@[email protected] to [email protected] • 5 days agoMany such cases.sh.itjust.worksimagemessage-square198fedilinkarrow-up1856
arrow-up1856imageMany such cases.sh.itjust.works@[email protected] to [email protected] • 5 days agomessage-square198fedilink
minus-square@[email protected]linkfedilink14•5 days agoThere is no such thing as idiot-proof steps to tamper the registry. Most of those registry keys are not documented, and it’s very hard to be completely sure about what you are touching. If you need a debloated experience, install LTSC.
minus-squareDefault UsernamelinkfedilinkEnglish2•5 days agoI mean, .reg files are pretty idiot-proof, but can also contain something malicious if you don’t read them.
There is no such thing as idiot-proof steps to tamper the registry. Most of those registry keys are not documented, and it’s very hard to be completely sure about what you are touching.
If you need a debloated experience, install LTSC.
I mean, .reg files are pretty idiot-proof, but can also contain something malicious if you don’t read them.