@einfach_orangensaft@sh.itjust.works to linuxmemes@lemmy.world • 2 months agoMany such cases.sh.itjust.worksimagemessage-square215fedilinkarrow-up1935arrow-down163
arrow-up1872arrow-down1imageMany such cases.sh.itjust.works@einfach_orangensaft@sh.itjust.works to linuxmemes@lemmy.world • 2 months agomessage-square215fedilink
minus-square@jim3692@discuss.onlinelinkfedilink15•2 months agoThere is no such thing as idiot-proof steps to tamper the registry. Most of those registry keys are not documented, and it’s very hard to be completely sure about what you are touching. If you need a debloated experience, install LTSC.
minus-squareDefault UsernamelinkfedilinkEnglish2•2 months agoI mean, .reg files are pretty idiot-proof, but can also contain something malicious if you don’t read them.
There is no such thing as idiot-proof steps to tamper the registry. Most of those registry keys are not documented, and it’s very hard to be completely sure about what you are touching.
If you need a debloated experience, install LTSC.
I mean, .reg files are pretty idiot-proof, but can also contain something malicious if you don’t read them.