einfach_orangensaft@sh.itjust.works to linuxmemes@lemmy.world · 4 days agoMany such cases.sh.itjust.worksimagemessage-square216fedilinkarrow-up1912arrow-down165
arrow-up1847arrow-down1imageMany such cases.sh.itjust.workseinfach_orangensaft@sh.itjust.works to linuxmemes@lemmy.world · 4 days agomessage-square216fedilink
minus-squarejim3692@discuss.onlinelinkfedilinkarrow-up15arrow-down1·4 days agoThere is no such thing as idiot-proof steps to tamper the registry. Most of those registry keys are not documented, and it’s very hard to be completely sure about what you are touching. If you need a debloated experience, install LTSC.
minus-squareDefault Username@lemmy.dbzer0.comlinkfedilinkEnglisharrow-up2·3 days agoI mean, .reg files are pretty idiot-proof, but can also contain something malicious if you don’t read them.
There is no such thing as idiot-proof steps to tamper the registry. Most of those registry keys are not documented, and it’s very hard to be completely sure about what you are touching.
If you need a debloated experience, install LTSC.
I mean, .reg files are pretty idiot-proof, but can also contain something malicious if you don’t read them.