The Notebook Review forums were hosted by TechTarget, who shut down them down on January 31, 2022. This static read-only archive was pulled by NBR forum users between January 20 and January 31, 2022, in an effort to make sure that the valuable technical information that had been posted on the forums is preserved. For current discussions, many NBR forum users moved over to NotebookTalk.net after the shutdown.
Problems? See this thread at archive.org.
← Previous pageNext page →

    Windows7/8 - Updates to hide to prevent Windows 10 Upgrade / Disable Telemetry

    Discussion in 'Windows OS and Software' started by Spartan@HIDevolution, Aug 23, 2015.

  1. toughasnails

    toughasnails Toughbook Moderator Moderator

    Reputations:
    7,109
    Messages:
    6,193
    Likes Received:
    2,254
    Trophy Points:
    331
    I did have problems with certain Web site's with 11. The last time I ran the batch file I did install 10 and have had no problems yet but also I have shut off all updates for now. I have lost all faith in M$. You might trust them but some of the things they have done these last few months leaves a bad taste in my mouth.
     
    Keith likes this.
  2. Spartan@HIDevolution

    Spartan@HIDevolution Company Representative

    Reputations:
    39,589
    Messages:
    23,560
    Likes Received:
    36,857
    Trophy Points:
    931
    Here what I've ended up doing on all my family members' machines. Install all the updates so they have some sort of security updates at least, then run the batch file to get rid of the bad ones, then disable Windows Updates altogether. There is no way around this for now as MS keeps unhiding the bad updates even if you hide them, like a freakin' virus.
     
    Ethrem and toughasnails like this.
  3. toughasnails

    toughasnails Toughbook Moderator Moderator

    Reputations:
    7,109
    Messages:
    6,193
    Likes Received:
    2,254
    Trophy Points:
    331
    I gave a new computer to my daughter for x-mas and that's exactly the way I set it up.
     
    Papusan and Spartan@HIDevolution like this.
  4. blindbroccoli

    blindbroccoli Notebook Geek

    Reputations:
    5
    Messages:
    81
    Likes Received:
    12
    Trophy Points:
    16
    I can't seem to find a way to contact the author of GWX Control Panel...if I right click the icon and go to Digital Signatures under Properties, then select the signature which is correct and click details, aside fr0m what he says should be there (and nothing else), there is a countersignature COMODO Time Stamp for Wednesday Nov. 25...does that mean the author has COMODO on his computer and forgot to mention that a reference to it would show up when one followed his instructions to check the integrity of the downloaded file? I did download the file directly from the Ultimate Outsider website.
     
  5. hmscott

    hmscott Notebook Nobel Laureate

    Reputations:
    7,110
    Messages:
    20,384
    Likes Received:
    25,139
    Trophy Points:
    931
    When I donated to him recently, I got a nice email from him a couple of days later. You could try that method of getting in touch. :)

    There is a Contacting the Author section at the bottom of his Blog.

    Downloads page, click on the Blog tab at the top:
    http://ultimateoutsider.com/downloads/

    Blog, scroll all the way to the bottom to the Contacting the Author section:
    http://blog.ultimateoutsider.com/

    Comodo is a service for getting certificates, here is their page for Code signing:

    Benefits of Comodo Code Signing Certificates
    https://www.comodo.com/business-security/code-signing-certificates/code-signing.php

    Video about Code signing certificates
    https://www.comodo.com/includes/video.php?f=http://download.comodo.com/comodovision/G22/g22_code_sign_cert.flv&title=Comodo Code Signing Certificate

    Comodo are legit, I have used them at a number of client sites over the years.
     
    Last edited: Dec 28, 2015
    stringbuzzzzzz likes this.
  6. blindbroccoli

    blindbroccoli Notebook Geek

    Reputations:
    5
    Messages:
    81
    Likes Received:
    12
    Trophy Points:
    16
    I'll assume Comodo countersignature belongs there.
     
    hmscott likes this.
  7. blindbroccoli

    blindbroccoli Notebook Geek

    Reputations:
    5
    Messages:
    81
    Likes Received:
    12
    Trophy Points:
    16
    Gwx control panel is running. All is good. Now what does DWS do if all the info on Gwx control panel is no, there remain no windows 10 download folders, and the monitor is enabled and running?
     
  8. hmscott

    hmscott Notebook Nobel Laureate

    Reputations:
    7,110
    Messages:
    20,384
    Likes Received:
    25,139
    Trophy Points:
    931
    I will post the contents of a DWS log file after a run, please read through it for what it did. You can also look at the images on his web site for the control dialogs.

    Click on the "Spoiler" button.
    [INFO] Latest version number: 716
    [INFO] Add to hosts - statsfe2.update.microsoft.com.akadns.net
    [INFO] Add to hosts - fe2.update.microsoft.com.akadns.net
    [INFO] Add to hosts - s0.2mdn.net
    [INFO] Add to hosts - survey.watson.microsoft.com
    [INFO] Add to hosts - view.atdmt.com
    [INFO] Add to hosts - watson.microsoft.com
    [INFO] Add to hosts - watson.ppe.telemetry.microsoft.com
    [INFO] Add to hosts - vortex.data.microsoft.com
    [INFO] Add to hosts - vortex-win.data.microsoft.com
    [INFO] Add to hosts - telecommand.telemetry.microsoft.com
    [INFO] Add to hosts - telecommand.telemetry.microsoft.com.nsatc.net
    [INFO] Add to hosts - oca.telemetry.microsoft.com
    [INFO] Add to hosts - sqm.telemetry.microsoft.com
    [INFO] Add to hosts - sqm.telemetry.microsoft.com.nsatc.net
    [INFO] Add to hosts - watson.telemetry.microsoft.com
    [INFO] Add to hosts - watson.telemetry.microsoft.com.nsatc.net
    [INFO] Add to hosts - redir.metaservices.microsoft.com
    [INFO] Add to hosts - choice.microsoft.com
    [INFO] Add to hosts - choice.microsoft.com.nsatc.net
    [INFO] Add to hosts - wes.df.telemetry.microsoft.com
    [INFO] Add to hosts - services.wes.df.telemetry.microsoft.com
    [INFO] Add to hosts - sqm.df.telemetry.microsoft.com
    [INFO] Add to hosts - telemetry.microsoft.com
    [INFO] Add to hosts - telemetry.appex.bing.net
    [INFO] Add to hosts - telemetry.urs.microsoft.com
    [INFO] Add to hosts - settings-sandbox.data.microsoft.com
    [INFO] Add to hosts - watson.live.com
    [INFO] Add to hosts - statsfe2.ws.microsoft.com
    [INFO] Add to hosts - corpext.msitadfs.glbdns2.microsoft.com
    [INFO] Add to hosts - compatexchange.cloudapp.net
    [INFO] Add to hosts - a-0001.a-msedge.net
    [INFO] Add to hosts - sls.update.microsoft.com.akadns.net
    [INFO] Add to hosts - diagnostics.support.microsoft.com
    [INFO] Add to hosts - corp.sts.microsoft.com
    [INFO] Add to hosts - statsfe1.ws.microsoft.com
    [INFO] Add to hosts - feedback.windows.com
    [INFO] Add to hosts - feedback.microsoft-hohm.com
    [INFO] Add to hosts - feedback.search.microsoft.com
    [INFO] Add to hosts - rad.msn.com
    [INFO] Add to hosts - preview.msn.com
    [INFO] Add to hosts - ad.doubleclick.net
    [INFO] Add to hosts - ads.msn.com
    [INFO] Add to hosts - ads1.msads.net
    [INFO] Add to hosts - ads1.msn.com
    [INFO] Add to hosts - a.ads1.msn.com
    [INFO] Add to hosts - a.ads2.msn.com
    [INFO] Add to hosts - adnexus.net
    [INFO] Add to hosts - adnxs.com
    [INFO] Add to hosts - az361816.vo.msecnd.net
    [INFO] Add to hosts - az512334.vo.msecnd.net
    [INFO] Add to hosts - ssw.live.com
    [INFO] Add to hosts - ca.telemetry.microsoft.com
    [INFO] Add to hosts - i1.services.social.microsoft.com
    [INFO] Add to hosts - i1.services.social.microsoft.com.nsatc.net
    [INFO] Add to hosts - df.telemetry.microsoft.com
    [INFO] Add to hosts - reports.wes.df.telemetry.microsoft.com
    [INFO] Add to hosts - cs1.wpc.v0cdn.net
    [INFO] Add to hosts - vortex-sandbox.data.microsoft.com
    [INFO] Add to hosts - oca.telemetry.microsoft.com.nsatc.net
    [INFO] Add to hosts - pre.footprintpredict.com
    [INFO] Add to hosts - spynet2.microsoft.com
    [INFO] Add to hosts - spynetalt.microsoft.com
    [INFO] Add to hosts - fe3.delivery.dsp.mp.microsoft.com.nsatc.net
    [INFO] Add to hosts - cache.datamart.windows.com
    [INFO] Add to hosts - db3wns2011111.wns.windows.com
    [INFO] Add to hosts - settings-win.data.microsoft.com
    [INFO] Add to hosts - v10.vortex-win.data.microsoft.com
    [INFO] Add to hosts - win10.ipv6.microsoft.com
    [INFO] Add to hosts - ca.telemetry.microsoft.com
    [INFO] Add to hosts - i1.services.social.microsoft.com.nsatc.net
    [INFO] Add hosts MS complete.
    [INFO] Add Windows Firewall rule: "104.96.147.3_Block"
    [INFO] Add Windows Firewall rule: "111.221.29.177_Block"
    [INFO] Add Windows Firewall rule: "111.221.29.253_Block"
    [INFO] Add Windows Firewall rule: "111.221.64.0-111.221.127.255_Block"
    [INFO] Add Windows Firewall rule: "131.253.40.37_Block"
    [INFO] Add Windows Firewall rule: "134.170.115.60_Block"
    [INFO] Add Windows Firewall rule: "134.170.165.248_Block"
    [INFO] Add Windows Firewall rule: "134.170.165.253_Block"
    [INFO] Add Windows Firewall rule: "134.170.185.70_Block"
    [INFO] Add Windows Firewall rule: "134.170.30.202_Block"
    [INFO] Add Windows Firewall rule: "137.116.81.24_Block"
    [INFO] Add Windows Firewall rule: "137.117.235.16_Block"
    [INFO] Add Windows Firewall rule: "157.55.129.21_Block"
    [INFO] Add Windows Firewall rule: "157.55.130.0-157.55.130.255_Block"
    [INFO] Add Windows Firewall rule: "157.55.133.204_Block"
    [INFO] Add Windows Firewall rule: "157.55.235.0-157.55.235.255_Block"
    [INFO] Add Windows Firewall rule: "157.55.236.0-157.55.236.255_Block"
    [INFO] Add Windows Firewall rule: "157.55.52.0-157.55.52.255_Block"
    [INFO] Add Windows Firewall rule: "157.55.56.0-157.55.56.255_Block"
    [INFO] Add Windows Firewall rule: "157.56.106.189_Block"
    [INFO] Add Windows Firewall rule: "157.56.121.89_Block"
    [INFO] Add Windows Firewall rule: "157.56.124.87_Block"
    [INFO] Add Windows Firewall rule: "157.56.91.77_Block"
    [INFO] Add Windows Firewall rule: "168.63.108.233_Block"
    [INFO] Add Windows Firewall rule: "191.232.139.2_Block"
    [INFO] Add Windows Firewall rule: "191.232.139.254_Block"
    [INFO] Add Windows Firewall rule: "191.232.80.58_Block"
    [INFO] Add Windows Firewall rule: "191.232.80.62_Block"
    [INFO] Add Windows Firewall rule: "191.237.208.126_Block"
    [INFO] Add Windows Firewall rule: "195.138.255.0-195.138.255.255_Block"
    [INFO] Add Windows Firewall rule: "2.22.61.43_Block"
    [INFO] Add Windows Firewall rule: "2.22.61.66_Block"
    [INFO] Add Windows Firewall rule: "204.79.197.200_Block"
    [INFO] Add Windows Firewall rule: "207.46.101.29_Block"
    [INFO] Add Windows Firewall rule: "207.46.114.58_Block"
    [INFO] Add Windows Firewall rule: "207.46.223.94_Block"
    [INFO] Add Windows Firewall rule: "207.68.166.254_Block"
    [INFO] Add Windows Firewall rule: "212.30.134.204_Block"
    [INFO] Add Windows Firewall rule: "212.30.134.205_Block"
    [INFO] Add Windows Firewall rule: "213.199.179.0-213.199.179.255_Block"
    [INFO] Add Windows Firewall rule: "23.102.21.4_Block"
    [INFO] Add Windows Firewall rule: "23.218.212.69_Block"
    [INFO] Add Windows Firewall rule: "23.223.20.82_Block"
    [INFO] Add Windows Firewall rule: "23.57.101.163_Block"
    [INFO] Add Windows Firewall rule: "23.57.107.163_Block"
    [INFO] Add Windows Firewall rule: "23.57.107.27_Block"
    [INFO] Add Windows Firewall rule: "23.99.10.11_Block"
    [INFO] Add Windows Firewall rule: "64.4.23.0-64.4.23.255_Block"
    [INFO] Add Windows Firewall rule: "64.4.54.22_Block"
    [INFO] Add Windows Firewall rule: "64.4.54.32_Block"
    [INFO] Add Windows Firewall rule: "64.4.6.100_Block"
    [INFO] Add Windows Firewall rule: "65.39.117.230_Block"
    [INFO] Add Windows Firewall rule: "65.39.117.230_Block"
    [INFO] Add Windows Firewall rule: "65.52.100.11_Block"
    [INFO] Add Windows Firewall rule: "65.52.100.7_Block"
    [INFO] Add Windows Firewall rule: "65.52.100.9_Block"
    [INFO] Add Windows Firewall rule: "65.52.100.91_Block"
    [INFO] Add Windows Firewall rule: "65.52.100.92_Block"
    [INFO] Add Windows Firewall rule: "65.52.100.93_Block"
    [INFO] Add Windows Firewall rule: "65.52.100.94_Block"
    [INFO] Add Windows Firewall rule: "65.52.108.29_Block"
    [INFO] Add Windows Firewall rule: "65.52.108.33_Block"
    [INFO] Add Windows Firewall rule: "65.55.108.23_Block"
    [INFO] Add Windows Firewall rule: "65.55.138.114_Block"
    [INFO] Add Windows Firewall rule: "65.55.138.126_Block"
    [INFO] Add Windows Firewall rule: "65.55.138.186_Block"
    [INFO] Add Windows Firewall rule: "65.55.223.0-65.55.223.255_Block"
    [INFO] Add Windows Firewall rule: "65.55.252.63_Block"
    [INFO] Add Windows Firewall rule: "65.55.252.71_Block"
    [INFO] Add Windows Firewall rule: "65.55.252.92_Block"
    [INFO] Add Windows Firewall rule: "65.55.252.93_Block"
    [INFO] Add Windows Firewall rule: "65.55.29.238_Block"
    [INFO] Add Windows Firewall rule: "65.55.39.10_Block"
    [INFO] Add Windows Firewall rule: "77.67.29.176_Block"
    [INFO] Add Windows Firewall rule: "WSearch_Block"
    [INFO] Ip list blocked
    [INFO] Disabled task: Microsoft\Office\Office ClickToRun Service Monitor
    [INFO] Disabled task: Microsoft\Office\OfficeTelemetryAgentFallBack2016
    [INFO] Disabled task: Microsoft\Office\OfficeTelemetryAgentLogOn2016
    [INFO] Disabled task: Microsoft\Windows\Customer Experience Improvement Program\KernelCeipTask
    [INFO] Disabled task: Microsoft\Windows\Customer Experience Improvement Program\UsbCeip
    [INFO] Disabled task: Microsoft\Windows\Power Efficiency Diagnostics\AnalyzeSystem
    [INFO] Disabled task: Microsoft\Windows\Shell\FamilySafetyMonitor
    [INFO] Disabled task: Microsoft\Windows\Shell\FamilySafetyRefresh
    [INFO] Disabled task: Microsoft\Windows\Application Experience\AitAgent
    [INFO] Disabled task: Microsoft\Windows\Application Experience\ProgramDataUpdater
    [INFO] Disabled task: Microsoft\Windows\Application Experience\StartupAppTask
    [INFO] Disabled task: Microsoft\Windows\Autochk\Proxy
    [INFO] Disabled task: Microsoft\Windows\Customer Experience Improvement Program\BthSQM
    [INFO] Disabled task: Microsoft\Windows\Customer Experience Improvement Program\Consolidator
    [INFO] Disabled task: Microsoft\Office\OfficeTelemetry\AgentFallBack2016
    [INFO] Disabled task: Microsoft\Office\OfficeTelemetry\OfficeTelemetryAgentLogOn2016
    [INFO] Disabled task: Microsoft\Windows\Application Experience\Microsoft Compatibility Appraiser
    [INFO] Disabled task: Microsoft\Windows\DiskDiagnostic\Microsoft-Windows-DiskDiagnosticDataCollector
    [INFO] Disabled task: Microsoft\Windows\Maintenance\WinSAT
    [INFO] Disabled task: Microsoft\Windows\Media Center\ActivateWindowsSearch
    [INFO] Disabled task: Microsoft\Windows\Media Center\ConfigureInternetTimeService
    [INFO] Disabled task: Microsoft\Windows\Media Center\DispatchRecoveryTasks
    [INFO] Disabled task: Microsoft\Windows\Media Center\ehDRMInit
    [INFO] Disabled task: Microsoft\Windows\Media Center\InstallPlayReady
    [INFO] Disabled task: Microsoft\Windows\Media Center\mcupdate
    [INFO] Disabled task: Microsoft\Windows\Media Center\MediaCenterRecoveryTask
    [INFO] Disabled task: Microsoft\Windows\Media Center\ObjectStoreRecoveryTask
    [INFO] Disabled task: Microsoft\Windows\Media Center\OCURActivate
    [INFO] Disabled task: Microsoft\Windows\Media Center\OCURDiscovery
    [INFO] Disabled task: Microsoft\Windows\Media Center\PBDADiscovery
    [INFO] Disabled task: Microsoft\Windows\Media Center\PBDADiscoveryW1
    [INFO] Disabled task: Microsoft\Windows\Media Center\PBDADiscoveryW2
    [INFO] Disabled task: Microsoft\Windows\Media Center\PvrRecoveryTask
    [INFO] Disabled task: Microsoft\Windows\Media Center\PvrScheduleTask
    [INFO] Disabled task: Microsoft\Windows\Media Center\RegisterSearch
    [INFO] Disabled task: Microsoft\Windows\Media Center\ReindexSearchRoot
    [INFO] Disabled task: Microsoft\Windows\Media Center\SqlLiteRecoveryTask
    [INFO] Disabled task: Microsoft\Windows\Media Center\UpdateRecordPath
    [INFO] Remove and Hide update KB3080149
    [INFO] Remove and Hide update KB3075249
    [INFO] Remove and Hide update KB3068708
    [INFO] Remove and Hide update KB3044374
    [INFO] Remove and Hide update KB3035583
    [INFO] Remove and Hide update KB3022345
    [INFO] Remove and Hide update KB3021917
    [INFO] Remove and Hide update KB3015249
    [INFO] Remove and Hide update KB3012973
    [INFO] Remove and Hide update KB2990214
    [INFO] Remove and Hide update KB2977759
    [INFO] Remove and Hide update KB2976978
    [INFO] Remove and Hide update KB2952664
    [INFO] Remove and Hide update KB2922324
    [INFO] Remove and Hide update KB971033
    [INFO] Remove and Hide update KB3083324
    [INFO] Remove and Hide update KB3083325
    [INFO] Remove and Hide update KB3088195
    [INFO] Remove and Hide update KB3093983
    [INFO] Remove and Hide update KB3093513
    [INFO] Remove and Hide update KB3042058
    [INFO] Remove and Hide update KB3083710
    [INFO] Remove and Hide update KB3050265
    [INFO] Remove and Hide update KB3112336
    [WARNING] GWX NOT FOUND <== GWX control panel already fixed this
     
  9. Seraiel

    Seraiel Notebook Consultant

    Reputations:
    55
    Messages:
    158
    Likes Received:
    110
    Trophy Points:
    56
    Because of the discussion about Comodo I want to add this link:

    Comodo free eMail certificate .

    So if you want, you can create your own network where only people in it can read the mails of others, and if you want, you can also sign all your eMails digitally to confirm that the eMail really came from you.

    I was interested in this, because I thought, that I could prevent my ISP and Google from reading my mails, something that I actually regard as a basic right, but seems encryption technology is not refined enough yet, because: Everybody that would want to read an encrypted eMail from you, would need your certificate (and the other way round when answering) . For me, this just isn't worth it, but being able to digitally sign my Mails I take gratefully :) .
     
  10. blindbroccoli

    blindbroccoli Notebook Geek

    Reputations:
    5
    Messages:
    81
    Likes Received:
    12
    Trophy Points:
    16
    So if I install DWS do they both run all the time? At the moment I assume not for DWS. So in what order do you run them and does Gwx control panel just keep running while you manually run DWS if you have monitor turned on? Then do you have to go back into Gwx control panel and turn monitor back on, or other settings? I'm not clear how the two programs interact. Btw I did have one instance of the monitor flashing and I had to reset one of the buttons in the Gwx control again and reboot, but it only happened once (so far). How often do you run DWS, hmscott?
     
  11. Spartan@HIDevolution

    Spartan@HIDevolution Company Representative

    Reputations:
    39,589
    Messages:
    23,560
    Likes Received:
    36,857
    Trophy Points:
    931
    no you don't have to run DWS all the time, just once to do the magic and that's it. Unless an updated version is out then you might wanna run it again just in case it has enhancements
     
    hmscott, Seraiel and toughasnails like this.
  12. blindbroccoli

    blindbroccoli Notebook Geek

    Reputations:
    5
    Messages:
    81
    Likes Received:
    12
    Trophy Points:
    16
    Clear, thanks.
     
  13. hmscott

    hmscott Notebook Nobel Laureate

    Reputations:
    7,110
    Messages:
    20,384
    Likes Received:
    25,139
    Trophy Points:
    931
    @Matrix Leader answered nicely, but I thought I would mention that for me I keep it around and use it a bit more, as I reload OS's for testing new SSD's/configuration, so recently I have used it a number of times - because I was restoring from the MSI BurnRecover Image to test from scratch install.

    Normally I would restore from a Macrium Reflect image of a new Windows 8.1 install patched and modded to current levels, to reduce startup time from a restore - the DWS run would already have been done in that image.

    For normal use running it once per new revision is enough. I check DWS's home/GIT pages the Saturday/Sunday following a new Patch Tuesday - he seems to get them out regularly around that time.
     
    toughasnails likes this.
  14. Ethrem

    Ethrem Notebook Prophet

    Reputations:
    1,404
    Messages:
    6,706
    Likes Received:
    4,735
    Trophy Points:
    431
    Glad to see the batch script is being maintained by @Matrix Leader and everyone has benefited from it. I'm going to run Windows Update today and then run the script actually, it's been a few weeks without updates.
     
  15. toughasnails

    toughasnails Toughbook Moderator Moderator

    Reputations:
    7,109
    Messages:
    6,193
    Likes Received:
    2,254
    Trophy Points:
    331
    @Ethrem my friend this is the best script that I have ever run on any laptop period and I thank you for this and @matrices Leader for keeping it updated. I would love to know how may computer users you guys have helped, members and nonmembers. I bet it's in the thousands. Great job guys :vbthumbsup:
     
  16. Ethrem

    Ethrem Notebook Prophet

    Reputations:
    1,404
    Messages:
    6,706
    Likes Received:
    4,735
    Trophy Points:
    431
    Thanks for the compliment. It took me a bit to figure out how to use the update manager but I'd say it was worth it :)

    By the way, your auto correct messed up Matrix lol
     
    Spartan@HIDevolution likes this.
  17. Spartan@HIDevolution

    Spartan@HIDevolution Company Representative

    Reputations:
    39,589
    Messages:
    23,560
    Likes Received:
    36,857
    Trophy Points:
    931
    Let's summon the Matrices to this thread :D
     
    toughasnails, hmscott and Ethrem like this.
  18. stringbuzzzzzz

    stringbuzzzzzz Notebook Consultant

    Reputations:
    27
    Messages:
    120
    Likes Received:
    28
    Trophy Points:
    41
    I always liked Comodo since it was recommended to me by a bud, years ago.

    They had the best system tools/reg cleaner, IMO.
     
    Last edited: Jan 3, 2016
    hmscott likes this.
  19. Seraiel

    Seraiel Notebook Consultant

    Reputations:
    55
    Messages:
    158
    Likes Received:
    110
    Trophy Points:
    56
    Updates from last tuesday all seem to be clean.

    KB3124275
    KB3108664
    KB3109560
    KB3110329
    KB3121212
    KB3121918
    KB3123479
    KB3124000
    KB3124001

    All around the same security whole, descriptions available at Microsoft.

    1 optional update from yesterday that is Windows 10 related again :mad:

    KB2952664 needs to be added to the list of updates to avoid and hide.

    This is really a joke. I have "turn off the upgrade to the latest version of Windows" on enabled in gpedit.msc, still I'm getting offered those updates. :mad:
     
  20. Todd Shipley

    Todd Shipley Newbie

    Reputations:
    17
    Messages:
    9
    Likes Received:
    26
    Trophy Points:
    16
    I very much appreciate your review, Seraiel! One thing I do after being notified of the new month's Windows updates, I review my list of hidden updates. Sure enough, update KB2952664 was no longer listed as a hidden update this month. I found KB2952664 was re-issued this month as a recommended update by Microsoft. As you suggested, Seraiel, I re-hid update KB2952664.

    Hopefully, all Windows 7 users who read this thread have Windows Update set to "Check for updates but let me choose whether to download and install them"; also, you should uncheck the box to "Give me recommended updates the same way I receive important updates".
     
  21. Todd Shipley

    Todd Shipley Newbie

    Reputations:
    17
    Messages:
    9
    Likes Received:
    26
    Trophy Points:
    16
  22. Spartan@HIDevolution

    Spartan@HIDevolution Company Representative

    Reputations:
    39,589
    Messages:
    23,560
    Likes Received:
    36,857
    Trophy Points:
    931
    inm8#2 likes this.
  23. Trabant Dave

    Trabant Dave Notebook Consultant

    Reputations:
    24
    Messages:
    108
    Likes Received:
    76
    Trophy Points:
    41
    Time to watch out again guys!

    Here in the UK today, 15th January, Windows has decided to 'unhide' all the telemetry and 'W10 downgrade' rubbish that I had hidden; seeing our friend KB3035583 set all those alarm bells ringing - it does pee me off that 'they' think that we are stupid enough to not realise that 'they' are trying to force these zombie updates upon us.....
     
  24. hmscott

    hmscott Notebook Nobel Laureate

    Reputations:
    7,110
    Messages:
    20,384
    Likes Received:
    25,139
    Trophy Points:
    931
    The best way to handle it is to use the GWX Control Panel program to automatically deal with GWX on Windows 7/8/8.1

    And, use Destroy Windows Spying to stop Telemetry on Windows 7/8/8.1/10

    Doing it by hand seems to be problematic, thanks @Todd Shipley :

    How 'Get Windows 10' sets its hooks into Windows 7 and 8.1
    http://www.infoworld.com/article/30...ts-hooks-into-windows-7-and-81.html?nsdr=true
     
    Last edited: Jan 15, 2016
    Todd Shipley likes this.
  25. Todd Shipley

    Todd Shipley Newbie

    Reputations:
    17
    Messages:
    9
    Likes Received:
    26
    Trophy Points:
    16
    I appreciate the "heads up" notification, Trabant Dave, regarding Microsoft reissuing the telemetry and Get Windows 10 (GWX) updates in the UK! Regarding the telemetry updates, I assume the following specific updates have been reissued: KB3068708, KB3075249, and KB3080149.
     
  26. Todd Shipley

    Todd Shipley Newbie

    Reputations:
    17
    Messages:
    9
    Likes Received:
    26
    Trophy Points:
    16
  27. hmscott

    hmscott Notebook Nobel Laureate

    Reputations:
    7,110
    Messages:
    20,384
    Likes Received:
    25,139
    Trophy Points:
    931
    The title of that article is:

    How 'Get Windows 10' sets its hooks into Windows 7 and 8.1
    http://www.infoworld.com/article/30...ts-hooks-into-windows-7-and-81.html?nsdr=true

    That's a different problem than I was discussing - I updated my post now that I realize Phoenix was talking about the Windows 10 Upgrade problem.

    I can see where the confusion came in... :)

    That is referring to Windows 7/8/8.1 users trying to stop GWX Windows 10 upgrades.

    The GWX Control Panel does work, as does Destroy Windows Spying to stop GWX from working.

    GWX Control Panel will also remove the downloaded Windows 10 Upgrade files and folder if they are found.

    And, GWX Control Panel can be run in Monitoring mode looking for Windows Update to try to reenable Windows 10 Upgrade and stop it.

    The Group Policy entries I am refering to have to do with running Windows 10, and trying to change the Update policies for automatic updates of drivers.

    Those can't be stopped, at least so far, by doing the Group Policy edits.
     
    Last edited: Jan 15, 2016
  28. Trabant Dave

    Trabant Dave Notebook Consultant

    Reputations:
    24
    Messages:
    108
    Likes Received:
    76
    Trophy Points:
    41
    Yes Todd, certainly those three, (KB3068708, KB3075249, and KB3080149) as well as our old 'friend' KB3035583, KB2882822, and many, many more! It seems like all the telemetry stuff - and other crud too - it even 'offered' me all the supplementary languages again, so some index file that holds info on the hidden updates is being fritzed; I've hidden all those language files too, and when they showed up again it was a red alert, and sure enough, the 'Usual Suspects' had been unhidden too....... SO; can anyone identify the file that's being nuked that holds the hidden update data - which could perhaps be backed up and copied back if W7 Update attempts this nonsense again?

    Regards
    Dave
     
  29. Ethrem

    Ethrem Notebook Prophet

    Reputations:
    1,404
    Messages:
    6,706
    Likes Received:
    4,735
    Trophy Points:
    431
    I really don't want to use third party tools... The batch script at least I know what its doing.
     
    hmscott likes this.
  30. hmscott

    hmscott Notebook Nobel Laureate

    Reputations:
    7,110
    Messages:
    20,384
    Likes Received:
    25,139
    Trophy Points:
    931
    You can read the dws.log files I posted for the entries listing what is done. There may be things you hadn't thought of, or added to your script.

    You can use that list to add to your hosts file and to add to block through your firewall.

    You can also get the list of processes/tasks to disable, and perhaps additional KB's to uninstall/hide.

    If you have already sync'd all that up into the script, then nevermind :)
     
    Ethrem likes this.
  31. Ethrem

    Ethrem Notebook Prophet

    Reputations:
    1,404
    Messages:
    6,706
    Likes Received:
    4,735
    Trophy Points:
    431
    No, all it does is remove the offending KBs which is plenty for me. I don't trust third party apps to do what they say they are going to do and nothing more. That batch script is completely viewable and I can see exactly what its going to do before it runs. You never know what consequences might arise out of messing with other things. I'd rather just remove the GWX and telemetry updates and leave everything else alone.
     
    toughasnails and hmscott like this.
  32. hmscott

    hmscott Notebook Nobel Laureate

    Reputations:
    7,110
    Messages:
    20,384
    Likes Received:
    25,139
    Trophy Points:
    931
    The blocking of IP's/IP ranges, blocking DNS host resolution in the Windows hosts file, disabling background tasks, all are part of the removal of telemetry and blocking outgoing data from your PC to Microsoft.

    It's not all done just through uninstalling the KB's...

    If you don't trust the implementation, binary, etc. You can still read the source code, or even just the dws.log file from one of my runs to get the elements to disable and block :)
     
    Ethrem likes this.
  33. Ethrem

    Ethrem Notebook Prophet

    Reputations:
    1,404
    Messages:
    6,706
    Likes Received:
    4,735
    Trophy Points:
    431
    If you've removed the "features" from the OS, it stands to reason that you shouldn't have to block anything though, does it not? I mean its not like 8.1 has been doing this all along. No, it came with updates. Removing those updates = no need for other changes.

    I can see the appeal for the super paranoid among us but when it comes down to it, my machine has all sketchy updates removed so I don't see the point in worrying about it.
     
    Spartan@HIDevolution likes this.
  34. hmscott

    hmscott Notebook Nobel Laureate

    Reputations:
    7,110
    Messages:
    20,384
    Likes Received:
    25,139
    Trophy Points:
    931
    Do you think we have found all the changes/updates/KB's that are doing telemetry?

    Why not block the hostname's /IP's / IP Ranges / Tasks that are known to be used for the sending/receiving of Telemetry?

    It's not like we need those IP's/hostname's to connect to them normally, and the tasks don't need to run if they aren't doing anything - if they exist they need to be disabled.

    An ounce of prevention is worth a pound of cure ;)
     
    Last edited: Jan 16, 2016
  35. alexhawker

    alexhawker Spent Gladiator

    Reputations:
    500
    Messages:
    2,540
    Likes Received:
    792
    Trophy Points:
    131
    I thought I read a while back that blocking the IPs through the host file didn't even work?


    Sent from my iPhone using Tapatalk
     
    hmscott likes this.
  36. hmscott

    hmscott Notebook Nobel Laureate

    Reputations:
    7,110
    Messages:
    20,384
    Likes Received:
    25,139
    Trophy Points:
    931
    hostnames are "blocked" through the Windows host file, not IP's / IP Ranges :)

    [INFO] Add to hosts - statsfe2.update.microsoft.com.akadns.net
    [INFO] Add to hosts - fe2.update.microsoft.com.akadns.net
    [INFO] Add to hosts - s0.2mdn.net
    [INFO] Add to hosts - survey.watson.microsoft.com
    [INFO] Add to hosts - view.atdmt.com
    [INFO] Add to hosts - watson.microsoft.com
    [INFO] Add to hosts - watson.ppe.telemetry.microsoft.com
    [INFO] Add to hosts - vortex.data.microsoft.com
    [INFO] Add to hosts - vortex-win.data.microsoft.com
    [INFO] Add to hosts - telecommand.telemetry.microsoft.com
    [INFO] Add to hosts - telecommand.telemetry.microsoft.com.nsatc.net
    [INFO] Add to hosts - oca.telemetry.microsoft.com
    [INFO] Add to hosts - sqm.telemetry.microsoft.com
    [INFO] Add to hosts - sqm.telemetry.microsoft.com.nsatc.net
    [INFO] Add to hosts - watson.telemetry.microsoft.com
    [INFO] Add to hosts - watson.telemetry.microsoft.com.nsatc.net
    [INFO] Add to hosts - redir.metaservices.microsoft.com
    [INFO] Add to hosts - choice.microsoft.com
    [INFO] Add to hosts - choice.microsoft.com.nsatc.net
    [INFO] Add to hosts - wes.df.telemetry.microsoft.com
    [INFO] Add to hosts - services.wes.df.telemetry.microsoft.com
    [INFO] Add to hosts - sqm.df.telemetry.microsoft.com
    [INFO] Add to hosts - telemetry.microsoft.com
    [INFO] Add to hosts - telemetry.appex.bing.net
    [INFO] Add to hosts - telemetry.urs.microsoft.com
    [INFO] Add to hosts - settings-sandbox.data.microsoft.com
    [INFO] Add to hosts - watson.live.com
    [INFO] Add to hosts - statsfe2.ws.microsoft.com
    [INFO] Add to hosts - corpext.msitadfs.glbdns2.microsoft.com
    [INFO] Add to hosts - compatexchange.cloudapp.net
    [INFO] Add to hosts - a-0001.a-msedge.net
    [INFO] Add to hosts - sls.update.microsoft.com.akadns.net
    [INFO] Add to hosts - diagnostics.support.microsoft.com
    [INFO] Add to hosts - corp.sts.microsoft.com
    [INFO] Add to hosts - statsfe1.ws.microsoft.com
    [INFO] Add to hosts - feedback.windows.com
    [INFO] Add to hosts - feedback.microsoft-hohm.com
    [INFO] Add to hosts - feedback.search.microsoft.com
    [INFO] Add to hosts - rad.msn.com
    [INFO] Add to hosts - preview.msn.com
    [INFO] Add to hosts - ad.doubleclick.net
    [INFO] Add to hosts - ads.msn.com
    [INFO] Add to hosts - ads1.msads.net
    [INFO] Add to hosts - ads1.msn.com
    [INFO] Add to hosts - a.ads1.msn.com
    [INFO] Add to hosts - a.ads2.msn.com
    [INFO] Add to hosts - adnexus.net
    [INFO] Add to hosts - adnxs.com
    [INFO] Add to hosts - az361816.vo.msecnd.net
    [INFO] Add to hosts - az512334.vo.msecnd.net
    [INFO] Add to hosts - ssw.live.com
    [INFO] Add to hosts - ca.telemetry.microsoft.com
    [INFO] Add to hosts - i1.services.social.microsoft.com
    [INFO] Add to hosts - df.telemetry.microsoft.com
    [INFO] Add to hosts - reports.wes.df.telemetry.microsoft.com
    [INFO] Add to hosts - cs1.wpc.v0cdn.net
    [INFO] Add to hosts - vortex-sandbox.data.microsoft.com
    [INFO] Add to hosts - oca.telemetry.microsoft.com.nsatc.net
    [INFO] Add to hosts - pre.footprintpredict.com
    [INFO] Add to hosts - spynet2.microsoft.com
    [INFO] Add to hosts - spynetalt.microsoft.com
    [INFO] Add to hosts - fe3.delivery.dsp.mp.microsoft.com.nsatc.net
    [INFO] Add to hosts - cache.datamart.windows.com
    [INFO] Add to hosts - db3wns2011111.wns.windows.com
    [INFO] Add to hosts - settings-win.data.microsoft.com
    [INFO] Add to hosts - v10.vortex-win.data.microsoft.com
    [INFO] Add to hosts - win10.ipv6.microsoft.com
    [INFO] Add to hosts - ca.telemetry.microsoft.com
    [INFO] Add to hosts - i1.services.social.microsoft.com.nsatc.net
    [INFO] Add to hosts - msnbot-207-46-194-33.search.msn.com
    [INFO] Add to hosts - settings.data.microsof.com
    [INFO] Add to hosts - telecommand.telemetry.microsoft.com.nsatc.net
    [INFO] Add hosts MS complete.
    # Destroy Windows Spying hostnames list - copy/paste into hosts file
    0.0.0.0 statsfe2.update.microsoft.com.akadns.net
    0.0.0.0 fe2.update.microsoft.com.akadns.net
    0.0.0.0 s0.2mdn.net
    0.0.0.0 survey.watson.microsoft.com
    0.0.0.0 view.atdmt.com
    0.0.0.0 watson.microsoft.com
    0.0.0.0 watson.ppe.telemetry.microsoft.com
    0.0.0.0 vortex.data.microsoft.com
    0.0.0.0 vortex-win.data.microsoft.com
    0.0.0.0 telecommand.telemetry.microsoft.com
    0.0.0.0 telecommand.telemetry.microsoft.com.nsatc.net
    0.0.0.0 oca.telemetry.microsoft.com
    0.0.0.0 sqm.telemetry.microsoft.com
    0.0.0.0 sqm.telemetry.microsoft.com.nsatc.net
    0.0.0.0 watson.telemetry.microsoft.com
    0.0.0.0 watson.telemetry.microsoft.com.nsatc.net
    0.0.0.0 redir.metaservices.microsoft.com
    0.0.0.0 choice.microsoft.com
    0.0.0.0 choice.microsoft.com.nsatc.net
    0.0.0.0 wes.df.telemetry.microsoft.com
    0.0.0.0 services.wes.df.telemetry.microsoft.com
    0.0.0.0 sqm.df.telemetry.microsoft.com
    0.0.0.0 telemetry.microsoft.com
    0.0.0.0 telemetry.appex.bing.net
    0.0.0.0 telemetry.urs.microsoft.com
    0.0.0.0 settings-sandbox.data.microsoft.com
    0.0.0.0 watson.live.com
    0.0.0.0 statsfe2.ws.microsoft.com
    0.0.0.0 corpext.msitadfs.glbdns2.microsoft.com
    0.0.0.0 compatexchange.cloudapp.net
    0.0.0.0 a-0001.a-msedge.net
    0.0.0.0 sls.update.microsoft.com.akadns.net
    0.0.0.0 diagnostics.support.microsoft.com
    0.0.0.0 corp.sts.microsoft.com
    0.0.0.0 statsfe1.ws.microsoft.com
    0.0.0.0 feedback.windows.com
    0.0.0.0 feedback.microsoft-hohm.com
    0.0.0.0 feedback.search.microsoft.com
    0.0.0.0 rad.msn.com
    0.0.0.0 preview.msn.com
    0.0.0.0 ad.doubleclick.net
    0.0.0.0 ads.msn.com
    0.0.0.0 ads1.msads.net
    0.0.0.0 ads1.msn.com
    0.0.0.0 a.ads1.msn.com
    0.0.0.0 a.ads2.msn.com
    0.0.0.0 adnexus.net
    0.0.0.0 adnxs.com
    0.0.0.0 az361816.vo.msecnd.net
    0.0.0.0 az512334.vo.msecnd.net
    0.0.0.0 ssw.live.com
    0.0.0.0 ca.telemetry.microsoft.com
    0.0.0.0 i1.services.social.microsoft.com
    0.0.0.0 df.telemetry.microsoft.com
    0.0.0.0 reports.wes.df.telemetry.microsoft.com
    0.0.0.0 cs1.wpc.v0cdn.net
    0.0.0.0 vortex-sandbox.data.microsoft.com
    0.0.0.0 oca.telemetry.microsoft.com.nsatc.net
    0.0.0.0 pre.footprintpredict.com
    0.0.0.0 spynet2.microsoft.com
    0.0.0.0 spynetalt.microsoft.com
    0.0.0.0 fe3.delivery.dsp.mp.microsoft.com.nsatc.net
    0.0.0.0 cache.datamart.windows.com
    0.0.0.0 db3wns2011111.wns.windows.com
    0.0.0.0 settings-win.data.microsoft.com
    0.0.0.0 v10.vortex-win.data.microsoft.com
    0.0.0.0 win10.ipv6.microsoft.com
    0.0.0.0 ca.telemetry.microsoft.com
    0.0.0.0 i1.services.social.microsoft.com.nsatc.net
    0.0.0.0 msnbot-207-46-194-33.search.msn.com
    0.0.0.0 settings.data.microsof.com
    0.0.0.0 telecommand.telemetry.microsoft.com.nsat-c.net

    These go into the Windows Firewall, but if you have a 3rd party Firewall like Norton Security, you need to manually add them to that 3rd party firewall.

    [INFO] Add Windows Firewall rule: "104.96.147.3_Block"
    [INFO] Add Windows Firewall rule: "111.221.29.177_Block"
    [INFO] Add Windows Firewall rule: "111.221.29.253_Block"
    [INFO] Add Windows Firewall rule: "111.221.64.0-111.221.127.255_Block"
    [INFO] Add Windows Firewall rule: "131.253.40.37_Block"
    [INFO] Add Windows Firewall rule: "134.170.115.60_Block"
    [INFO] Add Windows Firewall rule: "134.170.165.248_Block"
    [INFO] Add Windows Firewall rule: "134.170.165.253_Block"
    [INFO] Add Windows Firewall rule: "134.170.185.70_Block"
    [INFO] Add Windows Firewall rule: "134.170.30.202_Block"
    [INFO] Add Windows Firewall rule: "137.116.81.24_Block"
    [INFO] Add Windows Firewall rule: "137.117.235.16_Block"
    [INFO] Add Windows Firewall rule: "157.55.129.21_Block"
    [INFO] Add Windows Firewall rule: "157.55.130.0-157.55.130.255_Block"
    [INFO] Add Windows Firewall rule: "157.55.133.204_Block"
    [INFO] Add Windows Firewall rule: "157.55.235.0-157.55.235.255_Block"
    [INFO] Add Windows Firewall rule: "157.55.236.0-157.55.236.255_Block"
    [INFO] Add Windows Firewall rule: "157.55.240.220_Block"
    [INFO] Add Windows Firewall rule: "157.55.52.0-157.55.52.255_Block"
    [INFO] Add Windows Firewall rule: "157.55.56.0-157.55.56.255_Block"
    [INFO] Add Windows Firewall rule: "157.56.106.189_Block"
    [INFO] Add Windows Firewall rule: "157.56.121.89_Block"
    [INFO] Add Windows Firewall rule: "157.56.124.87_Block"
    [INFO] Add Windows Firewall rule: "157.56.91.77_Block"
    [INFO] Add Windows Firewall rule: "157.56.96.54_Block"
    [INFO] Add Windows Firewall rule: "168.63.108.233_Block"
    [INFO] Add Windows Firewall rule: "191.232.139.2_Block"
    [INFO] Add Windows Firewall rule: "191.232.139.254_Block"
    [INFO] Add Windows Firewall rule: "191.232.80.58_Block"
    [INFO] Add Windows Firewall rule: "191.232.80.62_Block"
    [INFO] Add Windows Firewall rule: "191.237.208.126_Block"
    [INFO] Add Windows Firewall rule: "195.138.255.0-195.138.255.255_Block"
    [INFO] Add Windows Firewall rule: "2.22.61.43_Block"
    [INFO] Add Windows Firewall rule: "2.22.61.66_Block"
    [INFO] Add Windows Firewall rule: "204.79.197.200_Block"
    [INFO] Add Windows Firewall rule: "207.46.101.29_Block"
    [INFO] Add Windows Firewall rule: "207.46.114.58_Block"
    [INFO] Add Windows Firewall rule: "207.46.223.94_Block"
    [INFO] Add Windows Firewall rule: "207.68.166.254_Block"
    [INFO] Add Windows Firewall rule: "212.30.134.204_Block"
    [INFO] Add Windows Firewall rule: "212.30.134.205_Block"
    [INFO] Add Windows Firewall rule: "213.199.179.0-213.199.179.255_Block"
    [INFO] Add Windows Firewall rule: "23.102.21.4_Block"
    [INFO] Add Windows Firewall rule: "23.218.212.69_Block"
    [INFO] Add Windows Firewall rule: "23.223.20.82_Block"
    [INFO] Add Windows Firewall rule: "23.57.101.163_Block"
    [INFO] Add Windows Firewall rule: "23.57.107.163_Block"
    [INFO] Add Windows Firewall rule: "23.57.107.27_Block"
    [INFO] Add Windows Firewall rule: "23.99.10.11_Block"
    [INFO] Add Windows Firewall rule: "64.4.23.0-64.4.23.255_Block"
    [INFO] Add Windows Firewall rule: "64.4.54.22_Block"
    [INFO] Add Windows Firewall rule: "64.4.54.32_Block"
    [INFO] Add Windows Firewall rule: "64.4.6.100_Block"
    [INFO] Add Windows Firewall rule: "65.39.117.230_Block"
    [INFO] Add Windows Firewall rule: "65.39.117.230_Block"
    [INFO] Add Windows Firewall rule: "65.52.100.11_Block"
    [INFO] Add Windows Firewall rule: "65.52.100.7_Block"
    [INFO] Add Windows Firewall rule: "65.52.100.9_Block"
    [INFO] Add Windows Firewall rule: "65.52.100.91_Block"
    [INFO] Add Windows Firewall rule: "65.52.100.92_Block"
    [INFO] Add Windows Firewall rule: "65.52.100.93_Block"
    [INFO] Add Windows Firewall rule: "65.52.100.94_Block"
    [INFO] Add Windows Firewall rule: "65.52.108.29_Block"
    [INFO] Add Windows Firewall rule: "65.52.108.33_Block"
    [INFO] Add Windows Firewall rule: "65.55.108.23_Block"
    [INFO] Add Windows Firewall rule: "65.55.138.114_Block"
    [INFO] Add Windows Firewall rule: "65.55.138.126_Block"
    [INFO] Add Windows Firewall rule: "65.55.138.186_Block"
    [INFO] Add Windows Firewall rule: "65.55.223.0-65.55.223.255_Block"
    [INFO] Add Windows Firewall rule: "65.55.252.63_Block"
    [INFO] Add Windows Firewall rule: "65.55.252.71_Block"
    [INFO] Add Windows Firewall rule: "65.55.252.92_Block"
    [INFO] Add Windows Firewall rule: "65.55.252.93_Block"
    [INFO] Add Windows Firewall rule: "65.55.29.238_Block"
    [INFO] Add Windows Firewall rule: "65.55.39.10_Block"
    [INFO] Add Windows Firewall rule: "77.67.29.176_Block"
    [INFO] Add Windows Firewall rule: "WSearch_Block"
    [INFO] Ip list blocked

    It's also not a bad idea to take one more step, and add these blockings to your perimeter firewall. :)
     
    Last edited: Jan 17, 2016
    Riley Martin, iunlock and alexhawker like this.
  37. iunlock

    iunlock 7980XE @ 5.4GHz

    Reputations:
    2,035
    Messages:
    4,533
    Likes Received:
    6,441
    Trophy Points:
    581
    Excellent thread. OP is there anyway to PM you mate? I wanted to share something with you to go toward this cause, but didn't want to post anything here, because I know someone will bark, "hijacking thread."

    Thanks for your contribution. This is awesome.
     
    toughasnails likes this.
  38. toughasnails

    toughasnails Toughbook Moderator Moderator

    Reputations:
    7,109
    Messages:
    6,193
    Likes Received:
    2,254
    Trophy Points:
    331
    Click on his signature then click "start a conversation"
     
    Dannemand and iunlock like this.
  39. iunlock

    iunlock 7980XE @ 5.4GHz

    Reputations:
    2,035
    Messages:
    4,533
    Likes Received:
    6,441
    Trophy Points:
    581
    Ah forgive me. I'm either really tired (which I am, long day) or I'm blind. This is what I'm prompt with:
    NotebookReview - Error
    This member limits who may view their full profile.


    OP are you okay with me asking some questions here on this thread? (All privacy/security related of course) I can always remove the post if need be... :p
     
  40. toughasnails

    toughasnails Toughbook Moderator Moderator

    Reputations:
    7,109
    Messages:
    6,193
    Likes Received:
    2,254
    Trophy Points:
    331
    You don't need to go into his profile. Just click his pic then click "start a conversation"
     
  41. iunlock

    iunlock 7980XE @ 5.4GHz

    Reputations:
    2,035
    Messages:
    4,533
    Likes Received:
    6,441
    Trophy Points:
    581
    Thanks. It must be my NoScript Add-On that is blocking something because all I get is a black pop up window with the profile pic along with some other info on there....hmm...
     

    Attached Files:

    • sig.png
      sig.png
      File size:
      52.6 KB
      Views:
      257
  42. toughasnails

    toughasnails Toughbook Moderator Moderator

    Reputations:
    7,109
    Messages:
    6,193
    Likes Received:
    2,254
    Trophy Points:
    331
    If it has something to do with this topic go ahead and post it. If not just start a new thread.
     
    Spartan@HIDevolution likes this.
  43. iunlock

    iunlock 7980XE @ 5.4GHz

    Reputations:
    2,035
    Messages:
    4,533
    Likes Received:
    6,441
    Trophy Points:
    581
    Roger that.

    OP, I believe this will compliment the blocking the telemetry for Windows 10 as it is constantly getting updated to include the new updates that roll out. I'm curious to hear your thoughts about it and I wouldn't be surprised if there are things you can see that would enhance it to make it more refined?

    Cheers
     
  44. toughasnails

    toughasnails Toughbook Moderator Moderator

    Reputations:
    7,109
    Messages:
    6,193
    Likes Received:
    2,254
    Trophy Points:
    331
    Well it sounds good but I really don't know anyone on that forum. Here I know and trust the members so I don't mind downloading a file. Don't get me wrong here. I am not saying there is something wrong with there script, just don't know the writer of the script. Maybe others here know that forum. Thanks for the link.
     
    Spartan@HIDevolution likes this.
  45. Spartan@HIDevolution

    Spartan@HIDevolution Company Representative

    Reputations:
    39,589
    Messages:
    23,560
    Likes Received:
    36,857
    Trophy Points:
    931
    Not adding any script from anywhere, that is for people to find, download, and decide whether to use it or not. This thread is only for telling the world what updates they should avoid. The script that we made is nothing but simply some command lines that uninstall all the *bad updates* in one go; has been created by a moderator here so we trust it.

    No offense meant and thank you for the contribution but I cannot add anything else to the thread. It's great and clean as is.
     
    toughasnails likes this.
  46. iunlock

    iunlock 7980XE @ 5.4GHz

    Reputations:
    2,035
    Messages:
    4,533
    Likes Received:
    6,441
    Trophy Points:
    581
    Fair enough. Cheers to the great cause of eliminating parasites.

    Sent from my SM-N910T using Tapatalk
     
    hmscott and toughasnails like this.
  47. Ethrem

    Ethrem Notebook Prophet

    Reputations:
    1,404
    Messages:
    6,706
    Likes Received:
    4,735
    Trophy Points:
    431
    For what it's worth, I went through the scripts and everything and that tool doesn't seem to do anything malicious unless there is some sort of malware embedded in setacl.exe which if you want to make certain there isn't, you can get a clean copy from http://helgeklein.com

    That said, DWS seems a lot more comprehensive albeit irreversible.
     
    hmscott and Spartan@HIDevolution like this.
  48. hmscott

    hmscott Notebook Nobel Laureate

    Reputations:
    7,110
    Messages:
    20,384
    Likes Received:
    25,139
    Trophy Points:
    931
    Thanks for posting, nice find.

    Script for Win 7/8 to block all telemetry updates and Windows 10 upgrade components
    https://voat.co/v/technology/comments/459263

    After reading the .cmd scripts, and checking out the .exe, I decided to run it and see what it did on my Windows 8.1 install (I have image backups :) ), and it's pretty nice - it has items not included in DWS.

    And, that is the point of checking out other works in this area, not everyone (group) will think of or find all the related items - MS counts on that I am sure.

    The only way to tighten up the perimeter security - find all the holes MS is using - on our PC's is to continue to share and merge findings - eventually in 1 runable tool for Windows 7, 8, 8.1, 10 - or several tools - which is what I do now.

    Aegis is now 1 of those tools, but I / you will want to edit the block.cmd / unblock.cmd scripts to fine tune them for our personal web access needs.

    Aegis is a bit too tight in the host/IP blocking - it blocks outlook.com, microsoft.com, msn.com, etc, which I still use. And, it blocks bing.com - which I don't use.

    The block.cmd also has counterpart undo script, unblock.com which is nice.

    If you want to use Aegis, I would save a copy of the .cmds, and edit at least the block.cmd to comment out the hosts you know you want to use before running it.

    Here is the aegis.cmd output captured from the cmd window, I ran it without editing the cmd scripts to be able to show you all that it does "out of the box":
    -/- aegis v1.9 by https://voat.co/u/thepower ( https://tiny.cc/aegis-voat)

    press ctrl-c to cancel, enter to continue


    step 1/8: disable gwx/skydrive/spynet/telemetry/wifisense ...


    step 2/8: disable/hide windows 10 download directory ...


    step 3/8: uninstall updates ...

    01/31 - uninstall kb 971033 ( https://support.microsoft.com/en-us/kb/971033)
    02/31 - uninstall kb 2902907 ( https://support.microsoft.com/en-us/kb/2902907)
    03/31 - uninstall kb 2922324 ( https://support.microsoft.com/en-us/kb/2922324)
    04/31 - uninstall kb 2952664 ( https://support.microsoft.com/en-us/kb/2952664)
    05/31 - uninstall kb 2976978 ( https://support.microsoft.com/en-us/kb/2976978)
    06/31 - uninstall kb 2977759 ( https://support.microsoft.com/en-us/kb/2977759)
    07/31 - uninstall kb 2990214 ( https://support.microsoft.com/en-us/kb/2990214)
    08/31 - uninstall kb 2999226 ( https://support.microsoft.com/en-us/kb/2999226)
    09/31 - uninstall kb 3012973 ( https://support.microsoft.com/en-us/kb/3012973)
    10/31 - uninstall kb 3014460 ( https://support.microsoft.com/en-us/kb/3014460)
    11/31 - uninstall kb 3015249 ( https://support.microsoft.com/en-us/kb/3015249)
    12/31 - uninstall kb 3021917 ( https://support.microsoft.com/en-us/kb/3021917)
    13/31 - uninstall kb 3022345 ( https://support.microsoft.com/en-us/kb/3022345)
    14/31 - uninstall kb 3035583 ( https://support.microsoft.com/en-us/kb/3035583)
    15/31 - uninstall kb 3044374 ( https://support.microsoft.com/en-us/kb/3044374)
    16/31 - uninstall kb 3046480 ( https://support.microsoft.com/en-us/kb/3046480)
    17/31 - uninstall kb 3050265 ( https://support.microsoft.com/en-us/kb/3050265)
    18/31 - uninstall kb 3050267 ( https://support.microsoft.com/en-us/kb/3050267)
    19/31 - uninstall kb 3065987 ( https://support.microsoft.com/en-us/kb/3065987)
    20/31 - uninstall kb 3065988 ( https://support.microsoft.com/en-us/kb/3065988)
    21/31 - uninstall kb 3068708 ( https://support.microsoft.com/en-us/kb/3068708)
    22/31 - uninstall kb 3075249 ( https://support.microsoft.com/en-us/kb/3075249)
    23/31 - uninstall kb 3075851 ( https://support.microsoft.com/en-us/kb/3075851)
    24/31 - uninstall kb 3075853 ( https://support.microsoft.com/en-us/kb/3075853)
    25/31 - uninstall kb 3080149 ( https://support.microsoft.com/en-us/kb/3080149)
    26/31 - uninstall kb 3083324 ( https://support.microsoft.com/en-us/kb/3083324)
    27/31 - uninstall kb 3083325 ( https://support.microsoft.com/en-us/kb/3083325)
    28/31 - uninstall kb 3083710 ( https://support.microsoft.com/en-us/kb/3083710)
    29/31 - uninstall kb 3083711 ( https://support.microsoft.com/en-us/kb/3083711)
    30/31 - uninstall kb 3112343 ( https://support.microsoft.com/en-us/kb/3112343)
    31/31 - uninstall kb 3112336 ( https://support.microsoft.com/en-us/kb/3112336)

    step 4/8: hide updates (this may take a while, be patient) ...

    Microsoft (R) Windows Script Host Version 5.8
    Copyright (C) Microsoft Corporation. All rights reserved.

    Searching for updates ...13 found.
    Hiding update: Update for Windows 8.1 for x64-based Systems (KB3046480)
    Update already hidden: Update for Windows 8.1 for x64-based Systems (KB3044374)
    Update already hidden: Update for Windows 8.1 for x64-based Systems (KB3075249)
    Update already hidden: Update for Windows 8.1 for x64-based Systems (KB3080149)
    Hiding update: Update for Windows 8.1 for x64-based Systems (KB2999226)
    Update already hidden: Update for Windows 8.1 for x64-based Systems (KB3112336)
    Update already hidden: Update for Windows 8.1 for x64-based Systems (KB3035583)
    Update already hidden: Update for Windows 8.1 for x64-based Systems (KB2976978)


    step 5/8: disable scheduled tasks ...


    step 6/8: uninstall diagtrack ...


    step 7/8: disable remote registry ...


    step 8/8: block hosts ...

    block a-0001.a-msedge.net
    block a-0002.a-msedge.net
    block a-0003.a-msedge.net
    block a-0004.a-msedge.net
    block a-0005.a-msedge.net
    block a-0006.a-msedge.net
    block a-0007.a-msedge.net
    block a-0008.a-msedge.net
    block a-0009.a-msedge.net
    block a23-218-212-69.deploy.static.akamaitechnologies.com
    block a.ads1.msn.com
    block a.ads2.msads.net
    block a.ads2.msn.com
    block ac3.msn.com
    block activation.playready.microsoft.com
    block ad.doubleclick.net
    block ads1.msads.net
    block ads1.msn.com
    block adsmockarc.azurewebsites.net
    block ads.msn.com
    block adsyndication.msn.com
    block aidps.atdmt.com
    block ajax.aspnetcdn.com
    block aka-cdn-ns.adtech.de
    block a-msedge.net
    block api.bing.com
    block appexmapsappupdate.blob.core.windows.net
    block apps.skype.com
    block a.rad.msn.com
    block au.au-msedge.net
    block auth.gfx.ms
    block az361816.vo.msecnd.net
    block az512334.vo.msecnd.net
    block b.ads1.msn.com
    block b.ads2.msads.net
    block bingads.microsoft.com
    block bing.com
    block b.rad.msn.com
    block bs.serving-sys.com
    block c1.microsoft.com
    block c.atdmt.com
    block cdn.atdmt.com
    block cdn.content.prod.cms.msn.com
    block cdp1.public-trust.com
    block cds26.ams9.msecn.net
    block choice.microsoft.com
    block choice.microsoft.com.nsatc.net
    block c.microsoft.com
    block c.msn.com
    block cmsresources.windowsphone.com
    block compatexchange.cloudapp.net
    block content.windows.microsoft.com
    block corpext.msitadfs.glbdns2.microsoft.com
    block corp.sts.microsoft.com
    block cs1.wpc.v0cdn.net
    block c.s-microsoft.com
    block db3aqu.atdmt.com
    block dc.services.visualstudio.com
    block dev.virtualearth.net
    block df.telemetry.microsoft.com
    block diagnostics.support.microsoft.com
    block displaycatalog.md.mp.microsoft.com
    block dl.delivery.mp.microsoft.com
    block dmd.metaservices.microsoft.com
    block download.microsoft.com
    block download-ssl.msgamestudios.com
    block ec.atdmt.com
    block ecn.dev.virtualearth.net
    block en-us.appex-rf.msn.com
    block fe2.update.microsoft.com.akadns.net
    block fe3.delivery.mp.microsoft.com
    block feedback.microsoft-hohm.com
    block feedback.search.microsoft.com
    block feedback.windows.com
    block ff4a487e56259f4bd5831e9e30470e83.azr.msnetworkanalytics.testanalytics.net
    block flex.msn.com
    block geo-prod.do.dsp.mp.microsoft.com
    block g.live.com
    block g.msn.com
    block go.microsoft.com
    block go.skype.com
    block h1.msn.com
    block h2.msn.com
    block help.bingads.microsoft.com
    block hotmail.com
    block i1.services.social.microsoft.com
    block i1.services.social.microsoft.com.nsatc.net
    block iecvlist.microsoft.com
    block ieonline.microsoft.com
    block img-s-msn-com.akamaized.net
    block inference.location.live.net
    block js.microsoft.com
    block lb1. www.ms.akadns.net
    block licensing.md.mp.microsoft.com
    block live.rads.msn.com
    block livetileedge.dsx.mp.microsoft.com
    block logging.windows.microsoft.com
    block login.live.com
    block login.live.com.nsatc.net
    block m.adnxs.com
    block mediadiscovery.microsoft.com
    block m.hotmail.com
    block microsoft.com
    block msedge.net
    block msftncsi.com
    block msnbc.com
    block msnbot-65-55-108-23.search.msn.com
    block msn.com
    block msnportal.112.2o7.net
    block msntest.serving-sys.com
    block nexus.officeapps.live.com
    block oca.telemetry.microsoft.com
    block oca.telemetry.microsoft.com.nsatc.net
    block ocsp.msocsp.com
    block ocsp.omniroot.com
    block ocsp.startssl.com
    block officeclient.microsoft.com
    block outlook.com
    block pipe.skype.com
    block platform.bing.com
    block pre.footprintpredict.com
    block preview.msn.com
    block pricelist.skype.com
    block r20swj13mr.microsoft.com
    block rad.live.com
    block rad.msn.com
    block redir.metaservices.microsoft.com
    block reports.wes.df.telemetry.microsoft.com
    block sb.scorecardresearch.com
    block schemas.microsoft.akadns.net
    block secure.adnxs.com
    block secure.flashtalking.com
    block services.wes.df.telemetry.microsoft.com
    block settings.data.microsoft.com
    block settings-sandbox.data.microsoft.com
    block settings-ssl.xboxlive.com
    block settings-win.data.microsoft.com
    block s.gateway.messenger.live.com
    block sgmetrics.cloudapp.net
    block shell.windows.com
    block sls.update.microsoft.com
    block sls.update.microsoft.com.akadns.net
    block sls.update.microsoft.com.nsatc.net
    block sO.2mdn.net
    block social.answers.microsoft.com
    block spynet2.microsoft.com
    block spynetalt.microsoft.com
    block sqm.df.telemetry.microsoft.com
    block sqm.microsoft.com
    block sqm.telemetry.microsoft.com
    block sqm.telemetry.microsoft.com.nsatc.net
    block ssw.live.com
    block static.2mdn.net
    block statsfe1.ws.microsoft.com
    block statsfe2.update.microsoft.com.akadns.net
    block statsfe2.ws.microsoft.com
    block storeedgefd.dsx.mp.microsoft.com
    block store-images.microsoft.com
    block survey.watson.microsoft.com
    block t0.ssl.ak.dynamic.tiles.virtualearth.net
    block t0.ssl.ak.tiles.virtualearth.net
    block telecommand.telemetry.microsoft.com
    block telecommand.telemetry.microsoft.com.nsatc.net
    block telemetry.appex.bing.net
    block telemetry.microsoft.com
    block telemetry.urs.microsoft.com
    block tile-service.weather.microsoft.com
    block tlu.dl.delivery.mp.microsoft.com
    block ui.skype.com
    block urs.microsoft.com
    block vassg141.ocsp.omniroot.com
    block version.hybrid.api.here.com
    block view.atdmt.com
    block vortex-bn2.metron.live.com.nsatc.net
    block vortex-cy2.metron.live.com.nsatc.net
    block vortex.data.microsoft.com
    block vortex-sandbox.data.microsoft.com
    block vortex-win.data.microsoft.com
    block watson.live.com
    block watson.microsoft.com
    block watson.ppe.telemetry.microsoft.com
    block watson.telemetry.microsoft.com
    block watson.telemetry.microsoft.com.nsatc.net
    block wes.df.telemetry.microsoft.com
    block www.microsoft.com
    block www.modern.ie
    block www.msftncsi.com
    block www.msn.com

    done

    Thanks again to @iunlock !!
     
    Last edited: Jan 18, 2016
  49. hmscott

    hmscott Notebook Nobel Laureate

    Reputations:
    7,110
    Messages:
    20,384
    Likes Received:
    25,139
    Trophy Points:
    931
    @Phoenix blocks PM's, so you need to post here - and don't forget to use the @tag command in the text so @Phoenix gets an alert to come and find it.

    You don't need to @tag someone if you reply to them, and you only need to do it once per posting, I was breaking those rules to alert you to pay attention to all the @'s. :cool:
     
    iunlock likes this.
  50. iunlock

    iunlock 7980XE @ 5.4GHz

    Reputations:
    2,035
    Messages:
    4,533
    Likes Received:
    6,441
    Trophy Points:
    581
    Couldn't have said it any better, " The only way to tighten up the perimeter security - find all the holes MS is using - on our PC's is to continue to share and merge findings - eventually in 1 runable tool for Windows 7, 8, 8.1, 10 - or several tools - which is what I do now." - hmscott

    This was and still is my intent all along. The greatness that comes out of all of this is having the ability to have choices for those like us who, "care" about security/privacy.

    Thanks for verifying the cleanliness, which is one of the things I wanted to put to rest by someone like you thoroughly examining it.

    Based on your knowledge, would you say that by combining the great works of the OP with similar tools like Aegis, be a pretty solid start to fight communism? (MS and alike)...

    It's my pleasure for being an OCD, maticulius and '2nd place isn't good enough,' observing student. Although obvious, I firmly believe that the only way to progress in this fight is to combine resources to strengthen the cause by winning with numbers. There's more of us than there are them.

    Thanks OP and thanks to this awesome community.

    Sent from my SM-N910T using Tapatalk
     
    hmscott likes this.
← Previous pageNext page →