Windows 10, License Agreements, Personal & Private Information!

I Today I have seen some news related with the License Agreement of Microsoft on Windows 10…

For what I have read it seems that they will allow themselves to scan all your machine and personal data so they can know you better. ūüôā

I believe in good faith but I do not thrust companies that gather more than what is required  about us.

I accept the fact that when I am shopping I have to give my name and CC number I do not accept the fact that I have to give my age, gender, GPS coordinates, birth date and all other information that are not required to complete the service.

I found the statements strange about this data privacy policies, with curiosity I have started to read some policy documents and collect more information about this.

This is what I have found in the Windows 10 License Agreement.

Privacy; Consent to Use of Data. Your privacy is important to us. Some of the software features send or receive information when using those features. Many of these features can be switched off in the user interface, or you can choose not to use them. By accepting this agreement and using the software you agree that Microsoft may collect, use, and disclose the information as described in the Microsoft Privacy Statement (, and as may be described in the user interface associated with the software features.”

This is a very brief statement that points to other page and policy…

What does this means?!!?

I have checked the other page  that they call   and found this user terms :

Personal Data we Collect Microsoft collects data to operate effectively and provide you the best experiences with our services. You provide some of this data directly, such as when you create a Microsoft account, submit a search query to Bing, speak a voice command to Cortana, upload a document to OneDrive, or contact us for support. We get some of it by recording how you interact with our services by, for example, using technologies like cookies, and receiving error reports or usage data from software running on your device. We also obtain data from third parties (including other companies). For example, we supplement the data we collect by purchasing demographic data from other companies. We also use services from other companies to help us determine a location based on your IP address in order to customize certain services to your location. The data we collect depends on the services and features you use, and includes the following.

Name and contact data. We collect your first and last name, email address, postal address, phone number, and other similar contact data.

Credentials. We collect passwords, password hints, and similar security information used for authentication and account access.

Demographic data. We collect data about you such as your age, gender, country and preferred language.

Interests and favorites. We collect data about your interests and favorites, such as the teams you follow in a sports app, the stocks you track in a finance app, or the favorite cities you add to a weather app. In addition to those you explicitly provide, your interests and favorites may also be inferred or derived from other data we collect.

Payment data. We collect data necessary to process your payment if you make purchases, such as your payment instrument number (such as a credit card number), and the security code associated with your payment instrument.

Usage data. We collect data about how you interact with our services. This includes data, such as the features you use, the items you purchase, the web pages you visit, and the search terms you enter. This also includes data about your device, including IP address, device identifiers, regional and language settings, and data about the network, operating system, browser or other software you use to connect to the services. And it also includes data about the performance of the services and any problems you experience with them.

Contacts and relationships. We collect data about your contacts and relationships if you use a Microsoft service to manage contacts, or to communicate or interact with other people or organizations.

Location data. We collect data about your location, which can be either precise or imprecise. Precise location data can be Global Position System (GPS) data, as well as data identifying nearby cell towers and Wi-Fi hotspots, we collect when you enable location-based services or features. Imprecise location data includes, for example, a location derived from your IP address or data that indicates where you are located with less precision, such as at a city or postal code level.

Content. We collect content of your files and communications when necessary to provide you with the services you use. This includes: the content of your documents, photos, music or video you upload to a Microsoft service such as OneDrive. It also includes the content of your communications sent or received using Microsoft services, such as the: subject line and body of an email, text or other content of an instant message, audio and video recording of a video message, and audio recording and transcript of a voice message you receive or a text message you dictate. Additionally, when you contact us, such as for customer support, phone conversations or chat sessions with our representatives may be monitored and recorded. If you enter our retail stores, your image may be captured by our security cameras. You have choices about the data we collect. When you are asked to provide personal data, you may decline. But if you choose not to provide data that is necessary to provide a service, you may not be able to use some features or services. Service-specific sections below describe additional data collection practices applicable to use of those services.

All this seems global to several services that Microsoft supplies to their customers.

The email situation is particularly strange…

Microsoft sells Office 365 services to companies, does this policy means that all their emails and documents contents are read and stored somewhere in a Microsoft Database? This gives Microsoft a huge power on the markets or Competitive Intelligence if they use this data.

Should we in good faith trust a corporation this information?

Google refuses to receive or relay encrypted email, I am now curious to see if the same happens in ūüôā
This is global policy and might or might not apply to windows 10.

Thinking again the integration of Windows 10 with the other services will cause that windows 10 indirectly will make use of this license agreements… By using their extra services we might get covered by this policies without conscience and¬†somewhere in time we will be giving Microsoft¬†more information than what we wished…

Now in my thoughts Windows 10 free upgrade seems more interesting as it seems to be used as a strategy to sooner or later people use other Microsoft  cloud services and then most of this policies will apply and in the end Microsoft will have more power over people and lots of valuable aggregated data. If you use some of the advertised functionalities of Windows 10 you will have to use the cloud services, if you fall on that sweet talk you will be giving money and bonus value (information) to Microsoft.

Unless this companies explain very well:

1 – How the info is protected from third parties.

2 – How the info is protected from employees of the company

3 – How that info is processed

I will get suspicious.

Probably even after reading this information I will continue to be suspicious on this companies…

I did not manage to find all this until the moment.

It would be more easy to have in this huge amount of policies something like how we protect your data…¬†

I am not a lawyer but Microsoft is an American company so if NSA requests information from this databank I don’t think Microsoft can refuse…

Because this seems to be a global Policy lets see what specific information Microsoft collects from Windows 10 Operating systems, not counting with other services integration…

Location Services Windows location service. Microsoft operates a location service that helps determine the precise geographic location of a specific Windows device. Depending on the capabilities of the device, location is determined using satellite global positioning service (GPS), detecting nearby cell towers and/or Wi-Fi access points and comparing that information against a database that Microsoft maintains of cell towers and Wi-Fi access points whose location is known, or deriving location from your IP address. When the location service is active on a Windows device, data about cell towers and Wi-Fi access points and their locations is collected by Microsoft and added to the location database after removing any data identifying the person or device from which it was collected. Microsoft may also share de-identified location data with third parties to provide and improve location and mapping services. Windows services and features (such as browsers and Cortana), applications running on Windows, and websites opened in Windows browsers can access the Windows location service to determine location if you allow them to do so. Some features and apps request location permission when you first install Windows, some ask the first time you use the app, and others ask every time you access the location service. For information about certain Windows apps that use the location service, see the Windows Apps section below. Data about a Windows device’s recent location history is stored on the device, and certain apps and Windows features can access this location history. You can clear your device’s location history at any time in the device’s Settings menu. In Settings, you can also view which applications have access to the location service or your device’s location history, turn off or on access to the location service for particular applications, or turn off the location service. Note that on mobile devices, your mobile operator will have access to your location even if you turn off the location service. Find My Phone. The Find My Phone feature allows you to find the location of your Windows phone from, even if you have turned off all access to the location service on the phone. If you have turned on the “save my location every few hours” feature in the Find My Phone settings on your phone, the Find My Phone feature will periodically send and store a single last known location of your phone, even if you have turned off location services on your phone. Each time a new location is sent, it replaces the previously-stored location. Find My Device. The Find My Device feature allows an administrator of a Windows PC or tablet to find the location of that device if the administrator has enabled the location service for the device, even if other users have disabled location for themselves. When the administrator attempts to locate the device, users will see a notification in the notification center. Windows Motion Sensing. Windows devices with motion activity detection can collect motion activity. This data can enable features such as a pedometer to count the number of steps you take, so a fitness application can estimate how many calories you burn. This data and history is stored on your device and can be accessed by applications you give permission to access and use that data.

Most of the personal things on the computer can be disabled so theoretically you can control what you give.

That is good and correct from manufacturer but what happens when you start using all other cloud services?

For some information it really does not need to collect data from your computer or GPS, all it needs is to correlate data using your IP with third-party information and it will know where you are, it will be even better if it gets your BSSID or SSID.

Reading a bit more…

Your backup of encryption key goes to the OneDrive where probably enters in the Backup cycle of Microsoft Cloud and can be stored for some time… even after we delete it… ūüôā

Device encryption. Device encryption helps protect the data stored on your device by encrypting it using BitLocker Drive Encryption technology. When device encryption is on, Windows automatically encrypts the drive Windows is installed on and generates a recovery key. The BitLocker recovery key for your device is automatically backed up online in your Microsoft OneDrive account.

Information of our connectivity is also interesting…

Remember when I said they only need to get your IP or BSSID or SSID?

Here is the policy on what they collect from us.

Usage and connectivity data. Microsoft regularly collects basic information about your Windows device including usage data, app compatibility data, and network and connectivity information. This data is transmitted to Microsoft and stored with one or more unique identifiers that can help us recognize an individual user on an individual device and understand the device’s service issues and use patterns. The data we collect includes: Configuration data, including the manufacturer of your device, model, number of processors, display size and resolution, date, region and language settings, and other data about the capabilities of the device. The software (including drivers and firmware supplied by device manufacturers), installed on the device. Performance and reliability data, such as how quickly programs respond to input, how many problems you experience with an app or device, or how quickly information is sent or received over a network connection. App use data for apps that run on Windows (including Microsoft and third party apps), such as how frequently and for how long you use apps, which app features you use most often, how often you use Windows Help and Support, which services you use to sign into apps, and how many folders you typically create on your desktop. Network and connection data, such as the device’s IP address, number of network connections in use, and data about the networks you connect to, such as mobile networks, Bluetooth, and identifiers (BSSID and SSID), connection requirements and speed of Wi-Fi networks you connect to. Other hardware devices connected to the device. Some diagnostic data is vital to the operation of Windows and cannot be turned off if you use Windows. Other data collection is optional, and you will be able to turn this data collection on or off in Settings.

Why they need my BSSID and SSID???
If I am using a public one, for what I have read, they buy that info from third parties, if it is personal why do they need to have it?

And finally I love the last statement Some diagnostic data is vital to the operation of Windows and cannot be turned off if you use Windows.

I am now curious if some companies when they give this diagnostics to Microsoft really know what is in the package…

I believe some know but most just have good faith. Same as users.

What is this part that we can’t disable and keeps feeding Microsoft with our data?!?!?!

In reality this makes redundant the GPS situation… the difference is just the precision¬†that they can¬†pin point you on the map.

Also this is interesting, if you use a wi-fi network and you use Tor¬†to make your traffic anonymous it means that somehow in specific situations they can get your wi-fi information? That information correlated with other info will make¬†Tor useless…

This with the policy¬†that you are forced to accept windows updates makes me think in some more conspiracy theories… ūüėõ

Probably is some requirement that governments need…

Speaking of data retention…

Microsoft retains personal data for as long as necessary to provide the services and fulfill the transactions you have requested, or for other essential purposes such as complying with our legal obligations, resolving disputes, and enforcing our agreements. For example: For Bing search queries, we de-identify stored queries by removing the entirety of the IP address after 6 months, and cookie IDs and other cross-session identifiers after 18 months. In, when your Deleted Items folder is emptied, those emptied items remain in our system for up to 30 days before final deletion. If you remove a credit card from your account, Microsoft will retain transaction records containing your credit card number for as long as reasonably necessary to complete any existing transactions, to comply with Microsoft’s legal and reporting requirements, and for the detection and prevention of fraud.

Strangely I did not find nothing related with OneDrive Retention Policy… Remember the place where it is stored our encryption key?!!!

Well I found all this in around 2 hours reading policies and jumping around from one to another…

I might be wrong but it seems in some cases they are collecting more that what they need to provide us the services they sell.

I hope this creates more awareness to people and they can decide in conscience if they want to give or not personal information control to corporations.

Novas funcionalidades do Windows 8 – Secure Boot

Secure boot.
Aparentemente o windows 8 vai ter novas funcionalidades em relação ao boot.

√Č sabido que uma das grandes dores de cabe√ßa em termos de seguran√ßa √© o controlo da parte de boot do sistema operativo das nossas m√°quinas.

A Fase em que a BIOS acaba de entrar e o S.O. come√ßa a arrancar √© uma das mais criticas. √Č aqui que se pode subverter a seguran√ßa implementada no S.O. arrancando com outro S.O. que permita a corrup√ß√£o do existente ou mesmo instalando aquilo a que vulgarmente se chama de root kit.

Com o windows 8 e as novas BIOS UEFI (Unified Extensible Firmware Interface) a Microsft veio tentar alterar o paradigma.

O UEFI inclui uma op√ß√£o de secure boot para impedir “Boot Loader Attacks”.

Qualquer código que é carregado na fase de boot do sistema terá que estar identificado com uma chave de segurança permitindo ao UEFI bloquear qualquer tentativa de correr código não autorizado.

Os fabricantes O.E.M terão de implementar esta funcionalidade para obterem certificação do seu equipamento (autocolante de windows 8 compatible.)

Para o utilizador esta funcionalidade √© muito boa, mas para o fabricante a funcionalidade tamb√©m √© excelente, porque passa a existir uma base de dados de chaves “Key Enrollment Key database (KEK)” onde a microsoft poder√° realizar a actualiza√ß√£o de chaves para novos S.O. mas tamb√©m poder√° revogar chaves para os seus sistemas operativos que ter√£o sido comprometidos ou na minha opini√£o pirateados!

A forma de funcionar é simples, haverão várias bases de dados de chaves que serão consultadas no processo de boot.
Depois de validadas o windows arranca o software “Anti-Malware”.
Finalmente o windows arranca os “Kernel Drivers” e inicializa o “User Mode”

Mais informa√ß√Ķes em

Script para retirar os utilizadores dos logs dos ISAS agrupados por n√ļmero de hits num dia.

Este script necessita de ter o logparser instalado. Ou no minimo a sua DLL registada.

Caminho onde est√° o Log: ‚ÄúE:ISALOG~1‚ÄĚ
Nome dos Ficheiros t√™m de come√ßar por: ‚ÄúISALOG_‚ÄĚ
' -----------------------------------------------'
' LogParser.vbs
' Script lê o conteudo do logs do ISA e coloca-os num ficheiroL.
' Autor Hugo Jorge Fernandes Rodrigues
' Vers√£o 1.0 - 21 Setembro 2011 - Retira os utilizadores com mais hits por dia
' -----------------------------------------------'
Set oLogQuery = createobject("MSUtil.LogQuery")
Set oInput = createobject("MSUtil.logquery.W3CInputformat")
Set oOutput = createobject("MSUtil.logquery.CSVOutputFormat")
Dim DataInicial
Dim DataFinal
Dim LogPath
Dim sLogName
Dim sLogFileName
Dim UserName
Dim strDiaInicial
Dim strMesInicial
Dim strAnoInicial
DataInicial = InputBox ("Qual a data Inicial para pesquisa. Formato: DD-MM-AAAA","Dia Inicio",date())
DataFinal = InputBox ("Qual a data de fim da pesquisa. Formato: DD-MM-AAAA","Dia de FIM",date())
Datafinal = CDate(datafinal)
Datainicial = CDate(dataInicial)
do while datainicial = datafinal
     strDiaInicial = DatePart("d",DataInicial)
     if len(strDiaInicial)
          strDiaInicial = "0" & strDiaInicial
     end if
     strMesInicial = cstr(DatePart("m",DataInicial))
     if len(strMesInicial)
         strMesInicial = "0" & strMesInicial
     end if
     strAnoInicial = cstr(DatePart("yyyy",DataInicial))
     sLogFileName = strAnoInicial & strMesInicial & strDiaInicial
     LogPath = "E:ISALOG~1"
     sLogName = "ISALOG_" & sLogFileName & "*.w3c"
     strsqlbyIPAddress = "Select count(cs-username) as UserCount, cs-username INTO e:LogParser" & sLogFileName & ".csv FROM " & logPath & sLogName & " Group by cs-username"
     oLogQuery.ExecuteBatch strsqlbyIPAddress, oInput, oOutput
     datainicial = DateAdd("d",1,datainicial)

Script para Carregar uma ‚ÄúRule Set‚ÄĚ de uma regra pertencente a um Array de ISA servers.

Ficheiro de dados est√° em: c:Export.txt, O nome da ‚ÄúRule Set‚ÄĚ √© BadsitesVarios. Primeiro o script apaga os dados da ‚Äúrule set‚ÄĚ s√≥ depois √© que preenche com os novos.


Dim limpa
Dim root
Dim urlSets
Dim urlSet
Dim ruleElements
Dim CurArray
Const ForReading = 1
Dim arrFileLines()
Set objFile = objFSO.OpenTextFile ("C:Export.txt", ForReading)
objFSO = CreateObject ("Scripting.FileSystemObject")
set root = CreateObject("FPC.Root")
Set CurArray = root.Enterprise
Set urlSets = CurArray.RuleElements.URLSets
Set urlset = URLSets.item("BadsitesVarios")
i = 0
Do Until objFile.AtEndOfStream
     Redim Preserve arrFileLines(i)
     arrFileLines(i) = objFile.ReadLine
     i = i + 1
Limpa = DeleteAllUrlsInUrlSet("<b>BadsitesVarios</b>")
if limpa = false then
     wscript.echo "N√£o Foi apagado nada"
end if
For Each strLine in arrFileLines
     on error resume next
     urlset.add strLine
     If Err.Number = 421 Then Err.Clear 'URL Set already exists.
     End if
wscript.echo "Adicionado"
Function DeleteAllUrlsInUrlSet(sUrlSetName)
     Dim oFPC 'Root COM object for ISA admin.
     Dim oIsaArray 'The local ISA Server or ISA Array.
     Dim cUrlSets 'FPCURLSets collection.
     Dim cUrlSet 'FPCURLSet collection.
     Dim sUrl
     Set oFPC = CreateObject("FPC.Root")
     Set oIsaArray = oFPC.Enterprise
     Set cUrlSets = oIsaArray.RuleElements.URLSets
     Set cUrlSet = cUrlSets.Item(sUrlSetName)
     For Each sUrl In cUrlSet
     If Err.Number = 0 Then DeleteAllUrlsInUrlSet = True
     Else DeleteAllUrlsInUrlSet = False
End Function


FCIV significa ‚ÄúFile Checksum Integrity Verifier‚ÄĚ

Estamos a falar de um programa que com base num ficheiro nos mostra o seu hash em MD5 ou em SHA1.

Isto permite saber se o ficheiro que retiramos de um determinado local na internet foi alterado ou n√£o. Claro que para isso o local de origem do ficheiro ter√° de ter publicado o hash MD5 ou SHA1 do ficheiro original.

Comparando as 2 sequências de dígitos validamos se o ficheiro que recebemos é ou não igual ao original.

Segundo a lógica não podem existir 2 ficheiros diferentes com o mesmo hash.

Aqui fica uma ligação para o programa de linha de comandos da Microsoft que nos permite realizar a validação.

Microsoft  File Checksum Integrity Verifier


-add file | dir:

Compute the hash and send it to an output device (default screen). The dir parameter has the following options:




Specify file type. For example, -type *.exe.

-exc file:

Do not compute these directories.


Do not store the full path name. (By default, FCIV stores the full path name.)


Remove the base path from the path name of each entry.


List entries in the database.


Verify hashes. The -v option has the following option:


Remove the base path from the path name of each entry.

-?, -h, or -help:

Open extended help.


-md5, -sha1, or -both:

Specify hash type. (By default, MCIV uses -md5.)

-xml db:

Specify database format and name.

Note When you use the -v option to verify a hash, FCIV also sends a return error code to indicate whether a hash is verified. A zero (0) indicates success, and a 1 indicates failure. With the return error code, you can use FCIV in automated scripts to verify hashes.

Example usage

To display the MD5 hash of a file, type the following command at a command prompt:

fciv.exe filename

Note filename is the name of the file.

To compute a hash of a file, type a command line that is similar to any one of the following command lines:

fciv.exe c:mydirmyfile.dll
fciv.exe c: -r -exc exceptions.txt -sha1 -xml dbsha.xml
fciv.exe c:mydir -type *.exe
fciv.exe c:mydir -wp -both -xml db.xml

To list the hashes that are stored in a database, type a command line that is similar to the following command line:

fciv.exe -list -sha1 -xml db.xml

To verify a hash in a file, type a command line that is similar to any one of the following command lines:

fciv.exe -v -sha1 -xml db.xml
fciv.exe -v -bp c:mydir -sha1 -xml db.xml

Mais informação:

Como ver os ‚ÄúMessage Headers‚ÄĚ no Outlook 2010

Para vermos os cabeçalhos de mensagens no Outlook 2010 temos de abrir o correio electrónico.
No topo do correio electrónico ao lado do cabeçalho mensagem existe outro chamado ficheiro,


Carregar no menu ‚ÄúFile‚ÄĚ ou ficheiro.

Escolher depois o quadro de op√ß√Ķes:


E aqui temos a informação relacionada com os cabeçalhos:


Comando Start? Nos vários Windows…

Com o surgimento dos m√ļltiplos processadores no Windows come√ßamos a ter alguns problemas por vezes com aquelas aplica√ß√Ķes que n√£o sabem bem como lidar com a fartura. Algumas tornam-se gananciosas e roubam todos os ciclos de processamento poss√≠veis em todos os processadores.
Por incrível que pareça esta situação pode ser facilmente controlada reservando os recursos necessários ao nosso sistema.
Imaginemos que se quer correr um notepad apenas a ocupar recursos de um processador especifico…

Para isto apenas necessitamos de abrir uma janela cmd e escrever o seguinte comando:

start /affinity 1 notepad.exe

Este comando d√° indica√ß√Ķes para inicializar o processo notepad a ocupar o CPU com o ID 0.
Pode ser validado abrindo o taskmanager e observando qual a afinidade de processadores,  apenas o CPU 0 está a a ser utilizado pelo programa.

Sabendo isto pode-se usar esta vantagem das mais diversas formas, exemplo: criar um atalho que arranca a aplica√ß√£o com estes par√Ęmetros, um ficheiro batch etc. A imagina√ß√£o √© o c√©u ūüôā

Aqui fica um conjunto de possibilidades do comando start que passa à maioria das pessoas despercebido mas que é muito importante.


Starts a separate window to run a specified program or command.

START ["title"] [/D path] [/I] [/MIN] [/MAX] [/SEPARATE | /SHARED] 
      [/AFFINITY ] [/WAIT] [/B] [command/program] 

¬†“title”¬†– Titulo a colocar na barra de Windows.

path – Directoria de inicio.

B –¬†Iniciar a aplica√ß√£o sem criar uma nova janela

I –¬†O novo ambiente ser√° o ambiente original passado para o cmd.exe e n√£o o ambiente que est√° a correr no momento.

MIN – Iniciar a janela minimizado.

MAX – Iniciar a janela maximizado.

SEPARATE РIniciar o programa de 16-bit numa zona de memória separada.

SHARED РIniciar um programa de 16-bit numa zona de moeria comum.

LOW –¬†Iniciar a aplica√ß√£o numa forma de “IDLE priority class”.

NORMAL РIniciar a aplicação com prioridade normal.

HIGH РIniciar a aplicação com prioridade Alta.

REALTIME РIniciar a aplicação com prioridade em tempo real.

ABOVENORMAL РIniciar a aplicação com prioridade acima do normal.

BELOWNORMAL РIniciar a aplicação com prioridade a baixo normal.

AFFINITY РA nova aplicação terá a afinidade para o processador especificado deve ser expressa como um numero decimal.

WAIT –¬†Iniciar uma aplica√ß√£o e esperar que ela termine.

Coisas escondidas no Windows 7

Bem uma coisa que achei engra√ßada foi o facto de haver ambientes de trabalho ou ‚Äúthemes‚ÄĚ escondidos no windows 7.

Existem uns muito bonitos.
Aqui fica a dica de como os encontrarem:
Carregar no bot√£o start e depois na janela de pesquisa colocar o seguinte:
Carregar em enter” e navegar pelas pastas de v√°rios temas de trabalho dedicados a v√°rios pa√≠ses.

Facilidade de utilização do windows 7

Um dos objectivos com a saída do Windows 7 é a facilidade de utilização.

Com base nisto há uns truques pouco conhecidos que aqui deixo para uma mais rápida utilização do Windows.

Lista de combina√ß√Ķes de teclas para fun√ß√Ķes do Windows 7 bem como os respectivos gestos de teclado. (atalhos do teclado / Keyboad Shortcuts).


Atalho do Teclado Gesto de Rato
Maximizar tecla com o Logo Windows + Seta para cima. Arrastar a barra de titulo para a parte de cima do ecr√£
Mudar o tamanho da janela para ecr√£ completo sem alterar a sua largura Pressionar tecla Shift+teclaWindows+seta para cima. arrastar o extremo inferior ou superior para o extremo do ecr√£.
Restaurar uma Janela Tecla do Windows + Seta para baixo Afastar a barra do titulo para fora do ecr√£.
Minimizar uma janela restaurada Tecla Windows + Seta para baixo. carregar no bot√£o minimizar.
Mostrar a janela na parte esquerda do ecr√£ tecla de logo do windows + seta para esquerda Arrastar a barra de titulo da janela para o extremo esquerdo.
Mostrar a janela no lado direito do ecr√£ Tecla do Windows + Seta da direita Arrastar a barra de titulo para o extremo direito do ecr√£
Mover janela para o monitor à esquerda Tecla shift+tecla windows+seta para esquerda arrastar a janela para o monitor pretendido
Mover janela para o monitor à direita Tecla shift+tecla windows+seta direita arrastar a janela para o monitor pretendido.
Minimizar todas as janelas excepto a que est√° activa. Tecla Windows + tecla home. Abanar a janela pressionando a barra de titulo com o rato.
Minimizar todas as janelas Tecla Windows + Tecla M
restaurar todas as janelas Tecla Shift + Tecla windos + Tecla M