This shows you the differences between two versions of the page.
| Both sides previous revision Previous revision Next revision | Previous revision | ||
|
win10 [2023-05-28 15:34:09] mi [No Hiberboot] |
win10 [2024-11-05 15:24:45] (current) mi [Enable ADMIN$ shares] |
||
|---|---|---|---|
| Line 6: | Line 6: | ||
| cmd /k ver | cmd /k ver | ||
| - | Windows Product key: | + | ===Windows Product key |
| wmic path SoftwareLicensingService get OA3xOriginalProductKey | wmic path SoftwareLicensingService get OA3xOriginalProductKey | ||
| Line 12: | Line 12: | ||
| or use [[https://www.nirsoft.net/utils/product_cd_key_viewer.html|NirSoft's ProduKey]] | or use [[https://www.nirsoft.net/utils/product_cd_key_viewer.html|NirSoft's ProduKey]] | ||
| + | ===Get computer name | ||
| + | |||
| + | * ''hostname'' (hostname.exe) in both CMD and PS | ||
| + | * ''%COMPUTERNAME%'' in CMD or ''$ENV:COMPUTERNAME'' in PowerShell | ||
| + | |||
| + | ===Rename computer | ||
| + | |||
| + | In admin PowerShell: | ||
| + | |||
| + | Rename-Computer "new_hostname" | ||
| + | |||
| + | or with restart | ||
| + | |||
| + | Rename-Computer "new_hostname" -Restart | ||
| ==Language | ==Language | ||
| Line 90: | Line 104: | ||
| "By default, Windows Vista and newer versions of Windows prevent local accounts from accessing administrative shares through the network." ([[https://docs.microsoft.com/en-us/troubleshoot/windows-client/networking/cannot-logon-access-administrative-share#cause|docs.microsoft.com]]) | "By default, Windows Vista and newer versions of Windows prevent local accounts from accessing administrative shares through the network." ([[https://docs.microsoft.com/en-us/troubleshoot/windows-client/networking/cannot-logon-access-administrative-share#cause|docs.microsoft.com]]) | ||
| reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\system /v LocalAccountTokenFilterPolicy /t REG_DWORD /d 1 | reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\system /v LocalAccountTokenFilterPolicy /t REG_DWORD /d 1 | ||
| + | |||
| + | ===Disable IPv6 | ||
| + | Not tested yet: | ||
| + | |||
| + | From https://4sysops.com/archives/disable-ipv6-in-windows/ | ||
| + | |||
| + | Get-NetAdapterBinding -ComponentID "ms_tcpip6" | where Enabled -eq $true | Disable-NetAdapterBinding -ComponentID "ms_tcpip6" | ||
| + | |||
| + | or (probably needs restart?): | ||
| + | |||
| + | reg add "HKLM\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters" /v DisabledComponents /t REG_DWORD /d 255 /f | ||
| + | |||
| + | or the same in PowerShell: | ||
| + | |||
| + | New-ItemProperty -Path HKLM:\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters\ -Name DisabledComponents -Type DWord -Value 255 | ||
| + | |||
| + | The Value 32 may be better than 255. | ||
| + | |||
| + | Or a .reg file (here with value 32 (hex 20)): | ||
| + | |||
| + | <file reg NoIPv6.reg>Windows Registry Editor Version 5.00 | ||
| + | |||
| + | [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters] | ||
| + | "DisabledComponents"=dword:00000020 | ||
| + | </file> | ||
| + | |||
| + | Or maybe ''netsh'' commands as suggested in https://systemadminspro.com/how-to-disable-ipv6-on-windows/ | ||
| + | (needs a restart) | ||
| + | |||
| + | <code>netsh interface ipv6 set teredo disabled | ||
| + | netsh interface ipv6 6to4 set state disabled | ||
| + | netsh interface ipv6 isatap set state disabled | ||
| + | </code> | ||
| ==WSL | ==WSL | ||
| Line 178: | Line 225: | ||
| Restart-Service LxssManager | Restart-Service LxssManager | ||
| + | ==File Explorer | ||
| + | ===Show file extensions: | ||
| + | reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /v HideFileExt /t REG_DWORD /d 0 /f | ||
| + | | ||
| ==Notepad++ | ==Notepad++ | ||