe
Windows System Security Tool = syskey.exe
Windows Script Host Settings = wscript.exe
Windows Version = winver.exe
Windows (Defender) Firewall [W(D)F] with Advanced Security = wf.msc
Windows Memory Diagnostic = MdSched.exe
Windows Malicious Removal Tool (MRT) = mrt.exe

* Computer Management:
Management Saved Console (.msc) script files are associated by default with and executed by Microsoft Management Console
(MMC.EXE) snap-in control tool, and most of them are located in the %WinDir%\SYSTEM32 folder [%WinDir% = usually
C:\WINDOWS].
http://en.wikipedia.org/wiki/Microsoft_Management_Console
View all directories/folders listed in your system PATH from a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE):
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter:
PATH
Command line (example):
MMC.EXE /S services.msc
Computer Management = compmgmt.msc or CompMgmtLauncher.exe
Task Scheduler = CONTROL.EXE schedtasks or taskschd.msc
Event Viewer = eventvwr.msc
Shared Folders = fsmgmt.msc
Local Users and Groups = lusrmgr.msc
Performance Monitor = perfmon.msc
Device Manager = devmgmt.msc
Disk Management = diskmgmt.msc
Windows Services = services.msc
Windows Management Infrastructure (WMI) = wmimgmt.msc

* Control Panel:
Control Panel = CONTROL.EXE
Action (Security) Center = wscui.cpl
AutoPlay = CONTROL.EXE /name Microsoft.AutoPlay
Backup and Restore = sdclt.exe
Create a System Repair disc = recdisc.exe
BDE Administrator = bdeadmin.cpl
Color Management = colorcpl.exe
Credential Manager = CONTROL.EXE /name Microsoft.CredentialManager
Credential Manager Stored User Names and Passwords = credwiz.exe
Date and Time Properties = timedate.cpl
Default Programs = CONTROL.EXE /name Microsoft.DefaultPrograms
Set Program Access and Computer Defaults = CONTROL.EXE appwiz.cpl,,3 or ComputerDefaults
Devices and Printers = CONTROL.EXE Printers
Devices and Printers Add a Device = DevicePairingWizard.exe
Display = dpiscaling.exe
Screen Resolution = desk.cpl
Display Color Calibration = dccw.exe
Cleartype Text Tuner = cttune.exe
Folders Options = CONTROL.EXE Folders
Fonts = CONTROL.EXE Fonts
Getting Started = GettingStarted.exe
HomeGroup = CONTROL.EXE /name Microsoft.HomeGroup
Indexing Options = CONTROL.EXE /name Microsoft.IndexingOptions
Internet Explorer (IE) Properties = inetcpl.cpl
Keyboard = CONTROL.EXE keyboard
Location and Other Sensors = CONTROL.EXE /name Microsoft.LocationandOtherSensors
Location Notifications = LocationNotifications.exe
Mouse = CONTROL.EXE mouse or main.cpl or CONTROL.EXE main.cpl,,0
Network and Sharing Center = CONTROL.EXE /name Microsoft.NetworkandSharingCenter
Network Connections = CONTROL.EXE NetConnections or ncpa.cpl
Notification Area Icons = CONTROL.EXE /name Microsoft.NotificationAreaIcons
Parental Controls = CONTROL.EXE /name Microsoft.ParentalControls
Performance Information = CONTROL.EXE /name Microsoft.PerformanceInformationandTools
Personalization = CONTROL.EXE Desktop
Windows Color and Appearance (Aero) = CONTROL.EXE Color
Phone and Modem Options = telephon.cpl
Power Configuration = powercfg.cpl
Programs and Features = appwiz.cpl or CONTROL.EXE appwiz.cpl
Optional Features Manager = OptionalFeatures.exe or CONTROL.EXE appwiz.cpl,,2
Recovery = CONTROL.EXE /name Microsoft.Recovery
Regional and Language = intl.cpl
RemoteApp and Desktop Connections = CONTROL.EXE /name Microsoft.RemoteAppandDesktopConnections
Sound = mmsys.cpl
Personalization (Desktop Background, Themes, Colors, Appearance, Sounds, Screen Saver) = CONTROL.EXE desk.cpl,,2
Screen Saver (SS) = CONTROL.EXE desk.cpl,,1
Volume Mixer = sndvol.exe
System Properties = sysdm.cpl or hold WinKey + press Pause/Break
System Properties ComputerName tab = SystemPropertiesComputerName.exe
System Properties Hardware tab = SystemPropertiesHardware.exe
System Properties Advanced tab = SystemPropertiesAdvanced.exe
System Properties Performance Options = SystemPropertiesPerformance.exe
System Properties Data Execution Prevention = SystemPropertiesDataExecutionPrevention.exe
System Properties Protection tab = SystemPropertiesProtection.exe
System Properties Remote tab = SystemPropertiesRemote.exe
Windows Activation = slui.exe
Windows Activation Phone Numbers = slui.exe 4
Taskbar and Start Menu = CONTROL.EXE /name Microsoft.TaskbarandStartMenu
Program Compatibility Troubleshooter (PCT) = CONTROL.EXE /name Microsoft.Troubleshooting (MSDT.EXE -id PCWDiagnostic)
User Accounts = CONTROL.EXE /name Microsoft.UserAccounts
User Account Control (UAC) Settings = UserAccountControlSettings.exe
User Accounts / Windows domain version = netplwiz.exe or CONTROL.EXE Userpasswords2
Encryption File System = rekeywiz.exe
Windows Anytime Upgrade = WindowsAnytimeUpgradeui.exe
Windows Anytime Upgrade Results = WindowsAnytimeUpgradeResults.exe
Windows CardSpace = CONTROL.EXE /name Microsoft.cardspace
Windows (Defender) Firewall [W(D)F] = firewall.cpl or CONTROL.EXE /name Microsoft.WindowsFirewall
WindowsSideshow = CONTROL.EXE /name Microsoft.WindowsSideshow
Windows Update (WU) = CONTROL.EXE /name Microsoft.WindowsUpdate (CONTROL.EXE update) (wuapp.exe)
Windows Update (WU) -> Change Settings = CONTROL.EXE /name Microsoft.WindowsUpdate /page pageSettings

* Accessories:
Calculator = calc.exe
Command Prompt (DOS console) = cmd.exe
http://docs.microsoft.com/windows-server/administration/windows-commands/cmd/
Connect to a Network Projector = NetProj.exe
Presentation Settings = PresentationSettings.exe
Connect/switch to a second screen/projector = displayswitch.exe or hold WinKey + press P
Notepad = notepad.exe
Microsoft Paint = mspaint.exe
Remote Desktop Connection (RDC) = mstsc.exe
Run... [hold WinKey + press R] or run this command:
RUNDLL32.EXE SHELL32.DLL,#61
Snipping Tool = snippingtool.exe
Sound Recorder = soundrecorder.exe
Sticky Note = StikyNot.exe
Sync Center = mobsync.exe
Windows Mobility Center [laptops/portables only] = mblctr.exe or hold WinKey + press X
Windows Explorer = explorer.exe or hold WinKey + press E
Wordpad = write.exe or wordpad.exe
Ease of Access Center (EAC) = utilman.exe or hold WinKey + press U
Magnifier = magnify.exe
Narrator = Narrator.exe
On Screen Keyboard (OSK) = osk.exe
Private Character Editor = eudcedit.exe
Character Map = charmap.exe
Digitizer Calibration Tool = tabcal.exe
Disk Cleanup Utility = cleanmgr.exe
Defragment User Interface = dfrgui.exe
Internet Explorer (IE) = iexplore.exe
Internet Explorer (IE) no add-ons = iexplore.exe -extoff
Internet Explorer (IE) no home page = iexplore.exe about:blank
Phone Dialer = dialer.exe
Printer Migration = PrintBrmUi.exe
Rating System = ticrf.exe
System Information = msinfo32.exe
System Restore = rstrui.exe
Windows Easy Transfer = migwiz.exe
Windows Media Player (WMP) = wmplayer.exe
Windows Media Player DVD Player = dvdplay.exe
Windows Fax and Scan Cover Page Editor = fxscover.exe
Windows Fax and Scan = wfs.exe
Windows Image Acquisition (WMA) (scanners, copiers) = wiaacmgr.exe
Windows PowerShell = PowerShell.exe [C:\WINDOWS\System32\WindowsPowerShell\v1.0\PowerShell.exe = default location]
Example of "fully loaded" PowerShell command line:
PowerShell.exe -noExit -ExecutionPolicy Unrestricted -ImportSystemModules -Command Set-Location -literalPath '%V'
http://docs.microsoft.com/windows-server/administration/windows-commands/powershell/
http://docs.microsoft.com/powershell/module/microsoft.powershell.core/about/about_powershell_exe/
http://docs.microsoft.com/powershell/module/microsoft.powershell.security/set-executionpolicy/
http://www.ss64.com/ps/powershell.html
http://www.ss64.com/ps/
http://www.ss64.com/ps/syntax-elevate.html
Windows PowerShell ISE (Integrated Scripting Environment) = powershell_ise.exe
[C:\WINDOWS\System32\WindowsPowerShell\v1.0\PowerShell_ISE.exe = default location]
http://docs.microsoft.com/powershell/module/microsoft.powershell.core/about/about_powershell_ise_exe/
XPS (XML Paper Specification) Viewer = xpsrchvw.exe

* Other Shell/User Folders:
Open Documents folder = Documents
Open Pictures folder = Pictures
Open Music folder = Music
Open Videos folder = Videos
Open Downloads folder = Downloads
Open Favorites folder = Favorites
Open Recent folder = Recent
Logs out of Windows = Logoff
Locks User Account = hold WinKey + press L

* List of System + User Shell Folders in Windows Vista/newer:
http://www.ss64.com/nt/shell.html
http://www.winhelponline.com/blog/shell-commands-to-access-the-special-folders/
http://www.winaero.com/list-of-shell-commands-in-windows-10/
http://www.tenforums.com/tutorials/3109-shell-commands-list-windows-10-a.html
http://www.windowslearning.net/articles/list-of-windows-10-shell-commands.php
http://www.techradar.com/news/computing/pc/shell-folders-the-best-kept-windows-time-saving-secret-464668/
These preset/hard linked system + user shell folders and their locations are listed under these registry keys (some may
not exist, depending on Windows NTx OS build/edition/release/update/version):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders\Backup
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
See also "XP -> 7/8/8.1 Easy Transfer Files + Settings" chapter further below +
"Link Directory IDentifier (LDID)/DIRectory IDentifier (DIRID)/Decentralized IDentifier (DID)..." topic further above:
http://www.mdgx.com/7.php
http://www.mdgx.com/WINDOWS7.TXT
View their locations from a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE): right-click CMD shortcut/CMD.EXE ->
Run as Administrator -> run this command -> press Enter (example):
EXPLORER.EXE shell:AppData
To view the rest -> repeat this command by sustituting AppData with the string values listed below:
Shell Command 			Description
覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧覧
shell:AccountPictures 		Account Pictures
shell:AddNewProgramsFolder 	Programs Control Panel item
shell:Administrative Tools 	Administrative Tools
shell:AppData 			C:\Users\%UserName%\Appdata\Roaming = %AppData%
shell:Application Shortcuts 	Modern Apps shortcuts
shell:AppsFolder 		Installed Modern Apps
shell:AppUpdatesFolder 		Installed Updates Control Panel item
shell:Cache 			Internet Explorer (IE) Cache [Temporary Internet Files (TIF)]
shell:CD Burning 		Temporary Burn
shell:ChangeRemoveProgramsFolder Uninstall Program Control Panel item
shell:Common Administrative Tools Administrative Tools for all users
shell:Common AppData 		C:\ProgramData = %ProgramData%
shell:Common Desktop 		Public Desktop = same for all users
shell:Common Documents 		Public Documents
shell:Common Programs 		All Users Programs = part of Start Menu + used by Start screen
shell:Common Start Menu 	All Users Start Menu
shell:Common Startup 		Startup = all users
shell:Common Templates 		Startup = new documents, templates (MS Office)
shell:CommonDownloads 		Public Downloads
shell:CommonMusic 		Public Music
shell:CommonPictures 		Public Pictures
shell:CommonRingtones 		Public Ringtones
shell:CommonVideo 		Public Videos
shell:ConflictFolder 		Control Panel\All Control Panel Items\Sync Center\Conflicts item
shell:ConnectionsFolder 	Control Panel\All Control Panel Items\Network Connections item
shell:Contacts 			Contacts = Address book
shell:ControlPanelFolder 	Control Panel
shell:Cookies			Internet Explorer (IE) Cookies
shell:CredentialManager 	C:\Users\%UserName%\AppData\Roaming\Microsoft\Credentials
shell:CryptoKeys 		C:\Users\%UserName%\AppData\Roaming\Microsoft\Crypto
shell:CSCFolder 		Offline files = Not valid in Windows 7/newer
shell:Desktop 			Desktop = different for each user
shell:Device Metadata Store 	C:\ProgramData\Microsoft\Windows\DeviceMetadataStore
shell:DocumentsLibrary 		Documents Library
shell:Downloads 		Downloads
shell:DpapiKeys 		C:\Users\%UserName%\AppData\Roaming\Microsoft\Protect
shell:Favorites 		Favorites
shell:Fonts 			C:\WINDOWS\Fonts = %WinDir%\Fonts
shell:Games 			Games Explorer item
shell:GameTasks 		C:\Users\%UserName%\AppData\Local\Microsoft\Windows\GameExplorer
shell:History 			C:\Users\%UserName%\AppData\Local\Microsoft\Windows\History = Internet Explorer (IE)
				browsing history
shell:HomeGroupCurrentUserFolder Home Group for current user
shell:HomeGroupFolder 		Home Group root
shell:ImplicitAppShortcuts 	C:\Users\%UserName%\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User
				Pinned\ImplicitAppShortcuts
shell:InternetFolder 		Internet Explorer (IE)
shell:Libraries 		Libraries
shell:Links 			Favorites = Explorer menu
shell:LocalAppData 		C:\Users\%UserName%\AppData\Local
shell:LocalAppDataLow 		C:\Users\%UserName%\AppData\LocalLow
shell:LocalizedResourcesDir 	Not valid in Windows 8/8.1/10
shell:MAPIFolder 		Microsoft Outlook
shell:MusicLibrary 		Music Library
shell:My Music			My Music (not Library)
shell:My Pictures 		My Pictures (not Library)
shell:My Video 			My Videos (not Library)
shell:MyComputerFolder 		Computer/Drives
shell:NetHood 			C:\Users\%UserName%\AppData\Roaming\Microsoft\Windows\Network Shortcuts
shell:NetworkPlacesFolder 	Network Places = Computers and Devices instaleld on respective network
shell:OEM Links 		May work only in Windows 8/8.1/10 OEM editions [?]
shell:Original Images 		Not functional in Windows 8/8.1/10
shell:Personal 			My Documents (not Library)
shell:PhotoAlbums 		Saved slideshows = Not implemented yet [?]
shell:PicturesLibrary 		Pictures Library
shell:Playlists 		Stored WMP Playlists
shell:PrintersFolder 		Classic Printers (not Devices and Printers)
shell:PrintHood 		C:\Users\%UserName%\AppData\Roaming\Microsoft\Windows\Printer Shortcuts
shell:Profile 			User profile = %UserProfile% = C:\Users\%UserName%
shell:ProgramFiles 		C:\Program Files = %ProgramFiles%
shell:ProgramFilesX86 		C:\Program Files (x86) = %ProgramFiles(x86)% = Windows 64-bit (x64) only
shell:ProgramFilesCommon 	C:\Program Files\Common Files
shell:ProgramFilesCommonX86 	C:\Program Files (x86)\Common Files = Windows 64-bit (x64) only
shell:Programs 			C:\Users\%UserName%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs = Per user Start
				Menu Programs
shell:Public 			C:\Users\Public
shell:PublicAccountPictures 	C:\Users\Public\AccountPictures
shell:PublicGameTasks 		C:\ProgramData\Microsoft\Windows\GameExplorer
shell:PublicLibraries 		C:\Users\Public\Libraries
shell:Quick Launch 		C:\Users\%UserName%\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch
shell:Recent 			Recent Items = Recent Documents
shell:RecordedTVLibrary 	Recorded TV Library
shell:RecycleBinFolder 		Recycle Bin
shell:ResourceDir 		C:\WINDOWS\Resources = %WinDir%\Resources stores visual styles
shell:Ringtones 		C:\Users\%UserName%\AppData\Local\Microsoft\Windows\Ringtones
shell:Roamed Tile Images 	Not implemented yet = reserved for future use [?]
shell:Roaming Tiles 		C:\Users\%UserName%\AppData\Local\Microsoft\Windows\RoamingTiles
shell:SavedGames 		Saved Games
shell:Screenshots 		Win+Print Screen screen shots
shell:Searches 			Saved Searches
shell:SearchHomeFolder 		Windows Search UI
shell:SendTo 			Items visible in Send to menu
shell:Start Menu 		C:\Users\%UserName%\AppData\Roaming\Microsoft\Windows\Start Menu = Logged on User Start Menu
shell:Startup 			Logged on User Startup
shell:SyncCenterFolder 		Control Panel\All Control Panel Items\Sync Center
shell:SyncResultsFolder 	Control Panel\All Control Panel Items\Sync Center\Sync Results
shell:SyncSetupFolder 		Control Panel\All Control Panel Items\Sync Center\Sync Setup
shell:System 			C:\WINDOWS\System32 = %WinDir%\System32
shell:SystemCertificates 	C:\Users\%UserName%\AppData\Roaming\Microsoft\SystemCertificates
shell:SystemX86 		C:\WINDOWS\SysWOW64 = %WinDir%\SysWOW64 = Windows 64-bit (x64) only
shell:Templates 		C:\Users\%UserName%\AppData\Roaming\Microsoft\Windows\Templates
shell:User Pinned 		C:\Users\%UserName%\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned =
				Pinned items
shell:UserProfiles 		C:\Users = Users profiles
shell:UserProgramFiles 		Not implemented yet = reserved for future use [?]
shell:UserProgramFilesCommon 	Not implemented yet = reserved for future use [?]
shell:UsersFilesFolder 		Current user profile
shell:UsersLibrariesFolder 	Libraries
shell:VideosLibrary 		Videos Library
shell:Windows			C:\WINDOWS = %WinDir%
______________________________________________________________________________



Public Root DNS Servers [*]
http://www.mdgx.com/7.php#:~:text=Public%20Root%20DNS%20Servers%20%5B%2A%5D



* Public Root DNS (Domain Name System) Servers = DNS over TLS (Transport Layer Security) (DoT) + DNS over HTTPS (DoH)
providers:
http://www.lifewire.com/free-and-public-dns-servers-2626062/
http://twitgoo.com/best-free-dns-servers/
http://public-dns.info/
http://public-dns.info/nameserver/us.html
http://servers.opennicproject.org/
http://www.publicdns.xyz/
http://wiki.ipfire.org/dns/public-servers
http://www.tech-faq.com/public-dns-servers.html
http://www.tweaks.com/windows/40339/
http://www.zdnet.com/blog/networking/fixing-dns-woes-for-comcast-users-and-everyone-else/
http://browserleaks.com/dns/
Reference:
Wikipedia: Root name server:
http://en.wikipedia.org/wiki/Root_name_server
Wikipedia: Domain Name System (DNS):
http://en.wikipedia.org/wiki/Domain_Name_System
Wikipedia: Transport Layer Security (TLS):
http://en.wikipedia.org/wiki/Transport_Layer_Security
Wikipedia: DNS over TLS (DoT):
http://en.wikipedia.org/wiki/DNS_over_TLS
Wikipedia: DNS over HTTPS (DoH):
http://en.wikipedia.org/wiki/DNS_over_HTTPS
Wikipedia: Hypertext Transfer Protocol Secure (HTTPS):
http://en.wikipedia.org/wiki/HTTPS

* Cloudflare WARP Desktop client 64-bit for Windows 8.1/newer 64-bit (x64) [free Virtual Private Network (VPN) using public
root Domain Name System (DNS) servers]:
http://1.1.1.1/
Cloudflare WARP for Windows:
http://developers.cloudflare.com/warp-client/get-started/windows/
Cloudflare WARP for Linux:
http://developers.cloudflare.com/warp-client/get-started/linux/
Cloudflare WARP for macOS:
http://developers.cloudflare.com/warp-client/get-started/macos/
Cloudflare WARP for Android:
http://developers.cloudflare.com/warp-client/get-started/android/
Cloudflare WARP for iOS:
http://developers.cloudflare.com/warp-client/get-started/ios/
BrowserLeaks: DNS Leak Test:
http://browserleaks.com/dns/
Wikipedia: Virtual Private Network (VPN):
http://en.wikipedia.org/wiki/Virtual_private_network
Wikipedia: Domain Name System (DNS):
http://en.wikipedia.org/wiki/Domain_Name_System
See MDGx "Digital + Internet/Online Privacy, Security + Safety" chapter ->
"* Web Browsers + Devices Online Protection Guides + Tools for Privacy, Security, Tracking:" section in WINDOWS7.TXT
(this file):
http://www.mdgx.com/7.php#:~:text=Digital%20%2B%20Internet%2FOnline%20Privacy%2C%20Security%20%2B%20Safety%20%3D%20Your%20Top%20Priority

* OpenVPN Cloud, Access Server + Connect client Virtual Private Network (VPN) system provides secure point-to-point or
site-to-site concurrent connections using OpenSSL encryption + Transport Layer Security (TLS) protocol, highly customizable:
http://openvpn.net/
Free subscriptions for personal use = limited to:
- OpenVPN Cloud = maximum 3 concurrent connections.
- Access Server = maximum 2 concurrent connections.
Repository:
http://github.com/OpenVPN/openvpn/
OpenVPN Connect client 32-bit + 64-bit for Windows 7/newer 32-bit (x86) + 64-bit (x64):
http://openvpn.net/client-connect-vpn-for-windows/
OpenVPN FAQs:
http://openvpn.net/vpn-server-resources/#faqs
OpenVPN Online Documentation:
http://openvpn.net/vpn-server-resources/
Wikipedia: Virtual Private Network (VPN):
http://en.wikipedia.org/wiki/Virtual_private_network
Wikipedia: OpenSSL:
http://en.wikipedia.org/wiki/OpenSSL
Wikipedia: Transport Layer Security (TLS):
http://en.wikipedia.org/wiki/Transport_Layer_Security

* Pi-hole DOS console command line installer [PH4WSL1.cmd] for Windows 10/newer installs Linux Pi-hole DNS sinkhole on
Windows computers, highly customizable:
http://github.com/DesktopECHO/Pi-Hole-for-WSL1/
Download:
http://github.com/DesktopECHO/Pi-Hole-for-WSL1/raw/master/PH4WSL1.cmd
PH4WSL1.cmd install guide step-by-step:
http://www.reddit.com/r/pihole/comments/j39drp/
PH4WSL1.cmd ReadMe guide:
http://github.com/DesktopECHO/Pi-Hole-for-WSL1/#readme
Pi-hole DNS sinkhole for Linux:
http://github.com/pi-hole/pi-hole/
DNS sinkhole:
http://en.wikipedia.org/wiki/DNS_sinkhole

* Privoxy GUI interface + DOS console command line non-caching HTTP/web proxy with advanced filtering for enhanced privacy +
safety, highly customizable:
http://www.privoxy.org/
Repository:
http://sourceforge.net/projects/ijbswa/
Download:
http://www.privoxy.org/sf-download-mirror/Win32/
http://sourceforge.net/projects/ijbswa/files/Win32/
Privoxy FAQ:
http://www.privoxy.org/faq/
Privoxy Online Manual:
http://www.privoxy.org/user-manual/
Proxy server:
http://en.wikipedia.org/wiki/Proxy_server

* DNS Jumper (DNSJumper) tests + changes to fastest + closest public root DNS servers -> right-click DNSJumper.exe ->
Run as as Administrator -> click Benchmark button:
http://www.sordum.org/7952/dns-jumper-v2-2/
File:
http://www.sordum.org/files/downloads.php?dns-jumper

* Domain Name Speed (DNS) Benchmark (DNSBench) tests fastest + closest public root DNS servers -> right-click DNSBench.exe
-> Run as Administrator -> click Fastest DNS button -> click Start DNS test button:
http://www.grc.com/dns/benchmark.htm
File:
http://www.grc.com/files/DNSBench.exe

* Automate Windows XP/newer customization of NameServer registry REG_SZ values to turn ON/enable/customize DoH (DNS over
HTTPS) using public root DNS servers from reliable/trusted entities (see listings further above and below) in order to
prevent privacy + security breaches, dissemination, hacking, intrusions, invasion, leaks, phishing, malware, spyware,
tracking:
http://serverfault.com/questions/208490/
http://technet.microsoft.com/library/cc978468.aspx
http://learn.microsoft.com/troubleshoot/windows-client/networking/tcpip-and-nbt-configuration-parameters/
Setup/change IPv4 (and IPv6 if applicable) public root DNS servers Registry entries (example using default home computer
internet connection name: "Local Area Network" (LAN) connection = modify to match your connection name if different, and to
use Cloudflare public root DNS servers): Open Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
-> copy & paste text strings between Cut & Paste lines below -> save BATch file as Root_DNS_Servers.bat (example).
- If using Windows 7 or 7 SP1: right-click on Root_DNS_Servers.bat -> Run as Administrator -> restart/reboot.
- If using Windows 8, 8.1, 2012, 10, 2016, 2019, 11, 2022 or newer: right-click on Root_DNS_Servers.bat -> select Open with
-> select Notepad or your favorite plain text/ASCII editor (browse to executable if needed) -> remark (comment) all Windows
XP... and Windows 7... NETSH.EXE lines by adding ":: " (double colon + space) in front of them -> enable the 2 remarked
(commented) Windows 8/newer NETSH.EXE lines by deleting the ":: " (double colon + space) in front of them -> save your file
-> right-click on it -> Run as Administrator -> restart/reboot.
- If using Windows XP or 2003: right-click on Root_DNS_Servers.bat -> select Open with -> select Notepad or your favorite
plain text/ASCII editor -> remark (comment) all Windows 7... and Windows 8... NETSH.EXE lines by adding ":: " (double colon
+ space) in front of them -> enable the 2 remarked (commented) Windows XP/2003 NETSH.EXE lines by deleting the ":: " (double
colon + space) in front of them -> save your file -> right-click on it -> Run... [hold WinKey + press R] -> run batch file
below [customize it first: change IP addresses below to other/faster public root DNS servers] -> restart/reboot.
-----Begin cut & paste here-----
@ECHO OFF
IF NOT "%OS%"=="Windows_NT" GOTO END
:: Cloudflare public root DNS servers (example):
:: * Windows 7/7 SP1 only:
NETSH.EXE interface ip set dns "Local Area Connection" static 1.1.1.1
NETSH.EXE interface ip add dns "Local Area Connection" 1.0.0.1 index=2
:: * Windows 8/newer only:
:: NETSH.EXE interface ipv4 set dns "Local Area Connection" static 1.1.1.1
:: NETSH.EXE interface ipv4 add dns "Local Area Connection" 1.0.0.1 index=2
:: * Windows XP/2003 only:
:: NETSH.EXE interface ip set address dns name="Local Area Connection" static 1.1.1.1
:: NETSH.EXE interface ip add address dns name="Local Area Connection" 1.0.0.1 index=2
:END
EXIT
------End cut & paste here------
This batch file (name it and save it as whatever you wish, just make sure it has the .BAT or .CMD extension) searches the
Registry database for the current/active network connection, and adds/changes the public root DNS servers (example using
Cloudflare servers) to the matching NameServer value(s):
- Windows 7/7 SP1 users BAT (.bat)/CMD (.cmd) file:
-----Begin cut & paste here-----
@ECHO OFF
IF NOT "%OS%"=="Windows_NT" GOTO END
:: Windows 8/newer only:
FOR /F "skip=2 tokens=4*" %%a IN ('NetSh Interface IP Show Interfaces') DO (
CALL :Network_Adapter %%a "%%b"
)
:: PAUSE
EXIT /B
:Network_Adapter
:: %1=State
:: %2=Name (quoted); %~2=Name (unquoted)
IF %1==connected (
:: Run your commands here (example):
ECHO %2
:: Primary public root DNS server [Cloudflare]:
NETSH.EXE interface ip set dnsservers %2 static 1.1.1.1
:: Secondary public root DNS server [Cloudflare]:
NETSH.EXE interface ip add dnsservers %2 1.0.0.1 index=2
:: In case you wish to reset to Windows original public root DNS servers -> delete double
:: colons + space [:: ] in front of NetSh command below -> run this batch file again:
:: NETSH.EXE int ip reset %2
)
:: PAUSE
EXIT /B
:END
EXIT
------End cut & paste here------
- Windows 8/newer users BAT (.bat)/CMD (.cmd) file:
-----Begin cut & paste here-----
@ECHO OFF
IF NOT "%OS%"=="Windows_NT" GOTO END
:: Windows 8/newer only:
FOR /F "skip=2 tokens=4*" %%a IN ('NetSh Interface IPv4 Show Interfaces') DO (
CALL :Network_Adapter %%a "%%b"
)
:: PAUSE
EXIT /B
:Network_Adapter
:: %1=State
:: %2=Name (quoted); %~2=Name (unquoted)
IF %1==connected (
:: Run your commands here (example):
ECHO %2
:: Primary public root DNS server [Cloudflare]:
NETSH.EXE interface ipv4 set dnsservers %2 static 1.1.1.1
:: Secondary public root DNS server [Cloudflare]:
NETSH.EXE interface ipv4 add dnsservers %2 1.0.0.1 index=2
:: In case you wish to reset to Windows original public root DNS servers -> delete double
:: colons + space [:: ] in front of NetSh command below -> run this batch file again:
:: NETSH.EXE int ip reset %2
)
:: PAUSE
EXIT /B
:END
EXIT
------End cut & paste here------
To determine your active network interface ID
http://social.technet.microsoft.com/forums/bacc4f3d-54c2-4e99-931c-42a3cea2e67c/
from a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE): right-click CMD shortcut/CMD.EXE -> Run as Administrator ->
run this command -> press Enter:
WMIC.EXE nicconfig get description,settingid
WMIC.EXE (Windows Management Instrumentation Command executable) is located in the %WinDir%\SYSTEM32\wbem folder [%WinDir% =
usually C:\WINDOWS], listed on your system PATH.
View all directories/folders listed in your system PATH from a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE):
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter:
PATH
WMIC (Windows Management Instrumentation Command):
http://docs.microsoft.com/windows/win32/wmisdk/wmic/
MS DOCs: WMIC:
http://technet.microsoft.com/library/bb742610.aspx
Dedoimedo: WMIC - The Windows secret weapon:
http://www.dedoimedo.com/computers/windows-wmic.html
ComputerHope: WMIC:
http://www.computerhope.com/wmic.htm
Rob van der Woude: WMIC:
http://www.robvanderwoude.com/wmic.php
quux: WMIC Snippets:
http://quux.wiki.zoho.com/WMIC-Snippets.html
SS64: WMIC.EXE:
http://www.ss64.com/nt/wmic.html
Wikipedia: WMI:
http://en.wikipedia.org/wiki/Windows_Management_Instrumentation
Example of output returned by running WMIC.EXE command above (each network adapter has a unique ID):
Description				SettingID
Intel Ethernet Network Adapter I225-T1	{0A1B2C4D-5E6F-7A8B-9C0D-1E2F3A4B5C6D}
Look at the NIC (Network Interface Controller) adapter name [under Description] you are using to connect to your internet
provider -> it is followed [under SettingID] by a Link Directory IDentifier (LDID) corresponding to the LDID from the
registry key below.
Your LDID number is different depending on your network adapter name/model/manufacturer and type of connection.
Generic example of NameServer REG_SZ (String) registry value for Ethernet network connection interface (each network adapter
has a unique ID) using Cloudflare public root DNS servers:
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
; Cloudflare public root DNS servers (example):
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\Tcpip\Parameters\Interfaces\{00000000-AAAA-1111-BBBB-222222222222}]
"NameServer"="1.1.1.1,1.0.0.1"
------End cut & paste here------
You need to substitute generic ID above ["00000000-AAAA-1111-BBBB-222222222222"] with your actual Decentralized IDentifier
(DID) (hard link) string which corresponds to your active internet/network connection/interface present in your registry
under the "CurrentControlSet" Hive Key Local Machine (HKLM) subkey above.

* Turn ON/enable/customize DoH (DNS over HTTPS) using public root DNS servers from reliable/trusted entities (see listings
further above and below) in Windows XP/newer, web browsers, routers + modem/router combos in order to prevent privacy +
security breaches, dissemination, hacking, intrusions, invasion, leaks, phishing, malware, spyware, tracking:
http://developers.cloudflare.com/1.1.1.1/setup/windows/
http://www.windowscentral.com/how-change-your-pcs-dns-settings-windows-10/
http://developers.google.com/speed/public-dns/docs/using/
- Windows 8/newer:
http://support.opendns.com/hc/articles/228006907/
Start menu -> Control Panel -> Network and Sharing Center -> Active Networks -> click item right side of Connections: ->
"your Network Connection name" (typical examples): "Ethernet" (direct broadband modem connection), "Local Area Network" (LAN
= direct router connection) or "Wi-Fi" (high speed wireless connection) -> connection Status -> General tab -> Properties ->
scroll down -> select Internet Protocol Version 4 (TCP/IPv4) -> Properties -> General tab -> Use the following DNS server
addresses: -> type desired IP addresses (example using Cloudflare public root DNS servers):
Preferred (1st) DNS Server: 1.1.1.1
Alternate (2nd) DNS Server: 1.0.0.1
http://www.mdgx.com/IPv4_Cloudflare_public_root_DNS_servers.jpg
-> select Internet Protocol Version 6 (TCP/IPv6) -> Properties -> General tab -> Use the following DNS server addresses: ->
type desired IP addresses (example using Cloudflare public root DNS servers):
2606:4700:4700::1111
2606:4700:4700::1001
http://www.mdgx.com/IPv6_Cloudflare_public_root_DNS_servers.jpg
Click OK -> exit all dialogs/prompts/windows -> restart/reboot.
- Windows 7/7 SP1:
http://www.sevenforums.com/tutorials/12421-local-area-connection-status-create-shortcut.html
Start menu -> Control Panel -> Network and Sharing Center -> View network status and tasks -> View Active networks -> click
item right side of Connections: -> "your Network Connection name" (typical examples): "Ethernet" (direct broadband modem
connection), "Local Area Network" (LAN = direct router connection) or "Wi-Fi" (Wi-Fi connection) -> connection Status ->
General tab -> Properties -> Connection Properties General tab -> scroll down -> select Internet Protocol Version 4
(TCP/IPv4) -> Properties -> Internet Protocol Version 4 (TCP/IPv4) Properties -> General tab -> scroll down -> select (x) ->
Use the following DNS server IP addresses: -> type desired IP addresses (example using Cloudflare public root DNS servers):
Preferred (1st) DNS Server: 1.1.1.1
Alternate (2nd) DNS Server: 1.0.0.1
http://www.mdgx.com/IPv4_Cloudflare_public_root_DNS_servers.jpg
Click OK -> exit all dialogs/prompts/windows -> restart/reboot.
- Windows XP/2003:
http://www.webnots.com/how-to-change-dns-server-ips-in-windows-xp/
Start menu -> Control Panel -> Network Connections -> select current connection -> "your Network Connection name" (typical
examples): "Local Area Network" (LAN = direct router connection) or "Wireless" (Wi-Fi connection) -> connection Status ->
General tab -> Properties -> Connection Properties General tab -> scroll down -> select Internet Protocol (TCP/IP) ->
Properties -> Internet Protocol Version (TCP/IP) Properties General tab -> scroll down -> select (x) -> Use the following
DNS server IP addresses: -> type desired IP addresses (example using Cloudflare public root DNS servers):
Preferred (1st) DNS Server: 1.1.1.1
Alternate (2nd) DNS Server: 1.0.0.1
http://www.mdgx.com/IPv4_Cloudflare_public_root_DNS_servers.jpg
Click OK -> exit all dialogs/prompts/windows -> restart/reboot.
- OPTIONAL:
Recommended for all Windows NTx users:
A. Start menu -> Control Panel -> Network and Sharing Center -> Active Networks -> click item right side of Connections: ->
"your Network Connection name" icon/item -> Properties button -> Networking tab -> This connection is using the following
items: -> Internet Protocol Version 4 (TCP/IPv4) -> General tab -> Advanced... button -> DNS tab -> DNS server addresses, in
order of use: -> Add... x 2 -> Add button x 2 -> type x 2 IP addresses below (example using Cloudflare public root DNS
servers):
1.1.1.1
1.0.0.1
-> OK/Apply.
http://www.mdgx.com/IPv4_Cloudflare_public_root_DNS_servers.jpg
B. Start menu -> Control Panel -> Network and Sharing Center -> Active Networks -> click item right side of Connections: ->
"your Network Connection name" icon/item -> Properties button -> Networking tab -> This connection is using the following
items: -> Internet Protocol Version 4 (TCP/IPv4) -> General tab -> Advanced... button -> WINS tab -> check Enable LMHOSTS
lookup box -> NetBIOS setting -> check Disable NetBIOS over TCP/IP box -> OK/Apply.
http://www.thewindowsclub.com/wp-content/uploads/2020/11/Disable-NetBIOS-over-TCP-IP.png
See also "Tweaks, Hacks + Fixes... UNconventional, UNdocumented, UNcensored ;-/" chapter -> "* Turn OFF unnecessary,
obsolete + unsafe TCP/IP NetBIOS (Network Basic Input/Output System) Helper service [lmhosts]" section in WIN10.TXT
(included):
http://www.mdgx.com/10.php
http://www.mdgx.com/WIN10.TXT
- WEB BROWSERS:
Turn ON DoH (DNS over HTTPS) in your web browser using public root DNS servers:
http://developers.cloudflare.com/1.1.1.1/encryption/dns-over-https/encrypted-dns-browsers/
http://techcountless.com/change-dns-server-in-google-chrome/
http://support.google.com/chrome/answer/10468685/
http://www.tenforums.com/tutorials/145372-how-enable-disable-dns-over-https-doh-google-chrome.html
http://pureinfotech.com/enable-dns-over-https-chrome/
http://icpmoles.github.io/post/chrome-doh/
Turn ON/enable/customize DoH (DNS over HTTPS) in Chromium/Chrome web browsers & alternatives/derivatives/forks/variants
using public root DNS servers from reliable/trusted entities (see listings further above and below):
http://chromeenterprise.google/policies/?policy=BuiltInDnsClientEnabled
http://chromeenterprise.google/policies/?policy=DnsOverHttpsMode
http://chromeenterprise.google/policies/?policy=DnsOverHttpsTemplates
http://admx.help/?Category=Chrome&Policy=Google.Policies.Chrome::BuiltInDnsClientEnabled
http://admx.help/?Category=EdgeChromium&Policy=Microsoft.Policies.Edge::DnsOverHttpsMode
http://admx.help/?Category=ChromeOS&Policy=Google.Policies.ChromeOS::DnsOverHttpsTemplates
RECOMMENDED:
************
Install an independent/3rd party free, open source, safe, secure, uncrippled, unlocked, unrestricted, modern web browser
based on Chromium code with enhanced privacy, safety + security
http://www.mdgx.com/nettoys.htm#PRV
-> see "FREE Windows 9x/NTx Web Browsers" chapter -> "Chromium + Chrome" section in SOFTWARE.TXT (included):
http://www.mdgx.com/nettoys.htm#CHR
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome]
"BuiltInDnsClientEnabled"=dword:1
"DnsOverHttpsMode"="automatic"
"DnsOverHttpsTemplates"="https://dns.google/dns-query{?dns}"
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome\Recommended]
"BuiltInDnsClientEnabled"=dword:1
"DnsOverHttpsMode"="automatic"
"DnsOverHttpsTemplates"="https://dns.google/dns-query{?dns}"
[HKEY_CURRENT_USER\Software\Policies\Google\Chrome]
"BuiltInDnsClientEnabled"=dword:1
"DnsOverHttpsMode"="automatic"
"DnsOverHttpsTemplates"="https://dns.google/dns-query{?dns}"
[HKEY_CURRENT_USER\Software\Policies\Google\Chrome\Recommended]
"BuiltInDnsClientEnabled"=dword:1
"DnsOverHttpsMode"="automatic"
"DnsOverHttpsTemplates"="https://dns.google/dns-query{?dns}"
[HKEY_USERS\.DEFAULT\Software\Policies\Google\Chrome]
"BuiltInDnsClientEnabled"=dword:1
"DnsOverHttpsMode"="automatic"
"DnsOverHttpsTemplates"="https://dns.google/dns-query{?dns}"
[HKEY_USERS\.DEFAULT\Software\Policies\Google\Chrome\Recommended]
"BuiltInDnsClientEnabled"=dword:1
"DnsOverHttpsMode"="automatic"
"DnsOverHttpsTemplates"="https://dns.google/dns-query{?dns}"
;
------End cut & paste here------
- ROUTERS + MODEM/ROUTER COMBOS:
Recommended for all internet/network/portable/Wi-Fi router + modem/router combo users to set up static IP address public
root DNS servers from reliable/trusted entities (see listings further above and below) in order to prevent privacy +
security breaches, dissemination, hacking, intrusions, invasion, leaks, phishing, malware, spyware, tracking:
http://developers.cloudflare.com/1.1.1.1/setup/router/
http://www.lifewire.com/how-to-2617995/
http://www.tp-link.com/support/faq/1712/
http://www.linksys.com/support-article?articleNum=316999
http://support.surfshark.com/hc/articles/360019705540/
http://blog.cloudflare.com/dns-over-tls-for-openwrt/
In this example I have used NETGEAR routers + Cloudflare public root DNS servers:
http://kb.netgear.com/30510/
http://www.mdgx.com/NETGEAR_router_public_root_DNS_servers.jpg
Type your router IP address in your web browser (typical example valid for most routers and modem/router combos):
http://192.168.1.1/
-> press Enter -> type user name (default on many routers is "admin" unless changed by user) + password (if any, recommended
to always have a strong password) to log on/sign in into your router built-in web browser interface (example): router Menu
(interface layout, options + wording vary depending on router brand/model/operating system/firmware version) -> Basic tab ->
Internet -> Domain Name Server (DNS) Address -> check Use these DNS Servers box -> type desired IP addresses in the square
boxes, but don't type the dots (example using Cloudflare public root DNS servers):
Primary (1st) Static DNS Server (DNS1) = 1.1.1.1
Secondary (2nd) Static DNS Server (DNS2) = 1.0.0.1
http://www.mdgx.com/NETGEAR_router_public_root_DNS_servers.jpg
-> Apply/Save changes -> reset/restart router if needed.

* DNS Client service [DNSCache] caches Domain Name System (DNS) names/hostnames (DNS Cache) which may slow down
significantly the processing of a large HOSTS [hosts] file with many IPs (for example my custom HOSTS file contains over
201500 hostnames):
- Disable Client Side DNS Caching in Windows NTx:
http://docs.microsoft.com/windows-server/networking/dns/troubleshoot/disable-dns-client-side-caching/
- Flush Windows DNS Cache:
http://www.thewindowsclub.com/flush-windows-dns-cache/
- Stop/Start DNS Client service:
http://www.computerstepbystep.com/dns_client_service.html
Open STARTDNS.CMD + STOP!DNS.CMD (both included) in Notepad for details:
http://www.mdgx.com/10BLK/STARTDNS.CMD.TXT
http://www.mdgx.com/10BLK/STOP!DNS.CMD.TXT
- MDGx "HOSTS Files, Guides + Tools" -> "DNS Client Service":
http://www.mdgx.com/hosts.php#N2
HOSTS file is located in the %WinDir%\SYSTEM32\DRIVERS\ETC folder [%WinDir% = usually C:\WINDOWS].

* Determine your router or modem/router combo IP address in Windows XP/newer:
From a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE): right-click CMD shortcut/CMD.EXE -> Run as Administrator ->
run this command
IPCONFIG.EXE
-> press Enter -> Default Gateway IP address is usually the same as your router IP address.
IPConfig [IPCONFIG.EXE] is located in the %WinDir%\SYSTEM32 folder [%WinDir% = usually C:\WINDOWS].

* Router + modem/router combo users:
Your router or modem/router combo should already have a pre-configured/preset DNS server to handle all DNS caching traffic
(default example):
192.168.1.1
Router or modem/router combo caching DNS server will redirect all queries to currently pre-configured/preset (default) ISP
connection provider servers (if unchanged) or custom assigned (if changed) public root DNS servers.
Router or modem/router combo static DNS IP addresses should be selected from outside DHCP (Dynamic Host Configuration
Protocol) range in order to avoid any conflicts (typical example):
192.168.1.2 - 192.168.1.9

* Upgrade WRT54G2 router (example) to DD-WRT/OpenWRT Firmware:
http://blogs.gurulabs.com/mike/2009/03/upgrading-a-cisco-linksys-wrt5.html
WRT54G2 Set up web server behind router:
http://sanzon.wordpress.com/2008/04/04/setting-up-web-server-behind-router-wrt54g2/
WRT54G2 Static IP config and reconfig:
http://sanzon.wordpress.com/2008/04/09/wrt54g2-static-ip-configuration-and-reconfiguring-router/
WRT54G2 Assign Static IP(s):
http://www.superuser.com/questions/8574/

* RECOMMENDED: Cloudflare public root DNS servers:
http://www.cloudflare.com/learning/dns/what-is-1.1.1.1/
Verify to make sure you're using Cloudflare public root DNS servers after setup:
http://1.1.1.1/help/
- IPv4 servers:
1.1.1.1
1.0.0.1
- IPv6 servers:
2606:4700:4700::1111
2606:4700:4700::1001

* Google public root DNS servers:
http://developers.google.com/speed/public-dns/docs/using/
8.8.8.8
8.8.4.4
Install Guide:
http://developers.google.com/speed/public-dns/docs/using/
IP addresses used by Google:
http://www.lifewire.com/what-is-818153/

* Quad9 public root DNS servers:
http://www.quad9.net/faq/
9.9.9.9
149.112.112.112

* Level3 (CenturyLink) public root DNS servers:
http://www.dnsserverlist.org/
4.2.2.1
4.2.2.2
4.2.2.3
4.2.2.4
4.2.2.5
4.2.2.6
Level3 (CenturyLink) alternate public root DNS servers:
209.244.0.3
209.244.0.4

* CenturyLink public root DNS servers:
http://www.centurylink.com/home/help/internet/dns.html
205.171.3.26
205.171.2.26

* CleanBrowsing public root DNS servers:
http://cleanbrowsing.org/filters/
185.228.168.9
185.228.168.10

* SafeDNS public root DNS servers:
http://www.safedns.com/en/guides/win7/
195.46.39.39
195.46.39.40

* Comodo Secure DNS public root DNS servers:
http://www.comodo.com/secure-dns/
8.26.56.26
8.20.247.20

* Advantage DNS (UltraDNS) public root DNS servers:
http://www.neustar.biz/security/dns-services
156.154.70.1
156.154.71.1

* Verisign public root DNS servers:
http://www.verisign.com/en_US/security-services/public-dns/
64.6.64.6
64.6.65.6

* OpenDNS public root DNS servers:
http://www.opendns.com/setupguide/
208.67.222.222
208.67.220.220
Install Guide:
http://use.opendns.com/
Cisco alternate public root DNS servers:
http://docs.umbrella.com/deployment-umbrella/docs/point-your-dns-to-cisco/
128.107.241.185
192.135.250.69

* OpenNIC public root DNS servers:
http://www.opennic.org/
52.173.73.208
45.56.117.118
OpenNIC public root DNS servers:
http://servers.opennicproject.org/
______________________________________________________________________________



Internet + Web Browsers Tweaks, Fixes + Tools [Chromium/Chrome, Firefox + Internet Explorer (IE)]
http://www.mdgx.com/7.php#:~:text=Internet%20%2B%20Web%20Browsers%20Tweaks%2C%20Fixes%20%2B%20Tools%20%5BChromium%2FChrome%2C%20Firefox



* MDGx "Internet Power Toys [free(ware)]" section -> "Free(ware) Windows NTx Web Browsers" topic in SOFTWARE.TXT (included):
http://www.mdgx.com/nettoys.htm#NET

* MDGx "Internet Power Toys [free(ware)]" section -> "Free(ware) Windows NTx Internet Enhancers" topic in SOFTWARE.TXT
(included):
http://www.mdgx.com/nettoys.htm#DUN

* MDGx "Firewalls, Anti-Spyware + Internet Monitors [free(ware)]" section -> "Free(ware) Windows NTx Monitors, Firewalls +
Anti-Spyware" topic in SOFTWARE.TXT (included):
http://www.mdgx.com/fw.htm

* MDGx "List of Useful Windows NTx Tools [99.9% free(ware)]" -> "INTERNET" section in TOOLS.TXT (included):
http://www.mdgx.com/tools.php
http://www.mdgx.com/TOOLS.TXT

* Tweak Network Interface Controller (NIC) Ethernet settings for maximum performance + speed in Windows 7/newer:
http://windowsreport.com/best-ethernet-settings-for-gaming/
http://techgenix.com/advanced-network-adapter-driver-settings/
http://helpdesk.flexradio.com/hc/articles/202118518/
http://docs.microsoft.com/windows-server/networking/technologies/network-subsystem/net-sub-performance-tuning-nics/
http://www.digit.in/features/tech/tweak-network-adapter-properties-networking-ethernet-wifi-vpn-45243.html
http://steamcommunity.com/sharedfiles/filedetails/?id=727946014
http://www.speedguide.net/articles/3449/
http://www.peerwisdom.org/2013/04/03/large-send-offload-and-network-performance/
http://www.networkworld.com/article/2224722/jumbo-frames.html
http://netcraftsmen.com/just-say-no-to-jumbo-frames/
NetSh (Network Shell) tool [%WinDir%\SYSTEM32\NETSH.EXE]:
http://docs.microsoft.com/windows-server/networking/technologies/netsh/netsh/
http://technet.microsoft.com/library/bb490939.aspx
http://www.ss64.com/nt/netsh.html
http://adamtheautomator.com/netsh/
View all NetSh available options, parameters + switches: from a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE):
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter:
NETSH.EXE /?
... And now dig deeper: ;-/
* Turn ON Receive Window Auto-Tuning + turn OFF Scaling Heuristics Transmission Control Protocol/Internet Protocol (TCP/IP)
parameters to increase/regain decreased speed/slow internet connection(s) in Windows XP/newer:
http://www.majorgeeks.com/content/page/how_to_fix_slow_internet_on_windows_10.html
http://blogs.technet.microsoft.com/networking/2016/08/11/an-update-on-windows-tcp-autotuninglevel/
http://www.techjourney.net/disable-tcp-receive-window-auto-tuning-fix-slow-internet-cannot-load-web-page-cannot-download-email/
http://docs.microsoft.com/troubleshoot/windows-server/networking/receive-window-auto-tuning-for-http/
http://pureinfotech.com/disable-window-auto-tuning-fix-slow-internet-speeds-windows-10/
http://www.speedguide.net/faq/339/
http://www.it-support.com.au/5-ways-to-improve-download-speed/2012/08/
http://therealhelper.blogspot.com/2017/09/you-can-actually-kill-lag-of-any-game.html
- Windows XP/Vista/7/7 SP1 users:
*********************************
1. Patch the TCPIP.SYS driver [%WinDir%\SYSTEM32\Drivers\TCPIP.SYS = original file will be backed up] using EvID4226 Limited
Connections Patch:
http://www.raymond.cc/blog/tcp-z-is-the-best-tcpip-half-open-connection-limited-patcher/
File:
http://www.raymond.cc/blog/download/did/205/
2. Restart/reboot Windows -> run these commands to turn ON TCP/IP Receive Window Auto-Tuning, turn OFF Scaling Heuristics +
turn ON Direct Cache Access (DCA) + NetDMA Direct Memory Access from a DOS console command prompt
(%WinDir%\SYSTEM32\CMD.EXE):
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run these commands -> press Enter after each line:
NETSH.EXE interface tcp set global autotuning=normal
NETSH.EXE interface tcp set global dca=enabled netdma=enabled
NETSH.EXE interface tcp set heuristics disabled
NETSH.EXE interface tcp set heuristics wsh=disabled forcews=enabled
NETSH.EXE interface tcp set global rss=enabled chimney=enabled rsc=enabled nonsackrttresiliency=enabled
3. View your TCP/IP connection status parameters from a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE): right-click
CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter:
NETSH.EXE interface tcp show global
Should be set to normal (Windows NTx default):
Receive Window Auto-Tuning Level    : normal
- Windows 8/8.1/10/11 users:
****************************
1. Run these commands to turn ON TCP/IP Receive Window Auto-Tuning, turn OFF Scaling Heuristics + turn ON Direct Cache Access
(DCA) + NetDMA Direct Memory Access from a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE): right-click CMD
shortcut/CMD.EXE -> Run as Administrator -> run these commands -> press Enter after each line:
NETSH.EXE interface tcp set global autotuninglevel=normal
NETSH.EXE interface tcp set global dca=enabled netdma=enabled
NETSH.EXE interface tcp set heuristics disabled
NETSH.EXE interface tcp set heuristics wsh=disabled forcews=enabled
NETSH.EXE interface tcp set global rss=enabled rsc=enabled nonsackrttresiliency=enabled
2. View your TCP/IP connection status parameters from a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE):
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter:
NETSH.EXE interface tcp show global
Should be set to normal (Windows NTx default):
Receive Window Auto-Tuning Level    : normal
BUG:
****
Increase/regain your internet connection speed in case using (older/incompatible) modems/routers/devices/networks without
built-in support for TCP/IP Receive Window Auto-Tuning.
FIX:
****
1. Turn OFF Receive Window Auto-Tuning from a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE): right-click CMD
shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter:
- Windows XP/Vista/7/7 SP1 users:
NETSH.EXE interface tcp set global autotuning=disabled
- Windows 8/8.1/10/11 users:
NETSH.EXE interface tcp set global autotuninglevel=disabled
2. View your TCP/IP connection status parameters from a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE):
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter:
NETSH.EXE interface tcp show global
Should be disabled:
Receive Window Auto-Tuning Level    : disabled
RESTORE:
********
In case your internet connection slows down after disabling Receive Window Auto-Tuning TCP/IP parameter:
1. Turn ON Windows Auto-Tuning from a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE): right-click CMD
shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter:
- Windows XP/Vista/7/7 SP1 users:
NETSH.EXE interface tcp set global autotuning=normal
- Windows 8/8.1/10/11 users:
NETSH.EXE interface tcp set global autotuninglevel=normal
2. View your TCP/IP connection status parameters from a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE):
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter:
NETSH.EXE interface tcp show global
Should be set to normal (Windows NTx default):
Receive Window Auto-Tuning Level    : normal

* Turn OFF Internet Explorer (IE) 9/10/11 "Automatic (Forced) Upgrade" + turn ON "Block Tracking" (disable Geolocation
Detection):
http://unlockforus.blogspot.com/2012/09/do-not-allow-websites-to-get-your.html
http://support.microsoft.com/help/2843950/
http://www.eightforums.com/tutorials/7996-internet-explorer-10-auto-update-enable-disable.html
http://www.itninja.com/question/ie10-turn-off-auto-updates/
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Geolocation]
"BlockAllWebsites"=dword:1
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main]
"EnableAutoUpgrade"=dword:0
[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main]
"EnableAutoUpgrade"=dword:0
[HKEY_USERS\.DEFAULT\Software\Microsoft\Internet Explorer\Main]
"EnableAutoUpgrade"=dword:0
;
------End cut & paste here------

* Turn OFF Internet Explorer (IE) obsolete/useless Security Check:
http://www.windows-security.org/65c2e8edd3108cdb6fc985493bb2fa38/turn-off-the-security-settings-check-feature/
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Security]
"DisableSecuritySettingsCheck"=dword:1
[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Security]
"DisableSecuritySettingsCheck"=dword:1
;
------End cut & paste here------

* FIX: Turn OFF Open File Security Warning, turn ON parallel downloading of multiple files in all web browsers, turn OFF
Chromium/Chrome web browsers download restrictions & annoying prompt(s) for downloaded files location + FIX Chromium/Chrome
web browsers "Failed - virus scan failed" file download error messages:
http://support.microsoft.com/help/883260/
http://www.thewindowsclub.com/disable-open-file-security-warning-for-file/
http://www.sevenforums.com/tutorials/124367-open-file-security-warning-unblock-file.html
http://www.sevenforums.com/tutorials/182353-open-file-security-warning-enable-disable.html
http://www.sevenforums.com/tutorials/124427-open-file-security-warning-allow-prevent-unblock-file.html
http://www.itechfever.com/fix-google-chrome-virus-scan-failed-error/
http://www.guidingtech.com/top-ways-to-fix-virus-scan-failed-error-in-google-chrome/
http://www.wisecleaner.com/think-tank/266-How-to-enable-the-parallel-downloading-function-of-Google-Chrome.html
http://stackoverflow.com/questions/38511515/
http://technoresult.com/download-faster-google-chrome-using-parallel-downloading/
http://admx.help/?Category=Chrome&Policy=Google.Policies.Chrome::DownloadDirectory
Start -> Control Panel (CP) or Run... [hold WinKey + press R] -> type:
control.exe
-> press Enter -> Internet (Explorer) Properties (Options) [inetcpl.cpl] -> Security tab -> Custom level button -> scroll
down to Launching applications and unsafe files -> check Enable (not secure) box -> OK/Apply -> Yes.
CAUTION:
Make sure to scan for malware/spyware ALL files downloaded from the internet!
http://www.mdgx.com/vir.htm
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Attachments]
"ScanWithAntiVirus"=dword:1
"SaveZoneInformation"=dword:1
"HideZoneInfoOnProperties"=dword:0
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Attachments]
"ScanWithAntiVirus"=dword:1
"SaveZoneInformation"=dword:1
"HideZoneInfoOnProperties"=dword:0
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Attachments]
"ScanWithAntiVirus"=dword:1
"SaveZoneInformation"=dword:1
"HideZoneInfoOnProperties"=dword:0
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings]
"MaxConnectionsPer1_0Server"=dword:20
"MaxConnectionsPerServer"=dword:20
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"MaxConnectionsPer1_0Server"=dword:20
"MaxConnectionsPerServer"=dword:20
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"MaxConnectionsPer1_0Server"=dword:20
"MaxConnectionsPerServer"=dword:20
[HKEY_LOCAL_MACHINE\Software\Policies\Google\Chrome]
"DownloadRestrictions"=dword:0
"PromptForDownloadLocation"=dword:0
[HKEY_LOCAL_MACHINE\Software\Policies\Google\Chrome\Recommended]
"DownloadRestrictions"=dword:0
"PromptForDownloadLocation"=dword:0
[HKEY_CURRENT_USER\Software\Policies\Google\Chrome]
"DownloadRestrictions"=dword:0
"PromptForDownloadLocation"=dword:0
[HKEY_CURRENT_USER\Software\Policies\Google\Chrome\Recommended]
"DownloadRestrictions"=dword:0
"PromptForDownloadLocation"=dword:0
[HKEY_USERS\.DEFAULT\Software\Policies\Google\Chrome]
"DownloadRestrictions"=dword:0
"PromptForDownloadLocation"=dword:0
[HKEY_USERS\.DEFAULT\Software\Policies\Google\Chrome\Recommended]
"DownloadRestrictions"=dword:0
"PromptForDownloadLocation"=dword:0
;
------End cut & paste here------

* Turn ON Chromium/Chrome (or alternative/derivative/fork/variant), Firefox (or alternative/derivative/fork/variant), Opera
(or alternative/derivative/fork/variant), or your favorite/preferate web browser
http://www.mdgx.com/nettoys.htm#NET
as Default Browser [to replace built-in/default/forced/preset Edge or Internet Explorer (IE)] for file extensions (.dhtml,
.htm, .html, .php, .xhtml, .xml, etc), internet schemes/protocols (ftp:, http:, https:, magnet:, mailto:, etc)
http://www.w3.org/wiki/UriSchemes
+ URL/URI links/shortcuts (.url, .website) in Windows 7/newer:
http://www.winhelponline.com/blog/open-url-shortcuts-different-browsers-right-click-menu/
http://answers.microsoft.com/en-us/windows/forum/windows_10-networking-winpc/how-do-i-get-url-files-to-open-in-chrome-not-ie/8e766fa8-eb8d-43a3-9945-3c43f5edf1fb/
http://support.google.com/chrome/a/answer/7009292/
Chromium/Chrome web browsers need .URL Handler extension:
http://chrome.google.com/webstore/detail/url-handler/nhmccpjmdhejpfhafcfajkgifkmjhkgf/
For example I use winPenPack X-Chromium (X-Launcher) Portable which installs Chromium web browser [free, open source]:
http://www.winpenpack.com/en/download.php?view.1082
Download:
http://sourceforge.net/projects/winpenpack/files/X-Chromium/releases/
In the examples below "winPenPack X-Chromium Launcher" [installed on my computer in C:\PORT\CHROME\X-Chromium.exe] becomes
default web browser for all these file extensions, internet schemes/protocols + URL/URI links/shortcuts:
http://superuser.com/questions/1205914/
File extensions:
.htm
.html
.shtm
.shtml
.url
.xht
.xhtm
.xhtml
Protocols:
http
https
mailto
Shortcuts:
.url
.website
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
; Used "winPenPack X-Chromium Launcher" [installed in C:\PORT\CHROME\X-Chromium.exe] in this example:
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ChromeHTML]
@="winPenPack X-Chromium Launcher"
"AppUserModelID"="winPenPack.X-ChromiumLauncher.Default"
"EditFlags"=dword:1
"FriendlyTypeName"="winPenPack X-Chromium Launcher"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ChromeHTML\Application]
"AppUserModelId"="winPenPack.X-ChromiumLauncher.Default"
"ApplicationName"="winPenPack X-Chromium Launcher"
"ApplicationDescription"="X-Chromium Portable Chromium Web Browser"
"ApplicationCompany"="winPenPack"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ChromeHTML\shell]
@="Open"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ChromeHTML\shell\open\command]
@="\"C:\\PORT\\CHROME\\X-Chromium.exe\" \"%1\""
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.URL]
@="urlfile"
"EditFlags"=dword:1
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.URL\shell]
@="Open"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.URL\shell\open\command]
@="\"C:\\PORT\\CHROME\\X-Chromium.exe\" \"%1\""
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\urlfile]
@="URL File"
"EditFlags"=dword:1
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\urlfile\shell]
@="Open"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\urlfile\shell\open\command]
@="\"C:\\PORT\\CHROME\\X-Chromium.exe\" \"%1\""
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\InternetShortcut]
@="InternetShortcut"
"NeverShowExt"=""
"EditFlags"=dword:1
"IsShortcut"=""
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\InternetShortcut\shell]
@="Open"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\InternetShortcut\shell\open\command]
@="\"C:\\PORT\\CHROME\\X-Chromium.exe\" \"%1\""
[HKEY_LOCAL_MACHINE\SOFTWARE\RegisteredApplications]
"winPenPack X-Chromium Launcher"="Software\\Clients\\StartMenuInternet\\winPenPack X-Chromium Launcher\\Capabilities"
[HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\winPenPack X-Chromium Launcher]
@="winPenPack X-Chromium Launcher"
[HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\winPenPack X-Chromium Launcher\Capabilities]
"ApplicationName"="winPenPack X-Chromium Launcher"
"ApplicationDescription"="Chromium is a fast web browser for Windows."
[HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\winPenPack X-Chromium Launcher\Capabilities\FileAssociations]
".htm"="ChromeHTML"
".html"="ChromeHTML"
".shtm"="ChromeHTML"
".shtml"="ChromeHTML"
".url"="ChromeHTML"
".website"="XChromium.exe_.website"
".xht"="ChromeHTML"
".xhtm"="ChromeHTML"
".xhtml"="ChromeHTML"
[HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\winPenPack X-Chromium Launcher\Capabilities\Startmenu]
"StartMenuInternet"="winPenPack X-Chromium Launcher"
[HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\winPenPack X-Chromium Launcher\Capabilities\URLAssociations]
"http"="ChromeHTML"
"https"="ChromeHTML"
"mailto"="ChromeHTML"
[HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\winPenPack X-Chromium Launcher\shell\open\command]
@="\"C:\\PORT\\CHROME\\X-Chromium.exe\" \"%1\""
;
------End cut & paste here------
Use a Visual Basic Script (VBScript) file (.vbs) to set your default web browser (X-Chromium in this example):
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text VBScript (.vbs) file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the VBS extension (.vbs) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to execute/run it.
-----Begin cut & paste here-----
Set WshShell=WScript.CreateObject("WScript.Shell")
' Set Default Web Browser in Windows Vista/newer:
WshShell.Run "%windir%\SYSTEM32\CONTROL.EXE /name Microsoft.DefaultPrograms /page pageDefaultProgram\pageAdvancedSettings?pszAppName=X-Chromium"
' Give Default Programs time to load (2 seconds in this case):
WScript.Sleep 2000
WshShell.AppActivate "Set Program Associations"
WshShell.SendKeys "{TAB}"
WshShell.SendKeys " "
WshShell.SendKeys "{TAB}"
WshShell.SendKeys "{TAB}"
WScript.Sleep 800
WshShell.SendKeys " "
Msgbox "Your Default Web Browser is X-Chromium (Portable Chromium)."
WScript.Quit
------End cut & paste here------
Execute/run VBS file above from a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE): right-click CMD shortcut/CMD.EXE
-> Run as Administrator -> run this command (example using X-Chromium above + VBS file named Def_Brow_X-Chrom.vbs):
CSCRIPT.EXE //NoLogo Def_Brow_X-Chrom.vbs
-> press Enter.
CSCRIPT.EXE is located in the %WinDir%\SYSTEM32 folder [%WinDir% = usually C:\WINDOWS].
View all directories/folders listed in your system PATH from a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE):
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter:
PATH

* Turn OFF/disable automatic/behind-your-back/unattended Google Chrome Update, Chrome Default Browser takeover + Google
Update services in Windows 7/newer:
http://support.google.com/chrome/a/answer/6350036/
http://superuser.com/questions/974766/
http://eddiejackson.net/wp/?p=17266
http://admx.help/?Category=GoogleUpdate&Policy=Google.Policies.Update::Pol_DefaultUpdatePolicy
http://admx.help/?Category=GoogleUpdate&Policy=Google.Policies.Update::Pol_AutoUpdateCheckPeriod
http://www.ghacks.net/2017/05/19/how-to-block-automatic-google-chrome-updates/
http://www.itninja.com/question/how-to-disable-updates-for-latest-chrome-enterprise-version-44-0-2403-130/
http://computergarage.org/disable-auto-update-google-chrome.html
http://www.chromium.org/administrators/policy-list-3/#DefaultBrowserSettingEnabled
http://admx.help/?Category=Chrome&Policy=Google.Policies.Chrome%3A%3ADefaultBrowserSettingEnabled
http://www.tenforums.com/attachments/browsers-email/120981d1486931502t-how-stop-google-chrome-not-your-default-browser-message-modification-info.jpg
http://www.tenforums.com/tutorials/5507-choose-default-apps-windows-10-a.html#option6
See topic above to use winPenPack X-Chromium (X-Launcher) Portable (example) which installs Chromium web browser as your
default browser for file extensions, internet protocols + URL/URI shortcuts.
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Update]
"UpdateDefault"=dword:0
"AutoUpdateCheckPeriodMinutes"=dword:0
; Windows NTx 64-bit (x64) only:
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Policies\Google\Update]
"UpdateDefault"=dword:0
"AutoUpdateCheckPeriodMinutes"=dword:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\GoogleChromeElevationService]
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\GoogleChromeElevationService]
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\GoogleChromeElevationService]
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\gpupdate]
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\gpupdate]
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\gpupdate]
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\gpupdatem]
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\gpupdatem]
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\gpupdatem]
"Start"=dword:4
[HKEY_LOCAL_MACHINE\Software\Policies\Google\Chrome]
"DefaultBrowserSettingEnabled"=dword:0
[HKEY_CURRENT_USER\Software\Policies\Google\Chrome]
"DefaultBrowserSettingEnabled"=dword:0
[HKEY_USERS\.DEFAULT\Software\Policies\Google\Chrome]
"DefaultBrowserSettingEnabled"=dword:0
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Google Update"=-
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce]
"Google Update"=-
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnceEx]
"Google Update"=-
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices]
"Google Update"=-
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServicesOnce]
"Google Update"=-
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run]
"Google Update"=-
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce]
"Google Update"=-
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnceEx]
"Google Update"=-
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunServices]
"Google Update"=-
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunServicesOnce]
"Google Update"=-
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"Google Update"=-
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\RunOnce]
"Google Update"=-
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\RunOnceEx]
"Google Update"=-
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\RunServices]
"Google Update"=-
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\RunServicesOnce]
"Google Update"=-
;
------End cut & paste here------

* Determine, Configure + Tweak IPv6 in Windows 7/newer:
http://en.wikipedia.org/wiki/IPv6
http://docs.microsoft.com/troubleshoot/windows-server/networking/configure-ipv6-in-windows/
http://technet.microsoft.com/library/bb726944.aspx
http://technet.microsoft.com/library/bb726995.aspx
http://technet.microsoft.com/library/bb962076.aspx
http://serverfault.com/questions/234711/
http://www.whatsmydns.net/ipv6-to-ipv4/
MDGx "IPv6 Testing, Info + Links":
http://www.mdgx.com/ipv6.php
View all your computer/device active/current IPv6 IP addresses supplied by your network/internet provider from a DOS console
command prompt (%WinDir%\SYSTEM32\CMD.EXE): right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command ->
press Enter:
NETSH.EXE interface ipv6 show addresses
and their corresponding IPv4 IP addresses:
NETSH.EXE interface ipv4 show addresses
NetSh [NETSH.EXE] is located in the %WinDir%\SYSTEM32 folder [%WinDir% = usually C:\WINDOWS].
View all directories/folders listed in your system PATH from a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE):
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter:
PATH
NetSh:
http://www.ss64.com/nt/netsh.html
http://adamtheautomator.com/netsh/

* Lockdown Windows: Customize/Disable Network/Internet + Security Settings:
http://forums.techguy.org/threads/locking-down-windows.829647/

* Chromium/Chrome:
******************
http://www.mdgx.com/7.php#:~:text=%2A%20Chromium%2FChrome%3A
MDGx "FREE Windows 9x/NTx Web Browsers" chapter -> "Chromium + Chrome web browsers [free(ware)]" section ->
"Chromium + Chrome" topic in SOFTWARE.TXT (included):
http://www.mdgx.com/nettoys.htm#CHR
RECOMMENDED:
- Chromium Precompiled EXEcutable [Installer EXE + Portable Archives ZIP/7z] 32-bit + 64-bit for Windows XP/newer 32-bit
(x86) + 64-bit (x64):
http://chromium.woolyss.com/
Certain Chromium builds [clearly labeled] are degoogled/ungoogled/stripped of Google adware/spyware/tracking code:
http://github.com/Eloston/ungoogled-chromium/blob/master/README.md
http://ungoogled-software.github.io/ungoogled-chromium-wiki/faq
Ungoogled Chromium precompiled Binaries 32-bit + 64-bit for Windows 7/newer 32-bit (x86) + 64-bit (x64):
http://ungoogled-software.github.io/ungoogled-chromium-binaries/releases/windows/
- Brave 32-bit + 64-bit web browser for Windows 7/newer 32-bit (x86) + 64-bit (x64) based on Chromium code [fork] with
improved privacy, safety + security and optimized speed:
http://brave.com/
Brave Repository:
http://github.com/brave/brave-browser/
Download [ZIP = full, Portable]:
http://github.com/brave/brave-browser/releases/latest/
- Vivaldi 32-bit + 64-bit web browser for Windows 7/newer 32-bit (x86) + 64-bit (x64) based on Chromium code [fork] with
enhanced privacy, safety + security:
http://vivaldi.com/
Download [EXE = Installer ONLY]:
http://vivaldi.com/download/
Vivaldi Portable -> run Installer EXE -> Install standalone:
http://help.vivaldi.com/desktop/install-update/standalone-version-of-vivaldi/
Vivaldi Portable [RAR = full, Portable]:
http://www.filecatchers.com/vivaldi-browser-portable/
- X-Chromium (X-Launcher) Portable:
http://www.portablefreeware.com/?id=2169
http://www.majorgeeks.com/files/details/chromium.html
Either install Chromium precompiled stable releases 32-bit or 64-bit:
http://chromium.woolyss.com/
http://www.portablefreeware.com/?id=2169
or extract all files from portable archive [zip or 7z] + copy to the destination of your choice Chromium portable stable
releases 32-bit or 64-bit to match the Windows NTx [7/newer] operating system(s) [OS(es)]
build/edition/release/update/version + bit strength [32-bit (x86) or 64-bit (x64)] you are using.
All Chromium/Chromium alternatives/derivatives/forks/variants users must have these 3 environment variables:
GOOGLE_API_KEY=NO
GOOGLE_DEFAULT_CLIENT_ID=NO
GOOGLE_DEFAULT_CLIENT_SECRET=NO
Right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run these commands -> press Enter after each line:
SETX.EXE GOOGLE_API_KEY "NO" /M
SETX.EXE GOOGLE_DEFAULT_CLIENT_ID "NO" /M
SETX.EXE GOOGLE_DEFAULT_CLIENT_SECRET "NO" /M
MDGx "@ Chromium/Chrome/Brave/X-Chromium/Thorium/Vivaldi Privacy, Security + Safety Settings, Extensions, Guides +
Solutions:" topic in SOFTWARE.TXT (included):
http://www.mdgx.com/nettoys.htm#PRV
MDGx collection of essential Chromium/Chrome extensions + tweaks -> "CHROMIUM" section in TOOLS.TXT (included):
http://www.mdgx.com/tools.php#:~:text=CHROMIUM%20%5B%2A%5D
http://www.mdgx.com/TOOLS.TXT

* Firefox:
**********
http://www.mdgx.com/7.php#:~:text=%2A%20Firefox%3A
MDGx "Internet Power Toys: Firefox [free(ware)]" section in SOFTWARE.TXT (included):
http://www.mdgx.com/nettoys.htm#MOZ
Firefox Stable (candidate):
http://ftp.mozilla.org/pub/firefox/nightly/
Firefox Alpha 1:
http://ftp.mozilla.org/pub/firefox/nightly/latest-trunk/
Firefox Alpha 2:
http://ftp.mozilla.org/pub/firefox/nightly/latest-mozilla-aurora/
Firefox Beta:
http://ftp.mozilla.org/pub/firefox/nightly/
Firefox Portable Stable:
http://www.portableapps.com/apps/internet/firefox_portable/
Firefox Portable Beta + Nightly:
http://www.portableapps.com/apps/internet/firefox_portable/test/
Firefox Portable:
http://www.thumbapps.org/2015/05/Mozilla-Firefox-browser-portable.html
File:
http://sourceforge.net/projects/thumbapps/files/Internet/Firefox/
- Tor Browser 32-bit + 64-bit web browser for Windows 7/newer 32-bit (x86) + 64-bit (x64) based on Gecko code [fork] with
enhanced anonymity, privacy, safety + security:
http://www.torproject.org/download/languages/
Tor Browser online Manual:
http://tb-manual.torproject.org/
- Waterfox 64-bit hardware/CPU optimized + improved privacy web browser for Windows 7/newer 64-bit (x64) based on Gecko code
[fork]:
http://www.waterfox.net/
Download:
http://www.waterfox.net/download/
Waterfox FAQ:
http://www.waterfox.net/docs/faq/
- Pale Moon 32-bit + 64-bit hardware/CPU optimized web browser for Windows 7/newer 32-bit (x86) + 64-bit (x64) based on
Gecko code [fork]:
http://www.palemoon.org/
Download Portable + X-Launcher [Setup EXE or archived 7z]:
http://www.palemoon.org/download.shtml
Pale Moon FAQ + Help Forum:
http://forum.palemoon.org/viewforum.php?f=24
Pale Moon Extensions:
http://addons.palemoon.org/extensions/
- LibreWolf 64-bit web browser for Windows 7/newer 64-bit (x64) based on Gecko code [fork] with enhanced privacy, safety +
security:
http://librewolf.net/
LibreWolf Windows Installer:
http://librewolf.net/installation/windows/
LibreWolf Windows Releases:
http://gitlab.com/librewolf-community/browser/windows/-/releases/
LibreWolf FAQ:
http://librewolf.net/docs/faq/
See WINDOWS7.TXT (this file) or go to:
http://www.mdgx.com/7.php
http://www.mdgx.com/WINDOWS7.TXT
-> "Internet + Web Browsers Tweaks, Fixes + Tools" chapter
http://www.mdgx.com/7.php#:~:text=Internet%20%2B%20Web%20Browsers%20Tweaks%2C%20Fixes%20%2B%20Tools%20%5BChromium%2FChrome%2C%20Firefox
-> "* Firefox:" section for more Firefox tips, downloads + links.
http://www.mdgx.com/7.php#:~:text=%2A%20Firefox%3A
MDGx "@ Firefox/Tor Browser/Waterfox/Pale Moon/LibreWolf Privacy, Security + Safety Settings, Extensions, Guides +
Solutions:" topic in SOFTWARE.TXT (included):
http://www.mdgx.com/nettoys.htm#PSF
MDGx collection of essential Firefox/Mozilla add-ons + tweaks -> "FIREFOX" section in TOOLS.TXT (included):
http://www.mdgx.com/tools.php#:~:text=FIREFOX%20%5B%2A%5D
http://www.mdgx.com/TOOLS.TXT

* Internet Explorer (IE) web browser [discontinued from all NEWer Windows 10/2016/2019 builds/editions/releases/updates!]:
**************************************************************************************************************************
See MDGx "Internet Explorer (IE) 4/5/6/7/8/9/10/11 Essential FREE Fixes + Updates" chapter in SOFTWARE.TXT (included):
http://www.mdgx.com/ietoy.htm
R.I.P. Internet Explorer... :-)
http://www.cnn.com/2022/06/18/asia/internet-explorer-gravestone-viral-south-korea-intl-hnk/
RECOMMENDED:
************
Install an independent/3rd party free, open source, safe, secure, uncrippled, unlocked, unrestricted, modern web browser
based on Chromium code with enhanced privacy, safety + security
http://www.mdgx.com/nettoys.htm#PRV
-> see "FREE Windows 9x/NTx Web Browsers" chapter -> "Chromium + Chrome" section in SOFTWARE.TXT (included):
http://www.mdgx.com/nettoys.htm#CHR

* Replace default proprietary Internet Explorer (IE) search engine with Google [http://www.google.com/], or DuckDuckGo
[http://duckduckgo.com/], or Brave [http://search.brave.com/], or Startpage [http://www.startpage.com/], or SearXNG
[http://searx.be/], or Qwant [http://www.qwant.com/] (examples) + make it the default:
http://www.itstillworks.com/change-bing-google-12283088.html
http://smallbusiness.chron.com/change-bing-google-70809.html
http://www.howtogeek.com/709072/
http://www.howtogeek.com/710128/
Run Control Panel (control.exe) -> Internet (Explorer) Options (Properties) (inetcpl.cpl) -> Programs tab -> Manage Add-ons
button -> highlight Search Providers left side item -> Find more search providers link (URL):
http://www.iegallery.com/
which redirects to [obsolete!]:
http://www.microsoft.com/iegallery/
-> new Internet Explorer (IE) browser window opens -> Add (click) link below Google logo -> back to Programs tab -> Manage
Add-ons window -> highlight Search Providers left side item -> highlight Google right side item -> Set default button ->
highlight all other right side items except Google (if any) 1 at a time -> Remove button for each one -> confirm deletion of
each item -> check Prevent programs from suggesting changes to my default search provider box -> Close button.
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
; Google Search [http://www.google.com/] used in this example:
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main]
"Default_Search_URL"="http://www.google.com/"
"Default_Page_URL"="http://www.google.com/"
"Start Page"="http://www.google.com/"
"Search Page"="http://www.google.com/"
"First Home Page"="http://www.google.com/"
[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main]
"Default_Search_URL"="http://www.google.com/"
"Default_Page_URL"="http://www.google.com/"
"Start Page"="http://www.google.com/"
"Search Page"="http://www.google.com/"
"First Home Page"="http://www.google.com/"
[HKEY_USERS\.DEFAULT\Software\Microsoft\Internet Explorer\Main]
"Default_Search_URL"="http://www.google.com/"
"Default_Page_URL"="http://www.google.com/"
"Start Page"="http://www.google.com/"
"Search Page"="http://www.google.com/"
"First Home Page"="http://www.google.com/"
;
------End cut & paste here------
More info:
All these MDGx topics:
- "@ Google search, (geo)location tracking, data, history, e-mail (Gmail), notifications + apps:"
- "@ Bing Search Engine, Live, Microsoft, MSN + Related/Shared Accounts, Services + Apps:"
- "@ Yahoo! (Y!) Search Engine, Yahoo! Mail + Yahoo! News:"
- "@ DuckDuckGo (DDG) Search Engine, Privacy Essentials + E-mail Protection:"
- "@ Startpage Search Engine + Privacy Protection Add-on + Extension:"
- "@ Brave Search Engine:"
from the "Digital + Internet/Online Privacy, Security + Safety" chapter in WINDOWS7.TXT (this file):
http://www.mdgx.com/7.php#:~:text=Digital%20%2B%20Internet%2FOnline%20Privacy%2C%20Security%20%2B%20Safety%20%3D%20Your%20Top%20Priority
MDGx "WWW (World Wide Web) Search Engines" [most have enhanced privacy, safety + security]:
http://www.mdgx.com/links.htm#WSE

* Flash [discontinued!]:
http://www.mdgx.com/nettoys.htm#SHFL
=> Flash STAND ALONE:
http://www.adobe.com/support/flashplayer/debug_downloads.html
http://labs.adobe.com/downloads/flashplayer.html
MUST UNcheck ALL McAfee/Symantec boxes B4 installing Flash !!!
Flash Player STAND ALONE:
http://fpdownload.macromedia.com/pub/flashplayer/updaters/30/flashplayer_30_sa.exe
Flash Player DEBUG STAND ALONE:
http://fpdownload.macromedia.com/pub/flashplayer/updaters/30/flashplayer_30_sa_debug.exe
Flash PepperFlash (PPAPI) for Chromium/Chrome STAND ALONE:
http://fpdownload.macromedia.com/pub/labs/flashruntimes/flashplayer/install_flash_player_ppapi.exe
Flash PepperFlash (PPAPI) for Chromium/Chrome STAND ALONE PORTABLE:
http://sourceforge.net/projects/thumbapps/files/Utilities/Adobe%20Flash%20Player/
http://effect8.ru/soft/media/adobe-flash-player-portable.html
Flash Netscape Plug-in (NPAPI) for Firefox STAND ALONE:
http://fpdownload.macromedia.com/pub/labs/flashruntimes/flashplayer/install_flash_player.exe
Flash ActiveX (AX) for Internet Explorer (IE) STAND ALONE:
http://fpdownload.macromedia.com/pub/labs/flashruntimes/flashplayer/install_flash_player_ax.exe
=> Flash SETUP ONLY:
http://get.adobe.com/flashplayer/
http://get.adobe.com/flashplayer/update/ppapi/
http://get.adobe.com/flashplayer/update/plugin/
http://get.adobe.com/flashplayer/otherversions/
MUST UNcheck ALL McAfee/Symantec boxes B4 installing Flash !!!
Flash PepperFlash (PPAPI) for Chromium/Chrome SETUP ONLY:
http://get.adobe.com/flashplayer/?fpchrome
http://admdownload.adobe.com/bin/live/flashplayer30pp_xa_install.exe
Flash Netscape Plug-in (NPAPI) for Firefox SETUP ONLY:
http://admdownload.adobe.com/bin/live/flashplayer30_xa_install.exe
Flash ActiveX (AX) for Internet Explorer (IE) SETUP ONLY:
http://admdownload.adobe.com/bin/live/flashplayer30ax_xa_install.exe
Internet Explorer 11.0 (IE11) Flash ActiveX (AX) 32-bit + 64-bit for Windows 8/8.1 32-bit + 64-bit:
http://helpx.adobe.com/flash-player/kb/flash-player-issues-windows-8.html
http://support.microsoft.com/help/4048951/
- IE11 Flash ActiveX (AX) 32-bit:
http://go.microsoft.com/fwlink/?linkid=328650
- IE11 Flash ActiveX (AX) 64-bit:
http://go.microsoft.com/fwlink/?linkid=328651
=> OLD Flash:
http://helpx.adobe.com/flash-player/kb/archived-flash-player-versions.html
http://www.filehippo.com/download_flashplayer/
http://www.oldapps.com/flash_player.php
Flash PepperFlash (PPAPI) for Chromium/Chrome Online Settings:
http://www.macromedia.com/support/documentation/en/flashplayer/help/settings_manager02.html
Chromium/Chrome Flash Help:
http://support.google.com/chrome/answer/6258784/
Use Flash with Chromium/Chrome:
http://helpx.adobe.com/flash-player/kb/flash-player-chromium.html
Install Flash Player Help:
http://helpx.adobe.com/flash-player.html

* Flash Player Stand Alone [discontinued!]:
Before installing OLDer Flash Player -> uninstall Flash Player (if any) -> restart/reboot.
Uninstall Flash Plug-in + ActiveX Control for Internet Explorer (IE):
http://www.adobe.com/?id=tn_14157
http://web.archive.org/web/20070503030542/http://www.adobe.com/cfusion/knowledgebase/index.cfm?id=tn_14157
If Flash Player for Internet Explorer (IE) installed -> you canNOT install OLDer versions.
Install OLDer Flash Player for Internet Explorer (IE):
http://helpx.adobe.com/flash-player/kb/install-earlier-flash-player-version.html
Flash Players 11.2.202.235 32-bit for Windows XP/2003/Vista/2008/7:
- Standalone: flashplayer11_2r202_235_win_sa_32bit.exe
- Internet Explorer: flashplayer11_2r202_235_winax_32bit.exe
- Internet Explorer: flashplayer11_2r202_235_winax_32bit.msi
- Netscape: flashplayer11_2r202_235_win_32bit.exe
- Netscape: flashplayer11_2r202_235_win_32bit.msi
- Uninstaller: uninstall_flashplayer11_2r202_235_win_32bit.exe
Flash Players 11.2.202.235 64-bit for Windows XP/2003/Vista/2008/7:
- Internet Explorer: flashplayer11_2r202_235_winax_64bit.exe
- Internet Explorer: flashplayer11_2r202_235_winax_64bit.msi
- Netscape: flashplayer11_2r202_235_win_64bit.exe
- Netscape: flashplayer11_2r202_235_win_64bit.msi
- Uninstaller: uninstall_flashplayer11_2r202_235_win_64bit.exe

* Flash Players + Savers/Downloaders [discontinued!]:
http://www.mdgx.com/nettoys.htm#FPSD
SWF Guide + Tools:
http://www.lifewire.com/swf-file-4138363/
SWF Tools: EXE to SWF Extractor:
http://swftools.sourceforge.net/exe-to-swf.html
File:
http://sourceforge.net/projects/swftools/files/eXe_To_SwF/eXeToSwF_Latest.zip
SWF Tools: SWF to EXE Converter:
http://swftools.sourceforge.net/swf-to-exe.html
File:
http://sourceforge.net/projects/swftools/files/SwF_To_eXe/Swf2eXe_Latest.zip
SWF Tools include Flash Player Projector Standalone 11.4.402.278 32-bit.
SWF -> EXE = Flash Player Projector Standalone 11.2.202.235 32-bit:
http://junebeetle.github.io/converter/executables/
File:
http://fpdownload.macromedia.com/get/flashplayer/installers/archive/fp_11.2.202.235_archive.zip
EXE -> SWF:
http://www.northcode.com/blog/Extract-SWF-files-from-Flash-Executables/
File:
http://www.northcode.com/free/exe2swf/exe2swf.exe
FLV Extract GUI (FLVExtract.exe) + command line (FLVExtractCL.exe) 32-bit tools:
http://www.moitah.net/
File:
http://www.moitah.net/download/latest/FLV_Extract.zip
SWFTools command line conversion, extraction + management SWF tools:
http://www.swftools.org/download.html

* Shockwave [discontinued!]:
http://www.mdgx.com/nettoys.htm#SHFL
http://www.adobe.com/shockwave/download/alternates/
Shockwave SLIM:
http://fpdownload.macromedia.com/get/shockwave/default/english/win95nt/latest/Shockwave_Installer_Slim.exe
Shockwave FULL [+ SHAREWARE/DEMOS!]:
http://fpdownload.macromedia.com/get/shockwave/default/english/win95nt/latest/Shockwave_Installer_Full.exe
Shockwave FULL for Internet Explorer (IE):
http://fpdownload.macromedia.com/get/shockwave/default/english/win95nt/latest/sw_lic_full_installer.msi
OLD Shockwave:
http://www.filehippo.com/download_shockwave/
http://www.oldapps.com/shockwave.php

* Silverlight [discontinued!]:
http://www.mdgx.com/nettoys.htm#SVL

* CleanIETempFiles (CleanIETempFiles.exe) 32-bit command line tool deletes Internet Explorer (IE) 7/newer Cookies, History +
Temporary Internet Files (TIF):
http://blogs.msmvps.com/danielmartin/2011/03/11/191-c-243-mo-automatizar-la-eliminaci-243-n-de-temporales-de-internet-explorer/
File:
http://www.mdgx.com/files/CITF.ZIP
Executable [only]:
http://raw.githubusercontent.com/gliheng/Blackhole/master/data/bin/CleanIETempFiles.exe
Syntax:
-q   runs silent (Quiet)
-c   deletes Cookies (C)
-h   deletes browsing History (H)
-t   deletes Temporary Internet Files (TIF)
Command line (example):
CleanIETempFiles.exe -c -h -t -q
or:
CITF.EXE -c -h -t -q

* IEWebGL Plug-in for Internet Explorer (IE) 6/7/8/9/10:
http://github.com/iewebgl/iewebgl/
File:
http://raw.githubusercontent.com/iewebgl/iewebgl/master/WebSite2.0/Releases/iewebgl.exe
http://github.com/iewebgl/iewebgl/blob/master/WebSite2.0/Releases/iewebgl.exe?raw=true
http://github.com/iewebgl/iewebgl/blob/master/WebSite2.0/Releases/iewebgl.cab?raw=true
http://github.com/iewebgl/iewebgl/archive/master.zip
NOTE:
Internet Explorer (IE) 11 has WebGL code built-in and does NOT need IEWebGL!

* Best Free Wi-Fi Network Tools:
http://www.techsupportalert.com/best-free-wi-fi-network-finder-utility.htm

* NetworkInterfacesView 32-bit + 64-bit:
http://www.nirsoft.net/utils/network_interfaces.html
- NetworkInterfacesView 32-bit:
http://www.nirsoft.net/utils/networkinterfacesview.zip
- NetworkInterfacesView 64-bit:
http://www.nirsoft.net/utils/networkinterfacesview-x64.zip

* inSSIDer Wi-Fi network stats, benchmark, signal strength + security audit tool:
http://www.techspot.com/downloads/5936-inssider.html
File:
http://files01.tchspt.com/temp/inSSIDer-installer.msi

* NetSurveyor Wi-Fi 802.11 network stats, optimization + monitoring tool:
http://www.nutsaboutnets.com/netsurveyor-wifi-scanner/
File:
http://nutsaboutnets-downloads.s3.amazonaws.com/NetSurveyor-Setup.exe

* Wireless Network Watcher (WNetWatcher) 32-bit detects all network/internet connected devices:
http://www.nirsoft.net/utils/wireless_network_watcher.html
File:
http://www.nirsoft.net/utils/wnetwatcher.zip
Improve Your Wireless Network Performance Guide:
http://www.majorgeeks.com/content/page/how_to_improve_your_wireless_network_performance.html
______________________________________________________________________________



Digital + Internet/Online Privacy, Security + Safety = Your Top Priority
http://www.mdgx.com/7.php#:~:text=Digital%20%2B%20Internet%2FOnline%20Privacy%2C%20Security%20%2B%20Safety%20%3D%20Your%20Top%20Priority



* KNOW YOUR RIGHTS + PROTECT YOURSELF/YOURSELVES = Basic education for all netizens/cybercitizens in the digital age:
*********************************************************************************************************************
General Information + Guidance...

@ For everybody no matter where you live:
*****************************************
- Digital Privacy:
http://en.wikipedia.org/wiki/Digital_privacy
- Personal Identifiable Information (Data):
http://en.wikipedia.org/wiki/Personal_data
- Internet Privacy:
http://en.wikipedia.org/wiki/Internet_privacy
- Privacy Laws:
http://en.wikipedia.org/wiki/Privacy_law
- Information privacy laws:
http://en.wikipedia.org/wiki/Information_privacy_law
- Net Neutrality:
http://en.wikipedia.org/wiki/Net_neutrality
- Search Engine Privacy:
http://en.wikipedia.org/wiki/Search_engine_privacy
- Privacy focused Search Engines + Web Browsers:
http://en.wikipedia.org/wiki/Internet_privacy#Privacy_focused_search_engines/browsers
- Privacy concerns with social networking services (social media):
http://en.wikipedia.org/wiki/Privacy_concerns_with_social_networking_services
- Recognize, Avoid + Protect against Internet/Online/E-mail Fraud, Phishing, Scams:
http://www.avast.com/c-scam/
http://www.fortinet.com/resources/cyberglossary/internet-fraud/
http://www.cisa.gov/uscert/sites/default/files/publications/emailscams_0905.pdf
http://www.safewise.com/blog/internet-safety-avoid-online-scams/
http://electronics.howstuffworks.com/how-to-tech/how-to-detect-online-scams.htm

@ For all who live in the United States of America (U.S.A.) states + territories:
*********************************************************************************
- Personal Identifiable Information (Data) in the United States:
http://en.wikipedia.org/wiki/Personal_data#United_States
- Internet Privacy in the United States:
http://en.wikipedia.org/wiki/Internet_privacy#Internet_privacy_in_the_United_States
- Privacy Laws in the United States:
http://en.wikipedia.org/wiki/Privacy_laws_of_the_United_States
- Information privacy laws in the United States:
http://en.wikipedia.org/wiki/Information_privacy_law#United_States
- Net Neutrality in the United States:
http://en.wikipedia.org/wiki/Net_neutrality_in_the_United_States
http://www.mdgx.com/4net.htm
- Internet privacy laws: how your personal information is protected online:
http://legal.thomsonreuters.com/en/insights/articles/how-your-personal-information-is-protected-online/
- American Data and Privacy Protection Act (ADPPA) [future law]:
http://arstechnica.com/tech-policy/2022/08/data-privacy-bill-would-give-you-more-control-over-info-collected-about-you/

@ For all who live in the European Union (E.U.) countries, sovereignties + territories:
***************************************************************************************
- Personal Identifiable Information (Data) in the European Union:
http://en.wikipedia.org/wiki/Personal_data#European_Union
- Internet Privacy in the European Union:
http://en.wikipedia.org/wiki/Internet_privacy#European_General_Data_protection_regulation
- Privacy Laws in the European Union:
http://en.wikipedia.org/wiki/Privacy_law#European_Union_(EU)
- Information privacy laws in the European Union:
http://en.wikipedia.org/wiki/Information_privacy_law#Europe
- Net Neutrality in the European Union:
http://en.wikipedia.org/wiki/Net_neutrality_in_the_European_Union
- Data protection + online privacy:
http://europa.eu/youreurope/citizens/consumers/internet-telecoms/data-protection-online-privacy/index_en.htm
- Data protection laws + rules:
http://ec.europa.eu/info/law/law-topic/data-protection/eu-data-protection-rules_en/
http://ec.europa.eu/info/law/law-topic/data-protection_en/
- Privacy Flag Overview:
http://privacyflag.eu/
- General Data Protection Regulation (GDPR):
http://en.wikipedia.org/wiki/General_Data_Protection_Regulation
http://gdpr-info.eu/

* E-mail, Accounts, Internet, Online Passwords:
***********************************************
Find out if your internet/online accounts, blogs, forums, social media, alerts, apps, e-mails, enrollments, memberships,
subscriptions, etc passwords/passcodes/PIN/secure numbers/words have been breached/hacked/leaked, learn how to create
better/stronger ones + how to encrypt your e-mails:
http://www.geckoandfly.com/32570/
- Have My E-mail(s) Been Pwned?:
http://haveibeenpwned.com/
- Have My Password(s) Been Pwned?:
http://haveibeenpwned.com/Passwords/
- LeakedSource = scan your e-mail(s) for breach(es):
http://www.leakedsource.com/
- Data Breach Check:
http://whatismyipaddress.com/breach-check/
- Avast Hack Check = scan your e-mail(s) password(s) for leak(s):
http://www.avast.com/hackcheck/
- Has your password leaked?:
http://cybernews.com/password-leak-check/
- Strong [hard to crack] Passwords Guide:
http://www.howtogeek.com/195430/
- Detect, Recognize and Avoid E-mail Phishing Scams:
http://consumer.ftc.gov/articles/how-recognize-and-avoid-phishing-scams/
http://www.cisa.gov/uscert/security-publications/recognizing-and-avoiding-email-scams/
http://www.itgovernance.co.uk/blog/5-ways-to-detect-a-phishing-email/
- Why You Should Be Careful Clicking The Unsubscribe Button:
http://www.skipser.com/p/2/p/careful-while-unsubscribing-from-mailing-lists.html
- Best Free Ways to Send Encrypted E-mail + Secure Messages:
http://www.howtogeek.com/135638/
- Best Free Secure (Encrypted) E-mail Account Providers:
http://www.guru99.com/secure-email-service-provider.html
- Encrypt E-mail Messages in Gmail, Yahoo, Outlook, iCloud + Your Device(s):
http://clean.email/blog/email-security/how-to-encrypt-email/
http://cybernews.com/secure-email-providers/how-to-encrypt-email/
http://www.cloudwards.net/how-to-encrypt-your-emails/
- Keep Social Media Passwords Secure:
http://terranovasecurity.com/how-to-create-a-strong-password-in-7-easy-steps/
- Windows, Windows Software + Online/Internet Password Recovery Tools [free(ware)]:
http://www.nirsoft.net/password_recovery_tools.html

* Malware, Virus + Spyware Scanning, Detection + Removal Info, Guides + Free(ware) Tools + FireWalls:
*****************************************************************************************************
- Wikipedia: Malware:
http://en.wikipedia.org/wiki/Malware
- Wikipedia: Spyware Removal:
http://en.wikipedia.org/wiki/Category:Spyware_removal
- Wikipedia: Anti-Virus Software:
http://en.wikipedia.org/wiki/Antivirus_software
- MDGx "Get Anti-Viral: Protect Yourself!" tools, guides + links:
http://www.mdgx.com/vir.htm
- MDGx "Get Anti-Viral = Protect Yourself !" -> "Free Online Malware + Spyware Scanners" section:
http://www.mdgx.com/vir.htm#SS
- MDGx "Get Anti-Viral = Protect Yourself !" -> "Free(ware) Anti-Virus Tools, Info + Links" section:
http://www.mdgx.com/vir.htm#TL
- MDGx "Get Anti-Viral = Protect Yourself !" -> "Free(ware) Anti-Virus Software for Windows NTx" section:
http://www.mdgx.com/vir.htm#AVS
- MDGx "Get Anti-Viral = Protect Yourself !" -> "Free(ware) Virus, Trojan, Worm, Rootkit + Malware Removal Tools" section:
http://www.mdgx.com/vir.htm#RMV
- MDGx "Free Online Privacy, Safety + Security Scanners":
http://www.mdgx.com/safety.htm
- STAY SAFE = Scan for viruses *all* files downloaded from the internet!:
http://www.mdgx.com/vir.htm#SS
- MDGx Beware of "False Positives" in FALSPOSI.TXT (included):
http://www.mdgx.com/fp.php
http://www.mdgx.com/FALSPOSI.TXT
- Wikipedia: FireWalls:
http://en.wikipedia.org/wiki/Firewall_(computing)
- Best free(ware) FireWalls for Windows NTx:
http://www.softwaretestinghelp.com/best-free-firewall/
http://www.lifewire.com/free-firewall-programs-4129270/
http://www.makeuseof.com/tag/free-firewalls-windows-compared/
- MDGx "FIREWALL" section in TOOLS.TXT (included):
http://www.mdgx.com/tools.php
http://www.mdgx.com/TOOLS.TXT
- MDGx "Free(ware) Windows 9x/NTx Firewalls, Anti-Spyware + Internet Monitors" chapter -> "Free(ware) Windows 9x/NTx
Anti-Spyware" section in SOFTWARE.TXT (included):
http://www.mdgx.com/fw.htm#ASP
- MDGx "Free(ware) Windows 9x/NTx Firewalls, Anti-Spyware + Internet Monitors" chapter -> "Free(ware) Windows 9x/NTx
Firewalls" section in SOFTWARE.TXT (included):
http://www.mdgx.com/fw.htm#FWL
- MDGx "HOSTS Files, Guides + Tools":
http://www.mdgx.com/hosts.php
Example of HOSTS file -> 10_BLOCK.TXT (included) -> "HOSTS" chapter [last 1 at the bottom]:
http://www.mdgx.com/10BLK/10_BLOCK.php#TXT

* Everything about HTTP/web/internet/browser Cookies:
*****************************************************
http://www.mdgx.com/7.php#:~:text=%2A%20Everything%20about%20HTTP%2Fweb%2Finternet%2Fbrowser%20Cookies%3A
- Privacy Policies: Browser Cookies: The Ultimate Guide:
http://www.privacypolicies.com/blog/browser-cookies-guide/
- HTML.com: Are You Using Cookies? Then This Ultimate Guide Is For You:
http://html.com/resources/cookies-ultimate-guide/
- Cookie Central: What are cookies?:
http://www.cookiecentral.com/cm002.htm
- Cookie Central: The Unofficial Cookie FAQ:
http://www.cookiecentral.com/faq/
- Cookie Script: All You Need to Know About Third-Party Cookies:
http://cookie-script.com/all-you-need-to-know-about-third-party-cookies.html
- VOX: Why every website wants you to accept its cookies:
http://www.vox.com/recode/2019/12/10/18656519/
- Medium: Cookies Visualized: Everything you ever need to know about Web Cookies:
http://medium.com/from-the-scratch/cookies-visualized-c5f3b403dc65/
- FTC: Internet Cookies:
http://www.ftc.gov/policy-notices/privacy-policy/internet-cookies/
- How-To Geek: Block Third Party Cookies in Every Web Browser:
http://www.howtogeek.com/241006/
- Google Chromium/Chrome: Clear, enable + manage cookies in Chromium/Chrome:
http://support.google.com/chrome/answer/95647/
- Mozilla: Cookies - Information that websites store on your computer:
http://support.mozilla.org/kb/cookies-information-websites-store-on-your-computer/
- Cookie Information: detect cookies in your web browser(s):
http://browserspy.dk/cookie.php
- Cookie Law Info: Best free cookie checkers for websites:
http://www.cookielawinfo.com/free-cookie-checker-for-websites/
- CatOnMat: Batch files + command line tools to delete Cookies, Cache + History in all major web browsers:
http://www.catonmat.net/clear-privacy-ie-firefox-opera-chrome-safari/
- Wikipedia: HTTP cookie:
http://en.wikipedia.org/wiki/HTTP_cookie

STRONGLY RECOMMENDED:
*********************
Enjoy your digital/internet/online live(s), protect your digital persona(s), enhance your online privacy, safety, security,
avoid/block/disable/opt OUT of/stop/turn OFF dangerous/insecure/unsafe, undesirable/unnecessary/unneeded/unused/useless,
forced/behind-your-back/hidden/intrusive/invasive/without your knowledge/permission, annoying/bloat/resources consuming
ad(vertisment)s/adware, cookies, hacking, phishing, viruses, malware, spyware, (geo)tracking, diagnostic tracking, telemetry
("phone home"), data collection/logging, customer "experience", unwanted "offers", "promotions", "reminders", "suggestions",
"trials", "updates", widgets in your Operating System(s) [OSes], e-mail, web browser(s) + online apps, chat rooms, (social)
media, forums, (web) sites, software, tools, games, enrollments, feeds, memberships, notifications, services, subscriptions,
etc.
Here are a few things you can do effortlessly in a nick of time, and they're all free... ;-/

* Web Browsers + Devices Online Protection Guides + Tools for Privacy, Security, Tracking:
******************************************************************************************
- BrowserLeaks: Test Your Web Browser(s) for fingerprinting, geo(location), tracking, spoofing, leaks, auditing, scripting:
http://browserleaks.com/
- BrowserLeaks: Social Media Login Detection:
http://browserleaks.com/social/
- The Markup: Browsers, Extensions/Add-ons, Cookies, Tracking:
http://themarkup.org/ask-the-markup/2020/09/22/i-scanned-the-websites-i-visit-with-blacklight-and-its-horrifying-now-what/
- The Markup: High Privacy Cost of "Free" Websites:
http://themarkup.org/blacklight/2020/09/22/blacklight-tracking-advertisers-digital-privacy-sensitive-websites/
- Cover Your Tracks (CYT): Browsers, Trackers, Cookies, Fingerprinting:
http://coveryourtracks.eff.org/learn
- Cover Your Tracks (CYT): Test Your Web Browser -> "test your browser":
http://coveryourtracks.eff.org/
- Make Tech Easier: Social Logins:
http://www.maketecheasier.com/are-social-logins-secure-private/
- Make Tech Easier: Strong Passwords:
http://www.maketecheasier.com/create-strong-password/
- Privacy Guides: Knowledge Base:
http://www.privacyguides.org/basics/
- Privacy Flag: Privacy Guide:
http://privacyflag.eu/pf-tools/privacy-guide/
- ProPrivacy: The Ultimate Online Privacy Guide:
http://proprivacy.com/guides/the-ultimate-privacy-guide/
- Privacy Tools: Privacy Tools Software Alternatives and Encryption:
http://www.privacytools.io/
- Prism Break: Anti-Surveillance Hardware + Software:
http://prism-break.org/
- gHacks: The Ultimate Online Privacy Test Resource List:
http://www.ghacks.net/2015/12/28/the-ultimate-online-privacy-test-resource-list/
- Global Privacy Control (GPC): Useful Downloads:
http://globalprivacycontrol.org/#download
- Privacy Guides: Privacy Tools [free]:
http://www.privacyguides.org/tools/
- Spread Privacy: Protect your Privacy on your Devices:
http://spreadprivacy.com/tag/device-privacy-tips/
- Spread Privacy: Privacy Crash Course:
http://spreadprivacy.com/tag/privacy-newsletter/
- EFF: Set Up HTTPS by Default in Your Browser:
http://www.eff.org/https-everywhere/set-https-default-your-browser/
- EFF: Do Not Track (DNT):
http://www.eff.org/issues/do-not-track/
- Firefox + Chromium compared: (In)Security Features:
http://madaidans-insecurities.github.io/firefox-chromium.html
- Turn OFF *all* Apps, Desktop, Platform + Web Push Notifications in web browsers:
Chromium/Chrome:
http://support.google.com/chrome/answer/3220216/
Firefox:
http://support.mozilla.org/kb/push-notifications-firefox/
Safari:
http://support.apple.com/guide/safari/customize-website-notifications-sfri40734/mac/
Edge:
http://blogs.windows.com/msedgedev/2016/05/16/web-notifications-microsoft-edge/
- Startpage: How to set up your Android for Privacy:
http://www.startpage.com/privacy-please/privacy-guides/how-to-set-up-your-android-for-privacy/
- Privacy Guides: Android OS, Settings + Apps:
http://www.privacyguides.org/android/
- ComputerWorld: The ultimate guide to privacy on Android:
http://www.computerworld.com/article/3545530/
- chrizel: iOS Security and Privacy Guide:
http://github.com/chrizel/iOS-Security-and-Privacy-Guide/
- Defending Digital: Apple iOS Security And Privacy Guide (for iPhone and iPad):
http://defendingdigital.com/apple-ios-security-privacy-guide/
- Navigate the Tnternet using a VPN (Virtual Private Network):
http://cybernews.com/how-to-use-vpn/
- VPN Guide:
http://www.security.org/vpn/
- Complete Beginner's VPN Guide:
http://www.privacyaffairs.com/beginners-guide-to-vpn/
- VPNs + VPN Providers for Consumers:
http://vpnoverview.com/vpn-information/what-is-a-vpn/
- Best free VPN services:
http://www.tomsguide.com/best-picks/best-free-vpn/
- Best free VPNs:
http://www.techradar.com/vpn/best-free-vpn/
- Free Public VPN Relay Servers:
http://www.vpngate.net/
- Cloudflare WARP Desktop client 64-bit for Windows 8.1/newer 64-bit (x64) [free Virtual Private Network (VPN) using public
root Domain Name System (DNS) servers]:
http://1.1.1.1/
Cloudflare WARP for Windows:
http://developers.cloudflare.com/warp-client/get-started/windows/
Cloudflare WARP for Linux:
http://developers.cloudflare.com/warp-client/get-started/linux/
Cloudflare WARP for macOS:
http://developers.cloudflare.com/warp-client/get-started/macos/
Cloudflare WARP for Android:
http://developers.cloudflare.com/warp-client/get-started/android/
Cloudflare WARP for iOS:
http://developers.cloudflare.com/warp-client/get-started/ios/
BrowserLeaks: DNS Leak Test:
http://browserleaks.com/dns/
Wikipedia: Virtual Private Network (VPN):
http://en.wikipedia.org/wiki/Virtual_private_network
Wikipedia: Domain Name System (DNS):
http://en.wikipedia.org/wiki/Domain_Name_System
- OpenVPN Cloud, Access Server + Connect client Virtual Private Network (VPN) system provides secure point-to-point or
site-to-site concurrent connections using OpenSSL encryption + Transport Layer Security (TLS) protocol, highly customizable:
http://openvpn.net/
Free subscriptions for personal use = limited to:
OpenVPN Cloud = maximum 3 concurrent connections.
Access Server = maximum 2 concurrent connections.
Repository:
http://github.com/OpenVPN/openvpn/
OpenVPN Connect client 32-bit + 64-bit for Windows 7/newer 32-bit (x86) + 64-bit (x64):
http://openvpn.net/client-connect-vpn-for-windows/
OpenVPN FAQs:
http://openvpn.net/vpn-server-resources/#faqs
OpenVPN Online Documentation:
http://openvpn.net/vpn-server-resources/
Wikipedia: Virtual Private Network (VPN):
http://en.wikipedia.org/wiki/Virtual_private_network
Wikipedia: OpenSSL:
http://en.wikipedia.org/wiki/OpenSSL
Wikipedia: Transport Layer Security (TLS):
http://en.wikipedia.org/wiki/Transport_Layer_Security
- MDGx "Public Root DNS Servers" chapter in WINDOWS7.TXT (this file):
http://www.mdgx.com/7.php#:~:text=Public%20Root%20DNS%20Servers%20%5B%2A%5D
- MDGx "Internet Power Toys [free(ware)]" chapter -> "Free(ware) Windows NTx Web Browsers" section in SOFTWARE.TXT
(included):
http://www.mdgx.com/nettoys.htm#NET
- MDGx "@ Chromium/Chrome/Brave/X-Chromium/Thorium/Vivaldi Privacy, Security + Safety Settings, Extensions, Guides +
Solutions:" topic in SOFTWARE.TXT (included):
http://www.mdgx.com/nettoys.htm#PRV
- MDGx "@ Firefox/Tor Browser/Waterfox/Pale Moon/LibreWolf Privacy, Security + Safety Settings, Extensions, Guides +
Solutions:" topic in SOFTWARE.TXT (included):
http://www.mdgx.com/nettoys.htm#PSF
Examples:

@ Chromium/Chrome web browsers + alternatives/derivatives/forks/variants:
*************************************************************************
http://www.mdgx.com/7.php#:~:text=%40%20Chromium%2FChrome%20web%20browsers%20%2B%20alternatives%2Fderivatives%2Fforks%2Fvariants%3A
- MDGx "FREE Windows 9x/NTx Web Browsers" chapter -> "Chromium + Chrome web browsers [free(ware)]" section ->
"Chromium + Chrome" topic in SOFTWARE.TXT (included):
http://www.mdgx.com/nettoys.htm#CHR
- MDGx "@ Chromium/Chrome/Brave/X-Chromium/Thorium/Vivaldi Privacy, Security + Safety Settings, Extensions, Guides +
Solutions:" topic in SOFTWARE.TXT (included):
http://www.mdgx.com/nettoys.htm#PRV
- MDGx "Web Browsers Links: Web Browsers, Tools + Tips on the Internet" [mostly free(ware)] in SOFTWARE.TXT (included):
http://www.mdgx.com/nettoys.htm#NET
Step-by-step:
01. Replace your Google Chrome web browser with a Google free [stripped of Google ads/phone-home/spyware apps, scripts +
code] Chromium or 3rd party/independent alternative/derivative/fork/variant Chromium based web browser (free, open source):
http://www.mdgx.com/nettoys.htm#CHR
RECOMMENDED:
- Chromium Precompiled EXEcutable [Installer EXE + Portable Archives ZIP/7z] 32-bit + 64-bit for Windows XP/newer 32-bit
(x86) + 64-bit (x64):
http://chromium.woolyss.com/
Certain Chromium builds [clearly labeled] are degoogled/ungoogled/stripped of Google adware/spyware/tracking code:
http://github.com/Eloston/ungoogled-chromium/blob/master/README.md
http://ungoogled-software.github.io/ungoogled-chromium-wiki/faq
Ungoogled Chromium precompiled Binaries 32-bit + 64-bit for Windows 7/newer 32-bit (x86) + 64-bit (x64):
http://ungoogled-software.github.io/ungoogled-chromium-binaries/releases/windows/
- Brave 32-bit + 64-bit web browser for Windows 7/newer 32-bit (x86) + 64-bit (x64) based on Chromium code [fork] with
improved privacy, safety + security and optimized speed:
http://brave.com/
Brave Repository:
http://github.com/brave/brave-browser/
Download [ZIP = full, Portable]:
http://github.com/brave/brave-browser/releases/latest/
- Vivaldi 32-bit + 64-bit web browser for Windows 7/newer 32-bit (x86) + 64-bit (x64) based on Chromium code [fork] with
enhanced privacy, safety + security:
http://vivaldi.com/
Download [EXE = Installer ONLY]:
http://vivaldi.com/download/
Vivaldi Portable -> run Installer EXE -> Install standalone:
http://help.vivaldi.com/desktop/install-update/standalone-version-of-vivaldi/
Vivaldi Portable [RAR = full, Portable]:
http://www.filecatchers.com/vivaldi-browser-portable/
- X-Chromium (X-Launcher) Portable:
http://www.portablefreeware.com/?id=2169
http://www.majorgeeks.com/files/details/chromium.html
Either install Chromium precompiled stable releases 32-bit or 64-bit:
http://chromium.woolyss.com/
http://www.portablefreeware.com/?id=2169
or extract all files from portable archive [zip or 7z] + copy to the destination of your choice Chromium portable stable
releases 32-bit or 64-bit to match the Windows NTx [7/newer] operating system(s) [OS(es)]
build/edition/release/update/version + bit strength [32-bit (x86) or 64-bit (x64)] you are using.
02. All Chromium/Chromium alternatives/derivatives/forks/variants users need to have Windows environment variables listed
below: run these commands from a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE): right-click CMD shortcut/CMD.EXE ->
Run as Administrator -> run these commands -> press Enter after each line:
SETX.EXE GOOGLE_API_KEY "NO" /M
SETX.EXE GOOGLE_DEFAULT_CLIENT_ID "NO" /M
SETX.EXE GOOGLE_DEFAULT_CLIENT_SECRET "NO" /M
to avoid any Google apps/code/scripts annoying errors/messages/pop-ups while running Chromium/Chromium
alternatives/derivatives/forks/variants.
03. Use Chromium/Chrome "Incognito Mode" to avoid cookies, (geo)location, personalized/targeted ad(vertisment)s, phone-home,
tracking, annoyances, blocked/restricted areas/content/features, privacy/safety/security invasions/intrusions:
http://support.google.com/chrome/answer/95464/
http://www.techtimes.com/articles/38718/20150310/
http://www.online-tech-tips.com/computer-tips/12-ways-to-get-past-a-paywall/
04. Log OFF/sign OUT of all Google Mail (Gmail)/Chromium/Chrome/etc account(s) (if any + if more than 1):
http://support.google.com/chrome/answer/9159867/
Then turn OFF Chromium/Chrome sign-in:
http://support.google.com/chrome/answer/185277/
Then log ON/sign IN to your Google Mail (Gmail)/Google account(s) 1 at a time (if any + if more than 1):
http://accounts.google.com/
05. Go to "Google Activity controls":
http://myactivity.google.com/activitycontrols
and then to "My Google Activity":
http://myactivity.google.com/
and then to "Other/More Activity":
http://myactivity.google.com/more-activity
and then to "Your data in Search" (Search Controls):
http://myaccount.google.com/yourdata/search
06. UNcheck all boxes/buttons, turn/slide OFF all switches/sliders + clear/delete all history/activity for "All time", for
"Older than 3 months" (most recent available), and related to all ad(vertisment)s, tracking, (geo)location, history,
activity, etc (if + where available).
http://support.google.com/accounts/answer/7660719/
07. Go to "Privacy and security" -> "Safety check":
chrome://settings/privacy/
-> "Privacy Guide" [Review key privacy and security controls] -> "A guide of your privacy choices":
chrome://settings/privacy/guide/?step=welcome
-> Next -> "Choose your search and browsing quality":
chrome://settings/privacy/guide/?step=msbb
-> turn OFF/slide left "Make searches and browsing better" -> Next:
chrome://settings/privacy/guide/?step=safeBrowsing
-> select "Enhanced protection" OR "Standard protection" -> for each of these 2 choices click the down arrow to see more
details and make an informed decision to suit your needs/preferences.
Or go to "Security":
chrome://settings/security/
-> "Safe Browsing" -> check "Enhanced protection" box.
http://support.google.com/chrome/answer/9890866/
CAUTION:
********
Turning ON "Enhanced protection" (see above) "Requires browsing data to be sent to Google." -> see this page for details:
http://support.google.com/accounts/answer/11577602/
Therefore if you are careful/concerned/conscientious/informed about your internet/online privacy, you may prefer to check
"Standard protection" box instead, and also turn OFF/slide left "Help improve security on the web for everyone", which
"Sends URLs of some pages you visit, limited system information, and some page content to Google, to help discover new
threats and protect everyone on the web.".
Turn ON/slide right "Always use secure connections" ["Upgrade navigations to HTTPS and warn you before loading sites that
don't support it"].
http://www.eff.org/https-everywhere/set-https-default-your-browser/
08. Go to "Choose your third-party cookie preferences":
chrome://settings/privacy/guide/?step=cookies
also available under "Cookies and other site data" (depending on your web browser version):
chrome://settings/cookies/
-> check "Block (all) third-party cookies" box -> turn ON/slide right "Clear cookies and site data when you close all
windows".
http://support.google.com/chrome/answer/95647/
09. Turn OFF/disable Sync for all your Chromium/Chrome account(s) (if any + if more than 1), for your activity,
data/information, (browsing) history, location/(geo)tracking to stop sending your personal/private data/info to Google
(cloud) servers:
http://support.google.com/chrome/answer/185277/
10. Type this command in the Chromium/Chrome address (URL/URI) bar -> press Enter:
chrome://settings/privacySandbox/
-> turn OFF/slide left "Privacy Sandbox trial" -> turn OFF/slide left "FLoC" (Federated Learning of Cohorts).
http://lifehacker.com/1847276073/
http://en.wikipedia.org/wiki/Federated_Learning_of_Cohorts
11. Go to "Ad personalization":
http://adssettings.google.com/authenticated
Turn OFF "Ad personalization is ON" to read "Ad personalization is OFF".
12. Click "Control ad personalization on other websites & apps that use Google ad services" which goes to:
http://optout.aboutads.info/
Wait a few seconds for browser detection to complete [may take a while! ;-(] -> 100%.
Under "Opt Out?" click "select all" (top right), or click "OPT OUT OF ALL" (bottom of web page).
Wait a few seconds for browser detection to complete [total 140+ opt-out requests! ;-(] -> 100%.
Click "View Updated Results" -> make sure all boxes are UNchecked + all items turned OFF.
13. Go to "Google News Settings":
http://news.google.com/settings
-> turn OFF/clear/delete "Hidden sources".
Under "My activity" -> click "View" -> go to:
http://myactivity.google.com/product/news/controls/
-> delete all activities/histories/tracking -> UNcheck all "Subsettings": "Include Chrome history and activity from sites,
apps, and devices that use Google services" + "Include voice and audio activity" -> turn OFF "Web & App Activity".
14. Go to "Activity controls":
http://myaccount.google.com/activitycontrols
Turn OFF/Pause "Web & App Activity", "Youtube Activity", "Other Activity" and all other activities/histories/tracking (if +
where available).
http://support.google.com/chrome/answer/185277/
UNcheck "Include Chrome history and activity from sites, apps and devices that use Google services".
15. Go to "Your ad choices":
http://www.youronlinechoices.com/uk/your-ad-choices/
Turn OFF all individual companies listed on that web page (if any).
16. Click the 3 dots ellipsis (older browser versions: 3 bars) at the top right corner or go to:
chrome://settings/
-> Settings -> People -> Sync, or (depending on your web browser version) -> "Sync and Google services":
chrome://settings/syncSetup/
-> turn OFF "On - sync everything" (if available).
Under "Other Google services" turn OFF/slide left all available items: "Allow Chromium/Chrome sign-in",
"Autocomplete searches and URLs" + "Make searches and browsing better".
17. Click circular Sync profile menu icon (top right corner) -> turn OFF "Sync and personalize Chrome across your devices".
18. If using Google Mail (Gmail) and/or any other Google account(s)/membership(s)/subscription(s): turn OFF "Allow
Chromium/Chrome sign-in" which automatically logs you into all your Google account(s) (if you have more than 1) whenever you
sign in into your Google Mail (Gmail)/Google account(s), and every time you open/start your app(s)/web browser(s).
19. Turn OFF both "Autocomplete searches and URLs" + "Sends URLs of pages you visit to Google" (depending on your web
browser version).
http://support.google.com/chrome/answer/114836/
20. Click the 3 dots ellipsis (older browser versions: 3 bars) at the top right corner -> Settings -> Advanced -> Privacy
and security (older web browser versions) or -> "Cookies and other site data"
chrome://settings/cookies/
-> turn ON/check/slide right "Send a "Do Not Track" request with your browsing traffic" (newer web browser versions).
http://support.google.com/chrome/answer/2790761/
21. Go to "Location":
chrome://settings/content/location/
-> Default behavior -> UNcheck "Sites can ask for your location" box -> check "Don't allow sites to see your location" box.
22. Go to "Notifications":
chrome://settings/content/notifications/
-> turn OFF/disable/opt OUT of/stop *all* Push Notifications
http://support.google.com/chrome/answer/3220216/
http://www.makeuseof.com/tag/disable-notifications-chrome-firefox-safari/
-> check "Don't allow sites to send notifications", OR "Block all: Turn OFF Ask before sending", OR turn OFF/slide left to
read "Blocked" (depending on your web browser version).
23. Go to "Clear browsing data" [pop-up dialog window]:
chrome://settings/clearBrowserData/
-> Advanced tab -> Time range -> select "All time" -> check all boxes you deem necessary/see fit for your specific
choices/needs/preferences + privacy/safety/security [if you're seriously careful/concerned/conscientious you should check
all of them ;-/] -> press "Clear data" button.
24. Go to "System":
chrome://settings/system/
-> turn OFF/slide left "Continue running background apps when Chromium/Chrome is closed".
25. Turn OFF/disable/stop Chromium/Chrome (+ alternatives/derivatives/forks/variants) + apps from running in the background
after all Chromium/Chrome (+ alternatives/derivatives/forks/variants) web browser instances have been closed/shutdown:
http://www.webnots.com/how-to-stop-google-chrome-from-running-in-background/
http://www.technorms.com/22405/silence-chrome-disable-background-apps/
http://www.lifewire.com/stop-apps-4777510/
26. Turn OFF/disable/stop Google Chrome + Apps from running in the background after Google Chrome web browser shutdown:
http://www.gtricks.com/chrome/how-to-stop-google-chrome-from-running-in-the-background-for-good/
27. Turn OFF Google (geo)location tracking on all your Android/Google/Chrome mobile/portable devices/computers:
http://www.cnet.com/tech/services-and-software/youre-likely-being-tracked-by-google-turn-off-these-settings-to-stop-it/
28. See MDGx "@ Chromium/Chrome/Brave/X-Chromium/Thorium/Vivaldi Privacy, Security + Safety Settings, Extensions, Guides +
Solutions:" topic in SOFTWARE.TXT (included):
http://www.mdgx.com/nettoys.htm#PRV
-> install free essential privacy/safety/security ad-blocker(s)/anti-malware/anti-phone-home/anti-spyware extensions,
TamperMonkey extension
http://chrome.google.com/webstore/detail/tampermonkey/dhdgffkkebhmkfjojejmpbldmpobfkfo/
+ useful TamperMonkey custom user JavaScript (JS) scripts/scriplets (examples):
http://privacyflag.eu/pf-tools/privacy-guide/
http://themarkup.org/ask-the-markup/2020/09/22/i-scanned-the-websites-i-visit-with-blacklight-and-its-horrifying-now-what/
http://greasyfork.org/
http://openuserjs.org/
http://raw.githubusercontent.com/Ibit-to/google-unlocked/master/google-unlocked.user.js
Go to TamperMonkey Dashboard/Options local HTML page:
chrome-extension://dhdgffkkebhmkfjojejmpbldmpobfkfo/options.html
-> configure/install/manage/tweak TamperMonkey options/settings + JavaScript (JS) scripts/scriplets.
http://www.tampermonkey.net/faq.php
29. Restart your browser (if + when needed).

@ Firefox/Mozilla web browsers + alternatives/derivatives/forks/variants:
*************************************************************************
http://www.mdgx.com/7.php#:~:text=%40%20Firefox%2FMozilla%20web%20browsers%20%2B%20alternatives%2Fderivatives%2Fforks%2Fvariants%3A
- MDGx "FREE Windows 9x/NTx Web Browsers" chapter -> "Firefox + Mozilla web browsers [free(ware)]" section -> "Firefox"
topic in SOFTWARE.TXT (included):
http://www.mdgx.com/nettoys.htm#MOZ
- MDGx "@ Firefox/Tor Browser/Waterfox/Pale Moon/LibreWolf Privacy, Security + Safety Settings, Extensions, Guides +
Solutions:" topic in SOFTWARE.TXT (included):
http://www.mdgx.com/nettoys.htm#PSF
- MDGx "Web Browsers Links: Web Browsers, Tools + Tips on the Internet" [mostly free(ware)] in SOFTWARE.TXT (included):
http://www.mdgx.com/nettoys.htm#NET
1. Go to:
http://support.mozilla.org/products/firefox/protect-your-privacy/
2. Follow instructions to turn OFF (opt OUT of) all ad(vertisment)s + tracking.
3. Go to:
http://www.ghacks.net/2015/08/18/a-comprehensive-list-of-firefox-privacy-and-security-settings/
4. Type
about:config
in the (URL/URI) address bar -> press Enter -> follow instructions:
http://kb.mozillazine.org/About:config_entries#Privacy.
http://kb.mozillazine.org/About:config_entries#Security.
to add/modify/delete desired/recommended settings in order to strengthen your Mozilla web browser security.
5. Turn OFF (Push) Notifications:
http://www.makeuseof.com/tag/disable-notifications-chrome-firefox-safari/
6. Click the 3 bars at the top right corner or type:
about:preferences#privacy
in the (URL/URI) address bar -> Options -> Privacy & Security -> Notifications -> Settings -> check "Block new requests
asking to allow notifications" box -> Save Changes.
7. See MDGx "@ Firefox/Tor Browser/Waterfox/Pale Moon/LibreWolf Privacy, Security + Safety Settings, Extensions, Guides +
Solutions:" topic in SOFTWARE.TXT (included):
http://www.mdgx.com/nettoys.htm#PSF
-> install free essential privacy/safety/security ad-blocker(s)/anti-malware/anti-phone-home/anti-spyware/anti-tracking
add-ons
http://addons.mozilla.org/firefox/extensions/category/privacy-security/
http://addons.mozilla.org/blog/whats-the-best-ad-blocker-for-you/
http://addons.mozilla.org/blog/top-anti-tracking-extensions/
+ TamperMonkey add-on
http://addons.mozilla.org/firefox/addon/tampermonkey/
+ useful TamperMonkey custom user JavaScript (JS) scripts/scriplets (examples):
http://privacyflag.eu/pf-tools/privacy-guide/
http://themarkup.org/ask-the-markup/2020/09/22/i-scanned-the-websites-i-visit-with-blacklight-and-its-horrifying-now-what/
http://greasyfork.org/
http://openuserjs.org/
http://raw.githubusercontent.com/Ibit-to/google-unlocked/master/google-unlocked.user.js
Go to TamperMonkey Dashboard/Options local HTML page -> configure/install/manage/tweak TamperMonkey options/settings +
JavaScript (JS) scripts/scriplets.
http://www.tampermonkey.net/faq.php
8. Restart your browser (if + when needed).

@ Edge web browsers:
********************
See MDGx "On The Edge of A Hostile Takeover = Uninstall + Replace Edge While You Still Can" chapter in WIN10.TXT (included):
http://www.mdgx.com/10.php
http://www.mdgx.com/WIN10.TXT

@ Internet Explorer (IE) web browser [discontinued from all NEWer Windows 10/2016/2019 builds/editions/releases/updates!]:
**************************************************************************************************************************
Microsoft DISCONTINUED primitive, obsolete, vulnerable, flawed, insecure Internet Explorer (IE) + replaced it with modified
[+ crippled/disabled/impaired/limited/locked/unavailable basic/important/optional features/options/settings + added
forced/hard to disable/impossible to get rid of unneeded/unwanted Microsoft centered apps, features, services, subscriptions
+ adware/tracking/spyware] Google Chromium based Edge proprietary web browser in all Windows 10/newer releases!
R.I.P. Internet Explorer... :-)
http://www.cnn.com/2022/06/18/asia/internet-explorer-gravestone-viral-south-korea-intl-hnk/
STRONGLY RECOMMENDED:
*********************
Therefore you should replace Internet Explorer (IE) as your default web browser with a better, modern, secure web browser.
Recommended independent/3rd party free, open source, safe, secure, uncrippled, unlocked, unrestricted, modern web browsers
(examples):
http://www.mdgx.com/nettoys.htm#NET
MDGx "FREE Windows 9x/NTx Web Browsers" chapter -> "Chromium + Chrome web browsers [free(ware)]" section ->
"Chromium + Chrome" topic in SOFTWARE.TXT (included):
http://www.mdgx.com/nettoys.htm#CHR
RECOMMENDED:
- Chromium Precompiled EXEcutable [Installer EXE + Portable Archives ZIP/7z] 32-bit + 64-bit for Windows XP/newer 32-bit
(x86) + 64-bit (x64):
http://chromium.woolyss.com/
Certain Chromium builds [clearly labeled] are degoogled/ungoogled/stripped of Google adware/spyware/tracking code:
http://github.com/Eloston/ungoogled-chromium/blob/master/README.md
http://ungoogled-software.github.io/ungoogled-chromium-wiki/faq
Ungoogled Chromium precompiled Binaries 32-bit + 64-bit for Windows 7/newer 32-bit (x86) + 64-bit (x64):
http://ungoogled-software.github.io/ungoogled-chromium-binaries/releases/windows/
- Brave 32-bit + 64-bit web browser for Windows 7/newer 32-bit (x86) + 64-bit (x64) based on Chromium code [fork] with
improved privacy, safety + security and optimized speed:
http://brave.com/
Brave Repository:
http://github.com/brave/brave-browser/
Download [ZIP = full, Portable]:
http://github.com/brave/brave-browser/releases/latest/
- Vivaldi 32-bit + 64-bit web browser for Windows 7/newer 32-bit (x86) + 64-bit (x64) based on Chromium code [fork] with
enhanced privacy, safety + security:
http://vivaldi.com/
Download [EXE = Installer ONLY]:
http://vivaldi.com/download/
Vivaldi Portable -> run Installer EXE -> Install standalone:
http://help.vivaldi.com/desktop/install-update/standalone-version-of-vivaldi/
Vivaldi Portable [RAR = full, Portable]:
http://www.filecatchers.com/vivaldi-browser-portable/
- X-Chromium (X-Launcher) Portable:
http://www.portablefreeware.com/?id=2169
http://www.majorgeeks.com/files/details/chromium.html
Either install Chromium precompiled stable releases 32-bit or 64-bit:
http://chromium.woolyss.com/
http://www.portablefreeware.com/?id=2169
or extract all files from portable archive [zip or 7z] + copy to the destination of your choice Chromium portable stable
releases 32-bit or 64-bit to match the Windows NTx [7/newer] operating system(s) [OS(es)]
build/edition/release/update/version + bit strength [32-bit (x86) or 64-bit (x64)] you are using.
All Chromium/Chromium alternatives/derivatives/forks/variants users must have these 3 environment variables:
GOOGLE_API_KEY=NO
GOOGLE_DEFAULT_CLIENT_ID=NO
GOOGLE_DEFAULT_CLIENT_SECRET=NO
Right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run these commands -> press Enter after each line:
SETX.EXE GOOGLE_API_KEY "NO" /M
SETX.EXE GOOGLE_DEFAULT_CLIENT_ID "NO" /M
SETX.EXE GOOGLE_DEFAULT_CLIENT_SECRET "NO" /M
MDGx "@ Chromium/Chrome/Brave/X-Chromium/Thorium/Vivaldi Privacy, Security + Safety Settings, Extensions, Guides +
Solutions:" topic in SOFTWARE.TXT (included):
http://www.mdgx.com/nettoys.htm#PRV
MDGx collection of essential Chromium/Chrome extensions + tweaks -> "CHROMIUM" section in TOOLS.TXT (included):
http://www.mdgx.com/tools.php#:~:text=CHROMIUM%20%5B%2A%5D
http://www.mdgx.com/TOOLS.TXT
But just in case you need to/are forced to keep Internet Explorer (IE) for various reasons, for example compatibility with
older software programs/scripts/documents (MS Office, Outlook), obsolete web sites and/or e-mail servers using older MS
server software/scripts, then you can improve and secure a little more the way Internet Explorer (IE) web browser works by
following the tips listed here.
See MDGx "Internet Explorer (IE) 4/5/6/7/8/9/10/11 Essential FREE Fixes + Updates" chapter in SOFTWARE.TXT (included):
http://www.mdgx.com/ietoy.htm
R.I.P. Internet Explorer... :-)
http://www.cnn.com/2022/06/18/asia/internet-explorer-gravestone-viral-south-korea-intl-hnk/
RECOMMENDED:
************
Install an independent/3rd party free, open source, safe, secure, uncrippled, unlocked, unrestricted, modern web browser
based on Chromium code with enhanced privacy, safety + security
http://www.mdgx.com/nettoys.htm#PRV
-> see "FREE Windows 9x/NTx Web Browsers" chapter -> "Chromium + Chrome" section in SOFTWARE.TXT (included):
http://www.mdgx.com/nettoys.htm#CHR
1. Go to:
http://choice.microsoft.com/opt-out
2. Turn OFF all ads:
- Personalized ads in this browser.
- Personalized ads wherever I use my Microsoft account.
3. Go to:
http://www.aboutads.info/choices/
4. UNcheck all boxes:
- "All Participating Companies".
- "Companies Customizing Ads For Your Browser".
5. Internet Explorer (IE) 9/10/11 "Block Tracking" (Geolocation Detection) + "Automatic (Forced) Upgrade":
http://unlockforus.blogspot.com/2012/09/do-not-allow-websites-to-get-your.html
http://support.microsoft.com/help/2843950/
http://www.eightforums.com/tutorials/7996-internet-explorer-10-auto-update-enable-disable.html
http://www.itninja.com/question/ie10-turn-off-auto-updates/
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Geolocation]
"BlockAllWebsites"=dword:1
[HKEY_USERS\.DEFAULT\Software\Microsoft\Internet Explorer\Geolocation]
"BlockAllWebsites"=dword:1
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main]
"EnableAutoUpgrade"=dword:0
[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main]
"EnableAutoUpgrade"=dword:0
[HKEY_USERS\.DEFAULT\Software\Microsoft\Internet Explorer\Main]
"EnableAutoUpgrade"=dword:0
;
------End cut & paste here------
6. Turn OFF primitive/obsolete Internet Explorer (IE) Security Check:
http://www.windows-security.org/65c2e8edd3108cdb6fc985493bb2fa38/turn-off-the-security-settings-check-feature/
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Security]
"DisableSecuritySettingsCheck"=dword:1
[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Security]
"DisableSecuritySettingsCheck"=dword:1
[HKEY_USERS\.DEFAULT\Software\Microsoft\Internet Explorer\Security]
"DisableSecuritySettingsCheck"=dword:1
;
------End cut & paste here------
7. Manage cookies in Internet Explorer (IE):
http://www.whatismybrowser.com/guides/clear-cache-history-cookies/internet-explorer
http://kb.wisc.edu/helpdesk/page.php?id=15141
http://support.microsoft.com/en-us/search?query=cookies%20in%20internet%20explorer
More info @ MDGx "Internet Explorer (IE) 11.0" section in SOFTWARE.TXT (included):
http://www.mdgx.com/ietoy.htm#IE11
Open E10BLOK.CMD (included) in Notepad for details:
http://www.mdgx.com/10BLK/E10BLOK.CMD.TXT
8. Install AdBlock Plus (ABP) for Internet Explorer (IE) (free, open source):
http://adblockplus.org/en/internet-explorer
9. Restart your browser (if + when needed).
RECOMMENDED:
WINDOWS7.TXT (this file) contains more tips on how to improve your life while still using Internet Explorer (IE).
Please see respective topics (clearly marked).

* Turn OFF/Disable/Opt OUT of/Stop for Profit Web Sites + Social Media Invading Your Privacy + Enhance Safety + Security:
*************************************************************************************************************************
Similar methods/options/settings to turn OFF/disable/opt OUT of/stop
automatic/unattended/forced/hidden/unwanted/behind-your-back/without-your-consent intrusions, invasion of privacy,
compromising your safety + security are available (even if hidden, little known, and/or not properly advertised/placed) on
most for profit web sites, social media, and their (co)owned, operated, and/or shared
affiliates/associates/branches/businesses/companies/divisions/entities/parents/partners/subsidiaries who
lure/push/recommend/tempt you with alerts, apps, cookies, e-mails, enrollments, feeds, memberships, messages, notifications,
promotions, reminders, subscriptions, trials, updates, widgets, etc, and will share and sell (even against your will, and
without your knowledge and/or permission) your personal/private information to others like them, just to sell you more stuff
you don't need, and make you spend money you can't afford, or don't have [credit is not cash]... ;-(
http://www.goodreads.com/quotes/25775/
Doing so will preserve/restore (some) privacy, safety and security on the internet, and most importantly, will allow you and
your computing/connected/digital/online environment(s), persona(s) + live(s) to stay safe from breaches, hacking,
intrusions, invasion, phishing, malware, spyware, (geo)tracking, personal/private data/information
break-ins, broadcast, dissemination, leaks, etc.
A few things you can do effortlessly, in a nick of time, and they're all free... ;-/

@ Google search + (geo)location tracking, data, history, e-mail (Gmail), notifications + apps:
**********************************************************************************************
http://www.mdgx.com/7.php#:~:text=%40%20Google%20search%20%2B%20%28geo%29location%20tracking
- Remove personal information from Google:
http://support.google.com/websearch/thread/182504436/
- Remove your personal information from Google Search:
http://support.google.com/websearch/troubleshooter/3111061/
- Remove select personally identifiable info (PII) or doxxing content from Google Search:
http://support.google.com/websearch/answer/9673730/
- Remove images of minors from Google search results:
http://support.google.com/websearch/answer/10949130/
- Request to remove your personal information on Google:
http://support.google.com/websearch/troubleshooter/9685456/
- Remove personal info, personally identifiable info (PII) + content from Google search engine + apps:
http://support.google.com/search?q=remove+personally+identifiable+info+doxxing+content+from+google
- Stop Google from tracking and storing your locations:
http://www.techrepublic.com/article/how-to-stop-google-from-tracking-and-storing-your-locations/
- Disable Web Push Notifications in Google Chrome:
http://www.pushassist.com/knowledgebase/how-to-disable-web-push-notifications-in-google-chrome/
- Force Google to automatically delete the information it saves about what you do online:
http://www.cnbc.com/2019/05/08/how-to-stop-google-from-tracking-web-history.html
- Google knows everywhere you go - here's how to stop it from tracking you and delete the logs:
http://www.cnbc.com/2019/04/25/how-to-stop-google-from-storing-your-location-history.html
- Google collects information about many things you do online - here's how to stop it:
http://www.cnbc.com/2019/05/01/how-to-stop-google-from-collecting-your-private-information.html
- Google Sees Everything You Do: Here's How to Stop That:
http://www.lifewire.com/stop-google-4123866/
- Report malicious software web sites:
http://safebrowsing.google.com/safebrowsing/report_badware/
- Report Phishing and Malware:
http://www.decentsecurity.com/malware-web-and-phishing-investigation/
- Gmail Confidential Mode: Send + open confidential e-mails + attachments:
http://support.google.com/mail/answer/7674059/
- Control Chromium/Chrome safety -> scroll down to the blue sections:
http://support.google.com/chrome/?#topic=7437824
- Chromium/Chrome privacy -> scroll down to the blue sections:
http://support.google.com/chrome/?#topic=9845306
- Chromium/Chrome Safe Browsing:
http://support.google.com/chrome/answer/9890866/
- Select Chromium/Chrome Privacy settings:
http://support.google.com/chrome/answer/114836/
- Chromium/Chrome Safe Browsing practices:
http://www.google.com/chrome/privacy/#safe-browsing-practices
- Manage Chromium/Chrome Safety + Security:
http://support.google.com/chrome/answer/10468685/
- Turn ON Chromium/Chrome "Send a 'Do Not Track' request with your browsing traffic":
http://support.google.com/chrome/answer/2790761/
- Turn OFF/disable/opt OUT of/stop *all* Chromium/Chrome (Push) Notifications:
http://support.google.com/chrome/answer/3220216/
- Online Privacy Guide:
http://privacyflag.eu/pf-tools/privacy-guide/
- Browsers, Extensions/Add-ons, Cookies, Tracking:
http://themarkup.org/ask-the-markup/2020/09/22/i-scanned-the-websites-i-visit-with-blacklight-and-its-horrifying-now-what/

@ YouTube (YT):
***************
- The Verge: Protect your privacy on YouTube:
http://www.theverge.com/2019/4/19/18484802/
- LifeWire: YouTube Privacy Settings:
http://www.lifewire.com/youtube-privacy-settings-1082507/
- GHacks: Why you should always use YouTube Privacy Enhanced Mode:
http://www.ghacks.net/2018/05/23/why-you-should-always-use-youtubes-privacy-enhanced-mode/
- YouTube: Account Privacy settings:
http://www.youtube.com/account_privacy/
- YouTube: Account Notifications:
http://www.youtube.com/account_notifications/
- YouTube: Account Playback and performance:
http://www.youtube.com/account_playback/
- Google YouTube: Privacy and safety center:
http://support.google.com/youtube/topic/2803240/
- Google YouTube: Protecting your identity:
http://support.google.com/youtube/answer/2801895/
- Google YouTube: Change video privacy settings:
http://support.google.com/youtube/answer/157177/
- Google YouTube: Browse YouTube while incognito on mobile devices:
http://support.google.com/youtube/answer/9040743/
- Wikipedia: YouTube and Privacy:
http://en.wikipedia.org/wiki/YouTube_and_privacy

@ Bing Search Engine, Live, Microsoft, MSN + Related/Shared Accounts, Services + Apps:
**************************************************************************************
Browser settings -> turn OFF/slide left "Get all notifications":
http://www.bing.com/profile/notifications/settings?service=3
Activity -> check right hand side box -> press "Clear" button:
http://www.bing.com/profile/history/
Clear your search history -> press "Clear all" button:
http://www.bing.com/profile/history/
Turn OFF/slide left all Experience Settings [Language & content + Feed settings] + Notification(s) [Notification settings:
news, notifications, badges, alerts]:
http://www.msn.com/en-us/feed/personalize/
http://www.msn.com/en-us/feed/personalize/notification/
http://www.msn.com/en-us/feed/personalize/settings/
Privacy settings in Microsoft products:
http://support.microsoft.com/topic/where-can-i-find-privacy-settings-in-microsoft-products-206f6928-2694-4adf-a50f-9edb95897d81
General privacy settings in Windows 10 + 11:
http://support.microsoft.com/windows/general-privacy-settings-in-windows-7c7f6a09-cebd-5589-c376-7f505e5bf65a
Change privacy settings in Windows 10 + 11:
http://support.microsoft.com/windows/change-privacy-settings-in-windows-55466b7b-14de-c230-3ece-6b75557c5227
Microsoft Account Privacy Settings:
http://account.microsoft.com/account/privacy
Microsoft Edge browsing activity for personalized advertising and experiences:
http://support.microsoft.com/microsoft-edge/microsoft-edge-browsing-activity-for-personalized-advertising-and-experiences-37aa831e-6372-238e-f33f-7cd3f0e53679
Microsoft Account -> Privacy -> Ad settings:
http://account.microsoft.com/privacy/ad-settings/signedout/
Disable Personalized Ads on Microsoft Sites + Apps:
http://www.laptopmag.com/articles/disable-microsoft-personalized-ads/
Examples above use United States English [en-us]. Your language ID string may be different depending on your installed
Windows operating system (OS) primary/selected language, language preference(s) and/or geographical location:
http://docs.microsoft.com/cpp/c-runtime-library/language-strings/
WARNING:
********
Unfortunately you must already have, or need to open a (new) Microsoft account in order to be able to change most privacy,
safety + security choices/options/preferences/settings on Microsoft/Microsoft operated/owned/partners/related/shared
accounts, alerts, apps, e-mails, enrollments, feeds, memberships, messages, notifications, products, promotions, reminders,
services, subscriptions, trials, updates, widgets:
http://account.microsoft.com/privacy/
http://account.microsoft.com/account/privacy
http://www.bing.com/account/general/

@ Yahoo! (Y!) Search Engine, Yahoo! Mail + Yahoo! News:
*******************************************************
- Turn OFF Desktop notifications for Yahoo Mail:
http://help.yahoo.com/kb/SLN26611.html
- Turn OFF notifications from Yahoo Mail app:
http://en-global.help.yahoo.com/kb/account/enable-notifications-yahoo-mail-sln26439.html
- Turn OFF Yahoo! News Notifications:
http://800emailsupport.com/blog/turn-off-yahoo-news-notification/

@ DuckDuckGo (DDG) Search Engine, Privacy Essentials + E-mail Protection:
*************************************************************************
Turn OFF/disable/opt OUT of/stop all DuckDuckGo (DDG) ad(vertisment)s, notifications, reminders, subscriptions, feedback,
requests, annoyances -> go to:
http://duckduckgo.com/settings/
-> under the General tab -> scroll down -> turn OFF/UNcheck all these boxes:
- Advertisements;
- Install DuckDuckGo: Shows links to instructions for how to add DuckDuckGo to your browser;
- Shows occasional reminders to add DuckDuckGo to your browser;
- Privacy Newsletters: Shows sign-up form for the DuckDuckGo privacy newsletters;
- Shows occasional reminders to sign up for the DuckDuckGo privacy newsletters;
- Homepage Privacy Tips: Shows the privacy benefits of using DuckDuckGo on the homepage;
- Help Improve DuckDuckGo: It's okay to (very infrequently) ask me about my experience using DuckDuckGo.
Switch to DuckDuckGo, a Private Search Engine:
http://www.howtogeek.com/709072/
DuckDuckGo: Google Alternative for Privacy:
http://www.howtogeek.com/710128/
Change the Default Search Engine on All Browsers + Devices:
http://kinsta.com/blog/how-to-change-search-engine/
DuckDuckGo search engine:
http://duckduckgo.com/
DuckDuckGo Privacy Essentials:
http://github.com/duckduckgo/duckduckgo-privacy-extension/
DuckDuckGo E-mail Protection [requires DuckDuckGo extension or add-on!]:
http://duckduckgo.com/email/
- Chromium/Chrome extension:
http://chrome.google.com/webstore/detail/duckduckgo-privacy-essent/bkdgflcldnnnapblkhphbgpggdiikppg/
- Firefox add-on:
http://addons.mozilla.org/firefox/addon/duckduckgo-for-firefox/
- Edge add-on:
http://microsoftedge.microsoft.com/addons/detail/caoacbimdbbljakfhgikoodekdnlcgpk/
- Safari app:
http://apps.apple.com/us/app/duckduckgo-privacy-for-safari/id1482920575/
- Android app:
http://duckduckgo.com/app/
DuckDuckGo E-mail Protection:
http://spreadprivacy.com/protect-your-inbox-with-duckduckgo-email-protection/

@ Startpage Search Engine + Privacy Protection Add-on + Extension:
******************************************************************
Turn OFF/disable/opt OUT of/stop Startpage promotions, annoyances -> go to:
http://www.startpage.com/do/settings
-> turn OFF/slide left "Promotional messaging".
Change the Default Search Engine on All Browsers + Devices:
http://kinsta.com/blog/how-to-change-search-engine/
Startpage search engine:
http://www.startpage.com/
Anonymous View by Startpage [English only!]:
http://www.startpage.com/en/anonymous-view/
Startpage Privacy Protection:
http://add.startpage.com/protection/
- Chromium/Chrome extension:
http://chrome.google.com/webstore/detail/startpage-privacy-protect/cdkhedhmncjnpabolpjceohohlefegak/
- Firefox add-on:
http://addons.mozilla.org/firefox/addon/startpage-privacy-protection/

@ Brave Search Engine:
**********************
http://search.brave.com/
Change the Default Search Engine on All Browsers + Devices:
http://kinsta.com/blog/how-to-change-search-engine/
- Chromium/Chrome extension:
http://chrome.google.com/webstore/detail/brave-search/jojedekgcncccnjhilimdojbfnfamkda/
- Firefox add-on:
http://addons.mozilla.org/firefox/addon/brave-search/

And last, but not least... ;-/
* MDGx Search Engines, Human Rights + Net Tools:
************************************************
http://www.mdgx.com/links.htm
- MDGx "WWW (World Wide Web) Search Engines" [most have enhanced privacy, safety + security]:
http://www.mdgx.com/links.htm#WSE
- MDGx "FTP (File Transfer Protocol) Search Engines":
http://www.mdgx.com/links.htm#FSE
- MDGx "Anonymous + Faster Surfing":
http://www.mdgx.com/links.htm#ANO
- MDGx "Human Rights, Privacy + Fairness" [Sites Who Fight for Your Rights]:
http://www.mdgx.com/links.htm#HRC
______________________________________________________________________________



Chromium/Chrome/X-Chromium/Thorium/Brave/Vivaldi Automated Clean-Up



Automatically + quietly [+ minimum output by terminating command lines with " >NUL 2>&1" to render them
invisible/quiet/silent] clean up by running a single DOS console command line BATch (.bat)/CoMmanD (.cmd) script (plain
text) file, which allows to delete/erase/remove/wipe out past activity, history, temporary, tracking +
annoying/bloat/undesirable/unnecessary/unneeded/unused/unwanted/useless files + directories/folders (some of whom consume
large amounts of storage space) created by Chromium, Google Chrome, Chrome Beta, Chrome Dev(eloper) (Canary), X-Chromium
(X-Launcher), Thorium, Brave, Vivaldi (+ other similar alternatives/derivatives/forks/variants) web browsers based on free,
open source Chromium code in Windows 7/newer.
CAUTION:
My BATch (.bat)/CoMmanD (.cmd) script does NOT work with Windows 10/11 Edge web browsers based on heavily modified Chromium
(Canary developer channel) code directory/folder structure.
http://www.verizon.com/support/knowledge-base-204588/
http://clear-my-cache.com/windows/microsoft-edge.html
FYI:
- Windows 11 users: you can use this BATch (.bat)/CoMmanD (.cmd) script
http://techcommunity.microsoft.com/t5/windows-11/example-batch-file-to-clear-browsing-history-on-microsoft-edge/m-p/3281775/
as example/template (and adapt/modify it to match your specific setup) to clean-up your Chromium based Edge web browsers.
- Firefox + Firefox code based web browsers users: you can use this BATch (.bat)/CoMmanD (.cmd) script
http://techcommunity.microsoft.com/t5/windows-11/example-batch-file-to-clear-browsing-history-on-microsoft-edge/m-p/3281775/highlight/true#M3276
as example/template (and adapt/modify it to match your specific setup) to clean-up your Firefox (+
alternatives/derivatives/forks/variants) web browsers.
1st Things 1st:
***************
1. Make a BACKUP copy/clone of all your web browser(s) user profile(s) directories/folders + files to a safe location before
running this DOS console command line BATch (.bat)/CoMmanD (.cmd) script file, which deletes/removes a lot of files +
directories/folders from your web browser(s) profile(s).
FYI:
These are most popular Chromium, Chrome + alternatives/derivatives/forks/variants based on Chromium code
built-in/default/preset web browser user profile locations in Windows Vista/newer, and they are all covered in this BATch
(.bat)/CoMmanD (.cmd) script file (see further below):
- Chromium based web browsers 32-bit + 64-bit (using original/unmodified/untouched Chromium code):
http://chromium.googlesource.com/chromium/src/+/master/docs/user_data_dir.md
%UserProfile%\AppData\Local\Chromium [%UserProfile% = C:\Users\Your_Name]
%AppData%\Local\Chromium [%AppData% = C:\Users\Your_Name\AppData]
Your_Name is replaced with your actual user name.
Get Chromium (certain builds are stripped of Google adware/spyware/tracking, portable):
http://chromium.woolyss.com/
- Chrome Beta web browsers 32-bit + 64-bit (using original/unmodified/untouched Chromium code):
http://chromium.googlesource.com/chromium/src/+/master/docs/user_data_dir.md
%UserProfile%\AppData\Local\Google\Chrome Beta [%UserProfile% = C:\Users\Your_Name]
%AppData%\Local\Google\Chrome Beta [%AppData% = C:\Users\Your_Name\AppData]
Your_Name is replaced with your actual user name.
Get Chrome Beta:
http://www.google.com/chrome/beta/
- Chrome Dev(eloper) (Canary) web browsers 32-bit + 64-bit (using original/unmodified/untouched Chromium code):
http://chromium.googlesource.com/chromium/src/+/master/docs/user_data_dir.md
%UserProfile%\AppData\Local\Google\Chrome SxS [%UserProfile% = C:\Users\Your_Name]
%AppData%\Local\Google\Chrome SxS [%AppData% = C:\Users\Your_Name\AppData]
Your_Name is replaced with your actual user name.
Get Chrome Dev(eloper) (Canary):
http://www.google.com/chrome/dev/
- Google Chrome web browsers 32-bit + 64-bit (using Chromium code modified by Google):
http://support.google.com/chrome/a/answer/7349337/
%UserProfile%\AppData\Local\Google\Chrome [%UserProfile% = C:\Users\Your_Name]
%AppData%\Local\Google\Chrome [%AppData% = C:\Users\Your_Name\AppData]
Your_Name is replaced with your actual user name.
Get Google Chrome:
http://support.google.com/chrome/answer/95346/
- Thorium/Thorium AVX2 web browsers 64-bit (using Chromium code modified by Thorium forks):
http://support.google.com/chrome/a/answer/7349337/
%UserProfile%\AppData\Local\Thorium [%UserProfile% = C:\Users\Your_Name]
%AppData%\Local\Thorium [%AppData% = C:\Users\Your_Name\AppData]
Your_Name is replaced with your actual user name.
Get Thorium (CPU extensions/hardware optimized, portable):
http://github.com/Alex313031/Thorium-Win/releases/latest/
Get Thorium AVX2 (3D rendering + HD/VHD/UHD video playback optimized, portable):
http://github.com/Alex313031/Thorium-AVX2/releases/latest/
- Brave web browser 32-bit + 64-bit (using Chromium code modified by Brave fork):
http://community.brave.com/t/where-does-brave-store-its-data-files/53830/
%UserProfile%\AppData\Local\BraveSoftware [%UserProfile% = C:\Users\Your_Name]
%AppData%\Local\BraveSoftware [%AppData% = C:\Users\Your_Name\AppData]
Your_Name is replaced with your actual user name.
Get Brave (improved privacy, safety + security, portable):
http://github.com/brave/brave-browser/releases/latest/
- Vivaldi web browser 32-bit + 64-bit (using Chromium code modified by Vivaldi fork):
http://techdows.com/2015/06/find-vivaldi-browser-installed-location-or-path.html
%UserProfile%\AppData\Local\Vivaldi [%UserProfile% = C:\Users\Your_Name]
%AppData%\Local\Vivaldi [%AppData% = C:\Users\Your_Name\AppData]
Your_Name is replaced with your actual user name.
Get Vivaldi (enhanced privacy + security, portable -> Install standalone):
http://vivaldi.com/download/
- X-Chromium (X-Launcher) web browsers 32-bit + 64-bit (using winPenPack X-Software launcher portability/redirection code +
original/unmodified/untouched Chromium code):
http://www.winpenpack.com/en/page.php?26
X:\X-Software\User\Program_Name
Replace all generic letters + names [X:, X-Software, User + Program_Name above] with your actual X-Chromium (X-Launcher)
drive/partition/volume letter, base/main directory/folder name + user name (if any).
In this example I use C:\PORT\CHROME = replace it to match yours -> see DOS console command line BATch (.bat)/CoMmanD (.cmd)
file below.
Get X-Chromium (X-Launcher) (100% portable):
http://www.winpenpack.com/en/download.php?view.1082
2. Chromium/Chrome + alternatives/derivatives/forks/variants directory/folder structure/tree layout:
open (File) Explorer -> go to the directory (directories)/folder(s) where your Chromium based web browser(s) keep(s)
its/their user profile location(s) -> see 1. further above.
You can view/save/print any directory/folder tree structure: from a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE):
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command (using Chromium in this example):
DIR "%UserProfile%\AppData\Local\Chromium" /A:D /B /S
OR:
DIR "%AppData%\Local\Chromium" /A:D /B /S
-> press Enter.
View DIR [Directory] built-in command options, switches + parameters: from a DOS console command prompt
(%WinDir%\SYSTEM32\CMD.EXE) right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter:
DIR /?
Save your DIR output screen as plain text/ASCII (.txt) file, you can view/edit/print using Notepad/similar/better free(ware)
plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
using same example above:
DIR "%UserProfile%\AppData\Local\Chromium" /A:D /B /S>%TEMP%\Chromium_User_Profile_tree.txt
OR:
DIR "%AppData%\Local\Chromium" /A:D /B /S>%TEMP%\Chromium_User_Profile_tree.txt
In this case Chromium_User_Profile_tree.txt is saved in your Temp(orary) [%TEMP%] directory/folder, usually
%UserProfile%\AppData\Local\Temp
OR:
%AppData%\Local\Temp
in Windows Vista/newer, where %UserProfile% = your actual user name.
View your default/preset (unless you changed it) system Temp(orary) [%TEMP%] directory/folder location: from a DOS console
command prompt (%WinDir%\SYSTEM32\CMD.EXE) right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command ->
press Enter:
PATH
Scroll down to these 2 environment variables (generic example):
TEMP=C:\Users\Your_Name\AppData\Local\Temp
TMP=C:\Users\Your_Name\AppData\Local\Temp
Your_Name is replaced with your actual user name.
References:
- Chromium/Chrome User Data Directory:
http://chromium.googlesource.com/chromium/src/+/master/docs/user_data_dir.md
- Chromium OS Local & Remote Source Tree Layouts:
http://chromium.googlesource.com/chromiumos/docs/+/HEAD/source_layout.md
- Getting Around the Chromium Source Code Directory Structure:
http://www.chromium.org/developers/how-tos/getting-around-the-chrome-source-code/
- Structure of Chromium/Chrome User Profile data:
http://superuser.com/questions/951095/
- Chromium/Chrome directory/folder hierarchy/tree:
http://chromium.googlesource.com/chromium/src.git/+/78b64f6ab701b31e69dc822adde685ebe55c62b1/
- Chromium/Chrome Cookies and Network Data:
http://www.avanite.com/blog/chromium-cookies-and-network-data/
- Location of Chromium/Chrome history:
http://www.foxtonforensics.com/browser-history-examiner/chrome-history-location/
3. Test this DOS console command line BATch (.bat)/CoMmanD (.cmd) file (see further below) to make sure it works properly on
your Windows 7/newer computer(s)/device(s) and in your specific environment(s), because certain hardware/software/system
configurations/customizations/requirements/settings may need some of these files +/- directories/folders.
4. After that customize/edit/modify it by opening it in Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
and comment/disable/remark the lines you see fit according to your specific
configurations/customizations/needs/preferences/requirements/settings by adding a double colon and a space [:: ] in front of
each line, or you can delete/remove them altogether, and/or add new ones to match your needs/preferences.
REQUIREMENTS:
*************
1. Must (double-)click/execute/open/run DOS console command line BATch (.bat)/CoMmanD (.cmd) file (further below) as
Administrator -> right-click it or its icon/item/link/shortcut -> select "Run as Administrator".
2. Make sure none of these EXEcutables (.exe files): Chrome.exe, Chromium.exe, X-Chromium.exe, Thorium.exe, Brave.exe and/or
Vivaldi.exe is/are NOT running, not even in the background.
Open/run Task Manager:
http://www.wikihow.com/Open-Windows-Task-Manager/
http://www.howtogeek.com/66622/
Start -> Run... [hold WinKey + press R] -> type this command:
taskmgr.exe
-> press Enter or click OK.
Windows 10/newer users (optional): open/run LaunchTM.exe the same way.
Task Manager window -> click "Processes" tab -> scroll down and look for any of the Chromium/Chrome or/and
alternatives/derivatives/forks/variants EXEcutables listed above.
In case you see any: righ-click on each of them 1 at a time (if more than 1) -> select "End Process Tree" as many times as
necessary to make sure you close all instances, or if there is only 1 listed -> select "End Process".
Therefore...
To be able to delete all files + directories/folders listed below 1st you MUST close/exit/shutdown completely *all* running
(even in the background)/idle/resident instances of Chrome, Chromium, X-Chromium (X-Launcher), Thorium, Brave and/or Vivaldi
EXEcutables (.exe files), and only after that right-click once again this DOS console command line BATch (.bat)/CoMmanD
(.cmd) file or its icon/item/link/shortcut (in case you created 1) -> select "Run as Administrator".
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text BATch (.bat) or CoMmanD (.cmd) script file containing the lines between Cut & Paste delimiters below
-> save it as plain text/ASCII file (Encode: -> ANSI) with the BAT (.bat) or CMD (.cmd) extension -> right-click it ->
Run as Administrator -> wait for completion.
-----Begin cut & paste here-----
@ECHO OFF
IF NOT "%OS%"=="Windows_NT" GOTO END
COLOR E4
TITLE "Delete Bloat/Useless (X-)Chrom(ium)/Brave/Thorium (AVX2)/Vivaldi files + folders..."
CD\
:: @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ Chromium @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
:: Chromium (Portable) web browsers user profile base/main directory/folder = %UserProfile%\AppData\Local\Chromium [where
:: %UserProfile% is C:\Users\Your_Name = Your_Name is replaced with your actual user name]:
TASKLIST.EXE>%TEMP%\CHROM_RUN!.TXT
FIND.EXE /I "CHROM" "%TEMP%\CHROM_RUN!.TXT" >NUL 2>&1
IF NOT ERRORLEVEL 1 GOTO NXT1
TAKEOWN.EXE /f "%UserProfile%\AppData\Local\Chromium" /r /d y >NUL 2>&1
ICACLS.EXE "%UserProfile%\AppData\Local\Chromium" /grant:R %UserName%:F Administrators:F /t /c /q >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Chromium\debug*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Chromium\*.corrupt" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Chromium\*crash*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Chromium\licens*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Chromium\about*.txt" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Chromium\CHANGELOG*.txt" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Chromium\*licens*.txt" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Chromium\*.bak" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Chromium\*.pma" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Chromium\BrowserMetric*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Chromium\CrashpadMetric*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Chromium\Cach*.pak" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Chromium\*.old" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Chromium\*.tmp" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Chromium\LOCK" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Chromium\lockfil*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Chromium\LOG" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Chromium\chrome_shut*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Chromium\*-journal.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Chromium\User Data\Default\File System\00000*" >NUL 2>&1
DEL /F /Q "%UserProfile%\AppData\Local\Chromium\User Data\Default\Local Storage\leveldb\*.ldb" >NUL 2>&1
DEL /F /Q "%UserProfile%\AppData\Local\Chromium\User Data\Default\History" >NUL 2>&1
DEL /F /Q "%UserProfile%\AppData\Local\Chromium\User Data\Default\Visited Links" >NUL 2>&1
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\BrowserMetrics"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Crash pad"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Crashpad"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\GrShaderCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\PnaclTranslationCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\ShaderCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\System Profile"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Webstore Downloads"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\AutofillStrikeDatabase"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\blob_storage"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\BudgetDatabase"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\Cache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\Code Cache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\coupon_db"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\Crash pad"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\Crashpad"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\data_reduction_proxy_leveldb"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\Download Service"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\Feature Engagement Tracker"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\GCM Store"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\GPUCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\GrShaderCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\optimization_guide_hint_cache_store"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\optimization_guide_model_and_features_store"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\optimization_guide_model_metadata_store"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\Platform Notifications"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\Search Logos"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\Segmentation Platform"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\Service Worker"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\Session Storage"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\Sessions"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\shared_proto_db"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\Thumbnails"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\VideoDecodeStats"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\Web Applications"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\WebrtcVideoStats"
:NXT1
:: @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ Chrome Beta @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
:: Chrome Beta web browser user profile base/main directory/folder = %UserProfile%\AppData\Local\Google\Chrome Beta [where
:: %UserProfile% is C:\Users\Your_Name = Your_Name is replaced with your actual user name]:
TASKLIST.EXE>%TEMP%\CHROM_RUN!.TXT
FIND.EXE /I "CHROM" "%TEMP%\CHROM_RUN!.TXT" >NUL 2>&1
IF NOT ERRORLEVEL 1 GOTO NXT2
TAKEOWN.EXE /f "%UserProfile%\AppData\Local\Google\Chrome Beta" /r /d y >NUL 2>&1
ICACLS.EXE "%UserProfile%\AppData\Local\Google\Chrome Beta" /grant:R %UserName%:F Administrators:F /t /c /q >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome Beta\debug*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome Beta\*.corrupt" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome Beta\*crash*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome Beta\licens*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome Beta\about*.txt" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome Beta\CHANGELOG*.txt" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome Beta\*licens*.txt" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome Beta\*.bak" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome Beta\*.pma" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome Beta\BrowserMetric*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome Beta\CrashpadMetric*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome Beta\Cach*.pak" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome Beta\*.old" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome Beta\*.tmp" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome Beta\LOCK" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome Beta\lockfil*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome Beta\LOG" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome Beta\chrome_shut*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome Beta\*-journal.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\File System\00000*" >NUL 2>&1
DEL /F /Q "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\Local Storage\leveldb\*.ldb" >NUL 2>&1
DEL /F /Q "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\History" >NUL 2>&1
DEL /F /Q "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\Visited Links" >NUL 2>&1
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\BrowserMetrics"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Crash pad"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Crashpad"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\GrShaderCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\PnaclTranslationCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\ShaderCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\System Profile"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Webstore Downloads"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\AutofillStrikeDatabase"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\blob_storage"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\BudgetDatabase"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\Cache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\Code Cache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\coupon_db"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\Crash pad"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\Crashpad"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\data_reduction_proxy_leveldb"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\Download Service"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\Feature Engagement Tracker"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\GCM Store"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\GPUCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\GrShaderCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\optimization_guide_hint_cache_store"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\optimization_guide_model_and_features_store"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\optimization_guide_model_metadata_store"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\Platform Notifications"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\Search Logos"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\Segmentation Platform"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\Service Worker"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\Session Storage"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\Sessions"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\shared_proto_db"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\Thumbnails"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\VideoDecodeStats"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\Web Applications"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\WebrtcVideoStats"
:NXT2
:: @@@@@@@@@@@@@@@@@@@@@@@ Chrome Dev(eloper) (Canary) @@@@@@@@@@@@@@@@@@@@@@@
:: Chrome Dev(eloper) (Canary) web browser user profile base/main directory/folder =
:: %UserProfile%\AppData\Local\Google\Chrome SxS [where %UserProfile% is C:\Users\Your_Name = Your_Name is replaced with
:: your actual user name]:
TASKLIST.EXE>%TEMP%\CHROM_RUN!.TXT
FIND.EXE /I "CHROM" "%TEMP%\CHROM_RUN!.TXT" >NUL 2>&1
IF NOT ERRORLEVEL 1 GOTO NXT3
TAKEOWN.EXE /f "%UserProfile%\AppData\Local\Google\Chrome SxS" /r /d y >NUL 2>&1
ICACLS.EXE "%UserProfile%\AppData\Local\Google\Chrome SxS" /grant:R %UserName%:F Administrators:F /t /c /q >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome SxS\debug*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome SxS\*.corrupt" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome SxS\*crash*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome SxS\licens*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome SxS\about*.txt" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome SxS\CHANGELOG*.txt" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome SxS\*licens*.txt" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome SxS\*.bak" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome SxS\*.pma" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome SxS\BrowserMetric*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome SxS\CrashpadMetric*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome SxS\Cach*.pak" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome SxS\*.old" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome SxS\*.tmp" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome SxS\LOCK" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome SxS\lockfil*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome SxS\LOG" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome SxS\chrome_shut*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome SxS\*-journal.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\File System\00000*" >NUL 2>&1
DEL /F /Q "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\Local Storage\leveldb\*.ldb" >NUL 2>&1
DEL /F /Q "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\History" >NUL 2>&1
DEL /F /Q "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\Visited Links" >NUL 2>&1
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\BrowserMetrics"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Crash pad"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Crashpad"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\GrShaderCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\PnaclTranslationCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\ShaderCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\System Profile"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Webstore Downloads"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\AutofillStrikeDatabase"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\blob_storage"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\BudgetDatabase"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\Cache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\Code Cache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\coupon_db"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\Crash pad"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\Crashpad"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\data_reduction_proxy_leveldb"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\Download Service"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\Feature Engagement Tracker"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\GCM Store"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\GPUCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\GrShaderCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\optimization_guide_hint_cache_store"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\optimization_guide_model_and_features_store"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\optimization_guide_model_metadata_store"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\Platform Notifications"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\Search Logos"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\Segmentation Platform"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\Service Worker"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\Session Storage"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\Sessions"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\shared_proto_db"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\Thumbnails"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\VideoDecodeStats"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\Web Applications"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\WebrtcVideoStats"
:NXT3
:: @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ Google Chrome @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
:: Google Chrome web browser user profile base/main directory/folder = %UserProfile%\AppData\Local\Google\Chrome [where
:: %UserProfile% is C:\Users\Your_Name = Your_Name is replaced with your actual user name]:
TASKLIST.EXE>%TEMP%\CHROM_RUN!.TXT
FIND.EXE /I "CHROM" "%TEMP%\CHROM_RUN!.TXT" >NUL 2>&1
IF NOT ERRORLEVEL 1 GOTO NXT4
TAKEOWN.EXE /f "%UserProfile%\AppData\Local\Google\Chrome" /r /d y >NUL 2>&1
ICACLS.EXE "%UserProfile%\AppData\Local\Google\Chrome" /grant:R %UserName%:F Administrators:F /t /c /q >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome\debug*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome\*.corrupt" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome\*crash*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome\licens*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome\about*.txt" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome\CHANGELOG*.txt" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome\*licens*.txt" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome\*.bak" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome\*.pma" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome\BrowserMetric*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome\CrashpadMetric*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome\Cach*.pak" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome\*.old" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome\*.tmp" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome\LOCK" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome\lockfil*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome\LOG" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome\chrome_shut*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome\*-journal.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\File System\00000*" >NUL 2>&1
DEL /F /Q "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\*.ldb" >NUL 2>&1
DEL /F /Q "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\History" >NUL 2>&1
DEL /F /Q "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\Visited Links" >NUL 2>&1
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\BrowserMetrics"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Crash pad"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Crashpad"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\GrShaderCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\PnaclTranslationCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\ShaderCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\System Profile"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Webstore Downloads"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\AutofillStrikeDatabase"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\blob_storage"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\Cache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\Code Cache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\coupon_db"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\Crash pad"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\Crashpad"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\Download Service"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\GCM Store"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\GPUCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\GrShaderCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_hint_cache_store"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_model_and_features_store"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_model_metadata_store"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\Platform Notifications"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\Search Logos"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\Segmentation Platform"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\Service Worker"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\Session Storage"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\Sessions"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\Thumbnails"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\VideoDecodeStats"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\Web Applications"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\WebrtcVideoStats"
:NXT4
:: @@@@@@@@@@@@@@@@@@@@@@@@@@@ Thorium/Thorium AVX2 @@@@@@@@@@@@@@@@@@@@@@@@@@
:: Thorium/Thorium AVX2 (Portable) web browsers user profile base/main directory/folder = %UserProfile%\AppData\Local\Thorium
:: [where %UserProfile% is C:\Users\Your_Name = Your_Name is replaced with your actual user name]:
TASKLIST.EXE>%TEMP%\CHROM_RUN!.TXT
FIND.EXE /I "THORIUM" "%TEMP%\CHROM_RUN!.TXT" >NUL 2>&1
IF NOT ERRORLEVEL 1 GOTO NXT5
TAKEOWN.EXE /f "%UserProfile%\AppData\Local\Thorium" /r /d y >NUL 2>&1
ICACLS.EXE "%UserProfile%\AppData\Local\Thorium" /grant:R %UserName%:F Administrators:F /t /c /q >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Thorium\debug*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Thorium\*.corrupt" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Thorium\*crash*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Thorium\licens*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Thorium\about*.txt" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Thorium\CHANGELOG*.txt" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Thorium\*licens*.txt" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Thorium\*.bak" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Thorium\*.pma" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Thorium\BrowserMetric*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Thorium\CrashpadMetric*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Thorium\Cach*.pak" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Thorium\*.old" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Thorium\*.tmp" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Thorium\LOCK" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Thorium\lockfil*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Thorium\LOG" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Thorium\chrome_shut*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Thorium\*-journal.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Thorium\User Data\Default\File System\00000*" >NUL 2>&1
DEL /F /Q "%UserProfile%\AppData\Local\Thorium\User Data\Default\Local Storage\leveldb\*.ldb" >NUL 2>&1
DEL /F /Q "%UserProfile%\AppData\Local\Thorium\User Data\Default\History" >NUL 2>&1
DEL /F /Q "%UserProfile%\AppData\Local\Thorium\User Data\Default\Visited Links" >NUL 2>&1
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\BrowserMetrics"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Crash pad"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Crashpad"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\GrShaderCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\PnaclTranslationCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\ShaderCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\System Profile"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Webstore Downloads"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\AutofillStrikeDatabase"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\blob_storage"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\BudgetDatabase"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\Cache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\Code Cache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\coupon_db"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\Crash pad"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\Crashpad"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\data_reduction_proxy_leveldb"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\Download Service"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\Feature Engagement Tracker"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\GCM Store"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\GPUCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\GrShaderCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\optimization_guide_hint_cache_store"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\optimization_guide_model_and_features_store"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\optimization_guide_model_metadata_store"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\Platform Notifications"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\Search Logos"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\Segmentation Platform"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\Service Worker"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\Session Storage"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\Sessions"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\shared_proto_db"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\Thumbnails"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\VideoDecodeStats"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\Web Applications"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\WebrtcVideoStats"
:NXT5
:: @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ Brave @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
:: Brave (Portable) web browser user profile base/main directory/folder = %UserProfile%\AppData\Local\BraveSoftware [where
:: %UserProfile% is C:\Users\Your_Name = Your_Name is replaced with your actual user name]:
TASKLIST.EXE>%TEMP%\CHROM_RUN!.TXT
FIND.EXE /I "BRAVE" "%TEMP%\CHROM_RUN!.TXT" >NUL 2>&1
IF NOT ERRORLEVEL 1 GOTO NXT6
TAKEOWN.EXE /f "%UserProfile%\AppData\Local\BraveSoftware" /r /d y >NUL 2>&1
ICACLS.EXE "%UserProfile%\AppData\Local\BraveSoftware" /grant:R %UserName%:F Administrators:F /t /c /q >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\BraveSoftware\debug*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\BraveSoftware\*.corrupt" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\BraveSoftware\*crash*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\BraveSoftware\licens*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\BraveSoftware\about*.txt" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\BraveSoftware\CHANGELOG*.txt" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\BraveSoftware\*licens*.txt" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\BraveSoftware\*.bak" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\BraveSoftware\*.pma" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\BraveSoftware\BrowserMetric*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\BraveSoftware\CrashpadMetric*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\BraveSoftware\Cach*.pak" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\BraveSoftware\*.old" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\BraveSoftware\*.tmp" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\BraveSoftware\LOCK" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\BraveSoftware\lockfil*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\BraveSoftware\LOG" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\BraveSoftware\chrome_shut*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\BraveSoftware\*-journal.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\File System\00000*" >NUL 2>&1
DEL /F /Q "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\Local Storage\leveldb\*.ldb" >NUL 2>&1
DEL /F /Q "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\History" >NUL 2>&1
DEL /F /Q "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\Visited Links" >NUL 2>&1
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\BrowserMetrics"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Crash pad"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Crashpad"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\GrShaderCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\PnaclTranslationCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\ShaderCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\System Profile"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Webstore Downloads"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\AutofillStrikeDatabase"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\blob_storage"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\BudgetDatabase"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\Cache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\Code Cache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\coupon_db"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\Crash pad"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\Crashpad"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\data_reduction_proxy_leveldb"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\Download Service"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\Feature Engagement Tracker"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\GCM Store"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\GPUCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\GrShaderCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\optimization_guide_hint_cache_store"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\optimization_guide_model_and_features_store"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\optimization_guide_model_metadata_store"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\Platform Notifications"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\Search Logos"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\Segmentation Platform"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\Service Worker"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\Session Storage"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\Sessions"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\shared_proto_db"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\Thumbnails"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\VideoDecodeStats"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\Web Applications"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\WebrtcVideoStats"
:NXT6
:: @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ Vivaldi @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
:: Vivaldi (Install standalone) web browser user profile base/main directory/folder = %UserProfile%\AppData\Local\Vivaldi
:: [where %UserProfile% is C:\Users\Your_Name = Your_Name is replaced with your actual user name]:
TASKLIST.EXE>%TEMP%\CHROM_RUN!.TXT
FIND.EXE /I "VIVALDI" "%TEMP%\CHROM_RUN!.TXT" >NUL 2>&1
IF NOT ERRORLEVEL 1 GOTO NXT7
TAKEOWN.EXE /f "%UserProfile%\AppData\Local\Vivaldi" /r /d y >NUL 2>&1
ICACLS.EXE "%UserProfile%\AppData\Local\Vivaldi" /grant:R %UserName%:F Administrators:F /t /c /q >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Vivaldi\debug*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Vivaldi\*.corrupt" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Vivaldi\*crash*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Vivaldi\licens*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Vivaldi\about*.txt" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Vivaldi\CHANGELOG*.txt" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Vivaldi\*licens*.txt" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Vivaldi\*.bak" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Vivaldi\*.pma" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Vivaldi\BrowserMetric*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Vivaldi\CrashpadMetric*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Vivaldi\Cach*.pak" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Vivaldi\*.old" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Vivaldi\*.tmp" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Vivaldi\LOCK" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Vivaldi\lockfil*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Vivaldi\LOG" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Vivaldi\chrome_shut*.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Vivaldi\*-journal.*" >NUL 2>&1
DEL /F /Q /S "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\File System\00000*" >NUL 2>&1
DEL /F /Q "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\Local Storage\leveldb\*.ldb" >NUL 2>&1
DEL /F /Q "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\History" >NUL 2>&1
DEL /F /Q "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\Visited Links" >NUL 2>&1
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\BrowserMetrics"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Crash pad"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Crashpad"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\GrShaderCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\PnaclTranslationCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\ShaderCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\System Profile"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Webstore Downloads"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\AutofillStrikeDatabase"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\blob_storage"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\BudgetDatabase"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\Cache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\Code Cache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\coupon_db"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\Crash pad"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\Crashpad"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\data_reduction_proxy_leveldb"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\Download Service"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\Feature Engagement Tracker"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\GCM Store"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\GPUCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\GrShaderCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\optimization_guide_hint_cache_store"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\optimization_guide_model_and_features_store"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\optimization_guide_model_metadata_store"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\Platform Notifications"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\Search Logos"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\Segmentation Platform"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\Service Worker"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\Session Storage"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\Sessions"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\shared_proto_db"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\Thumbnails"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\VideoDecodeStats"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\Web Applications"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\WebrtcVideoStats"
:NXT7
:: @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ X-Chromium @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
:: X-Chromium (X-Launcher) Portable running Chromium [chrome.exe] web browser base/main directory/folder = C:\PORT\CHROME
:: (example). *MUST* change drive letter +/- directories/folders names to match yours:
TASKLIST.EXE>%TEMP%\CHROM_RUN!.TXT
FIND.EXE /I "X-CHROM" "%TEMP%\CHROM_RUN!.TXT" >NUL 2>&1
IF NOT ERRORLEVEL 1 GOTO NXT8
TAKEOWN.EXE /f "C:\PORT\CHROME" /r /d y >NUL 2>&1
ICACLS.EXE "C:\PORT\CHROME" /grant:R %UserName%:F Administrators:F /t /c /q >NUL 2>&1
DEL /F /Q /S "C:\PORT\CHROME\debug*.*" >NUL 2>&1
DEL /F /Q /S "C:\PORT\CHROME\*.corrupt" >NUL 2>&1
DEL /F /Q /S "C:\PORT\CHROME\*crash*.*" >NUL 2>&1
DEL /F /Q /S "C:\PORT\CHROME\licens*.*" >NUL 2>&1
DEL /F /Q /S "C:\PORT\CHROME\about*.txt" >NUL 2>&1
DEL /F /Q /S "C:\PORT\CHROME\CHANGELOG*.txt" >NUL 2>&1
DEL /F /Q /S "C:\PORT\CHROME\*licens*.txt" >NUL 2>&1
DEL /F /Q /S "C:\PORT\CHROME\*.bak" >NUL 2>&1
DEL /F /Q /S "C:\PORT\CHROME\*.pma" >NUL 2>&1
DEL /F /Q /S "C:\PORT\CHROME\BrowserMetric*.*" >NUL 2>&1
DEL /F /Q /S "C:\PORT\CHROME\CrashpadMetric*.*" >NUL 2>&1
DEL /F /Q /S "C:\PORT\CHROME\Cach*.pak" >NUL 2>&1
DEL /F /Q /S "C:\PORT\CHROME\*.old" >NUL 2>&1
DEL /F /Q /S "C:\PORT\CHROME\*.tmp" >NUL 2>&1
DEL /F /Q /S "C:\PORT\CHROME\LOCK" >NUL 2>&1
DEL /F /Q /S "C:\PORT\CHROME\lockfil*.*" >NUL 2>&1
DEL /F /Q /S "C:\PORT\CHROME\LOG" >NUL 2>&1
DEL /F /Q /S "C:\PORT\CHROME\chrome_shut*.*" >NUL 2>&1
DEL /F /Q /S "C:\PORT\CHROME\*-journal.*" >NUL 2>&1
DEL /F /Q /S "C:\PORT\CHROME\USER\CHROME\DEFAULT\File System\00000*" >NUL 2>&1
DEL /F /Q "C:\PORT\CHROME\USER\CHROME\DEFAULT\Local Storage\leveldb\*.ldb" >NUL 2>&1
DEL /F /Q "C:\PORT\CHROME\USER\CHROME\DEFAULT\History" >NUL 2>&1
DEL /F /Q "C:\PORT\CHROME\USER\CHROME\DEFAULT\Visited Links" >NUL 2>&1
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\BrowserMetrics"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\Crash pad"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\Crashpad"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\GrShaderCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\PnaclTranslationCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\ShaderCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\System Profile"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\Webstore Downloads"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\AutofillStrikeDatabase"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\blob_storage"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\BudgetDatabase"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\Cache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\Code Cache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\coupon_db"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\Crash pad"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\Crashpad"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\data_reduction_proxy_leveldb"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\Download Service"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\Feature Engagement Tracker"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\GCM Store"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\GPUCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\GrShaderCache"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\optimization_guide_hint_cache_store"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\optimization_guide_model_and_features_store"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\optimization_guide_model_metadata_store"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\Platform Notifications"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\Search Logos"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\Segmentation Platform"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\Service Worker"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\Session Storage"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\Sessions"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\shared_proto_db"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\Thumbnails"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\VideoDecodeStats"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\Web Applications"
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\WebrtcVideoStats"
:: X-Chromium Temp (Temporary) directory/folder = %TEMP%\X-Chromium [where %TEMP% is by default
:: C:\Users\Your_Name\AppData\Local\Temp = Your_Name is replaced with your actual user name]:
TAKEOWN.EXE /f "%TEMP%\X-Chromium" /r /d y >NUL 2>&1
ICACLS.EXE "%TEMP%\X-Chromium" /grant:R %UserName%:F Administrators:F /t /c /q >NUL 2>&1
RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%TEMP%\X-Chromium"
:NXT8
:: @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ The End @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
IF EXIST "%TEMP%\CHROM_RUN!.TXT" DEL /F /Q "%TEMP%\CHROM_RUN!.TXT" >NUL 2>&1
:END
:: EXIT
------End cut & paste here------
ADVPACK.DLL, ICACLS.EXE, RUNDLL32.EXE + TAKEOWN.EXE are all located in the %WinDir%\SYSTEM32 folder [%WinDir% = usually
C:\WINDOWS], listed in your system PATH.
View all directories/folders listed in your system PATH from a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE):
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter:
PATH
Similar cleaning tools:
CCleaner Free [ CRIPPLED ! ] bloat, insecure, obsolete, outdated, uninstalled, unnecessary, unneeded, unsafe, unused,
unwanted, useless, wasteful system, registry + software folders + files cleaner, fixer, remover + uninstaller for Windows
XP/newer:
http://www.ccleaner.com/ccleaner/download/
Download [Installer EXE + Portable ZIP]:
http://www.ccleaner.com/ccleaner/builds/
CCleaner Free Guide + Review:
http://www.lifewire.com/ccleaner-review-2625143/
More info, guides + tools:
- MDGx "Digital + Internet/Online Privacy, Security + Safety" chapter
http://www.mdgx.com/7.php#:~:text=Digital%20%2B%20Internet%2FOnline%20Privacy%2C%20Security%20%2B%20Safety%20%3D%20Your%20Top%20Priority
-> "@ Chromium/Chrome web browsers + alternatives/derivatives/forks/variants:"
http://www.mdgx.com/7.php#:~:text=%40%20Chromium%2FChrome%20web%20browsers%20%2B%20alternatives%2Fderivatives%2Fforks%2Fvariants%3A
section in WINDOWS7.TXT (this file).
http://www.mdgx.com/7.php
http://www.mdgx.com/WINDOWS7.TXT
- MDGx collection of Chromium/Chrome web browsers -> "Chromium + Chrome" section in SOFTWARE.TXT (included):
http://www.mdgx.com/nettoys.htm#CHR
- MDGx collection of essential Chromium/Chrome extensions + tweaks -> "CHROMIUM" section in TOOLS.TXT (included):
http://www.mdgx.com/tools.php#:~:text=CHROMIUM%20%5B%2A%5D
http://www.mdgx.com/TOOLS.TXT
______________________________________________________________________________



Put A Pin In It!



* Pin (stick) any file/executable/shortcut/link/URL/etc to Taskbar in Windows 7:
http://www.howtogeek.com/66670/from-the-tips-box-pin-any-file-to-the-taskbar/
1. Desktop -> right-click -> New -> Shortcut -> create an empty place holder file (example): New Text Document (.txt).
2. Rename this file extension (the group of letters after the last dot) from txt to exe.
3. Drag it onto the Taskbar to pin it.
4. Go to this folder:
%UserName%\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar
5. Replace this empty file with a real shortcut to your actual file/executable/shortcut/link/URL/etc.
You must rename your newly created shortcut to match exactly the already pinned file name shortcut (if any)!
6. Force Taskbar icons to refresh: Task Manager -> restart Windows Explorer, log/sign back in or restart/reboot.

* Repair/customize Pin to Taskbar function + add more file types to the Pin to Taskbar right-click menu:
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{90AA3A4E-1CBA-4233-B8BB-535773D48449}]
@="Taskband Pin"
"ImplementsVerbs"="taskbarpin;taskbarunpin"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{90AA3A4E-1CBA-4233-B8BB-535773D48449}\InProcServer32]
@=hex(2):25,53,79,73,74,65,6d,52,6f,6f,74,25,5c,73,79,73,74,65,6d,33,32,5c,73,\
  68,65,6c,6c,33,32,2e,64,6c,6c,00
"ThreadingModel"="Apartment"
[HKEY_LOCAL_MACHINE\Software\Classes\*\shellex\ContextMenuHandlers\{90AA3A4E-1CBA-4233-B8BB-535773D48449}]
@="Taskband Pin"
[HKEY_LOCAL_MACHINE\Software\Classes\.lnk\shellex\ContextMenuHandlers\{90AA3A4E-1CBA-4233-B8BB-535773D48449}]
@="Taskband Pin"
[HKEY_LOCAL_MACHINE\Software\Classes\lnkfile\shellex\ContextMenuHandlers\{90AA3A4E-1CBA-4233-B8BB-535773D48449}]
@="Taskband Pin"
[HKEY_LOCAL_MACHINE\Software\Classes\.bat\shellex\ContextMenuHandlers\{90AA3A4E-1CBA-4233-B8BB-535773D48449}]
@="Taskband Pin"
[HKEY_LOCAL_MACHINE\Software\Classes\batfile\shellex\ContextMenuHandlers\{90AA3A4E-1CBA-4233-B8BB-535773D48449}]
@="Taskband Pin"
[HKEY_LOCAL_MACHINE\Software\Classes\.cmd\shellex\ContextMenuHandlers\{90AA3A4E-1CBA-4233-B8BB-535773D48449}]
@="Taskband Pin"
[HKEY_LOCAL_MACHINE\Software\Classes\cmdfile\shellex\ContextMenuHandlers\{90AA3A4E-1CBA-4233-B8BB-535773D48449}]
@="Taskband Pin"
[HKEY_LOCAL_MACHINE\Software\Classes\.php\shellex\ContextMenuHandlers\{90AA3A4E-1CBA-4233-B8BB-535773D48449}]
@="Taskband Pin"
[HKEY_LOCAL_MACHINE\Software\Classes\phpfile\shellex\ContextMenuHandlers\{90AA3A4E-1CBA-4233-B8BB-535773D48449}]
@="Taskband Pin"
[HKEY_LOCAL_MACHINE\Software\Classes\.hta\shellex\ContextMenuHandlers\{90AA3A4E-1CBA-4233-B8BB-535773D48449}]
@="Taskband Pin"
[HKEY_LOCAL_MACHINE\Software\Classes\htafile\shellex\ContextMenuHandlers\{90AA3A4E-1CBA-4233-B8BB-535773D48449}]
@="Taskband Pin"
[HKEY_LOCAL_MACHINE\Software\Classes\.htt\shellex\ContextMenuHandlers\{90AA3A4E-1CBA-4233-B8BB-535773D48449}]
@="Taskband Pin"
[HKEY_LOCAL_MACHINE\Software\Classes\httfile\shellex\ContextMenuHandlers\{90AA3A4E-1CBA-4233-B8BB-535773D48449}]
@="Taskband Pin"
[HKEY_LOCAL_MACHINE\Software\Classes\.reg\shellex\ContextMenuHandlers\{90AA3A4E-1CBA-4233-B8BB-535773D48449}]
@="Taskband Pin"
[HKEY_LOCAL_MACHINE\Software\Classes\regfile\shellex\ContextMenuHandlers\{90AA3A4E-1CBA-4233-B8BB-535773D48449}]
@="Taskband Pin"
[HKEY_LOCAL_MACHINE\Software\Classes\.txt\shellex\ContextMenuHandlers\{90AA3A4E-1CBA-4233-B8BB-535773D48449}]
@="Taskband Pin"
[HKEY_LOCAL_MACHINE\Software\Classes\txtfile\shellex\ContextMenuHandlers\{90AA3A4E-1CBA-4233-B8BB-535773D48449}]
@="Taskband Pin"
[HKEY_LOCAL_MACHINE\Software\Classes\Directory\shellex\ContextMenuHandlers\{90AA3A4E-1CBA-4233-B8BB-535773D48449}]
@="Taskband Pin"
[HKEY_LOCAL_MACHINE\Software\Classes\Drive\shellex\ContextMenuHandlers\{90AA3A4E-1CBA-4233-B8BB-535773D48449}]
@="Taskband Pin"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\MSILink\shellex\ContextMenuHandlers\{90AA3A4E-1CBA-4233-B8BB-535773D48449}]
@="Taskband Pin"
;
------End cut & paste here------

* Enable Pin to Taskbar/Start Menu right-click items for files/folders/items/links/shortcuts:
http://www.sevenforums.com/tutorials/5547-taskbar-pinned-programs-enable-disable.html
http://www.helpdeskgeek.com/windows-7/pin-to-taskbar-missing-in-windows-7/
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Explorer]
"NoPinningToTaskbar"=-
"TaskbarNoPinnedList"=-
[HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Explorer]
"NoPinningToTaskbar"=-
"TaskbarNoPinnedList"=-
[HKEY_USERS\.DEFAULT\Software\Policies\Microsoft\Windows\Explorer]
"NoPinningToTaskbar"=-
"TaskbarNoPinnedList"=-
;
------End cut & paste here------

* Pin to Taskbar: Add to/remove from right-click context menu in Windows 7:
http://www.sevenforums.com/tutorials/196235-pin-taskbar-add-remove-context-menu-windows-7-a.html

* Pin an External Drive to Taskbar in Windows 7:
http://www.howtogeek.com/howto/27903/how-to-pin-an-external-drive-to-the-windows-7-taskbar/

* Pin Special Items to Taskbar:
http://www.digitalcitizen.life/how-pin-special-windows-shortcuts-taskbar/
______________________________________________________________________________



XP -> 7/8/8.1 Easy Transfer Files + Settings



* Default System + User(s) built-in/default/preset "special" directories/folders (hard links = LDIDs) names, locations,
equivalents + transition: Windows XP/2003 -> Windows Vista/2008/7/8/8.1/2012:
http://en.wikipedia.org/wiki/Special_folder
http://www.nirsoft.net/utils/special_folders_view.html
http://social.technet.microsoft.com/wiki/contents/articles/6083.windows-xp-folders-and-locations-vs-windows-7-and-vista.aspx
Most of these "special" folders are also valid in Windows 10/2016/2019/11/2022/newer.

XP/2003:                 C:\Documents and Settings\All Users\Start Menu
Vista/2008/7/8/8.1/2012: C:\ProgramData\Microsoft\Windows\Start Menu

XP/2003:                 C:\Documents and Settings\%UserName%\Application Data\Microsoft\Internet Explorer\Quick Launch
Vista/2008/7/8/8.1/2012: C:\Users\%UserName%\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch

XP/2003:                 C:\Documents and Settings\All Users\Desktop
Vista/2008/7/8/8.1/2012: C:\Users\Public\Desktop

XP/2003:                 C:\Documents and Settings\All Users\Application Data\PROGRAM_NAME
Vista/2008/7/8/8.1/2012: C:\ProgramData\PROGRAM_NAME

XP/2003:                 C:\Documents and Settings\%UserName%\Application Data\PROGRAM_NAME
Vista/2008/7/8/8.1/2012: C:\Users\%UserName%\AppData\Local\PROGRAM_NAME

XP/2003:                 C:\Documents and Settings\All Users
Vista/2008/7/8/8.1/2012: C:\ProgramData

XP/2003:                 C:\Users\%UserName%\Documents\My Pictures
Vista/2008/7/8/8.1/2012: C:\Users\%UserName%\Pictures

XP/2003:                 C:\Users\%UserName%\Documents\My Music
Vista/2008/7/8/8.1/2012: C:\Users\%UserName%\Music

XP/2003:                 C:\Documents and Settings\%UserName%\My Documents
Vista/2008/7/8/8.1/2012: C:\Users\%UserName%\Documents

XP/2003:                 C:\Documents and Settings\%UserName%\My Documents\My Music
Vista/2008/7/8/8.1/2012: C:\Users\%UserName%\Music

XP/2003:                 C:\Documents and Settings\%UserName%\My Documents\My Pictures
Vista/2008/7/8/8.1/2012: C:\Users\%UserName%\Pictures

XP/2003:                 C:\Documents and Settings\%UserName%\My Documents\My Videos
Vista/2008/7/8/8.1/2012: C:\Users\%UserName%\Videos

XP/2003:                 C:\Documents and Settings\%UserName%\Application Data
Vista/2008/7/8/8.1/2012: C:\Users\%UserName%\AppData\Roaming

XP/2003:                 C:\Documents and Settings\%UserName%\Local Settings
Vista/2008/7/8/8.1/2012: C:\Users\%UserName%\Local

XP/2003:                 C:\Documents and Settings\%UserName%\Start Menu
Vista/2008/7/8/8.1/2012: C:\Users\%UserName%\AppData\Roaming\Microsoft\Windows\Start Menu

XP/2003:                 C:\Documents and Settings\%UserName%\Templates
Vista/2008/7/8/8.1/2012: C:\Users\%UserName%\AppData\Roaming\Microsoft\Windows\Templates

XP/2003:                 C:\Documents and Settings\All Users\Start Menu
Vista/2008/7/8/8.1/2012: C:\ProgramData\Microsoft\Windows\Start Menu

XP/2003:                 C:\Documents and Settings\Default User
Vista/2008/7/8/8.1/2012: C:\Users\Default

See also "Link Directory IDentifier (LDID)/DIRectory IDentifier (DIRID)/Decentralized IDentifier (DID)..." +
"* List of System + User Shell Folders in Windows Vista/newer:" topics further above:
http://www.mdgx.com/7.php
http://www.mdgx.com/WINDOWS7.TXT

* Windows Easy Transfer (WET) from XP/Vista to 7 [and beyond...]:
http://technet.microsoft.com/library/ff943667.aspx
- WET 32-bit for XP 32-bit:
http://www.microsoft.com/download/details.aspx?id=4503
- WET 64-bit for XP 64-bit:
http://www.microsoft.com/download/details.aspx?id=9926
- WET 32-bit for Vista 32-bit:
http://www.microsoft.com/download/details.aspx?id=14179
- WET 64-bit for Vista 64-bit:
http://www.microsoft.com/download/details.aspx?id=20483
- WET 32-bit for XP 32-bit (x86) + WET 64-bit for XP 64-bit (x64):
http://www.microsoft.com/download/details.aspx?id=7349
WET XP/Vista -> 7 Guide:
http://petri.com/transfer-user-files-and-settings-from-windows-xpvista-to-windows-7/
http://www.howtogeek.com/howto/3179/migrate-xp-to-windows-7-with-easy-transfer-and-a-usb-drive/

* Windows XP to 7 Hard Link Migration (HLM) of User Files + Settings:
http://www.microsoft.com/download/details.aspx?id=18913
HLM DOCument [DOC format, right-click to save]:
http://download.microsoft.com/download/8/9/D/89DC758B-3E81-42F6-84E1-E3E9AD790196/Windows%20XP%20to%20Windows%207%20Hard-Link%20Migration%20of%20User%20Files%20and%20Settings.docx
______________________________________________________________________________



Turn OFF/ON Windows Features



* Enable and Disable Windows Features in Windows XP/newer:
http://www.helpdeskgeek.com/how-to/enable-and-disable-windows-features/

* Remove Windows Features You Don't Need:
http://www.itprotoday.com/windows-7-tip-week-remove-windows-features-you-dont-need/

* Windows Features You Can Add or Remove:
http://www.digitalcitizen.life/what-are-those-windows-features-you-can-add-or-remove/

* Turn Windows 7 Features ON or OFF:
http://www.techsupportalert.com/content/how-turn-windows-7-features-or.htm
______________________________________________________________________________



Tweak Windows 7/7 SP1 Services



* Disable/(re)enable, stop/(re)start, clean/repair/restore + customize/optimize/tweak Windows 7/newer services responsible
for/contributing to/involved in/interconnected/interdependent/(inter)related to: dangerous/insecure/unsafe,
undesirable/unnecessary/unneeded/unused/useless,
automatic/unattended/forced/hidden/intrusive/invasive/buggy/unwanted/behind-your-back/without-your-consent,
annoying/bloat/resources consuming, diagnostic tracking, telemetry ("phone home"), data collection/logging, customer
"experience", unwanted "offers", ad(vertisment)s/adware/spyware, privacy/safety/security flaws/vulnerabilities:
View/(Re)Start/Stop/(Re)Enable/Disable, set to Disabled/Manual/Automatic Windows Services -> Start button/logo/orb -> Run...
[hold WinKey + press R] -> type:
services.msc
-> press Enter -> customize/optimize/tweak Windows Services after learning about them.
Services.msc is located in the %WinDir%\SYSTEM32 folder [%WinDir% = usually C:\WINDOWS].
View all directories/folders listed in your system PATH from a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE):
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter:
PATH
- Windows 7 SP1 Services Configuration:
http://www.blackviper.com/service-configurations/black-vipers-windows-7-service-pack-1-service-configurations/
- Windows 7 Services Configuration:
http://www.blackviper.com/service-configurations/black-vipers-windows-7-service-configurations/
- Windows 7/7 SP1 Services:
http://batcmd.com/windows/7/services/
- Windows 7/7 SP1 Service Defaults:
http://revertservice.com/7/
- Windows Services Encyclopedia:
http://www.windows-security.org/windows-services-encyclopedia/
- Windows 7/7 SP1: Disabling Unneeded Services:
http://www.sourcedaddy.com/windows-7/disabling-unneeded-services.html
- Restore Default Services in Windows 7/newer:
http://www.majorgeeks.com/content/page/restore_or_verify_default_services_in_windows_7_10.html
- Windows 8/8.1 Services:
http://batcmd.com/windows/8/services/
- List of all Windows Services:
http://www.blackviper.com/windows-services/
- List of all Running, Stopped + Disable Windows Services:
http://www.thewindowsclub.com/extract-list-of-running-stopped-disabled-services/
- Windows 8.1 Services Configuration:
http://www.blackviper.com/service-configurations/black-vipers-windows-8-1-service-configurations/
- Windows 8 Services Configuration:
http://www.blackviper.com/service-configurations/black-vipers-windows-8-service-configurations/
- Windowss 7 Disable Unnecessary Services:
http://sites.google.com/site/100pricin/speeding-up-your-pc/disable-unnecessary-services/
- Windows Vista SP2 Services Configuration:
http://www.blackviper.com/service-configurations/black-vipers-windows-vista-service-pack-2-service-configurations/
- Windows XP SP3 Services Configuration:
http://www.blackviper.com/WinXP/servicecfg.htm
- Windows XP Services Guide:
http://web.archive.org/web/20171129164138/http://www.theeldergeek.com/services_guide.htm
- Windows XP Services Tweak Guide:
http://www.techspot.com/tweaks/winxp_services/
- Windows XP Services Removal Guide:
http://www.overclockersclub.com/guides/windows_xp_services/
- Windows 2000 SP4+ Services Configuration:
http://www.blackviper.com/WIN2K/servicecfg.htm
- Wikipedia: Windows Service:
http://en.wikipedia.org/wiki/Windows_service
- Wikipedia: List of Windows Services:
http://en.wikipedia.org/wiki/List_of_Microsoft_Windows_components#Services
See also:
- MDGx "Windows 10/11 Tweaks, Fixes, Guides, Downloads + Links" -> "Tweak Windows 10/11 Services" chapter in WIN10.TXT
(included):
http://www.mdgx.com/10.php
http://www.mdgx.com/WIN10.TXT
- MDGx "HOSTS Files, Guides + Tools" -> "NOTE 2: DNS Client Service" -> "More info:":
http://www.mdgx.com/hosts.php#N2
- MDGx "Windows NTx Services tweaking tools [free(ware)]" -> "SERVICES" section in TOOLS.TXT (included):
http://www.mdgx.com/tools.php
http://www.mdgx.com/TOOLS.TXT

* Autoruns 32-bit + 64-bit GUI interface (Autoruns.exe 32-bit + Autoruns64.exe 64-bit) + DOS console command line
(Autorunsc.exe 32-bit + Autorunsc64.exe 64-bit) registry + startup tools add/disable/edit/enable/rename/remove any/all
automated/built-in/default/preset/unattended (auto)load/(auto)run entries: boot/logon/startup apps, drivers, executables
(.exe), gadgets (.gadget), loading/registered APIs/DLLs (.dll), programs, services, scripts (.bat, .cmd, .reg, .vbs, etc),
scheduled tasks (.job), highly customizable:
http://learn.microsoft.com/sysinternals/downloads/autoruns/
File:
http://download.sysinternals.com/files/Autoruns.zip

* ServiWin 32-bit + 64-bit displays, stops/(re)starts, pauses/continues + disables/(re)enables Windows services + drivers:
http://www.nirsoft.net/utils/serviwin.html
ServiWin 64-bit:
http://www.nirsoft.net/utils/serviwin-x64.zip
ServiWin 32-bit:
http://www.nirsoft.net/utils/serviwin.zip
Create complete Drivers + Services HTML Report(s):
ServiWin -> Help -> Run As Administrator [or hold Ctrl + press F11] -> View -> HTML Report - All Items.

* To tweak all available Windows services depending on your installed Windows NTx OS build/edition/release/update/version +
bit strength [32-bit (x86) or 64-bit (x64)]: right-click on SERVICES.HTA (included)
http://www.mdgx.com/SERVICES.HTA
-> Run as Administrator [will open by default in Internet Explorer (IE) web browser] -> scroll down the list -> tweak
available (listed) services: Automatic, Manual (Demand) or Disabled -> click "Save Changes" button.
To view a list of all running Windows services from within SERVICES.HTA: click "View SERV_LOG.TXT" button (will be saved by
default in the same directory/folder where SERVICES.HTA resides) -> double-click on SERV_LOG.TXT -> will open in your
Notepad/similar/better plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
associated with text (.txt) files as default program.
HTML Application (HTA):
http://en.wikipedia.org/wiki/HTML_Application
MDGx SERVICES.HTA = based on JSWare XPFix XPFixServ.hta script:
http://www.jsware.net/jsware/xpfix.php5
XPFix (freeware):
http://www.jsware.net/jsware/zips/fixpack.zip

* Save/view/print different types of lists + details for all/enabled/running/specific Windows Services from a DOS console or
PowerShell command line, and these tasks can be automated by running them as Administrator from within plain text BATch
(.bat) or CoMmanD (.cmd) script files:
http://docs.microsoft.com/powershell/module/microsoft.powershell.management/get-service/
http://www.shellhacks.com/windows-list-services-cmd-powershell/
http://www.thewindowsclub.com/extract-list-of-running-stopped-disabled-services/
http://serverfault.com/questions/203471/
Save your list(s) + details for all your enabled/disabled/manual/running/stopped services to text file(s) from a DOS console
command prompt (%WinDir%\SYSTEM32\CMD.EXE): right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run these commands
-> press Enter after each line (examples):
NET.EXE START>SVC_STARTED.TXT
WMIC.EXE SERVICE list full /format:list>SVC_FULL.TXT
WMIC.EXE SERVICE list>SVC_LIST.TXT
WMIC.EXE path Win32_Service where state='Running' get /format:csv>SVC_LIST.CSV
TASKLIST.EXE /SVC /FI "imagename eq svchost.exe">SVC_HOST.TXT
TASKLIST.EXE /SVC | FIND.EXE "svchost.exe">SVC_HOST2.TXT
TASKLIST.EXE /SVC>SVC_TASK.TXT
SC.EXE QUERY state= all|FINDSTR.EXE "DISPLAY_NAME STATE">SVC_STATE.TXT
SC.EXE QUERY type= service>SVC_ALL.TXT
WMIC.exe is located in the %WinDir%\SYSTEM32\wbem folder [%WinDir% = usually C:\WINDOWS], listed on your system PATH.
View all directories/folders listed in your system PATH from a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE):
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter:
PATH
WMIC (Windows Management Instrumentation Command):
http://docs.microsoft.com/windows/win32/wmisdk/wmic/
MS DOCs: WMIC:
http://technet.microsoft.com/library/bb742610.aspx
Dedoimedo: WMIC - The Windows secret weapon:
http://www.dedoimedo.com/computers/windows-wmic.html
ComputerHope: WMIC:
http://www.computerhope.com/wmic.htm
Rob van der Woude: WMIC:
http://www.robvanderwoude.com/wmic.php
quux: WMIC Snippets:
http://quux.wiki.zoho.com/WMIC-Snippets.html
SS64: WMIC.EXE:
http://www.ss64.com/nt/wmic.html
Wikipedia: WMI:
http://en.wikipedia.org/wiki/Windows_Management_Instrumentation
You can also use PowerShell commands: right-click PowerShell shortcut or
C:\WINDOWS\System32\WindowsPowerShell\v1.0\PowerShell.exe [default location] -> Run as Administrator -> run these commands
-> press Enter after each line (examples):
Get-Service | Where-Object {$_.Status -eq "Running"} | Out-File -filepath "SVC_RUNNING.TXT"
Get-Service | Where {$_.Status -eq "Running"} | Export-Csv -path "SVC_RUNNING.CSV"
Get-WmiObject win32_service | select Name, DisplayName, State, PathName | Export-Csv -path "SVC_RUN.CSV"
All text files above will be saved by default in the directory/folder you're running these executables or DOS/PowerShell
consoles from, unless you've specified a different/specific destination. To change destination you need to add the full path
(drive letter + directory/folder name) in front of each text file (C:\Services used in this example):
NET.EXE START>C:\Services\SVC_STARTED.TXT
View all these ANSI/Unicode text files using Notepad/similar/better free(ware) plain text/ASCII editor/viewer:
http://www.mdgx.com/toy.htm#TXT

* Turn OFF Windows Enterprise Vista/newer + Windows Server 2008/newer BranchCache [PeerDistSvc] service used only for Wide
Area Network (WAN) bandwidth optimization if not deploying/maintaining/running/servicing a WAN network hosted on, or from
your business/enterprise/personal/private computer(s)/server(s):
http://docs.microsoft.com/windows-server/networking/branchcache/branchcache/
http://docs.microsoft.com/windows-server/networking/core-network-guide/cncg/bc-hcm/1-deploy-bc-hcm/
http://searchenterprisedesktop.techtarget.com/definition/Microsoft-Windows-BranchCache/
http://en.wikipedia.org/wiki/Wide_area_network
Disable BranchCache [PeerDistSvc] service from a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE): right-click CMD
shortcut/CMD.EXE -> Run as Administrator -> run these commands -> press Enter after each line:
ECHO Y|NET.EXE STOP PeerDistSvc
SC.EXE CONFIG PeerDistSvc START= disabled
OR:
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\PeerDistSvc]
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\PeerDistSvc]
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\PeerDistSvc]
"Start"=dword:4
;
------End cut & paste here------
______________________________________________________________________________



Turn OFF Action/Security Center + Notifications/Messages



* Turn OFF/stop/disable Windows Security Center (WSC) service from a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE):
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run these commands -> press Enter after each line:
ECHO Y|NET.EXE STOP wscsvc
SC.EXE CONFIG wscsvc START= disabled
REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\services\wscsvc" /v Start /t REG_DWORD /d 4 /f

* Turn OFF Action/Defender/Security Center + annoying balloon tips/security/taskbar/tile/toast
notifications/messages/pop-ups in Windows 7/newer:
http://www.tenforums.com/tutorials/105486-enable-disable-notifications-windows-security-windows-10-a.html
http://www.heelpbook.net/2019/windows-10-disable-notifications-and-notifications-balloons/
http://www.techrepublic.com/article/how-to-change-windows-10-toast-notifications-into-balloon-notifications/
http://www.askvg.com/secret-trick-to-disable-turn-off-annoying-feature-advertisement-balloon-notifications-in-windows-7/
http://admx.help/?Category=Windows_10_2016&Policy=Microsoft.Policies.TaskBar2::TaskbarNoNotification
http://www.groovypost.com/howto/windows-8-7-disable-notification-balloons-taskbar/
http://www.howtogeek.com/howto/windows-vista/disable-all-notification-balloons-in-windows-vista/
http://www.heelpbook.net/2019/windows-10-disable-notifications-and-notifications-balloons/
http://www.technorms.com/24581/
http://smallvoid.com/article/winnt-balloon-tip.html
http://superuser.com/questions/883745/
http://social.technet.microsoft.com/forums/en-us/c5b66543-5b2f-4399-946a-bbd4fa4baccc/
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer]
"DisableActionCenter"=dword:1
"DisableNotificationCenter"=dword:1
"DisableSearchBoxSuggestions"=dword:1
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer]
"DisableActionCenter"=dword:1
"DisableNotificationCenter"=dword:1
"DisableSearchBoxSuggestions"=dword:1
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer]
"DisableActionCenter"=dword:1
"DisableNotificationCenter"=dword:1
"DisableSearchBoxSuggestions"=dword:1
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Explorer]
"DisableActionCenter"=dword:1
"DisableNotificationCenter"=dword:1
"DisableSearchBoxSuggestions"=dword:1
"HideSCAHealth"=dword:1
[HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Explorer]
"DisableActionCenter"=dword:1
"DisableNotificationCenter"=dword:1
"DisableSearchBoxSuggestions"=dword:1
"HideSCAHealth"=dword:1
[HKEY_USERS\.DEFAULT\Software\Policies\Microsoft\Windows\Explorer]
"DisableActionCenter"=dword:1
"DisableNotificationCenter"=dword:1
"DisableSearchBoxSuggestions"=dword:1
"HideSCAHealth"=dword:1
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer]
"HideSCAHealth"=dword:1
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]
"HideSCAHealth"=dword:1
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]
"HideSCAHealth"=dword:1
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Svc]
"AntiVirusDisableNotify"=dword:1
"FirewallDisableNotify"=dword:1
"UpdatesDisableNotify"=dword:1
[HKEY_CURRENT_USER\Software\Microsoft\Security Center\Svc]
"AntiVirusDisableNotify"=dword:1
"FirewallDisableNotify"=dword:1
"UpdatesDisableNotify"=dword:1
[HKEY_USERS\.DEFAULT\Software\Microsoft\Security Center\Svc]
"AntiVirusDisableNotify"=dword:1
"FirewallDisableNotify"=dword:1
"UpdatesDisableNotify"=dword:1
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications]
"DisableEnhancedNotifications"=dword:1
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ImmersiveShell]
"UseActionCenterExperience"=dword:0
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\CloudContent]
"DisableSoftLanding"=dword:1
[HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Explorer]
"EnableLegacyBalloonNotifications"=dword:1
"NoBalloonFeatureAdvertisements"=dword:1
[HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Explorer]
"EnableLegacyBalloonNotifications"=dword:1
"NoBalloonFeatureAdvertisements"=dword:1
[HKEY_USERS\.DEFAULT\Software\Policies\Microsoft\Windows\Explorer]
"EnableLegacyBalloonNotifications"=dword:1
"NoBalloonFeatureAdvertisements"=dword:1
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer]
"TaskbarNoNotification"=dword:0
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]
"TaskbarNoNotification"=dword:0
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]
"TaskbarNoNotification"=dword:0
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced]
"EnableBalloonTips"=dword:0
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced]
"EnableBalloonTips"=dword:0
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced]
"EnableBalloonTips"=dword:0
;
------End cut & paste here------

* Turn ON Balloon Tips Taskbar Notifications/Messages in Windows 7/newer:
http://smallvoid.com/article/winnt-balloon-tip.html
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced]
"EnableBalloonTips"=dword:1
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced]
"EnableBalloonTips"=dword:1
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced]
"EnableBalloonTips"=dword:1
;
------End cut & paste here------

* Turn OFF all Action/Security Center (Automatic/Scheduled Maintenance) annoying check boxes/messages/notifications/pop-ups
in Windows 7/newer:
http://technet.microsoft.com/library/dd492018.aspx
http://docs.microsoft.com/previous-versions/technet-magazine/images/dd492018.alerts3.jpg.jpg
http://social.technet.microsoft.com/forums/en-us/w7itproui/thread/83dc3de6-70b7-450f-992c-60511e4a6c4f/
http://www.winaero.com/blog/registry-tweak-to-disable-action-center-notifications-in-windows-7/
http://www.thewindowsclub.com/automatic-maintenance-windows-8/
http://www.winhelponline.com/blog/automatic-maintenance-disable-schedule-windows-8-10/
http://www.hongkiat.com/blog/windows-action-center-message/
http://www.thewindowsclub.com/turn-off-security-and-maintenance-messages-in-windows-10/
http://www.tenforums.com/tutorials/40161-manually-start-stop-automatic-maintenance-windows-10-a.html
http://thegeekpage.com/manually-start-and-disable-automatic-maintenance-in-windows-10/
http://www.makeuseof.com/how-to-fix-windows-unable-to-run-automatic-maintenance-error/
Turn OFF/stop all automatic/scheduled maintenance + security actions/functions/tasks from a DOS console command prompt
(%WinDir%\SYSTEM32\CMD.EXE): right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command:
MSchedExe.exe Stop
-> press Enter.
MicroSoft Schedule Executable (Automatic Maintenance) tool [MSchedExe.exe] is located in the %WinDir%\SYSTEM32 folder
[%WinDir% = usually C:\WINDOWS].
View all directories/folders listed in your system PATH from a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE):
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter:
PATH
Start -> Control Panel (CP) or Run... [hold WinKey + press R] -> type:
control.exe
-> press Enter -> Action Center -> Maintenance -> right hand down arrow -> Automatic Maintenance -> Turn on messages about
Automatic Maintenance -> Change maintenance settings -> UNcheck "Allow scheduled maintenanace to wake up my computer at the
scheduled time" box -> Action Center -> Change Action Center settings -> Maintenance messages -> UNcheck
"Automatic Maintenance" box -> OK.
Start -> Control Panel (CP) or Run... [hold WinKey + press R] -> type:
control.exe
-> press Enter -> System and Security category -> Security and Maintenance -> Change Security and Maintenance settings ->
Turn messages on or off -> UNcheck all available Security messages and Maintenance messages boxes [unfortunately some are
unavailable depending on specific OSes/policies/settings/restrictions ;-(] -> OK.
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\Maintenance]
"MaintenanceDisabled"=dword:1
[-HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Action Center]
[-HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center]
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{01979c6a-42fa-414c-b8aa-eee2c8202018}.check.100]
"CheckSetting"=hex:01,00,00,00,d0,8c,9d,df,01,15,d1,11,8c,7a,00,c0,4f,c2,97,eb,\
  01,00,00,00,a1,83,01,f4,91,88,0b,41,99,d1,cd,6e,b8,2a,4c,5d,00,00,00,00,02,\
  00,00,00,00,00,10,66,00,00,00,01,00,00,20,00,00,00,e2,97,b6,5b,6f,60,f3,7b,\
  cf,53,6b,b5,dd,de,0c,32,fb,f9,f1,c9,a8,85,75,4e,23,ce,3e,a7,8d,0e,21,cf,00,\
  00,00,00,0e,80,00,00,00,02,00,00,20,00,00,00,9b,6b,77,a4,52,21,2c,5e,09,d6,\
  47,f4,f5,02,52,bc,79,e8,ce,e2,7e,71,31,32,a3,15,6a,c0,4d,bf,d3,1e,b0,00,00,\
  00,9e,cc,3b,5a,c9,eb,a5,6b,aa,3b,f5,05,22,45,bd,ac,7d,03,ce,1b,58,ea,69,30,\
  ed,81,64,17,75,c5,ea,ea,04,51,ad,cb,bf,a3,e8,f8,f4,0b,f1,ed,49,db,04,ce,eb,\
  c0,da,d7,7e,bb,d6,81,86,66,23,70,b3,30,9c,5b,53,70,c6,04,d4,5a,67,39,27,4b,\
  7c,43,14,74,72,38,95,aa,53,1c,af,5d,44,42,61,09,27,01,14,54,b3,d8,f5,e5,d1,\
  5c,65,96,23,50,65,35,66,65,9a,e3,da,af,a4,73,e6,0d,39,17,87,4d,1a,40,67,df,\
  f9,51,ef,00,c5,63,d6,01,24,be,43,80,1c,b9,e2,92,dd,7a,e5,8e,5e,45,80,da,a7,\
  22,c8,65,85,04,0e,6d,1d,4b,44,99,52,70,a3,13,e1,d4,bd,da,8a,b0,27,31,5f,f2,\
  29,fb,40,00,00,00,0f,e8,43,32,cd,b1,1d,1d,fa,34,dd,6b,08,25,af,42,62,02,b9,\
  b7,fe,61,ec,60,98,37,23,8e,46,d9,b9,4f,56,dd,21,be,99,8f,5f,03,dc,e4,2d,81,\
  21,95,78,8c,2f,08,d2,4e,cc,27,9d,3f,1e,07,f2,fa,3c,72,8b,11
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{01979c6a-42fa-414c-b8aa-eee2c8202018}.check.101]
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{11CD958A-C507-4EF3-B3F2-5FD9DFBD2C78}.check.101]
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{852FB1F8-5CC6-4567-9C0E-7C330F8807C2}.check.100]
"CheckSetting"=hex:23,00,41,00,43,00,42,00,6c,00,6f,00,62,00,00,00,00,00,00,00,\
  00,00,00,00,01,00,00,00,00,00,00,00,00,00,00,00
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{852FB1F8-5CC6-4567-9C0E-7C330F8807C2}.check.101]
"CheckSetting"=hex:23,00,41,00,43,00,42,00,6c,00,6f,00,62,00,00,00,00,00,00,00,\
  00,00,00,00,01,00,00,00,00,00,00,00,00,00,00,00
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{945a8954-c147-4acd-923f-40c45405a658}.check.42]
"CheckSetting"=hex:01,00,00,00,d0,8c,9d,df,01,15,d1,11,8c,7a,00,c0,4f,c2,97,eb,\
  01,00,00,00,a1,83,01,f4,91,88,0b,41,99,d1,cd,6e,b8,2a,4c,5d,00,00,00,00,02,\
  00,00,00,00,00,10,66,00,00,00,01,00,00,20,00,00,00,19,0e,64,43,a7,00,37,cc,\
  24,94,48,4a,2f,79,3f,13,dc,b3,c1,11,80,fe,61,e4,1b,6b,dd,9b,41,f7,7e,03,00,\
  00,00,00,0e,80,00,00,00,02,00,00,20,00,00,00,ea,0c,21,40,a1,54,3d,98,be,f1,\
  ed,1f,99,a2,ba,63,23,41,ea,e8,a3,43,8d,ae,e8,8c,4f,d4,e8,3a,8a,26,30,00,00,\
  00,b1,00,f7,23,f2,4d,60,8d,f0,b1,6e,f1,6e,b5,c9,78,4f,ed,14,7f,5c,de,4c,e4,\
  04,1e,7e,75,b9,06,91,1d,90,50,7f,9a,ea,af,ed,80,76,e5,2b,72,18,b6,2d,1c,40,\
  00,00,00,90,5e,71,72,21,df,fd,63,3a,5b,ad,c8,fb,3d,64,54,3c,a3,2b,e6,c0,df,\
  24,c0,77,73,8b,11,9c,41,8e,0b,fe,a6,8c,53,d7,6b,88,e8,f2,b0,38,32,b2,7f,dd,\
  4f,cc,97,2d,0d,7a,27,6a,c5,7b,6d,8c,26,e0,46,17,24
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{A5268B8E-7DB5-465b-BAB7-BDCDA39A394A}.check.100]
"CheckSetting"=hex:01,00,00,00,d0,8c,9d,df,01,15,d1,11,8c,7a,00,c0,4f,c2,97,eb,\
  01,00,00,00,a1,83,01,f4,91,88,0b,41,99,d1,cd,6e,b8,2a,4c,5d,00,00,00,00,02,\
  00,00,00,00,00,10,66,00,00,00,01,00,00,20,00,00,00,ee,7c,38,98,5d,96,3f,0e,\
  57,4f,ff,44,e3,44,cc,7f,44,aa,43,a7,dd,0d,e4,9f,43,4c,4a,89,bd,9e,d6,70,00,\
  00,00,00,0e,80,00,00,00,02,00,00,20,00,00,00,50,ca,d8,2e,60,f7,f0,7d,ac,7c,\
  ea,2c,ca,42,fb,5e,1d,d3,aa,8c,b2,04,3f,3c,b4,ab,71,e6,fc,ca,e9,c3,30,00,00,\
  00,4a,a2,2c,d5,41,4b,db,ce,12,a4,d4,09,46,93,dc,56,cd,de,1e,a6,7c,96,ec,89,\
  a5,58,6c,75,2c,1d,26,de,07,11,0e,78,92,38,53,2c,d7,29,1b,f4,7d,8c,a7,5f,40,\
  00,00,00,0b,53,d6,4e,ed,cf,f0,45,61,82,6a,a8,43,61,68,45,b9,db,b7,66,e7,bc,\
  be,cb,de,61,47,7c,87,78,6d,86,02,9f,55,c4,79,d1,23,af,5d,02,98,8a,2e,1e,90,\
  97,1d,7b,5e,89,05,0c,8e,e8,1e,27,b9,bb,8a,7b,72,db
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.check.0]
"CheckSetting"=hex:01,00,00,00,d0,8c,9d,df,01,15,d1,11,8c,7a,00,c0,4f,c2,97,eb,\
  01,00,00,00,a1,83,01,f4,91,88,0b,41,99,d1,cd,6e,b8,2a,4c,5d,00,00,00,00,02,\
  00,00,00,00,00,10,66,00,00,00,01,00,00,20,00,00,00,d4,9a,ac,e0,26,2d,59,a0,\
  0a,44,ef,45,da,f6,cc,32,29,96,0a,a8,78,16,aa,3f,b4,47,af,75,7c,3f,1c,3b,00,\
  00,00,00,0e,80,00,00,00,02,00,00,20,00,00,00,9a,86,a6,87,00,84,58,01,25,5b,\
  79,f0,c8,c8,f1,85,9e,8f,f9,87,7b,81,69,df,28,1d,3f,d5,b1,c3,81,df,30,00,00,\
  00,5e,7d,46,e7,14,df,a6,d2,f2,6c,78,be,ab,97,b5,fd,89,56,2d,a5,4f,56,60,f5,\
  f6,db,18,dd,23,62,38,cc,79,c3,28,70,42,52,19,34,e0,19,5b,3a,ff,c3,cb,d4,40,\
  00,00,00,3a,2d,33,0c,59,9c,3d,e5,83,74,b4,dc,a8,49,38,44,aa,45,00,5b,7a,e0,\
  20,88,d3,67,8b,e5,48,d7,e9,79,10,0b,03,1e,ab,54,1f,24,a1,2f,0a,d3,8d,d5,36,\
  c0,45,7f,f9,55,43,71,53,d0,33,9e,cd,86,25,2c,6d,13
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{DAB69A6A-4D2A-4D44-94BF-E0091898C881}.check.100]
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.100]
"CheckSetting"=hex:01,00,00,00,d0,8c,9d,df,01,15,d1,11,8c,7a,00,c0,4f,c2,97,eb,\
  01,00,00,00,a1,83,01,f4,91,88,0b,41,99,d1,cd,6e,b8,2a,4c,5d,00,00,00,00,02,\
  00,00,00,00,00,10,66,00,00,00,01,00,00,20,00,00,00,93,86,7f,88,25,8c,28,ff,\
  12,39,7f,42,77,8e,46,d5,59,5b,a4,76,35,19,c7,87,98,10,b1,82,de,41,1d,30,00,\
  00,00,00,0e,80,00,00,00,02,00,00,20,00,00,00,fd,b3,73,53,df,86,fc,a7,27,47,\
  7b,88,c9,d2,c5,45,b4,ac,59,79,8a,0a,4d,ce,86,c4,55,fc,ee,47,d0,87,c0,00,00,\
  00,4a,f1,21,2f,78,91,0f,ac,18,54,e3,d8,ae,54,9a,af,62,c1,bd,57,2e,b4,a7,a3,\
  18,c0,8c,32,97,2c,f4,c9,2e,99,ad,86,6b,a4,12,3d,c3,87,ad,cb,30,0a,29,a9,db,\
  8e,f3,77,f7,e9,c2,9c,b6,dc,f5,78,64,50,b7,b3,32,24,4e,51,c7,73,8e,a9,0d,e1,\
  0c,12,ee,23,7d,0c,b0,a2,5f,88,5d,2c,f1,67,12,78,f2,04,10,95,b1,bc,c2,c2,b3,\
  4e,c7,78,33,ba,6d,ad,0e,58,ca,df,d4,40,f5,0c,33,dd,40,0d,fa,0e,5c,28,9a,ef,\
  e4,e9,c1,98,e3,af,3e,c1,de,8a,7d,f0,51,0d,d1,0d,69,da,b9,a2,8d,a1,e6,27,b6,\
  92,f9,25,8c,e1,90,1f,88,c9,37,c6,2e,b6,c3,3a,75,29,bf,b1,d3,b6,1e,ed,25,ec,\
  6b,66,15,0f,0d,a8,b5,3e,fe,0b,f8,bd,2a,9b,7b,da,f6,d7,40,00,00,00,b0,72,34,\
  cc,3e,fa,f5,30,42,1f,49,ee,f9,5b,46,06,9f,d1,42,3d,44,71,56,31,8c,d4,e1,bb,\
  56,ae,45,d4,4d,c9,f2,09,3f,74,38,5e,d2,f4,7e,dc,04,14,fd,d5,fc,70,c4,5c,10,\
  1a,ac,1f,61,64,5a,45,fb,db,d4,ec
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.101]
"CheckSetting"=hex:01,00,00,00,d0,8c,9d,df,01,15,d1,11,8c,7a,00,c0,4f,c2,97,eb,\
  01,00,00,00,a1,83,01,f4,91,88,0b,41,99,d1,cd,6e,b8,2a,4c,5d,00,00,00,00,02,\
  00,00,00,00,00,10,66,00,00,00,01,00,00,20,00,00,00,dd,2a,0c,dd,13,91,60,6a,\
  a9,97,de,a5,ba,bc,51,67,76,55,d5,7e,a3,37,3b,b1,5a,1c,b2,f3,92,6d,42,fb,00,\
  00,00,00,0e,80,00,00,00,02,00,00,20,00,00,00,df,a7,27,7a,99,16,f0,64,e5,67,\
  92,ba,2b,ff,20,28,4b,8a,ee,ad,de,f3,60,2d,a4,a1,51,91,ac,c9,78,c6,30,00,00,\
  00,ae,25,b6,95,e6,50,f1,eb,62,51,42,3e,2c,b0,3d,cc,52,a7,af,ca,76,8d,20,94,\
  bc,23,67,6b,21,ad,f3,cd,76,13,77,07,44,24,70,34,d9,2c,f6,69,51,26,e9,59,40,\
  00,00,00,dd,dc,47,be,c7,2a,60,af,73,88,c1,1a,17,cd,fd,c8,bb,ba,b1,83,41,d9,\
  83,7b,e2,e1,02,3e,98,82,68,da,b4,33,08,19,8a,d6,52,57,89,72,eb,71,49,26,b1,\
  b0,e9,79,0b,d2,8e,d8,6c,25,ca,e2,6c,e5,95,48,1e,11
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.102]
"CheckSetting"=hex:01,00,00,00,d0,8c,9d,df,01,15,d1,11,8c,7a,00,c0,4f,c2,97,eb,\
  01,00,00,00,a1,83,01,f4,91,88,0b,41,99,d1,cd,6e,b8,2a,4c,5d,00,00,00,00,02,\
  00,00,00,00,00,10,66,00,00,00,01,00,00,20,00,00,00,50,43,6c,78,43,64,b3,b1,\
  27,00,50,6a,2b,4b,af,34,d0,fc,8e,5f,21,3f,cd,e8,f2,7b,e4,00,68,18,68,50,00,\
  00,00,00,0e,80,00,00,00,02,00,00,20,00,00,00,20,5c,4c,a9,2d,ca,57,f5,03,b7,\
  7a,bd,40,93,cb,57,5c,1b,22,3b,be,e3,2e,ac,42,05,b3,db,2d,0e,c8,3f,c0,00,00,\
  00,07,a8,4e,ed,97,93,7e,ce,82,0b,ff,c9,15,cd,88,1d,cc,5a,7d,c7,6e,9a,c8,5e,\
  c1,7b,ca,b1,be,dd,8b,44,b2,93,06,6f,7a,24,91,42,79,af,25,57,84,27,bd,65,83,\
  ff,e4,a9,bd,22,fe,88,70,b1,98,a8,29,f7,ef,e4,b8,00,77,16,28,76,4e,77,04,93,\
  e5,42,b3,f1,06,2a,0c,66,29,b9,7f,55,18,68,ac,44,c9,94,10,80,5a,e2,06,0e,4c,\
  e6,72,0e,e2,41,8a,86,b8,64,bb,1e,84,20,35,11,d9,ac,22,d5,40,c3,38,74,cf,39,\
  18,5d,d0,8f,dc,c0,1c,56,9e,f5,71,40,af,2c,9e,a5,0e,64,18,fb,6c,87,14,72,a3,\
  26,de,70,da,7c,89,88,1e,5d,d7,eb,1f,a0,8e,e0,54,b4,6f,71,d3,ec,c7,03,dd,93,\
  df,56,01,c0,a2,02,bd,94,13,77,d9,e9,43,5a,8c,a8,58,54,40,00,00,00,9a,80,b6,\
  56,38,cb,d9,d0,3f,35,bd,3e,80,7f,1c,3e,a0,55,8c,b8,86,97,cd,37,e6,15,3a,be,\
  92,6c,0d,2d,d5,6c,f2,fe,fe,be,85,5e,61,38,2c,df,ea,95,20,71,6b,54,a1,64,c2,\
  ab,55,4a,9f,02,95,62,0c,db,2c,d0
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.103]
"CheckSetting"=hex:01,00,00,00,d0,8c,9d,df,01,15,d1,11,8c,7a,00,c0,4f,c2,97,eb,\
  01,00,00,00,a1,83,01,f4,91,88,0b,41,99,d1,cd,6e,b8,2a,4c,5d,00,00,00,00,02,\
  00,00,00,00,00,10,66,00,00,00,01,00,00,20,00,00,00,4d,55,53,40,ef,8f,10,36,\
  39,ae,1c,0d,10,f9,80,c8,20,3e,b9,0d,ff,84,8e,2e,36,85,de,cf,45,17,6c,1d,00,\
  00,00,00,0e,80,00,00,00,02,00,00,20,00,00,00,f9,93,5f,9c,d1,c3,fe,85,e1,68,\
  63,62,de,6e,93,f5,be,98,a6,d2,c5,c1,9a,2a,b7,10,42,cc,00,44,4e,35,c0,00,00,\
  00,16,4c,65,18,f5,45,89,04,5f,ba,f9,b7,95,d8,ed,13,c8,d0,12,65,be,eb,4d,e4,\
  08,ab,03,5f,35,e5,cf,1c,8d,ac,87,4f,fd,d4,f9,e3,1d,e8,eb,21,db,50,7f,b2,b8,\
  09,d9,b9,30,88,e1,c2,c3,b9,c8,27,96,9b,b7,97,47,77,17,8a,78,f3,53,bb,01,97,\
  88,2d,09,ed,45,ae,85,2c,73,cb,58,9f,33,9f,9a,94,e9,8c,cd,45,5d,b9,f1,46,9f,\
  59,15,7a,93,06,e3,2f,80,66,01,4b,f7,a4,83,d2,e5,bc,14,7e,ac,6a,67,5e,2b,01,\
  18,98,64,14,67,02,3f,a8,46,7b,1b,02,d1,8e,bd,20,ca,47,4b,10,44,e7,10,5b,93,\
  03,a7,6a,c6,71,3a,b8,23,25,52,09,94,d4,10,0c,ac,5b,07,ba,35,62,cd,80,1d,75,\
  dc,9b,ff,93,d6,a3,c4,80,20,f7,13,f5,a8,ed,2a,49,7d,97,40,00,00,00,da,46,de,\
  34,ca,77,5d,0c,1c,22,44,d5,63,db,32,e7,21,e3,7c,33,90,fe,b2,5e,9a,5a,eb,97,\
  01,ce,34,28,61,31,31,57,37,22,0a,d5,bd,0d,4d,5d,64,92,f1,f9,7e,5f,b3,ef,86,\
  50,23,89,03,0f,c9,4e,62,62,f2,85
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.104]
"CheckSetting"=hex:01,00,00,00,d0,8c,9d,df,01,15,d1,11,8c,7a,00,c0,4f,c2,97,eb,\
  01,00,00,00,a1,83,01,f4,91,88,0b,41,99,d1,cd,6e,b8,2a,4c,5d,00,00,00,00,02,\
  00,00,00,00,00,10,66,00,00,00,01,00,00,20,00,00,00,9e,a4,f2,e2,eb,85,47,db,\
  39,da,e1,fa,da,4d,30,6e,26,52,76,84,8d,ca,13,bb,d0,55,93,9a,ab,55,de,da,00,\
  00,00,00,0e,80,00,00,00,02,00,00,20,00,00,00,bd,39,4f,bb,23,43,4b,9d,13,6d,\
  b6,c3,28,a7,b1,0f,ae,c8,3d,7e,29,b9,1e,96,6d,99,15,87,33,d8,a2,7d,30,00,00,\
  00,34,d6,09,4e,22,cd,04,4b,14,38,76,96,36,3b,37,42,41,ee,a1,82,bc,8a,fd,22,\
  35,1d,b3,8f,04,0b,f4,46,30,0c,39,02,6e,7b,e8,ae,7e,f8,56,7f,dc,68,5d,5c,40,\
  00,00,00,79,8b,22,ff,81,23,92,b2,9b,9a,9b,41,91,f3,0e,7f,65,d4,e0,5b,ee,6b,\
  7d,b1,c8,59,f5,f2,0b,33,70,30,e3,3f,0b,99,4a,09,97,5e,90,8c,4c,ce,7b,62,07,\
  ce,74,7c,b0,21,7d,9f,2b,a0,b1,63,f8,06,ae,45,c2,66
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.106]
;
------End cut & paste here------
______________________________________________________________________________



Logon + Password Tweaks



* NOTE:
All these tweaks work with all Windows 7/newer + Server 2008/newer releases, and most even with Windows XP/newer + Server
2003/newer.

* WMIC.EXE DOS console command line tool:
Disable PasswordExpiryWarning DWORD [REG_DWORD] Registry value:
http://technet.microsoft.com/library/ee829687.aspx
Disable Password expiration for all accounts using WMIC.EXE command:
http://www.sevenforums.com/tutorials/73210-password-expiration-enable-disable.html
http://www.cocosenor.com/articles/windows-10/4-ways-to-disable-or-enable-windows-10-password-expiration-notification.html
Enable "Password never expires" network logon setting [disable PasswordExpiryWarning registry value] from a DOS console
command prompt (%WinDir%\SYSTEM32\CMD.EXE): right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command ->
press Enter:
WMIC.exe UserAccount set PasswordExpires=False
WMIC.exe is located in the %WinDir%\SYSTEM32\wbem folder [%WinDir% = usually C:\WINDOWS], listed on your system PATH.
View all directories/folders listed in your system PATH from a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE):
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter:
PATH
WMIC (Windows Management Instrumentation Command):
http://learn.microsoft.com/windows/win32/wmisdk/wmic/
MS DOCs: WMIC:
http://technet.microsoft.com/library/bb742610.aspx
Dedoimedo: WMIC - The Windows secret weapon:
http://www.dedoimedo.com/computers/windows-wmic.html
ComputerHope: WMIC:
http://www.computerhope.com/wmic.htm
Rob van der Woude: WMIC:
http://www.robvanderwoude.com/wmic.php
quux: WMIC Snippets:
http://quux.wiki.zoho.com/WMIC-Snippets.html
SS64: WMIC.EXE:
http://www.ss64.com/nt/wmic.html
Wikipedia: WMI:
http://en.wikipedia.org/wiki/Windows_Management_Instrumentation

* NET.EXE DOS console command line tool:
http://www.ss64.com/nt/net.html
http://www.lifewire.com/net-user-command-2618097/
http://www.ghacks.net/2017/05/24/manage-windows-users-with-net-user/
NET.EXE is located in the %WinDir%\SYSTEM32 folder [%WinDir% = usually C:\WINDOWS], listed on your system PATH.
View all directories/folders listed in your system PATH from a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE):
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter:
PATH
Syntax:
NET [ ACCOUNTS | COMPUTER | CONFIG | CONTINUE | FILE | GROUP | HELP |
      HELPMSG | LOCALGROUP | NAME | PAUSE | PRINT | SEND | SESSION |
      SHARE | START | STATISTICS | STOP | TIME | USE | USER | VIEW ]
Logon, Lockout + Password enforcement (Run as Administrator):
C:\>NET.EXE ACCOUNTS
Force user logoff how long after time expires?:       Never
Minimum password age (days):                          999
Maximum password age (days):                          Unlimited
Minimum password length:                              0
Length of password history maintained:                None
Lockout threshold:                                    Never
Lockout duration (minutes):                           0
Lockout observation window (minutes):                 0
Computer role:                                        WORKSTATION
Run as Administrator:
NET ACCOUNTS /?
http://www.ss64.com/nt/net-useradmin.html
http://support.microsoft.com/help/556003/
http://technet.microsoft.com/library/dd277400.aspx
Syntax:
NET ACCOUNTS
	[/FORCELOGOFF:{minutes|NO}]
	[/MINPWLEN:length]
	[/MAXPWAGE:{days|UNLIMITED}]
	[/MINPWAGE:days]
	[/UNIQUEPW:number]
	[/DOMAIN]
	[/lockoutwindow:(0-99999) MUST be = or > than "Lockout duration" number]
http://www.sevenforums.com/tutorials/72271-account-lockout-reset-invalid-logon-counter.html
	[/lockoutduration:(1-99999) MUST be = or < than "Lockout observation window" number]
http://www.sevenforums.com/tutorials/72258-account-lockout-duration-locked-out-user-accounts.html
Disable Password age, expiration + length restrictions + Lockout timeouts from a DOS console command prompt
(%WinDir%\SYSTEM32\CMD.EXE): right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter:
NET.EXE ACCOUNTS /lockoutduration:0 /lockoutwindow:0 /MAXPWAGE:UNLIMITED /MINPWAGE:999 /FORCELOGOFF:NO
OR, alternatively, this command -> press Enter:
NET.EXE ACCOUNTS /lockoutduration:0 /lockoutwindow:0 /MINPWLEN:0 /MAXPWAGE:UNLIMITED /MINPWAGE:0 /FORCELOGOFF:NO

* WinLogon Registry Settings:
ReportBootOk:
http://franck.kiechel.free.fr/dbr_eng/WinLogon.htm
AutoAdminLogon:
http://support.microsoft.com/help/324737/
ShutdownFlags:
http://github.com/lithnet/idle-logoff/blob/master/src/Lithnet.IdleLogoff/ShutdownFlags.cs
http://social.technet.microsoft.com/forums/windows/aedfc165-5b2c-4f6c-ada8-144b2c7094e6/
DisableCAD:
http://support.microsoft.com/help/960271/
Tweaked WinLogon Registry file (example):
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
; Some of these settings apply only to Windows 32-bit OSes:
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"Background"="0 0 0"
"DebugServerCommand"="no"
"Shell"="explorer.exe"
"DefaultDomainName"=""
"DefaultUserName"=""
"DisableCAD"=dword:0
"AutoRestartShell"=dword:1
"CachedLogonsCount"="50"
"FirstLogon"=dword:0
"ForceUnlockLogon"=dword:0
"LegalNoticeCaption"=-
"LegalNoticeText"=-
"LogonType"=-
"PasswordExpiryWarning"=dword:fffffff3
"PowerdownAfterShutdown"="1"
"ShutdownWithoutLogon"="1"
"WinStationsDisabled"="0"
"ScRemoveOption"="0"
"ShutdownFlags"=dword:a
; "ShutdownFlags"=dword:2b
"EnableConcurrentSessions"=-
"AllowMultipleTSSessions"=-
"ParseAutoexec"=-
"ShowLogonOptions"=dword:0
; "IgnoreShiftOveride"=dword:0
"IgnoreShiftOveride"=-
"HibernationPreviouslyEnabled"=dword:0
"AutoAdminLogon"="1"
"AutoLogonCount"=-
"ReportControllerMissing"="false"
"ReportBootOk"="1"
"Welcome"="Your Account or Domain Name Goes Here"
;
------End cut & paste here------
______________________________________________________________________________



Clock Sync



* Fix "Time difference too great" Time Sync Error:
http://www.raymond.cc/blog/auto-sync-pc-clock-on-windows-startup/
Using one of the National Institute of Standards and Technology (NIST) NTP public servers in this example:
time-b.nist.gov
List of Network Time Protocol (NTP) public servers:
http://tf.nist.gov/tf-cgi/servers.cgi
http://support.ntp.org/bin/view/Servers/NTPPoolServers
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time]
"Start"=dword:3
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\Config]
"MaxPosPhaseCorrection"=dword:ffffffff
"EventLogFlags"=dword:0
"MaxNegPhaseCorrection"=dword:ffffffff
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\Parameters]
"ServiceDllUnloadOnStop"=dword:1
"NtpServer"="time-b.nist.gov"
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\TimeProviders\NtpClient]
"RunOnVirtualOnly"=dword:0
"Enabled"=dword:1
"EventLogFlags"=dword:0
"SignatureAuthAllowed"=dword:1
"AllowNonstandardModeCombinations"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\TimeProviders\NtpServer]
"RunOnVirtualOnly"=dword:0
"Enabled"=dword:1
"EventLogFlags"=dword:0
"ChainDisable"=dword:0
"RequireSecureTimeSyncRequests"=dword:0
"AllowNonstandardModeCombinations"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\TimeProviders\VMICTimeProvider]
"RunOnVirtualOnly"=dword:0
"Enabled"=dword:1
"EventLogFlags"=dword:0
"AllowNonstandardModeCombinations"=dword:1
;
------End cut & paste here------

* Run batch file (.BAT or .CMD) below to synchronize your computer clock with the NTP public server [time-b.nist.gov]
(example) specified under the "NtpServer" REG_SZ value (see above) in Windows 7/newer:
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text BATch (.bat) or CoMmanD (.cmd) script file containing the lines between Cut & Paste delimiters below
-> save it as plain text/ASCII file (Encode: -> ANSI) with the BAT (.bat) or CMD (.cmd) extension -> right-click it ->
Run as Administrator -> wait for completion.
-----Begin cut & paste here-----
@ECHO OFF
IF NOT "%OS%"=="Windows_NT" GOTO END
:: (1) Start Windows Time Server (W32Time) NTP service:
SC.EXE CONFIG W32Time START= demand
ECHO Y|NET.EXE START W32Time
:: (2) Synchronize computer clock with NTP public server (example):
W32TM.EXE /config /manualpeerlist:time-b.nist.gov /syncfromflags:manual /update
W32TM.EXE /resync
:: (3) Stop Windows Time Server (W32Time) NTP service:
ECHO Y|NET.EXE STOP W32Time
SC.EXE CONFIG W32Time START= demand
:END
EXIT
------End cut & paste here------

* Create a new Task (TaskSchd.msc) using batch file (.BAT or .CMD) above and schedule it to run periodically to sync your
computer clock unattended in the background in Windows 7/newer:
http://answers.microsoft.com/en-us/windows/forum/windows_7-performance/make-windows-7-task-scheduler-run-a-batch-file/0573dc2e-4941-44a2-8304-264864e94f1a/
http://answers.microsoft.com/en-us/windows/forum/windows_10-performance/make-windows-10-task-scheduler-run-a-batch-file/e00b2fb0-02ca-439f-b534-eb34541130a9/

* MS DOCs: Windows Time Service Tools + Settings:
http://technet.microsoft.com/library/cc773263.aspx
http://learn.microsoft.com/windows-server/networking/windows-time-service/Windows-Time-Service-Tools-and-Settings/

* Update Internet Time from the DOS console command line:
http://groups.google.com/forum/#!topic/alt.msdos.batch.nt/UpvUnYfxBkw/
http://www.netikka.net/tsneti/info/tscmd169.htm

* Synchronize Windows Clock with Internet Time Server:
http://www.guidingtech.com/3119/windows-clock-sync/

* Date/Time time server Simple Network Time Protocol (SNTP) synchronization client tools for Windows XP/newer [free(ware)]:
http://www.thewindowsclub.com/free-time-synchronization-software-windows/
http://www.raymond.cc/blog/auto-sync-pc-clock-on-windows-startup/
- Time Synchronizer:
http://www.itsamples.com/time-synchronizer.html
File:
http://www.itsamples.com/downloads/time-synchronizer.zip
- NetTime:
http://www.timesynctool.com/
- Dimension 4:
http://www.thinkman.com/dimension4/
Download:
http://www.thinkman.com/dimension4/download.htm
- Atomic Clock Sync (ACS):
http://www.worldtimeserver.com/atomic-clock/
- Time-Sync:
http://www.speed-soft.de/software/time_sync/
Download:
http://www.speed-soft.de/software/time_sync/details/download.php
- Neutron:
http://www.keir.net/neutron.html
File:
http://www.keir.net/download/neutron.zip

* Wikipedia: Time Server:
http://en.wikipedia.org/wiki/Time_server

* Wikipedia: Network Time Protocol (NTP):
http://en.wikipedia.org/wiki/Network_Time_Protocol
______________________________________________________________________________



Turn OFF/ON Link Layer Topology Discovery (LLTD) + Quality of Service (QoS)



Turn OFF/stop/disable Link Layer Topology Discovery (LLTD) + Quality of Service (QoS) networking/internet
protocols/settings in Windows 7/newer (respectively these 2 drivers + this 1 service):
- Link-Layer Topology Discovery Mapper I/O driver [lltdio] [%WinDir%\SYSTEM32\DRIVERS\lltdio.sys],
- Link-Layer Topology Discovery Mapper service [lltdsvc] [%WinDir%\SYSTEM32\lltdsvc.dll] +
- QoS (Quality of Service) Packet Scheduler driver [Psched] [%WinDir%\SYSTEM32\DRIVERS\pacer.sys].
%WinDir% = usually C:\WINDOWS directory/folder.
http://batcmd.com/windows/10/services/lltdio/
http://www.windows-security.org/windows-service/link-layer-topology-discovery-mapper/
http://batcmd.com/windows/10/services/lltdsvc/
http://learn.microsoft.com/windows/win32/services/services-and-redirected-drives/
http://helpdeskgeek.com/windows-10/4-fixes-when-you-cant-map-a-network-drive-in-windows-10/
http://batcmd.com/windows/10/services/psched/
http://learn.microsoft.com/previous-versions/windows/desktop/qos/link-layer-topology-discovery-protocol/
http://learn.microsoft.com/previous-versions/windows/desktop/qos/
http://en.wikipedia.org/wiki/Link_Layer_Topology_Discovery
http://en.wikipedia.org/wiki/Quality_of_service
http://en.wikipedia.org/wiki/IPv4
http://en.wikipedia.org/wiki/IPv6

That's because basic broadband/cable/Ethernet/local/satellite/internet/network/LAN/WAN/NIC/Wi-Fi/wireless/etc connection
without any add-ons/components/extensions/extras/optional features/services needs only 2 protocols to function properly:
- Internet Protocol Version 4 (IPv4) +
- Internet Protocol version 6 (IPv6),
as listed in Windows Control Panel (CP) -> All Control Panel Items -> Network and Sharing Center -> Change adapter settings
-> Your Connection icon/item/link/shortcut -> right-click -> Properties -> Networking tab -> "This connection uses the
following items:".
Optimizing your connection and ditching unnecessary/unused bloat allows your computers/devices/portables to perform faster,
preserve additional resources by saving CPU cycles, decreasing CPU load, saving memory space, minimizing
loadind/startup/operational/processing times, etc.
Added bonus: disabling unnecessary/unused networking/internet features/options translates into enhanced online privacy,
safety + security by closing potential open doors which can expose your computers/devices/portables to breaches, hacking,
malware, spying, etc.
This also implies you're not using and/or you don't care about any Microsoft and 3rd party for profit
automatic/behind-your-back/built-in/bundled/default/forced/hidden/intrusive/invasive/preset/without-your-consent,
annoying/bloat/resources consuming, undesirable/unnecessary/unneeded/unused/unwanted/useless ad(vertisment)s/adware,
"features", enrollments, "experience", memberships, "offers", "trials", services, subscriptions (examples): Microsoft store
apps, proprietary software bundles/trials, Azure, Bing, Edge web browser, Hotmail, Live, (MSN) Messenger, Office,
OneDrive/SkyDrive, Outlook, Photos/Photo Viewer, Windows Essentials, Windows Insider Program (WIP), Windows (Live) Mail,
Windows Media Player (WMP), Windows Movie Maker (WMM).
You can always find cheaper [or even 100% free(ware)] better, improved alternatives, or similar products/services/software
available online (examples):
http://alternativeto.net/software/microsoft-office-suite/
http://alternativeto.net/software/windows-media-player/
http://alternativeto.net/software/windows-photo-viewer/
http://www.softwarehow.com/windows-mail-alternatives/
http://www.websiterating.com/cloud-storage/best-microsoft-onedrive-alternatives/
http://www.digitalcitizen.life/best-free-alternatives-windows-movie-maker/
Some of the bundled/forced/preset apps/programs/services are either buggy, flawed, still in development stages, interim,
pre-releases, previews, unfinished, untested (or incompletely tested), and some actually ask for cash/money, periodic paid
enrollment/membership/subscription fees, eventually at the end of their time limited deadline/expiration/trial periods,
or/and for as long as you choose to extend/maintain/pay for/purchase/support them.
Worse, most such programs ask for your personal/private/privileged data/information (which in many cases is not needed to
ensure proper functionality/operation), store it on their cloud/network/internet servers/storage facilities (and therefore
expose it to potential breaches, hacking, malware, spying, etc), and very frequently sell your data for profit to other
affiliates/associates/branches/businesses/companies/divisions/entities/parents/partners/subsidiaries.
See also these MDGx topics (all included):
- "Digital + Internet/Online Privacy, Security + Safety" chapter in WINDOWS7.TXT (this file):
http://www.mdgx.com/7.php#:~:text=Digital%20%2B%20Internet%2FOnline%20Privacy%2C%20Security%20%2B%20Safety%20%3D%20Your%20Top%20Priority
http://www.mdgx.com/WINDOWS7.TXT
- "Turn OFF/Remove Windows 7/8/8.1 Adware, Spyware, Security Flaws + Repair/Restore Privacy" chapter in WINDOWS7.TXT (this
file):
http://www.mdgx.com/7.php
http://www.mdgx.com/WINDOWS7.TXT
- "Turn OFF/Remove Windows 10 Adware, Spyware, Security Flaws + Repair/Restore Privacy" chapter in WIN10.TXT:
http://www.mdgx.com/10.php
http://www.mdgx.com/WIN10.TXT

CAUTION:
********
This requires adequate/advanced knowledge about critical computing, operating systems, shared environments, networks,
cybersecurity.
Recommended for single user environments without any add-ons/components/extensions/extras/optional features/services which
may require specific configurations/items/properties/settings for proper operation.
Not recommended for multiuser/networked/enterprise/server environments processing/storing/delivering
encrypted/protected/secure critical/private/sensitive/vital analysis/data/information.

Turn OFF LLTD from Control Panel (CP):
Start Menu/Orb -> Run... [hold WinKey + press R] -> type:
CONTROL.EXE /name Microsoft.NetworkAndSharingCenter
-> press Enter -> click left side "Change advanced sharing settings" link -> click "Network Profile" link (if prompted) ->
click down arrow next to "Private" profile (if needed) -> under "Network discovery" UNcheck (clear) "Turn on network
discovery" box.
CONTROL.EXE is located in the %WinDir%\SYSTEM32 folder [%WinDir% = usually C:\WINDOWS].
View all directories/folders listed in your system PATH from a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE):
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter:
PATH
Turn OFF LLTD + QoS from your active network/internet connection Properties:
- Windows 7/7 SP1 users:
Start Menu/Orb -> Control Panel (CP) -> Network and Sharing Center -> View network status and tasks -> View Active networks
-> click item right side of Connections: -> "your Network Connection name" (typical examples): "Ethernet" (direct broadband
modem connection), "Local Area Network" (LAN = direct router connection) or "Wi-Fi" (Wi-Fi connection) -> connection Status
-> General tab -> Properties -> Connection Properties General tab -> scroll down -> UNcheck (clear) all these 3 boxes:
"Link-Layer Topology Discovery Responder", "Link-Layer Topology Discovery Mapper I/O Driver" + "QoS Packet Scheduler" ->
click OK -> exit all dialogs/prompts/windows.
- Windows 8/newer users:
Start Menu/Orb -> Control Panel (CP) -> Network and Sharing Center -> Active Networks -> click item right side of
Connections: -> "your Network Connection name" (typical examples): "Ethernet" (direct broadband modem connection), "Local
Area Network" (LAN = direct router connection) or "Wi-Fi" (Wi-Fi connection) -> connection Status -> General tab ->
Properties -> scroll down -> UNcheck (clear) all these 3 boxes: "Link-Layer Topology Discovery Responder" (LLTD),
"Link-Layer Topology Discovery Mapper I/O Driver" + "QoS Packet Scheduler" -> click OK -> exit all dialogs/prompts/windows.
Turn OFF LLTD + QoS using a BATch (.bat)/CoMmanD (.cmd) file:
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text BATch (.bat) or CoMmanD (.cmd) script file containing the lines between Cut & Paste delimiters below
-> save it as plain text/ASCII file (Encode: -> ANSI) with the BAT (.bat) or CMD (.cmd) extension -> right-click it ->
Run as Administrator -> wait for completion.
-----Begin cut & paste here-----
@ECHO OFF
IF NOT "%OS%"=="Windows_NT" GOTO END
:: Turn OFF [Disabled] Link-Layer Topology Discovery Mapper I/O driver [lltdio]:
ECHO Y|NET.EXE STOP lltdio
SC.EXE CONFIG lltdio START= disabled
REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Services\lltdio" /v Start /t REG_DWORD /d 4 /f
:: Turn OFF [Disabled] Link-Layer Topology Discovery Mapper service [lltdsvc]:
ECHO Y|NET.EXE STOP lltdsvc
SC.EXE CONFIG lltdsvc START= disabled
REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Services\lltdsvc" /v Start /t REG_DWORD /d 4 /f
:: Turn OFF [Disabled] QoS (Quality of Service) Packet Scheduler driver [Psched]:
ECHO Y|NET.EXE STOP Psched
SC.EXE CONFIG Psched START= disabled
REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Services\Psched" /v Start /t REG_DWORD /d 4 /f
:END
EXIT
------End cut & paste here------
REG.EXE, NET.EXE + SC.EXE DOS console command line tools are all located in the %WinDir%\SYSTEM32 folder [%WinDir% = usually
C:\WINDOWS].
View all directories/folders listed in your system PATH from a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE):
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter:
PATH
Restart/reboot Windows for all these changes to take effect.
Turn OFF LLTD + QoS using a Registry (.reg) file (optional):
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
; Turn OFF [Disabled] Link-Layer Topology Discovery Mapper I/O driver [lltdio]:
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\lltdio]
"LaunchProtected"=dword:0
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\lltdio]
"LaunchProtected"=dword:0
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\lltdio]
"LaunchProtected"=dword:0
"Start"=dword:4
; Turn OFF [Disabled] Link-Layer Topology Discovery Mapper service [lltdsvc]:
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\lltdsvc]
"LaunchProtected"=dword:0
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\lltdsvc]
"LaunchProtected"=dword:0
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\lltdsvc]
"LaunchProtected"=dword:0
"Start"=dword:4
; Turn OFF [Disabled] QoS (Quality of Service) Packet Scheduler driver [Psched]:
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Psched]
"LaunchProtected"=dword:0
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Psched]
"LaunchProtected"=dword:0
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\Psched]
"LaunchProtected"=dword:0
"Start"=dword:4
;
------End cut & paste here------
Restart/reboot Windows for all these changes to take effect.

WARNING:
********
If these 2 drivers + this interconnected/interdependent/interrelated service are turned OFF/disabled/stopped
networking/internet discovery function for available/connected/linked/remote clients/computers/devices/servers
will not work, and you may experience errors in multiuser/networked/enterprise/server environments depending on these
drivers and service.
Example: Xbox platform computers, remote connections, devices, servers, services who need to use this protocol.
Refer to your documentation/guidelines/manuals/readme files or contact the manufacturer/support/vendor for information.
Turn ON/(re)enable/(re)start networking/internet discovery step-by-step:
1. Turn ON LLTD + QoS using a BATch (.bat)/CoMmanD (.cmd) file:
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text BATch (.bat) or CoMmanD (.cmd) script file containing the lines between Cut & Paste delimiters below
-> save it as plain text/ASCII file (Encode: -> ANSI) with the BAT (.bat) or CMD (.cmd) extension -> right-click it ->
Run as Administrator -> wait for completion.
-----Begin cut & paste here-----
@ECHO OFF
IF NOT "%OS%"=="Windows_NT" GOTO END
:: Turn ON [Automatic/Enabled] Link-Layer Topology Discovery Mapper I/O driver [lltdio]:
SC.EXE CONFIG lltdio START= enabled
ECHO Y|NET.EXE START lltdio
REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Services\lltdio" /v Start /t REG_DWORD /d 2 /f
:: Turn ON [Manual/Demand] Link-Layer Topology Discovery Mapper service [lltdsvc]:
SC.EXE CONFIG lltdsvc START= demand
ECHO Y|NET.EXE START lltdsvc
REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Services\lltdsvc" /v Start /t REG_DWORD /d 3 /f
:: Turn ON [System] QoS (Quality of Service) Packet Scheduler driver [Psched]:
SC.EXE CONFIG Psched START= system
ECHO Y|NET.EXE START Psched
REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Services\Psched" /v Start /t REG_DWORD /d 1 /f
:END
EXIT
------End cut & paste here------
REG.EXE, NET.EXE + SC.EXE DOS console command line tools are all located in the %WinDir%\SYSTEM32 folder [%WinDir% = usually
C:\WINDOWS].
View all directories/folders listed in your system PATH from a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE):
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter:
PATH
2. Turn ON LLTD + QoS using a Registry (.reg) file (optional):
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
; Turn ON [Automatic/Enabled] Link-Layer Topology Discovery Mapper I/O driver [lltdio]:
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\lltdio]
"LaunchProtected"=dword:0
"Start"=dword:2
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\lltdio]
"LaunchProtected"=dword:0
"Start"=dword:2
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\lltdio]
"LaunchProtected"=dword:0
"Start"=dword:2
; Turn ON [Manual/Demand] Link-Layer Topology Discovery Mapper service [lltdsvc]:
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\lltdsvc]
"LaunchProtected"=dword:0
"Start"=dword:3
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\lltdsvc]
"LaunchProtected"=dword:0
"Start"=dword:3
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\lltdsvc]
"LaunchProtected"=dword:0
"Start"=dword:3
; Turn ON [System] QoS (Quality of Service) Packet Scheduler driver [Psched]:
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Psched]
"LaunchProtected"=dword:0
"Start"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Psched]
"LaunchProtected"=dword:0
"Start"=dword:1
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\Psched]
"LaunchProtected"=dword:0
"Start"=dword:1
;
------End cut & paste here------
3. Follow these steps to turn ON/(re)enable/(re)start networking/internet discovery:
http://www.technewstoday.com/how-to-turn-on-network-discovery/
http://www.zubairalexander.com/blog/unable-to-turn-on-network-discovery-on-windows-7-or-windows-8/
http://learn.microsoft.com/troubleshoot/windows-client/networking/cannot-turn-on-network-discovery/
http://www.lifewire.com/turn-on-off-network-discovery-in-windows-10-5116083/
Turn ON LLTD from Control Panel (CP):
Start Menu/Orb -> Run... [hold WinKey + press R] -> type:
CONTROL.EXE /name Microsoft.NetworkAndSharingCenter
-> press Enter -> click left side "Change advanced sharing settings" link -> click "Network Profile" link (if prompted) ->
click down arrow next to "Private" profile (if needed) -> under "Network discovery" check "Turn on network discovery" box.
CONTROL.EXE is located in the %WinDir%\SYSTEM32 folder [%WinDir% = usually C:\WINDOWS].
View all directories/folders listed in your system PATH from a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE):
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter:
PATH
Turn ON LLTD + QoS from your active network/internet connection Properties:
- Windows 7/7 SP1 users:
Start Menu/Orb -> Control Panel (CP) -> Network and Sharing Center -> View network status and tasks -> View Active networks
-> click item right side of Connections: -> "your Network Connection name" (typical examples): "Ethernet" (direct broadband
modem connection), "Local Area Network" (LAN = direct router connection) or "Wi-Fi" (Wi-Fi connection) -> connection Status
-> General tab -> Properties -> Connection Properties General tab -> scroll down -> check all these 3 boxes: "Link-Layer
Topology Discovery Responder" (LLTD), "Link-Layer Topology Discovery Mapper I/O Driver" + "QoS Packet Scheduler" -> click OK
-> exit all dialogs/prompts/windows.
- Windows 8/newer users:
Start Menu/Orb -> Control Panel (CP) -> Network and Sharing Center -> Active Networks -> click item right side of
Connections: -> "your Network Connection name" (typical examples): "Ethernet" (direct broadband modem connection), "Local
Area Network" (LAN = direct router connection) or "Wi-Fi" (Wi-Fi connection) -> connection Status -> General tab ->
Properties -> scroll down -> check all these 3 boxes: "Link-Layer Topology Discovery Responder" (LLTD), "Link-Layer Topology
Discovery Mapper I/O Driver" + "QoS Packet Scheduler" -> click OK -> exit all dialogs/prompts/windows.
4. Restart/reboot Windows for all these changes to take effect.

NOTE:
Older client/server computers/devices/terminals running Windows XP + Windows 2003 Server 32-bit (x86) or 64-bit (x64) need
this Hotfix so they can be discovered on the networks/internet by other clients/computers/devices/servers:
All Windows XP + Windows 2003 Server 32-bit (x86) + 64-bit (x64) KB922120 Hotfix for all supported editions + languages:
http://thehotfixshare.net/board/?/search/&q=KB922120
Windows XP SP2 32-bit (x86) Network Map Errors With Windows Vista/newer Link Layer Topology Discovery (LLTD) responder Fix:
http://web.archive.org/web/20071226071116/http://support.microsoft.com/kb/922120/
File [514 KB, English]:
http://web.archive.org/web/20070221043025if_/http://download.microsoft.com:80/download/0/5/f/05fc30db-e7af-4488-a3a8-23999328e4bd/WindowsXP-KB922120-v5-x86-ENU.exe
______________________________________________________________________________



CMD, Commands, Environment + Console



* Windows environment variables documentation, guides, tutorials:
http://learn.microsoft.com/windows/win32/procthread/environment-variables/
http://msdn.microsoft.com/library/windows/desktop/ms682653.aspx
http://www.ss64.com/nt/syntax-variables.html
http://www.ss64.com/nt/syntax-64bit.html
http://www.xahlee.info/mswin/env_var.html
http://www.tenforums.com/tutorials/3234-environment-variables-windows-10-a.html
http://www.sevenforums.com/performance-maintenance/136057-windows-7-environment-variables-list.html
http://www.howtogeek.com/51807/how-to-create-and-use-global-system-environment-variables/
http://www.makeuseof.com/tag/what-are-environment-variables-how-can-i-use-them-windows/
http://www.computerhope.com/jargon/e/envivari.htm
http://en.wikipedia.org/wiki/Environment_variable

* Windows DOS console command line + command line tools + scripting:
http://technet.microsoft.com/library/cc754340.aspx
http://learn.microsoft.com/windows-server/administration/windows-commands/windows-commands/
http://www.bleepingcomputer.com/tutorials/windows-command-prompt-introduction/
http://www.ss64.com/nt/
http://www.ss64.com/nt/commands.html
http://www.ss64.com/nt/cmd.html
http://www.ss64.com/nt/run.html
http://docs.microsoft.com/windows-server/administration/windows-commands/cmd/
http://www.ss64.com/nt/set.html
http://www.ss64.com/nt/setx.html
http://www.robvanderwoude.com/
http://www.lifewire.com/list-of-4092302/
http://www.lifewire.com/dos-commands-4070427/
http://en.wikipedia.org/wiki/List_of_DOS_commands

* Execute (run) program/batch/script/process/service selectively depending on installed Windows NTx Operating System (OS)
bit strength: 32-bit (x86) or 64-bit (x64) (example):
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text BATch (.bat) or CoMmanD (.cmd) script file containing the lines between Cut & Paste delimiters below
-> save it as plain text/ASCII file (Encode: -> ANSI) with the BAT (.bat) or CMD (.cmd) extension -> right-click it ->
Run as Administrator -> wait for completion.
-----Begin cut & paste here-----
@ECHO OFF
IF NOT "%OS%"=="Windows_NT" GOTO END
IF NOT EXIST %WinDir%\SYSTEM32\REG.EXE GOTO END
IF NOT "%PROCESSOR_ARCHITECTURE%"=="AMD64" GOTO X86
REG.EXE DELETE "HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run" /v SunJavaUpdateSched /f
GOTO END
:X86
REG.EXE DELETE "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v SunJavaUpdateSched /f
:END
EXIT
------End cut & paste here------

* Add custom environment variables to the default list of SET commands (examples):
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text BATch (.bat) or CoMmanD (.cmd) script file containing the lines between Cut & Paste delimiters below
-> save it as plain text/ASCII file (Encode: -> ANSI) with the BAT (.bat) or CMD (.cmd) extension -> right-click it ->
Run as Administrator -> wait for completion.
-----Begin cut & paste here-----
@ECHO OFF
IF NOT "%OS%"=="Windows_NT" GOTO END
IF NOT EXIST %WinDir%\SYSTEM32\SETX.EXE GOTO END
SETX.EXE DIRCMD "/A:-D/B/O:GNE/-P/S"
SETX.EXE COPYCMD "/Y" /M
SETX.EXE DEVMGR_SHOW_DETAILS "1" /M
SETX.EXE DEVMGR_SHOW_NONPRESENT_DEVICES "1" /M
SETX.EXE FP_NO_HOST_CHECK "NO" /M
SETX.EXE GOOGLE_API_KEY "NO" /M
SETX.EXE GOOGLE_DEFAULT_CLIENT_ID "NO" /M
SETX.EXE GOOGLE_DEFAULT_CLIENT_SECRET "NO" /M
SETX.EXE windows_tracing_flags "0" /M
SETX.EXE windows_tracing_logfile "%TEMP%\CSILOG.LOG" /M
SETX.EXE deployment.expiration.check.enabled "false" /M
SETX.EXE SEE_MASK_NOZONECHECKS "1" /M
SETX.EXE __COMPAT_LAYER "RunAsAdmin" /M
:END
EXIT
------End cut & paste here------
Run CMD.EXE (as Administrator) -> type SET -> press Enter to view all installed SET environment variables (examples):
SET | MORE
or save list to plain text file:
SET>%TEMP%\ENVLIST.TXT
Example:
http://www.winaero.com/blog/how-to-see-names-and-values-of-environment-variables-in-windows-8-and-windows-7/
CMD.EXE [DOS console CoMmanD prompt EXEcutable] + SETX.EXE = both located in the %WinDir%\SYSTEM32 folder [%WinDir% =
usually C:\WINDOWS], listed on your system PATH.
View all directories/folders listed in your system PATH from a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE):
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter:
PATH

* Environment variables Registry keys:
All Users (system wide) active key:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Environment
All Users (system wide) backup key #1:
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager\Environment
All Users (system wide) backup key #2:
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Control\Session Manager\Environment
Current User (logged on user) key:
HKEY_CURRENT_USER\Environment
Default User (all users) key:
HKEY_USERS\.DEFAULT\Environment
See MDGx "Registry Structure" chapter in REGISTRY.TXT (included) for more details:
http://www.mdgx.com/reg.htm#RTS
______________________________________________________________________________



Paging (Swap) File Tweaks



* Optimizing Memory Configuration:
http://technet.microsoft.com/library/cc938581.aspx
Memory Management:
http://technet.microsoft.com/library/cc951698.aspx
Enhance Windows Memory Management Through Registry:
http://www.registryrecycler.com/blog/2013/07/enhance-windows-memory-management-through-registry/
LargeSystemCache + PagedPoolSize + SystemPages registry values:
http://technet.microsoft.com/library/bb463205.aspx
PagedPoolQuota registry value:
http://technet.microsoft.com/library/cc759495.aspx
PagedPoolSize registry value:
http://technet.microsoft.com/library/cc738462.aspx
PoolUsageMaximum registry value:
http://support.microsoft.com/help/312362/
http://helpforsure.wordpress.com/tag/poolusagemaximum/
http://arcserve.zendesk.com/hc/en-us/articles/202808835-Insufficient-System-Resources-1450-/
SessionPoolSize + SessionViewSize registry values:
http://support.microsoft.com/help/840342/
ClearPageFileAtShutdown registry value:
http://support.microsoft.com/help/314834/
ClearPageFileAtShutdown FixIt! tool:
http://download.microsoft.com/download/C/1/D/C1DC29D4-FD75-400A-A661-F72D8C6976E1/MicrosoftFixit50463.msi
SecondLevelDataCache registry value:
http://archive.arstechnica.com/tweak/nt/L2-cache-1.html
PhysicalAddressExtension registry value [Windows 32-bit (x86) only]:
http://www.registryrecycler.com/blog/2013/07/enhance-windows-memory-management-through-registry/

* Change pagefile.sys file location to another drive/partition/volume (if available), management, initial + maximum sizes:
http://garvis.ca/2018/02/07/change-the-page-in-command-line/
Right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run these commands -> press Enter after each line (examples):
WMIC.EXE computersystem where name="%ComputerName%" set AutomaticManagedPagefile=False
WMIC.EXE pagefileset where name="D:\\pagefile.sys" set InitialSize=65536,MaximumSize=65536
WMIC.exe is located in the %WinDir%\SYSTEM32\wbem folder [%WinDir% = usually C:\WINDOWS], listed on your system PATH.
View all directories/folders listed in your system PATH from a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE):
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter:
PATH
WMIC (Windows Management Instrumentation Command):
http://docs.microsoft.com/windows/win32/wmisdk/wmic/
MS DOCs: WMIC:
http://technet.microsoft.com/library/bb742610.aspx
Dedoimedo: WMIC - The Windows secret weapon:
http://www.dedoimedo.com/computers/windows-wmic.html
ComputerHope: WMIC:
http://www.computerhope.com/wmic.htm
Rob van der Woude: WMIC:
http://www.robvanderwoude.com/wmic.php
quux: WMIC Snippets:
http://quux.wiki.zoho.com/WMIC-Snippets.html
SS64: WMIC.EXE:
http://www.ss64.com/nt/wmic.html
Wikipedia: WMI:
http://en.wikipedia.org/wiki/Windows_Management_Instrumentation

* PAGEFILE.VBS for Windows Vista/7:
http://www.cluberti.com/blog/2010/06/17/pagefile-vbs-for-vistawin7-systems-may-work-on-xp2003-not-tested/comment-page-1/
pagefileconfig.vbs:
http://technet.microsoft.com/library/cc772827.aspx
http://ww.upgradenrepair.com/Software/Microsoft/Windows%20Server%202003/Library/P/pagefileconfigvbs.htm
______________________________________________________________________________



Windows (Defender) Firewall (WF) Tweaks + Tools



* MDGx "XP/2003 FIREWALL GUIDE" in TIPSXP.TXT (included) = most of these guidelines apply also to Windows 7/newer:
http://www.mdgx.com/xp2.htm#XFG

* MDGx "Free(ware) Windows 9x/NTx Monitors, Firewalls + Anti-Spyware" chapter -> "Firewalls" section in SOFTWARE.TXT
(included):
http://www.mdgx.com/fw.htm

* MDGx "Free(ware) Windows Firewalls Compared + Reviewed":
http://www.mdgx.com/modem.htm#FWC

* Control/optimize/secure advanced Windows Firewall (WF) behavior using Network Shell (NetSh) [NETSH.EXE] DOS console
command line tool in Windows 7/newer:
http://learn.microsoft.com/troubleshoot/windows-server/networking/netsh-advfirewall-firewall-control-firewall-behavior/
http://support.microsoft.com/help/947709/
http://www.poftut.com/manage-windows-firewall-command-line-netsh-command/
http://www.ss64.com/nt/netsh.html
http://adamtheautomator.com/netsh/
http://www.tenforums.com/tutorials/70699-turn-off-windows-defender-firewall-windows-10-a.html
http://www.itninja.com/blog/view/how-to-add-firewall-rules-using-netsh-exe-advanced-way/
http://www.stigviewer.com/stig/microsoft_windows_server_2012_domain_controller/2013-07-25/finding/WN12-FW-000005
NetSh [NETSH.EXE] is located in the %WinDir%\SYSTEM32 folder [%WinDir% = usually C:\WINDOWS].
View all directories/folders listed in your system PATH from a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE):
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter:
PATH
Examples (globally for all connection/profile types, or separately for each connection/profile type):
Right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run these commands -> press Enter after each line:
NETSH.EXE advfirewall set allprofiles state on
NETSH.EXE advfirewall set currentprofile state on
NETSH.EXE advfirewall set domainprofile state on
NETSH.EXE advfirewall set privateprofile state on
NETSH.EXE advfirewall set publicprofile state on
NETSH.EXE advfirewall set allprofiles state on
NETSH.EXE advfirewall set allprofiles settings inboundusernotification disable
NETSH.EXE advfirewall set allprofiles settings unicastresponsetomulticast disable
These commands disable all Remote Assistance, Administration, Desktop + Management RPC (Remote Procedure Call)/E(P)MAP (End
Point Mapper) Windows Firewall (WF) rules (examples):
NETSH.EXE advfirewall firewall set rule group="Remote Assistance" new enable=no
NETSH.EXE advfirewall firewall set rule group="Remote Administration" new enable=no
NETSH.EXE advfirewall firewall set rule group="Remote Desktop" new enable=no
NETSH.EXE advfirewall firewall set rule group="Remote Management" new enable=no
NETSH.EXE advfirewall set allprofiles settings remotemanagement disable
To completely disable Windows Remote Assistance, Administration, Desktop + Management: Start -> Run...
[hold WinKey + press R] -> type:
CONTROL.EXE
press Enter -> System -> Remote Settings -> disable/UNcheck all check boxes/options -> Apply/OK.
More info:
http://www.thewindowsclub.com/windows-remote-assistance-in-windows-8/
http://www.tenforums.com/tutorials/116749-enable-disable-remote-assistance-connections-windows.html
Turn OFF (set to Disabled) these interconnected/interdependent/interrelated services:
Remote Access Auto Connection Manager [RasAuto]
Remote Access Connection Manager [RasMan]
Remote Registry [RemoteRegistry]
Routing and Remote Access [RemoteAccess]
Windows Remote Management (WS-Management) [WinRM]
Run... [hold WinKey + press R] -> type:
services.msc
-> press Enter -> double-click each service above -> Stop (if running) -> Startup type: -> Disabled -> OK/Apply.
OR (if above doesn't work):
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text BATch (.bat) or CoMmanD (.cmd) script file containing the lines between Cut & Paste delimiters below
-> save it as plain text/ASCII file (Encode: -> ANSI) with the BAT (.bat) or CMD (.cmd) extension -> right-click it ->
Run as Administrator -> wait for completion.
-----Begin cut & paste here-----
@ECHO OFF
IF NOT "%OS%"=="Windows_NT" GOTO END
ECHO Y|NET.EXE STOP RasAuto
SC.EXE CONFIG RasAuto START= disabled
ECHO Y|NET.EXE STOP RasMan
SC.EXE CONFIG RasMan START= disabled
ECHO Y|NET.EXE STOP RemoteRegistry
SC.EXE CONFIG RemoteRegistry START= disabled
ECHO Y|NET.EXE STOP RemoteAccess
SC.EXE CONFIG RemoteAccess START= disabled
ECHO Y|NET.EXE STOP WinRM
SC.EXE CONFIG WinRM START= disabled
REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Services\RasAuto" /v Start /t REG_DWORD /d 4 /f
REG.EXE ADD "HKLM\SYSTEM\ControlSet001\Services\RasAuto" /v Start /t REG_DWORD /d 4 /f
REG.EXE ADD "HKLM\SYSTEM\ControlSet002\Services\RasAuto" /v Start /t REG_DWORD /d 4 /f
REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Services\RasMan" /v Start /t REG_DWORD /d 4 /f
REG.EXE ADD "HKLM\SYSTEM\ControlSet001\Services\RasMan" /v Start /t REG_DWORD /d 4 /f
REG.EXE ADD "HKLM\SYSTEM\ControlSet002\Services\RasMan" /v Start /t REG_DWORD /d 4 /f
REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry" /v Start /t REG_DWORD /d 4 /f
REG.EXE ADD "HKLM\SYSTEM\ControlSet001\Services\RemoteRegistry" /v Start /t REG_DWORD /d 4 /f
REG.EXE ADD "HKLM\SYSTEM\ControlSet002\Services\RemoteRegistry" /v Start /t REG_DWORD /d 4 /f
REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Services\RemoteAccess" /v Start /t REG_DWORD /d 4 /f
REG.EXE ADD "HKLM\SYSTEM\ControlSet001\Services\RemoteAccess" /v Start /t REG_DWORD /d 4 /f
REG.EXE ADD "HKLM\SYSTEM\ControlSet002\Services\RemoteAccess" /v Start /t REG_DWORD /d 4 /f
REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Services\WinRM" /v Start /t REG_DWORD /d 4 /f
REG.EXE ADD "HKLM\SYSTEM\ControlSet001\Services\WinRM" /v Start /t REG_DWORD /d 4 /f
REG.EXE ADD "HKLM\SYSTEM\ControlSet002\Services\WinRM" /v Start /t REG_DWORD /d 4 /f
:END
EXIT
------End cut & paste here------
Restart/reboot Windows for these changes to take effect.
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
; * Turn OFF remote administration/assistance/desktop/management:
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Remote Assistance]
"CreateEncryptedOnlyTickets"=dword:1
"fAllowFullControl"=dword:0
"fAllowToGetHelp"=dword:0
"fEnableChatControl"=dword:0
"MaxTicketExpiry"=dword:0
"MaxTicketExpiryUnits"=dword:0
[HKEY_LOCAL_MACHINE\SOFTWARE\System\ControlSet001\Control\Remote Assistance]
"CreateEncryptedOnlyTickets"=dword:1
"fAllowFullControl"=dword:0
"fAllowToGetHelp"=dword:0
"fEnableChatControl"=dword:0
"MaxTicketExpiry"=dword:0
"MaxTicketExpiryUnits"=dword:0
[HKEY_LOCAL_MACHINE\SOFTWARE\System\ControlSet002\Control\Remote Assistance]
"CreateEncryptedOnlyTickets"=dword:1
"fAllowFullControl"=dword:0
"fAllowToGetHelp"=dword:0
"fEnableChatControl"=dword:0
"MaxTicketExpiry"=dword:0
"MaxTicketExpiryUnits"=dword:0
; * Turn OFF remote administration/assistance/desktop/management services:
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RasAuto]
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\RasAuto]
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\RasAuto]
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RasMan]
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\RasMan]
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\RasMan]
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RemoteRegistry]
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\RemoteRegistry]
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\RemoteRegistry]
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RemoteAccess]
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\RemoteAccess]
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\RemoteAccess]
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WinRM]
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\WinRM]
"Start"=dword:4
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\WinRM]
"Start"=dword:4
;
------End cut & paste here------
Restart/reboot Windows for these changes to take effect.
See also "* Turn OFF/disable Remote Assistance, Remote (Auto) Connection Manager, Remote Registry, Remote Management (WinRM)
+ uninstall Quick Assist in Windows 10/11:" topic in WIN10.TXT (included):
http://www.mdgx.com/10.php
http://www.mdgx.com/WIN10.TXT
To (re)enable all Remote Assistance, Administration, Desktop + Management WF rule(s) run these commands (example):
NETSH.EXE advfirewall firewall set rule group="Remote Assistance" new enable=yes
NETSH.EXE advfirewall firewall set rule group="Remote Administration" new enable=yes
NETSH.EXE advfirewall firewall set rule group="Remote Desktop" new enable=yes
NETSH.EXE advfirewall firewall set rule group="Remote Management" new enable=yes
NETSH.EXE advfirewall set allprofiles settings remotemanagement enable
and then (re)enable all Windows Remote Assistance, Administration, Desktop + Management options in Control Panel (see above)
-> System -> Remote Settings -> enable/check all check boxes/options -> Apply/OK.
Also, make sure all services that contain the word "remote" in their names are either on Automatic or Manual:
Start -> Run... [hold WinKey + press R] -> type:
services.msc
press Enter -> double-click on each service with "remote" in its name that is Disabled -> Startup type: -> select Manual
-> click Apply/OK.
Turn ON (set to Manual, when needed) these interconnected/interdependent/interrelated services:
Remote Access Auto Connection Manager [RasAuto]
Remote Access Connection Manager [RasMan]
Remote Registry [RemoteRegistry]
Routing and Remote Access [RemoteAccess]
Windows Remote Management (WS-Management) [WinRM]
Run... [hold WinKey + press R] -> type:
services.msc
-> press Enter -> double-click each service above -> Stop (if running) -> Startup type: -> Manual -> OK/Apply.
OR (if above doesn't work):
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text BATch (.bat) or CoMmanD (.cmd) script file containing the lines between Cut & Paste delimiters below
-> save it as plain text/ASCII file (Encode: -> ANSI) with the BAT (.bat) or CMD (.cmd) extension -> right-click it ->
Run as Administrator -> wait for completion.
-----Begin cut & paste here-----
@ECHO OFF
IF NOT "%OS%"=="Windows_NT" GOTO END
ECHO Y|NET.EXE STOP RasAuto
SC.EXE CONFIG RasAuto START= demand
ECHO Y|NET.EXE STOP RasMan
SC.EXE CONFIG RasMan START= demand
ECHO Y|NET.EXE STOP RemoteRegistry
SC.EXE CONFIG RemoteRegistry START= demand
ECHO Y|NET.EXE STOP RemoteAccess
SC.EXE CONFIG RemoteAccess START= demand
ECHO Y|NET.EXE STOP WinRM
SC.EXE CONFIG WinRM START= demand
REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Services\RasAuto" /v Start /t REG_DWORD /d 3 /f
REG.EXE ADD "HKLM\SYSTEM\ControlSet001\Services\RasAuto" /v Start /t REG_DWORD /d 3 /f
REG.EXE ADD "HKLM\SYSTEM\ControlSet002\Services\RasAuto" /v Start /t REG_DWORD /d 3 /f
REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Services\RasMan" /v Start /t REG_DWORD /d 3 /f
REG.EXE ADD "HKLM\SYSTEM\ControlSet001\Services\RasMan" /v Start /t REG_DWORD /d 3 /f
REG.EXE ADD "HKLM\SYSTEM\ControlSet002\Services\RasMan" /v Start /t REG_DWORD /d 3 /f
REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry" /v Start /t REG_DWORD /d 3 /f
REG.EXE ADD "HKLM\SYSTEM\ControlSet001\Services\RemoteRegistry" /v Start /t REG_DWORD /d 3 /f
REG.EXE ADD "HKLM\SYSTEM\ControlSet002\Services\RemoteRegistry" /v Start /t REG_DWORD /d 3 /f
REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Services\RemoteAccess" /v Start /t REG_DWORD /d 3 /f
REG.EXE ADD "HKLM\SYSTEM\ControlSet001\Services\RemoteAccess" /v Start /t REG_DWORD /d 3 /f
REG.EXE ADD "HKLM\SYSTEM\ControlSet002\Services\RemoteAccess" /v Start /t REG_DWORD /d 3 /f
REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Services\WinRM" /v Start /t REG_DWORD /d 3 /f
REG.EXE ADD "HKLM\SYSTEM\ControlSet001\Services\WinRM" /v Start /t REG_DWORD /d 3 /f
REG.EXE ADD "HKLM\SYSTEM\ControlSet002\Services\WinRM" /v Start /t REG_DWORD /d 3 /f
:END
EXIT
------End cut & paste here------
Restart/reboot Windows for these changes to take effect.
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RasAuto]
"Start"=dword:3
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\RasAuto]
"Start"=dword:3
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\RasAuto]
"Start"=dword:3
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RasMan]
"Start"=dword:3
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\RasMan]
"Start"=dword:3
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\RasMan]
"Start"=dword:3
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RemoteRegistry]
"Start"=dword:3
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\RemoteRegistry]
"Start"=dword:3
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\RemoteRegistry]
"Start"=dword:3
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RemoteAccess]
"Start"=dword:3
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\RemoteAccess]
"Start"=dword:3
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\RemoteAccess]
"Start"=dword:3
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WinRM]
"Start"=dword:3
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\WinRM]
"Start"=dword:3
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\WinRM]
"Start"=dword:3
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Remote Assistance]
"fAllowFullControl"=dword:1
"fAllowToGetHelp"=dword:1
"fEnableChatControl"=dword:1
;
------End cut & paste here------
Restart/reboot Windows for these changes to take effect.
To connect to a remote assistant/chat room/helper/network/provider/etc: Start -> Run... [hold WinKey + press R] -> type:
msra.exe
and follow the step-by-step instructions of the screen.
Windows Remote Assistance (MsRA) [MSRA.EXE] + Network Shell (NetSh) [NETSH.EXE] are both located in the %WinDir%\SYSTEM32
folder [%WinDir% = usually C:\WINDOWS].
View all directories/folders listed in your system PATH from a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE):
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter:
PATH
View firewall status for all connection types:
ECHO Y|NETSH.EXE advfirewall show allprofiles
View list of all IPv4 connection(s) (sub)interface(s):
NETSH.EXE interface ipv4 show subinterfaces
View all NetSh [NETSH.EXE] available command line options, switches + parameters:
NETSH.EXE /?

* Turn OFF/block unnecessary, obsolete, insecure/unsafe TCP/IP NetBIOS (Network Basic Input/Output System) Helper service
[lmhosts], NetBIOS Interface driver [NetBIOS], NetBT service [NetBT] + NetBIOS over TCP/IP (NetBT, NBT) protocols for
internet/network connections IF *not* using/connecting to/depending on network(s)/remote computer(s)/server(s), +/- not
deploying/maintaining/running/servicing network(s)/server(s) using insecure/obsolete/outdated NetBIOS/NetBT/NBT services,
+/- sharing data/files/printers over internet/network(s) who use/connect to/depend on NetBIOS/NetBT/NBT
protocol(s)/interface(s):
http://en.wikipedia.org/wiki/NetBIOS_over_TCP/IP
http://windowsreport.com/how-to-disable-netbios/
http://support.microsoft.com/help/313314/
http://10dsecurity.com/saying-goodbye-netbios/
http://technet.microsoft.com/library/cc940063.aspx
http://support.hidemyass.com/hc/articles/202720396/
http://www.techrepublic.com/blog/it-security/the-problem-with-netbios/
http://batcmd.com/windows/10/services/lmhosts/
http://batcmd.com/windows/10/services/netbios/
http://batcmd.com/windows/10/services/netbt/
http://docs.microsoft.com/troubleshoot/windows-server/networking/disable-netbios-tcp-ip-using-dhcp/
http://docs.microsoft.com/troubleshoot/windows-server/networking/direct-hosting-of-smb-over-tcpip/
http://docs.microsoft.com/troubleshoot/windows-server/networking/configure-tcpip-networking-netbios-turn-off/
http://woshub.com/how-to-disable-netbios-over-tcpip-and-llmnr-using-gpo/
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[-HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\lmhosts\Security]
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\lmhosts]
"LaunchProtected"=dword:0
"UserServiceFlags"=dword:0
"Start"=dword:4
[-HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NetBIOS\Security]
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NetBIOS]
"LaunchProtected"=dword:0
"UserServiceFlags"=dword:0
"Start"=dword:3
[-HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NetBT\Security]
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NetBT]
"LaunchProtected"=dword:0
"UserServiceFlags"=dword:0
"Start"=dword:3
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NetBT\Parameters\Interfaces]
"NetbiosOptions"=dword:2
[-HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\lmhosts\Security]
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\lmhosts]
"LaunchProtected"=dword:0
"UserServiceFlags"=dword:0
"Start"=dword:4
[-HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\NetBIOS\Security]
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\NetBIOS]
"LaunchProtected"=dword:0
"UserServiceFlags"=dword:0
"Start"=dword:3
[-HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\NetBT\Security]
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\NetBT]
"LaunchProtected"=dword:0
"UserServiceFlags"=dword:0
"Start"=dword:3
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\NetBT\Parameters\Interfaces]
"NetbiosOptions"=dword:2
[-HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\lmhosts\Security]
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\lmhosts]
"LaunchProtected"=dword:0
"UserServiceFlags"=dword:0
"Start"=dword:4
[-HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\NetBIOS\Security]
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\NetBIOS]
"LaunchProtected"=dword:0
"UserServiceFlags"=dword:0
"Start"=dword:3
[-HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\NetBT\Security]
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\NetBT]
"LaunchProtected"=dword:0
"UserServiceFlags"=dword:0
"Start"=dword:3
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\NetBT\Parameters\Interfaces]
"NetbiosOptions"=dword:2
;
------End cut & paste here------
Run Control Panel (CP) Network + Internet Center -> Run... [hold WinKey + press R] -> type:
CONTROL.EXE /name Microsoft.NetworkAndSharingCenter
-> press Enter -> (double-)click your active/running
broadband/cable/Ethernet/local/satellite/internet/network/LAN/WAN/NIC/Wi-Fi/wireless/etc connection icon -> Properties
button -> Networking tab -> This connection is using the following items: -> Internet Protocol Version 4 (TCP/IPv4) ->
General tab -> Advanced... button -> WINS tab -> check Enable LMHOSTS lookup box -> NetBIOS setting -> check Disable NetBIOS
over TCP/IP box -> Apply/OK.
http://www.thewindowsclub.com/wp-content/uploads/2020/11/Disable-NetBIOS-over-TCP-IP.png
IF *not* using/connecting to/depending on any network(s)/server(s)/printer(s) (see further above) using
insecure/obsolete/outdated NetBIOS (NetBT, NBT) protocol(s)/interface(s), you can create custom (new) Windows Firewall (WF)
rules to block all TCP + UDP requests in both directions (in + out) for the 4 vulnerable local ports [137, 138, 139 + 445]
used by NetBIOS (NetBT, NBT):
http://www.grc.com/port_137.htm
http://www.grc.com/port_138.htm
http://www.grc.com/port_139.htm
http://www.grc.com/port_445.htm
From a DOS console (command prompt) -> right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run these commands ->
press Enter after each line (examples):
NETSH.EXE advfirewall firewall add rule name="Block_NetBIOS_port_137_TCP_IN" protocol=tcp localport=137 dir=in action=block enable=yes
NETSH.EXE advfirewall firewall add rule name="Block_NetBIOS_port_137_TCP_OUT" protocol=tcp localport=137 dir=out action=block enable=yes
NETSH.EXE advfirewall firewall add rule name="Block_NetBIOS_port_137_UDP_IN" protocol=udp localport=137 dir=in action=block enable=yes
NETSH.EXE advfirewall firewall add rule name="Block_NetBIOS_port_137_UDP_OUT" protocol=udp localport=137 dir=out action=block enable=yes
NETSH.EXE advfirewall firewall add rule name="Block_NetBIOS_port_138_TCP_IN" protocol=tcp localport=138 dir=in action=block enable=yes
NETSH.EXE advfirewall firewall add rule name="Block_NetBIOS_port_138_TCP_OUT" protocol=tcp localport=138 dir=out action=block enable=yes
NETSH.EXE advfirewall firewall add rule name="Block_NetBIOS_port_138_UDP_IN" protocol=udp localport=138 dir=in action=block enable=yes
NETSH.EXE advfirewall firewall add rule name="Block_NetBIOS_port_138_UDP_OUT" protocol=udp localport=138 dir=out action=block enable=yes
NETSH.EXE advfirewall firewall add rule name="Block_NetBIOS_port_139_TCP_IN" protocol=tcp localport=139 dir=in action=block enable=yes
NETSH.EXE advfirewall firewall add rule name="Block_NetBIOS_port_139_TCP_OUT" protocol=tcp localport=139 dir=out action=block enable=yes
NETSH.EXE advfirewall firewall add rule name="Block_NetBIOS_port_139_UDP_IN" protocol=udp localport=139 dir=in action=block enable=yes
NETSH.EXE advfirewall firewall add rule name="Block_NetBIOS_port_139_UDP_OUT" protocol=udp localport=139 dir=out action=block enable=yes
NETSH.EXE advfirewall firewall add rule name="Block_NetBIOS_port_445_TCP_IN" protocol=tcp localport=445 dir=in action=block enable=yes
NETSH.EXE advfirewall firewall add rule name="Block_NetBIOS_port_445_TCP_OUT" protocol=tcp localport=445 dir=out action=block enable=yes
NETSH.EXE advfirewall firewall add rule name="Block_NetBIOS_port_445_UDP_IN" protocol=udp localport=445 dir=in action=block enable=yes
NETSH.EXE advfirewall firewall add rule name="Block_NetBIOS_port_445_UDP_OUT" protocol=udp localport=445 dir=out action=block enable=yes
Network Shell (NetSh) [NETSH.EXE] is located in the %WinDir%\SYSTEM32 folder [%WinDir% = usually C:\WINDOWS].
View all directories/folders listed in your system PATH from a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE):
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter:
PATH
View all NetSh [NETSH.EXE] available command line options, switches + parameters:
NETSH.EXE /?

* Turn OFF/block all TCP + UDP requests in both directions (in + out) for local port 135 used by E(P)MAP (End Point Mapper)
protocol for DCE (Distributed Computing Environment)/DCP (Deferred Procedure Call)/RPC (Remote Procedure Call) Locator
service, not needed if not deploying/maintaining/running/servicing network(s)/server(s) that connect to/need/use this
potocol/service, by creating custom (new) Windows Firewall (WF) rules:
http://whatportis.com/ports/135_microsoft-epmap/
http://www.grc.com/port_135.htm
http://www.speedguide.net/port.php?port=135
http://en.wikipedia.org/wiki/Port_135
http://learn.microsoft.com/windows/security/threat-protection/windows-firewall/create-inbound-rules-to-support-rpc/
http://learn.microsoft.com/troubleshoot/windows-server/networking/configure-rpc-dynamic-port-allocation-with-firewalls/
http://en.wikipedia.org/wiki/Deferred_Procedure_Call
http://en.wikipedia.org/wiki/DCE/RPC
http://en.wikipedia.org/wiki/Microsoft_RPC
http://en.wikipedia.org/wiki/Remote_procedure_call
http://en.wikipedia.org/wiki/Distributed_Computing_Environment
From a DOS console (command prompt) -> right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run these commands ->
press Enter after each line (examples):
NETSH.EXE advfirewall firewall add rule name="BLOCK_EMAP_port_135_TCP_IN" protocol=tcp localport=135 dir=in action=block enable=yes
NETSH.EXE advfirewall firewall add rule name="BLOCK_EMAP_port_135_TCP_OUT" protocol=tcp localport=135 dir=out action=block enable=yes
NETSH.EXE advfirewall firewall add rule name="BLOCK_EMAP_port_135_UDP_IN" protocol=udp localport=135 dir=in action=block enable=yes
NETSH.EXE advfirewall firewall add rule name="BLOCK_EMAP_port_135_UDP_OUT" protocol=udp localport=135 dir=out action=block enable=yes
See "* Control/optimize/secure advanced Windows Firewall (WF) behavior using Network Shell (NetSh) [NETSH.EXE] DOS console
command line tool in Windows 7/newer:" topic (further above) to disable all Remote Assistance, Administration, Desktop +
Management RPC/E(P)MAP Windows Firewall (WF) rules using Network Shell (NetSh) [NETSH.EXE] DOS console command line tool.
Network Shell (NetSh) [NETSH.EXE] is located in the %WinDir%\SYSTEM32 folder [%WinDir% = usually C:\WINDOWS].
View all directories/folders listed in your system PATH from a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE):
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter:
PATH
View all NetSh [NETSH.EXE] available command line options, switches + parameters:
NETSH.EXE /?

* Configure/customize, import/export + restore default Windows Firewall rules in Windows 7/newer:
http://www.microsoftpressstore.com/articles/article.aspx?p=2224362&seqNum=2
http://github.com/metablaster/WindowsFirewallRuleset
http://www.winaero.com/export-and-import-specific-firewall-rule-in-windows-10/
http://woshub.com/windows-firewall-settings-group-policy/
http://www.dummies.com/computers/operating-systems/windows-10/how-to-change-windows-10-firewall-settings-to-allow-certain-programs/
http://www.thewindowsclub.com/how-to-backup-restore-reset-to-defaults-windows-7-firewall-settings/
http://www.winhelponline.com/blog/reset-firewall-defaults-restore-rules-advanced-security/
http://docs.microsoft.com/windows/security/threat-protection/windows-firewall/configure-windows-firewall-to-suppress-notifications-when-a-program-is-blocked/
http://www.xspdf.com/resolution/51904145.html
http://www.sourcedaddy.com/windows-7/configuring-windows-firewall-options.html
http://docs.microsoft.com/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/

* FIX: Stop Windows spying on you using just Windows Firewall (WF):
http://www.winaero.com/blog/stop-windows-10-spying-on-you-using-just-windows-firewall/
File:
http://www.winaero.com/download.php?view.1839
1. Use an unZIPping/unARChiving/unRARing tool [free(ware)]
http://www.mdgx.com/toy.htm#ZIP
to open "block_telemetry.zip" archive and extract "add rules.cmd" + "rules.ps1" into the same dedicated/empty
directory/folder.
2. Open Explorer/similar/replacement -> right-click "add rules.cmd" -> Run as Administrator -> wait for all WF rules to be
created -> exit BATch file.
3. Done.

* Turn ON DNS Client (DNS Cache) service for Windows Firewall Control (WFC) notifications + network discovery functions:
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text BATch (.bat) or CoMmanD (.cmd) script file containing the lines between Cut & Paste delimiters below
-> save it as plain text/ASCII file (Encode: -> ANSI) with the BAT (.bat) or CMD (.cmd) extension -> right-click it ->
Run as Administrator -> wait for completion.
-----Begin cut & paste here-----
@ECHO OFF
IF NOT "%OS%"=="Windows_NT" GOTO END
:: DNS Client caches Domain Name System names (DNS Cache service):
SC.EXE CONFIG DNSCache START= demand
ECHO Y|NET.EXE START DNSCache
:: DNS Cache can be flushed ONLY if DNS Cache service is running:
START /WAIT IPCONFIG.EXE /flushdns
:END
EXIT
------End cut & paste here------
More info @ MDGx "HOSTS Files, Guides + Tools":
http://www.mdgx.com/hosts.php#N2

* FIX: Turn ON network discovery + detection of network(ed) computers + devices in Windows 7/newer:
http://answers.microsoft.com/en-us/windows/forum/all/why-do-i-get-the-message-network-discovery-is/a6964130-5f98-4640-a064-f59fae974ad3/
http://answers.microsoft.com/en-us/windows/forum/windows_10-networking/connecting-pcs-and-users-for-sharing/fb92e439-5dbc-4367-9857-1ef360e9ffdf/
http://www.tenforums.com/tutorials/49652-turn-off-network-discovery-windows-10-a.html
http://www.itechguides.com/windows-10-network-discovery/
http://www.wintips.org/fix-windows-10-network-computers-not-showing/
http://windowsreport.com/file-explorer-detect-network-devices-fix/
http://support.microsoft.com/help/2722035/
Enable + Start these Windows services:
DNS Client (Dnscache)
Function Discovery Provider Host (fdPHost)
Function Discovery Resource Publication (FDResPub)
HomeGroup Listener (HomeGroupListener)
HomeGroup Provider (HomeGroupProvider)
SSDP Discovery (SSDPSRV)
TCP/IP NetBIOS Helper (lmhosts)
UPnP Device Host (upnphost)
In case you're using a large HOSTS file with thousands (or even more) of redirected servers [like I do ;-/], the DNS Cache
service (if started) may take too long to process all the servers listed in the HOSTS file.
In such cases it is recommended to flush the DNS Cache -> see this command line (included in the BATch file below):
START /WAIT IPCONFIG.EXE /flushdns
More info @ MDGx "HOSTS Files, Guides + Tools":
http://www.mdgx.com/hosts.php#N2
The HOSTS file is located in the %WinDir%\SYSTEM32\Drivers\ETC folder [%WinDir% = usually C:\WINDOWS].
View all directories/folders listed in your system PATH from a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE):
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter:
PATH
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text BATch (.bat) or CoMmanD (.cmd) script file containing the lines between Cut & Paste delimiters below
-> save it as plain text/ASCII file (Encode: -> ANSI) with the BAT (.bat) or CMD (.cmd) extension -> right-click it ->
Run as Administrator -> wait for completion.
-----Begin cut & paste here-----
@ECHO OFF
IF NOT "%OS%"=="Windows_NT" GOTO END
:: DNS Client caches Domain Name System names (DNS Cache service):
SC.EXE CONFIG DNSCache START= demand
ECHO Y|NET.EXE START DNSCache
:: DNS Cache can be flushed ONLY if DNS Cache service is running:
START /WAIT IPCONFIG.EXE /flushdns
:: Function Discovery Provider Host (fdPHost) service:
SC.EXE CONFIG fdPHost START= demand
ECHO Y|NET.EXE START fdPHost
:: Function Discovery Resource Publication (FDResPub) service:
SC.EXE CONFIG FDResPub START= demand
ECHO Y|NET.EXE START FDResPub
:: HomeGroup Listener (HomeGroupListener) service:
SC.EXE CONFIG HomeGroupListener START= demand
ECHO Y|NET.EXE START HomeGroupListener
:: HomeGroup Provider (HomeGroupProvider) service:
SC.EXE CONFIG HomeGroupProvider START= demand
ECHO Y|NET.EXE START HomeGroupProvider
:: SSDP Discovery (SSDPSRV) service:
SC.EXE CONFIG SSDPSRV START= demand
ECHO Y|NET.EXE START SSDPSRV
:: TCP/IP NetBIOS Helper (lmhosts) service:
SC.EXE CONFIG lmhosts START= demand
ECHO Y|NET.EXE START lmhosts
:: UPnP Device Host (upnphost) service:
SC.EXE CONFIG upnphost START= demand
ECHO Y|NET.EXE START upnphost
NETSH.EXE advfirewall firewall set rule group="Network Discovery" new enable=yes
:END
EXIT
------End cut & paste here------

* Block Windows Update (WU) service [wuauserv] by creating Windoss Firewall (WF) rule (example):
http://social.technet.microsoft.com/forums/lync/62b9fd5c-10b2-4266-bc15-fcf3e79d20d4/
In order for Windows Update (WU) to check whether an update is available and then to download the update files, you need 1st
to create a rule for outbound to block the WU service (wuauserv) pass through: Start -> Run... [hold WinKey + press R] ->
type:
wf.msc
-> Windows Firewall with Advanced Security -> press Enter -> create new outbound rule to block
%SystemRoot%\SYSTEM32\svchost.exe
from passing through both ways (in + out) on behalf of Windows Update (WU) service [wuauserv]:
wuauserv
Name: Block wuauserv OUTBOUND
Group:
Profile: All
Enabled: Yes
Action: Block
Program: %SystemRoot%\SYSTEM32\svchost.exe
Local Address: Any
Remote Address: Any
Protocol: Any
Local Port: Any
Remote Port: Any
Allowed Computers: Any
Status: Ok
Service: wuauserv
Rule Source: Local Setting
Interface Type: All interface types
Excepted Computers: None
Description:
To close the outbound firewall:
Outbound connections -> blocked (unless explicitly blocked by specific rule).
By default (built-in/preset WF rule) everything is allowed, so the outbound firewall is wide open.

* Windows 7/7 SP1 default built-in firewall rules:
http://technet.microsoft.com/network/bb545423/
http://technet.microsoft.com/library/ee126090/
http://www.sevenforums.com/tutorials/525-windows-firewall-restore-default-settings.html
http://www.thewindowsclub.com/reset-windows-firewall-settings/
http://www.howtogeek.com/201658/
http://www.howtogeek.com/112564/
[AET] = Allow Edge Traversal
[BET] = Block Edge Traversal
Core Networking = INBOUND:
**************************
01. Destination Unreachable (ICMPv6) [AET]
02. Destination Unreachable Fragmentation Needed (ICMPv4) [BET]
03. DHCP [BET]
04. DHCP IPv6 (DHCPv6) [BET]
05. IGMP [BET]
06. TPHTTPS (TCP) = Allows IPHTTPS tunneling technology to provide connectivity across HTTP proxies + firewalls [BET]
07. IPv6 = Required to permit IPv6 traffic for ISATAP (intra site automatic tunnel addressing protocol) and 6-to-4
tunneling services [BET]
08. Multicast Listener Done (ICMPv6) [BET]
09. Multicast Listener Query (ICMPv6) [BET]
10. Multicast Listener Report (ICMPv6) [BET]
11. Multicast Listener Report v2 (ICMPv6) [BET]
12. Neighbor Discovery Advertisement (ICMPv6) [AET]
13. Neighbor Discovery Solicitation (ICMPv6) [AET]
14. Packet Too Big (ICMPv6) [AET]
15. Parameter Problem (ICMPv6) [AET]
16. Router Advertisement (ICMPv6) [BET]
17. Router Solicitation (ICMPv6) [BET]
18. Teredo (UDP) = Allows Teredo edge traversal. Provides address assignment + autotunneling for IPv6 traffic for
IPv6/IPv4 host located behind an IPv4 NAT [BET]
19. Time Exceeded (ICMPv6) [AET]
Core Networking = OUTBOUND:
***************************
01. DNS (UDP)
02. DHCP
03. DHCP IPv6 (DHCPv6)
04. Group Policy (LSASS) [DOMAIN ONLY]
05. Group Policy (NP) [DOMAIN ONLY]
06. Group Policy (TCP) [DOMAIN ONLY]
07. IGMP
08. TPHTTPS (TCP)
09. IPv6
10. Multicast Listener Done (ICMPv6)
11. Multicast Listener Query (ICMPv6)
12. Multicast Listener Report (ICMPv6)
13. Multicast Listener Report v2 (ICMPv6)
14. Neighbor Discovery Advertisement (ICMPv6)
15. Neighbor Discovery Solicitation (ICMPv6)
16. Packet Too Big (ICMPv6)
17. Parameter Problem (ICMPv6)
18. Router Advertisement (ICMPv6)
19. Router Solicitation (ICMPv6)
20. Teredo (UDP)
21. Time Exceeded (ICMPv6)

* Free Firewall:
http://www.evorim.com/en/free-firewall/
File:
http://www.evorim.com/download/freefirewall-setup.exe

* simplewall 32-bit + 64-bit configures Windows Filtering Platform (WFP) network traffic:
http://www.henrypp.org/product/simplewall/
http://github.com/henrypp/simplewall/
File:
http://github.com/henrypp/simplewall/releases/latest/
simplewall Portable:
Place portable.dat in the program's main directory/folder or use Notepad/similar plain text editor
http://www.mdgx.com/toy.htm#TXT
to create (if absent) simplewall.ini in the program's directory/folder.
Documentation:
http://github.com/henrypp/simplewall/wiki/
Rules Editor:
http://github.com/henrypp/simplewall/wiki/Rules-editor/

* Firewall App Blocker (FAB) 32-bit + 64-bit blocks outbound EXEcutables:
http://www.sordum.org/8125/
File:
http://www.sordum.org/files/firewall-app-blocker/fab.zip

* Windows Firewall Control (WFC) 32-bit + 64-bit:
http://www.binisoft.org/wfc.php
File:
http://www.binisoft.org/download/wfc6setup.exe
Requires:
Microsoft .Net Framework Redistributable (NFR) 4.5/newer:
http://www.mdgx.com/add.htm#NFR
Enable DNS Client (DNS Cache) service for WFC notifications:
-----Begin cut & paste here-----
@ECHO OFF
IF NOT "%OS%"=="Windows_NT" GOTO END
:: DNS Client caches Domain Name System names (DNS Cache service):
SC.EXE CONFIG DNSCache START= auto
ECHO Y|NET.EXE START DNSCache
:: DNS cache can be flushed ONLY if DNS Cache service is running!
START /WAIT IPCONFIG.EXE /flushdns
:END
EXIT
------End cut & paste here------
MDGx 10_BLOCK DNS Cache service batch CoMmanD (.CMD) files (both included),
STARTDNS.CMD
STOP!DNS.CMD
are also available online [renamed as TeXT = .TXT]:
http://www.mdgx.com/10BLK/STARTDNS.CMD.TXT
http://www.mdgx.com/10BLK/STOP!DNS.CMD.TXT
If you prefer -> download them both to your computer/device -> rename .TXT extension to .CMD for both files -> right-click
on each 1 -> Run as Administrator.
STARTDNS.CMD + STOP!DNS.CMD = both detailed in 10_BLOCK.TXT (included):
http://www.mdgx.com/10BLK/10_BLOCK.php
http://www.mdgx.com/10BLK/10_BLOCK.TXT
MDGx "HOSTS Files, Guides + Tools" -> "DNS Client Service":
http://www.mdgx.com/hosts.php#N2
Wikipedia: DNS caching:
http://en.wikipedia.org/wiki/Name_server#Caching_name_server
______________________________________________________________________________



Turn OFF NVidia Telemetry



Turn OFF NVidia Telemetry, NVidia Data Collection + interconnected/interdependent/interrelated services bundled with NVidia
graphics drivers:
Download + install Disable Nvidia Telemetry tool [free, open source]:
http://github.com/NateShoffner/Disable-Nvidia-Telemetry/
File:
http://github.com/NateShoffner/Disable-Nvidia-Telemetry/releases/latest/
Disable Nvidia Telemetry Guide:
http://www.ghacks.net/2016/11/07/nvidia-telemetry-tracking/
http://forum.palemoon.org/viewtopic.php?t=15686&start=20
Right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run these commands -> press Enter after each line:
- Disable NVidia telemetry scheduled tasks commands:
SCHTASKS.EXE /change /TN NvTmMon_{B2FE1952-0186-46C3-BAEC-A80AA35AC5B8} /disable
SCHTASKS.EXE /change /TN NvTmRep_{B2FE1952-0186-46C3-BAEC-A80AA35AC5B8} /disable
SCHTASKS.EXE /change /TN NvTmRepOnLogon_{B2FE1952-0186-46C3-BAEC-A80AA35AC5B8} /disable
- Uninstall NVidia telemetry service command:
RUNDLL32.EXE "%ProgramFiles%\NVIDIA Corporation\Installer2\InstallerCore\NVI2.DLL",UninstallPackage NvTelemetryContainer
RUNDLL32.EXE + SCHTASKS.EXE are both located in the %WinDir%\SYSTEM32 folder [%WinDir% = usually C:\WINDOWS], listed in your
system PATH.
View all directories/folders listed in your system PATH from a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE):
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter:
PATH
Add lines between Cut & Paste below to your %WinDir%\SYSTEM32\DRIVERS\ETC\HOSTS [and to your
%WinDir%\SysWOW64\DRIVERS\ETC\HOSTS if using Windows NTx 64-bit (x64)] file -> edit HOSTS using Notepad/similar plain text
editor:
http://www.mdgx.com/toy.htm#TXT
Edit HOSTS file in Windows 7/7 SP1:
http://petri.com/edit-hosts-file-windows-7/
MDGx "HOSTS Files, Guides + Tools":
http://www.mdgx.com/hosts.php
-----Begin cut & paste here-----
##############################################################################
# MDGx HOSTS Guide:
# http://www.mdgx.com/hosts.php
# HOSTS (plain text/ASCII ANSI encoded file) is located in %windir% [usually C:\WINDOWS] in Windows 9x or
# %windir%\SYSTEM32\DRIVERS\ETC in Windows NTx.
# Transmission Control Protocol/Internet Protocol (TCP/IP) maps Internet Protocol (IP) addresses (1st column) to
# corresponding hostnames (2nd column):
# http://en.wikipedia.org/wiki/Hosts_%28file%29
# Each entry must be on its own separate line. Columns must be separated by at least 1 space or tab.
# All lines starting with a pound/hash sign (#) are comments/remarks and are not processed.
# Domain Name System (DNS) itself handles localhost name resolution:
# http://en.wikipedia.org/wiki/Localhost
# All local host(s) lines must be listed at the top of the HOSTS file in this exact order:
# http://en.wikipedia.org/wiki/Multicast_address
# 1. Internet Protocol version 4 (IPv4).
# http://en.wikipedia.org/wiki/IPv4
# 2. Internet Protocol version 6 (IPv6).
# http://en.wikipedia.org/wiki/IPv6
# Lines below map IPv4 local protocols:
# http://en.wikipedia.org/wiki/Reserved_IP_addresses#IPv4
0.0.0.0 null
127.0.0.1 local localhost.localdomain localdomain localhost
255.255.255.255 broadcasthost
# Lines below map IPv6 local protocols:
# http://en.wikipedia.org/wiki/Reserved_IP_addresses#IPv6
::0 null
::1 hosta localhost
fe80::1 localhost
fe00::0 ip6-localnet
ff00::0 ip6-mcastprefix
ff02::1 ip6-allnodes
ff02::2 ip6-allrouters
ff02::3 ip6-allhosts
# IPv4 hostnames below are disabled -> redirected to 0.0.0.0 (null).
# http://en.wikipedia.org/wiki/0.0.0.0
# Alternatively can be redirected to 127.0.0.1 (localhost), but will take longer to process with large number of
# HOSTS entries.
# http://en.wikipedia.org/wiki/Hostname
# To (re)enable/disable/edit/customize -> open HOSTS file as Administrator in Notepad/similar/better free(ware)
# plain text/ASCII editor
# http://www.mdgx.com/toy.htm#TXT
# -> comment/remark (precede each line with # followed by 1 space) or delete desired line(s) -> save it as HOSTS
# (no extension) -> refresh (F5)/restart your app(s)/browser(s)/service(s)/device(s) or reboot/restart if needed.
##############################################################################
# Lines below disable NVidia automatic updates, data collection + telemetry:
0.0.0.0 accounts.nvgs.nvidia.com
0.0.0.0 activation.gfe.nvidia.com
0.0.0.0 api.gfe.nvidia.com
0.0.0.0 assets.nvidiagrid.net
0.0.0.0 download.gfe.nvidia.com
0.0.0.0 events.gfe.nvidia.com
0.0.0.0 gfe.geforce.com
0.0.0.0 gfe.nvidia.com
0.0.0.0 gfwsl.geforce.com
0.0.0.0 images.nvidiagrid.net
0.0.0.0 rds-assets.nvidia.com
0.0.0.0 services.gfe.nvidia.com
0.0.0.0 telemetry.nvidia.com
0.0.0.0 telemetry.gfe.nvidia.com
------End cut & paste here------
______________________________________________________________________________



Java No Java



* Oracle (Sun) Java Runtime Environment (JRE) Standard Edition (SE) 32-bit + 64-bit -> SOFTWARE.TXT (included):
http://www.mdgx.com/add.htm#JAVA

* Block/disable Java (out-of-date) prompts + automatic updates:
http://discussions.citrix.com/topic/363880-your-java-version-is-out-of-date-how-to-blockdisable/
http://www.itninja.com/question/can-t-suppress-java-1-8-upd-74-update-prompts/
Java network:
http://community.spiceworks.com/how_to/65130/
Java Auto Update:
http://www.java.com/en/download/help/java_update.xml
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\AppDataLow\Software\JavaSoft\DeploymentProperties]
"deployment.security.sandbox.awtwarningwindow"="false"
"deployment.expiration.decision"="never"
"deployment.expiration.decision.locked"="false"
"deployment.expiration.decision.suppression"="false"
"deployment.expiration.decision.suppression.locked"="false"
"deployment.expiration.check.enabled"="false"
"deployment.expiration.check.enabled.locked"="false"
"deployment.security.mixcode"="HIDE_RUN"
"deployment.security.jsse.hostmismatch.warning"="false"
"deployment.security.jsse.hostmismatch.warning.locked"="false"
"deployment.roaming.profile"="false"
"deployment.system.tray.icon"="false"
"deployment.webjava.enabled"="false"
; Windows NTx 64-bit (x64) only:
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\AppDataLow\Software\JavaSoft\DeploymentProperties]
"deployment.security.sandbox.awtwarningwindow"="false"
"deployment.expiration.decision"="never"
"deployment.expiration.decision.locked"="false"
"deployment.expiration.decision.suppression"="false"
"deployment.expiration.decision.suppression.locked"="false"
"deployment.expiration.check.enabled"="false"
"deployment.expiration.check.enabled.locked"="false"
"deployment.security.mixcode"="HIDE_RUN"
"deployment.security.jsse.hostmismatch.warning"="false"
"deployment.security.jsse.hostmismatch.warning.locked"="false"
"deployment.roaming.profile"="false"
"deployment.system.tray.icon"="false"
"deployment.webjava.enabled"="false"
[HKEY_LOCAL_MACHINE\SOFTWARE\Oracle\JavaDeploy]
"WebDeployJava"="disabled"
"deployment.modified.timestamp"="9999999999999"
"deployment.webjava.enabled"="false"
; Windows NTx 64-bit (x64) only:
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Oracle\JavaDeploy]
"WebDeployJava"="disabled"
"deployment.modified.timestamp"="9999999999999"
"deployment.webjava.enabled"="false"
[HKEY_LOCAL_MACHINE\SOFTWARE\JavaSoft]
"RegDeployStatus"="0"
; Windows NTx 64-bit (x64) only:
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\JavaSoft]
"RegDeployStatus"="0"
[HKEY_LOCAL_MACHINE\SOFTWARE\JreMetrics]
"DisableSponsors"="Y"
; Windows NTx 64-bit (x64) only:
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\JreMetrics]
"DisableSponsors"="Y"
[HKEY_LOCAL_MACHINE\SOFTWARE\JavaSoft\Java Update\Policy]
"EnableAutoUpdateCheck"=dword:0
"EnableJavaUpdate"=dword:0
"NotifyDownload"=dword:0
"NotifyInstall"=dword:0
"UpdateSchedule"=dword:0
[HKEY_LOCAL_MACHINE\SOFTWARE\JavaSoft\Java Update\Policy\jucheck]
"EnableAutoUpdateCheck"=dword:0
"EnableJavaUpdate"=dword:0
"NotifyDownload"=dword:0
"NotifyInstall"=dword:0
"UpdateSchedule"=dword:0
; Windows NTx 64-bit (x64) only:
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\JavaSoft\Java Update\Policy]
"EnableAutoUpdateCheck"=dword:0
"EnableJavaUpdate"=dword:0
"NotifyDownload"=dword:0
"NotifyInstall"=dword:0
"UpdateSchedule"=dword:0
; Windows NTx 64-bit (x64) only:
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\JavaSoft\Java Update\Policy\jucheck]
"EnableAutoUpdateCheck"=dword:0
"EnableJavaUpdate"=dword:0
"NotifyDownload"=dword:0
"NotifyInstall"=dword:0
"UpdateSchedule"=dword:0
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SunJavaUpdateSched"=-
; Windows NTx 64-bit (x64) only:
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run]
"SunJavaUpdateSched"=-
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run]
"SunJavaUpdateSched"=-
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Run]
"SunJavaUpdateSched"=-
;
------End cut & paste here------
NOTE:
"Wow6432Node" registry keys are valid only for Windows NTx 64-bit (x64) OSes.

* Customize (see above) deployment.properties plain text/ASCII file located in:
%UserProfile%\AppData\LocalLow\Sun\Java\Deployment
C:\Users\%UserName%\AppData\LocalLow\Sun\Java\Deployment
Right-click deployment.properties (see above) -> Open with... -> Notepad/similar/better free(ware) plain text/ASCII
editor/viewer
http://www.mdgx.com/toy.htm#TXT
-> Run as Administrator -> add/change/delete desired lines/values/strings -> save file.

* Add Java environment variable(s) to the list of SET commands (example):
http://www.ss64.com/nt/set.html
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text BATch (.bat) or CoMmanD (.cmd) script file containing the lines between Cut & Paste delimiters below
-> save it as plain text/ASCII file (Encode: -> ANSI) with the BAT (.bat) or CMD (.cmd) extension -> right-click it ->
Run as Administrator -> wait for completion.
-----Begin cut & paste here-----
@ECHO OFF
IF NOT "%OS%"=="Windows_NT" GOTO END
IF NOT EXIST %WinDir%\SYSTEM32\SETX.EXE GOTO END
SETX.EXE deployment.expiration.check.enabled "false" /M
:END
EXIT
------End cut & paste here------
______________________________________________________________________________



Save Files List -> Text



* Create, view/edit, rename, copy/move, print & save/frame/hang on the wall/delete/whatevah the list of all the files inside
the drive/partition/volume or directory/folder of your choice, and all their (sub)directories/(sub)folders, in descending
Latin based alphabetical order,
http://en.wikipedia.org/wiki/Latin-script_alphabet
ordered by logical numeric value [0 -> 9 + A -> Z]:
http://web.archive.org/web/20150429091622/http://www.computing.net/answers/programming/log-file-date-and-time/18190.html
http://web.archive.org/web/20210506121738/http://www.intelliadmin.com/index.php/2007/02/create-a-date-and-time-stamp-in-your-batch-files/
http://www.serverfault.com/questions/16706/
http://www.techrepublic.com/forums/questions/dos-command-help/
http://www.ss64.com/nt/syntax-getdate.html
Usage:
1. Example: Highlight/select all (sub)folders and file(s), if more than 1 -> hold down Shift and left-click the 1st and then
the last (sub)folder/file on the list without releasing the Shift key.
NOTE:
In case you highlight/select more than 1 (sub)folder(s)/file(s) a separate text (.txt) file with different date + time
stamp(s) will be created in each of the selected (sub)folder(s), if more than 1.
2. Right-click on highlight/selection above -> select "Files &List 封> Text File: MM-DD-YYYY_(h)h-mm-ss.txt" -> go to the
(sub)directory/(sub)folder selected above, or to each of them if more than 1 -> now you can see a newly created text (.txt)
file -> right-click on it -> select Open or Edit -> will open in your Notepad/similar/better plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
associated with text (.txt) files as default program.
3. View/edit, rename, copy/move, print & save/delete this text file.
Explanation:
In Windows NTx time displays by default in 24 hours format.
Before 10:00 AM the hour display uses only 1 position to hold numbers from 0 to 9.
This is what it looks like by running the built-in DOS console TIME command (example):
1:14:16.57
with only 10 total available positions, as 1st 0 doesn't display.
After 10:00 AM time display increases to 11 total available positions (example):
11:15:18:33
with 2 positions for hour display.
For hours between 0 and 9 you need to use this TIME command:
%time:~1,1%.
For hours between 0 and 9 you need to use this text (.txt) file naming format (example):
File_Name_%date:~4,2%%date:~7,2%%date:~10,4%%time:~1,1%%time:~3,2%%time:~6,2%%time:~9,2%.txt
Where:
%time:~1,1% = hours
%time:~3,2% = minutes
%time:~6,2% = seconds
%time:~9.2% = milliseconds
From 10:00 AM to 24:00 [00:00 AM], when hour display occupies 2 positions, time display has 11 positions, in which case you
need to use this TIME command:
%time:~0,2%
Final code for file name display from 10:00 AM to 24:00 [00:00 AM] looks like this (example):
File_Name_%date:~4,2%%date:~7,2%%date:~10,4%%time:~0,2%%time:~3,2%%time:~6,2%%time:~9,2%.txt
The built-in DOS console DATE command displays in "Day mm/dd/yyyy" format, so current date looks like this (example):
Wed 07/07/2077
for a total of 14 positions, including spaces and demarcations/forward slashes.
DATE command format:
%date:~4,2% = month display with 2 digits
%date:~6,2% = day display with 2 digits
%date:~10,4% = year display with 4 digits
In case you prefer year display with only 2 digits use this format:
%date:~12,2%,
You can move any part of the DATE command around to customize presentation format to your liking/needs.
Example: if moving year section [%date:10,4%] up front, format changes to [yyyyddmm], and so on.
Example of BATch (.bat)/CoMmanD (.cmd) file used for time of day reference, or/and for BATch/CoMmanD job(s) to be
scheduled at different time(s) of day, say before and/or after 10:00 AM (example):
COPY /Y Old_File_Name.txt New_File_Name_%time:~0,2%%time:~3,2%%time:~6,2%_%date:~-10,2%%date:~-7,2%%date:~-4,4%.txt
You can also customize the built-in DOS console DIR command to list files in a different order (example):
DIR "%1" /A:-D /B /O:GNE /-P /S
View all available DIR command line options, switches + parameters:
DIR /?
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
; Reorder files + folders names alphabetically by logical numeric value -> see further above, also online:
; http://www.mdgx.com/7.php
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer]
"NoStrCmpLogical"=dword:1
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Directory\shell\Files_List_2_Text]
@="Files &List 封> Text File: MM-DD-YYYY_(h)h-mm-ss.txt"
"Extended"=-
"NoWorkingDirectory"=""
"SuppressionPolicy"=dword:0
"Icon"="SHELL32.DLL,19"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Directory\shell\Files_List_2_Text\command]
@="CMD.EXE /C DIR \"%1\" /A:-D /B /O:GNE /-P /S>\"%1\"\\\"%%date:~-10,2%%-%%date:~-7,2%%-%%date:~-4,4%%_%%time:~1,1%%-%%time:~3,2%%-%%time:~6,2%%.txt\""
"IsolatedCommand"=-
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Drive\shell\Files_List_2_Text]
@="Files &List 封> Text File: MM-DD-YYYY_(h)h-mm-ss.txt"
"Extended"=-
"NoWorkingDirectory"=""
"SuppressionPolicy"=dword:0
"Icon"="SHELL32.DLL,19"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Drive\shell\Files_List_2_Text\command]
@="CMD.EXE /C DIR \"%1\" /A:-D /B /O:GNE /-P /S>\"%1\"\\\"%%date:~-10,2%%-%%date:~-7,2%%-%%date:~-4,4%%_%%time:~1,1%%-%%time:~3,2%%-%%time:~6,2%%.txt\""
"IsolatedCommand"=-
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\*\shell\Files_List_2_Text]
@="Files &List 封> Text File: MM-DD-YYYY_(h)h-mm-ss.txt"
"Extended"=-
"NoWorkingDirectory"=""
"SuppressionPolicy"=dword:0
"Icon"="SHELL32.DLL,19"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\*\shell\Files_List_2_Text\command]
@="CMD.EXE /C DIR \"%1\" /A:-D /B /O:GNE /-P /S>\"%1\"\\\"%%date:~-10,2%%-%%date:~-7,2%%-%%date:~-4,4%%_%%time:~1,1%%-%%time:~3,2%%-%%time:~6,2%%.txt\""
"IsolatedCommand"=-
;
------End cut & paste here------
______________________________________________________________________________



Maximize Your Internet/Network Traffic Speed = MTU



Tweak optimal Maximum Transmission Unit (MTU) used by your Internet Service Provider (ISP)/network host/provider to
maximize your internet/network connection/interface traffic speed in Windows 7/newer:
http://docs.microsoft.com/troubleshoot/windows-client/networking/change-default-mtu-size-for-ppp-vpn-connection/
http://docs.microsoft.com/answers/questions/535814/
http://www.maketecheasier.com/3-ways-to-increase-network-speed-via-registry-editor-windows/
http://myrandomtechblog.com/cryptomining/change-mtu-size-in-windows-10/
http://answers.microsoft.com/en-us/windows/forum/all/how-to-change-mtu-settings-in-windows-10/5c36c250-a0e8-47ee-b01c-de22139dc297/
http://www.networkworld.com/article/2224654/
http://www.techtarget.com/searchnetworking/definition/maximum-transmission-unit/
http://en.wikipedia.org/wiki/Maximum_transmission_unit
* Method 1 [the easiest way ;-/]:
*********************************
Test your MTU optimal numeric value [measured in bytes (octets)] in 1 step -> type a server IP in the IPv4 box (using
google.com IP: 142.250.69.238 in this example):
http://www.letmecheck.it/mtu-test.php
In case you already have the optimal value of 1500 [the built-in/preset default/standard in Windows NTx OSes and most ISPs +
IPv4 networks] your MTU is already configured for maximum speed, and you don't need to do anything else, you're all set. ;-/
* Method 2 [the hard way ;-/]:
******************************
From a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE): right-click CMD shortcut/CMD.EXE -> Run as Administrator ->
run this command to view your Maximum Transmission Unit (MTU) value [the built-in/preset default/standard in Windows NTx
OSes and most ISPs + IPv4 networks] for your active internet/network Internet Protocol version 4 (IPv4) interface -> press
Enter:
NETSH.EXE interface ipv4 show subinterfaces
In my case: Interface = "Ethernet".
Network Shell (NetSh) [NETSH.EXE] DOS console command line tool is located in the %WinDir%\SYSTEM32 folder [%WinDir% =
usually C:\WINDOWS].
View all directories/folders listed in your system PATH from a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE):
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter:
PATH
NETSH:
http://www.ss64.com/nt/netsh.html
From a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE): right-click CMD shortcut/CMD.EXE -> Run as Administrator ->
run this command by replacing "Ethernet" with the actual name of your active interface in order to set permanently the value
of your interface MTU parameter to 1472 (using same interface name from example above: Ethernet) -> press Enter:
NETSH.EXE interface ipv4 set subinterface Ethernet mtu=1472 store=persistent
Substitute Ethernet with your actual interface name revealed by running previous NetSh "show subinterfaces" command above.
1472 [bytes (octets)] actually translates to MTU=1500, because the "missing" 28 bytes are used by the Internet Control
Message Protocol (ICMP) header [8 bytes (octets)] + the Internet Protocol (IP) [20 (octets)]:
http://community.arubanetworks.com/browse/articles/blogviewer?blogkey=75a5f030-1e9e-49bd-82d2-9a7f99c5aa82
In case you see this message
Ok.
you already have the optimal value of 1500 [the built-in/preset default/standard in Windows NTx OSes and most ISPs + IPv4
networks], your MTU is already configured for maximum speed, and you don't need to do anything else, you're all set. ;-/
In case you see any other message your MTU value is other than 1472 [which corresponds to MTU=1500 -> see above] (in rare
cases, depending on certain internet/network providers/hosts), and therefore you need to determine its actual value, and set
it accordingly in your registry in order to maximize your connection/interface speed.
From a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE): right-click CMD shortcut/CMD.EXE -> Run as Administrator ->
run this command -> press Enter:
PING.EXE google.com -f -l 1472
wait a few seconds, and view the received message.
Ping [PING.EXE] DOS console command line tool is located in the %WinDir%\SYSTEM32 folder [%WinDir% = usually C:\WINDOWS].
View all directories/folders listed in your system PATH from a DOS console command prompt (%WinDir%\SYSTEM32\CMD.EXE):
right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter:
PATH
PING:
http://www.ss64.com/nt/ping.html
If you have received a "Reply" message (example):
Reply from 142.250.69.238: bytes=68 (sent 1472) time=14ms TTL=112
followed by
Packets: [...] Lost = 0 (0% loss),
then your MTU value is 1472 [which corresponds to MTU=1500 -> see above] [the built-in/preset default/standard in Windows
NTx OSes and most ISPs + IPv4 networks], and your MTU is already configured for maximum speed, and you don't need to do
anything else, you're all set. ;-/
Values for bytes (octets), time [measured in milliseconds = ms] + Time To Live (TTL) [measured in seconds] can be different
depending on many changing factors (examples): location, distance (number of hops) from pinged server, type of
connection/service, server, latency (lag), traffic health/status.
In case you receive a "fragmented" message
Packet needs to be fragmented but DF set
followed by (example)
Packets: [...] Lost = 4 (100% loss),
you should re-test again (a few more times if necessary) by lowering your MTU numeric value in small increments [2, 3, 4, 6]
until the result is replaced by a normal "Reply" message (example):
Reply from 142.250.69.238: bytes=68 (sent 1472) time=14ms TTL=112
In case the returned value is 1472 [which corresponds to MTU=1500 -> see above], then you already have the optimal value of
1500 [the built-in/preset default/standard in Windows NTx OSes and most ISPs + IPv4 networks], and your MTU is already
configured for maximum speed, and you don't need to do anything else, you're all set. ;-/
In case your returned value is other than 1472 [which corresponds to MTU=1500 -> see above], then you can determine and set
your optimal MTU value -> see "* Method 1 [the easiest way ;-/]:" further above.
You can set the optimal MTU value for your active internet/network connection/connectoid/interface:
- by runing the NetSh "store=persistent" command -> see further above.
- OR by tweaking your registry -> see below:
TIP:
Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain
text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK
to all prompts to register/merge/import its information into your registry.
-----Begin cut & paste here-----
REGEDIT4
; In this example MTU [32-bit DWORD (REG_DWORD) value] = 5dc [hexadecimal (base 16)] = 1500 [decimal (numeric) (base 10)],
; which is the built-in/preset default/standard in Windows NTx OSes and most ISPs + IPv4 networks:
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{00000000-AAAA-1111-BBBB-222222222222}]
"MTU"=dword:5dc
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{00000000-AAAA-1111-BBBB-222222222222}]
"MTU"=dword:5dc
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\Tcpip\Parameters\Interfaces\{00000000-AAAA-1111-BBBB-222222222222}]
"MTU"=dword:5dc
;
------End cut & paste here------
You need to substitute all "00000000-AAAA-1111-BBBB-222222222222" (generic) instances with your actual Decentralized
IDentifier (DID) (hard link) string which corresponds to your active internet/network connection/interface present in your
registry under the "CurrentControlSet" Hive Key Local Machine (HKLM) subkey above.
See "Link Directory IDentifier (LDID)/DIRectory IDentifier (DIRID)/Decentralized IDentifier (DID)..." topic further above:
http://www.mdgx.com/7.php
http://www.mdgx.com/WINDOWS7.TXT
More info:
Wikipedia: Time To Live (TTL):
http://en.wikipedia.org/wiki/Time_to_live
Wikipedia: Ping:
http://en.wikipedia.org/wiki/Ping_(networking_utility)
Wikipedia: NetSh:
http://en.wikipedia.org/wiki/Netsh
MDGx "Comprehensive Windows Registry Guide" chapter in REGISTRY.TXT (included):
http://www.mdgx.com/reg.htm
MTU tweaking tool [free(ware)]:
TCP Optimizer 32-bit tweaks TCP/IP parameters to maximize Internet performance:
http://www.speedguide.net/tcpoptimizer.php
File:
http://www.speedguide.net/files/TCPOptimizer.exe
TCP Optimizer Documentation:
http://www.speedguide.net/articles.php?category=99
______________________________________________________________________________



Windows 7/8/8.1/10/11 Wikipedia Resources + Free eBooks



* Windows 7/newer Wikipedia resources (English language):
- Windows 10:
http://en.wikipedia.org/wiki/Windows_10
- Category -> Windows 10:
http://en.wikipedia.org/wiki/Category:Windows_10
- Windows 10 Editions:
http://en.wikipedia.org/wiki/Windows_10_editions
- Windows 10 Version History:
http://en.wikipedia.org/wiki/Windows_10_version_history
- List of features removed/missing in Windows 10:
http://en.wikipedia.org/wiki/List_of_features_removed_in_Windows_10
- Criticism of Windows 10:
http://en.wikipedia.org/wiki/Criticism_of_Windows_10
- Windows 8.1:
http://en.wikipedia.org/wiki/Windows_8.1
- Windows 8:
http://en.wikipedia.org/wiki/Windows_8
- Category -> Windows 8/8.1:
http://en.wikipedia.org/wiki/Category:Windows_8
- Windows 8 Editions:
http://en.wikipedia.org/wiki/Windows_8_editions
- List of features removed/missing in Windows 8/8.1:
http://en.wikipedia.org/wiki/List_of_features_removed_in_Windows_8
- Criticism of Windows:
http://en.wikipedia.org/wiki/Criticism_of_Microsoft_Windows
- Windows 7:
http://en.wikipedia.org/wiki/Windows_7
- Category -> Windows 7:
http://en.wikipedia.org/wiki/Category:Windows_7
- Features new to Windows 7:
http://en.wikipedia.org/wiki/Features_new_to_Windows_7
- List of features removed/missing in Windows 7:
http://en.wikipedia.org/wiki/List_of_features_removed_in_Windows_7
- Windows NT [NTx]:
http://en.wikipedia.org/wiki/Windows_NT
- Comparison of Windows versions:
http://en.wikipedia.org/wiki/Comparison_of_Microsoft_Windows_versions
- List of Windows versions:
http://en.wikipedia.org/wiki/List_of_Microsoft_Windows_versions
- List of Windows NT [NTx] family codenames:
http://en.wikipedia.org/wiki/List_of_Microsoft_codenames#Windows_NT_family

* Windows 7/newer eBooks, Guides + Tutorials in PDF format (free):
- Thiel College: Windows 10 Step by Step (2018) [PDF]:
http://www.thiel.edu/assets/documents/offices/information-technology/Windows_10_Training.pdf
- MS Press: Introducing Windows 10 for IT Professionals - Preview Edition (2015) [PDF]:
http://download.microsoft.com/download/D/2/B/D2B18586-8C4F-4F40-828D-99D96489152A/Microsoft_Press_eBook_Introducing_Windows_10_Preview_PDF.pdf
- MS Press: Windows 7 Step by Step (2010) [PDF]:
http://www.spumonte.com/files/PDFs/_PC%20Books_/Windows%207/MS%20Press%20-%20Windows%207%20Step%20by%20Step.pdf
- Windows Guides: Windows 7 The Pocket Guide (RC1) (2009) [PDF]:
http://www.spumonte.com/files/PDFs/_PC%20Books_/Windows%207/Windows%207%20-%20The%20Pocket%20Guide.pdf
- QUE: Learn Windows 7 (2011) [PDF]:
http://www.pearsoned.co.uk/media/learn_win_7_download.pdf
- WindowsVJ: Windows 7 Tips & Tricks (2009) [PDF]:
http://www.windowsvj.com/wpblog/downloads/Windows%207%20%20Tips%20&%20Trics%20%5BVasu%20Jain%5D.pdf
- Wiley: Windows 7 Secrets (2009) [PDF]:
http://muricmilorad.files.wordpress.com/2012/03/windows-7-secrets.pdf
- MakeUseOf: The Windows 7 Guide (2009) [PDF]:
http://manuals.makeuseof.com.s3.amazonaws.com/for-mobile/makeuseof_Windows_7_Guide_r2.pdf
- UDM: Windows 7 Quick Reference Guide (2008) [PDF]:
http://www.udmercy.edu/about/its/help/files/windows7.pdf
- TheLongClimb: Windows 7 Power Users Guide (2009) [PDF]:
http://web.archive.org/web/20111110041616/http://www.thelongclimb.com/books/win7powerfree.pdf
- MS Press: Windows 7 Resource Kit (2009) [PDF]:
http://jacermeno.files.wordpress.com/2010/06/microsoft-press-windows-7-resource-kit-oct-2009.pdf
- TheWindowsClub: Windows 7 A Beginner's Guide (2009) [ZIPped PDF]:
http://www.thewindowsclub.com/downloads/W7ebookpdf.zip
- Computer-PDF: Windows 7/newer Tutorials [PDF]:
http://www.computer-pdf.com/operating-system/windows/
______________________________________________________________________________



Free(ware), Open Source + Portable Software + Games @ MDGx.com



* MDGx web pages (all included):
- "List of Useful Windows NTx Tools" in TOOLS.TXT:
http://www.mdgx.com/tools.php
http://www.mdgx.com/TOOLS.TXT
- "Windows NTx Power Toys" section in SOFTWARE.TXT:
http://www.mdgx.com/toy.htm
- "Power Toys on the Internet" section in SOFTWARE.TXT:
http://www.mdgx.com/toy.htm#PTL
- "Windows NTx Tools" section in SOFTWARE.TXT:
http://www.mdgx.com/xptoy.htm
- "Internet Power Toys" section in SOFTWARE.TXT:
http://www.mdgx.com/nettoys.htm
- "Firewalls + Network Toys" section in SOFTWARE.TXT:
http://www.mdgx.com/fw.htm
- "Free Online Privacy, Safety + Security Scanners" (online only):
http://www.mdgx.com/safety.htm
- "Speed-Up + Benchmark Tools" section in SOFTWARE.TXT:
http://www.mdgx.com/speed.htm
- "Disk Partitioning, Formatting, Backup + Recovery Tools" section in SECRETS.TXT:
http://www.mdgx.com/secrets.htm#FDPT
- "WWW/FTP, HTML + Image Publishing Tools" (online only):
http://www.mdgx.com/html.htm
- "FREEbies: Software Sites" (online only):
http://www.mdgx.com/free.htm
- "PC Games":
http://www.mdgx.com/g.htm#GL

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
Back 2 Top
MDGx MAX Speed WinDOwS
MDGx