This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
win10 [2022-11-26 15:37:35] mi [Windows Defender] |
win10 [2024-11-05 15:24:45] (current) mi [Enable ADMIN$ shares] |
||
---|---|---|---|
Line 6: | Line 6: | ||
cmd /k ver | cmd /k ver | ||
- | Windows Product key: | + | ===Windows Product key |
wmic path SoftwareLicensingService get OA3xOriginalProductKey | wmic path SoftwareLicensingService get OA3xOriginalProductKey | ||
Line 12: | Line 12: | ||
or use [[https://www.nirsoft.net/utils/product_cd_key_viewer.html|NirSoft's ProduKey]] | or use [[https://www.nirsoft.net/utils/product_cd_key_viewer.html|NirSoft's ProduKey]] | ||
+ | ===Get computer name | ||
+ | |||
+ | * ''hostname'' (hostname.exe) in both CMD and PS | ||
+ | * ''%COMPUTERNAME%'' in CMD or ''$ENV:COMPUTERNAME'' in PowerShell | ||
+ | |||
+ | ===Rename computer | ||
+ | |||
+ | In admin PowerShell: | ||
+ | |||
+ | Rename-Computer "new_hostname" | ||
+ | |||
+ | or with restart | ||
+ | |||
+ | Rename-Computer "new_hostname" -Restart | ||
==Language | ==Language | ||
Line 42: | Line 56: | ||
echo "Disabling..." | echo "Disabling..." | ||
- | reg add "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Power" /v HiberbootEnabled /d 0 /f | + | reg add "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Power" /v HiberbootEnabled /t REG_DWORD /d 0 /f |
echo "New:" | echo "New:" | ||
Line 49: | Line 63: | ||
PAUSE | PAUSE | ||
</code> | </code> | ||
+ | |||
+ | I think the above registry hack is the same as running | ||
+ | |||
+ | powercfg /hibernate off | ||
+ | |||
+ | and then deleting the ''C:\hiberfil.sys'' file | ||
+ | |||
+ | |||
+ | |||
==Network | ==Network | ||
Line 81: | Line 104: | ||
"By default, Windows Vista and newer versions of Windows prevent local accounts from accessing administrative shares through the network." ([[https://docs.microsoft.com/en-us/troubleshoot/windows-client/networking/cannot-logon-access-administrative-share#cause|docs.microsoft.com]]) | "By default, Windows Vista and newer versions of Windows prevent local accounts from accessing administrative shares through the network." ([[https://docs.microsoft.com/en-us/troubleshoot/windows-client/networking/cannot-logon-access-administrative-share#cause|docs.microsoft.com]]) | ||
reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\system /v LocalAccountTokenFilterPolicy /t REG_DWORD /d 1 | reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\system /v LocalAccountTokenFilterPolicy /t REG_DWORD /d 1 | ||
+ | |||
+ | ===Disable IPv6 | ||
+ | Not tested yet: | ||
+ | |||
+ | From https://4sysops.com/archives/disable-ipv6-in-windows/ | ||
+ | |||
+ | Get-NetAdapterBinding -ComponentID "ms_tcpip6" | where Enabled -eq $true | Disable-NetAdapterBinding -ComponentID "ms_tcpip6" | ||
+ | |||
+ | or (probably needs restart?): | ||
+ | |||
+ | reg add "HKLM\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters" /v DisabledComponents /t REG_DWORD /d 255 /f | ||
+ | |||
+ | or the same in PowerShell: | ||
+ | |||
+ | New-ItemProperty -Path HKLM:\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters\ -Name DisabledComponents -Type DWord -Value 255 | ||
+ | |||
+ | The Value 32 may be better than 255. | ||
+ | |||
+ | Or a .reg file (here with value 32 (hex 20)): | ||
+ | |||
+ | <file reg NoIPv6.reg>Windows Registry Editor Version 5.00 | ||
+ | |||
+ | [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters] | ||
+ | "DisabledComponents"=dword:00000020 | ||
+ | </file> | ||
+ | |||
+ | Or maybe ''netsh'' commands as suggested in https://systemadminspro.com/how-to-disable-ipv6-on-windows/ | ||
+ | (needs a restart) | ||
+ | |||
+ | <code>netsh interface ipv6 set teredo disabled | ||
+ | netsh interface ipv6 6to4 set state disabled | ||
+ | netsh interface ipv6 isatap set state disabled | ||
+ | </code> | ||
==WSL | ==WSL | ||
Line 169: | Line 225: | ||
Restart-Service LxssManager | Restart-Service LxssManager | ||
+ | ==File Explorer | ||
+ | ===Show file extensions: | ||
+ | reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /v HideFileExt /t REG_DWORD /d 0 /f | ||
+ | | ||
==Notepad++ | ==Notepad++ | ||
Line 214: | Line 274: | ||
==Solitaire | ==Solitaire | ||
- | The old Solitaire from Windows 95. Assumes there is already a C:\bin directory, and it's in the Path: | + | The old Solitaire from Windows 95. |
+ | |||
+ | This assumes there is already a C:\bin directory, and it's in the Path: | ||
cd C:\bin | cd C:\bin | ||
Line 282: | Line 344: | ||
netsh advfirewall firewall add rule name="Allow ping ICMP V4" protocol=icmpv4:any,any dir=in action=allow | netsh advfirewall firewall add rule name="Allow ping ICMP V4" protocol=icmpv4:any,any dir=in action=allow | ||
+ | ==Verbose start | ||
+ | Script to run in an admin command prompt to enable some messages during startup and login: | ||
+ | |||
+ | <code> | ||
+ | @echo off | ||
+ | |||
+ | echo Current value for HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\verbosestatus | ||
+ | reg query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\" /v "verbosestatus" | ||
+ | echo Current value for HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableStatusMessages | ||
+ | reg query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\" /v "DisableStatusMessages" | ||
+ | |||
+ | echo Enabling (slightly) Verbose boot | ||
+ | reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\" /v "verbosestatus" /t REG_DWORD /d 1 /f | ||
+ | reg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\" /v "DisableStatusMessages" | ||
+ | |||
+ | pause | ||
+ | </code> |