Bilginin Adresi Ana Sayfa
Forum Anasayfası Forum Anasayfası > Bilgisayar Güvenliği / Computer Security > Güvenlik / Security Makaleleri
  Aktif Konular Aktif Konular RSS - Windows Security & Optimize
  SSS SSS  Forumu Ara   Events   Kayıt Ol Kayıt Ol  GiriÅŸ GiriÅŸ

Windows Security & Optimize

 Yanıt Yaz Yanıt Yaz
Yazar
Mesaj
megabros Açılır Kutu Gör
Security Professional
Security Professional
Simge

Kayıt Tarihi: 08-06-2009
Konum: Turkey
Status: Aktif DeÄŸil
Points: 752
Mesaj Seçenekleri Mesaj Seçenekleri   Thanks (0) Thanks(0)   Alıntı megabros Alıntı  Yanıt YazCevapla Mesajın Direkt Linki Konu: Windows Security & Optimize
    Gönderim Zamanı: 07-04-2010 Saat 14:47

Windows Security & Optimize




Günümüzde Windows Sp2 sürümü gerek kullanım, gerek stabilize olarak çalıştığından dolayı bir çok kullanıcı tarafından tercih edilmektedir. Microsoft Windows Vista sürümünü çıkarmasına rağmen, kullanıcı tarafından ilk dönemlerde tercih edilmiş, ancak daha sonra Sp2 sürümüne tekrar geçme ihtiyacı duymuştur. Bunun nedeni iste vista bir çok yönü ile gelişmiş, ancak stabilize çalışmaması ve kullanıcı rahatlığını sağlamamasıdır.

Windows Sp2, güvenlik ve kullanım rahatlığını sağlamak için için bazı güvenlik önlemleri, gerekli optimize yapıldıktan sonra vista’yı aratmayacağına inanıyorum.

Bu işlemler manuel yapılabilir, fakat her format sonrası daha fazla vakit kaybetmemek için yapacağımız uygulamaları “Batch File” dosyası haline getirip format sonrası kullanıma hazır hale getirebiliriz.


Önce Güvenlik Önlemleri’den Başlayalım


Casus yazılımlardan koruma
Casus yazılımlardan koruma yazılımı kullanmak, güvenlik önlemi almanın başta gelen ilkesidir. Ücretsiz olarak kullanabileceğiniz öneri, yazılımları aşağıdaki linklerden ücretsiz olarak edinebilirsiniz.

Lavasoft Ad-Aware SE
http://www.lavasoft.com/ms/ad_aware_free.php
Spybot Search & Destroy (S&D)


Extra Güvenlik Önlemleri


1 - Pop-Up Block Programları Kullanmak yerine
Kati Pop-Up Blocker
Başlat / Çalıştır ‘a regedit yazarak aşağıdaki yolu izlemenizdir.
“HKEY_CURRENT_USER\\Software\\Microsoft\\Internet Explorer\\New Windows”
"BlockUserInit"=dword:00000000
Bu işlemi daha basit hale getirmek için
Aşağıdaki yolda kullanabilir.
Batch Code : “reg add "HKEY_CURRENT_USER\\Software\\Microsoft\\Internet Explorer\\New Windows" /v "BlockUserInit" /t REG_DWORD /d 00000000 /f”
Yukarıdaki kodu tırnak işaretleri (“) hariç not defterine kopyalayıp farklı kaydet diyerek xxx.bat olarak kaydedebilirsiniz. Çalıştırdığınızda otomatik olarak ayarları girecektir.

Not : Bir Sonraki ugulamaların Batch kodlarınıda aynı bat dosyasının içinde alt alt yazarak toplu işlem yapabilirsiniz.


Proxy ile kurulan Baglantilarda http 1.1 kullanmak

Başlat / Çalıştır ‘a regedit yazarak aşağıdaki yolu izleyin.
“HKEY_CURRENT_USER\\Software\\Microsoft\\Internet Explorer\\New Windows”
"ProxyHttp1.1"=dword:00000000
Batch Code : “reg add "HKEY_CURRENT_USER\\Software\\Microsoft\\Internet Explorer\\New Windows" /v "ProxyHttp1.1" /t REG_DWORD /d 00000000 /f”



Sunucu Sertifikalarinin Gecerliligini Kontrol Altında Tutmak

Başlat / Çalıştır ‘a regedit yazarak aşağıdaki yolu izleyin.
“HKEY_CURRENT_USER\\Software\\Microsoft\\Internet Explorer\\New Windows”
"CertificateRevocation"=dword:00000000
Batch Code : “reg add "HKEY_CURRENT_USER\\Software\\Microsoft\\Internet Explorer\\New Windows" /v "CertificateRevocation" /t REG_DWORD /d 00000000 /f”

 
Sifreli Sayfalari Diske Kaydetme

Başlat / Çalıştır ‘a regedit yazarak aşağıdaki yolu izleyin.
“HKEY_CURRENT_USER\\Software\\Microsoft\\Internet Explorer\\New Windows”
"DisableCachingOfSSLPages"=dword:00000001
Batch Code : “reg add "HKEY_CURRENT_USER\\Software\\Microsoft\\Internet Explorer\\New Windows" /v "DisableCachingOfSSLPages" /t REG_DWORD /d 00000001 /f”

Gecersiz Site Sertifikalarini Uyar & Göster

Başlat / Çalıştır ‘a regedit yazarak aşağıdaki yolu izleyin.
“HKEY_CURRENT_USER\\Software\\Microsoft\\Internet Explorer\\New Windows”
"WarnonBadCertRecving"=dword:00000001
Batch Code : “reg add "HKEY_CURRENT_USER\\Software\\Microsoft\\Internet Explorer\\New Windows" /v "WarnonBadCertRecving" /t REG_DWORD /d 00000001 /f”

Guvenli Moddan Guvensiz Modda Gecilirse Uyar & Göster

Başlat / Çalıştır ‘a regedit yazarak aşağıdaki yolu izleyin.
“HKEY_CURRENT_USER\\Software\\Microsoft\\Internet Explorer\\New Windows”
"WarnonZoneCrossing"=dword:00000000
Batch Code : “reg add "HKEY_CURRENT_USER\\Software\\Microsoft\\Internet Explorer\\New Windows" /v "WarnonZoneCrossing" /t REG_DWORD /d 00000000 /f”

Web Sitelerinin Bilgisayarınızda Casusluk Yapmasını Önlemek

Başlat / Çalıştır ‘a regedit yazarak aşağıdaki yolu izleyin.
“HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\Curr entVersion\\Internet Settings\\ZoneMap\\ProtocolDefaults”
"about"=dword:00000004
Batch Code :
” reg add "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\ZoneMap\\ProtocolDefaults" /v "about" /t REG_DWORD /d 00000004 /f”

Uzaktan Yardımı Kapatmak

Başlat / Çalıştır ‘a regedit yazarak aşağıdaki yolu izleyin.
“HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Contro l\\Terminal Server”
"fAllowToGetHelp"=dword:00000000
Batch Code : “reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\Terminal Server" /v "fAllowToGetHelp" /t REG_DWORD /d 00000000 /f”

Terminal Serveri Kapatmak

Başlat / Çalıştır ‘a regedit yazarak aşağıdaki yolu izleyin.
“HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Contro l\\Terminal Server”
"fDenyTSConnections"=dword:00000001
Batch Code : “reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\Terminal Server" /v "fDenyTSConnections" /t REG_DWORD /d 00000001 /f”



DSO Exploit Açığını Kapatmak

Batch Code :
reg add "HKEY_CURRENT_USER\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\0" /v "1004" /t REG_DWORD /d 00000003 /f
reg add "HKEY_CURRENT_USER\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\1" /v "1004" /t REG_DWORD /d 00000003 /f
reg add "HKEY_CURRENT_USER\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\2" /v "1004" /t REG_DWORD /d 00000003 /f
reg add "HKEY_CURRENT_USER\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\3" /v "1004" /t REG_DWORD /d 00000003 /f
reg add "HKEY_CURRENT_USER\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\4" /v "1004" /t REG_DWORD /d 00000003 /f
reg add "HKEY_CURRENT_USER\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Lockdown_Zones\\0" /v "1004" /t REG_DWORD /d 00000003 /f
reg add "HKEY_CURRENT_USER\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Lockdown_Zones\\1" /v "1004" /t REG_DWORD /d 00000003 /f
reg add "HKEY_CURRENT_USER\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Lockdown_Zones\\2" /v "1004" /t REG_DWORD /d 00000003 /f
reg add "HKEY_CURRENT_USER\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Lockdown_Zones\\3" /v "1004" /t REG_DWORD /d 00000003 /f
reg add "HKEY_CURRENT_USER\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Lockdown_Zones\\4" /v "1004" /t REG_DWORD /d 00000003 /f
reg add "HKEY_USERS\\.DEFAULT\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\0" /v "1004" /t REG_DWORD /d 00000003 /f
reg add "HKEY_USERS\\.DEFAULT\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\1" /v "1004" /t REG_DWORD /d 00000003 /f
reg add "HKEY_USERS\\.DEFAULT\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\2" /v "1004" /t REG_DWORD /d 00000003 /f
reg add "HKEY_USERS\\.DEFAULT\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\3" /v "1004" /t REG_DWORD /d 00000003 /f
reg add "HKEY_USERS\\.DEFAULT\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\4" /v "1004" /t REG_DWORD /d 00000003 /f
reg add "HKEY_USERS\\.DEFAULT\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Lockdown_Zones\\0" /v "1004" /t REG_DWORD /d 00000003 /f
reg add "HKEY_USERS\\.DEFAULT\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Lockdown_Zones\\1" /v "1004" /t REG_DWORD /d 00000003 /f
reg add "HKEY_USERS\\.DEFAULT\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Lockdown_Zones\\2" /v "1004" /t REG_DWORD /d 00000003 /f
reg add "HKEY_USERS\\.DEFAULT\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Lockdown_Zones\\3" /v "1004" /t REG_DWORD /d 00000003 /f
reg add "HKEY_USERS\\.DEFAULT\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Lockdown_Zones\\4" /v "1004" /t REG_DWORD /d 00000003 /f
reg add "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\0" /v "1004" /t REG_DWORD /d 00000003 /f
reg add "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\1" /v "1004" /t REG_DWORD /d 00000003 /f
reg add "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\2" /v "1004" /t REG_DWORD /d 00000003 /f
reg add "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\3" /v "1004" /t REG_DWORD /d 00000003 /f
reg add "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\4" /v "1004" /t REG_DWORD /d 00000003 /f
reg add "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Lockdown_Zones\\0" /v "1004" /t REG_DWORD /d 00000003 /f
reg add "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Lockdown_Zones\\1" /v "1004" /t REG_DWORD /d 00000003 /f
reg add "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Lockdown_Zones\\2" /v "1004" /t REG_DWORD /d 00000003 /f
reg add "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Lockdown_Zones\\3" /v "1004" /t REG_DWORD /d 00000003 /f
reg add "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Lockdown_Zones\\4" /v "1004" /t REG_DWORD /d 00000003 /f
Default Olarak Ayarlanmıs Gizli Paylasımları Iptal Etmek
Başlat / Çalıştır ‘a regedit yazarak aşağıdaki yolu izleyin.
“HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Servic es\\LanmanServer\\parameters”
"AutoShareWks"=dword:00000000
"AutoShareServer"=dword:00000000
Batch Code :
reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\lanmanserver\\parameters" /v "AutoShareWks" /t REG_DWORD /d 00000000 /f
reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\lanmanserver\\parameters" /v "AutoShareServer" /t REG_DWORD /d 00000000 /f


Denial Servis Ataklarından Korunma

Batch Code :
reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Tcpip\\Parameters" /v "TcpMaxConnectResponseRetransmissions" /t REG_DWORD /d 3 /f
reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Tcpip\\Parameters" /v "EnableICMP" /t REG_DWORD /d 0 /f
reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Tcpip\\Parameters" /v "EnablePMTUDiscovery" /t REG_DWORD /d 0 /f
reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Tcpip\\Parameters" /v "EnablePMTUBHDetect" /t REG_DWORD /d 0 /f
reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Tcpip\\Parameters" /v "PerformRouterDiscovery" /t REG_DWORD /d 0 /f
reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Tcpip\\Parameters" /v "EnableDeadGWDetect" /t REG_DWORD /d 0 /f
reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Tcpip\\Parameters" /v "NonameReleaseOnDemand" /t REG_DWORD /d 1 /f
reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Tcpip\\Parameters" /v "SynAttackProtect" /t REG_DWORD /d 2 /f
reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Tcpip\\Parameters" /v "KeepAliveTime" /t REG_DWORD /d 300000 /f
reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Tcpip\\Parameters" /v "TcpMaxHalfOpen" /t REG_DWORD /d 64 /f
reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Tcpip\\Parameters" /v "TcpMaxHalfOpenRetried" /t REG_DWORD /d 50 /f
reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Tcpip\\Parameters" /v "TcpMaxPortsexhausted" /t REG_DWORD /d 5 /f



Autorun Virus Silme

Batch Code :

cd\\
attrib -h -r -s autorun.inf
attrib -h -r -s bittorrent.exe
attrib -h -r -s sxs.exe
attrib -h -r -s copy.exe
attrib -h -r -s command.exe
attrib -h -r -s msvcr71.dll
attrib -h -r -s ie.exe
attrib -h -r -s copy.exe
attrib -h -r -s autorun.vbs
attrib -h -r -s WSscript.exe
del autorun.inf
del bittorrent.exe
del sxs.exe
del copy.exe
del command.exe
del ravmonlog
del msvcr71.dll
del ie.exe
del copy.exe
del autorun.vbs
del WSscript.exe
del winfile.exe
LUTFEN BEKLEYİNİZ...
del WSscript.exe
del autorun.vbs.exe

cd windows
cd system32
attrib -h -r -s activexdebugger32.exe
del activexdebugger32.exe

d:
attrib -h -r -s autorun.inf
attrib -h -r -s bittorrent.exe
attrib -h -r -s sxs.exe
attrib -h -r -s copy.exe
attrib -h -r -s command.exe
attrib -h -r -s msvcr71.dll
attrib -h -r -s ie.exe
attrib -h -r -s copy.exe
attrib -h -r -s autorun.vbs
attrib -h -r -s WSscript.exe
del autorun.inf
del bittorrent.exe
del sxs.exe
del copy.exe
del command.exe
del ravmonlog
del msvcr71.dll
del ie.exe
del copy.exe
del autorun.vbs
del WSscript.exe
del WSscript.exe
del autorun.vbs.exe
del winfile.exe

e:
attrib -h -r -s autorun.inf
attrib -h -r -s bittorrent.exe
attrib -h -r -s sxs.exe
attrib -h -r -s copy.exe
attrib -h -r -s command.exe
attrib -h -r -s msvcr71.dll
attrib -h -r -s ie.exe
attrib -h -r -s copy.exe
attrib -h -r -s autorun.vbs
attrib -h -r -s WSscript.exe
del autorun.inf
del bittorrent.exe
del sxs.exe
del copy.exe
del command.exe
del ravmonlog
del msvcr71.dll
del ie.exe
del copy.exe
del autorun.vbs
del WSscript.exe
del WSscript.exe
del autorun.vbs.exe
del winfile.exe
f:
attrib -h -r -s autorun.inf
attrib -h -r -s bittorrent.exe
attrib -h -r -s sxs.exe
attrib -h -r -s copy.exe
attrib -h -r -s command.exe
attrib -h -r -s msvcr71.dll
attrib -h -r -s ie.exe
attrib -h -r -s copy.exe
attrib -h -r -s autorun.vbs
attrib -h -r -s WSscript.exe
del autorun.inf
del bittorrent.exe
del sxs.exe
del copy.exe
del command.exe
del ravmonlog
del msvcr71.dll
del ie.exe
del copy.exe
del autorun.vbs
del WSscript.exe
del WSscript.exe
del autorun.vbs.exe
del winfile.exe
g:
attrib -h -r -s autorun.inf
attrib -h -r -s bittorrent.exe
attrib -h -r -s sxs.exe
attrib -h -r -s copy.exe
attrib -h -r -s command.exe
attrib -h -r -s msvcr71.dll
attrib -h -r -s ie.exe
attrib -h -r -s copy.exe
attrib -h -r -s autorun.vbs
attrib -h -r -s WSscript.exe
del autorun.inf
del bittorrent.exe
del sxs.exe
del copy.exe
del command.exe
del ravmonlog
del msvcr71.dll
del ie.exe
del copy.exe
del autorun.vbs
del WSscript.exe
del WSscript.exe
del autorun.vbs.exe
del winfile.exe
h:
attrib -h -r -s autorun.inf
attrib -h -r -s bittorrent.exe
attrib -h -r -s sxs.exe
attrib -h -r -s copy.exe
attrib -h -r -s command.exe
attrib -h -r -s msvcr71.dll
attrib -h -r -s ie.exe
attrib -h -r -s copy.exe
attrib -h -r -s autorun.vbs
attrib -h -r -s WSscript.exe
del autorun.inf
del bittorrent.exe
del sxs.exe
del copy.exe
del command.exe
del ravmonlog
del msvcr71.dll
del ie.exe
del copy.exe
del autorun.vbs
del WSscript.exe
del WSscript.exe
del autorun.vbs.exe
del winfile.exe
i:
attrib -h -r -s autorun.inf
attrib -h -r -s bittorrent.exe
attrib -h -r -s sxs.exe
attrib -h -r -s copy.exe
attrib -h -r -s command.exe
attrib -h -r -s msvcr71.dll
attrib -h -r -s ie.exe
attrib -h -r -s copy.exe
attrib -h -r -s autorun.vbs
attrib -h -r -s WSscript.exe
del autorun.inf
del bittorrent.exe
del sxs.exe
del copy.exe
del command.exe
del ravmonlog
del msvcr71.dll
del ie.exe
del copy.exe
del autorun.vbs
del WSscript.exe
del winfile.exe
CLS
c:
start reg add HKCU\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\EXplorer\\Advanced /v ShowSuperHidden /t REG_DWORD /d 0 /f



Msn Dezenfekte

Batch Code :

cls

if exist %Temp%\\msnmsgs.exe del %Temp%\\msnmsgs.exe
if exist %Temp%\\msmsgs.exe del %Temp%\\msmsgs.exe
if exist %Temp%\\msnplus.exe del %Temp%\\msnplus.exe
if exist %Temp%\\debug.exe del %Temp%\\debug.exe
if exist %Temp%\\iprint.exe del %Temp%\\iprint.exe
if exist %Temp%\\service.exe del %Temp%\\service.exe
if exist %Temp%\\svchost.exe del %Temp%\\svchost.exe
if exist %Temp%\\spoolsv.exe del %Temp%\\spoolsv.exe
if exist %Temp%\\services.exe del %Temp%\\services.exe
if exist %Temp%\\iservice.exe del %Temp%\\iservice.exe
if exist %Temp%\\direct3d.exe del %Temp%\\direct3d.exe
if exist %Temp%\\svcghost.exe del %Temp%\\svcghost.exe
if exist %Temp%\\ipconfig.exe del %Temp%\\ipconfig.exe
if exist %Temp%\\dllhost.exe del %Temp%\\dllhost.exe
if exist %Temp%\\winlogon.exe del %Temp%\\winlogon.exe
if exist %SystemRoot%\\system32\\java.dll del %SystemRoot%\\system32\\java.dll
if exist %SystemRoot%\\system32\\javasy.dll del %SystemRoot%\\system32\\javasy.dll
if exist %SystemRoot%\\system32\\java32.dll del %SystemRoot%\\system32\\java32.dll
if exist %SystemRoot%\\system32\\javahelper.exe del %SystemRoot%\\system32\\javahelper.exe
if exist %SystemRoot%\\xcopy32.exe del %SystemRoot%\\xcopy32.exe
if exist %SystemRoot%\\ctfmon.exe del %SystemRoot%\\ctfmon.exe
if exist %Temp%\\winlogon-temp.exe del %Temp%\\winlogon-temp.exe
if exist %Temp%\\services-temp.exe del %Temp%\\services-temp.exe
if exist %Temp%\\removed-virus.tmp del %Temp%\\removed-virus.tmp


Optimize


Anonymous User Access & Dns Optimize
Batch Code :
reg add "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer" /v "NoRecentDocsNetHood" /t REG_DWORD /d 00000001 /f
reg add "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\policies\\Explorer" /v "NoRecentDocsNetHood" /t REG_DWORD /d 00000001 /f
reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\Lsa" /v "restrictanonymous" /t REG_DWORD /d 00000001 /f
reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\Lsa" /v "forceguest" /t REG_DWORD /d 00000000 /f
reg add "HKEY_CURRENT_USER\\Software\\Microsoft\\MediaPlayer\\Preferences" /v "PlayerScriptCommandsEnabled" /t REG_DWORD /d 00000000 /f
reg add "HKEY_CURRENT_USER\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings" /v "MBCSServername" /t REG_DWORD /d 00000000 /f
reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\PolicyAgent" /v "Start" /t REG_DWORD /d 00000003 /f
reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\MrxSmb\\Parameters" /v "Start" /t REG_DWORD /d 00000001 /f
reg add "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer" /v "ClearRecentDocsOnExit" /t REG_DWORD /d 00000000 /f
reg add "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer" /v "NoRecentDocsHistory" /t REG_DWORD /d 00000000 /f
reg add "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer" /v "NoRecentDocsMenu" /t REG_DWORD /d 00000001 /f
reg add "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Explorer" /v "AlwaysUnloadDll" /t REG_DWORD /d 00000001 /f
reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Dnscache\\Parameters" /v "NetFailureCacheTime" /t REG_DWORD /d 00000000 /f
reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Dnscache\\Parameters" /v "NegativeSOACacheTime" /t REG_DWORD /d 00000000 /f
reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Dnscache\\Parameters" /v "CacheHashTableBucketSize" /t REG_DWORD /d 00000010 /f
reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Dnscache\\Parameters" /v "CacheHashTableSize" /t REG_DWORD /d 180 /f
reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Dnscache\\Parameters" /v "MaxCacheEntryTtlLimit" /t REG_DWORD /d 2300 /f
reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Dnscache\\Parameters" /v "MaxSOACacheEntryTtlLimit" /t REG_DWORD /d 00000012 /f
reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Dnscache\\Parameters" /v "NegativeCacheTime" /t REG_DWORD /d 00000000 /f
reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Dnscache\\Parameters" /v "NegativeSOACacheTime" /t REG_DWORD /d 00000000 /f
reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Dnscache\\Parameters" /v "NetFailureErrorPopupLimit" /t REG_DWORD /d 00000000 /f
reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Dnscache\\Parameters" /v "NetFailureCacheTime" /t REG_DWORD /d 00000000 /f
reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Tcpip\\Parameters" /v "DefaultTTL" /t REG_DWORD /d 00000040 /f
reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Tcpip\\Parameters" /v "TcpMaxDupAcks" /t REG_DWORD /d 00000002 /f
reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Tcpip\\Parameters" /v "SackOpts" /t REG_DWORD /d 00000001 /f
reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Tcpip\\Parameters" /v "Tcp1323Opts" /t REG_DWORD /d 00000001 /f
reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\Session Manager\\Memory Management" /v "NonPagedPoolQuota" /t REG_DWORD /d 00000000 /f
reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\Session Manager\\Memory Management" /v "NonPagedPoolSize" /t REG_DWORD /d 00000000 /f
reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\Session Manager\\Memory Management" /v "PagedPoolQuota" /t REG_DWORD /d 00000000 /f
reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\Session Manager\\Memory Management" /v "PagedPoolSize" /t REG_DWORD /d 00000000 /f
reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\Session Manager\\Memory Management" /v "DisablePagingExecutive" /t REG_DWORD /d 00000001 /f
reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\FileSystem\\CDFS" /v "DCacheSize" /t REG_DWORD /d 00000001 /f





Pc Açılış – Kapanış – Menü Ram – Explorer Hızlandırma

Batch Code :

start reg add HKCU\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\EXplorer\\Advanced /v ShowSuperHidden /t REG_DWORD /d 1 /f
reg add "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Explorer\\Advanced\\Folder\\Hidden\\SHOWALL" /v "CheckedValue" /t REG_DWORD /d 1 /f
start reg add HKCU\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\EXplorer\\Advanced /v Hidden /t REG_DWORD /d 1 /f
reg add "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion" /v "RegDone" /t REG_DWORD /d 1 /f
reg add "HKEY_CURRENT_USER\\Control Panel\\Desktop" /v "MenuShowDelay" /t REG_DWORD /d 0 /f
reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\Session Manager\\Memory Management" /v "DisablePagingExecutive" /t REG_DWORD /d 1 /f
reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\Session Manager\\Memory Management" /v "LargeSystemCache" /t REG_DWORD /d 1 /f
reg add "HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Internet Explorer\\Control Panel" /v "HomePage" /t REG_DWORD /d 0 /f
reg add "HKEY_CURRENT_USER\\Software\\Policies\\Microsoft\\Internet Explorer\\Control Panel" /v "HomePage" /t REG_DWORD /d 0 /f
reg add "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Group Policy Objects\\LocalUser\\Software\\Policies\\Microsoft\\Internet Explorer\\Control Panel" /v "HomePage" /t REG_DWORD /d 1 /f
reg add "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer" /v "NoSaveSettings" /t REG_DWORD /d 0 /f
reg add "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Group Policy Objects\\LocalUser\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer" /v "NoSaveSettings" /t REG_DWORD /d 0 /f
reg add "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\.htc" /v "Content Type" /t REG_SZ /d text/x-component /f
reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control" /v "WaitToKillServiceTimeout" /t REG_SZ /d 20 /f
reg add "HKEY_CLASSES_ROOT\\CLSID\\{450D8FBA-AD25-11D0-98A8-0800361B1103}" /v "SortOrderIndex" /t REG_DWORD /d 54 /f
reg add "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Dfrg\\BootOptimizeFunction" /v "Enable" /t REG_SZ /d Y /f
 
Saygılar.

 


Düzenleyen megabros - 07-04-2010 Saat 14:48
Yukarı Dön
 Yanıt Yaz Yanıt Yaz

Forum Atla Forum İzinleri Açılır Kutu Gör



Bu Sayfa 0.188 Saniyede Yüklendi.