ULTIMATE THRILLER TV
ULTIMATE THRILLER TV
  • 287
  • 419 934
How to Run CMD or PowerShell as administrator: PowerShell for System Administrators
🚀 How to Run CMD or PowerShell as Administrator | PowerShell for System Administrators
🔑 Unlock the full potential of your system with administrator privileges! Whether you're a tech enthusiast, system admin, or a power user, learning how to run Command Prompt (CMD) or PowerShell as an administrator is essential for accessing restricted commands, performing system-level modifications, and more.
In this video, I'll walk you through 5 easy methods to launch CMD or PowerShell with admin rights on any Windows device. 📂💻
💡 What You'll Learn:
✔️ Using the Start Menu - Launch CMD/PowerShell with a simple right-click.
✔️ Shortcut Keys - Master quick shortcuts for instant admin access.
✔️ Task Manager - Open CMD/PowerShell in admin mode without leaving your desktop.
✔️ File Explorer - Find and run CMD/PowerShell directly from its location.
✔️ Desktop Shortcut - Create a custom shortcut for one-click admin mode.
🛠️ Why Run as Administrator?
Access Restricted Commands: Execute commands requiring elevated privileges.
System-Level Modifications: Manage settings, troubleshoot, and optimize performance.
Efficient Task Execution: Streamline advanced administrative tasks with ease.
🔥 Pro Tip: Don’t forget to approve the User Account Control (UAC) prompt when launching these tools.
📺 Watch Now to take your command-line skills to the next level! 💪 Don't forget to like, comment, and subscribe for more Windows tips and tech hacks. 🖥️✨
#CMD #PowerShell #RunAsAdmin #WindowsTips #SystemAdministrator
มุมมอง: 162

วีดีโอ

How to Automate Disk Cleanup Using CMD
มุมมอง 2589 ชั่วโมงที่ผ่านมา
Automate Disk Cleanup Using CMD: Boost Your PC's Performance Effortlessly Struggling with a cluttered PC? Learn how to automate Disk Cleanup using Command Prompt (CMD) and keep your system running like new! In this video, I’ll show you step-by-step how to: ✅ Configure Disk Cleanup tasks using the /sageset command. ✅ Automatically delete temporary files, system error dumps, and more. ✅ Schedule ...
Network Security in Computer Network: How to Randomize Source Ports for Enhanced Privacy
มุมมอง 23814 ชั่วโมงที่ผ่านมา
Learn how to enhance your network security by randomizing source ports in Windows. Randomizing source ports makes it harder for attackers to trace your network activity by varying the source ports used for outgoing connections. In this video, we'll use the Set-NetTCPSetting cmdlet to configure custom TCP settings and reduce the risk of advanced monitoring techniques. What You'll Learn: The impo...
Activate windows 11 | 100% Working
มุมมอง 75919 ชั่วโมงที่ผ่านมา
Activate Windows 11 | 100% Working Unlock the full potential of Windows 11 with this quick and easy activation guide! Activating your Windows ensures you have a genuine, properly licensed copy that unlocks all features and keeps your system secure. Follow these simple steps to activate Windows 11 today: 🔧 Steps to Activate Windows 11 1️⃣ Run PowerShell as Administrator Search for "PowerShell" i...
How to configure multi-factor authentication on Windows
มุมมอง 24821 ชั่วโมงที่ผ่านมา
🔒 Secure Your Windows System with Multi-Factor Authentication 🔒 In this step-by-step guide, learn how to configure Multi-Factor Authentication (MFA) on your Windows PC to enhance security and protect against unauthorized access. MFA adds an extra layer of security by requiring additional verification beyond just a password. 💡 What You'll Learn in This Video: 1️⃣ How to enable built-in MFA optio...
RDP Remote Desktop Connection : Quick & Easy Setup Guide for Windows
มุมมอง 390วันที่ผ่านมา
Looking to access your Windows PC remotely? With Remote Desktop Protocol (RDP), you don't need to download additional software-it’s already built into most versions of Windows! This step-by-step guide will walk you through enabling and using RDP effortlessly. 🎯 What You'll Learn in This Video: How to enable Remote Desktop on your target PC. Setting up secure remote access. Using the Remote Desk...
How to Automate Daily System Restore Points | Batch Script & Task Scheduler (Save Space Efficiently)
มุมมอง 306วันที่ผ่านมา
Here's a perfectly optimized TH-cam video description: 🚀 How to Automate Daily System Restore Points with Batch Script & Task Scheduler (Save Space Efficiently!) Learn how to automate the creation of daily System Restore points using a simple batch script and Task Scheduler! This method will not only ensure your system is always protected but also manage storage space by removing older restore ...
How to Use CMD to Clear Activity History and Recent Files
มุมมอง 63014 วันที่ผ่านมา
Clear Activity History & Recent Files Using Command Prompt (CMD) | Step-by-Step Guide In this video, you'll learn how to effectively clear your Windows activity history, recent files, and other sensitive data using Command Prompt (CMD). Whether you're optimizing for security, freeing up disk space, or enhancing privacy, these CMD techniques will make your system cleaner and safer. Commands Cove...
How to Detect Keyloggers on Your Windows PC Using Command Prompt & PowerShell
มุมมอง 1.9K21 วันที่ผ่านมา
Keyloggers pose a significant threat to your privacy, capturing every keystroke you type. In this video, we'll walk you through a detailed guide on how to effectively detect and counter keyloggers on your Windows PC. By leveraging the power of PowerShell and Command Prompt, you’ll learn how to monitor for suspicious activity and secure your system. 🖥️ 📜 Steps Covered in This Video: Open PowerSh...
How to Securely Delete Sensitive Files | Delete file by cmd | cmd del | cmd batch
มุมมอง 40921 วันที่ผ่านมา
Securely deleting files goes beyond just sending them to the Recycle Bin. To make sure your sensitive data is unrecoverable, you can use a variety of techniques and commands in Command Prompt. This video guides you through several methods to securely overwrite and delete files, preventing forensic tools from recovering them. Watch to learn how to ensure your data remains private and secure. 🔹 S...
How to Fix IPConfig Not Recognised as Internal or External Command : ipconfig not recognised
มุมมอง 321หลายเดือนก่อน
Are you struggling with the "IPConfig not recognized as an internal or external command" error on your Windows PC? This video will guide you through the steps to resolve this issue quickly and effectively. In this video, you will learn: Verify System Path Environment Variable: Press Windows Key R to open the Run dialog. Type sysdm.cpl and hit Enter. Go to the Advanced tab and click on Environme...
How to Ping Any Website using Command Prompt on a Windows PC : Looking Like a Hacker
มุมมอง 320หลายเดือนก่อน
Ever wondered how to ping a website using Command Prompt, just like the pros? Learn how to test your connection, check server responsiveness, and diagnose network issues with just a few commands! 🚀 Whether it’s TH-cam, Google, or any other site, follow along to master pinging on your Windows PC. 📌 Steps Covered: Launch Command Prompt: Type cmd in your search bar and open Command Prompt as an ad...
Powershell Test-Connection Example : Master Remote PC Connectivity in Minutes(9 Powerful Techniques)
มุมมอง 404หลายเดือนก่อน
9 Powerful Ways to Use Test-Connection in PowerShell for Network Troubleshooting Learn how to test the connectivity of remote computers or network devices with PowerShell using the Test-Connection cmdlet. In this tutorial, we'll explore 9 different techniques to diagnose network issues and monitor connections effectively. Whether you're a beginner or an experienced system administrator, these m...
How to Check Your Internet Connection Using CMD? (Stable or Unstable)
มุมมอง 1.3Kหลายเดือนก่อน
How to Check Your Internet Connection Using CMD: Stability and Troubleshooting Guide Struggling with an unstable internet connection? In this video, I’ll show you how to check your internet connection using Command Prompt (CMD) to identify potential issues and assess its stability. Follow this step-by-step guide to troubleshoot your network like a pro. Steps Covered: Network Adapter Status Chec...
Windows Firewall Block IP Address / Blacklist
มุมมอง 374หลายเดือนก่อน
How to Block Malicious IP Address Blocking specific IP addresses using Windows Firewall is a great way to protect your computer from malicious traffic, hackers, and botnet attacks. In this step-by-step guide, I'll show you how to block or blacklist any IP address to enhance your system's security. Why Block an IP Address? Blocking known malicious IPs can prevent unwanted connections from reachi...
How to Lower Ping and Fix Packet Loss for Gaming
มุมมอง 627หลายเดือนก่อน
How to Lower Ping and Fix Packet Loss for Gaming
How to Find Your Windows Product Key
มุมมอง 537หลายเดือนก่อน
How to Find Your Windows Product Key
Install Remote Server Administration Tools : For MAXIMUM CONTROL. RSAT Windows 10 & RSAT Windows 11
มุมมอง 282หลายเดือนก่อน
Install Remote Server Administration Tools : For MAXIMUM CONTROL. RSAT Windows 10 & RSAT Windows 11
Vulnerability Scanning : How to Perform Vulnerability Scanning on Windows Using Command Prompt
มุมมอง 473หลายเดือนก่อน
Vulnerability Scanning : How to Perform Vulnerability Scanning on Windows Using Command Prompt
How to FREE UP Disk Space on Windows 11/10/8/7 (2024)
มุมมอง 501หลายเดือนก่อน
How to FREE UP Disk Space on Windows 11/10/8/7 (2024)
Windows 11 Search Bar Not Working: 100% FIXED (PowerShell Included)
มุมมอง 1992 หลายเดือนก่อน
Windows 11 Search Bar Not Working: 100% FIXED (PowerShell Included)
How to Enable HYPER V : Run Multiple Operating Systems (Command Prompt included)
มุมมอง 5272 หลายเดือนก่อน
How to Enable HYPER V : Run Multiple Operating Systems (Command Prompt included)
How to RUN a PowerShell SCRIPT : Simple & Easy
มุมมอง 2392 หลายเดือนก่อน
How to RUN a PowerShell SCRIPT : Simple & Easy
How to shut down laptop with Keyboard
มุมมอง 2112 หลายเดือนก่อน
How to shut down laptop with Keyboard
How To Make Your PC FAST in 14 Minutes! (2024)
มุมมอง 9082 หลายเดือนก่อน
How To Make Your PC FAST in 14 Minutes! (2024)
How to Detect SPYWARE like a Hacker | Malware Detection Guide
มุมมอง 1.4K2 หลายเดือนก่อน
How to Detect SPYWARE like a Hacker | Malware Detection Guide
How to check the Laptop Model
มุมมอง 1982 หลายเดือนก่อน
How to check the Laptop Model
14 High-Security CMD Commands to Harden System Security and Counter Hackers
มุมมอง 2.5K2 หลายเดือนก่อน
14 High-Security CMD Commands to Harden System Security and Counter Hackers
Beginner's Guide to Install LINUX and Still Have WINDOWS | Dual Boot Linux Mint
มุมมอง 6922 หลายเดือนก่อน
Beginner's Guide to Install LINUX and Still Have WINDOWS | Dual Boot Linux Mint
26 Secret Run Commands to Access Hidden Tools and Settings in Windows 10/11
มุมมอง 2.8K2 หลายเดือนก่อน
26 Secret Run Commands to Access Hidden Tools and Settings in Windows 10/11

ความคิดเห็น

  • @vangalasankeerth
    @vangalasankeerth 3 ชั่วโมงที่ผ่านมา

    Can we do it via intune ?

  • @itenthusiast5988
    @itenthusiast5988 10 ชั่วโมงที่ผ่านมา

    This is the kind of security awareness we need the most which many authors are reluctant to share or rely mostly on other tools for help. Thank you very much for this information as it would help me boost my chance as a security professional during my interview. ❤

  • @danieloshea3326
    @danieloshea3326 วันที่ผ่านมา

    What about u block origin lite

  • @tejaschandivakar7430
    @tejaschandivakar7430 4 วันที่ผ่านมา

    can we could silent base cmd disk cleanup? Any method. Thank you.

    • @ULTIMATE_THRILLER_TV
      @ULTIMATE_THRILLER_TV 4 วันที่ผ่านมา

      That's an intelligent question, Tejas! 😊 Yes, you can perform a silent Disk Cleanup using CMD. Use cleanmgr /verylowdisk to clean up without prompts. Alternatively, pre-configure cleanup settings with cleanmgr /sageset:1 and run silently using cleanmgr /sagerun:1.

  • @farooqirshad4432
    @farooqirshad4432 4 วันที่ผ่านมา

    Thank you Sir

  • @arshia1961
    @arshia1961 5 วันที่ผ่านมา

    First of all Thanks to you.. sorry for late reply ... Please revisit script,it do not work properly, it do not repeat to delete & rewrite a new Restore Point next day. In simple words it add a new Restore point next day without deleting the previous one.. Many thanks in advance

    • @ULTIMATE_THRILLER_TV
      @ULTIMATE_THRILLER_TV 5 วันที่ผ่านมา

      I’ve updated the script to ensure it deletes the oldest restore point before creating a new one daily, as you suggested. I truly appreciate your feedback @echo off :: Set the name for the restore point set "RP_NAME=Daily System Restore" :: Delete the oldest restore point first vssadmin delete shadows /for=C: /oldest /quiet :: Wait for a few seconds to ensure deletion is complete timeout /t 5 >nul :: Create a new restore point powershell.exe -command "Checkpoint-Computer -Description '%RP_NAME%' -RestorePointType 'MODIFY_SETTINGS'" :: Wait for confirmation of the restore point creation timeout /t 5 >nul echo Restore point created successfully and the oldest restore point has been deleted. exit

    • @arshia1961
      @arshia1961 4 วันที่ผ่านมา

      @@ULTIMATE_THRILLER_TV drive.google.com/file/d/1E_UDYqZa_hnN6aU08LUvTPBzfTU4JwiD/view?usp=drive_link Hi There,once again with feedback.. it does delete now the previous RstPt.. but as you can see from image that it does not complete new Restore Pt. process till 100% and get terminated without notification *Restore point created successfully and the oldest restore point has been deleted.* Thanks You for your time..

  • @achaius8694
    @achaius8694 5 วันที่ผ่านมา

    what do you mean by adapter name?

    • @ULTIMATE_THRILLER_TV
      @ULTIMATE_THRILLER_TV 5 วันที่ผ่านมา

      Hi @achaius8694! The adapter name refers to the name of your network connection, like 'Ethernet' for wired connections or 'Wi-Fi' for wireless ones. You can find it by running ipconfig in Command Prompt and checking the active connection name

  • @polinaasmr340
    @polinaasmr340 6 วันที่ผ่านมา

    another great tutorial . I have emailed u , need your help.

    • @ULTIMATE_THRILLER_TV
      @ULTIMATE_THRILLER_TV 6 วันที่ผ่านมา

      To assist you, I will be creating a detailed video tutorial that addresses how to detect, mitigate, and prevent attacks like the one you described, particularly focusing on Netsh-based exploits and securing your Wi-Fi network. I will also cover steps to identify potential backdoors and strengthen your system’s defenses.

    • @polinaasmr340
      @polinaasmr340 6 วันที่ผ่านมา

      @@ULTIMATE_THRILLER_TV Looking foward to it

    • @itenthusiast5988
      @itenthusiast5988 10 ชั่วโมงที่ผ่านมา

      Thank you very much for this query and the author who is ready to help on it as this would help many.🎉​@@ULTIMATE_THRILLER_TV

  • @RX7PRO
    @RX7PRO 6 วันที่ผ่านมา

    excelent like always! love it! thanks for sharing! again and over again!

  • @BeBold_05
    @BeBold_05 8 วันที่ผ่านมา

    As i connect, the target pc logged out. It can't used by simultaneously. Can i only see the screen without any inputs by this way or any other way?

    • @ULTIMATE_THRILLER_TV
      @ULTIMATE_THRILLER_TV 8 วันที่ผ่านมา

      @BeBold_05 When you connect using Remote Desktop, the target PC typically logs out the current user, and you cannot use both sessions simultaneously. However, you can set up Remote Desktop in "View Only" mode using third-party software, such as TeamViewer or AnyDesk, if you need to view the screen without controlling it.

  • @NdayisengaJohn-qe3mu
    @NdayisengaJohn-qe3mu 10 วันที่ผ่านมา

    good

  • @agt313
    @agt313 10 วันที่ผ่านมา

    This is only if you pay extra to Microsoft. Windows Home edition only has the client not the server.

  • @WireDroid
    @WireDroid 10 วันที่ผ่านมา

    Using this method can i access my pc from anywhere? or do need to be in my local network?

    • @ULTIMATE_THRILLER_TV
      @ULTIMATE_THRILLER_TV 10 วันที่ผ่านมา

      @WireDroid By default, this method works only within your local network. To access your PC from anywhere, you’ll need to configure port forwarding on your router and know your public IP address.

    • @WireDroid
      @WireDroid 10 วันที่ผ่านมา

      @@ULTIMATE_THRILLER_TV Thank you

  • @Neutron_Playz
    @Neutron_Playz 12 วันที่ผ่านมา

    Bro thx so much

  • @lennoxsendler9984
    @lennoxsendler9984 12 วันที่ผ่านมา

    If I turn off my computer and turn it back on the next day, do I have to enter the commands again or do they remain saved?

    • @ULTIMATE_THRILLER_TV
      @ULTIMATE_THRILLER_TV 5 วันที่ผ่านมา

      Great question! Some changes made using CMD are temporary and will reset after a reboot, while changes made through Settings are permanent until you manually revert them

  • @SuparnoBose99
    @SuparnoBose99 13 วันที่ผ่านมา

    thanks man

  • @polinaasmr340
    @polinaasmr340 14 วันที่ผ่านมา

    how to block when hacker do a lan connection and port fowarding from router ? when the IP address in my PC when I check the location is the main culprit?

    • @ULTIMATE_THRILLER_TV
      @ULTIMATE_THRILLER_TV 5 วันที่ผ่านมา

      To block a hacker using LAN connection and port forwarding, you can use Windows Firewall to block the specific IP address you identified. Ensure that your router's firewall is also enabled and configured to block suspicious activity. It might also help to change your router's admin password and disable remote management if not needed.

  • @arshia1961
    @arshia1961 16 วันที่ผ่านมา

    Could you please write a bat. script for creating a System Restore point every day but with deleting or overwrite the previous restore point.. e.g restore point created today should delete or over write a restore point from yesterday with task scheduler. Thank you in advance---

    • @ULTIMATE_THRILLER_TV
      @ULTIMATE_THRILLER_TV 16 วันที่ผ่านมา

      Absolutely! Thanks for the suggestion!

    • @arshia1961
      @arshia1961 16 วันที่ผ่านมา

      @@ULTIMATE_THRILLER_TV You are welcome

  • @jwf3148
    @jwf3148 16 วันที่ผ่านมา

    W0W !!!

  • @websitemain9260
    @websitemain9260 17 วันที่ผ่านมา

    Thanks man

  • @Reverse-i8h
    @Reverse-i8h 17 วันที่ผ่านมา

    It didn’t work

  • @sniperene
    @sniperene 19 วันที่ผ่านมา

    1. IMPORTANT LIMITATIONS TO CONSIDER: - Modern keyloggers can hide from Task Manager and Process Explorer - They can operate at the kernel level making them almost undetectable with conventional tools - They can evade digital signature detection - Some do not appear in Autoruns 2. RECOMMENDED METHODOLOGY: A. SPECIALIZED TOOLS (In order of importance): 1. DEDICATED ANTI KEYLOGGER: - SpyShelter Anti Keylogger (Paid, but very effective) - KeyScrambler (Prevention rather than detection) - GuardedID 2. DEEP ANALYSIS TOOLS: - KernelDetective (for kernel level analysis) - ProcessHacker (deeper than Process Explorer) - API Monitor (to detect keyboard hooks) 3. DEEP ANALYSIS MEMORY: - Volatility Framework (memory forensics) - Rekall Framework (alternative to Volatility) B. DETECTION TECHNIQUES: 1. KERNEL ANALYSIS: ```powershell # This command is just the start - specialized tools are needed driverquery /v | findstr "Running" ``` 2. BEHAVIOR MONITORING: - Use Process Monitor to detect suspicious I/O operations - Monitor log file writes - Detect illegitimate keyboard hooks 3. NETWORK SCANNING: - Wireshark to detect data exfiltration - Monitor unusual outbound connections C. BEST PRACTICAL APPROACH: 1. PREVENTION: - Use a virtual keyboard for sensitive information - Implement KBM-VPN (Keyboard Mouse Virtual Private Network) - Use keyboard encryption systems 2. DETECTION: - Use multiple anti-keylogger tools together - Perform periodic memory scans - Monitor anomalous system behavior 3. SPECIFIC RECOMMENDED TOOLS (IN ORDER): LEVEL 1 (Basic Detection): - Malwarebytes Premium (has anti-keylogger capabilities) - HitmanPro Alert - SpyShelter Stop-Logger LEVEL 2 (Advanced Detection): - ProcessHacker + plugins - KernelDetective - API Monitor v2 LEVEL 3 (Forensic Analysis): - Volatility Framework - Memory DD - WinPmem IMPORTANT: No single tool is 100% effective. The best strategy is: 1. Use a combination of SpyShelter + ProcessHacker 2. Implement a virtual keyboard for sensitive information 3. Perform periodic scans with Volatility 4. Maintain an active prevention system The more sophisticated keyloggers you mention (the ones that hide well) usually operate at the kernel level or use rootkit techniques. For these cases: 1. Detection requires specific kernel analysis tools such as: - OSR Driver Loader - WinDbg with kernel extensions - DeviceTree (part of Windows Driver Kit) 2. Memory analysis is crucial: - Use Volatility with specific keylogger plugins - Analyze kernel structures - Look for undocumented hook patterns

  • @Occultus947
    @Occultus947 20 วันที่ผ่านมา

    Slow down the audio, and remove the intrusive graphics. If you are making instructionals, make instructionals. Idk many that want to brainrot when exploring a topic

    • @ULTIMATE_THRILLER_TV
      @ULTIMATE_THRILLER_TV 20 วันที่ผ่านมา

      Ok, I appreciate your genuine advice. I will work on that on the next video. Kindly stay tuned, I will cherish your feedback.

  • @user-yc9cr1tm9m
    @user-yc9cr1tm9m 21 วันที่ผ่านมา

    Thank you!!

  • @Reflect744
    @Reflect744 22 วันที่ผ่านมา

    Awesome work mate,!

  • @Reflect744
    @Reflect744 22 วันที่ผ่านมา

    👍

  • @discfree1
    @discfree1 22 วันที่ผ่านมา

    Nice video. but please remove all of the rockets, cogs and all of the other flying things you put in the video.

  • @manojkumarp-x5p
    @manojkumarp-x5p 22 วันที่ผ่านมา

  • @Obrempong1
    @Obrempong1 22 วันที่ผ่านมา

    We need to link up

  • @Obrempong1
    @Obrempong1 22 วันที่ผ่านมา

    Great knowledge bro

  • @Its.Axbish
    @Its.Axbish 23 วันที่ผ่านมา

    Not Working on Intel UHD 770

  • @SalemAlAlshahi
    @SalemAlAlshahi 27 วันที่ผ่านมา

    i got this message ERROR: Description = Invalid query

  • @gurilab
    @gurilab 29 วันที่ผ่านมา

    otima propaganda pra vender.... uma bosta

  • @sylvesternkrumah6403
    @sylvesternkrumah6403 29 วันที่ผ่านมา

    Still it didn’t change

  • @AbcdefZxcvghj
    @AbcdefZxcvghj 29 วันที่ผ่านมา

    @@ULTIMATE_THRILLER_TV No shit, sherlock... I can do the same in much effective way via dump memory analysis via volatility...

  • @andriyanto9369
    @andriyanto9369 หลายเดือนก่อน

    When i try Perfmon /report , there a warning, What can i do? Missing Events in Event Investigate why 61% (57,388) events were lost during data collection. The settings for Event Tracing for Windows (ETW) maximum buffers and buffer size may not be optimal depending on which data sets are being collected

    • @ULTIMATE_THRILLER_TV
      @ULTIMATE_THRILLER_TV หลายเดือนก่อน

      Hi @andriyanto9369! 👋 It sounds like your system might be losing events due to buffer settings. You can try increasing the buffer size and maximum buffers for Event Tracing for Windows (ETW) to improve data collection. Here’s how: Open Command Prompt as Administrator. Run this command to adjust ETW settings logman update trace “Perfmon” -bs 1024 -nb 8 128 This sets a buffer size of 1024 KB and increases the number of buffers. You can adjust the numbers as needed. After that, try running perfmon /report again. Let me know if this helps or if you see any changes!

    • @andriyanto9369
      @andriyanto9369 หลายเดือนก่อน

      ​@@ULTIMATE_THRILLER_TV ok i will try it. and my pc recenly have problem, when i insert hdd external or another, my wallpaper become black and i need to restart windows explorer to fix it

  • @SubZeroCraftCH
    @SubZeroCraftCH หลายเดือนก่อน

    Hello, can I change the 512 to 2gb or 3gb? Is there any problem because my ram is 16gb. This is no problem if the computer is turned off and turned on?

    • @ULTIMATE_THRILLER_TV
      @ULTIMATE_THRILLER_TV หลายเดือนก่อน

      Hi @SubZeroCraftCH! Yes, you can change the value to allocate more VRAM, like 2GB (2048 MB) or 3GB (3072 MB), since you have 16GB of RAM. Just keep in mind that increasing VRAM will reduce the amount of RAM available for other tasks, so make sure to monitor your system’s performance after making the change. Also, there’s no issue with powering off and restarting your computer-changes in the registry will remain in effect as long as they’re saved, and the system should apply them once you reboot.

    • @SubZeroCraftCH
      @SubZeroCraftCH หลายเดือนก่อน

      Okay thank you so much! ​@@ULTIMATE_THRILLER_TV

  • @chessmambo
    @chessmambo หลายเดือนก่อน

    Excellent video and very practical tips! Thank you

    • @ULTIMATE_THRILLER_TV
      @ULTIMATE_THRILLER_TV หลายเดือนก่อน

      Thank you too, for being part of my audience ⭐️

  • @RX7PRO
    @RX7PRO หลายเดือนก่อน

    sorry bro.. its just another day to ask ...

  • @SimRacingRevolution
    @SimRacingRevolution หลายเดือนก่อน

    wow those are really good advices! thank you for this straight to the point info! cheers

  • @Xrzack20
    @Xrzack20 หลายเดือนก่อน

    Yes it work thank you

  • @babayaga.666-v8x
    @babayaga.666-v8x หลายเดือนก่อน

    Hi i want to start studying also powershell....do u know recommend me some site or some books?

    • @ULTIMATE_THRILLER_TV
      @ULTIMATE_THRILLER_TV หลายเดือนก่อน

      @babayaga.666-v8x That's awesome!, I recommend starting with the official Microsoft PowerShell documentation: Microsoft Learn - PowerShell. It's comprehensive and free.

  • @OFFICIALGAMERGODYT
    @OFFICIALGAMERGODYT หลายเดือนก่อน

    My load percentage is 1 is it good or baf

  • @techparistech2659
    @techparistech2659 หลายเดือนก่อน

    Awesome excellent 👌

  • @manjitnayak-c3d
    @manjitnayak-c3d หลายเดือนก่อน

    IT SWITCH PORT restart command topic make video & live

    • @ULTIMATE_THRILLER_TV
      @ULTIMATE_THRILLER_TV หลายเดือนก่อน

      restart a network port (windows machine) or Cisco switches?

    • @manjitnayak-c3d
      @manjitnayak-c3d หลายเดือนก่อน

      @@ULTIMATE_THRILLER_TV Cisco switch port

    • @ULTIMATE_THRILLER_TV
      @ULTIMATE_THRILLER_TV หลายเดือนก่อน

      I have added your suggestion to the upcoming topics i might make next depending on the majority vote of the audience.⭐️🎖

  • @gamingtube2.098
    @gamingtube2.098 หลายเดือนก่อน

    ERROR: The system was unable to find the specified registry key or value . C:\Windows\system32\ How i can. Find my product key 😭