Guidelines for PC Data Destruction

Total Page:16

File Type:pdf, Size:1020Kb

Guidelines for PC Data Destruction Guidelines for PC Data Destruction Purpose The purpose of this document is to record procedures for the irretrievable destruction of data from computers donated to the Turing Trust (www.turingtrust.co.uk) for the benefit of schools in Africa. It is intended for readers who have at least semi-technical experience with PCs. Background The Trust collects donated PCs and laptops less than 10 years old, wipes them of all personally-identifiable data, rebuilds them with an Operating System and Educational software and despatches them to schools in Ghana run by Integrated Community Centres for Employable Skills. Understanding File Management When files are created and saved on a PC they are generally stored on magnetic, optical or electronic memory using the functions of the PC Operating System (usually Microsoft Windows or Apple MacOS) version on the machine. Typically files are stored on a Hard Disk and need to be completely removed before that equipment is passed to any other user. Pieces of a file are stored in data sectors on the hard disk. Sectors are grouped together into Clusters to form the minimum usable space that can be written to by a file. Details of all the positions of the clusters of data for a file are stored in a File Allocation Table (FAT) also held on the hard disk. A separate Directory Table (DT) stores the filename and first cluster, and when the file needs to be located the OS finds the name and first cluster in the DT then all the linked clusters in the FAT containing the entire file. When a file is deleted by a User its data is not actually removed, rather it is marked as “deleted” in the DT so as to make the Operating System (OS) aware that the space can be re-used. Many modern OS also support a Recycle Bin where the deleted file is made visible to the User and can be recovered to its original location. In this instance the file will not be overwritten by the OS until it has run out of other available free space on the disk, and so can usually still be recovered by a user. It is possible for the user to delete a file so that it no longer appears in the Recycle Bin (for example in Windows Explorer by holding down the “Shift” key whilst pressing delete). However whilst no longer visible to the user the DATA IS STILL PRESENT on the disk. It is simply marked in the DT as deleted and can still be retrieved using data recovery tools. It is even possible to recover a file after a disk or partition has been formatted so we need to ensure that this cannot happen by ensuring that every sector of the disk containing user data is overwritten using professional wiping tools before it leaves our control. This is usually done by writing patterns of 1’s or 0’s over the sectors, sometimes with multiple passes, using specialist wiping tools. Full Wipe or Factory Restore? Many modern PCs produced since 2004 come equipped with a facility to restore the Operating System and Application Software back to exactly the way it was when originally delivered from the factory. This is achieved by using a special Boot Record that allows the user to interrupt the normal PC boot procedure so that it does not run the OS but instead runs a process to overwrite it and rebuild the original OS from an image stored either on a Prepared by: A Clark Version 1.0 2 January 2014 hidden partition or on optical media (CD or DVD). This method is preferred to wiping the entire hard disk as:- 1. It retains the original OS and licence for that machine 2. It restores all necessary specific hardware drivers, utilities and Applications that came with that machine in the manufacturers recommended configuration. 3. It is much quicker (typically taking only 5 – 15 minutes) than wiping the entire hard disk and reinstalling the original OS (or a new one) from scratch, searching for and installing all the drivers and configuring the system. HOWEVER if a Factory Restore option is used free space on the disk must still be wiped afterwards to ensure any files left in sectors are irretrievable. Appendix A lists some procedures to invoke factory restore processes for some manufacturers (they do differ, so google the manufacturer, model number and “factory restore” to find suggestions for a particular machine as to the keystrokes/procedure required). If a potential PC donor asks how they should delete files prior to donation it is best to advise them to let us do it as unless they know what they are doing they can destroy the special boot record and make the factory restore option impossible. Tools to enable wiping to professional standards are available to download from the internet. A suggested list of proven ones is contained in Table B, but others are available too. Table B Tool Source Comment Paragon Hard http://www.paragon-software.com/ Full suite of Disk Manager partitioning, wiping (including Free Space only) and disk management options. Cost about £30 HDDERASE http://www.pcworld.com/article/232164/hdderase.html Boots from Floppy disk. Free tool MHDD http://hddguru.com/software/2005.10.02-MHDD/ Boots from Floppy disk. Free tool DBAN http://www.dban.org/ Boots from CD or floppy. Free tool Note that not all of these tools will work on a particular machine or hard disk configuration. For example Paragon won’t work on old machines with limited memory. HDDERASE relies on ATA secure erase commands built in to hard disk and doesn’t work with all disks. So it is best to have a selection at hand when setting out to wipe machines. Some of them will only handle wiping the entire disk, not free space only, so you can’t safely use the Factory Restore procedure1. If you can’t access that option then the disk will need to be fully wiped before despatch, and TT partners in Ghana will then load it with a Linux-based OS (Xubuntu) and teaching materials from Hyperion. Prepared by: A Clark Version 1.0 2 January 2014 You will also need to know how to boot a machine from external media (Floppy Disk, CD or USB Drive), as the tools usually boot their own OS. Many modern PCs have a “Boot Menu” option at startup where you have to hit F12 (or similar) at the splash screen before it starts booting from its hard disk to select the appropriate external drive. On older machines you may need to go into BIOS setup and change the boot order in there. Again it usually requires a key (e.g. Delete or F2) to be hit on startup varying according to the BIOS manufacturer in order to access the Setup screens. If the machine is unbootable (perhaps due to failed motherboard or memory components) a hard disk can be removed and either installed as an external drive in a suitable USB caddy or connected as a second drive internally on another PC, then wiped using that machine. But make sure you have full Malware protection running on it first as donated PCs are sometimes infected and you don’t want anything spreading to your PC. For the same reason don’t connect a donated PC to any form of network until you are confident it is clean (e.g. fully restored to Factory condition). Caddy devices are available for both Parallel and Serial ATA device interfaces and will usually handle both 3.5” and 2.5” formats. Ideally a clean area should be set up for wiping purposes allowing recording of machine Serial Numbers, Specifications and OS Licence details with segregation between machines ready for wiping and those already done. A sample Wipe Record spreadsheet is provided with this document package to record all the above details as well as donor Name and Address. If required a separate, linked Word Document will generate a suitable Certificate of Destruction for each of the wiped PCs. Image 1 – Restoring two systems simultaneously Image 1 shows the Authors wiping area. The machine on the left is restoring using HP’s Factory Restore option; the one on the right is using Dell’s (by Symantec) Factory Restore. Prepared by: A Clark Version 1.0 2 January 2014 After restoring the machines’ Free Space is wiped using Paragon and then booted up with an internet connection to allow Windows OS patches to be installed up to date. As these processes can take hours, it makes best use of time to do more than one at the same time. Bags or boxes can be used to keep accessories like mice, keyboards and speakers for donated items together with each PC. Details of what has been done on a PC should be recorded on the “TuringTrustWipeRecords1.xls” spreadsheet2, a sample of which is included with the package. This permits us to record by machine Serial Number what we did in the event of any subsequent query by donor or recipient. A convenient way to grab a serial number is to use a digital camera to photograph the label then enlarge it in the viewfinder screen and type it into the spreadsheet. Appendix B details how this spreadsheet can be used to generate a Certificate of Data Destruction should the donor require one. Finally a white sticky label should be attached to the desktop or tower unit summarising the Specification and what has been done to it. This makes it much easier for TT partners in Ghana to select machines for either Windows or Xubuntu usage in school computer labs.
Recommended publications
  • Journey Through the Impact of the Recovery Artifacts in Windows 8 WENDELL Kenneth JOHNSON Iowa State University
    Iowa State University Capstones, Theses and Graduate Theses and Dissertations Dissertations 2013 Journey through the impact of the recovery artifacts in Windows 8 WENDELL Kenneth JOHNSON Iowa State University Follow this and additional works at: https://lib.dr.iastate.edu/etd Part of the Databases and Information Systems Commons Recommended Citation JOHNSON, WENDELL Kenneth, "Journey through the impact of the recovery artifacts in Windows 8" (2013). Graduate Theses and Dissertations. 13414. https://lib.dr.iastate.edu/etd/13414 This Thesis is brought to you for free and open access by the Iowa State University Capstones, Theses and Dissertations at Iowa State University Digital Repository. It has been accepted for inclusion in Graduate Theses and Dissertations by an authorized administrator of Iowa State University Digital Repository. For more information, please contact [email protected]. Journey through the impact of the recovery artifacts in Windows 8 by Wendell Kenneth Johnson A thesis submitted to the graduate faculty in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE Co-majors: Computer Engineering; Information Assurance Program of Study Committee: Yong Guan, Major Professor Doug Jacobson Jennifer L. Davidson Iowa State University Ames, Iowa 2013 Copyright © Wendell Kenneth Johnson, 2013. All rights reserved. ii DEDICATION This Thesis is dedicated to my family Jessica, Savannah and Brady. Without your unrelenting support and sacrifices I would not have been able to follow my educational and career dreams. To Lee Adams, while you will never see the finished work, your guiding light and compassion shown to me helped create the person I am today. My drive to succeed and to share my success comes from watching you give so much of your compassion to others.
    [Show full text]
  • Laptop Service Guide
    Windows Operating System 3 Turn off visual effects 3 Turn off Windows Search Indexing Feature 4 Defragging Hard Drive 5 Step 1: Locating the Defragment Wizard 5 Step 2: Using Defragment Wizard 6 Checking your hard drive 8 Checking your memory 8 Ensure Windows Defender is enabled 9 Perform Disk cleanup to remove clutter 12 Disable Programs that you do not use frequently from starting when system boots 14 14 Perform regular Windows Defender scans on system 15 Uninstall programs that you do not use anymore 17 Regularly turn off your system when not in use 18 How to shut down your windows machine 19 Perform check disk on hard drive regularly 21 Turn Off Windows Tips and Tricks 23 Turn Off Search Indexing 24 Regularly perform backups as well as create restore points 27 Use Powershell to fix corrupt files: 32 Enable fast start-up: 34 Effect of ram on the system 35 2 Windows Operating System Turn off visual effects I. Open the start menu by pressing the Windows key on your keyboard or by clicking on the icon shown below. a. Type “Advanced System Settings” and click on it when it appears in the Menu. b. Navigate to the “Advanced” tab at the top. c. Click on “Settings” in the “Performance” block d. Select “Adjust for best performance”. e. Click “Ok” to finish the setup. 3 Turn off Windows Search Indexing Feature I. Open the start menu by pressing the Windows key on your keyboard or by clicking on the icon shown below. II. Search for “Index” and choose “Indexing Options” when it appears.
    [Show full text]
  • Run-Commands-Windows-10.Pdf
    Run Commands Windows 10 by Bettertechtips.com Command Action Command Action documents Open Documents Folder devicepairingwizard Device Pairing Wizard videos Open Videos Folder msdt Diagnostics Troubleshooting Wizard downloads Open Downloads Folder tabcal Digitizer Calibration Tool favorites Open Favorites Folder dxdiag DirectX Diagnostic Tool recent Open Recent Folder cleanmgr Disk Cleanup pictures Open Pictures Folder dfrgui Optimie Drive devicepairingwizard Add a new Device diskmgmt.msc Disk Management winver About Windows dialog dpiscaling Display Setting hdwwiz Add Hardware Wizard dccw Display Color Calibration netplwiz User Accounts verifier Driver Verifier Manager azman.msc Authorization Manager utilman Ease of Access Center sdclt Backup and Restore rekeywiz Encryption File System Wizard fsquirt fsquirt eventvwr.msc Event Viewer calc Calculator fxscover Fax Cover Page Editor certmgr.msc Certificates sigverif File Signature Verification systempropertiesperformance Performance Options joy.cpl Game Controllers printui Printer User Interface iexpress IExpress Wizard charmap Character Map iexplore Internet Explorer cttune ClearType text Tuner inetcpl.cpl Internet Properties colorcpl Color Management iscsicpl iSCSI Initiator Configuration Tool cmd Command Prompt lpksetup Language Pack Installer comexp.msc Component Services gpedit.msc Local Group Policy Editor compmgmt.msc Computer Management secpol.msc Local Security Policy: displayswitch Connect to a Projector lusrmgr.msc Local Users and Groups control Control Panel magnify Magnifier
    [Show full text]
  • The Control Panel and Settings in Windows 10 Most Programs and Apps Have Settings Specific to That Program
    GGCS Introduction to Windows 10 Part 3: The Control Panel and Settings in Windows 10 Most programs and apps have settings specific to that program. For example, in a word processor such as Microsoft Word there are settings for margins, fonts, tabs, etc. If you have another word processor, it can have different settings for margins, fonts, etc. These specific settings only affect one program. The settings in the Control Panel and in Settings are more general and affect the whole computer and peripherals such as the mouse, keyboard, monitor and printers. For example, if you switch the right and left buttons on the mouse in the Control Panel or in Settings, they are switched for everything you click on. If you change the resolution of the monitor, it is changed for the desktop, menus, Word, Internet Explorer and Edge, etc. How to display the Control Panel 1. Right-click the Windows Start button or press the Windows key on the keyboard + X. 2. Click “Control Panel” on the popup menu as shown in the first screen capture. In Windows 10, many of the settings that once were in the Control Panel have moved to Settings. However, there are often links in Settings that take you back to the Control Panel and many other settings that still only exist in the Control Panel. Settings versus Control Panel is an evolving part of Windows design that started with Windows 8. It is not clear at this time whether the Control Panel will eventually go away or whether it will simply be used less frequently by most users.
    [Show full text]
  • Veritas™ System Recovery 18 Service Pack 1 User's Guide
    Veritas™ System Recovery 18 Service Pack 1 User's Guide Windows Edition Documentation version: 18 Service Pack 1 Legal Notice Copyright © 2018 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are trademarks or registered trademarks of Veritas Technologies LLC or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This product may contain third party software for which Veritas is required to provide attribution to the third party (“Third Party Programs”). Some of the Third Party Programs are available under open source or free software licenses. The License Agreement accompanying the Software does not alter any rights or obligations you may have under those open source or free software licenses. Please see the Third Party Legal Notice Appendix to this Documentation or TPIP ReadMe File accompanying this product for more information on the Third Party Programs. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Veritas Technologies LLC and its licensors, if any. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. VERITAS TECHNOLOGIES LLC SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION.
    [Show full text]
  • Keeping Your PC Healthy
    South Seattle College Keep Your Computer Healthy In this class, you will learn about hardware and software maintenance. We will start with hardware and then we will move to software. Software has many different utilities that can be used and applied for different reasons. We will look at the following: System Restore Reset this PC Defragmenter Laptops BitLocker (Encryption) Microsoft Safety Scanner (remove viruses, spyware, and other malicious software) Uninstall unwanted software Hardware maintenance The first thing to do with your computer is to keep it running cool. Dust can cause your PC components to hold heat. This can cause parts to fail over time. The first thing you need to do is assemble your gear. Before working on your PC make sure you unplug. 1 11/2/2017 South Seattle College Dust, dirt, hair, and other debris can build up on fans and heatsinks. Before After Components can come loose or become unseated. If any component is loose or seems loose remove, clean and reseat the component. Have a Dustbuster or similar small vacuum on hand. In addition, some paper towels and a bit of all-purpose spray cleaner (like Fantastik or Simple Green) are useful, as are a microfiber cloth and some isopropyl alcohol. The canned air and brush are useful for dislodging hair, dust and other debris from all your PC’s surfaces—especially heatsinks and printed circuit boards (PCBs), which have countless tiny nooks and crannies. The vacuum sucks up the various detritus. The paper towels, spray cleaner, and microfiber cloth are for wiping down hard, nonelectrical surfaces.
    [Show full text]
  • MD-272/273 Full Manual
    MD-272/MD-273 TV Media Player Full Manual Introduction Congratulations on your purchase of the Sitecom MD-272/MD-273 TV Media Player. The MD-272/273 TV Media Player supports playback of the most common file formats of digital video, audio and photo media. Attach the media player via standard AV or HDMI cables to a standard or high-definition TV. The compact size of the device allows you to take it with you to anyone you like and share your digital content. Photos • Display slide shows with music • Zoom, pan, move and rotate photos Video • Fast forward, rewind, pause, zoom, and pan • View subtitles Music • Fast forward, rewind, pause, shuffle, and repeat • Playlist support Network • Connect the TV Media Player via cable or wireless to your home network • Play Media from a NAS or computer directly to your TV Online • Connect the TV Media Player via cable or wireless to the internet • View Media from popular applications such as YouTube and MediaFly • Use popular online applications such as Facebook Index 1 Key Features ............................................................................4 2 Package Contents.....................................................................5 3 Cautions ...................................................................................6 3.1 Usage Cautions.......................................................................................... 6 3.2 Power........................................................................................................ 6 3.3 Radio Interference ...................................................................................
    [Show full text]
  • Journey Into Windows 8 Recovery Artifacts
    2013 Annual ADFSL Conference on Digital Forensics, Security and Law Proceedings Jun 11th, 2:30 PM Journey into Windows 8 Recovery Artifacts W. K. Johnson KPMG, USA, [email protected] Follow this and additional works at: https://commons.erau.edu/adfsl Part of the Computer Engineering Commons, Computer Law Commons, Electrical and Computer Engineering Commons, Forensic Science and Technology Commons, and the Information Security Commons Scholarly Commons Citation Johnson, W. K., "Journey into Windows 8 Recovery Artifacts" (2013). Annual ADFSL Conference on Digital Forensics, Security and Law. 3. https://commons.erau.edu/adfsl/2013/tuesday/3 This Peer Reviewed Paper is brought to you for free and open access by the Conferences at Scholarly Commons. It has been accepted for inclusion in Annual ADFSL Conference on Digital Forensics, Security and Law by an (c)ADFSL authorized administrator of Scholarly Commons. For more information, please contact [email protected]. ADFSL Conference on Digital Forensics, Security and Law, 2013 JOURNEY INTO WINDOWS 8 RECOVERY ARTIFACTS W. Kenneth Johnson KPMG USA [email protected] ABSTRACT One of the most difficult processes of digital forensics is to understand how new technology interacts with current technology and how digital forensic analysts can utilize current Digital Forensics technologies and processes to recover and find information hidden. Microsoft has released their new operating system Windows 8, with this new release Microsoft has added some features to the operating system that will present some interesting complications to digital forensics. Since the initial release of the Windows 8 Release Candidates there have been some research released that focus primarily on the new user created artifacts and a few artifacts that have been added by the operating system that might contain valuable information.
    [Show full text]
  • Lab - System Restore in Windows 7 and Vista
    Lab - System Restore in Windows 7 and Vista Introduction In this lab, you will create a restore point and then use it to restore your computer. Recommended Equipment • A computer running Windows 7 or Vista Step 1: Create a restore point. a. Click Control Panel > System > System protection. © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 10 Lab – System Restore in Windows 7 and Vista b. Click the System Protection tab in the System Properties window and click Create. c. In the Create a restore point description field of the System Protection window, type Application Installed. Click Create. © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 10 Lab – System Restore in Windows 7 and Vista d. The System Protection window displays the progress of the creation of the restore point. When the message The restore point was created successfully displays, click Close. e. Click OK to close the System Properties window. Step 2: Work in the System Restore utility. a. Click Start > All Programs > Accessories > System Tools > System Restore. b. When the System Restore Window opens, click Next. © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 10 Lab – System Restore in Windows 7 and Vista c. The System Restore window displays a list of restore points. What type of restore point was created in step 1? d. Close all open windows. © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
    [Show full text]
  • D3dx9 30.Dll Windows 10 Download D3dx9 30.Dll : How to Fix DLL Errors, Download, and Update
    d3dx9 30.dll windows 10 download D3dx9_30.dll : How to Fix DLL Errors, Download, and Update. Last Updated: 07/02/2021 [Time to Read: D3dx9_30.dll uses the DLL file extension, which is more specifically known as a Dynamic Link Library file. It is classified as a Win64 DLL (Dynamic link library) file, created for Microsoft® DirectX for Windows® by Autodesk, Inc.. The first release in the Windows 10 Operating System for d3dx9_30.dll was on 09/17/2019 inside CyberLink PowerDirector 18. The newest file release date for DWG TrueView 2019 was 09/17/2018 [version 9.12.589.0000]. D3dx9_30.dll is packaged with DWG TrueView 2019, Call of Duty 4: Modern Warfare (Not Specified), and Flight Simulator X demo Demo. Below, you find comprehensive file information, instructions for simple DLL file troubleshooting, and list of free d3dx9_30.dll downloads for each available file version. File Analysis Provided by Jason Geater (Author) Recommended Download: Fix d3dx9_30.dll / DWG TrueView-related registry issues with WinThruster. Compatible with Windows 10, 8, 7, Vista, XP and 2000. Average User Rating. Optional Offer for WinThruster by Solvusoft | EULA | Privacy Policy | Terms | Uninstall. File Overview. Developer and Software Information Software Developer: Microsoft Corporation Software Program: Microsoft® DirectX for Windows® Legal Copyright: © Microsoft Corporation. All rights reserved. File Details Character Set: Unicode Language Code: English (U.S.) File Flags: (none) File Flags Mask: 0x003f Entry Point: 0x346280 Code Size: 3689472. File Info Description
    [Show full text]
  • Bitlocker Management
    BitLocker Management Vista Full Volume Encryption Feature Overview BitLocker - Full Volume Encryption Vista Enterprise and Ultimate AD management & Key backup options Save recovery password to USB, Printer, or File Share TPM 1.2 – Enables Drive Tampering Protection WMI Interface Vista Tool compatibility MS Boot Loader, System Restore, Disk Management BitLocker Tools Manage-bde.wsf - RTM Add / Remove key protectors Tools from MS Premier Support Site: BitLocker Drive Preparation BitLocker Recovery Password Viewer BitLocker Repair Tool Searches HD for unlinked FVEKs BitLocker Group Policy Computer Config\Admin Templates\Windows Components\BitLocker Drive Encryption AD Key Backup Options Backup Recovery Password to AD Backup Key Package to AD Require Backup to AD before encryption is enabled Backup Recovery Password to Share Recovery Options Require Creation of Recovery Password - Default Require Creation of Recovery Key Package - Default BitLocker Group Policy Advanced Options Allow BitLocker without TPM Startup Key or Pin with TPM Encryption Method AES 128 Diffuser – Default Prevent Memory Overwrite on Restart – Disabled TPM Platform Validation –7 Default Metrics Rom Code MBR Code – not partition table Boot Manager TPM Group Policy Computer Config\Admin Templates\System\ Trusted Platform Module Backup TPM Owner information to AD Require backup 3 settings related to TPM blocked commands BDE Security and Compatibility BitLocker Tips AD Backup only occurs when BDE is enabled Or when TPM is initialized
    [Show full text]
  • Server Execution Failed Downloaded File How to Fix "Server Execution Failed" Error When Playing Audio File
    server execution failed downloaded file How to fix "Server execution failed" error when playing audio file. Windows Media Player is the default software STUFF on a Windows computer for playing audio files, including MP3 and WAV. When you double-click an audio file, Windows Media Player automatically opens and starts to play it. Unfortunately, Windows updates or issues related to Windows Media Player or audio codecs can result in seeing the "Server execution failed" error when trying to play an audio file. The error is usually due to corruption with the Windows Media Player program files or the codecs for playing audio files. To fix the "Server execution failed " error for Windows Media Player, follow the steps in each section below. Back up Windows Media Player playlists and configuration settings. If you have playlists or other custom configuration settings in Windows Media Player, you first need to back up those playlists and settings. If you don't, your playlists and custom configuration settings are lost as part of the repair process. To back up your playlists and configuration settings, follow the steps below. If you do not have any playlists or custom configuration settings in Windows Media Player, skip to the next section. Navigate to the following folder path, where [username] is the name of the account you log in with and use in Windows. C:\Users\ [username] \AppData\Local\Microsoft\Media Player. If you do not see the "AppData" folder, you need to adjust the folder settings to show hidden files and folders, see: How do I view hidden files and folders in Windows? In the Media Player folder, press Ctrl + A , then press Ctrl + C to select and copy all the files and subfolders.
    [Show full text]