Regedit Only Tweaks
Regedit Only Tweaks
Why: Improve drive performance. Makes system “snappier”.
Why not: NoLowDiskSpaceChecks can be useful for some folks.
Many of these tweaks have been previously discussed elsewhere in this guide.
To access the registry: Press the Windows + R keys > in the resulting windows type regedit and then click OK.
To navigate to or within a specific key you simply click the arrows next to it. If there is no arrow then click on the name of the key itself.
To make your own registry (.reg) file copy and paste the text between the dotted lines into Notepad (start Orb > All Programs > Notepad).
Save as win7tweaks.reg (type= all files). Double-click on saved all to apply, reboot.
You can also download these files (.txt or .reg) on dropbox.
– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –
Windows Registry Editor Version 5.00
;Reg file by TweakHound https://www.tweakhound.com
; Make start menu snappier, end hung apps faster
[HKEY_CURRENT_USER\Control Panel\Desktop]
“MenuShowDelay”=”200”
“HungAppTimeout”=”4000”
“WaitToKillAppTimeout”=”5000”
; NTFS, Disable 8.3 names and Last Access (speeds up disk access)
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\FileSystem]
“NtfsDisable8dot3NameCreation”=dword:00000001
“NtfsDisableLastAccessUpdate”=dword:00000001
; Specifies the time, following user input, during which the system keeps apps from moving into the foreground.
[HKEY_CURRENT_USER\Control Panel\Desktop]
“ForegroundLockTimeout”=dword:00000000
; Faster Shutdown, may cause an error at shutdown with misbehaving apps (ZoneAlarm 7 is one)
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control]
“WaitToKillServiceTimeout”=”5000”
; Disable Low disk space checks
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]
“NoLowDiskSpaceChecks”=dword:00000001
;Add Take Ownership to right-click options
[HKEY_CLASSES_ROOT\*\shell\takeownership]
@=”Take ownership”
“HasLUAShield”=””
“NoWorkingDirectory”=””
[HKEY_CLASSES_ROOT\*\shell\takeownership\command]
@=”cmd.exe /c takeown /f \”%1\” && icacls \”%1\” /grant administrators:F”
“IsolatedCommand”=”cmd.exe /c takeown /f \”%1\” && icacls \”%1\” /grant administrators:F”
[HKEY_CLASSES_ROOT\exefile\shell\takeownership]
@=”Take ownership”
“HasLUAShield”=””
“NoWorkingDirectory”=””
[HKEY_CLASSES_ROOT\exefile\shell\takeownership\command]
@=”cmd.exe /c takeown /f \”%1\” && icacls \”%1\” /grant administrators:F”
“IsolatedCommand”=”cmd.exe /c takeown /f \”%1\” && icacls \”%1\” /grant administrators:F”
[HKEY_CLASSES_ROOT\Directory\shell\takeownership]
@=”Take ownership”
“HasLUAShield”=””
“NoWorkingDirectory”=””
[HKEY_CLASSES_ROOT\Directory\shell\takeownership\command]
@=”cmd.exe /c takeown /f \”%1\” /r /d y && icacls \”%1\” /grant administrators:F /t”
“IsolatedCommand”=”cmd.exe /c takeown /f \”%1\” /r /d y && icacls \”%1\” /grant administrators:F /t”
[HKEY_CLASSES_ROOT\dllfile\shell\takeownership]
@=”Take ownership”
“HasLUAShield”=””
“NoWorkingDirectory”=””
[HKEY_CLASSES_ROOT\dllfile\shell\takeownership\command]
@=”cmd.exe /c takeown /f \”%1\” && icacls \”%1\” /grant administrators:F”
“IsolatedCommand”=”cmd.exe /c takeown /f \”%1\” && icacls \”%1\” /grant administrators:F”
;Add Take Ownership to right-click options
[HKEY_CLASSES_ROOT\*\shell\takeownership]
@=”Take ownership”
“HasLUAShield”=””
“NoWorkingDirectory”=””
[HKEY_CLASSES_ROOT\*\shell\takeownership\command]
@=”cmd.exe /c takeown /f \”%1\” && icacls \”%1\” /grant administrators:F”
“IsolatedCommand”=”cmd.exe /c takeown /f \”%1\” && icacls \”%1\” /grant administrators:F”
[HKEY_CLASSES_ROOT\exefile\shell\takeownership]
@=”Take ownership”
“HasLUAShield”=””
“NoWorkingDirectory”=””
[HKEY_CLASSES_ROOT\exefile\shell\takeownership\command]
@=”cmd.exe /c takeown /f \”%1\” && icacls \”%1\” /grant administrators:F”
“IsolatedCommand”=”cmd.exe /c takeown /f \”%1\” && icacls \”%1\” /grant administrators:F”
[HKEY_CLASSES_ROOT\Directory\shell\takeownership]
@=”Take ownership”
“HasLUAShield”=””
“NoWorkingDirectory”=””
;open command window as admin
[-HKEY_CLASSES_ROOT\Directory\shell\runas]
[HKEY_CLASSES_ROOT\Directory\shell\runas]
@=”Open Command Window Here as Administrator”
“Icon”=”C:\\Windows\\System32\\imageres.dll,-78″
[-HKEY_CLASSES_ROOT\Directory\shell\runas\command]
[HKEY_CLASSES_ROOT\Directory\shell\runas\command]
@=”cmd.exe /s /k pushd \”%V\””
– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –