These settings apply to normal, functioning Windows 10 and 11 Pro desktops and laptops with
- wired Ethernet
- Wi-Fi
- Bluetooth
- IPv4
- IPv6
- no touch screen
| # Download latest dotnet/codeformatter release from github | |
| $repo = "dotnet/codeformatter" | |
| $file = "CodeFormatter.zip" | |
| $releases = "https://api.github.com/repos/$repo/releases" | |
| Write-Host Determining latest release | |
| $tag = (Invoke-WebRequest $releases | ConvertFrom-Json)[0].tag_name |
| @echo on | |
| REM checked for Windows 10 | |
| REM fork from https://gist.github.com/theultramage/cbdfdbb733d4a5b7d2669a6255b4b94b | |
| REM you may want full list https://gist.github.com/raspi/203aef3694e34fefebf772c78c37ec2c | |
| REM SET attrib=+ATTRIB_HIDE | |
| SET attrib=-ATTRIB_HIDE | |
| REM Hard disk burst ignore time | |
| powercfg -attributes 0012ee47-9041-4b5d-9b77-535fba8b1442 80e3c60e-bb94-4ad8-bbe0-0d3195efc663 %attrib% |
| :: Windows 10 Hardening Script | |
| :: This is based mostly on my own personal research and testing. My objective is to secure/harden Windows 10 as much as possible while not impacting usability at all. (Think being able to run on this computer's of family members so secure them but not increase the chances of them having to call you to troubleshoot something related to it later on). References for virtually all settings can be found at the bottom. Just before the references section, you will always find several security settings commented out as they could lead to compatibility issues in common consumer setups but they're worth considering. | |
| :: Obligatory 'views are my own'. :) | |
| :: Thank you @jaredhaight for the Win Firewall config recommendations! | |
| :: Thank you @ricardojba for the DLL Safe Order Search reg key! | |
| :: Thank you @jessicaknotts for the help on testing Exploit Guard configs and checking privacy settings! | |
| :: Best script I've found for Debloating Windows 10: https://github.com/Sycnex/Windows10Debloater | |
| : |
| #!/bin/bash | |
| # author: Marcos Oliveira <terminalroot.com.br> | |
| # describe: Clone Only a Git Subdirectory | |
| # version: 1.0 | |
| # license: GNU GPLv3 | |
| if [[ "$(echo $LANG | cut -c 1-2)" != "pt" ]]; then | |
| declare -x l=( "usage" | |
| "Use this flag to inform the REPOSITORY, this option is not optional." |
| @echo off | |
| echo. | |
| openfiles > NUL 2>&1 | |
| if %errorlevel% NEQ 0 ( | |
| echo You are not running as Administrator... | |
| echo This batch cannot do it's job without elevation! | |
| echo. | |
| echo Right-click and select ^'Run as Administrator^' and try again... | |
| echo. |
If you're looking into automating transactions in your Steam Account using Steam Bots, you most likely will need to:
shared secret and identity secretHaving Steam Guard enabled for your Steam Account ensures that there will be no holds on transactions such as trades. Having the shared and identity secrets are necessary for complete autonomy of your Steam Bot, meaning it won't require any human interaction from you.
There is a tremendous lack of information about all of this as Steam does not provide official support for implementing Steam Bots. The information available in this guide was gathered through lots of blood and sweat hard research, reverse eng
edit traefik.yml
entryPoints:
web:
address: ":80"
websecure:
address: ":443"
dot: # <- ADD THIS
address: ":853" # <- ADD THISThis list of mods is built around the W3EE Redux overhaul mod. It targets the Next Gen version of the game, 4.0+, and using ray tracing to make the game look really good.
Mods marked with an X are not currently in use.
This mod list also works well on the Steam Deck with Ray Tracing turned off. The same files can be copied over as-is, including the RT mods at the top - they will not be activate when ray tracing is turned off on the Deck.
Great. I’ll develop a phased implementation plan, edge function code, deployment strategy, user guide, and full documentation for a key rotator using Deno Edge Functions. This will focus on rotating Gemini 2.5 Pro API keys to handle 429 rate limits efficiently.
I’ll return with a clear breakdown of components, including a secure architecture, key storage and cycling logic, usage limits, and guidance for setup and customization.
Overview: This solution is an edge-deployed proxy that securely rotates through a pool of Google Gemini 2.5 Pro API keys to avoid hitting per-key rate limits (e.g. free-tier limit of ~2 requests/minute (Gemini 2.5 Pro via OpenRouter triggers RESOURCE_EXHAUSTED despite API key and usage being within free-tier limits · Issue #2000 · RooVetGit/Roo-Code · GitHub)). By