? If you have any questions, requests, suggestions etc. You can find all the information about them on GitHub. When you run this script, you will have an option to enable them if you want to. ? Note: There are 4 items tagged with #TopSecurity that can cause difficulties. ? Note: If there are multiple Windows user accounts in your computer, it's recommended to run this script in each of them, without administrator privileges, because Non-admin commands only apply to the current user and are not machine wide. ✅ Non-Admin Commands that only affect the current user and do not make machine-wide changes. ⏹ Commands that don't require Administrator Privileges ⏹ Commands that require Administrator Privileges ? Hardening Categories from top to bottom: (?Detailed info about each of them at my Github?) continue reading on GitHub for comprehensive info. this script only uses the tools and features that have already been implemented by Microsoft in Windows OS to fine-tune it towards the highest security and locked-down state, using well-documented, supported, recommended and official methods. just like anything, you have to use it wisely and don't compromise yourself with reckless behavior and bad user configuration Nothing is foolproof. On macOS, click Find duplicates -> Find, select the locations, and click Scan. ? Note: Windows by default is secure and safe, this script does not imply nor claim otherwise. On Windows, click Tools -> Duplicate Finder -> Search. ✅ Applying this script makes your PC compliant with Microsoft Security Baselines and Secured-core PC specifications (provided that you use modern hardware that supports the latest Windows security features) ✅ The script prompts for confirmation before running each hardening category and some sub-categories, so you can selectively run (or don't run) each of them. ✅ The script can be run infinite number of times, it's made in a way that it won't make any duplicate changes. ✅ When a hardening measure is no longer necessary because it's applied by default by Microsoft on new builds of Windows, it will also be removed from this script in order to prevent any problems and because it won't be necessary anymore. This is why the script doesn't break anything or cause unwanted behavior. It also uses PowerShell cmdlets where Group Policies aren't available, and finally uses a few registry keys to configure security measures that can neither be configured using Group Policies nor PowerShell cmdlets. ✅ The script primarily uses Group policies, the Microsoft recommended way of configuring Windows. ✅ Doesn't remove or disable Windows functionalities against Microsoft's recommendations. ✅ Everything is in plain text, nothing hidden, no 3rd party executable or pre-compiled binary is involved. ✅ Always stays up-to-date with the newest security measures. The retranscoding process is what adds the v and number to the end of the file or folder.⭕ You need to read the GitHub's readme page before running this script: The software has changed so now everything new is contained within folders but older content is just in the root as mp4 files until retranscoded. In this post, we will use the hash value to identify duplicate files. This hash can be used to uniquely identify a file. (All of the files and folders are generated by a system creating Video On Demand Files. PowerShell offers the Get-FileHash cmdlet to compute the hash (or checksum) of one or more files. Just a little more background on the purpose if you are curious… I found more old unnecessary duplicate files. Removing the filtering does combine both files and folders and is additionally helpful. $names | Group-Object -Property FirstPart | Where-Object | Folders: $InputFolderNameList = Get-ChildItem "E:\VODContent" -Recurse -Directoryįoreach ($InputFolderName in $InputFolderNameList) = $InputFolderNameįirstPart = ($InputFolderName -split '-')
0 Comments
Leave a Reply. |