Ok Noel so i finally went ahead and got it done. It works great but some things ive noticed. The start menu now has a DLGMODAL frame and the taskbar doesnt change at all.
I had to use save as on hp support to get around the stupid autodetect feature, when I got my daughter's Ethernet drivers. They still haven't modified their website to reflect the existence of W10. Doesn't exactly smack of confidence in the os does it?
It won't work on 32 bit I don't think (but to be fair, I haven't tried 32 )
Wow guys - I really admire your perseverance in trying to make win 10 docile and a joy to look at. Myself, I've just given up - no "important" updates to my Win 8.1 systems allowed and Win 10, unless there is a radical change in direction from M$, is not going to see the light of day on my machines.
Im not going to use it either. I just wanted to see if it would work. Sadly what you saw with windows 8 is windows. It will never be anything better than what it is. This generation sucks. They cant get shit right. As newer gnerations should learn from the current one what does that say about the next generation. Who will learn/know even less than the current group of idiots. Windows will not survive. Not enough people will swallow its manhood to afford MSFT the $$ they need to continue dog fucking us in the ass. Eventually MSFT will cut their losses and realize the only way they have been making money since 2011 is in their crappy android/ios apps and they will just go that route.
Im sure Linux will rise from the ashes of the Great OS crash of 2020. Ny then the whole desktop paradigm will fit under the category of Whats old is new again. Just as 4 bit graphics and 6 pastel colors with OS's that feature 3 options from 1985 are new again now. Im simply doing this because its probably the last thing windows can actually do to challenge me. It no longer offers any substantive value or challenge. It doesnt engage me making me want to do more. Windows has simply been reduced to /run www.facebook.com and nothing more. All the idiots at MSFT are so happy stroking their dicks everytime they release a new build where the only change is either something removed or the build number was increased. The equally mentally challenged fan boys cant keep from helping with their lips firmly wrapped around the few stiff rods in Redmond.
Im not going to use it either. I just wanted to see if it would work. Sadly what you saw with windows 8 is windows. It will never be anything better than what it is. This generation sucks. They cant get shit right. As newer gnerations should learn from the current one what does that say about the next generation. Who will learn/know even less than the current group of idiots. Windows will not survive. Not enough people will swallow its manhood to afford MSFT the $$ they need to continue dog fucking us in the ass. Eventually MSFT will cut their losses and realize the only way they have been making money since 2011 is in their crappy android/ios apps and they will just go that route.
Im sure Linux will rise from the ashes of the Great OS crash of 2020. Ny then the whole desktop paradigm will fit under the category of Whats old is new again. Just as 4 bit graphics and 6 pastel colors with OS's that feature 3 options from 1985 are new again now. Im simply doing this because its probably the last thing windows can actually do to challenge me. It no longer offers any substantive value or challenge. It doesnt engage me making me want to do more. Windows has simply been reduced to /run www.facebook.com and nothing more. All the idiots at MSFT are so happy stroking their dicks everytime they release a new build where the only change is either something removed or the build number was increased. The equally mentally challenged fan boys cant keep from helping with their lips firmly wrapped around the few stiff rods in Redmond.
But i digress.
From my great age, you are this latest generation, albeit with a decent about of intellect, so it can't all suck and there is some hope for the future. M$ was only successful because it managed to catch the right wave all those years ago, since then it has just been floundering in the shallows. If you look at the new "features" in Win X, those that are worth their salt, have been present in Linux for years or, in terms of Office have been part of Google Apps. There is nothing new and exciting in Win X or the latest iteration of Office other than the hype. The only redeeming feature is that, every time I see Pics of the three stooges using Hololens on the M$ stage, it brings a smile to my face
Ya i realize im part of the current generation. While im sure im not the smartest person around me and others like me probably make up less than 10% of the generation. Unlike your generation. Nowadays it isnt really about being smart or capable its about being lazy. Your generation had what my Gma would call shit 'n' getters. People who no matter what would always get the job done. They would be extremely resourceful using i wide range of experience and education. More people of your gen. Could use critical thinking and troubleshooting. This generation is the "Someone else will do it for me" generation. I detest the fact that i technically belong to it and at times have even exaggerated my age to try to escape the flack from it. How many women do you know will lie about their age making themselves appear older? Thats how badly i hate this generation.
I'm not moving it into production either - I'm just testing it on a VM.
But to be absolutely sure whether I would use it, I spent all the effort necessary to tweak it and augment it into something that is - to the best of my ability - as usable as possible.
It didn't give me as much usefulness and pleasure as my existing (highly tweaked and augmented) Windows 8.1 system, which in turn pretty much replaced (but did not improve) my highly tweaked and augmented Windows 7 system back at the end of 2012.
In short, Windows features stagnated after 2009, and usability has been declining. In my case:
Under hard use Win 7 ran stably for me for as long as I cared to run in (weeks if not months) - as does Win 8.1, as does Win 10.
Win 7's Aero Glass theme, out of the box, was nice, and with some configuration it was pleasant to use.
Win 8.1's theme out of the box was a regression. However, I re-themed it with an Aero 7 theme and use Aero Glass for Win 8+, so it looks and works like 7 on the desktop, except I've improved the window chrome some so I think it looks even better.
Win 10's theme out of the box is a flat, lifeless thing with even less consistency and usability than 8's out of the box, and the Metro/Modern/Universal bullshit isn't even tacked on very well.
Unfortunately, I've not yet run across a full desktop theme replacement for Win 10 that's stable. So common controls are less recognizable than their Windows 7 (and my 8.1) counterparts.
Ami's right, the Taskbar in 10 needs re-theming. One can barely make out the buttons.
Overall, the best I've been able to make of Win 10 is about 90% as good as the best I've been able to make of Win 8.1, which in turn is about 102% as good as the best I've been able to make of 7.
Ok Noel so i finally went ahead and got it done. It works great but some things ive noticed. The start menu now has a DLGMODAL frame and the taskbar doesnt change at all.
Don't know about the Windows Start Menu - I simply never open it. I use Classic Shell exclusively on all my systems.
The Action/Notification Center does have what looks like an incomplete frame on it. This doesn't seem to interfere with usability.
-Noel
Author of the "How to Configure the 'To Work' Options" series of Windows books. Not feeling enough love to do one for Windows 10.
This isn't Win 10-specific, but I have adapted it to Win 10 and it does work. It's not completely separated from the issue of privacy, but I'll post separately on privacy.
Security, in my mind, is largely a matter of keeping your system from being infected by malware. That's what I'll concentrate on here.
In order of what I deem most important, I suggest developing strategies for:
1. Smart computing involving a common-sense user philosophy for safe computing. This is primarily a matter of the user learning to be conscientious and just not do irresponsible things. Mistakes matter. You have to develop an awareness that the software world is a dangerous place and have a willingness to do without some glitz. Get used to the idea that you have to THINK, and may not be able to run whatever you feel like on the moment without serious consideration, involving testing and taking precautions. The health of your system matters.
2. Building an environment that will avoid bringing malware into the system. Strategies nottypically used or known, designed to help protect against accidental deviation from the philosophy of item 1. This includes adopting a managed hosts file and DNS service for blocking access to parasite web servers that are apt to provide the worst of what's out there, choosing/configuring the browser not to be promiscuous, etc.
3. Active protection - i.e., an active antivirus package as a safety net ONLY. Yes, this is third because it is no more than a last hurdle, virtually never expected to be exercised. Items 1 and 2 above are where the real protection lies. Antivirus software MUST be low-impact, i.e., it should not cause things you do on the computer to be noticeably slower or harder to run, nor should it ever detect legitimate software and block you from doing your work.
4. Regular scanning with both the active protection in item 3 and also a different product to see if anything has managed somehow to creep through the layers above. Again, if all is as expected, this should never find anything. A different product is warranted because not every anti-malware maker has the same database of malware, it can be a good idea to partner with more than one. Scans are often more thorough than active antivirus checking as well.
5. Do regular backups to prepare for the eventuality of loss of data, and to protect you from your own mistakes - just in case.
In particular, my choices for the above are:
1. Always being vigilant and exercising common sense. Being willing to take the time to research and vet things before adopting their usage. Avoid sites known to serve badware. Do without rather than take a chance on the free, cracked version. I read through the code if choosing to use open source software, and I test things in throwaway VMware virtual machines before deciding to install them on my real systems.
2. Use of a hosts file (without changing the Windows DNS service) gathered regularly from several sources (e.g., winhelp2002.mvps.org, malwaredomains.com, others) to keep my browsers and networking software away from badware sites, configuring my router to use the filtered list from OpenDNS, running a stricter-than-stock firewall setup, and using a reconfigured Internet Explorer set to avoid running ActiveX. IE still has the best security model of all of them if you configure the features properly.
3. I use the built-in Windows Defender, as it is reasonably efficient and also never detects false positives. That items 1 and 2 are completely effective means that this layer can be somewhat minimized. If you're an insider, Windows Defender is the only anti-malware software I'd suggest for active protection on the Win 10 pre-releases. I've yet to have anything get this far because of the sheer effectiveness of steps 1 and 2 above.
4. The system runs the default scans Windows Defender sets up automatically, plus I do a daily scan by the well-regarded MalwareBytes Antimalware package.
5. I schedule nightly wbadmin commands to take regular system image snapshots and put them on external USB drives. I can restore such a backup to baremetal, or I can access the files within using a volume shadow copy access tool such as Z-VSSCopy. Previous Versions works off such backups as well. I also do file backups to multiple alternate partitions and external drives to help protect me from my own mistakes.
This all really works! I have been following the above philosophy for decades, with some differences in the specifics, and I have successfully adapted it to my Win 10 test setup. I have yet to get even a single infection. Going all the way back I have only ever had to install Windows once on each of my systems, have had virtually zero infections blocked by the safety net, and have never had a scan turn up anything (except for false positives, which was a problem when I used Avast antivirus, which I have long since ditched).
I have debated this greatly with so-called security experts, and none has been able to convince me that there's anything missing or out of order in the above. There are actually fairly few folks in the world who understand practical security.
You may make different choices than I have made regarding the specifics. I only relate that which works.
-Noel
Author of the "How to Configure the 'To Work' Options" series of Windows books. Not feeling enough love to do one for Windows 10.
You were banned again? Yeah at this point im no longer even reading that forum like i used to. I read the new aero thread today. it was the first time in over a week i even opened the web page. The only insider is MSFT's head and im sure you can guess what its "Inside"
You were banned again? Yeah at this point im no longer even reading that forum like i used to. I read the new aero thread today. it was the first time in over a week i even opened the web page. The only insider is MSFT's head and im sure you can guess what its "Inside"
Good to here from you ,Ami. Yeah, headupbutt syndrome is rampant on insider forum. The Sheep n the Goats.
The Sheep wandering off the cliff one by one and the Goats belligerently standing around watching it happen.
After having disabled the Windows Update service on Windows 10 I've got it almost completely completely quieted down.
Windows Update clearly does a large number of things autonomously. But it's not the only one.
Note that Windows 10 isn't alone in being chatty online. Microsoft has been drop-loading their bullshit in older systems lately as well. On an updated Win 8.1 setup I've seen these things lately. The encrypted communications, marked in red, may represent clandestine attempts to send telemetry or personal data to Microsoft.
Unwanted Win 8.1 communications my firewall has blocked in the last few days:
TCP 104.41.32.78:443 - Microsoft Azure, Sao Paulo, Brazil - by Microsoft Windows Malicious Software Removal Tool
TCP 108.162.232.196:80 - CloudFlare, San Francisco, CA - by svchost.exe using my login ID TCP 108.162.232.197:80 - CloudFlare, San Francisco, CA - by svchost.exe using my login ID TCP 108.162.232.198:80 - CloudFlare, San Francisco, CA - by svchost.exe using my login ID TCP 108.162.232.199:80 - CloudFlare, San Francisco, CA - by svchost.exe using my login ID TCP 108.162.232.200:80 - CloudFlare, San Francisco, CA - by svchost.exe using my login ID TCP 108.162.232.201:80 - CloudFlare, San Francisco, CA - by svchost.exe using my login ID TCP 108.162.232.202:80 - CloudFlare, San Francisco, CA - by svchost.exe using my login ID
TCP 108.162.232.205:80 - CloudFlare, San Francisco, CA - by svchost.exe using my login ID
TCP 172.224.184.228:80 - Akamai Technologies (CDN), Cambridge MA - by dllhost.exe using SYSTEM login ID
TCP 191.237.208.126:443 - Microsoft Azure, Wichita, KA - by Microsoft Windows Malicious Software Removal Tool TCP 191.238.241.80:443 - Microsoft Azure, Wichita, KA - by Microsoft Windows Malicious Software Removal Tool
TCP 192.204.82.178:80 - NTT, Orlando, FL - by Windows Media Player
TCP 192.204.82.210:80 - NTT, Orlando, FL - by Windows Media Player
TCP 23.1.117.231:80 - Akamai Technologies (CDN), Cambridge MA - by svchost.exe using my login ID
TCP 23.13.70.176:80 - Akamai Technologies (CDN), Cambridge MA - by dllhost.exe using SYSTEM login ID
TCP 23.14.181.100:80 - Akamai Technologies (CDN), Cambridge MA - by svchost.exe using SYSTEM login ID
TCP 23.218.211.122:80 - Akamai Technologies (CDN), Cambridge MA - by svchost.exe using my login ID
TCP 23.39.131.234:80 - Akamai Technologies (CDN), Cambridge MA - by svchost.exe using my login ID
TCP 23.62.165.99:80 - Akamai Technologies (CDN), Cambridge MA - by svchost.exe using SYSTEM login ID
TCP 23.96.212.225:443 - Microsoft Azure, Redmond WA - by Microsoft Windows Malicious Software Removal Tool
Specifically blocked on Win 8.1 late last night while the system was idle:
TCP 104.73.11.204:80 - Akamai Technologies (CDN), Cambridge MA - by svchost.exe using my login ID
TCP 23.62.165.99:80 - Akamai Technologies (CDN), Cambridge MA - by svchost.exe using SYSTEM login ID
TCP 23.218.211.122:80 - Akamai Technologies (CDN), Cambridge MA
Win 8.1 Communications that have succeeded, since I've specifically whitelisted the address or protocol
ICMP 23.99.222.162 - Microsoft, Redmond WA
TCP 178.255.83.2:80 - Comodo (Certificate Revocation List server), London, England - by svchost.exe
TCP 93.184.215.200:80 - Edgecast Networks (Certificate Revocation List server), Wichita KA - by svchost.exe
Whitelisted to allow a Windows Update, but they also occurred autonomously
These concern me, as they may represent an attempt by the system to do some kind of "secret" Windows Update. It is apparently not fully possible to lock a system down with just a firewall alone and still allow Windows Updates. This is why in general I'll be disabling the Windows Update service when I'm not looking to actually do a Windows Update. It's possible an alternate firewall setup will need to be developed and invoked when a Windows Update is requested.
TCP 23.14.84.57:80 - Akamai Technologies (CDN), Cambridge MA - by svchost.exe TCP 23.14.84.113:80 - Akamai Technologies (CDN), Cambridge MA - by svchost.exe TCP 96.16.98.112:80 - Akamai Technologies (CDN), Cambridge MA - by svchost.exe
Whitelisted to allow a Windows Update, but they also occurred autonomously
These concern me, as they may represent an attempt by the system to do some kind of "secret" Windows Update. It is apparently not fully possible to lock a system down with just a firewall alone and still allow Windows Updates. This is why in general I'll be disabling the Windows Update service when I'm not looking to actually do a Windows Update. It's possible an alternate firewall setup will need to be developed and invoked when a Windows Update is requested.
TCP 23.14.84.57:80 - Akamai Technologies (CDN), Cambridge MA - by svchost.exe TCP 23.14.84.113:80 - Akamai Technologies (CDN), Cambridge MA - by svchost.exe TCP 96.16.98.112:80 - Akamai Technologies (CDN), Cambridge MA - by svchost.exe
Post by Bayer A.User on Nov 1, 2015 16:42:16 GMT -6
Make the best of this POS... Currently using windows firewall to block all outgoing except for MY rules. The only drawback is on occasion to see if any meaningful /important updates are available. Wuaserv running, need to create outbound exception rule svchost.exe Create the rule.Enable it .Verify that WU functions. Make note of the time(to check log) Then Disable rule. So far the only downside would be if cumulative update re installs something and creates an exception for it. The upside is I can let the machine idle day/night continuously without any sneak attack 3a.m. changes.
Last Edit: Nov 1, 2015 16:43:33 GMT -6 by Bayer A.User
My Win 8.1 system last night, running nothing but a backup, attempted these accesses to the Akamai CDN all by itself.
# 11/1/2015 # # System seen trying to contact Akamai early in the morning and on into the day... # # The process is svchost.exe listed as logging in with NT AUTHORITY\NETWORK SERVICE # Services include: # # CryptSvc # Dnscache # LanmanWorkstation # NlaSvc # TermService # # Note that the Windows Update service is disabled.
23.14.84.24:80 # Akamai, Cambridge: OS - Host Process for Windows Services (NoelC) 23.14.84.48:80 # Akamai, Cambridge: OS - Host Process for Windows Services (NoelC) 23.14.84.57:80 # Akamai, Cambridge: OS - Host Process for Windows Services (NoelC) 23.14.84.113:80 # Akamai, Cambridge: OS - Host Process for Windows Services (NoelC) 23.14.84.138:80 # Akamai, Cambridge: OS - Host Process for Windows Services (NoelC)
96.16.98.32:80 # Akamai, Cambridge: OS - Host Process for Windows Services (NoelC) 96.16.98.112:80 # Akamai, Cambridge: OS - Host Process for Windows Services (NoelC)
118.214.160.16:80 # Akamai, Singapore: OS - Host Process for Windows Services (NoelC) 118.214.160.24:80 # Akamai, Singapore: OS - Host Process for Windows Services (NoelC) 118.214.160.160:80 # Akamai, Singapore: OS - Host Process for Windows Services (NoelC) 118.214.160.169:80 # Akamai, Singapore: OS - Host Process for Windows Services (NoelC)
Do these represent more secret update attempts? There's certainly nothing more I'm aware of - NO settings remaining to be configured - to turn that shit off. What pisses me off even more is that it's trying to contact China.
The time is definitely now to institute a "deny-by-default" firewall setup if you haven't done so already.
I need networking to other Windows systems - I have other computers on my LAN and I do use Remote Desktop. I allow full access between systems inside my router, as I manage them all similarly.
One of those services, and I don't know yet which one, is systematically slow-polling all those Akamai servers to try to update... Something. More as I learn it. Not a big deal now, with the deny-by-default firewall configuration.
I think it's funny that my test Win 10 system is now quieter than 8.1 here with regard to attempting external connections. O&O ShutUp10 or one of the other tweaks, or maybe just Microsoft between 8.1 and 10, apparently stopped the logic that does this polling.
By the way, it's not a Windows Defender update. Those addresses are:
# A manually initiated Windows Defender update that did download updates contacted these addresses:
23.14.84.57:80 # ctldl.windowsupdate.com, Akamai, Cambridge: OS - Windows Defender UI 23.196.71.92:80 # Akamai, Cambridge: OS - Windows Defender User Interface 23.218.210.155:80 # Akamai, Cambridge: OS - Windows Defender User Interface
The Nalpeiron Licensing Service is needed for OnOne Software products such as their Perfect Resize Photoshop plug-in, that service is not running.
There appear to be several sets of ongoing access attempts... The first is something (or several somethings) in the group of 5 services I listed above that's starting a process with my login credentials, then trying to access a small group of addresses. Attempts seen last night:
# OS - Host Process for Windows Services, logged in with my ID 23.14.84.24:80 # Akamai, Cambridge: 9 times 23.14.84.57:80 # Akamai, Cambridge: 9 times118.214.160.160:80 # Akamai, Singapore: 18 times 118.214.160.169:80 # Akamai, Singapore: 18 times 178.255.83.2:80 # Akamai, London: 18 times93.184.215.200:80 # Edgecast CDN, Wichita: 24 times
There's not much to go on, other than the regular, slow polling of these. I've found some evidence that the 93.184 address may be a request for a "certificate revocation list", which may make sense for the CryptSvc to be doing. Though for now they're all blocked, it may make sense to whitelist at least some of these.
--
The second set is more easily identifiable - it is the Microsoft Malicious Software Removal Tool, though why it's doing regular activities is still a bit of a mystery. I updated definitions yesterday evening, and these addresses were contacted last night. This represents a reduction in the number of different addresses contacted vs. before.
# OS - Microsoft Windows Malicious Software Removal Tool
23.96.212.225:443 # spynet2.microsoft.com, Redmond 104.41.32.78:443 # spynetalt.microsoft.com, Sao Paulo
I'm still looking into stopping that without losing the potential protection of Windows Defender scans. Notably there's a registry key that may govern the list of addresses:
There is a correlation between the addresses and the URLS named.
Notably, there is a key [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\RemovalTools\MRT] containing and interestingly named value, LastHeartbeatReportTime.
Somewhere there is probably documentation about how to set a value nearby to stop the heartbeat.
Update:
There's also a key [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender\Spynet] which contains a SypNetReportingLocation value containing the same list, above.
I suspect, since Windows Defender is on and doing its thing, this is what's governing the ongoing contact attempts. Notably, the SpyNetReporting value in the same key is already 0.
Post by Bayer A.User on Nov 2, 2015 8:01:12 GMT -6
10Enterprise 10240 let it idle with internet access(svchost outbound allowed) last night. running AVG, so defender is/has been disabled. Every 2hours on the dot send to 23.10.82.85 & 86 Akamai,Mass. one occasion send to 93.184.215.200Amsterdam,Netherlands-images2.store.microsoft.com one occasion send to 23.62.6.49 Akamai,Mass. via tcp port80 "Panda AV Cloud" ? also download.windowsupdate.com ManualWU check for updates this a.m.- send to 191.234.72.188- Microsoft Hosting, kansas.
I know that if i run an older version of MSRtool that the next WU cycle will include the latest MSRtool automatically.
93.184.215.200 is in Wichita Kansas I believe, and is a Certificate Revocation List server. That's probably okay to allow, though I honestly don't know how often certificates are actually revoked.
So far this morning I have identified 5 CRL servers, hosted through CDNs:
23.14.84.24:80 # crl.microsoft.com, Microsoft/Akamai CDN, Cambridge 23.14.84.57:80 # Microsoft/Akamai CDN, Cambridge 93.184.215.200:80 # mscrl.microsoft.com, Microsoft Azure/Edgecast CDN, Wichita 108.162.232.197:80 # crl.globalsign.com, Amazon Cloudflare/San Francisco 178.255.83.2:80 # crl.comodoca.com, London
Keep in mind outbound connections might be setting up to make requests, e.g., like making a connection to ask a server for a web page.
<Rick> Good video. It's almost hard to believe that at one time Windows 98 was the resource hog, but even then, it still ran circles around what Windows 10 can do on today's modern hardware and look a heck of alot better doing it.
May 25, 2021 22:55:12 GMT -6
<Rick> As stated elsewhere, So much for the launch of Windows 11, "The Great Crash." Myself, I had a hard time getting into the site listed above, when I did get in, the video was partly done and then it crashed. There has been many other reports of crashing.
Jun 24, 2021 9:52:33 GMT -6
*
<Rick> I see Microsoft has been very quick to pull down reports of site crashing regarding the Launch of Windows 11 on the Microsoft Insiders forum.
Jun 24, 2021 9:57:31 GMT -6
*
<Rick> The rebroadcast is working okay.
Jun 24, 2021 11:00:25 GMT -6
<Rick> With reports of people being able to install the dev-edition of Windows 11 on machines not meeting spec, I thought I would give it a what-the-heck try. Lucky me, I'm caught in the downloading, doesn't meet spec, clearing, re-downloading loop on my machine!
Jul 2, 2021 7:08:46 GMT -6
<Rick> I've recently purchased a license for ArcaOS from www.arcanoae.com/ to play with. First impressions, it's still OS/2, but it now has a Linux twist to it.
Jul 2, 2021 7:32:53 GMT -6
*
<dozrguy> laptop shit out and am stuck buying a new one. os win11 as fucked as win10 was?
Oct 2, 2021 12:56:10 GMT -6
<Rick> Let's see ..., my impression of Windows 11 is that it is a spruced up version of Windows 10 requiring a 64-bit processor plus a piece of security hardware that is less than 4 years old in order for it to run.
Oct 4, 2021 18:25:49 GMT -6
*
<Rick> On the plus side, Microsoft is supposed to be supporting Windows 10 for some time to come for those of us still using systems with I7 or older processors.
Oct 4, 2021 18:44:35 GMT -6
*
<dozrguy> i tried installing win10 om the 'shitout' pc this morning usung media creation. EPIC FAIL! went into an endless bootloop. win7 reinstalled just fine
Oct 21, 2021 11:23:38 GMT -6
<dozrguy> STILL so much bullshit and so little time for the kiddie ideas from the hill. My new laptop (MSI GE 11-UH461) would be an awesome "10" machine but because of Winblows I can only give it a "2"......wasted $3500
Oct 27, 2021 9:36:47 GMT -6
<Rick> Hello. Just checking in.
Mar 17, 2022 10:46:54 GMT -6
<isidroco> Each new w10 update adds >100000 useless files to \Windows\Servicing\LCU\Package_for_RollupFix... folders. Even in a SSD takes time to delete that stuff. In each version they manage to worsen stuff.
Mar 27, 2022 16:14:51 GMT -6
*
<dozerguy> still traffic here?
Oct 9, 2022 17:32:44 GMT -6
<Rick> No, there does not seem to be very much traffic these days. I still check in from time to time.
Oct 9, 2022 20:08:58 GMT -6