Windows Security & Optimize
Günümüzde Windows Sp2 sürümü gerek kullaným, gerek stabilize olarak çalýþtýðýndan dolayý bir çok kullanýcý tarafýndan tercih edilmektedir. Microsoft Windows Vista sürümünü çýkarmasýna raðmen, kullanýcý tarafýndan ilk dönemlerde tercih edilmiþ, ancak daha sonra Sp2 sürümüne tekrar geçme ihtiyacý duymuþtur. Bunun nedeni iste vista bir çok yönü ile geliþmiþ, ancak stabilize çalýþmamasý ve kullanýcý rahatlýðýný saðlamamasýdýr.
Windows Sp2, güvenlik ve kullaným rahatlýðýný saðlamak için için bazý güvenlik önlemleri, gerekli optimize yapýldýktan sonra vista’yý aratmayacaðýna inanýyorum.
Bu iþlemler manuel yapýlabilir, fakat her format sonrasý daha fazla vakit kaybetmemek için yapacaðýmýz uygulamalarý “Batch File” dosyasý haline getirip format sonrasý kullanýma hazýr hale getirebiliriz.
Önce Güvenlik Önlemleri’den Baþlayalým
Casus yazýlýmlardan koruma Casus yazýlýmlardan koruma yazýlýmý kullanmak, güvenlik önlemi almanýn baþta gelen ilkesidir. Ücretsiz olarak kullanabileceðiniz öneri, yazýlýmlarý aþaðýdaki linklerden ücretsiz olarak edinebilirsiniz.
Lavasoft Ad-Aware SE http://www.lavasoft.com/ms/ad_aware_free.php Spybot Search & Destroy (S&D)
Extra Güvenlik Önlemleri
1 - Pop-Up Block Programlarý Kullanmak yerine Kati Pop-Up Blocker Baþlat / Çalýþtýr ‘a regedit yazarak aþaðýdaki yolu izlemenizdir. “HKEY_CURRENT_USER\\Software\\Microsoft\\Internet Explorer\\New Windows” "BlockUserInit"=dword:00000000 Bu iþlemi daha basit hale getirmek için Aþaðýdaki yolda kullanabilir. Batch Code : “reg add "HKEY_CURRENT_USER\\Software\\Microsoft\\Internet Explorer\\New Windows" /v "BlockUserInit" /t REG_DWORD /d 00000000 /f” Yukarýdaki kodu týrnak iþaretleri (“) hariç not defterine kopyalayýp farklý kaydet diyerek xxx.bat olarak kaydedebilirsiniz. Çalýþtýrdýðýnýzda otomatik olarak ayarlarý girecektir.
Not : Bir Sonraki ugulamalarýn Batch kodlarýnýda ayný bat dosyasýnýn içinde alt alt yazarak toplu iþlem yapabilirsiniz.
Proxy ile kurulan Baglantilarda http 1.1 kullanmak
Baþlat / Çalýþtýr ‘a regedit yazarak aþaðýdaki yolu izleyin. “HKEY_CURRENT_USER\\Software\\Microsoft\\Internet Explorer\\New Windows” "ProxyHttp1.1"=dword:00000000 Batch Code : “reg add "HKEY_CURRENT_USER\\Software\\Microsoft\\Internet Explorer\\New Windows" /v "ProxyHttp1.1" /t REG_DWORD /d 00000000 /f”
Sunucu Sertifikalarinin Gecerliligini Kontrol Altýnda Tutmak
Baþlat / Çalýþtýr ‘a regedit yazarak aþaðýdaki yolu izleyin. “HKEY_CURRENT_USER\\Software\\Microsoft\\Internet Explorer\\New Windows” "CertificateRevocation"=dword:00000000 Batch Code : “reg add "HKEY_CURRENT_USER\\Software\\Microsoft\\Internet Explorer\\New Windows" /v "CertificateRevocation" /t REG_DWORD /d 00000000 /f”
Sifreli Sayfalari Diske Kaydetme
Baþlat / Çalýþtýr ‘a regedit yazarak aþaðýdaki yolu izleyin. “HKEY_CURRENT_USER\\Software\\Microsoft\\Internet Explorer\\New Windows” "DisableCachingOfSSLPages"=dword:00000001 Batch Code : “reg add "HKEY_CURRENT_USER\\Software\\Microsoft\\Internet Explorer\\New Windows" /v "DisableCachingOfSSLPages" /t REG_DWORD /d 00000001 /f”
Gecersiz Site Sertifikalarini Uyar & Göster
Baþlat / Çalýþtýr ‘a regedit yazarak aþaðýdaki yolu izleyin. “HKEY_CURRENT_USER\\Software\\Microsoft\\Internet Explorer\\New Windows” "WarnonBadCertRecving"=dword:00000001 Batch Code : “reg add "HKEY_CURRENT_USER\\Software\\Microsoft\\Internet Explorer\\New Windows" /v "WarnonBadCertRecving" /t REG_DWORD /d 00000001 /f”
Guvenli Moddan Guvensiz Modda Gecilirse Uyar & Göster
Baþlat / Çalýþtýr ‘a regedit yazarak aþaðýdaki yolu izleyin. “HKEY_CURRENT_USER\\Software\\Microsoft\\Internet Explorer\\New Windows” "WarnonZoneCrossing"=dword:00000000 Batch Code : “reg add "HKEY_CURRENT_USER\\Software\\Microsoft\\Internet Explorer\\New Windows" /v "WarnonZoneCrossing" /t REG_DWORD /d 00000000 /f”
Web Sitelerinin Bilgisayarýnýzda Casusluk Yapmasýný Önlemek
Baþlat / Çalýþtýr ‘a regedit yazarak aþaðýdaki yolu izleyin. “HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\Curr entVersion\\Internet Settings\\ZoneMap\\ProtocolDefaults” "about"=dword:00000004 Batch Code : ” reg add "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\ZoneMap\\ProtocolDefaults" /v "about" /t REG_DWORD /d 00000004 /f”
Uzaktan Yardýmý Kapatmak
Baþlat / Çalýþtýr ‘a regedit yazarak aþaðýdaki yolu izleyin. “HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Contro l\\Terminal Server” "fAllowToGetHelp"=dword:00000000 Batch Code : “reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\Terminal Server" /v "fAllowToGetHelp" /t REG_DWORD /d 00000000 /f”
Terminal Serveri Kapatmak
Baþlat / Çalýþtýr ‘a regedit yazarak aþaðýdaki yolu izleyin. “HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Contro l\\Terminal Server” "fDenyTSConnections"=dword:00000001 Batch Code : “reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\Terminal Server" /v "fDenyTSConnections" /t REG_DWORD /d 00000001 /f”
DSO Exploit Açýðýný Kapatmak
Batch Code : reg add "HKEY_CURRENT_USER\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\0" /v "1004" /t REG_DWORD /d 00000003 /f reg add "HKEY_CURRENT_USER\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\1" /v "1004" /t REG_DWORD /d 00000003 /f reg add "HKEY_CURRENT_USER\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\2" /v "1004" /t REG_DWORD /d 00000003 /f reg add "HKEY_CURRENT_USER\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\3" /v "1004" /t REG_DWORD /d 00000003 /f reg add "HKEY_CURRENT_USER\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\4" /v "1004" /t REG_DWORD /d 00000003 /f reg add "HKEY_CURRENT_USER\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Lockdown_Zones\\0" /v "1004" /t REG_DWORD /d 00000003 /f reg add "HKEY_CURRENT_USER\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Lockdown_Zones\\1" /v "1004" /t REG_DWORD /d 00000003 /f reg add "HKEY_CURRENT_USER\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Lockdown_Zones\\2" /v "1004" /t REG_DWORD /d 00000003 /f reg add "HKEY_CURRENT_USER\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Lockdown_Zones\\3" /v "1004" /t REG_DWORD /d 00000003 /f reg add "HKEY_CURRENT_USER\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Lockdown_Zones\\4" /v "1004" /t REG_DWORD /d 00000003 /f reg add "HKEY_USERS\\.DEFAULT\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\0" /v "1004" /t REG_DWORD /d 00000003 /f reg add "HKEY_USERS\\.DEFAULT\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\1" /v "1004" /t REG_DWORD /d 00000003 /f reg add "HKEY_USERS\\.DEFAULT\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\2" /v "1004" /t REG_DWORD /d 00000003 /f reg add "HKEY_USERS\\.DEFAULT\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\3" /v "1004" /t REG_DWORD /d 00000003 /f reg add "HKEY_USERS\\.DEFAULT\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\4" /v "1004" /t REG_DWORD /d 00000003 /f reg add "HKEY_USERS\\.DEFAULT\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Lockdown_Zones\\0" /v "1004" /t REG_DWORD /d 00000003 /f reg add "HKEY_USERS\\.DEFAULT\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Lockdown_Zones\\1" /v "1004" /t REG_DWORD /d 00000003 /f reg add "HKEY_USERS\\.DEFAULT\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Lockdown_Zones\\2" /v "1004" /t REG_DWORD /d 00000003 /f reg add "HKEY_USERS\\.DEFAULT\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Lockdown_Zones\\3" /v "1004" /t REG_DWORD /d 00000003 /f reg add "HKEY_USERS\\.DEFAULT\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Lockdown_Zones\\4" /v "1004" /t REG_DWORD /d 00000003 /f reg add "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\0" /v "1004" /t REG_DWORD /d 00000003 /f reg add "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\1" /v "1004" /t REG_DWORD /d 00000003 /f reg add "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\2" /v "1004" /t REG_DWORD /d 00000003 /f reg add "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\3" /v "1004" /t REG_DWORD /d 00000003 /f reg add "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\4" /v "1004" /t REG_DWORD /d 00000003 /f reg add "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Lockdown_Zones\\0" /v "1004" /t REG_DWORD /d 00000003 /f reg add "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Lockdown_Zones\\1" /v "1004" /t REG_DWORD /d 00000003 /f reg add "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Lockdown_Zones\\2" /v "1004" /t REG_DWORD /d 00000003 /f reg add "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Lockdown_Zones\\3" /v "1004" /t REG_DWORD /d 00000003 /f reg add "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Lockdown_Zones\\4" /v "1004" /t REG_DWORD /d 00000003 /f Default Olarak Ayarlanmýs Gizli Paylasýmlarý Iptal Etmek Baþlat / Çalýþtýr ‘a regedit yazarak aþaðýdaki yolu izleyin. “HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Servic es\\LanmanServer\\parameters” "AutoShareWks"=dword:00000000 "AutoShareServer"=dword:00000000 Batch Code : reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\lanmanserver\\parameters" /v "AutoShareWks" /t REG_DWORD /d 00000000 /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\lanmanserver\\parameters" /v "AutoShareServer" /t REG_DWORD /d 00000000 /f
Denial Servis Ataklarýndan Korunma
Batch Code : reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Tcpip\\Parameters" /v "TcpMaxConnectResponseRetransmissions" /t REG_DWORD /d 3 /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Tcpip\\Parameters" /v "EnableICMP" /t REG_DWORD /d 0 /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Tcpip\\Parameters" /v "EnablePMTUDiscovery" /t REG_DWORD /d 0 /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Tcpip\\Parameters" /v "EnablePMTUBHDetect" /t REG_DWORD /d 0 /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Tcpip\\Parameters" /v "PerformRouterDiscovery" /t REG_DWORD /d 0 /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Tcpip\\Parameters" /v "EnableDeadGWDetect" /t REG_DWORD /d 0 /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Tcpip\\Parameters" /v "NonameReleaseOnDemand" /t REG_DWORD /d 1 /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Tcpip\\Parameters" /v "SynAttackProtect" /t REG_DWORD /d 2 /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Tcpip\\Parameters" /v "KeepAliveTime" /t REG_DWORD /d 300000 /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Tcpip\\Parameters" /v "TcpMaxHalfOpen" /t REG_DWORD /d 64 /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Tcpip\\Parameters" /v "TcpMaxHalfOpenRetried" /t REG_DWORD /d 50 /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Tcpip\\Parameters" /v "TcpMaxPortsexhausted" /t REG_DWORD /d 5 /f
Autorun Virus Silme
Batch Code :
cd\\ attrib -h -r -s autorun.inf attrib -h -r -s bittorrent.exe attrib -h -r -s sxs.exe attrib -h -r -s copy.exe attrib -h -r -s command.exe attrib -h -r -s msvcr71.dll attrib -h -r -s ie.exe attrib -h -r -s copy.exe attrib -h -r -s autorun.vbs attrib -h -r -s WSscript.exe del autorun.inf del bittorrent.exe del sxs.exe del copy.exe del command.exe del ravmonlog del msvcr71.dll del ie.exe del copy.exe del autorun.vbs del WSscript.exe del winfile.exe LUTFEN BEKLEYÝNÝZ... del WSscript.exe del autorun.vbs.exe
cd windows cd system32 attrib -h -r -s activexdebugger32.exe del activexdebugger32.exe
d: attrib -h -r -s autorun.inf attrib -h -r -s bittorrent.exe attrib -h -r -s sxs.exe attrib -h -r -s copy.exe attrib -h -r -s command.exe attrib -h -r -s msvcr71.dll attrib -h -r -s ie.exe attrib -h -r -s copy.exe attrib -h -r -s autorun.vbs attrib -h -r -s WSscript.exe del autorun.inf del bittorrent.exe del sxs.exe del copy.exe del command.exe del ravmonlog del msvcr71.dll del ie.exe del copy.exe del autorun.vbs del WSscript.exe del WSscript.exe del autorun.vbs.exe del winfile.exe
e: attrib -h -r -s autorun.inf attrib -h -r -s bittorrent.exe attrib -h -r -s sxs.exe attrib -h -r -s copy.exe attrib -h -r -s command.exe attrib -h -r -s msvcr71.dll attrib -h -r -s ie.exe attrib -h -r -s copy.exe attrib -h -r -s autorun.vbs attrib -h -r -s WSscript.exe del autorun.inf del bittorrent.exe del sxs.exe del copy.exe del command.exe del ravmonlog del msvcr71.dll del ie.exe del copy.exe del autorun.vbs del WSscript.exe del WSscript.exe del autorun.vbs.exe del winfile.exe f: attrib -h -r -s autorun.inf attrib -h -r -s bittorrent.exe attrib -h -r -s sxs.exe attrib -h -r -s copy.exe attrib -h -r -s command.exe attrib -h -r -s msvcr71.dll attrib -h -r -s ie.exe attrib -h -r -s copy.exe attrib -h -r -s autorun.vbs attrib -h -r -s WSscript.exe del autorun.inf del bittorrent.exe del sxs.exe del copy.exe del command.exe del ravmonlog del msvcr71.dll del ie.exe del copy.exe del autorun.vbs del WSscript.exe del WSscript.exe del autorun.vbs.exe del winfile.exe g: attrib -h -r -s autorun.inf attrib -h -r -s bittorrent.exe attrib -h -r -s sxs.exe attrib -h -r -s copy.exe attrib -h -r -s command.exe attrib -h -r -s msvcr71.dll attrib -h -r -s ie.exe attrib -h -r -s copy.exe attrib -h -r -s autorun.vbs attrib -h -r -s WSscript.exe del autorun.inf del bittorrent.exe del sxs.exe del copy.exe del command.exe del ravmonlog del msvcr71.dll del ie.exe del copy.exe del autorun.vbs del WSscript.exe del WSscript.exe del autorun.vbs.exe del winfile.exe h: attrib -h -r -s autorun.inf attrib -h -r -s bittorrent.exe attrib -h -r -s sxs.exe attrib -h -r -s copy.exe attrib -h -r -s command.exe attrib -h -r -s msvcr71.dll attrib -h -r -s ie.exe attrib -h -r -s copy.exe attrib -h -r -s autorun.vbs attrib -h -r -s WSscript.exe del autorun.inf del bittorrent.exe del sxs.exe del copy.exe del command.exe del ravmonlog del msvcr71.dll del ie.exe del copy.exe del autorun.vbs del WSscript.exe del WSscript.exe del autorun.vbs.exe del winfile.exe i: attrib -h -r -s autorun.inf attrib -h -r -s bittorrent.exe attrib -h -r -s sxs.exe attrib -h -r -s copy.exe attrib -h -r -s command.exe attrib -h -r -s msvcr71.dll attrib -h -r -s ie.exe attrib -h -r -s copy.exe attrib -h -r -s autorun.vbs attrib -h -r -s WSscript.exe del autorun.inf del bittorrent.exe del sxs.exe del copy.exe del command.exe del ravmonlog del msvcr71.dll del ie.exe del copy.exe del autorun.vbs del WSscript.exe del winfile.exe CLS c: start reg add HKCU\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\EXplorer\\Advanced /v ShowSuperHidden /t REG_DWORD /d 0 /f
Msn Dezenfekte
Batch Code :
cls
if exist %Temp%\\msnmsgs.exe del %Temp%\\msnmsgs.exe if exist %Temp%\\msmsgs.exe del %Temp%\\msmsgs.exe if exist %Temp%\\msnplus.exe del %Temp%\\msnplus.exe if exist %Temp%\\debug.exe del %Temp%\\debug.exe if exist %Temp%\\iprint.exe del %Temp%\\iprint.exe if exist %Temp%\\service.exe del %Temp%\\service.exe if exist %Temp%\\svchost.exe del %Temp%\\svchost.exe if exist %Temp%\\spoolsv.exe del %Temp%\\spoolsv.exe if exist %Temp%\\services.exe del %Temp%\\services.exe if exist %Temp%\\iservice.exe del %Temp%\\iservice.exe if exist %Temp%\\direct3d.exe del %Temp%\\direct3d.exe if exist %Temp%\\svcghost.exe del %Temp%\\svcghost.exe if exist %Temp%\\ipconfig.exe del %Temp%\\ipconfig.exe if exist %Temp%\\dllhost.exe del %Temp%\\dllhost.exe if exist %Temp%\\winlogon.exe del %Temp%\\winlogon.exe if exist %SystemRoot%\\system32\\java.dll del %SystemRoot%\\system32\\java.dll if exist %SystemRoot%\\system32\\javasy.dll del %SystemRoot%\\system32\\javasy.dll if exist %SystemRoot%\\system32\\java32.dll del %SystemRoot%\\system32\\java32.dll if exist %SystemRoot%\\system32\\javahelper.exe del %SystemRoot%\\system32\\javahelper.exe if exist %SystemRoot%\\xcopy32.exe del %SystemRoot%\\xcopy32.exe if exist %SystemRoot%\\ctfmon.exe del %SystemRoot%\\ctfmon.exe if exist %Temp%\\winlogon-temp.exe del %Temp%\\winlogon-temp.exe if exist %Temp%\\services-temp.exe del %Temp%\\services-temp.exe if exist %Temp%\\removed-virus.tmp del %Temp%\\removed-virus.tmp
Optimize
Anonymous User Access & Dns Optimize Batch Code : reg add "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer" /v "NoRecentDocsNetHood" /t REG_DWORD /d 00000001 /f reg add "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\policies\\Explorer" /v "NoRecentDocsNetHood" /t REG_DWORD /d 00000001 /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\Lsa" /v "restrictanonymous" /t REG_DWORD /d 00000001 /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\Lsa" /v "forceguest" /t REG_DWORD /d 00000000 /f reg add "HKEY_CURRENT_USER\\Software\\Microsoft\\MediaPlayer\\Preferences" /v "PlayerScriptCommandsEnabled" /t REG_DWORD /d 00000000 /f reg add "HKEY_CURRENT_USER\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings" /v "MBCSServername" /t REG_DWORD /d 00000000 /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\PolicyAgent" /v "Start" /t REG_DWORD /d 00000003 /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\MrxSmb\\Parameters" /v "Start" /t REG_DWORD /d 00000001 /f reg add "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer" /v "ClearRecentDocsOnExit" /t REG_DWORD /d 00000000 /f reg add "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer" /v "NoRecentDocsHistory" /t REG_DWORD /d 00000000 /f reg add "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer" /v "NoRecentDocsMenu" /t REG_DWORD /d 00000001 /f reg add "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Explorer" /v "AlwaysUnloadDll" /t REG_DWORD /d 00000001 /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Dnscache\\Parameters" /v "NetFailureCacheTime" /t REG_DWORD /d 00000000 /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Dnscache\\Parameters" /v "NegativeSOACacheTime" /t REG_DWORD /d 00000000 /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Dnscache\\Parameters" /v "CacheHashTableBucketSize" /t REG_DWORD /d 00000010 /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Dnscache\\Parameters" /v "CacheHashTableSize" /t REG_DWORD /d 180 /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Dnscache\\Parameters" /v "MaxCacheEntryTtlLimit" /t REG_DWORD /d 2300 /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Dnscache\\Parameters" /v "MaxSOACacheEntryTtlLimit" /t REG_DWORD /d 00000012 /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Dnscache\\Parameters" /v "NegativeCacheTime" /t REG_DWORD /d 00000000 /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Dnscache\\Parameters" /v "NegativeSOACacheTime" /t REG_DWORD /d 00000000 /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Dnscache\\Parameters" /v "NetFailureErrorPopupLimit" /t REG_DWORD /d 00000000 /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Dnscache\\Parameters" /v "NetFailureCacheTime" /t REG_DWORD /d 00000000 /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Tcpip\\Parameters" /v "DefaultTTL" /t REG_DWORD /d 00000040 /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Tcpip\\Parameters" /v "TcpMaxDupAcks" /t REG_DWORD /d 00000002 /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Tcpip\\Parameters" /v "SackOpts" /t REG_DWORD /d 00000001 /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Tcpip\\Parameters" /v "Tcp1323Opts" /t REG_DWORD /d 00000001 /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\Session Manager\\Memory Management" /v "NonPagedPoolQuota" /t REG_DWORD /d 00000000 /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\Session Manager\\Memory Management" /v "NonPagedPoolSize" /t REG_DWORD /d 00000000 /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\Session Manager\\Memory Management" /v "PagedPoolQuota" /t REG_DWORD /d 00000000 /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\Session Manager\\Memory Management" /v "PagedPoolSize" /t REG_DWORD /d 00000000 /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\Session Manager\\Memory Management" /v "DisablePagingExecutive" /t REG_DWORD /d 00000001 /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\FileSystem\\CDFS" /v "DCacheSize" /t REG_DWORD /d 00000001 /f
Pc Açýlýþ – Kapanýþ – Menü Ram – Explorer Hýzlandýrma
Batch Code :
start reg add HKCU\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\EXplorer\\Advanced /v ShowSuperHidden /t REG_DWORD /d 1 /f reg add "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Explorer\\Advanced\\Folder\\Hidden\\SHOWALL" /v "CheckedValue" /t REG_DWORD /d 1 /f start reg add HKCU\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\EXplorer\\Advanced /v Hidden /t REG_DWORD /d 1 /f reg add "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion" /v "RegDone" /t REG_DWORD /d 1 /f reg add "HKEY_CURRENT_USER\\Control Panel\\Desktop" /v "MenuShowDelay" /t REG_DWORD /d 0 /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\Session Manager\\Memory Management" /v "DisablePagingExecutive" /t REG_DWORD /d 1 /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\Session Manager\\Memory Management" /v "LargeSystemCache" /t REG_DWORD /d 1 /f reg add "HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Internet Explorer\\Control Panel" /v "HomePage" /t REG_DWORD /d 0 /f reg add "HKEY_CURRENT_USER\\Software\\Policies\\Microsoft\\Internet Explorer\\Control Panel" /v "HomePage" /t REG_DWORD /d 0 /f reg add "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Group Policy Objects\\LocalUser\\Software\\Policies\\Microsoft\\Internet Explorer\\Control Panel" /v "HomePage" /t REG_DWORD /d 1 /f reg add "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer" /v "NoSaveSettings" /t REG_DWORD /d 0 /f reg add "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Group Policy Objects\\LocalUser\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer" /v "NoSaveSettings" /t REG_DWORD /d 0 /f reg add "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\.htc" /v "Content Type" /t REG_SZ /d text/x-component /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control" /v "WaitToKillServiceTimeout" /t REG_SZ /d 20 /f reg add "HKEY_CLASSES_ROOT\\CLSID\\{450D8FBA-AD25-11D0-98A8-0800361B1103}" /v "SortOrderIndex" /t REG_DWORD /d 54 /f reg add "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Dfrg\\BootOptimizeFunction" /v "Enable" /t REG_SZ /d Y /f
Saygýlar.
|