einfach_orangensaft@sh.itjust.works to linuxmemes@lemmy.world · 2 days agoMany such cases.sh.itjust.worksimagemessage-square214fedilinkarrow-up1901arrow-down164
arrow-up1837arrow-down1imageMany such cases.sh.itjust.workseinfach_orangensaft@sh.itjust.works to linuxmemes@lemmy.world · 2 days agomessage-square214fedilink
minus-squarejim3692@discuss.onlinelinkfedilinkarrow-up15arrow-down1·2 days agoThere is no such thing as idiot-proof steps to tamper the registry. Most of those registry keys are not documented, and it’s very hard to be completely sure about what you are touching. If you need a debloated experience, install LTSC.
minus-squareDefault Username@lemmy.dbzer0.comlinkfedilinkEnglisharrow-up2·2 days agoI mean, .reg files are pretty idiot-proof, but can also contain something malicious if you don’t read them.
There is no such thing as idiot-proof steps to tamper the registry. Most of those registry keys are not documented, and it’s very hard to be completely sure about what you are touching.
If you need a debloated experience, install LTSC.
I mean, .reg files are pretty idiot-proof, but can also contain something malicious if you don’t read them.