Windows 10 - Conclusion

 Back  Windows 10  Next

 Babylon Traffic

 Conclusion Picture at left shows a group of shapes in sequence, and can be added and new shapes, if the picture is increased. Illustrates service model development and distribution of Windows 10. The first shape is a check mark, which means that one of the initial versions of the operating system is used. It is an association of different versions of the 'same' Windows 10 operating systems that are being upgraded. On the computer described below, the version 'Windows 10 PRO build 1511-x86' is processed with 'NTLite' software and blocked upgrade (note: 'NTLite' can not embed patches in '1511_2-x86' version). I have to admit I tried to install the latest version of 'over' mentioned, and to my surprise the new version did not 'crash' until now it was made and accepted the upgrade of only what was left after processing with 'NTLite'. The knowledge that regardless of compatibility with older software support no meaningful improvement, the reason is the residue on 'x86' system. All Microsoft activity focuses on the new setup interface - 'Settings', and 'Control Panel' practically disappears, founded my decision to block upgrades. The more that some system settings are no longer enabled, or are only possible by setting it directly in the 'registry'. Beside that, the addition of the computer hardware mentioned further is not important to accept the upgrade.

The computer and home network were upgraded with respect to 'EXAMPLE II' according to the following:

Bolded green fonts are modification or addition to the computer and home network, so the entire realization of the home network is shown the next Figure.

Figure 4.6.88 Home network with multimedia additions.

Some components are purchased because they dropped the price because of the newer products, but are sufficient for the previously described computer, and some have received as a gift, because the owner outdated, but fit well in the displayed home network.

But, first, here is a sequence of Figures which explaining how to block the upgrade of the operating system or some other software products; enlarged Figure 4.6.76.

Figure*...* 4.6.89 Upgrade & update settings. ( + / - )

From the displayed set of images can see which components are not 'hidden' and that can be upgraded, and components that are 'hidden' and that will not be upgraded. This record is kept in a small database of upgrades. Therefore, you should be very careful using some 'cleaning' tools because the data in this database can be deleted,. For this hacking game, you can use the software 'wushowhide.diagcab' that you can that you can download here. System Policy can not perform an effective blockade of upgrades, although this would be, in my opinion, the right solution. However, with system policies (gpedit.msc) should be banned automatically update and adjust it so that it displays a warning about the upgrade (choice of 2 or 3 in Figure 4.6.90b) in order to get to use 'wushowhide.diagcab' before installation. After the changes made by this tool should restart the computer to excluded records of the upgrade are not displayed.

Figure* 4.6.90 Setup of system policies for upgrade. ( + / - )

All other activities regarding upgrades of OS are without significance. Since the entire 'Microsoft Office' suite is not installed, some components are blocked for upgrading because not present at all. No worries, the installed parts of this package will be upgraded, as well as the updates and definitions of the anti-virus program (Windows Defender), and occasionally some critical patches. The 'EssentialPim' software is used for email, as Microsoft software have been shown to be 'vulnerable' for the same purpose. Its use is not a commercial for them, but a solution found by the author who has the most commonly solved 'INBOX' for all user accounts, and is not 'vulnerable'. There is a free and PRO version that is payable one time. A useful feature of this e-mail client is support for PGP.

Figure* 4.6.91 Desktop / Software for e-mail. ( + / - )

Icons with shield indicate that software works in some 'compatible' mode (Figure 4.6.74). The organization of the disk system and the installation of the operating system and the software resulted in the concept of organizing the data in the following figure with the use of a plurality of links made with the 'Link Shell Extension' software which you can download here.

Figure** 4.6.92 Organization of OS / Computer Components. ( + / - )





Figure 4.6.93 Description of the computer after testing.



Figure 4.6.94 Computer test results.




Figure***** 4.6.95 Comparison of the Importance of Changing Individual Components. ( + / - )



Figure 4.6.96 Usability of the computer according to the test.



Figure 4.6.97 Computer test results with older software.



 Girls  iStripper  iStripper  iStripper  iStripper  iStripper  iStripper


Perhaps once in the future 'Windows 10' becomes a valid operating system. Who is waiting - welcome.




 Content - Home
 Content  Informatics Alphabet
Citing of this page:
Radic, Drago. " IT - Informatics Alphabet " Split-Croatia.
{Date of access}. <>.
Copyright © by Drago Radic. All rights reserved. | Disclaimer