einfach_orangensaft@sh.itjust.works to linuxmemes@lemmy.world · 20 hours agoMany such cases.sh.itjust.worksimagemessage-square171fedilinkarrow-up1736arrow-down152
arrow-up1684arrow-down1imageMany such cases.sh.itjust.workseinfach_orangensaft@sh.itjust.works to linuxmemes@lemmy.world · 20 hours agomessage-square171fedilink
minus-squarejim3692@discuss.onlinelinkfedilinkarrow-up14arrow-down1·14 hours agoThere is no such thing as idiot-proof steps to tamper the registry. Most of those registry keys are not documented, and it’s very hard to be completely sure about what you are touching. If you need a debloated experience, install LTSC.
minus-squareDefault Username@lemmy.dbzer0.comlinkfedilinkEnglisharrow-up2·10 hours agoI mean, .reg files are pretty idiot-proof, but can also contain something malicious if you don’t read them.
There is no such thing as idiot-proof steps to tamper the registry. Most of those registry keys are not documented, and it’s very hard to be completely sure about what you are touching.
If you need a debloated experience, install LTSC.
I mean, .reg files are pretty idiot-proof, but can also contain something malicious if you don’t read them.