@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ MDGx MAX Speed WinDOwS ©Tricks · Secrets · Bugs · Fixes ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯http://www.mdgx.com/¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯ ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯ Windows 7/7 SP1/2008 R2 Tweaks, Fixes, Guides, Downloads + Links ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯ These topics refer strictly to all English retail/final/gamma/Gold/RTM/OEM releases, versions, editions + builds [including previews, Service Packs (SPs), updates + patches] 32-bit (x86) + 64-bit (x64) of these Microsoft Windows operating systems (OSes) - 7 http://en.wikipedia.org/wiki/Windows_7 http://en.wikipedia.org/wiki/Windows_7_editions - Server 2008 R2 http://en.wikipedia.org/wiki/Windows_Server_2008_R2 unless specified otherwise: http://www.mdgx.com/7.php Also available as plain text/ASCII file (this file): http://www.mdgx.com/WINDOWS7.TXT BONUS: More Windows 7/7 SP1 (clearly marked) tweaks, hacks, fixes, guides, links + tools (all included): - MDGx "Win10 Block Tools (10_BLOCK)" in 10_BLOCK.TXT: http://www.mdgx.com/xptoy.htm#10BLK http://www.mdgx.com/10BLK/10_BLOCK.php http://www.mdgx.com/10BLK/10_BLOCK.TXT - MDGx "Windows 10/11 Tweaks, Fixes, Guides, Downloads + Links" in WIN10.TXT: http://www.mdgx.com/10.php http://www.mdgx.com/WIN10.TXT - MDGx "Windows 8/8.1 Tweaks, Fixes, Guides, Downloads + Links" in WINDOWS8.TXT: http://www.mdgx.com/8.php http://www.mdgx.com/WINDOWS8.TXT - MDGx "List of Useful Windows NTx Tools [free(ware)]" in TOOLS.TXT: http://www.mdgx.com/tools.php http://www.mdgx.com/TOOLS.TXT FYI: Windows NTx (based on Windows NT) = Windows NT4/2000/XP/2003/Vista/2008/7/8/8.1/2012/10/2016/2019/11/2022/newer Windows 9x (based on Windows 95) = Windows 95/95 OSR1/95 OSR2.x/98/98 SP1/98 SE(U)/ME @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @@ ALWAYS BACKUP ALL YOUR OPERATING SYSTEM DRIVES TO A SAFE LOCATION @@ @@ BEFORE ATTEMPTING TO MAKE ANY SYSTEM CHANGES ! @@ @@ -> "Free(ware) WinDOwS Backup + Restore Tools" section in @@ @@ SECRETS.TXT (included): @@ @@ http://www.mdgx.com/secrets.htm#BKP @@ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ WARNING: * Take EXTREME CAUTION when modifying/adjusting/customizing your Registry/System/Startup files/configuration/settings! Faulty changes may result in crashes/lockups/permanent data loss, or might lead to having you REINSTALL your Operating System(s)! YOU are the ONLY one responsible for ANY changes YOU make! ALWAYS HAVE YOUR MOST RECENT SYSTEM BACKUP READY! -> "Free(ware) WinDOwS Backup + Restore Tools" in SECRETS.TXT (included): http://www.mdgx.com/secrets.htm#BKP * BACKUP YOUR REGISTRY BEFORE MAKING ANY CHANGES! -> "BACKUP/EXPORT + RESTORE/IMPORT REGISTRY/REGISTRY KEY(S)" in WINDOWS7.TXT (this file): http://www.mdgx.com/7.php#:~:text=BACKUP%2FEXPORT%20%2B%20RESTORE%2FIMPORT%20REGISTRY%2FREGISTRY%20KEY%28S%29%20%21 * Some of these tricks + apps/programs/tools/scripts require adequate/advanced knowledge about critical computing, operating systems (OSes), registry, services, shared environments, networks, cybersecurity, and other related subjects/disciplines: http://en.wikipedia.org/wiki/Category:Microsoft_operating_systems http://en.wikipedia.org/wiki/Windows_Registry http://www.mdgx.com/reg.htm http://en.wikipedia.org/wiki/Category:Windows_services http://en.wikipedia.org/wiki/Real-time_computing http://en.wikipedia.org/wiki/Enterprise_software http://en.wikipedia.org/wiki/Shared_resource http://en.wikipedia.org/wiki/Computer_network http://en.wikipedia.org/wiki/Computer_security http://en.wikipedia.org/wiki/Network_security NOTES: - These ©Tricks + Secrets have been tested on many computers, but with NO guarantee they should also work for you. - Some of these tips I stumbled upon while browsing the Internet or while helping others with WinDOwS problems, some were kindly sent in by concerned readers (all authors/contributors are acknowledged and reliable sources given proper credit), and some I discovered on my own. Enjoy the ride. - Contributed tips (clearly marked) and other web sites mentioned here do not necessarily reflect the opinion of the author + owner of these files + of this web site. IMPORTANT: ********** http://www.mdgx.com/importnt.php * Some of these files are archived in ZIP [http://en.wikipedia.org/wiki/Zip_%28file_format%29], RAR [http://en.wikipedia.org/wiki/RAR_%28file_format%29], 7Z [http://en.wikipedia.org/wiki/7z] or CAB [http://en.wikipedia.org/wiki/Cabinet_%28file_format%29] format. You need a file decompression (unZIPping/unARChiving/unRARing) tool to extract their contents. I recommend [free(ware)]: - Windows 9x/NTx users: File Shrinkers 32-bit + 64-bit: http://www.mdgx.com/toy.htm#ZIP - Windows/WfWG 3.1x users: Info-ZIP WiZ 16-bit: http://www.info-zip.org/WiZ.html#Win16 - DOS/MS-DOS/FreeDOS/DR-DOS/OpenDOS users: DOS ZIP/unZIP 16-bit tools: http://www.mdgx.com/dos.htm#ZIP * STAY SAFE -> Scan for viruses *all* files downloaded from the Internet: http://www.mdgx.com/vir.htm and *beware* of false positives (included): http://www.mdgx.com/fp.php http://www.mdgx.com/FALSPOSI.TXT * Target Operating System(s)/software/hardware REQUIRED for installing upgrades/patches/fixes/drivers! * Installing Windows OS components/upgrades/patches/fixes/drivers/tools may require you to be logged on with Administrative/Power User/Sysadmin privileges. * Windows Vista/newer users: right-click each file and select "Run as Administrator" (temporary fix) or disable User Account Control (UAC) (permanent fix) in: - Windows 10/2016/2019/11/2022: http://www.tenforums.com/tutorials/3577-user-account-control-uac-change-settings-windows-10-a.html - Windows 8/2012/8.1/2012 R2: http://www.eightforums.com/tutorials/5509-user-account-control-uac-change-settings-windows-8-a.html - Windows 7/2008 R2: http://www.petri.com/disable-uac-in-windows-7/ - Windows Vista/2008: http://www.petri.com/disable_uac_in_windows_vista/ User Account Control (UAC) tweaking tools [free(ware)]: - UAC Pass: http://sites.google.com/site/freeavvarea/uac-pass/uac-pass/ - TweakUAC: http://www.winability.com/tweak-uac/ - Disable UAC: http://www.majorgeeks.com/files/details/disable_uac.html FYI: MDGx Tweaked + Customized File Manager (FM) installer FMNT32.EXE (free): http://www.mdgx.com/xptoy.htm#FMNT also installs "Disable User Account Control (UAC)" + "Enable User Account Control (UAC)" items to Desktop right-click shell context menu. * NEWest at the top -> OLDest at the bottom. * Items labeled as "discontinued!": obsolete, unmaintained +/- abandoned. * Most all software featured here is free(ware): - Freeware: http://en.wikipedia.org/wiki/Freeware - Free: http://en.wikipedia.org/wiki/Free_software - Open Source: http://en.wikipedia.org/wiki/Open-source_software * I do not recommend any crippled/demo/limited/shareware/trialware/retail software, except the few essentials on my *MUST HAVE* list: http://www.mdgx.com/toy.htm and only if I could not find any free(ware) alternative. * Most unofficial Windows OSes (Hot)Fixes, Packs + Updates created using official Microsoft IEAK {INF [http://www.mdgx.com/add.htm#INF] + SED [http://www.mdgx.com/INF_web/cdfinfo.htm]} installer toolkit (free): http://www.mdgx.com/add.htm#IEA * Check back often for NEW tools + UPDATEs. * FYI: Certain MDGx.com [http://www.mdgx.com/] ancient/old(er), deprecated/discontinued/obsolete/unneeded, deleted/moved/renamed web pages, documents, files, directories/folders are most likely to have been archived/saved for posterity by these entities, and may still be available for free (gratis): - Internet Archive (WayBack Machine) [2003 - 2023]: http://web.archive.org/web/*/http://www.mdgx.com/ - archive.today (Webpage Capture) [2014 - 2022]: http://archive.is/http://www.mdgx.com/ * MDGx.com archived/saved directories/folders + all their files: - /files/ -> from 2021: http://web.archive.org/web/20210506185314/http://www.mdgx.com/files/ - /spx/ -> from 2019: http://web.archive.org/web/20210506152359/http://www.mdgx.com/spx/list.php - /sbdrv/ -> from 2021: http://www.mdgx.com/sbdrv/ * Please let me know if you discover any broken links: http://www.mdgx.com/form.htm * Thank you for your time and patience. ;-/ * Enjoy. ;-) Please send me feedback online: http://www.mdgx.com/form.htm Thanks. ;-/ Must have + useful Windows NTx Software Programs [99.99% free(ware)] from TOOLS.TXT (included): http://www.mdgx.com/tools.php http://www.mdgx.com/TOOLS.TXT Must have + useful Software Programs [99.99% free(ware)] from SOFTWARE.TXT (included): - MDGx Windows NTx Extras: http://www.mdgx.com/xptoy.htm - MDGx 1000+ Windows NTx Power Toys + Tweaking Tools: http://www.mdgx.com/toy.htm - MDGx Windows NTx Web Browsers + Internet Power Toys: http://www.mdgx.com/nettoys.htm WINDOWS7.TXT Contents: [New ©tweaks added at the TOP] BACKUP/EXPORT + RESTORE/IMPORT REGISTRY/REGISTRY KEY(S) http://www.mdgx.com/7.php#:~:text=BACKUP%2FEXPORT%20%2B%20RESTORE%2FIMPORT%20REGISTRY%2FREGISTRY%20KEY%28S%29%20%21 Tweaks, Hacks + Fixes... UNconventional, UNdocumented, UNcensored ;-/ Updates/(Hot)Fixes/Patches + Windows Update (WU) Turn OFF/Remove Windows 7/8/8.1 Adware, Spyware, Security Flaws + Repair/Restore Privacy Turn OFF/Remove Windows 10 Adware, Spyware, Security Flaws + Repair/Restore Privacy -> WIN10.TXT (included): http://www.mdgx.com/10.php Everything About The Infamous (Not So) Trusted Installer Task Scheduler Tweaks Patch Windows 7 Customize BOOT Screens Desktop Background/Wallpaper Tweaks + Free(ware) Tools Free(ware) 7/8/8.1/10/11 Aero Tools + Tweaks Free(ware) Windows 7 Replacement Apps + Tweaking Tools Free(ware) Start Menu Shell Replacements Turn OFF/ON User Account Control (UAC) Free(ware) BOOT Tools + Tweaks Windows Side-by-Side (WinSxS) Folder Free(ware) Burn/Copy/Write/Install CDs/DVDs/BDs/USB Tools OEM Application (IN)Compatibility Control Panel (CP) + Omnipotent/Master/Mega/'god mode' (OMg) Control Panel Public Root DNS Servers http://www.mdgx.com/7.php#:~:text=Public%20Root%20DNS%20Servers%20%5B%2A%5D Internet + Web Browsers Tweaks, Fixes + Tools http://www.mdgx.com/7.php#:~:text=Internet%20%2B%20Web%20Browsers%20Tweaks%2C%20Fixes%20%2B%20Tools%20%5BChromium%2FChrome%2C%20Firefox Digital + Internet/Online Privacy, Safety + Security http://www.mdgx.com/7.php#:~:text=Digital%20%2B%20Internet%2FOnline%20Privacy%2C%20Safety%20%2B%20Security%20%3D%20Your%20Top%20Priority Chromium/Chrome/X-Chromium/Thorium/Brave/Vivaldi Automated Clean-Up Put A Pin In It! XP -> 7/8/8.1 Easy Transfer Files + Settings Turn OFF/ON Windows Features Tweak Windows 7/7 SP1 Services Turn OFF Action/Security Center + Notifications/Messages Logon + Password Tweaks Clock Sync Turn OFF/ON Link Layer Topology Discovery (LLTD) + Quality of Service (QoS) CMD, Commands, Environment + Console Paging (Swap) File Tweaks Windows (Defender) Firewall (WF) Tweaks + Tools Turn OFF NVidia Telemetry Java No Java Save Files List -> Text Maximize Your Internet/Network Traffic Speed = MTU Windows 7/newer Reference, Resources + Free eBooks + Documentation Free(ware), Open Source + Portable Software + Games @ MDGx.com Tweak Windows 10/11 Services -> WIN10.TXT (included): http://www.mdgx.com/10.php Advanced Appearance (Metrics) Settings [AA(M)S] for Windows 7/newer -> WINDOWS8.TXT (included): http://www.mdgx.com/8.php Tweak, Customize + Repair Tools on the Internet [free(ware)] -> WIN10.TXT (included): http://www.mdgx.com/10.php Essential Add-ons, Components, Fixes, Updates, Tools + Games [free(ware)] -> WIN10.TXT (included): http://www.mdgx.com/10.php exFAT -> SECRETS.TXT (included): http://www.mdgx.com/secrets.htm#XFAT See also matching/related Windows NTx tweaks in WIN10.TXT, WINDOWS8.TXT, DESKTOP.TXT, MYTIPS95.TXT, REGISTRY.TXT, TIPS2000.TXT, TIPS95.TXT, TIPSXP.TXT (all included): http://www.mdgx.com/newtip.htm ______________________________________________________________________________ BACKUP/EXPORT + RESTORE/IMPORT REGISTRY/REGISTRY KEY(S) ! http://www.mdgx.com/7.php#:~:text=BACKUP%2FEXPORT%20%2B%20RESTORE%2FIMPORT%20REGISTRY%2FREGISTRY%20KEY%28S%29%20%21 * Backup/Export/Save + Restore/Import/Load/Merge the entire Registry + separate Registry (hive) keys in Windows NTx [2000/newer] 32-bit (x86) + 64-bit (x64) Operating Systems (OSes): http://support.microsoft.com/help/322756/ http://neosmart.net/wiki/backup-restore-registry/ http://www.howtogeek.com/197785/how-to-backup-and-restore-the-windows-registry/ http://blog.netwrix.com/2018/10/30/how-to-back-up-and-restore-the-windows-registry/ http://www.winhelponline.com/blog/automatically-backup-registry-hives-windows-10/ http://www.minitool.com/data-recovery/backup-and-restore-registry.html http://www.majorgeeks.com/content/page/how_to_back_up_or_restore_the_windows_registry.html http://www.windowscentral.com/how-backup-entire-registry-windows-10/ http://theitbros.com/restore-windows-10-registry-from-backup-or-restore-point/ http://www.techbout.com/backup-registry-in-windows-10-47923/ Registry hive keys (hives): http://learn.microsoft.com/windows/win32/sysinfo/registry-hives/ http://en.wikipedia.org/wiki/Windows_Registry#Keys_and_values http://www.mdgx.com/reg.htm#RTS 1. From the graphical user interface (GUI) or from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE] using RegEdit (%WinDir%\REGEDIT.EXE): http://www.mdgx.com/reg.htm#RER http://www.ss64.com/nt/regedit.html [%WinDir% = usually C:\WINDOWS]. A. Backup/Export/Save entire Registry manually: - From a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter (example): REGEDIT.EXE /E REGISTRY.reg - Right-click RegEdit (%WinDir%\REGEDIT.EXE) or its shortcut/link -> Run as Administrator -> make sure it points to "Computer" [root, entire registry] -> click File -> click Export... -> under Export Registry File -> select the folder of your choice -> type your choice of "File name:" (example: REGISTRY.reg) -> click Save -> exit RegEdit. B. Restore/Import/Load/Merge entire Registry manually: - From a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter (example using saved reg file above): REGEDIT.EXE /S REGISTRY.reg - Right-click RegEdit (%WinDir%\REGEDIT.EXE) or its shortcut/link -> Run as Administrator -> make sure it points to "Computer" [root, entire registry] -> click File -> click Import... -> under Import Registry File -> select the folder where your backed up .REG file(s) reside(s) -> highlight/select your backed up Registry (.HIV, .REG, etc) file(s) (in this example: REGISTRY.reg) -> click Open separately for each file (if more than 1) -> click OK or press Enter -> exit RegEdit. 2. From a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE] using REG (%WinDir%\SYSTEM32\REG.EXE) command line tool: http://www.mdgx.com/reg.htm#BNR http://learn.microsoft.com/windows-server/administration/windows-commands/reg/ http://www.ss64.com/nt/reg.html A. Backup/Export/Save separate Registry (hive) key(s) manually: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run these commands -> press Enter after each line (example): REG.EXE EXPORT "HKCR" HKCR.reg /y REG.EXE EXPORT "HKCU" HKCU.reg /y REG.EXE EXPORT "HKLM" HKLM.reg /y REG.EXE EXPORT "HKU" HKU.reg /y REG.EXE EXPORT "HKCC" HKCC.reg /y Where http://www.mdgx.com/reg.htm#RTS HKCR = Classes Root Hive Key: HKEY_CLASSES_ROOT HKCU = Current User Hive Key: HKEY_CURRENT_USER HKLM = Local Machine Hive Key: HKEY_LOCAL_MACHINE HKU = Users Hive Key: HKEY_USERS\.DEFAULT HKCC = Current Configuration Hive Key: HKEY_CURRENT_CONFIG On 64-bit (x64) Windows NTx OSes these commands backup also the correspondent 64-bit registry hive keys (example): the HKEY_LOCAL_MACHINE\SOFTWARE subkey is linked to the HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node subkey. More info: - MS DOCs: Registry Keys Affected by WoW64 on Windows 64-bit (x64) editions: http://msdn.microsoft.com/library/aa384253.aspx - Advanced INSTALLER: Wow6432Node Registry Key: http://www.advancedinstaller.com/user-guide/registry-wow6432-node.html - MDGx "Registry Structure" section in REGISTRY.TXT (included): http://www.mdgx.com/reg.htm#RTS B. Restore/Import/Load/Merge separate Registry (hive) key(s) manually (example using saved reg files above): locate saved reg files [see above] -> right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run these commands -> press Enter after each line (example): REG.EXE IMPORT HKCR.reg /y REG.EXE IMPORT HKCU.reg /y REG.EXE IMPORT HKLM.reg /y REG.EXE IMPORT HKU.reg /y REG.EXE IMPORT HKCC.reg /y Where http://www.mdgx.com/reg.htm#RTS HKCR = Classes Root Hive Key: HKEY_CLASSES_ROOT HKCU = Current User Hive Key: HKEY_CURRENT_USER HKLM = Local Machine Hive Key: HKEY_LOCAL_MACHINE HKU = Users Hive Key: HKEY_USERS\.DEFAULT HKCC = Current Configuration Hive Key: HKEY_CURRENT_CONFIG 3. Using 3rd party Registry Backup/Restore tools [free(ware)]: http://www.mdgx.com/toy.htm#FIX http://www.raymond.cc/blog/backup-restore-whole-windows-registry-selected-hives/ http://www.tweaking.com/content/page/registry_backup.html http://www.majorgeeks.com/mg/sortdate/registry.html http://listoffreeware.com/list-of-best-free-registry-backup-software/ http://www.winhelponline.com/blog/automatically-backup-registry-hives-windows-10/ http://www.tweaking.com/content/page/registry_backup.html * Windows Registry info, guides + tools [free(ware)]: - MDGx "The Registry" chapter -> "Backup, Edit + Restore the Registry in Windows NTx OSes" topic -> "REG:" paragraph in REGISTRY.TXT (included): http://www.mdgx.com/reg.htm#BNR - MDGx "Registry Editing Rules" section -> "Registry Editing Rules + RegEdit (REGEDIT.EXE) Guide" topic -> in REGISTRY.TXT (included): http://www.mdgx.com/reg.htm#RER - MDGx "Free(ware) 9x/NTx System + Registry Fixers" section -> "Windows Registry Backup, Restore + Tweaking tools [free(ware)]" topic in SOFTWARE.TXT (included): http://www.mdgx.com/toy.htm#FIX ______________________________________________________________________________ Tweaks, Hacks + Fixes... UNconventional, UNdocumented, UNcensored ;-/ * FIX: Block/disable/stop/turn OFF Windows 7/newer + Windows Server 2008/newer LSASS (Local Security Authority Subsystem Service) plain text/ASCII credentials/passwords exposure security vulnerability used by Mimikatz + similar hacking methods: http://woshub.com/defending-windows-domain-against-mimikatz-attacks/ http://seniordba.wordpress.com/2021/04/12/defending-against-mimikatz-in-windows-10/ http://www.reliaquest.com/blog/credential-dumping-part-2-how-to-mitigate-windows-credential-stealing/ http://learn.microsoft.com/windows-server/security/credentials-protection-and-management/configuring-additional-lsa-protection/ http://admx.help/?Category=SecurityBaseline&Policy=Microsoft.Policies.PtH::Pol_PtH_WDigestAuthn http://www.stigviewer.com/stig/windows_7/2016-12-19/finding/V-72753 http://en.wikipedia.org/wiki/Local_Security_Authority_Subsystem_Service CAUTION: ******** This requires adequate/advanced knowledge about critical computing, operating systems, shared environments, networks, cybersecurity. http://www.mdgx.com/importnt.php Recommended for multiuser/networked/enterprise/shared/server environments processing/storing/delivering encrypted/protected/secure critical/private/sensitive/vital analysis/data/information. Modifying settings below may affect proper operation of connected/networked computers/devices/servers, components/features/functions, and/or your multiuser/networked/enterprise/shared/server environment(s) may experience errors. UPDATES: ******** MSKB KB3134228 MS16-014 Security Update 32-bit + 64-bit for Windows 7 SP1/2008 R2/8/8.1/2012/2012 R2/10/2016 32-bit (x86) + 64-bit (x64): http://support.microsoft.com/help/3134228/ MSKB KB3134228 MS16-014 Security Advisory: http://learn.microsoft.com/security-updates/securitybulletins/2016/ms16-014/ MSKB KB2871997 Security Update 32-bit + 64-bit for Windows 7 SP1/2008 R2/8/8.1/2012/2012 R2 32-bit (x86) + 64-bit (x64): http://support.microsoft.com/help/2871997/ Microsoft Catalog Files for KB2871997 Update: http://www.catalog.update.microsoft.com/search.aspx?q=KB2871997 MSKB KB2871997 Security Advisory: http://learn.microsoft.com/security-updates/SecurityAdvisories/2016/2871997/ FIXES: ****** TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK to all prompts to register/merge/import its information into your registry. -----Begin cut & paste here----- REGEDIT4 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa] "RunAsPPL"=dword:1 "TokenLeakDetectDelaySecs"=dword:1e [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\WDigest] "Negotiate"=dword:0 "UseLogonCredential"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa] "RunAsPPL"=dword:1 "TokenLeakDetectDelaySecs"=dword:1e [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\SecurityProviders\WDigest] "Negotiate"=dword:0 "UseLogonCredential"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Control\Lsa] "RunAsPPL"=dword:1 "TokenLeakDetectDelaySecs"=dword:1e [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Control\SecurityProviders\WDigest] "Negotiate"=dword:0 "UseLogonCredential"=dword:0 ; ------End cut & paste here------ TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text BATch (.bat) or CoMmanD (.cmd) script file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the BAT (.bat) or CMD (.cmd) extension -> right-click it -> Run as Administrator -> wait for completion. -----Begin cut & paste here----- @ECHO OFF IF NOT "%OS%"=="Windows_NT" GOTO END REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Control\Lsa" /v RunAsPPL /t REG_DWORD /d 1 /f REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Control\Lsa" /v TokenLeakDetectDelaySecs /t REG_DWORD /d 1e /f REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\WDigest" /v Negotiate /t REG_DWORD /d 0 /f REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\WDigest" /v UseLogonCredential /t REG_DWORD /d 0 /f REG.EXE ADD "HKLM\SYSTEM\ControlSet001\Control\Lsa" /v RunAsPPL /t REG_DWORD /d 1 /f REG.EXE ADD "HKLM\SYSTEM\ControlSet001\Control\Lsa" /v TokenLeakDetectDelaySecs /t REG_DWORD /d 1e /f REG.EXE ADD "HKLM\SYSTEM\ControlSet001\Control\SecurityProviders\WDigest" /v Negotiate /t REG_DWORD /d 0 /f REG.EXE ADD "HKLM\SYSTEM\ControlSet001\Control\SecurityProviders\WDigest" /v UseLogonCredential /t REG_DWORD /d 0 /f REG.EXE ADD "HKLM\SYSTEM\ControlSet002\Control\Lsa" /v RunAsPPL /t REG_DWORD /d 1 /f REG.EXE ADD "HKLM\SYSTEM\ControlSet002\Control\Lsa" /v TokenLeakDetectDelaySecs /t REG_DWORD /d 1e /f REG.EXE ADD "HKLM\SYSTEM\ControlSet002\Control\SecurityProviders\WDigest" /v Negotiate /t REG_DWORD /d 0 /f REG.EXE ADD "HKLM\SYSTEM\ControlSet002\Control\SecurityProviders\WDigest" /v UseLogonCredential /t REG_DWORD /d 0 /f :END EXIT ------End cut & paste here------ * FIX: Windows 7/7 SP1 BypassESU Patch allows installing ESU (Extended Security Updates) [German]: http://www.deskmodder.de/blog/2019/12/07/windows-7-erweiterte-sicherheitsupdates-esu-erhalten-wird-moeglich-sein/ Translated into English [by Google]: https://www-deskmodder-de.translate.goog/blog/2019/12/07/windows-7-erweiterte-sicherheitsupdates-esu-erhalten-wird-moeglich-sein/?_x_tr_sl=de&_x_tr_tl=en BypassESU: http://github.com/arturolegovich/BypassESU-v9-AIO/ File: http://gitlab.com/stdout12/adns/uploads/b5ad06702413b6bf6b1d5a1db8b086d4/BypassESU-v11.7z BypassESU Guide: http://trackerninja.codeberg.page/post/windows-7-esu-extended-security-updates/ BypassESU Guide [French, translation not allowed :-(]: http://lecrabeinfo.net/windows-7-recevoir-les-mises-a-jour-de-securite-jusquen-2023.html Windows 7 ESU Patching: http://hackandpwn.com/windows-7-esu-patching/ Windows 7 ESU Bypass: http://www.ghacks.net/2020/02/13/it-appears-that-the-windows-7-esu-bypass-is-indeed-working/ Bypass Windows 7 Extended Security Updates Eligibility: http://forums-mydigitallife-net.translate.goog/threads/bypass-windows-7-extended-security-updates-eligibility.80606/ Windows 7 ESU (Extended Security Updates) FAQ: http://learn.microsoft.com/troubleshoot/windows-client/windows-7-eos-faq/windows-7-extended-security-updates-faq/ * Fix Windows 7 Shut Down Bug: http://www.lifehacker.com/1841581231/ http://esupport.quickheal.com/support/solutions/articles/23000020281/ * Fix Windows 7 Wallpaper Display Bug: http://www.winaero.com/blog/microsoft-fixes-black-wallpaper-windows-7-bug-with-kb4539602/ http://www.lifehacker.com/1841274851/ FIX: Wallpaper set to Stretch is displayed as black: http://support.microsoft.com/help/4539602/ created by Microsoft... BUG: Windows 7 January 14 2020 Monthly Rollup: http://support.microsoft.com/help/4534310/ * Fix Windows 7 Slow/Stuck "Checking for Updates" Bug: http://www.reddit.com/r/windows/comments/4tx4s9/ * Migrate Windows 7 to a new SSD (SATA)/NVMe (PCIe) drive without reinstalling: http://www.lifehacker.com/5837543/ MDGx "Free(ware) WinDOwS Backup + Restore Tools" section in SECRETS.TXT (included): http://www.mdgx.com/secrets.htm#BKP * Speed Up Windows Shutdown Process: http://www.addictivetips.com/windows-tips/how-to-speed-up-windows-shutdown-process/ * Control How Long Windows Waits Before Killing Apps at Shutdown: http://www.howtogeek.com/282062/control-how-long-windows-waits-before-killing-apps-at-shutdown/ * Always show full details in Explorer Copy/Move/Delete dialog box: http://www.askvg.com/how-to-always-show-more-details-in-file-transfer-cut-copy-delete-dialog-box-in-windows-vista-and-7/ Install Open-Shell [Classic Shell fork] 32-bit + 64-bit Start Menu + button/icon/logo/orb, Explorer + IE enhancer, replacer, supports custom skins, buttons/logos, highly customizable (free, open source): http://open-shell.github.io/Open-Shell-Menu/ Open-Shell -> enable Open (Classic) Explorer Bar -> Classic Explorer Settings button -> File Operation tab -> enable Always show more details -> Apply/OK. * (Un)Hide/(re)assign/remove/(un)mount drive(s)/partition(s)/volume(s) in Windows 7/newer: http://www.isumsoft.com/windows-10/hide-or-unhide-hard-disk-partition-in-windows-10.html http://www.windowscentral.com/how-hide-entire-drive-prying-eyes-windows-10/ * Windows Registry keys involved in, linked to, and affected by WoW64 (Windows 32-bit on Windows 64-bit) 64-bit (x64) in Windows NTx 64-bit (x64) OSes: http://msdn.microsoft.com/library/aa384253.aspx http://en.wikipedia.org/wiki/WoW64 WoW64 symbolic links (Wow6432Node): HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Classes HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\AppId HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppId HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\PROTOCOLS HKEY_LOCAL_MACHINE\SOFTWARE\Classes\PROTOCOLS HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Typelib HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Typelib See MDGx "Registry Structure" chapter in REGISTRY.TXT (included) for more details: http://www.mdgx.com/reg.htm#RTS * Add/customize/substitute System, Dialog, Menus, Window, Icons, Taskbar + DOS Console (Command Prompt) Fonts (.fon, .ttf, .otf) + tweak DPI (Dots Per Inch) Scaling to other than default [100%] in Windows 7/newer: http://www.superuser.com/questions/163430/#1131693 Customize Windows 7 Font Face/Size + Taskbar Icons Size: http://www.wikihow.com/Customize-the-Size-of-the-Windows-7-Taskbar-Icons/ http://blogs.msdn.microsoft.com/developingfordynamicsgp/2009/12/01/more-on-windows-7-bitmap-fonts-and-dpi-settings/ http://www.tenforums.com/tutorials/70839-change-menus-text-size-windows-10-a.html Change Default System Fonts: http://answers.microsoft.com/en-us/windows/forum/windows_7-desktop/how-to-change-system-default-font-in-all-parts/dfce15db-7337-420a-a42e-517521a8502e/ Change Dialog Boxes + Buttons Fonts: http://www.sevenforums.com/tutorials/1175-fonts-change.html Add Custom Fonts to DOS Console (Command Prompt): http://www.thewindowsclub.com/add-custom-fonts-to-command-prompt/ Substitute any font with any other font: http://social.technet.microsoft.com/forums/windows/en-us/12b37082-c4e6-4beb-9bfb-7b992ebc2a1a/ http://answers.microsoft.com/en-us/windows/forum/all/windows-10-taskbar-clock-broken-change-windows/3462b7b6-03fb-4e97-9b2d-430b09867248/ http://gist.github.com/jcherven/42b84294248674c29eb50cb711114315/ Use also [limited options :-(] Windows built-in Display Font Size and DPI tool [DpiScaling.exe] located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually C:\WINDOWS]. View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command PATH -> press Enter. See also "* Advanced Appearance (Metrics) Settings [AA(M)S] for Windows 7/newer:" section in WINDOWS8.TXT (included): http://www.mdgx.com/8.php http://www.mdgx.com/WINDOWS8.TXT Right-click on improved WIN8_AAS.HTA (included, further customized) HTML Application (.HTA) file [right-click to save!]: http://www.mdgx.com/WIN8_AAS.HTA -> Run as Administrator [will open by default in Internet Explorer (IE) web browser] -> tweak to your heart content. ;-/ HTML Application (HTA): http://en.wikipedia.org/wiki/HTML_Application Change System Font using Winaero Tweaker (freeware) + Windows built-in Registry Editor [RegEdit.exe]: http://www.winaero.com/change-system-font-windows-10/ Winaero Tweaker 32-bit + 64-bit for Windows 7/8/8.1/10/11 [select Portable at install time!]: http://www.winaero.com/winaero-tweaker/ Download: http://www.winaero.com/download-winaero-tweaker/ Winaero Tweaker Features: http://www.winaero.com/the-list-of-winaero-tweaker-features/ TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK to all prompts to register/merge/import its information into your registry. -----Begin cut & paste here----- REGEDIT4 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Fonts] "Courier 10,12,15"="COURF.FON" "MS Serif 8,10,12,14,18,24"="SERIFF.FON" "MS Sans Serif 8,10,12,14,18,24"="SSERIFF.FON" "Small Fonts"="SMALLF.FON" "Small Fonts (120)"="SMALLF.FON" ; ------End cut & paste here------ I use these fonts substitutes on my 17 inch gaming laptop with 1080p screen resolution http://www.mdgx.com/pc.htm#LAP to replace system + fixed (raster) fonts. You can customize/tweak your favorite fonts/font pairs/substitutes according to your needs, preferences and/or desktop/display/screen size (examples): TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK to all prompts to register/merge/import its information into your registry. -----Begin cut & paste here----- REGEDIT4 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\FontSubstitutes] ; "MS Shell Dlg"="Microsoft Sans Serif" "MS Shell Dlg"="Segoe UI Bold (TrueType)" ; "MS Shell Dlg 2"="Tahoma" "MS Shell Dlg 2"="Segoe UI Bold (TrueType)" ; "Segoe UI"=- "Segoe UI"="Segoe UI Bold (TrueType)" ; "Segoe UI (TrueType)"=- "Segoe UI (TrueType)"="Segoe UI Bold (TrueType)" ; "Arial"=- "Arial"="Segoe UI Bold (TrueType)" ; "Tahoma"=- "Tahoma"="Segoe UI Bold (TrueType)" ; "Helv"="MS Sans Serif" "Helv"="Segoe UI Bold (TrueType)" ; "Helvetica"="Arial" "Helvetica"="Segoe UI Bold (TrueType)" ; "Tms Rmn"="MS Serif" "Tms Rmn"="Segoe UI Bold" ; ------End cut & paste here------ Lines above preceded by a semicolon followed by a space [; ] are disabled (comments), and represent backups of the original registry values (see correspondent modified lines underneath). I have added lines above ending with an equal sign followed by a minus sign [=-] so you can restore the original fonts by removing their customized substitutes (see correspondent modified lines underneath). To restore original fonts: remove the semicolon and the space [; ] -> save the file as plain text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK to all prompts to register/merge/import its information into your registry. Log off/sign out -> log back on/sign back in into same user account for these changes to take effect. Windows System Font (.fon) files for different DPI settings (examples): 125% DPI font file | 100% DPI font file *************************************** SSERIFF.FON | SSERIFE.FON SSERIFFE.FON | SSERIFEE.FON SSERIFFG.FON | SSERIFEG.FON SSERIFFR.FON | SSERIFER.FON SSERIFFT.FON | SSERIFET.FON SSEF1255.FON | SSEE1255.FON SSEF1256.FON | SSEE1256.FON SSEF1257.FON | SSEE1257.FON SSEF874.FON | SSEE874.FON * MS Serif FON: 125% DPI font file | 100% DPI font file *************************************** SERIFF.FON | SERIFE.FON SERIFFE.FON | SERIFEE.FON SERIFFG.FON | SERIFEG.FON SERIFFR.FON | SERIFER.FON SERIFFT.FON | SERIFET.FON SERF1255.FON | SERE1255.FON SERF1256.FON | SERE1256.FON SERF1257.FON | SERE1257.FON * Courier FON: 125% DPI font file | 100% DPI font file *************************************** COURF.FON | COURE.FON COURFE.FON | COUREE.FON COURFG.FON | COUREG.FON COURFR.FON | COURER.FON COURFT.FON | COURET.FON COUF1255.FON | COUE1255.FON COUF1256.FON | COUE1256.FON COUF1257.FON | COUE1257.FON Add/modify/customize fonts used by DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE] + BATch (.bat)/CoMmanD (.cmd) script files: http://smallvoid.com/article/winnt-cmd-add-font.html http://www.techrepublic.com/blog/windows-and-office/quick-tip-add-fonts-to-the-command-prompt/ http://www.howtogeek.com/howto/windows-vista/stupid-geek-tricks-enable-more-fonts-for-the-windows-command-prompt/ http://www.wikihow.com/Customize-the-Font-in-Windows-Command-Prompt/ FYI: Some of the fonts listed here are available only in certain Windows NTx builds/editions/releases/versions. Example: TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK to all prompts to register/merge/import its information into your registry. -----Begin cut & paste here----- REGEDIT4 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Console\TrueTypeFont] "0"="Lucida Console" "00"="Consolas" "01"="Monotype" "02"="OCR A Extended" "03"="OCR A Std" "04"="Segoe UI" "05"="Segoe UI Bold" "06"="Segoe UI Black" "07"="Tahoma" "08"="Verdana" "09"="Fixedsys" [HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Console\TrueTypeFont] "0"="Lucida Console" "00"="Consolas" "01"="Monotype" "02"="OCR A Extended" "03"="OCR A Std" "04"="Segoe UI" "05"="Segoe UI Bold" "06"="Segoe UI Black" "07"="Tahoma" "08"="Verdana" "09"="Fixedsys" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows NT\CurrentVersion\Console\TrueTypeFont] "0"="Lucida Console" "00"="Consolas" "01"="Monotype" "02"="OCR A Extended" "03"="OCR A Std" "04"="Segoe UI" "05"="Segoe UI Bold" "06"="Segoe UI Black" "07"="Tahoma" "08"="Verdana" "09"="Fixedsys" ; ------End cut & paste here------ Winaero Tweaker 32-bit + 64-bit for Windows 7/8/8.1/10/11 [select Portable at install time!]: http://www.winaero.com/winaero-tweaker/ Download: http://www.winaero.com/download-winaero-tweaker/ Winaero Tweaker Features: http://www.winaero.com/the-list-of-winaero-tweaker-features/ Change display/icons/items/system/UI fonts using Winaero Tweaker: http://www.winaero.com/change-system-font-windows-10/ * Tweak + fix Desktop, Explorer, interface (GUI, Shell, API), mouse/cursor + keyboard/input annoyances in Windows XP/newer: MenuShowDelay -> "MENUSHOWDELAY" -> REGISTRY.TXT (included): http://www.mdgx.com/last3.htm#MENUDELAY TileWallpaper -> "STRETCH WALLPAPER" -> TIPS98.TXT (included): http://www.mdgx.com/98-1.htm#STRETCH CursorBlinkRate -> "BLINK... NOT!" -> REGISTRY.TXT (included): http://www.mdgx.com/last3.htm#BLINK NoAutoReturnToWelcome: http://sourceforge.net/p/unattended/mailman/message/32062919/ WindowArrangementActive: http://www.tenforums.com/tutorials/4343-turn-off-snap-windows-windows-10-a.html MouseWheelRouting: http://www.tenforums.com/tutorials/12816-turn-off-scroll-inactive-windows-windows-10-a.html JointResize, SnapAssist + SnapFill: http://superuser.com/questions/1516878/ DockMoving: http://superuser.com/questions/1039039/ DockTargetMouseWidth: http://superuser.com/questions/1462732/ NOTE: Some of these settings are available only in Windows 8/newer. TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK to all prompts to register/merge/import its information into your registry. -----Begin cut & paste here----- REGEDIT4 [HKEY_CURRENT_USER\Control Panel\Desktop] "DockMoving"="0" "MenuShowDelay"="0" "TileWallpaper"="0" "CursorBlinkRate"="-1" "NoAutoReturnToWelcome"="1" "WindowArrangementActive"="0" "MouseWheelRouting"=dword:2 [HKEY_USERS\.DEFAULT\Control Panel\Desktop] "DockMoving"="0" "MenuShowDelay"="0" "TileWallpaper"="0" "CursorBlinkRate"="-1" "NoAutoReturnToWelcome"="1" "WindowArrangementActive"="0" "MouseWheelRouting"=dword:2 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced] "JointResize"=dword:0 "SnapAssist"=dword:0 "SnapFill"=dword:0 [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced] "JointResize"=dword:0 "SnapAssist"=dword:0 "SnapFill"=dword:0 [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced] "JointResize"=dword:0 "SnapAssist"=dword:0 "SnapFill"=dword:0 [HKEY_CURRENT_USER\Control Panel\Mouse] "DockTargetMouseWidth"=dword:0 [HKEY_USERS\.DEFAULT\Control Panel\Mouse] "DockTargetMouseWidth"=dword:0 ; ------End cut & paste here------ * Turn ON Write Cache (hardware dependent) + turn ON Writing (turn OFF Write Protect = write-cache buffer flush), Error Checking, Legacy + Suspend functions (hardware dependent) to speed up all your available/configured/connected/installed/linked/local/networked/remote/removable cards/devices/discs/disks/media/sticks drives/partitions/volumes in Windows 7/newer: http://www.lifewire.com/remove-write-4586905/ http://www.isumsoft.com/computer/format-write-protected-usb-drive-using-cmd.html http://www.howtogeek.com/howto/windows-vista/registry-hack-to-disable-writing-to-usb-drives/ http://support.citrix.com/article/CTX236681/ http://www.tenforums.com/drivers-hardware/138212-change-removal-policy-defaults-current-all-future-drives.html http://www.der-windows-papst.de/en/2015/06/02/harddisk-write-cache-festplatte-schreibcache-richtlinie/ http://learn.microsoft.com/windows/client-management/change-default-removal-policy-external-storage-media/ http://social.msdn.microsoft.com/Forums/WINDOWS/4e8f2618-0dc6-4ef6-b749-25b47b830797/ http://admx.help/?Category=Windows_10_2016&Policy=Microsoft.Policies.RemovableStorageAccess::Removable_Remote_Allow_Access http://howandroidhelp.com/how-to-return-safely-remove-hardware-to-windows-taskbar/ Start button/icon/logo/menu/orb -> Control Panel (CP) OR Run... [hold WinKey + press R] -> type this command CONTROL.EXE -> press Enter -> All Control Panel Items -> Safely Remove Hardware (Plug/Unplug Removable Devices/Storage Media); OR Run... [hold WinKey + press R] -> type this command RUNDLL32.EXE SHELL32.DLL,Control_RunDLL HotPlug.dll -> press Enter -> check "Display device components" box: "HotPlugFlags" REG_DWORD value = 2 in registry (.reg) file below. Control Panel executable [CONTROL.EXE] is located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually C:\WINDOWS]. View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command PATH -> press Enter. 1st Things 1st: *************** BACKUP YOUR REGISTRY BEFORE MAKING ANY CHANGES! -> See "BACKUP/EXPORT + RESTORE/IMPORT REGISTRY/REGISTRY KEY(S)" in WINDOWS7.TXT (this file): http://www.mdgx.com/7.php#:~:text=BACKUP%2FEXPORT%20%2B%20RESTORE%2FIMPORT%20REGISTRY%2FREGISTRY%20KEY%28S%29%20%21 TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK to all prompts to register/merge/import its information into your registry. -----Begin cut & paste here----- REGEDIT4 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Applets\SysTray] "HotPlugFlags"=dword:2 [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Applets\SysTray] "HotPlugFlags"=dword:2 [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Applets\SysTray] "HotPlugFlags"=dword:2 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\I/O System] "AllowRemoteDASD"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager\I/O System] "AllowRemoteDASD"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Control\Session Manager\I/O System] "AllowRemoteDASD"=dword:1 [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\RemovableStorageDevices] "AllowRemoteDASD"=dword:1 [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services\Client] "fEnableUsbBlockDeviceBySetupClass"=dword:0 "fEnableUsbSelectDeviceByInterface"=dword:1 [-HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services\Client\UsbBlockDeviceBySetupClasses] [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services\Client\UsbSelectDeviceByInterfaces] "1000"="{6bdd1fc6-810f-11d0-bec7-08002be2092f}" [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\StorageDevicePolicies] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Usb] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Storage\EnabledDenyGP] "DenyAllGPState"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\StorageDevicePolicies] "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Storage\EnabledDenyGP] "DenyAllGPState"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Control\StorageDevicePolicies] "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Control\Storage\EnabledDenyGP] "DenyAllGPState"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\StorageManagement\SpacesSMP\ConnectedSubsystems\{00000000-0000-0000-0000-000000000000}] "CacheEnabled"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\StorageManagement\SpacesSMP\ConnectedSubsystems\{00000000-0000-0000-0000-000000000000}] "CacheEnabled"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Control\StorageManagement\SpacesSMP\ConnectedSubsystems\{00000000-0000-0000-0000-000000000000}] "CacheEnabled"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0000] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0001] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0002] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0003] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0004] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0005] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0006] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0007] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0008] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0009] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0010] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0011] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0012] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0013] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0014] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0015] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0016] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0017] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0018] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0019] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0020] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0021] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0022] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0023] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0024] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0025] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0026] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0027] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0028] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0029] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0030] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0031] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0032] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0033] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0034] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0035] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0036] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0037] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0038] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0039] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0040] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0041] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0042] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0043] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0044] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0045] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0046] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0047] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0048] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0049] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0050] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0000] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0001] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0002] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0003] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0004] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0005] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0006] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0007] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0008] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0009] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0010] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0011] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0012] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0013] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0014] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0015] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0016] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0017] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0018] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0019] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0020] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0021] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0022] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0023] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0024] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0025] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0026] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0027] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0028] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0029] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0030] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0031] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0032] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0033] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0034] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0035] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0036] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0037] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0038] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0039] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0040] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0041] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0042] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0043] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0044] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0045] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0046] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0047] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0048] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0049] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{36FC9E60-C465-11CF-8056-444553540000}\0050] "ErrorCheckingEnabled"=dword:0 "LegacyCheckingEnabled"=dword:0 "HcDisableSelectiveSuspend"=dword:1 "DisableSelectiveSuspend"=dword:1 "EnableSelectiveSuspend"=dword:0 "WriteProtect"=dword:0 ; ------End cut & paste here------ Open Device Manager: Start -> Run... [hold WinKey + press R] -> type: DevMgmt.msc or (in some cases): MMC.EXE /S DevMgmt.msc -> press Enter -> Disk Drives -> double-click on each drive/partition/volume name Properties -> Policies tab -> Removal policy -> check "Better Performance" box (if applicable) -> Write-caching policy -> check "Enable write caching on the device" box (if applicable) -> Apply/OK. http://2.bp.blogspot.com/-rH-Np-Af7cU/VkwxreXVcjI/AAAAAAAAAKs/Vz2kGGCXxxY/s1600/Write-caching-policy.png http://www.tenforums.com/attachments/tutorials/36596d1441816445-enable-disable-disk-write-caching-windows-10-a-write_cache-3.png Device Manager DevCon [devcon.exe] 32-bit + 64-bit DOS console command line tool used to enable, disable, restart, update, remove (groups of) hardware device drivers: http://learn.microsoft.com/windows-hardware/drivers/devtest/devcon/ Available versions of DevCon 32-bit + 64-bit for Windows XP/newer 32-bit (x86) + 64-bit (x64): http://superuser.com/questions/1002950/ DevCon Repository: http://networchestration.wordpress.com/2016/07/11/how-to-obtain-device-console-utility-devcon-exe-without-downloading-and-installing-the-entire-windows-driver-kit-100-working-method/ DevCon-Installer: http://github.com/Drawbackz/DevCon-Installer/ Download: http://github.com/Drawbackz/DevCon-Installer/releases/latest/ For example DevCon [devcon.exe] installs as part of Windows Driver Kit (WDK) 7.1.0/newer: http://learn.microsoft.com/windows-hardware/drivers/download-the-wdk/ WDK 7.1.0 ISO: http://www.microsoft.com/download/details.aspx?id=11800 File [620 MB]: http://download.microsoft.com/download/4/A/2/4A25C7D5-EFBE-4182-B6A9-AE6850409A78/GRMWDK_EN_7600_1.ISO Install 7-Zip unZIPping/unARChiving/unRARing tool (free GPL): http://www.7-zip.org/ Explorer -> right-click GRMWDK_EN_7600_1.ISO (see above) -> select 7-Zip -> select Open archive -> extract devcon.exe file which matches your Windows NTx OS build/edition/release/update/version + bit strength [32-bit (x86) or 64-bit (x64)] anywhere on your local storage drives/partitions/volumes -> move matching devcon.exe file to a directory/folder listed in your system PATH. View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command PATH -> press Enter. Devcon.exe Commands: http://learn.microsoft.com/windows-hardware/drivers/devtest/devcon-general-commands/ DEVCON Command Line Utility Alternative to Device Manager: http://www.robvanderwoude.com/devcon.php DEVCON.exe: http://www.ss64.com/nt/devcon.html Manage Windows Drivers at Command Prompt using DevCon: http://www.thewindowsclub.com/devcon-manage-windows-drivers-cmd/ Run DevCon (devcon.exe) from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter: devcon.exe restart *usb* You will see the list of all connected/local/removable USB devices (generic example): ----------snippity-snip---------- USB\VID_0000&PID_0000\00000000000000 : Restarted USB\ROOT_HUB00\0&00000000&0&0 : Requires restart/reboot etc... The xxx device(s) are ready to be restarted. To restart/reset the devices, restart/reboot the system. ----------snippity-snip---------- Each device has a unique VID_xxxx + PID_xxx and/or ROOT_HUB_xx manufacturer/vendor ID number. Open Registry Editor (RegEdit) [REGEDIT.EXE] located in the %WinDir% directory/folder [%WinDir% = usually C:\WINDOWS]: right-click RegEdit or its shortcut/link -> Run as Administrator -> go to this registry subkey (generic, replace # numbers with actual hardware IDs corresponding to connected/installed storage media devices): HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\SCSI\Device_Vendor_ID_#\Device_Model_ID_#\Device Parameters\Classpnp\ Replace each Device_Vendor_ID_# + Device_Model_ID_# above with your specific number(s) obtained from the devcon.exe list in generic example above. In this generic example: VID_0000&PID_0000\00000000000000 the registry key you need (most likely) looks like this (generic example): HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\SCSI\VID_0000&PID_0000\00000000000000\Device Parameters\Classpnp\ In the right hand pane of this registry key you need to modify or create (if not present) these 3 registry values with these exact names and with these exact numeric values after "dword:" [REG_DWORD value type]: "UserRemovalPolicy"=dword:2 "UserWriteCacheSetting"=dword:1 "CacheIsPowerProtected"=dword:0 To create a new registry value (if not present): in the Registry Editor right hand pane -> right-click on an empty spot -> select Value -> REG_DWORD -> right-click on each value newly created -> name it exactly as above, without typing any quotation marks. Repeat same steps 3 times in order to create + rename all 3 registry DWORD values above. To modify the numeric/hex/bin/text/ASCII/ANSI/etc value of a registry value: in the Registry Editor right hand pane -> double-click on each of the 3 DWORD values above -> type 2 or 1 or 0 to match exactly its numeric value with the respective name of each of the 3 registry DWORD values. Repeat same steps 3 times in order to modify the numeric values of all 3 registry DWORD values above. Restart/reboot Windows for all changes to take effect. DskCache [DSKCACHE.EXE] DOS console command line tool 32-bit Hotfix for Windows 2000/newer turns ON/OFF power failure protection (+p/-p) [CacheIsPowerProtected DWORD value] + write cache (+w/-w) [UserWriteCacheSetting DWORD value] in the registry for all connected/installed/local/network/removable drives/partitions/volumes: http://web.archive.org/web/20140825143556/http://support.microsoft.com/kb/811392/ Download: http://thehotfixshare.net/board/index.php?/files/file/1113-windows2000-kb811392-x86-enuexe/ File: http://hotfixv4.trafficmanager.net/Windows%202000/sp5/Fix178740/2195/free/266264_ENU_i386_zip.exe ----------snippity-snip---------- DSKCACHE.EXE [+p|-p] [+w|-w] [/i|/s|Drive_Specifier] Set [+] or Clear [-] the disk cache value: p Power protected write cache (not supported on all OS versions). w Write cache. Drive selection (default is all drives): /i IDE disks only. /s SCSI (includes FC) disks only. Drive_Specifier: Drive letter, volume name, or physical drive. Drive letter(s): c:, d:, etc. Volume name(s): \\?\Volume{8fc37c41-bdd3-11d5-b897-806d6172696f}\ Physical drive(s): PhysicalDrive0, PhysicalDrive1, etc. If using no options current settings for all fixed disks will be displayed. ----------snippity-snip---------- Turn ON power failure protection (+p) [CacheIsPowerProtected] + write cache (+w) [UserWriteCacheSetting] for all connected/installed/local/network/removable drives/partitions/volumes (example): DSKCACHE.EXE +p +w p = power failure protection w = write cache + = enabled - = disabled +w and -w switches correspond to Device Manager [hold WinKey + press R -> type DevMgmt.msc -> press Enter] -> Disk Drives -> drive/partition/volume name Properties -> Policies tab -> Write-caching policy -> "Enable write caching on the device" check box, which corresponds to write cache [UserWriteCacheSetting] Registry DWORD [REG_DWORD] value [1 = enabled | 0 = disabled]: "UserWriteCacheSetting"=dword:1 +p and -p switches correspond to Device Manager [hold WinKey + press R -> type DevMgmt.msc -> press Enter] -> Disk Drives -> drive/partition/volume name Properties -> Policies tab -> Write-caching policy -> "Turn off Windows write-cache buffer flushing on the device" check box, which corresponds to power failure protection [CacheIsPowerProtected] Registry DWORD [REG_DWORD] value [1 = enabled | 0 = disabled]: "CacheIsPowerProtected"=dword:1 These 2 Registry values reside under this Registry Hive Key Local Machine (HKLM) subkey (generic, replace 0es with actual hardware IDs of connected/installed/local/network/removable drives/partitions/volumes): HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\SCSI\VID_0000&PID_0000\00000000000000\Device Parameters\Classpnp\ "UserWriteCacheSetting"=dword:1 "CacheIsPowerProtected"=dword:1 More info: http://www.tomshardware.com/reviews/ssd-performance-tweak,2911-5.html http://devblogs.microsoft.com/oldnewthing/20100909-00/?p=12913 * Turn OFF Diagnostic Tracing [DiagTrack], Data Collection/Logging [DataCollection], Telemetry + Performance Counters in Windows 7/newer: NOTE: ***** Some of the Diagnostic Tracing [DiagTrack] + Data Collection/Logging [DataCollection] settings [registry keys + values] apply only to Windows 8/8.1/10/11! http://www.tenforums.com/tutorials/7032-change-diagnostic-data-settings-windows-10-a.html http://www.tenforums.com/tutorials/118019-enable-disable-delete-diagnostic-data-windows-10-a.html http://pcauthorities.com/pc-speed/how-to-disable-performance-counters-in-windows-xp/ http://heimdalsecurity.com/en/windows-10-security-guide/privacy/ http://www.helpdeskgeek.com/windows-10/how-to-disable-windows-10-telemetry/ http://tosdr.org/#microsoft http://tosdr.org/#microsoft-store http://learn.microsoft.com/windows/privacy/windows-diagnostic-data/ http://privacy.microsoft.com/ Microsoft Extensible Performance Counter List (EXCTRLST.EXE) 32-bit tool displays, enables + disables extensible performance counters for installed Dynamic Link Libraries (DLLs)/Services [616 KB]: http://web.archive.org/web/20160722103758/http://download.microsoft.com/download/win2000platform/exctrlst/1.00.0.1/nt5/en-us/exctrlst_setup.exe Explorer -> right-click exctrlst_setup.exe (see above) -> Run as Administrator -> Install Tool: EXCTRLST.EXE -> Next -> complete installation -> right-click exctrlst.exe -> Run as Administrator -> scroll down and highlight 1 item at a time all the way down to the bottom -> UNcheck every correspondent Performance Counter List box -> exit exctrlst.exe. TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK to all prompts to register/merge/import its information into your registry. -----Begin cut & paste here----- REGEDIT4 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\DataCollection] "Allow Telemetry"=dword:0 "AllowTelemetry"=dword:0 "DisableDeviceDelete"=- "MaxTelemetryAllowed"=- [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\DataCollection] "Allow Telemetry"=dword:0 "AllowTelemetry"=dword:0 "DisableDeviceDelete"=- "MaxTelemetryAllowed"=- [-HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\DiagTrack\Security] [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\DiagTrack] "LaunchProtected"=dword:0 "UserServiceFlags"=dword:0 "Start"=dword:4 [-HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\DiagTrack\Security] [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\DiagTrack] "LaunchProtected"=dword:0 "UserServiceFlags"=dword:0 "Start"=dword:4 [-HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\DiagTrack\Security] [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\DiagTrack] "LaunchProtected"=dword:0 "UserServiceFlags"=dword:0 "Start"=dword:4 [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Diagnostics\DiagTrack] "ShowedToastAtLevel"=dword:0 [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Diagnostics\DiagTrack] "ShowedToastAtLevel"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Diagnostics\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\.NET CLR Data\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\.NET CLR Networking\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\.NET CLR Networking 4.0.0.0\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\.NET Data Provider for Oracle\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\.NET Data Provider for SqlServer\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\.NET Memory Cache 4.0\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\.NETFramework\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\ASP.NET\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\ASP.NET_1.1.4322\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\ASP.NET_2.0.50727\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\ASP.NET_4.0.30319\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\aspnet_state\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\BITS\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\ESENT\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\Intel Storage Counters\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\Lsa\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\MSDTC\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\MSDTC Bridge 3.0.0.0\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\MSDTC Bridge 4.0.0.0\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\MSSCNTRS\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\PerfDisk\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\PerfNet\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\PerfOS\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\PerfProc\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\Psched\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\rdyboost\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\RemoteAccess\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\RSVP\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\ServiceModelEndpoint 3.0.0.0\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\ServiceModelEndpoint 4.0.0.0\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\ServiceModelOperation 3.0.0.0\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\ServiceModelOperation 4.0.0.0\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\ServiceModelService 3.0.0.0\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\ServiceModelService 4.0.0.0\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SMSvcHost 3.0.0.0\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SMSvcHost 4.0.0.0\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\Spooler\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\TapiSrv\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\Tcpip\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\TermService\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\UGatherer\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\UGTHRSVC\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\usbhub\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\Windows Workflow Foundation 3.0.0.0\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\Windows Workflow Foundation 4.0.0.0\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\WmiApRpl\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\WSearchIdxPi\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Diagnostics\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\.NET CLR Data\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\.NET CLR Networking\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\.NET CLR Networking 4.0.0.0\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\.NET Data Provider for Oracle\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\.NET Data Provider for SqlServer\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\.NET Memory Cache 4.0\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\.NETFramework\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\ASP.NET\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\ASP.NET_1.1.4322\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\ASP.NET_2.0.50727\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\ASP.NET_4.0.30319\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\aspnet_state\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\BITS\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\ESENT\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Intel Storage Counters\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Lsa\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\MSDTC\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\MSDTC Bridge 3.0.0.0\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\MSDTC Bridge 4.0.0.0\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\MSSCNTRS\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\PerfDisk\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\PerfNet\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\PerfOS\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\PerfProc\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Psched\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\rdyboost\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\RemoteAccess\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\RSVP\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\ServiceModelEndpoint 3.0.0.0\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\ServiceModelEndpoint 4.0.0.0\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\ServiceModelOperation 3.0.0.0\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\ServiceModelOperation 4.0.0.0\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\ServiceModelService 3.0.0.0\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\ServiceModelService 4.0.0.0\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\SMSvcHost 3.0.0.0\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\SMSvcHost 4.0.0.0\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Spooler\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\TapiSrv\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Tcpip\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\TermService\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\UGatherer\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\UGTHRSVC\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\usbhub\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Windows Workflow Foundation 3.0.0.0\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Windows Workflow Foundation 4.0.0.0\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\WmiApRpl\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\WSearchIdxPi\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Control\Diagnostics\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\.NET CLR Data\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\.NET CLR Networking\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\.NET CLR Networking 4.0.0.0\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\.NET Data Provider for Oracle\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\.NET Data Provider for SqlServer\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\.NET Memory Cache 4.0\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\.NETFramework\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\ASP.NET\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\ASP.NET_1.1.4322\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\ASP.NET_2.0.50727\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\ASP.NET_4.0.30319\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\aspnet_state\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\BITS\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\ESENT\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\Intel Storage Counters\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\Lsa\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\MSDTC\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\MSDTC Bridge 3.0.0.0\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\MSDTC Bridge 4.0.0.0\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\MSSCNTRS\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\PerfDisk\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\PerfNet\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\PerfOS\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\PerfProc\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\Psched\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\rdyboost\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\RemoteAccess\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\RSVP\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\ServiceModelEndpoint 3.0.0.0\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\ServiceModelEndpoint 4.0.0.0\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\ServiceModelOperation 3.0.0.0\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\ServiceModelOperation 4.0.0.0\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\ServiceModelService 3.0.0.0\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\ServiceModelService 4.0.0.0\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\SMSvcHost 3.0.0.0\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\SMSvcHost 4.0.0.0\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\Spooler\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\TapiSrv\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\Tcpip\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\TermService\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\UGatherer\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\UGTHRSVC\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\usbhub\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\Windows Workflow Foundation 3.0.0.0\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\Windows Workflow Foundation 4.0.0.0\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\WmiApRpl\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\WSearchIdxPi\Performance] "DisableDiagnosticTracing"=dword:1 "Disable Performance Counters"=dword:1 ; ------End cut & paste here------ * Turn OFF/disable, customize the creation of, delete/remove +/- change target directory/folder of crash (mini)dump memory (stack) (temporary) log files (default names + locations listed here): - %SystemDrive%\DumpStack.log.tmp [file]; - %SystemRoot%\MEMORY.DMP [file]; - %SystemRoot%\Minidump [directory/folder]. http://crashdmp.wordpress.com/use-cases/file-patching/ http://www.scribd.com/document/548461821/ http://forums.mydigitallife.net/threads/windows-11-creates-a-lot-of-empty-folders.84466/ http://www.windowscentral.com/how-clear-system-error-memory-dump-files-windows-10/ http://www.windowscentral.com/how-open-and-analyze-dump-error-files-windows-10/ http://www.howtogeek.com/196672/windows-memory-dumps-what-exactly-are-they-for/ http://learn.microsoft.com/troubleshoot/windows-server/performance/memory-dump-file-options/ http://learn.microsoft.com/troubleshoot/windows-client/performance/read-small-memory-dump-file/ TIP: **** Windows NTx built-in/default/pre-installed/preset machine/system (apply to all users on the same machine) + local/user (apply only to the current/logged on user) environment variables used for target system/user directories/folders: http://www.ss64.com/nt/syntax-variables.html http://pureinfotech.com/list-environment-variables-windows-10/ http://www.computerhope.com/issues/ch000549.htm - %SystemDrive% = usually C:\ root. - %SystemRoot% = usually C:\WINDOWS [same as %WinDir%]. - %WinDir% = usually C:\WINDOWS [same as %SystemRoot%]. CAUTION: ******** Windows operating system (OS) integrity, proper functionality + correct operation *depend* on the *validity* of *all* these variables! INvalid/wrong parameters can render Windows INoperable or/and UNbootable, and you may have to reinstall from scratch or repair your operating system (OS), eventually using the original disc/media containing Windows Setup files! Some of these variables can be added/customized/deleted/modified by using a Control Panel (CP)/Windows Settings (WS) tool: Run... [hold WinKey + press R] -> type this command SystemPropertiesAdvanced.exe -> press Enter -> Advanced tab -> Environment Variables... button -> edit variables -> highlight respective line -> Edit button -> change parameters -> OK -> OK. View the list of all your Windows operating system (OS) environment variables from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command SET -> press Enter. OR Save it to a plain text/ASCII (.txt) file: from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type same command above followed by the name of the file (in this example it will be saved in C:\ root) SET>C:\Windows_Environment_Variables.txt -> press Enter -> use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to view text file contents. Example of Windows Vista/newer list of relevant environment variables [replace all User_Name instances with your actual user name]: ----------snippity-snip---------- ALLUSERSPROFILE=C:\ProgramData APPDATA=C:\Users\PC\AppData\Roaming [OR: APPDATA=C:\Windows\system32\config\systemprofile\AppData\Roaming] CommonProgramFiles=C:\Program Files\Common Files CommonProgramFiles(x86)=C:\Program Files (x86)\Common Files [exists only in Windows 64-bit (x64)] CommonProgramW6432=C:\Program Files\Common Files ComSpec=C:\Windows\system32\cmd.exe DriverData=C:\Windows\System32\Drivers\DriverData HOMEDRIVE=C: HOMEPATH=\WINDOWS\SYSTEM32 [OR: HOMEPATH=\Users\User_Name] LOCALAPPDATA=C:\Users\PC\AppData\Local [OR: LOCALAPPDATA=C:\Windows\system32\config\systemprofile\AppData\Local] OS=Windows_NT ProgramData=C:\ProgramData ProgramFiles=C:\Program Files ProgramFiles(x86)=C:\Program Files (x86) [exists only in Windows 64-bit (x64)] ProgramW6432=C:\Program Files PSModulePath=%ProgramFiles%\WindowsPowerShell\Modules;C:\Windows\system32\WindowsPowerShell\v1.0\Modules PUBLIC=C:\Users\Public SystemDrive=C: SystemRoot=C:\Windows TEMP=C:\Users\PC\AppData\Local\Temp [OR: TEMP=C:\Windows\TEMP] TMP=C:\Users\PC\AppData\Local\Temp [OR: TMP=C:\Windows\TEMP] USERNAME=User_Name USERPROFILE=C:\Users\User_Name [OR: USERPROFILE=C:\Windows\system32\config\systemprofile] windir=C:\Windows ----------snippity-snip---------- By default automatic (crash) memory dumps can be triggered by operating system (OS) core, GUI (Graphical User Interface), hardware, kernel, software, system BSoDs (Blue Screens of Death), conflicts, crashes, drivers, errors, failures, incompatibilities, lockups, random/unexpected reboots/restarts/shut downs, faulty settings, etc. http://www.mdgx.com/newtip14.htm#BSOD http://en.wikipedia.org/wiki/Blue_screen_of_death A. Customize memory dump logging events, operation, schedule, file size + location: http://www.windowscentral.com/how-manage-crash-dump-settings-windows-10/ Run... [hold WinKey + press R] -> type this command SystemPropertiesAdvanced.exe -> press Enter -> Advanced tab -> Startup and Recovery -> Settings... button -> System failure -> check "Write an event to the sysytem log" box -> check "Automatically restart" box -> Write debugging information -> select preferred option -> Dump file: -> change environment variable [between %% characters] to any other valid option [see list above] -> check "Overwrite any existing file" box -> UNcheck "Disable automatic deletion of memory dumps when disk space is low" box -> OK. Use Windows built-in Event Viewer tool [eventvwr.msc] to view + diagnose conflicts, errors, crashes, failures, lockups, problems, reboots, shut downs, etc. http://www.minitool.com/news/open-event-viewer-windows-10.html http://www.windowscentral.com/how-use-event-viewer-windows-10/ Event Viewer [eventvwr.msc] is located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually C:\WINDOWS]. Management Saved Console (.msc) script files are associated by default with and executed by Microsoft Management Console (MMC.EXE) snap-in control tool, and most of them are located in the %WinDir%\SYSTEM32 folder [%WinDir% = usually C:\WINDOWS]. http://en.wikipedia.org/wiki/Microsoft_Management_Console B. Turn OFF/disable + delete/remove obsolete/unused memory dump log files (examples): 1. Delete them using PowerShell commands: Right-click PowerShell shortcut or C:\WINDOWS\System32\WindowsPowerShell\v1.0\PowerShell.exe [default location] -> Run as Administrator -> type these commands (examples) Powershell.exe -EP Bypass -MTA -NOL -NONI -NOP -C "Remove-Item '%SystemDrive%\DumpStack.log.*' -Force -EA SilentlyContinue -Verbose" Powershell.exe -EP Bypass -MTA -NOL -NONI -NOP -C "Remove-Item '%SystemRoot%\MEMORY.DMP' -Force -EA SilentlyContinue -Verbose" -> press Enter after each line. 2. Turn them OFF using registry settings: TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK to all prompts to register/merge/import its information into your registry. -----Begin cut & paste here----- REGEDIT4 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\CrashControl] "AutoReboot"=dword:1 "CrashDumpEnabled"=dword:0 "DumpFile"=hex(2):25,54,45,4d,50,25,5c,4d,45,4d,4f,52,59,2e,44,4d,50,00 "DumpLogLevel"=dword:0 "EnableLogFile"=dword:0 "LogEvent"=dword:0 "MinidumpDir"=hex(2):25,54,45,4d,50,25,5c,4d,69,6e,69,64,75,6d,70,00 "MinidumpsCount"=dword:0 "Overwrite"=dword:1 "DisplayParameters"=dword:1 "AlwaysKeepMemoryDump"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\CrashControl\StorageTelemetry] "DeviceDumpEnabled"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\CrashControl] "AutoReboot"=dword:1 "CrashDumpEnabled"=dword:0 "DumpFile"=hex(2):25,54,45,4d,50,25,5c,4d,45,4d,4f,52,59,2e,44,4d,50,00 "DumpLogLevel"=dword:0 "EnableLogFile"=dword:0 "LogEvent"=dword:0 "MinidumpDir"=hex(2):25,54,45,4d,50,25,5c,4d,69,6e,69,64,75,6d,70,00 "MinidumpsCount"=dword:0 "Overwrite"=dword:1 "DisplayParameters"=dword:1 "AlwaysKeepMemoryDump"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\CrashControl\StorageTelemetry] "DeviceDumpEnabled"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Control\CrashControl] "AutoReboot"=dword:1 "CrashDumpEnabled"=dword:0 "DumpFile"=hex(2):25,54,45,4d,50,25,5c,4d,45,4d,4f,52,59,2e,44,4d,50,00 "DumpLogLevel"=dword:0 "EnableLogFile"=dword:0 "LogEvent"=dword:0 "MinidumpDir"=hex(2):25,54,45,4d,50,25,5c,4d,69,6e,69,64,75,6d,70,00 "MinidumpsCount"=dword:0 "Overwrite"=dword:1 "DisplayParameters"=dword:1 "AlwaysKeepMemoryDump"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Control\CrashControl\StorageTelemetry] "DeviceDumpEnabled"=dword:0 ; ------End cut & paste here------ * Maximize 3D/DirectX/DirectX3D 3D/gaming/graphics/spatial/texture processing/rendering performance: decrease hardware lag + turn OFF diagnostics, performance + tracing counters + timers in Windows 7/newer: http://forums.guru3d.com/threads/from-red-to-green.387539/ http://www.ghacks.net/2013/04/18/try-changing-hpet-settings-to-improve-your-pcs-performance/ See also "* Turn OFF Diagnostic Tracing [DiagTrack], Data Collection/Logging [DataCollection], Telemetry + Performance Counters..." section further above. Turn OFF High Precision Event Timer (HPET) BIOS clock boot setting from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command BCDEDIT.EXE /deletevalue useplatformclock -> press Enter -> restart/reboot. In case BCDEdit setting above doesn't help, or if HPET is needed by some hardware component/device or software driver/program you are using: Turn ON High Precision Event Timer (HPET) BIOS clock boot setting from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command BCDEDIT.EXE /set useplatformclock true -> press Enter -> restart/reboot. TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text BATch (.bat) or CoMmanD (.cmd) script file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the BAT (.bat) or CMD (.cmd) extension -> right-click it -> Run as Administrator -> wait for completion. -----Begin cut & paste here----- @ECHO OFF IF NOT "%OS%"=="Windows_NT" GOTO END REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Direct3D" /v PSGPNumThreads /t REG_DWORD /d 16 /f REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Direct3D" /v EnableSC /t REG_DWORD /d 1 /f REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Direct3D" /v ForceCritSec /t REG_DWORD /d 1 /f REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Direct3D" /v MMXFastPath /t REG_DWORD /d 1 /f REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Control\ACPI" /v AMLIGlobalHeapSize /t REG_DWORD /d 1048576 /f REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v SystemPages /t REG_DWORD /d 4294967295 /f REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v PagedPoolSize /t REG_DWORD /d 4294967295 /f REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v SessionPoolSize /t REG_DWORD /d 60 /f REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v SessionViewSize /t REG_DWORD /d 120 /f REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v PoolUsageMaximum /t REG_DWORD /d 60 /f REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Control\usbstor\054C00C1" /v MaximumTransferLength /t REG_DWORD /d 2097152 /f REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Control\usbstor\05AC12xx" /v MaximumTransferLength /t REG_DWORD /d 2097152 /f REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Control\usbstor\05AC13xx" /v MaximumTransferLength /t REG_DWORD /d 2097152 /f REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Control\usbstor\05DCA431" /v MaximumTransferLength /t REG_DWORD /d 2097152 /f REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Control\usbstor\058F6362" /v MaximumTransferLength /t REG_DWORD /d 2097152 /f REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows" /v GDIProcessHandleQuota /t REG_DWORD /d 32768 /f REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows" /v USERProcessHandleQuota /t REG_DWORD /d 32768 /f REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Multimedia\SystemProfile\Tasks\Games" /v "Scheduling Category" /t REG_SZ /d High /f REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Multimedia\SystemProfile\Tasks\Games" /v "SFIO Priority" /t REG_SZ /d High /f REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Multimedia\SystemProfile\Tasks\Games" /v "Background Only" /t REG_SZ /d False /f REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Multimedia\SystemProfile\Tasks\Games" /v "Priority" /t REG_DWORD /d 1 /f REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Multimedia\SystemProfile\Tasks\Games" /v "GPU Priority" /t REG_DWORD /d 1 /f REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Multimedia\SystemProfile\Tasks\Games" /v "Affinity" /t REG_DWORD /d 0 /f :END EXIT ------End cut & paste here------ * Increase Cached Icons numeric value to max(imum) in Desktop, Explorer, File Manager (FM) + 3rd party replacements/similar tools in all Windows NTx editions -> "HARD DRIVE THRASHING" -> REGISTRY.TXT (included): http://www.mdgx.com/newtip1.htm#THRASH MDGx "File Manager + Windows Explorer/File Explorer Replacement Tools [free(ware)]" section in SOFTWARE.TXT (included): http://www.mdgx.com/toy.htm#ENH MDGx "Tweaked + Customized File Manager (FM) 32-bit" section in SOFTWARE.TXT (included): http://www.mdgx.com/xptoy.htm#FMNT Microsoft open source original File Manager (FM) 32-bit + 64-bit: http://www.mdgx.com/xptoy.htm#FMMS TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK to all prompts to register/merge/import its information into your registry. -----Begin cut & paste here----- REGEDIT4 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer] "Max Cached Icons"="65535" ; ------End cut & paste here------ * FIX: Repair Remote Procedure Call (RPC) Internet Protocol version 6 (IPv6)/server errors in Windows 7/newer: http://www.helpdeskgeek.com/help-desk/how-to-fix-rpc-server-is-unavailable-error-in-windows/ http://www.hpc.mil/program-areas/networking-overview/2013-10-03-17-24-38/ipv6-knowledge-base-ip-transport/disabling-ipv6-in-microsoft-windows-8-and-server-2012/ http://techjourney.net/disable-turn-off-ipv6-support-in-windows-10-8-1-8-7-vista/ http://kb.iu.edu/d/baeg/ http://www.drivereasy.com/knowledge/rpc-server-is-unavailable-error-on-windows-10-fixed/ http://www.alphr.com/rpc-server-is-unavailable/ http://learn.microsoft.com/troubleshoot/windows-server/networking/configure-ipv6-in-windows/ TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK to all prompts to register/merge/import its information into your registry. -----Begin cut & paste here----- REGEDIT4 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters] "DisabledComponents"=dword:8 ; ------End cut & paste here------ Restart/reboot Windows for this change to take effect. * FIX: Refresh/reset (delete + rebuild) Explorer Icon Cache Database [IconCache.db + iconcache*.db] in Windows 7/newer: http://www.thewindowsclub.com/rebuild-icon-clear-thumbnail-cache-windows-10/ http://www.thewindowsclub.com/rebuild-the-icon-cache-windows/ http://neosmart.net/wiki/clear-icons-cache/ http://www.windowscentral.com/how-reset-icon-cache-database-windows-10/ http://www.howtogeek.com/232779/how-to-rebuild-a-broken-icon-cache-in-windows-10/ http://appuals.com/rebuild-icon-cache-windows-11/ http://www.elevenforum.com/t/rebuild-icon-cache-in-windows-11.2049/ http://www.tenforums.com/tutorials/5645-rebuild-icon-cache-windows-10-a.html File: http://www.tenforums.com/attachments/tutorials/207993d1539300969-rebuild-icon-cache-windows-10-a-rebuild_icon_cache.bat IconCache.db + iconcache*.db files reside in these local user directories/folders: - %LocalAppData%\IconCache.db - %UserProfile%\AppData\Local\IconCache.db - %LocalAppData%\Microsoft\Windows\Explorer\iconcache*.db - %UserProfile%\AppData\Local\Microsoft\Windows\Explorer\iconcache*.db TIP: **** Windows NTx built-in/default/pre-installed/preset machine/system (apply to all users on the same machine) + local/user (apply only to the current/logged on user) environment variables used for target system/user directories/folders: http://www.ss64.com/nt/syntax-variables.html http://pureinfotech.com/list-environment-variables-windows-10/ http://www.computerhope.com/issues/ch000549.htm - %LocalAppData% = usually %UserProfile%\AppData\Local [same as C:\Users\%UserName%\AppData\Local] OR %WinDir%\SYSTEM32\Config\SystemProfile\AppData\Local . - %ProgramData% = usually C:\ProgramData . - %ProgramFiles% = usually C:\Program Files [exists in Windows 32-bit (x86) + Windows 64-bit (x64)]. - %ProgramFiles(x86)% = usually C:\Program Files (x86) [exists only in Windows 64-bit (x64)]. - %SystemDrive% = usually C:\ root. - %SystemRoot% = usually C:\WINDOWS [same as %WinDir%]. - %UserName% = your user name. - %UserProfile% = usually C:\Users\%UserName% . - %WinDir% = usually C:\WINDOWS [same as %SystemRoot%]. CAUTION: ******** Windows operating system (OS) integrity, proper functionality + correct operation *depend* on the *validity* of *all* these variables! INvalid/wrong parameters can render Windows INoperable or/and UNbootable, and you may have to reinstall from scratch or repair your operating system (OS), eventually using the original storage media containing Windows Setup files! Some of these variables can be added/customized/deleted/modified by using a Control Panel (CP)/Windows Settings (WS) tool: Run... [hold WinKey + press R] -> type this command SystemPropertiesAdvanced.exe -> press Enter -> Advanced tab -> Environment Variables... button -> edit variables -> highlight respective line -> Edit button -> change parameters -> OK -> OK. View the list of all your Windows operating system (OS) environment variables from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command SET -> press Enter. OR Save it to a plain text/ASCII (.txt) file: from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type same command above followed by the name of the file (in this example it will be saved in C:\ root) SET>C:\Windows_Environment_Variables.txt -> press Enter -> use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to view text file contents. Example of Windows Vista/newer list of relevant environment variables [replace all User_Name instances with your actual user name]: ----------snippity-snip---------- ALLUSERSPROFILE=C:\ProgramData APPDATA=C:\Users\PC\AppData\Roaming [OR: APPDATA=C:\Windows\system32\config\systemprofile\AppData\Roaming] CommonProgramFiles=C:\Program Files\Common Files CommonProgramFiles(x86)=C:\Program Files (x86)\Common Files [exists only in Windows 64-bit (x64)] CommonProgramW6432=C:\Program Files\Common Files ComSpec=C:\Windows\system32\cmd.exe DriverData=C:\Windows\System32\Drivers\DriverData HOMEDRIVE=C: HOMEPATH=\WINDOWS\SYSTEM32 [OR: HOMEPATH=\Users\User_Name] LOCALAPPDATA=C:\Users\PC\AppData\Local [OR: LOCALAPPDATA=C:\Windows\system32\config\systemprofile\AppData\Local] OS=Windows_NT ProgramData=C:\ProgramData ProgramFiles=C:\Program Files ProgramFiles(x86)=C:\Program Files (x86) [exists only in Windows 64-bit (x64)] ProgramW6432=C:\Program Files PSModulePath=%ProgramFiles%\WindowsPowerShell\Modules;C:\Windows\system32\WindowsPowerShell\v1.0\Modules PUBLIC=C:\Users\Public SystemDrive=C: SystemRoot=C:\Windows TEMP=C:\Users\PC\AppData\Local\Temp [OR: TEMP=C:\Windows\TEMP] TMP=C:\Users\PC\AppData\Local\Temp [OR: TMP=C:\Windows\TEMP] USERNAME=User_Name USERPROFILE=C:\Users\User_Name [OR: USERPROFILE=C:\Windows\system32\config\systemprofile] windir=C:\Windows ----------snippity-snip---------- * FIX: Turn OFF annoying/nagging "Your Windows 7 PC is out of support" (full screen) pop-ups in Windows 7 with Service Pack 1 (SP1) + certain Microsoft Updates [example: KB4530734] installed: http://nolabnoparty.com/en/windows-7-suppress-pc-is-out-of-support-warning/ http://www.askvg.com/tip-disable-your-windows-7-pc-is-out-of-support-full-screen-banner/ TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK to all prompts to register/merge/import its information into your registry. -----Begin cut & paste here----- REGEDIT4 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\EOSNotify] "DiscontinueEOS"=dword:1 [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\EOSNotify] "DiscontinueEOS"=dword:1 [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\EOSNotify] "DiscontinueEOS"=dword:1 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\EOSnotify.exe] "Debugger"="systray.exe" ; ------End cut & paste here------ * FIX: Detect/diagnose/repair/troubleshoot internet/network connection errors using Windows Network Diagnostics, a.k.a. Diagnostics Troubleshooting Wizard, a.k.a. DiagWizard, a.k.a. Microsoft Support Diagnostic Tool [MSDT.EXE] in Windows 7/newer: http://learn.microsoft.com/windows-server/administration/windows-commands/msdt/ http://technet.microsoft.com/library/ee424379.aspx#available-troubleshooting-packs http://www.elevenforum.com/t/run-troubleshooters-in-windows-11.3337/ http://www.thewindowsclub.com/how-to-run-a-troubleshooter-from-the-command-line-in-windows-10/ http://www.linksys.com/us/support-article?articleNum=135351 http://www.majorgeeks.com/content/page/how_to_use_the_microsoft_support_diagnostic_tool_system_diagnostic_report.html Run MSDT.EXE from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command MSDT.EXE -id NetworkDiagnosticsWeb -ep SystemSettings_Troubleshoot_L2 -skip true -elevated yes -> press Enter -> follow the instructions to diagnose + repair internet/network connection(s) errors. Microsoft Support Diagnostic Tool [MSDT.EXE] is located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually C:\WINDOWS]. View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command PATH -> press Enter. * FIX: Fix Windows 7/newer, Windows Server 2008 R2/newer + MS Office XP/newer Activation Errors 0x8007232b + 0xc004f074: http://www.techyuga.com/windows-activation-error-0x8007232b/ http://www.serverbrain.org/system-administration/disabling-automatic-kms-to-dns-publishing.html http://appuals.com/how-to-fix-office-2016-activation-error-code-0xc004f074/ http://winpeaker.com/en/windows/0xc004f074-office-activation-error-2010-2013-2016/ More info: http://github.com/MicrosoftDocs/windowsserverdocs/issues/4218/ MS DOCs: Registry Settings for Volume Activation: http://learn.microsoft.com/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn502532(v=ws.11) MS DOCs: Key Management Service (KMS) Activation -> Configuring DNS: http://technet.microsoft.com/library/ff793405.aspx MS DOCs: Activate Windows 7/newer using Key Management Service (KMS): http://learn.microsoft.com/windows/deployment/volume-activation/activate-using-key-management-service-vamt/ Wikipedia: Key Management Service (KMS): http://simple.wikipedia.org/wiki/Key_Management_Service Wikipedia: MS Office Versions: http://en.wikipedia.org/wiki/History_of_Microsoft_Office TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK to all prompts to register/merge/import its information into your registry. -----Begin cut & paste here----- REGEDIT4 ; Windows 7/newer + Windows Server 2008 R2/newer: [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform] "DisableDnsPublishing"=dword:1 ; Windows XP/2003/Vista/2008 only: [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SL] "DisableDnsPublishing"=dword:1 ; ------End cut & paste here------ * Turn ON display of time seconds [00:00:??] in Taskbar Tray Clock in Windows 7/newer: http://www.askvg.com/collection-of-windows-10-hidden-secret-registry-tweaks/ TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK to all prompts to register/merge/import its information into your registry. -----Begin cut & paste here----- REGEDIT4 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced] "ShowSecondsInSystemClock"=dword:1 [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced] "ShowSecondsInSystemClock"=dword:1 [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced] "ShowSecondsInSystemClock"=dword:1 ; ------End cut & paste here------ * Delete/remove unnecessary/bloat files + directories/folders to free up space in Windows 7/newer: http://www.techspot.com/guides/2240-windows-free-up-storage-space/ http://www.makeuseof.com/tag/delete-windows-files-folders/ http://www.houkconsulting.com/2019/07/freeing-disk-space-windows/ * Windows Desktop Gadgets (free): http://gadgetsrevived.com/ http://win10gadgets.com/ http://win7gadgets.com/ http://www.gadgetskit.com/ * Create Scheduled Task to Run at Boot Time: http://www.myboogpages.com/2009/02/how-to-create-a-scheduled-task-that-runs-at-boot-time.html * Remove icon/link/shortcut arrow + UAC (User Account Control) shield overlay (+ add transparency) + pin them to Taskbar/Start Menu in Windows 7/newer: http://www.mydigitallife.info/workaround-to-remove-shortcut-arrow-make-transparent-in-windows-7-yet-can-pin-to-taskbar-or-start-menu/ http://www.winaero.com/remove-shortcut-arrow-overlay-in-windows-10/ http://superuser.com/questions/68345/ http://www.tenforums.com/tutorials/5645-rebuild-icon-cache-windows-10-a.html http://windowsloop.com/remove-overlay-lock-icon-on-encrypted-files/ http://www.reddit.com/r/Windows10/comments/j4mr5y/ Winaero Tweaker 32-bit + 64-bit for Windows 7/8/8.1/10/11 [select Portable at install time!]: http://www.winaero.com/winaero-tweaker/ Download: http://www.winaero.com/download-winaero-tweaker/ Winaero Tweaker Features: http://www.winaero.com/the-list-of-winaero-tweaker-features/ Winaero Tweaker removes icon overlay using transparent icon. * Run BATch file as service: http://www.serverfault.com/questions/226271/running-a-batch-file-as-a-system-service-in-windows-server-2003 * Windows 7 File Association Fixes: http://www.winhelponline.com/blog/file-asso-fixes-for-windows-7/ http://www.winhelponline.com/blog/unassociate-file-types-windows-7-vista/ http://www.techsupportall.com/file-association-fixes/ http://www.techsupportall.com/file-association-fix-for-windows-7/ http://www.vistax64.com/threads/233243/ * Add programs (file associations) to right-click Open with... menu: http://www.techrepublic.com/forums/discussions/using-open-with-does-not-work/ * Default Programs Editor (DPE) 32-bit adds/edits/removes right-click items, file associations, autoplay programs (apps): http://www.defaultprogramseditor.com/ File: http://www.defaultprogramseditor.com/files/DefaultProgramsEditor.zip Requires Microsoft .Net Framework Redistributable (NFR) 3.5/newer: http://www.mdgx.com/add.htm#NFR * Fix Files/Folders Access Denied + other (similar) Errors: http://support.microsoft.com/help/2623670/ http://www.thewindowsclub.com/access-is-denied-software-installation-windows/ http://www.stackoverflow.com/questions/8619541/ http://smallbusiness.chron.com/change-permissions-system32-drivers-50434.html http://www.blogsdna.com/2159/how-to-take-ownership-grant-permissions-to-access-files-folder-in-windows-7.htm * Take Ownership + Grant Permission right-click items in Windows Vista/newer: http://www.techfleece.com/2011/05/15/how-to-take-ownership-of-files-or-folders-or-an-entire-hard-drive/ http://www.blogsdna.com/2159/ http://www.howtogeek.com/howto/windows-vista/add-take-ownership-to-explorer-right-click-menu-in-vista/ * (Re)Gain/(re)acquire/restore full permissions (run as SYSTEM) to edit protected/hidden/read-only registry (sub)keys in Windows Vista/newer: http://www.howtogeek.com/262464/how-to-gain-full-permissions-to-edit-protected-registry-keys/ Run the Registry Editor [RegEdit = %WinDir%\REGEDIT.EXE] with full SYSTEM level privileges to be able to view/create/edit/rename/delete hidden/locked registry (sub)keys/values: 1. NirCmd 32-bit + 64-bit multi-function DOS console command line + GUI tool: http://www.nirsoft.net/utils/nircmd.html NirCmd 32-bit: http://www.nirsoft.net/utils/nircmd.zip NirCmd 64-bit: http://www.nirsoft.net/utils/nircmd-x64.zip NirCmd Guide: http://nircmd.nirsoft.net/ Help: http://www.nirsoft.net/utils/nircmd2.html Download ZIP archive above that matches your Windows NTx OS bit strength [32-bit (x86) or 64-bit (x64)] + then unZIP/extract NirCmd files. 2. Place (copy/move) all NirCmd files in a (sub)directory/(sub)folder of your choice (example): C:\TOOLS\NirCmd 3. Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text CoMmanD (.cmd) script file containing the lines between Cut & Paste delimiters below -> save file as REGEDIT.CMD (example) into the same (sub)directory/(sub)folder where NirCmd files reside (using C:\TOOLS\NirCmd from example above): -----Begin cut & paste here----- @ECHO OFF IF NOT "%OS%"=="Windows_NT" GOTO END IF NOT EXIST C:\TOOLS\NirCmd\nircmd.exe GOTO END IF NOT EXIST %WinDir%\REGEDIT.EXE GOTO END C:\TOOLS\NirCmd\nircmd.exe elevatecmd runassystem %WinDir%\REGEDIT.EXE :END EXIT ------End cut & paste here------ This way from now on you can run RegEdit with full SYSTEM privileges from a convenient shortcut. 4. Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text VBScript (.vbs) script file containing the lines between Cut & Paste delimiters below -> save file as REGEDIT.VBS (example) into the same (sub)directory/(sub)folder where NirCmd files reside (using C:\TOOLS\NirCmd from example above): -----Begin cut & paste here----- Dim WshShell:Set WshShell=CreateObject("WScript.Shell") WshShell.Run chr(34)&"C:\TOOLS\NirCmd\REGEDIT.CMD"&Chr(34),0,true Set WshShell=Nothing ------End cut & paste here------ 5. Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save file as REGEDIT.REG (example) into the same (sub)directory/(sub)folder where NirCmd files reside (using C:\TOOLS\NirCmd from example above): -----Begin cut & paste here----- REGEDIT4 ; Desktop right-click RegEdit as SYSTEM shortcut: [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Directory\Background\shell\regedit_sys] @="Registry Editor (RegEdit) = SYSTEM" "SuppressionPolicy"=dword:0 "Icon"="REGEDIT.EXE,0" "NoWorkingDirectory"="" [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Directory\Background\shell\regedit_sys\command] @="WSCRIPT.EXE /B /Nologo C:\\TOOLS\\NirCmd\\REGEDIT.VBS" "IsolatedCommand"=- ; My Computer (machine/system wide/all users) Desktop RegEdit as SYSTEM shortcut: [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\regedit_sys] @="Registry Editor (RegEdit) = SYSTEM" "SuppressionPolicy"=dword:0 "Icon"="REGEDIT.EXE,0" [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\regedit_sys\command] @="WSCRIPT.EXE /B /Nologo C:\\TOOLS\\NirCmd\\REGEDIT.VBS" "IsolatedCommand"=- ; My Computer (current/logged on user) Desktop RegEdit as SYSTEM shortcut: [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{59031A47-3F72-44A7-89C5-5595FE6B30EE}\shell\regedit_sys] @="Registry Editor (RegEdit) = SYSTEM" "SuppressionPolicy"=dword:0 "Icon"="REGEDIT.EXE,0" [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{59031A47-3F72-44A7-89C5-5595FE6B30EE}\shell\regedit_sys\command] @="WSCRIPT.EXE /B /Nologo C:\\TOOLS\\NirCmd\\REGEDIT.VBS" "IsolatedCommand"=- ; Desktop right-click RegEdit as Current User shortcut: [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Directory\Background\shell\regedit] @="Registry Editor (RegEdit) = Current User" "SuppressionPolicy"=dword:0 "Icon"="REGEDIT.EXE,0" "NoWorkingDirectory"="" [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Directory\Background\shell\regedit\command] @="REGEDIT.EXE" "IsolatedCommand"=- ; My Computer (machine/system wide/all users) Desktop RegEdit as Current User shortcut: [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\regedit] @="Registry Editor (RegEdit) = Current User" "SuppressionPolicy"=dword:0 "Icon"="REGEDIT.EXE,0" [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\regedit\command] @="REGEDIT.EXE" "IsolatedCommand"=- ; My Computer (current/logged on user) Desktop RegEdit as Current User shortcut: [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{59031A47-3F72-44A7-89C5-5595FE6B30EE}\shell\regedit] @="Registry Editor (RegEdit) = Current User" "SuppressionPolicy"=dword:0 "Icon"="REGEDIT.EXE,0" [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{59031A47-3F72-44A7-89C5-5595FE6B30EE}\shell\regedit\command] @="REGEDIT.EXE" "IsolatedCommand"=- ; Control Panel (CONTROL.EXE) RegEdit as SYSTEM shortcut: [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{77708248-f839-436b-8919-527c410f48b9}] @="Registry Editor (RegEdit) = SYSTEM" "InfoTip"="Starts Registry Editor (RegEdit) as SYSTEM" "System.ControlPanel.Category"="5" [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{77708248-f839-436b-8919-527c410f48b9}\DefaultIcon] @="REGEDIT.EXE,0" [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{77708248-f839-436b-8919-527c410f48b9}\shell\open\command] @="WSCRIPT.EXE /B /Nologo C:\\TOOLS\\NirCmd\\REGEDIT.VBS" [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{77708248-f839-436b-8919-527c410f48b9}\Elevation] "Enabled"=dword:1 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ControlPanel\NameSpace\{77708248-f839-436b-8919-527c410f48b9}] @="Add Registry Editor (RegEdit) as SYSTEM to Control Panel" ; Control Panel (CONTROL.EXE) RegEdit as Current User shortcut: [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{77708248-f839-436b-8919-527c410f48b8}] @="Registry Editor (RegEdit) = Current User" "InfoTip"="Starts Registry Editor (RegEdit) as Current User" "System.ControlPanel.Category"="5" [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{77708248-f839-436b-8919-527c410f48b8}\DefaultIcon] @="REGEDIT.EXE,0" [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{77708248-f839-436b-8919-527c410f48b8}\shell\open\command] @="REGEDIT.EXE" [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{77708248-f839-436b-8919-527c410f48b8}\Elevation] "Enabled"=dword:1 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ControlPanel\NameSpace\{77708248-f839-436b-8919-527c410f48b8}] @="Add Registry Editor (RegEdit) as Current User to Control Panel" ; ------End cut & paste here------ 6. Desktop/Explorer -> go to C:\ drive -> TOOLS directory/folder -> NirCmd subdirectory/subfolder (using C:\TOOLS\NirCmd in this example) -> right-click on REGEDIT.REG -> Run as Administrator -> answer Yes/OK to all prompts to register/merge/import the information into your registry. 7. From now on you can run either "Registry Editor (RegEdit) = SYSTEM" (privileged) or "Registry Editor (RegEdit) as Current User" (default) shortcuts from all these locations: - Desktop [context menu] -> right-click. - My Computer (machine/system wide/all users) [context menu] -> right-click. - My Computer (current/logged on user) [context menu] -> right-click. - Control Panel (CP) [list of shortcuts] -> Start -> Control Panel or Run... [hold WinKey + press R] -> type this command control -> press Enter. Control Panel executable [CONTROL.EXE] is located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually C:\WINDOWS]. View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command PATH -> press Enter. * Turn OFF HomeGroup + Network Function Discovery (optional) in Windows 7/newer: http://www.howtogeek.com/howto/27091/how-to-disable-or-enable-the-homegroup-feature-in-windows-7/ http://support.microsoft.com/help/17145/ http://www.digitalcitizen.life/homegroup-feature-how-it-works/ http://www.howtogeek.com/9524/learning-windows-7-create-a-homegroup-join-a-new-computer-to-it/ CAUTION: Disabling these services will turn OFF device/network/remote/shared files/folders/libraries sharing/printing features! Disable these 2 HomeGroup services: HomeGroup Listener [HomeGroupListener] + HomeGroup Provider [HomeGroupProvider]: TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text BATch (.bat) or CoMmanD (.cmd) script file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the BAT (.bat) or CMD (.cmd) extension -> right-click it -> Run as Administrator -> wait for completion. -----Begin cut & paste here----- @ECHO OFF IF NOT "%OS%"=="Windows_NT" GOTO END :: Disable HomeGroup Listener [HomeGroupListener] service: ECHO Y|NET.EXE STOP HomeGroupListener SC.EXE CONFIG HomeGroupListener START= disabled :: Disable HomeGroup Provider [HomeGroupProvider] service: ECHO Y|NET.EXE STOP HomeGroupProvider SC.EXE CONFIG HomeGroupProvider START= disabled :END EXIT ------End cut & paste here------ TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK to all prompts to register/merge/import its information into your registry. -----Begin cut & paste here----- REGEDIT4 [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B4FB3F98-C1EA-428d-A78A-D1F5659CBA93}] "System.IsPinnedToNameSpaceTree"=dword:0 ; WOW6432Node registry subkey exists only in Windows NTx 64-bit (x64): [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B4FB3F98-C1EA-428d-A78A-D1F5659CBA93}] "System.IsPinnedToNameSpaceTree"=dword:0 [HKEY_CURRENT_USER\Software\Classes\CLSID\{B4FB3F98-C1EA-428d-A78A-D1F5659CBA93}] "System.IsPinnedToNameSpaceTree"=dword:0 ; WOW6432Node registry subkey exists only in Windows NTx 64-bit (x64): [HKEY_CURRENT_USER\Software\Classes\Wow6432Node\CLSID\{B4FB3F98-C1EA-428d-A78A-D1F5659CBA93}] "System.IsPinnedToNameSpaceTree"=dword:0 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\HomeGroup\SharingInProgress] "SharingInProgress"=dword:0 [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\HomeGroup] "AlwaysStuffAlphaCreds"=dword:0 "ShareBannerCount"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\HomeGroupListener] "Start"=dword:4 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\HomeGroupListener] "Start"=dword:4 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\HomeGroupListener] "Start"=dword:4 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\HomeGroupProvider] "Start"=dword:4 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\HomeGroupProvider] "Start"=dword:4 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\HomeGroupProvider] "Start"=dword:4 ; ------End cut & paste here------ Turn OFF these 2 HomeGroup related Function Discovery services (optional): Function Discovery Provider Host [fdPHost] [%WinDir%\SYSTEM32\fdPHost.dll] + Function Discovery Resource Publication [FDResPub] [%WinDir%\SYSTEM32\fdrespub.dll]: http://batcmd.com/windows/10/services/fdphost/ http://batcmd.com/windows/10/services/fdrespub/ TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text BATch (.bat) or CoMmanD (.cmd) script file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the BAT (.bat) or CMD (.cmd) extension -> right-click it -> Run as Administrator -> wait for completion. -----Begin cut & paste here----- @ECHO OFF IF NOT "%OS%"=="Windows_NT" GOTO END :: Disable Function Discovery Provider Host [fdPHost] service: ECHO Y|NET.EXE STOP fdPHost SC.EXE CONFIG fdPHost START= disabled :: Disable Function Discovery Resource Publication [FDResPub] service: ECHO Y|NET.EXE STOP FDResPub SC.EXE CONFIG FDResPub START= disabled :END EXIT ------End cut & paste here------ TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK to all prompts to register/merge/import its information into your registry. -----Begin cut & paste here----- REGEDIT4 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\fdPHost] "Start"=dword:4 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\fdPHost] "Start"=dword:4 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\fdPHost] "Start"=dword:4 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\FDResPub] "Start"=dword:4 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\FDResPub] "Start"=dword:4 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\FDResPub] "Start"=dword:4 ; ------End cut & paste here------ * Automatically install recommended drivers/updates for your hardware/devices: http://support.microsoft.com/help/15054/ * .MSI/.MSP/.MSU Installer (%WinDir%\SYSTEM32\MSIEXEC.EXE) Command Line Options: http://learn.microsoft.com/windows/desktop/msi/command-line-options/ http://msdn.microsoft.com/library/aa367988.aspx http://msdn.microsoft.com/library/aa372024.aspx http://helpnet.installshield.com/installshield21helplib/helplibrary/IHelpCmdLineMSI.htm http://www.silentinstall.org/msiexec/ * Remove Breadcrumbs Bar from Explorer in Windows 7/newer: http://twigstechtips.blogspot.com/2010/02/win7-remove-windows-explorer.html http://www.winaero.com/show-full-path-address-bar-windows-10-file-explorer/ * Windows DOS console command (prompt) line, commands, command line tools + scripting: http://learn.microsoft.com/windows-server/administration/windows-commands/windows-commands/ http://technet.microsoft.com/library/cc754340.aspx http://learn.microsoft.com/windows-server/administration/windows-commands/cmd/ http://www.microsoft.com/download/details.aspx?id=56846 http://download.microsoft.com/download/5/8/9/58911986-D4AD-4695-BF63-F734CD4DF8F2/ws-commands.pdf http://web.archive.org/web/20071014001728/http://technet2.microsoft.com:80/windowsserver/en/library/552ed70a-208d-48c4-8da8-2e27b530eac71033.mspx http://www.bleepingcomputer.com/tutorials/windows-command-prompt-introduction/ http://www.ss64.com/nt/ http://www.ss64.com/nt/commands.html http://www.ss64.com/nt/cmd.html http://www.ss64.com/nt/run.html http://www.ss64.com/nt/set.html http://www.ss64.com/nt/setx.html http://www.ionos.com/digitalguide/server/know-how/windows-cmd-commands/ http://www.bytescout.com/blog/windows-command-prompt-commands.html http://www.c3scripts.com/tutorials/msdos/commands.html http://www.robvanderwoude.com/ http://www.ccm.net/faq/403-command-prompts-for-windows/ http://www.lifewire.com/list-of-4092302/ http://www.lifewire.com/dos-commands-4070427/ http://en.wikipedia.org/wiki/List_of_DOS_commands * Link Directory IDentifier (LDID)/DIRectory IDentifier (DIRID)/Decentralized IDentifier (DID)/Globally Unique IDentifier (GUID)/Universaly Unique IDentifier (UUID) built-in/hard linked/encrypted 128-bit unique reference numbers used in Windows API (Application Programming Interface) to identify for example system, localized + user special directories/folders names/values in Windows 9x/NTx OSes (conventions used in INF/MSI installation/reference files/scripts, registry keys/values, API/NET programming, driver/hardware/internet/networking identification, etc): http://learn.microsoft.com/dotnet/api/system.environment.specialfolder/ http://learn.microsoft.com/windows-hardware/drivers/install/using-dirids/ http://learn.microsoft.com/windows/win32/shell/knownfolderid/ http://learn.microsoft.com/windows/win32/shell/csidl/ http://w3c-ccg.github.io/did-primer/ http://guid.one/guid/ http://en.wikipedia.org/wiki/Decentralized_identifier http://en.wikipedia.org/wiki/Universally_unique_identifier Examples of system + user special directories/folders registry values [some are unique to specific Windows NTx OS builds/editions/releases/updates/versions]: Desktop {B4BFCC3A-DB2C-424C-B029-7FE99A87C641} This PC {0AC0837C-BBF8-452A-850D-79D08E667CA7} Downloads {374DE290-123F-4565-9164-39C4925E467B} Documents {FDD39AD0-238F-46AF-ADB4-6C85480369C7} Local Downloads {7d83ee9b-2244-4e70-b1f5-5393042af1e4} 3D Objects {31C0DD25-9439-4F12-BF41-7FF4EDA38722} My Music {4BD8D571-6D19-48D3-BE97-422220080E43} Local Pictures {0ddd015d-b06c-45d5-8c4c-f59713854639} My Pictures {33E28130-4E1E-4676-835A-98395C3BC3BB} Local Music {a0c69a99-21c8-4671-8703-7934162fcf1d} My Video {18989B1D-99B5-455B-841C-AB7C74E4DDFC} Personal {FDD39AD0-238F-46AF-ADB4-6C85480369C7} Local Documents {f42ee2d3-909f-4907-8871-4c22fc0bf756} Local Videos {35286a68-3c57-41a1-bbb1-0eae73d76c95} MDGx "INF Setup files" topic in SOFTWARE.TXT (included): http://www.mdgx.com/add.htm#INF MDGx "INF Guide" topic in SOFTWARE.TXT (included): http://www.mdgx.com/INF_web/ Value Destination Directory/Folder ———————————————————————————————————— 01 Source Drive_Letter:\Pathname = the directory the INF file is installed from 10 Windows directory = equivalent to %WinDir% 11 System directory = equivalent to %WinDir%\SYSTEM32 for NT based (NTx) OSes and to %WinDir%\SYSTEM for Windows 9x/ME 12 Drivers directory = equivalent to %WinDir%\SYSTEM32\DRIVERS for NT based (NTx) OSes and to %WinDir%\SYSTEM\IoSubsys on Windows 9x/ME 17 INF file directory 18 Help directory 20 Fonts directory 21 Viewers directory 23 Color directory (ICM) = not used for installing printer drivers 24 Root directory of the system disk = root directory of disk on which Windows files are installed = example: if DIRID 10 is C:\WINDOWS then DIRID 24 is C:\ root 25 Shared directory 30 Root directory of the boot disk known as "ARC system partition" for NT based (NTx) OSes = may or may not be same directory as the one represented by DIRID 24 50 System directory for NT based (NTx) OSes = equivalent to %WinDir%\system = NT based (NTx) OSes only 51 Spool directory = not used for installing printer drivers: see Printer DIRIDs 52 Spool drivers directory = not used for installing Printer drivers 53 User profile directory 54 Directory where ntldr.exe and osloader.exe are located = NT based (NTx) OSes only 55 Print processors directory = not used for installing Printer drivers -1 Absolute path (hard link) More info: http://en.wikipedia.org/wiki/Hard_link http://en.wikipedia.org/wiki/Symbolic_link#Microsoft_Windows http://en.wikipedia.org/wiki/Symbolic_link#Shell_objects DIRID values from 16384 through 32767 are reserved for special Shell Folders. Examples of special directories/folders DIRID values and their correspondent locations: http://learn.microsoft.com/dotnet/api/system.environment.specialfolder/ http://en.wikipedia.org/wiki/Special_folder#List_of_special_folders http://www.nirsoft.net/articles/find_special_folder_location.html http://livecode.fandom.com/wiki/SpecialFolderPath http://commandwindows.com/windows7-shell-commands.htm http://johnkoerner.com/csharp/special-folder-values-on-windows-versus-mac/ Value Shell Special Directory/Folder —————————————————————————————————————— 16406 All Users\Start Menu 16407 All Users\Start Menu\Programs 16408 All Users\Start Menu\Programs\Startup 16409 All Users\Desktop 16415 All Users\Favorites 16419 All Users\Application Data 16422 Program Files 16425 %WinDir%\SYSTEM32 = valid for Win32 user mode applications running under Windows 32-bit/x86 on Windows 64-bit/x64 (WoW64) 16426 Program Files = valid for Win32 user mode applications running under Windows 64-bit/x64 (WoW64) 16427 Program Files\Common 16428 Program Files\Common = valid for Win32 user mode applications running under Windows 64-bit/x64 (WoW64) 16429 All Users\Templates 16430 All Users\Documents See also "XP -> 7/8/8.1 Easy Transfer Files + Settings" chapter + "List of System + User Shell Folders in Windows Vista/newer:" topic in WINDOWS7.TXT (this file) -> further below: http://www.mdgx.com/7.php http://www.mdgx.com/WINDOWS7.TXT * Turn ON Automatic Logon [AutoAdminLogon registry REG_SZ (String) value] for (default) admin(istrator)/main/principal user/owner/sysadmin + logon into your computer/device/portable automatically without the need for typing in your user name + password every time (enable passwordless function) in Windows 7/newer: http://www.partitionwizard.com/clone-disk/disable-login-screen-windows-10.html http://learn.microsoft.com/troubleshoot/windows-server/user-profiles-and-logon/turn-on-automatic-logon/ http://quicklaunch.ucworkspace.com/support/solutions/articles/3000053152/ http://www.tenforums.com/tutorials/3539-sign-user-account-automatically-windows-10-startup.html http://www.tenforums.com/tutorials/138564-enable-disable-passwordless-sign-microsoft-accounts.html http://www.winaero.com/enable-passwordless-sign-in-for-microsoft-accounts/ http://mashtips.com/set-auto-login-windows-10/ http://support.microsoft.com/help/324737/ See also "BYPASS AUTOLOGON" topic in TIPS2000.TXT (included): http://www.mdgx.com/2k1.htm#BAIW TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK to all prompts to register/merge/import its information into your registry. -----Begin cut & paste here----- REGEDIT4 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] "AutoAdminLogon"="1" ; WOW6432Node registry subkey exists only in Windows NTx 64-bit (x64): [HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon] "AutoAdminLogon"="1" [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\PasswordLess\Device] "DevicePasswordLessBuildVersion"=dword:2 ; WOW6432Node registry subkey exists only in Windows NTx 64-bit (x64): [HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\PasswordLess\Device] "DevicePasswordLessBuildVersion"=dword:2 ; ------End cut & paste here------ Autologon 32-bit + 64-bit GUI interface + DOS console command line (Autologon.exe 32-bit + Autologon64.exe 64-bit) tools automate/configure/enable/disable Windows built-in auto-logon for users with Administrator level credentials/privileges/rights: http://learn.microsoft.com/sysinternals/downloads/autologon/ File: http://download.sysinternals.com/files/AutoLogon.zip * Turn OFF deprecated/obsolete Microsoft proprietary SMB (Server Message Block) 1.0 (SMB1) + CIFS (Common Internet File System) file sharing support network protocols (which are disabled by default in Windows 8/newer + Windows Server 2012/newer and replaced with newer SMB versions) due to (until recently!) unpatched security vulnerabilities in Windows 7/newer: http://arstechnica.com/information-technology/2022/12/critical-windows-code-execution-vulnerability-went-undetected-until-now/ http://arstechnica.com/gadgets/2022/04/microsoft-enters-final-phase-of-disabling-smb1-file-sharing-in-windows-11/ http://learn.microsoft.com/windows-server/storage/file-server/troubleshoot/smbv1-not-installed-by-default-in-windows/ http://woshub.com/how-to-disable-smb-1-0-in-windows-10-server-2016/ http://en.wikipedia.org/wiki/Server_Message_Block UPDATE: List of all available Security Vulnerability Updates for all affected Windows NTx editions + versions: http://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37958/#securityUpdates Make sure all SMB1/CIFS protocols are disabled in Optional Windows Features Manager: Start -> Run... [hold WinKey + press R] -> make sure it states "This task will be created with administrative privileges." -> type: OptionalFeatures.exe -> press Enter -> scroll down to SMB 1.0/CIFS File Sharing Support -> click all [+] signs to open submenu list -> make sure to UNcheck all (3) square boxes -> click OK button. Or in PowerShell: right-click PowerShell shortcut or C:\WINDOWS\System32\WindowsPowerShell\v1.0\PowerShell.exe [default location] -> Run as Administrator -> run 1 of these commands -> press Enter after each line: Uninstall-WindowsFeature -Name FS-SMB1 -Remove OR: Disable-WindowsOptionalFeature -Online -FeatureName SMB1Protocol -Remove Verify to make sure all SMB1 protocols are disabled: from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter: DISM.EXE /online /Get-Features /format:table | find "SMB1Protocol" -> make sure all (4) messages show "Disabled". Deployment Image Servicing and Management (DISM) tool (DISM.EXE) is located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually C:\WINDOWS]. * Hide (currently) disabled/disconnected/empty/inactive/orphan/phantom/remote/removed/unavailable drives/partitions/volumes in Explorer, File Manager (FM) + 3rd party replacements/similar tools and turn OFF "Could not reconnect all network drives" notification: http://www.sevenforums.com/tutorials/6969-drives-hide-show-empty-drives-computer-folder.html http://www.tenforums.com/tutorials/145379-disable-could-not-reconnect-all-network-drives-notification-windows.html http://www.winaero.com/blog/disable-could-not-reconnect-all-network-drives-notification-in-windows-10/ MDGx "Tweaked + Customized File Manager (FM) 32-bit" section in SOFTWARE.TXT (included): http://www.mdgx.com/xptoy.htm#FMNT Microsoft open source original File Manager (FM) 32-bit + 64-bit: http://www.mdgx.com/xptoy.htm#FMMS TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK to all prompts to register/merge/import its information into your registry. -----Begin cut & paste here----- REGEDIT4 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced] "HideDrivesWithNoMedia"=- [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced] "HideDrivesWithNoMedia"=dword:1 [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced] "HideDrivesWithNoMedia"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\NetworkProvider] "RestoreConnection"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\NetworkProvider] "RestoreConnection"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Control\NetworkProvider] "RestoreConnection"=dword:0 ; ------End cut & paste here------ * Show (previously) disabled/disconnected/empty/inactive/orphan/phantom/remote/removed/unavailable drives/partitions/volumes in Explorer, File Manager (FM) + 3rd party replacements/similar tools and turn ON "Could not reconnect all network drives" notification: http://www.sevenforums.com/tutorials/6969-drives-hide-show-empty-drives-computer-folder.html http://www.tenforums.com/tutorials/145379-disable-could-not-reconnect-all-network-drives-notification-windows.html http://www.winaero.com/blog/disable-could-not-reconnect-all-network-drives-notification-in-windows-10/ MDGx "Tweaked + Customized File Manager (FM) 32-bit" section in SOFTWARE.TXT (included): http://www.mdgx.com/xptoy.htm#FMNT Microsoft open source original File Manager (FM) 32-bit + 64-bit: http://www.mdgx.com/xptoy.htm#FMMS TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK to all prompts to register/merge/import its information into your registry. -----Begin cut & paste here----- REGEDIT4 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced] "HideDrivesWithNoMedia"=- [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced] "HideDrivesWithNoMedia"=dword:0 [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced] "HideDrivesWithNoMedia"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\NetworkProvider] "RestoreConnection"=- [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\NetworkProvider] "RestoreConnection"=- [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Control\NetworkProvider] "RestoreConnection"=- ; ------End cut & paste here------ * UNhide file/folder (directory)/protocol/shortcut/link extensions in Windows NTx (examples): http://www.winaero.com/blog/show-hide-file-extensions-windows-10/ TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK to all prompts to register/merge/import its information into your registry. -----Begin cut & paste here----- REGEDIT4 [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Directory] "AlwaysShowExt"="" "EditFlags"=hex:01 [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Drive] "AlwaysShowExt"="" "EditFlags"=hex:01 [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Folder] "AlwaysShowExt"="" "EditFlags"=hex:01 [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\*] "AlwaysShowExt"="" "EditFlags"=hex:01 [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\exefile] "AlwaysShowExt"="" "EditFlags"=hex:01 [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\dllfile] "AlwaysShowExt"="" "EditFlags"=hex:01 [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{450D8FBA-AD25-11D0-98A8-0800361B1103}] "AlwaysShowExt"="" "EditFlags"=hex:01 [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}] "AlwaysShowExt"="" "EditFlags"=hex:01 [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{59031A47-3F72-44A7-89C5-5595FE6B30EE}] "AlwaysShowExt"="" "EditFlags"=hex:01 ; ------End cut & paste here------ * Reorder files + directories/folders names alphabetically by their logical numeric value in Windows XP/newer: http://www.tenforums.com/tutorials/91417-enable-disable-numerical-sorting-file-explorer-windows-10-a.html http://admx.help/?Category=Windows_10_2016&Policy=Microsoft.Policies.WindowsExplorer::NoStrCmpLogical http://web.archive.org/web/20150226105024/http://support.microsoft.com/kb/319827/ See "SYSTEM RESTRICTIONS" chapter in REGISTRY.TXT (included): http://www.mdgx.com/newtip9.htm#RESTRICT TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK to all prompts to register/merge/import its information into your registry. -----Begin cut & paste here----- REGEDIT4 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer] "NoStrCmpLogical"=dword:1 [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer] "NoStrCmpLogical"=dword:1 [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer] "NoStrCmpLogical"=dword:1 ; ------End cut & paste here------ * Turn OFF/ON all AutoPlay [+ Display/PlayBack] settings for all available/configured/connected/installed/linked/local/networked/remote/removable cards/devices/discs/disks/media/sticks drives/partitions/volumes + apps/programs/software/services in Windows 7/newer: http://www.top-password.com/blog/4-ways-to-disable-windows-10-autoplay/ http://www.winaero.com/disable-autoplay-for-all-drives-in-windows-10/ 1. Control Panel (CP) or Windows Settings (WS): - Windows 10/11 users: Start button/icon/logo/menu/orb -> (Windows) Settings (WS) [gear icon] -> Devices -> AutoPlay. OR: Run... [hold WinKey + press R] -> type this command: EXPLORER.EXE ms-settings:autoplay -> press Enter. - Windows 7/8/8.1 users: Start button/icon/logo/menu/orb -> Control Panel (CP) OR Run... [hold WinKey + press R] -> type this command: CONTROL.EXE -> press Enter -> All Control Panel Items -> AutoPlay. OR: Run... [hold WinKey + press R] -> type this command: CONTROL.EXE /name Microsoft.AutoPlay -> press Enter. Control Panel executable [CONTROL.EXE] is located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually C:\WINDOWS]. View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command PATH -> press Enter. All Windows 7/newer users: customize settings +/- turn OFF/ON AutoPlay according to your needs/preferences. 2. Turn OFF AutoPlay [+ Display/PlayBack] globally on your computer for all available/configured/connected/installed/linked/local/networked/remote/removable cards/devices/discs/disks/media/sticks drives/partitions/volumes -> see "HIDE YOUR DRIVES!" topic in REGISTRY.TXT (included): http://www.mdgx.com/newtip14.htm#HW9XD TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK to all prompts to register/merge/import its information into your registry. -----Begin cut & paste here----- REGEDIT4 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer] "NoDriveTypeAutoRun"=dword:03ffffff [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer] "NoDriveTypeAutoRun"=dword:03ffffff [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer] "NoDriveTypeAutoRun"=dword:03ffffff ; ------End cut & paste here------ 3. Turn OFF all AutoPlay [+ Display/PlayBack] settings for current (logged on/signed in) user + all other users (if more than 1) using same computer/device/portable: TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK to all prompts to register/merge/import its information into your registry. -----Begin cut & paste here----- REGEDIT4 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers] "DisableAutoplay"=dword:1 [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers] "DisableAutoplay"=dword:1 [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers] "DisableAutoplay"=dword:1 [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\AutorunINFLegacyArrival] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\CameraAlternate] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\CameraAlternate\ShowPicturesOnArrival] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\HandleBDBurningOnArrival] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\HandleCDBurningOnArrival] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\HandleDVDBurningOnArrival] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\MixedContentOnArrival] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\PlayBluRayOnArrival] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\PlayCDAudioOnArrival] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\PlayDVDAudioOnArrival] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\PlayDVDMovieOnArrival] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\PlayEnhancedCDOnArrival] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\PlayEnhancedDVDOnArrival] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\PlayMusicFilesOnArrival] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\PlaySuperVideoCDMovieOnArrival] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\PlayVideoCDMovieOnArrival] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\PlayVideoFilesOnArrival] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\ShowPicturesOnArrival] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\StorageOnArrival] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\WPD\ImageSource] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\AutorunINFLegacyArrival] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\CameraAlternate] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\CameraAlternate\ShowPicturesOnArrival] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\HandleBDBurningOnArrival] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\HandleCDBurningOnArrival] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\HandleDVDBurningOnArrival] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\MixedContentOnArrival] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\PlayBluRayOnArrival] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\PlayCDAudioOnArrival] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\PlayDVDAudioOnArrival] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\PlayDVDMovieOnArrival] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\PlayEnhancedCDOnArrival] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\PlayEnhancedDVDOnArrival] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\PlayMusicFilesOnArrival] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\PlaySuperVideoCDMovieOnArrival] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\PlayVideoCDMovieOnArrival] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\PlayVideoFilesOnArrival] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\ShowPicturesOnArrival] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\StorageOnArrival] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\WPD\ImageSource] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\AutorunINFLegacyArrival] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\CameraAlternate] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\CameraAlternate\ShowPicturesOnArrival] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\HandleBDBurningOnArrival] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\HandleCDBurningOnArrival] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\HandleDVDBurningOnArrival] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\MixedContentOnArrival] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\PlayBluRayOnArrival] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\PlayCDAudioOnArrival] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\PlayDVDAudioOnArrival] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\PlayDVDMovieOnArrival] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\PlayEnhancedCDOnArrival] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\PlayEnhancedDVDOnArrival] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\PlayMusicFilesOnArrival] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\PlaySuperVideoCDMovieOnArrival] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\PlayVideoCDMovieOnArrival] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\PlayVideoFilesOnArrival] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\ShowPicturesOnArrival] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\StorageOnArrival] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\WPD\ImageSource] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\AutorunINFLegacyArrival] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\CameraAlternate] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\CameraAlternate\ShowPicturesOnArrival] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\HandleBDBurningOnArrival] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\HandleCDBurningOnArrival] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\HandleDVDBurningOnArrival] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\MixedContentOnArrival] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\PlayBluRayOnArrival] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\PlayCDAudioOnArrival] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\PlayDVDAudioOnArrival] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\PlayDVDMovieOnArrival] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\PlayEnhancedCDOnArrival] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\PlayEnhancedDVDOnArrival] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\PlayMusicFilesOnArrival] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\PlaySuperVideoCDMovieOnArrival] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\PlayVideoCDMovieOnArrival] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\PlayVideoFilesOnArrival] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\ShowPicturesOnArrival] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\StorageOnArrival] @="MSTakeNoAction" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\WPD\ImageSource] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\AutorunINFLegacyArrival] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\CameraAlternate] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\CameraAlternate\ShowPicturesOnArrival] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\HandleBDBurningOnArrival] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\HandleCDBurningOnArrival] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\HandleDVDBurningOnArrival] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\MixedContentOnArrival] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\PlayBluRayOnArrival] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\PlayCDAudioOnArrival] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\PlayDVDAudioOnArrival] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\PlayDVDMovieOnArrival] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\PlayEnhancedCDOnArrival] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\PlayEnhancedDVDOnArrival] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\PlayMusicFilesOnArrival] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\PlaySuperVideoCDMovieOnArrival] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\PlayVideoCDMovieOnArrival] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\PlayVideoFilesOnArrival] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\ShowPicturesOnArrival] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\StorageOnArrival] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlers\WPD\ImageSource] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\AutorunINFLegacyArrival] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\CameraAlternate] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\CameraAlternate\ShowPicturesOnArrival] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\HandleBDBurningOnArrival] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\HandleCDBurningOnArrival] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\HandleDVDBurningOnArrival] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\MixedContentOnArrival] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\PlayBluRayOnArrival] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\PlayCDAudioOnArrival] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\PlayDVDAudioOnArrival] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\PlayDVDMovieOnArrival] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\PlayEnhancedCDOnArrival] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\PlayEnhancedDVDOnArrival] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\PlayMusicFilesOnArrival] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\PlaySuperVideoCDMovieOnArrival] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\PlayVideoCDMovieOnArrival] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\PlayVideoFilesOnArrival] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\ShowPicturesOnArrival] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\StorageOnArrival] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\WPD\ImageSource] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\AutorunINFLegacyArrival] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\CameraAlternate] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\CameraAlternate\ShowPicturesOnArrival] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\HandleBDBurningOnArrival] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\HandleCDBurningOnArrival] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\HandleDVDBurningOnArrival] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\MixedContentOnArrival] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\PlayBluRayOnArrival] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\PlayCDAudioOnArrival] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\PlayDVDAudioOnArrival] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\PlayDVDMovieOnArrival] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\PlayEnhancedCDOnArrival] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\PlayEnhancedDVDOnArrival] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\PlayMusicFilesOnArrival] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\PlaySuperVideoCDMovieOnArrival] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\PlayVideoCDMovieOnArrival] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\PlayVideoFilesOnArrival] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\ShowPicturesOnArrival] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\StorageOnArrival] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\WPD\ImageSource] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\AutorunINFLegacyArrival] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\CameraAlternate] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\CameraAlternate\ShowPicturesOnArrival] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\HandleBDBurningOnArrival] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\HandleCDBurningOnArrival] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\HandleDVDBurningOnArrival] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\MixedContentOnArrival] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\PlayBluRayOnArrival] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\PlayCDAudioOnArrival] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\PlayDVDAudioOnArrival] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\PlayDVDMovieOnArrival] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\PlayEnhancedCDOnArrival] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\PlayEnhancedDVDOnArrival] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\PlayMusicFilesOnArrival] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\PlaySuperVideoCDMovieOnArrival] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\PlayVideoCDMovieOnArrival] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\PlayVideoFilesOnArrival] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\ShowPicturesOnArrival] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\StorageOnArrival] @="MSTakeNoAction" [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\WPD\ImageSource] @="MSTakeNoAction" ; ------End cut & paste here------ * Turn OFF annoying boot/logon/startup/launch sounds in Windows 7/newer: http://www.tenforums.com/tutorials/61302-turn-off-startup-sound-windows-10-a.html Winaero Tweaker 32-bit + 64-bit for Windows 7/8/8.1/10/11 [select Portable at install time!]: http://www.winaero.com/winaero-tweaker/ Download: http://www.winaero.com/download-winaero-tweaker/ TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK to all prompts to register/merge/import its information into your registry. -----Begin cut & paste here----- REGEDIT4 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\LogonUI\BootAnimation] "DisableStartupSound"=dword:1 [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Authentication\LogonUI\BootAnimation] "DisableStartupSound"=dword:1 [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Authentication\LogonUI\BootAnimation] "DisableStartupSound"=dword:1 ; ------End cut & paste here------ * Turn OFF *all* annoying Desktop/Explorer/system/event/notification/app/program/scheduled task + boot/logon/startup/launch sounds + rename/delete/disable the "Media" directory/folder in Windows 7/newer: http://www.howtogeek.com/howto/windows-vista/turn-off-windows-explorer-click-sounds-in-windows-vista/ http://www.eightforums.com/threads/delete-windows-7-sound-schemes.79731/ http://freewindowsvistatutorials.com/whereIsSoundFolderLocationSystemSoundsMediaInWindows7.php 1. 1st backup these 2 registry subkeys + save them as REG files (see examples below): HKCU (Current User) "AppEvents" + HKU .DEFAULT (Default User) "AppEvents": right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run these commands -> press Enter after each line (example): REG.EXE EXPORT "HKCU\AppEvents" HKCU_AppEvents.reg /y REG.EXE EXPORT "HKU\.DEFAULT\AppEvents" HKU_DEF_AppEvents.reg /y To restore original sounds events from registry files above (assuming you're running them from within their location, otherwise you must add full path: drive letter + directory/folder name in front of them): right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run these commands -> press Enter after each line (example): REG.EXE IMPORT HKCU_AppEvents.reg /y REG.EXE IMPORT HKU_DEF_AppEvents.reg /y 2. Run Registry file below: TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK to all prompts to register/merge/import its information into your registry. -----Begin cut & paste here----- REGEDIT4 [-HKEY_CURRENT_USER\AppEvents] [-HKEY_USERS\.DEFAULT\AppEvents] [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\LogonUI\BootAnimation] "DisableStartupSound"=dword:1 [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Authentication\LogonUI\BootAnimation] "DisableStartupSound"=dword:1 [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Authentication\LogonUI\BootAnimation] "DisableStartupSound"=dword:1 ; ------End cut & paste here------ 3. Optional: if you plan never to use any Windows system events sounds in the future, you can safely rename or delete (to save a little bit of space) [but back it up 1st!] the "Media" Windows subfolder which holds all Windows sound files (.mid, .rmi, .wav): right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run these commands -> press Enter after each line (example): - to rename it: TAKEOWN.EXE /f "%WinDir%\Media" /r /d y ICACLS.EXE "%WinDir%\Media" /grant:R Everyone:F /t /c /q TASKKILL.EXE /IM TrustedInstaller.exe /F /T REN "%WinDir%\Media" "Media.BKP" - to delete it: TAKEOWN.EXE /f "%WinDir%\Media" /r /d y ICACLS.EXE "%WinDir%\Media" /grant:R Everyone:F /t /c /q TASKKILL.EXE /IM TrustedInstaller.exe /F /T RUNDLL32.EXE ADVPACK.DLL,DelNodeRunDLL32 "%WinDir%\Media" OR instead of RUNDLL32.EXE command above: RMDIR /S /Q "%WinDir%\Media" ICACLS.EXE: http://www.ss64.com/nt/icacls.html http://learn.microsoft.com/windows-server/administration/windows-commands/icacls/ http://adamtheautomator.com/icacls/ TAKEOWN.EXE: http://www.ss64.com/nt/takeown.html http://learn.microsoft.com/windows-server/administration/windows-commands/takeown/ * Turn OFF laptop/netbook/notebook/portable built-in touchpad (mouse-like pointer hardware device) when connecting/using bluetooth/external/USB/wireless mouse/pointing device in Windows 7/newer: http://www.tenforums.com/tutorials/111633-disable-touchpad-when-mouse-connected-windows-10-a.html http://answers.microsoft.com/en-us/windows/forum/all/how-to-disable-touchpad-when-connecting-the-mouse/5bbd5729-577f-474d-aca5-0900182f6367 http://www.makeuseof.com/ways-to-disable-touchpad-in-windows-10/ http://www.alphr.com/disable-touchpad-windows/ http://helpdeskgeek.com/windows-10/fix-cant-disable-touchpad-in-windows-10/ http://appuals.com/how-to-turn-off-touchpad-windows-10/ Your built-in touchpad Device Manager hardware device name may be different depending on brand + model. Most touchpads are manufactured by ASUS, Elan, Intel, Precision, Synaptics (examples): Start button/icon/logo/menu/orb -> Run... [hold WinKey + press R] -> type DevMgmt.msc -> press Enter -> Device Manager -> Human Interface Devices OR Mice and other pointing devices -> HID-compliant mouse [-> General tab -> Location: -> on... should be 1 of the devices listed here] OR (Intel) I2C HID Device, or ASUS Precision Touchpad, or ELAN Touchpad, or ELAN Input Device, or Synaptics (SMBus) TouchPad, or Precision touchpad -> Driver tab -> Disable Device -> OK. Device Manager MMC (Microsoft Management Console) snap-in control [DevMgmt.msc] is located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually C:\WINDOWS]. TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK to all prompts to register/merge/import its information into your registry. -----Begin cut & paste here----- REGEDIT4 [HKEY_LOCAL_MACHINE\SOFTWARE\Elantech\Othersetting] "DisableWhenDetectUSBMouse"=dword:1 [HKEY_CURRENT_USER\Software\Elantech\Othersetting] "DisableWhenDetectUSBMouse"=dword:1 [HKEY_USERS\.DEFAULT\Elantech\Othersetting] "DisableWhenDetectUSBMouse"=dword:1 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\PrecisionTouchPad] "LeaveOnWithMouse"=dword:0 [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\PrecisionTouchPad] "LeaveOnWithMouse"=dword:0 [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\PrecisionTouchPad] "LeaveOnWithMouse"=dword:0 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\PrecisionTouchPad\Status] "Enabled"=dword:0 [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\PrecisionTouchPad\Status] "Enabled"=dword:0 [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\PrecisionTouchPad\Status] "Enabled"=dword:0 [HKEY_LOCAL_MACHINE\SOFTWARE\Synaptics\SynTPEnh] "DisableIntPDFeature"=dword:33 [HKEY_CURRENT_USER\Software\Synaptics\SynTPEnh] "DisableIntPDFeature"=dword:33 [HKEY_USERS\.DEFAULT\Software\Synaptics\SynTPEnh] "DisableIntPDFeature"=dword:33 ; ------End cut & paste here------ Touchpad Blocker prevents accidental clicks + key presses on laptops/notebooks/portables equipped with touchpads by automatically blocking mouse events: http://www.softpedia.com/get/Desktop-Enhancements/Other-Desktop-Enhancements/Touchpad-Blocker.shtml File: http://www.majorgeeks.com/files/details/touchpad_blocker.html Similar Tools: http://www.raymond.cc/blog/touchfreeze-disables-laptop-touchpad-when-typing/ http://www.geckoandfly.com/7011/how-to-disable-your-acer-dell-hp-or-toshiba-laptops-touchpad-for-windows-and-ubuntu/ * Add app(lication)/EXEcutable (.exe)/program manifest support for all Windows Vista/newer builds/editions/releases/versions in order to improve/increase/optimize compatibility with (partially) compatible/supported and incompatible/unsupported EXEcutables (.exe) built/designed/programmed for different/older/previous Windows 9x/NTx operating systems (OSes): http://learn.microsoft.com/windows/win32/sysinfo/targeting-your-application-at-windows-8-1/ http://learn.microsoft.com/windows/compatibility/application-executable-manifest/ http://learn.microsoft.com/windows/win32/sbscs/application-manifests/ http://learn.microsoft.com/windows/win32/win7appqual/compatibility---application-manifest/ Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create (if absent) or edit/modify (if already present) the .manifest file correspondent to your .exe file, which must reside inside same directory/folder as your .exe file, and which should contain the lines between Cut & Paste delimiters below the opening "" or "" tag (if present), and above the closing "" tag (if present) -> save it as plain text/ASCII file (Encode: -> ANSI) with the same file name to match your executable (.exe) file name, and followed by the manifest (.manifest) file extension (example): if executable (.exe) file is "winfile.exe", its corresponding manifest (.manifest) file must be "winfile.exe.manifest" (case insensitive): -----Begin cut & paste here----- ------End cut & paste here------ In this example I have used MDGx Tweaked + Customized File Manager (FM = WINFILE.EXE) 32-bit: http://www.mdgx.com/xptoy.htm#FMNT More info: http://www.mdgx.com/fmnt32/fmnt32.php Go to this page http://www.mdgx.com/fmnt32/ -> scroll all the way down to WINFILE.EXE.manifest -> right-click its URL/URI address/item/link/scheme/shortcut http://www.mdgx.com/fmnt32/WINFILE.EXE.manifest -> Save link as... -> go to your web browser Downloads tab/window [if using a Chromium/Chrome browser/fork/variant go to chrome://downloads/ OR if using a Firefox browser/fork/variant go to about:downloads] -> click Keep (if prompted to do so) -> click Keep anyway (if prompted to do so) -> go to your Downloads directory/folder [default is %UserProfile%\Downloads or C:\Users\%UserName%\Downloads = where %UserName% is your user name] -> use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to view saved WINFILE.EXE.manifest (this example). * Configure/Install/Tweak Dark (Night) Mode [High Contrast] + Dark (Night) Mode [Theme Patchers] Themes in Windows 7/8/8.1: http://www.makeuseof.com/tag/10-dark-windows-themes-skins-reduce-eye-strain/ http://www.deviantart.com/creativ-xtreme/gallery/?set=40540051&offset=16 http://www.deviantart.com/ezio/art/418541637 http://www.winaero.com/light-dark-theme-windows-10/ http://download.microsoft.com/download/1/5/4/154E922A-7744-4474-A95A-5BDC043CDBBE/LightDarkNickBoyer.themepack Themes Patchers, Styles + Tools: - UltraUXThemePatcher 32-bit + 64-bit for Windows XP/Vista/7/8/8.1/10/11 patches UX (User eXperience) Theme system files [uxtheme.dll, uxinit.dll, themeui.dll] to allow use of 3rd party/custom themes: http://mhoefs.eu/software_uxtheme.php UltraUXThemePatcher Guide: http://setupgamer.info/how-to-install-custom-windows-10-themes-and-visual-styles-with-ultrauxthemepatcher/ UltraUXThemePatcher Tutorial: http://www.tenforums.com/customization/76077-ultrauxthemepatcher-recover-black-grey-screen-windows-8-10-a.html Windows 7/newer Themes: http://www.majorgeeks.com/files/categories/themes.html Windows 8/8.1 Themes: http://www.deviantart.com/tag/windows8themes/ Windows 7 Themes: http://www.deviantart.com/tag/windows7themes/ View + Remove All built-in Windows 10 Themes: http://www.majorgeeks.com/content/page/how_to_view_and_remove_all_windows_10_themes.html - SecureUxTheme for Windows 8.1/10 patches UX (User eXperience) Theme system files [uxtheme.dll, uxinit.dll, themeui.dll] to allow use of 3rd party/custom themes: http://github.com/namazso/SecureUxTheme/ Download: http://github.com/namazso/SecureUxTheme/releases/latest/ SecureUxTheme Install Guide: http://github.com/namazso/SecureUxTheme/wiki/Help:-Step-by-step-installing-SecureUxTheme-and-a-custom-theme/ Windows 7/newer Themes: http://www.majorgeeks.com/files/categories/themes.html Windows 8/8.1 Themes: http://www.deviantart.com/tag/windows8themes/ View + Remove All built-in Windows 10 Themes: http://www.majorgeeks.com/content/page/how_to_view_and_remove_all_windows_10_themes.html - UxStyle for Windows 7/8/8.1/10 Preview: http://www.uxstyle.com/ http://github.com/riverar/uxstyle/ UxStyle for Windows 8/8.1: http://www.uxstyle.com/builds/UxStyle_sep23_x86_x64_possibly_bugged.zip UxStyle for Windows 7/7 SP1: http://www.uxstyle.com/builds/UxStyle_Core_jul13_bits.zip Aero Theme for Windows 8/8.1: http://simplexdesignsart.deviantart.com/art/Windows-Aero-536877982/ http://web.archive.org/web/20130402051457/http://xxinightxx.deviantart.com/art/Windows-7-Vs-REV-D-350491112/ File: http://drive.google.com/uc?export=download&id=0B883uGPmNY72Sjk3dy1MTzBGVEE http://web.archive.org/web/20130402051457/http://www.deviantart.com/download/350491112/windows_7_vs_rev_d_by_xxinightxx-d5so8o8.zip Windows 8/8.1 Themes: http://www.winaero.com/category/windows-8-themes/ - Open-Shell [Classic Shell fork] 32-bit + 64-bit Start Menu + button/icon/logo/orb, Explorer + IE enhancer, replacer, supports custom skins, buttons/logos, highly customizable: http://open-shell.github.io/Open-Shell-Menu/ ReadMe: http://github.com/Open-Shell/Open-Shell-Menu/ Download: http://github.com/Open-Shell/Open-Shell-Menu/releases/ Open-Shell Guides: http://askleo.com/open-shell-regain-your-start-menu-in-windows-and-much-more/ http://www.techrepublic.com/article/how-to-use-open-shell-as-your-windows-10-start-menu/ Custom Start button/icon/logo/orb Tutorial: http://coddec.github.io/Classic-Shell/www.classicshell.net/tutorials/buttontutorial.html Custom Skin Tutorial: http://coddec.github.io/Classic-Shell/www.classicshell.net/tutorials/skintutorial.html Skins: http://www.winaero.com/best-skins-for-classic-shells-start-menu/ http://www.classicshell.net/gallery/Start-Menu/skins/ http://www.classicshell.net/forum/viewforum.php?f=17 Start Buttons/Orbs: http://www.classicshell.net/forum/viewforum.php?f=18 http://www.deviantart.com/w1ck3dmatt/art/Mega-Orb-Pack-150-start-orbs-259940654/ http://www.door2windows.com/customization/start-buttons/ Aero Glass mod [Windows 8/8.1 style UI] for Windows 8/8.1/10/11: http://www.glass8.eu/ "If you only knew the power of the Dark Side." ;-/ http://www.youtube.com/watch?v=esEcwAWi6dk * List of my all-time favorite + must-have tools [free(ware)]: I use all these free(ware) programs + tools on all my computers + laptops (almost) every day for (too) many years: ;-/ - Thorium AVX2 (Chromium fork) web browser 64-bit: http://www.mdgx.com/nettoys.htm#CHR - X-Chromium (X-Launcher) Portable launcher: http://www.winpenpack.com/en/download.php?view.1082 - Chromium/Chrome/X-Chromium/Thorium Privacy, Safety + Security Extensions + (Java)Scripts: http://www.mdgx.com/nettoys.htm#PRV - Mercury AVX (Firefox fork) web browser 64-bit: http://www.mdgx.com/nettoys.htm#MOZ - Firefox Privacy, Safety + Security Add-ons + (Java)Scripts: http://www.mdgx.com/nettoys.htm#PSF - MDGx custom HOSTS file: http://www.mdgx.com/hosts.php - 7-Zip 64-bit: http://www.7-zip.org/ - Universal Extractor 2 (UniExtract2) 64-bit: http://bioruebe.com/dev/uniextract/ - AutoRuns 64-bit: http://learn.microsoft.com/sysinternals/downloads/autoruns/ - ServiWin 64-bit: http://www.nirsoft.net/utils/serviwin.html - NTFS Permissions Tools (NPT): http://www.majorgeeks.com/files/details/ntfs_permissions_tools.html - Default Programs Editor (DPE): http://www.defaultprogramseditor.com/ - Classic Task Manager (TM) 64-bit: http://www.winaero.com/how-to-restore-the-good-old-task-manager-in-windows-8/ - Open-Shell 64-bit: http://open-shell.github.io/Open-Shell-Menu/ - 7+ Taskbar Tweaker (7TT) 64-bit: http://ramensoftware.com/7-taskbar-tweaker/ - Winaero Tweaker 64-bit: http://www.winaero.com/winaero-tweaker/ - Programmer's File Editor 32-bit (PFE32): http://www.lancs.ac.uk/people/steveb/cpaap/pfe/ - IObit Unlocker: http://www.iobit.com/iobit-unlocker.php - grepWin 64-bit: http://tools.stefankueng.com/grepWin.html - T-Clock Redux 64-bit: http://github.com/White-Tiger/T-Clock/ - TransparentMenu (TM): http://www.moo0.com/software/TransparentMenu/ - TrayIcon: http://www.mdgx.com/files/TI25.ZIP - ClickOff: http://johanneshuebner.com/quickcms/index.html%3Fde_downloads,2.html - Wallpaper SlideShow LT: http://www.gphotoshow.com/wallpaperss.htm - MDGx File Manager (FM) 32-bit: http://www.mdgx.com/xptoy.htm#FMNT - Microsoft File Manager (FM) 64-bit: http://www.mdgx.com/xptoy.htm#FMMS - FreeCommander (FC) XE 32-bit: http://www.freecommander.com/ - NexusFile: http://www.xiles.app/ - NetMeter: http://www.metal-machine.de/readerror/ - CurrPorts 64-bit: http://www.nirsoft.net/utils/cports.html - Network Activity Indicator (NAI) 64-bit: http://www.itsamples.com/network-activity-indicator.html - JPEGView 64-bit: http://sourceforge.net/projects/jpegview/ - IrfanView 64-bit: http://www.irfanview.com/ - Darktable 64-bit: http://www.darktable.org/ - GIMP Portable 64-bit: http://www.portableapps.com/apps/graphics_pictures/gimp_portable/ - XnView MP Portable 64-bit: http://www.xnview.com/en/xnviewmp/#downloads - IcoFX Portable: http://www.portableapps.com/apps/graphics_pictures/icofx_portable/ - K-Lite Codec Pack (KLCP) Mega + Media Player Classic Home Cinema (MPC-HC) Lite 64-bit: http://www.codecguide.com/download_k-lite_codec_pack_mega.htm - MKVToolNix 64-bit: http://www.mkvtoolnix.download/ - gMKVExtractGUI: http://forum.doom9.org/showthread.php?t=170249 - HandBrake Portable 64-bit: http://www.fcportables.com/handbrake-portable/ - Pazera Free Audio + Video Conversion Pack Portable 64-bit: http://www.pazera-software.com/products/free-audio-video-pack/ - MKV Cutter: http://www.videohelp.com/software/MKV-Cutter - FFmpeg 64-bit: http://www.ffmpeg.org/download.html#build-windows - foobar2000 64-bit: http://www.foobar2000.org/ - ReNamer 5.60: http://files.fyxm.net/121/121773/renamer.zip - Desktop Background Tuner (DBT) [from "Windows 8" folder]: http://www.winaero.com/desktop-background-tuner/ - Swiss File Knife (SFK): http://www.stahlworks.com/dev/swiss-file-knife.html - NirCmd 64-bit: http://www.nirsoft.net/utils/nircmd.html - AdvancedRun 64-bit: http://www.nirsoft.net/utils/advanced_run.html - Calibre Portable 64-bit: http://www.calibre-ebook.com/download_portable/ - Libre Office Portable: http://www.portableapps.com/apps/office/libreoffice_portable/ - JDownloader2 (JD2): http://www.jdownloader.org/ - Tixati Portable 64-bit: http://www.tixati.com/download/portable.html - FileZilla 64-bit: http://www.filezilla-project.org/ More like these [all text (.txt) files included]: - MDGx "List of Useful Windows NTx Tools" in TOOLS.TXT: http://www.mdgx.com/tools.php http://www.mdgx.com/TOOLS.TXT - MDGx "1000+ Windows NTx Power Toys + Tweaking Tools" in SOFTWARE.TXT: http://www.mdgx.com/toy.htm - MDGx "Windows NTx Internet Power Toys" in SOFTWARE.TXT: http://www.mdgx.com/nettoys.htm - MDGx "Free(ware) Windows NTx Extras" in SOFTWARE.TXT: http://www.mdgx.com/xptoy.htm - MDGx "List of Digital Photography, Imaging + Video Tools for Windows NTx" in PHOTO.TXT: http://www.mdgx.com/photo.php http://www.mdgx.com/PHOTO.TXT * MDGx "Group Policy Editor (GPE) fixes + tools (free)" topic in SOFTWARE.TXT (included): http://www.mdgx.com/xptoy.htm#GPO * MDGx "Group Policy Editor (gpedit.msc) Guide" topic in REGISTRY.TXT (included): http://www.mdgx.com/reg.htm#ADM * Useful, little known, hidden, undocumented, unknown registry + system hacks + tweaks to fix, improve + customize Windows 7 + Windows Server 2008 R2: http://forums.mydigitallife.net/forums/mdl-projects-and-applications.34/ http://www.howtogeek.com/5391/175-windows-7-tweaks-tips-and-how-to-articles/ http://www.techradar.com/us/news/computing-components/643861/ http://www.thecustomizewindows.com/2011/08/windows-7-right-click-menu-tipstricks-and-tutorials-index/ http://www.howtogeek.com/77614/best-windows-7-start-menu-and-taskbar-tips-and-tricks/ http://www.edy.es/dev/docs/windows-tricks/ http://www.majorgeeks.com/files/details/majorgeeks_registry_tweaks.html http://github.com/MajorGeek/MajorGeeks-Windows-Tweaks/ http://www.majorgeeks.com/mg/sortdate/majorgeeks_registry_batch_file_tweaks.html http://www.sevenforums.com/customization/23122-remove-favorites-libraries-homegroup-my-folder-2.html http://www.helpdeskgeek.com/how-to/disable-snap-assist-in-windows-7-8-10/ http://windowsreport.com/tag/network/ http://www.isoftspot.com/ http://www.thewindowsclub.com/ http://www.winaero.com/blog/category/windows-7/ http://www.winaero.com/ http://www.mydigitallife.info/ http://www.sevenforums.com/ http://www.door2windows.com/download/ http://www.howtogeek.com/ http://www.tweaks.com/windows-7/ http://www.tweakhound.com/tweaking-windows-7/ http://sourcedaddy.com/windows-7/ http://www.askvg.com/category/windows-seven/ http://www.tweaks.com/ http://woshub.com/windows-7/ http://www.ghacks.net/category/windows/ http://www.blogsdna.com/ http://www.instantfundas.com/search/label/Windows%207 http://www.techdows.com/ http://www.techsupportalert.com/view/tips/ http://www.commandwindows.com/ MDGx "Comprehensive Windows Registry Guide" chapter in REGISTRY.TXT (included): http://www.mdgx.com/reg.htm MDGx "200+ Ways To Hack Your Windows 9x/NTx Registry" chapter in REGISTRY.TXT (included): http://www.mdgx.com/reg.htm#RHC MDGx "Windows 10/11 Tweaks, Fixes, Guides, Downloads + Links" chapter in WIN10.TXT (included): http://www.mdgx.com/10.php http://www.mdgx.com/WIN10.TXT MDGx "Windows 8/8.1 Tweaks, Fixes, Guides, Downloads + Links" chapter in WINDOWS8.TXT (included): http://www.mdgx.com/8.php http://www.mdgx.com/WINDOWS8.TXT NOTE: Some of these hacks + tweaks apply also to Windows 8, 8.1, 10, 11. * Windows 7 Transformation Packs + Themes: http://winempyrean.net/category/shell-styles/ http://winempyrean.net/jarvis/ http://www.deviantart.com/#/art/Jarvis-Windows-7-Transformation-Pack-397222303 * Windows 7 Tutorials: http://sites.google.com/a/rmprepusb.com/www/tutorials/ http://www.7tutorials.com/ http://unlockforus.blogspot.com/2008/11/tutorials.html http://www.winhelponline.com/blog/ http://sector-seven.net/ http://www.technixupdate.com/tag/windows-7/ * Windows 7 system requirements: http://support.microsoft.com/help/10737/ http://en.wikipedia.org/wiki/Windows_7#System_requirements * Coulda... Shoulda... Woulda... Operating system (OS) core/system features, functionality, operations, processes +/- programs/tools/games/etc abandoned/banned/cancelled/changed/deprecated/discontinued/limited//obsolete/reduced/removed/restricted by Microsoft in/from/out of Windows 7, and how to adapt/fix/port/repair/restore/upgrade, use better/similar, and/or work around/bring back/restore (some of) them: - MS Docs: Features and functionality removed in Windows client: http://learn.microsoft.com/windows/whats-new/removed-features/ - MS Docs: Deprecated features for Windows client: http://learn.microsoft.com/windows/whats-new/deprecated-features/ - Wikipedia: List of features removed/missing in Windows 7: http://en.wikipedia.org/wiki/List_of_features_removed_in_Windows_7 - MSFN: List of software that doesn't support Windows 7 [+ how to make them work]: http://www.msfn.org/board/index.php?showtopic=181987 - Techulator: Disadvantages of Windows 7: http://www.techulator.com/resources/3311-Disadvantages-windows.aspx - OS Today: What are the disadvantages of Windows 7?: http://ostoday.org/windows/quick-answer-what-are-the-disadvantages-of-windows-7.html - Wikipedia: Criticism of Windows: http://en.wikipedia.org/wiki/Criticism_of_Microsoft_Windows - MDGx Free(ware) "Win10/11 Block Tools (10_BLOCK)" -> 10_BLOCK.TXT (included): http://www.mdgx.com/xptoy.htm#10BLK http://www.mdgx.com/10BLK/10_BLOCK.php http://www.mdgx.com/10BLK/10_BLOCK.TXT - MDGx Free(ware) "List of Useful Windows NTx Tools" [apps/programs, games, screen savers, tools/utilities] -> TOOLS.TXT (included): http://www.mdgx.com/tools.php http://www.mdgx.com/TOOLS.TXT - MDGx Free(ware) "1000+ Windows 9x/NTx Power Toys + Tweaking Tools" -> SOFTWARE.TXT (included): http://www.mdgx.com/toy.htm - MDGx "Free(ware) Windows NTx Extras" -> SOFTWARE.TXT (included): http://www.mdgx.com/xptoy.htm ______________________________________________________________________________ Updates/(Hot)Fixes/Patches + Windows Update (WU) * NOTE: Microsoft Updates/Upgrades/Service Packs (SPs)/(Hot)Fixes/Patches/Drivers/etc listed here are for United States (US) English [en-US] Windows NTx Operating Systems (OSes) 32-bit (x86) + 64-bit (x64) builds/editions/releases/versions. See Microsoft web pages for information how to download Windows updates in other languages. http://www.science.co.il/language/Locale-codes.php Microsoft Updates Catalog lists Windows Updates (WU) in all available languages: http://www.catalog.update.microsoft.com/search.aspx?q=Windows%207%20Update * Must uninstall/remove Windows 7/7 SP1 Updates/Upgrades/(Hot)Fixes/Patches/etc which expose your computer(s) to: - intrusion/invasion of privacy, - telemetry snooping ("phone home"), - data/info collection/logging, - (diagnostic) tracking, - auditing, - fingerprinting, - spoofing, - (geo)location tracking, - "customer experience", - unwanted "offers", - spyware, - ad(vertisment)s/adware, - promotions, - surveillance, - forced (unauthorized/without your knowledge/permission, behind your back!) upgrade to Windows 10 (GWX), among others: http://www.mdgx.com/xptoy.htm#10BLK http://github.com/keizerzilla/remove-windows7-telemetry/ http://github.com/nalal/Windows-Telemetry-Remover/ http://spreadprivacy.com/windows-7-privacy-tips/ http://web.archive.org/web/20180320070137/http://www.privacytools.io/#win10 http://gist.github.com/xvitaly/eafa75ed2cb79b3bd4e9/ http://www.addictivetips.com/windows-tips/a-complete-list-of-all-updates-you-should-uninstall-to-block-windows-10/ http://www.sevenforums.com/installation-setup/413301-reinstall-win7-what-updates-avoid-telemetry-winx-preparation-3.html http://www.ghacks.net/2019/01/15/better-check-your-windows-7-pc-for-get-windows-10-gwx-traces/ Similar tools: http://www.majorgeeks.com/mg/sortname/windows_10_fixes.html July 2019 Windows 7 "security only" update installs telemetry snooping: http://www.computerworld.com/article/3408496/new-windows-7-security-only-update-installs-telemetrysnooping-uh-feature.html Block Telemetry in Windows 7/7 SP1 and 8.1: http://www.ghacks.net/2017/02/11/blocking-telemetry-in-windows-7-and-8-1/ All Microsoft Updates/Upgrades/(Hot)Fixes/Patches/etc listed at the web sites above should be uninstalled (examples): TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text BATch (.bat) or CoMmanD (.cmd) script file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the BAT (.bat) or CMD (.cmd) extension -> right-click it -> Run as Administrator -> wait for completion. -----Begin cut & paste here----- @ECHO OFF IF NOT "%OS%"=="Windows_NT" GOTO END IF NOT EXIST %WinDir%\SYSTEM32\WUSA.EXE GOTO END :: KB4507456: Security Only Update: START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:4507456 /quiet /norestart :: KB971033: Windows Activation Update: START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:971033 /quiet /norestart :: KB2952664: Get Windows 10 (GWX) Assistant: START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:2952664 /quiet /norestart :: KB2990214: Get Windows 10 (GWX): START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:2990214 /quiet /norestart :: KB3012973: Upgrade to Windows 10 Pro: START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:3012973 /quiet /norestart :: KB3021917: Performance Improvements Update: START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:3021917 /quiet /norestart :: KB3022345: Customer Experience and Diagnostic Telemetry Update: START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:3022345 /quiet /norestart :: KB3035583: Get Windows 10 (GWX) App: START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:3035583 /quiet /norestart :: KB3044374: Get Windows 10 (GWX) Update: START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:3044374 /quiet /norestart :: KB3068708: Customer Experience and Diagnostic Telemetry Update: START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:3068708 /quiet /norestart :: KB3075249: Telemetry Update: START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:3075249 /quiet /norestart :: KB3080149: Customer Experience and Diagnostic Telemetry Update: START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:3080149 /quiet /norestart :: KB3112343: Windows Update Client (WUC): START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:3112343 /quiet /norestart :: KB3083711: Windows Update Client (WUC): START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:3083711 /quiet /norestart :: KB3083325: Windows Update Client (WUC): START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:3083325 /quiet /norestart :: KB3075853: Windows Update Client (WUC): START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:3075853 /quiet /norestart :: KB3072318: OOBE Update to upgrade to Windows 10: START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:3072318 /quiet /norestart :: KB3065988: Windows Update Client (WUC): START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:3065988 /quiet /norestart :: KB3064683: OOBE Update to upgrade to Windows 10: START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:3064683 /quiet /norestart :: KB3058168: Activate Windows 10 from Hosts Update: START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:3058168 /quiet /norestart :: KB3050267: Windows Update Client (WUC): START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:3050267 /quiet /norestart :: KB2976978: Compatibility Update: START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:2976978 /quiet /norestart :: KB2977759: Compatibility Update: START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:2977759 /quiet /norestart :: KB3081954: Work Folders Update: START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:3081954 /quiet /norestart :: KB3123862: Upgrade Capability Update: START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:3123862 /quiet /norestart :: KB3138612: Windows Update Client (WUC): START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:3138612 /quiet /norestart :: KB3172605: July 2016 Update Rollup: START "Uninstalling BUGGY Update..." /B /WAIT WUSA.EXE /uninstall /KB:3172605 /quiet /norestart TIMEOUT /T 5 /NOBREAK :END EXIT ------End cut & paste here------ Restart/reboot. * Windows Updates (WU) Catalog, Listings + Guides: - Windows 7/7 SP1 Updates Catalog: http://www.catalog.update.microsoft.com/search.aspx?q=%22Windows%207%22 Download desired/needed Update(s)/Fix(es)/Patch(es) to your local disk/media/storage device -> right-click each .CAB/.EXE/.MSI/.MSP/.MSU file -> Run as Administrator -> follow on screen instructions -> restart/reboot (if prompted). - ERPMan's Windows 7 System Updates Page: http://erpman1.tripod.com/win7upd.html - ERPMan's Windows 7 X64 & Server 2008 R2 X64 System Updates: http://erpman1.tripod.com/w7x64upd.html - THFS: List of Windows 7 + 7 SP1 Updates/(Hot)Fixes/Patches: http://thehotfixshare.net/board/?/search/&q=%22Windows%207%22&type=downloads_file - SevenForums: Windows 7/7 SP1 News: http://www.sevenforums.com/news/ - Microsoft Security Advisories + Bulletins: http://learn.microsoft.com/security-updates/ - Install Manually Offline CAB (.cab), EXE (.exe) + MSU (.msu) Updates: http://woshub.com/manually-install-cab-msu-updates-windows/ - Windows 7/7 SP1 Updates/(Hot)Fixes/Patches History: http://support.microsoft.com/help/4009469/ - Every Last Thing About Windows Update (WU) for Windows 7/newer: http://www.makeuseof.com/tag/how-to-find-out-every-last-thing-about-windows-update/ * Windows 7/8/8.1/10 32-bit + 64-bit Updates disable Intel Broadwell + Haswell CPUs Meltdown/Spectre Variants "Branch target injection vulnerability" errors/reboots after Intel CPU firmware update(s): - MSKB KB4090007 Fix 32-bit + 64-bit for Windows 10/2016 32-bit (x86) + 64-bit (x64): http://support.microsoft.com/help/4090007/ Microsoft Catalog Files for KB4090007 Update: http://www.catalog.update.microsoft.com/search.aspx?q=KB4090007 - MSKB KB4078130 Fix 32-bit + 64-bit for Windows 7/2008 R2/8/20012/8.1/2012 R2/10/2016 32-bit (x86) + 64-bit (x64): http://support.microsoft.com/help/4078130/ Microsoft Catalog File for KB4078130 Update: http://www.catalog.update.microsoft.com/search.aspx?q=KB4078130 File: http://download.windowsupdate.com/c/msdownload/update/software/crup/2018/01/kb4078130_b86f0bf2dc0866a0e117ed2d4a5302fab0493a7b.exe Intel CPUs Updates: http://newsroom.intel.com/news/intel-security-issue-update-addressing-reboot-issues/ Intel CPUs Info [PDF]: http://newsroom.intel.com/wp-content/uploads/sites/11/2018/04/microcode-update-guidance.pdf InSpectre for Windows 10/11 detects operating system (OS) ability to prevent Meltdown + Spectre vulnerability attacks against Intel Broadwell + Haswell CPUs + necessity of installing respective update(s): http://www.grc.com/inspectre.htm File: http://www.grc.com/files/InSpectre.exe * Non-Volatile Memory Express (NVMe) native Drivers for Windows 7 SP1 32-bit (x86) + 64-bit (x64): http://support.microsoft.com/help/2990941/ - NVMe Drivers 64-bit for Windows 7 SP1 64-bit (x64) [7 MB]: http://conduant.zendesk.com/hc/en-us/articles/217205998-PXIe-DM-4M-2-Windows-Driver/ http://pcsupport.lenovo.com/us/en/downloads/ds105871 - NVMe Drivers 32-bit for Windows 7 SP1 32-bit (x86) [6 MB]: http://conduant.zendesk.com/hc/en-us/articles/217205998-PXIe-DM-4M-2-Windows-Driver/ http://pcsupport.lenovo.com/us/en/downloads/ds105871 NVMe Drivers: http://nvmexpress.org/drivers/windowsdrivers/ More info: http://www.win-raid.com/t29f25-Recommended-AHCI-RAID-and-NVMe-Drivers.html NVMe: http://en.wikipedia.org/wiki/NVM_Express * Required Windows 7 64-bit (x64) Updates for Thorium (hardware optimized Chromium fork) + Mercury (hardware optimized Firefox fork) 64-bit web browsers enhanced hardware + software compatibility/support: http://thorium.rocks/win7 - Windows 7 SP1/2008 R2 64-bit (x64) Servicing Stack Update 2019 KB4490628: http://support.microsoft.com/help/4490628/ Download: http://catalog.update.microsoft.com/search.aspx?q=4490628+x64 - Windows 7 SP1/2008 R2 64-bit (x64) SHA-2 Code Signing Support Update 2019 KB4474419: http://support.microsoft.com/help/4474419/ Download: http://catalog.update.microsoft.com/search.aspx?q=4474419+x64 Thorium [Th90] (Chromium fork) 64-bit hardware optimized web browser for Windows 7/newer 64-bit (x64) based on Chromium code: http://thorium.rocks/ - Thorium AVX repository: http://github.com/Alex313031/Thorium-Win/ Thorium AVX latest build for Windows 10/11 [ZIP = full, Portable]: http://github.com/Alex313031/Thorium-Win/releases/latest/ - Thorium AVX2 (+ 3D rendering + HD/VHD/UHD video playback) repository: http://github.com/Alex313031/Thorium-AVX2/ Thorium AVX2 latest build for Windows 10/11 [ZIP = full, Portable]: http://github.com/Alex313031/Thorium-AVX2/releases/latest/ Thorium latest build for Windows 7/8/8.1 [ZIP = full, Portable]: http://github.com/Alex313031/thorium-win7/releases/latest/ Thorium Requirements: - Multicore CPU: minimum Intel Core 2nd gen or AMD FX with built-in SSE4 (Streaming SIMD Extensions 4), http://en.wikipedia.org/wiki/SSE4 AVX (Advanced Vector EXtensions) http://en.wikipedia.org/wiki/Advanced_Vector_Extensions + AES (Advanced Encryption Standard) http://en.wikipedia.org/wiki/Advanced_Encryption_Standard enhancements/multimedia extensions/instructions. - Graphics video controller with 3D rendering + OpenGL capabilities. Thorium Optimizations: http://thorium.rocks/optimizations Mercury [Hg80 (Hydrargyrum)] AVX (Firefox fork) 64-bit hardware optimized + improved privacy web browser for Windows 7/newer 64-bit (x64) based on Firefox code: http://thorium.rocks/mercury Mercury repository: http://github.com/Alex313031/Mercury/ Mercury latest build [ZIP = full, Portable]: http://github.com/Alex313031/Mercury/releases/latest/ Mercury Requirements: - Multicore CPU: minimum Intel Core 2nd gen or AMD FX with built-in SSE4 (Streaming SIMD Extensions 4), http://en.wikipedia.org/wiki/SSE4 AVX (Advanced Vector EXtensions) http://en.wikipedia.org/wiki/Advanced_Vector_Extensions + AES (Advanced Encryption Standard) http://en.wikipedia.org/wiki/Advanced_Encryption_Standard enhancements/multimedia extensions/instructions. - Graphics video controller with 3D rendering + OpenGL capabilities. Mercury Optimizations: http://thorium.rocks/optimizations Mercury Patches: http://github.com/Alex313031/Mercury/blob/main/docs/PATCHES.md Get a modern [see "Chromium + Chrome" topic in SOFTWARE.TXT (included)] http://www.mdgx.com/nettoys.htm#CHR and secure http://www.mdgx.com/nettoys.htm#PRV web browser. * Windows 7 SP1 Remote Desktop Protocol (RDP) Remote Desktop Services (RDS) Remote Code (BlueKeep cryptocurrency miner) Vulnerability Fix 32-bit + 64-bit for Windows 7 SP1 32-bit (x86) + 64-bit (x64): http://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2019-0708 RDP/RDS Fixes: http://www.catalog.update.microsoft.com/search.aspx?q=KB4499175 - RDP/RDS Fix 64-bit for Windows 7 SP1 64-bit (x64) [100 MB]: http://download.windowsupdate.com/d/msdownload/update/software/secu/2019/05/windows6.1-kb4499175-x64_3704acfff45ddf163d8049683d5a3b75e49b58cb.msu - RDP/RDS Fix 32-bit for Windows 7 SP1 32-bit (x86) [73 MB]: http://download.windowsupdate.com/d/msdownload/update/software/secu/2019/05/windows6.1-kb4499175-x86_6f1319c32d5bc4caf2058ae8ff40789ab10bf41b.msu More info: http://support.microsoft.com/help/4499175/ Prevent BlueKeep cryptocurrency miner worm -> update RDS (CVE-2019-0708): http://msrc-blog.microsoft.com/2019/05/14/prevent-a-worm-by-updating-remote-desktop-services-cve-2019-0708/ * Windows 7 SP1 System Update Readiness (SUR) tool 32-bit + 64-bit for Windows 7 SP1 32-bit (x86) + 64-bit (x64): http://support.microsoft.com/help/947821/ - SUR 64-bit for Windows 7 SP1 64-bit (x64): http://download.microsoft.com/download/E/8/D/E8DAA970-1036-447F-B5EA-716D4BA70EC5/Windows6.1-KB947821-v34-x64.msu - SUR 32-bit for Windows 7 SP1 32-bit (x86): http://download.microsoft.com/download/4/7/A/47A0F7B9-1F0F-41B0-AA42-00FD16337268/Windows6.1-KB947821-v34-x86.msu Windows Update Errors in Windows Vista/2008/7 Fixed by System Update Readiness (SUR) tool: http://support.microsoft.com/help/947821/ Fix Windows Update Error 00009C48 in Windows 7: http://www.sevenforums.com/windows-updates-activation/213912-i-cant-update-windows-due-windows-up-date-error-00009c48.html * Windows 7 SP1 Servicing Stack Update (SSU) 32-bit + 64-bit for Windows 7 SP1 32-bit (x86) + 64-bit (x64): http://support.microsoft.com/help/3020369/ - SSU 64-bit for Windows 7 SP1 64-bit (x64) [10 MB]: http://download.microsoft.com/download/5/D/0/5D0821EB-A92D-4CA2-9020-EC41D56B074F/Windows6.1-KB3020369-x64.msu - SSU 32-bit for Windows 7 SP1 32-bit (x86) [8 MB]: http://download.microsoft.com/download/C/0/8/C0823F43-BFE9-4147-9B0A-35769CBBE6B0/Windows6.1-KB3020369-x86.msu * Windows 7 SP1 Monthly Rollup Update (MRU) 32-bit + 64-bit for Windows 7 SP1 32-bit (x86) + 64-bit (x64): http://support.microsoft.com/help/4093118/ - MRU 64-bit for Windows 7 SP1 64-bit (x64) [219 MB]: http://download.windowsupdate.com/d/msdownload/update/software/secu/2018/04/windows6.1-kb4093118-x64_5ea1778b896fcc764e0db8da7d094f62dc98d82f.msu - MRU 32-bit for Windows 7 SP1 32-bit (x86) [131 MB]: http://download.windowsupdate.com/c/msdownload/update/software/secu/2018/04/windows6.1-kb4093118-x86_2bbb81cd98fb80623b7afa3dcb2da73f28322ea3.msu * Windows 7 SP1 Security Monthly Quality Rollup (SMQR) 32-bit + 64-bit for Windows 7 SP1 32-bit (x86) + 64-bit (x64): http://support.microsoft.com/help/4503292/ SMQR Fixes: http://www.catalog.update.microsoft.com/search.aspx?q=KB3033929 - SMQR 64-bit for Windows 7 SP1 64-bit (x64) [272 MB]: http://catalog.s.download.windowsupdate.com/d/msdownload/update/software/secu/2019/06/windows6.1-kb4503292-x64_a35bb4ea16d1d529fde9abfe8a0c16e9061f74cd.msu - SMQR 32-bit for Windows 7 SP1 32-bit (x86) [27 MB]: http://catalog.s.download.windowsupdate.com/d/msdownload/update/software/secu/2015/02/windows6.1-kb3033929-x86_927e018113fe51250c57029635d46b89bf235920.msu * Windows 7 SP1 Convenience Rollup Update (CRU) + VNIC.VBS VBScript 32-bit + 64-bit for Windows 7 SP1 32-bit (x86) + 64-bit (x64): http://support.microsoft.com/help/3125574/ - CRU 64-bit for Windows 7 SP1 64-bit (x64) [477 MB]: http://download.windowsupdate.com/d/msdownload/update/software/updt/2016/05/windows6.1-kb3125574-v4-x64_2dafb1d203c8964239af3048b5dd4b1264cd93b9.msu - CRU 32-bit for Windows 7 SP1 32-bit (x86) [317 MB]: http://download.windowsupdate.com/d/msdownload/update/software/updt/2016/05/windows6.1-kb3125574-v4-x86_ba1ff5537312561795cc04db0b02fbb0a74b2cbd.msu * Windows 7 SP1 Security Quality Rollups (SQR) 32-bit + 64-bit for Windows 7 SP1 32-bit (x86) + 64-bit (x64): http://www.catalog.update.microsoft.com/search.aspx?q=Security+Quality+Rollup+Windows+7+SP1 * Windows 7 SP1 Stop Errors with Multiple CPUs TCPIP.SYS Hotfix 32-bit + 64-bit for Windows 7 SP1 32-bit (x86) + 64-bit (x64): http://support.microsoft.com/help/2905412/ Hotfix [request links in e-mail]: http://support.microsoft.com/hotfix/kbhotfix?kbnum=2905412&kbln=en-us - TCPIP.SYS Hotfix 64-bit for Windows 7 SP1 64-bit (x64): http://hotfixv4.trafficmanager.net/Windows%207/Windows%20Server2008%20R2%20SP1/sp2/Fix476701/7600/free/470223_intl_x64_zip.exe - TCPIP.SYS Hotfix 32-bit for Windows 7 SP1 32-bit (x86): http://hotfixv4.trafficmanager.net/Windows%207/Windows%20Server2008%20R2%20SP1/sp2/Fix476701/7600/free/470191_intl_i386_zip.exe All TCPIP.SYS Hotfixes for Windows 2000/newer: http://www.mskbfiles.com/tcpip.sys.php * Windows 7 Stop Errors with Large SATA HDD MSAHCI.SYS Hotfix: http://support.microsoft.com/help/977178/ Hotfix [request links in e-mail]: http://support.microsoft.com/hotfix/KBHotfix.aspx?kbnum=977178&kbln=en-us - SATA HDD Hotfix 64-bit: http://hotfixv4.trafficmanager.net/Windows%207/WindowsServer%202008%20R2/sp1/Fix306215/7600/free/404474_intl_x64_zip.exe - SATA HDD Hotfix 32-bit: http://hotfixv4.trafficmanager.net/Windows%207/WindowsServer%202008%20R2/sp1/Fix306215/7600/free/404472_intl_i386_zip.exe * Windows 7 Registry Hive Ntkrnlpa.exe + Ntoskrnl.exe Hotfix: http://support.microsoft.com/help/983544/ Hotfix [request links in e-mail]: http://support.microsoft.com/en-us/hotfix/kbhotfix?kbnum=983544&kbln=en-US - Registry Hive Hotfix 64-bit: http://hotfixv4.trafficmanager.net/Windows%207/WindowsServer%202008%20R2/sp1/Fix322114/7600/free/413807_intl_x64_zip.exe - Registry Hive Hotfix 32-bit: http://hotfixv4.trafficmanager.net/Windows%207/WindowsServer%202008%20R2/sp1/Fix322114/7600/free/413805_intl_i386_zip.exe * Windows 7/8/8.1 DirectX 9.0c (DX9c)/10.0 (DX10)/11.x (DX11) 32-bit + 64-bit: http://www.mdgx.com/dx.htm#DX9 * Windows 7 SP1 DirectX (DX) Graphics Update: http://support.microsoft.com/help/2028560/ - DX Graphics 64-bit: http://download.microsoft.com/download/F/1/A/F1A02F0C-0F64-4E87-9BC1-EFA8CDE464FE/Windows6.1-KB2028560-v2-x64.msu - DX Graphics 32-bit: http://download.microsoft.com/download/9/7/6/976634BE-DC4D-4B7B-9567-209811D7AF14/Windows6.1-KB2028560-v2-x86.msu * Windows 7 SP1 DirectX (DX) Direct3D (D3D) App Crash Full Screen Hotfix: http://support.microsoft.com/help/2400157/ Hotfix [request links in e-mail]: http://support.microsoft.com/en-us/hotfix/kbhotfix?kbnum=2400157&kbln=en-US - DX D3D Hotfix 64-bit: http://hotfixv4.trafficmanager.net/Windows%207/Windows%20Server2008%20R2%20SP1/sp2/Fix347381/7600/free/425610_intl_x64_zip.exe - DX D3D Hotfix 32-bit: http://hotfixv4.trafficmanager.net/Windows%207/Windows%20Server2008%20R2%20SP1/sp2/Fix347381/7600/free/425608_intl_i386_zip.exe * Windows 7 SP1 Performance and Functionality Update (FPU): http://support.microsoft.com/help/2454826/ - FPU 64-bit: http://download.microsoft.com/download/D/B/D/DBD62263-2627-49CB-B675-AA1601EBE0BD/Windows6.1-KB2454826-v2-x64.msu - FPU 32-bit: http://download.microsoft.com/download/5/E/4/5E404378-9A5D-41AB-AFBA-1AC04F3B2A13/Windows6.1-KB2454826-v2-x86.msu * FIX: Get back/restore Windows Help Viewer (WinHlp32), Windows Help (HLP) + Compiled HTML Help (CHM) functionality in Windows 7/7 SP1 -> see MDGx "Restore/Update HTML Help (.CHM) + Windows Help (.HLP) Guides, Fixes + Tools" section in SOFTWARE.TXT (included): http://www.mdgx.com/add.htm#HHU BUG: In Windows Vista/newer you canNOT use Windows Help files (*.CNT, *.HLP) because Microsoft removed Windows Help 32-bit (WinHlp32.exe) from these OSes. :-( FIX: Microsoft Windows Help 32-bit (WinHlp32.exe) for Windows 7/7 SP1 32-bit + 64-bit (English, right-click to save!): http://support.microsoft.com/help/917607/ - WinHlp32.exe for Windows 7 64-bit (x64) [702 KB]: http://download.microsoft.com/download/9/A/8/9A8FCFAA-78A0-49F5-8C8E-4EAE185F515C/Windows6.1-KB917607-x64.msu - WinHlp32.exe for Windows 7 32-bit (x86) [688 KB]: http://download.microsoft.com/download/9/A/8/9A8FCFAA-78A0-49F5-8C8E-4EAE185F515C/Windows6.1-KB917607-x86.msu Registry fixes necessary to enable WinHlp32.exe macros, Intranet access + CHM (Compiled HTML Help) XML, XSL, CSS, JPG + PNG functionality: http://www.vistax64.com/tutorials/87497-help-support-vista.html TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK to all prompts to register/merge/import its information into your registry. -----Begin cut & paste here----- REGEDIT4 ; WinHelp32 Macro FIX for Windows Vista/2008/7/8/8.1 32-bit (x86): [HKEY_LOCAL_MACHINE\Software\Microsoft\WinHelp] "AllowProgrammaticMacros"=dword:1 "AllowIntranetAccess"=dword:1 ; WinHelp32 Macro FIX for Windows Vista/2008/7/8/8.1 64-bit (x64): [HKEY_LOCAL_MACHINE\Software\Wow6432Node\Microsoft\WinHelp] "AllowProgrammaticMacros"=dword:1 "AllowIntranetAccess"=dword:1 ; HTML Help (CHM) FIX: XML, XSL, CSS, JPG + PNG for Windows Vista/2008/7/8/8.1: [HKEY_LOCAL_MACHINE\Software\Classes\.xml] @="xmlfile" "Content Type"="text/xml" "PerceivedType"="text" [HKEY_LOCAL_MACHINE\Software\Classes\.xml\PersistentHandler] @="{7E9D8D44-6926-426F-AA2B-217A819A5CCE}" [HKEY_LOCAL_MACHINE\Software\Classes\.xsl] @="xslfile" "Content Type"="text/xml" "PerceivedType"="text" [HKEY_LOCAL_MACHINE\Software\Classes\.xsl\PersistentHandler] @="{7E9D8D44-6926-426F-AA2B-217A819A5CCE}" [HKEY_LOCAL_MACHINE\Software\Classes\.css] @="CSSfile" "Content Type"="text/css" "PerceivedType"="text" [HKEY_LOCAL_MACHINE\Software\Classes\.css\PersistentHandler] @="{eec97550-47a9-11cf-b952-00aa0051fe20}" [HKEY_LOCAL_MACHINE\Software\Classes\.png] @="pngfile" "PerceivedType"="image" "Content Type"="image/png" [HKEY_LOCAL_MACHINE\Software\Classes\.png\PersistentHandler] @="{098f2470-bae0-11cd-b579-08002b30bfeb}" [HKEY_LOCAL_MACHINE\Software\Classes\.jpg] @="jpegfile" "Content Type"="image/jpeg" "PerceivedType"="image" [HKEY_LOCAL_MACHINE\Software\Classes\.jpg\OpenWithProgids] "jpegfile"="" [HKEY_LOCAL_MACHINE\Software\Classes\.jpg\PersistentHandler] @="{098f2470-bae0-11cd-b579-08002b30bfeb}" ; ------End cut & paste here------ Microsoft FixIt! WinHlp32.exe tools (English, right-click to save!): - Enable macros FixIt! after installing WinHlp32.exe [964 KB]: http://web.archive.org/web/20160314054228if_/http://download.microsoft.com/download/7/9/5/7955FD19-CE75-477A-A2BE-3B3E8BD20A04/MicrosoftFixit50105.msi - Unblock .HLP FixIt! after installing WinHlp32.exe [964 KB]: http://web.archive.org/web/20170610234444if_/http://download.microsoft.com/download/6/9/F/69FB8CEB-90AA-49EC-ADA5-09EF2A1ACB12/MicrosoftFixit50237.msi - Windows Update (WU) Error 80070422 .HLP FixIt! after installing WinHlp32.exe [1 MB]: http://web.archive.org/web/20170503080905if_/http://download.microsoft.com/download/3/5/0/35062C9F-980C-455D-9652-82A4B30888D2/MicrosoftFixit50776.msi * USBView (USBView.exe): http://learn.microsoft.com/windows-hardware/drivers/debugger/usbview/ Available as part of Windows 10 SDK for Windows 7 SP1/8/8.1/10: http://developer.microsoft.com/windows/downloads/windows-10-sdk/ SETUP ONLY: http://download.microsoft.com/download/8/C/3/8C37C5CE-C6B9-4CC8-8B5F-149A9C976035/windowssdk/winsdksetup.exe Requires Universal C Runtime Update for Windows 7 SP1/8/8.1: http://support.microsoft.com/help/2999226/ USBView.exe installed in: - 64-bit Windows OS (x64): C:\Program Files (x86)\Windows Kits\10\Debuggers - 32-bit Windows OS (x86): C:\Program Files\Windows Kits\10\Debuggers * Windows 7 SP1/8/8.1 Universal C Runtime Update: http://support.microsoft.com/help/2999226/ - Windows 8.1 64-bit: http://download.microsoft.com/download/9/6/F/96FD0525-3DDF-423D-8845-5F92F4A6883E/Windows8.1-KB2999226-x64.msu - Windows 8.1 32-bit: http://download.microsoft.com/download/E/4/6/E4694323-8290-4A08-82DB-81F2EB9452C2/Windows8.1-KB2999226-x86.msu - Windows 7 SP1 64-bit: http://download.microsoft.com/download/1/1/5/11565A9A-EA09-4F0A-A57E-520D5D138140/Windows6.1-KB2999226-x64.msu - Windows 7 SP1 32-bit: http://download.microsoft.com/download/4/F/E/4FE73868-5EDD-4B47-8B33-CE1BB7B2B16A/Windows6.1-KB2999226-x86.msu * Windows 7 SP1 Platform Update (PU): http://support.microsoft.com/help/2670838/ - PU 64-bit: http://download.microsoft.com/download/1/4/9/14936FE9-4D16-4019-A093-5E00182609EB/Windows6.1-KB2670838-x64.msu - PU 32-bit: http://download.microsoft.com/download/1/4/9/14936FE9-4D16-4019-A093-5E00182609EB/Windows6.1-KB2670838-x86.msu * Windows 7 SP1 0x00000050 Stop Error after installing Platform Update (PU): http://support.microsoft.com/help/2834140/ - PU Error Fix 64-bit: http://download.microsoft.com/download/5/A/5/5A548BFE-ADC5-414B-B6BD-E1EC27A8DD80/Windows6.1-KB2834140-v2-x64.msu - PU Error Fix 32-bit: http://download.microsoft.com/download/F/1/4/F1424AD7-F754-4B6E-B0DA-151C7CBAE859/Windows6.1-KB2834140-v2-x86.msu * FixIt! Windows Installer MSI/MSU Errors: http://support.microsoft.com/help/2438651/ FixIt! problems that block programs from being installed/removed: http://support.microsoft.com/help/17588/ File: http://download.microsoft.com/download/7/E/9/7E9188C0-2511-4B01-8B4E-0A641EC2F600/MicrosoftProgram_Install_and_Uninstall.meta.diagcab Repair MSI (Windows Installer) Automated Scripts: http://www.tweaking.com/content/page/repair_msi_windows_installer.html File: http://www.majorgeeks.com/files/details/tweaking_com_repair_msi_(windows_installer).html Microsoft .NET Framework (NetFX) Repair Tool: http://support.microsoft.com/help/2698555/ Download: http://www.microsoft.com/download/details.aspx?id=30135 File: http://download.microsoft.com/download/2/B/D/2BDE5459-2225-48B8-830C-AE19CAF038F1/NetFxRepairTool.exe FixIt! Windows Installer MSI/MSU Install Error 0x8007000D: http://support.microsoft.com/help/2230957/ File: http://download.microsoft.com/download/B/3/2/B3259ACE-2BFC-47D3-9627-A21372C1D4B5/MicrosoftFixit50485.msi Fatal Error 0x80070643: Failed to install .NET/MSI package: http://www.google.com/search?q=Error+0x80070643%3A+Failed+to+install+MSI+package http://stackoverflow.com/questions/41720158/ http://www.windows101tricks.com/fix-error-0x80070643-failed-to-install-msi-package/ http://social.msdn.microsoft.com/Forums/vstudio/14ccc37f-d70a-454d-bea2-a0244394ac5e/ http://blogs.msdn.microsoft.com/vsnetsetup/2014/10/ http://support.microsoft.com/help/10164/ http://www.youtube.com/watch?v=0cBg_A5axNI * FixIt! Disable "Test mode" message: http://support.microsoft.com/help/2509241/ File: http://download.microsoft.com/download/C/7/9/C796E9A8-E2F2-4281-9A53-9BF67BB259FC/MicrosoftFixit50756.msi * Windows 7 Computer Stops Responding Randomly Hotfix: http://support.microsoft.com/help/2265716/ Hotfix [request links in e-mail]: http://support.microsoft.com/en-us/hotfix/kbhotfix?kbnum=2265716&kbln=en-us File: http://hotfixv4.trafficmanager.net/Windows%207/WindowsServer%202008%20R2/sp1/Fix322397/7600/free/417036_intl_i386_zip.exe * Windows 7 SP1 Stop Error 0x00000050 in NTKRNLPA.EXE Hotfix: http://support.microsoft.com/help/2516405/ Hotfix [request links in e-mail]: http://support.microsoft.com/hotfix/KBHotfix.aspx?kbnum=2516405&kbln=en-us - NTKRNLPA.EXE Hotfix 64-bit: http://hotfixv4.trafficmanager.net/Windows%207/Windows%20Server2008%20R2%20SP1/sp2/Fix368160/7600/free/430477_intl_x64_zip.exe - NTKRNLPA.EXE Hotfix 32-bit: http://hotfixv4.trafficmanager.net/Windows%207/Windows%20Server2008%20R2%20SP1/sp2/Fix368160/7600/free/430476_intl_i386_zip.exe * Windows 7 32-bit Variable %UserDomain% not resolved Profprov.dll + Profsvc.dll Hotfix: http://support.microsoft.com/help/2664408/ Hotfix [request links in e-mail]: http://support.microsoft.com/en-us/hotfix/kbhotfix?kbnum=2664408&kbln=en-us File: http://hotfixv4.trafficmanager.net/Windows%207/Windows%20Server2008%20R2%20SP1/sp2/Fix397022/7600/free/444149_intl_i386_zip.exe * Windows 7/7 SP1 ROBOCOPY.EXE incorrectly skips files Hotfix: http://support.microsoft.com/help/2680906/ Hotfix [request links in e-mail]: http://support.microsoft.com/en-us/Hotfix/KbHotfix?kbnum=2680906&kbln=en-US - ROBOCOPY.EXE Hotfix 64-bit: http://hotfixv4.trafficmanager.net/Windows%207/Windows%20Server2008%20R2%20SP1/sp2/Fix396879/7600/free/445248_intl_x64_zip.exe - ROBOCOPY.EXE Hotfix 32-bit: http://hotfixv4.trafficmanager.net/Windows%207/Windows%20Server2008%20R2%20SP1/sp2/Fix396879/7600/free/445246_intl_i386_zip.exe * Windows 7 Audiodg.exe Memory Leak Hotfix: http://support.microsoft.com/help/981013/ Hotfix [request links in e-mail]: http://support.microsoft.com/en-us/Hotfix/KbHotfix?kbnum=981013&kbln=en-US - Audiodg.exe Hotfix 64-bit: http://hotfixv4.trafficmanager.net/Windows%207/WindowsServer%202008%20R2/sp1/Fix307914/7600/free/409416_intl_x64_zip.exe - Audiodg.exe Hotfix 32-bit: http://hotfixv4.trafficmanager.net/Windows%207/WindowsServer%202008%20R2/sp1/Fix307914/7600/free/409414_intl_i386_zip.exe * Windows 7/7 SP1 defective WaitToKillServiceTimeout Registry value Hotfix: http://support.microsoft.com/help/2549760/ Hotfix [request links in e-mail]: http://support.microsoft.com/en-us/Hotfix/KbHotfix?kbnum=2549760&kbln=en-US - WaitToKillServiceTimeout Hotfix 64-bit: http://hotfixv4.trafficmanager.net/Windows%207/Windows%20Server2008%20R2%20SP1/sp2/Fix367694/7600/free/435571_intl_x64_zip.exe - WaitToKillServiceTimeout Hotfix 32-bit: http://hotfixv4.trafficmanager.net/Windows%207/Windows%20Server2008%20R2%20SP1/sp2/Fix367694/7600/free/435569_intl_i386_zip.exe * Windows 7/7 SP1 slow Startup (ReadyBoot) with many Restore Points Hotfix: http://support.microsoft.com/help/2555428/ Hotfix [request links in e-mail]: http://support.microsoft.com/en-us/Hotfix/KbHotfix?kbnum=2555428&kbln=en-US - ReadyBoot Hotfix 64-bit: http://hotfixv4.trafficmanager.net/Windows%207/Windows%20Server2008%20R2%20SP1/sp2/Fix368028/7600/free/433314_intl_x64_zip.exe - ReadyBoot Hotfix 32-bit: http://hotfixv4.trafficmanager.net/Windows%207/Windows%20Server2008%20R2%20SP1/sp2/Fix368028/7600/free/433313_intl_i386_zip.exe * Windows 7/7 SP1 FSUTIL.EXE Hotfix/Update improves compatibility with Advanced Format Disk Drives (AFD): http://support.microsoft.com/help/982018/ Download: http://www.catalog.update.microsoft.com/search.aspx?q=KB982018 - FSUTIL.EXE Hotfix 64-bit: http://download.windowsupdate.com/msdownload/update/software/updt/2011/04/windows6.1-kb982018-v3-x64_7853a1c9c63611e17cd2c923704bf2e924bdfe7b.msu - FSUTIL.EXE Hotfix 32-bit: http://download.windowsupdate.com/msdownload/update/software/updt/2011/04/windows6.1-kb982018-v3-x86_b009d84249f14d4eaae7aa522be37c38dd83531b.msu * Windows 7/7 SP1 "Explorer.exe Server Execution Failed" Error: http://support.microsoft.com/help/2444677/ - Hotfix 64-bit for Windows 7/7 SP1 64-bit (x64): http://thehotfixshare.net/board/index.php?showtopic=15505 - Hotfix 32-bit for Windows 7/7 SP1 32-bit (x86): http://thehotfixshare.net/board/index.php?showtopic=15506 Hotfix [request links in e-mail]: http://support.microsoft.com/hotfix/kbhotfix?kbnum=2444677&kbln=en-us Fix "Explorer.exe Server Execution Failed" Error in Windows 7/newer: http://www.pcerror-fix.com/methods-repair-explorer-exe-server-execution-failed-windows-7-8-10/ http://support.microsoft.com/windows/fix-a-corrupted-user-profile-in-windows-1cf41c18-7ce3-12f9-8e1d-95896661c5c9 http://www.thewindowsclub.com/fix-explorer-exe-server-execution-failed-on-windows-7/ http://michlstechblog.info/blog/windows-explorer-exe-server-execution-failed/ * Windows 10 Universal C RunTime (UCRT) 32-bit + 64-bit for Windows Vista/2008/7 SP1/8/8.1/2012 32-bit (x86) + 64-bit (x64): http://support.microsoft.com/help/3118401/ UCRT All in One [ZIP]: http://download.microsoft.com/download/3/1/1/311C06C1-F162-405C-B538-D9DC3A4007D1/WindowsUCRT.zip UCRT Separate Files [MSU Installer]: http://www.catalog.update.microsoft.com/Search.aspx?q=3118401 * Microsoft PowerShell 32-bit + 64-bit cross-platform task automation, scripting language, configuration management framework (.NET compatible) + interactive shell command line interface for Windows XP/newer 32-bit (x86) + 64-bit (x64) (English, free, open source): http://github.com/PowerShell/PowerShell/ - PowerShell 32-bit + 64-bit for Windows 7 SP1/newer 32-bit (x86) + 64-bit (x64) [20-100 MB]: http://github.com/PowerShell/PowerShell/releases/ PowerShell Documentation: http://learn.microsoft.com/powershell/ Required: Windows 10 Universal C RunTime (UCRT) 32-bit + 64-bit for Windows Vista/2008/7 SP1/8/8.1/2012 32-bit (x86) + 64-bit (x64): http://support.microsoft.com/help/3118401/ UCRT All in One [ZIP]: http://download.microsoft.com/download/3/1/1/311C06C1-F162-405C-B538-D9DC3A4007D1/WindowsUCRT.zip UCRT Separate Files [MSU Installer]: http://www.catalog.update.microsoft.com/Search.aspx?q=3118401 * Extract files from .MSU installers and install them in automated mode: http://blogs.msdn.microsoft.com/astebner/2008/03/11/knowledge-base-article-describing-how-to-extract-msu-files-and-automate-installing-them/ http://support.microsoft.com/help/934307/ Extract .MSU contents (example): EXPAND.EXE -f:* "Q000000.msu" %temp%\Q000000 Then use extracted file (.XML) to install .MSU by using Package Manager (PkgMgr.exe), after renaming .XML file if needed (example): PKGMGR.EXE /n:%temp%\Q000000\Q000000.xml Install .MSU directly using Windows Update Standalone Installer (WUSA.exe) (example): WUSA.EXE "Q000000.MSU" /quiet /norestart * Toubleshoot: Missing Windows Installer Cache files: http://www.thewindowsclub.com/missing-windows-installer-cache-files-rebuild * Fix Windows 7/newer errors/problems generated by executables/programs that canNOT be installed or uninstalled: http://support.microsoft.com/mats/Program_Install_and_Uninstall/ Troubleshooter: http://download.microsoft.com/download/7/E/9/7E9188C0-2511-4B01-8B4E-0A641EC2F600/MicrosoftProgram_Install_and_Uninstall.meta.diagcab * Microsoft FixIt! [ DISCONTINUED ! ]: http://support.microsoft.com/fixit/ Download ALL FixIt! Files: http://support.microsoft.com/help/2970908/ Portable Install [ RECOMMENDED ! ]: http://web.archive.org/web/20200414041622if_/http://download.microsoft.com/download/E/2/3/E237A32D-E0A9-4863-B864-9E820C1C6F9A/MicrosoftFixit-portable.exe * FixIt! Disable Network Adapter Power Management setting: http://support.microsoft.com/help/2740020/ File: http://download.microsoft.com/download/0/A/F/0AFE6980-A813-42DD-86EC-58BF7A6A7B1B/MicrosoftEasyFix55016.msi * Troubleshoot Intel Network Adapters Power Management: http://www.intel.com/content/www/us/en/support/articles/000005879/network-and-i-o/wireless-networking.html * Stop Network Adapter from Getting Disabled in Windows 7: http://www.addictivetips.com/windows-tips/stop-network-adapter-from-getting-disabled-in-windows-7/ * Turn ON/OFF + Enable/Disable/Restart/Reset Internet/Network Adapter/Connection/Interface/Profile using command line tools: http://www.action1.com/kb/restarting-the-network-adapter-in-Windows.html http://www.privateinternetaccess.com/forum/discussion/20296/torrenting-disconnect-s-my-internet/ http://stackoverflow.com/questions/19831023/ * Prevent Windows from Turning OFF USB Devices: http://www.helpdeskgeek.com/how-to/prevent-windows-from-powering-off-usb-device/ * 5 Tools to Prevent Windows from Sleeping or Turning OFF the Display: http://www.raymond.cc/blog/dont-sleep-prevent-windows-from-standby-shutdown-hibernate-and-restart/ * Keep Computer/Laptop Awake without Touching the Mouse or Keyboard: http://www.technorms.com/41354/ Mouse Jiggler fakes mouse cursor movement to prevent power savings iddle detection triggers: http://github.com/arkane-systems/mousejiggler/ Download: http://github.com/arkane-systems/mousejiggler/releases/latest/ Requires Microsoft .Net Framework Redistributable (NFR) 2.0/newer: http://www.mdgx.com/add.htm#NFR Command: MouseJiggle.exe -j -z -m Coffee prevents standby/sleep during network/internet activity, changes power settings: http://sourceforge.net/projects/coffee-sc/ Download: http://sourceforge.net/projects/coffee-sc/files/ * Save/view/print list of installed Windows Updates (WU) from the command line: http://www.rakhesh.com/windows/get-a-list-of-recently-installed-windows-updates-via-the-command-line/ Save updates list(s) to text file(s) (examples): WMIC.EXE QFE>UPD_QFE.TXT WMIC.EXE QFE LIST FULL>UPD_FULL.TXT DISM.EXE /Online /Get-packages>UPD_LIST.TXT DISM.EXE /Online /Get-Packages /Format:Table>UPD_TABLE.TXT systeminfo.exe>UPD_INFO.TXT View text file(s) using Notepad/similar/better free(ware) plain text/ASCII editor/viewer: http://www.mdgx.com/toy.htm#TXT Deployment Image Servicing and Management (DISM) tool (DISM.EXE) is located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually C:\WINDOWS]. WMIC.exe is located in the %WinDir%\SYSTEM32\wbem directory/folder [%WinDir% = usually C:\WINDOWS], listed on your system PATH. View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command PATH -> press Enter. WMIC (Windows Management Instrumentation Command): http://learn.microsoft.com/windows/win32/wmisdk/wmic/ MS DOCs: WMIC: http://technet.microsoft.com/library/bb742610.aspx Dedoimedo: WMIC - The Windows secret weapon: http://www.dedoimedo.com/computers/windows-wmic.html ComputerHope: WMIC: http://www.computerhope.com/wmic.htm Rob van der Woude: WMIC: http://www.robvanderwoude.com/wmic.php quux: WMIC Snippets: http://quux.wiki.zoho.com/WMIC-Snippets.html SS64: WMIC.EXE: http://www.ss64.com/nt/wmic.html Wikipedia: WMI: http://en.wikipedia.org/wiki/Windows_Management_Instrumentation * Uninstall Internet Explorer 9 (IE9): http://support.microsoft.com/help/2579295/ File: http://support.microsoft.com/help/2970908/ Internet Explorer (IE) Uninstall command line: FORFILES.EXE /P %WinDir%\Servicing\Packages /M Microsoft-Windows-InternetExplorer-*9.*.mum /c "CMD /C ECHO Uninstalling package @fname && START /W pkgmgr /up:@fname /norestart" * Install/Uninstall Internet Explorer 9 (IE9) in/from Windows 7: http://windows.microsoft.com/en-US/windows7/how-do-i-install-or-uninstall-internet-explorer-9/ * Uninstall Internet Explorer 10 (IE10) + Reinstall Internet Explorer 9 (IE9) in Windows 7: http://news.softpedia.com/news/How-to-Remove-IE10-and-Get-Back-to-IE9-on-Windows-7-308998.shtml * Install/Uninstall Internet Explorer 10 (IE10) in/from Windows 7: http://www.sevenforums.com/tutorials/282216-internet-explorer-10-install-uninstall-windows-7-a.html * Searching, Downloading and Installing Updates: http://msdn.microsoft.com/library/windows/desktop/aa387102.aspx Searching, Downloading and Installing Specific Updates: http://msdn.microsoft.com/library/windows/desktop/aa387101.aspx Using the Windows Update Agent API: http://msdn.microsoft.com/library/windows/desktop/aa387287.aspx Using WUA to Scan for Updates Offline: http://msdn.microsoft.com/library/windows/desktop/aa387290.aspx MSKB: Error code 0x80000FFFF when using Windows Update or Microsoft Update: http://support.microsoft.com/help/946414/ MSKB: Latest version of Windows Update Agent (WUA): http://support.microsoft.com/help/949104/ MSKB: Unable to install Updates: http://support.microsoft.com/help/2509997/ SevenForums: Windows Update will not start: http://www.sevenforums.com/windows-updates-activation/120431-windows-update-will-not-start.html#post1039097 SevenForums: Windows Update service not working: http://www.sevenforums.com/windows-updates-activation/102472-windows-update-service-not-working.html Fix WU: http://www.softpedia.com/get/Tweak/System-Tweak/Fix-WU.shtml MDGx "Windows Update Client (WUC) + Windows Update Agent (WUA)" topic in SOFTWARE.TXT (included): http://www.mdgx.com/xptoy.htm#WUC * Enable Windows Updates (WU) in Windows 7/8/8.1: http://support.microsoft.com/help/4056895/ http://support.microsoft.com/help/4056894/ TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK to all prompts to register/merge/import its information into your registry. -----Begin cut & paste here----- REGEDIT4 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\QualityCompat] "cadca5fe-87d3-4b96-b7fb-a231484277cc"=dword:0 ; ------End cut & paste here------ * Disable Windows Updates (WU), Windows Server Update Services (WSUS) + related Registry settings in Windows 7/8/8.1/10 + Windows Server 2012/2016/2019/2022: http://support.microsoft.com/help/328010/ http://github.com/vFense/vFenseAgent-win/wiki/Registry-keys-for-configuring-Automatic-Updates-&-WSUS/ http://www.smallvoid.com/article/winnt-automatic-updates-config.html http://admx.help/HKLM/Software/Policies/Microsoft/WindowsStore TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK to all prompts to register/merge/import its information into your registry. -----Begin cut & paste here----- REGEDIT4 [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate] "DoNotConnectToWindowsUpdateInternetLocations"=dword:1 "AllowAutoWindowsUpdateDownloadOverMeteredNetwork"=dword:0 "BranchReadinessLevel"=dword:10 "ConfigureDeadlineForFeatureUpdates"=dword:1e "ConfigureDeadlineForQualityUpdates"=dword:1e "DeferFeatureUpdates"=dword:1 "DeferFeatureUpdatesPeriodInDays"=dword:16d "DeferQualityUpdatesPeriodInDays"=dword:1e "DeferQualityUpdates"=dword:1 "DeferUpgrade"=dword:1 "DeferUpgradePeriod"=dword:8 "DeferUpdatePeriod"=dword:4 "DisableOSUpgrade"=dword:1 "DisableWindowsUpdateAccess"=dword:1 "ElevateNonAdmins"=dword:1 "FlightCommitted"=dword:0 "FlightSettingsMaxPauseDays"=dword:99999999 "HideMCTLink"=dword:1 "InsiderProgramEnabled"=dword:0 "PauseDeferrals"=dword:1 "PauseFeatureUpdatesStartTime"="2015-05-05T05:05:05Z" "PauseQualityUpdatesStartTime"="2015-05-05T05:05:05Z" "PauseUpdatesExpiryTime"="2077-07-07T07:07:07Z" "PauseFeatureUpdatesEndTime"="2077-07-07T07:07:07Z" "PauseQualityUpdatesEndTime"="2077-07-07T07:07:07Z" "RestartNotificationsAllowed"=dword:1 "TargetReleaseVersion"=dword:1 "TargetReleaseVersionInfo"=dword:0 "WUServer"="0.0.0.0" "WUStatusServer"="0.0.0.0" "UpdateServiceUrlAlternate"="0.0.0.0" "ManagePreviewBuilds"=dword:1 "ManagePreviewBuildsPolicyValue"=dword:0 [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU] "AutoInstallMinorUpdates"=dword:0 "NoAutoUpdate"=dword:1 "NoAutoRebootWithLoggedOnUsers"=dword:1 "NoAUAsDefaultShutdownOption"=dword:1 "RebootRelaunchTimeout"=dword:3 "RebootRelaunchTimeoutEnabled"=dword:1 "UseWUServer"=dword:1 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update] "NextSqmReportTime"="0" "NextFeaturedUpdatesNotificationTime"="0" "EnableFeaturedSoftware"=dword:0 "FeaturedUpdatesNotificationSeqNum"=dword:0 "FeaturedUpdatesNotificationSeqNumGenTime"="0" "SetupWizardLaunchTime"="0" "ForcedReboot"=dword:0 "AUOptions"=dword:1 "ConfigVer"=dword:1 "BalloonTime"="0" "ScheduledInstallDay"=dword:0 "ScheduledInstallTime"=dword:0 "IncludeRecommendedUpdates"=dword:0 "NextDetectionTime"="0" [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer] "NoWindowsUpdate"=dword:1 [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer] "NoWindowsUpdate"=dword:1 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\OSUpgrade] "AllowOSUpgrade"=dword:0 "ReservationsAllowed"=dword:0 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\OSUpgrade\State] "OSUpgradeState"=dword:1 "OSUpgradeStateTimeStamp"="2015-05-05 05:05:05" [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsStore] "DisableOSUpgrade"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\Setup\UpgradeNotification] "UpgradeAvailable"=dword:0 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main] "EnableAutoUpgrade"=dword:0 [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main] "EnableAutoUpgrade"=dword:0 [HKEY_USERS\.DEFAULT\Software\Microsoft\Internet Explorer\Main] "EnableAutoUpgrade"=dword:0 [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Media Player] "DisableAutoUpdate"=dword:1 [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Internet Explorer\Infodelivery\Restrictions] "NoUpdateCheck"=dword:1 ; ------End cut & paste here------ * Portable Update (PortUp): http://www.portableupdate.com/ PortUp: http://www.portableupdate.com/public/PortUp.zip PortUp DOCumentation: http://www.portableupdate.com/docs/documentation.aspx * Microsoft Windows Updates (WU) server: http://windowsupdate.microsoft.com/ * Windows Server Update Services (WSUS) Offline Update tool: http://download.wsusoffline.net/ * Start (run) WuauServ (Windows Updates Automatic Service) and configure it to start only when needed (on demand): ECHO Y|NET.EXE START wuauserv SC.EXE CONFIG wuauserv START= demand Stop (exit) WuauServ (if running): ECHO Y|NET.EXE STOP wuauserv * Run Windows Automatic Updates (WUA): WUAPP.EXE Run WUA from the command line: http://morgansimonsen.com/2010/12/14/automatic-updates-client-command-line-parameters/ http://www.ss64.com/nt/wuauclt.html WUAUCLT.EXE * Repair/Reinstall Windows Update (WU): http://www.winhelp.us/reinstall-windows-update.html File: http://www.winhelp.us/files/MicrosoftFixit50202.msi * Fix WU Utility: http://www.thewindowsclub.com/repair-fix-windows-updates-with-fix-wu-utility/ File: http://www.thewindowsclub.com/downloads/Fix%20WU.zip * FixIt! Windows Update (WU): http://support.microsoft.com/mats/windows_update/ FixIt! WU PORTABLE: http://download.microsoft.com/download/E/2/3/E237A32D-E0A9-4863-B864-9E820C1C6F9A/MicrosoftFixit-portable.exe FixIt! WU ONLINE: http://download.microsoft.com/download/F/2/2/F22D5FDB-59CD-4275-8C95-1BE17BF70B21/WindowsUpdateDiagnostic.diagcab * Repair Windows 7 Update Issues: http://www.dell.com/support/troubleshooting/us/en/19/KCS/KcsArticles/ArticleView?docid=404587 * Hide/Restore Hidden Windows Updates in Windows 7/8/8.1: http://www.sevenforums.com/tutorials/24376-windows-update-hide-restore-hidden-updates.html * Windows Hotfix Downloader (WHDownloader.exe) for Windows 7/8/8.1: http://forums.mydigitallife.net/threads/whdownloader-support-and-chat.44645/ File: http://www.majorgeeks.com/files/details/windows_hotfix_downloader.html * Windows Updates Downloader (WUD): http://www.windowsupdatesdownloader.com/ Files: http://www.windowsupdatesdownloader.com/ProgramFiles.aspx Updates List (ULZ): http://www.windowsupdatesdownloader.com/UpdateLists.aspx * Windows Update Checker (KUC): http://windows-update-checker.com/ Files: http://windows-update-checker.com/download/ * TheHotfixShare (THS) Windows Hotfixes: http://www.thehotfixshare.net/board/?autocom=downloads THS forum membership is free. THS Language Neutral Windows 7 Hotfix Downloads: http://www.thehotfixshare.net/board/?autocom=downloads&showcat=136 * FixWin for Windows Vista/7: http://www.thewindowsclub.com/repair-fix-windows-7-vista-problems-with-fixwin-utility/ File: http://www.thewindowsclub.com/downloads/FixWin.zip Guide: http://www.windowsvalley.com/download-fixwin-utility-reform-your-windows/ * System Update Readiness (SUR) + Deployment Image Servicing and Management (DISM) tool (DISM.EXE) repairs WU errors, (re)installs + verifies updates/(hot)fixes/patches in Windows Vista/7/newer: http://support.microsoft.com/help/947821/ - DISM 64-bit for Windows 7 64-bit (x64): http://www.microsoft.com/download/details.aspx?id=20858 File: http://download.microsoft.com/download/E/8/D/E8DAA970-1036-447F-B5EA-716D4BA70EC5/Windows6.1-KB947821-v34-x64.msu - DISM 32-bit for Windows 7 SP1 32-bit (x86): http://www.microsoft.com/download/details.aspx?id=3132 File: http://download.microsoft.com/download/4/7/A/47A0F7B9-1F0F-41B0-AA42-00FD16337268/Windows6.1-KB947821-v34-x86.msu Deployment Image Servicing and Management tool [DISM.EXE] is included with all Windows Vista/7/newer editions, and is located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually C:\WINDOWS]. View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command PATH -> press Enter. Use DISM to fix Windows Update (WU) errors: http://learn.microsoft.com/troubleshoot/windows-server/deployment/fix-windows-update-errors/ DISM command line options: http://learn.microsoft.com/windows-hardware/manufacture/desktop/dism-global-options-for-command-line-syntax/ http://learn.microsoft.com/windows-hardware/manufacture/desktop/dism-operating-system-package-servicing-command-line-options/ * Turn OFF Internet File Association (Search web for unknown extension) behind-your-back/forced/hidden/intrusive/invasive/subversive/unwanted/without-your-consent "feature" for safety purposes in Windows NTx: http://admx.help/?Category=Windows_10_2016&Policy=Microsoft.Policies.InternetCommunicationManagement::ShellNoUseInternetOpenWith_2 TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK to all prompts to register/merge/import its information into your registry. -----Begin cut & paste here----- REGEDIT4 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer] "NoInternetOpenWith"=dword:1 [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer] "NoInternetOpenWith"=dword:1 [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer] "NoInternetOpenWith"=dword:1 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System] "NoInternetOpenWith"=dword:1 [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System] "NoInternetOpenWith"=dword:1 [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\System] "NoInternetOpenWith"=dword:1 ; ------End cut & paste here------ * Windows 7 Internet Explorer 9 (IE9) Core Fonts Blurred Text Fix: http://support.microsoft.com/help/2545698/ - IE9 Text Fix 64-bit: http://download.microsoft.com/download/0/5/6/05675ADF-21AB-4476-8731-95182643D02C/Windows6.1-KB2545698-x64.msu - IE9 Text Fix 32-bit: http://download.microsoft.com/download/4/C/7/4C7D491B-6F78-4DB7-B87C-71777BF41E3F/Windows6.1-KB2545698-x86.msu * Uninstall/Reinstall/Repair Internet Explorer (IE) [discontinued!] in Windows Vista/7/8/8.1/10: http://learn.microsoft.com/troubleshoot/browsers/how-to-repair-or-reinstall-ie/ http://answers.microsoft.com/en-us/windows/forum/windows_7-windows_install-winsubother/windows-update-how-to-fix-some-settings-are/a5160e9d-21e8-4ecd-8218-6a6b88134748 1. Uninstall Internet Explorer (IE) from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run one of these commands (run the 2nd in case the 1st doesn't work) -> press Enter (after each line): DISM.EXE /online /Disable-Feature /FeatureName:Internet-Explorer-Optional-amd64 FORFILES.EXE /P %WinDir%\servicing\Packages /M Microsoft-Windows-InternetExplorer-*11.*.mum /c "cmd.exe /c echo Uninstalling package @fname && start /w pkgmgr.exe /up:@fname /norestart" Deployment Image Servicing and Management (DISM) tool (DISM.EXE) is located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually C:\WINDOWS]. 2. Reinstall Internet Explorer (IE) -> open Control Panel (CP) CONTROL.EXE -> Programs and Features -> Turn Windows features on or off -> Windows Features -> check Internet Explorer (11) box -> Apply/OK. * Windows 7 Application Compatibility Update (ACU): http://support.microsoft.com/help/974332/ Windows 7 Application Compatibility List: http://www.microsoft.com/download/details.aspx?id=2394 MDGx "Application Compatibility Toolkit (ACT)" topic in SOFTWARE.TXT (included): http://www.mdgx.com/xptoy.htm#ACT * Windows 7 Service Pack 1 (SP1): http://support.microsoft.com/help/976932/ Windows 7 Service Pack 1 (SP1) Update: http://support.microsoft.com/help/2533552/ Windows 7 Service Pack 1 (SP1) Guide: http://windows.microsoft.com/windows7sp1/ Windows 7 Service Pack 1 (SP1) Downloads: http://www.catalog.update.microsoft.com/search.aspx?q=KB976932 - Windows 7 SP1 64-bit for Windows 7 64-bit (x64) [900 MB]: http://download.windowsupdate.com/msdownload/update/software/svpk/2011/02/windows6.1-kb976932-x64_74865ef2562006e51d7f9333b4a8d45b7a749dab.exe - Windows 7 SP1 Update 64-bit for Windows 7 SP1 64-bit (x64): http://download.windowsupdate.com/msdownload/update/software/crup/2011/05/windows6.1-kb2533552-x64_0ba5ac38d4e1c9588a1e53ad390d23c1e4ecd04d.msu - Windows 7 SP1 32-bit for Windows 7 32-bit (x86) [500 MB]: http://download.windowsupdate.com/msdownload/update/software/svpk/2011/02/windows6.1-kb976932-x86_c3516bc5c9e69fee6d9ac4f981f5b95977a8a2fa.exe - Windows 7 SP1 Update 32-bit for Windows 7 SP1 32-bit (x86): http://download.windowsupdate.com/msdownload/update/software/crup/2011/05/windows6.1-kb2533552-x86_f2061d1c40b34f88efbe55adf6803d278aa67064.msu * Microsoft Security Essentials (MSE): http://www.microsoft.com/security_essentials/ * Windows 7 Review: http://www.activewin.com/reviews/software/operating-sys/windows7/ * Windows 7 ISOs: http://www.mydigitallife.info/2009/11/10/windows-7-iso-x86-and-x64-official-direct-download-links-ultimate-professional-and-home-premium/ * Windows NT Backup Restore Utility for Windows 7: http://support.microsoft.com/help/974674/ Hotfix [request links in e-mail]: http://support.microsoft.com/hotfix/KBHotfix.aspx?kbnum=974674&kbln=en-us http://www.microsoft.com/download/details.aspx?id=18924 * MDGx Windows 7/7 SP1 Components, Add-ons, Extras, (Hot)Fixes, Patches, Upgrades, Updates (all included): - MDGx "Java Runtime Environment (JRE)" topic in SOFTWARE.TXT: http://www.mdgx.com/add.htm#JAVA - MDGx ".NET Framework Redistributable (NFR)" topic in SOFTWARE.TXT: http://www.mdgx.com/add.htm#NFR - MDGx "Visual Studio (VS) + Visual C++ (VC)" topic in SOFTWARE.TXT: http://www.mdgx.com/add.htm#VS6 - MDGx "Windows Update Client (WUC) + Windows Update Agent (WUA)" topic in SOFTWARE.TXT: http://www.mdgx.com/xptoy.htm#WUC - MDGx "Application Compatibility Toolkit (ACT)" topic in SOFTWARE.TXT: http://www.mdgx.com/xptoy.htm#ACT - MDGx "Group Policy (GP)" topic in SOFTWARE.TXT: http://www.mdgx.com/xptoy.htm#GPO - MDGx "File Manager (FM)" topic in SOFTWARE.TXT: http://www.mdgx.com/xptoy.htm#FMNT - MDGx "Access Control Lists (ACL) + Ownership Tools" topic in SOFTWARE.TXT: http://www.mdgx.com/xptoy.htm#ACL - MDGx "NTFS Alternate Data Streams (ADS)" topic in SOFTWARE.TXT: http://www.mdgx.com/xptoy.htm#ADS - MDGx "Free(ware) Windows NTx Extras" topic in SOFTWARE.TXT: http://www.mdgx.com/xptoy.htm#2KXP ______________________________________________________________________________ Turn OFF/Remove Windows 7/8/8.1 Adware, Spyware, Security Flaws + Repair/Restore Privacy * MDGx "Turn OFF/Remove Windows 10 Adware, Spyware, Security Flaws + Repair/Restore Privacy" chapter in WIN10.TXT (included): http://www.mdgx.com/10.php http://www.mdgx.com/WIN10.TXT * Turn OFF/block/disable/remove/stop/repair Windows 7/8/8.1 dangerous/insecure/unsafe, undesirable/unnecessary/unneeded/unused/useless, forced/behind-my-back/hidden/intrusive/invasive, annoying/bloat/resources consuming, diagnostic tracking, telemetry ("phone home"), data collection/logging, customer "experience", unwanted "offers", ad(ware)/spyware/surveillance/tracking, privacy/safety/security flaws/vulnerabilities: - Fix Windows 7/8/8.1 privacy + disable spyware: http://web.archive.org/web/20180323123837/http://fix10.isleaked.com/oldwindows.html - Remove, Block and Prevent "Get Windows 10" (GWX) App for Enterprise Environments: http://blogs.technet.com/b/charlesa_us/archive/2015/06/25/how-to-remove-block-and-prevent-quot-get-windows-10-quot-application-for-corporate-environments.aspx - Manage connections from Windows Operating System components to Microsoft services: http://technet.microsoft.com/library/mt577208.aspx - Disable Telemetry and Data Collection in Windows 7/8/8.1: http://www.askvg.com/tip-disable-telemetry-and-data-collection-on-windows-7-and-8/ - Disable Remote Registry (RemoteRegistry) service: http://www.techrepublic.com/article/solutionbase-disabling-windows-xps-remote-registry-service/ ______________________________________________________________________________ Everything About The Infamous (Not So) Trusted Installer * Everything about TrustedInstaller: ************************************ Info, guides, fixes, workarounds + tweaks: TrustedInstaller [TrustedInstaller.exe] is located in the %WinDir%\Servicing directory/folder [%WinDir% = usually C:\WINDOWS] is Windows NTx [Vista/newer] Microsoft built-in user account [special "VIP" type user created by Microsoft as "master overseer"] with privileged, above-admin, system-wide rights which performs automatic/unattended behind-your-back/forced/hidden/intrusive/invasive/subversive/unwanted/without-your-consent functions/operations, for example: downloads, updates, (re)installs/uninstalls, closes/executes/(re)starts/(re)schedules dynamic link libraries (DLLs)/executables/services/tasks/scripts, modifies the Registry, system configuration files/scripts/tasks, creates/copies/renames/modifies/moves/deletes files/folders, blocks/locks out the owner/administrators/legitimate users/modifies/takes over files/folders ownership/permissions/attributes, reboots/restarts/shuts down Windows. But you [as any logged in user with administrative rights ;-/] can "disguise"/"impersonate"/replace/substitute/switch as different user, and run as TrustedInstaller in order to access/customize/modify/run any disabled/forbidden/locked/unavailable Windows command, executable, file, directory/folder, function, process, registry key/value, script, service, task, etc: - Run Programs as TrustedInstaller to Write to Certain Registry Keys or Files: http://www.winhelponline.com/blog/run-program-as-trustedinstaller-locked-registry-keys-files/ - Delete Files Protected by TrustedInstaller: http://www.helpdeskgeek.com/windows-7/windows-7-how-to-delete-files-protected-by-trustedinstaller/ - TrustedInstaller Permission and CPU Fix: http://howtoremove.guide/trustedinstaller-permission-cpu-fix-win7-win10/ - Execute programs as System/TrustedInstaller: http://borncity.com/win/2017/02/22/windows-10-execute-programs-as-systemtrustedinstaller/ - The Art of Becoming TrustedInstaller: http://www.tiraniddo.dev/2017/08/the-art-of-becoming-trustedinstaller.html - Take ownership and get full access to files and directories/folders in Windows 10: http://www.winaero.com/blog/how-to-take-ownership-and-get-full-access-to-files-and-folders-in-windows-10/ - What is TrustedInstaller.exe and should I remove it?: http://windowsreport.com/what-is-trustedinstaller-exe/ - Get Permission from TrustedInstaller in Windows 7/newer: http://www.partitionwizard.com/partitionmagic/you-require-permission-from-trustedinstaller.html - TrustedInstaller Permission and CPU Fix: http://howtoremove.guide/trustedinstaller-permission-cpu-fix-win7-win10/ - What Is TrustedInstaller? Why Does It Keep Me From Renaming Files?: http://www.makeuseof.com/tag/what-is-trustedinstaller-and-why-does-it-keep-me-from-renaming-files/ - Fix: You require permission from trustedinstaller windows 10: http://thegeekpage.com/fix-you-require-permission-from-trustedinstaller-windows-10/ - Windows 10 Home - Getting TrustedInstaller permission to edit and remove items: http://answers.microsoft.com/en-us/windows/forum/windows_10-other_settings/windows-10-home-getting-trustedinstaller/6664a5f1-5c71-45fc-94be-805075db682a/ - COMPLETELY delete trustedinstaller: http://social.technet.microsoft.com/forums/en-us/b6b1ee19-96a3-4b6a-b7af-166287c1b3c2/ - What is TrustedInstaller.exe in Windows 10/11?: http://www.thewindowsclub.com/trustedinstaller-exe-windows-7/ - Restore TrustedInstaller ownership in Windows 10: http://www.winaero.com/blog/how-to-restore-the-trustedinstaller-ownership-in-windows-10/ * Restore/Take control [take #1]: ********************************* Run Registry Editor (%WinDir%\RegEdit.exe) [%WinDir% = usually C:\WINDOWS] as TrustedInstaller (highest available user level) in order to be allowed to add/delete/edit/modify/rename any registry key/value using AdvancedRun.exe: AdvancedRun.exe /EXEFilename "%windir%\REGEDIT.EXE" /RunAs 8 /Run AdvancedRun [AdvancedRun.exe] 32-bit + 64-bit GUI interface + DOS console command line tool for Windows Vista/newer 32-bit + 64-bit runs any app/batch/command/executable/function/process/program/script/service/task/tool as Administrator/SYSTEM/TrustedInstaller/any user with elevated/highest/protected privileges/rights, compatibility, environment, ownership, permissions, priority, properties, useful for task automation in BATch (.BAT), CoMmanD (.CMD) + Visual Basic Script (.VBS) files, highly customizable: http://www.nirsoft.net/utils/advanced_run.html AdvancedRun 64-bit: http://www.nirsoft.net/utils/advancedrun-x64.zip AdvancedRun 32-bit: http://www.nirsoft.net/utils/advancedrun.zip Run Programs as TrustedInstaller: http://www.winhelponline.com/blog/run-program-as-trustedinstaller-locked-registry-keys-files/ See also "Turn OFF/Postpone/Block/Uninstall Windows Updates (WU)" chapter -> "WUB Brief Explanation:" section in WIN10.TXT (included): http://www.mdgx.com/10.php http://www.mdgx.com/WIN10.TXT Add "Run as TrustedInstaller" item to the right-click shell context menu for BATch (.bat), CoMmanD (.cmd), EXEcutables (.exe) + Visual Basic Script (.vbs) files/shortcuts. You can add any other/all file formats following the same rules -> see below. In this example AdvancedRun.exe (see above) is located in the C:\TOOLS directory/folder. TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK to all prompts to register/merge/import its information into your registry. -----Begin cut & paste here----- REGEDIT4 [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\batfile\shell\RunAsTrustInst] @="Run as TrustedInstaller" "SuppressionPolicy"=dword:0 "HasLUAShield"="" "NoWorkingDirectory"="" [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\batfile\shell\RunAsTrustInst\command] @="C:\\TOOLS\\AdvancedRun.exe /EXEFilename \"%1\" /RunAs 8 /Run" "IsolatedCommand"=- [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\cmdfile\shell\RunAsTrustInst] @="Run as TrustedInstaller" "SuppressionPolicy"=dword:0 "HasLUAShield"="" "NoWorkingDirectory"="" [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\cmdfile\shell\RunAsTrustInst\command] @="C:\\TOOLS\\AdvancedRun.exe /EXEFilename \"%1\" /RunAs 8 /Run" "IsolatedCommand"=- [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\exefile\shell\RunAsTrustInst] @="Run as TrustedInstaller" "SuppressionPolicy"=dword:0 "HasLUAShield"="" "NoWorkingDirectory"="" [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\exefile\shell\RunAsTrustInst\command] @="C:\\TOOLS\\AdvancedRun.exe /EXEFilename \"%1\" /RunAs 8 /Run" "IsolatedCommand"=- [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\vbsfile\shell\RunAsTrustInst] @="Run as TrustedInstaller" "SuppressionPolicy"=dword:0 "HasLUAShield"="" "NoWorkingDirectory"="" [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\vbsfile\shell\RunAsTrustInst\command] @="C:\\TOOLS\\AdvancedRun.exe /EXEFilename \"%1\" /RunAs 8 /Run" "IsolatedCommand"=- ; ------End cut & paste here------ From now on: Explorer/Desktop/Start button/icon/logo/menu/orb -> right-click a BATch (.bat), CoMmanD (.cmd), EXEcutable (.exe), or Visual Basic Script (.vbs) file/shortcut -> select "Run as TrustedInstaller". * Restore/Take control [take #2]: ********************************* Access/execute/open/run any possible file type (file extension) by adding "Run as TrustedInstaller" item to the right-click shell context menu for *all* files types/extensions associated with a known/listed/registered API (Application Programming Interface)/app(lication)/DLL (Dynamic Link Library)/EXEcutable (.exe)/function/program/resident/script (.bat, .cmd, .hta, .reg, .vbs, .wsh, etc)/service/task -> see below. In this example AdvancedRun.exe (see above) is located in the C:\TOOLS directory/folder, and represented as "C:\\TOOLS" in the Registry (.reg) file below. TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK to all prompts to register/merge/import its information into your registry. -----Begin cut & paste here----- REGEDIT4 [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\*\shell\RunAsTrustInst] @="Run as TrustedInstaller" "SuppressionPolicy"=dword:0 "HasLUAShield"="" "NoWorkingDirectory"="" [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\*\shell\RunAsTrustInst\command] @="C:\\TOOLS\\AdvancedRun.exe /EXEFilename \"%1\" /RunAs 8 /Run" "IsolatedCommand"=- ; ------End cut & paste here------ From now on: Explorer/Desktop/Start button/icon/logo/menu/orb -> right-click any file type (any extension)/file shortcut -> select "Run as TrustedInstaller". * Restore/Take control [take #3]: ********************************* Import/load/merge all data/information contained inside Registration Files (.reg) into the Registry [using RegEdit (REGEDIT.EXE) located in the %WinDir% directory/folder = usually C:\WINDOWS] with TrustedInstaller privileges -> see below. In this example AdvancedRun.exe (see above) is located in the C:\TOOLS directory/folder. TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK to all prompts to register/merge/import its information into your registry. -----Begin cut & paste here----- REGEDIT4 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\REGEDIT.EXE] @="C:\\WINDOWS\\REGEDIT.EXE" "Path"="C:\\WINDOWS" [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\AdvancedRun.exe] @="C:\\TOOLS\\AdvancedRun.exe" "Path"="C:\\TOOLS" [HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers] "C:\\TOOLS\\AdvancedRun.exe"="RUNASADMIN" "C:\\WINDOWS\\REGEDIT.EXE"="RUNASADMIN" "C:\\WINDOWS\\SYSTEM32\\regedt32.exe"="RUNASADMIN" "C:\\WINDOWS\\SysWOW64\\regedit.exe"="RUNASADMIN" "C:\\WINDOWS\\SysWOW64\\regedt32.exe"="RUNASADMIN" [HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted] "C:\\TOOLS\\AdvancedRun.exe"=dword:1 "C:\\WINDOWS\\REGEDIT.EXE"=dword:1 "C:\\WINDOWS\\SYSTEM32\\regedt32.exe"=dword:1 "C:\\WINDOWS\\SysWOW64\\regedit.exe"=dword:1 "C:\\WINDOWS\\SysWOW64\\regedt32.exe"=dword:1 [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Applications\REGEDIT.EXE] "NoOpenWith"=- [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Applications\REGEDIT.EXE\DefaultIcon] @="REGEDIT.EXE,0" ; Restore default action: remove the semicolon [;] and the space [ ] in front of the ; commented/disabled @="REGEDIT.EXE \"%1\"" value below + add a semicolon [;] followed by a space [ ] in front of the ; active/enabled @="... AdvancedRun64..." value below: [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Applications\REGEDIT.EXE\shell\open\command] ; @="REGEDIT.EXE \"%1\"" @="C:\\TOOLS\\AdvancedRun.exe /EXEFilename \"C:\\WINDOWS\\REGEDIT.EXE\" /CommandLine \"%1\" /RunAs 8 /Run" "NoOpenWith"=- [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\regedit] @="Registration Entries" [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\regedit\DefaultIcon] @="REGEDIT.EXE,0" ; Restore default action: remove the semicolon [;] and the space [ ] in front of the ; commented/disabled @="REGEDIT.EXE \"%1\"" value below + add a semicolon [;] followed by a space [ ] in front of the ; active/enabled @="... AdvancedRun64..." value below: [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\regedit\shell\open\command] ; @="REGEDIT.EXE \"%1\"" @="C:\\TOOLS\\AdvancedRun.exe /EXEFilename \"C:\\WINDOWS\\REGEDIT.EXE\" /CommandLine \"%1\" /RunAs 8 /Run" [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\REGEDIT.EXE] @="Registration Entries" [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\REGEDIT.EXE\DefaultIcon] @="REGEDIT.EXE,0" ; Restore default action: remove the semicolon [;] and the space [ ] in front of the ; commented/disabled @="REGEDIT.EXE \"%1\"" value below + add a semicolon [;] followed by a space [ ] in front of the ; active/enabled @="... AdvancedRun64..." value below: [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\REGEDIT.EXE\shell\open\command] ; @="REGEDIT.EXE \"%1\"" @="C:\\TOOLS\\AdvancedRun.exe /EXEFilename \"C:\\WINDOWS\\REGEDIT.EXE\" /CommandLine \"%1\" /RunAs 8 /Run" [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\regfile] @="Registration Entries" "EditFlags"=dword:1 "AlwaysShowExt"="" [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\regfile\DefaultIcon] @="REGEDIT.EXE,0" [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\regfile\shell\open] @="Mer&ge" ; Restore default action: remove the semicolon [;] and the space [ ] in front of the ; commented/disabled @="REGEDIT.EXE \"%1\"" value below + add a semicolon [;] followed by a space [ ] in front of the ; active/enabled @="... AdvancedRun64..." value below: [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\regfile\shell\open\command] ; @="REGEDIT.EXE \"%1\"" @="C:\\TOOLS\\AdvancedRun.exe /EXEFilename \"C:\\WINDOWS\\REGEDIT.EXE\" /CommandLine \"%1\" /RunAs 8 /Run" [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.reg] @="regfile" "PerceivedType"="system" ; ------End cut & paste here------ From now on: Desktop/Explorer/Start button/icon/logo/menu/orb, etc -> right-click any Registration File (.reg) -> select "Merge" -> click Yes -> click OK. * Turn OFF (Disable) TrustedInstaller | Turn back ON (Restore) TrustedInstaller: ******************************************************************************** Method I [the easiest way ;-/]: ******************************* Turn OFF/disable the TrustedInstaller service [which starts the %WinDir%\servicing\TrustedInstaller.exe EXEcutable upon every Windows (re)boot/(re)start and whenever the TrustedInstaller service is not running] from starting + running by tweaking your registry: http://learn.microsoft.com/troubleshoot/windows-client/deployment/windows-update-hangs-updates-uninstalled/ http://learn.microsoft.com/answers/questions/53649/ http://conetrix.com/blog/windows-updates-consistently-failing-after-15-minutes/ http://www.sysnative.com/forums/threads/windows-update-going-around-in-circles-telling-me-i-must-restart-my-computer.5804/ All of this can be done in 1 easy (double)-click step by running the Registry (.reg) file below. TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK to all prompts to register/merge/import its information into your registry. -----Begin cut & paste here----- REGEDIT4 ; Built-in/default values are commented out (disabled) = preceded by a semicolon [;] + a space [ ]. ; To replace any of these customized value(s) with the built-in/default one(s): add a semicolon [;] and a space [ ] in front ; of the active (enabled) line(s) you wish to disable/comment, and which begin with a quote mark ["], and delete/remove the ; semicolon [;] and the space [ ] present in front of the disabled one(s) in order to enable/activate it/them: [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\TrustedInstaller] ; "BlockTime"=dword:2a30 "BlockTime"=dword:0 ; "BlockTimeIncrement"=dword:384 "BlockTimeIncrement"=dword:ffffffff ; "PreshutdownTimeout"=dword:36ee80 "PreshutdownTimeout"=dword:e10 ; "Start"=dword:2 "Start"=dword:4 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\TrustedInstaller] ; "BlockTime"=dword:2a30 "BlockTime"=dword:0 ; "BlockTimeIncrement"=dword:384 "BlockTimeIncrement"=dword:ffffffff ; "PreshutdownTimeout"=dword:36ee80 "PreshutdownTimeout"=dword:e10 ; "Start"=dword:2 "Start"=dword:4 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\TrustedInstaller] ; "BlockTime"=dword:2a30 "BlockTime"=dword:0 ; "BlockTimeIncrement"=dword:384 "BlockTimeIncrement"=dword:ffffffff ; "PreshutdownTimeout"=dword:36ee80 "PreshutdownTimeout"=dword:e10 ; "Start"=dword:2 "Start"=dword:4 ; ------End cut & paste here------ Explanation of all these Registry values, and step-by-step how to do this the hard way, manually, by hand [;-/]: Open Registry Editor (RegEdit) [REGEDIT.EXE] located in the %WinDir% directory/folder [%WinDir% = usually C:\WINDOWS]: right-click RegEdit or its shortcut/link -> Run as Administrator -> double-click -> scroll down 4 times [in the left hand panel] until you arrive at your destination -> this registry key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\TrustedInstaller In the right hand panel: 1. Double-click "BlockTime" DWORD [REG_DWORD] to change its default value: - hexadecimal: 2a30 - decimal: 10800 seconds = 180 minutes = 3 hours to the minimum allowed value: - hexadecimal: 0 - decimal: 0 seconds 2. Double-click "BlockTimeIncrement" DWORD [REG_DWORD] to change its default value: - hexadecimal: 384 - decimal: 900 seconds = 15 minutes to the maximum allowed value: - hexadecimal: ffffffff - decimal: 4294967295 seconds = 71582788 minutes = 1193046 hours = ~ 49710 days = ~ 136 years 3. Double-click "PreshutdownTimeout" DWORD [REG_DWORD] to change its default value: - hexadecimal: 36ee80 - decimal: 3600000 seconds = 60000 minutes = 1000 hours = ~ 42 days to a much smaller value: - hexadecimal: e10 - decimal: 3600 seconds = 60 minutes = 1 hour 4. Double-click "Start" DWORD [REG_DWORD] to change its Automatic (Enabled) default value: - hexadecimal: 2 - decimal: 2 to the Disabled (Blocked) value: - hexadecimal: 4 - decimal: 4 Method I may need to be combined with Method II (below) to make sure it works 100% [;-/] -> keep reading... Method II [the easy way]: ************************* Turn OFF/disable the TrustedInstaller.exe executable by renaming its "servicing" directory/folder to something like "servicing_OLD" (example), and then in case you'll need it whenever you wish to change/install/repair/uninstall/update/upgrade an app/driver/game/program/software/tool/upgrade/Windows add-on/component/feature/fix/patch/update/etc just turn ON/restore the TrustedInstaller.exe "servicing" directory/folder by renaming it back to its original name: A. Create a DOS console batch file with commands below: TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text BATch (.bat) or CoMmanD (.cmd) script file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the BAT (.bat) or CMD (.cmd) extension -> right-click it -> Run as Administrator -> wait for completion. -----Begin cut & paste here----- @ECHO OFF IF NOT "%OS%"=="Windows_NT" GOTO END TITLE "Turn OFF/disable TrustedInstaller -> RENAME %windir%\servicing 2 %windir%\servicing_OLD ..." C: CD\ TASKKILL.EXE /IM TrustedInstaller.exe /F /T IF EXIST "%windir%\servicing" TAKEOWN.EXE /f "%windir%\servicing" /r /d y IF EXIST "%windir%\servicing" ICACLS.EXE "%windir%\servicing" /grant:R Administrators:F SYSTEM:F /t /c /q IF EXIST "%windir%\servicing" REN "%windir%\servicing" servicing_OLD IF EXIST "%windir%\servicing_OLD" TAKEOWN.EXE /f "%windir%\servicing_OLD" /r /d y IF EXIST "%windir%\servicing_OLD" ICACLS.EXE "%windir%\servicing_OLD" /grant:R Administrators:F SYSTEM:F /t /c /q :END EXIT ------End cut & paste here------ Save it as TrustdInstallr_OFF_RENAME_folder.cmd (example) on your Desktop or in any other location on your local drive(s)/partition(s)/volume(s), and then create a Desktop shortcut for it -> right-click TrustdInstallr_OFF_RENAME_folder.cmd (or its Desktop shortcut) -> Run as Administrator -> wait for completion. B. Create a DOS console batch file with commands below: TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text BATch (.bat) or CoMmanD (.cmd) script file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the BAT (.bat) or CMD (.cmd) extension -> right-click it -> Run as Administrator -> wait for completion. -----Begin cut & paste here----- @ECHO OFF IF NOT "%OS%"=="Windows_NT" GOTO END TITLE "Turn ON/restore TrustedInstaller -> Rename %windir%\servicing_OLD 2 %windir%\servicing ..." C: CD\ IF EXIST "%windir%\servicing_OLD" TAKEOWN.EXE /f "%windir%\servicing_OLD" /r /d y IF EXIST "%windir%\servicing_OLD" ICACLS.EXE "%windir%\servicing_OLD" /grant:R Administrators:F SYSTEM:F /t /c /q TASKKILL.EXE /IM TrustedInstaller.exe /F /T IF EXIST "%windir%\servicing_OLD" REN "%windir%\servicing_OLD" servicing :END EXIT ------End cut & paste here------ Save it as TrustdInstallr_ON_RESTORE_folder.cmd (example) on your Desktop or in any other location on your local drive(s)/partition(s)/volume(s), and then create a Desktop shortcut for it -> right-click TrustdInstallr_ON_RESTORE_folder.cmd (or its Desktop shortcut) -> Run as Administrator -> wait for completion. Method III [the hard way ;-/]: ****************************** Turn OFF/rename TrustedInstaller.exe step-by-step [but 1st make a *BACKUP*!]: A. Install IObit Unlocker 32-bit Explorer right-click context menu shell extension + GUI tool forces in-use files to unlock so they can be copied, moved, deleted or renamed: http://www.iobit.com/iobit-unlocker.php File: http://cdn.iobit.com/dl/unlocker-setup.exe Guide: http://www.winhelponline.com/blog/delete-a-stubborn-file-folder-in-windows/ Use IObit Unlocker executable [IObitUnlocker.exe] command line options, switches + parameters for unattended/automated BATch files/jobs/scripts: http://forums.iobit.com/topic/14855-command-line-arguments/ In this example IObitUnlocker.exe is installed [default option] in the "%ProgramFiles(x86)%\IObit\IObit Unlocker" directory/folder [where %ProgramFiles(x86)% = usually "C:\Program Files (x86)"], found only on Windows NTx 64-bit (x64) editions. The Windows NTx 32-bit (x86) correspondent directory/folder is %ProgramFiles% = usually "C:\Program Files". B. Extract executable [AdvancedRun.exe] from AdvancedRun ZIP archive below to match your Windows NTx OS bit strength [32-bit (x86) or 64-bit (x64)]: AdvancedRun [AdvancedRun.exe] 32-bit + 64-bit GUI interface + DOS console command line tool for Windows Vista/newer 32-bit + 64-bit runs any app/batch/command/executable/function/process/program/script/service/task/tool as Administrator/SYSTEM/TrustedInstaller/any user with elevated/highest/protected privileges/rights, compatibility, environment, ownership, permissions, priority, properties, useful for task automation in BATch (.BAT), CoMmanD (.CMD) + Visual Basic Script (.VBS) files, highly customizable: http://www.nirsoft.net/utils/advanced_run.html AdvancedRun 64-bit: http://www.nirsoft.net/utils/advancedrun-x64.zip AdvancedRun 32-bit: http://www.nirsoft.net/utils/advancedrun.zip Run Programs as TrustedInstaller: http://www.winhelponline.com/blog/run-program-as-trustedinstaller-locked-registry-keys-files/ In this example AdvancedRun.exe is located in the C:\TOOLS directory/folder. C. Create a DOS console batch file with commands below: TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text BATch (.bat) or CoMmanD (.cmd) script file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the BAT (.bat) or CMD (.cmd) extension -> right-click it -> Run as Administrator -> wait for completion. -----Begin cut & paste here----- @ECHO OFF IF NOT "%OS%"=="Windows_NT" GOTO END C:\TOOLS\AdvancedRun.exe /EXEFilename "%ProgramFiles(x86)%\IObit\IObit Unlocker\IObitUnlocker.exe" /CommandLine "/Rename /Advanced %WinDir%\servicing\TrustedInstaller.exe TrustedInstaller_OLD.exe" /RunAs 8 /Run :END EXIT ------End cut & paste here------ Save it as Rename_TrustdInstallr.cmd (example) on your Desktop or in any other location on your local drive(s)/partition(s)/volume(s), and then create a Desktop shortcut for it = important for fast access in the next step below! D. Turn OFF temporarily (for a few seconds, until you can rename it in the next step below) TrustedInstaller.exe: hold Ctrl + Shift + press Esc -> Task Manager (TaskMgr.exe) -> Processes tab -> right-click TrustedInstaller.exe (-> End task) -> click "End process". E. As fast as possible [!]: Desktop -> right-click Rename_TrustdInstallr.cmd (or its Desktop shortcut) -> Run as Administrator -> click OK when you see the IObit Unloker "Operation succeded." window -> done. From now on you won't have to put up anymore with any TrustedInstaller annoyances, behind-your-back/blocked/forbidden system/user functions/operations, lock outs, limitations, etc. F. Restore TrustedInstaller.exe by renaming it back to its original name in case you'll need it whenever you wish to change/install/repair/uninstall/update/upgrade an app/driver/game/program/software/tool/upgrade/Windows add-on/component/feature/fix/patch/update/etc: Perform again steps C. + E. above (D. is not needed), but this time use instead another DOS console batch file [example: Restore_TrustdInstallr.cmd] to rename TrustedInstaller_OLD.exe back to its original name = TrustedInstaller.exe : TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text BATch (.bat) or CoMmanD (.cmd) script file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the BAT (.bat) or CMD (.cmd) extension -> right-click it -> Run as Administrator -> wait for completion. -----Begin cut & paste here----- @ECHO OFF IF NOT "%OS%"=="Windows_NT" GOTO END C:\TOOLS\AdvancedRun.exe /EXEFilename "%ProgramFiles(x86)%\IObit\IObit Unlocker\IObitUnlocker.exe" /CommandLine "/Rename /Advanced %WinDir%\servicing\TrustedInstaller_OLD.exe TrustedInstaller.exe" /RunAs 8 /Run :END EXIT ------End cut & paste here------ ______________________________________________________________________________ Task Scheduler Tweaks * Windows Vista/7: Run any BATch/script/program (in Task Scheduler) minimized and with custom icon: http://answers.microsoft.com/en-us/windows/forum/windows_7-performance/make-windows-7-task-scheduler-run-a-batch-file/0573dc2e-4941-44a2-8304-264864e94f1a/ Windows 8/8.1/10/11: Run any BATch/script/program (in Task Scheduler) minimized and with custom icon: http://answers.microsoft.com/en-us/windows/forum/windows_10-performance/make-windows-10-task-scheduler-run-a-batch-file/e00b2fb0-02ca-439f-b534-eb34541130a9/ Run applications/scripts minimized (from Task Scheduler): http://forums.anandtech.com/threads/want-to-run-applications-minimized-at-log-in-from-task-scheduler.224581/ 1. Create (if not present) C:\SCRIPTS directory/folder (example) from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run these commands -> press Enter after each line: C: CD\ MD SCRIPTS 2. Use Notepad to create C:\SCRIPTS\DEL_RECYCL_B1N.VBS VBScript file (example): -----Begin cut & paste here----- Dim WshShell:Set WshShell=CreateObject("WScript.Shell") WshShell.Run chr(34)&"C:\SCRIPTS\DEL_RECYCL_B1N.CMD"&Chr(34),0 Set WshShell=Nothing ------End cut & paste here------ 3. Use Notepad to create C:\SCRIPTS\DEL_RECYCL_B1N.CMD BATch file (example): -----Begin cut & paste here----- @ECHO OFF IF NOT "%OS%"=="Windows_NT" GOTO END COLOR 3B TITLE "Delete all $Recycle.BIN directories/folders..." ECHO. ECHO  ECHO Deleting $Recycle.BIN directories/folders on all drives/partitions/volumes... ECHO  ECHO. C: CD\ FOR %%i IN (C: D: E: F: G: H: I: J: K: L: M: N: O: P: Q: R: S: T: U: V: W: X: Y: Z:) DO IF EXIST "%%i\$RECYCLE.BIN" TAKEOWN.EXE /f "%%i\$RECYCLE.BIN" /r /d y >NUL 2>&1 FOR %%i IN (C: D: E: F: G: H: I: J: K: L: M: N: O: P: Q: R: S: T: U: V: W: X: Y: Z:) DO IF EXIST "%%i\$RECYCLE.BIN" ICACLS.EXE "%%i\$RECYCLE.BIN" /grant:r Everyone:F /t /c /q >NUL 2>&1 FOR %%i IN (C: D: E: F: G: H: I: J: K: L: M: N: O: P: Q: R: S: T: U: V: W: X: Y: Z:) DO IF EXIST "%%i\$RECYCLE.BIN" RUNDLL32.EXE ADVPACK.DLL,DelNodeRunDLL32 "%%i\$RECYCLE.BIN" :END EXIT ------End cut & paste here------ 4. Add C:\SCRIPTS\DEL_RECYCL_B1N.VBS (example) to your custom Task Scheduler script -> run: MMC.EXE /S taskschd.msc 5. Create a new Task -> Action tab -> highlight your task line -> click Edit... button -> Program/script box -> type (example): WSCRIPT.EXE -> Add arguments box -> type (example): /B /NoLogo C:\SCRIPTS\DEL_RECYCL_B1N.VBS 6. Customize and save your task to run whenever and however often you wish. 7. Optionally you can automate Task Scheduler to run C:\SCRIPTS\DEL_RECYCL_B1N.VBS every 30 minutes (example) from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run these commands -> press Enter after each line: ECHO Y|SCHTASKS.EXE /Create /TN "Delete_$Recycle.B1N_folders" /TR "WSCRIPT.EXE /B /NoLogo C:\SCRIPTS\DEL_RECYCL_B1N.VBS" /RU SYSTEM /RL HIGHEST /SC MINUTE /MO 30 /F ECHO Y|SCHTASKS.EXE /Change /TN "Delete_$Recycle.B1N_folders" /RI 30 /RL HIGHEST /ENABLE * Create scheduled task to be triggered by Windows service event using XML: http://www.superuser.com/questions/502160/ http://blogs.technet.microsoft.com/askds/2011/09/26/advanced-xml-filtering-in-the-windows-event-viewer/ http://social.technet.microsoft.com/forums/windows/bae1e2c4-c60a-4f90-87b9-7b33e8d9660e/ http://msdn.microsoft.com/library/aa385231.aspx http://social.technet.microsoft.com/forums/office/fac16f3c-d088-4d66-83d8-7139261dea83/ Wikipedia: XML: http://en.wikipedia.org/wiki/XML Run... [hold WinKey + press R] -> taskschd.msc -> Create Task... -> Trigger tab -> On an event -> Custom -> New Event Filter -> XML tab -> Edit query manually -> Yes -> cut & paste (example): Actions tab -> Start a program -> Program/script (example): SC.EXE Add argument (optional) (example): STOP DNSCache OK -> OK. ______________________________________________________________________________ Patch Windows 7 * Updated Physical Address Extension (PAE) Patch [ntkrnlpa.exe] for Windows 7 SP1 32-bit unlocks using installed RAM up to 128 GB: http://www.wj32.org/wp/2011/02/23/pae-patch-updated-for-windows-7-sp1/ Updated Physical Address Extension (PAE) Patch [ntkrnlpa.exe] for Windows 8/8.1 32-bit unlocks using installed RAM up to 128 GB: http://www.wj32.org/wp/2013/10/25/pae-patch-updated-for-windows-8-1/ Updated Physical Address Extension (PAE) Patch [ntkrnlpa.exe] for Windows 10 32-bit unlocks using installed RAM up to 128 GB: http://www.wj32.org/wp/2016/02/01/pae-patch-updated-for-windows-10/ ReadyFor4GB PAE Patch [ntkrnlpa.exe] for Windows Vista/7/7 SP1 32-bit unlocks using installed RAM up to 128 GB: - Chinese: http://zh-deepxw.blogspot.com/2009/04/readyfor4gb.html - English: http://www.arstechnica.com/civis/viewtopic.php?f=15&t=49358 PAE RAMPatch [ntkrnlpa.exe] for Windows Vista/7/7 SP1 32-bit unlocks using installed RAM up to 128 GB: http://www.bcastell.com/tech-articles/enabling-more-than-4-gb-of-ram-under-windows-7-32-bit/ File: http://www.bcastell.com/wp-content/uploads/2012/09/win7-7600-4gb-patch.rar PASSWORD: nowarranty These Patches work ONLY with 32-bit (x86) Windows NTx OSes! * 4GB Patch for 32-bit EXEcutables (.exe) to use up to 4 GB of virtual RAM on Windows NTx 64-bit (x64) OSes: http://www.ntcore.com/4gb_patch.php File: http://www.ntcore.com/files/4gb_patch.zip This Patch works ONLY with 64-bit (x64) Windows NTx OSes + 32-bit (x86) EXEcutables! * WUFUC for Windows 7/8/8.1 disables hardware detection, bypasses Windows Update (WU) "Unsupported Hardware" errors + allows installing fixes/patches/updates: http://web.archive.org/web/20211107030255/https://github.com/zeffy/wufuc/ File: http://dl.thorium.rocks/files/win7/wufuc_v1.0.1.201-a52637d4.zip * Windows 7 Patches: TCP/IP Limited Connections (TCPIP.SYS), Theme (UXTHEME.DLL), Terminal Server (TERMSRV.DLL) + Desktop Watermark (USER32.DLL + USER32.DLL.mui): http://deepxw.blogspot.com/ Windows 7 Desktop Watermark (USER32.DLL + USER32.DLL.mui) Patch: http://deepxw.blogspot.com/2008/12/remove-watermark-v03-build-20081210.html Desktop Watermark Patch Guide: http://www.askvg.com/how-to-remove-windows-7-rc-watermark-build-info-from-desktop/ * UxStyle for Windows 7/8/8.1/10 Preview: http://www.uxstyle.com/ http://github.com/riverar/uxstyle/ UxStyle for Windows 8/8.1: http://www.uxstyle.com/builds/UxStyle_sep23_x86_x64_possibly_bugged.zip UxStyle for Windows 7/7 SP1: http://www.uxstyle.com/builds/UxStyle_Core_jul13_bits.zip Aero Theme for Windows 8/8.1: http://simplexdesignsart.deviantart.com/art/Windows-Aero-536877982/ http://web.archive.org/web/20130402051457/http://xxinightxx.deviantart.com/art/Windows-7-Vs-REV-D-350491112/ File: http://drive.google.com/uc?export=download&id=0B883uGPmNY72Sjk3dy1MTzBGVEE http://web.archive.org/web/20130402051457/http://www.deviantart.com/download/350491112/windows_7_vs_rev_d_by_xxinightxx-d5so8o8.zip Windows 8/8.1 Themes: http://www.winaero.com/category/windows-8-themes/ * UltraUXThemePatcher 32-bit + 64-bit for Windows XP/Vista/7/8/8.1/10/11 patches UX (User eXperience) Theme system files [uxtheme.dll, uxinit.dll, themeui.dll] to allow use of 3rd party/custom themes: http://mhoefs.eu/software_uxtheme.php UltraUXThemePatcher Guide: http://setupgamer.info/how-to-install-custom-windows-10-themes-and-visual-styles-with-ultrauxthemepatcher/ UltraUXThemePatcher Tutorial: http://www.tenforums.com/customization/76077-ultrauxthemepatcher-recover-black-grey-screen-windows-8-10-a.html Windows 7/newer Themes: http://www.majorgeeks.com/files/categories/themes.html Windows 11 Themes: http://www.deviantart.com/tag/windows11themes/ Windows 10 Themes: http://www.deviantart.com/tag/windows10themes/ http://www.deviantart.com/sagorpirbd/art/Aero-7-Themes-for-Win10-Final-523979941/ http://www.deviantart.com/niivu/art/Sweetness-for-Windows-10-826122176/ Windows 8/8.1 Themes: http://www.deviantart.com/tag/windows8themes/ Windows 7 Themes: http://www.deviantart.com/tag/windows7themes/ View + Remove All built-in Windows 10 Themes: http://www.majorgeeks.com/content/page/how_to_view_and_remove_all_windows_10_themes.html * Windows 7 Theme Source Patcher (7TSP): http://www.xptsp.com/fixit/7tsp.php 7TSP Portable: http://users.xptsp.com/fixit/programs/7tsp_GUI_v0.4_B(2015).exe 7TSP Installer: http://users.xptsp.com/fixit/programs/7tsp_GUI_v0.4_B(2015)_Installer.exe 7TSP Icon Packs: http://www.creativx.net/forums/7tsp-iconpacks/ 7TSP requires Resource Hacker: http://www.angusj.com/resourcehacker/ File: http://www.angusj.com/resourcehacker/resource_hacker.zip * GDIPP (Graphics Device Interface ++) 32-bit + 64-bit [unmaintained!] for Windows Vista/newer improves anti-aliasing/rasterizing/smoothing rendering + clarity/readability of all Windows desktop/display/monitor/screen/system fonts: http://code.google.com/archive/p/gdipp/ http://github.com/CoolOppo/GDIPP/ - GDIPP 32-bit for Windows Vista/newer 32-bit (x86) [MSI Installer]: http://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/gdipp/gdipp_x86_0.9.1.msi - GDIPP 64-bit for Windows Vista/newer 64-bit (x64) [MSI Installer]: http://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/gdipp/gdipp_x64_0.9.1.msi GDIPP Guide: http://www.makeuseof.com/tag/make-windows-fonts-look-like-mac-fonts/ * ReadyDriver Plus: http://web.archive.org/web/20131029095655/http://www.citadelindustries.net/rdp.php File: http://web.archive.org/web/20131029095655/http://data.citadelindustries.net/setupreadydriverplus.exe * Driver Signature Enforcement Overrider (DSEO): http://www.ngohq.com/?page=dseo File: http://files.ngohq.com/ngo/dseo/dseo13b.exe * Windows 7 Boot Updater changes animated boot logo: http://www.coderforlife.com/projects/win7boot/ Guide: http://www.intowindows.com/windows-7-boot-animation-updater-change-windows-7-boot-screen/ ______________________________________________________________________________ Customize BOOT Screens * Customize Windows 7 Boot Screen Guides: http://www.techdows.com/2011/06/get-windows-8-betta-fish-boot-screen-for-windows-7.html http://www.askvg.com/download-windows-8-rtm-boot-screen-windows-7/ http://www.door2windows.com/how-to-change-windows-7-boot-screen-animation/ Win7BootUpdater = MUST USE IT!: http://www.coderforlife.com/projects/win7boot/ File: http://www.coderforlife.com/projects/win7boot/downloads/ http://www.coderforlife.com/projects/win7boot/downloads/Win7BootUpdater2.exe Extras: http://www.coderforlife.com/projects/win7boot/extras/ Boot Screens: http://www.coderforlife.com/projects/win7boot/bootskins/ http://www.deskmodder.de/phpBB3/viewtopic.php?f=220&t=13363 Custom Animations: http://medi-dadu.deviantart.com/art/Win-Boot-Screen-16-9-277342889 Navi OS from SE Lain: http://detechtive.deviantart.com/art/Win-7-boot-animation-Navi-OS-from-SE-Lain-280887190 Holographic: http://ultimatedesktops.deviantart.com/art/Holographic-Boot-Skin-for-Windows-7-359440527 http://creativ-xtreme.deviantart.com/art/Holographic-Boot-Skin-for-Windows-7-359440527 Abstract: http://detechtive.deviantart.com/art/Abstract-Bootscreen-w-resolution-fix-and-a-bonus-393047765 The Hatchling v2: http://faziri.deviantart.com/art/The-Hatchling-v2-340304259 Blaupunkt v2: http://tchiro.deviantart.com/art/Blau-punkt-v2-BootScreen-344602849 Pulse Blue: http://tchiro.deviantart.com/art/Pulse-blue-Windows-7-BootScreen-321869645 Pulse Green: http://tchiro.deviantart.com/art/Pulse-Windows-7-BootScreen-321814750 Molecule 16:9: http://judian.deviantart.com/art/Molucule-Boot-Screen-16-9-312105328 L: http://luttik.deviantart.com/art/L-bootloader-297223007 Earth 16:9: http://medi-dadu.deviantart.com/art/Win-Boot-Screen-16-9-294257700 Gears: http://creativ-xtreme.deviantart.com/art/gears-BootScreen-262299074 Stargate Logo: http://fallenangelofdeath63.deviantart.com/art/Stargate-Boot-Theme-290423425 STARGATE: http://zangio.deviantart.com/art/Win7-Boot-Animation-STARGATE-189992814 Starfleet Logo: http://deskmodder.deviantart.com/art/Starfleetlogo-by-rufus721-269639178 Blue Plasma: http://deskmodder.deviantart.com/art/BluePlasma-by-AxP-261661276 Nerd: http://sachse.deviantart.com/art/Nerd-Bootscreen-260310482 DoTa Puck: http://seva-tmplr.deviantart.com/art/WIN7-Boot-DoTa-Puck-196485118 Orb: http://zangio.deviantart.com/art/Win7-Boot-Animation-Orb-188321689 Windows 8 ALPHA Fish: http://misaki2009.deviantart.com/art/Windows-8-Bootscreen-quot-ALPHA-quot-214596752 Boot Screens: http://creativ-xtreme.deviantart.com/gallery/36418593 http://kidofoundation.deviantart.com/gallery/ http://korruptninja.deviantart.com/gallery/ http://www.windows7bootscreens.com/bootscreen-22-orb/ ______________________________________________________________________________ Desktop Background/Wallpaper Tweaks + Free(ware) Tools * Next wallpaper slideshow -> right-click Desktop shortcut: http://www.sevenforums.com/tutorials/161638-next-desktop-background-add-remove-desktop-context-menu.html http://www.windowsvalley.com/remove-next-desktop-background-from-desktop-context-menu-of-windows-7/ http://www.intowindows.com/how-to-create-shortcut-key-to-switch-to-next-desktop-background-in-windows-7-and-windows-8/ NOTE: This requires your wallpaper (Desktop Background) settings to cycle through a directory/folder containing at least 2 images. 1. Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create Next_Wallpaper.vbs VBScript file (example): -----Begin cut & paste here----- Dim WshShell:Set WshShell=WScript.CreateObject("WScript.Shell") WshShell.SendKeys("^ ") WshShell.SendKeys("+{F10}") WshShell.SendKeys("n") ------End cut & paste here------ 2. Run Next_Wallpaper.vbs (example): WSCRIPT.EXE /B /NoLogo Next_Wallpaper.vbs 3. Right-click on an empty Desktop spot -> click "Next desktop background". 4. Make this permanent: use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a new Registry (.reg) file -> copy & paste text strings between Cut & Paste lines below -> save file as Next_Wallpaper.reg (example). 5. Right-click on Next_Wallpaper.reg -> Run as Administrator -> answer Yes/OK to all prompts to register the information into your Registry. 6. From now on you can right-click on an empty Desktop spot -> click "Next desktop background". -----Begin cut & paste here----- REGEDIT4 [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\DesktopBackground\shellex\ContextMenuHandlers\DesktopSlideshow] @="{0bf754aa-c967-445c-ab3d-d8fda9bae7ef}" "Icon"="themecpl.dll,0" "Position"="Bottom" "MUIVerb"="Next &Wallpaper" "SuppressionPolicy"=dword:0 [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0bf754aa-c967-445c-ab3d-d8fda9bae7ef}] @="SlideshowContextMenu" [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0bf754aa-c967-445c-ab3d-d8fda9bae7ef}\InProcServer32] @=hex(2):25,53,79,73,74,65,6d,52,6f,6f,74,25,5c,73,79,73,74,65,6d,33,32,5c,73,\ 74,6f,62,6a,65,63,74,2e,64,6c,6c,00 "ThreadingModel"="Apartment" ; ------End cut & paste here------ * Desktop Background Tuner (DBT) 32-bit: http://www.winaero.com/desktop-background-tuner/ File: http://www.winaero.com/download-desktop-background-tuner/ Extract DesktopBackgroundTuner.exe version which matches your Windows NTx OS edition from DesktopBackgroundTuner.zip archive using an unZIPping/unARChiving/unRARing tool [free(ware)] http://www.mdgx.com/toy.htm#ZIP to the local drive/partition/volume + directory/folder of your choice: - Windows XP/Vista/7 users: DesktopBackgroundTuner.exe from ZIP root [no name] folder; - Windows 8/8.1/10/11 users: DesktopBackgroundTuner.exe from ZIP "Windows 8" folder. * Any Wallpaper: http://www.anyutils.com/anywall.php File: http://www.anyutils.com/download/anywall.exe Requires Microsoft .Net Framework Redistributable (NFR) 2.0/newer (free): http://www.mdgx.com/add.htm#NFR Right-click Taskbar Icon -> Restore main window -> Options -> Choose a wallpaper position: Autofit. Settings: %UserProfile%\AppData\Local\AnyUtils\AnyWall\settings.xml * Logon Background Changer (W7LBC): http://www.julien-manici.com/windows_7_logon_background_changer/ File: http://jmanici.blob.core.windows.net/download/Win7LogonBackgroundChanger_1_5_2.zip * Logon Changer: http://www.tweaks.com/software/tweakslogon/ File: http://www.tweaks.com/software/tweakslogon/download/tweakslogon.zip * Logon Screen Rotator (LSR): http://www.lukepaynesoftware.com/lsrotator/ File: http://www.lukepaynesoftware.com/downloads/lsr_4.4 LSR Guide: http://www.door2windows.com/how-to-automatically-change-your-logon-screen-background-after-an-interval-of-time-in-windows-7/ * Wallpaper Slideshow LT: http://www.gphotoshow.com/wallpaperss.htm File: http://www.gphotoshow.com/files/WallpaperSSLT.exe * Aero Wallpaper Changer (AWC) for Windows 7 Home/Basic: http://www.winaero.com/aerowallpaperchanger/ File: http://www.winaero.com/download-aerowallpaperchanger-adds-cool-aero-color-effects-and-desktop-slideshow-to-windows-7-home-basic/ * Oceanis: http://www.sevenforums.com/tutorials/47294-desktop-background-wallpaper-change-windows-7-starter.html File: http://dl2.sevenforums.com/dl/Oceanis_Change_Background_W7.zip * Windows Wallpaper Changer: http://sourceforge.net/projects/winwallchanger/ File: http://sourceforge.net/projects/winwallchanger/files/ * List of Wallpaper Changers: http://www.techsupportalert.com/content/best-free-wallpaper-changer.htm ______________________________________________________________________________ Free(ware) 7/8/8.1/10/11 Aero Tools + Tweaks * TransparentMenu 32-bit + 64-bit adjusts transparency + assigns colors schemes to Windows + programs right-click menus: http://www.moo0.com/software/TransparentMenu/ File: http://www.moo0.com/software/TransparentMenu/download/free2/ Download: http://www.softpedia.com/get/Desktop-Enhancements/Other-Desktop-Enhancements/Moo0-TransparentMenu.shtml "%UserProfile%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Moo0 Transparent Menu 1.xx.lnk" shortcut command line: TransparentMenu.exe -startup Setup (examples) -> right-click green "Moo0 Transparent Menu" Taskbar/Notification area icon: - Menu Skin (affects system colors) -> UNcheck Change Highlight Colors Together -> Green Tea (Win7) or Charcoal Palette 3 (Win8/newer) - Menu Transparency (%) -> 10% - Start on System Boot -> checked. * Aero Adjuster: http://samusaranfreak.deviantart.com/art/Aero-Adjuster-261383189 File: http://www.deviantart.com/download/261383189/aero_adjuster_by_samusaranfreak-d4bmck5.zip * Winaero Tweaker 32-bit + 64-bit for Windows 7/8/8.1/10/11 [select Portable at install time!]: http://www.winaero.com/winaero-tweaker/ Download: http://www.winaero.com/download-winaero-tweaker/ Winaero Tweaker Features: http://www.winaero.com/the-list-of-winaero-tweaker-features/ Examples: customizes manufacturer/OEM/vendor info, removes icon overlay using transparent icon. * Switcher: http://www.insentient.net/ File: http://www.insentient.net/Files/Projects/Switcher/Switcher-2.0.0.2705.zip * Aura Auto Colorization tool: http://aura.codeplex.com/ http://www.askvg.com/aura-get-windows-8-aero-auto-colorization-feature-in-windows-vista-and-7/ http://www.door2windows.com/get-windows-8-auto-colorization-feature-in-windows-7vista-3/ File: http://aura.codeplex.com/downloads/get/227648 http://angelwzr.deviantart.com/art/Aura-Beta-3-203960157 http://www.deviantart.com/download/203960157/aura_beta_2_by_angelwzr-d3dfknx.zip * 7+ Taskbar Tweaker (7TT) 32-bit + 64-bit (Portable) for Windows 7/newer adds hidden + unavailable Taskbar tray settings beyond Windows capabilities, highly customizable [select Portable at install time]: http://ramensoftware.com/7-taskbar-tweaker/ http://tweaker.ramensoftware.com/ File [Install -> select Portable]: http://ramensoftware.com/downloads/7tt_setup.exe 7+ Taskbar Tweaker (7TT) Guide: http://www.winaero.com/get-a-classic-taskbar-in-windows-8-and-windows-7-that-works-like-xp/ 7+ Taskbar Tweaker (7TT) Advanced Settings: http://tweaker.ramensoftware.com/images/7-taskbar-tweaker.png 7+ Taskbar Tweaker (7TT) Repository: http://github.com/m417z/7-Taskbar-Tweaker/ 7+ Taskbar Tweaker (7TT) Windhawk tweak mods for Windows 11 Taskbar: http://ramensoftware.com/windhawk-mods-for-the-windows-11-taskbar/ BUG: 7+ Taskbar Tweaker (7TT) does NOT (yet) support NEWer Windows 11 Taskbar: http://ramensoftware.com/7-taskbar-tweaker-and-a-first-look-at-windows-11/ FIX: Restore classic Taskbar tray in Windows 11: http://ramensoftware.com/7-taskbar-tweaker-on-windows-11-with-windows-10s-taskbar/ http://www.winaero.com/winaero-tweaker-1-20-1-get-back-windows-10-start-menu-and-taskbar-in-windows-11/ 1. Install Winaero Tweaker: http://www.winaero.com/winaero-tweaker/ 2. Open/run/start Winaero Tweaker. 3. Go to: Windows 11 -> Classic Start Menu and Taskbar -> check "Enable Classic Taskbar and Start menu" box -> click "Sign out now" button. 4. Log on/sign in back into Windows 11 under same user name. 5. Open/run/start 7+ Taskbar Tweaker (7TT) -> customize/tweak settings according to your needs/preferences -> done. * UxStyle for Windows 7/8/8.1/10 Preview: http://www.uxstyle.com/ http://github.com/riverar/uxstyle/ UxStyle for Windows 8/8.1: http://www.uxstyle.com/builds/UxStyle_sep23_x86_x64_possibly_bugged.zip UxStyle for Windows 7/7 SP1: http://www.uxstyle.com/builds/UxStyle_Core_jul13_bits.zip Aero Theme for Windows 8/8.1: http://simplexdesignsart.deviantart.com/art/Windows-Aero-536877982/ http://web.archive.org/web/20130402051457/http://xxinightxx.deviantart.com/art/Windows-7-Vs-REV-D-350491112/ File: http://drive.google.com/uc?export=download&id=0B883uGPmNY72Sjk3dy1MTzBGVEE http://web.archive.org/web/20130402051457/http://www.deviantart.com/download/350491112/windows_7_vs_rev_d_by_xxinightxx-d5so8o8.zip Windows 8/8.1 Themes: http://www.winaero.com/category/windows-8-themes/ * UltraUXThemePatcher 32-bit + 64-bit for Windows XP/Vista/7/8/8.1/10/11 patches UX (User eXperience) Theme system files [uxtheme.dll, uxinit.dll, themeui.dll] to allow use of 3rd party/custom themes: http://mhoefs.eu/software_uxtheme.php UltraUXThemePatcher Guide: http://setupgamer.info/how-to-install-custom-windows-10-themes-and-visual-styles-with-ultrauxthemepatcher/ UltraUXThemePatcher Tutorial: http://www.tenforums.com/customization/76077-ultrauxthemepatcher-recover-black-grey-screen-windows-8-10-a.html Windows 7/newer Themes: http://www.majorgeeks.com/files/categories/themes.html Windows 11 Themes: http://www.deviantart.com/tag/windows11themes/ Windows 10 Themes: http://www.deviantart.com/tag/windows10themes/ http://www.deviantart.com/sagorpirbd/art/Aero-7-Themes-for-Win10-Final-523979941/ http://www.deviantart.com/niivu/art/Sweetness-for-Windows-10-826122176/ Windows 8/8.1 Themes: http://www.deviantart.com/tag/windows8themes/ Windows 7 Themes: http://www.deviantart.com/tag/windows7themes/ View + Remove All built-in Windows 10 Themes: http://www.majorgeeks.com/content/page/how_to_view_and_remove_all_windows_10_themes.html * AeroRainbow for Windows 7/8/8.1/10/11: http://www.winaero.com/aerorainbow/ File: http://www.winaero.com/download.php?view.11 * Windows 7 Start button/icon/logo/orb Changer: http://www.door2windows.com/windows-7-start-button-changer-change-your-windows-7-start-button-with-one-click/ File: http://www.door2windows.com/download-freeware/?obsolete#Windows+7+Start+Orb+Changer Guide: http://www.intowindows.com/windows-7-start-orb-changer-lets-you-quickly-change-start-orb/ * MDGx Aero tools [free(ware)] -> "" section in TOOLS.TXT (included): http://www.mdgx.com/tools.php http://www.mdgx.com/TOOLS.TXT * MDGx Windows NTx Tools -> "Free(ware) Windows NTx Extras" section in SOFTWARE.TXT (included): http://www.mdgx.com/xptoy.htm * MDGx "1000+ Windows NTx Power Toys + Tweaking Tools [99.99% Free(ware)]" section in SOFTWARE.TXT (included): http://www.mdgx.com/toy.htm ______________________________________________________________________________ Free(ware) Windows 7 Replacement Apps + Tweaking Tools * Vista Calculator (CALC.EXE): http://www.askvg.com/get-windows-7-calculator-working-in-windows-vista/ http://www.askvg.com/get-windows-7-like-calculator-in-windows-xp/ http://grdcityboy.deviantart.com/art/Seven-Calculator-102484514 http://www.softpedia.com/reviews/windows/Windows-7-Calculator-Review-106024.shtml http://www.7tutorials.com/windows-calculator-tool-geek-you/ * AeroCalc (Glass Theme): http://www.door2windows.com/how-to-get-glass-calculator-in-windows-7vista/ * Notepad (Glass Theme): http://www.door2windows.com/how-to-get-glass-notepad-in-windows-7vista/ Ribbon Notepad: http://www.door2windows.com/get-notepad-with-ribbon-user-interface-in-windows-7vista/ * Command Prompt (Glass Theme): http://www.door2windows.com/how-to-get-glass-command-prompt-in-windows-7vista/ * Ribbon Image Viewer: http://www.door2windows.com/get-ribbon-user-interface-ui-image-viewer-in-windows-7vistaxp/ * Bubbles, Mystify, Ribbons, Lines + Aurora Screen Savers: http://www.softpedia.com/get/Desktop-Enhancements/Screensavers/Vista-Screensaver-Ported-to-XP.shtml Screen Savers Guides: http://www.door2windows.com/tweak-bubbles-mystify-ribbons-lines-aurora-screensavers/ http://www.howtogeek.com/howto/15088/customize-the-default-screensavers-in-windows-7-and-vista/ http://www.winaero.com/comment.php?comment.news.9 http://www.tweaks.com/windows/39129/the-ultimate-windows-screensaver-tweaking-guide/ * XP Pipes (SSPIPES.SCR) Screen Saver: http://www.bearblain.com/Downloads/sspipes.zip http://www.mdgx.com/3dpipes.jpg * 7Smoker Pro: http://www.xp-smoker.com/7smokerpro.html File: http://www.majorgeeks.com/files/details/7smoker_pro.html * Windows 7/newer tweaking tools [free(ware)]: http://www.winaero.com/ http://www.wintools.info/ http://www.thewindowsclub.com/category/downloads/ http://www.nirsoft.net/utils/ http://www.sordum.org/ http://www.itsamples.com/software.html http://www.mitec.cz/Data/XML/data_downloads.xml http://learn.microsoft.com/sysinternals/ http://www.majorgeeks.com/ http://www.majorgeeks.com/mg/sortname/windows_7_8.html http://www.intowindows.com/15-free-windows-8-1-customization-tweaking-tools/ http://www.nextofwindows.com/a-list-of-windows-8-tweaking-tools/ http://www.thewindowsclub.com/list-freeware-releases-from-the-windows-club/ http://www.softpedia.com/hubs/Tweak-Windows-8/ http://www.snapfiles.com/freeware/system/fwsystweak.html http://www.mdgx.com/xptoy.htm http://www.mdgx.com/toy.htm http://www.mdgx.com/nettoys.htm http://www.mdgx.com/fw.htm http://www.mdgx.com/tools.php * MDGx "List of Windows 7/8/8.1/10/11 Anti-Spyware/Privacy Tools" section in 10_BLOCK.TXT (included): http://www.mdgx.com/xptoy.htm#10BLK http://www.mdgx.com/10BLK/10_BLOCK.php http://www.mdgx.com/10BLK/10_BLOCK.TXT * MDGx "Free(ware) Windows NTx Extras" section in SOFTWARE.TXT (included): http://www.mdgx.com/xptoy.htm * MDGx "1000+ Windows NTx Power Toys + Tweaking Tools [99.9% free(ware)]" section in SOFTWARE.TXT (included): http://www.mdgx.com/toy.htm * MDGx "List of Useful Windows NTx Tools [99.9% free(ware)]" in TOOLS.TXT (included): http://www.mdgx.com/tools.php http://www.mdgx.com/TOOLS.TXT ______________________________________________________________________________ Free(ware) Start Menu Shell Replacements * Open-Shell [Classic Shell fork] 32-bit + 64-bit Start Menu + button/icon/logo/orb, Explorer + IE enhancer, replacer, supports custom skins, buttons/logos, highly customizable (free, open source): http://open-shell.github.io/Open-Shell-Menu/ ReadMe: http://github.com/Open-Shell/Open-Shell-Menu/ Download: http://github.com/Open-Shell/Open-Shell-Menu/releases/ Open-Shell Guides: http://askleo.com/open-shell-regain-your-start-menu-in-windows-and-much-more/ http://www.techrepublic.com/article/how-to-use-open-shell-as-your-windows-10-start-menu/ Custom Start button/icon/logo/orb Tutorial: http://coddec.github.io/Classic-Shell/www.classicshell.net/tutorials/buttontutorial.html Custom Skin Tutorial: http://coddec.github.io/Classic-Shell/www.classicshell.net/tutorials/skintutorial.html Skins: http://www.winaero.com/best-skins-for-classic-shells-start-menu/ http://www.classicshell.net/gallery/Start-Menu/skins/ http://www.classicshell.net/forum/viewforum.php?f=17 Start Buttons/Orbs: http://www.classicshell.net/forum/viewforum.php?f=18 http://www.deviantart.com/w1ck3dmatt/art/Mega-Orb-Pack-150-start-orbs-259940654/ http://www.door2windows.com/customization/start-buttons/ Aero Glass mod [Windows 8/8.1 style UI] for Windows 8/8.1/10/11: http://www.glass8.eu/ Open-Shell/Classic Shell Free(ware) Alternatives: http://classicshell.sourceforge.net/alternatives.html http://classic-shell.en.softonic.com/windows/alternatives/ http://www.alternativeto.net/software/classicshell/ http://www.makeuseof.com/tag/windows-start-menu-alternatives/ http://www.similarindex.com/classic-shell-alternatives/ * Power8 Start Menu replacer for Windows 8/8.1, works with Windows 7: http://github.com/AgentMC/power8/ Download: http://github.com/AgentMC/power8/releases/latest/ * Start Menu X Start Menu replacer [CRIPPLED freeware!] for Windows 7/newer: http://www.startmenux.com/ File: http://www.startmenux.com/StartMenuX_Setup_freeware.exe * Pokki Start Menu replacer for Windows 8/8.1, works with Windows 7: http://www.pokki.com/ File: http://cdn.pokki.com/download/PokkiStartMenuInstaller.exe ______________________________________________________________________________ Turn OFF/ON User Account Control (UAC) * FIX (Temporary): In Windows Vista/newer you must right-click each app/file/executable/program/installer/DOS console (command prompt)/BATch (CoMmanD) file/icon/link/shortcut/script/screen saver/etc and select "Run as Administrator" every time you're trying to use it in order to execute/run it/them the way they were intended, fully functional. Otherwise a nagging dialog box will pop up and you will be prompted to Run.../Open/Save/etc them, or you won't be allowed to execute/run them every time you (double-)click on them directly or their icons/links/shortcuts (.lnk), and you will notice most of them will not execute/function/operate/run properly, and/or are crippled, exhibit abnormalities, limitations, restrictions, and/or inappropriate behavior. ;-( * FIX (Permanent): Turn OFF User Account Control (UAC): - Windows 10/2016/2019/11/2022: http://www.tenforums.com/tutorials/3577-user-account-control-uac-change-settings-windows-10-a.html - Windows 8/2012/8.1/2012 R2: http://www.eightforums.com/tutorials/5509-user-account-control-uac-change-settings-windows-8-a.html - Windows 7/7 SP1/2008 R2: http://petri.com/disable-uac-in-windows-7/ - Windows Vista/2008: http://petri.com/disable_uac_in_windows_vista/ * IMPORTANT: ************ - Always make sure you have Administrative (admin, administrator, main/principal/power user, owner, sysadmin, SYSTEM) privileges + rights for all computer(s)/device(s)/media in your environment (unless you are a user without administrative privileges/rights in a business/enterprise/multiuser connected/networked/shared environment), and that you are using approved/authorized/certified/legitimate/safe/scanned/secure/trustworthy apps/files/programs/software/etc, preferably located + stored on your authorized/sanctioned local/personal storage device(s)/media. - Always make sure all files acquired/copied/downloaded/installed/obtained/etc from external/remote/shared/other sources/media/networks/internet/etc are approved/authorized/certified/legitimate/safe/scanned/secure/trustworthy. - Always make sure to schedule your anti-virus/anti-malware app/program/service/software to check/scan [+ clean-up if necessary] periodically all your computer(s)/device(s) + storage device(s)/media for malware/spyware/viruses. http://www.mdgx.com/vir.htm * UAC_OFF.REG Registry file disables all User Account Control (UAC) annoyances: http://www.tenforums.com/user-accounts-family-safety/98737-standard-user-able-access-admin-folders.html http://batcmd.com/windows/7/services/luafv/ http://parsons-technology.com/what-is-luafv/ http://learn.microsoft.com/windows-hardware/customize/desktop/unattend/microsoft-windows-lua-settings/ http://learn.microsoft.com/windows/security/identity-protection/user-account-control/user-account-control-group-policy-and-registry-key-settings/ http://learn.microsoft.com/windows/security/identity-protection/user-account-control/how-user-account-control-works/ http://learn.microsoft.com/windows/security/identity-protection/user-account-control/user-account-control-security-policy-settings/ http://learn.microsoft.com/openspecs/windows_protocols/ms-gpsb/9ad50fd3-4d8d-4870-9f5b-978ce292b9d8/ http://learn.microsoft.com/openspecs/windows_protocols/ms-gpsb/7c705718-f58e-4886-8057-37c8fd9aede1/ http://www.stigviewer.com/stig/windows_10/2020-06-15/finding/V-63827 http://admx.help/?Category=Windows_10_2016&Policy=Microsoft.Policies.Auditing::IncludeCmdLine 1st Things 1st: *************** BACKUP YOUR REGISTRY BEFORE MAKING ANY CHANGES! -> See "BACKUP/EXPORT + RESTORE/IMPORT REGISTRY/REGISTRY KEY(S)" in WINDOWS7.TXT (this file): http://www.mdgx.com/7.php#:~:text=BACKUP%2FEXPORT%20%2B%20RESTORE%2FIMPORT%20REGISTRY%2FREGISTRY%20KEY%28S%29%20%21 WARNING: ******** If LUAfv service [provided by the %WinDir%\SYSTEM32\DRIVERS\luafv.sys driver] is disabled [.reg file below: "Start"=dword:4] certain Windows components/features/functions will not work, and Windows Server users may experience errors in multiuser/networked/shared/enterprise/server environments: http://developpaper.com/windows-ad-error-message-resolution-uac-file-virtualization-service-failed-to-start-this-driver-is-blocked-from-loading/ http://www.wincert.net/windows-server/event-id-7000-uac-file-virtualization-error/ http://www.microsoftpressstore.com/articles/article.aspx?p=2228450&seqNum=9 http://www.programmersought.com/article/27216104324/ Examples: - Internet Explorer (IE) [discontinued!] sandbox mode = DISABLED; - Live/Metro/Screen/Start/Tile (Store) UWP (Universal Windows Platform) apps = DISABLED; - certain Windows Server components + functions = DISABLED. CAUTION: ******** This requires adequate/advanced knowledge about critical computing, operating systems, shared environments, networks, cybersecurity. http://www.mdgx.com/importnt.php Recommended for single user environments without any add-ons/components/extensions/extras/features/services which may require specific configurations/items/properties/settings for proper operation. Not recommended for multiuser/networked/shared/enterprise/server environments processing/storing/delivering encrypted/protected/secure critical/private/sensitive/vital analysis/data/information. TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK to all prompts to register/merge/import its information into your registry. -----Begin cut & paste here----- REGEDIT4 ; MUST restart/reboot after turning UAC ON or OFF ! ; Disable User Account Control file virtualization (LUAfv) Service: [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\luafv] "Start"=dword:4 ; Disable ALL UAC settings: [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System] "ConsentPromptBehaviorAdmin"=dword:0 "ConsentPromptBehaviorUser"=dword:1 "DisableStatusMessages"=dword:0 "DontDisplayLastUserName"=dword:0 "EnableInstallerDetection"=dword:0 "EnableLUA"=dword:0 "EnableSecureUIAPaths"=dword:0 "EnableUIADesktopToggle"=dword:1 "EnableVirtualization"=dword:1 "FilterAdministratorToken"=dword:0 "NoInternetOpenWith"=dword:1 "PromptOnSecureDesktop"=dword:0 "SCForceOption"=dword:0 "SynchronousMachineGroupPolicy"=dword:0 "SynchronousUserGroupPolicy"=dword:0 "ValidateAdminCodeSignatures"=dword:0 "VerboseStatus"=dword:0 ; ------End cut & paste here------ Perform same steps for UAC_OFF.BAT BATch (.bat) file, which also disables UAC: TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text BATch (.bat) or CoMmanD (.cmd) script file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the BAT (.bat) or CMD (.cmd) extension -> right-click it -> Run as Administrator -> wait for completion. -----Begin cut & paste here----- @ECHO OFF IF NOT "%OS%"=="Windows_NT" GOTO END :: MUST restart/reboot after turning UAC ON or OFF ! :: Disable User Account Control file virtualization (LUAfv) Service: ECHO Y|NET.EXE STOP luafv SC.EXE CONFIG luafv START= disabled :: Disable UAC: REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v EnableLUA /t REG_DWORD /d 0 /f :END EXIT ------End cut & paste here------ Restart/reboot. * UAC_ON.REG Registry file enables all User Account Control (UAC) annoyances: http://www.tenforums.com/user-accounts-family-safety/98737-standard-user-able-access-admin-folders.html http://learn.microsoft.com/windows/security/identity-protection/user-account-control/user-account-control-group-policy-and-registry-key-settings/ http://learn.microsoft.com/windows/security/identity-protection/user-account-control/how-user-account-control-works/ http://learn.microsoft.com/windows/security/identity-protection/user-account-control/user-account-control-security-policy-settings/ http://learn.microsoft.com/openspecs/windows_protocols/ms-gpsb/9ad50fd3-4d8d-4870-9f5b-978ce292b9d8/ http://learn.microsoft.com/openspecs/windows_protocols/ms-gpsb/7c705718-f58e-4886-8057-37c8fd9aede1/ http://www.stigviewer.com/stig/windows_10/2020-06-15/finding/V-63827 http://admx.help/?Category=Windows_10_2016&Policy=Microsoft.Policies.Auditing::IncludeCmdLine CAUTION: ******** This requires adequate/advanced knowledge about critical computing, operating systems, shared environments, networks, cybersecurity. http://www.mdgx.com/importnt.php Recommended for single user environments without any add-ons/components/extensions/extras/features/services which may require specific configurations/items/properties/settings for proper operation. Not recommended for multiuser/networked/shared/enterprise/server environments processing/storing/delivering encrypted/protected/secure critical/private/sensitive/vital analysis/data/information. TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK to all prompts to register/merge/import its information into your registry. -----Begin cut & paste here----- REGEDIT4 ; MUST restart/reboot after turning UAC ON or OFF ! ; Enable User Account Control file virtualization (LUAfv) Service: [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\luafv] "Start"=dword:2 ; Enable ALL UAC settings: [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System] "ConsentPromptBehaviorAdmin"=dword:2 ; "ConsentPromptBehaviorUser"=dword:3 "ConsentPromptBehaviorUser"=dword:0 "DisableStatusMessages"=dword:1 "DontDisplayLastUserName"=dword:1 "EnableInstallerDetection"=dword:1 "EnableLUA"=dword:1 "EnableSecureUIAPaths"=dword:1 "EnableUIADesktopToggle"=dword:0 "EnableVirtualization"=dword:0 "FilterAdministratorToken"=dword:1 "NoInternetOpenWith"=dword:0 "PromptOnSecureDesktop"=dword:1 "SCForceOption"=dword:1 "SynchronousMachineGroupPolicy"=dword:1 "SynchronousUserGroupPolicy"=dword:1 "ValidateAdminCodeSignatures"=dword:1 "VerboseStatus"=dword:1 ; ------End cut & paste here------ Perform same steps for UAC_ON.BAT BATch (.bat) file, which also enables UAC: TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text BATch (.bat) or CoMmanD (.cmd) script file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the BAT (.bat) or CMD (.cmd) extension -> right-click it -> Run as Administrator -> wait for completion. -----Begin cut & paste here----- @ECHO OFF IF NOT "%OS%"=="Windows_NT" GOTO END :: MUST restart/reboot after turning UAC ON or OFF ! :: Enable User Account Control file virtualization (LUAfv) Service: ECHO Y|NET.EXE START luafv SC.EXE CONFIG luafv START= auto :: Enable UAC: REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v EnableLUA /t REG_DWORD /d 1 /f :END EXIT ------End cut & paste here------ Restart/reboot. * Elevate low/standard/Administrator level end/home/local/single user access/permissions/privileges/rights to system wide/network/server Administrator/SYSTEM/Sysadmin level in Windows Vista/newer: http://www.tenforums.com/user-accounts-family-safety/98737-standard-user-able-access-admin-folders.html http://learn.microsoft.com/windows/security/identity-protection/user-account-control/user-account-control-group-policy-and-registry-key-settings/ http://learn.microsoft.com/windows/security/identity-protection/user-account-control/how-user-account-control-works/ http://learn.microsoft.com/windows/security/identity-protection/user-account-control/user-account-control-security-policy-settings/ http://learn.microsoft.com/openspecs/windows_protocols/ms-gpsb/9ad50fd3-4d8d-4870-9f5b-978ce292b9d8/ http://learn.microsoft.com/openspecs/windows_protocols/ms-gpsb/7c705718-f58e-4886-8057-37c8fd9aede1/ http://www.stigviewer.com/stig/windows_10/2020-06-15/finding/V-63827 http://admx.help/?Category=Windows_10_2016&Policy=Microsoft.Policies.Auditing::IncludeCmdLine 1st Things 1st: *************** BACKUP YOUR REGISTRY BEFORE MAKING ANY CHANGES! -> See "BACKUP/EXPORT + RESTORE/IMPORT REGISTRY/REGISTRY KEY(S)" in WINDOWS7.TXT (this file): http://www.mdgx.com/7.php#:~:text=BACKUP%2FEXPORT%20%2B%20RESTORE%2FIMPORT%20REGISTRY%2FREGISTRY%20KEY%28S%29%20%21 CAUTION: ******** This requires adequate/advanced knowledge about critical computing, operating systems, shared environments, networks, cybersecurity. http://www.mdgx.com/importnt.php Recommended for single user environments without any add-ons/components/extensions/extras/features/services which may require specific configurations/items/properties/settings for proper operation. Not recommended for multiuser/networked/shared/enterprise/server environments processing/storing/delivering encrypted/protected/secure critical/private/sensitive/vital analysis/data/information. TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK to all prompts to register/merge/import its information into your registry. -----Begin cut & paste here----- REGEDIT4 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System] "ConsentPromptBehaviorAdmin"=dword:0 "ConsentPromptBehaviorUser"=dword:3 "EnableFullTrustStartupTasks"=dword:1 "EnableInstallerDetection"=dword:0 "EnableLUA"=dword:0 "EnableSecureUIAPaths"=dword:0 "EnableUwpStartupTasks"=dword:1 "EnableUIADesktopToggle"=dword:1 "EnableVirtualization"=dword:1 "FilterAdministratorToken"=dword:1 "PromptOnSecureDesktop"=dword:0 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Audit] "ProcessCreationIncludeCmdLine_Enabled"=dword:0 ; ------End cut & paste here------ OR: BATch (.bat)/CoMmanD (.cmd) script below 1st checks if the user has Administrator/SYSTEM/Sysadmin access/permissions/privileges/rights, and only if condition is met it will run the script, otherwise it will abort and exit (example): http://stackoverflow.com/questions/14639743/ http://www.robvanderwoude.com/clevertricks.php http://stackoverflow.com/questions/4051883/ http://superuser.com/questions/667607/ http://www.sevenforums.com/tutorials/11949-elevated-program-shortcut-without-uac-prompt-create.html TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text BATch (.bat) or CoMmanD (.cmd) script file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the BAT (.bat) or CMD (.cmd) extension -> right-click it -> Run as Administrator -> wait for completion. -----Begin cut & paste here----- @ECHO OFF IF NOT "%OS%"=="Windows_NT" GOTO END NET.EXE session IF %ERRORLEVEL% EQU 0 ( ECHO. ECHO  ECHO You seem to have (Sys)Admin/SYSTEM privileges. Continue... ECHO  ECHO. :: ECHO Press a key to continue... :: PAUSE >NUL 2>&1 GOTO CNT ) ELSE ( ECHO. ECHO  ECHO Administrator/SYSTEM/Sysadmin *REQUIRED* to perform operations below ! ECHO Right-click this BATch/icon/shortcut + select "Run as Administrator", ECHO OR log/sign back in as Administrator/SYSTEM/Sysadmin + then repeat step above. ECHO  ECHO. ECHO Press a key to exit... PAUSE >NUL 2>&1 GOTO END EXIT /B 1 ) :CNT ECHO. ECHO  ECHO Make sure you're familiar with all settings below *before* running ECHO this script = see web pages at the top of this topic for info. ECHO Abort if you need more time, then run this BATch again when ready. ECHO  ECHO. ECHO * Press a key to continue, OR... ECHO * Hold Ctrl + press Break/Pause -> press Y -> press Enter to abort... PAUSE >NUL 2>&1 :: Admin Consent: 0 = Elevate without prompting | 1 = Prompt for credentials secure desktop | 2 = Prompt for consent secure :: desktop | 3 = Prompt for credentials | 4 = Prompt for consent | 5 = Prompt for consent non-Windows binaries [DEFAULT]: REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "ConsentPromptBehaviorAdmin" /t REG_DWORD /d 0 /f :: User Consent: 0 = Automatically deny elevation requests | 1 = Prompt for credentials on secure desktop | 3 = Prompt for :: credentials [DEFAULT]: REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "ConsentPromptBehaviorUser" /t REG_DWORD /d 3 /f :: Allow fully trusted startup tasks: 0 = Disabled | 1 = Enabled | 2 = Filtered (UAC) [DEFAULT]: REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableFullTrustStartupTasks" /t REG_DWORD /d 1 /f :: Detect app installs and prompt for elevation: 1 = Enabled [DEFAULT = Home] | 0 = Disabled [DEFAULT = Enterprise]: REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableInstallerDetection" /t REG_DWORD /d 0 /f :: Run all Admins in Admin approval mode: 0 = Disabled (UAC) | 1 = Enabled (UAC): REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t REG_DWORD /d 0 /f :: Elevate only UIAccess apps installed in secure locations: 0 = Disabled | 1 = Enabled [DEFAULT]: REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableSecureUIAPaths" /t REG_DWORD /d 0 /f :: Allow UWP (Universal Windows Platform) startup tasks: 0 = Disabled [DEFAULT] | 1 = Enabled | 2 = Filtered (UAC) [?]: REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableUwpStartupTasks" /t REG_DWORD /d 1 /f :: Allow UIAccess apps to prompt for elevation without secure desktop: 0 = Disabled [DEFAULT] | 1 = Enabled: REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableUIADesktopToggle" /t REG_DWORD /d 1 /f :: Enable virtualization: 0 = Disabled | 1 = Enabled [DEFAULT]: REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableVirtualization" /t REG_DWORD /d 1 /f :: Admin approval mode for built-in Admin account: 0 = Disabled [DEFAULT] | 1 = Enabled: REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "FilterAdministratorToken" /t REG_DWORD /d 1 /f :: Allow UIAccess apps to prompt for elevation without secure desktop: 0 = Disabled [DEFAULT] | 1 = Enabled: REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "PromptOnSecureDesktop" /t REG_DWORD /d 0 /f :: Command-line audit logging: 1 = Enable command-line audit logging | 0 = Disable command-line audit logging: REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Audit" /v "ProcessCreationIncludeCmdLine_Enabled" /t REG_DWORD /d 0 /f :END EXIT ------End cut & paste here------ BATch (.bat)/CoMmanD (.cmd) script example bellow elevates user access/permissions/privileges/rights to "Run as Administrator", and continues running it in the same session without exiting. Just replace [cut & paste] the 2 lines bellow the ") ELSE (" line with your desired script code -> see comment line starting with a double colon [:: ]: http://www.robvanderwoude.com/clevertricks.php TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text BATch (.bat) or CoMmanD (.cmd) script file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the BAT (.bat) or CMD (.cmd) extension -> right-click it -> Run as Administrator -> wait for completion. -----Begin cut & paste here----- @ECHO OFF IF NOT "%OS%"=="Windows_NT" GOTO END IF '%ERRORLEVEL%' NEQ '0' ( ECHO SET UAC=CreateObject^("Shell.Application"^)>"%TEMP%\runasadm.vbs" ECHO UAC.ShellExecute "%~s0","","","runas",1>>"%TEMP%\runasadm.vbs" "%TEMP%\runasadm.vbs" DEL /F /Q "%TEMP%\runasadm.vbs" EXIT /B ) ELSE ( :: Replace next 2 lines with script code you wish to run as Administrator: PUSHD "%CD%" CD /D "%~dp0" ) :END EXIT ------End cut & paste here------ * Turn OFF Secure (Dimmed) Desktop for User Account Control (UAC) prompt in Windows 7/newer: http://msdn.microsoft.com/library/cc232766.aspx http://www.tenforums.com/tutorials/112520-enable-disable-dimmed-secure-desktop-uac-prompt-windows.html http://github.com/okieselbach/Intune/blob/master/DisablePromptOnSecureDesktop.ps1 TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK to all prompts to register/merge/import its information into your registry. -----Begin cut & paste here----- REGEDIT4 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System] "PromptOnSecureDesktop"=dword:0 ; ------End cut & paste here------ * Change User Account Control (UAC) settings in Windows 7/newer: - Disable Windows User Access Control (UAC): http://www.keithholloway.net/blog/how-to-disable-windows-user-access-control-uac/ - Registry Tweaks to Customize User Account Control (UAC) Options in Windows Vista and Later: http://www.askvg.com/how-to-tweak-user-account-control-uac-options-in-windows-vista-home-basic-home-premium/ - UAC and Application Run Levels: http://www.slickit.ca/2009/05/uac-and-application-run-levels.html - MSKB: Disable UAC Prompt for certain apps: http://web.archive.org/web/20080103052016/http://support.microsoft.com/kb/946932 - MSKB: Disabling UAC Prompt for certain apps: http://web.archive.org/web/20121225075400/http://kartones.net/blogs/kartones/archive/2008/01/21/kb946932-disabling-uac-prompt-for-certain-apps-not-that-useful.aspx - Selectively disable UAC for trusted Windows Vista/7/newer apps: http://www.techrepublic.com/blog/windows-and-office/selectively-disable-uac-for-your-trusted-vista-applications/ - MS DOCs: UAC Group Policy Settings and Registry Key Settings: http://technet.microsoft.com/library/dd835564.aspx - MSDN: FilterAdministratorToken Registry DWORD [REG_DWORD] value: http://msdn.microsoft.com/library/cc232760.aspx - MSDN: ConsentPromptBehaviorAdmin Registry DWORD [REG_DWORD] value: http://msdn.microsoft.com/library/cc232761.aspx - MSDN: ConsentPromptBehaviorUser Registry DWORD [REG_DWORD] value: http://msdn.microsoft.com/library/cc232762.aspx - MSDN: EnableInstallerDetection Registry DWORD [REG_DWORD] value: http://msdn.microsoft.com/library/cc232763.aspx - MSDN: ValidateAdminCodeSignatures Registry DWORD [REG_DWORD] value: http://msdn.microsoft.com/library/cc232764.aspx - MSDN: EnableLUA Registry DWORD [REG_DWORD] value: http://msdn.microsoft.com/library/cc232765.aspx - MSDN: PromptOnSecureDesktop Registry DWORD [REG_DWORD] value: http://msdn.microsoft.com/library/cc232766.aspx - MSDN: EnableVirtualization Registry DWORD [REG_DWORD] value: http://msdn.microsoft.com/library/cc232767.aspx - MSKB: PromptOnSecureDesktop Registry Value: http://support.microsoft.com/help/975788/ - Configure Windows UAC prompt behavior for admins and users: http://www.ghacks.net/2013/06/20/how-to-configure-windows-uac-prompt-behavior-for-admins-and-users/ - Changing How UAC Works (The Hard Way): http://sourcedaddy.com/windows-7/changing-how-uac-works-the-hard-way.html - Windows 7: User Account Control (UAC) Change Notification Settings: http://www.sevenforums.com/tutorials/299-user-account-control-uac-change-notification-settings.html - MSKB: Adjust User Account Control Settings in Windows 7/8/8.1: http://support.microsoft.com/help/975787/ * Free(ware) User Account Control (UAC) tools: - UAC Pass 32-bit + 64-bit: http://sites.google.com/site/freeavvarea/uac-pass/uac-pass/ Download: http://www.majorgeeks.com/files/details/uac_pass.html - TweakUAC: http://www.winability.com/tweak-uac/ Download: http://www.majorgeeks.com/files/details/tweakuac.html File: http://www.winability.com/download/TweakUAC.exe - Disable UAC: http://www.majorgeeks.com/files/details/disable_uac.html * Always Run as Administrator: http://www.superuser.com/questions/204781/ A. Add User to Administrators Group + remove User from Users Group: 1. Log/sign in as Administrator -> Run... [hold WinKey + press R] -> type: CONTROL.EXE userpasswords2 -> press Enter. 2. Your Account Name -> Properties -> Group Membership tab -> Administrators -> OK -> OK. B. Disable Approval Mode: http://www.askvg.com/how-to-tweak-user-account-control-uac-options-in-windows-vista-home-basic-home-premium/ http://www.tweakhound.com/vista/tweakguide/page_5.htm http://msdn.microsoft.com/library/cc232771.aspx 1. Log/sign in as Administrator -> Run... [hold WinKey + press R] -> type: SECPOL.MSC -> press Enter. 2. Local Polices -> Security Options. 3. User Account Control (UAC): Switch to secure desktop when prompting for elevation -> Disable -> OK. 4. Must restart/reboot for these changes to take effect. * Windows NTx NTFS Access Control List (ACL) ownership/access/elevation/permissions + run as Administrator free(ware) tools -> "NTFS ACL + OWNER" -> TOOLS.TXT (included): http://www.mdgx.com/tools.php http://www.mdgx.com/TOOLS.TXT MDGx "Access Control Lists (ACL) + Ownership Tools" [free(ware)] for Windows NTx" topic in SOFTWARE.TXT (included): http://www.mdgx.com/xptoy.htm#ACL ______________________________________________________________________________ Free(ware) BOOT Tools + Tweaks * MDGx "Free(ware) Windows Boot Managers" section in SOFTWARE.TXT (included): http://www.mdgx.com/toy.htm#BOO * MDGx "Free(ware) Windows Boot Tweakers" section in SOFTWARE.TXT (included): http://www.mdgx.com/toy.htm#BINI * MDGx "Free(ware) DOS Boot Managers" section in SOFTWARE.TXT (included): http://www.mdgx.com/dos.htm#BTM * MDGx "BOOT 7" + "RECOVERY" sections in TOOLS.TXT (included): http://www.mdgx.com/tools.php http://www.mdgx.com/TOOLS.TXT * BellaVista 32-bit + 64-bit BOOT.INI, Boot Configuration Data (BCD) + BCDEdit.exe interface (GUI) tweaking tool: http://www.zezula.net/en/fstools/bellavista.html File: http://www.zezula.net/download/bellavista_en.zip * Visual BCD Editor (VBCDE) Boot Configuration Data (BCD) + BCDEdit.exe interface (GUI) tweaking tool: http://www.boyans.net/ VBCDE Download: http://www.boyans.net/DownloadVisualBCD.html File: http://www.boyans.net/VisualBcd/VisualBcd_0.9.3.1.msi VBCDE DOCument: http://www.boyans.net/VisualBCD_doc.htm VBCDE Guide: http://www.boyans.net/VBCD_HowTo.html * Dual-Boot Repair (DBR) GUI tool repairs any Windows XP/newer multi-boot setup: http://www.boyans.net/dual-boot-repair-windows-10.html File: http://www.boyans.net/dbr7/dbr-1.3.0.0.zip Online Help: http://www.boyans.net/DualBootRepairHelp.html Repair Windows boot: http://www.boyans.net/RepairWindows/repair-windows-boot.html Requires Microsoft .Net Framework Redistributable (NFR) 2.0/newer (free): http://www.mdgx.com/add.htm#NFR * EasyBCD Community Edition 32-bit Boot Configuration Data (BCD), BCDEDIT.EXE + BOOT.INI interface (GUI) tweaking tool: http://www.neosmart.net/EasyBCD/ File: http://www.softpedia.com/get/System/OS-Enhancements/EasyBCD.shtml EasyBCD Online DOCumentation: http://www.neosmart.net/wiki/easybcd/ * MBRFix 32-bit + 64-bit DOS console command line MBR/EMBR [(Extended) Master Boot Record] creator/editor/backup/repair/restore tool: http://sysint.no/en/mbrfix/ File: http://sysint.no/wp-content/uploads/mbrfix.zip http://www.softpedia.com/get/System/Hard-Disk-Utils/MBRFix.shtml MBR (Master Boot Record) Guide: http://thestarman.pcministry.com/asm/mbr/#MBR Wikipedia: Master Boot Record: http://en.wikipedia.org/wiki/Master_boot_record Wikipedia: Extended (Partition) Boot Record: http://en.wikipedia.org/wiki/Extended_boot_record * Stop Check Disk (ChkDsk) from Running at Startup: http://www.top-password.com/blog/stop-check-disk-chkdsk-from-running-at-startup/ http://www.top-password.com/blog/how-to-manually-clear-or-set-dirty-bit-on-windows-volume/ http://learn.microsoft.com/windows-server/administration/windows-commands/chkntfs/ http://www.ss64.com/nt/chkntfs.html Check Disk (ChkDsk) [CHKDSK.EXE] + Check NTFS (ChkNTFS) [CHKNTFS.EXE] DOS console command line tools are both located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually C:\WINDOWS]. View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command PATH -> press Enter. Exclude all drives/partitions/volumes from boot/startup check + turn OFF check NTFS disk/partition/volume AUTOCHK countdown time: from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run these commands -> press Enter after each line: CHKNTFS.EXE /X C: D: E: F: G: H: I: J: K: L: M: N: O: P: Q: R: S: T: U: V: W: X: Y: Z: CHKNTFS.EXE /T:0 View these DOS console tools command line options, switches + parameters: from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE] right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run these commands -> press Enter after each line: CHKDSK.EXE /? CHKNTFS.EXE /? * Turn ON Solid State memory Drive (SSD) TRIM Advanced Technology Attachment (ATA) command to maximize performance for all available/configured/connected/installed/linked/local/networked/remote/removable physical/logical cards/devices/discs/disks/media/sticks drives/partitions/volumes in Windows 7/newer using File System Utility (FSUtil) [FSUTIL.EXE] command line tool: http://learn.microsoft.com/windows-server/administration/windows-commands/fsutil/ http://learn.microsoft.com/windows-server/administration/windows-commands/fsutil-8dot3name/ http://learn.microsoft.com/windows-server/administration/windows-commands/fsutil-behavior/ http://www.ss64.com/nt/fsutil.html http://www.commandwindows.com/fsutil.htm TRIM ATA command: http://en.wikipedia.org/wiki/Trim_(computing) Troubleshoot Disks + File Systems: http://technet.microsoft.com/library/bb457122.aspx Windows 7/7 SP1 FSUTIL.EXE Hotfix/Update 32-bit + 64-bit improves compatibility with Advanced Format Disk Drives (AFD): http://support.microsoft.com/help/982018/ Download: http://www.catalog.update.microsoft.com/search.aspx?q=KB982018 - FSUTIL.EXE Hotfix 64-bit for Windows 7/7 SP1 64-bit (x64): http://download.windowsupdate.com/msdownload/update/software/updt/2011/04/windows6.1-kb982018-v3-x64_7853a1c9c63611e17cd2c923704bf2e924bdfe7b.msu - FSUTIL.EXE Hotfix 32-bit for Windows 7/7 SP1 32-bit (x86): http://download.windowsupdate.com/msdownload/update/software/updt/2011/04/windows6.1-kb982018-v3-x86_b009d84249f14d4eaae7aa522be37c38dd83531b.msu Advanced Format Disk (AF): http://en.wikipedia.org/wiki/Advanced_Format FSUTIL behavior command line options, switches + parameters: http://technet.microsoft.com/library/cc785435.aspx FSUtil quota command line options, switches + parameters: http://technet.microsoft.com/library/cc788136.aspx FSUtil resource command line options, switches + parameters: http://technet.microsoft.com/library/ff621564.aspx FSUtil usn command line options, switches + parameters: http://technet.microsoft.com/library/cc788042.aspx FSUtil fsinfo command line options, switches + parameters: http://technet.microsoft.com/library/cc788080.aspx FSUtil 8dot3name command line options, switches + parameters: http://technet.microsoft.com/library/ff621566.aspx FSUtil dirty command line options, switches + parameters: http://technet.microsoft.com/library/cc788091.aspx FSUtil file command line options, switches + parameters: http://technet.microsoft.com/library/cc788058.aspx Monitor Disk Space using FSUtil: http://www.sqlservercentral.com/blogs/powersql-by-prashanth-jayaram/2016/09/27/sql-server-monitoring-disk-space-with-fsutil-command-line-utility/ Monitor File System using FSUtil: http://tutorial.wmlcloud.com/windows_server/Windows-Server-2008-Server-Core---Monitoring-the-File-System-with-the-FSUtil-Command-(part-1)---Behavior,-Dirty---File.aspx Some of the FSUtil command line parameters correspond to Registry DWORD [REG_DWORD] 32-bit values under the Hive Key Local Machine (HKLM) FileSystem subkey: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\FileSystem Examples: FSUtil Parameter Registry Value ————————————————————————————————————————————————————————————— AllowExtChar NtfsAllowExtendedCharacterIn8dot3Name BugcheckOnCorrupt NtfsBugcheckOnCorrupt Disable8dot3 NtfsDisable8dot3NameCreation DisableCompression NtfsDisableCompression DisableDeleteNotify DisableDeleteNotification DisableEncryption NtfsDisableEncryption DisableLastAccess NtfsDisableLastAccessUpdate EncryptPagingFile NtfsEncryptPagingFile MemoryUsage NtfsMemoryUsage FSUtil [FSUTIL.EXE] DOS console command line tool is located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually C:\WINDOWS]. View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command PATH -> press Enter. Turn ON SSD/NVMe TRIM ATA command http://en.wikipedia.org/wiki/Trim_(computing) to maximize performance for all local/removable physical/logical SSD/NVMe disks/partitions/volumes (if any), including the boot disk/partition -> DisableDeleteNotify [ 0 = ON | 1 = OFF ]: http://www.howtogeek.com/257196/how-to-check-if-trim-is-enabled-for-your-ssd-and-enable-it-if-it-isnt/ http://www.thomas-krenn.com/en/wiki/Optimize_Windows_for_SSDs http://www.pchardwarehelp.com/guides/optimize-ssd-windows.php http://www.howtogeek.com/256859/dont-waste-time-optimizing-your-ssd-windows-knows-what-its-doing/ From a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run these commands -> press Enter after each line (examples): FSUTIL.EXE behavior set DisableDeleteNotify 0 FSUTIL.EXE behavior set AllowExtChar 1 FSUTIL.EXE behavior set BugcheckOnCorrupt 0 FSUTIL.EXE behavior set DisableCompression 0 FSUTIL.EXE behavior set DisableEncryption 0 FSUTIL.EXE behavior set DisableLastAccess 0 FSUTIL.EXE behavior set EncryptPagingFile 1 FSUTIL.EXE behavior set MemoryUsage 2 FSUTIL.EXE behavior set Disable8dot3 0 View FSUtil [FSUTIL.EXE] command line options, switches + parameters (examples): from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE] right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run these commands -> press Enter after each line: FSUTIL.EXE FSUTIL.EXE behavior set * Turn OFF Maintain Objects List (MOL) global flag for local open files + turn OFF all local/removable physical/logical disks/partitions/volumes performance counters: http://learn.microsoft.com/windows-server/administration/windows-commands/openfiles/ http://learn.microsoft.com/windows-server/administration/windows-commands/diskperf/ http://www.ss64.com/nt/openfiles.html Open Files (OpenFiles) [openfiles.exe] + Disk Performance (DiskPerf) [DISKPERF.EXE] DOS console command line tools are located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually C:\WINDOWS]. From a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run these commands -> press Enter after each line: openfiles.exe /Local OFF DISKPERF.EXE -N View these DOS console tools command line options, switches + parameters: from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE] right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run these commands -> press Enter after each line: openfiles.exe /? DISKPERF.EXE /? See also "* Turn OFF Diagnostic Tracing [DiagTrack], Data Collection/Logging [DataCollection], Telemetry + Performance Counters..." section further above. * BootCfg [BOOTCFG.EXE] is located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually C:\WINDOWS]: http://learn.microsoft.com/windows-server/administration/windows-commands/bootcfg/ View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command PATH -> press Enter. Windows Recovery Console (WRC) command used to build or modify the BOOT.INI file in Windows 2000/XP/2003 -> "FREE Windows 9x/NTx Boot Tweakers" -> SOFTWARE.TXT (included): http://www.mdgx.com/toy.htm#BINI BootCfg can be used to multi-boot with other operating systems (OSes) like Windows 9x/NTx, Linux, etc. NOTE: In Windows 2000/XP/2003 BootCfg is available only from within the Recovery Console. View BootCfg [BOOTCFG.EXE] options, switches + parameters: from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE] right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter: BOOTCFG.EXE /? * Switch Windows Vista/7/7 SP1 Boot Disk drive/partition/volume letters using BcdBoot [BCDBOOT.EXE]: http://www.hanselman.com/blog/SwitchingMyWindows7BootDiskFromDToCWithBCDBootRatherThanBCDEdit.aspx http://social.technet.microsoft.com/forums/windows/1a909e7c-6ffe-48df-a179-6cba7256e836/ http://www.boyans.net/MoveWindows7BootFilesToAnotherDrive.html BcdBoot is a Windows Vista/7/7 SP1 BCD boot file creation + repair command line tool. BcdBoot [BCDBOOT.EXE] is available only in Windows Vista/7/7 SP1, and is located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually C:\WINDOWS]. View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command PATH -> press Enter. View BcdBoot command line options, switches + parameters: from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE] right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command BCDBOOT.EXE /? -> press Enter. * BcdEdit [BCDEDIT.EXE] is available only in Windows Vista/7/7 SP1, and is located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually C:\WINDOWS]: View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command PATH -> press Enter. Boot Configuration Data Store Editor. BcdEdit Command Line Options: http://technet.microsoft.com/library/cc709667.aspx BcdEdit Guide: http://diddy.boot-land.net/bcdedit/ BcdEdit commands: http://diddy.boot-land.net/bcdedit/files/commands_list.htm BcdEdit command line tool: http://www.sevenforums.com/tutorials/2676-bcdedit-how-use.html Use BcdEdit to dual-boot multiple Windows: http://www.superuser.com/questions/511582/ Dual-boot Windows 7 and Linux using BcdEdit: http://www.iceflatline.com/2009/09/how-to-dual-boot-windows-7-and-linux-using-bcdedit/ Load/Install Grub4Dos from Windows: http://diddy.boot-land.net/grub4dos/files/install_windows.htm BCDEDIT.EXE command line tool modifies the boot configuration data store. The boot configuration data store contains boot configuration parameters and controls how the operating system is booted. These parameters were previously in the Boot.ini file (in BIOS-based operating systems) or in the nonvolatile RAM entries (in Extensible Firmware Interface-based operating systems). You can use BcdEdit to add, delete, edit, and append entries in the boot configuration data store. View BcdEdit [BCDEDIT.EXE] command line options, switches + parameters: from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE] right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run these commands -> press Enter after each line: BCDEDIT.EXE /? BCDEDIT.EXE /? TOPICS BCDEDIT.EXE /? /createstore * BootRec [BOOTREC.EXE] is available only in Windows Vista/7/7 SP1, and is located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually C:\WINDOWS]: http://support.microsoft.com/help/927392/ View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command PATH -> press Enter. You can use the Bootrec.exe tool in Windows Recovery Environment (Windows RE) to troubleshoot and repair certain functions/items: - master boot record (MBR). - boot sector. - Boot Configuration Data (BCD) store. NOTE: When you are troubleshooting startup issues by using Windows RE, you should first try the Startup Repair option in the System Recovery Options dialog box. If the Startup Repair option does not resolve the issue, or if you must troubleshoot more steps manually, use BootRec. To run BootRec you must boot from Windows RE: 1. Place Windows Vista/7/7 SP1 install disc/USB in the disc drive/USB port and start your computer. 2. Press a key when prompted. 3. Select language, time, currency, keyboard or input method and then click Next. 4. Click Repair your computer. 5. Click the operating system you want to repair and then click Next. 6. In System Recovery Options dialog box click Command Prompt. 7. Type Bootrec.exe and then press Enter. NOTE: To boot up from a Windows Vista/7/7 SP1 DVD/BD your computer must be configured to start from the DVD/BD drive. Refer to your documentation/guidelines/manuals/readme files or contact the manufacturer/support/vendor for information. NOTE: Use BootRec to troubleshoot "Bootmgr Is Missing" issue. If rebuilding the BCD does not resolve the startup issue, you can export and delete the BCD, and then run this option again. This method makes sure BCD is completely rebuilt. To do this type the following commands at the Windows RE command prompt: bcdedit /export C:\BCD_Backup c: cd boot attrib bcd -s -h -r ren c:\boot\bcd bcd.old bootrec /RebuildBcd The /FixMbr option writes a Windows Vista/7/7 SP1 compatible MBR to the system partition. This option does not overwrite the existing partition table. Use this option when you must resolve MBR corruption issues, or when you have to remove non-standard code from the MBR. The /FixBoot option writes a new boot sector to the system (boot) drive/partition/volume by using a boot sector compatible with Windows Vista/7/7 SP1. Use this option if 1 of the following conditions is true: - The boot sector has been replaced with a non-standard Windows Vista/7/7 SP1 boot sector. - The boot sector is damaged. - An earlier Windows operating system has been installed after Windows Vista/7/7 SP1 was installed. In this scenario the computer starts by using Windows NT Loader (NTLDR) instead of Windows Boot Manager (Bootmgr.exe). The /ScanOs option scans all disks for installations compatible with Windows Vista/7/7 SP1. Additionally, this option displays the entries currently not in the BCD store. Use this option when there are Windows Vista/7/7 SP1 installations Boot Manager menu does not list. The /RebuildBcd option scans all disks for installations compatible with Windows Vista/7/7 SP1. Additionally, this option lets you select the installations you want to add to the BCD store. Use this option when you must completely rebuild the BCD. Startup Repair can automatically recover from most BCD problems. If you prefer to manually analyze and repair problems, you can use BootRec by starting the System Recovery tools, and then clicking Command Prompt in the System Recovery Options dialog box. View BootRec [BOOTREC.EXE] command line options, switches + parameters: from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE] right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter: BOOTREC.EXE /? * BootSect [BOOTSECT.EXE] is available only in Windows 7/7 SP1, and is located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually C:\WINDOWS]: http://learn.microsoft.com/windows-hardware/manufacture/desktop/bootsect-command-line-options/ View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command PATH -> press Enter. Boot sector restoration DOS console command line tool. BOOTSECT.EXE {/help|/nt60|/nt52} {SYS|ALL|:} [/force] [/mbr] BootSect updates the master boot code for hard disk partitions in order to switch between BOOTMGR and NTLDR. You can use BootSect to restore the boot sector on your computer(s). View BootSect [BOOTSECT.EXE] command line options, switches + parameters: from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE] right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command BOOTSECT.EXE /? -> press Enter. ______________________________________________________________________________ Windows Side-by-Side (WinSxS) Folder * Move/delete WinSxS directory/folder + files in Windows Vista/newer: http://www.thewindowsclub.com/winsxs-folder-windows-7-8/ CAUTION: 1st backup/clone your entire Windows Operating System (OS), or create a fresh restore point! PendMoves [pendmoves.exe + pendmoves64.exe] + MoveFile [movefile.exe + movefile64.exe] 32-bit + 64-bit command line tools for Windows NTx unlock, display + delete in-use, protected + system files + schedule these operations for next reboot: http://learn.microsoft.com/sysinternals/downloads/pendmoves/ File: http://download.sysinternals.com/files/pendmoves.zip MS DOCs: PendMoves + MoveFile: http://technet.microsoft.com/magazine/2009.06.utilityspotlight.aspx MS DOCs: PendMoves + MoveFile Tips: http://technet.microsoft.com/magazine/dd370591.aspx 01. Download ZIP file above -> extract PendMoves.exe + MoveFile.exe using an unZIPping/unARChiving/unRARing tool [free(ware)] http://www.mdgx.com/toy.htm#ZIP -> place them in a directory/folder listed in your system PATH. View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command PATH -> press Enter. 02. Explorer -> C:\WINDOWS\WinSxS -> right-click on it -> Properties -> Security tab -> must list the owner of the directory/folder user (who must be part of the Administrators group) -> must grant Administrator Full Control. 03. Start a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command to create a dummy (clone) directory/folder (example) -> press Enter: MKDIR C:\WINDOWS\WinSxS.moved 04. Create a new junction (a.k.a. symbolic link): MKLINK /J C:\WINDOWS\WinSxS.link WinSxS.moved 05. Delete WinSxS.moved directory: RMDIR C:\WINDOWS\WinSxS.moved 06. Use MoveFile.exe (see above) to schedule renaming of WinSxS directory at next restart/reboot. 07. Start a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter: MoveFile.exe C:\WINDOWS\WinSxS C:\WINDOWS\WinSxS.moved This will rename your WinSxS directory/folder before Windows manages to get a lock on it. 08. Start a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter: MoveFile.exe C:\WINDOWS\WinSxS.link C:\WINDOWS\WinSxS This restores your new WinSxS directory/folder in order to avoid OS critical errors! 09. Start a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter: PendMoves.exe to view the 2 pending moves executed above. 10. Restart/reboot. 11. Upon restart/reboot the 2 rename/move operations will execute, and WinSxS directory will be unlocked + allowed to be moved. 12. Start a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter: DIR C:\WINDOWS\WinSxS* You can see WinSxS.moved directory/folder contents and respective WinSxS junction created above. If this doesn't work, *must* repeat steps above! 13. Explorer -> copy entire WinSxS.moved directory/folder to \Windows directory/folder on different drive/partition/volume (D: for example). 14. Rename new directory/folder from WinSxS.moved back to WinSxS (original name). 15. Start a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter: RMDIR C:\WINDOWS\WinSxS 16. Start a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter: MKLINK /J C:\WINDOWS\WinSxS D:\Windows\WinSxS 17. Explorer -> browse to C:\WINDOWS\WinSxS -> should see all files, even if now they are physically located on different drive/partition/volume (D: in this example). 18. Restart/reboot. 19. Now you should be able to delete C:\WINDOWS\WinSxS.moved to free some disk space. * Move/delete Windows Updates (WU) Downloads directory/folder in Windows Vista/newer: CAUTION: 1st backup/clone your entire Windows Operating System (OS), or create a fresh restore point! Same process can be applied to Windows Updates (WU) list. Installed Windows Updates are configured to download to C:\WINDOWS\SoftwareDistribution which in time will grow too large, and eventually take too much storage space. Stop WU service [wuauserv] (if running) -> move/create a directory/folder junction (using MoveFile.exe -> see above) http://download.sysinternals.com/files/pendmoves.zip -> restart WU service [wuauserv] from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run these commands -> press Enter after each line (example): ECHO Y|NET.EXE STOP wuauserv SC.EXE CONFIG wuauserv START= demand MKDIR C:\WINDOWS\SoftwareDistribution_NEW MKLINK /J C:\WINDOWS\SoftwareDistribution_OLD SoftwareDistribution_NEW RMDIR C:\WINDOWS\SoftwareDistribution_NEW MoveFile.exe C:\WINDOWS\SoftwareDistribution C:\WINDOWS\SoftwareDistribution_NEW MoveFile.exe C:\WINDOWS\SoftwareDistribution_OLD C:\WINDOWS\SoftwareDistribution ECHO Y|NET.EXE START wuauserv May need to restart/reboot for all these changes to take effect. * WinSxS frequently asked questions (FAQ): http://learn.microsoft.com/archive/blogs/joscon/should-you-delete-files-in-the-winsxs-directory-and-whats-the-deal-with-vss/ Q: Should you delete files inside \WinSxS directory? What's the deal with Volume Shadow Copy (VSS)? A: No. Why? Because component store (\WinSxS) is needed to repair OS binaries in the event file(s) become corrupted, compromised or missing. Directories located under component store: \WinSxS\Catalogs = Security catalogs for each manifest on the system; \WinSxS\InstallTemp = Temporary location for install events; \WinSxS\Manifests = Component manifest for each specific component used during operation to make sure files end up in proper location; \WinSxS\Temp = Temp directory used for various operations, pending renames; \WinSxS\Backup = Backups of manifest files in case the copy in \WinSxS\Manifests becomes corrupted; \WinSxS\Filemaps = File system mapping to a file location; \WinSxS\ = Binary payloads for each specific component/device. So long as files in the \Windows\SYSTEM32 directory are valid, most likely you wouldn't see any problems initially, the machine would most likely operate properly. However, the 1st time you attempt to update a binary, apply a service pack or service a component, it's going to fail because the backing components needed don't exist anymore. The way files end up in \System32 are via hardlinks. This should help answer another question regarding how Volume Shadow Copy (VSS) is used in servicing. Short answer: No. We use NTFS hardlinks to project the file to the file system from the component store. That's why the \WinSxS directory is so important. The files there can be seen as the "authoritative" versions on the file system. When there is an issue and a binary needs to be replaced, running SFC.EXE /SCANFILE against it verifies the directories above and if the version doesn't match, it will re-project (deliver a fresh copy) it so it stars working again. View a hardlink from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run these commands -> press Enter after each line (example): C: CD\WINDOWS\SYSTEM32\Drivers FSUTIL.EXE hardlink list ntfs.sys which returns this output: \Windows\System32\drivers\ntfs.sys \Windows\WinSxS\amd64_microsoft-windows-ntfs_31bf3856ad364e35_6.1.7600.16385_none_02661b64369ca03a\ntfs.sys You can see the NTFS file has a link to the \WinSxS directory and if that version of NTFS were to become corrupted, we could go back to the component store and grab a new copy. The \WinSxS backup directory exists in the event the version in the main directory has also become corrupted. This is a good method of having decent OS protection without consuming a huge amount of space. New servicing structure does remove the $NTUninstall$ directories/folders that were used in Windows NT4/2000/XP/2003. Updates, if they are marked as removable, no longer contain that structure. Instead updates are recommended to be removed via Control Panel (CP) -> Programs (and Features) -> (View) Installed Updates. Updates can be removed via appropriate switches using DISM.EXE or PKGMGR.EXE, but the Control Panel (CP) method tends to be cleaner. * Dism++ -> select "Replaced WinSxS assemblies" -> click OK to cancel "Warning: these installed updates cannot be uninstalled!" -> Scan -> Cleanup: http://www.chuyu.me/en/ File: http://gh.api.99988866.xyz/github.com/Chuyu-Team/Dism-Multi-language/releases/download/v10.1.1002.1/Dism++10.1.1002.1.zip Documentation: http://www.chuyu.me/en/Document.html * Reduce size of WinSxS directory/folder using WinSxSLite: http://www.dmitrybobrovsky.ru/2012/09/05/decrease-of-the-size-of-folder-winsxs-in-windows-7-or-how-to-use-winsxslite-bat/ http://sites.google.com/site/winsxslite/ NEWest: http://github.com/zippy1981/Nuget-Packages-FerventCoder/raw/master/WinsxsLite1.88.zip OLDer: http://www.dmitrybobrovsky.ru/wp-content/uploads/files/winsxslite.zip * Reduce size of WinSxS directory/folder using COMPCLN.EXE: http://www.techrepublic.com/blog/tr-dojo/reduce-the-size-of-the-winsxs-folder-with-vsp1clnexe-and-compclnexe/ http://www.boshdirect.com/Blogs/Tech/how-to-reduce-size-of-winsxs.html * Reduce size of WinSxS directory/folder by deleting some of the files: http://blogs.technet.com/b/askcore/archive/2008/09/17/what-is-the-winsxs-directory-in-windows-2008-and-windows-vista-and-why-is-it-so-large.aspx http://blogs.technet.com/b/joscon/archive/2010/08/06/should-you-delete-files-in-the-winsxs-directory-and-what-s-the-deal-with-vss.aspx http://www.helpdeskgeek.com/windows-8/cleanup-the-winsxs-folder-in-windows-8-7/ * Reduce size of WinSxS directory/folder by deleting some of the duplicate files: http://www.msfn.org/board/index.php?showtopic=109131 * Reduce size of WinSxS directory/folder by deleting some of the backup files: http://technet.microsoft.com/library/dn251565.aspx * Deployment Image Servicing and Management [DISM.EXE] is located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually C:\WINDOWS] DOS console command line tool for component cleanup: http://learn.microsoft.com/windows-hardware/manufacture/desktop/what-is-dism/ http://learn.microsoft.com/windows-hardware/manufacture/desktop/dism-image-management-command-line-options-s14/ View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command PATH -> press Enter. First backup/clone your operating system drive/partition/volume to a safe location -> see "Free(ware) WinDOwS Backup + Restore Tools" section in SECRETS.TXT (included): http://www.mdgx.com/secrets.htm#BKP Then from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run these 3 commands in this exact order -> press Enter after each line: DISM.EXE /online /Cleanup-Image /StartComponentCleanup DISM.EXE /online /Cleanup-Image /StartComponentCleanup /ResetBase DISM.EXE /online /Cleanup-Image /SpSuperseded Deployment Image Servicing and Management (DISM) tool (DISM.EXE) is located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually C:\WINDOWS]. * Microsoft Package Manager [PKGMGR.EXE] Command Line Options: http://technet.microsoft.com/library/cc749465.aspx Use Package Manager [PKGMGR.EXE] to Uninstall A Package: http://support.microsoft.com/help/940410/ * Windows 7 64-bit (x64) vLite extreme removal: http://www.msfn.org/board/index.php?showtopic=136837 ______________________________________________________________________________ Free(ware) Burn/Copy/Write/Install CDs/DVDs/BDs/USB Tools * MDGx "Free(ware) WinDOwS Backup + Restore Tools" section in SECRETS.TXT (included): http://www.mdgx.com/secrets.htm#BKP * MDGx "BACKUP" section in TOOLS.TXT (included): http://www.mdgx.com/tools.php http://www.mdgx.com/TOOLS.TXT * MDGx "STORAGE" section in TOOLS.TXT (included): http://www.mdgx.com/tools.php http://www.mdgx.com/TOOLS.TXT * WinBuilder: http://reboot.pro/files/file/4-winbuilder/ http://reboot.pro/files/download/4-winbuilder/ WinBuilder Scripts: http://reboot.pro/files/category/5-winbuilder/ WinBuilder Download Center = Scripts: http://multipe.exec-se.de/ Create Windows 7 Live Install CD/DVD/BD/UHD/USB using WinBuilder: http://www.instantfundas.com/2010/12/how-to-create-windows-7-live-cddvdusb.html PEFactory WinBuilder add-on: http://multipe.exec-se.de/Documentation/multiPE/PEF_index.htm * Win7PE_SE: http://reboot.pro/topic/12427-win7pe-se-release/ Win7PE SE Downloads [144 MB]: http://w7pese.cwcodes.net/Compressed/ multiPE 62 script: http://reboot.pro/files/file/61-multipe/ * Get Windows Automated Installation Kit (WAIK) Tools without downloading entire disc image (ISO): http://www.msfn.org/board/index.php?showtopic=156869 File: http://db.tt/2l5l22OE * Create Windows 7 Bootable Install USB Drive disc image (ISO): http://www.softlay.net/operating-system/create-windows-7-bootable-usb-install-disk-drive-iso.html * Windows 7 Windows Automated Installation Kit (WAIK): http://www.microsoft.com/en-us/download/confirmation.aspx?id=5753 Win7 WAIK ISO [1.7 GB]: http://download.microsoft.com/download/8/E/9/8E9BBC64-E6F8-457C-9B8D-F6C9A16E6D6A/KB3AIK_EN.iso Win7 WAIK ReadMe: http://technet.microsoft.com/library/dd349350.aspx Win7 SP1 WAIK Supplement: http://www.microsoft.com/en-us/download/details.aspx?id=5188 Win7 SP1 WAIK Supplement ISO [1.3 GB]: http://download.microsoft.com/download/0/4/C/04C805CC-4C04-4D76-BE80-7D67B951CF73/waik_supplement_en-us.iso * YUMI (Your USB Multiboot Installer) Multiboot USB Creator for Windows 7/newer creates universal bootable USB drive from multiple bootable ISO images of different operating systems (OSes): http://www.pendrivelinux.com/yumi-multiboot-usb-creator/ YUMI Legacy BIOS USB boot only [NTFS or FAT32 only]: http://www.pendrivelinux.com/yumi-multiboot-usb-creator/#YUMI-Legacy YUMI exFAT BIOS + UEFI USB boot [exFAT only]: http://www.pendrivelinux.com/yumi-multiboot-usb-creator/#YUMI-exFAT * GImageX GUI for Windows Imaging: http://www.autoitconsulting.com/site/software/gimagex/ * ei.cfg Removal Utility (Windows 7 Universal CD) Make Your Windows 7 Disc Universal: http://www.technibble.com/ei-cfg-removal-utility-repair-tool-of-the-week/ * Windows disc image (ISO) Utilities: http://code.kliu.org/misc/winisoutils/ * PEChecksum 32-bit + 64-bit command line tool updates Portable EXEcutable (PE) files (EXE, DLL, OCX, SYS, DRV, MUI) 32-bit + 64-bit signatures: http://www.coderforlife.com/projects/utilities/#PEChecksum PEChecksum 32-bit: http://www.coderforlife.com/projects/utilities/PEChecksum.exe PEChecksum 64-bit: http://www.coderforlife.com/projects/utilities/PEChecksum64.exe * Windows Graphics User Interface (GUI) + Tweaking Tools: http://www.thewindowsclub.com/list-freeware-releases-from-the-windows-club/ http://www.winaero.com/ http://www.xptsp.com/ http://www.blogsdna.com/ http://www.xp-smoker.com/ Themes: http://www.winaero.com/news.php?cat.2 Downloads: http://www.winaero.com/download.php?list.2 * WinCDEmu 32-bit + 64-bit mounts CD/DVD/BD/UHD ISO/IMG images on HDD/SSD/USB: http://wincdemu.sysprogs.org/ WinCDEmu Portable: http://wincdemu.sysprogs.org/portable/ File: http://wincdemu.sysprogs.org/download/ * WinFLASHTool writes raw CD/DVD/BD/UHD disk images to memory cards/discs/media/sticks: http://winflashtool.sysprogs.com/ File: http://www.sysprogs.com/files/WinFLASHTool/v2/WinFlashTool.exe Download: http://winflashtool.sysprogs.com/download/ * cdrtfe Audio/CD/XCD/VCD/DVD/BD/UHD ISO/bootable disc image burning tool: http://cdrtfe.sourceforge.io/ http://sourceforge.net/projects/cdrtfe/ Download: http://cdrtfe.sourceforge.io/cdrtfe/download_en.html Portable: http://sourceforge.net/projects/cdrtfe/files/cdrtfe%20portable/ cdrtfe Tools: http://cdrtfe.sourceforge.io/tools/index_en.html Download: http://sourceforge.net/projects/cdrtools/ File: http://sourceforge.net/projects/cdrtools/files/ * Sevenize: http://www.sevenize.com/ * Completely Hide Windows 7 Shell, Logos, Icons, Start etc: http://forum.arcadecontrols.com/index.php?topic=113896.0 * Completely hide Windows + Shell with 3rd party Front End GUI: http://www.gameex.com/Community/InstantShellerandShellingGuide.aspx * Windows 7 Boot Updater: http://www.coderforlife.com/projects/win7boot/ ______________________________________________________________________________ OEM * OEM licensing terms: http://web.archive.org/web/20141228133711/http://www.microsoft.com/oem/en/licensing/sblicensing/pages/licensing_faq.aspx Original Equipment Manufacturer (OEM) versions of Windows 7 are identical to Full License Retail (FLR) except they... - do not provide any free direct support from Microsoft. - OEM licenses are tied to the 1st computer Windows is installed and activated on. - all hardware upgrades are allowed except for different model/version motherboard upgrades. - cannot be used to upgrade directly from an older Windows OS. ______________________________________________________________________________ Application (IN)Compatibility * Application (program executable = .exe) Compatibility Info, Guides, Tips + Tools: To DEP (Data Execution Prevention) or not to DEP... DisableNXShowUI: http://techcommunity.microsoft.com/t5/ask-the-performance-team/to-dep-or-not-to-dep-8230/ba-p/373137/ Script Compatibility Layers in Windows XP: http://web.archive.org/web/20111114000642/http://support.microsoft.com/?kbid=286705 Configure Compatibility tab: http://www.intrntpirate.com/2012/03/29/configuring-the-compatibility-tab/ Use Windows Application Compatibility Mode (ACM): http://technet.microsoft.com/library/bb456979.aspx Use Compatibility Administration tool in Windows 7/newer: http://learn.microsoft.com/windows/deployment/planning/using-the-compatibility-administrator-tool/ Use Compatibility Administration tool in Windows 7: http://sourcedaddy.com/windows-7/using-the-compatibility-administrator.html http://support.microsoft.com/help/317510/ http://technet.microsoft.com/library/cc749034.aspx http://www.techrepublic.com/blog/windows-and-office/selectively-disable-uac-for-your-trusted-vista-applications/ Use Compatibility Administration tool in Windows XP: http://technet.microsoft.com/library/bb456983.aspx Get Rid of UAC Prompts using Application Compatibility Toolkit (ACT): http://www.ghacks.net/2010/07/08/get-rid-of-uac-prompts-with-microsofts-application-compatibility-toolkit/ Fix Old Games using Application Compatibility Toolkit (ACT): http://classicgamefixes.wixsite.com/home/act-toolkit/ Create Shim/Fix using Compatibility Administrator tool: http://www.msigeek.com/4823/ Using Program Compatibility Mode in Windows 7/newer: http://www.howtogeek.com/howto/10436/using-program-compatibility-mode-in-windows-7/ http://www.thewindowsclub.com/programs-compatibility-wizard-in-windows-7/ http://www.thewindowsclub.com/program-compatibility-troubleshooter-desktop-shortcut/ Run Program Compatibility Troubleshooter (PCT) [MSDT.EXE] from a DOS console command prompt -> right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter: MSDT.EXE -id PCWDiagnostic Microsoft Support Diagnostic Tool [MSDT.EXE] is located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually C:\WINDOWS]. View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command PATH -> press Enter. Use Compatibility Mode to Fix App Problems: http://www.reviversoft.com/blog/2013/01/compatibility-mode/ Using RunAsHighest Fix: http://technet.microsoft.com/library/dd638322.aspx UAC (User Account Control) and Application Run Levels: http://www.slickit.ca/2009/05/uac-and-application-run-levels.html Disable UAC for certain apps: http://web.archive.org/web/20080103052016/http://support.microsoft.com/kb/946932 Selectively disable UAC for trusted Windows Vista/7/newer apps: http://www.techrepublic.com/blog/windows-and-office/selectively-disable-uac-for-your-trusted-vista-applications/ Exclude Programs from Program Compatibility Assistant (PCA): http://support.microsoft.com/help/2545347/ Application Compatibility: http://msdn.microsoft.com/library/bb757005.aspx Application Compatibility: Program Compatibility Assistant (PCA): http://msdn.microsoft.com/library/bb756937.aspx Program Compatibility Assistant (PCA) - Part 2: http://blogs.technet.microsoft.com/askperf/2007/10/05/the-program-compatibility-assistant-part-two/ Add/Remove Compatibility tab from Properties: http://www.sevenforums.com/tutorials/237405-compatibility-tab-add-remove-properties.html * Microsoft Windows 2000 SP4/XP/2003/Vista/2008/7/8/8.1/2012 Application Compatibility Toolkit (ACT) (English): http://www.mdgx.com/xptoy.htm#ACT ACT 5.6 [12.2 MB]: http://web.archive.org/web/20180605103833if_/http://download.microsoft.com/download/D/3/3/D33A8F5D-A7E1-4BBE-B04D-7A688785A229/ApplicationCompatibilityToolkitSetup.exe Requires Microsoft .Net Framework Redistributable (NFR) 3.5/newer (free): http://www.mdgx.com/add.htm#NFR More info: http://support.microsoft.com/help/294895/ * AppCompatFlags "Layers" Registry REG_SZ [String] values + __COMPAT_LAYER [RunAsAdmin] environment variable modes + parameters [case insensitive] in Windows XP/newer: http://learn.microsoft.com/windows/deployment/planning/compatibility-fixes-for-windows-8-windows-7-and-windows-vista/ http://www.ss64.com/nt/syntax-elevate.html http://www.ss64.com/nt/syntax-variables.html http://techsupt.winbatch.com/webcgi/webbatch.exe?techsupt/tsleft.web+WinBatch/How~To+Control~Compatibility~Mode.txt http://www.ss64.org/viewtopic.php?t=18 Complete list of Windows 10/11 [most are available in Windows XP/newer] compatibility values/modes + parameters for both 32-bit (x86) + 64-bit (x64) executables (.exe): http://www.ss64.org/viewtopic.php?t=18 All Users (system wide) [HKLM Registry Hive Key]: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers Current User (logged on user) [HKCU Registry Hive Key]: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers All Users (any logged on user, when more than 1 user) [HKU .Default Registry Hive Key]: HKEY_USERS\.DEFAULT\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers Enumeration of multiple values is allowed on the same line: they must be separated by a space [ ] (if more than 1). Meaning: http://www.verboon.info/2011/03/running-an-application-as-administrator-or-in-compatibility-mode/ http://qtechbabble.wordpress.com/2016/08/23/run-application-in-compatibility-mode-from-command-line/ Values/Modes (examples): Windows 8 RTM (Released To Manufacturing) = WIN8RTM Windows 7 RTM (Released To Manufacturing) = WIN7RTM Windows Server 2008 SP1 (Service Pack 1) = WINSRV08SP1 Windows Vista RTM (Released To Manufacturing) = VISTARTM Windows Vista SP1 (Service Pack 1) = VISTASP1 Windows Vista SP2 (Service Pack 2) = VISTASP2 Windows XP SP3 (Service Pack 3) = WINXPSP3 Windows XP SP2 (Service Pack 2) = WINXPSP2 Windows Server 2003 SP1 (Service Pack 1) = WINSRV03SP1 Windows 2000 = WIN2000 Windows NT 4.0 SP5 (Service Pack 5) = NT4SP5 Windows 98/ME = WIN98 Windows 95 = WIN95 Run in 65536 colors (16-bit) = 16BITCOLOR Run in 256 colors (8-bit) = 256COLOR Run in 640x480 screen resolution = 640X480 Disable visual themes = DisableThemes Disable desktop composition = DisableDWM Disable display scaling on high DPI settings = HighDPIAware Run this program as Administrator = RunAsAdmin Enable program to work with SkyDrive/OneDrive = PlaceHolderFile EveryOne-full [?] AlcatelLayer DisableCicero DisabledXMaximizedWindowedMode DisableNXHideUI DisableNXShowUI DisableThemes ElevateCreateProcess EnableNXShowUI International LUA LUACleanUp PlayerGetProcAddrExOverride ProfilesSetup RunAsInvoker RunAsHighest Use SetX [SETX.EXE] environment variable manager tool to add new compatibility layer variable [__COMPAT_LAYER] and set its value for "Run as Administrator" level [RunAsAdmin] to the machine (system wide, all users) environment (example): From a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command SETX.EXE __COMPAT_LAYER "RunAsAdmin" /M -> press Enter. SetX [SETX.EXE] is located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually C:\WINDOWS]. Environment variables can be added/customized/deleted/modified by using a Control Panel (CP)/Windows Settings (WS) tool: Run... [hold WinKey + press R] -> type this command SystemPropertiesAdvanced.exe -> press Enter -> Advanced tab -> Environment Variables... button -> System variables -> New... button -> Variable name: -> type __COMPAT_LAYER -> Variable value: -> type RunAsAdmin -> press OK button -> close/exit SystemPropertiesAdvanced.exe. View the list of all your Windows operating system (OS) environment variables from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command SET -> press Enter. OR Save it to a plain text/ASCII (.txt) file: from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type same command above followed by the name of the file (in this example it will be saved in C:\ root) SET>C:\Windows_Environment_Variables.txt -> press Enter -> use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to view text file contents. Newly added environment variable above looks like this: ----------snippity-snip---------- __COMPAT_LAYER=RunAsAdmin ----------snippity-snip---------- * Program Compatibility Assistant (PCA) Service [PcaSvc]: http://www.howtogeek.com/4161/disable-program-compatibility-assistant-in-windows-7-and-vista/ http://batcmd.com/windows/7/services/pcasvc/ Disabled (Manual = only loads upon demand when triggered): ECHO Y|NET.EXE STOP PcaSvc SC.EXE CONFIG PcaSvc START= demand Enabled (Automatic = always loads with Windows upon boot/start): ECHO Y|NET.EXE START PcaSvc SC.EXE CONFIG PcaSvc START= auto * Optimize/tweak Application Compatibility/Program Compatibility Assistant (PCA) registry settings: TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK to all prompts to register/merge/import its information into your registry. -----Begin cut & paste here----- REGEDIT4 [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\AppCompat] ; http://www.windows-security.org/a9e1f3187a2d9e753e52bc92a558b867/remove-program-compatibility-property-page/ ; http://www.sevenforums.com/tutorials/237405-compatibility-tab-add-remove-properties.html "DisablePropPage"=dword:0 ; http://www.windows-security.org/13372c6a0a2d392443dc146ceb94d720/turn-off-application-telemetry/ "AITEnable"=dword:0 ; http://www.windows-security.org/7be7ad4dce7009d71a3061f872f610e0/turn-off-steps-recorder/ "DisableUAR"=dword:1 ; http://www.windows-security.org/dc93a8ca81b69891762057593d8d2ccd/prevent-access-to-16-bit-applications/ "VDMDisallowed"=dword:0 ; http://www.windows-security.org/a6c2ac5e5f13a880f6254303a16e20a4/turn-off-application-compatibility-engine/ "DisableEngine"=dword:0 ; http://www.windows-security.org/6412ea982640d8a1dd2090387e2e5b29/turn-off-program-compatibility-assistant/ "DisablePCA"=dword:1 ; http://www.windows-security.org/36ff6b13efb41d27cc12094bc252b9f3/turn-off-switchback-compatibility-engine/ "SbEnable"=dword:1 ; WOW6432Node registry subkey exists only in Windows NTx 64-bit (x64): [HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Policies\Microsoft\Windows\AppCompat] ; http://www.windows-security.org/a9e1f3187a2d9e753e52bc92a558b867/remove-program-compatibility-property-page/ ; http://www.sevenforums.com/tutorials/237405-compatibility-tab-add-remove-properties.html "DisablePropPage"=dword:0 ; http://www.windows-security.org/13372c6a0a2d392443dc146ceb94d720/turn-off-application-telemetry/ "AITEnable"=dword:0 ; http://www.windows-security.org/7be7ad4dce7009d71a3061f872f610e0/turn-off-steps-recorder/ "DisableUAR"=dword:1 ; http://www.windows-security.org/dc93a8ca81b69891762057593d8d2ccd/prevent-access-to-16-bit-applications/ "VDMDisallowed"=dword:0 ; http://www.windows-security.org/a6c2ac5e5f13a880f6254303a16e20a4/turn-off-application-compatibility-engine/ "DisableEngine"=dword:0 ; http://www.windows-security.org/6412ea982640d8a1dd2090387e2e5b29/turn-off-program-compatibility-assistant/ "DisablePCA"=dword:1 ; http://www.windows-security.org/36ff6b13efb41d27cc12094bc252b9f3/turn-off-switchback-compatibility-engine/ "SbEnable"=dword:1 ; ------End cut & paste here------ ______________________________________________________________________________ Control Panel (CP) + Omnipotent/Master/Mega/'god mode' (OMg) Control Panel * Windows omnipotent/master/mega/'god mode' (OMg) Control Panel folder/shortcut (all Control Panel items enumerated in bulleted list form): http://en.wikipedia.org/wiki/Windows_Master_Control_Panel_shortcut http://www.nogeekleftbehind.com/2010/01/16/more-windows-7-god-mode-hacks/ http://technet.microsoft.com/magazine/hh706157.aspx * Add Control Panel (CP), omnipotent/master/mega/'god mode' (OMg) Control Panel, enable/disable User Account Control (UAC), Open Console Command (CMD) Here as Administrator to Desktop right-click menu in Windows Vista/newer: http://www.eightforums.com/tutorials/19706-control-panel-desktop-context-menu-create-windows-8-a.html * Control Panel (CP) CLSID (GUID) keys, commands, directories/folders, items, links, scripts, shortcuts available using Control [CONTROL.EXE], Explorer [EXPLORER.EXE] + RunDLL32 [RUNDLL32.EXE] in Windows Vista/7/newer: http://en.wikipedia.org/wiki/Control_Panel_(Windows)#Standard_applets http://learn.microsoft.com/windows/win32/shell/executing-control-panel-items/ http://docs.rainmeter.net/tips/launching-windows-special-folders/ http://www.tenforums.com/tutorials/86339-list-commands-open-control-panel-items-windows-10-a.html http://renenyffenegger.ch/notes/Windows/control-panel/ http://www.sevenforums.com/tutorials/110919-clsid-key-list-windows-7-a.html http://www.eightforums.com/threads/clsid-key-guid-shortcuts-list-for-windows-8.13591/ http://www.tenforums.com/tutorials/3123-clsid-key-guid-shortcuts-list-windows-10-a.html http://www.thewindowsclub.com/shortcuts-shell-commands-clsid-windows-8/ http://www.geoffchappell.com/studies/windows/shell/explorer/cmdline.htm http://www.howtogeek.com/257715/how-to-open-hidden-system-folders-with-windos-shell-command/ http://www.lifewire.com/command-line-2626060/ http://www.winaero.com/blog/control-panel-context-menu-windows-10/ http://www.thewindowsclub.com/remove-click-context-menu-items-editors/ http://www.tenforums.com/tutorials/6051-add-personalize-classic-context-menu-windows-10-a.html http://www.techspot.com/guides/1670-windows-right-click-menu/ http://www.tenforums.com/tutorials/24451-add-bluetooth-context-menu-windows-10-a.html http://www.majorgeeks.com/content/page/here_are_all_the_rundll32_commands_for_windows_10.html http://www.winaero.com/windows-10-rundll32-command-list/ http://shortcutworld.com/Windows/win/Windows-Run-Commands_-Settings_-and-Start-Menu-Shortcuts http://www.computerhope.com/issues/ch001870.htm http://msdn.microsoft.com/library/windows/desktop/cc144191.aspx http://support.microsoft.com/help/192806/ http://social.technet.microsoft.com/wiki/contents/articles/4486.accessing-the-control-panel-via-the-commandline.aspx Syntax: CONTROL.EXE , [] OR: CONTROL.EXE /name [/page ] OR: EXPLORER.EXE SHELL:::{CLSID/GUID key}[\::{optional CLSID/GUID key}] OR: RUNDLL32.EXE , [] All *.cpl, *.DLL, *.EXE files used here are located respectively in the %WinDir%, %WinDir%\SYSTEM32 + %WinDir%\SYSTEM32\wbem directories/folders [%WinDir% = usually C:\WINDOWS], listed on your system PATH. View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command PATH -> press Enter. All these Control Panel (CP) commands can be used in DOS console BATch (.bat)/CoMmanD (.cmd) files, DOS console CoMmanD prompt [CMD.EXE], directory/folder names, items, links, powershell, scripts, shortcuts, etc. Below is a comprehensive list of Control, Explorer + RunDll32 Control Panel (CP) commands + directory/folder names. Some may or may not be available or work properly depending on the specific Windows NTx OS(es) build/edition/release/update/version +/- bit strength [32-bit (x86) or 64-bit (x64)] installed on your computer(s)/device(s). Control Panel (CP) items command lines, directory/folder names, options, switches + parameters: - Omnipotent/master/mega/'god mode' (OMg) Control Panel (all Control Panel items categorized + enumerated in bulleted list form): as Folder: @.{ED7BA470-8E54-465E-825C-99712043E01C} as Command line: EXPLORER.EXE SHELL:::{ED7BA470-8E54-465E-825C-99712043E01C} - Control Panel -> All Control Panel Items -> System (About) [hold WinKey + press Pause/Break]: http://www.winaero.com/open-classic-system-properties-in-windows-10-version-20h2/ http://www.askvg.com/tip-restore-and-get-back-classic-system-properties-in-windows-10/ as Folder: @.{BB06C0E4-D293-4f75-8A90-CB05B6477EEE} as Command line: EXPLORER.EXE SHELL:::{BB06C0E4-D293-4f75-8A90-CB05B6477EEE} - Control Panel behavior in Windows 7/newer: as Folder: Small icons: @.{21EC2020-3AEA-1069-A2DD-08002B30309D} Large icons: @.{26EE0668-A00A-44D7-9371-BEB064C98683} as Command line: Small icons: EXPLORER.EXE SHELL:::{21EC2020-3AEA-1069-A2DD-08002B30309D} Large icons: EXPLORER.EXE SHELL:::{26EE0668-A00A-44D7-9371-BEB064C98683} - Control Panel -> All Control Panel Items -> Personalization -> Window Color and Appearance (Aero): as Command line: CONTROL.EXE /name Microsoft.Personalization /page pageColorization as Command line: EXPLORER.EXE SHELL:::{26EE0668-A00A-44D7-9371-BEB064C98683}\1\::{ED834ED6-4B5A-4bfe-8F11-A626DCB6A921}\pageColorization - Control Panel -> All Control Panel Items -> Personalization -> Display: http://www.winaero.com/how-to-open-old-display-settings-in-windows-10-two-ways/ as Command line: - Windows 10: CONTROL.EXE desk.cpl,Settings,@Settings OR: - Windows 7/8/8.1: RUNDLL32.EXE SHELL32.DLL,Control_RunDLL desk.cpl CONTROL.EXE /name Microsoft.Display as Folder: @.{C555438B-3C23-4769-A71F-B6D3D9B6053A} as Command line: EXPLORER.EXE SHELL:::{C555438B-3C23-4769-A71F-B6D3D9B6053A} - Control Panel -> All Control Panel Items -> AutoPlay: as Command line: CONTROL.EXE /name Microsoft.AutoPlay as Folder: @.{9C60DE1E-E5FC-40f4-A487-460851A8D915} as Command line: EXPLORER.EXE SHELL:::{9C60DE1E-E5FC-40f4-A487-460851A8D915} - Control Panel -> All Control Panel Items -> Printers (Classic): as Command line: EXPLORER.EXE shell:PrintersFolder as Command line: EXPLORER.EXE SHELL:::{21ec2020-3aea-1069-a2dd-08002b30309d}\::{2227a280-3aea-1069-a2de-08002b30309d} - Control Panel -> All Control Panel Items -> Devices and Printers -> Bluetooth Devices (Windows 7/8/8.1) or Bluetooth Settings (Windows 10/11): as Command line: Bluetooth Settings -> tab: Options: CONTROL.EXE bthprops.cpl,,1 RUNDLL32.EXE SHELL32.DLL,Control_RunDLL bthprops.cpl,,1 COM Ports: CONTROL.EXE bthprops.cpl,,2 RUNDLL32.EXE SHELL32.DLL,Control_RunDLL bthprops.cpl,,2 Hardware: CONTROL.EXE bthprops.cpl,,3 RUNDLL32.EXE SHELL32.DLL,Control_RunDLL bthprops.cpl,,3 Shared Folder: CONTROL.EXE bthprops.cpl,,4 RUNDLL32.EXE SHELL32.DLL,Control_RunDLL bthprops.cpl,,4 as Folder: @.{28803F59-3A75-4058-995F-4EE5503B023C} as Command line: EXPLORER.EXE SHELL:::{28803F59-3A75-4058-995F-4EE5503B023C} - Control Panel -> All Control Panel Items -> Network and Sharing Center -> Change adapter settings -> Your Connection icon/item/link/shortcut -> drag connection name onto an empty Desktop spot or create shortcut [these examples may or may not work on your computer(s) depending on your connection(s) type(s)/name(s)]: as Folders: @.{38A98528-6CBF-4CA9-8DC0-B1E1D10F7B1B} @.{1fa9085f-25a2-489b-85d4-86326eedcd87} @.{BA126ADB-2166-11D1-B1D0-00805FC1270E} as Command lines: EXPLORER.EXE SHELL:::{20D04FE0-3AEA-1069-A2D8-08002B30309D}\::{21EC2020-3AEA-1069-A2DD-08002B30309D}\::{38A98528-6CBF-4CA9-8DC0-B1E1D10F7B1B} EXPLORER.EXE SHELL:::{38A98528-6CBF-4CA9-8DC0-B1E1D10F7B1B} EXPLORER.EXE SHELL:::{1fa9085f-25a2-489b-85d4-86326eedcd87} EXPLORER.EXE SHELL:::{BA126ADB-2166-11D1-B1D0-00805FC1270E} Right-click on an empty Desktop spot -> New -> create: Shortcut [.lnk] or Folder. - Control Panel -> All Control Panel Items -> Personalization -> Desktop Background: as Command line: EXPLORER.EXE SHELL:::{ED834ED6-4B5A-4bfe-8F11-A626DCB6A921} -Microsoft.Personalization\pageWallpaper - Control Panel -> All Control Panel Items -> Programs (and Features) -> (View) Installed Updates: as Folder: @.{d450a8a1-9568-45c7-9c0e-b4f9fb4537bd} as Command line: EXPLORER.EXE SHELL:::{d450a8a1-9568-45c7-9c0e-b4f9fb4537bd} - Task/Window Switcher [hold Alt + press Tab]: RUNDLL32.EXE SHELL32.DLL,-10114 as Folder: @.{3080F90E-D7AD-11D9-BD98-0000947B0257} as Command line: EXPLORER.EXE SHELL:::{3080F90E-D7AD-11D9-BD98-0000947B0257} - Recycle Bin: Control Panel -> All Control Panel Items -> Personalization -> Change Desktop Items -> check "Recycle Bin" box -> Apply/OK: as Folder: @.{645FF040-5081-101B-9F08-00AA002F954E} as Command lines: EXPLORER.EXE SHELL:::{645FF040-5081-101B-9F08-00AA002F954E} EXPLORER.EXE shell:recyclebinfolder - Troubleshooting (hardware + software problems): Control Panel -> All Control Panel Items -> Troubleshooting -> Troubleshoot computer problems: as Folder: @.{C58C4893-3BE0-4B45-ABB5-A63E4B8C8651} as Command lines: EXPLORER.EXE SHELL:::{C58C4893-3BE0-4B45-ABB5-A63E4B8C8651} EXPLORER.EXE SHELL:::{26EE0668-A00A-44D7-9371-BEB064C98683}\0\::{C58C4893-3BE0-4B45-ABB5-A63E4B8C8651} FYI: See Windows (File) Explorer [EXPLORER.EXE] command line options -> "EXPLORE YOUR ROOTS" in TIPS95.TXT (included): http://www.mdgx.com/newtip22.htm#EYR * Personalization: —————————————————————————————————————————————————————————————————————————————— Font Size and DPI DpiScaling.exe Screen Resolution CONTROL.EXE desk.cpl,Settings,@Settings Screen Resolution CONTROL.EXE /name Microsoft.Display /page Settings Display CONTROL.EXE desk.cpl,Settings,@Settings Themes CONTROL.EXE desk.cpl,Themes,@Themes Screen Saver CONTROL.EXE desk.cpl,screensaver,@screensaver Multi Monitor CONTROL.EXE desk.cpl,Monitor,@Monitor Color Scheme CONTROL.EXE /name Microsoft.Personalization /page pageColorization Desktop Background CONTROL.EXE /name Microsoft.Personalization /page pageWallpaper * System Properties: —————————————————————————————————————————————————————————————————————————————— Performance Options SystemPropertiesPerformance.exe Remote Access SystemPropertiesRemote.exe Computer Name SystemPropertiesComputerName.exe System Protection SystemPropertiesProtection.exe Advanced System Properties SystemPropertiesAdvanced.exe Hardware SystemPropertiesHardware.exe Data Execution Prevention SystemPropertiesDataExecutionPrevention.exe * Programs + Features: —————————————————————————————————————————————————————————————————————————————— Add/Remove Programs CONTROL.EXE /name Microsoft.ProgramsAndFeatures Windows Features OptionalFeatures.exe * Regional + Language Options: —————————————————————————————————————————————————————————————————————————————— Keyboard CONTROL.EXE /name Microsoft.RegionalAndLanguageOptions /page /p:keyboard Location CONTROL.EXE /name Microsoft.RegionalAndLanguageOptions /page /p:location Administrative CONTROL.EXE /name Microsoft.RegionalAndLanguageOptions /page /p:administrative * Folder: —————————————————————————————————————————————————————————————————————————————— Folder searching RUNDLL32.EXE SHELL32.DLL,Options_RunDLL 2 View RUNDLL32.EXE SHELL32.DLL,Options_RunDLL 7 General RUNDLL32.EXE SHELL32.DLL,Options_RunDLL 0 File associations CONTROL.EXE /name Microsoft.DefaultPrograms /page pageFileAssoc * Power: —————————————————————————————————————————————————————————————————————————————— Edit current plan settings CONTROL.EXE /name Microsoft.PowerOptions /page pagePlanSettings System settings CONTROL.EXE /name Microsoft.PowerOptions /page pageGlobalSettings Create a power plan CONTROL.EXE /name Microsoft.PowerOptions /page pageCreateNewPlan Advanced Settings CONTROL.EXE powercfg.cpl,,3 * Accessibility (Ease of Access): —————————————————————————————————————————————————————————————————————————————— Ease of Access Center (EAC) CONTROL.EXE /name Microsoft.EaseOfAccessCenter * Control Panel (CP) canonical/module names/Globally Unique IDentifiers (GUIDs) in Windows Vista/newer: http://learn.microsoft.com/windows/win32/shell/controlpanel-canonical-names/ —————————————————————————————————————————————————————————————————————————————— CONTROL.EXE desktop Display Properties CONTROL.EXE color Display Properties Appearance tab CONTROL.EXE date/time Date and Time Properties CONTROL.EXE international Regional and Language Options CONTROL.EXE mouse Mouse Properties CONTROL.EXE keyboard Keyboard Properties CONTROL.EXE printers Printers and Faxes folder CONTROL.EXE fonts Fonts folder * Control Panel (CP) canonical/module names/Globally Unique IDentifiers (GUIDs) in Windows 2000/newer: —————————————————————————————————————————————————————————————————————————————— CONTROL.EXE folders Folder (File Explorer) Options (General) View tab CONTROL.EXE netware Novell NetWare (if installed) CONTROL.EXE telephony Phone and Modem Options CONTROL.EXE admintools Administrative Tools folder CONTROL.EXE schedtasks Scheduled Tasks folder CONTROL.EXE netconnections Network Connections folder CONTROL.EXE infrared Infrared Monitor (if installed) CONTROL.EXE userpasswords User Accounts main menu CONTROL.EXE userpasswords2 User Accounts accounts menu * Control Panel tool Command [Control Panel applet (.cpl)] —————————————————————————————————————————————————————————————————————————————— Accessibility Options CONTROL.EXE access.cpl Add New Hardware CONTROL.EXE sysdm.cpl add new hardware Add/Remove Programs CONTROL.EXE appwiz.cpl Date/Time Properties CONTROL.EXE timedate.cpl Display Properties CONTROL.EXE desk.cpl FindFast CONTROL.EXE findfast.cpl Fonts Folder CONTROL.EXE fonts Internet Explorer Properties CONTROL.EXE inetcpl.cpl Joystick Properties CONTROL.EXE joy.cpl Keyboard Properties CONTROL.EXE main.cpl keyboard Microsoft Exchange (Windows Messaging) CONTROL.EXE mlcfg32.cpl Microsoft Mail Post Office CONTROL.EXE wgpocpl.cpl Modem Properties CONTROL.EXE modem.cpl Mouse Properties CONTROL.EXE main.cpl Multimedia Properties CONTROL.EXE mmsys.cpl Network Properties CONTROL.EXE netcpl.cpl Password Properties CONTROL.EXE password.cpl PC Card CONTROL.EXE main.cpl pc card (PCMCIA) Power Management (Windows 95) CONTROL.EXE main.cpl power Power Management (Windows 98) CONTROL.EXE powercfg.cpl Printers Folder CONTROL.EXE printers Regional Settings CONTROL.EXE intl.cpl Scanners and Cameras CONTROL.EXE sticpl.cpl Sound Properties CONTROL.EXE mmsys.cpl sounds System Properties CONTROL.EXE sysdm.cpl * Access/execute/open/run Control Panel (CP) items/folders/links/shortcuts + Windows APIs/core/GUI/shell/system functions using RunDLL32 [RUNDLL32.EXE] + Shell32 [SHELL32.DLL] commands available in Windows Vista/7/newer (some are also valid for Windows 2000/XP/2003): http://www.windows7tips.com/rundll32-vista-windows-7.html http://www.robvanderwoude.com/rundll.php http://www.majorgeeks.com/content/page/the_ultimate_list_of_rundll32_commands_for_windows_1087.html http://www.majorgeeks.com/content/page/here_are_all_the_rundll32_commands_for_windows_10.html http://www.tenforums.com/tutorials/77458-rundll32-commands-list-windows-10-a.html http://www.winaero.com/windows-11-control-panel-commands-to-open-applets-directly/ http://www.winaero.com/windows-10-rundll32-command-list/ http://www.thewindowsclub.com/rundll32-shortcut-commands-windows/ http://www.lifewire.com/command-line-commands-for-control-panel-applets-2626060/ http://web.archive.org/web/20150317044746/http://www.vlaurie.com/computers2/Articles/control.htm http://web.archive.org/web/20150812103403/http://best-windows.vlaurie.com/rundll32.html http://www.commandwindows.com/windows7-commands.htm http://www.commandwindows.com/command3.htm http://www.commandwindows.com/runline.htm http://www.svolpi.ch/Windows/cmd.html http://www.eightforums.com/threads/36567/ http://windows10dll.nirsoft.net/shell32_dll.html Syntax: RUNDLL32.EXE , [] All *.cpl, *.DLL, *.EXE files used here are located respectively in the %WinDir%, %WinDir%\SYSTEM32 + %WinDir%\SYSTEM32\wbem directories/folders [%WinDir% = usually C:\WINDOWS], listed on your system PATH. View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command PATH -> press Enter. All these Control Panel (CP) commands can be used in DOS console BATch (.bat)/CoMmanD (.cmd) files, DOS console CoMmanD prompt [CMD.EXE], directory/folder names, items, links, powershell, scripts, shortcuts, etc. Below is a comprehensive list of RunDll32 Control Panel (CP) commands. Some may or may not be available or work properly depending on the specific Windows NTx OS(es) build/edition/release/update/version +/- bit strength [32-bit (x86) or 64-bit (x64)] installed on your computer(s)/device(s): Add/Change/Repair/Uninstall Add-ons, Drivers, Programs, Features, Tools: RUNDLL32.EXE SHELL32.DLL,Control_RunDLL appwiz.cpl,,0 Personalization -> Display: RUNDLL32.EXE SHELL32.DLL,Control_RunDLL desk.cpl Personalization -> Desktop Background (Wallpaper): RUNDLL32.EXE SHELL32.DLL,Control_RunDLL desk.cpl,,@Desktop Personalization -> Color and Appearance (Aero): RUNDLL32.EXE SHELL32.DLL,Control_RunDLL desk.cpl,Advanced,@Advanced Personalization -> Screen Saver: RUNDLL32.EXE SHELL32.DLL,Control_RunDLL desk.cpl,screensaver,@screensaver Content Advisor: RUNDLL32.EXE msrating.dll,RatingSetupUI Control Panel: RUNDLL32.EXE SHELL32.DLL,Control_RunDLL Primary Graphics/Video Adapter/Controller: RUNDLL32.EXE display.dll,ShowAdapterSettings Secondary Graphics/Video Adapter/Controller (if any): RUNDLL32.EXE display.dll,ShowAdapterSettings 1 Device Installation Settings: RUNDLL32.EXE newdev.dll,DeviceInternetSettingUi RUNDLL32.EXE newdev.dll,DeviceInternetSettingUi 2 Delete Internet Explorer (IE) temporary browsing, cache, cookies, history files + (sub)folders from the DOS console command line using Windows system built-in command line tools: http://www.winhelponline.com/blog/clear-ie-cache-command-line-rundll32/ http://www.superuser.com/questions/450014/ http://www.stackoverflow.com/questions/33447236/ http://social.msdn.microsoft.com/forums/ie/ce81943b-32b8-437b-b620-171c3d5893e7/ Delete Internet Explorer (IE) History: RUNDLL32.EXE InetCpl.cpl,ClearMyTracksByProcess 1 Delete Internet Explorer (IE) Cookies: RUNDLL32.EXE InetCpl.cpl,ClearMyTracksByProcess 2 Delete Internet Explorer (IE) Temporary Internet Files (TIF): RUNDLL32.EXE InetCpl.cpl,ClearMyTracksByProcess 4 Delete Internet Explorer (IE) Favorites Cached Data (FCD) + History: RUNDLL32.EXE InetCpl.cpl,ClearMyTracksByProcess 8 Delete Internet Explorer (IE) Form Data (FD): RUNDLL32.EXE InetCpl.cpl,ClearMyTracksByProcess 16 Delete Internet Explorer (IE) Passwords: RUNDLL32.EXE InetCpl.cpl,ClearMyTracksByProcess 32 Delete Internet Explorer (IE) Phishing Filter Data (PFD): RUNDLL32.EXE InetCpl.cpl,ClearMyTracksByProcess 64 Delete Internet Explorer (IE) Web Page Recovery Data: RUNDLL32.EXE InetCpl.cpl,ClearMyTracksByProcess 128 Delete All Internet Explorer (IE) browsing + Temporary Internet Files (TIF): RUNDLL32.EXE InetCpl.cpl,ClearMyTracksByProcess 255 Delete All Internet Explorer (IE) browsing + Temporary Internet Files (TIF) without GUI: RUNDLL32.EXE InetCpl.cpl,ClearMyTracksByProcess 256 Delete All Internet Explorer (IE) browsing + Temporary Internet Files (TIF) without using multi-threading delete (slower): RUNDLL32.EXE InetCpl.cpl,ClearMyTracksByProcess 512 Delete Internet Explorer (IE) Private Mode Data (PMD): RUNDLL32.EXE InetCpl.cpl,ClearMyTracksByProcess 1024 Delete Internet Explorer (IE) Tracking Data (TD): RUNDLL32.EXE InetCpl.cpl,ClearMyTracksByProcess 2048 Delete Internet Explorer (IE) Add-ons Data (AoD): RUNDLL32.EXE InetCpl.cpl,ClearMyTracksByProcess 4096 Delete All Internet Explorer (IE) Add-ons settings + data (AoSD): RUNDLL32.EXE InetCpl.cpl,ClearMyTracksByProcess 4351 Delete Internet Explorer (IE) History + keep Favorites Cached Data (FCD): RUNDLL32.EXE InetCpl.cpl,ClearMyTracksByProcess 8192 Delete Internet Explorer (IE) download History: RUNDLL32.EXE InetCpl.cpl,ClearMyTracksByProcess 16384 Date and Time Properties: RUNDLL32.EXE SHELL32.DLL,Control_RunDLL timedate.cpl Ease of Access Center: RUNDLL32.EXE SHELL32.DLL,Control_RunDLL access.cpl Display Settings: RUNDLL32.EXE SHELL32.DLL,Control_RunDLL access.cpl,,3 Device Manager: RUNDLL32.EXE DEVMGR.DLL,DeviceManager_Execute RUNDLL32.EXE SHELL32.DLL,Control_RunDLL hdwwiz.cpl RUNDLL32.EXE SHELL32.DLL,Control_RunDLL hdwwiz.cpl,,0 Folder (File Explorer) Options -> (General) View tab: RUNDLL32.EXE SHELL32.DLL,Options_RunDLL 0 OR: CONTROL.EXE folders Folder Options -> File Types (Windows Vista/7 only): RUNDLL32.EXE SHELL32.DLL,Control_Options 2 Folder Options -> Search: RUNDLL32.EXE SHELL32.DLL,Options_RunDLL 2 Folder Options -> View: RUNDLL32.EXE SHELL32.DLL,Options_RunDLL 7 Forgotten Password Wizard: RUNDLL32.EXE KEYMGR.DLL,PRShowSaveWizardExW Devices and Printers -> Bluetooth Devices -> Bluetooth Settings: RUNDLL32.EXE SHELL32.DLL,Control_RunDLL bthprops.cpl,,1 Devices and Printers -> Bluetooth Devices -> COM Ports: RUNDLL32.EXE SHELL32.DLL,Control_RunDLL bthprops.cpl,,2 Devices and Printers -> Bluetooth Devices -> Hardware: RUNDLL32.EXE SHELL32.DLL,Control_RunDLL bthprops.cpl,,3 Devices and Printers -> Bluetooth Devices -> Shared Folder: RUNDLL32.EXE SHELL32.DLL,Control_RunDLL bthprops.cpl,,4 Devices and Printers -> (Set up USB) Game Controllers -> Joystick Properties: RUNDLL32.EXE SHELL32.DLL,Control_RunDLL joy.cpl Infrared (IR) Properties: RUNDLL32.EXE SHELL32.DLL,Control_RunDLL irprops.cpl Hibernate: RUNDLL32.EXE POWRPROF.DLL,SetSuspendState Internet Explorer (IE) Properties -> General: RUNDLL32.EXE SHELL32.DLL,Control_RunDLL inetcpl.cpl RUNDLL32.EXE SHELL32.DLL,Control_RunDLL inetcpl.cpl,,0 Internet Explorer (IE) Properties -> Security: RUNDLL32.EXE SHELL32.DLL,Control_RunDLL inetcpl.cpl,,1 Internet Explorer (IE) Properties -> Privacy: RUNDLL32.EXE SHELL32.DLL,Control_RunDLL inetcpl.cpl,,2 Internet Explorer (IE) Properties -> Content: RUNDLL32.EXE SHELL32.DLL,Control_RunDLL inetcpl.cpl,,3 Internet Explorer (IE) Properties -> Connections: RUNDLL32.EXE SHELL32.DLL,Control_RunDLL inetcpl.cpl,,4 Internet Explorer (IE) Properties -> Programs: RUNDLL32.EXE SHELL32.DLL,Control_RunDLL inetcpl.cpl,,5 Internet Explorer (IE) Properties -> Advanced: RUNDLL32.EXE SHELL32.DLL,Control_RunDLL inetcpl.cpl,,6 Keyboard Properties: RUNDLL32.EXE SHELL32.DLL,Control_RunDLL main.cpl @1 Lock Screen: RUNDLL32.EXE USER32.DLL,LockWorkStation Swap Left and Right Mouse Buttons: RUNDLL32.EXE USER32.DLL,SwapMouseButton Mouse Properties: RUNDLL32.EXE SHELL32.DLL,Control_RunDLL main.cpl @0,0 Keyboard Properties: RUNDLL32.EXE SHELL32.DLL,Control_RunDLL main.cpl keyboard Map Network Drive Wizard: RUNDLL32.EXE SHELL32.DLL,SHHelpShortcuts_RunDLL Connect Network Connections: RUNDLL32.EXE SHELL32.DLL,Control_RunDLL ncpa.cpl Pen, Tablet and Touch: RUNDLL32.EXE SHELL32.DLL,Control_RunDLL TabletPC.cpl Pen, Tablet and Touch -> General: RUNDLL32.EXE SHELL32.DLL,Control_RunDLL TabletPC.cpl @1,general Pen, Tablet and Touch -> Buttons: RUNDLL32.EXE SHELL32.DLL,Control_RunDLL TabletPC.cpl @1,buttons Pen, Tablet and Touch -> Flicks: RUNDLL32.EXE SHELL32.DLL,Control_RunDLL TabletPC.cpl @0,flicks Pen, Tablet and Touch -> Touch: RUNDLL32.EXE SHELL32.DLL,Control_RunDLL TabletPC.cpl @0,touch Sync Center -> Offline Files: RUNDLL32.EXE SHELL32.DLL,Control_RunDLL cscui.dll RUNDLL32.EXE SHELL32.DLL,Control_RunDLL cscui.dll,2 Organize Internet Explorer (IE) Favorites: RUNDLL32.EXE SHDOCVW.DLL,DoOrganizeFavDlg Open With -> replace FileName.ext with an actual file name + extension: RUNDLL32.EXE SHELL32.DLL,OpenAs_RunDLL FileName.ext Printer User Interface command line options, switches + parameters: RUNDLL32.EXE PRINTUI.DLL,PrintUIEntry /? Printer Management Folder: RUNDLL32.EXE SHELL32.DLL,SHHelpShortcuts_RunDLL PrintersFolder Power Options: RUNDLL32.EXE SHELL32.DLL,Control_RunDLL powercfg.cpl Process Idle Tasks (Windows XP/2003 only): http://web.archive.org/web/20101218135715/http://www.microsoft.com/whdc/archive/benchmark.mspx RUNDLL32.EXE ADVAPI32.DLL,ProcessIdleTasks Regional and Language Options -> Formats: RUNDLL32.EXE SHELL32.DLL,Control_RunDLL intl.cpl RUNDLL32.EXE SHELL32.DLL,Control_RunDLL intl.cpl,,0 Regional and Language Options -> Location: RUNDLL32.EXE SHELL32.DLL,Control_RunDLL intl.cpl,,1 Regional and Language Options -> Administrative: RUNDLL32.EXE SHELL32.DLL,Control_RunDLL intl.cpl,,2 Stored Usernames and Passwords: RUNDLL32.EXE KEYMGR.DLL,KRShowKeyMgr Safely Remove Hardware (Plug/Unplug Removable Devices/Storage Media): RUNDLL32.EXE SHELL32.DLL,Control_RunDLL HotPlug.dll Sound Properties: RUNDLL32.EXE SHELL32.DLL,Control_RunDLL mmsys.cpl,,0 System Properties -> Advanced: RUNDLL32.EXE SHELL32.DLL,Control_RunDLL sysdm.cpl,,3 System Properties -> System Protection: RUNDLL32.EXE SHELL32.DLL,Control_RunDLL sysdm.cpl,,4 System Properties -> Automatic Updates: RUNDLL32.EXE SHELL32.DLL,Control_RunDLL sysdm.cpl,,5 System Properties -> Environment Variables...: RUNDLL32.EXE sysdm.cpl,EditEnvironmentVariables Taskbar and Start Menu/Orb Properties: RUNDLL32.EXE SHELL32.DLL,Options_RunDLL 1 User Accounts: RUNDLL32.EXE SHELL32.DLL,Control_RunDLL nusrmgr.cpl Local User and Groups (Windows 7/newer only): MMC.EXE /S lusrmgr.msc Windows Security Center (WSC) -> Security and Maintenance: RUNDLL32.EXE SHELL32.DLL,Control_RunDLL wscui.cpl Windows -> About [winver.exe = Version information]: RUNDLL32.EXE SHELL32.DLL,ShellAbout OR: RUNDLL32.EXE SHELL32.DLL,ShellAboutW Windows Fonts Installation Folder: RUNDLL32.EXE SHELL32.DLL,SHHelpShortcuts_RunDLL FontsFolder Windows Firewall: RUNDLL32.EXE SHELL32.DLL,Control_RunDLL firewall.cpl Wireless Network Setup: RUNDLL32.EXE SHELL32.DLL,Control_RunDLL NetSetup.cpl,@0,WNSW 3D Window (Task) Switcher = Flip3D (Aero) (Windows Vista/7 only): RUNDLL32.EXE DwmApi.dll #105 Windows 16-Bit Emulation Control Panel (Windows 10 only): http://www.fileinspect.com/fileinfo/ntvdmcpl-dll/ RUNDLL32.EXE SHELL32.DLL,Control_RunDLL ntvdmcpl.dll Windows To Go Startup Options (Windows 10 only): RUNDLL32.EXE pwlauncher.dll,ShowPortableWorkspaceLauncherConfigurationUX Syntax using Shell32 [SHELL32.DLL] functions: RUNDLL32.EXE SHELL32.DLL,[#|-] [] DLL_Name.dll or Program_Name.exe has stopped working -> Close the program: RUNDLL32.EXE SHELL32.DLL,#49 DLL_Name.dll or Program_Name.exe has stopped working -> Close the program: RUNDLL32.EXE SHELL32.DLL,#50 DLL_Name.dll or Program_Name.exe has stopped working -> Close the program: RUNDLL32.EXE SHELL32.DLL,#51 DLL_Name.dll or Program_Name.exe has stopped working -> Close the program: RUNDLL32.EXE SHELL32.DLL,#52 Sign Out [unattended, no confirmation]: RUNDLL32.EXE SHELL32.DLL,#54 DLL_Name.dll or Program_Name.exe has stopped working -> Close the program: RUNDLL32.EXE SHELL32.DLL,#55 DLL_Name.dll or Program_Name.exe has stopped working -> Close the program: RUNDLL32.EXE SHELL32.DLL,#56 DLL_Name.dll or Program_Name.exe has stopped working -> Close the program: RUNDLL32.EXE SHELL32.DLL,#57 DLL_Name.dll or Program_Name.exe has stopped working -> Close the program: RUNDLL32.EXE SHELL32.DLL,#58 You must restart your computer to apply these changes: Restart Now | Restart Later: RUNDLL32.EXE SHELL32.DLL,#59 Run... [hold WinKey + press R]: RUNDLL32.EXE SHELL32.DLL,#61 DLL_Name.dll or Program_Name.exe has stopped working -> Close the program: RUNDLL32.EXE SHELL32.DLL,#62 * Use Microsoft Management Console (MMC) [MMC.EXE] snap-in control precompiled script files (.mmc) in Windows 2000/newer: http://en.wikipedia.org/wiki/Microsoft_Management_Console http://learn.microsoft.com/windows-server/administration/windows-commands/mmc/ http://msdn.microsoft.com/library/bb742441.aspx http://msdn.microsoft.com/library/bb742442.aspx http://www.ss64.com/nt/syntax-mmc.html http://www.groovypost.com/tips/mmc-exe-windows-process-safe-virus/ http://www.ghacks.net/2017/06/10/windows-msc-files-overview/ http://www.mdgx.com/add.htm#MMC Syntax: MMC.EXE \. File paths, file names, file extensions + optional arguments/parameters are case insensitive. MMC commands can be used in shortcuts, DOS console BATch (.bat)/CoMmanD (.cmd) files, scripts, powershell, etc. MMC command line using /S (Silent) parameter (example): MMC.EXE /S services.msc NOTE: Microsoft "quietly" discontinued the /S (Silent) MMC parameter from Windows 8/newer. :-( By default *.msc files are associated with %WinDir%\SYSTEM32\MMC.EXE, therefore they can be run by themselves (example): services.msc unless you need to run them with specific command line arguments/parameters, in which case you need to use the MMC command in front of the *.msc file name, and followed by respective parameter(s) (see example above). Most *.msc files are located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually C:\WINDOWS], listed in your system PATH. View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command PATH -> press Enter. * Administrative Tools [for .msc files + links -> see above]: Administrative Tools = CONTROL.EXE admintools Authorization Manager = azman.msc Certificate Manager = certmgr.msc Component Services = comexp.msc + dcomcnfg.exe DirectX (DX) Diagnostic Tool = dxdiag.exe Display Languages = lpksetup.exe ODBC Data Source Administrator = odbcad32.exe File Signature Verification Tool = sigverif.exe Group Policy Editor (GPE) = gpedit.msc [Microsoft removed GPE from all Windows XP/newer Home + Starter editions! :-(] http://www.mdgx.com/xptoy.htm#GPX Add Hardware Wizard = hdwwiz.cpl iSCSI Initiator = iscsicpl.exe Iexpress (Internet Explorer Express) Wizard = iexpress.exe Local Security Settings = secpol.msc Microsoft Support Diagnostic Tool (MSDT) = msdt.exe Microsoft Management Console (MMC) = mmc.exe Print management = printmanagement.msc Printer User Interface = printui.exe Problems Steps Recorder (PSR) = psr.exe People Near Me = p2phost.exe Registry Editor (RegEdit) = regedit.exe or regedt32.exe Resoure Monitor = resmon.exe System Configuration Utility = msconfig.exe Resultant Set of Policy (RSOP) = rsop.msc SQL Server Client Configuration = cliconfg.exe Task Manager (TM) = taskmgr.exe [also LaunchTM.exe in Windows 10/newer] Trusted Platform Module (TPM) = tpm.msc TPM Security Hardware = TpmInit.exe Windows Remote Assistance (WRA) = msra.exe Windows Share Folder Creation Wizard = shrpubw.exe Windows Update Manager (WUM) = wusa.exe Windows System Security Tool = syskey.exe Windows Script Host Settings = wscript.exe Windows Version = winver.exe Windows (Defender) Firewall [W(D)F] with Advanced Security = wf.msc Windows Memory Diagnostic = MdSched.exe Windows Malicious Removal Tool (MRT) = mrt.exe * Computer Management: Management Saved Console (.msc) script files are associated by default with and executed by Microsoft Management Console (MMC.EXE) snap-in control tool, and most of them are located in the %WinDir%\SYSTEM32 folder [%WinDir% = usually C:\WINDOWS]. http://en.wikipedia.org/wiki/Microsoft_Management_Console View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command PATH -> press Enter. Command line (example): MMC.EXE /S services.msc Computer Management = compmgmt.msc or CompMgmtLauncher.exe Task Scheduler = CONTROL.EXE schedtasks or taskschd.msc Event Viewer = eventvwr.msc Shared Folders = fsmgmt.msc Local Users and Groups = lusrmgr.msc Performance Monitor = perfmon.msc Device Manager = devmgmt.msc Disk Management = diskmgmt.msc Windows Services = services.msc Windows Management Infrastructure (WMI) = wmimgmt.msc * Control Panel: Control Panel = CONTROL.EXE Action (Security) Center = wscui.cpl AutoPlay = CONTROL.EXE /name Microsoft.AutoPlay Backup and Restore = sdclt.exe Create a System Repair disc = recdisc.exe BDE Administrator = bdeadmin.cpl Color Management = colorcpl.exe Credential Manager = CONTROL.EXE /name Microsoft.CredentialManager Credential Manager Stored User Names and Passwords = credwiz.exe Date and Time Properties = timedate.cpl Default Programs = CONTROL.EXE /name Microsoft.DefaultPrograms Set Program Access and Computer Defaults = CONTROL.EXE appwiz.cpl,,3 or ComputerDefaults Devices and Printers = CONTROL.EXE Printers Devices and Printers Add a Device = DevicePairingWizard.exe Display = dpiscaling.exe Screen Resolution = desk.cpl Display Color Calibration = dccw.exe Cleartype Text Tuner = cttune.exe Folders (File Explorer) Options (General) View tab = CONTROL.EXE Folders Fonts = CONTROL.EXE Fonts Getting Started = GettingStarted.exe HomeGroup = CONTROL.EXE /name Microsoft.HomeGroup Indexing Options = CONTROL.EXE /name Microsoft.IndexingOptions Internet Explorer (IE) Properties = inetcpl.cpl Keyboard = CONTROL.EXE keyboard Location and Other Sensors = CONTROL.EXE /name Microsoft.LocationandOtherSensors Location Notifications = LocationNotifications.exe Mouse = CONTROL.EXE mouse or main.cpl or CONTROL.EXE main.cpl,,0 Network and Sharing Center = CONTROL.EXE /name Microsoft.NetworkandSharingCenter Network Connections = CONTROL.EXE NetConnections or ncpa.cpl Notification Area Icons = CONTROL.EXE /name Microsoft.NotificationAreaIcons Parental Controls = CONTROL.EXE /name Microsoft.ParentalControls Performance Information = CONTROL.EXE /name Microsoft.PerformanceInformationandTools Personalization = CONTROL.EXE Desktop Windows Color and Appearance (Aero) = CONTROL.EXE Color Phone and Modem Options = telephon.cpl Power Configuration = powercfg.cpl Programs and Features = appwiz.cpl or CONTROL.EXE appwiz.cpl Optional Features Manager = OptionalFeatures.exe or CONTROL.EXE appwiz.cpl,,2 Recovery = CONTROL.EXE /name Microsoft.Recovery Regional and Language = intl.cpl RemoteApp and Desktop Connections = CONTROL.EXE /name Microsoft.RemoteAppandDesktopConnections Sound = mmsys.cpl Personalization (Desktop Background, Themes, Colors, Appearance, Sounds, Screen Saver) = CONTROL.EXE desk.cpl,,2 Screen Saver (SS) = CONTROL.EXE desk.cpl,,1 Speech Properties = %WinDir%\SYSTEM32\Speech\SpeechUX\SpeechUXWiz.exe (Windows 10/11) Speech Recognition = %WinDir%\Speech\Common\sapisvr.exe (Windosws 7/8/8.1) Volume Mixer = sndvol.exe System Properties = sysdm.cpl or hold WinKey + press Pause/Break System Properties ComputerName tab = SystemPropertiesComputerName.exe System Properties Hardware tab = SystemPropertiesHardware.exe System Properties Advanced tab = SystemPropertiesAdvanced.exe System Properties Performance Options = SystemPropertiesPerformance.exe System Properties Data Execution Prevention = SystemPropertiesDataExecutionPrevention.exe System Properties Protection tab = SystemPropertiesProtection.exe System Properties Remote tab = SystemPropertiesRemote.exe Windows Activation = slui.exe Windows Activation Phone Numbers = slui.exe 4 Taskbar and Start Menu = CONTROL.EXE /name Microsoft.TaskbarandStartMenu Program Compatibility Troubleshooter (PCT) (Diagnostics Troubleshooting Wizard) = CONTROL.EXE /name Microsoft.Troubleshooting (MSDT.EXE -id PCWDiagnostic) User Accounts = CONTROL.EXE /name Microsoft.UserAccounts User Account Control (UAC) Settings = UserAccountControlSettings.exe User Accounts / Windows domain version = netplwiz.exe or CONTROL.EXE Userpasswords2 Encryption File System = rekeywiz.exe Windows Anytime Upgrade = WindowsAnytimeUpgradeui.exe Windows Anytime Upgrade Results = WindowsAnytimeUpgradeResults.exe Windows CardSpace = CONTROL.EXE /name Microsoft.cardspace Windows (Defender) Firewall [W(D)F] = firewall.cpl or CONTROL.EXE /name Microsoft.WindowsFirewall Windows Network Diagnostics (Diagnostics Troubleshooting Wizard) = MSDT.EXE -id NetworkDiagnosticsWeb -ep SystemSettings_Troubleshoot_L2 -skip true -elevated yes WindowsSideshow = CONTROL.EXE /name Microsoft.WindowsSideshow Windows Update (WU) = CONTROL.EXE /name Microsoft.WindowsUpdate (CONTROL.EXE update) (wuapp.exe) Windows Update (WU) -> Change Settings = CONTROL.EXE /name Microsoft.WindowsUpdate /page pageSettings * Accessories: Calculator = calc.exe Command Prompt (DOS console) = cmd.exe http://learn.microsoft.com/windows-server/administration/windows-commands/cmd/ Connect to a Network Projector = NetProj.exe Presentation Settings = PresentationSettings.exe Connect/switch to a second screen/projector = displayswitch.exe or hold WinKey + press P Notepad = notepad.exe Microsoft Paint = mspaint.exe Remote Desktop Connection (RDC) = mstsc.exe Run... [hold WinKey + press R] or run this command: RUNDLL32.EXE SHELL32.DLL,#61 Snipping Tool = snippingtool.exe Sound Recorder = soundrecorder.exe Sticky Note = StikyNot.exe Sync Center = mobsync.exe Windows Mobility Center [laptops/notebooks/portables only] = mblctr.exe or hold WinKey + press X Windows Explorer = explorer.exe or hold WinKey + press E Wordpad = write.exe or wordpad.exe Ease of Access Center (EAC) = utilman.exe or hold WinKey + press U Magnifier = magnify.exe Narrator = Narrator.exe On Screen Keyboard (OSK) = osk.exe Private Character Editor = eudcedit.exe Character Map = charmap.exe Digitizer Calibration Tool = tabcal.exe Disk Cleanup Utility = cleanmgr.exe Defragment User Interface = dfrgui.exe Internet Explorer (IE) = iexplore.exe Internet Explorer (IE) no add-ons = iexplore.exe -extoff Internet Explorer (IE) no home page = iexplore.exe about:blank Phone Dialer = dialer.exe Printer Migration = PrintBrmUi.exe Rating System = ticrf.exe System Information = msinfo32.exe System Restore = rstrui.exe Windows Easy Transfer = migwiz.exe Windows Media Player (WMP) = wmplayer.exe Windows Media Player DVD Player = dvdplay.exe Windows Fax and Scan Cover Page Editor = fxscover.exe Windows Fax and Scan = wfs.exe Windows Image Acquisition (WIA, WMA) (scanners, copiers) = wiaacmgr.exe Windows PowerShell = PowerShell.exe [C:\WINDOWS\System32\WindowsPowerShell\v1.0\PowerShell.exe = default location] Example of "fully loaded" PowerShell command line: PowerShell.exe -noExit -ExecutionPolicy Unrestricted -ImportSystemModules -Command Set-Location -literalPath '%V' http://learn.microsoft.com/windows-server/administration/windows-commands/powershell/ http://learn.microsoft.com/powershell/module/microsoft.powershell.core/about/about_powershell_exe/ http://learn.microsoft.com/powershell/module/microsoft.powershell.security/set-executionpolicy/ http://www.ss64.com/ps/powershell.html http://www.ss64.com/ps/ http://www.ss64.com/ps/syntax-elevate.html Windows PowerShell ISE (Integrated Scripting Environment) = powershell_ise.exe [C:\WINDOWS\System32\WindowsPowerShell\v1.0\PowerShell_ISE.exe = default location] http://learn.microsoft.com/powershell/module/microsoft.powershell.core/about/about_powershell_ise_exe/ XPS (XML Paper Specification) Viewer = xpsrchvw.exe * Other System + User Shell Folders: Open Documents folder = Documents Open Pictures folder = Pictures Open Music folder = Music Open Videos folder = Videos Open Downloads folder = Downloads Open Favorites folder = Favorites Open Recent folder = Recent Logs out of Windows = Logoff Locks User Account = hold WinKey + press L * List of System + User Shell Folders in Windows Vista/newer: http://www.ss64.com/nt/shell.html http://www.winhelponline.com/blog/shell-commands-to-access-the-special-folders/ http://www.winaero.com/list-of-shell-commands-in-windows-10/ http://www.tenforums.com/tutorials/3109-shell-commands-list-windows-10-a.html http://www.techradar.com/news/computing/pc/shell-folders-the-best-kept-windows-time-saving-secret-464668/ These preset/hard linked system + user shell folders and their locations are listed under these registry keys (some may not exist, depending on Windows NTx OS build/edition/release/update/version): HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders\Backup HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders See also "XP -> 7/8/8.1 Easy Transfer Files + Settings" chapter further below + "* Link Directory IDentifier (LDID)/DIRectory IDentifier (DIRID)/Decentralized IDentifier (DID)" topic further above: http://www.mdgx.com/7.php http://www.mdgx.com/WINDOWS7.TXT View their locations from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter (example): EXPLORER.EXE shell:AppData To view the rest -> repeat this command by sustituting AppData with the string values listed below: Shell Command Description —————————————————————————————————————————————————————————————————————————————— shell:AccountPictures Account Pictures shell:AddNewProgramsFolder Programs Control Panel item shell:Administrative Tools Administrative Tools shell:AppData C:\Users\%UserName%\Appdata\Roaming = %AppData% shell:Application Shortcuts Modern Apps shortcuts shell:AppsFolder Installed Modern Apps shell:AppUpdatesFolder Installed Updates Control Panel item shell:Cache Internet Explorer (IE) Cache [Temporary Internet Files (TIF)] shell:CD Burning Temporary Burn shell:ChangeRemoveProgramsFolder Uninstall Program Control Panel item shell:Common Administrative Tools Administrative Tools for all users shell:Common AppData C:\ProgramData = %ProgramData% shell:Common Desktop Public Desktop = same for all users shell:Common Documents Public Documents shell:Common Programs All Users Programs = part of Start Menu + used by Start screen shell:Common Start Menu All Users Start Menu shell:Common Startup Startup = all users shell:Common Templates Startup = new documents, templates (MS Office) shell:CommonDownloads Public Downloads shell:CommonMusic Public Music shell:CommonPictures Public Pictures shell:CommonRingtones Public Ringtones shell:CommonVideo Public Videos shell:ConflictFolder Control Panel\All Control Panel Items\Sync Center\Conflicts item shell:ConnectionsFolder Control Panel\All Control Panel Items\Network Connections item shell:Contacts Contacts = Address book shell:ControlPanelFolder Control Panel shell:Cookies Internet Explorer (IE) Cookies shell:CredentialManager C:\Users\%UserName%\AppData\Roaming\Microsoft\Credentials shell:CryptoKeys C:\Users\%UserName%\AppData\Roaming\Microsoft\Crypto shell:CSCFolder Offline files = Not valid in Windows 7/newer shell:Desktop Desktop = different for each user shell:Device Metadata Store C:\ProgramData\Microsoft\Windows\DeviceMetadataStore shell:DocumentsLibrary Documents Library shell:Downloads Downloads shell:DpapiKeys C:\Users\%UserName%\AppData\Roaming\Microsoft\Protect shell:Favorites Favorites shell:Fonts C:\WINDOWS\Fonts = %WinDir%\Fonts shell:Games Games Explorer item shell:GameTasks C:\Users\%UserName%\AppData\Local\Microsoft\Windows\GameExplorer shell:History C:\Users\%UserName%\AppData\Local\Microsoft\Windows\History = Internet Explorer (IE) browsing history shell:HomeGroupCurrentUserFolder Home Group for current user shell:HomeGroupFolder Home Group root shell:ImplicitAppShortcuts C:\Users\%UserName%\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\ImplicitAppShortcuts shell:InternetFolder Internet Explorer (IE) shell:Libraries Libraries shell:Links Favorites = Explorer menu shell:LocalAppData C:\Users\%UserName%\AppData\Local shell:LocalAppDataLow C:\Users\%UserName%\AppData\LocalLow shell:LocalizedResourcesDir Not valid in Windows 8/8.1/10 shell:MAPIFolder Microsoft Outlook shell:MusicLibrary Music Library shell:My Music My Music (not Library) shell:My Pictures My Pictures (not Library) shell:My Video My Videos (not Library) shell:MyComputerFolder Computer/Drives shell:NetHood C:\Users\%UserName%\AppData\Roaming\Microsoft\Windows\Network Shortcuts shell:NetworkPlacesFolder Network Places = Computers and Devices instaleld on respective network shell:OEM Links May work only in Windows 8/8.1/10 OEM editions [?] shell:Original Images Not functional in Windows 8/8.1/10 shell:Personal My Documents (not Library) shell:PhotoAlbums Saved slideshows = Not implemented yet [?] shell:PicturesLibrary Pictures Library shell:Playlists Stored WMP Playlists shell:PrintersFolder Classic Printers (not Devices and Printers) shell:PrintHood C:\Users\%UserName%\AppData\Roaming\Microsoft\Windows\Printer Shortcuts shell:Profile User profile = %UserProfile% = C:\Users\%UserName% shell:ProgramFiles C:\Program Files = %ProgramFiles% shell:ProgramFilesX86 C:\Program Files (x86) = %ProgramFiles(x86)% = Windows 64-bit (x64) only shell:ProgramFilesCommon C:\Program Files\Common Files shell:ProgramFilesCommonX86 C:\Program Files (x86)\Common Files = Windows 64-bit (x64) only shell:Programs C:\Users\%UserName%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs = Per user Start Menu Programs shell:Public C:\Users\Public shell:PublicAccountPictures C:\Users\Public\AccountPictures shell:PublicGameTasks C:\ProgramData\Microsoft\Windows\GameExplorer shell:PublicLibraries C:\Users\Public\Libraries shell:Quick Launch C:\Users\%UserName%\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch shell:Recent Recent Items = Recent Documents shell:RecordedTVLibrary Recorded TV Library shell:RecycleBinFolder Recycle Bin shell:ResourceDir C:\WINDOWS\Resources = %WinDir%\Resources stores visual styles shell:Ringtones C:\Users\%UserName%\AppData\Local\Microsoft\Windows\Ringtones shell:Roamed Tile Images Not implemented yet = reserved for future use [?] shell:Roaming Tiles C:\Users\%UserName%\AppData\Local\Microsoft\Windows\RoamingTiles shell:SavedGames Saved Games shell:Screenshots Win+Print Screen screen shots shell:Searches Saved Searches shell:SearchHomeFolder Windows Search UI shell:SendTo Items visible in Send to menu shell:Start Menu C:\Users\%UserName%\AppData\Roaming\Microsoft\Windows\Start Menu = Logged on User Start Menu shell:Startup Logged on User Startup shell:SyncCenterFolder Control Panel\All Control Panel Items\Sync Center shell:SyncResultsFolder Control Panel\All Control Panel Items\Sync Center\Sync Results shell:SyncSetupFolder Control Panel\All Control Panel Items\Sync Center\Sync Setup shell:System C:\WINDOWS\System32 = %WinDir%\System32 shell:SystemCertificates C:\Users\%UserName%\AppData\Roaming\Microsoft\SystemCertificates shell:SystemX86 C:\WINDOWS\SysWOW64 = %WinDir%\SysWOW64 = Windows 64-bit (x64) only shell:Templates C:\Users\%UserName%\AppData\Roaming\Microsoft\Windows\Templates shell:User Pinned C:\Users\%UserName%\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned = Pinned items shell:UserProfiles C:\Users = Users profiles shell:UserProgramFiles Not implemented yet = reserved for future use [?] shell:UserProgramFilesCommon Not implemented yet = reserved for future use [?] shell:UsersFilesFolder Current user profile shell:UsersLibrariesFolder Libraries shell:VideosLibrary Videos Library shell:Windows C:\WINDOWS = %WinDir% TIP: **** Windows NTx built-in/default/pre-installed/preset machine/system (apply to all users on the same machine) + local/user (apply only to the current/logged on user) environment variables used for target system/user directories/folders: http://www.ss64.com/nt/syntax-variables.html http://pureinfotech.com/list-environment-variables-windows-10/ http://www.computerhope.com/issues/ch000549.htm - %LocalAppData% = usually %UserProfile%\AppData\Local [same as C:\Users\%UserName%\AppData\Local] OR %WinDir%\SYSTEM32\Config\SystemProfile\AppData\Local . - %ProgramData% = usually C:\ProgramData . - %ProgramFiles% = usually C:\Program Files [exists in Windows 32-bit (x86) + Windows 64-bit (x64)]. - %ProgramFiles(x86)% = usually C:\Program Files (x86) [exists only in Windows 64-bit (x64)]. - %SystemDrive% = usually C:\ root. - %SystemRoot% = usually C:\WINDOWS [same as %WinDir%]. - %UserName% = your user name. - %UserProfile% = usually C:\Users\%UserName% . - %WinDir% = usually C:\WINDOWS [same as %SystemRoot%]. CAUTION: ******** Windows operating system (OS) integrity, proper functionality + correct operation *depend* on the *validity* of *all* these variables! INvalid/wrong parameters can render Windows INoperable or/and UNbootable, and you may have to reinstall from scratch or repair your operating system (OS), eventually using the original storage media containing Windows Setup files! Some of these variables can be added/customized/deleted/modified by using a Control Panel (CP)/Windows Settings (WS) tool: Run... [hold WinKey + press R] -> type this command SystemPropertiesAdvanced.exe -> press Enter -> Advanced tab -> Environment Variables... button -> edit variables -> highlight respective line -> Edit button -> change parameters -> OK -> OK. View the list of all your Windows operating system (OS) environment variables from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command SET -> press Enter. OR Save it to a plain text/ASCII (.txt) file: from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type same command above followed by the name of the file (in this example it will be saved in C:\ root) SET>C:\Windows_Environment_Variables.txt -> press Enter -> use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to view text file contents. Example of Windows Vista/newer list of relevant environment variables [replace all User_Name instances with your actual user name]: ----------snippity-snip---------- ALLUSERSPROFILE=C:\ProgramData APPDATA=C:\Users\PC\AppData\Roaming [OR: APPDATA=C:\Windows\system32\config\systemprofile\AppData\Roaming] CommonProgramFiles=C:\Program Files\Common Files CommonProgramFiles(x86)=C:\Program Files (x86)\Common Files [exists only in Windows 64-bit (x64)] CommonProgramW6432=C:\Program Files\Common Files ComSpec=C:\Windows\system32\cmd.exe DriverData=C:\Windows\System32\Drivers\DriverData HOMEDRIVE=C: HOMEPATH=\WINDOWS\SYSTEM32 [OR: HOMEPATH=\Users\User_Name] LOCALAPPDATA=C:\Users\PC\AppData\Local [OR: LOCALAPPDATA=C:\Windows\system32\config\systemprofile\AppData\Local] OS=Windows_NT ProgramData=C:\ProgramData ProgramFiles=C:\Program Files ProgramFiles(x86)=C:\Program Files (x86) [exists only in Windows 64-bit (x64)] ProgramW6432=C:\Program Files PSModulePath=%ProgramFiles%\WindowsPowerShell\Modules;C:\Windows\system32\WindowsPowerShell\v1.0\Modules PUBLIC=C:\Users\Public SystemDrive=C: SystemRoot=C:\Windows TEMP=C:\Users\PC\AppData\Local\Temp [OR: TEMP=C:\Windows\TEMP] TMP=C:\Users\PC\AppData\Local\Temp [OR: TMP=C:\Windows\TEMP] USERNAME=User_Name USERPROFILE=C:\Users\User_Name [OR: USERPROFILE=C:\Windows\system32\config\systemprofile] windir=C:\Windows ----------snippity-snip---------- ______________________________________________________________________________ Public Root DNS Servers [*] http://www.mdgx.com/7.php#:~:text=Public%20Root%20DNS%20Servers%20%5B%2A%5D * Secure encrypted public Root DNS (Domain Name System) Servers = DNS over HTTPS (HyperText Transfer Protocol Secure) (DoH) + DNS over TLS (Transport Layer Security) (DoT) providers [free]: http://www.privacyguides.org/dns/#recommended-providers http://dnscrypt.info/public-servers/ http://www.lifewire.com/free-and-public-dns-servers-2626062/ http://github.com/curl/curl/wiki/DNS-over-HTTPS/ http://www.privacytools.io/encrypted-dns/ http://twitgoo.com/best-free-dns-servers/ http://public-dns.info/ http://public-dns.info/nameserver/us.html http://servers.opennicproject.org/ http://www.publicdns.xyz/ http://wiki.ipfire.org/dns/public-servers http://www.tech-faq.com/public-dns-servers.html http://adguard-dns.io/kb/general/dns-providers/ http://fmhy.pages.dev/storage/#dns-filters http://www.tweaks.com/windows/40339/ http://www.zdnet.com/blog/networking/fixing-dns-woes-for-comcast-users-and-everyone-else/ * Turn ON "Secure DNS" [DNS over HTTPS (DoH)] in your web browser: - See "@ Chromium/Chrome web browsers + alternatives/derivatives/forks/variants:" topic under "Digital + Internet/Online Privacy, Safety + Security = Your Top Priority" chapter http://www.mdgx.com/7.php#:~:text=Digital%20%2B%20Internet%2FOnline%20Privacy%2C%20Safety%20%2B%20Security%20%3D%20Your%20Top%20Priority further below in WINDOWS7.TXT (this file): http://www.mdgx.com/7.php http://www.mdgx.com/WINDOWS7.TXT - Turn ON Chromium/Chrome "Use Secure DNS" [DNS over HTTPS (DoH)] encrypted IP lookup feature: http://support.google.com/chrome/answer/10468685/ - Configure DNS over HTTPS (DoH) "Enable Secure DNS" protection levels in Firefox: http://support.mozilla.org/kb/dns-over-https/ * DNS servers detection + leak tests: - Gibson Research Corporation (GRC): DNS Nameserver Spoofability Test -> Test Your IP(s) in your web browser: http://www.grc.com/dns/dns.htm - IPLeak: IP/DNS Detect -> Test Your Web Browser: http://ipleak.net/ - BrowserLeaks: DNS (Domain Name System) Leak Test -> Test Your Web Browser: http://browserleaks.com/dns/ - Whoer: My IP, DNS Leak, Evercookie (Supercookie) + Port Scanner Tests: http://whoer.net/ - Whoer: DNS Leak Test: http://whoer.net/dns-leak-test/ * Reference: - Wikipedia: Root name server: http://en.wikipedia.org/wiki/Root_name_server - Wikipedia: Domain Name System (DNS): http://en.wikipedia.org/wiki/Domain_Name_System - Wikipedia: Secure Sockets Layer (SSL): http://en.wikipedia.org/wiki/Transport_Layer_Security#SSL_1.0,_2.0,_and_3.0 - Wikipedia: Transport Layer Security (TLS): http://en.wikipedia.org/wiki/Transport_Layer_Security - Wikipedia: DNS over TLS (DoT): http://en.wikipedia.org/wiki/DNS_over_TLS - Wikipedia: DNS over HTTPS (DoH): http://en.wikipedia.org/wiki/DNS_over_HTTPS - Wikipedia: Hypertext Transfer Protocol Secure (HTTPS): http://en.wikipedia.org/wiki/HTTPS - Wikipedia: Domain Name System Security Extensions (DNSSEC): http://en.wikipedia.org/wiki/Domain_Name_System_Security_Extensions - Wikipedia: DNSCrypt: http://en.wikipedia.org/wiki/DNSCrypt * MDGx: "Anonymous + Faster Surfing" solutions: http://www.mdgx.com/links.htm#ANO * Cloudflare WARP Desktop client 64-bit for Windows 8.1/newer 64-bit (x64) [free Virtual Private Network (VPN) using public root Domain Name System (DNS) servers]: http://1.1.1.1/ Cloudflare WARP for Windows: http://developers.cloudflare.com/warp-client/get-started/windows/ Cloudflare WARP for Linux: http://developers.cloudflare.com/warp-client/get-started/linux/ Cloudflare WARP for macOS: http://developers.cloudflare.com/warp-client/get-started/macos/ Cloudflare WARP for Android: http://developers.cloudflare.com/warp-client/get-started/android/ Cloudflare WARP for iOS: http://developers.cloudflare.com/warp-client/get-started/ios/ Use Cloudflare WARP VPN in combination with WireGuard: http://www.andryou.com/2020/03/28/guide-using-cloudflares-warp-vpn-on-a-computer-mac-pc-linux/ WireGuard VPN (free, open source): http://www.wireguard.com/ BrowserLeaks: DNS (Domain Name System) Leak Test: http://browserleaks.com/dns/ Wikipedia: Virtual Private Network (VPN): http://en.wikipedia.org/wiki/Virtual_private_network Wikipedia: Domain Name System (DNS): http://en.wikipedia.org/wiki/Domain_Name_System See MDGx "* Web Browsers, Platforms, Computers + Devices Online Protection Guides + Tools for Privacy, Safety + Security:" section further below under "Digital + Internet/Online Privacy, Safety + Security" chapter http://www.mdgx.com/7.php#:~:text=Digital%20%2B%20Internet%2FOnline%20Privacy%2C%20Safety%20%2B%20Security%20%3D%20Your%20Top%20Priority in WINDOWS7.TXT (this file): http://www.mdgx.com/7.php http://www.mdgx.com/WINDOWS7.TXT * OpenVPN Cloud, Access Server + Connect client Virtual Private Network (VPN) system provides secure point-to-point or site-to-site concurrent connections using OpenSSL (Secure Sockets Layer) encryption + Transport Layer Security (TLS) protocol, highly customizable: http://openvpn.net/ Free subscriptions for personal use = limited to: - OpenVPN Cloud = maximum 3 concurrent connections. - Access Server = maximum 2 concurrent connections. Repository: http://github.com/OpenVPN/openvpn/ OpenVPN Connect client 32-bit + 64-bit for Windows 7/newer 32-bit (x86) + 64-bit (x64) [MSI Installer]: http://openvpn.net/client-connect-vpn-for-windows/ OpenVPN FAQs: http://openvpn.net/vpn-server-resources/#faqs OpenVPN Online Documentation: http://openvpn.net/vpn-server-resources/ Wikipedia: Virtual Private Network (VPN): http://en.wikipedia.org/wiki/Virtual_private_network Wikipedia: OpenSSL: http://en.wikipedia.org/wiki/OpenSSL Wikipedia: Secure Sockets Layer (SSL): http://en.wikipedia.org/wiki/Transport_Layer_Security#SSL_1.0,_2.0,_and_3.0 Wikipedia: Transport Layer Security (TLS): http://en.wikipedia.org/wiki/Transport_Layer_Security * Portmaster Free 64-bit for Windows 7/newer 64-bit (x64) port manager, firewall, filter, secure DNS, blocker, network monitor, highly customizable: http://safing.io/ File [Setup only!]: http://updates.safing.io/latest/windows_amd64/packages/portmaster-installer.exe Windows 7 64-bit (x64) requires Microsoft Security Monthly Quality Rollup (SMQR) KB4503292: http://catalog.s.download.windowsupdate.com/d/msdownload/update/software/secu/2019/06/windows6.1-kb4503292-x64_a35bb4ea16d1d529fde9abfe8a0c16e9061f74cd.msu More info @ MSKB: http://support.microsoft.com/help/4503292/ Portmaster Documentation: http://docs.safing.io/ Community Wiki: http://wiki.safing.io/ * Pi-hole DOS console command line installer [PH4WSL1.cmd] for Windows 10/newer installs Linux Pi-hole DNS sinkhole on Windows computers, highly customizable: http://github.com/DesktopECHO/Pi-Hole-for-WSL1/ Download: http://github.com/DesktopECHO/Pi-Hole-for-WSL1/raw/master/PH4WSL1.cmd PH4WSL1.cmd install guide step-by-step: http://www.reddit.com/r/pihole/comments/j39drp/ PH4WSL1.cmd ReadMe guide: http://github.com/DesktopECHO/Pi-Hole-for-WSL1/#readme Pi-hole DNS sinkhole for Linux: http://github.com/pi-hole/pi-hole/ DNS sinkhole: http://en.wikipedia.org/wiki/DNS_sinkhole * DNSCrypt Proxy clients for Windows NTx 32-bit + 64-bit use encrypted DNS protocol to authenticate + anonymize two way traffic between DNS client and DNSCrypt enabled DNS resolver, prevents DNS spoofing, DDoS attacks: http://dnscrypt.info/ More Info: http://www.dnscrypt.org/ DNSCrypt Proxy: http://github.com/DNSCrypt/dnscrypt-proxy/ Download [ZIP -> Installer EXE]: http://github.com/dnscrypt/dnscrypt-proxy/releases/latest/ DNSCrypt Documentation: http://github.com/DNSCrypt/dnscrypt-proxy/wiki/ DNSCrypt Clients + DNSCrypt Servers: http://dnscrypt.info/implementations/ DNSCrypt Clients: http://www.dnscrypt.org/#dnscrypt-windows DNSCrypt Public Root DNS Servers: http://dnscrypt.info/public-servers/ DNSCrypt: http://en.wikipedia.org/wiki/DNSCrypt * Unbound 32-bit + 64-bit for Windows 7/newer 32-bit (x86) + 64-bit (x64) validating, recursive + caching DNS resolver, supports IPv6 (Internet Protocol version 6), DNSSEC (Domain Name System Security Extensions), NSEC (Next Secure Record), DNS over TLS (DoT) + DNS over HTTPS (DoH) encryption + protocols: http://nlnetlabs.nl/projects/unbound/ Download [Portable ZIP]: http://nlnetlabs.nl/projects/unbound/download/ Unbound Repository: http://github.com/NLnetLabs/unbound/ Unbound Documentation: http://unbound.docs.nlnetlabs.nl/ * Privoxy GUI interface + DOS console command line non-caching HTTP/web proxy with advanced filtering for enhanced privacy + safety, highly customizable: http://www.privoxy.org/ Repository: http://sourceforge.net/projects/ijbswa/ Download: http://www.privoxy.org/sf-download-mirror/Win32/ http://sourceforge.net/projects/ijbswa/files/Win32/ Privoxy FAQ: http://www.privoxy.org/faq/ Privoxy Online Manual: http://www.privoxy.org/user-manual/ Proxy server: http://en.wikipedia.org/wiki/Proxy_server * Privaxy 32-bit + 64-bit DOS console command line MITM (Man In The Middle) HTTP(S) low level incoming + outgoing tunnel proxy ad(ware)/malware/spying/surveillance/tracking blocker/filter: http://github.com/Barre/privaxy/ Download: http://github.com/Barre/privaxy/releases/latest/ Proxy server: http://en.wikipedia.org/wiki/Proxy_server * PeerBlock [ UNMAINTAINED ! ] Portable 32-bit + 64-bit for Windows XP/newer personal firewall blocks/filters incoming + outgoing dangerous/deceptive/insecure/invasive/intrusive/subversive/unsafe IPs + ports [IPv4 only] from frequently updated + user customized lists of blacklisted ad(ware)/malware/spying/surveillance/tracking hosts/IPs: http://www.peerblock.com/ Download [Portable ZIP]: http://code.google.com/archive/p/peerblock/downloads/ PeerBlock 64-bit for Windows Vista/newer 64-bit (x64): http://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/peerblock/PeerBlock_r693__x64_Release_(Vista).zip PeerBlock 32-bit for Windows Vista/newer 32-bit (x86): http://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/peerblock/PeerBlock_r693__Win32_Release_(Vista).zip PeerBlock Repository: http://code.google.com/archive/p/peerblock/ http://sourceforge.net/projects/peerblock/ http://github.com/PeerBlock/peerblock/ I-Blocklist lists of blacklisted IPs [frequently updated]: http://www.iblocklist.com/lists Blocklists + Filterlists: http://github.com/badmojr/1Hosts/ http://filterlists.com/ http://github.com/yokoffing/filterlists/ PeerBlock @ Wikipedia: http://en.wikipedia.org/wiki/PeerBlock * DNS Jumper (DNSJumper) tests + changes to fastest + closest public root DNS servers -> right-click DNSJumper.exe -> Run as as Administrator -> click Benchmark button: http://www.sordum.org/7952/dns-jumper-v2-2/ File: http://www.sordum.org/files/downloads.php?dns-jumper * Domain Name Speed (DNS) Benchmark (DNSBench) tests fastest + closest public root DNS servers -> right-click DNSBench.exe -> Run as Administrator -> click Fastest DNS button -> click Start DNS test button: http://www.grc.com/dns/benchmark.htm File: http://www.grc.com/files/DNSBench.exe * Automate Windows XP/newer customization of NameServer registry String [REG_SZ] values to turn ON/enable/customize DoH (DNS over HTTPS) using public root DNS servers from reliable/trusted entities (see links to servers further above and providers further below) in order to prevent privacy, safety + security breaches, dissemination, exposure, hacking, intrusions, invasion, leaks, auditing, fingerprinting, phishing, malware, spyware, surveillance, tracking: http://serverfault.com/questions/208490/ http://technet.microsoft.com/library/cc978468.aspx http://learn.microsoft.com/troubleshoot/windows-client/networking/tcpip-and-nbt-configuration-parameters/ http://portforward.com/networking/static-win7.htm http://www.windowscentral.com/how-change-your-pcs-dns-settings-windows-10/ http://www.howto-connect.com/change-dns-server-address-windows-11-4-methods/ Setup/change IPv4 (and IPv6 if applicable) public root DNS servers Registry entries (example using default home computer internet connection name: "Local Area Network" (LAN) connection = modify to match your connection name if different, and to use AdGuard public root DNS servers): Open Notepad or your favorite similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT -> copy & paste text strings between Cut & Paste lines below -> save BATch file as Root_DNS_Servers.bat (example): - Windows 7 and 7 SP1 users: right-click on Root_DNS_Servers.bat -> Run as Administrator -> restart/reboot. - Windows 8, 8.1, 2012, 10, 2016, 2019, 11, 2022 and newer users: right-click on Root_DNS_Servers.bat -> select Open with -> select Notepad or your favorite similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT (browse to executable if needed) -> remark (comment) all Windows XP... and Windows 7... NETSH.EXE lines by adding ":: " (double colon + space) in front of them -> enable the 2 remarked (commented) Windows 8/newer NETSH.EXE lines by deleting/removing the ":: " (double colon + space) in front of them -> save your file -> right-click on it -> Run as Administrator -> restart/reboot. - Windows XP and 2003 users: right-click on Root_DNS_Servers.bat -> select Open with -> select Notepad or your favorite similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT -> remark (comment) all Windows 7... and Windows 8... NETSH.EXE lines by adding ":: " (double colon + space) in front of them -> enable the 2 remarked (commented) Windows XP/2003 NETSH.EXE lines by deleting/removing the ":: " (double colon + space) in front of them -> save your file -> right-click on it -> Run... [hold WinKey + press R] -> run batch file below [customize it first: change IP addresses below to your preferred public root DNS servers] -> restart/reboot. -----Begin cut & paste here----- @ECHO OFF IF NOT "%OS%"=="Windows_NT" GOTO END :: AdGuard public root DNS servers (example): :: * Windows 7/7 SP1 only: NETSH.EXE interface ip set dns "Local Area Connection" static 94.140.14.14 NETSH.EXE interface ip add dns "Local Area Connection" 94.140.15.15 index=2 :: * Windows 8/newer only: :: NETSH.EXE interface ipv4 set dns "Local Area Connection" static 94.140.14.14 :: NETSH.EXE interface ipv4 add dns "Local Area Connection" 94.140.15.15 index=2 :: * Windows XP/2003 only: :: NETSH.EXE interface ip set address dns name="Local Area Connection" static 94.140.14.14 :: NETSH.EXE interface ip add address dns name="Local Area Connection" 94.140.15.15 index=2 :END EXIT ------End cut & paste here------ BATch (.bat)/CoMmanD (.cmd) script files below (name it and save it as whatever you wish, just make sure it has the .bat or .cmd extension) search the Registry database for the current/active internet/network connection, and adds/changes the public root DNS servers (example using AdGuard servers) to the matching NameServer registry value(s): - Windows 7/7 SP1 users, including Windows Vista users: -----Begin cut & paste here----- @ECHO OFF IF NOT "%OS%"=="Windows_NT" GOTO END :: Windows 8/newer only: FOR /F "skip=2 tokens=4*" %%a IN ('NetSh Interface IP Show Interfaces') DO ( CALL :Network_Adapter %%a "%%b" ) :: PAUSE EXIT /B :Network_Adapter :: %1=State :: %2=Name (quoted); %~2=Name (unquoted) IF %1==connected ( :: Run your commands here (example): ECHO %2 :: Primary (1st, Preferred) public root DNS server (DNS1) [AdGuard]: NETSH.EXE interface ip set dnsservers %2 static 94.140.14.14 :: Secondary (2nd, Alternate) public root DNS server (DNS2) [AdGuard]: NETSH.EXE interface ip add dnsservers %2 94.140.15.15 index=2 :: In case you wish to reset to Windows original public root DNS servers -> delete double :: colons + space [:: ] in front of NetSh command below -> run this batch file again: :: NETSH.EXE int ip reset %2 ) :: PAUSE EXIT /B :END EXIT ------End cut & paste here------ - Windows 8/newer users, including Windows 10 + 11 users: -----Begin cut & paste here----- @ECHO OFF IF NOT "%OS%"=="Windows_NT" GOTO END :: Windows 8/newer only: FOR /F "skip=2 tokens=4*" %%a IN ('NetSh Interface IPv4 Show Interfaces') DO ( CALL :Network_Adapter %%a "%%b" ) :: PAUSE EXIT /B :Network_Adapter :: %1=State :: %2=Name (quoted); %~2=Name (unquoted) IF %1==connected ( :: Run your commands here (example): ECHO %2 :: Primary (1st, Preferred) public root DNS server (DNS1) [AdGuard]: NETSH.EXE interface ipv4 set dnsservers %2 static 94.140.14.14 :: Secondary (2nd, Alternate) public root DNS server (DNS2) [AdGuard]: NETSH.EXE interface ipv4 add dnsservers %2 94.140.15.15 index=2 :: In case you wish to reset to Windows original public root DNS servers -> delete double :: colons + space [:: ] in front of NetSh command below -> run this batch file again: :: NETSH.EXE int ip reset %2 ) :: PAUSE EXIT /B :END EXIT ------End cut & paste here------ To determine your active network interface ID http://social.technet.microsoft.com/forums/bacc4f3d-54c2-4e99-931c-42a3cea2e67c/ from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter: WMIC.EXE nicconfig get description,settingid WMIC.EXE (Windows Management Instrumentation Command executable) is located in the %WinDir%\SYSTEM32\wbem directory/folder [%WinDir% = usually C:\WINDOWS], listed on your system PATH. View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command PATH -> press Enter. WMIC (Windows Management Instrumentation Command): http://learn.microsoft.com/windows/win32/wmisdk/wmic/ MS DOCs: WMIC: http://technet.microsoft.com/library/bb742610.aspx Dedoimedo: WMIC - The Windows secret weapon: http://www.dedoimedo.com/computers/windows-wmic.html ComputerHope: WMIC: http://www.computerhope.com/wmic.htm Rob van der Woude: WMIC: http://www.robvanderwoude.com/wmic.php quux: WMIC Snippets: http://quux.wiki.zoho.com/WMIC-Snippets.html SS64: WMIC.EXE: http://www.ss64.com/nt/wmic.html Wikipedia: Windows Management Instrumentation (WMI): http://en.wikipedia.org/wiki/Windows_Management_Instrumentation Example of output returned by running WMIC.EXE command above (each network adapter has a unique hardware ID, this is a generic example): Description SettingID Intel Ethernet Network Adapter I???-T? {00000000-AAAA-1111-BBBB-222222222222} Look at the NIC (Network Interface Controller) adapter name [under Description] you are using to connect to your internet provider -> it is followed [under SettingID] by a Link Directory IDentifier (LDID) corresponding to the LDID from the registry key below. Your LDID number is different depending on your network adapter name/model/manufacturer and type of connection. Generic example of NameServer registry String [REG_SZ] value for Ethernet network connection interface (each network adapter has a unique hardware ID) using AdGuard public root DNS servers: TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK to all prompts to register/merge/import its information into your registry. -----Begin cut & paste here----- REGEDIT4 ; AdGuard public root DNS servers (example): [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\Tcpip\Parameters\Interfaces\{00000000-AAAA-1111-BBBB-222222222222}] "NameServer"="94.140.14.14,94.140.15.15" ------End cut & paste here------ You need to substitute generic ID above ["00000000-AAAA-1111-BBBB-222222222222"] with your actual Decentralized IDentifier (DID) (hard link) string which corresponds to your active internet/network connection/interface present in your registry under the "CurrentControlSet" Hive Key Local Machine (HKLM) subkey above. * Turn ON/enable/customize DoH (DNS over HTTPS) using public root DNS servers from reliable/trusted entities (see links to servers further above and providers further below) in order to prevent privacy, safety + security breaches, dissemination, hacking, intrusions, invasion, leaks, fingerprinting, phishing, malware, spyware, tracking, auditing: http://adguard-dns.io/en/public-dns.html http://developers.cloudflare.com/1.1.1.1/setup/windows/ http://www.windowscentral.com/how-change-your-pcs-dns-settings-windows-10/ http://developers.google.com/speed/public-dns/docs/using/ - Windows 8/newer users, including Windows 10 + 11 users: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ http://support.opendns.com/hc/articles/228006907/ Start menu -> Control Panel -> Network and Sharing Center -> Active Networks -> click item right side of Connections: -> "your Network Connection name" (typical examples): "Ethernet" (direct broadband modem connection), "Local Area Network" (LAN = direct router connection) or "Wi-Fi" (high speed wireless connection) -> connection Status -> General tab -> Properties -> scroll down -> select Internet Protocol Version 4 (TCP/IPv4) -> Properties -> General tab -> Use the following DNS server addresses: -> type desired IP addresses (example using AdGuard public root DNS servers): Preferred (Primary, 1st) DNS Server (DNS1): 94.140.14.14 Alternate (Secondary, 2nd) DNS Server (DNS2): 94.140.15.15 http://www.mdgx.com/IPv4_AdGuard_public_root_DNS_servers.jpg Example using Cloudflare public root DNS servers: http://www.mdgx.com/IPv4_Cloudflare_public_root_DNS_servers.jpg -> select Internet Protocol Version 6 (TCP/IPv6) -> Properties -> General tab -> Use the following DNS server addresses: -> type desired IP addresses (example using AdGuard public root DNS servers): Preferred (Primary, 1st) DNS Server (DNS1): 2606:4700:4700::1111 Alternate (Secondary, 2nd) DNS Server (DNS2): 2606:4700:4700::1001 http://www.mdgx.com/IPv6_AdGuard_public_root_DNS_servers.jpg Example using Cloudflare public root DNS servers: http://www.mdgx.com/IPv6_Cloudflare_public_root_DNS_servers.jpg Click OK -> click OK -> exit all dialogs/prompts/windows -> restart/reboot. - Windows 7/7 SP1 users, including Windows Vista users: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ http://www.sevenforums.com/tutorials/12421-local-area-connection-status-create-shortcut.html Start menu -> Control Panel -> Network and Sharing Center -> View network status and tasks -> View Active networks -> click item right side of Connections: -> "your Network Connection name" (typical examples): "Ethernet" (direct broadband modem connection), "Local Area Network" (LAN = direct router connection) or "Wi-Fi" (Wi-Fi connection) -> connection Status -> General tab -> Properties -> Connection Properties General tab -> scroll down -> select Internet Protocol Version 4 (TCP/IPv4) -> Properties -> Internet Protocol Version 4 (TCP/IPv4) Properties -> General tab -> scroll down -> select (x) -> Use the following DNS server IP addresses: -> type desired IP addresses (example using AdGuard public root DNS servers): Preferred (Primary, 1st) DNS Server (DNS1): 94.140.14.14 Alternate (Secondary, 2nd) DNS Server (DNS2): 94.140.15.15 http://www.mdgx.com/IPv4_AdGuard_public_root_DNS_servers.jpg Example using Cloudflare public root DNS servers: http://www.mdgx.com/IPv4_Cloudflare_public_root_DNS_servers.jpg Click OK -> click OK -> exit all dialogs/prompts/windows -> restart/reboot. - Windows XP/2003 users: ~~~~~~~~~~~~~~~~~~~~~~~~ http://www.webnots.com/how-to-change-dns-server-ips-in-windows-xp/ Start menu -> Control Panel -> Network Connections -> select current connection -> "your Network Connection name" (typical examples): "Local Area Network" (LAN = direct router connection) or "Wireless" (Wi-Fi connection) -> connection Status -> General tab -> Properties -> Connection Properties General tab -> scroll down -> select Internet Protocol (TCP/IP) -> Properties -> Internet Protocol Version (TCP/IP) Properties General tab -> scroll down -> select (x) -> Use the following DNS server IP addresses: -> type desired IP addresses (example using AdGuard public root DNS servers): Preferred (Primary, 1st) DNS Server (DNS1): 94.140.14.14 Alternate (Secondary, 2nd) DNS Server (DNS2): 94.140.15.15 http://www.mdgx.com/IPv4_AdGuard_public_root_DNS_servers.jpg Example using Cloudflare public root DNS servers: http://www.mdgx.com/IPv4_Cloudflare_public_root_DNS_servers.jpg Click OK -> click OK -> exit all dialogs/prompts/windows -> restart/reboot. - Optional: ~~~~~~~~~~~ Recommended for all Windows XP/newer users: A. Start menu -> Control Panel -> Network and Sharing Center -> Active Networks -> click item right side of Connections: -> "your Network Connection name" icon/item -> Properties button -> Networking tab -> This connection is using the following items: -> Internet Protocol Version 4 (TCP/IPv4) -> General tab -> Advanced... button -> DNS tab -> DNS server addresses, in order of use: -> Add... x 2 -> Add button x 2 -> type x 2 IP addresses below (example using AdGuard public root DNS servers): 94.140.14.14 94.140.15.15 -> Apply/OK -> OK. http://www.mdgx.com/IPv4_AdGuard_public_root_DNS_servers.jpg Example using Cloudflare public root DNS servers: http://www.mdgx.com/IPv4_Cloudflare_public_root_DNS_servers.jpg B. Start menu -> Control Panel -> Network and Sharing Center -> Active Networks -> click item right side of Connections: -> "your Network Connection name" icon/item -> Properties button -> Networking tab -> This connection is using the following items: -> Internet Protocol Version 4 (TCP/IPv4) -> General tab -> Advanced... button -> WINS (Windows Internet Name Service) tab -> check Enable LMHOSTS lookup box -> NetBIOS setting -> check Disable NetBIOS over TCP/IP box -> Apply/OK. http://www.thewindowsclub.com/wp-content/uploads/2020/11/Disable-NetBIOS-over-TCP-IP.png See also "Tweaks, Hacks + Fixes... UNconventional, UNdocumented, UNcensored ;-/" chapter -> "* Turn OFF unnecessary, obsolete + unsafe TCP/IP NetBIOS (Network Basic Input/Output System) Helper service [lmhosts]" section in WIN10.TXT (included): http://www.mdgx.com/10.php http://www.mdgx.com/WIN10.TXT - Web Browsers: ~~~~~~~~~~~~~~~ Turn ON DoH (DNS over HTTPS) in your web browser using public root DNS servers: http://developers.cloudflare.com/1.1.1.1/encryption/dns-over-https/encrypted-dns-browsers/ http://techcountless.com/change-dns-server-in-google-chrome/ http://support.google.com/chrome/answer/10468685/ http://www.tenforums.com/tutorials/145372-how-enable-disable-dns-over-https-doh-google-chrome.html http://pureinfotech.com/enable-dns-over-https-chrome/ http://icpmoles.github.io/post/chrome-doh/ Turn ON/enable/customize DoH (DNS over HTTPS) in Chromium/Chrome web browsers & alternatives/derivatives/forks/variants using public root DNS servers from reliable/trusted entities (see links to servers further above and providers further below): http://chromeenterprise.google/policies/?policy=BuiltInDnsClientEnabled http://chromeenterprise.google/policies/?policy=DnsOverHttpsMode http://chromeenterprise.google/policies/?policy=DnsOverHttpsTemplates http://admx.help/?Category=Chrome&Policy=Google.Policies.Chrome::BuiltInDnsClientEnabled http://admx.help/?Category=EdgeChromium&Policy=Microsoft.Policies.Edge::DnsOverHttpsMode http://admx.help/?Category=ChromeOS&Policy=Google.Policies.ChromeOS::DnsOverHttpsTemplates BEWARE: ******* Edge web browsers collect + send logged in members/subscribers/users' unique SID (Security IDentifier) + web browser history [URLs (Uniform Resource Locator) = IPs, web addresses] data/information to Microsoft or Microsoft affiliated/partner servers: http://winbuzzer.com/2019/07/23/users-raise-privacy-concerns-as-edge-browser-caught-sending-full-urls-and-sid-to-microsoft-xcxwbn/ RECOMMENDED: ************ Install an independent/3rd party free, open source, safe, secure, uncrippled, unlocked, unrestricted, modern web browser based on Chromium code with enhanced privacy, safety + security http://www.mdgx.com/nettoys.htm#PRV -> see "FREE Windows 9x/NTx Web Browsers" chapter -> "Chromium + Chrome" section in SOFTWARE.TXT (included): http://www.mdgx.com/nettoys.htm#CHR Change/Set Windows 7 default web browser to Chromium/Chrome or Firefox: http://www.groovypost.com/howto/change-default-browser-windows-7/ TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK to all prompts to register/merge/import its information into your registry. -----Begin cut & paste here----- REGEDIT4 [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome] "BuiltInDnsClientEnabled"=dword:1 "DnsOverHttpsMode"="automatic" "DnsOverHttpsTemplates"="https://dns.google/dns-query{?dns}" [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome\Recommended] "BuiltInDnsClientEnabled"=dword:1 "DnsOverHttpsMode"="automatic" "DnsOverHttpsTemplates"="https://dns.google/dns-query{?dns}" [HKEY_CURRENT_USER\Software\Policies\Google\Chrome] "BuiltInDnsClientEnabled"=dword:1 "DnsOverHttpsMode"="automatic" "DnsOverHttpsTemplates"="https://dns.google/dns-query{?dns}" [HKEY_CURRENT_USER\Software\Policies\Google\Chrome\Recommended] "BuiltInDnsClientEnabled"=dword:1 "DnsOverHttpsMode"="automatic" "DnsOverHttpsTemplates"="https://dns.google/dns-query{?dns}" [HKEY_USERS\.DEFAULT\Software\Policies\Google\Chrome] "BuiltInDnsClientEnabled"=dword:1 "DnsOverHttpsMode"="automatic" "DnsOverHttpsTemplates"="https://dns.google/dns-query{?dns}" [HKEY_USERS\.DEFAULT\Software\Policies\Google\Chrome\Recommended] "BuiltInDnsClientEnabled"=dword:1 "DnsOverHttpsMode"="automatic" "DnsOverHttpsTemplates"="https://dns.google/dns-query{?dns}" ; ------End cut & paste here------ - Routers + modem/router combos: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Recommended for all internet/network/portable/device/wireless/Wi-Fi router + modem/router combo users to set up static IP address public root DNS servers from reliable/trusted entities (see links to servers further above and providers further below) in order to prevent privacy, safety + security breaches, dissemination, hacking, intrusions, invasion, leaks, phishing, malware, spyware, tracking: http://developers.cloudflare.com/1.1.1.1/setup/router/ http://www.lifewire.com/how-to-2617995/ http://www.tp-link.com/support/faq/1712/ http://www.linksys.com/support-article?articleNum=316999 http://support.surfshark.com/hc/articles/360019705540/ http://blog.cloudflare.com/dns-over-tls-for-openwrt/ In this example I have used NETGEAR routers + Cloudflare public root DNS servers: http://kb.netgear.com/30510/ http://www.mdgx.com/NETGEAR_router_AdGuard_public_root_DNS_servers.jpg Example using Cloudflare public root DNS servers: http://www.mdgx.com/NETGEAR_router_public_root_DNS_servers.jpg Type your router IP local/private/reserved address in your web browser (typical example valid out of the box for most routers + modem/router combos): http://192.168.1.1/ -> press Enter -> type user name (default on many routers is "admin" unless changed by user) + password (if any, recommended to always set up a strong password) to log on/sign in into your router built-in web browser interface (example): router Menu (interface layout, options + wording vary depending on router brand/model/operating system/firmware version) -> Basic tab -> Internet -> Domain Name Server (DNS) Address -> check Use these DNS Servers box -> type desired IP addresses in the square boxes, but don't type the dots (example using AdGuard public root DNS servers): Primary (1st, Preferred) Static DNS Server (DNS1) = 94.140.14.14 Secondary (2nd, Alternate) Static DNS Server (DNS2) = 94.140.15.15 http://www.mdgx.com/NETGEAR_router_AdGuard_public_root_DNS_servers.jpg Example using Cloudflare public root DNS servers: http://www.mdgx.com/NETGEAR_router_public_root_DNS_servers.jpg -> Apply/Save changes -> reset/restart router or modem/router combo if needed. * BUG: DNS Client service [DNSCache] caches Domain Name System (DNS) names/hostnames (DNS Cache) which may slow down significantly the processing of a large HOSTS [hosts] file with many IPs (for example my custom HOSTS file contains over 225000 hostname entries): http://www.mdgx.com/hosts.php FIXes: - Disable Client Side DNS Caching in Windows NTx: http://learn.microsoft.com/windows-server/networking/dns/troubleshoot/disable-dns-client-side-caching/ - Flush Windows DNS Cache: http://www.thewindowsclub.com/flush-windows-dns-cache/ See "* FIX: Turn ON network discovery + detection of network(ed) computers + devices in Windows 7/newer:" section futther below in WINDOWS7.TXT (this file) http://www.mdgx.com/7.php http://www.mdgx.com/WINDOWS7.TXT to flush DNS cache using Windows built-in IPConfig [IPCONFIG.EXE] DOS console command line tool. IPConfig [IPCONFIG.EXE] is located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually C:\WINDOWS]. View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command PATH -> press Enter. - Stop (if already running) + then Restart DNS Client service [DNSCache]: http://www.computerstepbystep.com/dns_client_service.html Run these 2 DOS console CoMmanD line BATch (.CMD) files in this order: 1. STOP!DNS.CMD + only after that 2. STARTDNS.CMD. Both these files are part of MDGx "Win10 Block Tools (10_BLOCK)" ZIP archive: http://www.mdgx.com/10BLK/10_BLOCK.ZIP MDGx "Win10 Block Tools (10_BLOCK)" ReadMe Guide -> 10_BLOCK.TXT (included): http://www.mdgx.com/xptoy.htm#10BLK http://www.mdgx.com/10BLK/10_BLOCK.php http://www.mdgx.com/10BLK/10_BLOCK.TXT Open STARTDNS.CMD + STOP!DNS.CMD (both included) in Notepad for details: http://www.mdgx.com/10BLK/STARTDNS.CMD.TXT http://www.mdgx.com/10BLK/STOP!DNS.CMD.TXT See MDGx "HOSTS Files, Guides + Tools" -> "DNS Client Service" topic: http://www.mdgx.com/hosts.php#N2 HOSTS [hosts] file is located in the %WinDir%\SYSTEM32\DRIVERS\ETC directory/folder [%WinDir% = usually C:\WINDOWS]: http://www.mdgx.com/hosts.php#HG * Determine your router or modem/router combo local/private/reserved IP address in Windows XP/newer: From a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command IPCONFIG.EXE -> press Enter -> Default Gateway IP address is usually the same or within same pool/range [address space] as your router or router/modem combo IPv4 IP address. Example: ----------snippity-snip---------- Your network adapter connection type/connectoid/interface name: IPv4 Address. . . . . . . . . . . : 192.168.1.2 Default Gateway . . . . . . . . . : 192.168.1.1 ----------snippity-snip---------- IPConfig [IPCONFIG.EXE] is located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually C:\WINDOWS]. View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command PATH -> press Enter. * Router + modem/router combo users: Your router or modem/router combo should already have a pre-assigned/pre-configured/default/preset LAN (Local Area Network) DNS server IP address which handles all DNS caching traffic (default example): 192.168.1.1 Router or modem/router combo caching DNS server will redirect all queries/requests to active/current pre-assigned/pre-configured/preset (default) ISP connection provider server(s) (if unchanged) or custom assigned (if changed/customized) public root DNS IPs/server(s) -> see further above how to change public root DNS servers for your internet/network connection(s). Router or modem/router combo static DNS IP address pool/range [address space] should be selected from outside DHCP (Dynamic Host Configuration Protocol) pool/range in order to avoid any conflicts with most network setups (typical examples): 192.168.1.2 - 192.168.1.9 Full pool/range [address space] of pre-assigned/pre-configured/default/preset LAN (Local Area Network) DNS server IP addresses: 192.168.0.0 - 192.168.255.255 Wikipedia: Dynamic Host Configuration Protocol (DHCP): http://en.wikipedia.org/wiki/Dynamic_Host_Configuration_Protocol Wikipedia: Localhost: http://en.wikipedia.org/wiki/Localhost Wikipedia: Local/Private/Reserved IP pools/ranges: http://en.wikipedia.org/wiki/Private_network * Upgrade WRT54G2 router built-in/default/factory firmware (example) to DD-WRT/OpenWRT firmware + enable DoT (DNS over TLS): http://blogs.gurulabs.com/mike/2009/03/upgrading-a-cisco-linksys-wrt5.html http://www.andryou.com/2020/04/23/guide-enabling-dns-over-tls-on-an-openwrt-router/ http://www.privacyguides.org/router/ WRT54G2 Set up web server behind router: http://sanzon.wordpress.com/2008/04/04/setting-up-web-server-behind-router-wrt54g2/ WRT54G2 Static IP config and reconfig: http://sanzon.wordpress.com/2008/04/09/wrt54g2-static-ip-configuration-and-reconfiguring-router/ WRT54G2 Assign Static IP(s): http://www.superuser.com/questions/8574/ @ Best free secure public root DNS IPs/servers [most support standard encryption + security protocols]: ******************************************************************************************************* NOTE: I have selected these examples + made this classification based on trustworthy online reviews [see top of this topic], personal experience + preferences: 1st Best Option: **************** * Cloudflare secure public root DNS servers support encryption protocols for DoH (DNS over HTTPS) + DoT (DNS over TLS) = these DNS servers block/filter/blacklist/protect against malicious + suspicious content, malware, phishing, spyware [Blacklisters/Blockers/Filters]: http://www.cloudflare.com/learning/dns/what-is-1.1.1.1/ http://www.cloudflare.com/learning/dns/dns-over-tls/ http://www.cloudflare.com/learning/access-management/what-is-dns-filtering/ Verify to make sure you're using Cloudflare public root DNS servers after setup: http://1.1.1.1/help/ IPv4 servers: 1.1.1.1 1.0.0.1 IPv6 servers: 2606:4700:4700::1111 2606:4700:4700::1001 More info: http://blog.cloudflare.com/warp-for-desktop/ 2nd Best Option: **************** * AdGuard secure public root DNS servers support encryption protocols for DoH (DNS over HTTPS), DoT (DNS over TLS), DNSCrypt + DNS over QUIC (DoQ) http://adguard-dns.io/kb/public-dns/overview/ -> Our server addresses -> Plain DNS -> Default servers: http://adguard-dns.io/en/public-dns.html En Garde! [Be Warned!]: AdGuard blockers + protectors DNS servers are limited to maximum 300000 queries/month, after which they automatically downgrade to plain, UNblocking/UNfiltered DNS servers! - Blockers [default] = these DNS servers block/filter/blacklist/protect against ad(vertisment)s, spyware + trackers [Blacklisters/Blockers/Filters]: IPv4 servers: 94.140.14.14 94.140.15.15 IPv6 servers: 2a10:50c0::ad1:ff 2a10:50c0::ad2:ff - Plain = these DNS servers do NOT block/filter/blacklist/protect against ad(vertisment)s, spyware, trackers, or any other DNS requests [UNblocked/UNfiltered]: IPv4 servers: 94.140.14.140 94.140.14.141 IPv6 servers: 2a10:50c0::1:ff 2a10:50c0::2:ff - Family protectors = these DNS servers block/filter/blacklist/protect against ad(vertisment)s, spyware, trackers, adult/inappropriate content, and enable Safe Search + Safe Mode (where possible) [Blacklisters/Blockers/Filters]: IPv4 servers: 94.140.14.15 94.140.15.16 IPv6 servers: 2a10:50c0::bad1:ff 2a10:50c0::bad2:ff AdGuard DNS Filters: http://github.com/AdguardTeam/AdGuardDNS/ More info: http://adguard-dns.io/en/welcome.html See "* Automate Windows XP/newer customization of NameServer registry String [REG_SZ] values" topic further above for step-by-step guidelines to configure your current/active internet/network/private/wi-fi connection(s) in order to use AdGuard public root DNS servers. 3rd Best Option: **************** * OpenDNS (Cisco) secure public root DNS servers support encryption protocols for DoH (DNS over HTTPS) + DoT (DNS over TLS): http://www.opendns.com/setupguide/ http://support.opendns.com/hc/articles/360038086532/ http://umbrella.cisco.com/blog/enhancing-support-dns-encryption-with-dns-over-https/ Verify to make sure you're using OpenDNS (Cisco) public root DNS servers after setup: http://welcome.opendns.com/ - Umbrella/OpenDNS [default] = these DNS servers block/filter/blacklist/protect against malicious + suspicious content, malware, phishing, spyware [Blacklisters/Blockers/Filters]: IPv4 servers: 208.67.222.222 208.67.220.220 208.67.220.222 208.67.222.220 IPv6 servers: 2620:119:35::35 2620:119:53::53 - FamilyShield = these DNS servers block/filter/blacklist/protect against malicious + suspicious content, malware, phishing, spyware + adult/inappropriate content [Blacklisters/Blockers/Filters]: IPv4 servers: 208.67.222.123 208.67.220.123 IPv6 servers: 2620:119:35::123 2620:119:53::123 Install Guide: http://use.opendns.com/ http://docs.umbrella.com/deployment-umbrella/docs/point-your-dns-to-cisco/ 4th Best Option: **************** * AhaDNS secure public root DNS servers with 0 [zero] logging support encryption protocols for DoH (DNS over HTTPS) [port 443], DoT (DNS over TLS) [port 853] + DNSSEC using encryption [DNSCrypt]: http://ahadns.com/dns-over-https/ http://ahadns.com/dns-over-tls/ IPv4 servers: 5.2.75.75 45.67.219.208 IPv6 servers: 2a04:52c0:101:75::75 2a04:bdc7:100:70::70 AhaDNS public root DNS servers block/filter/blacklist/protect against ad(vertisment)s, malware, ransomware, telemetry, trackers, viruses: http://ahadns.com/faq/ 5th Best Option: **************** * Google public root DNS servers support encryption protocols for DoH (DNS over HTTPS) + DoT (DNS over TLS) [UNblocked/UNfiltered]: http://developers.google.com/speed/public-dns/docs/using/ IPv4 servers: 8.8.8.8 8.8.4.4 Install Guide: http://developers.google.com/speed/public-dns/docs/using/ IP addresses used by Google: http://www.lifewire.com/what-is-818153/ Other Options: ************** * OpenNIC secure public root DNS servers support encryption protocols for DoH (DNS over HTTPS) + DoT (DNS over TLS) [UNblocked/UNfiltered]: http://www.opennic.org/ IPv4 servers: 52.173.73.208 45.56.117.118 OpenNIC public root DNS servers: http://servers.opennicproject.org/ * Quad9 secure public root DNS servers support encryption protocols for DoH (DNS over HTTPS) + DoT (DNS over TLS): http://www.quad9.net/faq/ IPv4 servers: 9.9.9.9 149.112.112.112 * Level3 (CenturyLink) secure public root DNS servers support encryption protocols for DoH (DNS over HTTPS) + DoT (DNS over TLS): http://www.dnsserverlist.org/ IPv4 servers: 4.2.2.1 4.2.2.2 4.2.2.3 4.2.2.4 4.2.2.5 4.2.2.6 Level3 (CenturyLink) alternate public root DNS servers: IPv4 servers: 209.244.0.3 209.244.0.4 * CenturyLink secure public root DNS servers support encryption protocols for DoH (DNS over HTTPS) + DoT (DNS over TLS): http://www.centurylink.com/home/help/internet/dns.html IPv4 servers: 205.171.3.26 205.171.2.26 * CleanBrowsing secure public root DNS servers support encryption protocols for DoH (DNS over HTTPS) + DoT (DNS over TLS): http://cleanbrowsing.org/filters/ IPv4 servers: 185.228.168.9 185.228.168.10 * SafeDNS secure public root DNS servers support encryption protocols for DoH (DNS over HTTPS) + DoT (DNS over TLS): http://www.safedns.com/en/guides/win7/ IPv4 servers: 195.46.39.39 195.46.39.40 * Comodo secure DNS public root DNS servers support encryption protocols for DoH (DNS over HTTPS) + DoT (DNS over TLS): http://www.comodo.com/secure-dns/ IPv4 servers: 8.26.56.26 8.20.247.20 * Advantage DNS (UltraDNS) secure public root DNS servers support encryption protocols for DoH (DNS over HTTPS) + DoT (DNS over TLS): http://www.neustar.biz/security/dns-services IPv4 servers: 156.154.70.1 156.154.71.1 * Verisign secure public root DNS servers support encryption protocols for DoH (DNS over HTTPS) + DoT (DNS over TLS): http://www.verisign.com/en_US/security-services/public-dns/ IPv4 servers: 64.6.64.6 64.6.65.6 ______________________________________________________________________________ Internet + Web Browsers Tweaks, Fixes + Tools [Chromium/Chrome, Firefox + Internet Explorer (IE)] http://www.mdgx.com/7.php#:~:text=Internet%20%2B%20Web%20Browsers%20Tweaks%2C%20Fixes%20%2B%20Tools%20%5BChromium%2FChrome%2C%20Firefox * MDGx "Internet Power Toys [free(ware)]" section -> "Free(ware) Windows NTx Web Browsers" topic in SOFTWARE.TXT (included): http://www.mdgx.com/nettoys.htm#NET * MDGx "Internet Power Toys [free(ware)]" section -> "Free(ware) Windows NTx Internet Enhancers" topic in SOFTWARE.TXT (included): http://www.mdgx.com/nettoys.htm#DUN * MDGx "Firewalls, Anti-Spyware + Internet Monitors [free(ware)]" section -> "Free(ware) Windows NTx Monitors, Firewalls + Anti-Spyware" topic in SOFTWARE.TXT (included): http://www.mdgx.com/fw.htm * MDGx "List of Useful Windows NTx Tools [99.9% free(ware)]" -> "INTERNET" section in TOOLS.TXT (included): http://www.mdgx.com/tools.php http://www.mdgx.com/TOOLS.TXT * Change/Set Windows 7 default web browser to Chromium/Chrome or Firefox: http://www.groovypost.com/howto/change-default-browser-windows-7/ * Tweak Network Interface Controller (NIC) Ethernet settings for maximum performance + speed in Windows 7/newer: http://windowsreport.com/best-ethernet-settings-for-gaming/ http://techgenix.com/advanced-network-adapter-driver-settings/ http://helpdesk.flexradio.com/hc/articles/202118518/ http://learn.microsoft.com/windows-server/networking/technologies/network-subsystem/net-sub-performance-tuning-nics/ http://www.digit.in/features/tech/tweak-network-adapter-properties-networking-ethernet-wifi-vpn-45243.html http://steamcommunity.com/sharedfiles/filedetails/?id=727946014 http://www.speedguide.net/articles/3449/ http://www.peerwisdom.org/2013/04/03/large-send-offload-and-network-performance/ http://www.networkworld.com/article/2224722/jumbo-frames.html http://netcraftsmen.com/just-say-no-to-jumbo-frames/ NetSh (Network Shell) tool [%WinDir%\SYSTEM32\NETSH.EXE]: http://learn.microsoft.com/windows-server/networking/technologies/netsh/netsh/ http://technet.microsoft.com/library/bb490939.aspx http://www.ss64.com/nt/netsh.html http://adamtheautomator.com/netsh/ View all NetSh available options, parameters + switches: from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter: NETSH.EXE /? ... And now let's dig deeper: ;-/ * Turn ON Receive Window Auto-Tuning + turn OFF Scaling Heuristics Transmission Control Protocol/Internet Protocol (TCP/IP) parameters to increase/regain decreased speed/slow internet connection(s) in Windows XP/newer: http://www.majorgeeks.com/content/page/how_to_fix_slow_internet_on_windows_10.html http://blogs.technet.microsoft.com/networking/2016/08/11/an-update-on-windows-tcp-autotuninglevel/ http://www.techjourney.net/disable-tcp-receive-window-auto-tuning-fix-slow-internet-cannot-load-web-page-cannot-download-email/ http://learn.microsoft.com/troubleshoot/windows-server/networking/receive-window-auto-tuning-for-http/ http://pureinfotech.com/disable-window-auto-tuning-fix-slow-internet-speeds-windows-10/ http://www.speedguide.net/faq/339/ http://www.it-support.com.au/5-ways-to-improve-download-speed/2012/08/ http://therealhelper.blogspot.com/2017/09/you-can-actually-kill-lag-of-any-game.html - Windows XP/Vista/7/7 SP1 users: ********************************* 1. Patch the TCPIP.SYS driver [%WinDir%\SYSTEM32\Drivers\TCPIP.SYS = original file will be backed up] using EvID4226 Limited Connections Patch: http://www.raymond.cc/blog/tcp-z-is-the-best-tcpip-half-open-connection-limited-patcher/ File: http://www.raymond.cc/blog/download/did/205/ 2. Restart/reboot Windows -> run these commands to turn ON TCP/IP Receive Window Auto-Tuning, turn OFF Scaling Heuristics + turn ON Direct Cache Access (DCA) + NetDMA Direct Memory Access from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run these commands -> press Enter after each line: NETSH.EXE interface tcp set global autotuning=normal NETSH.EXE interface tcp set global dca=enabled netdma=enabled NETSH.EXE interface tcp set heuristics disabled NETSH.EXE interface tcp set heuristics wsh=disabled forcews=enabled NETSH.EXE interface tcp set global rss=enabled chimney=enabled rsc=enabled nonsackrttresiliency=enabled 3. View your TCP/IP connection status parameters from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter: NETSH.EXE interface tcp show global Should be set to normal (Windows NTx default): Receive Window Auto-Tuning Level : normal - Windows 8/8.1/10/11 users: **************************** 1. Run these commands to turn ON TCP/IP Receive Window Auto-Tuning, turn OFF Scaling Heuristics + turn ON Direct Cache Access (DCA) + NetDMA Direct Memory Access from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run these commands -> press Enter after each line: NETSH.EXE interface tcp set global autotuninglevel=normal NETSH.EXE interface tcp set global dca=enabled netdma=enabled NETSH.EXE interface tcp set heuristics disabled NETSH.EXE interface tcp set heuristics wsh=disabled forcews=enabled NETSH.EXE interface tcp set global rss=enabled rsc=enabled nonsackrttresiliency=enabled 2. View your TCP/IP connection status parameters from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter: NETSH.EXE interface tcp show global Should be set to normal (Windows NTx default): Receive Window Auto-Tuning Level : normal BUG: **** Increase/regain your internet connection speed in case using (older/incompatible) modems/routers/devices/networks without built-in support for TCP/IP Receive Window Auto-Tuning. FIX: **** 1. Turn OFF Receive Window Auto-Tuning from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter: - Windows XP/Vista/7/7 SP1 users: NETSH.EXE interface tcp set global autotuning=disabled - Windows 8/8.1/10/11 users: NETSH.EXE interface tcp set global autotuninglevel=disabled 2. View your TCP/IP connection status parameters from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter: NETSH.EXE interface tcp show global Should be disabled: Receive Window Auto-Tuning Level : disabled RESTORE: ******** In case your internet connection slows down after disabling Receive Window Auto-Tuning TCP/IP parameter: 1. Turn ON Windows Auto-Tuning from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter: - Windows XP/Vista/7/7 SP1 users: NETSH.EXE interface tcp set global autotuning=normal - Windows 8/8.1/10/11 users: NETSH.EXE interface tcp set global autotuninglevel=normal 2. View your TCP/IP connection status parameters from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter: NETSH.EXE interface tcp show global Should be set to normal (Windows NTx default): Receive Window Auto-Tuning Level : normal * Turn OFF Internet Explorer (IE) 9/10/11 "Automatic (Forced) Upgrade" + turn ON "Block Tracking" (disable Geolocation Detection): http://unlockforus.blogspot.com/2012/09/do-not-allow-websites-to-get-your.html http://support.microsoft.com/help/2843950/ http://www.eightforums.com/tutorials/7996-internet-explorer-10-auto-update-enable-disable.html http://www.itninja.com/question/ie10-turn-off-auto-updates/ TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK to all prompts to register/merge/import its information into your registry. -----Begin cut & paste here----- REGEDIT4 [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Geolocation] "BlockAllWebsites"=dword:1 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main] "EnableAutoUpgrade"=dword:0 [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main] "EnableAutoUpgrade"=dword:0 [HKEY_USERS\.DEFAULT\Software\Microsoft\Internet Explorer\Main] "EnableAutoUpgrade"=dword:0 ; ------End cut & paste here------ * Turn OFF Internet Explorer (IE) obsolete/useless Security Check: http://www.windows-security.org/65c2e8edd3108cdb6fc985493bb2fa38/turn-off-the-security-settings-check-feature/ TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK to all prompts to register/merge/import its information into your registry. -----Begin cut & paste here----- REGEDIT4 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Security] "DisableSecuritySettingsCheck"=dword:1 [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Security] "DisableSecuritySettingsCheck"=dword:1 ; ------End cut & paste here------ * FIX: Turn OFF Open File Security Warning, turn ON parallel downloading of multiple files in all web browsers, turn OFF Chromium/Chrome web browsers download restrictions & annoying prompt(s) for downloaded files location + FIX Chromium/Chrome web browsers "Failed - virus scan failed" file download error messages: http://support.microsoft.com/help/883260/ http://www.thewindowsclub.com/disable-open-file-security-warning-for-file/ http://www.sevenforums.com/tutorials/124367-open-file-security-warning-unblock-file.html http://www.sevenforums.com/tutorials/182353-open-file-security-warning-enable-disable.html http://www.sevenforums.com/tutorials/124427-open-file-security-warning-allow-prevent-unblock-file.html http://www.itechfever.com/fix-google-chrome-virus-scan-failed-error/ http://www.guidingtech.com/top-ways-to-fix-virus-scan-failed-error-in-google-chrome/ http://www.wisecleaner.com/think-tank/266-How-to-enable-the-parallel-downloading-function-of-Google-Chrome.html http://stackoverflow.com/questions/38511515/ http://technoresult.com/download-faster-google-chrome-using-parallel-downloading/ http://admx.help/?Category=Chrome&Policy=Google.Policies.Chrome::DownloadDirectory Start -> Control Panel (CP) or Run... [hold WinKey + press R] -> type: control.exe -> press Enter -> Internet (Explorer) Properties (Options) [inetcpl.cpl] -> Security tab -> Custom level button -> scroll down to Launching applications and unsafe files -> check Enable (not secure) box -> Apply/OK -> Yes. CAUTION: Make sure to scan for malware/spyware ALL files downloaded from the internet! http://www.mdgx.com/vir.htm TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK to all prompts to register/merge/import its information into your registry. -----Begin cut & paste here----- REGEDIT4 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Attachments] "ScanWithAntiVirus"=dword:1 "SaveZoneInformation"=dword:1 "HideZoneInfoOnProperties"=dword:0 [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Attachments] "ScanWithAntiVirus"=dword:1 "SaveZoneInformation"=dword:1 "HideZoneInfoOnProperties"=dword:0 [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Attachments] "ScanWithAntiVirus"=dword:1 "SaveZoneInformation"=dword:1 "HideZoneInfoOnProperties"=dword:0 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings] "MaxConnectionsPer1_0Server"=dword:20 "MaxConnectionsPerServer"=dword:20 [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings] "MaxConnectionsPer1_0Server"=dword:20 "MaxConnectionsPerServer"=dword:20 [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings] "MaxConnectionsPer1_0Server"=dword:20 "MaxConnectionsPerServer"=dword:20 [HKEY_LOCAL_MACHINE\Software\Policies\Google\Chrome] "DownloadRestrictions"=dword:0 "PromptForDownloadLocation"=dword:0 [HKEY_LOCAL_MACHINE\Software\Policies\Google\Chrome\Recommended] "DownloadRestrictions"=dword:0 "PromptForDownloadLocation"=dword:0 [HKEY_CURRENT_USER\Software\Policies\Google\Chrome] "DownloadRestrictions"=dword:0 "PromptForDownloadLocation"=dword:0 [HKEY_CURRENT_USER\Software\Policies\Google\Chrome\Recommended] "DownloadRestrictions"=dword:0 "PromptForDownloadLocation"=dword:0 [HKEY_USERS\.DEFAULT\Software\Policies\Google\Chrome] "DownloadRestrictions"=dword:0 "PromptForDownloadLocation"=dword:0 [HKEY_USERS\.DEFAULT\Software\Policies\Google\Chrome\Recommended] "DownloadRestrictions"=dword:0 "PromptForDownloadLocation"=dword:0 ; ------End cut & paste here------ * Turn ON Chromium/Chrome (or alternative/derivative/fork/variant), Firefox (or alternative/derivative/fork/variant), Opera (or alternative/derivative/fork/variant), or your favorite/preferred web browser http://www.mdgx.com/nettoys.htm#NET as Default Browser [to replace built-in/default/forced/hardwired/locked/preset Edge or Internet Explorer (IE)] for file extensions (.dhtml, .htm, .html, .php, .xhtml, .xml, etc), internet schemes/protocols (ftp:, http:, https:, magnet:, mailto:, news:, etc) http://www.w3.org/wiki/UriSchemes + URL/URI addresses/items/links/schemes/shortcuts (.url, .website, etc) in Windows 7/newer: http://www.winhelponline.com/blog/open-url-shortcuts-different-browsers-right-click-menu/ http://answers.microsoft.com/en-us/windows/forum/windows_10-networking-winpc/how-do-i-get-url-files-to-open-in-chrome-not-ie/8e766fa8-eb8d-43a3-9945-3c43f5edf1fb/ http://support.google.com/chrome/a/answer/7009292/ http://en.wikipedia.org/wiki/Uniform_Resource_Identifier Chromium/Chrome web browsers may need to install the .URL Handler extension: http://chrome.google.com/webstore/detail/url-handler/nhmccpjmdhejpfhafcfajkgifkmjhkgf/ For example I use winPenPack X-Chromium (X-Launcher) Portable launcher which installs Chromium web browser [free, open source]: http://www.winpenpack.com/en/download.php?view.1082 Download: http://sourceforge.net/projects/winpenpack/files/X-Chromium/releases/ In the examples below "winPenPack X-Chromium Launcher" [installed on my computers as C:\PORT\CHROME\X-Chromium.exe] becomes default web browser for all these file extensions, internet schemes/protocols + URL/URI addresses/items/links/schemes/shortcuts: http://superuser.com/questions/1205914/ File extensions I have linked to Chromium (example): .htm .html .shtm .shtml .url .xht .xhtm .xhtml Protocols: http https mailto Shortcuts: .url .website TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK to all prompts to register/merge/import its information into your registry. -----Begin cut & paste here----- REGEDIT4 ; Used "winPenPack X-Chromium Launcher" [installed in C:\PORT\CHROME\X-Chromium.exe] in this example: [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ChromeHTML] @="winPenPack X-Chromium Launcher" "AppUserModelID"="winPenPack.X-ChromiumLauncher.Default" "EditFlags"=dword:1 "FriendlyTypeName"="winPenPack X-Chromium Launcher" [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ChromeHTML\Application] "AppUserModelId"="winPenPack.X-ChromiumLauncher.Default" "ApplicationName"="winPenPack X-Chromium Launcher" "ApplicationDescription"="X-Chromium Portable Chromium Web Browser" "ApplicationCompany"="winPenPack" [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ChromeHTML\shell] @="Open" [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ChromeHTML\shell\open\command] @="\"C:\\PORT\\CHROME\\X-Chromium.exe\" \"%1\"" [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.URL] @="urlfile" "EditFlags"=dword:1 [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.URL\shell] @="Open" [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.URL\shell\open\command] @="\"C:\\PORT\\CHROME\\X-Chromium.exe\" \"%1\"" [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\urlfile] @="URL File" "EditFlags"=dword:1 [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\urlfile\shell] @="Open" [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\urlfile\shell\open\command] @="\"C:\\PORT\\CHROME\\X-Chromium.exe\" \"%1\"" [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\InternetShortcut] @="InternetShortcut" "NeverShowExt"="" "EditFlags"=dword:1 "IsShortcut"="" [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\InternetShortcut\shell] @="Open" [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\InternetShortcut\shell\open\command] @="\"C:\\PORT\\CHROME\\X-Chromium.exe\" \"%1\"" [HKEY_LOCAL_MACHINE\SOFTWARE\RegisteredApplications] "winPenPack X-Chromium Launcher"="Software\\Clients\\StartMenuInternet\\winPenPack X-Chromium Launcher\\Capabilities" [HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\winPenPack X-Chromium Launcher] @="winPenPack X-Chromium Launcher" [HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\winPenPack X-Chromium Launcher\Capabilities] "ApplicationName"="winPenPack X-Chromium Launcher" "ApplicationDescription"="Chromium is a fast web browser for Windows." [HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\winPenPack X-Chromium Launcher\Capabilities\FileAssociations] ".htm"="ChromeHTML" ".html"="ChromeHTML" ".shtm"="ChromeHTML" ".shtml"="ChromeHTML" ".url"="ChromeHTML" ".website"="XChromium.exe_.website" ".xht"="ChromeHTML" ".xhtm"="ChromeHTML" ".xhtml"="ChromeHTML" [HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\winPenPack X-Chromium Launcher\Capabilities\Startmenu] "StartMenuInternet"="winPenPack X-Chromium Launcher" [HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\winPenPack X-Chromium Launcher\Capabilities\URLAssociations] "http"="ChromeHTML" "https"="ChromeHTML" "mailto"="ChromeHTML" [HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\winPenPack X-Chromium Launcher\shell\open\command] @="\"C:\\PORT\\CHROME\\X-Chromium.exe\" \"%1\"" ; ------End cut & paste here------ Use a Visual Basic Script (VBScript) file (.vbs) to set your default web browser (X-Chromium in this example): TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text VBScript (.vbs) file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the VBS extension (.vbs) -> right-click it -> Run as Administrator -> answer Yes/OK to all prompts to execute/run it. -----Begin cut & paste here----- Set WshShell=WScript.CreateObject("WScript.Shell") ' Set Default Web Browser in Windows Vista/newer: WshShell.Run "%windir%\SYSTEM32\CONTROL.EXE /name Microsoft.DefaultPrograms /page pageDefaultProgram\pageAdvancedSettings?pszAppName=X-Chromium" ' Give Default Programs time to load (2 seconds in this case): WScript.Sleep 2000 WshShell.AppActivate "Set Program Associations" WshShell.SendKeys "{TAB}" WshShell.SendKeys " " WshShell.SendKeys "{TAB}" WshShell.SendKeys "{TAB}" WScript.Sleep 800 WshShell.SendKeys " " Msgbox "Your Default Web Browser is X-Chromium (Portable Chromium)." WScript.Quit ------End cut & paste here------ Execute/run VBS file above from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command (example using X-Chromium above + VBS file named Def_Brow_X-Chrom.vbs) CSCRIPT.EXE //NoLogo Def_Brow_X-Chrom.vbs -> press Enter. CSCRIPT.EXE is located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually C:\WINDOWS]. View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command PATH -> press Enter. * Turn OFF/disable automatic/behind-your-back/unattended Google Chrome Update, Chrome Default Browser takeover + Google Update services in Windows 7/newer: http://support.google.com/chrome/a/answer/6350036/ http://superuser.com/questions/974766/ http://eddiejackson.net/wp/?p=17266 http://admx.help/?Category=GoogleUpdate&Policy=Google.Policies.Update::Pol_DefaultUpdatePolicy http://admx.help/?Category=GoogleUpdate&Policy=Google.Policies.Update::Pol_AutoUpdateCheckPeriod http://www.ghacks.net/2017/05/19/how-to-block-automatic-google-chrome-updates/ http://www.itninja.com/question/how-to-disable-updates-for-latest-chrome-enterprise-version-44-0-2403-130/ http://computergarage.org/disable-auto-update-google-chrome.html http://www.chromium.org/administrators/policy-list-3/#DefaultBrowserSettingEnabled http://admx.help/?Category=Chrome&Policy=Google.Policies.Chrome%3A%3ADefaultBrowserSettingEnabled http://www.tenforums.com/attachments/browsers-email/120981d1486931502t-how-stop-google-chrome-not-your-default-browser-message-modification-info.jpg http://www.tenforums.com/tutorials/5507-choose-default-apps-windows-10-a.html#option6 See topic above to use winPenPack X-Chromium (X-Launcher) Portable launcher (example) which installs Chromium web browser as your default browser for file extensions, internet protocols + URL/URI addresses/items/links/schemes/shortcuts. TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK to all prompts to register/merge/import its information into your registry. -----Begin cut & paste here----- REGEDIT4 [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Update] "UpdateDefault"=dword:0 "AutoUpdateCheckPeriodMinutes"=dword:0 ; WOW6432Node registry subkey exists only in Windows NTx 64-bit (x64): [HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Policies\Google\Update] "UpdateDefault"=dword:0 "AutoUpdateCheckPeriodMinutes"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\GoogleChromeElevationService] "Start"=dword:4 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\GoogleChromeElevationService] "Start"=dword:4 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\GoogleChromeElevationService] "Start"=dword:4 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\gpupdate] "Start"=dword:4 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\gpupdate] "Start"=dword:4 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\gpupdate] "Start"=dword:4 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\gpupdatem] "Start"=dword:4 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\gpupdatem] "Start"=dword:4 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\gpupdatem] "Start"=dword:4 [HKEY_LOCAL_MACHINE\Software\Policies\Google\Chrome] "DefaultBrowserSettingEnabled"=dword:0 [HKEY_CURRENT_USER\Software\Policies\Google\Chrome] "DefaultBrowserSettingEnabled"=dword:0 [HKEY_USERS\.DEFAULT\Software\Policies\Google\Chrome] "DefaultBrowserSettingEnabled"=dword:0 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] "Google Update"=- [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce] "Google Update"=- [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnceEx] "Google Update"=- [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices] "Google Update"=- [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServicesOnce] "Google Update"=- [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run] "Google Update"=- [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce] "Google Update"=- [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnceEx] "Google Update"=- [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunServices] "Google Update"=- [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunServicesOnce] "Google Update"=- [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run] "Google Update"=- [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\RunOnce] "Google Update"=- [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\RunOnceEx] "Google Update"=- [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\RunServices] "Google Update"=- [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\RunServicesOnce] "Google Update"=- ; ------End cut & paste here------ * Determine, Configure + Tweak IPv6 in Windows 7/newer: http://en.wikipedia.org/wiki/IPv6 http://learn.microsoft.com/troubleshoot/windows-server/networking/configure-ipv6-in-windows/ http://technet.microsoft.com/library/bb726944.aspx http://technet.microsoft.com/library/bb726995.aspx http://technet.microsoft.com/library/bb962076.aspx http://serverfault.com/questions/234711/ http://www.whatsmydns.net/ipv6-to-ipv4/ MDGx "IPv6 Testing, Info + Links": http://www.mdgx.com/modem.htm#IPV6 View all your computer/device active/current IPv6 IP addresses supplied by your network/internet provider from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter: NETSH.EXE interface ipv6 show addresses and their corresponding IPv4 IP addresses: NETSH.EXE interface ipv4 show addresses NetSh [NETSH.EXE] is located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually C:\WINDOWS]. View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command PATH -> press Enter. NetSh: http://www.ss64.com/nt/netsh.html http://adamtheautomator.com/netsh/ * Lockdown Windows: Customize/Disable Network/Internet + Security Settings: http://forums.techguy.org/threads/locking-down-windows.829647/ * Chromium/Chrome: ****************** http://www.mdgx.com/7.php#:~:text=%2A%20Chromium%2FChrome%3A MDGx "FREE Windows 9x/NTx Web Browsers" chapter -> "Chromium + Chrome web browsers [free(ware)]" section -> "Chromium + Chrome" topic in SOFTWARE.TXT (included): http://www.mdgx.com/nettoys.htm#CHR Change/Set Windows 7 default web browser to Chromium/Chrome or Firefox: http://www.groovypost.com/howto/change-default-browser-windows-7/ RECOMMENDED: - Chromium Precompiled EXEcutable [Installer EXE + Portable Archives ZIP/7z] 32-bit + 64-bit for Windows XP/newer 32-bit (x86) + 64-bit (x64): http://chromium.woolyss.com/ Degoogled/Ungoogled/stripped of Google ad(ware)/spyware/surveillance/tracking code Chromium builds [clearly labeled]: http://github.com/ungoogled-software/ungoogled-chromium/blob/master/README.md http://ungoogled-software.github.io/ungoogled-chromium-wiki/faq Ungoogled Chromium precompiled binaries 32-bit + 64-bit for Windows 7/newer 32-bit (x86) + 64-bit (x64) [75-125 MB, Installer ONLY EXE + Portable ZIP, NEWest at the top]: http://ungoogled-software.github.io/ungoogled-chromium-binaries/ Ungoogled Chromium 64-bit for Windows 7/newer 64-bit (x64): http://ungoogled-software.github.io/ungoogled-chromium-binaries/releases/windows/64bit/ Ungoogled Chromium 32-bit for Windows 7/newer 32-bit (x86): http://ungoogled-software.github.io/ungoogled-chromium-binaries/releases/windows/32bit/ - Brave 32-bit + 64-bit web browser for Windows 7/newer 32-bit (x86) + 64-bit (x64) based on Chromium code [fork] with improved privacy, safety + security and optimized speed: http://brave.com/ Brave Repository: http://github.com/brave/brave-browser/ Download [ZIP = full, Portable]: http://github.com/brave/brave-browser/releases/latest/ - Vivaldi 32-bit + 64-bit web browser for Windows 7/newer 32-bit (x86) + 64-bit (x64) based on Chromium code [fork] with enhanced privacy, safety + security: http://vivaldi.com/ Download [EXE = Installer ONLY]: http://vivaldi.com/download/ Vivaldi Portable -> run Installer EXE -> Install standalone: http://help.vivaldi.com/desktop/install-update/standalone-version-of-vivaldi/ - X-Chromium (X-Launcher) Portable launcher: http://www.winpenpack.com/en/download.php?view.1082 Download [EXE = Installer, full]: http://sourceforge.net/projects/winpenpack/files/X-Chromium/releases/ Either install Chromium precompiled stable releases 32-bit or 64-bit: http://chromium.woolyss.com/ or extract all files from portable archive [zip or 7z] + copy to the destination of your choice Chromium portable stable releases 32-bit or 64-bit to match the Windows NTx [7/newer] operating system(s) [OS(es)] build/edition/release/update/version + bit strength [32-bit (x86) or 64-bit (x64)] you are using. All Chromium + Chrome alternatives/derivatives/forks/variants users must have these 3 environment variables: GOOGLE_API_KEY=NO GOOGLE_DEFAULT_CLIENT_ID=NO GOOGLE_DEFAULT_CLIENT_SECRET=NO Right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run these commands -> press Enter after each line: SETX.EXE GOOGLE_API_KEY "NO" /M SETX.EXE GOOGLE_DEFAULT_CLIENT_ID "NO" /M SETX.EXE GOOGLE_DEFAULT_CLIENT_SECRET "NO" /M MDGx "@ Chromium/Chrome/Brave/X-Chromium/Thorium/Vivaldi Privacy, Safety + Security Settings, Extensions, Guides + Solutions:" topic in SOFTWARE.TXT (included): http://www.mdgx.com/nettoys.htm#PRV MDGx collection of essential + useful Chromium/Chrome extensions + tweaks -> "CHROMIUM" section in TOOLS.TXT (included): http://www.mdgx.com/tools.php#:~:text=CHROMIUM%20%5B%2A%5D http://www.mdgx.com/TOOLS.TXT * Firefox: ********** http://www.mdgx.com/7.php#:~:text=%2A%20Firefox%3A MDGx "Internet Power Toys: Firefox [free(ware)]" section in SOFTWARE.TXT (included): http://www.mdgx.com/nettoys.htm#MOZ Firefox Stable (candidate): http://ftp.mozilla.org/pub/firefox/nightly/ Firefox Alpha 1: http://ftp.mozilla.org/pub/firefox/nightly/latest-trunk/ Firefox Alpha 2: http://ftp.mozilla.org/pub/firefox/nightly/latest-mozilla-aurora/ Firefox Beta: http://ftp.mozilla.org/pub/firefox/nightly/ Firefox Portable Stable: http://www.portableapps.com/apps/internet/firefox_portable/ Firefox Portable Beta + Nightly: http://www.portableapps.com/apps/internet/firefox_portable/test/ - TOR (The Onion Router) Browser 32-bit + 64-bit web browser for Windows 7/newer 32-bit (x86) + 64-bit (x64) based on Gecko code [fork] with enhanced anonymity, privacy, safety + security: http://www.torproject.org/download/languages/ Make TOR Browser Portable -> Install EXE -> select desired local/removable media location: http://tb-manual.torproject.org/make-tor-portable/ TOR Browser Portable [OLDer Installer EXE]: http://github.com/garethflowers/tor-browser-portable/ Download: http://github.com/garethflowers/tor-browser-portable/releases/latest/ TOR Browser online Manual: http://tb-manual.torproject.org/ - Waterfox 64-bit hardware/CPU optimized + improved privacy web browser for Windows 7/newer 64-bit (x64) based on Gecko code [fork]: http://www.waterfox.net/ Download: http://www.waterfox.net/download/ Waterfox FAQ: http://www.waterfox.net/docs/faq/ - Pale Moon 32-bit + 64-bit hardware/CPU optimized web browser for Windows 7/newer 32-bit (x86) + 64-bit (x64) based on Gecko code [fork]: http://www.palemoon.org/ Download Portable + X-Launcher [Setup EXE or archived 7z]: http://www.palemoon.org/download.shtml Pale Moon FAQ + Help Forum: http://forum.palemoon.org/viewforum.php?f=24 Pale Moon Extensions: http://addons.palemoon.org/extensions/ - LibreWolf 64-bit web browser for Windows 7/newer 64-bit (x64) based on Gecko code [fork] with enhanced privacy, safety + security: http://librewolf.net/ LibreWolf Windows Installer: http://librewolf.net/installation/windows/ LibreWolf Windows Releases: http://gitlab.com/librewolf-community/browser/windows/-/releases/ LibreWolf Portable: http://www.portableapps.com/apps/internet/librewolf-portable/ LibreWolf FAQ: http://librewolf.net/docs/faq/ See WINDOWS7.TXT (this file) or go to: http://www.mdgx.com/7.php http://www.mdgx.com/WINDOWS7.TXT -> "Internet + Web Browsers Tweaks, Fixes + Tools" chapter http://www.mdgx.com/7.php#:~:text=Internet%20%2B%20Web%20Browsers%20Tweaks%2C%20Fixes%20%2B%20Tools%20%5BChromium%2FChrome%2C%20Firefox -> "* Firefox : " section for more Firefox tips, downloads + links. http://www.mdgx.com/7.php#:~:text=%2A%20Firefox%3A MDGx "@ Firefox/TOR Browser/Mercury/Waterfox/Pale Moon/LibreWolf Privacy, Safety + Security Settings, Extensions, Guides + Solutions:" topic in SOFTWARE.TXT (included): http://www.mdgx.com/nettoys.htm#PSF MDGx collection of essential Firefox/Mozilla add-ons + tweaks -> "FIREFOX" section in TOOLS.TXT (included): http://www.mdgx.com/tools.php#:~:text=FIREFOX%20%5B%2A%5D http://www.mdgx.com/TOOLS.TXT * Internet Explorer (IE) web browser [discontinued from all NEWer Windows 10/2016/2019 builds/editions/releases/updates!]: ************************************************************************************************************************** See MDGx "Internet Explorer (IE) 4/5/6/7/8/9/10/11 Essential FREE Fixes + Updates" chapter in SOFTWARE.TXT (included): http://www.mdgx.com/ietoy.htm R.I.P. Internet Explorer... :-) http://www.cnn.com/2022/06/18/asia/internet-explorer-gravestone-viral-south-korea-intl-hnk/ RECOMMENDED: ************ Install an independent/3rd party free, open source, safe, secure, uncrippled, unlocked, unrestricted, modern web browser based on Chromium code with enhanced privacy, safety + security http://www.mdgx.com/nettoys.htm#PRV -> see "FREE Windows 9x/NTx Web Browsers" chapter -> "Chromium + Chrome" section in SOFTWARE.TXT (included): http://www.mdgx.com/nettoys.htm#CHR * Replace obsolete default proprietary Internet Explorer (IE) search engine with a better, safer, more secure alternative, with enhanced privacy, less hard-to-disable/hard-to-find/hidden, unwanted ad(vertisment)s/"offers", spyware, annoyances, forced/behind-your-back data collection/logging, telemetry/"phone home", surveillance, tracking (examples): - Google: http://www.google.com/ - Neocities Metasearch Redirector [random SearXNG instance/server]: http://searx.neocities.org/ - DuckDuckGo: http://duckduckgo.com/ - Brave: http://search.brave.com/ - Startpage: http://www.startpage.com/ - Qwant: http://www.qwant.com/ - More examples -> MDGx 100+ "WWW (World Wide Web) Search Engines": http://www.mdgx.com/links.htm#WSE + make it the default: http://www.itstillworks.com/change-bing-google-12283088.html http://smallbusiness.chron.com/change-bing-google-70809.html http://www.howtogeek.com/709072/how-to-switch-to-duckduckgo-a-private-search-engine/ http://www.howtogeek.com/710128/what-is-duckduckgo-meet-the-google-alternative-for-privacy/ In this example I have selected Neocities [http://searx.neocities.org/] as default search engine. You can change to any other according to your needs/preferences -> see MDGx 100+ "WWW (World Wide Web) Search Engines" [most have enhanced privacy, safety + security]: http://www.mdgx.com/links.htm#WSE Obsolete Method: **************** Start button/icon/logo/menu/orb -> Control Panel (CP) OR Run... [hold WinKey + press R] -> type this command: control.exe -> press Enter -> Internet (Explorer) Options (Properties) [inetcpl.cpl] -> Programs tab -> Manage Add-ons button -> highlight Search Providers left side item -> Find more search providers link (URL) [ DISCONTINUED ! -> redirects to MS Edge web page :-(]: http://www.iegallery.com/ which redirects to [ DISCONTINUED ! -> redirects to MS Edge web page :-(]: http://www.microsoft.com/iegallery/ -> new Internet Explorer (IE) browser window opens -> Add (click) link below Google logo (example) -> back to Programs tab -> Manage Add-ons window -> highlight Search Providers left side item -> highlight Google right side item -> Set default button -> highlight all other right side items except Google (if any) 1 at a time -> Remove button for each one -> confirm deletion of each item -> check Prevent programs from suggesting changes to my default search provider box -> Close button. Working Method: *************** TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK to all prompts to register/merge/import its information into your registry. -----Begin cut & paste here----- REGEDIT4 ; Neocities random SearXNG Metasearch Redirector [http://searx.neocities.org/] used in this example: [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main] "Default_Search_URL"="http://searx.neocities.org/" "Default_Page_URL"="http://searx.neocities.org/" "Start Page"="http://searx.neocities.org/" "Search Page"="http://searx.neocities.org/" "First Home Page"="http://searx.neocities.org/" [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main] "Default_Search_URL"="http://searx.neocities.org/" "Default_Page_URL"="http://searx.neocities.org/" "Start Page"="http://searx.neocities.org/" "Search Page"="http://searx.neocities.org/" "First Home Page"="http://searx.neocities.org/" [HKEY_USERS\.DEFAULT\Software\Microsoft\Internet Explorer\Main] "Default_Search_URL"="http://searx.neocities.org/" "Default_Page_URL"="http://searx.neocities.org/" "Start Page"="http://searx.neocities.org/" "Search Page"="http://searx.neocities.org/" "First Home Page"="http://searx.neocities.org/" ; ------End cut & paste here------ More info -> all these MDGx topics (further below): All these WWW (World Wide Web) search engines, some of whom have by default/preconfigured/preinstalled/out-of-the-box enhanced anonymity/pseudonymity, privacy, safety + security features/functions/properties/protocols (further below): - "@ Google search, (geo)location tracking, data, history, e-mail (Gmail), notifications + apps:" - "@ YouTube (YT) [videos hosted by Google]:" - "@ Bing Search, Live, Microsoft, MSN + Related/Shared Accounts, Services + Apps [owned by Microsoft]:" - "@ Yahoo! (Y!) Search, Yahoo! Mail + Yahoo! News:" - "@ DuckDuckGo (DDG) Search, Privacy Essentials + E-mail Protection:" - "@ SearXNG Metasearch:" - "@ SearX Metasearch:" - "@ Startpage Search + Privacy Protection Add-on + Extension:" - "@ Brave Search:" - "@ Qwant Search:" from the "Digital + Internet/Online Privacy, Safety + Security" chapter in WINDOWS7.TXT (this file): http://www.mdgx.com/7.php#:~:text=Digital%20%2B%20Internet%2FOnline%20Privacy%2C%20Safety%20%2B%20Security%20%3D%20Your%20Top%20Priority See also MDGx 100+ "WWW (World Wide Web) Search Engines" [most have enhanced privacy, safety + security]: http://www.mdgx.com/links.htm#WSE * Flash [discontinued!]: http://www.mdgx.com/nettoys.htm#SHFL Flash STAND ALONE: http://adobe-flash-player.apponic.com/11.2.202.235-141412/ All major web browsers blocked Flash -> Unblock Flash: http://windowsreport.com/adobe-flash-content-was-blocked/ MUST UNcheck ALL McAfee/Symantec boxes B4 installing Flash !!! Flash Player STAND ALONE: http://fpdownload.macromedia.com/pub/flashplayer/updaters/30/flashplayer_30_sa.exe Flash Player DEBUG STAND ALONE: http://fpdownload.macromedia.com/pub/flashplayer/updaters/30/flashplayer_30_sa_debug.exe Flash PepperFlash (PPAPI) for Chromium/Chrome STAND ALONE: http://fpdownload.macromedia.com/pub/labs/flashruntimes/flashplayer/install_flash_player_ppapi.exe Flash PepperFlash (PPAPI) for Chromium/Chrome STAND ALONE PORTABLE: http://sourceforge.net/projects/thumbapps/files/Utilities/Adobe%20Flash%20Player/ http://effect8.ru/soft/media/adobe-flash-player-portable.html Flash Netscape Plug-in (NPAPI) for Firefox STAND ALONE: http://fpdownload.macromedia.com/pub/labs/flashruntimes/flashplayer/install_flash_player.exe Flash ActiveX (AX) for Internet Explorer (IE) STAND ALONE: http://fpdownload.macromedia.com/pub/labs/flashruntimes/flashplayer/install_flash_player_ax.exe => Flash SETUP ONLY: http://get.adobe.com/flashplayer/ http://get.adobe.com/flashplayer/update/ppapi/ http://get.adobe.com/flashplayer/update/plugin/ http://get.adobe.com/flashplayer/otherversions/ MUST UNcheck ALL McAfee/Symantec boxes B4 installing Flash !!! Flash PepperFlash (PPAPI) for Chromium/Chrome SETUP ONLY: http://get.adobe.com/flashplayer/?fpchrome http://admdownload.adobe.com/bin/live/flashplayer30pp_xa_install.exe Flash Netscape Plug-in (NPAPI) for Firefox SETUP ONLY: http://admdownload.adobe.com/bin/live/flashplayer30_xa_install.exe Flash ActiveX (AX) for Internet Explorer (IE) SETUP ONLY: http://admdownload.adobe.com/bin/live/flashplayer30ax_xa_install.exe Internet Explorer 11.0 (IE11) Flash ActiveX (AX) 32-bit + 64-bit for Windows 8/8.1 32-bit + 64-bit: http://helpx.adobe.com/flash-player/kb/flash-player-issues-windows-8.html http://support.microsoft.com/help/4048951/ - IE11 Flash ActiveX (AX) 32-bit: http://go.microsoft.com/fwlink/?linkid=328650 - IE11 Flash ActiveX (AX) 64-bit: http://go.microsoft.com/fwlink/?linkid=328651 => OLD Flash: http://helpx.adobe.com/flash-player/kb/archived-flash-player-versions.html http://www.filehippo.com/download_flashplayer/ http://www.oldapps.com/flash_player.php Flash PepperFlash (PPAPI) for Chromium/Chrome Online Settings: http://www.macromedia.com/support/documentation/en/flashplayer/help/settings_manager02.html Chromium/Chrome Flash Help: http://support.google.com/chrome/answer/6258784/ Use Flash with Chromium/Chrome: http://helpx.adobe.com/flash-player/kb/flash-player-chromium.html Install Flash Player Help: http://helpx.adobe.com/flash-player.html * Flash Player Stand Alone [discontinued!]: Before installing OLDer Flash Player -> uninstall Flash Player (if any) -> restart/reboot. Uninstall Flash Plug-in + ActiveX Control for Internet Explorer (IE): http://www.adobe.com/?id=tn_14157 http://web.archive.org/web/20070503030542/http://www.adobe.com/cfusion/knowledgebase/index.cfm?id=tn_14157 If Flash Player for Internet Explorer (IE) installed -> you canNOT install OLDer versions. Install OLDer Flash Player for Internet Explorer (IE): http://helpx.adobe.com/flash-player/kb/install-earlier-flash-player-version.html Flash Players 11.2.202.235 32-bit for Windows XP/2003/Vista/2008/7: - Standalone: flashplayer11_2r202_235_win_sa_32bit.exe - Internet Explorer: flashplayer11_2r202_235_winax_32bit.exe - Internet Explorer: flashplayer11_2r202_235_winax_32bit.msi - Netscape: flashplayer11_2r202_235_win_32bit.exe - Netscape: flashplayer11_2r202_235_win_32bit.msi - Uninstaller: uninstall_flashplayer11_2r202_235_win_32bit.exe Flash Players 11.2.202.235 64-bit for Windows XP/2003/Vista/2008/7: - Internet Explorer: flashplayer11_2r202_235_winax_64bit.exe - Internet Explorer: flashplayer11_2r202_235_winax_64bit.msi - Netscape: flashplayer11_2r202_235_win_64bit.exe - Netscape: flashplayer11_2r202_235_win_64bit.msi - Uninstaller: uninstall_flashplayer11_2r202_235_win_64bit.exe * Flash Players + Savers/Downloaders [discontinued!]: http://www.mdgx.com/nettoys.htm#FPSD SWF Guide + Tools: http://www.lifewire.com/swf-file-4138363/ SWF Tools: EXE to SWF Extractor: http://swftools.sourceforge.net/exe-to-swf.html File: http://sourceforge.net/projects/swftools/files/eXe_To_SwF/eXeToSwF_Latest.zip SWF Tools: SWF to EXE Converter: http://swftools.sourceforge.net/swf-to-exe.html File: http://sourceforge.net/projects/swftools/files/SwF_To_eXe/Swf2eXe_Latest.zip SWF Tools include Flash Player Projector Standalone 11.4.402.278 32-bit. SWF -> EXE = Flash Player Projector Standalone 11.2.202.235 32-bit: http://junebeetle.github.io/converter/executables/ File: http://fpdownload.macromedia.com/get/flashplayer/installers/archive/fp_11.2.202.235_archive.zip EXE -> SWF: http://www.northcode.com/blog/Extract-SWF-files-from-Flash-Executables/ File: http://www.northcode.com/free/exe2swf/exe2swf.exe FLV Extract GUI (FLVExtract.exe) + command line (FLVExtractCL.exe) 32-bit tools: http://www.moitah.net/ File: http://www.moitah.net/download/latest/FLV_Extract.zip SWFTools command line conversion, extraction + management SWF tools: http://www.swftools.org/download.html * Shockwave [discontinued!]: http://www.mdgx.com/nettoys.htm#SHFL http://codecpack.co/download/Shockwave_Player.html Shockwave 32-bit Web Player + Plug-ins for Windows XP/newer + Apple, Google, Microsoft, Mozilla, Netscape + Opera 32-bit web browsers: - Shockwave SLIM: http://fpdownload.macromedia.com/get/shockwave/default/english/win95nt/latest/Shockwave_Installer_Slim.exe - Shockwave FULL [attempts to install ADWARE/SHAREWARE/TRIALWARE!]: http://fpdownload.macromedia.com/get/shockwave/default/english/win95nt/latest/Shockwave_Installer_Full.exe - Shockwave FULL for Internet Explorer (IE) [attempts to install ADWARE/SHAREWARE/TRIALWARE!]: http://fpdownload.macromedia.com/get/shockwave/default/english/win95nt/latest/sw_lic_full_installer.msi OLD Shockwave Versions: http://www.filehippo.com/download_shockwave/ http://www.oldapps.com/shockwave.php * Silverlight [discontinued!]: http://www.mdgx.com/nettoys.htm#SVL * CleanIETempFiles (CleanIETempFiles.exe) 32-bit command line tool deletes Internet Explorer (IE) 7/newer Cookies, History + Temporary Internet Files (TIF): http://blogs.msmvps.com/danielmartin/2011/03/11/191-c-243-mo-automatizar-la-eliminaci-243-n-de-temporales-de-internet-explorer/ File: http://www.mdgx.com/files/CITF.ZIP Executable [only]: http://raw.githubusercontent.com/gliheng/Blackhole/master/data/bin/CleanIETempFiles.exe Syntax (case insensitive): -q runs silent (Quiet = Q) -c deletes Cookies (C) -h deletes browsing History (H) -t deletes Temporary Internet Files (TIF = T) Command line (example): CleanIETempFiles.exe -c -h -t -q * IEWebGL Plug-in for Internet Explorer (IE) 6/7/8/9/10: http://github.com/iewebgl/iewebgl/ File: http://raw.githubusercontent.com/iewebgl/iewebgl/master/WebSite2.0/Releases/iewebgl.exe http://github.com/iewebgl/iewebgl/blob/master/WebSite2.0/Releases/iewebgl.exe?raw=true http://github.com/iewebgl/iewebgl/blob/master/WebSite2.0/Releases/iewebgl.cab?raw=true http://github.com/iewebgl/iewebgl/archive/master.zip NOTE: Internet Explorer (IE) 11 has WebGL code built-in and does NOT need IEWebGL! * Best Free Wi-Fi Network Tools: http://www.techsupportalert.com/best-free-wi-fi-network-finder-utility.htm * NetworkInterfacesView 32-bit + 64-bit: http://www.nirsoft.net/utils/network_interfaces.html - NetworkInterfacesView 32-bit: http://www.nirsoft.net/utils/networkinterfacesview.zip - NetworkInterfacesView 64-bit: http://www.nirsoft.net/utils/networkinterfacesview-x64.zip * inSSIDer Wi-Fi network stats, benchmark, signal strength + security audit tool: http://www.techspot.com/downloads/5936-inssider.html File: http://files01.tchspt.com/temp/inSSIDer-installer.msi * NetSurveyor Wi-Fi 802.11 network stats, optimization + monitoring tool: http://www.nutsaboutnets.com/netsurveyor-wifi-scanner/ File: http://nutsaboutnets-downloads.s3.amazonaws.com/NetSurveyor-Setup.exe * Wireless Network Watcher (WNetWatcher) 32-bit detects all network/internet connected devices: http://www.nirsoft.net/utils/wireless_network_watcher.html File: http://www.nirsoft.net/utils/wnetwatcher.zip Improve Your Wireless Network Performance Guide: http://www.majorgeeks.com/content/page/how_to_improve_your_wireless_network_performance.html ______________________________________________________________________________ Digital + Internet/Online Privacy, Safety + Security = Your Top Priority http://www.mdgx.com/7.php#:~:text=Digital%20%2B%20Internet%2FOnline%20Privacy%2C%20Safety%20%2B%20Security%20%3D%20Your%20Top%20Priority * Know Your Rights + Protect Yourself/Yourselves = Basic education for all netizens/cybercitizens in the digital age: ********************************************************************************************************************* General Information, Guidance + Solutions... @ For everybody no matter where you live: ***************************************** FYI [For Your Information]: Wikipedia articles are available in many languages: http://www.wikipedia.org/ List of Wikipedias by language group: http://meta.wikimedia.org/wiki/List_of_Wikipedias_by_language_group Translate this http://www.mdgx.com/7.php http://www.mdgx.com/WINDOWS7.TXT into your language [copy & paste 1 of the 2 links above in the left hand box]: http://translate.google.com/ List of Text/HTML Translation Engines: http://www.mdgx.com/links.htm#TTE ***************************************** - Wikipedia: Digital Privacy: http://en.wikipedia.org/wiki/Digital_privacy - Wikipedia: Personal Identifiable Information (Data): http://en.wikipedia.org/wiki/Personal_data - Wikipedia: Internet Privacy (data privacy, digital privacy, individual/personal privacy, information privacy): http://en.wikipedia.org/wiki/Internet_privacy - Wikipedia: Information Privacy (data privacy) + (Data) Privacy Protection Legislation: http://en.wikipedia.org/wiki/Information_privacy - Wikipedia: Information Privacy -> all categories: http://en.wikipedia.org/wiki/Category:Information_privacy - Wikipedia: Privacy Laws: http://en.wikipedia.org/wiki/Privacy_law - Wikipedia: Information privacy laws: http://en.wikipedia.org/wiki/Information_privacy_law - Wikipedia: Net Neutrality: http://en.wikipedia.org/wiki/Net_neutrality - Wikipedia: Search Engine Privacy: http://en.wikipedia.org/wiki/Search_engine_privacy - Wikipedia: Privacy focused Search Engines + Web Browsers: http://en.wikipedia.org/wiki/Internet_privacy#Privacy_focused_search_engines/browsers - Wikipedia: Privacy concerns with social networking services (social media): http://en.wikipedia.org/wiki/Privacy_concerns_with_social_networking_services - Wikipedia: Internet privacy -> all categories: http://en.wikipedia.org/wiki/Category:Internet_privacy - Wikipedia: Internet Safety (online safety, cyber safety, electronic safety): http://en.wikipedia.org/wiki/Internet_safety - Wikipedia: Internet Safety -> all categories: http://en.wikipedia.org/wiki/Category:Internet_safety - Wikipedia: Computer Security (cybersecurity, data security, digital security, information security, internet security): http://en.wikipedia.org/wiki/Computer_security - Wikipedia: Information Security (InfoSec): http://en.wikipedia.org/wiki/Information_security - Wikipedia: Data Security: http://en.wikipedia.org/wiki/Data_security - Wikipedia: Internet Security: http://en.wikipedia.org/wiki/Internet_security - Wikipedia: Computer Security -> all categories: http://en.wikipedia.org/wiki/Category:Computer_security - Common Types of Malicious Cyberattacks, Frauds, Hacks, Scams: http://www.crowdstrike.com/cybersecurity-101/cyberattacks/most-common-types-of-cyberattacks/ - Wikipedia: Types of Cyberattacks, Frauds, Hacks, Scams -> all categories: http://en.wikipedia.org/wiki/Category:Types_of_cyberattacks - Wikipedia: Cyberattack: http://en.wikipedia.org/wiki/Cyberattack - Wikipedia: Internet Fraud: http://en.wikipedia.org/wiki/Internet_fraud - Wikipedia: Ad Fraud: http://en.wikipedia.org/wiki/Ad_fraud - Wikipedia: Click Fraud: http://en.wikipedia.org/wiki/Click_fraud - Wikipedia: Cyberbullying: http://en.wikipedia.org/wiki/Cyberbullying - Wikipedia: Cyberstalking: http://en.wikipedia.org/wiki/Cyberstalking - Wikipedia: Racism on The Internet (Cyber Racism): http://en.wikipedia.org/wiki/Racism_on_the_Internet - Wikipedia: Identity fraud: http://en.wikipedia.org/wiki/Identity_fraud - Wikipedia: Identity theft: http://en.wikipedia.org/wiki/Identity_theft - ZDNet: Cybersecurity 101: Protect your privacy from hackers, spies + the government: http://www.zdnet.com/article/online-security-101-how-to-protect-your-privacy-from-hackers-spies-and-the-government/ - Recognize, Avoid + Protect against Digital, Computer, E-mail, Internet, Online Breaches, Fraud, Hacks, Phishing, Scams: http://www.avast.com/c-scam/ http://www.fortinet.com/resources/cyberglossary/internet-fraud/ http://www.cisa.gov/uscert/sites/default/files/publications/emailscams_0905.pdf http://consumer.ftc.gov/articles/how-protect-your-privacy-online/ http://www.npr.org/2020/10/09/922262686/ http://www.bitdefender.com/cyberpedia/how-to-protect-online-privacy/ http://www.safewise.com/blog/internet-safety-avoid-online-scams/ http://electronics.howstuffworks.com/how-to-tech/how-to-detect-online-scams.htm - TechTarget: Wireless Security: WEP, WPA, WPA2 + WPA3 differences: http://www.techtarget.com/searchnetworking/feature/Wireless-encryption-basics-Understanding-WEP-WPA-and-WPA2/ - GlobalSign: Best Practices for Wireless Network Security: http://www.globalsign.com/en/blog/12-best-practices-wireless-network-security/ - CISA (Cybersecurity and Infrastructure Security Agency) [U.S.A.]: Securing Wireless Networks: http://www.cisa.gov/news-events/news/securing-wireless-networks/ - Wikipedia: Cybersecurity information technology list: http://en.wikipedia.org/wiki/Cybersecurity_information_technology_list - Wikipedia: Category: Internet Security: http://en.wikipedia.org/wiki/Category:Internet_security - IETF (Internet Engineering Task Force): Internet Security Glossary: http://datatracker.ietf.org/doc/html/rfc4949/ - NIST (National Institute of Standards and Technology) [U.S.A.]: Cybersecurity + Digital/Online Privacy Glossary: http://csrc.nist.gov/glossary/ @ For all who live in the United States of America (U.S.A.) states + territories: ********************************************************************************* - Personal Identifiable Information (Data) in the United States: http://en.wikipedia.org/wiki/Personal_data#United_States - Internet Privacy in the United States: http://en.wikipedia.org/wiki/Internet_privacy#Internet_privacy_in_the_United_States - Privacy Laws in the United States: http://en.wikipedia.org/wiki/Privacy_laws_of_the_United_States - Information privacy laws in the United States: http://en.wikipedia.org/wiki/Information_privacy_law#United_States - Net Neutrality in the United States: http://en.wikipedia.org/wiki/Net_neutrality_in_the_United_States http://www.mdgx.com/4net.htm - Internet privacy laws: how your personal information is protected online: http://legal.thomsonreuters.com/en/insights/articles/how-your-personal-information-is-protected-online/ - Wikipedia: Federal Trade Commission Act (FTCA): http://en.wikipedia.org/wiki/Federal_Trade_Commission_Act_of_1914 - Wikipedia: Electronic Communications Privacy Act (ECPA): http://en.wikipedia.org/wiki/Electronic_Communications_Privacy_Act - Wikipedia: Computer Fraud and Abuse Act (CFAA): https://en.wikipedia.org/wiki/Computer_Fraud_and_Abuse_Act - Wikipedia: Children's Online Privacy Protection Act (COPPA): http://en.wikipedia.org/wiki/Children%27s_Online_Privacy_Protection_Act - Wikipedia: Controlling the Assault of Non-Solicited Pornography and Marketing Act (CAN-SPAM): http://en.wikipedia.org/wiki/CAN-SPAM_Act_of_2003 - Wikipedia: Financial Services Modernization Act (GLBA): http://en.wikipedia.org/wiki/Gramm%E2%80%93Leach%E2%80%93Bliley_Act - Wikipedia: Fair and Accurate Credit Transactions Act (FACTA): http://en.wikipedia.org/wiki/Fair_and_Accurate_Credit_Transactions_Act - Wikipedia: California Consumer Privacy Act (CCPA): http://en.wikipedia.org/wiki/California_Consumer_Privacy_Act - American Data and Privacy Protection Act (ADPPA) [future law]: http://arstechnica.com/tech-policy/2022/08/data-privacy-bill-would-give-you-more-control-over-info-collected-about-you/ @ English [EN] = For all who live in the European Union (E.U.) countries, sovereignties + territories: @ Ceština [CS]: Pro všechny, kterí žijí v zemích, suverenity + území Evropské Unie (E.U.): @ Dansk [DA]: For alle, der bor i den Europæiske Unions (E.U.) lande, suveræniteter + territorier: @ Deutsch [DE] = Für alle in den ländern, souveränitäten + territorien der Europäischen Union (E.U.): @ Elliniká [EL]: Gia ólous ósoi zoun se chóres, kyriarchíes + edáfi tis Evropaïkís Énosis (E.E.): @ Español [ES] = Para todos que viven en los países, soberanías + territorios de la Unión Europea (U.E.): @ Français [FR] = Pour tous ceux qui vivent dans les pays, souverainetés + territoires de l'Union Européenne (U.E.): @ Italiano [IT] = Per tutti che vivono nei paesi, sovranità + territori dell'Unione Europea (U.E.): @ Nederlands [NL]: Voor iedereen die in de landen, soevereiniteiten + territoria van de Europese Unie (E.U.) woont: @ Polski [PL]: Dla wszystkich, którzy mieszkaja w krajach, suwerennosci + terytoria Unii Europejskiej (U.E.): @ Português [PT]: Para todos os que vivem nos países, soberanias + territórios da União Europeia (U.E.): @ Româna [RO]: Pentru toti cei care locuiesc în tarile, suveranitatile + teritoriile Uniunii Europene (U.E.): @ Svenska [SW]: För alla som bor i EU:s (E.U.) länder, suveräniteter + territorier: http://en.wikipedia.org/wiki/European_Union#Member_states http://en.wikipedia.org/wiki/Languages_of_the_European_Union#Official_EU_languages ********************************************************************************************************************** FYI [For Your Information]: Wikipedia articles are available in many languages: http://www.wikipedia.org/ List of Wikipedias by language group: http://meta.wikimedia.org/wiki/List_of_Wikipedias_by_language_group Translate this http://www.mdgx.com/7.php http://www.mdgx.com/WINDOWS7.TXT into your language [copy & paste 1 of the 2 links above in the left hand box]: http://translate.google.com/ List of Text/HTML Translation Engines: http://www.mdgx.com/links.htm#TTE ***************************************** - Personal Identifiable Information (Data) in the European Union: http://en.wikipedia.org/wiki/Personal_data#European_Union - Internet Privacy in the European Union: http://en.wikipedia.org/wiki/Internet_privacy#European_General_Data_protection_regulation - Privacy Laws in the European Union: http://en.wikipedia.org/wiki/Privacy_law#European_Union_(EU) - Information privacy laws in the European Union: http://en.wikipedia.org/wiki/Information_privacy_law#Europe - Net Neutrality in the European Union: http://en.wikipedia.org/wiki/Net_neutrality_in_the_European_Union - Data protection + online privacy: http://europa.eu/youreurope/citizens/consumers/internet-telecoms/data-protection-online-privacy/index_en.htm - Data protection laws + rules: http://ec.europa.eu/info/law/law-topic/data-protection/eu-data-protection-rules_en/ http://ec.europa.eu/info/law/law-topic/data-protection_en/ - General Data Protection Regulation (GDPR): http://en.wikipedia.org/wiki/General_Data_Protection_Regulation http://gdpr-info.eu/ - Data Protection Directive (DPD): http://en.wikipedia.org/wiki/Data_Protection_Directive http://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A31995L0046 - Google Translate: http://translate.gogle.com/ - G2: Online Machine Translation Engines: http://www.g2.com/categories/machine-translation/ - MDGx: "Text/HTML Translation Engines": http://www.mdgx.com/links.htm#TTE * E-mail, Accounts, Internet, Online Passwords: *********************************************** Find out if your digital, internet/online accounts, blogs, forums, social media, alerts, apps, e-mails, enrollments, memberships, subscriptions, etc credentials, passwords/passcodes/passkeys/passphrases/pins/secure/secret codes/phrases/questions/(key)words have been breached/hacked/leaked, learn how to create better/stronger ones + how to encrypt/protect your e-mails/messages: http://www.geckoandfly.com/32570/ - gHacks: The Ultimate Online Privacy Test Resource List: http://www.ghacks.net/2015/12/28/the-ultimate-online-privacy-test-resource-list/ - E-mail IP Leak: http://emailipleak.com/ - E-mail Privacy Tester: http://emailprivacytester.com/ - E-mail Trace: http://www.ip-adress.com/trace_email/ - Has/Have My E-mail(s) Been Pwned?: http://haveibeenpwned.com/ - Has/Have My Password(s) Been Pwned?: http://haveibeenpwned.com/Passwords/ - LeakedSource = scan your e-mail(s) for breach(es): http://www.leakedsource.com/ - Data Breach Check: http://whatismyipaddress.com/breach-check/ - Avast Hack Check = scan your e-mail(s) password(s) for leak(s): http://www.avast.com/hackcheck/ - Has your password leaked?: http://cybernews.com/password-leak-check/ - How-To Geek: Strong [hard to crack] Passwords Guide: http://www.howtogeek.com/195430/how-to-create-a-strong-password-and-remember-it/ - EFF (Electronic Frontier Foundation) SSD: Creating Strong Passwords: http://ssd.eff.org/module/creating-strong-passwords/ - Privacy Guides: Introduction to Passwords: http://www.privacyguides.org/basics/passwords-overview/ - ScamAdviser: Everything about Digital/Online Scams, Spam, Fakes, Fraud, Phishing, Theft: http://www.scamadviser.com/ - Media Smarts [Canada]: Cyber Security: Spam, Scams, Frauds + Identity Theft: http://mediasmarts.ca/digital-media-literacy/digital-issues/cyber-security/cyber-security-spam-scams-frauds-identity-theft/ - Investopedia: Watch Out for Internet Scams: http://www.investopedia.com/articles/personal-finance/040115/watch-out-these-top-internet-scams.asp - WebRoot: E-mail Phishing, Vishing & Other Types of Attacks: http://www.webroot.com/us/en/resources/tips-articles/what-is-phishing/ - FTC (Federal Trade Commission) [U.S.A.]: Detect, Recognize + Avoid (E-mail) Phishing Scams: http://consumer.ftc.gov/articles/how-recognize-and-avoid-phishing-scams/ - CISA (Cybersecurity and Infrastructure Security Agency) [U.S.A.]: Recognizing + Avoiding (E-mail) Scams [PDF]: http://www.cisa.gov/sites/default/files/publications/emailscams_0905.pdf - IT Governance [U.K.]: Detect Phishing E-mails: http://www.itgovernance.co.uk/blog/5-ways-to-detect-a-phishing-email/ - Skipser: Why You Should Be Careful Clicking The Unsubscribe Button: http://www.skipser.com/p/2/p/careful-while-unsubscribing-from-mailing-lists.html - Privacy Guides: E-mail Security: http://www.privacyguides.org/basics/email-security/ - How-To Geek: Best Free Ways to Send Encrypted E-mail + Secure Messages: http://www.howtogeek.com/135638/the-best-free-ways-to-send-encrypted-email-and-secure-messages/ - Guru99: Best Free Secure (Encrypted) E-mail Account Providers: http://www.guru99.com/secure-email-service-provider.html - Encrypt E-mail Messages in Gmail, Yahoo, Outlook, iCloud + Your Device(s): http://clean.email/blog/email-security/how-to-encrypt-email/ http://cybernews.com/secure-email-providers/how-to-encrypt-email/ http://www.cloudwards.net/how-to-encrypt-your-emails/ - TerraNova Security: Keep Social Media Passwords Secure: http://terranovasecurity.com/how-to-create-a-strong-password-in-7-easy-steps/ - NirSoft: Windows, Windows Software + Online/Internet Password Recovery Tools [free(ware)]: http://www.nirsoft.net/password_recovery_tools.html - Major Geeks: Password Managers: http://www.majorgeeks.com/files/categories/password_managers.html - Wikipedia: Password strength: http://en.wikipedia.org/wiki/Password_strength * Malware, Virus + Spyware Scanning, Detection + Removal Info, Guides + Free(ware) Tools + FireWalls: ***************************************************************************************************** - Wikipedia: Malware: http://en.wikipedia.org/wiki/Malware - Wikipedia: Spyware Removal: http://en.wikipedia.org/wiki/Category:Spyware_removal - Wikipedia: Anti-Virus Software: http://en.wikipedia.org/wiki/Antivirus_software - MDGx "Get Anti-Viral: Protect Yourself!" tools, guides + links: http://www.mdgx.com/vir.htm - MDGx "Get Anti-Viral = Protect Yourself !" -> "Free Online Malware + Spyware Scanners" section: http://www.mdgx.com/vir.htm#SS - MDGx "Get Anti-Viral = Protect Yourself !" -> "Free(ware) Anti-Virus Tools, Info + Links" section: http://www.mdgx.com/vir.htm#TL - MDGx "Get Anti-Viral = Protect Yourself !" -> "Free(ware) Anti-Virus Software for Windows NTx" section: http://www.mdgx.com/vir.htm#AVS - MDGx "Get Anti-Viral = Protect Yourself !" -> "Free(ware) Virus, Trojan, Worm, Rootkit + Malware Removal Tools" section: http://www.mdgx.com/vir.htm#RMV - MDGx "Free Online Privacy, Safety + Security Scanners": http://www.mdgx.com/safety.htm - STAY SAFE = Scan for viruses *all* files downloaded from the internet!: http://www.mdgx.com/vir.htm#SS - MDGx Beware of "False Positives" in FALSPOSI.TXT (included): http://www.mdgx.com/fp.php http://www.mdgx.com/FALSPOSI.TXT - Wikipedia: Computer/Device/Portable fingerprint: http://en.wikipedia.org/wiki/Device_fingerprint - Wikipedia: Fingerprinting (computing): http://en.wikipedia.org/wiki/Fingerprint_(computing) - Wikipedia: FireWalls: http://en.wikipedia.org/wiki/Firewall_(computing) - Best free(ware) FireWalls for Windows NTx: http://www.softwaretestinghelp.com/best-free-firewall/ http://www.lifewire.com/free-firewall-programs-4129270/ http://www.makeuseof.com/tag/free-firewalls-windows-compared/ - MDGx "FIREWALL" section in TOOLS.TXT (included): http://www.mdgx.com/tools.php http://www.mdgx.com/TOOLS.TXT - MDGx "Free(ware) Windows 9x/NTx Firewalls, Anti-Spyware + Internet Monitors" chapter -> "Free(ware) Windows 9x/NTx Anti-Spyware" section in SOFTWARE.TXT (included): http://www.mdgx.com/fw.htm#ASP - MDGx "Free(ware) Windows 9x/NTx Firewalls, Anti-Spyware + Internet Monitors" chapter -> "Free(ware) Windows 9x/NTx Firewalls" section in SOFTWARE.TXT (included): http://www.mdgx.com/fw.htm#FWL - MDGx "HOSTS Files, Guides + Tools": http://www.mdgx.com/hosts.php Example of HOSTS file -> 10_BLOCK.TXT (included) -> "HOSTS" chapter [last 1 at the bottom]: http://www.mdgx.com/10BLK/10_BLOCK.php#TXT * Everything about HTTP/web/internet/browser Cookies: ***************************************************** http://www.mdgx.com/7.php#:~:text=%2A%20Everything%20about%20HTTP%2Fweb%2Finternet%2Fbrowser%20Cookies%3A - Privacy Policies: Browser Cookies: The Ultimate Guide: http://www.privacypolicies.com/blog/browser-cookies-guide/ - HTML.com: Are You Using Cookies? This Ultimate Guide is for You: http://html.com/resources/cookies-ultimate-guide/ - Cookie Central: What are cookies?: http://www.cookiecentral.com/cm002.htm - Cookie Central: The Unofficial Cookie FAQ: http://www.cookiecentral.com/faq/ - Cookie Script: All You Need to Know About Third-Party Cookies: http://cookie-script.com/all-you-need-to-know-about-third-party-cookies.html - CookieYes: United States of America (U.S.A.) Cookie Laws: http://www.cookieyes.com/knowledge-base/cookie-consent/are-there-cookie-laws-in-the-us/ - GDPR E.U.: European Union (E.U.) GDPR (General Data Protection Regulation) Cookie Law: http://gdpr.eu/cookies/ - Vox: Why every website wants you to accept its cookies: http://www.vox.com/recode/2019/12/10/18656519/ - Medium: Cookies Visualized: Everything you ever need to know about Web Cookies: http://medium.com/from-the-scratch/cookies-visualized-c5f3b403dc65/ - FTC (Federal Trade Commission) [U.S.A.]: Internet Cookies: http://www.ftc.gov/policy-notices/privacy-policy/internet-cookies/ - ProPrivacy: How to Block/Disable Cookies in all Web Browsers: http://proprivacy.com/ruinmysearchhistory/how-to-block-cookies/ - How-To Geek: Block Third Party Cookies in Every Web Browser: http://www.howtogeek.com/241006/how-to-block-third-party-cookies-in-every-web-browser/ - Google Chromium/Chrome: Clear, Disable/Enable + Manage Cookies + 3rd party Cookies in Chromium/Chrome: http://support.google.com/chrome/answer/95647/ - Google Chromium/Chrome: View, Edit + Delete Cookies: http://developer.chrome.com/docs/devtools/storage/cookies/ - Mozilla Firefox: Cookies - Information that websites store on your computer: http://support.mozilla.org/kb/cookies-information-websites-store-on-your-computer/ - Mozilla Firefox: Cookies and cache: http://support.mozilla.org/products/firefox/protect-your-privacy/cookies/ - Mozilla Firefox: 3rd party Cookies and Firefox tracking protection: http://support.mozilla.org/kb/third-party-cookies-firefox-tracking-protection/ - Microsoft Edge: How to Disable Cookies in Edge: http://cookie-script.com/knowledge-base/disable-cookies-edge/ - Microsoft Edge: View, Edit + Delete Cookies: http://learn.microsoft.com/microsoft-edge/devtools-guide-chromium/storage/cookies/ - Microsoft Internet Explorer (IE): How to Disable *All* Cookies (including 3rd party Cookies) in Internet Explorer (IE): http://www.cookiesandyou.com/disable-cookies/windows/ie/ - Microsoft Internet Explorer (IE): How to delete Cookie files in Internet Explorer (IE): http://support.microsoft.com/topic/bca9446f-d873-78de-77ba-d42645fa52fc - BrowserSpy: Cookie Information + How to Detect Cookies in Your Web Browser(s): http://browserspy.dk/cookie.php - CookieYes: Check Cookies in Your Web Browsers + on Your Devices Manually: http://www.cookieyes.com/blog/how-to-check-cookies-on-your-website-manually/ - wikiHow: View Cookies in All Major Web Browsers: http://www.wikihow.com/View-Cookies - Google Account(s): Turn Cookies ON or OFF: http://support.google.com/accounts/answer/61416/ - MakeUseOf (MUO): Supercookies (Evercookies): What Are Supercookies? How to Remove Them Properly: http://www.makeuseof.com/tag/what-are-supercookies-and-why-are-they-dangerous/ - NordVPN: Supercookies (Evercookies): Definition + Removal: http://nordvpn.com/blog/super-cookies-going-global/ - Mozilla Blog: Supercookies (Evercookies): Cookies + Supercookies Explained: http://blog.mozilla.org/internet-culture/mozilla-explains-cookies-and-supercookies/ - CompariTech: Supercookies (Evercookies): Super Cookies + How to Remove Them: http://www.comparitech.com/identity-theft-protection/supercookie/ - Cookie Law Info: Best free cookie checkers for websites: http://www.cookielawinfo.com/free-cookie-checker-for-websites/ - ClearCookies BATch (.bat) file [ClearCookies.bat] deletes all stored cookies from most popular web browsers: Chrome/Chromium, Firefox, Internet Explorer (IE), Opera, Safari: http://github.com/CCrashZer0/ClearCookies/ File: http://github.com/CCrashZer0/ClearCookies/blob/master/ClearCookies.bat - CatOnMat: Batch files + command line tools to delete Cookies, Cache + History in all major web browsers: http://www.catonmat.net/clear-privacy-ie-firefox-opera-chrome-safari/ - Wikipedia: HTTP/Web/Internet/Web Browser Cookies: http://en.wikipedia.org/wiki/HTTP_cookie - Wikipedia: HTTP/Web/Internet/Web Browser Evercookies (Supercookies): http://en.wikipedia.org/wiki/Evercookie STRONGLY RECOMMENDED: ********************* Enjoy your digital + internet/online live(s), protect your digital persona(s), enhance your online/personal privacy, safety, security, avoid/block/disable/opt OUT of/stop/turn OFF dangerous/insecure/unsafe, undesirable/unnecessary/unneeded/unused/useless, forced/behind-your-back/hidden/intrusive/invasive/unauthorized/without your approval/consent/knowledge/permission, annoying/bloat/resource consuming/wasting ad(vertisment)s/adware, cookies, hacking, phishing, viruses, malware, spyware, (geo)tracking, (diagnostic) tracking, telemetry ("phone home"), data/info collection/logging, (customer) "experience", unwanted "offers", "promotions", "reminders", "suggestions", "trials", "updates", widgets in your Operating System(s) [OSes], devices (phones, tablets, portables), e-mail, messaging, web browser(s) + online apps, chat rooms, (social) media, forums, (web) sites, software, tools, games, enrollments, feeds, memberships, notifications, services, subscriptions, etc. Obviously, for-profit businesses want your money, and they'll do just about anything in order to get as much as possible. That's why a lot of software/services advertisers/businesses/developers/manufacturers/vendors, even some of the ones you think of as being dependable/reliable/trustworthy (attempt to) bundle, install, package and somehow sneak in annoying bloatware, junk, unnecessary, unwanted, useless adware (advertisment banners, apps, pop-ups, scrollers, widgets), toolbars, trackers, web browser add-ons, extensions (which constantly collect/harvest, track, and send your personal data, info, history, preferences, search queries to their servers/sites/computers unauthorized, without your approval, consent, knowledge or permission), crippled/limited features shareware/time limited/trial apps/software/enrollments/memberships/services/subscriptions. Here are a few things you can do to get rid of them effortlessly, in a nick of time, and they're all free... ;-/ * Web Browsers, Platforms, Computers + Devices Online Protection Guides + Tools for Privacy, Safety + Security: *************************************************************************************************************** - MDGx: 100+ "WWW (World Wide Web) Search Engines" [most have enhanced privacy, safety + security]: http://www.mdgx.com/links.htm#WSE - MDGx: "Anonymous + Faster Surfing": http://www.mdgx.com/links.htm#ANO - MDGx: "HOSTS Files, Guides + Tools": http://www.mdgx.com/hosts.php - MDGx: "Get Anti-Viral: Protect Yourself!" -> tools, guides + links: http://www.mdgx.com/vir.htm - MDGx: "Free(ware) Windows 9x/NTx Firewalls, Anti-Spyware + Internet Monitors" section in SOFTWARE.TXT (included): http://www.mdgx.com/fw.htm - FMHY: Ad Blockers, Anti-Virus, Privacy Tools, DNS, Proxies, VPNs, Encrypted E-mail, etc: http://fmhy.pages.dev/adblockvpnguide/ - Cover Your Tracks (CYT) -> Test Your Web Browser: http://coveryourtracks.eff.org/ - Simple Opt Out: From 100+ web sites who market, sell + share for profit your personal/private data/info: http://simpleoptout.com/ - AdBlock Tester -> Test Your Web Browser: http://adblock-tester.com/ - Test Ad Block -> Test Your Web Browser: http://d3ward.github.io/toolz/adblock.html - Can You Block It? Adblocker Test -> Test Your Web Browser: https://canyoublockit.com/testing/ - AmIUnique: My browser fingerprint -> Test Your Web Browser: http://amiunique.org/fingerprint/ - Device Info -> Test Your Web Browser: http://www.deviceinfo.me/ - LocateJS: Check your location -> Test Your Web Browser: http://locatejs.com/ - Gibson Research Corporation (GRC): DNS Nameserver Spoofability Test -> Test Your IP(s) in your web browser: http://www.grc.com/dns/dns.htm - IPLeak: IP/DNS Detect -> Test Your Web Browser: http://ipleak.net/ - TorZillaPrint (TZP) -> Test Your Web Browser [requires Firefox/derivative/fork/variant 102/newer!]: http://arkenfox.github.io/TZP/tzp.html - Test Permission related UIs (User Interface) for web APIs (Application Programming Interface) -> Test Your Web Browser: https://permission.site/ - BrowserLeaks: DNS (Domain Name System) Leak Test -> Test Your Web Browser: http://browserleaks.com/dns/ - BrowserLeaks: Test Your Web Browser(s) for fingerprinting, geo(location), tracking, spying, spoofing, leaks, beacons, auditing, scripting: http://browserleaks.com/ - BrowserLeaks: Social Media Login Detection: http://browserleaks.com/social/ - WebBrowserTools: Check online privacy, safety + security of your web browser(s): http://webbrowsertools.com/ - Whoer: My IP, DNS Leak, Evercookie (Supercookie) + Port Scanner Tests: http://whoer.net/ - Whoer: My IP Test: http://whoer.net/ - Whoer: DNS Leak Test: http://whoer.net/dns-leak-test/ - Whoer: Evercookie (Supercookie) Test: http://whoer.net/evercookie/ - Whoer: Port Scanner: http://whoer.net/port-scanner-online/ - PrivacyTests: Web Browsers Compared - Privacy Tests: http://privacytests.org/ - How-To Geek: Optimize Chromium/Chrome for Maximum Privacy: http://www.howtogeek.com/100361/how-to-optimize-google-chrome-for-maximum-privacy/ - Woolyss Chromium: Privacy Guidelines: http://chromium.woolyss.com/#privacy - Privacy Tools: Best Privacy Web Browsers: http://www.privacytools.io/private-browser/ - Privacy Tools: Best Privacy Web Browsers Add-ons + Extensions: http://www.privacytools.io/privacy-browser-addons/ - Chromium/Chrome + Firefox Privacy Add-ons + Extensions: http://wiki.archlinux.org/title/Browser_extensions#Privacy - The Markup: Browsers, Extensions/Add-ons, Cookies, Tracking: http://themarkup.org/ask-the-markup/2020/09/22/i-scanned-the-websites-i-visit-with-blacklight-and-its-horrifying-now-what/ - LifeWire: Browser Hijackers: Protect Yourselves: http://www.lifewire.com/what-is-a-browser-hijacker-4777175/ - The Markup: High Privacy Cost of "Free" Websites: http://themarkup.org/blacklight/2020/09/22/blacklight-tracking-advertisers-digital-privacy-sensitive-websites/ - Cover Your Tracks (CYT): Browsers, Trackers, Cookies, Fingerprinting: http://coveryourtracks.eff.org/learn - Make Tech Easier (MTE): Social (3rd party/cross-site/external/federated/outsourced) Logins: http://www.maketecheasier.com/are-social-logins-secure-private/ - Make Tech Easier (MTE): Strong Passwords: http://www.maketecheasier.com/create-strong-password/ - Privacy Guides: Introduction to Passwords: http://www.privacyguides.org/basics/passwords-overview/ - Privacy Guides: Common Threats: http://www.privacyguides.org/basics/common-threats/ - Privacy Guides: Recommended Secure DNS (Domain Name System) Resolvers Providers: http://www.privacyguides.org/dns/#recommended-providers - MDGx: "Public Root DNS Servers" chapter in WINDOWS7.TXT (this file): http://www.mdgx.com/7.php#:~:text=Public%20Root%20DNS%20Servers%20%5B%2A%5D - ProPrivacy: The Ultimate Online Privacy Guide: http://proprivacy.com/guides/the-ultimate-privacy-guide/ - Privacy Tools: Privacy Tools Software Alternatives and Encryption: http://www.privacytools.io/ - Prism Break: Anti-Surveillance Hardware + Software [free(ware) + open source]: http://prism-break.org/ - gHacks: The Ultimate Online Privacy Test Resource List: http://www.ghacks.net/2015/12/28/the-ultimate-online-privacy-test-resource-list/ - Global Privacy Control (GPC): http://globalprivacycontrol.org/ - Privacy Guides: Privacy Tools [free(ware) + open source]: http://www.privacyguides.org/tools/ - Spread Privacy: Protect your Privacy on your Devices: http://spreadprivacy.com/tag/device-privacy-tips/ - Spread Privacy: Privacy Crash Course: http://spreadprivacy.com/tag/privacy-newsletter/ - Techlore: Spreading privacy & security to the masses: http://techlore.tech/ - EFF (Electronic Frontier Foundation): HTTPS Is Actually Everywhere: http://www.eff.org/deeplinks/2021/09/https-actually-everywhere/ - EFF (Electronic Frontier Foundation): Do Not Track (DNT): http://www.eff.org/issues/do-not-track/ - EFF (Electronic Frontier Foundation): Surveillance Self-Defense (SSD): http://ssd.eff.org/ - EFF (Electronic Frontier Foundation) SSD: Fingerprinting Explained: http://ssd.eff.org/module/what-fingerprinting/ - TOR Project Blog: Web Browser Fingerprinting: Introduction + Challenges: http://blog.torproject.org/browser-fingerprinting-introduction-and-challenges-ahead/ - Firefox + Chromium compared: (In)Security Features: http://madaidans-insecurities.github.io/firefox-chromium.html - Wikipedia: Web Browser fingerprint: http://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint - Wikipedia: Fingerprinting (computing): http://en.wikipedia.org/wiki/Fingerprint_(computing) - Wikipedia: Web Browser sniffing: http://en.wikipedia.org/wiki/Browser_sniffing - Wikipedia: Web Browser user agent: http://en.wikipedia.org/wiki/User_agent - Turn OFF *all* Apps, Desktop, Platform + Web Push Notifications in web browsers: Chromium/Chrome: http://support.google.com/chrome/answer/3220216/ Firefox: http://support.mozilla.org/kb/push-notifications-firefox/ Safari: http://support.apple.com/guide/safari/customize-website-notifications-sfri40734/mac/ Edge: http://blogs.windows.com/msedgedev/2016/05/16/web-notifications-microsoft-edge/ - Firefox privacy and security features: http://support.mozilla.org/kb/firefox-privacy-and-security-features/ - Privacy and security settings: http://support.mozilla.org/products/firefox/privacy-and-security/ - Protect your privacy: http://support.mozilla.org/products/firefox/protect-your-privacy/ - "Private Browsing" (Incognito Mode) - Use Firefox without saving history: http://support.mozilla.org/kb/private-browsing-use-firefox-without-history/ - Cookies and cache: http://support.mozilla.org/products/firefox/protect-your-privacy/cookies/ - 3rd party Cookies and Firefox tracking protection: http://support.mozilla.org/kb/third-party-cookies-firefox-tracking-protection/ - Firefox built-in Phishing and Malware Protection: http://www.mozilla.org/firefox/phishing-protection/ - Change/Set Windows 10/11 default web browser to other than Edge [or Internet Explorer (IE)]: http://www.avg.com/en/signal/set-your-default-browser/ - Make Chromium/Chrome your default web browser in Windows 10/11: http://support.google.com/chrome/answer/95417/ - Make Firefox your default web browser in Windows 10/11: http://support.mozilla.org/kb/how-change-your-default-browser-firefox-windows/ - Make Chromium/Chrome or alternative/derivative/fork/variant your default web browser in Windows 8/8.1: http://www.solveyourtech.com/set-google-chrome-as-the-default-browser-in-windows-8/ - Make Firefox or alternative/derivative/fork/variant your default web browser in Windows 8/8.1: http://support.mozilla.org/kb/setting-firefox-default-browser-does-not-work/ - Change/Set Windows 7 default web browser to Chromium/Chrome or Firefox: http://www.groovypost.com/howto/change-default-browser-windows-7/ - Turn ON the Do Not Track (DNT) feature: http://dnt.mozilla.org/ - Turn ON Global Privacy Control (GPC) in Firefox: http://blog.mozilla.org/netpolicy/2021/10/28/implementing-global-privacy-control/ -> Global Privacy Control (GPC): http://globalprivacycontrol.org/ - Best ad blockers: http://addons.mozilla.org/blog/whats-the-best-ad-blocker-for-you/ - Best anti-trackers: http://addons.mozilla.org/blog/top-anti-tracking-extensions/ - Enhanced Tracking Protection in Firefox for Desktop: http://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop/ - Privacy & Security: http://blog.mozilla.org/category/privacy-security/ - Mozilla Security: http://www.mozilla.org/security/ - Startpage: How to set up your Android for Privacy: http://www.startpage.com/privacy-please/privacy-guides/how-to-set-up-your-android-for-privacy/ - Privacy Guides: Android OS, Settings + Apps: http://www.privacyguides.org/android/ - ComputerWorld: The ultimate guide to privacy on Android: http://www.computerworld.com/article/3545530/ - chrizel: iOS Security and Privacy Guide: http://github.com/chrizel/iOS-Security-and-Privacy-Guide/ - Defending Digital: Apple iOS Security and Privacy Guide (for iPhone and iPad): http://defendingdigital.com/apple-ios-security-privacy-guide/ - Smishing (cellular/mobile device SMS/text messaging phishing) and How to Defend Against It: http://usa.kaspersky.com/resource-center/threats/what-is-smishing-and-how-to-defend-against-it/ - The Register: Kill Google AMP (Accelerated Mobile Pages) before it kills the web: http://www.theregister.com/2017/05/19/open_source_insider_google_amp_bad_bad_bad/ - Wikipedia: Accelerated Mobile Pages (AMP): http://en.wikipedia.org/wiki/Accelerated_Mobile_Pages - Navigate the Tnternet using a VPN (Virtual Private Network): http://cybernews.com/how-to-use-vpn/ - VPN Guide: http://www.security.org/vpn/ - Complete VPN Beginner Guide: http://www.privacyaffairs.com/beginners-guide-to-vpn/ - VPN Overview: http://www.privacyguides.org/basics/vpn-overview/ - VPNs + VPN Providers for Consumers: http://vpnoverview.com/vpn-information/what-is-a-vpn/ - Everything You Need to Know about VPNs: http://restoreprivacy.com/vpn/ - Best Free VPN Providers: http://vpnoverview.com/best-vpn/free-vpn/ - Best free VPN services: http://www.tomsguide.com/best-picks/best-free-vpn/ - Best free VPNs: http://www.techradar.com/vpn/best-free-vpn/ - Best free VPN list + some you should definitely avoid: http://proprivacy.com/vpn/comparison/free-vpn-services/ - Free Public VPN Relay Servers: http://www.vpngate.net/ - Cloudflare WARP Desktop client 64-bit for Windows 8.1/newer 64-bit (x64) [free Virtual Private Network (VPN) using public root Domain Name System (DNS) servers]: http://1.1.1.1/ Cloudflare WARP for Windows: http://developers.cloudflare.com/warp-client/get-started/windows/ Cloudflare WARP for Linux: http://developers.cloudflare.com/warp-client/get-started/linux/ Cloudflare WARP for macOS: http://developers.cloudflare.com/warp-client/get-started/macos/ Cloudflare WARP for Android: http://developers.cloudflare.com/warp-client/get-started/android/ Cloudflare WARP for iOS: http://developers.cloudflare.com/warp-client/get-started/ios/ Use Cloudflare WARP VPN in combination with WireGuard: http://www.andryou.com/2020/03/28/guide-using-cloudflares-warp-vpn-on-a-computer-mac-pc-linux/ WireGuard VPN (free, open source): http://www.wireguard.com/ BrowserLeaks: DNS (Domain Name System) Leak Test: http://browserleaks.com/dns/ Wikipedia: Virtual Private Network (VPN): http://en.wikipedia.org/wiki/Virtual_private_network Wikipedia: Domain Name System (DNS): http://en.wikipedia.org/wiki/Domain_Name_System - OpenVPN Cloud, Access Server + Connect client Virtual Private Network (VPN) system provides secure point-to-point or site-to-site concurrent connections using OpenSSL (Secure Sockets Layer) encryption + Transport Layer Security (TLS) protocol, highly customizable: http://openvpn.net/ Free subscriptions for personal use = limited to: - OpenVPN Cloud = maximum 3 concurrent connections. - Access Server = maximum 2 concurrent connections. Repository: http://github.com/OpenVPN/openvpn/ OpenVPN Connect client 32-bit + 64-bit for Windows 7/newer 32-bit (x86) + 64-bit (x64) [MSI Installer]: http://openvpn.net/client-connect-vpn-for-windows/ OpenVPN FAQs: http://openvpn.net/vpn-server-resources/#faqs OpenVPN Online Documentation: http://openvpn.net/vpn-server-resources/ Wikipedia: Virtual Private Network (VPN): http://en.wikipedia.org/wiki/Virtual_private_network Wikipedia: OpenSSL: http://en.wikipedia.org/wiki/OpenSSL Wikipedia: Secure Sockets Layer (SSL): http://en.wikipedia.org/wiki/Transport_Layer_Security#SSL_1.0,_2.0,_and_3.0 Wikipedia: Transport Layer Security (TLS): http://en.wikipedia.org/wiki/Transport_Layer_Security - Portmaster Free 64-bit for Windows 7/newer 64-bit (x64) port manager, firewall, filter, secure DNS, blocker, network monitor, highly customizable: http://safing.io/ File [Setup only!]: http://updates.safing.io/latest/windows_amd64/packages/portmaster-installer.exe Windows 7 64-bit (x64) requires Microsoft Security Monthly Quality Rollup (SMQR) KB4503292: http://catalog.s.download.windowsupdate.com/d/msdownload/update/software/secu/2019/06/windows6.1-kb4503292-x64_a35bb4ea16d1d529fde9abfe8a0c16e9061f74cd.msu More info @ MSKB: http://support.microsoft.com/help/4503292/ Portmaster Documentation: http://docs.safing.io/ Community Wiki: http://wiki.safing.io/ - Pi-hole DOS console command line installer [PH4WSL1.cmd] for Windows 10/newer installs Linux Pi-hole DNS sinkhole on Windows computers, highly customizable: http://github.com/DesktopECHO/Pi-Hole-for-WSL1/ Download: http://github.com/DesktopECHO/Pi-Hole-for-WSL1/raw/master/PH4WSL1.cmd PH4WSL1.cmd install guide step-by-step: http://www.reddit.com/r/pihole/comments/j39drp/ PH4WSL1.cmd ReadMe guide: http://github.com/DesktopECHO/Pi-Hole-for-WSL1/#readme Pi-hole DNS sinkhole for Linux: http://github.com/pi-hole/pi-hole/ DNS sinkhole: http://en.wikipedia.org/wiki/DNS_sinkhole - DNSCrypt Proxy clients for Windows NTx 32-bit + 64-bit use encrypted DNS protocol to authenticate + anonymize two way traffic between DNS client and DNSCrypt enabled DNS resolver, prevents DNS spoofing, DDoS attacks: http://dnscrypt.info/ More Info: http://www.dnscrypt.org/ DNSCrypt Proxy: http://github.com/DNSCrypt/dnscrypt-proxy/ Download [ZIP -> Installer EXE]: http://github.com/dnscrypt/dnscrypt-proxy/releases/latest/ DNSCrypt Documentation: http://github.com/DNSCrypt/dnscrypt-proxy/wiki/ DNSCrypt Clients + DNSCrypt Servers: http://dnscrypt.info/implementations/ DNSCrypt Clients: http://www.dnscrypt.org/#dnscrypt-windows DNSCrypt Public Root DNS Servers: http://dnscrypt.info/public-servers/ DNSCrypt: http://en.wikipedia.org/wiki/DNSCrypt - Unbound 32-bit + 64-bit for Windows 7/newer 32-bit (x86) + 64-bit (x64) validating, recursive + caching DNS resolver, supports IPv6 (Internet Protocol version 6), DNSSEC (Domain Name System Security Extensions), NSEC (Next Secure Record), DNS over TLS (DoT) + DNS over HTTPS (DoH) encryption + protocols: http://nlnetlabs.nl/projects/unbound/ Download [Portable ZIP]: http://nlnetlabs.nl/projects/unbound/download/ Unbound Repository: http://github.com/NLnetLabs/unbound/ Unbound Documentation: http://unbound.docs.nlnetlabs.nl/ - Privoxy GUI interface + DOS console command line non-caching HTTP/web proxy with advanced filtering for enhanced privacy + safety, highly customizable: http://www.privoxy.org/ Repository: http://sourceforge.net/projects/ijbswa/ Download: http://www.privoxy.org/sf-download-mirror/Win32/ http://sourceforge.net/projects/ijbswa/files/Win32/ Privoxy FAQ: http://www.privoxy.org/faq/ Privoxy Online Manual: http://www.privoxy.org/user-manual/ Proxy server: http://en.wikipedia.org/wiki/Proxy_server - Privaxy 32-bit + 64-bit DOS console command line MITM (Man In The Middle) HTTP(S) low level incoming + outgoing tunnel proxy ad(ware)/malware/spying/surveillance/tracking blocker/filter: http://github.com/Barre/privaxy/ Download: http://github.com/Barre/privaxy/releases/latest/ Proxy server: http://en.wikipedia.org/wiki/Proxy_server - PeerBlock [ UNMAINTAINED ! ] Portable 32-bit + 64-bit for Windows XP/newer personal firewall blocks/filters incoming + outgoing dangerous/deceptive/insecure/invasive/intrusive/subversive/unsafe IPs + ports [IPv4 only] from frequently updated + user customized lists of blacklisted ad(ware)/malware/spying/surveillance/tracking hosts/IPs: http://www.peerblock.com/ Download [Portable ZIP]: http://code.google.com/archive/p/peerblock/downloads/ PeerBlock 64-bit for Windows Vista/newer 64-bit (x64): http://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/peerblock/PeerBlock_r693__x64_Release_(Vista).zip PeerBlock 32-bit for Windows Vista/newer 32-bit (x86): http://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/peerblock/PeerBlock_r693__Win32_Release_(Vista).zip PeerBlock Repository: http://code.google.com/archive/p/peerblock/ http://sourceforge.net/projects/peerblock/ http://github.com/PeerBlock/peerblock/ I-Blocklist lists of blacklisted IPs [frequently updated]: http://www.iblocklist.com/lists Blocklists + Filterlists: http://github.com/badmojr/1Hosts/ http://filterlists.com/ http://github.com/yokoffing/filterlists/ PeerBlock @ Wikipedia: http://en.wikipedia.org/wiki/PeerBlock - FSF: Ethical Tech Guide -> Recommended Devices/Hardware, Apps/Software + Services/Subscriptions: http://www.fsf.org/givingguide/ - MDGx "Public Root DNS Servers" chapter in WINDOWS7.TXT (this file): http://www.mdgx.com/7.php#:~:text=Public%20Root%20DNS%20Servers%20%5B%2A%5D - MDGx "Internet Power Toys [free(ware)]" chapter -> "Free(ware) Windows NTx Web Browsers" section in SOFTWARE.TXT (included): http://www.mdgx.com/nettoys.htm#NET - MDGx "@ Chromium/Chrome/Brave/X-Chromium/Thorium/Vivaldi Privacy, Safety + Security Settings, Extensions, Guides + Solutions:" topic in SOFTWARE.TXT (included): http://www.mdgx.com/nettoys.htm#PRV - MDGx "@ Firefox/TOR Browser/Mercury/Waterfox/Pale Moon/LibreWolf Privacy, Safety + Security Settings, Extensions, Guides + Solutions:" topic in SOFTWARE.TXT (included): http://www.mdgx.com/nettoys.htm#PSF RECOMMENDED: ************ @ Chromium/Chrome web browsers + alternatives/derivatives/forks/variants: ************************************************************************* http://www.mdgx.com/7.php#:~:text=%40%20Chromium%2FChrome%20web%20browsers%20%2B%20alternatives%2Fderivatives%2Fforks%2Fvariants%3A - MDGx "FREE Windows 9x/NTx Web Browsers" chapter -> "Chromium + Chrome web browsers [free(ware)]" section -> "Chromium + Chrome" topic in SOFTWARE.TXT (included): http://www.mdgx.com/nettoys.htm#CHR - MDGx "@ Chromium/Chrome/Brave/X-Chromium/Thorium/Vivaldi Privacy, Safety + Security Settings, Extensions, Guides + Solutions:" topic in SOFTWARE.TXT (included): http://www.mdgx.com/nettoys.htm#PRV - MDGx "Web Browsers Links: Web Browsers, Tools + Tips on the Internet" [mostly free(ware)] in SOFTWARE.TXT (included): http://www.mdgx.com/nettoys.htm#NET Step-by-step Guide: ******************* 01. Replace (if applicable) Google Chrome web browser with a Google free [stripped of Google ad(ware)/tracking/spyware/surveillance apps, "features", scripts + code] Chromium or 3rd party/independent alternative/derivative/fork/variant Chromium based web browser (free, open source): http://www.mdgx.com/nettoys.htm#CHR RECOMMENDED: - Chromium Precompiled EXEcutable [Installer EXE + Portable Archives ZIP/7z] 32-bit + 64-bit for Windows XP/newer 32-bit (x86) + 64-bit (x64): http://chromium.woolyss.com/ Degoogled/Ungoogled/stripped of Google ad(ware)/spyware/surveillance/tracking code Chromium builds [clearly labeled]: http://github.com/ungoogled-software/ungoogled-chromium/blob/master/README.md http://ungoogled-software.github.io/ungoogled-chromium-wiki/faq Ungoogled Chromium precompiled binaries 32-bit + 64-bit for Windows 7/newer 32-bit (x86) + 64-bit (x64) [75-125 MB, Installer ONLY EXE + Portable ZIP, NEWest at the top]: http://ungoogled-software.github.io/ungoogled-chromium-binaries/ Ungoogled Chromium 64-bit for Windows 7/newer 64-bit (x64): http://ungoogled-software.github.io/ungoogled-chromium-binaries/releases/windows/64bit/ Ungoogled Chromium 32-bit for Windows 7/newer 32-bit (x86): http://ungoogled-software.github.io/ungoogled-chromium-binaries/releases/windows/32bit/ - Brave 32-bit + 64-bit web browser for Windows 7/newer 32-bit (x86) + 64-bit (x64) based on Chromium code [fork] with improved privacy, safety + security and optimized speed: http://brave.com/ Brave Repository: http://github.com/brave/brave-browser/ Download [ZIP = full, Portable]: http://github.com/brave/brave-browser/releases/latest/ - Vivaldi 32-bit + 64-bit web browser for Windows 7/newer 32-bit (x86) + 64-bit (x64) based on Chromium code [fork] with enhanced privacy, safety + security: http://vivaldi.com/ Download [EXE = Installer ONLY]: http://vivaldi.com/download/ Vivaldi Portable -> run Installer EXE -> Install standalone: http://help.vivaldi.com/desktop/install-update/standalone-version-of-vivaldi/ - X-Chromium (X-Launcher) Portable launcher: http://www.winpenpack.com/en/download.php?view.1082 Download [EXE = Installer, full]: http://sourceforge.net/projects/winpenpack/files/X-Chromium/releases/ Either install Chromium precompiled stable releases 32-bit or 64-bit: http://chromium.woolyss.com/ or extract all files from portable archive [zip or 7z] + copy to the destination of your choice Chromium portable stable releases 32-bit or 64-bit to match the Windows NTx [7/newer] operating system(s) [OS(es)] build/edition/release/update/version + bit strength [32-bit (x86) or 64-bit (x64)] you are using. 02. All Chromium + Chrome alternatives/derivatives/forks/variants users must have these 3 Windows environment variables listed below: run these commands from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run these commands -> press Enter after each line: SETX.EXE GOOGLE_API_KEY "NO" /M SETX.EXE GOOGLE_DEFAULT_CLIENT_ID "NO" /M SETX.EXE GOOGLE_DEFAULT_CLIENT_SECRET "NO" /M to avoid any Google apps/code/scripts annoying errors/messages/pop-ups while running Chromium or Chromium alternatives/derivatives/forks/variants. 03. Use Chromium/Chrome or alternative/derivative/fork/variant "Incognito Mode" (Private Browsing) to avoid cookies, (geo)location, personalized/targeted ad(vertisment)s, phone-home, tracking, banned/blocked/forbidden/limited/restricted areas/content/features, privacy/safety/security exposures/invasions/intrusions, annoyances: http://support.google.com/chrome/answer/95464/ http://www.techtimes.com/articles/38718/20150310/ http://www.online-tech-tips.com/computer-tips/12-ways-to-get-past-a-paywall/ Chromium/Chrome -> right-click desired URL/URI address/item/link/scheme/shortcut -> select "Open link in incognito window". Go to "Extensions": chrome://extensions/ -> for each of your installed extensions listed on the Extensions page that block ad(vertisment)s, malware, spying, tracking, and protect against security, safety + privacy breaches/hacks/intrusions/invasions [see "@ Chromium/Chrome/Brave/X-Chromium/Thorium/Vivaldi Privacy, Safety + Security Settings, Extensions, Guides + Solutions:" section in SOFTWARE.TXT (included) http://www.mdgx.com/nettoys.htm#PRV -> click "Details" button -> turn ON/slide right "Allow in Incognito": http://img.webnots.com/2021/08/Enable-Allow-In-Incognito-Mode.png 04. Turn ON (encrypted) Secure DNS, a.k.a. DoH [DNS over HTTPS (DoH)] for all your Chromium/Chrome web browser lookup instances [if supported by both your web browser(s) and respective IP addresses]: http://support.google.com/chrome/answer/10468685/ Go to Settings -> Privacy and security -> Security chrome://settings/security/ -> scroll down to Advanced -> turn ON/slide right "Use secure DNS" -> select your active/current internet/intranet/network/wi-fi/wireless connection/service provider (which needs to be preconfigured to use either their own, or a choice of public root DNS servers -> see "Public Root DNS Servers" chapter in WINDOWS7.TXT (this file)], http://www.mdgx.com/7.php#:~:text=Public%20Root%20DNS%20Servers%20%5B%2A%5D or select a different available/custom/installed/preferred service provider or public root DNS servers (if available and/or applicable) from the drop down menu. Be aware that certain DNS providers may require obtaining security keys, a pin number, fingerprints, a phone number, QR code, which in turn may require opening an account, some kind of enrollment, membership, subscription, and some of them are not free [may require a one time payment, or periodic fees], or/and may require disclosure of certain personal/private data/information, like your e-mail address, (cellular/mobile) phone number, etc. Typical built-in Chromium/Chrome list of public root DNS servers you can choose from (not all of them, or different ones are available depending on your web browser version, operating system, custom settings, type of connection, service provider, etc): - Cloudflare (1.1.1.1); - CleanBrowsing (Family Filter); - Custom -> type in your preferred DNS server provider (valid, correctly formatted URL address) -> see "Public Root DNS Servers" chapter further above in WINDOWS7.TXT (this file); http://www.mdgx.com/7.php#:~:text=Public%20Root%20DNS%20Servers%20%5B%2A%5D - Google (Public DNS); - NextDNS; - OpenDNS. Go to "Async DNS resolver" [flags setting]: chrome://flags/#enable-async-dns -> Disabled -> go to "Use DNS https alpn" [flags setting]: chrome://flags/#use-dns-https-svcb-alpn -> Disabled -> go to "Encrypted ClientHello" [flags setting]: chrome://flags/#encrypted-client-hello -> Disabled -> relaunch/restart your web browser. In case ANY/ALL of these 3 settings are Enabled -> Chromium/Chrome will (eventually) manage (in certain situations) to bypass custom/installed/set (secure) public DNS servers configured by using "Use secure DNS" customized settings (see above), or by using 3rd party DNS extensions/app(lication)s/providers/scripts/services, like public root DNS servers, Cloudflare, DNSCrypt, Unbound, BlackFog, Pi-hole + other similar (secure) DNS (Domain Name System)/DoH (DNS over HTTPS)/DoT (DNS over TLS) providers/services/tools. http://bugdrivendevelopment.net/browser-ignore-internal-dns/ http://serverfault.com/questions/1122251/ http://www.blackfog.com/knowledge-base/disable-async-dns-on-google-chrome-for-windows/ BEWARE: ******* - Additional/extra/supplemental permissions/privileges/rights, change/elevation of level/status, and/or fees may apply/be necessary/required -> check with your administrator/management/service provider/sysadmin/vendor for details. - In case your computer/console/device/terminal, environment/operating system, internet/intranet/network connection and/or web browser(s) are administered/managed externally/remotely, especially in business/educational/enterprise/public/work environments, or in case Parental Controls are turned on, most likely you won't be able to use the built-in Secure DNS feature. - In case you are not able to use the built-in Secure DNS feature -> see "Public Root DNS Servers" chapter further above in WINDOWS7.TXT (this file) in order to use other free/gratis available options, some of whom may require administrator/management/sysadmin permissions/privileges/rights or change/elevation of level/status, depending on your specific environment: http://www.mdgx.com/7.php#:~:text=Public%20Root%20DNS%20Servers%20%5B%2A%5D 05. Log OFF/sign OUT of all Google Mail (Gmail)/Chromium/Chrome/etc account(s) (if any + if more than 1): http://support.google.com/chrome/answer/9159867/ Then turn OFF Chromium/Chrome sign-in: http://support.google.com/chrome/answer/185277/ Then log ON/sign IN to your Google Mail (Gmail)/Google account(s) 1 at a time (if any + if more than 1): http://accounts.google.com/ 06. Go to "Activity controls": http://myactivity.google.com/activitycontrols and then to "My Google Activity": http://myactivity.google.com/ and then to "Other/More Activity": http://myactivity.google.com/more-activity and then to "Your data in Search" (Search Controls): http://myaccount.google.com/yourdata/search and then to "Chrome history": http://myactivity.google.com/page?page=chrome -> delete all activities + history items + lists. More info: http://www.alphr.com/delete-all-google-activity/ 07. Go to "Results about you" [still in beta testing phase, final version to be made available soon]: http://myactivity.google.com/results-about-you/ log in into your Gmail/Google account(s) [1 at a time if more than 1] -> Get started -> Next -> Next -> Find results about you -> fill in all required personal contact info boxes to match your previous contact info (if any) -> Continue -> follow guidelines in order to review found results + remove approved requests. More details: http://www.cnbc.com/2023/10/28/how-to-delete-private-information-from-google-search-results.html http://bgr.com/tech/how-to-remove-your-personal-info-from-google-search-results/ http://www.wired.com/story/remove-personal-info-from-google-search-results/ In case there are any identifiable/personal/private contact/content/data/information/search results/stats/etc distributed/found/leaked/posted/published/shared/etc online, especially unauthorized/without your approval/knowledge/permission -> request to have them all deleted and removed from all Google + Alphabet 3rd party, affiliates, apps, businesses, memberships, partners, products, services, sites, subscriptions, subsidiaries, etc: http://support.google.com/websearch/answer/12719076/ Request to remove your personal information on Google: http://support.google.com/websearch/troubleshooter/9685456/ Content removal form: http://support.google.com/websearch/contact/content_removal_form/ How to report child/minor sexual abuse content: http://support.google.com/?visit_id=638267960047336280-4079233850/ Resources for removing explicit/intimate personal/private images/photos/pictures: http://support.google.com/websearch/answer/13650142/ Outdated content removal tool: http://support.google.com/websearch/answer/6349986/ Refresh Outdated Content tool: http://support.google.com/webmasters/answer/7041154/ Request a refresh of outdated content in Google Search: http://search.google.com/search-console/remove-outdated-content Removals + SafeSearch reports tool: http://support.google.com/webmasters/answer/9689846/ Get Answers/Help from Google Search Help Community: http://support.google.com/websearch/community/ Content removal options outside Google Search: http://support.google.com/websearch/answer/13652412/ Personal Content and Product Policies + Removal Requirements: http://support.google.com/websearch/troubleshooter/3111061/ More info: http://www.usatoday.com/story/tech/2023/08/04/google-users-alerts-search-result/70530494007/ http://www.theverge.com/2023/8/3/23817797/ http://blog.google/products/search/new-privacy-tools/ 08. Go to "Security": http://myaccount.google.com/security and make sure to configure/customize/manage carefully *all* choices/features/settings in order to protect your privacy, safety + security. Examples: - set up strong (hard to crack/guess) passwords/passcodes/passkeys/passphrases/pins/secure/secret codes/phrases/questions/(key)words (if/where applicable, available + possible) -> for details + more information see "Digital + Internet/Online Privacy, Safety + Security" chapter -> "E-mail, Accounts, Internet, Online Passwords" section (further above) in WINDOWS7.TXT (this file): http://www.mdgx.com/7.php#:~:text=Digital%20%2B%20Internet%2FOnline%20Privacy%2C%20Safety%20%2B%20Security%20%3D%20Your%20Top%20Priority - set up 2 step verification, a.k.a. 2 (two)/multi factor authentication (2FA, TFA) (if/where applicable + available) by submitting either a recovery cellular/mobile phone number or a 2nd (backup) recovery e-mail address, or both (if applicable + available); - review your recent security activity, alerts, notifications (if any): http://myaccount.google.com/notifications and in case of *any* out of place, suspicious, unauthorized, unknown access/login into your account(s), security breaches, or suspicions activity you should report them to Google as soon as possible: http://support.google.com/accounts/answer/140921/ http://support.google.com/mail/answer/8253/ In case *any* fraudulous, malicious, unauthorized, unknown access, activity, login or security breach has been confirmed *immediately* take appropriate/necessary measures (if/where applicable, available + possible): change all affected passwords/passcodes/passkeys/passphrases/pins/secure/secret codes/phrases/questions/(key)words, notify respective account/e-mail/enrollment/membership/service/social media/subscription providers, fix/improve existing safety/security settings, add more safety/security features/layers/options, etc: http://www.loginradius.com/blog/identity/what-to-do-when-email-hacked/ http://www.theguardian.com/technology/2014/feb/03/what-to-do-email-hacked-how-to-prevent/ http://consumer.ftc.gov/articles/how-recover-your-hacked-email-or-social-media-account/ 09. Go to "Location Sharing": http://myaccount.google.com/locationsharing and turn OFF/disable/stop sharing your real-time (geo)location with anyone/anything on Google, and do the same for all their 3rd party, affiliates, businesses, memberships, partners, products, services, sites, subscriptions, subsidiaries, etc (if any). That is *unless* any of your accounts, apps, connections, interactions, memberships, services, subscriptions, etc depend on this setting being turned ON. 10. Go to "Data & privacy": http://myaccount.google.com/data-and-privacy and turn OFF/disable/stop any/all sharing your personal/private data/information you consider necessary to keep confidential, exclusive, private, to yourself/yourselves, and/or limit/restrict sharing only with your well-known/trusted family members, friends, co-workers, people, circles, groups, etc. 11. Go to "Emails from Google": http://myaccount.google.com/communication-preferences and turn OFF/block/disable/opt OUT of/stop all e-mails, features, newsletters, notifications, product tips, promotions, reminders, special offers, etc. That is *unless* any of your accounts, apps, connections, interactions, memberships, notifications, services, subscriptions, etc depend on this setting being turned ON. 12. Go to "Third-party apps & services": http://myaccount.google.com/connections and turn OFF/disable/stop *any* accounts, apps, connections, interactions, memberships, notifications, services, subscriptions, etc that look/seem deceptive, fraudulous, malicious, out of place, suspicious, unauthorized, unknown, unneeded, unnecessary, untrustworthy, etc, and make sure to report them to Google as soon as possible: http://support.google.com/accounts/answer/140921/ http://support.google.com/mail/answer/8253/ 13. UNcheck all boxes/buttons, turn/slide OFF all switches/sliders + clear/delete all history/activity for "All time", for "Older than 3 months" (most recent available), and related to all ad(vertisment)s, tracking, (geo)location, history, activity, etc (if + where available). http://support.google.com/accounts/answer/7660719/ More info: http://www.techjunkie.com/automatically-delete-chrome-history-exit/ 14. Go to "Privacy and security" -> "Safety check": chrome://settings/privacy/ -> "Privacy Guide" [Review key privacy and security controls] -> "A guide of your privacy choices": chrome://settings/privacy/guide/?step=welcome -> Next -> "Choose your search and browsing quality": chrome://settings/privacy/guide/?step=msbb -> turn OFF/slide left "Make searches and browsing better" to block/disable/opt OUT of/stop auditing, fingerprinting, (geo)location, personalized/targeted ad(vertisment)s, phone-home, surveillance, tracking, privacy/safety/security exposures/invasions/intrusions, annoyances: "You'll get improved suggestions in the address bar", "URLs you visit are sent to Google to predict what sites you might visit next" + "If you also share Chromium/Chrome usage reports, those reports include the URLs you visit". Then go -> Next: chrome://settings/privacy/guide/?step=safeBrowsing -> select "Enhanced protection" OR "Standard protection" -> for each of these 2 choices click/drop down/touch the down arrow next to each selection so you can see more details and make an informed decision to suit your privacy needs and preferences, because "Enhanced protection" comes with certain compromises/concessions/trade-offs -> see "The downsides to Enhanced Safe Browsing" chapter: http://www.cnet.com/tech/services-and-software/chrome-toughest-browser-security-what-you-give-up-enhanced-safe-browsing-mode/ More info: http://www.quora.com/Is-it-safe-to-enable-Enhanced-protection-in-Google-Chrome/ http://www.wired.com/story/how-to-use-google-chrome-enhanced-safety-mode/ BEWARE: ******* Turning ON "Enhanced protection" (see above) "Requires browsing data to be sent to Google." -> see this page for details: http://support.google.com/accounts/answer/11577602/ Therefore if you are careful/concerned/conscientious/informed about your internet/online privacy, you may prefer to check "Standard protection" box instead, and also turn OFF/slide left "Help improve security on the web for everyone", which "Sends URLs of some pages you visit, limited system information, and some page content to Google, to help discover new threats and protect everyone on the web". http://support.google.com/chrome/answer/96817/ More info: http://www.ghacks.net/2013/11/09/disable-privacy-sensitive-features-google-chrome/ FYI: **** I prefer "Standard protection", and in order to strengthen browsing privacy, safety + security without making compromises/concessions/trade-offs, I use some of these "Essential Free Chromium/Chrome/Brave/X-Chromium/Thorium/Vivaldi Privacy, Safety + Security Extensions" in SOFTWARE.TXT (included): http://www.mdgx.com/nettoys.htm#PRV Older web browser versions -> go to "Security": chrome://settings/security/ -> "Safe Browsing" -> check "Enhanced protection" OR at least "Standard protection" box. http://support.google.com/chrome/answer/9890866/ 15. Go to Privacy and Security -> Advanced: chrome://settings/security/ -> turn ON/slide right "Always use secure connections" ["Upgrade navigations to HTTPS and warn you before loading sites that don't support it"] http://www.eff.org/deeplinks/2021/09/https-actually-everywhere/ -> turn ON/slide right "Warn you if passwords are exposed in a data breach". 16. Go to "Cookies and other site data" -> "General settings": chrome://settings/cookies/ also (previously) available under "Choose your third-party cookie preferences" (depending on your web browser version): chrome://settings/privacy/guide/?step=cookies -> check "Block (all) third-party cookies" box -> turn ON/slide right "Clear cookies and site data when you close all windows" (which is the safest choice). http://support.google.com/chrome/answer/95647/ CAUTION: ******** "Clear cookies and site data when you close all windows" will automatically log you off from/out of *all* accounts (if using any) you are currently logged in/on to which deliver/are linked to/provide accounts, alerts, apps, e-mails, enrollments, feeds, forums, memberships, notifications, promotions, reminders, services, social media, subscriptions, etc. Consequently you will have to log back in into *all* your online/internet accounts one at a time (if any + if more than 1). 17. Go to Flags: chrome://flags/ -> in the Search box type [flags setting]: journeys -> press Enter -> change to Disabled all instances/options/settings -> relaunch/restart your web browser for all changes to take effect. 18. Turn OFF/disable Sync for all your Chromium/Chrome account(s) (if any + if more than 1), apps, activity, autofill, bookmarks, data/information, extensions, (activity, browsing, search) history, location/(geo)tracking, (open) tabs, (stored) passwords, settings, themes to stop keeping/sending/storing your personal/private data/information/stats onto Google, Alphabet, and/or 3rd party/affiliates/associates/branches/brands/companies/divisions/entities/parents/partners/subsidiaries (cloud/network/remote) servers/sites: http://chrome.google.com/sync More info: http://support.google.com/chrome/answer/185277/ 19. Go to "Privacy Sandbox" [testing phase]: chrome://settings/privacySandbox -> turn OFF/slide left "Privacy Sandbox trial" (older browser versions) OR "Trials" (newer browser versions). Go to: chrome://flags/ -> search for "Privacy Sandbox Ads APIs" flags setting -> Disabled -> relaunch/restart your web browser. BEWARE: ******* Privacy Sandbox is just another behind-your-back, deceiving, hideen, subversive Google ad(vertisment) platform disguised as a new privacy "feature", and is coming soon to future Chromium/Chrome web browsers releases. http://theconversation.com/google-chrome-know-213150/ http://arstechnica.com/gadgets/2023/09/googles-widely-opposed-ad-platform-the-privacy-sandbox-launches-in-chrome/ http://gizmodo.com/1850812404/ Then turn OFF/slide left "FLoC" (Federated Learning of Cohorts) (older browser versions). http://lifehacker.com/1847276073/ http://en.wikipedia.org/wiki/Federated_Learning_of_Cohorts FLoC is actually used by advertising surveillance for-profit industry to bypass 3rd party cookies: http://www.eff.org/deeplinks/2021/03/googles-floc-terrible-idea/ Am I FLoCed? -> Test Your Web Browser: http://amifloced.org/ Fortunately newer Chromium/Chrome web browser versions disabled FLoC. 20. Go to "Ad personalization": http://adssettings.google.com/authenticated -> turn OFF "Ad personalization is ON" to read "Ad personalization is OFF". 21. Click "Control ad personalization on other websites & apps that use Google ad services" which goes to: http://optout.aboutads.info/ -> wait a few seconds for browser detection to complete [may take a while! ;-(] -> 100%. Under "Opt Out?" click "select all" (top right), or click "OPT OUT OF ALL" (bottom of page). Wait a few seconds for browser detection to complete [total 140+ opt-out requests! ;-(] -> 100%. Click "View Updated Results" -> make sure all boxes are UNchecked + all items turned OFF. 22. Go to "My Ad Center": http://myadcenter.google.com/ http://myadcenter.google.com/personalizationoff formerly: http://adssettings.google.com/ -> Personalized ads -> turn OFF (top of page right side) OR Turn OFF personalized ads (bottom of page center). Go to "My Google Activity": http://myactivity.google.com/myactivity -> Delete activity by (left hand side) -> select All time -> Delete button -> turn OFF *all* activities: - Web & App [+ Search] Activity, - Location History, - YouTube History, and all other activities/histories/tracking (if + where available). OR go to "Activity controls" (same 3 choices as above): http://myactivity.google.com/activitycontrols -> Web & App [+ Search] Activity http://myactivity.google.com/activitycontrols/webandapp -> turn OFF. UNcheck these 2 boxes: "Include Chrome history and activity from sites, apps, and devices that use Google services" + "Include voice and audio activity". 23. Go to "Location History": http://myactivity.google.com/activitycontrols?settings=location -> turn OFF. Go to "YouTube History": http://myactivity.google.com/product/youtube/ -> turn OFF "Saving your YouTube history" -> should say "NOT saving your YouTube history". Then go to "YouTube History" activity controls: http://myactivity.google.com/activitycontrols?settings=youtube -> turn OFF -> UNcheck these 2 boxes: "Include the YouTube videos you watch" + "Include your searches on YouTube". More info: http://support.google.com/youtube/answer/57711/ http://support.google.com/chrome/answer/185277/ Go to "Personalized ads on sites and apps that partner with Google": http://adssettings.google.com/partnerads -> expand (down arrow) "Related Google Account settings" -> UNcheck "Also save data in your Google Account from sites and apps that partner with Google" box. 24. Go to "Your ad choices": http://www.youronlinechoices.com/uk/your-ad-choices/ Turn OFF all individual companies/entities listed on that web page (if any). 25. Go to "Google News Settings": http://news.google.com/settings -> turn OFF/clear/delete "Hidden sources". Under "My activity" -> click "View" -> go to: http://myactivity.google.com/product/news/controls/ -> delete all activities/histories/tracking -> UNcheck all "Subsettings": "Include Chrome history and activity from sites, apps, and devices that use Google services" + "Include voice and audio activity" -> turn OFF "Web & App Activity". 26. Click the 3 dots ellipsis (older browser versions: 3 bars) Menu (Customize and control Chromium/Chrome) at the top right corner or go to: chrome://settings/ -> Settings -> go to "You and Google" or "People" (depending on your web browser version) -> "Sync and Google services" or "Sync" (depending on your web browser version): chrome://settings/syncSetup/ -> turn OFF "On - sync everything" (or similar, and if available). Under "Other Google services" turn OFF/slide left all available items: "Allow Chromium/Chrome sign-in", "Autocomplete searches and URLs" + "Make searches and browsing better". http://support.google.com/chrome/answer/9116376/ 27. Go to "Background sync" [After you leave a site, it can keep syncing to finish tasks, like uploading photos or sending a chat message]: chrome://settings/content/backgroundSync/ -> check "Don't allow closed sites to finish sending or receiving data" box [After closing a page, tasks you started might not finish]. http://support.google.com/chrome/answer/185277/ 28. Click circular Sync profile menu icon (top right corner) -> turn OFF "Sync and personalize Chromium/Chrome across your devices". 29. If using Google Mail (Gmail) and/or any other Google account(s)/membership(s)/subscription(s): turn OFF "Allow Chromium/Chrome sign-in" which automatically logs you into all your Google account(s) (if you have more than 1) whenever you sign in into your Google Mail (Gmail)/Google account(s) (if any), and every time you open/start your app(s)/web browser(s). 30. Turn OFF both "Autocomplete searches and URLs" + "Sends URLs of pages you visit to Google" (depending on your web browser version). http://support.google.com/chrome/answer/114836/ 31. Click the 3 dots ellipsis (older browser versions: 3 bars) Menu (Customize and control Chromium/Chrome) at the top right corner -> Settings -> Advanced -> Privacy and security (older web browser versions) or -> "Cookies and other site data" chrome://settings/cookies/ -> turn ON/check/slide right "Send a "Do Not Track" (DNT) request with your browsing traffic" (newer web browser versions). http://support.google.com/chrome/answer/2790761/ 32. Go to "Location": chrome://settings/content/location/ -> Default behavior -> UNcheck "Sites can ask for your location" box -> check "Don't allow sites to see your location" box. http://support.google.com/chrome/answer/142065/ 33. Go to "Notifications": chrome://settings/content/notifications/ -> turn OFF/disable/opt OUT of/stop all Push Notifications -> check "Don't allow sites to send notifications", OR "Block all: Turn OFF Ask before sending", OR turn OFF/slide left to read "Blocked" (depending on your web browser version). http://support.google.com/chrome/answer/3220216/ More info: http://www.makeuseof.com/tag/disable-notifications-chrome-firefox-safari/ 34. Go to "Clear browsing data" [pop-up dialog window]: chrome://settings/clearBrowserData/ -> Advanced tab -> Time range -> select "All time" -> check all boxes you deem necessary/see fit for your specific choices/needs/preferences + to preserve + protect your privacy/safety/security [if you're seriously careful/concerned/conscientious you should check all of them ;-/] -> press "Clear data" button. 35. Go to "System": chrome://settings/system/ -> turn OFF/slide left "Continue running background apps when Chromium/Chrome is closed". 36. Ungoogled Chromium (Chromium fork) + certain [?] Chromium/Chrome recompiled (portable) binaries 110/newer http://ungoogled-software.github.io/ungoogled-chromium-binaries/ allow to turn OFF/disable by hand/manually the unique, identifiable, trackable machine ID it assigns by default to all their web browers' users on Windows computers, and which can be easily tracked and spied on for behind your back/forced/hidden/unauthorized/without your knowledge/permission ad(vertisment)s, deceptive, fraudulous, surveillance, malicious purposes. More info: http://portapps.io/app/ungoogled-chromium-portable/#modifications Ungoogled Chromium (Chromium fork) 110/newer -> turn OFF machine ID -> go to [flags setting]: chrome://flags/#disable-machine-id -> Disabled -> relaunch/restart your web browser. CAUTION: ******** Turning OFF machine ID disables *all* flags, settings, enrollments, extensions, memberships, services that depend on it in order to function properly! 37. Install Chromium/Chrome (+ alternatives/derivatives/forks/variants) Extensions + Themes by hand/manually including those delisted/discontinued/unavailable from reliable sources other than Chrome Web Store: http://developer.chrome.com/docs/extensions/mv3/external_extensions/ http://chrome-stats.com/ http://www.crx4chrome.com/ 38. Turn OFF/disable/stop Chromium/Chrome (+ alternatives/derivatives/forks/variants) + apps from running in the background after all Chromium/Chrome (+ alternatives/derivatives/forks/variants) web browser instances/tabs have been closed/shutdown: http://www.gtricks.com/chrome/how-to-stop-google-chrome-from-running-in-the-background-for-good/ http://www.webnots.com/how-to-stop-google-chrome-from-running-in-background/ http://www.technorms.com/22405/silence-chrome-disable-background-apps/ http://www.lifewire.com/stop-apps-4777510/ 39. Turn OFF Google (geo)detection/(geo)location/snooping/spying/surveillance/(geo)tracking on all your Android/Google/Chromium/Chrome/ChromeOS cellular/mobile/portable devices and computers/portables, unless it is mandatory/necessary/vital to your needs/requirements: http://www.cnet.com/tech/services-and-software/youre-likely-being-tracked-by-google-turn-off-these-settings-to-stop-it/ 40. See MDGx "@ Chromium/Chrome/Brave/X-Chromium/Thorium/Vivaldi Privacy, Safety + Security Settings, Extensions, Guides + Solutions:" topic in SOFTWARE.TXT (included): http://www.mdgx.com/nettoys.htm#PRV -> install free essential privacy/safety/security ad-blocker(s)/anti-malware/anti-phone-home/anti-spyware/anti-tracking extensions. 41. Install TamperMonkey extension: http://chrome.google.com/webstore/detail/tampermonkey/dhdgffkkebhmkfjojejmpbldmpobfkfo/ + useful privacy/safety/security ad-blocker(s)/anti-malware/anti-phone-home/anti-spyware/anti-tracking TamperMonkey user JavaScript (JS) scripts/scriplets (examples): http://greasyfork.org/ http://openuserjs.org/ http://gist.github.com/search?l=JavaScript&o=desc&q=%22%3D%3DUserScript%3D%3D%22&s=updated http://github.com/AdguardTeam/AdGuardExtra/ http://raw.githubusercontent.com/Ibit-to/google-unlocked/master/google-unlocked.user.js Go to TamperMonkey Dashboard/Options local HTML page: chrome-extension://dhdgffkkebhmkfjojejmpbldmpobfkfo/options.html -> configure/install/manage/tweak TamperMonkey options/settings + JavaScript (JS) scripts/scriplets. http://www.tampermonkey.net/faq.php 42. Relaunch/restart your web browser (if + when needed) for all changes to take effect. @ Firefox/Mozilla web browsers + alternatives/derivatives/forks/variants: ************************************************************************* http://www.mdgx.com/7.php#:~:text=%40%20Firefox%2FMozilla%20web%20browsers%20%2B%20alternatives%2Fderivatives%2Fforks%2Fvariants%3A - MDGx "FREE Windows 9x/NTx Web Browsers" chapter -> "Firefox + Mozilla web browsers [free(ware)]" section -> "Firefox" topic in SOFTWARE.TXT (included): http://www.mdgx.com/nettoys.htm#MOZ - MDGx "@ Firefox/TOR Browser/Mercury/Waterfox/Pale Moon/LibreWolf Privacy, Safety + Security Settings, Extensions, Guides + Solutions:" topic in SOFTWARE.TXT (included): http://www.mdgx.com/nettoys.htm#PSF - MDGx "Web Browsers Links: Web Browsers, Tools + Tips on the Internet" [mostly free(ware)] in SOFTWARE.TXT (included): http://www.mdgx.com/nettoys.htm#NET 01. Go to: http://support.mozilla.org/products/firefox/protect-your-privacy/ 02. Follow instructions to turn OFF (opt OUT of) all ad(vertisment)s + tracking. 03. Go to: http://www.ghacks.net/2015/08/18/a-comprehensive-list-of-firefox-privacy-and-security-settings/ 04. Type about:config in the (URL/URI) address bar -> press Enter -> follow instructions: http://kb.mozillazine.org/About:config_entries#Privacy. http://kb.mozillazine.org/About:config_entries#Security. to add/modify/delete desired/recommended settings in order to strengthen your Mozilla web browser security. 05. Turn OFF (Push) Notifications: http://www.makeuseof.com/tag/disable-notifications-chrome-firefox-safari/ 06. Click the 3 bars menu at the top right corner or type about:preferences#privacy -> press Enter -> in the (URL/URI) address bar -> Options -> Privacy & Security -> Notifications -> Settings -> check "Block new requests asking to allow notifications" box -> Save Changes. 07. Use Firefox or alternative/derivative/fork/variant "Private Browsing" (Incognito Mode) to avoid cookies, (geo)location, personalized/targeted ad(vertisment)s, phone-home, tracking, banned/blocked/forbidden/limited/restricted areas/content/features, privacy/safety/security exposures/invasions/intrusions, annoyances: http://support.mozilla.org/kb/private-browsing-use-firefox-without-history/ http://www.techtimes.com/articles/38718/20150310/ http://www.online-tech-tips.com/computer-tips/12-ways-to-get-past-a-paywall/ Firefox -> right-click desired URL/URI address/item/link/scheme/shortcut -> select "Open Link in New Private Window". 08. See MDGx "@ Firefox/TOR Browser/Mercury/Waterfox/Pale Moon/LibreWolf Privacy, Safety + Security Settings, Extensions, Guides + Solutions:" topic in SOFTWARE.TXT (included): http://www.mdgx.com/nettoys.htm#PSF -> install free essential privacy/safety/security ad-blocker(s)/anti-malware/anti-phone-home/anti-spyware/anti-tracking add-ons: http://addons.mozilla.org/firefox/extensions/category/privacy-security/ http://addons.mozilla.org/blog/whats-the-best-ad-blocker-for-you/ http://addons.mozilla.org/blog/top-anti-tracking-extensions/ 09. Install TamperMonkey add-on: http://addons.mozilla.org/firefox/addon/tampermonkey/ + useful privacy/safety/security ad-blocker(s)/anti-malware/anti-phone-home/anti-spyware/anti-tracking TamperMonkey user JavaScript (JS) scripts/scriplets (examples): http://greasyfork.org/ http://openuserjs.org/ http://gist.github.com/search?l=JavaScript&o=desc&q=%22%3D%3DUserScript%3D%3D%22&s=updated http://github.com/AdguardTeam/AdGuardExtra/ http://raw.githubusercontent.com/Ibit-to/google-unlocked/master/google-unlocked.user.js Go to TamperMonkey Dashboard/Options local HTML page -> configure/install/manage/tweak TamperMonkey options/settings + JavaScript (JS) scripts/scriplets. http://www.tampermonkey.net/faq.php 10. Relaunch/restart your web browser (if + when needed) for all changes to take effect. @ Edge web browsers: ******************** See MDGx "On The Edge of A Hostile Takeover = Uninstall + Replace Edge While You Still Can" chapter in WIN10.TXT (included): http://www.mdgx.com/10.php http://www.mdgx.com/WIN10.TXT BEWARE: ******* Edge web browsers collect + send logged in members/subscribers/users' unique SID (Security IDentifier) + web browser history [URLs (Uniform Resource Locator) = IPs, web addresses] data/information to Microsoft + Microsoft 3rd party/affiliated/(sub)contracted/partner (cloud) servers: http://winbuzzer.com/2019/07/23/users-raise-privacy-concerns-as-edge-browser-caught-sending-full-urls-and-sid-to-microsoft-xcxwbn/ STRONGLY RECOMMENDED: ********************* In case you decide to keep + use Edge (for whatever reason, personal preference, or being forced due to some business, contract, employer, enrollment, licensing, membership, partnership, proprietary software, services, etc constraints, limitations, requirements, etc) the *least* you can do in order to enhance/improve your privacy, safety + security, and to block/disable/minimize/reduce/stop the ad(vertising), spying, surveillance, tracking behind-your-back/forced/hidden/intrusive/invasive/subversive/unwanted/without-your-consent compromising/dangerous/insecure/unsafe environment is to install uBlock Origin (uBO) [free, open source web browser add-on/extension for all Chromium based Edge web browsers] http://microsoftedge.microsoft.com/addons/detail/odfafepnkmbhccpbejgmiehpchacaeak/ -> *best* ad(ware), scripting, malware, phishing, pop-ups, spyware, tracking, hijacking, dialers, miners, skimmers, social media, video sites, e-mail blocker/filter/remover: http://www.cloudwards.net/best-pop-up-blockers/ uBlock Origin (uBO): http://ublockorigin.com/ uBlock Origin (uBO) repository + source code: http://github.com/gorhill/uBlock/ uBlock Origin (uBO) releases: http://github.com/gorhill/uBlock/releases/latest/ uBlock Origin (uBO) Documentation: http://github.com/gorhill/uBlock/wiki/ Useful Chromium based Edge Add-ons/Extensions: - Ad(ware) Blockers: http://microsoftedge.microsoft.com/addons/search/blocker/ - Anti-Malware: http://microsoftedge.microsoft.com/addons/search/malware/ - Privacy: http://microsoftedge.microsoft.com/addons/search/privacy/ - Protection: http://microsoftedge.microsoft.com/addons/search/protection/ - Safety: http://microsoftedge.microsoft.com/addons/search/safety/ - Security: http://microsoftedge.microsoft.com/addons/search/security/ @ Internet Explorer (IE) web browser [discontinued from all NEWer Windows 10/2016/2019 builds/editions/releases/updates!]: ************************************************************************************************************************** Microsoft DISCONTINUED primitive, obsolete, vulnerable, flawed, insecure Internet Explorer (IE) + replaced it with [+ crippled/disabled/impaired/limited/locked/unavailable basic/important/optional features/options/settings + added forced/hard to disable/(almost) impossible to get rid of unneeded/unwanted Microsoft anti-competitive/centered/exclusive apps, features, services, subscriptions + ad(ware)/spyware/surveillance/tracking] heavily modified Google Chromium (Canary developer channel) based Edge proprietary web browser in all Windows 10/newer releases! R.I.P. Internet Explorer... :-) http://www.cnn.com/2022/06/18/asia/internet-explorer-gravestone-viral-south-korea-intl-hnk/ STRONGLY RECOMMENDED: ********************* Therefore you should replace Internet Explorer (IE) as your default web browser with a better, modern, secure web browser. Recommended independent/3rd party free, open source, safe, secure, uncrippled, unlocked, unrestricted, modern web browsers (examples): http://www.mdgx.com/nettoys.htm#NET MDGx "FREE Windows 9x/NTx Web Browsers" chapter -> "Chromium + Chrome web browsers [free(ware)]" section -> "Chromium + Chrome" topic in SOFTWARE.TXT (included): http://www.mdgx.com/nettoys.htm#CHR RECOMMENDED: - Chromium Precompiled EXEcutable [Installer EXE + Portable Archives ZIP/7z] 32-bit + 64-bit for Windows XP/newer 32-bit (x86) + 64-bit (x64): http://chromium.woolyss.com/ Degoogled/Ungoogled/stripped of Google ad(ware)/spyware/surveillance/tracking code Chromium builds [clearly labeled]: http://github.com/ungoogled-software/ungoogled-chromium/blob/master/README.md http://ungoogled-software.github.io/ungoogled-chromium-wiki/faq Ungoogled Chromium precompiled binaries 32-bit + 64-bit for Windows 7/newer 32-bit (x86) + 64-bit (x64) [75-125 MB, Installer ONLY EXE + Portable ZIP, NEWest at the top]: http://ungoogled-software.github.io/ungoogled-chromium-binaries/ Ungoogled Chromium 64-bit for Windows 7/newer 64-bit (x64): http://ungoogled-software.github.io/ungoogled-chromium-binaries/releases/windows/64bit/ Ungoogled Chromium 32-bit for Windows 7/newer 32-bit (x86): http://ungoogled-software.github.io/ungoogled-chromium-binaries/releases/windows/32bit/ - Brave 32-bit + 64-bit web browser for Windows 7/newer 32-bit (x86) + 64-bit (x64) based on Chromium code [fork] with improved privacy, safety + security and optimized speed: http://brave.com/ Brave Repository: http://github.com/brave/brave-browser/ Download [ZIP = full, Portable]: http://github.com/brave/brave-browser/releases/latest/ - Vivaldi 32-bit + 64-bit web browser for Windows 7/newer 32-bit (x86) + 64-bit (x64) based on Chromium code [fork] with enhanced privacy, safety + security: http://vivaldi.com/ Download [EXE = Installer ONLY]: http://vivaldi.com/download/ Vivaldi Portable -> run Installer EXE -> Install standalone: http://help.vivaldi.com/desktop/install-update/standalone-version-of-vivaldi/ - X-Chromium (X-Launcher) Portable launcher: http://www.winpenpack.com/en/download.php?view.1082 Download [EXE = Installer, full]: http://sourceforge.net/projects/winpenpack/files/X-Chromium/releases/ Either install Chromium precompiled stable releases 32-bit or 64-bit: http://chromium.woolyss.com/ or extract all files from portable archive [zip or 7z] + copy to the destination of your choice Chromium portable stable releases 32-bit or 64-bit to match the Windows NTx [7/newer] operating system(s) [OS(es)] build/edition/release/update/version + bit strength [32-bit (x86) or 64-bit (x64)] you are using. All Chromium + Chrome alternatives/derivatives/forks/variants users must have these 3 environment variables: GOOGLE_API_KEY=NO GOOGLE_DEFAULT_CLIENT_ID=NO GOOGLE_DEFAULT_CLIENT_SECRET=NO Right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run these commands -> press Enter after each line: SETX.EXE GOOGLE_API_KEY "NO" /M SETX.EXE GOOGLE_DEFAULT_CLIENT_ID "NO" /M SETX.EXE GOOGLE_DEFAULT_CLIENT_SECRET "NO" /M MDGx "@ Chromium/Chrome/Brave/X-Chromium/Thorium/Vivaldi Privacy, Safety + Security Settings, Extensions, Guides + Solutions:" topic in SOFTWARE.TXT (included): http://www.mdgx.com/nettoys.htm#PRV MDGx collection of essential + useful Chromium/Chrome extensions + tweaks -> "CHROMIUM" section in TOOLS.TXT (included): http://www.mdgx.com/tools.php#:~:text=CHROMIUM%20%5B%2A%5D http://www.mdgx.com/TOOLS.TXT But just in case you need/are constrained/forced to keep Internet Explorer (IE) for various reasons, for example compatibility/requirements with older/proprietary software programs/scripts/documents/services (Microsoft Windows Server, Office, Outlook, Live, Active Directory, Exchange, etc), obsolete web pages/sites and/or e-mail providers/servers using obsolete/older server software/scripts, then you can improve and secure a little more the way Internet Explorer (IE) web browser performs by following the tips listed here. See MDGx "Internet Explorer (IE) 4/5/6/7/8/9/10/11 Essential FREE Fixes + Updates" chapter in SOFTWARE.TXT (included): http://www.mdgx.com/ietoy.htm R.I.P. Internet Explorer... :-) http://www.cnn.com/2022/06/18/asia/internet-explorer-gravestone-viral-south-korea-intl-hnk/ RECOMMENDED: ************ Install an independent/3rd party free, open source, safe, secure, uncrippled, unlocked, unrestricted, modern web browser based on Chromium code with enhanced privacy, safety + security http://www.mdgx.com/nettoys.htm#PRV -> see "FREE Windows 9x/NTx Web Browsers" chapter -> "Chromium + Chrome" section in SOFTWARE.TXT (included): http://www.mdgx.com/nettoys.htm#CHR 1. Go to: http://choice.microsoft.com/opt-out 2. Turn OFF all ads: - Personalized ads in this browser. - Personalized ads wherever I use my Microsoft account. 3. Go to: http://www.aboutads.info/choices/ 4. UNcheck all boxes: - "All Participating Companies". - "Companies Customizing Ads For Your Browser". 5. Internet Explorer (IE) 9/10/11 "Block Tracking" (Geolocation Detection) + "Automatic (Forced) Upgrade": http://unlockforus.blogspot.com/2012/09/do-not-allow-websites-to-get-your.html http://support.microsoft.com/help/2843950/ http://www.eightforums.com/tutorials/7996-internet-explorer-10-auto-update-enable-disable.html http://www.itninja.com/question/ie10-turn-off-auto-updates/ TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK to all prompts to register/merge/import its information into your registry. -----Begin cut & paste here----- REGEDIT4 [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Geolocation] "BlockAllWebsites"=dword:1 [HKEY_USERS\.DEFAULT\Software\Microsoft\Internet Explorer\Geolocation] "BlockAllWebsites"=dword:1 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main] "EnableAutoUpgrade"=dword:0 [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main] "EnableAutoUpgrade"=dword:0 [HKEY_USERS\.DEFAULT\Software\Microsoft\Internet Explorer\Main] "EnableAutoUpgrade"=dword:0 ; ------End cut & paste here------ 6. Turn OFF primitive/obsolete Internet Explorer (IE) Security Check: http://www.windows-security.org/65c2e8edd3108cdb6fc985493bb2fa38/turn-off-the-security-settings-check-feature/ TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK to all prompts to register/merge/import its information into your registry. -----Begin cut & paste here----- REGEDIT4 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Security] "DisableSecuritySettingsCheck"=dword:1 [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Security] "DisableSecuritySettingsCheck"=dword:1 [HKEY_USERS\.DEFAULT\Software\Microsoft\Internet Explorer\Security] "DisableSecuritySettingsCheck"=dword:1 ; ------End cut & paste here------ 7. Manage cookies in Internet Explorer (IE): http://www.whatismybrowser.com/guides/clear-cache-history-cookies/internet-explorer http://kb.wisc.edu/helpdesk/page.php?id=15141 http://support.microsoft.com/en-us/search?query=cookies%20in%20internet%20explorer More info @ MDGx "Internet Explorer (IE) 11.0" section in SOFTWARE.TXT (included): http://www.mdgx.com/ietoy.htm#IE11 Open E10BLOK.CMD (included) in Notepad for details: http://www.mdgx.com/10BLK/E10BLOK.CMD.TXT 8. Install AdBlock Plus (ABP) for Internet Explorer (IE) (free, open source): http://adblockplus.org/en/internet-explorer 9. Relaunch/restart your web browser (if + when needed) for all changes to take effect. RECOMMENDED: WINDOWS7.TXT (this file) contains more guides + tips on how to improve your life while still using Internet Explorer (IE) -> please see respective topics (clearly marked). * Turn OFF/Disable/Opt OUT of/Stop for Profit Web Sites + Social Media Invading Your Privacy + Enhance Safety + Security: ************************************************************************************************************************* There are plenty of free choices/methods/options/settings available to turn OFF/block/disable/opt OUT of/stop automatic/unattended behind-your-back/forced/hidden/intrusive/invasive/subversive/unwanted/without-your-consent dangerous/insecure/unsafe, undesirable/unnecessary/unneeded/unused/useless, intrusions, invasion of privacy, tracking, spying, surveillance compromising your safety + security (even if hidden, little known, and/or not obviously/properly advertised/disclosed/established/placed/set) designed/(pre)installed/set up by most for-profit ad(vertisment) businesses, entities, web sites, social media, search engines, surveillance industry, and their associated, contracted, (co)owned, operated, related, shared 3rd party/affiliates/associates/branches/brands/companies/divisions/entities/parents/partners/subsidiaries who lure/push/recommend/tempt you with accounts, alerts, apps, banners, cookies, e-mails, enrollments, feeds, memberships, messages, notifications, pop-ups, promotions, reminders, subscriptions, crippled/time limited trials, updates, widgets, etc, who distribute, disseminate, share and sell (even against your will, behind your back, and unauthorized/without your knowledge/permission) your personal/private data/information to others like them, only to sell you more stuff [which does not constitute necessity, you may not need, do not need, or you can live without], and who constantly attempt to persuade you by deceptive, false, fraudulous, malicious means and pretenses to spend money [you cannot afford, are needed for other, more important purposes, and/or do not have (access to)], or on [high interest, especially when compounded over longer periods of time] credit/loan/scheduled time deferred/delayed payments, because as everybody knows, credit is not cash... :-( http://www.goodreads.com/quotes/25775/ http://www.youtube.com/watch?v=6ieKUvEiVR8&t=679s Doing so will enhance/improve/maintain/preserve/repair/restore (a certain degree/level of) privacy, safety and security on the internet and in the digital world, and most importantly will allow you and your computing/connected/digital/online + real every day environment(s), persona(s) + live(s) to remain/stay safe as much as possible from breaches, hacking, intrusions, invasion, malware, phishing, spyware, (geo)tracking, personal/private data/information auditing, beacons, break-ins, broadcast, dissemination, fingerprinting, leaks, spoofing, etc. Here are a few things you can do to get rid of them effortlessly in a nick of time, and they're all free... ;-/ @ WWW (World Wide Web) Search Engines with Best Anonymity, Privacy, Safety + Security: ************************************************************************************** - Privacy Tools: Best Private Web Search Engines: http://www.privacytools.io/private-search/ - Panda Security: Best Private Search Engines: Where to Search Without Being Tracked: http://www.pandasecurity.com/en/mediacenter/security/best-private-search-enginges/ - Software Testing Help (STH): Best Private Search Engines: Secure Anonymous Search: http://www.softwaretestinghelp.com/best-private-search-engines/ - MDGx Search Engines, Privacy + Net Tools: http://www.mdgx.com/links.htm - MDGx 100+ "WWW (World Wide Web) Search Engines" [most have enhanced privacy, safety + security]: http://www.mdgx.com/links.htm#WSE - MDGx "FTP (File Transfer Protocol) Search Engines": http://www.mdgx.com/links.htm#FSE - MDGx "Anonymous + Faster Surfing": http://www.mdgx.com/links.htm#ANO - MDGx "Human Rights, Privacy + Fairness" [Sites Who Fight for Your Rights]: http://www.mdgx.com/links.htm#HRC - All these WWW (World Wide Web) search engines, some of whom have by default/preconfigured/preinstalled/out-of-the-box enhanced anonymity/pseudonymity, privacy, safety + security features/functions/properties/protocols -> see below: "@ Google search, (geo)location tracking, data, history, e-mail (Gmail), notifications + apps:" "@ YouTube (YT) [videos hosted by Google]:" "@ Bing Search, Live, Microsoft, MSN + Related/Shared Accounts, Services + Apps [owned by Microsoft]:" "@ Yahoo! (Y!) Search, Yahoo! Mail + Yahoo! News:" "@ DuckDuckGo (DDG) Search, Privacy Essentials + E-mail Protection:" "@ SearXNG Metasearch:" "@ SearX Metasearch:" "@ Startpage Search + Privacy Protection Add-on + Extension:" "@ Brave Search:" "@ Qwant Search:" @ Google search + (geo)location tracking, data, history, e-mail (Gmail), notifications + apps: ********************************************************************************************** http://www.mdgx.com/7.php#:~:text=%40%20Google%20search%20%2B%20%28geo%29location%20tracking - Turn OFF/block/disable/stop *all* Google and Google associated, contracted, (co)owned, operated, related, shared 3rd party/affiliates/associates/branches/brands/companies/divisions/entities/parents/partners/subsidiaries account(s), alerts, apps, e-mails, enrollments, feeds, forums, memberships, news, notifications, products, promotions, reminders, services, social media, subscriptions [if any] Data & Privacy options/preferences/settings that allow/enable/permit Google and Google associated entities to access, follow, identify, keep, log, record, store, surveil, spy on, track, use directly/indirectly for advertisment/marketing/monetization/profit/sales/surveillance your identifiable/personal/private/unique activity, data, info, history, location, sharing, tracks, trails, whereabouts without concern/respect/regard for customers' and users' privacy or safety, unless imposed/mandated by laws and/or regulations (only where + when applicable + enforceable): http://myaccount.google.com/data-and-privacy http://myactivity.google.com/activitycontrols http://myactivity.google.com/more-activity http://myactivity.google.com/activitycontrols/webandapp http://myaccount.google.com/yourdata/search http://adssettings.google.com/partnerads http://www.youronlinechoices.com/uk/your-ad-choices/ http://myactivity.google.com/product/news/controls/ http://news.google.com/settings - Remove personal information from Google: http://support.google.com/websearch/thread/182504436/ - Remove your personal information from Google Search: http://support.google.com/websearch/troubleshooter/3111061/ - Remove select personally identifiable info (PII) or doxxing content from Google Search: http://support.google.com/websearch/answer/9673730/ - Remove images of minors from Google search results: http://support.google.com/websearch/answer/10949130/ - Request to remove your personal information on Google: http://support.google.com/websearch/troubleshooter/9685456/ - Remove personal info, personally identifiable info (PII) + content from Google search engine + apps: http://support.google.com/search?q=remove+personally+identifiable+info+doxxing+content+from+google - Stop Google from tracking and storing your locations: http://www.techrepublic.com/article/how-to-stop-google-from-tracking-and-storing-your-locations/ - Turn OFF ad tracking in Google, Bing + Yahoo!: http://www.searchenginewatch.com/2017/03/09/how-to-turn-off-ad-tracking-in-google-bing-and-yahoo/ - Disable Web Push Notifications in Google Chrome: http://www.pushassist.com/knowledgebase/how-to-disable-web-push-notifications-in-google-chrome/ - Force Google to automatically delete the information it saves about what you do online: http://www.cnbc.com/2019/05/08/how-to-stop-google-from-tracking-web-history.html - Google knows everywhere you go - here's how to stop it from tracking you and delete the logs: http://www.cnbc.com/2019/04/25/how-to-stop-google-from-storing-your-location-history.html - Google collects information about many things you do online - here's how to stop it: http://www.cnbc.com/2019/05/01/how-to-stop-google-from-collecting-your-private-information.html - Google Sees Everything You Do: Here's How to Stop That: http://www.lifewire.com/stop-google-4123866/ - OpenPGP: Encrypt Your E-mail using PGP (Pretty Good Privacy): http://www.openpgp.org/software/ - Report malicious software web sites: http://safebrowsing.google.com/safebrowsing/report_badware/ - Report Phishing and Malware: http://www.decentsecurity.com/malware-web-and-phishing-investigation/ - Gmail Confidential Mode: Send + open confidential e-mails + attachments: http://support.google.com/mail/answer/7674059/ - Control Chromium/Chrome safety -> scroll down to the blue sections: http://support.google.com/chrome/?#topic=7437824 - Chromium/Chrome privacy -> scroll down to the blue sections: http://support.google.com/chrome/?#topic=9845306 - Chromium/Chrome Safe Browsing: http://support.google.com/chrome/answer/9890866/ - Select Chromium/Chrome Privacy settings: http://support.google.com/chrome/answer/114836/ - Chromium/Chrome Browse in private using "Incognito Mode" (Private Browsing): http://support.google.com/chrome/answer/95464/ - Chromium/Chrome Safe Browsing practices: http://www.google.com/chrome/privacy/#safe-browsing-practices - Manage Chromium/Chrome Safety + Security: http://support.google.com/chrome/answer/10468685/ - Clear, Disable/Enable + Manage Cookies + 3rd party Cookies in Chromium/Chrome: http://support.google.com/chrome/answer/95647/ - Chromium/Chrome Remove unwanted ads, pop-ups & malware: http://support.google.com/chrome/answer/2765944/ - Turn ON Chromium/Chrome "Send a 'Do Not Track' (DNT) request with your browsing traffic": http://support.google.com/chrome/answer/2790761/ - Turn OFF *all* Apps, Desktop, Platform + Web Push Notifications in Chromium/Chrome: http://support.google.com/chrome/answer/3220216/ - Browsers, Extensions/Add-ons, Cookies, Tracking: http://themarkup.org/ask-the-markup/2020/09/22/i-scanned-the-websites-i-visit-with-blacklight-and-its-horrifying-now-what/ WARNING: ******** Unfortunately you must already have, or need to open a (new) YouTube, Gmail (Google mail) or Google account in order to be allowed to change/disable/turn OFF many of these privacy, safety + security choices/options/preferences/settings (see above). @ YouTube (YT) [videos hosted by Google]: ***************************************** Go to "YouTube History": http://myactivity.google.com/product/youtube/ -> turn OFF "Saving your YouTube history" -> should say "NOT saving your YouTube history". Then go to "YouTube History" activity controls: http://myactivity.google.com/activitycontrols?settings=youtube -> turn OFF -> UNcheck these 2 boxes: "Include the YouTube videos you watch" + "Include your searches on YouTube". More info: http://support.google.com/youtube/answer/57711/ http://support.google.com/chrome/answer/185277/ - The Verge: Protect your privacy on YouTube: http://www.theverge.com/2019/4/19/18484802/ - LifeWire: YouTube Privacy Settings: http://www.lifewire.com/youtube-privacy-settings-1082507/ - GHacks: Always use YouTube Privacy Enhanced Mode: http://www.ghacks.net/2018/05/23/why-you-should-always-use-youtubes-privacy-enhanced-mode/ - Online Tech Tips: Watch YouTube Without Ads: http://www.online-tech-tips.com/computer-tips/5-ways-to-watch-youtube-without-ads/ - GitHub: YouTube Video Ads Blocklist: http://github.com/anudeepND/youtubeadsblacklist/ - YouTube: Account Privacy settings: http://www.youtube.com/account_privacy/ - YouTube: Account Notifications: http://www.youtube.com/account_notifications/ - YouTube: Account Playback and performance: http://www.youtube.com/account_playback/ - YouTube: Privacy Controls: http://www.youtube.com/howyoutubeworks/user-settings/privacy/ - Google YouTube: Privacy and safety center: http://support.google.com/youtube/topic/2803240/ - Google YouTube: Protecting your identity: http://support.google.com/youtube/answer/2801895/ - Google YouTube: Change video privacy settings: http://support.google.com/youtube/answer/157177/ - Google YouTube: Browse YouTube while incognito on cellular/mobile devices: http://support.google.com/youtube/answer/9040743/ - Google YouTube: Secure your YouTube account: http://support.google.com/youtube/answer/9701986/ - Wikipedia: YouTube and Privacy: http://en.wikipedia.org/wiki/YouTube_and_privacy WARNING: ******** Unfortunately you must already have, or need to open a (new) YouTube, Gmail (Google mail) or Google account in order to be allowed to change/disable/turn OFF many of these privacy, safety + security choices/options/preferences/settings (see above). @ Bing Search, Live, Microsoft, MSN + Related/Shared Accounts, Services + Apps [owned by Microsoft]: **************************************************************************************************** Turn OFF/block/disable/stop *all* Microsoft Azure, Bing, Cortana, Edge, Hotmail, Live, MSN, Microsoft Start, OneDrive, Outlook, SkyDrive, Windows Mail and Microsoft associated, contracted, (co)owned, operated, related, shared 3rd party/affiliates/associates/branches/brands/companies/divisions/entities/parents/partners/subsidiaries account(s), alerts, apps, e-mails, enrollments, feeds, forums, memberships, news, notifications, products, promotions, reminders, services, social media, subscriptions [if any] Data & Privacy options/preferences/settings that allow/enable/permit Microsoft and Microsoft associated entities to access, follow, identify, keep, log, record, store, surveil, spy on, track, use directly/indirectly for advertisment/marketing/monetization/profit/sales/surveillance your identifiable/personal/private/unique activity, data, info, history, (geo)location, sharing, tracks, trails, whereabouts without concern/respect/regard for customers' and users' privacy or safety, unless imposed/mandated by specific laws, norms, regulations and/or rules, and only if, where and/or when applicable and/or enforceable: Turn OFF ad tracking in Google, Bing/Live/Microsoft Start/MSN + Yahoo!: http://www.searchenginewatch.com/2017/03/09/how-to-turn-off-ad-tracking-in-google-bing-and-yahoo/ Browser settings -> turn OFF/slide left "Get all notifications": http://www.bing.com/profile/notifications/settings?service=3 Settings -> Personalization -> Images Feed Personalization [Allow Bing to use your activities to improve the image and video recommendations experience] -> turn OFF/slide left: http://www.bing.com/account/general/#personalization-section Activity -> check right hand side box -> press "Clear" button: http://www.bing.com/profile/history/ Clear your search history -> press "Clear all" button: http://www.bing.com/profile/history/ Turn OFF/slide left all Experience Settings [Language & content + Feed settings] + Notification(s) [Notification settings: news, notifications, badges, alerts]: http://www.msn.com/en-us/feed/personalize/ http://www.msn.com/en-us/feed/personalize/notification/ http://www.msn.com/en-us/feed/personalize/settings/ Privacy settings in Microsoft products: http://support.microsoft.com/topic/where-can-i-find-privacy-settings-in-microsoft-products-206f6928-2694-4adf-a50f-9edb95897d81 General privacy settings in Windows 10 + 11: http://support.microsoft.com/windows/general-privacy-settings-in-windows-7c7f6a09-cebd-5589-c376-7f505e5bf65a Change privacy settings in Windows 10 + 11: http://support.microsoft.com/windows/change-privacy-settings-in-windows-55466b7b-14de-c230-3ece-6b75557c5227 Microsoft Account Privacy Settings: http://account.microsoft.com/account/privacy Microsoft Edge browsing activity for personalized advertising and experiences: http://support.microsoft.com/microsoft-edge/microsoft-edge-browsing-activity-for-personalized-advertising-and-experiences-37aa831e-6372-238e-f33f-7cd3f0e53679 Microsoft Account -> Privacy -> Ad settings: http://account.microsoft.com/privacy/ad-settings/signedout/ Disable Personalized Ads on Microsoft Sites, Apps + Services: http://www.laptopmag.com/articles/disable-microsoft-personalized-ads/ Examples above use United States English [en-us]. Your language ID string may be different depending on your installed Windows operating system (OS) primary/selected language, language preference(s) and/or geographical (geo)location: http://learn.microsoft.com/cpp/c-runtime-library/language-strings/ WARNING: ******** Unfortunately you must already have, or need to open a (new) Microsoft account in order to be allowed to change most privacy, safety + security choices/options/preferences/settings on Microsoft and/or associated, contracted, (co)owned, operated, related, shared 3rd party/affiliates/associates/branches/brands/companies/divisions/entities/parents/partners/subsidiaries accounts, alerts, apps, e-mails, enrollments, feeds, memberships, messages, notifications, products, promotions, reminders, services, subscriptions, trials, updates, widgets (see above): http://account.microsoft.com/privacy/ http://account.microsoft.com/account/privacy http://www.bing.com/account/general/ @ Yahoo! (Y!) Search, Yahoo! Mail + Yahoo! News: ************************************************ - Turn OFF ad tracking in Google, Bing + Yahoo!: http://www.searchenginewatch.com/2017/03/09/how-to-turn-off-ad-tracking-in-google-bing-and-yahoo/ - Turn OFF Desktop notifications for Yahoo! Mail: http://help.yahoo.com/kb/SLN26611.html - Turn OFF notifications from Yahoo! Mail app: http://en-global.help.yahoo.com/kb/account/enable-notifications-yahoo-mail-sln26439.html - Turn OFF Yahoo! News Notifications: http://800emailsupport.com/blog/turn-off-yahoo-news-notification/ WARNING: ******** Unfortunately you must already have, or need to open a (new) Yahoo! account in order to be allowed to change/disable/turn OFF most of these privacy, safety + security choices/options/preferences/settings (see above). @ DuckDuckGo (DDG) Search, Privacy Essentials + E-mail Protection: ****************************************************************** DuckDuckGo (DDG) search engine with enhanced privacy: http://duckduckgo.com/ Disconnect Search (using DuckDuckGo): http://search.disconnect.me/ Turn OFF/disable/opt OUT of/stop all DuckDuckGo (DDG) ad(vertisment)s, notifications, reminders, subscriptions, feedback, requests, annoyances -> go to: http://duckduckgo.com/settings/ -> All Settings -> General tab -> scroll down -> turn OFF/UNcheck all these boxes: - "Advertisements"; - "Install DuckDuckGo" [this will also automatically turn OFF/disable next setting below]; - "Shows occasional reminders to add DuckDuckGo to your browser"; - "Privacy Newsletters"; - "Shows occasional reminders to sign up for the DuckDuckGo privacy newsletters"; - "Homepage Privacy Tips"; - "Help Improve DuckDuckGo". DuckDuckGo Help Pages: http://help.duckduckgo.com/duckduckgo-help-pages/ REMINDER: ********* You may need to do this all over again once in a while/periodically, because DuckDuckGo may turn back ON/reenable some of these settings (see above) behind your back/unauthorized/without your knowledge/permission (based on expiring cookies). ;-( DuckDuckGo: Google Alternative for Privacy: http://www.howtogeek.com/710128/what-is-duckduckgo-meet-the-google-alternative-for-privacy/ Switch to DuckDuckGo, a Private Search Engine: http://www.howtogeek.com/709072/how-to-switch-to-duckduckgo-a-private-search-engine/ Wikipedia: DuckDuckGo: http://en.wikipedia.org/wiki/DuckDuckGo Change Default Search Engine on All Browsers + Devices: http://kinsta.com/blog/how-to-change-search-engine/ Add DuckDuckGo Search Engine to Your Browser: http://www.tomsguide.com/how-to/how-to-use-duckduckgo/ DuckDuckGo Privacy Essentials: http://github.com/duckduckgo/duckduckgo-privacy-extension/ DuckDuckGo E-mail Protection [@duck.com e-mail address, forwarding + blocks trackers -> requires DuckDuckGo extension, or add-on, or app!]: http://duckduckgo.com/email/ - Chromium/Chrome extension: http://chrome.google.com/webstore/detail/duckduckgo-privacy-essent/bkdgflcldnnnapblkhphbgpggdiikppg/ - Firefox add-on: http://addons.mozilla.org/firefox/addon/duckduckgo-for-firefox/ - Edge add-on: http://microsoftedge.microsoft.com/addons/detail/caoacbimdbbljakfhgikoodekdnlcgpk/ - Safari app: http://apps.apple.com/us/app/duckduckgo-privacy-for-safari/id1482920575/ - Android app: http://duckduckgo.com/app/ DuckDuckGo E-mail Protection: http://spreadprivacy.com/protect-your-inbox-with-duckduckgo-email-protection/ @ SearXNG Metasearch: ********************* SearXNG (SearX fork) open source metasearch engine with enhanced privacy aggregates results from 70+ public search engines, services + sources, highly customizable (repository + source code): http://github.com/searxng/searxng/ Users are neither tracked nor profiled, NO ad(vertisment)s/marketing/promos/sales. List of all 80+ SearXNG available online/preconfigured/preinstalled/ready-to-use public instances/servers: http://searx.space/ SearX instances/servers repository: http://github.com/searx/searx-instances/ Neocities redirects users to a random SearXNG instance/server: http://searx.neocities.org/ Fast SearXNG instance/server [using searxng.nicfab.eu as example]: http://searxng.nicfab.eu/ SearXNG Preferences [using searxng.nicfab.eu as example, highly customizable]: http://searxng.nicfab.eu/searxng/preferences SearXNG Search Syntax + Guide [using searxng.nicfab.eu as example]: http://searxng.nicfab.eu/searxng/info/en/search-syntax Neocities: Random SearX Metasearch Redirector [JavaScript]: http://searx.neocities.org/ Neocities: SearX Metasearch Redirector [JavaScript DISABLED]: http://searx.neocities.org/nojs Neocities: SearX Metasearch instances/servers stats: http://searx.neocities.org/instancescores SearXNG Documentation: http://docs.searxng.org/ Wikipedia: SearX: http://en.wikipedia.org/wiki/Searx Change the Default Search Engine on All Browsers + Devices: http://kinsta.com/blog/how-to-change-search-engine/ - Chromium/Chrome Set your default search engine: http://support.google.com/chrome/answer/95426/ - Firefox add-on [using searx.be as instance/server]: http://addons.mozilla.org/firefox/addon/searxng-search/ @ SearX Metasearch: ******************* SearX open source metasearch engine with enhanced privacy aggregates results from 70+ public search engines, services + sources, highly customizable (repository + source code): http://github.com/searx/searx/ Users are neither tracked nor profiled, NO ad(vertisment)s/marketing/promos/sales. SearX instances/servers repository: http://github.com/searx/searx-instances/ SearX [using searx.org as example]: http://searx.org/ SearX Preferences [using searx.org as example, highly customizable]: http://searx.org/preferences SearX Search Syntax + Guide [using searx.org as example]: http://searx.org/info/en/search-syntax Neocities: Random SearX Metasearch Redirector [JavaScript]: http://searx.neocities.org/ Neocities: SearX Metasearch Redirector [JavaScript DISABLED]: http://searx.neocities.org/nojs Neocities: SearX Metasearch instances/servers stats: http://searx.neocities.org/instancescores SearX Documentation: http://searx.github.io/searx/ Wikipedia: SearX: http://en.wikipedia.org/wiki/Searx Change the Default Search Engine on All Browsers + Devices: http://kinsta.com/blog/how-to-change-search-engine/ - Chromium/Chrome Set your default search engine: http://support.google.com/chrome/answer/95426/ - Firefox add-on [using searx.thegpm.org as instance/server]: http://addons.mozilla.org/firefox/addon/search-searx/ @ Startpage Search + Privacy Protection Add-on + Extension: *********************************************************** Startpage Search engine with enhanced privacy: http://www.startpage.com/ Turn OFF/disable/opt OUT of/stop Startpage promotions, annoyances -> go to: http://www.startpage.com/do/settings -> turn OFF/slide left "Promotional messaging". Change the Default Search Engine on All Browsers + Devices: http://kinsta.com/blog/how-to-change-search-engine/ Anonymous View by Startpage [English only!]: http://www.startpage.com/en/anonymous-view/ Startpage Privacy Protection: http://add.startpage.com/protection/ Wikipedia: Startpage: http://en.wikipedia.org/wiki/Startpage.com - Chromium/Chrome extension: http://chrome.google.com/webstore/detail/startpage-privacy-protect/cdkhedhmncjnpabolpjceohohlefegak/ - Firefox add-on: http://addons.mozilla.org/firefox/addon/startpage-privacy-protection/ @ Brave Search: *************** Brave Search engine with enhanced privacy: http://search.brave.com/ Turn OFF/disable/opt OUT of/stop Brave annoyances -> go to: http://search.brave.com/settings/ -> scroll all the way down to the bottom of the page -> turn OFF/slide left "Anonymous usage metrics". Wikipedia: Brave Search: http://en.wikipedia.org/wiki/Brave_Search Change the Default Search Engine on All Browsers + Devices: http://kinsta.com/blog/how-to-change-search-engine/ - Chromium/Chrome extension: http://chrome.google.com/webstore/detail/brave-search/jojedekgcncccnjhilimdojbfnfamkda/ - Firefox add-on: http://addons.mozilla.org/firefox/addon/brave-search/ @ Qwant Search: *************** Qwant search engine with enhanced privacy: http://www.qwant.com/ Qwant Junior search engine with enhanced child/family privacy + safety: http://www.qwantjunior.com/ Users are neither tracked nor profiled, NO ad(vertisment)s/marketing/promos/sales. About Qwant: http://about.qwant.com/ Qwant Help: http://help.qwant.com/ Wikipedia: Qwant: http://en.wikipedia.org/wiki/Qwant Change the Default Search Engine on All Browsers + Devices: http://kinsta.com/blog/how-to-change-search-engine/ - Chromium/Chrome extension: http://chrome.google.com/webstore/detail/qwant-viprivacy/hnlkiofnhhoahaiimdicppgemmmomijo/ - Firefox add-on: http://addons.mozilla.org/firefox/addon/qwantcom-for-firefox/ @ Ecosia Search: **************** Ecosia search engine with enhanced privacy: http://www.ecosia.org/ Turn OFF/disable/opt OUT of/stop/UNcheck Ecosia Notifications + Personalized search results -> go to: http://www.ecosia.org/settings/ -> turn OFF/UNcheck "Personalized search results" + "Notifications" boxes. Wikipedia: Ecosia: http://en.wikipedia.org/wiki/Ecosia Change the Default Search Engine on All Browsers + Devices: http://kinsta.com/blog/how-to-change-search-engine/ - Chromium/Chrome extension: http://chrome.google.com/webstore/detail/ecosia-the-search-engine/eedlgdlajadkbbjoobobefphmfkcchfk/ - Firefox add-on: http://addons.mozilla.org/firefox/addon/ecosia-the-green-search/ @ 100+ Search Engines: ********************** MDGx 100+ "WWW (World Wide Web) Search Engines" [most have enhanced privacy, safety + security]: http://www.mdgx.com/links.htm#WSE ______________________________________________________________________________ Chromium/Chrome/X-Chromium/Thorium/Brave/Vivaldi Automated Clean-Up Automatically [eliminating laborious by hand/manual time consuming procedures, multiple steps, interruptions, interference, etc] + quietly [with 0/minimum output by terminating command lines with " >NUL 2>&1" to render them invisible/quiet/silent] clean-up/de-bloat by running a single DOS console command line BATch (.bat)/CoMmanD (.cmd) script (plain text) file, which deletes/erases/removes/wipes out past activity, history, temporary, tracking + annoying/bloat/undesirable/unnecessary/unneeded/unused/unwanted/useless files + directories/folders (some of whom consume large amounts of storage space) created by Chromium, Google Chrome, Chrome Beta, Chrome Dev(eloper) (Canary), X-Chromium (X-Launcher), Thorium, Brave, Vivaldi (+ other similar alternatives/derivatives/forks/variants) web browsers based on free, open source Chromium code in Windows 7/newer. BEWARE: ******* Windows 10/11 users: my BATch (.bat)/CoMmanD (.cmd) clean-up/de-bloat script file does NOT work with abandoned/discontinued/obsolete/OLDer/unsupported and modified/proprietary Microsoft Edge web browsers files + directory/folder layout/structure. http://www.verizon.com/support/knowledge-base-204588/ http://clear-my-cache.com/windows/microsoft-edge.html NOTES: ****** - Windows 10 + 11 users of current/NEWer/supported Edge web browsers based on Microsoft heavily modified Chromium (Canary developer channel) free, open source code: you can use this BATch (.bat)/CoMmanD (.cmd) script http://techcommunity.microsoft.com/t5/windows-11/example-batch-file-to-clear-browsing-history-on-microsoft-edge/m-p/3281775/ as example/template (and need to adapt/modify it to match your specific configuration/needs/preferences) to clean-up/de-bloat your Chromium based Edge web browsers. - Firefox + Firefox free, open source code based web browsers users: you can use this BATch (.bat)/CoMmanD (.cmd) script http://techcommunity.microsoft.com/t5/windows-11/example-batch-file-to-clear-browsing-history-on-microsoft-edge/m-p/3281775/highlight/true#M3276 as example/template (and need to adapt/modify it to match your specific configuration/needs/preferences) to clean-up/de-bloat your Firefox + Firefox based alternatives/derivatives/forks/variants web browsers -> see "FREE Windows 9x/NTx Web Browsers" chapter -> "Firefox" section in SOFTWARE.TXT (included): http://www.mdgx.com/nettoys.htm#MOZ FYI: **** To clear/delete/remove stored web browser cookies: - See "* Everything about HTTP/web/internet/browser Cookies:" section further above in WINDOWS7.TXT (this file): http://www.mdgx.com/7.php#:~:text=%2A%20Everything%20about%20HTTP%2Fweb%2Finternet%2Fbrowser%20Cookies%3A - ClearCookies BATch (.bat) file [ClearCookies.bat] deletes all stored cookies from most popular web browsers: Chrome/Chromium, Firefox, Internet Explorer (IE), Opera, Safari: http://github.com/CCrashZer0/ClearCookies/ File: http://github.com/CCrashZer0/ClearCookies/blob/master/ClearCookies.bat 1st Things 1st: *************** 1. Make a BACKUP copy/clone of all your web browser(s) user profile(s) directories/folders + files to a safe location before running this DOS console command line BATch (.bat)/CoMmanD (.cmd) script plain text/ASCII file, which deletes/removes a lot of files + directories/folders from your web browser(s) user profile(s). FYI: These are most popular Chromium, Chrome + alternatives/derivatives/forks/variants -> see "FREE Windows 9x/NTx Web Browsers" chapter -> "Chromium + Chrome" section in SOFTWARE.TXT (included): http://www.mdgx.com/nettoys.htm#CHR based on Chromium code built-in/default/preset web browser user profile locations in Windows Vista/newer, and they are all covered in this BATch (.bat)/CoMmanD (.cmd) clean-up/de-bloat script file (see further below): - Chromium based web browsers 32-bit + 64-bit (using original/unmodified/untouched Chromium code): http://chromium.googlesource.com/chromium/src/+/master/docs/user_data_dir.md %UserProfile%\AppData\Local\Chromium [%UserProfile% = C:\Users\User_Name] %AppData%\Local\Chromium [%AppData% = C:\Users\User_Name\AppData] User_Name is replaced with your actual user name. http://renenyffenegger.ch/notes/Windows/dirs/Users/username/ Get Degoogled/Ungoogled/stripped of Google ad(ware)/spyware/surveillance/tracking code Chromium builds [clearly labeled, portable]: http://chromium.woolyss.com/ - Chrome Beta web browsers 32-bit + 64-bit (using original/unmodified/untouched Chromium code): http://chromium.googlesource.com/chromium/src/+/master/docs/user_data_dir.md %UserProfile%\AppData\Local\Google\Chrome Beta [%UserProfile% = C:\Users\User_Name] %AppData%\Local\Google\Chrome Beta [%AppData% = C:\Users\User_Name\AppData] User_Name is replaced with your actual user name. Get Chrome Beta: http://www.google.com/chrome/beta/ - Chrome Dev(eloper) (Canary) web browsers 32-bit + 64-bit (using original/unmodified/untouched Chromium code): http://chromium.googlesource.com/chromium/src/+/master/docs/user_data_dir.md %UserProfile%\AppData\Local\Google\Chrome SxS [%UserProfile% = C:\Users\User_Name] %AppData%\Local\Google\Chrome SxS [%AppData% = C:\Users\User_Name\AppData] User_Name is replaced with your actual user name. Get Chrome Dev(eloper) (Canary): http://www.google.com/chrome/dev/ - Google Chrome web browsers 32-bit + 64-bit (using Chromium code modified by Google): http://support.google.com/chrome/a/answer/7349337/ %UserProfile%\AppData\Local\Google\Chrome [%UserProfile% = C:\Users\User_Name] %AppData%\Local\Google\Chrome [%AppData% = C:\Users\User_Name\AppData] User_Name is replaced with your actual user name. Get Google Chrome: http://support.google.com/chrome/answer/95346/ - Thorium (AVX)/Thorium AVX2 web browsers 64-bit (using Chromium code modified by Thorium forks): http://support.google.com/chrome/a/answer/7349337/ %UserProfile%\AppData\Local\Thorium [%UserProfile% = C:\Users\User_Name] %AppData%\Local\Thorium [%AppData% = C:\Users\User_Name\AppData] User_Name is replaced with your actual user name. Get Thorium (CPU extensions/hardware optimized, portable): Thorium latest build for Windows 10/11 [ZIP = full, Portable]: http://github.com/Alex313031/Thorium-Win/releases/latest/ Thorium latest build for Windows 7/8/8.1 [ZIP = full, Portable]: http://github.com/Alex313031/thorium-win7/releases/latest/ Get Thorium AVX2 (+ 3D rendering + HD/VHD/UHD video playback, portable): http://github.com/Alex313031/Thorium-AVX2/releases/latest/ - Brave web browser 32-bit + 64-bit (using Chromium code modified by Brave fork): http://community.brave.com/t/where-does-brave-store-its-data-files/53830/ %UserProfile%\AppData\Local\BraveSoftware [%UserProfile% = C:\Users\User_Name] %AppData%\Local\BraveSoftware [%AppData% = C:\Users\User_Name\AppData] User_Name is replaced with your actual user name. Get Brave (improved privacy, safety + security, portable): http://github.com/brave/brave-browser/releases/latest/ - Vivaldi web browser 32-bit + 64-bit (using Chromium code modified by Vivaldi fork): http://techdows.com/2015/06/find-vivaldi-browser-installed-location-or-path.html %UserProfile%\AppData\Local\Vivaldi [%UserProfile% = C:\Users\User_Name] %AppData%\Local\Vivaldi [%AppData% = C:\Users\User_Name\AppData] User_Name is replaced with your actual user name. Get Vivaldi (enhanced privacy + security, portable -> Install standalone): http://vivaldi.com/download/ - X-Chromium (X-Launcher) web browsers 32-bit + 64-bit (using winPenPack X-Software launcher portability/redirection code + original/unmodified/untouched Chromium code): http://www.winpenpack.com/en/page.php?26 X:\X-Software\User\Program_Name Replace all generic letters + names [X:, X-Software, User + Program_Name above] with your actual X-Chromium (X-Launcher) drive/partition/volume letter, base/main directory/folder name + user name (if any). In this example I use C:\PORT\CHROME = replace it to match yours -> see DOS console command line BATch (.bat)/CoMmanD (.cmd) file below. Get X-Chromium (X-Launcher) (100% portable): http://www.winpenpack.com/en/download.php?view.1082 2. Chromium/Chrome + alternatives/derivatives/forks/variants directory/folder structure/tree layout: open (File) Explorer -> go to the directory (directories)/folder(s) where your Chromium based web browser(s) keep(s) its/their user profile location(s) -> see 1. further above. You can view/save/print any directory/folder tree structure: from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command (using Chromium in this example): DIR "%UserProfile%\AppData\Local\Chromium" /A:D /B /S OR: DIR "%AppData%\Local\Chromium" /A:D /B /S -> press Enter. View DIR [Directory] built-in command options, switches + parameters: from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE] right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter: DIR /? Save your DIR output screen as plain text/ASCII (.txt) file, you can view/edit/print using Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT using same example above: DIR "%UserProfile%\AppData\Local\Chromium" /A:D /B /S>%TEMP%\Chromium_User_Profile_tree.txt OR: DIR "%AppData%\Local\Chromium" /A:D /B /S>%TEMP%\Chromium_User_Profile_tree.txt In this case Chromium_User_Profile_tree.txt is saved in your Temp(orary) [%TEMP%] directory/folder, usually %UserProfile%\AppData\Local\Temp OR: %AppData%\Local\Temp in Windows Vista/newer, where %UserProfile% = your actual user name. View your default/preset (unless you changed it) system Temp(orary) [%TEMP%] directory/folder location: from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE] right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter: PATH Scroll down to these 2 environment variables (generic example): TEMP=C:\Users\User_Name\AppData\Local\Temp TMP=C:\Users\User_Name\AppData\Local\Temp User_Name is replaced with your actual user name. References: - Chromium/Chrome User Data Directory: http://chromium.googlesource.com/chromium/src/+/master/docs/user_data_dir.md - Chromium OS Local & Remote Source Tree Layouts: http://chromium.googlesource.com/chromiumos/docs/+/HEAD/source_layout.md - Getting Around the Chromium Source Code Directory Structure: http://www.chromium.org/developers/how-tos/getting-around-the-chrome-source-code/ - Structure of Chromium/Chrome User Profile data: http://superuser.com/questions/951095/ - Chromium/Chrome directory/folder hierarchy/tree: http://chromium.googlesource.com/chromium/src.git/+/78b64f6ab701b31e69dc822adde685ebe55c62b1/ - Chromium/Chrome Cookies and Network Data: http://www.avanite.com/blog/chromium-cookies-and-network-data/ - Location of Chromium/Chrome history: http://www.foxtonforensics.com/browser-history-examiner/chrome-history-location/ 3. Test this DOS console command line BATch (.bat)/CoMmanD (.cmd) file (see further below) to make sure it works properly on your Windows 7/newer computer(s)/device(s) and in your specific environment(s), because certain hardware/software/system configurations/customizations/requirements/settings may need some of these files +/- directories/folders +/- have custom/different folder locations. 4. After that customize/edit/modify it by opening it in Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT and comment/disable/remark the lines you see fit according to your specific configurations/customizations/needs/preferences/requirements/settings by adding a double colon and a space [:: ] in front of each line, or you can delete/erase/remove them altogether, and/or add new ones to match your needs/preferences. REQUIREMENTS: ************* 1. Must (double-)click/execute/open/run DOS console command line BATch (.bat)/CoMmanD (.cmd) file (further below) as Administrator -> right-click it or its icon/item/link/shortcut -> select "Run as Administrator". 2. Make sure none of these EXEcutables (.exe files): Chrome.exe, Chromium.exe, X-Chromium.exe, Thorium.exe, Brave.exe and/or Vivaldi.exe is/are NOT running, not even in the background. Open/run Task Manager: http://www.wikihow.com/Open-Windows-Task-Manager/ http://www.howtogeek.com/66622/stupid-geek-tricks-6-ways-to-open-windows-task-manager/ Start -> Run... [hold WinKey + press R] -> type this command: taskmgr.exe -> press Enter or click OK. Task Manager [TaskMgr.exe] is located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually C:\WINDOWS]. View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command PATH -> press Enter. Windows 10/newer users (optional): open/run LaunchTM.exe the same way. Launch Task Manager [LaunchTM.exe] is located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually C:\WINDOWS]. Task Manager window -> click "Processes" tab -> scroll down and look for any of the Chromium/Chrome or/and alternatives/derivatives/forks/variants EXEcutables listed above. In case you see any: righ-click on each of them 1 at a time (if more than 1) -> select "End Process Tree" as many times as necessary to make sure you close all instances, or if there is only 1 listed -> select "End Process". Therefore... To be able to delete all files + directories/folders listed below 1st you MUST close/exit/shutdown completely *all* running (even in the background)/idle/resident instances of Chrome, Chromium, X-Chromium (X-Launcher), Thorium, Brave and/or Vivaldi EXEcutables (.exe files), and only after that right-click once again this DOS console command line BATch (.bat)/CoMmanD (.cmd) file or its icon/item/link/shortcut (in case you created 1) -> select "Run as Administrator". TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text BATch (.bat) or CoMmanD (.cmd) script file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the BAT (.bat) or CMD (.cmd) extension -> right-click it -> Run as Administrator -> wait for completion. -----Begin cut & paste here----- @ECHO OFF IF NOT "%OS%"=="Windows_NT" GOTO END COLOR E4 TITLE "Delete Bloat/Insecure/Useless (X-)Chrom(ium)/Brave/Thorium (AVX2)/Vivaldi files + directories/folders..." CD\ :: @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ Chromium @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ :: Chromium (Portable) web browsers user profile base/main directory/folder = %UserProfile%\AppData\Local\Chromium [where :: %UserProfile% is C:\Users\User_Name = User_Name is replaced with your actual user name]: TASKLIST.EXE>%TEMP%\CHROM_RUN!.TXT FIND.EXE /I "CHROM" "%TEMP%\CHROM_RUN!.TXT" >NUL 2>&1 IF NOT ERRORLEVEL 1 GOTO NXT1 TAKEOWN.EXE /f "%UserProfile%\AppData\Local\Chromium" /r /d y >NUL 2>&1 ICACLS.EXE "%UserProfile%\AppData\Local\Chromium" /grant:R %UserName%:F Administrators:F /t /c /q >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Chromium\debug*.*" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Chromium\*.corrupt" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Chromium\*crash*.*" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Chromium\licens*.*" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Chromium\about*.txt" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Chromium\CHANGELOG*.txt" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Chromium\*licens*.txt" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Chromium\*.bak" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Chromium\*.pma" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Chromium\BrowserMetric*.*" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Chromium\CrashpadMetric*.*" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Chromium\Cach*.pak" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Chromium\*.old" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Chromium\*.tmp" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Chromium\LOCK" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Chromium\lockfil*.*" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Chromium\LOG" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Chromium\chrome_shut*.*" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Chromium\*-journal.*" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Chromium\User Data\Default\File System\00000*" >NUL 2>&1 DEL /F /Q "%UserProfile%\AppData\Local\Chromium\User Data\Default\Local Storage\leveldb\*.ldb" >NUL 2>&1 DEL /F /Q "%UserProfile%\AppData\Local\Chromium\User Data\Default\DownloadMetadata" >NUL 2>&1 DEL /F /Q "%UserProfile%\AppData\Local\Chromium\User Data\Default\History" >NUL 2>&1 DEL /F /Q "%UserProfile%\AppData\Local\Chromium\User Data\Default\Visited Links" >NUL 2>&1 RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\BrowserMetrics" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Crash pad" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Crashpad" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\DeferredBrowserMetrics" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\DesktopSharingHub" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Floc" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\GrShaderCache" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\PnaclTranslationCache" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\ShaderCache" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\System Profile" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Webstore Downloads" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\AutofillStrikeDatabase" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\blob_storage" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\BudgetDatabase" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\Cache" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\Code Cache" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\commerce_subscription_db" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\coupon_db" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\Crash pad" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\Crashpad" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\data_reduction_proxy_leveldb" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\DawnCache" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\Download Service" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\Feature Engagement Tracker" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\GCM Store" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\GPUCache" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\GrShaderCache" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\optimization_guide_hint_cache_store" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\optimization_guide_model_and_features_store" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\optimization_guide_model_metadata_store" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\optimization_guide_prediction_model_downloads" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\Platform Notifications" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\Search Logos" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\Segmentation Platform" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\Service Worker" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\Session Storage" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\Sessions" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\shared_proto_db" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\Thumbnails" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\VideoDecodeStats" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\Web Applications" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Chromium\User Data\Default\WebrtcVideoStats" :NXT1 :: @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ Chrome Beta @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ :: Chrome Beta web browser user profile base/main directory/folder = %UserProfile%\AppData\Local\Google\Chrome Beta [where :: %UserProfile% is C:\Users\User_Name = User_Name is replaced with your actual user name]: TASKLIST.EXE>%TEMP%\CHROM_RUN!.TXT FIND.EXE /I "CHROM" "%TEMP%\CHROM_RUN!.TXT" >NUL 2>&1 IF NOT ERRORLEVEL 1 GOTO NXT2 TAKEOWN.EXE /f "%UserProfile%\AppData\Local\Google\Chrome Beta" /r /d y >NUL 2>&1 ICACLS.EXE "%UserProfile%\AppData\Local\Google\Chrome Beta" /grant:R %UserName%:F Administrators:F /t /c /q >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome Beta\debug*.*" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome Beta\*.corrupt" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome Beta\*crash*.*" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome Beta\licens*.*" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome Beta\about*.txt" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome Beta\CHANGELOG*.txt" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome Beta\*licens*.txt" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome Beta\*.bak" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome Beta\*.pma" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome Beta\BrowserMetric*.*" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome Beta\CrashpadMetric*.*" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome Beta\Cach*.pak" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome Beta\*.old" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome Beta\*.tmp" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome Beta\LOCK" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome Beta\lockfil*.*" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome Beta\LOG" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome Beta\chrome_shut*.*" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome Beta\*-journal.*" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\File System\00000*" >NUL 2>&1 DEL /F /Q "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\Local Storage\leveldb\*.ldb" >NUL 2>&1 DEL /F /Q "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\DownloadMetadata" >NUL 2>&1 DEL /F /Q "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\History" >NUL 2>&1 DEL /F /Q "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\Visited Links" >NUL 2>&1 RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\BrowserMetrics" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Crash pad" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Crashpad" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\DeferredBrowserMetrics" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\DesktopSharingHub" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Floc" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\GrShaderCache" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\PnaclTranslationCache" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\ShaderCache" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\System Profile" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Webstore Downloads" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\AutofillStrikeDatabase" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\blob_storage" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\BudgetDatabase" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\Cache" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\Code Cache" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\commerce_subscription_db" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\coupon_db" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\Crash pad" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\Crashpad" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\data_reduction_proxy_leveldb" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\DawnCache" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\Download Service" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\Feature Engagement Tracker" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\GCM Store" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\GPUCache" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\GrShaderCache" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\optimization_guide_hint_cache_store" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\optimization_guide_model_and_features_store" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\optimization_guide_model_metadata_store" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\optimization_guide_prediction_model_downloads" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\Platform Notifications" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\Search Logos" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\Segmentation Platform" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\Service Worker" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\Session Storage" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\Sessions" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\shared_proto_db" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\Thumbnails" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\VideoDecodeStats" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\Web Applications" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome Beta\User Data\Default\WebrtcVideoStats" :NXT2 :: @@@@@@@@@@@@@@@@@@@@@@@ Chrome Dev(eloper) (Canary) @@@@@@@@@@@@@@@@@@@@@@@ :: Chrome Dev(eloper) (Canary) web browser user profile base/main directory/folder = :: %UserProfile%\AppData\Local\Google\Chrome SxS [where %UserProfile% is C:\Users\User_Name = User_Name is replaced with :: your actual user name]: TASKLIST.EXE>%TEMP%\CHROM_RUN!.TXT FIND.EXE /I "CHROM" "%TEMP%\CHROM_RUN!.TXT" >NUL 2>&1 IF NOT ERRORLEVEL 1 GOTO NXT3 TAKEOWN.EXE /f "%UserProfile%\AppData\Local\Google\Chrome SxS" /r /d y >NUL 2>&1 ICACLS.EXE "%UserProfile%\AppData\Local\Google\Chrome SxS" /grant:R %UserName%:F Administrators:F /t /c /q >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome SxS\debug*.*" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome SxS\*.corrupt" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome SxS\*crash*.*" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome SxS\licens*.*" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome SxS\about*.txt" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome SxS\CHANGELOG*.txt" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome SxS\*licens*.txt" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome SxS\*.bak" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome SxS\*.pma" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome SxS\BrowserMetric*.*" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome SxS\CrashpadMetric*.*" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome SxS\Cach*.pak" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome SxS\*.old" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome SxS\*.tmp" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome SxS\LOCK" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome SxS\lockfil*.*" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome SxS\LOG" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome SxS\chrome_shut*.*" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome SxS\*-journal.*" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\File System\00000*" >NUL 2>&1 DEL /F /Q "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\Local Storage\leveldb\*.ldb" >NUL 2>&1 DEL /F /Q "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\DownloadMetadata" >NUL 2>&1 DEL /F /Q "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\History" >NUL 2>&1 DEL /F /Q "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\Visited Links" >NUL 2>&1 RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\BrowserMetrics" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Crash pad" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Crashpad" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\DeferredBrowserMetrics" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\DesktopSharingHub" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Floc" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\GrShaderCache" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\PnaclTranslationCache" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\ShaderCache" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\System Profile" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Webstore Downloads" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\AutofillStrikeDatabase" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\blob_storage" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\BudgetDatabase" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\Cache" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\Code Cache" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\commerce_subscription_db" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\coupon_db" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\Crash pad" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\Crashpad" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\data_reduction_proxy_leveldb" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\DawnCache" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\Download Service" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\Feature Engagement Tracker" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\GCM Store" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\GPUCache" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\GrShaderCache" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\optimization_guide_hint_cache_store" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\optimization_guide_model_and_features_store" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\optimization_guide_model_metadata_store" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\optimization_guide_prediction_model_downloads" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\Platform Notifications" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\Search Logos" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\Segmentation Platform" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\Service Worker" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\Session Storage" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\Sessions" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\shared_proto_db" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\Thumbnails" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\VideoDecodeStats" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\Web Applications" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome SxS\User Data\Default\WebrtcVideoStats" :NXT3 :: @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ Google Chrome @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ :: Google Chrome web browser user profile base/main directory/folder = %UserProfile%\AppData\Local\Google\Chrome [where :: %UserProfile% is C:\Users\User_Name = User_Name is replaced with your actual user name]: TASKLIST.EXE>%TEMP%\CHROM_RUN!.TXT FIND.EXE /I "CHROM" "%TEMP%\CHROM_RUN!.TXT" >NUL 2>&1 IF NOT ERRORLEVEL 1 GOTO NXT4 TAKEOWN.EXE /f "%UserProfile%\AppData\Local\Google\Chrome" /r /d y >NUL 2>&1 ICACLS.EXE "%UserProfile%\AppData\Local\Google\Chrome" /grant:R %UserName%:F Administrators:F /t /c /q >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome\debug*.*" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome\*.corrupt" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome\*crash*.*" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome\licens*.*" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome\about*.txt" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome\CHANGELOG*.txt" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome\*licens*.txt" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome\*.bak" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome\*.pma" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome\BrowserMetric*.*" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome\CrashpadMetric*.*" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome\Cach*.pak" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome\*.old" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome\*.tmp" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome\LOCK" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome\lockfil*.*" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome\LOG" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome\chrome_shut*.*" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome\*-journal.*" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\File System\00000*" >NUL 2>&1 DEL /F /Q "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\*.ldb" >NUL 2>&1 DEL /F /Q "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\DownloadMetadata" >NUL 2>&1 DEL /F /Q "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\History" >NUL 2>&1 DEL /F /Q "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\Visited Links" >NUL 2>&1 RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\BrowserMetrics" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Crash pad" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Crashpad" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\DeferredBrowserMetrics" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\DesktopSharingHub" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Floc" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\GrShaderCache" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\PnaclTranslationCache" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\ShaderCache" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\System Profile" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Webstore Downloads" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\AutofillStrikeDatabase" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\blob_storage" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\Cache" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\Code Cache" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\coupon_db" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\Crash pad" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\Crashpad" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\DawnCache" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\Download Service" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\GCM Store" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\GPUCache" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\GrShaderCache" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_hint_cache_store" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_model_and_features_store" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_model_metadata_store" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\Platform Notifications" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\Search Logos" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\Segmentation Platform" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\Service Worker" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\Session Storage" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\Sessions" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\Thumbnails" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\VideoDecodeStats" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\Web Applications" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\WebrtcVideoStats" :NXT4 :: @@@@@@@@@@@@@@@@@@@@@@@@ Thorium (AVX)/Thorium AVX2 @@@@@@@@@@@@@@@@@@@@@@@ :: Thorium (AVX)/Thorium AVX2 (Portable) browsers user profile base/main directory/folder = :: %UserProfile%\AppData\Local\Thorium [where %UserProfile% is C:\Users\User_Name = User_Name is replaced with your actual :: user name]: TASKLIST.EXE>%TEMP%\CHROM_RUN!.TXT FIND.EXE /I "THORIUM" "%TEMP%\CHROM_RUN!.TXT" >NUL 2>&1 IF NOT ERRORLEVEL 1 GOTO NXT5 TAKEOWN.EXE /f "%UserProfile%\AppData\Local\Thorium" /r /d y >NUL 2>&1 ICACLS.EXE "%UserProfile%\AppData\Local\Thorium" /grant:R %UserName%:F Administrators:F /t /c /q >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Thorium\debug*.*" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Thorium\*.corrupt" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Thorium\*crash*.*" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Thorium\licens*.*" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Thorium\about*.txt" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Thorium\CHANGELOG*.txt" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Thorium\*licens*.txt" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Thorium\*.bak" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Thorium\*.pma" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Thorium\BrowserMetric*.*" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Thorium\CrashpadMetric*.*" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Thorium\Cach*.pak" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Thorium\*.old" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Thorium\*.tmp" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Thorium\LOCK" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Thorium\lockfil*.*" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Thorium\LOG" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Thorium\chrome_shut*.*" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Thorium\*-journal.*" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Thorium\User Data\Default\File System\00000*" >NUL 2>&1 DEL /F /Q "%UserProfile%\AppData\Local\Thorium\User Data\Default\Local Storage\leveldb\*.ldb" >NUL 2>&1 DEL /F /Q "%UserProfile%\AppData\Local\Thorium\User Data\Default\DownloadMetadata" >NUL 2>&1 DEL /F /Q "%UserProfile%\AppData\Local\Thorium\User Data\Default\History" >NUL 2>&1 DEL /F /Q "%UserProfile%\AppData\Local\Thorium\User Data\Default\Visited Links" >NUL 2>&1 RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\BrowserMetrics" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Crash pad" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Crashpad" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\DeferredBrowserMetrics" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\DesktopSharingHub" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Floc" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\GrShaderCache" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\PnaclTranslationCache" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\ShaderCache" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\System Profile" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Webstore Downloads" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\AutofillStrikeDatabase" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\blob_storage" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\BudgetDatabase" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\Cache" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\Code Cache" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\commerce_subscription_db" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\coupon_db" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\Crash pad" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\Crashpad" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\data_reduction_proxy_leveldb" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\DawnCache" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\Download Service" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\Feature Engagement Tracker" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\GCM Store" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\GPUCache" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\GrShaderCache" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\optimization_guide_hint_cache_store" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\optimization_guide_model_and_features_store" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\optimization_guide_model_metadata_store" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\optimization_guide_prediction_model_downloads" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\Platform Notifications" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\Search Logos" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\Segmentation Platform" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\Service Worker" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\Session Storage" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\Sessions" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\shared_proto_db" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\Thumbnails" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\VideoDecodeStats" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\Web Applications" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Thorium\User Data\Default\WebrtcVideoStats" :NXT5 :: @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ Brave @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ :: Brave (Portable) web browser user profile base/main directory/folder = %UserProfile%\AppData\Local\BraveSoftware [where :: %UserProfile% is C:\Users\User_Name = User_Name is replaced with your actual user name]: TASKLIST.EXE>%TEMP%\CHROM_RUN!.TXT FIND.EXE /I "BRAVE" "%TEMP%\CHROM_RUN!.TXT" >NUL 2>&1 IF NOT ERRORLEVEL 1 GOTO NXT6 TAKEOWN.EXE /f "%UserProfile%\AppData\Local\BraveSoftware" /r /d y >NUL 2>&1 ICACLS.EXE "%UserProfile%\AppData\Local\BraveSoftware" /grant:R %UserName%:F Administrators:F /t /c /q >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\BraveSoftware\debug*.*" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\BraveSoftware\*.corrupt" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\BraveSoftware\*crash*.*" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\BraveSoftware\licens*.*" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\BraveSoftware\about*.txt" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\BraveSoftware\CHANGELOG*.txt" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\BraveSoftware\*licens*.txt" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\BraveSoftware\*.bak" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\BraveSoftware\*.pma" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\BraveSoftware\BrowserMetric*.*" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\BraveSoftware\CrashpadMetric*.*" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\BraveSoftware\Cach*.pak" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\BraveSoftware\*.old" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\BraveSoftware\*.tmp" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\BraveSoftware\LOCK" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\BraveSoftware\lockfil*.*" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\BraveSoftware\LOG" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\BraveSoftware\chrome_shut*.*" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\BraveSoftware\*-journal.*" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\File System\00000*" >NUL 2>&1 DEL /F /Q "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\Local Storage\leveldb\*.ldb" >NUL 2>&1 DEL /F /Q "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\DownloadMetadata" >NUL 2>&1 DEL /F /Q "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\History" >NUL 2>&1 DEL /F /Q "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\Visited Links" >NUL 2>&1 RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\BrowserMetrics" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Crash pad" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Crashpad" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\DeferredBrowserMetrics" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\DesktopSharingHub" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Floc" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\GrShaderCache" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\PnaclTranslationCache" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\ShaderCache" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\System Profile" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Webstore Downloads" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\AutofillStrikeDatabase" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\blob_storage" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\BudgetDatabase" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\Cache" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\Code Cache" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\commerce_subscription_db" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\coupon_db" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\Crash pad" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\Crashpad" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\data_reduction_proxy_leveldb" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\DawnCache" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\Download Service" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\Feature Engagement Tracker" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\GCM Store" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\GPUCache" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\GrShaderCache" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\optimization_guide_hint_cache_store" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\optimization_guide_model_and_features_store" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\optimization_guide_model_metadata_store" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\optimization_guide_prediction_model_downloads" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\Platform Notifications" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\Search Logos" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\Segmentation Platform" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\Service Worker" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\Session Storage" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\Sessions" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\shared_proto_db" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\Thumbnails" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\VideoDecodeStats" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\Web Applications" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\BraveSoftware\User Data\Default\WebrtcVideoStats" :NXT6 :: @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ Vivaldi @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ :: Vivaldi (Install standalone) web browser user profile base/main directory/folder = %UserProfile%\AppData\Local\Vivaldi :: [where %UserProfile% is C:\Users\User_Name = User_Name is replaced with your actual user name]: TASKLIST.EXE>%TEMP%\CHROM_RUN!.TXT FIND.EXE /I "VIVALDI" "%TEMP%\CHROM_RUN!.TXT" >NUL 2>&1 IF NOT ERRORLEVEL 1 GOTO NXT7 TAKEOWN.EXE /f "%UserProfile%\AppData\Local\Vivaldi" /r /d y >NUL 2>&1 ICACLS.EXE "%UserProfile%\AppData\Local\Vivaldi" /grant:R %UserName%:F Administrators:F /t /c /q >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Vivaldi\debug*.*" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Vivaldi\*.corrupt" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Vivaldi\*crash*.*" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Vivaldi\licens*.*" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Vivaldi\about*.txt" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Vivaldi\CHANGELOG*.txt" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Vivaldi\*licens*.txt" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Vivaldi\*.bak" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Vivaldi\*.pma" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Vivaldi\BrowserMetric*.*" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Vivaldi\CrashpadMetric*.*" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Vivaldi\Cach*.pak" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Vivaldi\*.old" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Vivaldi\*.tmp" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Vivaldi\LOCK" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Vivaldi\lockfil*.*" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Vivaldi\LOG" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Vivaldi\chrome_shut*.*" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Vivaldi\*-journal.*" >NUL 2>&1 DEL /F /Q /S "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\File System\00000*" >NUL 2>&1 DEL /F /Q "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\Local Storage\leveldb\*.ldb" >NUL 2>&1 DEL /F /Q "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\DownloadMetadata" >NUL 2>&1 DEL /F /Q "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\History" >NUL 2>&1 DEL /F /Q "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\Visited Links" >NUL 2>&1 RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\BrowserMetrics" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Crash pad" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Crashpad" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\DeferredBrowserMetrics" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\DesktopSharingHub" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Floc" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\GrShaderCache" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\PnaclTranslationCache" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\ShaderCache" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\System Profile" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Webstore Downloads" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\AutofillStrikeDatabase" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\blob_storage" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\BudgetDatabase" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\Cache" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\Code Cache" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\commerce_subscription_db" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\coupon_db" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\Crash pad" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\Crashpad" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\data_reduction_proxy_leveldb" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\DawnCache" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\Download Service" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\Feature Engagement Tracker" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\GCM Store" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\GPUCache" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\GrShaderCache" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\optimization_guide_hint_cache_store" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\optimization_guide_model_and_features_store" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\optimization_guide_model_metadata_store" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\optimization_guide_prediction_model_downloads" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\Platform Notifications" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\Search Logos" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\Segmentation Platform" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\Service Worker" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\Session Storage" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\Sessions" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\shared_proto_db" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\Thumbnails" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\VideoDecodeStats" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\Web Applications" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%UserProfile%\AppData\Local\Vivaldi\User Data\Default\WebrtcVideoStats" :NXT7 :: @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ X-Chromium @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ :: X-Chromium (X-Launcher) Portable launcher [X-Chromium.exe] running Chromium [chrome.exe] web browser base/main :: directory/folder = C:\PORT\CHROME (example). *MUST* change drive letter +/- directories/folders names to match yours: TASKLIST.EXE>%TEMP%\CHROM_RUN!.TXT FIND.EXE /I "X-CHROM" "%TEMP%\CHROM_RUN!.TXT" >NUL 2>&1 IF NOT ERRORLEVEL 1 GOTO NXT8 TAKEOWN.EXE /f "C:\PORT\CHROME" /r /d y >NUL 2>&1 ICACLS.EXE "C:\PORT\CHROME" /grant:R %UserName%:F Administrators:F /t /c /q >NUL 2>&1 DEL /F /Q /S "C:\PORT\CHROME\debug*.*" >NUL 2>&1 DEL /F /Q /S "C:\PORT\CHROME\*.corrupt" >NUL 2>&1 DEL /F /Q /S "C:\PORT\CHROME\*crash*.*" >NUL 2>&1 DEL /F /Q /S "C:\PORT\CHROME\licens*.*" >NUL 2>&1 DEL /F /Q /S "C:\PORT\CHROME\about*.txt" >NUL 2>&1 DEL /F /Q /S "C:\PORT\CHROME\CHANGELOG*.txt" >NUL 2>&1 DEL /F /Q /S "C:\PORT\CHROME\*licens*.txt" >NUL 2>&1 DEL /F /Q /S "C:\PORT\CHROME\*.bak" >NUL 2>&1 DEL /F /Q /S "C:\PORT\CHROME\*.pma" >NUL 2>&1 DEL /F /Q /S "C:\PORT\CHROME\BrowserMetric*.*" >NUL 2>&1 DEL /F /Q /S "C:\PORT\CHROME\CrashpadMetric*.*" >NUL 2>&1 DEL /F /Q /S "C:\PORT\CHROME\Cach*.pak" >NUL 2>&1 DEL /F /Q /S "C:\PORT\CHROME\*.old" >NUL 2>&1 DEL /F /Q /S "C:\PORT\CHROME\*.tmp" >NUL 2>&1 DEL /F /Q /S "C:\PORT\CHROME\LOCK" >NUL 2>&1 DEL /F /Q /S "C:\PORT\CHROME\lockfil*.*" >NUL 2>&1 DEL /F /Q /S "C:\PORT\CHROME\LOG" >NUL 2>&1 DEL /F /Q /S "C:\PORT\CHROME\chrome_shut*.*" >NUL 2>&1 DEL /F /Q /S "C:\PORT\CHROME\*-journal.*" >NUL 2>&1 DEL /F /Q /S "C:\PORT\CHROME\USER\CHROME\DEFAULT\File System\00000*" >NUL 2>&1 DEL /F /Q "C:\PORT\CHROME\USER\CHROME\DEFAULT\Local Storage\leveldb\*.ldb" >NUL 2>&1 DEL /F /Q "C:\PORT\CHROME\USER\CHROME\DEFAULT\DownloadMetadata" >NUL 2>&1 DEL /F /Q "C:\PORT\CHROME\USER\CHROME\DEFAULT\History" >NUL 2>&1 DEL /F /Q "C:\PORT\CHROME\USER\CHROME\DEFAULT\Visited Links" >NUL 2>&1 RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\BrowserMetrics" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\Crash pad" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\Crashpad" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DeferredBrowserMetrics" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DesktopSharingHub" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\Floc" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\GrShaderCache" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\PnaclTranslationCache" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\ShaderCache" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\System Profile" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\Webstore Downloads" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\AutofillStrikeDatabase" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\blob_storage" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\BudgetDatabase" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\Cache" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\Code Cache" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\commerce_subscription_db" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\coupon_db" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\Crash pad" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\Crashpad" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\data_reduction_proxy_leveldb" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\DawnCache" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\Download Service" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\Feature Engagement Tracker" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\GCM Store" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\GPUCache" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\GrShaderCache" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\optimization_guide_hint_cache_store" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\optimization_guide_model_and_features_store" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\optimization_guide_model_metadata_store" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\optimization_guide_prediction_model_downloads" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\Platform Notifications" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\Search Logos" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\Segmentation Platform" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\Service Worker" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\Session Storage" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\Sessions" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\shared_proto_db" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\Thumbnails" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\VideoDecodeStats" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\Web Applications" RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "C:\PORT\CHROME\USER\CHROME\DEFAULT\WebrtcVideoStats" :: X-Chromium Temp (Temporary) directory/folder = %TEMP%\X-Chromium [where %TEMP% is by default :: C:\Users\User_Name\AppData\Local\Temp = User_Name is replaced with your actual user name]: TAKEOWN.EXE /f "%TEMP%\X-Chromium" /r /d y >NUL 2>&1 ICACLS.EXE "%TEMP%\X-Chromium" /grant:R %UserName%:F Administrators:F /t /c /q >NUL 2>&1 RUNDLL32.EXE %WinDir%\SYSTEM32\ADVPACK.DLL,DelNodeRunDLL32 "%TEMP%\X-Chromium" :NXT8 :: @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ The End @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ IF EXIST "%TEMP%\CHROM_RUN!.TXT" DEL /F /Q "%TEMP%\CHROM_RUN!.TXT" >NUL 2>&1 :END :: EXIT ------End cut & paste here------ ADVPACK.DLL, ICACLS.EXE, RUNDLL32.EXE + TAKEOWN.EXE are all located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually C:\WINDOWS], listed in your system PATH. View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command PATH -> press Enter. Similar cleaning/debloating tools: - BleachBit 32-bit + 64-bit bloat, obsolete, outdated, uninstalled, unnecessary, unneeded, unsafe, unused, unwanted, useless, wasteful system + software directories/folders + files cleaner + remover, frees storage space, highly customizable: http://www.bleachbit.org/ Download [Portable ZIP]: http://www.bleachbit.org/download/windows/ BleachBit Features: http://www.bleachbit.org/features/ BleachBit online Documentation: http://docs.bleachbit.org/ - CCleaner Free [ CRIPPLED ! ] bloat, insecure, obsolete, outdated, uninstalled, unnecessary, unneeded, unsafe, unused, unwanted, useless, wasteful system, registry + software directories/folders + files cleaner, fixer, remover + uninstaller for Windows XP/newer: http://www.ccleaner.com/ccleaner/download/ Download [Installer EXE + Portable ZIP]: http://www.ccleaner.com/ccleaner/builds/ CCleaner Free Guide + Review: http://www.lifewire.com/ccleaner-review-2625143/ More info, guides + tools: - MDGx "Digital + Internet/Online Privacy, Safety + Security" chapter http://www.mdgx.com/7.php#:~:text=Digital%20%2B%20Internet%2FOnline%20Privacy%2C%20Safety%20%2B%20Security%20%3D%20Your%20Top%20Priority -> "@ Chromium/Chrome web browsers + alternatives/derivatives/forks/variants:" http://www.mdgx.com/7.php#:~:text=%40%20Chromium%2FChrome%20web%20browsers%20%2B%20alternatives%2Fderivatives%2Fforks%2Fvariants%3A section in WINDOWS7.TXT (this file). http://www.mdgx.com/7.php http://www.mdgx.com/WINDOWS7.TXT - MDGx collection of Chromium/Chrome web browsers -> "Chromium + Chrome" section in SOFTWARE.TXT (included): http://www.mdgx.com/nettoys.htm#CHR - MDGx collection of essential + useful Chromium/Chrome extensions + tweaks -> "CHROMIUM" section in TOOLS.TXT (included): http://www.mdgx.com/tools.php#:~:text=CHROMIUM%20%5B%2A%5D http://www.mdgx.com/TOOLS.TXT ______________________________________________________________________________ Put A Pin In It! * Pin (stick) any file/executable/shortcut/link/URL/etc to Taskbar in Windows 7: http://www.howtogeek.com/66670/from-the-tips-box-pin-any-file-to-the-taskbar/ 1. Desktop -> right-click -> New -> Shortcut -> create an empty place holder file (example): New Text Document (.txt). 2. Rename this file extension (the group of letters after the last dot) from txt to exe. 3. Drag it onto the Taskbar to pin it. 4. Go to this directory/folder: %UserName%\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar 5. Replace this empty file with a real shortcut to your actual file/executable/shortcut/link/URL/etc. You must rename your newly created shortcut to match exactly the already pinned file name shortcut (if any)! 6. Force Taskbar icons to refresh: Task Manager -> restart Windows (File) Explorer, log/sign back in, or restart/reboot Windows. * Repair/customize Pin to Taskbar function + add more file types to the Pin to Taskbar right-click menu: TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK to all prompts to register/merge/import its information into your registry. -----Begin cut & paste here----- REGEDIT4 [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{90AA3A4E-1CBA-4233-B8BB-535773D48449}] @="Taskband Pin" "ImplementsVerbs"="taskbarpin;taskbarunpin" [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{90AA3A4E-1CBA-4233-B8BB-535773D48449}\InProcServer32] @=hex(2):25,53,79,73,74,65,6d,52,6f,6f,74,25,5c,73,79,73,74,65,6d,33,32,5c,73,\ 68,65,6c,6c,33,32,2e,64,6c,6c,00 "ThreadingModel"="Apartment" [HKEY_LOCAL_MACHINE\Software\Classes\*\shellex\ContextMenuHandlers\{90AA3A4E-1CBA-4233-B8BB-535773D48449}] @="Taskband Pin" [HKEY_LOCAL_MACHINE\Software\Classes\.lnk\shellex\ContextMenuHandlers\{90AA3A4E-1CBA-4233-B8BB-535773D48449}] @="Taskband Pin" [HKEY_LOCAL_MACHINE\Software\Classes\lnkfile\shellex\ContextMenuHandlers\{90AA3A4E-1CBA-4233-B8BB-535773D48449}] @="Taskband Pin" [HKEY_LOCAL_MACHINE\Software\Classes\.bat\shellex\ContextMenuHandlers\{90AA3A4E-1CBA-4233-B8BB-535773D48449}] @="Taskband Pin" [HKEY_LOCAL_MACHINE\Software\Classes\batfile\shellex\ContextMenuHandlers\{90AA3A4E-1CBA-4233-B8BB-535773D48449}] @="Taskband Pin" [HKEY_LOCAL_MACHINE\Software\Classes\.cmd\shellex\ContextMenuHandlers\{90AA3A4E-1CBA-4233-B8BB-535773D48449}] @="Taskband Pin" [HKEY_LOCAL_MACHINE\Software\Classes\cmdfile\shellex\ContextMenuHandlers\{90AA3A4E-1CBA-4233-B8BB-535773D48449}] @="Taskband Pin" [HKEY_LOCAL_MACHINE\Software\Classes\.php\shellex\ContextMenuHandlers\{90AA3A4E-1CBA-4233-B8BB-535773D48449}] @="Taskband Pin" [HKEY_LOCAL_MACHINE\Software\Classes\phpfile\shellex\ContextMenuHandlers\{90AA3A4E-1CBA-4233-B8BB-535773D48449}] @="Taskband Pin" [HKEY_LOCAL_MACHINE\Software\Classes\.hta\shellex\ContextMenuHandlers\{90AA3A4E-1CBA-4233-B8BB-535773D48449}] @="Taskband Pin" [HKEY_LOCAL_MACHINE\Software\Classes\htafile\shellex\ContextMenuHandlers\{90AA3A4E-1CBA-4233-B8BB-535773D48449}] @="Taskband Pin" [HKEY_LOCAL_MACHINE\Software\Classes\.htt\shellex\ContextMenuHandlers\{90AA3A4E-1CBA-4233-B8BB-535773D48449}] @="Taskband Pin" [HKEY_LOCAL_MACHINE\Software\Classes\httfile\shellex\ContextMenuHandlers\{90AA3A4E-1CBA-4233-B8BB-535773D48449}] @="Taskband Pin" [HKEY_LOCAL_MACHINE\Software\Classes\.reg\shellex\ContextMenuHandlers\{90AA3A4E-1CBA-4233-B8BB-535773D48449}] @="Taskband Pin" [HKEY_LOCAL_MACHINE\Software\Classes\regfile\shellex\ContextMenuHandlers\{90AA3A4E-1CBA-4233-B8BB-535773D48449}] @="Taskband Pin" [HKEY_LOCAL_MACHINE\Software\Classes\.txt\shellex\ContextMenuHandlers\{90AA3A4E-1CBA-4233-B8BB-535773D48449}] @="Taskband Pin" [HKEY_LOCAL_MACHINE\Software\Classes\txtfile\shellex\ContextMenuHandlers\{90AA3A4E-1CBA-4233-B8BB-535773D48449}] @="Taskband Pin" [HKEY_LOCAL_MACHINE\Software\Classes\Directory\shellex\ContextMenuHandlers\{90AA3A4E-1CBA-4233-B8BB-535773D48449}] @="Taskband Pin" [HKEY_LOCAL_MACHINE\Software\Classes\Drive\shellex\ContextMenuHandlers\{90AA3A4E-1CBA-4233-B8BB-535773D48449}] @="Taskband Pin" [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\MSILink\shellex\ContextMenuHandlers\{90AA3A4E-1CBA-4233-B8BB-535773D48449}] @="Taskband Pin" ; ------End cut & paste here------ * Enable Pin to Taskbar/Start Menu right-click items for files/folders/items/links/shortcuts: http://www.sevenforums.com/tutorials/5547-taskbar-pinned-programs-enable-disable.html http://www.helpdeskgeek.com/windows-7/pin-to-taskbar-missing-in-windows-7/ TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK to all prompts to register/merge/import its information into your registry. -----Begin cut & paste here----- REGEDIT4 [HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Explorer] "NoPinningToTaskbar"=- "TaskbarNoPinnedList"=- [HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Explorer] "NoPinningToTaskbar"=- "TaskbarNoPinnedList"=- [HKEY_USERS\.DEFAULT\Software\Policies\Microsoft\Windows\Explorer] "NoPinningToTaskbar"=- "TaskbarNoPinnedList"=- ; ------End cut & paste here------ * Pin to Taskbar: Add to/remove from right-click context menu in Windows 7: http://www.sevenforums.com/tutorials/196235-pin-taskbar-add-remove-context-menu-windows-7-a.html * Pin an External Drive to Taskbar in Windows 7: http://www.howtogeek.com/howto/27903/how-to-pin-an-external-drive-to-the-windows-7-taskbar/ * Pin Special Items to Taskbar: http://www.digitalcitizen.life/how-pin-special-windows-shortcuts-taskbar/ ______________________________________________________________________________ XP -> 7/8/8.1 Easy Transfer Files + Settings * Default System + User(s) built-in/default/forced/hardwired/locked/preset "special" directories/folders (hard links = LDIDs) names, locations, equivalents + transition: Windows XP/2003 -> Windows Vista/2008/7/8/8.1/2012: http://en.wikipedia.org/wiki/Special_folder http://www.nirsoft.net/utils/special_folders_view.html http://social.technet.microsoft.com/wiki/contents/articles/6083.windows-xp-folders-and-locations-vs-windows-7-and-vista.aspx Most of these "special" directories/folders are valid, and can be found in Windows 10/2016/2019/11/2022/newer OSes. Default Windows NTx installation drive/partition/volume is C -> C:\ = root directory/folder. XP/2003: C:\Documents and Settings\All Users\Start Menu Vista/2008/7/8/8.1/2012: C:\ProgramData\Microsoft\Windows\Start Menu XP/2003: C:\Documents and Settings\%UserName%\Application Data\Microsoft\Internet Explorer\Quick Launch Vista/2008/7/8/8.1/2012: C:\Users\%UserName%\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch XP/2003: C:\Documents and Settings\All Users\Desktop Vista/2008/7/8/8.1/2012: C:\Users\Public\Desktop XP/2003: C:\Documents and Settings\All Users\Application Data\PROGRAM_NAME Vista/2008/7/8/8.1/2012: C:\ProgramData\PROGRAM_NAME XP/2003: C:\Documents and Settings\%UserName%\Application Data\PROGRAM_NAME Vista/2008/7/8/8.1/2012: C:\Users\%UserName%\AppData\Local\PROGRAM_NAME XP/2003: C:\Documents and Settings\All Users Vista/2008/7/8/8.1/2012: C:\ProgramData XP/2003: C:\Downloads Vista/2008/7/8/8.1/2012: C:\Users\%UserName%\Downloads XP/2003: C:\Users\%UserName%\Documents\My Pictures Vista/2008/7/8/8.1/2012: C:\Users\%UserName%\Pictures XP/2003: C:\Users\%UserName%\Documents\My Music Vista/2008/7/8/8.1/2012: C:\Users\%UserName%\Music XP/2003: C:\Documents and Settings\%UserName%\My Documents Vista/2008/7/8/8.1/2012: C:\Users\%UserName%\Documents XP/2003: C:\Documents and Settings\%UserName%\My Documents\My Music Vista/2008/7/8/8.1/2012: C:\Users\%UserName%\Music XP/2003: C:\Documents and Settings\%UserName%\My Documents\My Pictures Vista/2008/7/8/8.1/2012: C:\Users\%UserName%\Pictures XP/2003: C:\Documents and Settings\%UserName%\My Documents\My Videos Vista/2008/7/8/8.1/2012: C:\Users\%UserName%\Videos XP/2003: C:\Documents and Settings\%UserName%\Application Data Vista/2008/7/8/8.1/2012: C:\Users\%UserName%\AppData\Roaming XP/2003: C:\Documents and Settings\%UserName%\Local Settings Vista/2008/7/8/8.1/2012: C:\Users\%UserName%\Local XP/2003: C:\Documents and Settings\%UserName%\Start Menu Vista/2008/7/8/8.1/2012: C:\Users\%UserName%\AppData\Roaming\Microsoft\Windows\Start Menu XP/2003: C:\Documents and Settings\%UserName%\Templates Vista/2008/7/8/8.1/2012: C:\Users\%UserName%\AppData\Roaming\Microsoft\Windows\Templates XP/2003: C:\Documents and Settings\All Users\Start Menu Vista/2008/7/8/8.1/2012: C:\ProgramData\Microsoft\Windows\Start Menu XP/2003: C:\Documents and Settings\Default User Vista/2008/7/8/8.1/2012: C:\Users\Default See also "* Link Directory IDentifier (LDID)/DIRectory IDentifier (DIRID)/Decentralized IDentifier (DID)" + "* List of System + User Shell Folders in Windows Vista/newer:" topics in WINDOWS7.TXT (this file) further above: http://www.mdgx.com/7.php http://www.mdgx.com/WINDOWS7.TXT * Windows Easy Transfer (WET) from XP/Vista to 7 [and beyond...]: http://technet.microsoft.com/library/ff943667.aspx - WET 32-bit for XP 32-bit: http://www.microsoft.com/download/details.aspx?id=4503 - WET 64-bit for XP 64-bit: http://www.microsoft.com/download/details.aspx?id=9926 - WET 32-bit for Vista 32-bit: http://www.microsoft.com/download/details.aspx?id=14179 - WET 64-bit for Vista 64-bit: http://www.microsoft.com/download/details.aspx?id=20483 - WET 32-bit for XP 32-bit (x86) + WET 64-bit for XP 64-bit (x64): http://www.microsoft.com/download/details.aspx?id=7349 WET XP/Vista -> 7 Guide: http://petri.com/transfer-user-files-and-settings-from-windows-xpvista-to-windows-7/ http://www.howtogeek.com/howto/3179/migrate-xp-to-windows-7-with-easy-transfer-and-a-usb-drive/ * Windows XP to 7 Hard Link Migration (HLM) of User Files + Settings: http://www.microsoft.com/download/details.aspx?id=18913 HLM DOCument [DOC format, right-click to save]: http://download.microsoft.com/download/8/9/D/89DC758B-3E81-42F6-84E1-E3E9AD790196/Windows%20XP%20to%20Windows%207%20Hard-Link%20Migration%20of%20User%20Files%20and%20Settings.docx ______________________________________________________________________________ Turn OFF/ON Windows Features * Enable and Disable Windows Features in Windows XP/newer: http://www.helpdeskgeek.com/how-to/enable-and-disable-windows-features/ * Remove Windows Features You Don't Need: http://www.itprotoday.com/windows-7-tip-week-remove-windows-features-you-dont-need/ * Windows Features You Can Add or Remove: http://www.digitalcitizen.life/what-are-those-windows-features-you-can-add-or-remove/ * Turn Windows 7 Features ON or OFF: http://www.techsupportalert.com/content/how-turn-windows-7-features-or.htm ______________________________________________________________________________ Tweak Windows 7/7 SP1 Services * Disable/(re)enable, stop/(re)start, clean/repair/restore + customize/optimize/tweak Windows 7/newer interconnected/interdependent/interrelated services + drivers responsible for/contributing to/involved in/related to dangerous/insecure/unsafe, undesirable/unnecessary/unneeded/unused/useless, automatic/unattended behind-your-back/forced/hidden/intrusive/invasive/subversive/unwanted/without-your-consent, annoying/bloat/resources consuming, diagnostic tracking, telemetry ("phone home"), data collection/logging, customer "experience", unwanted "offers", ad(ware)/spyware/surveillance/tracking, privacy/safety/security flaws/vulnerabilities: View/(Re)Start/Stop/(Re)Enable/Disable, set to Disabled/Manual/Automatic Windows Services + Drivers -> Start button/icon/logo/menu/orb -> Run... [hold WinKey + press R] -> type this command services.msc -> press Enter -> (re)enable [Boot = 0, System = 1, Automatic (triggered) = 2, Automatic (Delayed Start) (triggered) = 2 or Manual (triggered) = 3], disable [Disabled = 4], customize/optimize/tweak Windows (User) Services + Drivers after learning about them -> continue reading... Services.msc is located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually C:\WINDOWS]. Management Saved Console (.msc) script files are associated by default with and executed by Microsoft Management Console (MMC.EXE) snap-in control tool, and most of them are located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually C:\WINDOWS]. http://en.wikipedia.org/wiki/Microsoft_Management_Console View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command PATH -> press Enter. RegEdit.exe: ************ http://learn.microsoft.com/troubleshoot/windows-server/performance/windows-registry-advanced-users/ http://www.ss64.com/nt/regedit.html http://www.mdgx.com/reg.htm#RER http://www.windowscentral.com/how-start-and-stop-services-windows-10/ Certain services Microsoft deems mandatory they should be enabled and running at all times because they may either affect proper functionality/operation [interconnected/interdependent/interrelated], or for their own purposes [see above for details], but which may not (always) align/coincide with your needs/preferences are locked + protected, and therefore they canNOT be stopped, disabled and/or modified/customized from within the services.msc interface due to Windows registry protection lockups, no matter your user level/privileges/rights, even if logged in as Administrator/Owner/Sysadmin/SYSTEM. In (most) such cases the most obvious solution is to do it by hand by using the Registry Editor (%WinDir%\RegEdit.exe) [%WinDir% = usually C:\WINDOWS]: Right-click RegEdit or its shortcut/link -> Run as Administrator -> go to this registry subkey: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services and then to this (backup copy) registry subkey: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services and then to this (backup copy) registry subkey (if present): HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services -> click left hand pane desired driver/service name registry subkey [example: DNSCache (DNS Client service)] (if present) -> double-click right hand pane "Start" DWORD [REG_DWORD] registry value -> change its numeric value to any integer number between 0 and 4 [see below for details] -> press OK -> exit RegEdit. http://mistyprojects.co.uk/documents/TinyPXEServer/files/img/regedit2.jpg http://cdn2.windowswally.com/wp-content/uploads/2015/09/RuntimeBroker.exe-Windows-10-regedit-TimeBroker-Windows-Wally.jpg Repeat same steps for all 3 registry subkeys above: CurrentControlSet, ControlSet001 + ControlSet002 (if present). "Start" valid registry DWORD [REG_DWORD] values: http://smallvoid.com/article/winnt-services-regedit.html - 0 [dword:00000000] = Boot; - 1 [dword:00000001] = System; - 2 [dword:00000002] = Automatic; - 3 [dword:00000003] = Manual; - 4 [dword:00000004] = Disabled. MDGx: "Comprehensive Windows Registry Guide" [Intro Chapter] in REGISTRY.TXT (included): http://www.mdgx.com/reg.htm#CWRG NET.EXE, NETSH.EXE, REG.EXE, SC.EXE + WMIC.EXE: *********************************************** Another option is to use (in combination or separately) these 5 Windows NTx DOS console command line tools: - Net(work) Resources Manager [NET.EXE]; http://learn.microsoft.com/troubleshoot/windows-server/networking/net-commands-on-operating-systems/ http://www.ss64.com/nt/net-service.html - Net(work) Sh(ell) [NETSH.EXE]; http://learn.microsoft.com/windows-server/networking/technologies/netsh/netsh-contexts/ http://learn.microsoft.com/windows-server/administration/windows-commands/netsh/ http://www.ss64.com/nt/netsh.html - Reg(istry) Editor + Manager [REG.EXE]; http://learn.microsoft.com/windows-server/administration/windows-commands/reg/ http://www.ss64.com/nt/reg.html http://www.mdgx.com/reg.htm#BNR - S(ervice) C(ontrol) [C(onfiguration)] [SC.EXE]; http://learn.microsoft.com/windows/win32/services/controlling-a-service-using-sc/ http://learn.microsoft.com/windows-server/administration/windows-commands/sc-config/ http://www.ss64.com/nt/sc.html - W(indows) M(anagement) I(nstrumentation) C(ommand) [WMIC.EXE]. http://learn.microsoft.com/windows/win32/wmisdk/wmic/ http://learn.microsoft.com/windows/win32/wmisdk/wmi-start-page/ http://www.ss64.com/nt/wmic.html WMIC has been deprecated starting with Windows 10 21H1, correspondent Windows Server 2022 + all newer builds/editions/releases/updates/versions: http://learn.microsoft.com/windows/whats-new/deprecated-features/ NOTES: ****** All these executables (.exe) require you to be logged on, or must be executed/run with elevated access/permissions/privileges/rights as Admin(istrator)/SYSTEM/Sysadmin: http://www.ss64.com/nt/syntax-elevate.html A. Temporary [per app(lication)/command/executable (.exe)/session] FIX: Windows Vista/newer users -> start a DOS console command prompt session [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator. OR Use an elevation tool separately for each individual app(lication)/command/executable (.exe)/session [free(ware) examples]: - AdvancedRun [AdvancedRun.exe] 32-bit + 64-bit GUI interface + DOS console command line tool for Windows Vista/newer 32-bit + 64-bit runs any app/batch/command/executable/function/process/program/script/service/task/tool as Administrator/SYSTEM/TrustedInstaller/any user with elevated/highest/protected privileges/rights, compatibility, environment, ownership, permissions, priority, properties, useful for task automation in BATch (.BAT), CoMmanD (.CMD) + Visual Basic Script (.VBS) files, highly customizable: http://www.nirsoft.net/utils/advanced_run.html AdvancedRun 64-bit: http://www.nirsoft.net/utils/advancedrun-x64.zip AdvancedRun 32-bit: http://www.nirsoft.net/utils/advancedrun.zip Run Programs as SYSTEM: http://www.winhelponline.com/blog/run-program-as-system-localsystem-account-windows/ Run Programs as TrustedInstaller: http://www.winhelponline.com/blog/run-program-as-trustedinstaller-locked-registry-keys-files/ - SetACL [SetACL.exe 32-bit + SetACL.exe 64-bit] 32-bit + 64-bit DOS console command line tool for Windows Vista/newer enables/disables/changes/elevates NTFS ACL permissions + ownership for local/remote files/(sub)directories, registry (sub)keys, devices/objects/services: http://helgeklein.com/setacl/ Download: http://helgeklein.com/download/#download-setacl SetACL Command Line Documentation: http://helgeklein.com/setacl/documentation/command-line-version-setacl-exe/ SetACL Examples: http://helgeklein.com/setacl/examples/ Wikipedia: SetACL: http://en.wikipedia.org/wiki/SetACL - Elevate [elevate.exe 32-bit + elevate.exe 64-bit] 1.3.0 32-bit + 64-bit DOS console command line tool runs any app/batch/command/executable/function/process/program/script/service/task/tool as Administrator with elevated/highest/protected privileges/rights, useful for task automation in BATch (.BAT), CoMmanD (.CMD) + Visual Basic Script (.VBS) files: http://code.kliu.org/misc/elevate/ File: http://code.kliu.org/misc/elevate/elevate-1.3.0-redist.7z - See also "NTFS ACL + OWNER" section in TOOLS.TXT (included): http://www.mdgx.com/tools.php http://www.mdgx.com/TOOLS.TXT B. Permanent (per local/network user) FIX: Disable User Account Control (UAC) in: - Windows 10/2016/2019/11/2022: http://www.tenforums.com/tutorials/3577-user-account-control-uac-change-settings-windows-10-a.html - Windows 8/2012/8.1/2012 R2: http://www.eightforums.com/tutorials/5509-user-account-control-uac-change-settings-windows-8-a.html - Windows 7/2008 R2: http://www.petri.com/disable-uac-in-windows-7/ - Windows Vista/2008: http://www.petri.com/disable_uac_in_windows_vista/ User Account Control (UAC) tweaking tools [free(ware)]: - UAC Pass: http://sites.google.com/site/freeavvarea/uac-pass/uac-pass/ - TweakUAC: http://www.winability.com/tweak-uac/ - Disable UAC: http://www.majorgeeks.com/files/details/disable_uac.html NET.EXE, NETSH.EXE, REG.EXE + SC.EXE executables (.exe) are located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually C:\WINDOWS]. WMIC.EXE executable (.exe) is located in the %WinDir%\SYSTEM32\WBEM directory/folder. View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command PATH -> press Enter. OR Save it to a plain text/ASCII (.txt) file: from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type same command above followed by the name of the file (in this example it will be saved in C:\ root) PATH>C:\Windows_PATH_Directories.txt -> press Enter -> use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to view text file contents. Example using same service above [DNSCache (DNS Client service)] -> stop + disable DNSCache service: From a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type these commands in this specific order ECHO Y|NET.EXE STOP DNSCache SC.EXE CONFIG DNSCache START= disabled REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\services\DNSCache" /v Start /t REG_DWORD /d 4 /f -> press Enter after each line. PowerShell.exe: *************** http://learn.microsoft.com/powershell/module/microsoft.powershell.management/set-service/ http://www.ss64.com/ps/powershell.html http://www.ss64.com/ps/ http://www.ss64.com/ps/set-service.html http://www.windowscentral.com/how-start-and-stop-services-windows-10/ PowerShell [%WinDir%\SYSTEM32\WindowsPowerShell\v1.0\PowerShell.exe] is a task automation + configuration manager command line shell environment + interpreter tool capable of using text/ASCII command line Script/BATch files (.ps1). http://en.wikipedia.org/wiki/PowerShell PowerShell requires Microsoft .NET Framework core + components, which are preinstalled on all Windows Vista/newer releases, and (usually) updated automatically via Windows Update (WU) service [WuauServ]: http://www.mdgx.com/add.htm#NFR PowerShell is a better, more advanced alternative to the standard DOS console CoMmanD line prompt interpreter tool [%WinDir%\SYSTEM32\CMD.EXE]. http://en.wikipedia.org/wiki/Cmd.exe Start + Stop Drivers + Services manually in Windows 7/newer -> "How to Manage Services from PowerShell" section: http://www.windowscentral.com/how-start-and-stop-services-windows-10/#section-how-to-manage-services-from-powershell Windows NTx Services + Drivers Information, Reference, Guidelines, Tutorials, Customization, Optimization: ********************************************************************************************************** - Windows 7 SP1 Services Configuration: http://www.blackviper.com/service-configurations/black-vipers-windows-7-service-pack-1-service-configurations/ - Windows 7 Services Configuration: http://www.blackviper.com/service-configurations/black-vipers-windows-7-service-configurations/ - Windows 7/7 SP1 Services: http://batcmd.com/windows/7/services/ - Windows 7/7 SP1 Service Defaults: http://revertservice.com/7/ - Windows Services Encyclopedia: http://www.windows-security.org/windows-services-encyclopedia/ - Windows 7/7 SP1: Disabling Unneeded Services: http://sourcedaddy.com/windows-7/disabling-unneeded-services.html - Restore Default Services in Windows 7/newer: http://www.majorgeeks.com/content/page/restore_or_verify_default_services_in_windows_7_10.html - Windows 8/8.1 Services: http://batcmd.com/windows/8/services/ - List of all Windows Services: http://www.blackviper.com/windows-services/ - List of all Running, Stopped + Disable Windows Services: http://www.thewindowsclub.com/extract-list-of-running-stopped-disabled-services/ - Windows 8.1 Services Configuration: http://www.blackviper.com/service-configurations/black-vipers-windows-8-1-service-configurations/ - Windows 8 Services Configuration: http://www.blackviper.com/service-configurations/black-vipers-windows-8-service-configurations/ - Windowss 7 Disable Unnecessary Services: http://sites.google.com/site/100pricin/speeding-up-your-pc/disable-unnecessary-services/ - Windows Vista SP2 Services Configuration: http://www.blackviper.com/service-configurations/black-vipers-windows-vista-service-pack-2-service-configurations/ - Windows XP SP3 Services Configuration: http://www.blackviper.com/WinXP/servicecfg.htm - Windows XP Services Guide: http://web.archive.org/web/20171129164138/http://www.theeldergeek.com/services_guide.htm - Windows XP Services Tweak Guide: http://www.techspot.com/tweaks/winxp_services/ - Windows XP Services Removal Guide: http://www.overclockersclub.com/guides/windows_xp_services/ - Windows 2000 SP4+ Services Configuration: http://www.blackviper.com/WIN2K/servicecfg.htm - Use Registry Editor to change Service state: http://smallvoid.com/article/winnt-services-regedit.html - Wikipedia: Windows Service: http://en.wikipedia.org/wiki/Windows_service - Wikipedia: List of Windows Services: http://en.wikipedia.org/wiki/List_of_Microsoft_Windows_components#Services Disable individual + interconnected/interdependent/interrelated services in groups +/- separately (if + where applicable): http://en.wikipedia.org/wiki/List_of_Microsoft_Windows_components#Services http://www.file.net/process/fmapp.exe.html http://teckangaroo.com/what-is-connected-devices-platform-service/ http://www.thewindowsclub.com/what-is-connected-devices-platform-service-cdpsvc/ http://appuals.com/what-is-the-connected-devices-platform-service-and-should-it-be-disabled/ http://learn.microsoft.com/previous-versions/windows/desktop/qos/link-layer-topology-discovery-protocol/ http://social.technet.microsoft.com/Forums/en-US/f933e03b-e157-4a1d-9916-8cfeb11ad2fc/ http://www.newnettechnologies.com/disable-windows-services.html http://www.poppelgaard.com/how-to-determine-usb-drivers-are-configured-correctly-on-the-online-plug-in/ See also: - MDGx "Windows 10/11 Tweaks, Fixes, Guides, Downloads + Links" -> "Tweak Windows 10/11 Services" chapter in WIN10.TXT (included): http://www.mdgx.com/10.php http://www.mdgx.com/WIN10.TXT - MDGx "HOSTS Files, Guides + Tools" -> "NOTE 2: DNS Client Service" -> "More info:": http://www.mdgx.com/hosts.php#N2 - MDGx "Windows NTx Services tweaking tools [free(ware)]" -> "SERVICES" section in TOOLS.TXT (included): http://www.mdgx.com/tools.php http://www.mdgx.com/TOOLS.TXT * Autoruns 32-bit + 64-bit GUI interface (Autoruns.exe 32-bit + Autoruns64.exe 64-bit) + DOS console command line (Autorunsc.exe 32-bit + Autorunsc64.exe 64-bit) registry + startup tools add/disable/edit/enable/rename/remove any/all automated/built-in/default/forced/hardwired/locked/preset/unattended (auto)load/(auto)run entries: boot/logon/startup apps, drivers, executables (.exe), gadgets (.gadget), loading/registered APIs/DLLs (.dll), programs, services, scripts (.bat, .cmd, .reg, .vbs, etc), scheduled tasks (.job), highly customizable: http://learn.microsoft.com/sysinternals/downloads/autoruns/ File: http://download.sysinternals.com/files/Autoruns.zip * ServiWin 32-bit + 64-bit displays, stops/(re)starts, pauses/continues + disables/(re)enables Windows services + drivers: http://www.nirsoft.net/utils/serviwin.html ServiWin 64-bit: http://www.nirsoft.net/utils/serviwin-x64.zip ServiWin 32-bit: http://www.nirsoft.net/utils/serviwin.zip Create complete Drivers + Services HTML Report(s): ServiWin -> Help -> Run As Administrator [or hold Ctrl + press F11] -> View -> HTML Report - All Items. * Windows Service Master (WSM) displays, stops/(re)starts, + uninstalls Windows services + drivers: http://www.itsamples.com/windows-service-master.html File: http://www.itsamples.com/downloads/windows-service-master.zip * Easy Service Optimizer (ESO) disables/stops unneeded/unnecessary/bloat services: http://www.sordum.org/8637/ File: http://www.sordum.org/files/easy-service-optimizer/eso.zip * SrvMan 32-bit + 64-bit command line + front end GUI interface changes/creates/deletes Windows services + drivers: http://sysprogs.com/legacy/tools/srvman/ File: http://sysprogs.com/getfile/411/srvman-1.0.7z * Mz Services Manager 32-bit + 64-bit: http://www.mztweak.com/mzservicesmanager.html File: http://www.mztweak.com/download/mzservices.exe * To tweak all available Windows services depending on your installed Windows NTx OS build/edition/release/update/version + bit strength [32-bit (x86) or 64-bit (x64)]: right-click on SERVICES.HTA (included) http://www.mdgx.com/SERVICES.HTA -> Run as Administrator [will open by default in Internet Explorer (IE) web browser] -> scroll down the list -> tweak available (listed) services: Automatic, Manual (Demand) or Disabled -> click "Save Changes" button. To view a list of all running Windows services from within SERVICES.HTA: click "View SERV_LOG.TXT" button (will be saved by default in the same directory/folder where SERVICES.HTA resides) -> double-click on SERV_LOG.TXT -> will open in your Notepad/similar/better plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT associated with text (.txt) files as default program. HTML Application (HTA): http://en.wikipedia.org/wiki/HTML_Application MDGx SERVICES.HTA = based on JSWare XPFix XPFixServ.hta script: http://www.jsware.net/jsware/xpfix.php5 XPFix (freeware): http://www.jsware.net/jsware/zips/fixpack.zip * Save/view/print different types of lists + details for all/enabled/running/specific Windows Services from a DOS console or PowerShell command line, and these tasks can be automated by running them as Administrator from within plain text BATch (.bat) or CoMmanD (.cmd) script files: http://learn.microsoft.com/powershell/module/microsoft.powershell.management/get-service/ http://www.shellhacks.com/windows-list-services-cmd-powershell/ http://www.thewindowsclub.com/extract-list-of-running-stopped-disabled-services/ http://serverfault.com/questions/203471/ Save your list(s) + details for all your enabled/disabled/manual/running/stopped services to text file(s) from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run these commands -> press Enter after each line (examples): NET.EXE START>SVC_STARTED.TXT WMIC.EXE SERVICE list full /format:list>SVC_FULL.TXT WMIC.EXE SERVICE list>SVC_LIST.TXT WMIC.EXE path Win32_Service where state='Running' get /format:csv>SVC_LIST.CSV TASKLIST.EXE /SVC /FI "imagename eq svchost.exe">SVC_HOST.TXT TASKLIST.EXE /SVC | FIND.EXE "svchost.exe">SVC_HOST2.TXT TASKLIST.EXE /SVC>SVC_TASK.TXT SC.EXE QUERY state= all|FINDSTR.EXE "DISPLAY_NAME STATE">SVC_STATE.TXT SC.EXE QUERY type= service>SVC_ALL.TXT WMIC.exe is located in the %WinDir%\SYSTEM32\wbem directory/folder [%WinDir% = usually C:\WINDOWS], listed on your system PATH. View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command PATH -> press Enter. WMIC (Windows Management Instrumentation Command): http://learn.microsoft.com/windows/win32/wmisdk/wmic/ MS DOCs: WMIC: http://technet.microsoft.com/library/bb742610.aspx Dedoimedo: WMIC - The Windows secret weapon: http://www.dedoimedo.com/computers/windows-wmic.html ComputerHope: WMIC: http://www.computerhope.com/wmic.htm Rob van der Woude: WMIC: http://www.robvanderwoude.com/wmic.php quux: WMIC Snippets: http://quux.wiki.zoho.com/WMIC-Snippets.html SS64: WMIC.EXE: http://www.ss64.com/nt/wmic.html Wikipedia: WMI: http://en.wikipedia.org/wiki/Windows_Management_Instrumentation You can also use PowerShell commands: right-click PowerShell shortcut or C:\WINDOWS\System32\WindowsPowerShell\v1.0\PowerShell.exe [default location] -> Run as Administrator -> type these commands (examples) Get-Service | Where-Object {$_.Status -eq "Running"} | Out-File -filepath "SVC_RUNNING.TXT" Get-Service | Where {$_.Status -eq "Running"} | Export-Csv -path "SVC_RUNNING.CSV" Get-WmiObject win32_service | select Name, DisplayName, State, PathName | Export-Csv -path "SVC_RUN.CSV" -> press Enter after each line. All text files above will be saved by default in the directory/folder you're running these executables or DOS/PowerShell consoles from, unless you've specified a different/specific destination. To change destination you need to add the full path (drive letter + directory/folder name) in front of each text file (C:\Services used in this example): NET.EXE START>C:\Services\SVC_STARTED.TXT View all these ANSI/Unicode text files using Notepad/similar/better free(ware) plain text/ASCII editor/viewer: http://www.mdgx.com/toy.htm#TXT * Turn OFF Windows Enterprise Vista/newer + Windows Server 2008/newer BranchCache [PeerDistSvc] service used only for Wide Area Network (WAN) bandwidth optimization if not deploying/maintaining/running/servicing a WAN network hosted on, or from your business/enterprise/personal/private computer(s)/server(s): http://learn.microsoft.com/windows-server/networking/branchcache/branchcache/ http://learn.microsoft.com/windows-server/networking/core-network-guide/cncg/bc-hcm/1-deploy-bc-hcm/ http://searchenterprisedesktop.techtarget.com/definition/Microsoft-Windows-BranchCache/ http://en.wikipedia.org/wiki/Wide_area_network Disable BranchCache [PeerDistSvc] service from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run these commands -> press Enter after each line: ECHO Y|NET.EXE STOP PeerDistSvc SC.EXE CONFIG PeerDistSvc START= disabled OR: TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK to all prompts to register/merge/import its information into your registry. -----Begin cut & paste here----- REGEDIT4 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\PeerDistSvc] "Start"=dword:4 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\PeerDistSvc] "Start"=dword:4 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\PeerDistSvc] "Start"=dword:4 ; ------End cut & paste here------ ______________________________________________________________________________ Turn OFF Action/Security Center + Notifications/Messages * See also "* Turn OFF Windows 10/11 Push Notification Services (WNS) [WpnService + WpnUserService], automatic install, Action Center" topic under "Turn OFF/Remove Windows 10 Adware, Spyware, Security Flaws + Repair/Restore Privacy" chapter in WIN10.TXT (included): http://www.mdgx.com/10.php http://www.mdgx.com/WIN10.TXT Most of those tweaks apply to Windows 7/8/8.1. * Turn OFF/stop/disable Windows Security Center (WSC) service [wscsvc] from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run these commands -> press Enter after each line: ECHO Y|NET.EXE STOP wscsvc SC.EXE CONFIG wscsvc START= disabled REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\services\wscsvc" /v Start /t REG_DWORD /d 4 /f * Turn OFF Action/Defender/Security Center + annoying balloon tips/security/taskbar/tile/toast notifications/messages/pop-ups in Windows 7/newer: http://www.tenforums.com/tutorials/105486-enable-disable-notifications-windows-security-windows-10-a.html http://www.heelpbook.net/2019/windows-10-disable-notifications-and-notifications-balloons/ http://www.techrepublic.com/article/how-to-change-windows-10-toast-notifications-into-balloon-notifications/ http://www.askvg.com/secret-trick-to-disable-turn-off-annoying-feature-advertisement-balloon-notifications-in-windows-7/ http://admx.help/?Category=Windows_10_2016&Policy=Microsoft.Policies.TaskBar2::TaskbarNoNotification http://www.groovypost.com/howto/windows-8-7-disable-notification-balloons-taskbar/ http://www.howtogeek.com/howto/windows-vista/disable-all-notification-balloons-in-windows-vista/ http://www.heelpbook.net/2019/windows-10-disable-notifications-and-notifications-balloons/ http://www.technorms.com/24581/ http://smallvoid.com/article/winnt-balloon-tip.html http://superuser.com/questions/883745/ http://social.technet.microsoft.com/forums/en-us/c5b66543-5b2f-4399-946a-bbd4fa4baccc/ TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK to all prompts to register/merge/import its information into your registry. -----Begin cut & paste here----- REGEDIT4 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer] "DisableActionCenter"=dword:1 "DisableNotificationCenter"=dword:1 "DisableSearchBoxSuggestions"=dword:1 [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer] "DisableActionCenter"=dword:1 "DisableNotificationCenter"=dword:1 "DisableSearchBoxSuggestions"=dword:1 [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer] "DisableActionCenter"=dword:1 "DisableNotificationCenter"=dword:1 "DisableSearchBoxSuggestions"=dword:1 [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Explorer] "DisableActionCenter"=dword:1 "DisableNotificationCenter"=dword:1 "DisableSearchBoxSuggestions"=dword:1 "HideSCAHealth"=dword:1 [HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Explorer] "DisableActionCenter"=dword:1 "DisableNotificationCenter"=dword:1 "DisableSearchBoxSuggestions"=dword:1 "HideSCAHealth"=dword:1 [HKEY_USERS\.DEFAULT\Software\Policies\Microsoft\Windows\Explorer] "DisableActionCenter"=dword:1 "DisableNotificationCenter"=dword:1 "DisableSearchBoxSuggestions"=dword:1 "HideSCAHealth"=dword:1 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer] "HideSCAHealth"=dword:1 [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer] "HideSCAHealth"=dword:1 [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer] "HideSCAHealth"=dword:1 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Svc] "AntiVirusDisableNotify"=dword:1 "FirewallDisableNotify"=dword:1 "UpdatesDisableNotify"=dword:1 [HKEY_CURRENT_USER\Software\Microsoft\Security Center\Svc] "AntiVirusDisableNotify"=dword:1 "FirewallDisableNotify"=dword:1 "UpdatesDisableNotify"=dword:1 [HKEY_USERS\.DEFAULT\Software\Microsoft\Security Center\Svc] "AntiVirusDisableNotify"=dword:1 "FirewallDisableNotify"=dword:1 "UpdatesDisableNotify"=dword:1 [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications] "DisableEnhancedNotifications"=dword:1 [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ImmersiveShell] "UseActionCenterExperience"=dword:0 [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\CloudContent] "DisableSoftLanding"=dword:1 [HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Explorer] "EnableLegacyBalloonNotifications"=dword:1 "NoBalloonFeatureAdvertisements"=dword:1 [HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Explorer] "EnableLegacyBalloonNotifications"=dword:1 "NoBalloonFeatureAdvertisements"=dword:1 [HKEY_USERS\.DEFAULT\Software\Policies\Microsoft\Windows\Explorer] "EnableLegacyBalloonNotifications"=dword:1 "NoBalloonFeatureAdvertisements"=dword:1 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer] "TaskbarNoNotification"=dword:0 [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer] "TaskbarNoNotification"=dword:0 [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer] "TaskbarNoNotification"=dword:0 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced] "EnableBalloonTips"=dword:0 [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced] "EnableBalloonTips"=dword:0 [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced] "EnableBalloonTips"=dword:0 ; ------End cut & paste here------ * Turn ON Balloon Tips Taskbar Notifications/Messages in Windows 7/newer: http://smallvoid.com/article/winnt-balloon-tip.html TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK to all prompts to register/merge/import its information into your registry. -----Begin cut & paste here----- REGEDIT4 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced] "EnableBalloonTips"=dword:1 [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced] "EnableBalloonTips"=dword:1 [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced] "EnableBalloonTips"=dword:1 ; ------End cut & paste here------ * Turn OFF all Action/Security Center (Automatic/Scheduled Maintenance) annoying check boxes/messages/notifications/pop-ups in Windows 7/newer: http://technet.microsoft.com/library/dd492018.aspx http://learn.microsoft.com/previous-versions/technet-magazine/images/dd492018.alerts3.jpg.jpg http://social.technet.microsoft.com/forums/en-us/w7itproui/thread/83dc3de6-70b7-450f-992c-60511e4a6c4f/ http://www.winaero.com/blog/registry-tweak-to-disable-action-center-notifications-in-windows-7/ http://www.thewindowsclub.com/automatic-maintenance-windows-8/ http://www.winhelponline.com/blog/automatic-maintenance-disable-schedule-windows-8-10/ http://www.hongkiat.com/blog/windows-action-center-message/ http://www.thewindowsclub.com/turn-off-security-and-maintenance-messages-in-windows-10/ http://www.tenforums.com/tutorials/40161-manually-start-stop-automatic-maintenance-windows-10-a.html http://thegeekpage.com/manually-start-and-disable-automatic-maintenance-in-windows-10/ http://www.makeuseof.com/how-to-fix-windows-unable-to-run-automatic-maintenance-error/ http://www.isunshare.com/windows-10/turn-security-and-maintenance-messages-off-or-on-in-windows-10.html Turn OFF/stop all automatic/scheduled maintenance + security actions/functions/tasks from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command: MSchedExe.exe Stop -> press Enter. MicroSoft Schedule Executable (Automatic Maintenance) tool [MSchedExe.exe] is located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually C:\WINDOWS]. View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command PATH -> press Enter. Start -> Control Panel (CP) or Run... [hold WinKey + press R] -> type this command control -> press Enter -> Action Center -> Maintenance -> right hand down arrow -> Automatic Maintenance -> Turn on messages about Automatic Maintenance -> Change maintenance settings -> UNcheck "Allow scheduled maintenanace to wake up my computer at the scheduled time" box -> Action Center -> Change Action Center settings -> Maintenance messages -> UNcheck "Automatic Maintenance" box -> OK. Start -> Control Panel (CP) or Run... [hold WinKey + press R] -> type this command control -> press Enter -> System and Security category -> Security and Maintenance -> Change Security and Maintenance settings -> Turn messages on or off -> UNcheck all available (colored in black) Security messages and Maintenance messages boxes [unfortunately some are unavailable/grayed out depending on specific OSes/policies/settings/restrictions ;-(] -> OK. TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK to all prompts to register/merge/import its information into your registry. -----Begin cut & paste here----- REGEDIT4 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\Maintenance] "MaintenanceDisabled"=dword:1 [-HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Action Center] [-HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center] [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{01979c6a-42fa-414c-b8aa-eee2c8202018}.check.100] "CheckSetting"=hex:01,00,00,00,d0,8c,9d,df,01,15,d1,11,8c,7a,00,c0,4f,c2,97,eb,\ 01,00,00,00,a1,83,01,f4,91,88,0b,41,99,d1,cd,6e,b8,2a,4c,5d,00,00,00,00,02,\ 00,00,00,00,00,10,66,00,00,00,01,00,00,20,00,00,00,e2,97,b6,5b,6f,60,f3,7b,\ cf,53,6b,b5,dd,de,0c,32,fb,f9,f1,c9,a8,85,75,4e,23,ce,3e,a7,8d,0e,21,cf,00,\ 00,00,00,0e,80,00,00,00,02,00,00,20,00,00,00,9b,6b,77,a4,52,21,2c,5e,09,d6,\ 47,f4,f5,02,52,bc,79,e8,ce,e2,7e,71,31,32,a3,15,6a,c0,4d,bf,d3,1e,b0,00,00,\ 00,9e,cc,3b,5a,c9,eb,a5,6b,aa,3b,f5,05,22,45,bd,ac,7d,03,ce,1b,58,ea,69,30,\ ed,81,64,17,75,c5,ea,ea,04,51,ad,cb,bf,a3,e8,f8,f4,0b,f1,ed,49,db,04,ce,eb,\ c0,da,d7,7e,bb,d6,81,86,66,23,70,b3,30,9c,5b,53,70,c6,04,d4,5a,67,39,27,4b,\ 7c,43,14,74,72,38,95,aa,53,1c,af,5d,44,42,61,09,27,01,14,54,b3,d8,f5,e5,d1,\ 5c,65,96,23,50,65,35,66,65,9a,e3,da,af,a4,73,e6,0d,39,17,87,4d,1a,40,67,df,\ f9,51,ef,00,c5,63,d6,01,24,be,43,80,1c,b9,e2,92,dd,7a,e5,8e,5e,45,80,da,a7,\ 22,c8,65,85,04,0e,6d,1d,4b,44,99,52,70,a3,13,e1,d4,bd,da,8a,b0,27,31,5f,f2,\ 29,fb,40,00,00,00,0f,e8,43,32,cd,b1,1d,1d,fa,34,dd,6b,08,25,af,42,62,02,b9,\ b7,fe,61,ec,60,98,37,23,8e,46,d9,b9,4f,56,dd,21,be,99,8f,5f,03,dc,e4,2d,81,\ 21,95,78,8c,2f,08,d2,4e,cc,27,9d,3f,1e,07,f2,fa,3c,72,8b,11 [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{01979c6a-42fa-414c-b8aa-eee2c8202018}.check.101] [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{11CD958A-C507-4EF3-B3F2-5FD9DFBD2C78}.check.101] [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{852FB1F8-5CC6-4567-9C0E-7C330F8807C2}.check.100] "CheckSetting"=hex:23,00,41,00,43,00,42,00,6c,00,6f,00,62,00,00,00,00,00,00,00,\ 00,00,00,00,01,00,00,00,00,00,00,00,00,00,00,00 [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{852FB1F8-5CC6-4567-9C0E-7C330F8807C2}.check.101] "CheckSetting"=hex:23,00,41,00,43,00,42,00,6c,00,6f,00,62,00,00,00,00,00,00,00,\ 00,00,00,00,01,00,00,00,00,00,00,00,00,00,00,00 [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{945a8954-c147-4acd-923f-40c45405a658}.check.42] "CheckSetting"=hex:01,00,00,00,d0,8c,9d,df,01,15,d1,11,8c,7a,00,c0,4f,c2,97,eb,\ 01,00,00,00,a1,83,01,f4,91,88,0b,41,99,d1,cd,6e,b8,2a,4c,5d,00,00,00,00,02,\ 00,00,00,00,00,10,66,00,00,00,01,00,00,20,00,00,00,19,0e,64,43,a7,00,37,cc,\ 24,94,48,4a,2f,79,3f,13,dc,b3,c1,11,80,fe,61,e4,1b,6b,dd,9b,41,f7,7e,03,00,\ 00,00,00,0e,80,00,00,00,02,00,00,20,00,00,00,ea,0c,21,40,a1,54,3d,98,be,f1,\ ed,1f,99,a2,ba,63,23,41,ea,e8,a3,43,8d,ae,e8,8c,4f,d4,e8,3a,8a,26,30,00,00,\ 00,b1,00,f7,23,f2,4d,60,8d,f0,b1,6e,f1,6e,b5,c9,78,4f,ed,14,7f,5c,de,4c,e4,\ 04,1e,7e,75,b9,06,91,1d,90,50,7f,9a,ea,af,ed,80,76,e5,2b,72,18,b6,2d,1c,40,\ 00,00,00,90,5e,71,72,21,df,fd,63,3a,5b,ad,c8,fb,3d,64,54,3c,a3,2b,e6,c0,df,\ 24,c0,77,73,8b,11,9c,41,8e,0b,fe,a6,8c,53,d7,6b,88,e8,f2,b0,38,32,b2,7f,dd,\ 4f,cc,97,2d,0d,7a,27,6a,c5,7b,6d,8c,26,e0,46,17,24 [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{A5268B8E-7DB5-465b-BAB7-BDCDA39A394A}.check.100] "CheckSetting"=hex:01,00,00,00,d0,8c,9d,df,01,15,d1,11,8c,7a,00,c0,4f,c2,97,eb,\ 01,00,00,00,a1,83,01,f4,91,88,0b,41,99,d1,cd,6e,b8,2a,4c,5d,00,00,00,00,02,\ 00,00,00,00,00,10,66,00,00,00,01,00,00,20,00,00,00,ee,7c,38,98,5d,96,3f,0e,\ 57,4f,ff,44,e3,44,cc,7f,44,aa,43,a7,dd,0d,e4,9f,43,4c,4a,89,bd,9e,d6,70,00,\ 00,00,00,0e,80,00,00,00,02,00,00,20,00,00,00,50,ca,d8,2e,60,f7,f0,7d,ac,7c,\ ea,2c,ca,42,fb,5e,1d,d3,aa,8c,b2,04,3f,3c,b4,ab,71,e6,fc,ca,e9,c3,30,00,00,\ 00,4a,a2,2c,d5,41,4b,db,ce,12,a4,d4,09,46,93,dc,56,cd,de,1e,a6,7c,96,ec,89,\ a5,58,6c,75,2c,1d,26,de,07,11,0e,78,92,38,53,2c,d7,29,1b,f4,7d,8c,a7,5f,40,\ 00,00,00,0b,53,d6,4e,ed,cf,f0,45,61,82,6a,a8,43,61,68,45,b9,db,b7,66,e7,bc,\ be,cb,de,61,47,7c,87,78,6d,86,02,9f,55,c4,79,d1,23,af,5d,02,98,8a,2e,1e,90,\ 97,1d,7b,5e,89,05,0c,8e,e8,1e,27,b9,bb,8a,7b,72,db [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.check.0] "CheckSetting"=hex:01,00,00,00,d0,8c,9d,df,01,15,d1,11,8c,7a,00,c0,4f,c2,97,eb,\ 01,00,00,00,a1,83,01,f4,91,88,0b,41,99,d1,cd,6e,b8,2a,4c,5d,00,00,00,00,02,\ 00,00,00,00,00,10,66,00,00,00,01,00,00,20,00,00,00,d4,9a,ac,e0,26,2d,59,a0,\ 0a,44,ef,45,da,f6,cc,32,29,96,0a,a8,78,16,aa,3f,b4,47,af,75,7c,3f,1c,3b,00,\ 00,00,00,0e,80,00,00,00,02,00,00,20,00,00,00,9a,86,a6,87,00,84,58,01,25,5b,\ 79,f0,c8,c8,f1,85,9e,8f,f9,87,7b,81,69,df,28,1d,3f,d5,b1,c3,81,df,30,00,00,\ 00,5e,7d,46,e7,14,df,a6,d2,f2,6c,78,be,ab,97,b5,fd,89,56,2d,a5,4f,56,60,f5,\ f6,db,18,dd,23,62,38,cc,79,c3,28,70,42,52,19,34,e0,19,5b,3a,ff,c3,cb,d4,40,\ 00,00,00,3a,2d,33,0c,59,9c,3d,e5,83,74,b4,dc,a8,49,38,44,aa,45,00,5b,7a,e0,\ 20,88,d3,67,8b,e5,48,d7,e9,79,10,0b,03,1e,ab,54,1f,24,a1,2f,0a,d3,8d,d5,36,\ c0,45,7f,f9,55,43,71,53,d0,33,9e,cd,86,25,2c,6d,13 [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{DAB69A6A-4D2A-4D44-94BF-E0091898C881}.check.100] [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.100] "CheckSetting"=hex:01,00,00,00,d0,8c,9d,df,01,15,d1,11,8c,7a,00,c0,4f,c2,97,eb,\ 01,00,00,00,a1,83,01,f4,91,88,0b,41,99,d1,cd,6e,b8,2a,4c,5d,00,00,00,00,02,\ 00,00,00,00,00,10,66,00,00,00,01,00,00,20,00,00,00,93,86,7f,88,25,8c,28,ff,\ 12,39,7f,42,77,8e,46,d5,59,5b,a4,76,35,19,c7,87,98,10,b1,82,de,41,1d,30,00,\ 00,00,00,0e,80,00,00,00,02,00,00,20,00,00,00,fd,b3,73,53,df,86,fc,a7,27,47,\ 7b,88,c9,d2,c5,45,b4,ac,59,79,8a,0a,4d,ce,86,c4,55,fc,ee,47,d0,87,c0,00,00,\ 00,4a,f1,21,2f,78,91,0f,ac,18,54,e3,d8,ae,54,9a,af,62,c1,bd,57,2e,b4,a7,a3,\ 18,c0,8c,32,97,2c,f4,c9,2e,99,ad,86,6b,a4,12,3d,c3,87,ad,cb,30,0a,29,a9,db,\ 8e,f3,77,f7,e9,c2,9c,b6,dc,f5,78,64,50,b7,b3,32,24,4e,51,c7,73,8e,a9,0d,e1,\ 0c,12,ee,23,7d,0c,b0,a2,5f,88,5d,2c,f1,67,12,78,f2,04,10,95,b1,bc,c2,c2,b3,\ 4e,c7,78,33,ba,6d,ad,0e,58,ca,df,d4,40,f5,0c,33,dd,40,0d,fa,0e,5c,28,9a,ef,\ e4,e9,c1,98,e3,af,3e,c1,de,8a,7d,f0,51,0d,d1,0d,69,da,b9,a2,8d,a1,e6,27,b6,\ 92,f9,25,8c,e1,90,1f,88,c9,37,c6,2e,b6,c3,3a,75,29,bf,b1,d3,b6,1e,ed,25,ec,\ 6b,66,15,0f,0d,a8,b5,3e,fe,0b,f8,bd,2a,9b,7b,da,f6,d7,40,00,00,00,b0,72,34,\ cc,3e,fa,f5,30,42,1f,49,ee,f9,5b,46,06,9f,d1,42,3d,44,71,56,31,8c,d4,e1,bb,\ 56,ae,45,d4,4d,c9,f2,09,3f,74,38,5e,d2,f4,7e,dc,04,14,fd,d5,fc,70,c4,5c,10,\ 1a,ac,1f,61,64,5a,45,fb,db,d4,ec [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.101] "CheckSetting"=hex:01,00,00,00,d0,8c,9d,df,01,15,d1,11,8c,7a,00,c0,4f,c2,97,eb,\ 01,00,00,00,a1,83,01,f4,91,88,0b,41,99,d1,cd,6e,b8,2a,4c,5d,00,00,00,00,02,\ 00,00,00,00,00,10,66,00,00,00,01,00,00,20,00,00,00,dd,2a,0c,dd,13,91,60,6a,\ a9,97,de,a5,ba,bc,51,67,76,55,d5,7e,a3,37,3b,b1,5a,1c,b2,f3,92,6d,42,fb,00,\ 00,00,00,0e,80,00,00,00,02,00,00,20,00,00,00,df,a7,27,7a,99,16,f0,64,e5,67,\ 92,ba,2b,ff,20,28,4b,8a,ee,ad,de,f3,60,2d,a4,a1,51,91,ac,c9,78,c6,30,00,00,\ 00,ae,25,b6,95,e6,50,f1,eb,62,51,42,3e,2c,b0,3d,cc,52,a7,af,ca,76,8d,20,94,\ bc,23,67,6b,21,ad,f3,cd,76,13,77,07,44,24,70,34,d9,2c,f6,69,51,26,e9,59,40,\ 00,00,00,dd,dc,47,be,c7,2a,60,af,73,88,c1,1a,17,cd,fd,c8,bb,ba,b1,83,41,d9,\ 83,7b,e2,e1,02,3e,98,82,68,da,b4,33,08,19,8a,d6,52,57,89,72,eb,71,49,26,b1,\ b0,e9,79,0b,d2,8e,d8,6c,25,ca,e2,6c,e5,95,48,1e,11 [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.102] "CheckSetting"=hex:01,00,00,00,d0,8c,9d,df,01,15,d1,11,8c,7a,00,c0,4f,c2,97,eb,\ 01,00,00,00,a1,83,01,f4,91,88,0b,41,99,d1,cd,6e,b8,2a,4c,5d,00,00,00,00,02,\ 00,00,00,00,00,10,66,00,00,00,01,00,00,20,00,00,00,50,43,6c,78,43,64,b3,b1,\ 27,00,50,6a,2b,4b,af,34,d0,fc,8e,5f,21,3f,cd,e8,f2,7b,e4,00,68,18,68,50,00,\ 00,00,00,0e,80,00,00,00,02,00,00,20,00,00,00,20,5c,4c,a9,2d,ca,57,f5,03,b7,\ 7a,bd,40,93,cb,57,5c,1b,22,3b,be,e3,2e,ac,42,05,b3,db,2d,0e,c8,3f,c0,00,00,\ 00,07,a8,4e,ed,97,93,7e,ce,82,0b,ff,c9,15,cd,88,1d,cc,5a,7d,c7,6e,9a,c8,5e,\ c1,7b,ca,b1,be,dd,8b,44,b2,93,06,6f,7a,24,91,42,79,af,25,57,84,27,bd,65,83,\ ff,e4,a9,bd,22,fe,88,70,b1,98,a8,29,f7,ef,e4,b8,00,77,16,28,76,4e,77,04,93,\ e5,42,b3,f1,06,2a,0c,66,29,b9,7f,55,18,68,ac,44,c9,94,10,80,5a,e2,06,0e,4c,\ e6,72,0e,e2,41,8a,86,b8,64,bb,1e,84,20,35,11,d9,ac,22,d5,40,c3,38,74,cf,39,\ 18,5d,d0,8f,dc,c0,1c,56,9e,f5,71,40,af,2c,9e,a5,0e,64,18,fb,6c,87,14,72,a3,\ 26,de,70,da,7c,89,88,1e,5d,d7,eb,1f,a0,8e,e0,54,b4,6f,71,d3,ec,c7,03,dd,93,\ df,56,01,c0,a2,02,bd,94,13,77,d9,e9,43,5a,8c,a8,58,54,40,00,00,00,9a,80,b6,\ 56,38,cb,d9,d0,3f,35,bd,3e,80,7f,1c,3e,a0,55,8c,b8,86,97,cd,37,e6,15,3a,be,\ 92,6c,0d,2d,d5,6c,f2,fe,fe,be,85,5e,61,38,2c,df,ea,95,20,71,6b,54,a1,64,c2,\ ab,55,4a,9f,02,95,62,0c,db,2c,d0 [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.103] "CheckSetting"=hex:01,00,00,00,d0,8c,9d,df,01,15,d1,11,8c,7a,00,c0,4f,c2,97,eb,\ 01,00,00,00,a1,83,01,f4,91,88,0b,41,99,d1,cd,6e,b8,2a,4c,5d,00,00,00,00,02,\ 00,00,00,00,00,10,66,00,00,00,01,00,00,20,00,00,00,4d,55,53,40,ef,8f,10,36,\ 39,ae,1c,0d,10,f9,80,c8,20,3e,b9,0d,ff,84,8e,2e,36,85,de,cf,45,17,6c,1d,00,\ 00,00,00,0e,80,00,00,00,02,00,00,20,00,00,00,f9,93,5f,9c,d1,c3,fe,85,e1,68,\ 63,62,de,6e,93,f5,be,98,a6,d2,c5,c1,9a,2a,b7,10,42,cc,00,44,4e,35,c0,00,00,\ 00,16,4c,65,18,f5,45,89,04,5f,ba,f9,b7,95,d8,ed,13,c8,d0,12,65,be,eb,4d,e4,\ 08,ab,03,5f,35,e5,cf,1c,8d,ac,87,4f,fd,d4,f9,e3,1d,e8,eb,21,db,50,7f,b2,b8,\ 09,d9,b9,30,88,e1,c2,c3,b9,c8,27,96,9b,b7,97,47,77,17,8a,78,f3,53,bb,01,97,\ 88,2d,09,ed,45,ae,85,2c,73,cb,58,9f,33,9f,9a,94,e9,8c,cd,45,5d,b9,f1,46,9f,\ 59,15,7a,93,06,e3,2f,80,66,01,4b,f7,a4,83,d2,e5,bc,14,7e,ac,6a,67,5e,2b,01,\ 18,98,64,14,67,02,3f,a8,46,7b,1b,02,d1,8e,bd,20,ca,47,4b,10,44,e7,10,5b,93,\ 03,a7,6a,c6,71,3a,b8,23,25,52,09,94,d4,10,0c,ac,5b,07,ba,35,62,cd,80,1d,75,\ dc,9b,ff,93,d6,a3,c4,80,20,f7,13,f5,a8,ed,2a,49,7d,97,40,00,00,00,da,46,de,\ 34,ca,77,5d,0c,1c,22,44,d5,63,db,32,e7,21,e3,7c,33,90,fe,b2,5e,9a,5a,eb,97,\ 01,ce,34,28,61,31,31,57,37,22,0a,d5,bd,0d,4d,5d,64,92,f1,f9,7e,5f,b3,ef,86,\ 50,23,89,03,0f,c9,4e,62,62,f2,85 [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.104] "CheckSetting"=hex:01,00,00,00,d0,8c,9d,df,01,15,d1,11,8c,7a,00,c0,4f,c2,97,eb,\ 01,00,00,00,a1,83,01,f4,91,88,0b,41,99,d1,cd,6e,b8,2a,4c,5d,00,00,00,00,02,\ 00,00,00,00,00,10,66,00,00,00,01,00,00,20,00,00,00,9e,a4,f2,e2,eb,85,47,db,\ 39,da,e1,fa,da,4d,30,6e,26,52,76,84,8d,ca,13,bb,d0,55,93,9a,ab,55,de,da,00,\ 00,00,00,0e,80,00,00,00,02,00,00,20,00,00,00,bd,39,4f,bb,23,43,4b,9d,13,6d,\ b6,c3,28,a7,b1,0f,ae,c8,3d,7e,29,b9,1e,96,6d,99,15,87,33,d8,a2,7d,30,00,00,\ 00,34,d6,09,4e,22,cd,04,4b,14,38,76,96,36,3b,37,42,41,ee,a1,82,bc,8a,fd,22,\ 35,1d,b3,8f,04,0b,f4,46,30,0c,39,02,6e,7b,e8,ae,7e,f8,56,7f,dc,68,5d,5c,40,\ 00,00,00,79,8b,22,ff,81,23,92,b2,9b,9a,9b,41,91,f3,0e,7f,65,d4,e0,5b,ee,6b,\ 7d,b1,c8,59,f5,f2,0b,33,70,30,e3,3f,0b,99,4a,09,97,5e,90,8c,4c,ce,7b,62,07,\ ce,74,7c,b0,21,7d,9f,2b,a0,b1,63,f8,06,ae,45,c2,66 [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.106] ; ------End cut & paste here------ ______________________________________________________________________________ Logon + Password Tweaks * NOTE: All these tweaks work with all Windows 7/newer + Server 2008/newer releases, and most even with Windows XP/newer + Server 2003/newer. * WMIC.EXE DOS console command line tool: Disable PasswordExpiryWarning DWORD [REG_DWORD] Registry value: http://technet.microsoft.com/library/ee829687.aspx Disable Password expiration for all accounts using WMIC.EXE command: http://www.sevenforums.com/tutorials/73210-password-expiration-enable-disable.html http://www.cocosenor.com/articles/windows-10/4-ways-to-disable-or-enable-windows-10-password-expiration-notification.html Enable "Password never expires" network logon setting [disable PasswordExpiryWarning registry value] from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter: WMIC.exe UserAccount set PasswordExpires=False WMIC.exe is located in the %WinDir%\SYSTEM32\wbem directory/folder [%WinDir% = usually C:\WINDOWS], listed on your system PATH. View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command PATH -> press Enter. WMIC (Windows Management Instrumentation Command): http://learn.microsoft.com/windows/win32/wmisdk/wmic/ MS DOCs: WMIC: http://technet.microsoft.com/library/bb742610.aspx Dedoimedo: WMIC - The Windows secret weapon: http://www.dedoimedo.com/computers/windows-wmic.html ComputerHope: WMIC: http://www.computerhope.com/wmic.htm Rob van der Woude: WMIC: http://www.robvanderwoude.com/wmic.php quux: WMIC Snippets: http://quux.wiki.zoho.com/WMIC-Snippets.html SS64: WMIC.EXE: http://www.ss64.com/nt/wmic.html Wikipedia: WMI: http://en.wikipedia.org/wiki/Windows_Management_Instrumentation * NET.EXE DOS console command line tool: http://www.ss64.com/nt/net.html http://www.lifewire.com/net-user-command-2618097/ http://www.ghacks.net/2017/05/24/manage-windows-users-with-net-user/ NET.EXE is located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually C:\WINDOWS], listed on your system PATH. View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command PATH -> press Enter. Syntax: NET [ ACCOUNTS | COMPUTER | CONFIG | CONTINUE | FILE | GROUP | HELP | HELPMSG | LOCALGROUP | NAME | PAUSE | PRINT | SEND | SESSION | SHARE | START | STATISTICS | STOP | TIME | USE | USER | VIEW ] Logon, Lockout + Password enforcement (Run as Administrator): C:\>NET.EXE ACCOUNTS Force user logoff how long after time expires?: Never Minimum password age (days): 999 Maximum password age (days): Unlimited Minimum password length: 0 Length of password history maintained: None Lockout threshold: Never Lockout duration (minutes): 0 Lockout observation window (minutes): 0 Computer role: WORKSTATION Run as Administrator: NET ACCOUNTS /? http://www.ss64.com/nt/net-useradmin.html http://support.microsoft.com/help/556003/ http://technet.microsoft.com/library/dd277400.aspx Syntax: NET ACCOUNTS [/FORCELOGOFF:{minutes|NO}] [/MINPWLEN:length] [/MAXPWAGE:{days|UNLIMITED}] [/MINPWAGE:days] [/UNIQUEPW:number] [/DOMAIN] [/lockoutwindow:(0-99999) MUST be = or > than "Lockout duration" number] http://www.sevenforums.com/tutorials/72271-account-lockout-reset-invalid-logon-counter.html [/lockoutduration:(1-99999) MUST be = or < than "Lockout observation window" number] http://www.sevenforums.com/tutorials/72258-account-lockout-duration-locked-out-user-accounts.html Disable Password age, expiration + length restrictions + Lockout timeouts from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter: NET.EXE ACCOUNTS /lockoutduration:0 /lockoutwindow:0 /MAXPWAGE:UNLIMITED /MINPWAGE:999 /FORCELOGOFF:NO OR, alternatively, this command -> press Enter: NET.EXE ACCOUNTS /lockoutduration:0 /lockoutwindow:0 /MINPWLEN:0 /MAXPWAGE:UNLIMITED /MINPWAGE:0 /FORCELOGOFF:NO * Customized/Optimized WinLogon registry settings: AutoAdminLogon: http://learn.microsoft.com/troubleshoot/windows-server/user-profiles-and-logon/turn-on-automatic-logon/ CachedLogonsCount: http://learn.microsoft.com/troubleshoot/windows-server/user-profiles-and-logon/cached-domain-logon-information/ DisableCAD: http://support.microsoft.com/help/960271/ Notify, Shell + Userinit: http://attack.mitre.org/techniques/T1547/004/ PasswordExpiryWarning: http://technet.microsoft.com/library/ee829687.aspx http://www.sevenforums.com/tutorials/73210-password-expiration-enable-disable.html http://www.cocosenor.com/articles/windows-10/4-ways-to-disable-or-enable-windows-10-password-expiration-notification.html ReportBootOk: http://franck.kiechel.free.fr/dbr_eng/WinLogon.htm ShutdownFlags: http://learn.microsoft.com/openspecs/windows_protocols/ms-tsts/81c472be-2a71-424e-8bde-71e826a34c26/ NOTE: Some of these settings apply only to Windows NTx 32-bit (x86) OSes. Tweaked WinLogon Registry file (example): TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK to all prompts to register/merge/import its information into your registry. -----Begin cut & paste here----- REGEDIT4 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] "Background"="0 0 0" "DebugServerCommand"="no" "Shell"="explorer.exe /select,explorer.exe" "DefaultDomainName"="" "DefaultUserName"="" "DisableCAD"=dword:0 "AutoRestartShell"=dword:1 "CachedLogonsCount"="50" "FirstLogon"=dword:0 "ForceUnlockLogon"=dword:0 "LegalNoticeCaption"=- "LegalNoticeText"=- "LogonType"=- "PasswordExpiryWarning"=dword:fffffff3 "PowerdownAfterShutdown"="1" "ShutdownWithoutLogon"="1" "WinStationsDisabled"="0" "ScRemoveOption"="0" "ShutdownFlags"=dword:a ; "ShutdownFlags"=dword:2b "EnableConcurrentSessions"=- "AllowMultipleTSSessions"=- "ParseAutoexec"=- "ShowLogonOptions"=dword:0 ; "IgnoreShiftOveride"=dword:0 "IgnoreShiftOveride"=- "HibernationPreviouslyEnabled"=dword:0 "AutoAdminLogon"="1" "AutoLogonCount"=- "ReportControllerMissing"="false" "ReportBootOk"="1" "Welcome"="Your Account or Domain Name" ; ------End cut & paste here------ ______________________________________________________________________________ Clock Sync * Fix "Time difference too great" Time Sync Error: http://www.raymond.cc/blog/auto-sync-pc-clock-on-windows-startup/ using one of the National Institute of Standards and Technology (NIST) http://www.nist.gov/ NTP (Network Time Protocol) public servers (example): time-b.nist.gov List of NTP (Network Time Protocol) public servers: http://tf.nist.gov/tf-cgi/servers.cgi http://support.ntp.org/bin/view/Servers/NTPPoolServers TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK to all prompts to register/merge/import its information into your registry. -----Begin cut & paste here----- REGEDIT4 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time] "Start"=dword:3 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\Config] "MaxPosPhaseCorrection"=dword:ffffffff "EventLogFlags"=dword:0 "MaxNegPhaseCorrection"=dword:ffffffff [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\Parameters] "ServiceDllUnloadOnStop"=dword:1 "NtpServer"="time-b.nist.gov" [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\TimeProviders\NtpClient] "RunOnVirtualOnly"=dword:0 "Enabled"=dword:1 "EventLogFlags"=dword:0 "SignatureAuthAllowed"=dword:1 "AllowNonstandardModeCombinations"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\TimeProviders\NtpServer] "RunOnVirtualOnly"=dword:0 "Enabled"=dword:1 "EventLogFlags"=dword:0 "ChainDisable"=dword:0 "RequireSecureTimeSyncRequests"=dword:0 "AllowNonstandardModeCombinations"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\TimeProviders\VMICTimeProvider] "RunOnVirtualOnly"=dword:0 "Enabled"=dword:1 "EventLogFlags"=dword:0 "AllowNonstandardModeCombinations"=dword:1 ; ------End cut & paste here------ * Synchronize your computer clock with one of the NTP (Network Time Protocol) public servers [time-b.nist.gov in this example], also listed (see above) under the "NtpServer" registry REG_SZ [String] value in Windows 7/newer: http://www.guidingtech.com/3119/windows-clock-sync/ http://groups.google.com/forum/#!topic/alt.msdos.batch.nt/UpvUnYfxBkw/ http://www.netikka.net/tsneti/info/tscmd169.htm TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text BATch (.bat) or CoMmanD (.cmd) script file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the BAT (.bat) or CMD (.cmd) extension -> right-click it -> Run as Administrator -> wait for completion. -----Begin cut & paste here----- @ECHO OFF IF NOT "%OS%"=="Windows_NT" GOTO END :: (1) Start Windows Time Server [W32Time] NTP service: SC.EXE CONFIG W32Time START= demand ECHO Y|NET.EXE START W32Time :: (2) Synchronize computer clock with NTP public server (example): W32TM.EXE /config /manualpeerlist:time-b.nist.gov /syncfromflags:manual /update W32TM.EXE /resync :: (3) Stop Windows Time Server [W32Time] NTP service: ECHO Y|NET.EXE STOP W32Time SC.EXE CONFIG W32Time START= demand :END EXIT ------End cut & paste here------ NET.EXE, SC.EXE + W32TM.EXE DOS console command line tools are all located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually C:\WINDOWS], listed on your system PATH. View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command PATH -> press Enter. * Create a new Task (TaskSchd.msc) using batch file (.BAT or .CMD) above and schedule it to run periodically to sync your computer clock unattended in the background in Windows 7/newer: http://answers.microsoft.com/en-us/windows/forum/windows_7-performance/make-windows-7-task-scheduler-run-a-batch-file/0573dc2e-4941-44a2-8304-264864e94f1a/ http://answers.microsoft.com/en-us/windows/forum/windows_10-performance/make-windows-10-task-scheduler-run-a-batch-file/e00b2fb0-02ca-439f-b534-eb34541130a9/ * MS DOCs: Windows Time Service Tools + Settings: http://technet.microsoft.com/library/cc773263.aspx http://learn.microsoft.com/windows-server/networking/windows-time-service/Windows-Time-Service-Tools-and-Settings/ * Date/Time time server Simple Network Time Protocol (SNTP) synchronization client tools for Windows XP/newer [free(ware)]: http://www.thewindowsclub.com/free-time-synchronization-software-windows/ http://www.raymond.cc/blog/auto-sync-pc-clock-on-windows-startup/ - Time Synchronizer: http://www.itsamples.com/time-synchronizer.html File: http://www.itsamples.com/downloads/time-synchronizer.zip - NetTime: http://www.timesynctool.com/ - Dimension 4: http://www.thinkman.com/dimension4/ Download: http://www.thinkman.com/dimension4/download.htm - Atomic Clock Sync (ACS): http://www.worldtimeserver.com/atomic-clock/ - Time-Sync: http://www.speed-soft.de/software/time_sync/ Download: http://www.speed-soft.de/software/time_sync/details/download.php - Neutron: http://www.keir.net/neutron.html File: http://www.keir.net/download/neutron.zip * Wikipedia: Time Server: http://en.wikipedia.org/wiki/Time_server * Wikipedia: Network Time Protocol (NTP): http://en.wikipedia.org/wiki/Network_Time_Protocol ______________________________________________________________________________ Turn OFF/ON Link Layer Topology Discovery (LLTD) + Quality of Service (QoS) Turn OFF/stop/disable Link Layer Discovery Protocol (LLDP), Link Layer Topology Discovery (LLTD) + Quality of Service (QoS) networking/internet protocols, drivers, services + settings in Windows 7/newer (applies also to Windows XP, 2003 + Vista): - Link-Layer Topology Discovery Mapper I/O driver [lltdio] = %WinDir%\SYSTEM32\DRIVERS\lltdio.sys , - Link-Layer Topology Discovery Mapper service [lltdsvc] = %WinDir%\SYSTEM32\lltdsvc.dll , - Link-Layer Topology Discovery Responder driver [rspndr] = %WinDir%\SYSTEM32\DRIVERS\rspndr.sys , - Microsoft LLDP Protocol Driver service [MsLldp] = %WinDir%\SYSTEM32\DRIVERS\mslldp.sys + - QoS (Quality of Service) Packet Scheduler driver [Psched] = %WinDir%\SYSTEM32\DRIVERS\pacer.sys . %WinDir% directory/folder = usually C:\WINDOWS -> listed on your system PATH. http://www.windows-security.org/windows-service/quality-windows-audio-video-experience/ http://www.windows-security.org/windows-service/link-layer-topology-discovery-mapper/ http://learn.microsoft.com/windows/win32/services/services-and-redirected-drives/ http://helpdeskgeek.com/windows-10/4-fixes-when-you-cant-map-a-network-drive-in-windows-10/ http://learn.microsoft.com/previous-versions/windows/desktop/qos/link-layer-topology-discovery-protocol/ http://learn.microsoft.com/previous-versions/windows/desktop/qos/ http://batcmd.com/windows/10/services/lltdio/ http://batcmd.com/windows/10/services/lltdsvc/ http://batcmd.com/windows/10/services/rspndr/ http://batcmd.com/windows/10/services/mslldp/ http://batcmd.com/windows/10/services/psched/ http://en.wikipedia.org/wiki/Link_Layer_Topology_Discovery http://en.wikipedia.org/wiki/Link_Layer_Discovery_Protocol http://en.wikipedia.org/wiki/Quality_of_service http://en.wikipedia.org/wiki/IPv4 http://en.wikipedia.org/wiki/IPv6 CAUTION: ******** Quality Windows Audio Video Experience [qWave] component driver http://batcmd.com/windows/10/services/qwavedrv/ depends on these 2 drivers (among others): http://www.windows-security.org/windows-service/quality-windows-audio-video-experience/ - Link-Layer Topology Discovery Mapper I/O driver [lltdio], http://batcmd.com/windows/10/services/lltdio/ - QoS (Quality of Service) Packet Scheduler driver [Psched]. http://batcmd.com/windows/10/services/psched/ That's because basic broadband/cable/Ethernet/local/satellite/internet/network/LAN/WAN/NIC/Wi-Fi/wireless/etc stand alone connections without any add-ons/components/extensions/extras/features/services that require any of the drivers + services listed above, and without any connected/linked/networked/shared computers/consoles/devices/PCs/terminals need only 2 basic internet protocols to function properly: - Internet Protocol Version 4 (IPv4) + - Internet Protocol version 6 (IPv6), as listed in Control Panel (CP) [Windows XP/newer] and Windows Settings (WS) [Windows 10/newer] -> All Control Panel Items -> Network and Sharing Center -> Change adapter settings -> Your active/current/enabled Connection icon/item/link/shortcut -> right-click -> Properties -> Networking tab -> "This connection uses the following items:". Optimizing your connection and ditching unnecessary/unused bloat allows your computers/devices/portables to perform faster, preserve additional resources by saving CPU cycles, decreasing CPU load, saving memory space, minimizing loadind/startup/operational/processing times, etc. Added bonus: disabling unnecessary/unused networking/internet features/options usually translates into enhanced online privacy, safety + security by closing available/potential (open) doors which could expose your computer(s)/device(s)/portable(s) to breaches, hacking, malware, spying, etc. This also implies you're not using and/or you don't care about any Microsoft and 3rd party for profit automatic/unattended behind-your-back/forced/hidden/intrusive/invasive/subversive/unwanted/without-your-consent, annoying/bloat/resources consuming, undesirable/unnecessary/unneeded/unused/unwanted/useless ad(vertisment)s/adware, components, add-ons, "features", enrollments, "experience", memberships, "offers", "trials", services, subscriptions (examples): Store apps, proprietary software bundles/trials, Azure, Bing, Edge web browser, Hotmail, Live, Microsoft Start, (MSN) Messenger, Office, OneDrive/SkyDrive, Outlook, Photos/Photo Viewer, Windows Essentials, Windows Insider Program (WIP), Windows (Live) Mail, Windows Media Player (WMP), Windows Movie Maker (WMM). You can always find cheaper [or even 100% free(ware)], better, improved alternatives, or similar products/services/software available online (examples): http://alternativeto.net/software/microsoft-office-suite/ http://alternativeto.net/software/windows-media-player/ http://alternativeto.net/software/windows-photo-viewer/ http://www.softwarehow.com/windows-mail-alternatives/ http://www.websiterating.com/cloud-storage/best-microsoft-onedrive-alternatives/ http://www.digitalcitizen.life/best-free-alternatives-windows-movie-maker/ Some of the bundled/forced/preset apps/programs/services are either buggy, flawed, still in development stages, interim, pre-releases, previews, unfinished, untested (or incompletely tested), and some actually ask for cash/money, periodic paid enrollment/membership/subscription fees, eventually at the end of their time limited deadline/expiration/trial periods, or/and for as long as you choose to extend/maintain/pay for/purchase/subscribe to/support them. Worse, most such programs ask for your personal/private/privileged data/information (which in many cases is not needed to ensure proper functionality/operation), store it on their cloud/network/internet/remote servers/storage facilities (and therefore expose it to potential breaches, hacking, malware, spying, etc), and very frequently sell/lease your data for profit to other 3rd party/affiliates/associates/branches/brands/companies/divisions/entities/parents/partners/subsidiaries. See also these MDGx topics (all included): - "Digital + Internet/Online Privacy, Safety + Security" chapter in WINDOWS7.TXT (this file): http://www.mdgx.com/7.php#:~:text=Digital%20%2B%20Internet%2FOnline%20Privacy%2C%20Safety%20%2B%20Security%20%3D%20Your%20Top%20Priority http://www.mdgx.com/WINDOWS7.TXT - "Turn OFF/Remove Windows 7/8/8.1 Adware, Spyware, Security Flaws + Repair/Restore Privacy" chapter in WINDOWS7.TXT (this file): http://www.mdgx.com/7.php http://www.mdgx.com/WINDOWS7.TXT - "Turn OFF/Remove Windows 10 Adware, Spyware, Security Flaws + Repair/Restore Privacy" chapter in WIN10.TXT: http://www.mdgx.com/10.php http://www.mdgx.com/WIN10.TXT CAUTION: ******** This requires adequate/advanced knowledge about critical computing, operating systems, shared environments, networks, cybersecurity. http://www.mdgx.com/importnt.php Recommended for single user environments without any add-ons/components/extensions/extras/features/services which may require specific configurations/items/properties/settings for proper operation. Not recommended for multiuser/networked/shared/enterprise/server environments processing/storing/delivering encrypted/protected/secure critical/private/sensitive/vital analysis/data/information. Turn OFF LLTD from Control Panel (CP): Start Menu/Orb -> Run... [hold WinKey + press R] -> type: CONTROL.EXE /name Microsoft.NetworkAndSharingCenter -> press Enter -> click left side "Change advanced sharing settings" link -> click "Network Profile" link (if prompted) -> click down arrow next to "Private" profile (if needed) -> under "Network discovery" UNcheck (clear) "Turn on network discovery" box. CONTROL.EXE is located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually C:\WINDOWS]. View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command PATH -> press Enter. Turn OFF all LLDP, LLTD + QoS drivers + services from your active/current/enabled network/internet connection Properties: - Windows 7/7 SP1 users, including Windows Vista users: Start Menu/Orb -> Control Panel (CP) -> Network and Sharing Center -> View network status and tasks -> View Active networks -> click item right side of Connections: -> "your Network Connection name" (typical examples): "Ethernet" (direct broadband modem connection), "Local Area Network" (LAN = direct router connection) or "Wi-Fi" (Wireless Fidelity connection) -> connection Status -> General tab -> Properties -> Connection Properties General tab -> scroll down -> UNcheck (clear) all these 4 boxes: - "Link-Layer Topology Discovery Mapper I/O Driver", - "Link-Layer Topology Discovery Responder", - "Microsoft LLDP Protocol Driver" + - "QoS Packet Scheduler" -> click OK -> exit all dialogs/prompts/windows. - Windows 8/newer users, including Windows 10 + 11 users: Start Menu/Orb -> Control Panel (CP) -> Network and Sharing Center -> Active Networks -> click item right side of Connections: -> "your Network Connection name" (typical examples): "Ethernet" (direct broadband modem connection), "Local Area Network" (LAN = direct router connection) or "Wi-Fi" (Wireless Fidelity connection) -> connection Status -> General tab -> Properties -> scroll down -> UNcheck (clear) all these 4 boxes: - "Link-Layer Topology Discovery Mapper I/O Driver", - "Link-Layer Topology Discovery Responder", - "Microsoft LLDP Protocol Driver" + - "QoS Packet Scheduler" -> click OK -> exit all dialogs/prompts/windows. Turn OFF all LLDP, LLTD + QoS drivers + services using a BATch (.bat)/CoMmanD (.cmd) file: TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text BATch (.bat) or CoMmanD (.cmd) script file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the BAT (.bat) or CMD (.cmd) extension -> right-click it -> Run as Administrator -> wait for completion. -----Begin cut & paste here----- @ECHO OFF IF NOT "%OS%"=="Windows_NT" GOTO END :: Turn OFF [Disabled] Link-Layer Topology Discovery Mapper I/O driver [lltdio]: ECHO Y|NET.EXE STOP lltdio SC.EXE CONFIG lltdio START= disabled REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Services\lltdio" /v Start /t REG_DWORD /d 4 /f :: Turn OFF [Disabled] Link-Layer Topology Discovery Mapper service [lltdsvc]: ECHO Y|NET.EXE STOP lltdsvc SC.EXE CONFIG lltdsvc START= disabled REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Services\lltdsvc" /v Start /t REG_DWORD /d 4 /f :: Turn OFF [Disabled] Link-Layer Topology Discovery Responder driver [rspndr]: ECHO Y|NET.EXE STOP rspndr SC.EXE CONFIG rspndr START= disabled REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Services\rspndr" /v Start /t REG_DWORD /d 4 /f :: Turn OFF [Disabled] Microsoft LLDP Protocol Driver service [MsLldp]: ECHO Y|NET.EXE STOP MsLldp SC.EXE CONFIG MsLldp START= disabled REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Services\MsLldp" /v Start /t REG_DWORD /d 4 /f :: Turn OFF [Disabled] QoS (Quality of Service) Packet Scheduler driver [Psched]: ECHO Y|NET.EXE STOP Psched SC.EXE CONFIG Psched START= disabled REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Services\Psched" /v Start /t REG_DWORD /d 4 /f :END EXIT ------End cut & paste here------ REG.EXE, NET.EXE + SC.EXE DOS console command line tools are all located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually C:\WINDOWS]. View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command PATH -> press Enter. Restart/reboot Windows for all these changes to take effect. Turn OFF all LLDP, LLTD + QoS drivers + services using a Registry (.reg) file (optional): TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK to all prompts to register/merge/import its information into your registry. -----Begin cut & paste here----- REGEDIT4 ; Turn OFF [Disabled] Link-Layer Topology Discovery Mapper I/O driver [lltdio]: [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\lltdio] "LaunchProtected"=dword:0 "Start"=dword:4 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\lltdio] "LaunchProtected"=dword:0 "Start"=dword:4 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\lltdio] "LaunchProtected"=dword:0 "Start"=dword:4 ; Turn OFF [Disabled] Link-Layer Topology Discovery Mapper service [lltdsvc]: [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\lltdsvc] "LaunchProtected"=dword:0 "Start"=dword:4 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\lltdsvc] "LaunchProtected"=dword:0 "Start"=dword:4 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\lltdsvc] "LaunchProtected"=dword:0 "Start"=dword:4 ; Turn OFF [Disabled] Link-Layer Topology Discovery Responder driver [rspndr]: [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\rspndr] "LaunchProtected"=dword:0 "Start"=dword:4 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\rspndr] "LaunchProtected"=dword:0 "Start"=dword:4 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\rspndr] "LaunchProtected"=dword:0 "Start"=dword:4 ; Turn OFF [Disabled] Microsoft LLDP Protocol Driver service [MsLldp]: [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\MsLldp] "LaunchProtected"=dword:0 "Start"=dword:4 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\MsLldp] "LaunchProtected"=dword:0 "Start"=dword:4 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\MsLldp] "LaunchProtected"=dword:0 "Start"=dword:4 ; Turn OFF [Disabled] QoS (Quality of Service) Packet Scheduler driver [Psched]: [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Psched] "LaunchProtected"=dword:0 "Start"=dword:4 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Psched] "LaunchProtected"=dword:0 "Start"=dword:4 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\Psched] "LaunchProtected"=dword:0 "Start"=dword:4 ; ------End cut & paste here------ Restart/reboot Windows for all these changes to take effect. WARNING: ******** If all these interconnected/interdependent/interrelated drivers + services are turned OFF/disabled/stopped networking/internet discovery, mapping + responder functions for available/connected/linked/remote/shared clients/computers/devices/servers will not work, and you may experience errors +/- loss of functionality in multiuser/networked/shared/enterprise/server environments which depend on these drivers + services. Example: Xbox platform computers, connections, devices, servers + services need to use this protocol. Refer to your documentation/guidelines/manuals/readme files or contact the manufacturer/support/vendor for information. Turn ON/(re)enable/(re)start networking/internet discovery, mapping + responder step-by-step: 1. Turn ON all LLDP, LLTD + QoS drivers + services using a BATch (.bat)/CoMmanD (.cmd) file: TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text BATch (.bat) or CoMmanD (.cmd) script file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the BAT (.bat) or CMD (.cmd) extension -> right-click it -> Run as Administrator -> wait for completion. -----Begin cut & paste here----- @ECHO OFF IF NOT "%OS%"=="Windows_NT" GOTO END :: Turn ON [Automatic/Enabled] Link-Layer Topology Discovery Mapper I/O driver [lltdio]: SC.EXE CONFIG lltdio START= enabled ECHO Y|NET.EXE START lltdio REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Services\lltdio" /v Start /t REG_DWORD /d 2 /f :: Turn ON [Manual/Demand] Link-Layer Topology Discovery Mapper service [lltdsvc]: SC.EXE CONFIG lltdsvc START= demand ECHO Y|NET.EXE START lltdsvc REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Services\lltdsvc" /v Start /t REG_DWORD /d 3 /f :: Turn ON [Manual/Demand] Link-Layer Topology Discovery Responder driver [rspndr]: SC.EXE CONFIG rspndr START= demand ECHO Y|NET.EXE START rspndr REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Services\rspndr" /v Start /t REG_DWORD /d 3 /f :: Turn ON [System] QoS (Quality of Service) Packet Scheduler driver [Psched]: SC.EXE CONFIG Psched START= system ECHO Y|NET.EXE START Psched REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Services\Psched" /v Start /t REG_DWORD /d 1 /f :END EXIT ------End cut & paste here------ REG.EXE, NET.EXE + SC.EXE DOS console command line tools are all located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually C:\WINDOWS]. View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command PATH -> press Enter. 2. Turn ON all LLDP, LLTD + QoS drivers + services using a Registry (.reg) file (optional): TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK to all prompts to register/merge/import its information into your registry. -----Begin cut & paste here----- REGEDIT4 ; Turn ON [Automatic/Enabled] Link-Layer Topology Discovery Mapper I/O driver [lltdio]: [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\lltdio] "LaunchProtected"=dword:0 "Start"=dword:2 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\lltdio] "LaunchProtected"=dword:0 "Start"=dword:2 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\lltdio] "LaunchProtected"=dword:0 "Start"=dword:2 ; Turn ON [Manual/Demand] Link-Layer Topology Discovery Mapper service [lltdsvc]: [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\lltdsvc] "LaunchProtected"=dword:0 "Start"=dword:3 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\lltdsvc] "LaunchProtected"=dword:0 "Start"=dword:3 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\lltdsvc] "LaunchProtected"=dword:0 "Start"=dword:3 ; Turn ON [Manual/Demand] Link-Layer Topology Discovery Responder driver [rspndr]: [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\rspndr] "LaunchProtected"=dword:0 "Start"=dword:3 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\rspndr] "LaunchProtected"=dword:0 "Start"=dword:3 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\rspndr] "LaunchProtected"=dword:0 "Start"=dword:3 ; Turn ON [Automatic/Enabled] Microsoft LLDP Protocol Driver service [MsLldp]: [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\MsLldp] "LaunchProtected"=dword:0 "Start"=dword:2 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\MsLldp] "LaunchProtected"=dword:0 "Start"=dword:2 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\MsLldp] "LaunchProtected"=dword:0 "Start"=dword:2 ; Turn ON [System] QoS (Quality of Service) Packet Scheduler driver [Psched]: [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Psched] "LaunchProtected"=dword:0 "Start"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Psched] "LaunchProtected"=dword:0 "Start"=dword:1 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\Psched] "LaunchProtected"=dword:0 "Start"=dword:1 ; ------End cut & paste here------ 3. Follow these steps to turn ON/(re)enable/(re)start networking/internet discovery: http://www.technewstoday.com/how-to-turn-on-network-discovery/ http://www.zubairalexander.com/blog/unable-to-turn-on-network-discovery-on-windows-7-or-windows-8/ http://learn.microsoft.com/troubleshoot/windows-client/networking/cannot-turn-on-network-discovery/ http://www.lifewire.com/turn-on-off-network-discovery-in-windows-10-5116083/ Turn ON LLTD from Control Panel (CP): Start Menu/Orb -> Run... [hold WinKey + press R] -> type: CONTROL.EXE /name Microsoft.NetworkAndSharingCenter -> press Enter -> click left side "Change advanced sharing settings" link -> click "Network Profile" link (if prompted) -> click down arrow next to "Private" profile (if needed) -> under "Network discovery" check "Turn on network discovery" box. CONTROL.EXE is located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually C:\WINDOWS]. View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command PATH -> press Enter. Turn ON all LLDP, LLTD + QoS drivers + services from your active/current/enabled network/internet connection Properties: - Windows 7/7 SP1 users, including Windows Vista users: Start Menu/Orb -> Control Panel (CP) -> Network and Sharing Center -> View network status and tasks -> View Active networks -> click item right side of Connections: -> "your Network Connection name" (typical examples): "Ethernet" (direct broadband modem connection), "Local Area Network" (LAN = direct router connection) or "Wi-Fi" (Wi-Fi connection) -> connection Status -> General tab -> Properties -> Connection Properties General tab -> scroll down -> check all these 4 boxes: - "Link-Layer Topology Discovery Mapper I/O Driver", - "Link-Layer Topology Discovery Responder", - "Microsoft LLDP Protocol Driver" + - "QoS Packet Scheduler" -> click OK -> exit all dialogs/prompts/windows. - Windows 8/newer users, including Windows 10 + 11 users: Start Menu/Orb -> Control Panel (CP) -> Network and Sharing Center -> Active Networks -> click item right side of Connections: -> "your Network Connection name" (typical examples): "Ethernet" (direct broadband modem connection), "Local Area Network" (LAN = direct router connection) or "Wi-Fi" (Wi-Fi connection) -> connection Status -> General tab -> Properties -> scroll down -> check all these 4 boxes: - "Link-Layer Topology Discovery Mapper I/O Driver", - "Link-Layer Topology Discovery Responder", - "Microsoft LLDP Protocol Driver" + - "QoS Packet Scheduler" -> click OK -> exit all dialogs/prompts/windows. 4. Restart/reboot Windows for all these changes to take effect. NOTE: Older client/server computers/devices/terminals running Windows XP + Windows 2003 Server 32-bit (x86) + 64-bit (x64) need this Hotfix so they can be discovered/found/mapped on the networks/internet by other clients/computers/devices/servers: All Windows XP + Windows 2003 Server 32-bit (x86) + 64-bit (x64) KB922120 Hotfix for all supported editions + languages: http://thehotfixshare.net/board/?/search/&q=KB922120 Windows XP SP2 32-bit (x86) Network Map Errors With Windows Vista/newer Link Layer Topology Discovery (LLTD) responder Fix: http://web.archive.org/web/20071226071116/http://support.microsoft.com/kb/922120/ File [514 KB, English]: http://web.archive.org/web/20070221043025if_/http://download.microsoft.com:80/download/0/5/f/05fc30db-e7af-4488-a3a8-23999328e4bd/WindowsXP-KB922120-v5-x86-ENU.exe ______________________________________________________________________________ CMD, Commands, Environment + Console * Windows environment variables documentation, guides, tutorials: http://learn.microsoft.com/windows/win32/procthread/environment-variables/ http://msdn.microsoft.com/library/windows/desktop/ms682653.aspx http://www.ss64.com/nt/syntax-variables.html http://www.ss64.com/nt/syntax-64bit.html http://www.xahlee.info/mswin/env_var.html http://www.tenforums.com/tutorials/3234-environment-variables-windows-10-a.html http://www.sevenforums.com/performance-maintenance/136057-windows-7-environment-variables-list.html http://www.howtogeek.com/51807/how-to-create-and-use-global-system-environment-variables/ http://www.makeuseof.com/tag/what-are-environment-variables-how-can-i-use-them-windows/ http://www.computerhope.com/jargon/e/envivari.htm http://en.wikipedia.org/wiki/Environment_variable * Execute (run) program/batch/script/process/service selectively depending on installed Windows NTx Operating System (OS) bit strength: 32-bit (x86) or 64-bit (x64) (example): TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text BATch (.bat) or CoMmanD (.cmd) script file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the BAT (.bat) or CMD (.cmd) extension -> right-click it -> Run as Administrator -> wait for completion. -----Begin cut & paste here----- @ECHO OFF IF NOT "%OS%"=="Windows_NT" GOTO END IF NOT EXIST %WinDir%\SYSTEM32\REG.EXE GOTO END IF NOT "%PROCESSOR_ARCHITECTURE%"=="AMD64" GOTO X86 REG.EXE DELETE "HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run" /v SunJavaUpdateSched /f GOTO END :X86 REG.EXE DELETE "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v SunJavaUpdateSched /f :END EXIT ------End cut & paste here------ * Add custom environment variables to the default list of SET commands (examples): TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text BATch (.bat) or CoMmanD (.cmd) script file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the BAT (.bat) or CMD (.cmd) extension -> right-click it -> Run as Administrator -> wait for completion. -----Begin cut & paste here----- @ECHO OFF IF NOT "%OS%"=="Windows_NT" GOTO END IF NOT EXIST %WinDir%\SYSTEM32\SETX.EXE GOTO END SETX.EXE DIRCMD "/A:-D/B/O:GNE/-P/S" SETX.EXE COPYCMD "/Y" /M SETX.EXE DEVMGR_SHOW_DETAILS "1" /M SETX.EXE DEVMGR_SHOW_NONPRESENT_DEVICES "1" /M SETX.EXE FP_NO_HOST_CHECK "NO" /M SETX.EXE GOOGLE_API_KEY "NO" /M SETX.EXE GOOGLE_DEFAULT_CLIENT_ID "NO" /M SETX.EXE GOOGLE_DEFAULT_CLIENT_SECRET "NO" /M SETX.EXE windows_tracing_flags "0" /M SETX.EXE windows_tracing_logfile "%TEMP%\CSILOG.LOG" /M SETX.EXE deployment.expiration.check.enabled "false" /M SETX.EXE SEE_MASK_NOZONECHECKS "1" /M SETX.EXE __COMPAT_LAYER "RunAsAdmin" /M :END EXIT ------End cut & paste here------ Run CMD.EXE (as Administrator) -> type SET -> press Enter to view all installed SET environment variables (examples): SET | MORE or save list to plain text file: SET>%TEMP%\ENVLIST.TXT Example: http://www.winaero.com/blog/how-to-see-names-and-values-of-environment-variables-in-windows-8-and-windows-7/ CMD.EXE [DOS console CoMmanD prompt EXEcutable] + SETX.EXE = both located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually C:\WINDOWS], listed on your system PATH. View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command PATH -> press Enter. * Environment variables Registry keys: All Users (system wide) active key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Environment All Users (system wide) backup key #1: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager\Environment All Users (system wide) backup key #2: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Control\Session Manager\Environment Current User (logged on user) key: HKEY_CURRENT_USER\Environment Default User (all users) key: HKEY_USERS\.DEFAULT\Environment See MDGx "Registry Structure" chapter in REGISTRY.TXT (included) for more details: http://www.mdgx.com/reg.htm#RTS ______________________________________________________________________________ Paging (Swap) File Tweaks * Optimizing Memory Configuration: http://technet.microsoft.com/library/cc938581.aspx Memory Management: http://technet.microsoft.com/library/cc951698.aspx Enhance Windows Memory Management Through Registry: http://www.registryrecycler.com/blog/2013/07/enhance-windows-memory-management-through-registry/ LargeSystemCache + PagedPoolSize + SystemPages registry values: http://technet.microsoft.com/library/bb463205.aspx PagedPoolQuota registry value: http://technet.microsoft.com/library/cc759495.aspx PagedPoolSize registry value: http://technet.microsoft.com/library/cc738462.aspx PoolUsageMaximum registry value: http://support.microsoft.com/help/312362/ http://helpforsure.wordpress.com/tag/poolusagemaximum/ http://arcserve.zendesk.com/hc/en-us/articles/202808835-Insufficient-System-Resources-1450-/ SessionPoolSize + SessionViewSize registry values: http://support.microsoft.com/help/840342/ ClearPageFileAtShutdown registry value: http://support.microsoft.com/help/314834/ ClearPageFileAtShutdown FixIt! tool: http://download.microsoft.com/download/C/1/D/C1DC29D4-FD75-400A-A661-F72D8C6976E1/MicrosoftFixit50463.msi SecondLevelDataCache registry value: http://archive.arstechnica.com/tweak/nt/L2-cache-1.html PhysicalAddressExtension registry value [Windows 32-bit (x86) only]: http://www.registryrecycler.com/blog/2013/07/enhance-windows-memory-management-through-registry/ * Change pagefile.sys file location to another drive/partition/volume (if available), management, initial + maximum sizes: http://garvis.ca/2018/02/07/change-the-page-in-command-line/ Right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run these commands -> press Enter after each line (examples): WMIC.EXE computersystem where name="%ComputerName%" set AutomaticManagedPagefile=False WMIC.EXE pagefileset where name="D:\\pagefile.sys" set InitialSize=65536,MaximumSize=65536 WMIC.exe is located in the %WinDir%\SYSTEM32\wbem directory/folder [%WinDir% = usually C:\WINDOWS], listed on your system PATH. View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command PATH -> press Enter. WMIC (Windows Management Instrumentation Command): http://learn.microsoft.com/windows/win32/wmisdk/wmic/ MS DOCs: WMIC: http://technet.microsoft.com/library/bb742610.aspx Dedoimedo: WMIC - The Windows secret weapon: http://www.dedoimedo.com/computers/windows-wmic.html ComputerHope: WMIC: http://www.computerhope.com/wmic.htm Rob van der Woude: WMIC: http://www.robvanderwoude.com/wmic.php quux: WMIC Snippets: http://quux.wiki.zoho.com/WMIC-Snippets.html SS64: WMIC.EXE: http://www.ss64.com/nt/wmic.html Wikipedia: WMI: http://en.wikipedia.org/wiki/Windows_Management_Instrumentation * PAGEFILE.VBS for Windows Vista/7: http://www.cluberti.com/blog/2010/06/17/pagefile-vbs-for-vistawin7-systems-may-work-on-xp2003-not-tested/comment-page-1/ pagefileconfig.vbs: http://technet.microsoft.com/library/cc772827.aspx http://ww.upgradenrepair.com/Software/Microsoft/Windows%20Server%202003/Library/P/pagefileconfigvbs.htm ______________________________________________________________________________ Windows (Defender) Firewall (WF) Tweaks + Tools * MDGx "Tweaks, Hacks + Fixes... UNconventional, UNdocumented, UNcensored ;-/" chapter -> "* FIX: MDGx customized/tweaked list of all Windows Defender Firewall (WDF) Inbound + Outbound Core Networking rules" topic in WIN10.TXT (included) = most of them apply also to Windows 7/newer: http://www.mdgx.com/10.php http://www.mdgx.com/WIN10.TXT * MDGx "XP/2003 FIREWALL GUIDE" chapter in TIPSXP.TXT (included) = most of these tricks + guidelines apply also to Windows 7/newer: http://www.mdgx.com/xp2.htm#XFG * MDGx "Free(ware) Windows 9x/NTx Monitors, Firewalls + Anti-Spyware" chapter -> "Firewalls" section in SOFTWARE.TXT (included): http://www.mdgx.com/fw.htm * MDGx "Free(ware) Windows Firewalls Compared + Reviewed": http://www.mdgx.com/modem.htm#FWC * Execute/open/run Windows (Defender) Firewall [W(D)F] with Advanced Security applet/tool in Windows 7/newer: http://voyager.deanza.edu/~hso/cis170f/lecture/ch08/win08/advanced.html http://www.digitalcitizen.life/manage-rules-windows-firewall-advanced-security/ 1. Start button/icon/logo/menu/orb -> Windows Administrative Tools -> Windows Defender Firewall with Advanced Security. 2. Control Panel (CP) OR Start button/icon/logo/menu/orb -> Run... [hold WinKey + press R] -> type: control.exe -> OK/Enter -> System and Security -> Windows Defender Firewall (WDF) -> Advanced settings. 3. Start button/icon/logo/menu/orb -> Run... [hold WinKey + press R] -> type: wf.msc -> OK/Enter -> Windows Defender Firewall (WDF) with Advanced Security. * Control/optimize/secure advanced Windows Firewall (WF) behavior using Network Shell (NetSh) [NETSH.EXE] DOS console command line tool in Windows 7/newer: http://learn.microsoft.com/troubleshoot/windows-server/networking/netsh-advfirewall-firewall-control-firewall-behavior/ http://support.microsoft.com/help/947709/ http://www.poftut.com/manage-windows-firewall-command-line-netsh-command/ http://www.ss64.com/nt/netsh.html http://adamtheautomator.com/netsh/ http://www.tenforums.com/tutorials/70699-turn-off-windows-defender-firewall-windows-10-a.html http://www.itninja.com/blog/view/how-to-add-firewall-rules-using-netsh-exe-advanced-way/ http://www.stigviewer.com/stig/microsoft_windows_server_2012_domain_controller/2013-07-25/finding/WN12-FW-000005 NetSh [NETSH.EXE] is located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually C:\WINDOWS]. View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command PATH -> press Enter. Examples (globally for all connection/profile types, or separately for each connection/profile type): Right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run these commands -> press Enter after each line: NETSH.EXE advfirewall set allprofiles state on NETSH.EXE advfirewall set currentprofile state on NETSH.EXE advfirewall set domainprofile state on NETSH.EXE advfirewall set privateprofile state on NETSH.EXE advfirewall set publicprofile state on NETSH.EXE advfirewall set allprofiles state on NETSH.EXE advfirewall set allprofiles settings inboundusernotification disable NETSH.EXE advfirewall set allprofiles settings unicastresponsetomulticast disable These commands disable all Remote Assistance, Administration, Desktop + Management RPC (Remote Procedure Call)/E(P)MAP (End Point Mapper) Windows Firewall (WF) rules (examples): NETSH.EXE advfirewall firewall set rule group="Remote Assistance" new enable=no NETSH.EXE advfirewall firewall set rule group="Remote Administration" new enable=no NETSH.EXE advfirewall firewall set rule group="Remote Desktop" new enable=no NETSH.EXE advfirewall firewall set rule group="Remote Management" new enable=no NETSH.EXE advfirewall set allprofiles settings remotemanagement disable To completely disable Windows Remote Assistance, Administration, Desktop + Management: Start -> Run... [hold WinKey + press R] -> type: CONTROL.EXE press Enter -> System -> Remote Settings -> disable/UNcheck all check boxes/options -> Apply/OK. More info: http://www.thewindowsclub.com/windows-remote-assistance-in-windows-8/ http://www.tenforums.com/tutorials/116749-enable-disable-remote-assistance-connections-windows.html Turn OFF (set to Disabled) these interconnected/interdependent/interrelated services: Remote Access Auto Connection Manager [RasAuto] Remote Access Connection Manager [RasMan] Remote Registry [RemoteRegistry] Routing and Remote Access [RemoteAccess] Windows Remote Management (WS-Management) [WinRM] Run... [hold WinKey + press R] -> type: services.msc -> press Enter -> double-click each service above -> Stop (if running) -> Startup type: -> Disabled -> Apply/OK. OR (if above doesn't work): TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text BATch (.bat) or CoMmanD (.cmd) script file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the BAT (.bat) or CMD (.cmd) extension -> right-click it -> Run as Administrator -> wait for completion. -----Begin cut & paste here----- @ECHO OFF IF NOT "%OS%"=="Windows_NT" GOTO END ECHO Y|NET.EXE STOP RasAuto SC.EXE CONFIG RasAuto START= disabled ECHO Y|NET.EXE STOP RasMan SC.EXE CONFIG RasMan START= disabled ECHO Y|NET.EXE STOP RemoteRegistry SC.EXE CONFIG RemoteRegistry START= disabled ECHO Y|NET.EXE STOP RemoteAccess SC.EXE CONFIG RemoteAccess START= disabled ECHO Y|NET.EXE STOP WinRM SC.EXE CONFIG WinRM START= disabled REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Services\RasAuto" /v Start /t REG_DWORD /d 4 /f REG.EXE ADD "HKLM\SYSTEM\ControlSet001\Services\RasAuto" /v Start /t REG_DWORD /d 4 /f REG.EXE ADD "HKLM\SYSTEM\ControlSet002\Services\RasAuto" /v Start /t REG_DWORD /d 4 /f REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Services\RasMan" /v Start /t REG_DWORD /d 4 /f REG.EXE ADD "HKLM\SYSTEM\ControlSet001\Services\RasMan" /v Start /t REG_DWORD /d 4 /f REG.EXE ADD "HKLM\SYSTEM\ControlSet002\Services\RasMan" /v Start /t REG_DWORD /d 4 /f REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry" /v Start /t REG_DWORD /d 4 /f REG.EXE ADD "HKLM\SYSTEM\ControlSet001\Services\RemoteRegistry" /v Start /t REG_DWORD /d 4 /f REG.EXE ADD "HKLM\SYSTEM\ControlSet002\Services\RemoteRegistry" /v Start /t REG_DWORD /d 4 /f REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Services\RemoteAccess" /v Start /t REG_DWORD /d 4 /f REG.EXE ADD "HKLM\SYSTEM\ControlSet001\Services\RemoteAccess" /v Start /t REG_DWORD /d 4 /f REG.EXE ADD "HKLM\SYSTEM\ControlSet002\Services\RemoteAccess" /v Start /t REG_DWORD /d 4 /f REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Services\WinRM" /v Start /t REG_DWORD /d 4 /f REG.EXE ADD "HKLM\SYSTEM\ControlSet001\Services\WinRM" /v Start /t REG_DWORD /d 4 /f REG.EXE ADD "HKLM\SYSTEM\ControlSet002\Services\WinRM" /v Start /t REG_DWORD /d 4 /f :END EXIT ------End cut & paste here------ Restart/reboot Windows for these changes to take effect. TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK to all prompts to register/merge/import its information into your registry. -----Begin cut & paste here----- REGEDIT4 ; * Turn OFF remote administration/assistance/desktop/management: [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Remote Assistance] "CreateEncryptedOnlyTickets"=dword:1 "fAllowFullControl"=dword:0 "fAllowToGetHelp"=dword:0 "fEnableChatControl"=dword:0 "MaxTicketExpiry"=dword:0 "MaxTicketExpiryUnits"=dword:0 [HKEY_LOCAL_MACHINE\SOFTWARE\System\ControlSet001\Control\Remote Assistance] "CreateEncryptedOnlyTickets"=dword:1 "fAllowFullControl"=dword:0 "fAllowToGetHelp"=dword:0 "fEnableChatControl"=dword:0 "MaxTicketExpiry"=dword:0 "MaxTicketExpiryUnits"=dword:0 [HKEY_LOCAL_MACHINE\SOFTWARE\System\ControlSet002\Control\Remote Assistance] "CreateEncryptedOnlyTickets"=dword:1 "fAllowFullControl"=dword:0 "fAllowToGetHelp"=dword:0 "fEnableChatControl"=dword:0 "MaxTicketExpiry"=dword:0 "MaxTicketExpiryUnits"=dword:0 ; * Turn OFF remote administration/assistance/desktop/management services: [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RasAuto] "Start"=dword:4 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\RasAuto] "Start"=dword:4 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\RasAuto] "Start"=dword:4 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RasMan] "Start"=dword:4 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\RasMan] "Start"=dword:4 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\RasMan] "Start"=dword:4 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RemoteRegistry] "Start"=dword:4 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\RemoteRegistry] "Start"=dword:4 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\RemoteRegistry] "Start"=dword:4 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RemoteAccess] "Start"=dword:4 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\RemoteAccess] "Start"=dword:4 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\RemoteAccess] "Start"=dword:4 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WinRM] "Start"=dword:4 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\WinRM] "Start"=dword:4 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\WinRM] "Start"=dword:4 ; ------End cut & paste here------ Restart/reboot Windows for these changes to take effect. See also "* Turn OFF/disable Remote Assistance, Remote (Auto) Connection Manager, Remote Registry, Remote Management (WinRM) + uninstall Quick Assist in Windows 10/11:" topic in WIN10.TXT (included): http://www.mdgx.com/10.php http://www.mdgx.com/WIN10.TXT To (re)enable all Remote Assistance, Administration, Desktop + Management WF rule(s) run these commands (example): NETSH.EXE advfirewall firewall set rule group="Remote Assistance" new enable=yes NETSH.EXE advfirewall firewall set rule group="Remote Administration" new enable=yes NETSH.EXE advfirewall firewall set rule group="Remote Desktop" new enable=yes NETSH.EXE advfirewall firewall set rule group="Remote Management" new enable=yes NETSH.EXE advfirewall set allprofiles settings remotemanagement enable and then (re)enable all Windows Remote Assistance, Administration, Desktop + Management options in Control Panel (see above) -> System -> Remote Settings -> enable/check all check boxes/options -> Apply/OK. Also, make sure all services that contain the word "remote" in their names are either on Automatic or Manual: Start -> Run... [hold WinKey + press R] -> type: services.msc press Enter -> double-click on each service with "remote" in its name that is Disabled -> Startup type: -> select Manual -> click Apply/OK. Turn ON (set to Manual, when needed) these interconnected/interdependent/interrelated services: Remote Access Auto Connection Manager [RasAuto] Remote Access Connection Manager [RasMan] Remote Registry [RemoteRegistry] Routing and Remote Access [RemoteAccess] Windows Remote Management (WS-Management) [WinRM] Run... [hold WinKey + press R] -> type: services.msc -> press Enter -> double-click each service above -> Stop (if running) -> Startup type: -> Manual -> Apply/OK. OR (if above doesn't work): TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text BATch (.bat) or CoMmanD (.cmd) script file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the BAT (.bat) or CMD (.cmd) extension -> right-click it -> Run as Administrator -> wait for completion. -----Begin cut & paste here----- @ECHO OFF IF NOT "%OS%"=="Windows_NT" GOTO END ECHO Y|NET.EXE STOP RasAuto SC.EXE CONFIG RasAuto START= demand ECHO Y|NET.EXE STOP RasMan SC.EXE CONFIG RasMan START= demand ECHO Y|NET.EXE STOP RemoteRegistry SC.EXE CONFIG RemoteRegistry START= demand ECHO Y|NET.EXE STOP RemoteAccess SC.EXE CONFIG RemoteAccess START= demand ECHO Y|NET.EXE STOP WinRM SC.EXE CONFIG WinRM START= demand REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Services\RasAuto" /v Start /t REG_DWORD /d 3 /f REG.EXE ADD "HKLM\SYSTEM\ControlSet001\Services\RasAuto" /v Start /t REG_DWORD /d 3 /f REG.EXE ADD "HKLM\SYSTEM\ControlSet002\Services\RasAuto" /v Start /t REG_DWORD /d 3 /f REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Services\RasMan" /v Start /t REG_DWORD /d 3 /f REG.EXE ADD "HKLM\SYSTEM\ControlSet001\Services\RasMan" /v Start /t REG_DWORD /d 3 /f REG.EXE ADD "HKLM\SYSTEM\ControlSet002\Services\RasMan" /v Start /t REG_DWORD /d 3 /f REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry" /v Start /t REG_DWORD /d 3 /f REG.EXE ADD "HKLM\SYSTEM\ControlSet001\Services\RemoteRegistry" /v Start /t REG_DWORD /d 3 /f REG.EXE ADD "HKLM\SYSTEM\ControlSet002\Services\RemoteRegistry" /v Start /t REG_DWORD /d 3 /f REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Services\RemoteAccess" /v Start /t REG_DWORD /d 3 /f REG.EXE ADD "HKLM\SYSTEM\ControlSet001\Services\RemoteAccess" /v Start /t REG_DWORD /d 3 /f REG.EXE ADD "HKLM\SYSTEM\ControlSet002\Services\RemoteAccess" /v Start /t REG_DWORD /d 3 /f REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Services\WinRM" /v Start /t REG_DWORD /d 3 /f REG.EXE ADD "HKLM\SYSTEM\ControlSet001\Services\WinRM" /v Start /t REG_DWORD /d 3 /f REG.EXE ADD "HKLM\SYSTEM\ControlSet002\Services\WinRM" /v Start /t REG_DWORD /d 3 /f :END EXIT ------End cut & paste here------ Restart/reboot Windows for these changes to take effect. TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK to all prompts to register/merge/import its information into your registry. -----Begin cut & paste here----- REGEDIT4 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RasAuto] "Start"=dword:3 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\RasAuto] "Start"=dword:3 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\RasAuto] "Start"=dword:3 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RasMan] "Start"=dword:3 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\RasMan] "Start"=dword:3 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\RasMan] "Start"=dword:3 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RemoteRegistry] "Start"=dword:3 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\RemoteRegistry] "Start"=dword:3 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\RemoteRegistry] "Start"=dword:3 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RemoteAccess] "Start"=dword:3 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\RemoteAccess] "Start"=dword:3 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\RemoteAccess] "Start"=dword:3 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WinRM] "Start"=dword:3 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\WinRM] "Start"=dword:3 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\WinRM] "Start"=dword:3 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Remote Assistance] "fAllowFullControl"=dword:1 "fAllowToGetHelp"=dword:1 "fEnableChatControl"=dword:1 ; ------End cut & paste here------ Restart/reboot Windows for these changes to take effect. To connect to a remote assistant/chat room/helper/network/provider/etc: Start -> Run... [hold WinKey + press R] -> type: msra.exe and follow the step-by-step instructions of the screen. Windows Remote Assistance (MsRA) [MSRA.EXE] + Network Shell (NetSh) [NETSH.EXE] are both located in the %WinDir%\SYSTEM32 folder [%WinDir% = usually C:\WINDOWS]. View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command PATH -> press Enter. View firewall status for all connection types: ECHO Y|NETSH.EXE advfirewall show allprofiles View list of all IPv4 connection(s) (sub)interface(s): NETSH.EXE interface ipv4 show subinterfaces View all NetSh [NETSH.EXE] available command line options, switches + parameters: NETSH.EXE /? * Turn OFF/block unnecessary, obsolete, insecure/unsafe TCP/IP NetBIOS (Network Basic Input/Output System) Helper service [lmhosts], NetBIOS Interface driver [NetBIOS], NetBT service [NetBT] + NetBIOS over TCP/IP (NetBT, NBT) protocols for internet/network connections IF *not* using/connecting to/depending on network(s)/remote/shared computer(s)/server(s), +/- not administering/deploying/maintaining/managing/running/servicing network(s)/server(s) using insecure/obsolete/outdated NetBIOS/NetBT/NBT services, +/- sharing data/files/printers over internet/network(s) who connect to/depend on/use NetBIOS/NetBT/NBT connection(s)/interface(s)/protocol(s) in Windows 7/newer: http://en.wikipedia.org/wiki/NetBIOS_over_TCP/IP http://windowsreport.com/how-to-disable-netbios/ http://support.microsoft.com/help/313314/ http://10dsecurity.com/saying-goodbye-netbios/ http://technet.microsoft.com/library/cc940063.aspx http://support.hidemyass.com/hc/articles/202720396/ http://www.techrepublic.com/blog/it-security/the-problem-with-netbios/ http://www.thewindowsclub.com/how-to-disable-lmhosts-lookup-using-powershell-registry-or-adapter-properties/ http://batcmd.com/windows/10/services/lmhosts/ http://batcmd.com/windows/10/services/netbios/ http://batcmd.com/windows/10/services/netbt/ http://learn.microsoft.com/troubleshoot/windows-server/networking/disable-netbios-tcp-ip-using-dhcp/ http://learn.microsoft.com/troubleshoot/windows-server/networking/direct-hosting-of-smb-over-tcpip/ http://learn.microsoft.com/troubleshoot/windows-server/networking/configure-tcpip-networking-netbios-turn-off/ http://woshub.com/how-to-disable-netbios-over-tcpip-and-llmnr-using-gpo/ http://support.microsoft.com/help/832017/ http://learn.microsoft.com/windows-server/networking/technologies/wins/wins-top/ http://en.wikipedia.org/wiki/Windows_Internet_Name_Service CAUTION: ******** This requires adequate/advanced knowledge about critical computing, operating systems, shared environments, networks, cybersecurity. http://www.mdgx.com/importnt.php Recommended for single user environments without any add-ons/components/extensions/extras/features/services which may require specific configurations/items/properties/settings for proper operation. Not recommended for multiuser/networked/shared/enterprise/server environments which use these features/functions/protocols/services. TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK to all prompts to register/merge/import its information into your registry. -----Begin cut & paste here----- REGEDIT4 [-HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\lmhosts\Security] [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\lmhosts] "LaunchProtected"=dword:0 "UserServiceFlags"=dword:0 "Start"=dword:4 [-HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NetBIOS\Security] [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NetBIOS] "LaunchProtected"=dword:0 "UserServiceFlags"=dword:0 "Start"=dword:3 [-HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NetBT\Security] [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NetBT] "LaunchProtected"=dword:0 "UserServiceFlags"=dword:0 "Start"=dword:3 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NetBT\Parameters] "EnableLMHOSTS"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NetBT\Parameters\Interfaces] "NetbiosOptions"=dword:2 [-HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\lmhosts\Security] [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\lmhosts] "LaunchProtected"=dword:0 "UserServiceFlags"=dword:0 "Start"=dword:4 [-HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\NetBIOS\Security] [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\NetBIOS] "LaunchProtected"=dword:0 "UserServiceFlags"=dword:0 "Start"=dword:3 [-HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\NetBT\Security] [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\NetBT] "LaunchProtected"=dword:0 "UserServiceFlags"=dword:0 "Start"=dword:3 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\NetBT\Parameters] "EnableLMHOSTS"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\NetBT\Parameters\Interfaces] "NetbiosOptions"=dword:2 [-HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\lmhosts\Security] [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\lmhosts] "LaunchProtected"=dword:0 "UserServiceFlags"=dword:0 "Start"=dword:4 [-HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\NetBIOS\Security] [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\NetBIOS] "LaunchProtected"=dword:0 "UserServiceFlags"=dword:0 "Start"=dword:3 [-HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\NetBT\Security] [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\NetBT] "LaunchProtected"=dword:0 "UserServiceFlags"=dword:0 "Start"=dword:3 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\NetBT\Parameters] "EnableLMHOSTS"=dword:0 [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\NetBT\Parameters\Interfaces] "NetbiosOptions"=dword:2 ; ------End cut & paste here------ Start button/icon/logo/menu/orb -> Run... [hold WinKey + press R] -> type this command: CONTROL.EXE /name Microsoft.NetworkAndSharingCenter OR: Control Panel (CP) -> Network and Sharing Center -> Active Networks -> click item right side of Connections: -> "your Internet/Network Connection name" icon/item -> Properties button -> Networking tab -> This connection is using the following items: -> Internet Protocol Version 4 (TCP/IPv4) -> General tab -> Advanced... button -> WINS (Windows Internet Name Service) tab -> UNcheck Enable LMHOSTS lookup box -> NetBIOS setting -> check Disable NetBIOS over TCP/IP box -> Apply/OK. http://www.thewindowsclub.com/wp-content/uploads/2020/11/Disable-NetBIOS-over-TCP-IP.png IF *not* using/connecting to/depending on any network(s)/server(s)/printer(s) (see further above) using insecure/obsolete/outdated NetBIOS (NetBT, NBT) protocol(s)/interface(s), you can create custom (new) Windows (Defender) Firewall (WF) rules to block all TCP + UDP requests in both directions (in + out) for the 4 vulnerable local ports [137, 138, 139 + 445] used by NetBIOS (NetBT, NBT): http://www.grc.com/port_137.htm http://www.grc.com/port_138.htm http://www.grc.com/port_139.htm http://www.grc.com/port_445.htm From a DOS console (command prompt) -> right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run these commands -> press Enter after each line (examples): NETSH.EXE advfirewall firewall add rule name="Block_NetBIOS_port_137_TCP_IN" protocol=tcp localport=137 dir=in action=block enable=yes NETSH.EXE advfirewall firewall add rule name="Block_NetBIOS_port_137_TCP_OUT" protocol=tcp localport=137 dir=out action=block enable=yes NETSH.EXE advfirewall firewall add rule name="Block_NetBIOS_port_137_UDP_IN" protocol=udp localport=137 dir=in action=block enable=yes NETSH.EXE advfirewall firewall add rule name="Block_NetBIOS_port_137_UDP_OUT" protocol=udp localport=137 dir=out action=block enable=yes NETSH.EXE advfirewall firewall add rule name="Block_NetBIOS_port_138_TCP_IN" protocol=tcp localport=138 dir=in action=block enable=yes NETSH.EXE advfirewall firewall add rule name="Block_NetBIOS_port_138_TCP_OUT" protocol=tcp localport=138 dir=out action=block enable=yes NETSH.EXE advfirewall firewall add rule name="Block_NetBIOS_port_138_UDP_IN" protocol=udp localport=138 dir=in action=block enable=yes NETSH.EXE advfirewall firewall add rule name="Block_NetBIOS_port_138_UDP_OUT" protocol=udp localport=138 dir=out action=block enable=yes NETSH.EXE advfirewall firewall add rule name="Block_NetBIOS_port_139_TCP_IN" protocol=tcp localport=139 dir=in action=block enable=yes NETSH.EXE advfirewall firewall add rule name="Block_NetBIOS_port_139_TCP_OUT" protocol=tcp localport=139 dir=out action=block enable=yes NETSH.EXE advfirewall firewall add rule name="Block_NetBIOS_port_139_UDP_IN" protocol=udp localport=139 dir=in action=block enable=yes NETSH.EXE advfirewall firewall add rule name="Block_NetBIOS_port_139_UDP_OUT" protocol=udp localport=139 dir=out action=block enable=yes NETSH.EXE advfirewall firewall add rule name="Block_NetBIOS_port_445_TCP_IN" protocol=tcp localport=445 dir=in action=block enable=yes NETSH.EXE advfirewall firewall add rule name="Block_NetBIOS_port_445_TCP_OUT" protocol=tcp localport=445 dir=out action=block enable=yes NETSH.EXE advfirewall firewall add rule name="Block_NetBIOS_port_445_UDP_IN" protocol=udp localport=445 dir=in action=block enable=yes NETSH.EXE advfirewall firewall add rule name="Block_NetBIOS_port_445_UDP_OUT" protocol=udp localport=445 dir=out action=block enable=yes Network Shell (NetSh) [NETSH.EXE] is located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually C:\WINDOWS]. View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command PATH -> press Enter. View all NetSh [NETSH.EXE] available command line options, switches + parameters: NETSH.EXE /? * Turn OFF/block all TCP + UDP requests in both directions (incoming + outgoing) for local port 135 used by E(P)MAP (End Point Mapper) protocol for DCE (Distributed Computing Environment)/DCP (Deferred Procedure Call)/RPC (Remote Procedure Call) Locator service, not needed if not administering/deploying/managing/maintaining/running/servicing network(s)/server(s) that connect to/depend on/need/use this potocol/service, by creating custom (new) Windows Firewall (WF) rules: http://whatportis.com/ports/135_microsoft-epmap/ http://www.grc.com/port_135.htm http://www.speedguide.net/port.php?port=135 http://en.wikipedia.org/wiki/Port_135 http://learn.microsoft.com/windows/security/threat-protection/windows-firewall/create-inbound-rules-to-support-rpc/ http://learn.microsoft.com/troubleshoot/windows-server/networking/configure-rpc-dynamic-port-allocation-with-firewalls/ http://en.wikipedia.org/wiki/Deferred_Procedure_Call http://en.wikipedia.org/wiki/DCE/RPC http://en.wikipedia.org/wiki/Microsoft_RPC http://en.wikipedia.org/wiki/Remote_procedure_call http://en.wikipedia.org/wiki/Distributed_Computing_Environment From a DOS console (command prompt) -> right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run these commands -> press Enter after each line (examples): NETSH.EXE advfirewall firewall add rule name="BLOCK_EMAP_port_135_TCP_IN" protocol=tcp localport=135 dir=in action=block enable=yes NETSH.EXE advfirewall firewall add rule name="BLOCK_EMAP_port_135_TCP_OUT" protocol=tcp localport=135 dir=out action=block enable=yes NETSH.EXE advfirewall firewall add rule name="BLOCK_EMAP_port_135_UDP_IN" protocol=udp localport=135 dir=in action=block enable=yes NETSH.EXE advfirewall firewall add rule name="BLOCK_EMAP_port_135_UDP_OUT" protocol=udp localport=135 dir=out action=block enable=yes See "* Control/optimize/secure advanced Windows Firewall (WF) behavior using Network Shell (NetSh) [NETSH.EXE] DOS console command line tool in Windows 7/newer:" topic (further above) to disable all Remote Assistance, Administration, Desktop + Management RPC/E(P)MAP Windows Firewall (WF) rules using Network Shell (NetSh) [NETSH.EXE] DOS console command line tool. Network Shell (NetSh) [NETSH.EXE] is located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually C:\WINDOWS]. View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command PATH -> press Enter. View all NetSh [NETSH.EXE] available command line options, switches + parameters: NETSH.EXE /? * Configure/customize, import/export + restore default Windows Firewall (WF) rules in Windows 7/newer: http://www.microsoftpressstore.com/articles/article.aspx?p=2224362&seqNum=2 http://github.com/metablaster/WindowsFirewallRuleset http://www.winaero.com/export-and-import-specific-firewall-rule-in-windows-10/ http://woshub.com/windows-firewall-settings-group-policy/ http://www.dummies.com/computers/operating-systems/windows-10/how-to-change-windows-10-firewall-settings-to-allow-certain-programs/ http://www.thewindowsclub.com/how-to-backup-restore-reset-to-defaults-windows-7-firewall-settings/ http://www.winhelponline.com/blog/reset-firewall-defaults-restore-rules-advanced-security/ http://learn.microsoft.com/windows/security/threat-protection/windows-firewall/configure-windows-firewall-to-suppress-notifications-when-a-program-is-blocked/ http://www.xspdf.com/resolution/51904145.html http://sourcedaddy.com/windows-7/configuring-windows-firewall-options.html http://learn.microsoft.com/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/ * FIX: Block/stop Microsoft from tracking + spying on you behind your back using Windows (Defender) Firewall [W(D)F] custom firewall rules in Windows 7/newer: http://www.winaero.com/blog/stop-windows-10-spying-on-you-using-just-windows-firewall/ File: http://www.winaero.com/download.php?view.1839 http://www.winaero.com/downloads/block_telemetry.zip 1. Use an unZIPping/unARChiving/unRARing tool [free(ware)] http://www.mdgx.com/toy.htm#ZIP to open "block_telemetry.zip" archive and extract "add rules.cmd" + "rules.ps1" into the same dedicated/empty directory/folder. 2. Open Explorer/similar/replacement -> right-click "add rules.cmd" -> Run as Administrator -> wait for all W(D)F rules to be created -> exit BATch CoMmanD script file. 3. Done. * Turn ON DNS Client (DNS Cache) service for Windows Firewall Control (WFC) notifications + network discovery functions: TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text BATch (.bat) or CoMmanD (.cmd) script file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the BAT (.bat) or CMD (.cmd) extension -> right-click it -> Run as Administrator -> wait for completion. -----Begin cut & paste here----- @ECHO OFF IF NOT "%OS%"=="Windows_NT" GOTO END :: DNS Client caches Domain Name System names (DNS Cache service): SC.EXE CONFIG DNSCache START= demand ECHO Y|NET.EXE START DNSCache :: DNS Cache can be flushed ONLY if DNS Cache service is running: START /WAIT IPCONFIG.EXE /flushdns :END EXIT ------End cut & paste here------ IPConfig [IPCONFIG.EXE] is located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually C:\WINDOWS]. View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command PATH -> press Enter. Windows Firewall Control (WFC) 32-bit + 64-bit for Windows 7/newer extends Windows (Defender) Firewall [W(D)F] functionality + adds extra features, highly customizable: http://www.binisoft.org/wfc.php File: http://www.binisoft.org/download/wfc6setup.exe Requires: Microsoft .Net Framework Redistributable (NFR) 4.5/newer: http://www.mdgx.com/add.htm#NFR MDGx 10_BLOCK DNS Cache service batch CoMmanD (.CMD) files (both included), STARTDNS.CMD STOP!DNS.CMD are also available online [renamed as TeXT = .TXT]: http://www.mdgx.com/10BLK/STARTDNS.CMD.TXT http://www.mdgx.com/10BLK/STOP!DNS.CMD.TXT If you prefer -> download them both to your computer/device -> rename .TXT extension to .CMD for both files -> right-click on each 1 -> Run as Administrator. STARTDNS.CMD + STOP!DNS.CMD = both detailed in 10_BLOCK.TXT (included): http://www.mdgx.com/10BLK/10_BLOCK.php http://www.mdgx.com/10BLK/10_BLOCK.TXT MDGx "HOSTS Guide" -> "DNS Client Service": http://www.mdgx.com/hosts.php#N2 Wikipedia: DNS caching: http://en.wikipedia.org/wiki/Name_server#Caching_name_server * FIX: Turn ON network discovery + detection of network(ed) computers + devices in Windows 7/newer: http://answers.microsoft.com/en-us/windows/forum/all/why-do-i-get-the-message-network-discovery-is/a6964130-5f98-4640-a064-f59fae974ad3/ http://answers.microsoft.com/en-us/windows/forum/windows_10-networking/connecting-pcs-and-users-for-sharing/fb92e439-5dbc-4367-9857-1ef360e9ffdf/ http://www.tenforums.com/tutorials/49652-turn-off-network-discovery-windows-10-a.html http://www.itechguides.com/windows-10-network-discovery/ http://www.wintips.org/fix-windows-10-network-computers-not-showing/ http://windowsreport.com/file-explorer-detect-network-devices-fix/ http://support.microsoft.com/help/2722035/ Enable + Start these Windows services: DNS Client (Dnscache) Function Discovery Provider Host (fdPHost) Function Discovery Resource Publication (FDResPub) HomeGroup Listener (HomeGroupListener) HomeGroup Provider (HomeGroupProvider) SSDP Discovery (SSDPSRV) TCP/IP NetBIOS Helper (lmhosts) UPnP Device Host (upnphost) In case you're using a large HOSTS file with thousands (or even more) of redirected servers [like I do ;-/], the DNS Cache service (if started) may take too long to process all the servers listed in the HOSTS file. In such cases it is recommended to flush the DNS Cache -> see this command line (included in the BATch file below): START /WAIT IPCONFIG.EXE /flushdns IPConfig [IPCONFIG.EXE] is located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually C:\WINDOWS]. View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command PATH -> press Enter. More info @ MDGx "HOSTS Files, Guides + Tools": http://www.mdgx.com/hosts.php#N2 The HOSTS file is located in the %WinDir%\SYSTEM32\Drivers\ETC directory/folder [%WinDir% = usually C:\WINDOWS]. View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command PATH -> press Enter. TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text BATch (.bat) or CoMmanD (.cmd) script file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the BAT (.bat) or CMD (.cmd) extension -> right-click it -> Run as Administrator -> wait for completion. -----Begin cut & paste here----- @ECHO OFF IF NOT "%OS%"=="Windows_NT" GOTO END :: DNS Client caches Domain Name System names (DNS Cache service): SC.EXE CONFIG DNSCache START= demand ECHO Y|NET.EXE START DNSCache :: DNS Cache can be flushed ONLY if DNS Cache service is running: START /WAIT IPCONFIG.EXE /flushdns :: Function Discovery Provider Host (fdPHost) service: SC.EXE CONFIG fdPHost START= demand ECHO Y|NET.EXE START fdPHost :: Function Discovery Resource Publication (FDResPub) service: SC.EXE CONFIG FDResPub START= demand ECHO Y|NET.EXE START FDResPub :: HomeGroup Listener (HomeGroupListener) service: SC.EXE CONFIG HomeGroupListener START= demand ECHO Y|NET.EXE START HomeGroupListener :: HomeGroup Provider (HomeGroupProvider) service: SC.EXE CONFIG HomeGroupProvider START= demand ECHO Y|NET.EXE START HomeGroupProvider :: SSDP Discovery (SSDPSRV) service: SC.EXE CONFIG SSDPSRV START= demand ECHO Y|NET.EXE START SSDPSRV :: TCP/IP NetBIOS Helper (lmhosts) service: SC.EXE CONFIG lmhosts START= demand ECHO Y|NET.EXE START lmhosts :: UPnP Device Host (upnphost) service: SC.EXE CONFIG upnphost START= demand ECHO Y|NET.EXE START upnphost NETSH.EXE advfirewall firewall set rule group="Network Discovery" new enable=yes :END EXIT ------End cut & paste here------ IPConfig [IPCONFIG.EXE], Net(work) Resources Manager [NET.EXE], Net(work) Sh(ell) [NETSH.EXE] + S(ervice) C(ontrol) [C(onfiguration)] [SC.EXE] are all located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually C:\WINDOWS]. View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command PATH -> press Enter. * Turn OFF/block Windows Update (WU) service [wuauserv] by creating Windows (Defender) Firewall [W(D)F] rules (example): http://social.technet.microsoft.com/forums/lync/62b9fd5c-10b2-4266-bc15-fcf3e79d20d4/ In order for Windows Update (WU) to check whether an update is available and then approve to download the update file(s), 1st you need to create an Outbound Rule to block the WU service (wuauserv) pass through: Start button/icon/logo/menu/orb -> Run... [hold WinKey + press R] -> type: wf.msc -> OK/Enter -> Windows (Defender) Firewall [W(D)F] with Advanced Security -> create new Outbound Rule to block %SystemRoot%\SYSTEM32\svchost.exe from passing through both ways (in + out) on behalf of Windows Update (WU) service [wuauserv]: wuauserv Name: Block wuauserv OUTBOUND Group: Profile: All Enabled: Yes Action: Block Program: %SystemRoot%\SYSTEM32\svchost.exe Local Address: Any Remote Address: Any Protocol: Any Local Port: Any Remote Port: Any Allowed Computers: Any Status: Ok Service: wuauserv Rule Source: Local Setting Interface Type: All interface types Excepted Computers: None Description: To close the outbound firewall: Outbound connections -> Blocked (unless explicitly blocked by specific rule). By default (built-in/preinstalled/preset firewall rules) everything is Allowed, so the outbound firewall is wide open. TIP: **** Windows NTx built-in/default/pre-installed/preset machine/system (apply to all users on the same machine) + local/user (apply only to the current/logged on user) environment variables used for target system/user directories/folders: http://www.ss64.com/nt/syntax-variables.html http://pureinfotech.com/list-environment-variables-windows-10/ http://www.computerhope.com/issues/ch000549.htm - %SystemRoot% = usually C:\WINDOWS [same as %WinDir%]. - %WinDir% = usually C:\WINDOWS [same as %SystemRoot%]. CAUTION: ******** Windows operating system (OS) integrity, proper functionality + correct operation *depend* on the *validity* of *all* these variables! INvalid/wrong parameters can render Windows INoperable or/and UNbootable, and you may have to reinstall from scratch or repair your operating system (OS), eventually using the original storage media containing Windows Setup files! Some of these variables can be added/customized/deleted/modified by using a Control Panel (CP)/Windows Settings (WS) tool: Run... [hold WinKey + press R] -> type this command SystemPropertiesAdvanced.exe -> press Enter -> Advanced tab -> Environment Variables... button -> edit variables -> highlight respective line -> Edit button -> change parameters -> OK -> OK. View the list of all your Windows operating system (OS) environment variables from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command SET -> press Enter. OR Save it to a plain text/ASCII (.txt) file: from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type same command above followed by the name of the file (in this example it will be saved in C:\ root) SET>C:\Windows_Environment_Variables.txt -> press Enter -> use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to view text file contents. Example of Windows Vista/newer list of relevant environment variables [replace all User_Name instances with your actual user name]: ----------snippity-snip---------- ALLUSERSPROFILE=C:\ProgramData APPDATA=C:\Users\PC\AppData\Roaming [OR: APPDATA=C:\Windows\system32\config\systemprofile\AppData\Roaming] CommonProgramFiles=C:\Program Files\Common Files CommonProgramFiles(x86)=C:\Program Files (x86)\Common Files [exists only in Windows 64-bit (x64)] CommonProgramW6432=C:\Program Files\Common Files ComSpec=C:\Windows\system32\cmd.exe DriverData=C:\Windows\System32\Drivers\DriverData HOMEDRIVE=C: HOMEPATH=\WINDOWS\SYSTEM32 [OR: HOMEPATH=\Users\User_Name] LOCALAPPDATA=C:\Users\PC\AppData\Local [OR: LOCALAPPDATA=C:\Windows\system32\config\systemprofile\AppData\Local] OS=Windows_NT ProgramData=C:\ProgramData ProgramFiles=C:\Program Files ProgramFiles(x86)=C:\Program Files (x86) [exists only in Windows 64-bit (x64)] ProgramW6432=C:\Program Files PSModulePath=%ProgramFiles%\WindowsPowerShell\Modules;C:\Windows\system32\WindowsPowerShell\v1.0\Modules PUBLIC=C:\Users\Public SystemDrive=C: SystemRoot=C:\Windows TEMP=C:\Users\PC\AppData\Local\Temp [OR: TEMP=C:\Windows\TEMP] TMP=C:\Users\PC\AppData\Local\Temp [OR: TMP=C:\Windows\TEMP] USERNAME=User_Name USERPROFILE=C:\Users\User_Name [OR: USERPROFILE=C:\Windows\system32\config\systemprofile] windir=C:\Windows ----------snippity-snip---------- * *Never* block/disable/stop/turn off *any* of these core/critical/essential/mandatory/vital Windows 7/newer apps/EXEcutables/processes/programs/residents/services: Process Name Process Path ============================================== lsass.exe %WinDir%\SYSTEM32\lsass.exe services.exe %WinDir%\SYSTEM32\services.exe svchost.exe %WinDir%\SYSTEM32\svchost.exe wininit.exe %WinDir%\SYSTEM32\wininit.exe %WinDir% = usually C:\WINDOWS . BEWARE: ******* If you do, Windows will *not* reboot/restart, become unusable, and you will need to reinstall or repair install your Operating System (OS)! * Windows 7/7 SP1 built-in/default/preinstalled/preset Windows Firewall (WF) rules (examples): http://technet.microsoft.com/network/bb545423/ http://technet.microsoft.com/library/ee126090/ http://www.sevenforums.com/tutorials/525-windows-firewall-restore-default-settings.html http://www.thewindowsclub.com/reset-windows-firewall-settings/ http://www.howtogeek.com/201658/how-to-reset-the-windows-firewall-rules-to-default/ http://www.howtogeek.com/112564/how-to-create-advanced-firewall-rules-in-the-windows-firewall/ AET = Allow Edge Traversal BET = Block Edge Traversal Core Networking = INBOUND: ************************** 01. Destination Unreachable (ICMPv6) [AET] 02. Destination Unreachable Fragmentation Needed (ICMPv4) [BET] 03. DHCP [BET] 04. DHCP IPv6 (DHCPv6) [BET] 05. IGMP [BET] 06. TPHTTPS (TCP) = Allows IPHTTPS tunneling technology to provide connectivity across HTTP proxies + firewalls [BET] 07. IPv6 = Required to permit IPv6 traffic for ISATAP (intra site automatic tunnel addressing protocol) and 6-to-4 tunneling services [BET] 08. Multicast Listener Done (ICMPv6) [BET] 09. Multicast Listener Query (ICMPv6) [BET] 10. Multicast Listener Report (ICMPv6) [BET] 11. Multicast Listener Report v2 (ICMPv6) [BET] 12. Neighbor Discovery Advertisement (ICMPv6) [AET] 13. Neighbor Discovery Solicitation (ICMPv6) [AET] 14. Packet Too Big (ICMPv6) [AET] 15. Parameter Problem (ICMPv6) [AET] 16. Router Advertisement (ICMPv6) [BET] 17. Router Solicitation (ICMPv6) [BET] 18. Teredo (UDP) = Allows Teredo edge traversal. Provides address assignment + autotunneling for IPv6 traffic for IPv6/IPv4 host located behind an IPv4 NAT [BET] 19. Time Exceeded (ICMPv6) [AET] Core Networking = OUTBOUND: *************************** 01. DNS (UDP) 02. DHCP 03. DHCP IPv6 (DHCPv6) 04. Group Policy (LSASS) [DOMAIN ONLY] 05. Group Policy (NP) [DOMAIN ONLY] 06. Group Policy (TCP) [DOMAIN ONLY] 07. IGMP 08. TPHTTPS (TCP) 09. IPv6 10. Multicast Listener Done (ICMPv6) 11. Multicast Listener Query (ICMPv6) 12. Multicast Listener Report (ICMPv6) 13. Multicast Listener Report v2 (ICMPv6) 14. Neighbor Discovery Advertisement (ICMPv6) 15. Neighbor Discovery Solicitation (ICMPv6) 16. Packet Too Big (ICMPv6) 17. Parameter Problem (ICMPv6) 18. Router Advertisement (ICMPv6) 19. Router Solicitation (ICMPv6) 20. Teredo (UDP) 21. Time Exceeded (ICMPv6) * Free Firewall 32-bit + 64-bit for Windows 7/newer enhanced firewall tool, highly customizable: http://www.evorim.com/en/free-firewall/ File: http://www.evorim.com/download/freefirewall-setup.exe * Firewall App Blocker (FAB) 32-bit + 64-bit for Windows 7/newer allows/blocks inbound + outbound app(lication)s/EXEcutables (.exe)/programs, highly customizable: http://www.sordum.org/8125/ File: http://www.sordum.org/files/firewall-app-blocker/fab.zip * Windows Firewall Control (WFC) 32-bit + 64-bit for Windows 7/newer extends Windows (Defender) Firewall [W(D)F] functionality + adds extra features, highly customizable: http://www.binisoft.org/wfc.php File: http://www.binisoft.org/download/wfc6setup.exe Requires: Microsoft .Net Framework Redistributable (NFR) 4.5/newer: http://www.mdgx.com/add.htm#NFR Enable DNS Client (DNS Cache) service for WFC notifications: -----Begin cut & paste here----- @ECHO OFF IF NOT "%OS%"=="Windows_NT" GOTO END :: DNS Client caches Domain Name System names (DNS Cache service): SC.EXE CONFIG DNSCache START= auto ECHO Y|NET.EXE START DNSCache :: DNS cache can be flushed ONLY if DNS Cache service is running! START /WAIT IPCONFIG.EXE /flushdns :END EXIT ------End cut & paste here------ IPConfig [IPCONFIG.EXE] is located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually C:\WINDOWS]. View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command PATH -> press Enter. MDGx 10_BLOCK DNS Cache service batch CoMmanD (.CMD) files (both included), STARTDNS.CMD STOP!DNS.CMD are also available online [renamed as TeXT = .TXT]: http://www.mdgx.com/10BLK/STARTDNS.CMD.TXT http://www.mdgx.com/10BLK/STOP!DNS.CMD.TXT If you prefer -> download them both to your computer/device -> rename .TXT extension to .CMD for both files -> right-click on each 1 -> Run as Administrator. STARTDNS.CMD + STOP!DNS.CMD = both detailed in 10_BLOCK.TXT (included): http://www.mdgx.com/10BLK/10_BLOCK.php http://www.mdgx.com/10BLK/10_BLOCK.TXT MDGx "HOSTS Guide" -> "DNS Client Service": http://www.mdgx.com/hosts.php#N2 Wikipedia: DNS caching: http://en.wikipedia.org/wiki/Name_server#Caching_name_server ______________________________________________________________________________ Turn OFF NVidia Telemetry Turn OFF NVidia Telemetry, NVidia Data Collection + interconnected/interdependent/interrelated services bundled with NVidia graphics drivers: Download + install Disable Nvidia Telemetry tool [free, open source]: http://github.com/NateShoffner/Disable-Nvidia-Telemetry/ File: http://github.com/NateShoffner/Disable-Nvidia-Telemetry/releases/latest/ Disable Nvidia Telemetry Guide: http://www.ghacks.net/2016/11/07/nvidia-telemetry-tracking/ http://forum.palemoon.org/viewtopic.php?t=15686&start=20 Right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run these commands -> press Enter after each line: - Disable NVidia telemetry scheduled tasks commands: SCHTASKS.EXE /change /TN NvTmMon_{B2FE1952-0186-46C3-BAEC-A80AA35AC5B8} /disable SCHTASKS.EXE /change /TN NvTmRep_{B2FE1952-0186-46C3-BAEC-A80AA35AC5B8} /disable SCHTASKS.EXE /change /TN NvTmRepOnLogon_{B2FE1952-0186-46C3-BAEC-A80AA35AC5B8} /disable - Uninstall NVidia telemetry service command: RUNDLL32.EXE "%ProgramFiles%\NVIDIA Corporation\Installer2\InstallerCore\NVI2.DLL",UninstallPackage NvTelemetryContainer RUNDLL32.EXE + SCHTASKS.EXE are both located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually C:\WINDOWS], listed in your system PATH. View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command PATH -> press Enter. Add lines between Cut & Paste below to your %WinDir%\SYSTEM32\DRIVERS\ETC\HOSTS [and to your %WinDir%\SysWOW64\DRIVERS\ETC\HOSTS if using Windows NTx 64-bit (x64)] file -> edit HOSTS using Notepad/similar plain text editor: http://www.mdgx.com/toy.htm#TXT Edit HOSTS file in Windows 7/newer: http://www.petri.com/edit-hosts-file-windows-7/ http://www.petri.com/edit-hosts-file-windows-8/ http://www.petri.com/easily-edit-hosts-file-windows-10/ http://www.petri.com/easily-edit-the-hosts-file-in-windows-11/ MDGx "HOSTS Files, Guides + Tools": http://www.mdgx.com/hosts.php -----Begin cut & paste here----- ############################################################################## # MDGx HOSTS with > 225000 hostnames: # http://www.mdgx.com/hosts.php # HOSTS (plain text/ASCII ANSI encoded file) is located in %windir% [usually C:\WINDOWS] in Windows 9x or # %windir%\SYSTEM32\DRIVERS\ETC in Windows NTx. # Transmission Control Protocol/Internet Protocol (TCP/IP) maps Internet Protocol (IP) addresses (1st column) to # corresponding hostnames (2nd column): # http://en.wikipedia.org/wiki/Hosts_%28file%29 # Each entry must be on its own separate line. Columns must be separated by at least 1 space or tab. # All lines starting with a pound/hash sign (#) are comments/remarks and are not processed. # Domain Name System (DNS) itself handles localhost name resolution: # http://en.wikipedia.org/wiki/Localhost # All local host(s) lines must be listed at the top of the HOSTS file in this exact order: # http://en.wikipedia.org/wiki/Multicast_address # 1. Internet Protocol version 4 (IPv4). # http://en.wikipedia.org/wiki/IPv4 # 2. Internet Protocol version 6 (IPv6). # http://en.wikipedia.org/wiki/IPv6 # Lines below map IPv4 local protocols: # http://en.wikipedia.org/wiki/Reserved_IP_addresses#IPv4 0.0.0.0 null 0.0.0.0 0.0.0.0 127.0.0.1 localhost 127.0.0.1 localhost.localdomain 127.0.0.1 localdomain 127.0.0.1 local 255.255.255.255 broadcasthost # Lines below map IPv6 local protocols: # http://en.wikipedia.org/wiki/Reserved_IP_addresses#IPv6 ::0 null ::1 localhost ::1 ip6-localhost ::1 ip6-loopback fe80::1%lo0 localhost fe00::0 ip6-localnet ff00::0 ip6-mcastprefix ff02::1 ip6-allnodes ff02::2 ip6-allrouters ff02::3 ip6-allhosts # WARNING: # Some of the disabled sites in this file will attempt to HACK/INFECT/INSTALL malware/spyware +/- PHISH/SPY on # your computer(s)/device(s) the moment you ENABLE and ACCESS them! # http://www.mdgx.com/hosts.php#AB # IPv4 hostnames below are disabled -> redirected to 0.0.0.0 (null). # http://en.wikipedia.org/wiki/0.0.0.0 # Alternatively can be redirected to 127.0.0.1 (localhost), but will take longer to process with large number of # HOSTS entries. # http://en.wikipedia.org/wiki/Hostname # To (re)enable/disable/edit/customize -> open HOSTS file as Administrator in Notepad/similar/better free(ware) # plain text/ASCII editor # http://www.mdgx.com/toy.htm#TXT # -> comment/remark (precede each line with # followed by 1 space) or delete desired line(s) -> save it as HOSTS # (no extension) -> refresh (F5)/restart your app(s)/browser(s)/service(s)/device(s) or reboot/restart if needed. # Edit HOSTS file in Windows 7/newer: # http://www.petri.com/easily-edit-the-hosts-file-in-windows-11/ # http://www.petri.com/easily-edit-hosts-file-windows-10/ # http://www.petri.com/edit-hosts-file-windows-8/ # http://www.petri.com/edit-hosts-file-windows-7/ ############################################################################## # Lines below disable NVidia automatic updates, data collection, surveillance, telemetry, tracking: 0.0.0.0 accounts.nvgs.nvidia.com 0.0.0.0 activation.gfe.nvidia.com 0.0.0.0 api.gfe.nvidia.com 0.0.0.0 assets.nvidiagrid.net 0.0.0.0 download.gfe.nvidia.com 0.0.0.0 events.gfe.nvidia.com 0.0.0.0 gfe.geforce.com 0.0.0.0 gfe.nvidia.com 0.0.0.0 gfwsl.geforce.com 0.0.0.0 images.nvidiagrid.net 0.0.0.0 rds-assets.nvidia.com 0.0.0.0 services.gfe.nvidia.com 0.0.0.0 telemetry.nvidia.com 0.0.0.0 telemetry.gfe.nvidia.com ############################################################################## ------End cut & paste here------ ______________________________________________________________________________ Java No Java * Oracle (Sun) Java Runtime Environment (JRE) Standard Edition (SE) 32-bit + 64-bit -> SOFTWARE.TXT (included): http://www.mdgx.com/add.htm#JAVA * Block/disable Java (out-of-date) prompts + automatic updates: http://discussions.citrix.com/topic/363880-your-java-version-is-out-of-date-how-to-blockdisable/ http://www.itninja.com/question/can-t-suppress-java-1-8-upd-74-update-prompts/ Java network: http://community.spiceworks.com/how_to/65130/ Java Auto Update: http://www.java.com/en/download/help/java_update.xml TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK to all prompts to register/merge/import its information into your registry. -----Begin cut & paste here----- REGEDIT4 [HKEY_LOCAL_MACHINE\SOFTWARE\AppDataLow\Software\JavaSoft\DeploymentProperties] "deployment.security.sandbox.awtwarningwindow"="false" "deployment.expiration.decision"="never" "deployment.expiration.decision.locked"="false" "deployment.expiration.decision.suppression"="false" "deployment.expiration.decision.suppression.locked"="false" "deployment.expiration.check.enabled"="false" "deployment.expiration.check.enabled.locked"="false" "deployment.security.mixcode"="HIDE_RUN" "deployment.security.jsse.hostmismatch.warning"="false" "deployment.security.jsse.hostmismatch.warning.locked"="false" "deployment.roaming.profile"="false" "deployment.system.tray.icon"="false" "deployment.webjava.enabled"="false" ; WOW6432Node registry subkey exists only in Windows NTx 64-bit (x64): [HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\AppDataLow\Software\JavaSoft\DeploymentProperties] "deployment.security.sandbox.awtwarningwindow"="false" "deployment.expiration.decision"="never" "deployment.expiration.decision.locked"="false" "deployment.expiration.decision.suppression"="false" "deployment.expiration.decision.suppression.locked"="false" "deployment.expiration.check.enabled"="false" "deployment.expiration.check.enabled.locked"="false" "deployment.security.mixcode"="HIDE_RUN" "deployment.security.jsse.hostmismatch.warning"="false" "deployment.security.jsse.hostmismatch.warning.locked"="false" "deployment.roaming.profile"="false" "deployment.system.tray.icon"="false" "deployment.webjava.enabled"="false" [HKEY_LOCAL_MACHINE\SOFTWARE\Oracle\JavaDeploy] "WebDeployJava"="disabled" "deployment.modified.timestamp"="9999999999999" "deployment.webjava.enabled"="false" ; WOW6432Node registry subkey exists only in Windows NTx 64-bit (x64): [HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Oracle\JavaDeploy] "WebDeployJava"="disabled" "deployment.modified.timestamp"="9999999999999" "deployment.webjava.enabled"="false" [HKEY_LOCAL_MACHINE\SOFTWARE\JavaSoft] "RegDeployStatus"="0" ; WOW6432Node registry subkey exists only in Windows NTx 64-bit (x64): [HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\JavaSoft] "RegDeployStatus"="0" [HKEY_LOCAL_MACHINE\SOFTWARE\JreMetrics] "DisableSponsors"="Y" ; WOW6432Node registry subkey exists only in Windows NTx 64-bit (x64): [HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\JreMetrics] "DisableSponsors"="Y" [HKEY_LOCAL_MACHINE\SOFTWARE\JavaSoft\Java Update\Policy] "EnableAutoUpdateCheck"=dword:0 "EnableJavaUpdate"=dword:0 "NotifyDownload"=dword:0 "NotifyInstall"=dword:0 "UpdateSchedule"=dword:0 [HKEY_LOCAL_MACHINE\SOFTWARE\JavaSoft\Java Update\Policy\jucheck] "EnableAutoUpdateCheck"=dword:0 "EnableJavaUpdate"=dword:0 "NotifyDownload"=dword:0 "NotifyInstall"=dword:0 "UpdateSchedule"=dword:0 ; WOW6432Node registry subkey exists only in Windows NTx 64-bit (x64): [HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\JavaSoft\Java Update\Policy] "EnableAutoUpdateCheck"=dword:0 "EnableJavaUpdate"=dword:0 "NotifyDownload"=dword:0 "NotifyInstall"=dword:0 "UpdateSchedule"=dword:0 ; WOW6432Node registry subkey exists only in Windows NTx 64-bit (x64): [HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\JavaSoft\Java Update\Policy\jucheck] "EnableAutoUpdateCheck"=dword:0 "EnableJavaUpdate"=dword:0 "NotifyDownload"=dword:0 "NotifyInstall"=dword:0 "UpdateSchedule"=dword:0 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] "SunJavaUpdateSched"=- ; WOW6432Node registry subkey exists only in Windows NTx 64-bit (x64): [HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run] "SunJavaUpdateSched"=- [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run] "SunJavaUpdateSched"=- [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Run] "SunJavaUpdateSched"=- ; ------End cut & paste here------ * Customize (see above) deployment.properties plain text/ASCII file located in: %UserProfile%\AppData\LocalLow\Sun\Java\Deployment C:\Users\%UserName%\AppData\LocalLow\Sun\Java\Deployment TIP: **** Windows NTx built-in/default/pre-installed/preset machine/system (apply to all users on the same machine) + local/user (apply only to the current/logged on user) environment variables used for target system/user directories/folders: http://www.ss64.com/nt/syntax-variables.html http://pureinfotech.com/list-environment-variables-windows-10/ http://www.computerhope.com/issues/ch000549.htm - %UserProfile% = usually C:\Users\%UserName% . - %WinDir% = usually C:\WINDOWS [same as %SystemRoot%]. View the list of all your Windows operating system (OS) environment variables from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command SET -> press Enter. Right-click deployment.properties (see above) -> Open with... -> Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT -> Run as Administrator -> add/change/delete desired lines/values/strings -> save file. * Add Java environment variable(s) to the list of SET commands (example): http://www.ss64.com/nt/set.html TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text BATch (.bat) or CoMmanD (.cmd) script file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the BAT (.bat) or CMD (.cmd) extension -> right-click it -> Run as Administrator -> wait for completion. -----Begin cut & paste here----- @ECHO OFF IF NOT "%OS%"=="Windows_NT" GOTO END IF NOT EXIST %WinDir%\SYSTEM32\SETX.EXE GOTO END SETX.EXE deployment.expiration.check.enabled "false" /M :END EXIT ------End cut & paste here------ ______________________________________________________________________________ Save Files List -> Text * Create, view, save, print, etc the list of all the files inside the drive/partition/volume or directory/folder of your choice, and all their (sub)directories/(sub)folders, in descending Latin based alphabetical order, http://en.wikipedia.org/wiki/Latin-script_alphabet ordered by logical numeric value [0 -> 9 + A -> Z]: http://web.archive.org/web/20150429091622/http://www.computing.net/answers/programming/log-file-date-and-time/18190.html http://web.archive.org/web/20210506121738/http://www.intelliadmin.com/index.php/2007/02/create-a-date-and-time-stamp-in-your-batch-files/ http://www.serverfault.com/questions/16706/ http://www.techrepublic.com/forums/questions/dos-command-help/ http://www.ss64.com/nt/syntax-getdate.html Usage: 1. Example: Highlight/select all (sub)folders and file(s), if more than 1 -> hold down Shift and left-click the 1st and then the last (sub)folder/file on the list without releasing the Shift key. NOTE: In case you highlight/select more than 1 (sub)folder(s)/file(s) a separate text (.txt) file with different date + time stamp(s) will be created in each of the selected (sub)folder(s), if more than 1. 2. Right-click on highlight/selection above -> select "Files &List –––> Text File: MM-DD-YYYY_(h)h-mm-ss.txt" -> go to the (sub)directory/(sub)folder selected above, or to each of them if more than 1 -> now you can see a newly created text (.txt) file -> right-click on it -> select Open or Edit -> will open in your Notepad/similar/better plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT associated with text (.txt) files as default program. 3. View/edit, rename, copy/move, print & save/delete this text file. Explanation: In Windows NTx time displays by default in 24 hours format. Before 10:00 AM the hour display uses only 1 position to hold numbers from 0 to 9. This is what it looks like by running the built-in DOS console TIME command (example): 1:14:16.57 with only 10 total available positions, as 1st 0 doesn't display. After 10:00 AM time display increases to 11 total available positions (example): 11:15:18:33 with 2 positions for hour display. For hours between 0 and 9 you need to use this TIME command: %time:~1,1%. For hours between 0 and 9 you need to use this text (.txt) file naming format (example): File_Name_%date:~4,2%%date:~7,2%%date:~10,4%%time:~1,1%%time:~3,2%%time:~6,2%%time:~9,2%.txt Where: %time:~1,1% = hours %time:~3,2% = minutes %time:~6,2% = seconds %time:~9.2% = milliseconds From 10:00 AM to 24:00 [00:00 AM], when hour display occupies 2 positions, time display has 11 positions, in which case you need to use this TIME command: %time:~0,2% Final code for file name display from 10:00 AM to 24:00 [00:00 AM] looks like this (example): File_Name_%date:~4,2%%date:~7,2%%date:~10,4%%time:~0,2%%time:~3,2%%time:~6,2%%time:~9,2%.txt The built-in DOS console DATE command displays in "Day mm/dd/yyyy" format, so current date looks like this (example): Wed 07/07/2077 for a total of 14 positions, including spaces and demarcations/forward slashes. DATE command format: %date:~4,2% = month display with 2 digits %date:~6,2% = day display with 2 digits %date:~10,4% = year display with 4 digits In case you prefer year display with only 2 digits use this format: %date:~12,2%, You can move any part of the DATE command around to customize presentation format to your liking/needs. Example: if moving year section [%date:10,4%] up front, format changes to [yyyyddmm], and so on. Example of BATch (.bat)/CoMmanD (.cmd) file used for time of day reference, or/and for BATch/CoMmanD job(s) to be scheduled at different time(s) of day, say before and/or after 10:00 AM (example): COPY /Y Old_File_Name.txt New_File_Name_%time:~0,2%%time:~3,2%%time:~6,2%_%date:~-10,2%%date:~-7,2%%date:~-4,4%.txt You can also customize the built-in DOS console DIR command to list files in a different order (example): DIR "%1" /A:-D /B /O:GNE /-P /S View all available DIR command line options, switches + parameters -> type this command DIR /? -> press Enter. TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK to all prompts to register/merge/import its information into your registry. -----Begin cut & paste here----- REGEDIT4 ; Reorder files + directories/folders names alphabetically by logical numeric value -> see further above, also online: ; http://www.mdgx.com/7.php [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer] "NoStrCmpLogical"=dword:1 [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Directory\shell\Files_List_2_Text] @="Files &List –––> Text File: MM-DD-YYYY_(h)h-mm-ss.txt" "Extended"=- "NoWorkingDirectory"="" "SuppressionPolicy"=dword:0 "Icon"="SHELL32.DLL,19" [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Directory\shell\Files_List_2_Text\command] @="CMD.EXE /C DIR \"%1\" /A:-D /B /O:GNE /-P /S>\"%1\"\\\"%%date:~-10,2%%-%%date:~-7,2%%-%%date:~-4,4%%_%%time:~1,1%%-%%time:~3,2%%-%%time:~6,2%%.txt\"" "IsolatedCommand"=- [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Drive\shell\Files_List_2_Text] @="Files &List –––> Text File: MM-DD-YYYY_(h)h-mm-ss.txt" "Extended"=- "NoWorkingDirectory"="" "SuppressionPolicy"=dword:0 "Icon"="SHELL32.DLL,19" [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Drive\shell\Files_List_2_Text\command] @="CMD.EXE /C DIR \"%1\" /A:-D /B /O:GNE /-P /S>\"%1\"\\\"%%date:~-10,2%%-%%date:~-7,2%%-%%date:~-4,4%%_%%time:~1,1%%-%%time:~3,2%%-%%time:~6,2%%.txt\"" "IsolatedCommand"=- [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\*\shell\Files_List_2_Text] @="Files &List –––> Text File: MM-DD-YYYY_(h)h-mm-ss.txt" "Extended"=- "NoWorkingDirectory"="" "SuppressionPolicy"=dword:0 "Icon"="SHELL32.DLL,19" [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\*\shell\Files_List_2_Text\command] @="CMD.EXE /C DIR \"%1\" /A:-D /B /O:GNE /-P /S>\"%1\"\\\"%%date:~-10,2%%-%%date:~-7,2%%-%%date:~-4,4%%_%%time:~1,1%%-%%time:~3,2%%-%%time:~6,2%%.txt\"" "IsolatedCommand"=- ; ------End cut & paste here------ ______________________________________________________________________________ Maximize Your Internet/Network Traffic Speed = MTU Tweak optimal Maximum Transmission Unit (MTU) used by your Internet Service Provider (ISP)/network host/provider to maximize your internet/network connection/interface traffic speed in Windows 7/newer: http://learn.microsoft.com/troubleshoot/windows-client/networking/change-default-mtu-size-for-ppp-vpn-connection/ http://learn.microsoft.com/answers/questions/535814/ http://www.maketecheasier.com/3-ways-to-increase-network-speed-via-registry-editor-windows/ http://myrandomtechblog.com/cryptomining/change-mtu-size-in-windows-10/ http://answers.microsoft.com/en-us/windows/forum/all/how-to-change-mtu-settings-in-windows-10/5c36c250-a0e8-47ee-b01c-de22139dc297/ http://www.networkworld.com/article/2224654/ http://www.techtarget.com/searchnetworking/definition/maximum-transmission-unit/ http://en.wikipedia.org/wiki/Maximum_transmission_unit * Method 1 [the easiest way ;-/]: ********************************* Test your MTU optimal numeric value [measured in bytes (octets)] in 1 step -> type a server IP in the IPv4 box (using google.com IP: 142.250.69.238 in this example): http://www.wikihow.com/Find-Proper-MTU-Size-for-Network http://www.comparitech.com/net-admin/determine-mtu-size-using-ping/ http://www.tp-link.com/us/support/faq/190/ http://faq.draytek.com.au/2020/06/24/tools-available-to-detect-mtu-size/ In case you already have the optimal value of 1500 [the built-in/preset default/standard in Windows NTx OSes and most ISPs + IPv4 networks] your MTU is already configured for maximum speed, and you don't need to do anything else, you're all set. ;-/ * Method 2 [the hard way ;-/]: ****************************** From a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command to view your Maximum Transmission Unit (MTU) value [the built-in/preset default/standard in Windows NTx OSes and most ISPs + IPv4 networks] for your active internet/network Internet Protocol version 4 (IPv4) interface -> press Enter: NETSH.EXE interface ipv4 show subinterfaces In my case: Interface = "Ethernet". Network Shell (NetSh) [NETSH.EXE] DOS console command line tool is located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually C:\WINDOWS]. View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command PATH -> press Enter. NETSH: http://www.ss64.com/nt/netsh.html From a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command by replacing "Ethernet" with the actual name of your active interface in order to set permanently the value of your interface MTU parameter to 1472 (using same interface name from example above: Ethernet) -> press Enter: NETSH.EXE interface ipv4 set subinterface Ethernet mtu=1472 store=persistent Substitute Ethernet with your actual interface name revealed by running previous NetSh "show subinterfaces" command above. 1472 [bytes (octets)] actually translates to MTU=1500, because the "missing" 28 bytes are used by the Internet Control Message Protocol (ICMP) header [8 bytes (octets)] + the Internet Protocol (IP) [20 (octets)]: http://community.arubanetworks.com/browse/articles/blogviewer?blogkey=75a5f030-1e9e-49bd-82d2-9a7f99c5aa82 In case you see this message Ok. you already have the optimal value of 1500 [the built-in/preset default/standard in Windows NTx OSes and most ISPs + IPv4 networks], your MTU is already configured for maximum speed, and you don't need to do anything else, you're all set. ;-/ In case you see any other message your MTU value is other than 1472 [which corresponds to MTU=1500 -> see above] (in rare cases, depending on certain internet/network providers/hosts), and therefore you need to determine its actual value, and set it accordingly in your registry in order to maximize your connection/interface speed. From a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> run this command -> press Enter: PING.EXE google.com -f -l 1472 wait a few seconds, and view the received message. Ping [PING.EXE] DOS console command line tool is located in the %WinDir%\SYSTEM32 directory/folder [%WinDir% = usually C:\WINDOWS]. View all directories/folders listed in your system PATH from a DOS console command prompt [%WinDir%\SYSTEM32\CMD.EXE]: right-click CMD shortcut/CMD.EXE -> Run as Administrator -> type this command PATH -> press Enter. PING: http://www.ss64.com/nt/ping.html If you have received a "Reply" message (example): Reply from 142.250.69.238: bytes=68 (sent 1472) time=14ms TTL=112 followed by Packets: [...] Lost = 0 (0% loss), then your MTU value is 1472 [which corresponds to MTU=1500 -> see above] [the built-in/preset default/standard in Windows NTx OSes and most ISPs + IPv4 networks], and your MTU is already configured for maximum speed, and you don't need to do anything else, you're all set. ;-/ Values for bytes (octets), time [measured in milliseconds = ms] + Time To Live (TTL) [measured in seconds] can be different depending on many changing factors (examples): location, distance (number of hops) from pinged server, type of connection/service, server, latency (lag), traffic health/status. In case you receive a "fragmented" message Packet needs to be fragmented but DF set followed by (example) Packets: [...] Lost = 4 (100% loss), you should re-test again (a few more times if necessary) by lowering your MTU numeric value in small increments [2, 3, 4, 6] until the result is replaced by a normal "Reply" message (example): Reply from 142.250.69.238: bytes=68 (sent 1472) time=14ms TTL=112 In case the returned value is 1472 [which corresponds to MTU=1500 -> see above], then you already have the optimal value of 1500 [the built-in/preset default/standard in Windows NTx OSes and most ISPs + IPv4 networks], and your MTU is already configured for maximum speed, and you don't need to do anything else, you're all set. ;-/ In case your returned value is other than 1472 [which corresponds to MTU=1500 -> see above], then you can determine and set your optimal MTU value -> see "* Method 1 [the easiest way ;-/]:" further above. You can set the optimal MTU value for your active internet/network connection type/connectoid/interface: - by runing the NetSh "store=persistent" command -> see further above. - OR by tweaking your registry -> see below: TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK to all prompts to register/merge/import its information into your registry. -----Begin cut & paste here----- REGEDIT4 ; In this example MTU [32-bit DWORD (REG_DWORD) value] = 5dc [hexadecimal (base 16)] = 1500 [decimal (numeric) (base 10)], ; which is the built-in/preset default/standard in Windows NTx OSes and most ISPs + IPv4 networks: [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{00000000-AAAA-1111-BBBB-222222222222}] "MTU"=dword:5dc [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{00000000-AAAA-1111-BBBB-222222222222}] "MTU"=dword:5dc [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\Tcpip\Parameters\Interfaces\{00000000-AAAA-1111-BBBB-222222222222}] "MTU"=dword:5dc ; ------End cut & paste here------ You need to substitute all "00000000-AAAA-1111-BBBB-222222222222" (generic) instances with your actual Decentralized IDentifier (DID) (hard link) string which corresponds to your active internet/network connection/interface present in your registry under the "CurrentControlSet" Hive Key Local Machine (HKLM) subkey above. See "* Link Directory IDentifier (LDID)/DIRectory IDentifier (DIRID)/Decentralized IDentifier (DID)" topic further above: http://www.mdgx.com/7.php http://www.mdgx.com/WINDOWS7.TXT More info: Wikipedia: Time To Live (TTL): http://en.wikipedia.org/wiki/Time_to_live Wikipedia: Ping: http://en.wikipedia.org/wiki/Ping_(networking_utility) Wikipedia: NetSh: http://en.wikipedia.org/wiki/Netsh MDGx "Comprehensive Windows Registry Guide" chapter in REGISTRY.TXT (included): http://www.mdgx.com/reg.htm MTU tweaking tool [free(ware)]: TCP Optimizer 32-bit tweaks TCP/IP parameters to maximize Internet performance: http://www.speedguide.net/tcpoptimizer.php File: http://www.speedguide.net/files/TCPOptimizer.exe TCP Optimizer Documentation: http://www.speedguide.net/articles.php?category=99 ______________________________________________________________________________ Windows 7/newer Reference, Resources + Free eBooks + Documentation * Windows 7/newer Reference + Resources [English]: - Windows 11: http://en.wikipedia.org/wiki/Windows_11 - Category -> Windows 11: http://en.wikipedia.org/wiki/Category:Windows_11 - Windows 11 Editions + Versions: http://en.wikipedia.org/wiki/Windows_11#Versions - Windows 11 Version History: http://en.wikipedia.org/wiki/Windows_11_version_history - List of features removed in Windows 11: http://en.wikipedia.org/wiki/List_of_features_removed_in_Windows_11 - Criticism of Windows 11: http://en.wikipedia.org/wiki/Windows_11#Reception - Windows 10: http://en.wikipedia.org/wiki/Windows_10 - Category -> Windows 10: http://en.wikipedia.org/wiki/Category:Windows_10 - Windows 10 Editions + Versions: http://en.wikipedia.org/wiki/Windows_10_editions - Windows 10 Version History: http://en.wikipedia.org/wiki/Windows_10_version_history - List of features removed/missing in Windows 10: http://en.wikipedia.org/wiki/List_of_features_removed_in_Windows_10 - Features + functionality removed in Windows 10: http://learn.microsoft.com/windows/deployment/planning/windows-10-removed-features/ - Windows 10 features no longer developed: http://learn.microsoft.com/windows/deployment/planning/windows-10-deprecated-features/ - Criticism of Windows 10: http://en.wikipedia.org/wiki/Criticism_of_Windows_10 - Fix the Most Annoying Things in Windows 10: http://www.pcmag.com/how-to/how-to-fix-the-most-annoying-things-in-windows-10/ - All the Useless Windows 10 Features Microsoft Should Remove: http://www.howtogeek.com/437942/all-the-useless-windows-10-features-microsoft-should-remove/ - List of features removed or deprecated in Windows 10: http://www.thewindowsclub.com/features-removed-in-windows-10/ - Windows 10 Problems, Issues with Solutions and Fixes: http://www.thewindowsclub.com/windows-10-known-issues/ - Windows 10 Creators Update: new and removed features: http://www.ghacks.net/2017/03/28/windows-10-creators-update-new-and-removed-features/ - List of features removed/missing in Windows 8/8.1: http://en.wikipedia.org/wiki/List_of_features_removed_in_Windows_8 - Features and options removed/missing in Windows 8: http://www.msfn.org/board/index.php?showtopic=156585 - 8 Features Microsoft Removed in Windows 8.1: http://www.howtogeek.com/167610/8-features-microsoft-removed-in-windows-8.1/ - 5 core criticisms of Windows 8: http://www.zdnet.com/article/five-core-criticisms-of-windows-8/ - Windows 8.1: http://en.wikipedia.org/wiki/Windows_8.1 - Windows 8: http://en.wikipedia.org/wiki/Windows_8 - Category -> Windows 8/8.1: http://en.wikipedia.org/wiki/Category:Windows_8 - Windows 8 Editions + Versions: http://en.wikipedia.org/wiki/Windows_8_editions - Windows 7: http://en.wikipedia.org/wiki/Windows_7 - Category -> Windows 7: http://en.wikipedia.org/wiki/Category:Windows_7 - Features new to Windows 7: http://en.wikipedia.org/wiki/Features_new_to_Windows_7 - List of features removed/missing in Windows 7: http://en.wikipedia.org/wiki/List_of_features_removed_in_Windows_7 - List of software that doesn't support Windows 7 [+ how to make them work]: http://www.msfn.org/board/index.php?showtopic=181987 - Disadvantages of Windows 7: http://www.techulator.com/resources/3311-Disadvantages-windows.aspx - What are the disadvantages of Windows 7?: http://ostoday.org/windows/quick-answer-what-are-the-disadvantages-of-windows-7.html - Criticism of Windows: http://en.wikipedia.org/wiki/Criticism_of_Microsoft_Windows - Windows NT [NTx]: http://en.wikipedia.org/wiki/Windows_NT - Comparison of Windows versions: http://en.wikipedia.org/wiki/Comparison_of_Microsoft_Windows_versions - List of Windows versions: http://en.wikipedia.org/wiki/List_of_Microsoft_Windows_versions - List of Windows NT [NTx] family codenames: http://en.wikipedia.org/wiki/List_of_Microsoft_codenames#Windows_NT_family * Windows 7/newer eBooks, Guides, Tutorials + Documentation in PDF format [free, English]: - Thiel College: Windows 10 Step by Step - 2nd Edition (2018) [PDF]: http://www.thiel.edu/ee2assets/Win_10_Training_v1.pdf - MS Press: Windows 10 IT Pro Essentials - Support Secrets (2016) [PDF]: http://download.microsoft.com/download/9/3/7/937D982C-7697-4076-99FE-6856DA30B253/Microsoft_Press_ebook_Windows_10_Support_Secrets_PDF.PDF - MS Press: Windows 10 IT Pro Essentials - Top 10 Tools (2016) [PDF]: http://download.microsoft.com/download/7/3/8/7381E0E8-CE72-4366-9849-13B2BAFBBA3C/Microsoft_Press_ebook_Windows_10_Tools_8.5x11.pdf - MS Press: Introducing Windows Server 2016 - Technical Preview (2016) [PDF]: http://download.microsoft.com/download/7/1/B/71B9C665-6D2B-4154-AB7E-9CDC40647B57/697737_ebook_mobile_TechPreview.pdf - MS Press: Introducing Windows 10 for IT Professionals - Technical Preview (2016) [PDF]: http://download.microsoft.com/download/F/4/2/F42AE0AD-A9CB-4EE7-A209-D9A399604A72/Microsoft_Press_eBook_Introducing_Windows_10_PDF.pdf - MS Press: Introducing Windows 10 for IT Professionals - Preview Edition (2015) [PDF]: http://download.microsoft.com/download/D/2/B/D2B18586-8C4F-4F40-828D-99D96489152A/Microsoft_Press_eBook_Introducing_Windows_10_Preview_PDF.pdf - Champlain College: Windows 10 Forensics (2015) [PDF]: http://www.champlain.edu/documents/lcdi/windows%2010%20forensics.pdf - MS Press: Windows 7 Step by Step (2010) [PDF]: http://www.spumonte.com/files/PDFs/_PC%20Books_/Windows%207/MS%20Press%20-%20Windows%207%20Step%20by%20Step.pdf - Windows Guides: Windows 7 The Pocket Guide (RC1) (2009) [PDF]: http://www.spumonte.com/files/PDFs/_PC%20Books_/Windows%207/Windows%207%20-%20The%20Pocket%20Guide.pdf - QUE: Learn Windows 7 (2011) [PDF]: http://www.pearsoned.co.uk/media/learn_win_7_download.pdf - WindowsVJ: Windows 7 Tips & Tricks (2009) [PDF]: http://www.windowsvj.com/wpblog/downloads/Windows%207%20%20Tips%20&%20Trics%20%5BVasu%20Jain%5D.pdf - Wiley: Windows 7 Secrets (2009) [PDF]: http://muricmilorad.files.wordpress.com/2012/03/windows-7-secrets.pdf - MakeUseOf: The Windows 7 Guide (2009) [PDF]: http://manuals.makeuseof.com.s3.amazonaws.com/for-mobile/makeuseof_Windows_7_Guide_r2.pdf - UDM: Windows 7 Quick Reference Guide (2008) [PDF]: http://www.udmercy.edu/about/its/help/files/windows7.pdf - TheLongClimb: Windows 7 Power Users Guide (2009) [PDF]: http://web.archive.org/web/20111110041616/http://www.thelongclimb.com/books/win7powerfree.pdf - MS Press: Windows 7 Resource Kit (2009) [PDF]: http://jacermeno.files.wordpress.com/2010/06/microsoft-press-windows-7-resource-kit-oct-2009.pdf - TheWindowsClub: Windows 7 A Beginner's Guide (2009) [ZIPped PDF]: http://www.thewindowsclub.com/downloads/W7ebookpdf.zip - Dokumen: Microsoft Windows Registry Guide - 2nd Edition (2005) [PDF]: http://dokumen.tips/documents/microsoft-windows-registry-guide-2nd-edition-the-eyeeu-variousmicrosoft-windows.html - winreg-kb: Windows Registry knowledge base (2022) [PDF]: http://winreg-kb.readthedocs.io/_/downloads/en/latest/pdf/ - The Internal Structure of Windows Registry (2009) [PDF format]: http://web.archive.org/web/20190819040818/http://amnesia.gtisc.gatech.edu/~moyix/suzibandit.ltd.uk/MSc/Registry%20Structure%20-%20Main%20V4.pdf - The Windows NT Registry File Format (2009) [PDF format]: http://www.sentinelchicken.com/data/TheWindowsNTRegistryFileFormat.pdf - Windows Registry Forensics (2011) [PDF format]: http://paper.bobylive.com/Security/Windows%20Registry%20Forensics%20%20Advanced%20Digital%20Forensic%20Analysis%20of%20the%20Windows%20Registry.pdf - Computer-PDF: Windows 7/newer Tutorials [PDF]: http://www.computer-pdf.com/operating-system/windows/ ______________________________________________________________________________ Free(ware), Open Source + Portable Software + Games @ MDGx.com * MDGx web pages (all included): - "List of Useful Windows NTx Tools" in TOOLS.TXT: http://www.mdgx.com/tools.php http://www.mdgx.com/TOOLS.TXT - "Windows NTx Power Toys" section in SOFTWARE.TXT: http://www.mdgx.com/toy.htm - "Power Toys on the Internet" section in SOFTWARE.TXT: http://www.mdgx.com/toy.htm#PTL - "Windows NTx Tools" section in SOFTWARE.TXT: http://www.mdgx.com/xptoy.htm - "Internet Power Toys" section in SOFTWARE.TXT: http://www.mdgx.com/nettoys.htm - "Firewalls + Network Toys" section in SOFTWARE.TXT: http://www.mdgx.com/fw.htm - "Free Online Privacy, Safety + Security Scanners" (online only): http://www.mdgx.com/safety.htm - "List of Digital Photography, Imaging + Video Tools for Windows NTx": http://www.mdgx.com/photo.php http://www.mdgx.com/PHOTO.TXT - "Speed-Up + Benchmark Tools" section in SOFTWARE.TXT: http://www.mdgx.com/speed.htm - "Disk Partitioning, Formatting, Backup + Recovery Tools" section in SECRETS.TXT: http://www.mdgx.com/secrets.htm#FDPT - "WWW/FTP, HTML + Image Publishing Tools" (online only): http://www.mdgx.com/html.htm - "FREEbies: Software Sites" (online only): http://www.mdgx.com/free.htm - "PC Games": http://www.mdgx.com/g.htm#GL @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@