Afrikaans: Afrikaans | Albanian: shqiptare | Amharic: አማርኛ | Arabic: عربي | Armenian: հայերեն | Assamese: অসমীয়া | Azerbaijani: Azərbaycan | Basque: euskara | Belarusian: беларускі | Bosnian: bosanski | Bulgarian: български | Burmese: မြန်မာ | Catalan: català | Cebuano: Cebuano | Chinese (Simplified): 简体中文 | Chinese (Traditional):中國傳統的 | Corsican: Corsu | Croatian: Hrvatski | Czech: čeština | Danish: dansk | Dutch: Nederlands | Esperanto: Esperanto | Estonian: eesti keel | Filipino: Filipino | Finnish: Suomalainen | French: Français | Galician: galego | Georgian: galego; | German: Deutsch | Greek: Ελληνικά | Gujarati: ગુજરાતી | Haitian Creole: Kreyòl ayisyen | Hausa: Hausa | Hawaiian: ʻŌlelo Hawaiʻ | Hebrew: עִברִית | Hindi: हिंदी | Hmong: Hmoob | Hungarian: Magyar | Icelandic: íslenskur | Igbo: Igbo | Indonesian: bahasa Indonesia | Irish: Gaeilge | Italian: Italian | Japanese: 日本 | Javanese: basa jawa | Kannada: ಕನ್ನಡ | Kazakh: қазақ | Khmer: ខ្មែរ | Kinyarwanda: Kinyarwanda | Korean: 한국인 | Kurdish: Kurdî | Kyrgyz: Кыргызча | Lao: ພາສາລາວ | Latin: Latinus | Latvian: latviski | Lithuanian: lietuvių | Luxembourgish: lëtzebuergesch | Macedonian: македонски | Malagasy: Malagasy | Malay: Melayu | Malayalam: മലയാളം | Maltese: Malti | Marathi: मराठी | Mongolian: Монгол | Nepali: नेपाली | Norwegian: norsk | Odia: ଓଡିଆ | Pashto: پښتو | Persian: فارسی | Polish: Polski | Portuguese: Português | Punjabi: ਪੰਜਾਬੀ | Romanian: Română | Russian: Русский | Samoan: Samoa | Scottish Gaelic: Gàidhlig na h-Alba | Serbian: Српски | Shona: Shona | Sindhi: سنڌي | Sinhala: සිංහල | Slovak: slovenský | Slovenian: Slovenščina | Somali: Soomaali | Spanish: Español | Sundanese: basa Sunda | Swahili: kiswahili | Swedish: svenska | Tajik: тоҷикӣ | Tamil: தமிழ் | Tatar: Татар | Telugu: తెలుగు | Thai: แบบไทย | Turkish: Türkçe | Turkmen: Türkmenler | Ukrainian: українська | Urdu: اردو | Uyghur: ئۇيغۇر | Uzbek: o'zbek | Vietnamese: Tiếng Việt | Welsh: Cymraeg | West Frisian: Westfrysk | Xhosa: isiXhosa | Yiddish: יידיש | Yoruba: Yoruba | Zulu: Zulu |

Windows 11 Secured Setup for new PC with Internet

Main ëHome: http://www.TheCloudOSCenter.com

WARNING:
The secured setup to protect new PC is recommended for Windows 10 as shown in other links to protect your works from hacking. Windows 11 has more hidden hacked processes and more hidden settings to due with. You can use the settings from Windows 10 but recommended for Windows 10 since Windows 11 has more hidden settings... Window 11 can also use HackedProcessKiller app to help you identify strange or hacking processes but need more careful! Make sure don't set this app to run as startup/bootup, run manually from command line (with admin mode) to play with new hacked processes first!
IMPORTANT:
Laptop has more hidden wireless devices and more hacked processes than desktop, and each brand may has different wireless devices...

Windows Accounts -- Showing all hidden Windows Accounts

  1. Enable hidden Accounts & System Files:


  2. Unhide the hidden Windows System files to view all other accounts:

  3. Goto 'C:\Users' folder and checkout all accounts that have been unhidden with the above settings.
    WARNING: You can delete the unknown accounts with your own risk.

  4. Big Hidden in Windows 11: Security Policy Settings and User and Groups Management and more...

Secure Windows 11 with HackedProcessKiller app (Same as Windows 10)

  1. First, make sure download HackedProcessKiller app from the main page.
  2. Second, create a folder 'C:\W10-SECURED-SW-FOLDER' and unzip HackedProcessKiller.zip.
  3. Third, download and unzip 3 files (HackedProcessGroup.list, HackedProcessNames.list, and W10TakeOwnerFolder.bat) to 'C:\W10-SECURED-SW-FOLDER\HackedProcessKiller' folder.
  4. Next, open Command Prompt in Administrator mode, and type command 'C:\W10-SECURED-SW-FOLDER\HackedProcessKiller\StartHackedProcessKiller.bat' to run the 'HackedProcessKiller.jar' file. If the app is not opened, then you need to install Java JRE . When the app is run, these 2 files (HackedProcessGroup.list & HackedProcessNames.list) should be enough to protect your Windows 10 PC in to kill hacked processes.
  5. The extra batch file is provided to help you create a secured folder 'C:\MY W10 SECURED DATA FOLDER' for your data files by command prompt 'C:\W10-SECURED-SW-FOLDER\HackedProcessKiller\W10TakeOwnerFolder.bat "C:\MY W10 SECURED DATA FOLDER"'. This command will secure folder 'C:\MY W10 SECURED DATA FOLDER' with only your account user name with full access.
  6. The 'HackedProcessKiller' app provides flexiable and customizable commands, and you can add into 'HackedProcessKiller.cmd' run once when app starts or 'HackedProcessKiller[m].cmd' (m: minutes periodically running) for more personal customizable protection. Also, don't forget to turn on 'Hacked Box Dumper' from 'File ⇒ [X]: Enable/Disable Hacked Box Dumper'; also enable for next login.

Secure Windows Folder Tricks (same as Windows 10)

  1. How to create and take ownership of a folder? The above steps you already have the batch file 'W10TakeOwnerFolder.bat'. Create and/or take ownership of 'C:\W10-SECURED-DATA-FOLDER' for instance, you can use command prompt 'C:\W10-SECURED-SW-FOLDER\HackedProcessKiller\W10TakeOwnerFolder.bat "C:\MY W10 SECURED DATA FOLDER"'. The batch script will create folder 'C:\MY W10 SECURED DATA FOLDER' if it does not exist.
  2. How to check for folder ownership? You can try the followings with snapshots.
    1. Select and right-click a folder, select 'Properties' then a window will popup.
    2. From Security tab, click 'Advanced' button.
    3. Click 'Change' link and enter your account name to change ownership if it's not your account. Click 'Check Names' to make sure your account is correct, then click 'OK' button to confirm.
    4. Next, make sure delete other accounts before add your account into the folder permission box by click on 'Remove' button or 'Disable Inheritance' button.
    5. Then, click 'Add' button to add your account name as a principle account, and click 'OK' to confirm. Note that the popup window will be the same as shown in step 3.
    6. Now make sure to check 'Full Control' permissions as shown below.
    7. Finally, you have full permission for your folder as shown. Important: Make sure the check 'Replace all child object permission...' before click 'OK' button.

Secure USB Drive Tricks (same as Windows 10)

  1. How to set ownership for your USB stick/drive? You can try the followings with snapshots.
    1. First, select and right-click on USB drive, and select 'Properties' then a popup window will be shown.
    2. From Security tab, click 'Advanced' button. A popup window will show as below.
    3. Click 'Change' link and enter your account name to change ownership if it's not your account. Click 'Check Names' to make sure your account is correct, then click 'OK' button to confirm.
    4. Next, make sure delete other accounts (keep only 'Authenticated users' account) before add your account into the folder permission box by click on 'Remove' button or 'Disable Inheritance' button.
    5. Then, click 'Modify' button to change permission of the 'Authenticated users' account to 'Read' readonly and 'Applies to: This folder only' as shown below.
    6. Now add your account as a principle account with 'Full Control' as shown below.
    7. Finally, you have full permission for your folder as shown. Important: Make sure the check 'Replace all child object permission...' before click 'OK' button.

Take Ownership of USB Drive Tricks (same as Windows 10)

  1. What happens if you put your USB drive to a different Windows PC? You cannot able to access to your folders/files. You need to set ownership for your USB stick/drive to gain access. You can try the followings with snapshots.
  2. How to take ownership of a USB drive? The above steps you already have the batch file 'W10TakeOwnerFolder.bat'. You can take ownership of USB drive 'E:' for instance, you can use command prompt 'C:\W10-SECURED-SW-FOLDER\HackedProcessKiller\W10TakeOwnerFolder.bat "E:"'. The batch script will set your ownership to the USB drive.
  3. How to take ownership of a USB drive manually? You can try the followings with snapshots.
    1. First, select and right-click on USB drive, and select 'Properties' then a popup window will be shown with a strange account 'S-1-5-21-...'.
    2. From Security tab, click 'Advanced' button. A popup window will show as below.
    3. Click 'Change' link and enter your account name to change ownership if it's not your account. Click 'Check Names' to make sure your account is correct, then click 'OK' button to confirm.
    4. Then, make sure permission of the 'Authenticated users' account to 'Read' readonly and 'Applies to: This folder only' as shown below.
    5. Now add your account as a principle account with 'Full Control' as shown below.
    6. Finally, add your account as a principle account with 'Full Control' for full permission for your folder as shown. Important: Make sure the check 'Replace all child object permission...' before click 'OK' button.
  4. Your USB drive is now on your own account. However, you need to remember to take ownership of your USB drive when you switch to different Windows PC.
  5. These steps can be use to get back your data from your crashed Windows PC!
Main ëHome: http://www.TheCloudOSCenter.com

[Last updated: 2024-01-05 -- Henry V. Pham]

Copyright© 2021[⨢] by www.TheCloudOSCenter.com. All Rights Resevered.