i think only 25158 or newer builds support this function for now, instead you can activate that feature on Edge or Firefox (just google it). Moreover, you can use 1.1.1.2/1.0.0.2 malware blocking or 1.1.1.3/1.0.0.3 for malware+adult content blocker together for your family/kids if you have...
Thank you, i am Dutch . i have managed to get the right version using the Dump. this the hash number of the ISO 875444A75F5D26A527C96E864A1885EB1C9F495027A1DD1476CA4C855D8A3E8F i cannot seem to find it anywhere. where can i check if the ISO is corret? i dont remeber how i've got the previous activated to use multiple users RDS. how do you guys got it activated?
wifi issue continues in 22631.2861 turns off by it self and most be manually toggle to turn it back on
Do you have this registry? Code: [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Policies\Microsoft\FeatureManagement\Overrides] "2701253260"=dword:00000000
FYI, Microsoft Windows must provide native support for DoT or "DNS over TLS" for Edge or Firefox to work. At the moment, one can enable Edge or Firefox to work with DoH or "DNS over Https" because Microsoft Windows supports it natively.
caching over http ends up not using caches that providers provide, it can slow down the connection this way
I'm using the unbound resolver (local DNS). It can be configured to connect to DNS over TLS upstream servers. After setup, manually set the IPv4 DNS to 127.0.0.1 and the IPv6 one to ::1. Code: forward-zone: name: "." forward-tls-upstream: yes forward-first: yes forward-no-cache: no # Quad9 forward-addr: 2620:fe::fe@853#dns.quad9.net forward-addr: 9.9.9.9@853#dns.quad9.net forward-addr: 2620:fe::9@853#dns.quad9.net forward-addr: 149.112.112.112@853#dns.quad9.net # Cloudflare DNS forward-addr: 2606:4700:4700::1111@853#cloudflare-dns.com forward-addr: 1.1.1.1@853#cloudflare-dns.com forward-addr: 2606:4700:4700::1001@853#cloudflare-dns.com forward-addr: 1.0.0.1@853#cloudflare-dns.com # forward-addr: 199.9.14.201 # b.root-servers.net # forward-addr: 192.33.4.12 # c.root-servers.net # forward-addr: 199.7.91.13 # d.root-servers.net # forward-addr: 192.5.5.241 # f.root-servers.net # forward-addr: 192.112.36.4 # g.root-servers.net # forward-addr: 193.0.14.129 # k.root-servers.net # forward-addr: 192.0.47.132 # xfr.cjr.dns.icann.org # forward-addr: 192.0.32.132 # xfr.lax.dns.icann.org # forward-addr: 2001:500:200::b # b.root-servers.net # forward-addr: 2001:500:2::c # c.root-servers.net # forward-addr: 2001:500:2d::d # d.root-servers.net # forward-addr: 2001:500:2f::f # f.root-servers.net # forward-addr: 2001:500:12::d0d # g.root-servers.net # forward-addr: 2001:7fd::1 # k.root-servers.net # forward-addr: 2620:0:2830:202::132 # xfr.cjr.dns.icann.org # forward-addr: 2620:0:2d0:202::132 # xfr.lax.dns.icann.org # a.root-servers.net 198.41.0.4, 2001:503:ba3e::2:30 Verisign, Inc. # b.root-servers.net 199.9.14.201, 2001:500:200::b University of Southern California (ISI) # c.root-servers.net 192.33.4.12, 2001:500:2::c Cogent Communications # d.root-servers.net 199.7.91.13, 2001:500:2d::d University of Maryland # e.root-servers.net 192.203.230.10, 2001:500:a8::e NASA (Ames Research Center) # f.root-servers.net 192.5.5.241, 2001:500:2f::f Internet Systems Consortium, Inc. # g.root-servers.net 192.112.36.4, 2001:500:12::d0d US Department of Defense (NIC) # h.root-servers.net 198.97.190.53, 2001:500:1::53 US Army (Research Lab) # i.root-servers.net 192.36.148.17, 2001:7fe::53 Netnod # j.root-servers.net 192.58.128.30, 2001:503:c27::2:30 Verisign, Inc. # k.root-servers.net 193.0.14.129, 2001:7fd::1 RIPE NCC # l.root-servers.net 199.7.83.42, 2001:500:9f::42 ICANN # m.root-servers.net 202.12.27.33, 2001:dc3::35 WIDE Project local-zone: "8.b.d.0.1.0.d.f.ip6.arpa." transparent