Windows Tweaks Guide

Total Page:16

File Type:pdf, Size:1020Kb

Windows Tweaks Guide Windows Tweaks Guide For By Windows Geeks Team Introduction .......................................................................................................................................... 5 Important Notes on This Guide........................................................................................................... 5 Usage Instruction.................................................................................................................................. 5 No Warranty .......................................................................................................................................... 5 Hosting, Distribution & Translation ................................................................................................... 6 Tweaks for Windows XP ...................................................................................................................... 6 Before You Begin Tweaking XP ................................................................................................. 6 Tweaks for Startup ..................................................................................................................... 8 Tweaks for Shutdown .............................................................................................................. 10 Tweaks for Mouse .................................................................................................................... 10 Tweaks for Start Menu ............................................................................................................. 12 Tweaks for Desktop ................................................................................................................. 13 Tweaks for Themes.................................................................................................................. 13 Tweaks for Taskbar ................................................................................................................... 14 Tweaks for Graphics ................................................................................................................ 15 Tweaks for Memory ................................................................................................................. 19 Tweak UI ................................................................................................................................. 20 Tweaks for Scheduled Task ...................................................................................................... 24 Tweaks for ClearType .............................................................................................................. 26 Tweaks for Processor Scheduling ............................................................................................ 26 Tweaks for Hardware ............................................................................................................... 27 Tweaks for SSD ....................................................................................................................... 28 Tweaks for Windows Built-In .................................................................................................. 30 Tweaks for Disk Cleanup ......................................................................................................... 32 Tweaks for Defrag.................................................................................................................... 35 Tweaks for Drivers ................................................................................................................... 36 Tweaks for System Tray ........................................................................................................... 36 Tweaks for Page File ................................................................................................................ 36 Tweaks for Indexing Service.................................................................................................... 38 Tweaks for Add/ Remove Programs ......................................................................................... 39 Tweaks for Remove Unnecessary Windows Files .................................................................... 40 Tweaks for Remote Assistance and Remote Desktop Sharing ................................................. 40 Tweaks for Network Printers and Folders ................................................................................ 41 Tweaks for Internet Explorer 9 on Windows XP ..................................................................... 41 Tweaks for Firefox on Windows XP ....................................................................................... 45 Tweaks for Google Chrome on Windows XP ......................................................................... 46 Tweaks for Windows Vista ................................................................................................................. 49 Vista Usage Notes .................................................................................................................... 49 Search Box .............................................................................................................................. 49 User Account Control .............................................................................................................. 49 Administrator Command Prompt ............................................................................................. 50 Notification Area ..................................................................................................................... 50 Windows Aero Interface .......................................................................................................... 50 Before Using This Guide ......................................................................................................... 50 Tweaks for Backup................................................................................................................... 51 Tweaks for Restore .................................................................................................................. 58 2 Tweaks for Auto Login ............................................................................................................ 59 Tweaks for Auto-Start Applications.......................................................................................... 59 Tweaks for Task Scheduler ....................................................................................................... 60 Tweaks for Date and Time ....................................................................................................... 60 Tweaks for Fonts ...................................................................................................................... 61 Tweaks for Personalization ...................................................................................................... 62 Tweaks for Glass Window Borders .......................................................................................... 65 Tweaks for Turning off System Sounds .................................................................................... 65 Tweaks for Start Menu ............................................................................................................. 65 Tweaks for Windows Sidebar ................................................................................................... 69 Tweaks for Disk Defragmenter ................................................................................................ 70 Tweaks for Mouse .................................................................................................................... 72 Tweaks for Graphics and Interface .......................................................................................... 73 Tweaks for Indexing Options ................................................................................................... 75 Tweaks for Recycle Bin ........................................................................................................... 78 Tweaks for Visual ..................................................................................................................... 78 Tweaks for User Account Control ............................................................................................ 80 Tweaks for Drives .................................................................................................................... 80 Tweaks for Page File ................................................................................................................ 82 Tweaks for Welcome Center ..................................................................................................... 87 Tweaks for Security Center & Other Security Related ............................................................. 91 Tweaks for Speeding up Windows Vista ................................................................................. 92 Tweaks for Internet & Networking .......................................................................................... 98 Tweaks for Windows 7 ..................................................................................................................... 103 Install Windows 7 from a USB Thumb Drive ........................................................................ 103 Tweaks for Login ..................................................................................................................
Recommended publications
  • Bitmap Graphics Model - Device Context • Windows Does Not Retain a Copy of What the Application Drew • Windows 3.0 (1990)
    historie 08.11.2018 vjj 1 pravěk INPUT PROGRAM OUTPUT 08.11.2018 vjj 2 evoluce • dávkové zpracování • interaktivní práce • prompt • GUI 08.11.2018 vjj 3 evoluce INPUT PROGRAM OUTPUT 08.11.2018 vjj 4 evoluce Windows • bitmap graphics model - Device Context • Windows does not retain a copy of what the application drew • Windows 3.0 (1990) • bitmap graphics model - layered Device Context • Windows does retain a copy of the drawing as a bitmap • Windows 2000 (beta 1998) • .NET Framework (2001-2005) • vector graphics model – WPF (on DirectX) • tree of user-interface elements with objects representing graphical shapes • Windows Vista, .NET Framework 3.0 (2006) • Metro - deterioration • Windows 8, .NET Framework 4.5 (2012) 08.11.2018 vjj 5 1: Win32 API classique 08.11.2018 vjj 6 Uživatel Fronta zpráv GetMessage (mouse, keyboard) hardware interrupt DRIVER DispatchMessage System message queue WindowProc WindowProc RIT Raw Input Thread Fronta zpráv 8.11.18 vjj 7 WM_PAINT • každý ovládací prvek je samostatným oknem s vlastní procedurou na zpracovávání zpráv • celá stavba programu/algoritmu se točila kolem přípravy dat pro vykreslení obsahu okna vždy, když přišla zpráva WM_PAINT (a že chodila často) • během přímého kreslení se výstup do momentálně neviditelné části okna nikam nezapsal 08.11.2018 vjj 8 User Windows OS Invalidate... Program WM_PAINT GetDC Program Funkce GDI32 / GDI+ Graphics Card Frame Buffer for Screen Image data only retained as long as it remains visible on screen 08.11.2018 vjj 9 PROGRAM: direct Device Context OUTPUT PROGRAM PROGRAM PROGRAM PROGRAM PROGRAM WM_PAINT WM_PAINT WM_PAINT WM_PAINT WM_PAINT 08.11.2018 vjj 10 standardní funkce • TextOut • MoveToEx DrawText LineTo Rectangle Ellipse • DrawIcon Pie Arc Chord Polyline • BitBlt Polygon stretchBlt 08.11.2018 vjj 11 Device Context • standardní funkce pro kreslení do okna vyžadují hDC jako svůj první parametr • datová struktura popisující vlastnosti výstupu, např.
    [Show full text]
  • Panadapter for Ft1000mp with a PMSDR and Hamradio Deluxe Cat/ Logging Application
    Panadapter for FT1000mp with a PMSDR and Hamradio deluxe Cat/ logging application Hardware and Software • PMSDR (you don’t need the switchboard plug- in!) • FT1000mp • Soundcard for the PMSDR (I use the EMU 0202 USB) • WinradHD ( now called HDSDR) • Omnirig Cat software (A COM component for transceiver/receiver CAT control) • VSPE ( virtual serial ports emulator) • Hamradio deluxe ( version 5.0 build 2837 (always use the last one)) • Tweak UI (This PowerToy gives you access to system settings that are not exposed in the Windows XP default user interface, including mouse settings, Explorer settings, taskbar settings, and more. • UHF Female (SO-239) Tee Coaxial Adapter Connector • Two phone jacks male • One BNC plug male • 3x UHF male (pl-259) • RG-8 coax To Prepare the Hardware The first two RG-8 Coax cables can be short (1 foot/30cm). Make two equal ones of them with on one end the Male Phone jack and on the other end the PL 259 connector. The length of the third cable depends of the distance between the back of your FT1000mp and the PMSDR. On one end of that last RG-8 coax cable you have to connect the BNC and on the other end the PL-259. To download the software It depends on your settings on what place the downloads will be set. All my downloads will be placed on my desktop, but most computers will place them in the map called Downloads. Download WinradHD (now called HDSDR) form this site: http://www.hdsdr.de/ Download also the latest DLL-file for Winrad from the site: http://www.iw3aut.altervista.org/ (At this time the latest one are DELL 3.3 rev2) Download Omnirig Cat from this site: http://www.dxatlas.com/OmniRig/ Download VSPE form this site: http://www.eterlogic.com/Downloads.html (Choose virtual serial ports emulator.
    [Show full text]
  • Understanding the Attack Surface and Attack Resilience of Project Spartan’S (Edge) New Edgehtml Rendering Engine
    Understanding the Attack Surface and Attack Resilience of Project Spartan’s (Edge) New EdgeHTML Rendering Engine Mark Vincent Yason IBM X-Force Advanced Research yasonm[at]ph[dot]ibm[dot]com @MarkYason [v2] © 2015 IBM Corporation Agenda . Overview . Attack Surface . Exploit Mitigations . Conclusion © 2015 IBM Corporation 2 Notes . Detailed whitepaper is available . All information is based on Microsoft Edge running on 64-bit Windows 10 build 10240 (edgehtml.dll version 11.0.10240.16384) © 2015 IBM Corporation 3 Overview © 2015 IBM Corporation Overview > EdgeHTML Rendering Engine © 2015 IBM Corporation 5 Overview > EdgeHTML Attack Surface Map & Exploit Mitigations © 2015 IBM Corporation 6 Overview > Initial Recon: MSHTML and EdgeHTML . EdgeHTML is forked from Trident (MSHTML) . Problem: Quickly identify major code changes (features/functionalities) from MSHTML to EdgeHTML . One option: Diff class names and namespaces © 2015 IBM Corporation 7 Overview > Initial Recon: Diffing MSHTML and EdgeHTML (Method) © 2015 IBM Corporation 8 Overview > Initial Recon: Diffing MSHTML and EdgeHTML (Examples) . Suggests change in image support: . Suggests new DOM object types: © 2015 IBM Corporation 9 Overview > Initial Recon: Diffing MSHTML and EdgeHTML (Examples) . Suggests ported code from another rendering engine (Blink) for Web Audio support: © 2015 IBM Corporation 10 Overview > Initial Recon: Diffing MSHTML and EdgeHTML (Notes) . Further analysis needed –Renamed class/namespace results into a new namespace plus a deleted namespace . Requires availability
    [Show full text]
  • Guidelines for Designing Embedded Systems with Windows 10 Iot Enterprise
    Guidelines for Designing Embedded Systems with Windows 10 IoT Enterprise Version 2.0 Published July 15, 2016 Guidelines for designing embedded systems 1 CONFIDENTIAL Contents Overview .................................................................................................................................................................................................... 4 Building a task-specific experience ............................................................................................................................................ 4 General Group Policy settings ....................................................................................................................................................... 4 Application control ................................................................................................................................................................................ 5 Application boot options ................................................................................................................................................................. 5 Auto-boot Universal Windows apps ...................................................................................................................................... 5 Auto-boot Classic Windows apps ........................................................................................................................................... 5 Limit application access with AppLocker ...............................................................................................................................
    [Show full text]
  • Zero-Day Vulnerability in Desktop Window Manager (CVE-2021-28310) Used in the Wild | Securelist
    4/14/2021 Zero-day vulnerability in Desktop Window Manager (CVE-2021-28310) used in the wild | Securelist Zero-day vulnerability in Desktop Window Manager (CVE-2021-28310) used in the wild securelist.com/zero-day-vulnerability-in-desktop-window-manager-cve-2021-28310-used-in-the-wild/101898 While analyzing the CVE-2021-1732 exploit originally discovered by the DBAPPSecurity Threat Intelligence Center and used by the BITTER APT group, we discovered another zero-day exploit we believe is linked to the same actor. We reported this new exploit to Microsoft in February and after confirmation that it is indeed a zero-day, it received the designation CVE-2021-28310. Microsoft released a patch to this vulnerability as a part of its April security updates. We believe this exploit is used in the wild, potentially by several threat actors. It is an escalation of privilege (EoP) exploit that is likely used together with other browser exploits to escape sandboxes or get system privileges for further access. Unfortunately, we weren’t able to capture a full chain, so we don’t know if the exploit is used with another browser zero-day, or coupled with known, patched vulnerabilities. The exploit was initially identified by our advanced exploit prevention technology and related detection records. In fact, over the past few years, we have built a multitude of exploit protection technologies into our products that have detected several zero-days, proving their effectiveness time and again. We will continue to improve defenses for our users by enhancing technologies and working with third-party vendors to patch vulnerabilities, making the internet more secure for everyone.
    [Show full text]
  • Microsoft Patches Were Evaluated up to and Including CVE-2020-1587
    Honeywell Commercial Security 2700 Blankenbaker Pkwy, Suite 150 Louisville, KY 40299 Phone: 1-502-297-5700 Phone: 1-800-323-4576 Fax: 1-502-666-7021 https://www.security.honeywell.com The purpose of this document is to identify the patches that have been delivered by Microsoft® which have been tested against Pro-Watch. All the below listed patches have been tested against the current shipping version of Pro-Watch with no adverse effects being observed. Microsoft Patches were evaluated up to and including CVE-2020-1587. Patches not listed below are not applicable to a Pro-Watch system. 2020 – Microsoft® Patches Tested with Pro-Watch CVE-2020-1587 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability CVE-2020-1584 Windows dnsrslvr.dll Elevation of Privilege Vulnerability CVE-2020-1579 Windows Function Discovery SSDP Provider Elevation of Privilege Vulnerability CVE-2020-1578 Windows Kernel Information Disclosure Vulnerability CVE-2020-1577 DirectWrite Information Disclosure Vulnerability CVE-2020-1570 Scripting Engine Memory Corruption Vulnerability CVE-2020-1569 Microsoft Edge Memory Corruption Vulnerability CVE-2020-1568 Microsoft Edge PDF Remote Code Execution Vulnerability CVE-2020-1567 MSHTML Engine Remote Code Execution Vulnerability CVE-2020-1566 Windows Kernel Elevation of Privilege Vulnerability CVE-2020-1565 Windows Elevation of Privilege Vulnerability CVE-2020-1564 Jet Database Engine Remote Code Execution Vulnerability CVE-2020-1562 Microsoft Graphics Components Remote Code Execution Vulnerability
    [Show full text]
  • THE OFFICE WORKERS GUIDE to a USB THUMB DRIVE Makeuseof.Com
    THE OFFICE WORKERS GUIDE TO A USB THUMB DRIVE By: Tina Sieber MakeUseOf.com This manual is intellectual property of MakeUseOf. It must only be published in its original form. Using parts or republishing altered parts of this guide is prohibited. P a g e 2 MakeUseOf.com | Tina Sieber THE OFFICE WORKERS GUIDE TO A USB THUMB DRIVE Table of Contents Introduction and Technical Background ............................................................................. 5 What is a USB flash drive? ................................................................................................... 5 What is a memory stick used for? ...................................................................................... 6 What should I know before buying a thumb drive? ........................................................... 7 Case:...................................................................................................................................... 7 Capacity: .............................................................................................................................. 7 Transfer rate: ......................................................................................................................... 8 What type of flash drive do I need? ................................................................................... 10 Generic ............................................................................................................................... 10 High Performance .............................................................................................................
    [Show full text]
  • Mastering Powershellpowershell
    CopyrightCopyright © 2009 BBS Technologies ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored, or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval systems except as permitted under Section 107 or 108 of the 1976 United States Copyright Act without the prior written permission of the publisher. For permission to use material from the text please contact Idera at [email protected]. Microsoft® Windows PowerShell® and Microsoft® SQL Server® are registered trademarks of Microsoft Corporation in the United Stated and other countries. All other trademarks are the property of their respective owners. AboutAbout thethe AuthorAuthor Dr. Tobias Weltner is one of the most visible PowerShell MVPs in Europe. He has published more than 80 books on Windows and Scripting Techniques with Microsoft Press and other publishers, is a regular speaker at conferences and road shows and does high level PowerShell and Scripting trainings for companies throughout Europe. He created the powershell.com website and community in an effort to help people adopt and use PowerShell more efficiently. As software architect, he created a number of award-winning scripting tools such as SystemScripter (VBScript), the original PowerShell IDE and PowerShell Plus, a comprehensive integrated PowerShell development system. AcknowledgmentsAcknowledgments First and foremost, I’d like to thank my family who is always a source of inspiration and encouragement. A special thanks to Idera, Rick Pleczko, David Fargo, Richard Giles, Conley Smith and David Twamley for helping to bring this book to the English speaking world.
    [Show full text]
  • (RUNTIME) a Salud Total
    Windows 7 Developer Guide Published October 2008 For more information, press only: Rapid Response Team Waggener Edstrom Worldwide (503) 443-7070 [email protected] Downloaded from www.WillyDev.NET The information contained in this document represents the current view of Microsoft Corp. on the issues discussed as of the date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication. This guide is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form, by any means (electronic, mechanical, photocopying, recording or otherwise), or for any purpose, without the express written permission of Microsoft. Microsoft may have patents, patent applications, trademarks, copyrights or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property. Unless otherwise noted, the example companies, organizations, products, domain names, e-mail addresses, logos, people, places and events depicted herein are fictitious, and no association with any real company, organization, product, domain name, e-mail address, logo, person, place or event is intended or should be inferred.
    [Show full text]
  • NCD Thinpath PC Installation Guide and Release Notes Copyright Copyright © 2001 by Network Computing Devices, Inc
    NCD ThinPATH PC Installation Guide and Release Notes Copyright Copyright © 2001 by Network Computing Devices, Inc. (NCD).The information contained in this document is subject to change without notice. Network Computing Devices, Inc. shall not be liable for errors contained herein or for incidental or consequential damages in connection with the furnishing, performance, or use of this material. This document contains information which is protected by copyright. All rights are reserved. No part of this document may be photocopied, reproduced, or translated to another language without the prior written consent of Network Computing Devices, Inc. Trademarks Network Computing Devices, ThinSTAR, ThinPATH, and XRemote are registered trademarks of Network Computing Devices, Inc. Explora, Explora Pro, ECX, HMX, HMXpro, HMXpro24, WinCenter, WinCenter Pro, WinCenter Connect, NCDnet, and NCDware are trademarks of Network Computing Devices, Inc. Other product and company names mentioned herein are the trademarks of their respective owners. All terms mentioned in this book that are known to be trademarks or service marks have been appropriately capitalized. NCD cannot attest to the accuracy of this information. Use of a term in this book should not be regarded as affecting the validity of any trademark or service mark. Disclaimer THE SOFTWARE PRODUCTS ARE PROVIDED “AS IS” WITHOUT WARRANTY OF ANY KIND. TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, NCD FURTHER DISCLAIMS ALL WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY IMPLIED WARRANTIES OF MERCHANTABILITY,
    [Show full text]
  • Security Policy Page 1 of 20
    Security Policy Page 1 of 20 Security Policy This security policy contains data to configure services and network security based on the server’s role, as well as data to configure registry and auditing settings. Server: VENGWIN207 Services Service Name Startup Mode Description Issues, manages, and removes X.509 certificates for such applications such as Active Directory Certificate S/MIME and SSL. If the service is stopped, Disabled Services certificates will not be issued. If this service is disabled, any services that explicitly depend on it will fail to start. AD DS Domain Controller service. If this service is stopped, users will be unable to log Active Directory Domain Services Disabled on to the network. If this service is disabled, any services that explicitly depend on it will fail to start. AD FS Web Agent Authentication The AD FS Web Agent Authentication Service Disabled Service validates incoming tokens and cookies. Adobe Acrobat Updater keeps your Adobe Adobe Acrobat Update Service Automatic software up to date. Sends logging messages to the logging database when logging is enabled for the Active Directory Rights Management Services role. If this service is disabled or stopped AdRmsLoggingService Disabled when logging is enabled, logging messages will be stored in local message queues and sent to the logging database when the service is started. Processes application compatibility cache Application Experience Disabled requests for applications as they are launched Provides administrative services for IIS, for example configuration history and Application Pool account mapping. If this Application Host Helper Service Disabled service is stopped, configuration history and locking down files or directories with Application Pool specific Access Control Entries will not work.
    [Show full text]
  • The New York Society Library Presents: Windows XP: Tips and Tricks Ingrid Richter Head of System
    The New York Society Library Presents: Windows XP: Tips and Tricks Ingrid Richter Head of System WINDOWS XP: TIPS & TRICKS INDEX OPERATING SYSTEMS Windows XP………………………………………………………………………….. Page 03 Windows Vista………………………………………………………………………. Page 04 ADDING MORE SPACE Clean up hard drive………………………………………………………………… Page 05 Remove Programs…………………………………………………………………… Page 05 Turn off System Restore…………………………………………………………. Page 06 SPEED UP YOUR COMPUTER Remove Startup Programs……………………………………………………….. Page 07 Disable Unused Services……………………………………………………………. Page 07 Disable Indexing Service……………………………………………………………. Page 08 Remove Visual Effects………………………………………………………………… Page 08 Add Virtual Memory……………………………………………………………………. Page 09 SECURITY Upgrade to Service Pack 2………………………………………………………….. Page 10 Review Error Logs………………………………………………………………………… Page 11 TOOLS Download PowerToys…………………………………………………………………… Page 12 Kelly’s Korner………………………………………………………………………………. Page 13 Shortcut Keys……………………………………………………………………………… Page 13 Page 2 Printed: 10/20/06 WINDOWS XP: TIPS & TRICKS OPERATING SYSTEMS WINDOWS XP (HOME & PROFESSIONAL) http://www.microsoft.com/windowsxp/default.mspx Windows XP is faster than 2000 and the interface is more colorful. Windows XP comes with Movie Maker, built-in CD writer support, speech recognition, a firewall and Remote Desktop Connection, allowing you to connect to your computer remotely. You need to register your copy with Microsoft when you buy XP. There are two versions of XP on the market: Professional and Home Edition. Windows XP runs off of the NT platform. • The Desktop is the space used to run programs. My Computer (all the contents of your computer) and Recycle Bin (anything you wish to remove from your computer) will always be on the desktop. Network Neighborhood (if your computer is connected to a network) and My Documents may also be on the desktop. • The Start Menu is located in the bottom left-hand corner of the screen.
    [Show full text]