Enabling Hidden items reveals those otherwise invisible files and folders. But attackers might also use these folders as a convenient place to hide their malware. By default, Windows hides certain folders that Microsoft believes users should not touch. Hidden items: Just below File name extensions, put a checkmark next to the Hidden items option. That’s an immediate tip-off that it’s a potentially dangerous executable. exe on the end (i.e., “trickyfilename.doc. With extensions shown, that same file has now sprouted an extra. For example, with extensions hidden, you could see something called “trickyfilename.doc” (and might have forgotten that. They might use that setting as a way to disguise their code. For as long as I can remember, Microsoft has always hidden file extensions by default - which malicious hackers know all too well. There’s a security aspect to this change. Enable File name extensions and Hidden items in File Explorer’s View tab. Select the View tab near the top of the File Explorer window then, in the Show/hide section, put checkmarks next to both File name extensions and Hidden items (see Figure 1).įigure 1. In File Explorer’s left-hand file tree, click the This PC folder. Reveal file extensions: This step makes a file’s type obvious, and the change is exceptionally easy. They help make the system more transparent, so users know which files are what. Here are two changes I make to every computer under my control. If that’s the case, I’ll simply jump to the next step: tweaking the system. But the business systems I purchase tend to come with less junkware than do consumer versions. If the system came stuffed with unwanted bloatware and advertising apps, and if I can download the necessary drivers, I’ll do a clean install of Windows 10. It all comes down to the amount of junkware installed and driver availability. That’s not to say I won’t do a fresh, from-scratch reinstall of Windows. In other words, I don’t follow the corporate practice of reformatting the hard drive and installing a set configuration designed for enterprise management. As a small-business owner, I tend to purchase OEM systems in ones and twos - and make only the modifications I deem necessary. That review doesn’t include the keyboard or the monitor: rather, I take a close look at which third-party apps the vendor has installed. (Note: I initially set up the system with a non-Microsoft - i.e., local - account by not allowing it to connect to the Internet.) After unboxing, setting up, and completing the Windows 10 setup, I start the configuration process by reviewing what came with the machine.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |