User Tools

Site Tools


win10

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
win10 [2022-11-26 15:37:35]
mi [Windows Defender]
win10 [2024-11-05 15:24:45] (current)
mi [Enable ADMIN$ shares]
Line 6: Line 6:
   cmd /k ver   cmd /k ver
  
-Windows Product key:+===Windows Product key
  
   wmic path SoftwareLicensingService get OA3xOriginalProductKey   wmic path SoftwareLicensingService get OA3xOriginalProductKey
Line 12: Line 12:
 or use [[https://​www.nirsoft.net/​utils/​product_cd_key_viewer.html|NirSoft'​s ProduKey]] or use [[https://​www.nirsoft.net/​utils/​product_cd_key_viewer.html|NirSoft'​s ProduKey]]
  
 +===Get computer name
 +
 +* ''​hostname''​ (hostname.exe) in both CMD and PS
 +* ''​%COMPUTERNAME%''​ in CMD or ''​$ENV:​COMPUTERNAME''​ in PowerShell
 +
 +===Rename computer
 +
 +In admin PowerShell: ​
 +
 +  Rename-Computer "​new_hostname"​
 +
 +or with restart
 +
 +  Rename-Computer "​new_hostname"​ -Restart
  
 ==Language ==Language
Line 42: Line 56:
  
 echo "​Disabling..."​ echo "​Disabling..."​
-reg add "​HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Power"​ /v HiberbootEnabled /d 0 /f+reg add "​HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Power"​ /v HiberbootEnabled ​/t REG_DWORD ​/d 0 /f
  
 echo "​New:"​ echo "​New:"​
Line 49: Line 63:
 PAUSE PAUSE
 </​code>​ </​code>​
 +
 +I think the above registry hack is the same as running
 +
 +  powercfg /hibernate off
 +
 +and then deleting the ''​C:​\hiberfil.sys''​ file
 +
 +
 +
  
 ==Network ==Network
Line 81: Line 104:
 "By default, Windows Vista and newer versions of Windows prevent local accounts from accessing administrative shares through the network."​ ([[https://​docs.microsoft.com/​en-us/​troubleshoot/​windows-client/​networking/​cannot-logon-access-administrative-share#​cause|docs.microsoft.com]]) "By default, Windows Vista and newer versions of Windows prevent local accounts from accessing administrative shares through the network."​ ([[https://​docs.microsoft.com/​en-us/​troubleshoot/​windows-client/​networking/​cannot-logon-access-administrative-share#​cause|docs.microsoft.com]])
   reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\system /v LocalAccountTokenFilterPolicy /t REG_DWORD /d 1   reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\system /v LocalAccountTokenFilterPolicy /t REG_DWORD /d 1
 +
 +===Disable IPv6
 +Not tested yet:
 +
 +From https://​4sysops.com/​archives/​disable-ipv6-in-windows/​
 +
 +  Get-NetAdapterBinding -ComponentID "​ms_tcpip6"​ | where Enabled -eq $true | Disable-NetAdapterBinding -ComponentID "​ms_tcpip6"​
 +
 +or (probably needs restart?):
 +
 +  reg add "​HKLM\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters"​ /v DisabledComponents /t REG_DWORD /d 255 /f
 +
 +or the same in PowerShell:
 +
 +  New-ItemProperty -Path HKLM:​\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters\ -Name DisabledComponents -Type DWord -Value 255
 +
 +The Value 32 may be better than 255.
 +
 +Or a .reg file (here with value 32 (hex 20)):
 +
 +<file reg NoIPv6.reg>​Windows Registry Editor Version 5.00
 +
 +[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters]
 +"​DisabledComponents"​=dword:​00000020
 +</​file>​
 +
 +Or maybe ''​netsh''​ commands as suggested in https://​systemadminspro.com/​how-to-disable-ipv6-on-windows/ ​
 +(needs a restart)
 +
 +<​code>​netsh interface ipv6 set teredo disabled
 +netsh interface ipv6 6to4 set state disabled
 +netsh interface ipv6 isatap set state disabled
 +</​code>​
  
 ==WSL ==WSL
Line 169: Line 225:
  Restart-Service LxssManager  Restart-Service LxssManager
  
 +==File Explorer
 +===Show file extensions:
 +  reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /v HideFileExt /t REG_DWORD /d 0 /f
 +  ​
 ==Notepad++ ==Notepad++
  
Line 214: Line 274:
 ==Solitaire ==Solitaire
  
-The old Solitaire from Windows 95. Assumes ​there is already a C:\bin directory, and it's in the Path:+The old Solitaire from Windows 95. 
 + 
 +This assumes ​there is already a C:\bin directory, and it's in the Path:
  
   cd C:\bin   cd C:\bin
Line 282: Line 344:
   netsh advfirewall firewall add rule name="​Allow ping ICMP V4" protocol=icmpv4:​any,​any dir=in action=allow   netsh advfirewall firewall add rule name="​Allow ping ICMP V4" protocol=icmpv4:​any,​any dir=in action=allow
  
 +==Verbose start
  
 +Script to run in an admin command prompt to enable some messages during startup and login:
 +
 +<​code>​
 +@echo off
 +
 +echo Current value for HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\verbosestatus
 +reg query "​HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\"​ /v "​verbosestatus"​
 +echo Current value for HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableStatusMessages
 +reg query "​HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\"​ /v "​DisableStatusMessages"​
 +
 +echo Enabling (slightly) Verbose boot
 +reg add "​HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\"​ /v "​verbosestatus"​ /t REG_DWORD /d 1 /f
 +reg delete "​HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\"​ /v "​DisableStatusMessages"​
 +
 +pause
 +</​code>​
/docs/dokuwiki/data/attic/win10.1669473455.txt.gz · Last modified: 2022-11-26 15:37:35 by mi