To prevent damages and protect the use of third-party applications on Shadow, users must refrain from making any changes mentioned in this article. These changes range from installing various software to activities that could harm or disrupt the services provided by Shadow or third-parties.
Committing the following activities in this article may prevent Shadow from functioning properly:
- Reinstalling Windows
- Installing Antivirus, Firewalls, or VPNs
- Modifying Shadow
- Mining Cryptocurrency
- Torrenting, Pirating, or Downloading Illegal Content
- Server Hosting & Shared Computing
- Booting to Safe Mode
- Installing Virtualization Software
- Bypassing Automatic Hibernation
Windows comes preinstalled on your system using licenses provided to you by Shadow. If you'd like to format or reset your Windows operating system, see how to factory reset your Shadow.
Installing Antivirus, Firewalls, or VPNs
Antivirus, firewall, and VPN applications can interfere with Shadow's operations and, if installed, may require you to reset Shadow to factory settings. You may use the antivirus or firewall protection provided by Windows.
Antivirus, firewall, and VPN services may block or redirect your connection on Shadow, preventing you from accessing the service. We recommend contacting your security provider if issues occur.
You may not modify Shadow at any capacity, and doing so may result in the termination of your account.
Modifying Shadow constitutes as adding, deleting, or changing the following:
- Registry keys
- Changing the Windows registry can disable some services.
- Pay particular attention to "bloatware", "junkware", or other cleaning software like CCleaner, which may automatically change the registry.
- Shadow's processes, services, and hardware
- Removing the graphics card or the network card immediately stops the service.
- Using the components to overclock your Shadow are susceptible to breakdowns and is therefore forbidden.
- Shadow's BIOS
- Changing the BIOS can have a considerable impact on the functionality of Shadow. Should you lose access to your Shadow as a result of modifying the BIOS, you must reset your Shadow.
- Other Blade or Shadow programs
- Several programs run in the background are necessary for the proper functioning of the service.
- Overclocking Shadow
- Overclocking often overheats the CPU and may damage surrounding hardware within the data center. Overclocking will result in the termination of your account.
Torrenting, Pirating, or Downloading Illegal Content
Server Hosting & Shared Computing
- Computing pools
- Volunteer computing, such as Folding@home
- Grid computing
- Network computing, such as BOINC
As a reminder, Shadow may not be used for business or commercial purposes.
Booting to Safe Mode
Booting Shadow to Safe Mode or Safe Mode with Networking stops all streaming services. If Shadow has been booted to Safe Mode, you must reset your Shadow to factory settings.
Installing Virtualization Software
Shadow does not support virtualization software, including emulators, and cannot be modified to do so. Attempting to enable virtualization is considered a modification and is not supported.
Bypassing Automatic Hibernation
If you've encountered a problem or have committed any of the items above, contact Support from your account page for assistance. Mention the actions you took leading to the incident so we can assist you.