This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
win10 [2023-05-28 15:34:09] mi [No Hiberboot] |
win10 [2024-11-05 15:24:45] (current) mi [Enable ADMIN$ shares] |
||
---|---|---|---|
Line 6: | Line 6: | ||
cmd /k ver | cmd /k ver | ||
- | Windows Product key: | + | ===Windows Product key |
wmic path SoftwareLicensingService get OA3xOriginalProductKey | wmic path SoftwareLicensingService get OA3xOriginalProductKey | ||
Line 12: | Line 12: | ||
or use [[https://www.nirsoft.net/utils/product_cd_key_viewer.html|NirSoft's ProduKey]] | or use [[https://www.nirsoft.net/utils/product_cd_key_viewer.html|NirSoft's ProduKey]] | ||
+ | ===Get computer name | ||
+ | |||
+ | * ''hostname'' (hostname.exe) in both CMD and PS | ||
+ | * ''%COMPUTERNAME%'' in CMD or ''$ENV:COMPUTERNAME'' in PowerShell | ||
+ | |||
+ | ===Rename computer | ||
+ | |||
+ | In admin PowerShell: | ||
+ | |||
+ | Rename-Computer "new_hostname" | ||
+ | |||
+ | or with restart | ||
+ | |||
+ | Rename-Computer "new_hostname" -Restart | ||
==Language | ==Language | ||
Line 90: | Line 104: | ||
"By default, Windows Vista and newer versions of Windows prevent local accounts from accessing administrative shares through the network." ([[https://docs.microsoft.com/en-us/troubleshoot/windows-client/networking/cannot-logon-access-administrative-share#cause|docs.microsoft.com]]) | "By default, Windows Vista and newer versions of Windows prevent local accounts from accessing administrative shares through the network." ([[https://docs.microsoft.com/en-us/troubleshoot/windows-client/networking/cannot-logon-access-administrative-share#cause|docs.microsoft.com]]) | ||
reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\system /v LocalAccountTokenFilterPolicy /t REG_DWORD /d 1 | reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\system /v LocalAccountTokenFilterPolicy /t REG_DWORD /d 1 | ||
+ | |||
+ | ===Disable IPv6 | ||
+ | Not tested yet: | ||
+ | |||
+ | From https://4sysops.com/archives/disable-ipv6-in-windows/ | ||
+ | |||
+ | Get-NetAdapterBinding -ComponentID "ms_tcpip6" | where Enabled -eq $true | Disable-NetAdapterBinding -ComponentID "ms_tcpip6" | ||
+ | |||
+ | or (probably needs restart?): | ||
+ | |||
+ | reg add "HKLM\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters" /v DisabledComponents /t REG_DWORD /d 255 /f | ||
+ | |||
+ | or the same in PowerShell: | ||
+ | |||
+ | New-ItemProperty -Path HKLM:\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters\ -Name DisabledComponents -Type DWord -Value 255 | ||
+ | |||
+ | The Value 32 may be better than 255. | ||
+ | |||
+ | Or a .reg file (here with value 32 (hex 20)): | ||
+ | |||
+ | <file reg NoIPv6.reg>Windows Registry Editor Version 5.00 | ||
+ | |||
+ | [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters] | ||
+ | "DisabledComponents"=dword:00000020 | ||
+ | </file> | ||
+ | |||
+ | Or maybe ''netsh'' commands as suggested in https://systemadminspro.com/how-to-disable-ipv6-on-windows/ | ||
+ | (needs a restart) | ||
+ | |||
+ | <code>netsh interface ipv6 set teredo disabled | ||
+ | netsh interface ipv6 6to4 set state disabled | ||
+ | netsh interface ipv6 isatap set state disabled | ||
+ | </code> | ||
==WSL | ==WSL | ||
Line 178: | Line 225: | ||
Restart-Service LxssManager | Restart-Service LxssManager | ||
+ | ==File Explorer | ||
+ | ===Show file extensions: | ||
+ | reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /v HideFileExt /t REG_DWORD /d 0 /f | ||
+ | | ||
==Notepad++ | ==Notepad++ | ||