User Tools

Site Tools


win10

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
win10 [2021-04-25 14:53:59]
mi [Delete WiFi passwords]
win10 [2024-11-05 15:24:45] (current)
mi [Enable ADMIN$ shares]
Line 6: Line 6:
   cmd /k ver   cmd /k ver
  
-Windows Product key:+===Windows Product key
  
   wmic path SoftwareLicensingService get OA3xOriginalProductKey   wmic path SoftwareLicensingService get OA3xOriginalProductKey
Line 12: Line 12:
 or use [[https://​www.nirsoft.net/​utils/​product_cd_key_viewer.html|NirSoft'​s ProduKey]] or use [[https://​www.nirsoft.net/​utils/​product_cd_key_viewer.html|NirSoft'​s ProduKey]]
  
 +===Get computer name
 +
 +* ''​hostname''​ (hostname.exe) in both CMD and PS
 +* ''​%COMPUTERNAME%''​ in CMD or ''​$ENV:​COMPUTERNAME''​ in PowerShell
 +
 +===Rename computer
 +
 +In admin PowerShell: ​
 +
 +  Rename-Computer "​new_hostname"​
 +
 +or with restart
 +
 +  Rename-Computer "​new_hostname"​ -Restart
  
 ==Language ==Language
Line 42: Line 56:
  
 echo "​Disabling..."​ echo "​Disabling..."​
-reg add "​HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Power"​ /v HiberbootEnabled /d 0 /f+reg add "​HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Power"​ /v HiberbootEnabled ​/t REG_DWORD ​/d 0 /f
  
 echo "​New:"​ echo "​New:"​
Line 49: Line 63:
 PAUSE PAUSE
 </​code>​ </​code>​
 +
 +I think the above registry hack is the same as running
 +
 +  powercfg /hibernate off
 +
 +and then deleting the ''​C:​\hiberfil.sys''​ file
 +
 +
 +
  
 ==Network ==Network
Line 57: Line 80:
 https://​superuser.com/​a/​1160447/​53547 https://​superuser.com/​a/​1160447/​53547
  
-## Change NetWorkConnection Category to Private +Change NetWorkConnection Category to Private. (Requires ​''​-RunasAdministrator''​)
-#Requires -RunasAdministrator+
  
-<code>​Get-NetConnectionProfile |+<file ps net2private.ps1> 
 +Get-NetConnectionProfile |
   Where{ $_.NetWorkCategory -ne '​Private'​} |   Where{ $_.NetWorkCategory -ne '​Private'​} |
   ForEach {   ForEach {
     $_     $_
-    $_|Set-NetConnectionProfile -NetWorkCategory Private -Confirm+    $_ | Set-NetConnectionProfile -NetWorkCategory Private -Confirm
   }   }
-</code>+</file>
  
 ===Delete WiFi passwords ===Delete WiFi passwords
Line 81: Line 104:
 "By default, Windows Vista and newer versions of Windows prevent local accounts from accessing administrative shares through the network."​ ([[https://​docs.microsoft.com/​en-us/​troubleshoot/​windows-client/​networking/​cannot-logon-access-administrative-share#​cause|docs.microsoft.com]]) "By default, Windows Vista and newer versions of Windows prevent local accounts from accessing administrative shares through the network."​ ([[https://​docs.microsoft.com/​en-us/​troubleshoot/​windows-client/​networking/​cannot-logon-access-administrative-share#​cause|docs.microsoft.com]])
   reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\system /v LocalAccountTokenFilterPolicy /t REG_DWORD /d 1   reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\system /v LocalAccountTokenFilterPolicy /t REG_DWORD /d 1
 +
 +===Disable IPv6
 +Not tested yet:
 +
 +From https://​4sysops.com/​archives/​disable-ipv6-in-windows/​
 +
 +  Get-NetAdapterBinding -ComponentID "​ms_tcpip6"​ | where Enabled -eq $true | Disable-NetAdapterBinding -ComponentID "​ms_tcpip6"​
 +
 +or (probably needs restart?):
 +
 +  reg add "​HKLM\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters"​ /v DisabledComponents /t REG_DWORD /d 255 /f
 +
 +or the same in PowerShell:
 +
 +  New-ItemProperty -Path HKLM:​\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters\ -Name DisabledComponents -Type DWord -Value 255
 +
 +The Value 32 may be better than 255.
 +
 +Or a .reg file (here with value 32 (hex 20)):
 +
 +<file reg NoIPv6.reg>​Windows Registry Editor Version 5.00
 +
 +[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters]
 +"​DisabledComponents"​=dword:​00000020
 +</​file>​
 +
 +Or maybe ''​netsh''​ commands as suggested in https://​systemadminspro.com/​how-to-disable-ipv6-on-windows/ ​
 +(needs a restart)
 +
 +<​code>​netsh interface ipv6 set teredo disabled
 +netsh interface ipv6 6to4 set state disabled
 +netsh interface ipv6 isatap set state disabled
 +</​code>​
  
 ==WSL ==WSL
Line 115: Line 171:
 ==Path ==Path
  
-===Add to Machine Path+===Show current path
  
-https://​stackoverflow.com/​a/​36379814/​111036+  $env:path -split ";"​
  
-https://​docs.microsoft.com/​en-us/​powershell/​scripting/​samples/​working-with-registry-entries?​view=powershell-7.1+or
  
-Show Path+<code powershell>​ 
 +# Only parts for current user 
 +reg query HKCU\Environment /v Path
  
-  ​reg query HKCU\Environment /v Path+# Only machine path 
 +reg query "​HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Environment" ​/v Path
  
-  reg query "​HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Environment"​ /v Path +(New-Object -ComObject WScript.Shell).RegRead("​HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Environment\Path"​) -split ";"​ 
- +</​code>​ 
-  ​(New-Object -ComObject WScript.Shell).RegRead("​HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Environment\Path"​) -split ";"​ +===Add to Machine Path
- +
-Add to path+
  
 <​code>​ <​code>​
 $addpath = "​C:​\bin"​ $addpath = "​C:​\bin"​
 +$regenv ​ = "​SYSTEM\CurrentControlSet\Control\Session Manager\Environment"​
  
-$machinepath = (New-Object -ComObject WScript.Shell).RegRead("​HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Environment\Path"​) -split ";"​ | Where-Object { $_ -ne $addpath }+$machinepath = (New-Object -ComObject WScript.Shell).RegRead("​$regenv\Path"​) -split ";"​ | Where-Object { $_ -ne $addpath }
 $machinepath += $addpath $machinepath += $addpath
  
Line 141: Line 199:
  
 # do it # do it
-Set-ItemProperty -Path "​HKLM:​\SYSTEM\CurrentControlSet\Control\Session Manager\Environment" -Name '​Path'​ -Value ($machinepath -join ';'​) -Type ExpandString+Set-ItemProperty -Path "​HKLM:​\$regenv" -Name '​Path'​ -Value ($machinepath -join ';'​) -Type ExpandString
 </​code>​ </​code>​
 +
 +The new path is not active immediately for users. For users to get the updated machine path, it is necessary to Sign out and Sign back in.
 +
 +https://​stackoverflow.com/​a/​36379814/​111036
 +
 +https://​docs.microsoft.com/​en-us/​powershell/​scripting/​samples/​working-with-registry-entries?​view=powershell-7.1
  
 ===WSL Path ===WSL Path
Line 161: Line 225:
  Restart-Service LxssManager  Restart-Service LxssManager
  
 +==File Explorer
 +===Show file extensions:
 +  reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /v HideFileExt /t REG_DWORD /d 0 /f
 +  ​
 ==Notepad++ ==Notepad++
  
Line 171: Line 239:
 https://​npp-user-manual.org/​docs/​other-resources/#​notepad-replacement https://​npp-user-manual.org/​docs/​other-resources/#​notepad-replacement
  
-# check if we have 64 or 32 bit notepad+++%%#%% check if we have 64 or 32 bit notepad++
  
   if (Test-Path "​C:​\Program Files\Notepad++\notepad++.exe"​) { echo "​64bit"​ } `   if (Test-Path "​C:​\Program Files\Notepad++\notepad++.exe"​) { echo "​64bit"​ } `
Line 178: Line 246:
  
  
-# Make notepad++ the default+%%#%% Make notepad++ the default
  
   reg query "​HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\notepad.exe"​   reg query "​HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\notepad.exe"​
  
-# In cmd.exe:+%%#%% In cmd.exe:
  
   REM If 64-bit Notepad++   REM If 64-bit Notepad++
Line 190: Line 258:
   reg add "​HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\notepad.exe"​ /v "​Debugger"​ /t REG_SZ /d "​\"​%ProgramFiles(x86)%\Notepad++\notepad++.exe\"​ -notepadStyleCmdline -z" /f   reg add "​HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\notepad.exe"​ /v "​Debugger"​ /t REG_SZ /d "​\"​%ProgramFiles(x86)%\Notepad++\notepad++.exe\"​ -notepadStyleCmdline -z" /f
  
-# In Powershell:​ +%%#%% In Powershell:​ 
-# 64bit+%%#%% 64bit
  
   reg add "​HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\notepad.exe"​ /v "​Debugger"​ /t REG_SZ /d "​$env:​ProgramFiles\Notepad++\notepad++.exe -notepadStyleCmdline -z" /f   reg add "​HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\notepad.exe"​ /v "​Debugger"​ /t REG_SZ /d "​$env:​ProgramFiles\Notepad++\notepad++.exe -notepadStyleCmdline -z" /f
  
-# 32bit+%%#%% 32bit
  
   reg add "​HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\notepad.exe"​ /v "​Debugger"​ /t REG_SZ /d "​$env:​ProgramFiles(x86)%\Notepad++\notepad++.exe -notepadStyleCmdline -z" /f   reg add "​HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\notepad.exe"​ /v "​Debugger"​ /t REG_SZ /d "​$env:​ProgramFiles(x86)%\Notepad++\notepad++.exe -notepadStyleCmdline -z" /f
Line 206: Line 274:
 ==Solitaire ==Solitaire
  
-The old Solitaire from Windows 95. Assumes ​there is already a C:\bin directory, and it's in the Path:+The old Solitaire from Windows 95. 
 + 
 +This assumes ​there is already a C:\bin directory, and it's in the Path:
  
   cd C:\bin   cd C:\bin
   curl.exe -O -R http://​alma.ch/​install/​win7/​bin/​sol.exe   curl.exe -O -R http://​alma.ch/​install/​win7/​bin/​sol.exe
   curl.exe -O -R http://​alma.ch/​install/​win7/​bin/​cards.dll   curl.exe -O -R http://​alma.ch/​install/​win7/​bin/​cards.dll
 +
 +To install it in Ubuntu Linux for running it with [[https://​www.winehq.org/​|wine]] :
 +
 +<code bash>
 +# If not done already, install wine
 +sudo apt install wine winetricks
 +# and run wine at least once to make it create it's directories in your $HOME
 +wine
 +  ​
 +# Install Solitaire
 +wget http://​alma.ch/​install/​win7/​bin/​{sol.exe,​cards.dll}
 +mv -t ~/​.wine/​drive_c/​windows/​ sol.exe cards.dll
 +
 +# run Solitaire with
 +wine sol
 +</​code> ​
  
 ==Cached credentials ==Cached credentials
Line 224: Line 310:
   control keymgr.dll   control keymgr.dll
   ​   ​
 +==Windows Defender
 +
 +To check which paths are ignored by Windows Defender:
 +
 +  Get-MpPreference
   ​   ​
 +or
  
 +  reg query "​HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths"​ /s
 +  reg query "​HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths"​ /s
 +
 +
 +To protect paths from Windows Defender (so that it doesn'​t delete nc.exe for example):
 +
 +  Add-MpPreference -ExclusionPath "​C:​\bin"​
 + 
 +or 
 +
 +  reg add "​HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths"​ /d 0 /t REG_SZ /v "​C:​\bin"​
 +  reg add "​HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths"​ /d 0 /t REG_SZ /v "​\\server\install\bin"​
 +  ...
 +  ​
 +With the 2nd option using Policies, they must also be activated by rebooting or by running ''​gpudate /​force''​ (see also https://​cloudbrothers.info/​create-persistent-defender-av-exclusions-circumvent-defender-endpoint-detection/​)
 +
 +==Firewall
 +
 +Show current ICMP ping rule state:
 +
 +  netsh advfirewall firewall show rule name="​Allow ping ICMP V4"
 +
 +Enable ping replies:
 +
 +  netsh advfirewall firewall add rule name="​Allow ping ICMP V4" protocol=icmpv4:​any,​any dir=in action=allow
 +
 +==Verbose start
 +
 +Script to run in an admin command prompt to enable some messages during startup and login:
 +
 +<​code>​
 +@echo off
 +
 +echo Current value for HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\verbosestatus
 +reg query "​HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\"​ /v "​verbosestatus"​
 +echo Current value for HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableStatusMessages
 +reg query "​HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\"​ /v "​DisableStatusMessages"​
 +
 +echo Enabling (slightly) Verbose boot
 +reg add "​HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\"​ /v "​verbosestatus"​ /t REG_DWORD /d 1 /f
 +reg delete "​HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\"​ /v "​DisableStatusMessages"​
 +
 +pause
 +</​code>​
/docs/dokuwiki/data/attic/win10.1619355239.txt.gz · Last modified: 2021-04-25 14:53:59 by mi