User Tools

Site Tools


win10

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
win10 [2023-05-20 15:58:44]
mi [No Hiberboot]
win10 [2024-11-05 15:24:45] (current)
mi [Enable ADMIN$ shares]
Line 6: Line 6:
   cmd /k ver   cmd /k ver
  
-Windows Product key:+===Windows Product key
  
   wmic path SoftwareLicensingService get OA3xOriginalProductKey   wmic path SoftwareLicensingService get OA3xOriginalProductKey
Line 12: Line 12:
 or use [[https://​www.nirsoft.net/​utils/​product_cd_key_viewer.html|NirSoft'​s ProduKey]] or use [[https://​www.nirsoft.net/​utils/​product_cd_key_viewer.html|NirSoft'​s ProduKey]]
  
 +===Get computer name
 +
 +* ''​hostname''​ (hostname.exe) in both CMD and PS
 +* ''​%COMPUTERNAME%''​ in CMD or ''​$ENV:​COMPUTERNAME''​ in PowerShell
 +
 +===Rename computer
 +
 +In admin PowerShell: ​
 +
 +  Rename-Computer "​new_hostname"​
 +
 +or with restart
 +
 +  Rename-Computer "​new_hostname"​ -Restart
  
 ==Language ==Language
Line 49: Line 63:
 PAUSE PAUSE
 </​code>​ </​code>​
 +
 +I think the above registry hack is the same as running
 +
 +  powercfg /hibernate off
 +
 +and then deleting the ''​C:​\hiberfil.sys''​ file
 +
 +
 +
  
 ==Network ==Network
Line 81: Line 104:
 "By default, Windows Vista and newer versions of Windows prevent local accounts from accessing administrative shares through the network."​ ([[https://​docs.microsoft.com/​en-us/​troubleshoot/​windows-client/​networking/​cannot-logon-access-administrative-share#​cause|docs.microsoft.com]]) "By default, Windows Vista and newer versions of Windows prevent local accounts from accessing administrative shares through the network."​ ([[https://​docs.microsoft.com/​en-us/​troubleshoot/​windows-client/​networking/​cannot-logon-access-administrative-share#​cause|docs.microsoft.com]])
   reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\system /v LocalAccountTokenFilterPolicy /t REG_DWORD /d 1   reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\system /v LocalAccountTokenFilterPolicy /t REG_DWORD /d 1
 +
 +===Disable IPv6
 +Not tested yet:
 +
 +From https://​4sysops.com/​archives/​disable-ipv6-in-windows/​
 +
 +  Get-NetAdapterBinding -ComponentID "​ms_tcpip6"​ | where Enabled -eq $true | Disable-NetAdapterBinding -ComponentID "​ms_tcpip6"​
 +
 +or (probably needs restart?):
 +
 +  reg add "​HKLM\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters"​ /v DisabledComponents /t REG_DWORD /d 255 /f
 +
 +or the same in PowerShell:
 +
 +  New-ItemProperty -Path HKLM:​\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters\ -Name DisabledComponents -Type DWord -Value 255
 +
 +The Value 32 may be better than 255.
 +
 +Or a .reg file (here with value 32 (hex 20)):
 +
 +<file reg NoIPv6.reg>​Windows Registry Editor Version 5.00
 +
 +[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters]
 +"​DisabledComponents"​=dword:​00000020
 +</​file>​
 +
 +Or maybe ''​netsh''​ commands as suggested in https://​systemadminspro.com/​how-to-disable-ipv6-on-windows/ ​
 +(needs a restart)
 +
 +<​code>​netsh interface ipv6 set teredo disabled
 +netsh interface ipv6 6to4 set state disabled
 +netsh interface ipv6 isatap set state disabled
 +</​code>​
  
 ==WSL ==WSL
Line 169: Line 225:
  Restart-Service LxssManager  Restart-Service LxssManager
  
 +==File Explorer
 +===Show file extensions:
 +  reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /v HideFileExt /t REG_DWORD /d 0 /f
 +  ​
 ==Notepad++ ==Notepad++
  
/docs/dokuwiki/data/attic/win10.1684591124.txt.gz ยท Last modified: 2023-05-20 15:58:44 by mi