AskOverflow.Dev

AskOverflow.Dev Logo AskOverflow.Dev Logo

AskOverflow.Dev Navigation

  • 主页
  • 系统&网络
  • Ubuntu
  • Unix
  • DBA
  • Computer
  • Coding
  • LangChain

Mobile menu

Close
  • 主页
  • 系统&网络
    • 最新
    • 热门
    • 标签
  • Ubuntu
    • 最新
    • 热门
    • 标签
  • Unix
    • 最新
    • 标签
  • DBA
    • 最新
    • 标签
  • Computer
    • 最新
    • 标签
  • Coding
    • 最新
    • 标签
主页 / computer / 问题 / 1516725
Accepted
jw_
jw_
Asked: 2020-01-13 17:04:44 +0800 CST2020-01-13 17:04:44 +0800 CST 2020-01-13 17:04:44 +0800 CST

如何禁用 Windows 10 系统日志

  • 772

在 Windows 10 资源监视器中,我发现系统进程以 30-100KB/s 的速度不断写入 C:\ProgramData\Microsoft\Windows\wfp\wfpdiag.etl。这等于 1TB 写入/年,这对 SSD 来说是不健康的。还有其他日志写入,例如 C:\Windows\System32\LogFiles***。

虽然诊断需要日志,但最好仅在问题已经发生时才打开。

是否可以禁用尽可能多的系统日志以减少对 SSD 的垃圾写入?

windows-10 event-log
  • 6 6 个回答
  • 40540 Views

6 个回答

  • Voted
  1. Best Answer
    DrMoishe Pippik
    2020-01-13T18:05:40+08:002020-01-13T18:05:40+08:00

    默认情况下,Windows 有大量的日志文件,不断地写入数据。

    有两种方法可以阻止这种搅动:

    停止在 Windows 过滤平台 (WFP) 中记录“审核成功”,仅记录“审核失败”

    • 以管理员身份打开 CMD 提示符:按Windows,键入cmd,按Ctrl+ Shift+Enter并确认。
    • 键入(或复制/粘贴)以下内容并按Enter: auditpol /set /subcategory:"Filtering Platform Connection" /success:disable /failure:enable

    如果此操作成功,预计会记录更少的事件。

    禁用单个日志 Windows 事件查看器

    • 打开 Windows 事件查看器:按WindowsR、键入eventvwr.msc并按Enter。
    • 向下滚动到Application and Service Logs, Microsoft, Windows, WFP。
    • 右键单击日志进程并选择Disable Log。

    按名称搜索事件日志的一个有用工具是 Nirsoft 的完整事件日志视图。 Nirsoft 的完整事件日志视图

    • 29
  2. GChuf
    2020-07-08T01:09:15+08:002020-07-08T01:09:15+08:00

    去铁杆:

    如果要禁用特定事件日志记录,请转到事件查看器并右键单击要删除的事件日志。单击Event Properties。

    应该会打开一个新窗口 - 单击XML view,您可以在其中看到事件的 GUID。我们将尝试根据此 GUID 在注册表中查找事件日志记录服务。并非所有事件都有此 GUID,我们无法在注册表中找到每个 GUID。

    事件属性

    获得 GUID 后,我们导航到HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\WMI\Autologger\EventLog-Systemin regedit,然后在圆括号内搜索我们的 GUID。

    如果我们找到它,我们可以继续更改 Enabled 和 EnabledProperty 键:

    "Enabled"=dword:0
    "EnableProperty"=dword:0
    

    注册表编辑

    • 2
  3. Dolores Stevens
    2020-08-03T10:22:21+08:002020-08-03T10:22:21+08:00

    我想我想出了如何将 NetCore.etl 写入硬盘而不是 ssd。我运行了性能监视器(一个 Windows 应用程序),深入到 Data Collector Sets | Event Trace Sessions,右键NetCore,在弹出的菜单中点击Properties,点击Directory选项卡,浏览到想要的文件夹。根据资源监视器的说法,时间会证明更改是否是永久性的,但目前正在将日志写入我的硬盘 E:。

    如果希望完全停止编写 NetCore.etl,单击停止而不是属性可能会停止它。但我不太相信这种变化会是永久性的。某些应用程序可能会重新启动它,也许下次重新启动 Windows 时。如果有人尝试这个,我希望他/她能在这个帖子中发布结果。

    其他几个日志文件可以以类似的方式重定向(或停止)。

    • 1
  4. Hoak
    2021-09-06T09:27:06+08:002021-09-06T09:27:06+08:00

    回覆。原始帖子:Windows 事件日志确实会随着时间的推移将大量数据写入磁盘;并且有很多用例非常不希望这样做;例如无法维护的嵌入式系统,磁盘磨损是一个问题,资源非常宝贵,因此尽可能减少所有不必要的 i/o 是可取的。

    还有一些用户用例,其中无法控制 Windows 事件日志记录是典型的 Microsoft 方式、用户恶意设计,因为不再有任何简单的方法可以在不需要、不想要并且实际上是一种责任时暂停日志记录。已经有很多迂回的尝试,例如通过暂停线程进行的尝试,但没有一个可以可靠地用于暂停 Windows 事件日志记录。

    一种可能适用于只想减少磁盘磨损的方法是使用 Windows UWF 或统一写入过滤器重定向到小型 RAM 磁盘,但要在任何通用计算应用程序中实现这一点,您将编辑广泛的排除列表 - - 这既费时又麻烦,又符合微软的用户恶意体验。

    微软对这个问题完全置若罔闻,或者完全漠不关心;开发人员得到相同的罐头 smarmy '让它成为美好的一天' 用户做的回答。因此,任何人发现的任何廉价和肮脏的黑客都将受到欢迎和赞赏。

    • 0
  5. isidroco
    2022-01-03T19:30:49+08:002022-01-03T19:30:49+08:00

    方法 1) 不推荐:禁用“Windows 事件日志”服务并重新启动。但在 win7 上将禁用 TaskScheduler(和碎片整理磁盘)。win10 上最差的将禁用网络列表和设备自动设置。

    方法2)以管理员身份运行此批处理:

          rem https://docs.microsoft.com/en-us/windows/win32/fwp/auditing-and-logging
          rem https://social.technet.microsoft.com/Forums/en-US/ec2b033f-3e9b-4727-88d2-e6e358393734/how-to-disable-stop-windows-filtering-platform-filtering-platform-packet-drop
          rem  ALL
        Auditpol /set /category:* /Success:disable /failure:disable
          rem FIREWALL
        auditpol /set /subcategory:"Filtering Platform Policy Change" /success:disable /failure:disable
        auditpol /set /subcategory:"Filtering Platform Packet Drop" /success:disable /failure:disable
        auditpol /set /subcategory:"Filtering Platform Connection" /success:disable /failure:disable
        auditpol /set /subcategory:"Other Object Access Events" /success:disable /failure:disable
        auditpol /set /subcategory:"IPsec Main Mode" /success:disable /failure:disable
        auditpol /set /subcategory:"IPsec Quick Mode" /success:disable /failure:disable
        auditpol /set /subcategory:"IPsec Extended Mode" /success:disable /failure:disable
        auditpol /set /subcategory:"IPsec Driver" /success:disable /failure:disable
          rem https://thesystemengineers.wordpress.com/2014/05/08/the-best-advanced-audit-script-and-advanced-audit-policy-i-use/
          rem http://www.ultimatewindowssecurity.com/wiki/WindowsSecuritySettings/Recommended-Baseline-Audit-Policy-for-Windows-Server-2008
        auditpol /set /subcategory:"DPAPI Activity" /success:disable /failure:disable
        auditpol /set /subcategory:"Detailed Directory Service Replication" /success:disable /failure:disable
        auditpol /set /subcategory:"Directory Service Replication" /success:disable /failure:disable
        auditpol /set /subcategory:"Handle Manipulation" /success:disable /failure:disable
        auditpol /set /subcategory:"MPSSVC Rule-Level Policy Change" /success:disable /failure:disable
        auditpol /set /subcategory:"Non Sensitive Privilege Use" /success:disable /failure:disable
        auditpol /set /subcategory:"Other Policy Change Events" /success:disable /failure:enable
        auditpol /set /subcategory:"Other Privilege Use Events" /success:disable /failure:disable
        auditpol /set /subcategory:"SAM" /success:disable /failure:disable
        auditpol /set /subcategory:"Sensitive Privilege Use" /success:disable /failure:disable
          rem may be enabled on failure
        auditpol /set /subcategory:"Other System Events" /success:disable /failure:disable
          rem Usually all enabled
        auditpol /set /subcategory:"Account Lockout" /success:disable /failure:disable
        auditpol /set /subcategory:"Application Generated" /success:disable /failure:disable
        auditpol /set /subcategory:"Application Group Management" /success:disable /failure:disable
        auditpol /set /subcategory:"Audit Policy Change" /success:disable /failure:disable
        auditpol /set /subcategory:"Authentication Policy Change" /success:disable /failure:disable
        auditpol /set /subcategory:"Authorization Policy Change" /success:disable /failure:disable
        auditpol /set /subcategory:"Certification Services" /success:disable /failure:disable
        auditpol /set /subcategory:"Computer Account Management" /success:disable /failure:disable
        auditpol /set /subcategory:"Credential Validation" /success:disable /failure:disable
        auditpol /set /subcategory:"Directory Service Access" /success:disable /failure:disable
        auditpol /set /subcategory:"Directory Service Changes" /success:disable /failure:disable
        auditpol /set /subcategory:"Distribution Group Management" /success:disable /failure:disable
        auditpol /set /subcategory:"File Share" /success:disable /failure:disable
        auditpol /set /subcategory:"File System" /success:disable /failure:disable
        auditpol /set /subcategory:"Kerberos Authentication Service" /success:disable /failure:disable
        auditpol /set /subcategory:"Kerberos Service Ticket Operations" /success:disable /failure:disable
        auditpol /set /subcategory:"Kernel Object" /success:disable /failure:disable
        auditpol /set /subcategory:"Logoff" /success:disable /failure:disable
        auditpol /set /subcategory:"Logon" /success:disable /failure:disable
        auditpol /set /subcategory:"Network Policy Server" /success:disable /failure:disable
        auditpol /set /subcategory:"Other Account Logon Events" /success:disable /failure:disable
        auditpol /set /subcategory:"Other Account Management Events" /success:disable /failure:disable
        auditpol /set /subcategory:"Other Logon/Logoff Events" /success:disable /failure:disable
        auditpol /set /subcategory:"Process Creation" /success:disable /failure:disable
        auditpol /set /subcategory:"Process Termination" /success:disable /failure:disable
        auditpol /set /subcategory:"RPC Events" /success:disable /failure:disable
        auditpol /set /subcategory:"Registry" /success:disable /failure:disable
        auditpol /set /subcategory:"Security Group Management" /success:disable /failure:disable
        auditpol /set /subcategory:"Security State Change" /success:disable /failure:disable
        auditpol /set /subcategory:"Security System Extension" /success:disable /failure:disable
        auditpol /set /subcategory:"Special Logon" /success:disable /failure:disable
        auditpol /set /subcategory:"System Integrity" /success:disable /failure:disable
        auditpol /set /subcategory:"User Account Management" /success:disable /failure:disable
          rem Apply immediatly
        gpupdate /force
    

    方法 3) 创建文件夹 C:\TEMP
    打开 regedit。导航并将选择器放置在此分支上 HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\WMI\Autologger
    右键单击​​并将选定的分支导出到 C:\TEMP\WMI_backup.reg(将保留此作为备份)右键单击并将选定的分支导出到 C: \TEMP\WMI_disable.reg,关闭 regedit 用 TEXTPAD 编辑器打开 C:\TEMP\WMI_disable.reg:

      Search and Replace, enable Regular Expressions, SEARCH:
    ^(?!("Enabled"|"EnableProperty"|\[|\n|Windows)).+\n
      Replace with:
    (empty)
      REPLACE ALL
      Second Search and replace, Search:
    dword:.+
      Replace with:
    dword:00000000
      REPLACE ALL
      Third (optional) Search and replace, Search:
    (^\[.*(?:\n*\h*)*)+(^\[.*)
      Replace with:
    $+
      REPLACE ALL
      Save and exit.
    

    应用生成的 .REG,除非使用 nirsoft advancedrun 作为系统用户输入,否则某些键将不会应用:

    AdvancedRun_x64.exe /EXEFilename "%windir%\regedit.exe" /CommandLine "c:\TEMP\WMI_disable.reg" /RunAs 8 /Run
    

    替换说明:第一个将消除所有不以下列之一开头的行:[; “启用”;“启用属性”;视窗; (空的)

    第二次搜索会将所有剩余的 Execute dword:xxxxxxxx 更改为 dword:00000000

    第三个(可选清理)搜索以 [... 开头的连续行并保留最后一个

    方法 4) 与方法 3 相同,但使用密钥:[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT]

    方法 5) 应用这个 .REG 文件来禁用某些日志,不要重置 START 的:EventLog-Application、EventLog-Security、EventLog-System

        Windows Registry Editor Version 5.00
    
        ;* no autolog
        ; https://www.reddit.com/r/Windows10/comments/8lpttt/howto_make_w10_log_less_prune_the_amount_of/
        ; https://gist.github.com/FadeMind/9500d49948654b50aa870706a8ac9f04
        [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\WMI\Autologger\AITEventLog]
        ; Disables Event Trace Session in Perfmon Data Collector Sets
        "Start"=dword:00000000
        [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\WMI\Autologger\AppModel]
        ;+ Disables Event Trace Session in Perfmon Data Collector Sets
        "Start"=dword:00000000
        [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\WMI\Autologger\AppPlat]
        ;+ Disables Event Trace Session in Perfmon Data Collector Sets
        "Start"=dword:00000000
        [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\WMI\Autologger\Audio]
        ; Disables Event Trace Session in Perfmon Data Collector Sets
        "Start"=dword:00000000
        [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\WMI\Autologger\AutoLogger-Diagtrack-Listener]
        ;* Disables %systemroot%\System32\LogFiles\WMI\Diagtrack-Listener.etl
        "Start"=dword:00000000
        [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\WMI\Autologger\Circular Kernel Context Logger]
        ; Disables Event Trace Session in Perfmon Data Collector Sets
        "Start"=dword:00000000
        [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\WMI\AutoLogger\DefenderApiLogger]
        ;+ Disables Event Trace Session in Perfmon Data Collector Sets
        "Start"=dword:00000000
        [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\WMI\AutoLogger\DiagLog]
        ; Disables Event Trace Session in Perfmon Data Collector Sets
        "Start"=dword:00000000
        [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\WMI\AutoLogger\DefenderAuditLogger]
        ;+ Disables Event Trace Session in Perfmon Data Collector Sets
        "Start"=dword:00000000
        [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\WMI\Autologger\FamilySafetyAOT]
        ;+ Disables Event Trace Session in Perfmon Data Collector Sets
        "Start"=dword:00000000
        [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\WMI\Autologger\LwtNetLog]
        ;+ Disables Event Trace Session in Perfmon Data Collector Sets
        "Start"=dword:00000000
        [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\WMI\Autologger\NtfsLog]
        ; Disables Event Trace Session in Perfmon Data Collector Sets
        "Start"=dword:00000000
        [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\WMI\Autologger\RadioMgr]
        ;* Disables %SystemRoot%\System32\LogFiles\WMI\RadioMgr.etl
        "Start"=dword:00000000
        [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\WMI\Autologger\ReadyBoot]
        ; Disables Event Trace Session in Perfmon Data Collector Sets
        "Start"=dword:00000000
        [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\WMI\Autologger\SQMLogger]
        ; Disables Event Trace Session in Perfmon Data Collector Sets
        "Start"=dword:00000000
        [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\WMI\Autologger\UBPM]
        "Start"=dword:00000000
        [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\WMI\Autologger\WdiContextLog]
        ; Disables Event Trace Session in Perfmon Data Collector Sets
        "Start"=dword:00000000
        [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\WMI\AutoLogger\WiFiSession]
        ;+ Disables Event Trace Session in Perfmon Data Collector Sets
        "Start"=dword:00000000
    
    • 0
  6. amymor
    2022-08-25T12:37:20+08:002022-08-25T12:37:20+08:00

    感谢其他人提供有用的信息,我创建了一个批处理脚本来禁用几乎所有日志。

    注意 1:Xbox 应用程序需要游戏服务跟踪日志,因此它不包含在我的脚本中,如果您不使用 Xbox 应用程序,只需将其卸载或禁用游戏服务并重新启动以禁用此类跟踪。

    注意 2:即使您禁用相关的事件日志注册表(包含在我的脚本中),UBPM 跟踪也不会禁用。我听说它结合到内核中。

    注意 3:脚本必须作为Trustedinstaller运行才能正常工作,否则访问某些密钥会被拒绝。如果您的系统环境变量中有Nsudo路径,则脚本使用 Nsudo 作为 Trustedinstaller 自行运行,否则您需要使用 Nsudo 或 AdvancedRun 等手动运行脚本作为 Trustedinstaller。

    这是我的脚本,用于自动查找注册表中的所有记录器并禁用它们(我将其分为 2 部分以便更容易理解,如果您有 Nsudo,请将 2 部分合并到一个批处理文件中,否则您需要将第 2 部分作为 Trustedinstaller 运行手动):

    第 1 部分)检查并作为 Trustedinstaller 运行自身

    @echo off
    setlocal & set runState=user
    whoami /groups | findstr /b /c:"Mandatory Label\High Mandatory Level" > nul && set runState=administrator
    whoami /groups | findstr /b /c:"Mandatory Label\System Mandatory Level" > nul && set runState=TISYSTEM
    echo [42m Running in state: "%runState%" [0m
    if "%runState%"=="TISYSTEM" (goto gotTISYSTEM) else (NSudoLG.exe -U:T -P:E -UseCurrentConsole "%~0" %* && exit /b)
    :gotTISYSTEM
    echo [42m Running as TtustesInstaller.[0m
    

    第 2 部分)获得 Trustedinstaller 权限(主要工作)

    @echo off
    echo [33m Auto-find and Disable all WMI\AutoLogger [0m
    echo [33m find all Auto-Loggers and set Enabled to 0[0m
    for /f "usebackq tokens=1*" %%a in (`reg query "HKLM\SYSTEM\CurrentControlSet\Control\WMI\AutoLogger" /s /f "Enabled"^| findstr "HKEY"`) do reg add "%%a %%b" /v "Enabled" /t REG_DWORD /d 0 /f
    echo.
    echo [33m find all Auto-Loggers and set Start to 0[0m
    for /f "usebackq tokens=1*" %%a in (`reg query "HKLM\SYSTEM\CurrentControlSet\Control\WMI\AutoLogger" /s /f "Start"^| findstr "HKEY"`) do reg add "%%a %%b" /v "Start" /t REG_DWORD /d 0 /f
    echo.
    echo.
    echo.
    echo [33m Auto-find and Disable all WINEVT [0m
    echo [33m find all WINEVT items and set Enabled to 0[0m
    for /f "usebackq tokens=1*" %%a in (`reg query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT" /s /f "Enabled"^| findstr "HKEY"`) do reg add "%%a %%b" /v "Enabled" /t REG_DWORD /d 0 /f
    echo.
    pause
    exit
    

    Extra step: some loggings arennt related to windows (like .Net apps that create some logs into C:\USERS\Your_User_Name\APPDATA\LOCAL\MICROSOFT\CLR_V4.0\USAGELOGS), how we stop such thing? answer: by fooling windows, i learned it from someone in Ntlite forum, just delete that folder (for example USAGELOGS), then create new text document but without extension and then rename it to that folder name, windows thinks that folder is existed so prevents you and apps from creating new folder with that name so apps cant create logs into that folder :)

    im trying to create a script for this part too, i will update my post when it's ready.

    更新 1 :在此处使用新脚本以避免在禁用/启用以太网网络适配器时破坏它的问题。如果您不使用以太网或不禁用它(始终打开),您仍然可以使用旧脚本甚至更多地抑制记录器。

    • 0

相关问题

  • VMware Workstation USB 仲裁服务无法自动启动

  • 如何在域和 Linux 活动目录中启用指纹传感器

  • 资源管理器侧面板中的桌面外壳快捷方式

  • 为什么我不能将文件从 Android 发送到 Windows 10?

  • 在多个文件上打开方式?

Sidebar

Stats

  • 问题 205573
  • 回答 270741
  • 最佳答案 135370
  • 用户 68524
  • 热门
  • 回答
  • Marko Smith

    如何减少“vmmem”进程的消耗?

    • 11 个回答
  • Marko Smith

    从 Microsoft Stream 下载视频

    • 4 个回答
  • Marko Smith

    Google Chrome DevTools 无法解析 SourceMap:chrome-extension

    • 6 个回答
  • Marko Smith

    Windows 照片查看器因为内存不足而无法运行?

    • 5 个回答
  • Marko Smith

    支持结束后如何激活 WindowsXP?

    • 6 个回答
  • Marko Smith

    远程桌面间歇性冻结

    • 7 个回答
  • Marko Smith

    子网掩码 /32 是什么意思?

    • 6 个回答
  • Marko Smith

    鼠标指针在 Windows 中按下的箭头键上移动?

    • 1 个回答
  • Marko Smith

    VirtualBox 无法以 VERR_NEM_VM_CREATE_FAILED 启动

    • 8 个回答
  • Marko Smith

    应用程序不会出现在 MacBook 的摄像头和麦克风隐私设置中

    • 5 个回答
  • Martin Hope
    CiaranWelsh 如何减少“vmmem”进程的消耗? 2020-06-10 02:06:58 +0800 CST
  • Martin Hope
    Jim Windows 10 搜索未加载,显示空白窗口 2020-02-06 03:28:26 +0800 CST
  • Martin Hope
    v15 为什么通过电缆(同轴电缆)的千兆位/秒 Internet 连接不能像光纤一样提供对称速度? 2020-01-25 08:53:31 +0800 CST
  • Martin Hope
    fixer1234 “HTTPS Everywhere”仍然相关吗? 2019-10-27 18:06:25 +0800 CST
  • Martin Hope
    andre_ss6 远程桌面间歇性冻结 2019-09-11 12:56:40 +0800 CST
  • Martin Hope
    Riley Carney 为什么在 URL 后面加一个点会删除登录信息? 2019-08-06 10:59:24 +0800 CST
  • Martin Hope
    zdimension 鼠标指针在 Windows 中按下的箭头键上移动? 2019-08-04 06:39:57 +0800 CST
  • Martin Hope
    jonsca 我所有的 Firefox 附加组件突然被禁用了,我该如何重新启用它们? 2019-05-04 17:58:52 +0800 CST
  • Martin Hope
    MCK 是否可以使用文本创建二维码? 2019-04-02 06:32:14 +0800 CST
  • Martin Hope
    SoniEx2 更改 git init 默认分支名称 2019-04-01 06:16:56 +0800 CST

热门标签

windows-10 linux windows microsoft-excel networking ubuntu worksheet-function bash command-line hard-drive

Explore

  • 主页
  • 问题
    • 最新
    • 热门
  • 标签
  • 帮助

Footer

AskOverflow.Dev

关于我们

  • 关于我们
  • 联系我们

Legal Stuff

  • Privacy Policy

Language

  • Pt
  • Server
  • Unix

© 2023 AskOverflow.DEV All Rights Reserve