Windows Security & Optimize |
Yanıt Yaz |
Yazar | |
megabros
Security Professional Kayıt Tarihi: 08-06-2009 Konum: Turkey Status: Aktif Değil Points: 752 |
Mesaj Seçenekleri
Yanıt Yaz
Alıntı megabros
Bu mesaj kurallara aykırıysa buradan yöneticileri bilgilendirebilirsiniz.
Gönderim Zamanı: 07-04-2010 Saat 14:47 |
Windows Security & Optimize Günümüzde Windows Sp2 sürümü gerek kullanım, gerek stabilize olarak çalıştığından dolayı bir çok kullanıcı tarafından tercih edilmektedir. Microsoft Windows Vista sürümünü çıkarmasına rağmen, kullanıcı tarafından ilk dönemlerde tercih edilmiş, ancak daha sonra Sp2 sürümüne tekrar geçme ihtiyacı duymuştur. Bunun nedeni iste vista bir çok yönü ile gelişmiş, ancak stabilize çalışmaması ve kullanıcı rahatlığını sağlamamasıdır. Windows Sp2, güvenlik ve kullanım rahatlığını sağlamak için için bazı güvenlik önlemleri, gerekli optimize yapıldıktan sonra vista’yı aratmayacağına inanıyorum. Bu işlemler manuel yapılabilir, fakat her format sonrası daha fazla vakit kaybetmemek için yapacağımız uygulamaları “Batch File” dosyası haline getirip format sonrası kullanıma hazır hale getirebiliriz. Önce Güvenlik Önlemleri’den Başlayalım Casus yazılımlardan koruma Casus yazılımlardan koruma yazılımı kullanmak, güvenlik önlemi almanın başta gelen ilkesidir. Ücretsiz olarak kullanabileceğiniz öneri, yazılımları aşağıdaki linklerden ücretsiz olarak edinebilirsiniz. Lavasoft Ad-Aware SE http://www.lavasoft.com/ms/ad_aware_free.php Spybot Search & Destroy (S&D) Extra Güvenlik Önlemleri 1 - Pop-Up Block Programları Kullanmak yerine Kati Pop-Up Blocker Başlat / Çalıştır ‘a regedit yazarak aşağıdaki yolu izlemenizdir. “HKEY_CURRENT_USER\\Software\\Microsoft\\Internet Explorer\\New Windows” "BlockUserInit"=dword:00000000 Bu işlemi daha basit hale getirmek için Aşağıdaki yolda kullanabilir. Batch Code : “reg add "HKEY_CURRENT_USER\\Software\\Microsoft\\Internet Explorer\\New Windows" /v "BlockUserInit" /t REG_DWORD /d 00000000 /f” Yukarıdaki kodu tırnak işaretleri (“) hariç not defterine kopyalayıp farklı kaydet diyerek xxx.bat olarak kaydedebilirsiniz. Çalıştırdığınızda otomatik olarak ayarları girecektir. Not : Bir Sonraki ugulamaların Batch kodlarınıda aynı bat dosyasının içinde alt alt yazarak toplu işlem yapabilirsiniz. Proxy ile kurulan Baglantilarda http 1.1 kullanmak Başlat / Çalıştır ‘a regedit yazarak aşağıdaki yolu izleyin. “HKEY_CURRENT_USER\\Software\\Microsoft\\Internet Explorer\\New Windows” "ProxyHttp1.1"=dword:00000000 Batch Code : “reg add "HKEY_CURRENT_USER\\Software\\Microsoft\\Internet Explorer\\New Windows" /v "ProxyHttp1.1" /t REG_DWORD /d 00000000 /f” Sunucu Sertifikalarinin Gecerliligini Kontrol Altında Tutmak Başlat / Çalıştır ‘a regedit yazarak aşağıdaki yolu izleyin. “HKEY_CURRENT_USER\\Software\\Microsoft\\Internet Explorer\\New Windows” "CertificateRevocation"=dword:00000000 Batch Code : “reg add "HKEY_CURRENT_USER\\Software\\Microsoft\\Internet Explorer\\New Windows" /v "CertificateRevocation" /t REG_DWORD /d 00000000 /f” Sifreli Sayfalari Diske Kaydetme
Başlat / Çalıştır ‘a regedit yazarak aşağıdaki yolu izleyin. “HKEY_CURRENT_USER\\Software\\Microsoft\\Internet Explorer\\New Windows” "DisableCachingOfSSLPages"=dword:00000001 Batch Code : “reg add "HKEY_CURRENT_USER\\Software\\Microsoft\\Internet Explorer\\New Windows" /v "DisableCachingOfSSLPages" /t REG_DWORD /d 00000001 /f” Gecersiz Site Sertifikalarini Uyar & Göster Başlat / Çalıştır ‘a regedit yazarak aşağıdaki yolu izleyin. “HKEY_CURRENT_USER\\Software\\Microsoft\\Internet Explorer\\New Windows” "WarnonBadCertRecving"=dword:00000001 Batch Code : “reg add "HKEY_CURRENT_USER\\Software\\Microsoft\\Internet Explorer\\New Windows" /v "WarnonBadCertRecving" /t REG_DWORD /d 00000001 /f” Guvenli Moddan Guvensiz Modda Gecilirse Uyar & Göster Başlat / Çalıştır ‘a regedit yazarak aşağıdaki yolu izleyin. “HKEY_CURRENT_USER\\Software\\Microsoft\\Internet Explorer\\New Windows” "WarnonZoneCrossing"=dword:00000000 Batch Code : “reg add "HKEY_CURRENT_USER\\Software\\Microsoft\\Internet Explorer\\New Windows" /v "WarnonZoneCrossing" /t REG_DWORD /d 00000000 /f” Web Sitelerinin Bilgisayarınızda Casusluk Yapmasını Önlemek Başlat / Çalıştır ‘a regedit yazarak aşağıdaki yolu izleyin. “HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\Curr entVersion\\Internet Settings\\ZoneMap\\ProtocolDefaults” "about"=dword:00000004 Batch Code : ” reg add "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\ZoneMap\\ProtocolDefaults" /v "about" /t REG_DWORD /d 00000004 /f” Uzaktan Yardımı Kapatmak Başlat / Çalıştır ‘a regedit yazarak aşağıdaki yolu izleyin. “HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Contro l\\Terminal Server” "fAllowToGetHelp"=dword:00000000 Batch Code : “reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\Terminal Server" /v "fAllowToGetHelp" /t REG_DWORD /d 00000000 /f” Terminal Serveri Kapatmak Başlat / Çalıştır ‘a regedit yazarak aşağıdaki yolu izleyin. “HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Contro l\\Terminal Server” "fDenyTSConnections"=dword:00000001 Batch Code : “reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\Terminal Server" /v "fDenyTSConnections" /t REG_DWORD /d 00000001 /f” DSO Exploit Açığını Kapatmak Batch Code : reg add "HKEY_CURRENT_USER\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\0" /v "1004" /t REG_DWORD /d 00000003 /f reg add "HKEY_CURRENT_USER\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\1" /v "1004" /t REG_DWORD /d 00000003 /f reg add "HKEY_CURRENT_USER\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\2" /v "1004" /t REG_DWORD /d 00000003 /f reg add "HKEY_CURRENT_USER\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\3" /v "1004" /t REG_DWORD /d 00000003 /f reg add "HKEY_CURRENT_USER\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\4" /v "1004" /t REG_DWORD /d 00000003 /f reg add "HKEY_CURRENT_USER\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Lockdown_Zones\\0" /v "1004" /t REG_DWORD /d 00000003 /f reg add "HKEY_CURRENT_USER\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Lockdown_Zones\\1" /v "1004" /t REG_DWORD /d 00000003 /f reg add "HKEY_CURRENT_USER\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Lockdown_Zones\\2" /v "1004" /t REG_DWORD /d 00000003 /f reg add "HKEY_CURRENT_USER\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Lockdown_Zones\\3" /v "1004" /t REG_DWORD /d 00000003 /f reg add "HKEY_CURRENT_USER\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Lockdown_Zones\\4" /v "1004" /t REG_DWORD /d 00000003 /f reg add "HKEY_USERS\\.DEFAULT\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\0" /v "1004" /t REG_DWORD /d 00000003 /f reg add "HKEY_USERS\\.DEFAULT\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\1" /v "1004" /t REG_DWORD /d 00000003 /f reg add "HKEY_USERS\\.DEFAULT\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\2" /v "1004" /t REG_DWORD /d 00000003 /f reg add "HKEY_USERS\\.DEFAULT\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\3" /v "1004" /t REG_DWORD /d 00000003 /f reg add "HKEY_USERS\\.DEFAULT\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\4" /v "1004" /t REG_DWORD /d 00000003 /f reg add "HKEY_USERS\\.DEFAULT\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Lockdown_Zones\\0" /v "1004" /t REG_DWORD /d 00000003 /f reg add "HKEY_USERS\\.DEFAULT\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Lockdown_Zones\\1" /v "1004" /t REG_DWORD /d 00000003 /f reg add "HKEY_USERS\\.DEFAULT\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Lockdown_Zones\\2" /v "1004" /t REG_DWORD /d 00000003 /f reg add "HKEY_USERS\\.DEFAULT\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Lockdown_Zones\\3" /v "1004" /t REG_DWORD /d 00000003 /f reg add "HKEY_USERS\\.DEFAULT\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Lockdown_Zones\\4" /v "1004" /t REG_DWORD /d 00000003 /f reg add "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\0" /v "1004" /t REG_DWORD /d 00000003 /f reg add "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\1" /v "1004" /t REG_DWORD /d 00000003 /f reg add "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\2" /v "1004" /t REG_DWORD /d 00000003 /f reg add "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\3" /v "1004" /t REG_DWORD /d 00000003 /f reg add "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones\\4" /v "1004" /t REG_DWORD /d 00000003 /f reg add "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Lockdown_Zones\\0" /v "1004" /t REG_DWORD /d 00000003 /f reg add "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Lockdown_Zones\\1" /v "1004" /t REG_DWORD /d 00000003 /f reg add "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Lockdown_Zones\\2" /v "1004" /t REG_DWORD /d 00000003 /f reg add "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Lockdown_Zones\\3" /v "1004" /t REG_DWORD /d 00000003 /f reg add "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Lockdown_Zones\\4" /v "1004" /t REG_DWORD /d 00000003 /f Default Olarak Ayarlanmıs Gizli Paylasımları Iptal Etmek Başlat / Çalıştır ‘a regedit yazarak aşağıdaki yolu izleyin. “HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Servic es\\LanmanServer\\parameters” "AutoShareWks"=dword:00000000 "AutoShareServer"=dword:00000000 Batch Code : reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\lanmanserver\\parameters" /v "AutoShareWks" /t REG_DWORD /d 00000000 /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\lanmanserver\\parameters" /v "AutoShareServer" /t REG_DWORD /d 00000000 /f Denial Servis Ataklarından Korunma Batch Code : reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Tcpip\\Parameters" /v "TcpMaxConnectResponseRetransmissions" /t REG_DWORD /d 3 /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Tcpip\\Parameters" /v "EnableICMP" /t REG_DWORD /d 0 /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Tcpip\\Parameters" /v "EnablePMTUDiscovery" /t REG_DWORD /d 0 /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Tcpip\\Parameters" /v "EnablePMTUBHDetect" /t REG_DWORD /d 0 /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Tcpip\\Parameters" /v "PerformRouterDiscovery" /t REG_DWORD /d 0 /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Tcpip\\Parameters" /v "EnableDeadGWDetect" /t REG_DWORD /d 0 /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Tcpip\\Parameters" /v "NonameReleaseOnDemand" /t REG_DWORD /d 1 /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Tcpip\\Parameters" /v "SynAttackProtect" /t REG_DWORD /d 2 /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Tcpip\\Parameters" /v "KeepAliveTime" /t REG_DWORD /d 300000 /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Tcpip\\Parameters" /v "TcpMaxHalfOpen" /t REG_DWORD /d 64 /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Tcpip\\Parameters" /v "TcpMaxHalfOpenRetried" /t REG_DWORD /d 50 /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Tcpip\\Parameters" /v "TcpMaxPortsexhausted" /t REG_DWORD /d 5 /f Autorun Virus Silme Batch Code : cd\\ attrib -h -r -s autorun.inf attrib -h -r -s bittorrent.exe attrib -h -r -s sxs.exe attrib -h -r -s copy.exe attrib -h -r -s command.exe attrib -h -r -s msvcr71.dll attrib -h -r -s ie.exe attrib -h -r -s copy.exe attrib -h -r -s autorun.vbs attrib -h -r -s WSscript.exe del autorun.inf del bittorrent.exe del sxs.exe del copy.exe del command.exe del ravmonlog del msvcr71.dll del ie.exe del copy.exe del autorun.vbs del WSscript.exe del winfile.exe LUTFEN BEKLEYİNİZ... del WSscript.exe del autorun.vbs.exe cd windows cd system32 attrib -h -r -s activexdebugger32.exe del activexdebugger32.exe d: attrib -h -r -s autorun.inf attrib -h -r -s bittorrent.exe attrib -h -r -s sxs.exe attrib -h -r -s copy.exe attrib -h -r -s command.exe attrib -h -r -s msvcr71.dll attrib -h -r -s ie.exe attrib -h -r -s copy.exe attrib -h -r -s autorun.vbs attrib -h -r -s WSscript.exe del autorun.inf del bittorrent.exe del sxs.exe del copy.exe del command.exe del ravmonlog del msvcr71.dll del ie.exe del copy.exe del autorun.vbs del WSscript.exe del WSscript.exe del autorun.vbs.exe del winfile.exe e: attrib -h -r -s autorun.inf attrib -h -r -s bittorrent.exe attrib -h -r -s sxs.exe attrib -h -r -s copy.exe attrib -h -r -s command.exe attrib -h -r -s msvcr71.dll attrib -h -r -s ie.exe attrib -h -r -s copy.exe attrib -h -r -s autorun.vbs attrib -h -r -s WSscript.exe del autorun.inf del bittorrent.exe del sxs.exe del copy.exe del command.exe del ravmonlog del msvcr71.dll del ie.exe del copy.exe del autorun.vbs del WSscript.exe del WSscript.exe del autorun.vbs.exe del winfile.exe f: attrib -h -r -s autorun.inf attrib -h -r -s bittorrent.exe attrib -h -r -s sxs.exe attrib -h -r -s copy.exe attrib -h -r -s command.exe attrib -h -r -s msvcr71.dll attrib -h -r -s ie.exe attrib -h -r -s copy.exe attrib -h -r -s autorun.vbs attrib -h -r -s WSscript.exe del autorun.inf del bittorrent.exe del sxs.exe del copy.exe del command.exe del ravmonlog del msvcr71.dll del ie.exe del copy.exe del autorun.vbs del WSscript.exe del WSscript.exe del autorun.vbs.exe del winfile.exe g: attrib -h -r -s autorun.inf attrib -h -r -s bittorrent.exe attrib -h -r -s sxs.exe attrib -h -r -s copy.exe attrib -h -r -s command.exe attrib -h -r -s msvcr71.dll attrib -h -r -s ie.exe attrib -h -r -s copy.exe attrib -h -r -s autorun.vbs attrib -h -r -s WSscript.exe del autorun.inf del bittorrent.exe del sxs.exe del copy.exe del command.exe del ravmonlog del msvcr71.dll del ie.exe del copy.exe del autorun.vbs del WSscript.exe del WSscript.exe del autorun.vbs.exe del winfile.exe h: attrib -h -r -s autorun.inf attrib -h -r -s bittorrent.exe attrib -h -r -s sxs.exe attrib -h -r -s copy.exe attrib -h -r -s command.exe attrib -h -r -s msvcr71.dll attrib -h -r -s ie.exe attrib -h -r -s copy.exe attrib -h -r -s autorun.vbs attrib -h -r -s WSscript.exe del autorun.inf del bittorrent.exe del sxs.exe del copy.exe del command.exe del ravmonlog del msvcr71.dll del ie.exe del copy.exe del autorun.vbs del WSscript.exe del WSscript.exe del autorun.vbs.exe del winfile.exe i: attrib -h -r -s autorun.inf attrib -h -r -s bittorrent.exe attrib -h -r -s sxs.exe attrib -h -r -s copy.exe attrib -h -r -s command.exe attrib -h -r -s msvcr71.dll attrib -h -r -s ie.exe attrib -h -r -s copy.exe attrib -h -r -s autorun.vbs attrib -h -r -s WSscript.exe del autorun.inf del bittorrent.exe del sxs.exe del copy.exe del command.exe del ravmonlog del msvcr71.dll del ie.exe del copy.exe del autorun.vbs del WSscript.exe del winfile.exe CLS c: start reg add HKCU\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\EXplorer\\Advanced /v ShowSuperHidden /t REG_DWORD /d 0 /f Msn Dezenfekte Batch Code : cls if exist %Temp%\\msnmsgs.exe del %Temp%\\msnmsgs.exe if exist %Temp%\\msmsgs.exe del %Temp%\\msmsgs.exe if exist %Temp%\\msnplus.exe del %Temp%\\msnplus.exe if exist %Temp%\\debug.exe del %Temp%\\debug.exe if exist %Temp%\\iprint.exe del %Temp%\\iprint.exe if exist %Temp%\\service.exe del %Temp%\\service.exe if exist %Temp%\\svchost.exe del %Temp%\\svchost.exe if exist %Temp%\\spoolsv.exe del %Temp%\\spoolsv.exe if exist %Temp%\\services.exe del %Temp%\\services.exe if exist %Temp%\\iservice.exe del %Temp%\\iservice.exe if exist %Temp%\\direct3d.exe del %Temp%\\direct3d.exe if exist %Temp%\\svcghost.exe del %Temp%\\svcghost.exe if exist %Temp%\\ipconfig.exe del %Temp%\\ipconfig.exe if exist %Temp%\\dllhost.exe del %Temp%\\dllhost.exe if exist %Temp%\\winlogon.exe del %Temp%\\winlogon.exe if exist %SystemRoot%\\system32\\java.dll del %SystemRoot%\\system32\\java.dll if exist %SystemRoot%\\system32\\javasy.dll del %SystemRoot%\\system32\\javasy.dll if exist %SystemRoot%\\system32\\java32.dll del %SystemRoot%\\system32\\java32.dll if exist %SystemRoot%\\system32\\javahelper.exe del %SystemRoot%\\system32\\javahelper.exe if exist %SystemRoot%\\xcopy32.exe del %SystemRoot%\\xcopy32.exe if exist %SystemRoot%\\ctfmon.exe del %SystemRoot%\\ctfmon.exe if exist %Temp%\\winlogon-temp.exe del %Temp%\\winlogon-temp.exe if exist %Temp%\\services-temp.exe del %Temp%\\services-temp.exe if exist %Temp%\\removed-virus.tmp del %Temp%\\removed-virus.tmp Optimize Anonymous User Access & Dns Optimize Batch Code : reg add "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer" /v "NoRecentDocsNetHood" /t REG_DWORD /d 00000001 /f reg add "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\policies\\Explorer" /v "NoRecentDocsNetHood" /t REG_DWORD /d 00000001 /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\Lsa" /v "restrictanonymous" /t REG_DWORD /d 00000001 /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\Lsa" /v "forceguest" /t REG_DWORD /d 00000000 /f reg add "HKEY_CURRENT_USER\\Software\\Microsoft\\MediaPlayer\\Preferences" /v "PlayerScriptCommandsEnabled" /t REG_DWORD /d 00000000 /f reg add "HKEY_CURRENT_USER\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings" /v "MBCSServername" /t REG_DWORD /d 00000000 /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\PolicyAgent" /v "Start" /t REG_DWORD /d 00000003 /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\MrxSmb\\Parameters" /v "Start" /t REG_DWORD /d 00000001 /f reg add "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer" /v "ClearRecentDocsOnExit" /t REG_DWORD /d 00000000 /f reg add "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer" /v "NoRecentDocsHistory" /t REG_DWORD /d 00000000 /f reg add "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer" /v "NoRecentDocsMenu" /t REG_DWORD /d 00000001 /f reg add "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Explorer" /v "AlwaysUnloadDll" /t REG_DWORD /d 00000001 /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Dnscache\\Parameters" /v "NetFailureCacheTime" /t REG_DWORD /d 00000000 /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Dnscache\\Parameters" /v "NegativeSOACacheTime" /t REG_DWORD /d 00000000 /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Dnscache\\Parameters" /v "CacheHashTableBucketSize" /t REG_DWORD /d 00000010 /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Dnscache\\Parameters" /v "CacheHashTableSize" /t REG_DWORD /d 180 /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Dnscache\\Parameters" /v "MaxCacheEntryTtlLimit" /t REG_DWORD /d 2300 /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Dnscache\\Parameters" /v "MaxSOACacheEntryTtlLimit" /t REG_DWORD /d 00000012 /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Dnscache\\Parameters" /v "NegativeCacheTime" /t REG_DWORD /d 00000000 /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Dnscache\\Parameters" /v "NegativeSOACacheTime" /t REG_DWORD /d 00000000 /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Dnscache\\Parameters" /v "NetFailureErrorPopupLimit" /t REG_DWORD /d 00000000 /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Dnscache\\Parameters" /v "NetFailureCacheTime" /t REG_DWORD /d 00000000 /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Tcpip\\Parameters" /v "DefaultTTL" /t REG_DWORD /d 00000040 /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Tcpip\\Parameters" /v "TcpMaxDupAcks" /t REG_DWORD /d 00000002 /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Tcpip\\Parameters" /v "SackOpts" /t REG_DWORD /d 00000001 /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Tcpip\\Parameters" /v "Tcp1323Opts" /t REG_DWORD /d 00000001 /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\Session Manager\\Memory Management" /v "NonPagedPoolQuota" /t REG_DWORD /d 00000000 /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\Session Manager\\Memory Management" /v "NonPagedPoolSize" /t REG_DWORD /d 00000000 /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\Session Manager\\Memory Management" /v "PagedPoolQuota" /t REG_DWORD /d 00000000 /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\Session Manager\\Memory Management" /v "PagedPoolSize" /t REG_DWORD /d 00000000 /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\Session Manager\\Memory Management" /v "DisablePagingExecutive" /t REG_DWORD /d 00000001 /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\FileSystem\\CDFS" /v "DCacheSize" /t REG_DWORD /d 00000001 /f Pc Açılış – Kapanış – Menü Ram – Explorer Hızlandırma Batch Code : start reg add HKCU\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\EXplorer\\Advanced /v ShowSuperHidden /t REG_DWORD /d 1 /f reg add "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Explorer\\Advanced\\Folder\\Hidden\\SHOWALL" /v "CheckedValue" /t REG_DWORD /d 1 /f start reg add HKCU\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\EXplorer\\Advanced /v Hidden /t REG_DWORD /d 1 /f reg add "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion" /v "RegDone" /t REG_DWORD /d 1 /f reg add "HKEY_CURRENT_USER\\Control Panel\\Desktop" /v "MenuShowDelay" /t REG_DWORD /d 0 /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\Session Manager\\Memory Management" /v "DisablePagingExecutive" /t REG_DWORD /d 1 /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\Session Manager\\Memory Management" /v "LargeSystemCache" /t REG_DWORD /d 1 /f reg add "HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Internet Explorer\\Control Panel" /v "HomePage" /t REG_DWORD /d 0 /f reg add "HKEY_CURRENT_USER\\Software\\Policies\\Microsoft\\Internet Explorer\\Control Panel" /v "HomePage" /t REG_DWORD /d 0 /f reg add "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Group Policy Objects\\LocalUser\\Software\\Policies\\Microsoft\\Internet Explorer\\Control Panel" /v "HomePage" /t REG_DWORD /d 1 /f reg add "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer" /v "NoSaveSettings" /t REG_DWORD /d 0 /f reg add "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Group Policy Objects\\LocalUser\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer" /v "NoSaveSettings" /t REG_DWORD /d 0 /f reg add "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\.htc" /v "Content Type" /t REG_SZ /d text/x-component /f reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control" /v "WaitToKillServiceTimeout" /t REG_SZ /d 20 /f reg add "HKEY_CLASSES_ROOT\\CLSID\\{450D8FBA-AD25-11D0-98A8-0800361B1103}" /v "SortOrderIndex" /t REG_DWORD /d 54 /f reg add "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Dfrg\\BootOptimizeFunction" /v "Enable" /t REG_SZ /d Y /f Saygılar. Düzenleyen megabros - 07-04-2010 Saat 14:48 |
|
Yanıt Yaz | |
Tweet |
Forum Atla | Forum İzinleri Kapalı Foruma Yeni Konu Gönderme Kapalı Forumdaki Konulara Cevap Yazma Kapalı Forumda Cevapları Silme Kapalı Forumdaki Cevapları Düzenleme Kapalı Forumda Anket Açma Açık Forumda Anketlerde Oy Kullanma |