Over at Wilderssecurity somene posted a bit of registry code (me thinks). Which persistently routes MS-server IP's to nothing. To try avoiding MS getting your keystrokes. Can anyone show me how to use this? I recognize the first third part is registry key, the last 3rd is DOS based command. Do I put it all in a .reg file and execute?
Can you please tell me how to deploy the code instead of arguing? Thanks! Ah well, I copied and executed a route line, and found it back through windows registry. I guess just make a .BAT of the "route -p" alinea part and run it.
Question is the same as for hosts file blocking ... will it work with most stuff hardcoded inside DLL files ? Unlikely. Best option would be blocking at Router level.
I don't know. It's different from hosts file blocking. The hosts file only maps hostnames to IP addresses. It doesn't change the routing of the data. The route command on the other hand changes the local IP routing table. That might be enough, but we don't know. Best option is, like you said, blocking it at the router level. You would definitely want a router that supports wildcards though.
Good point. I might have been a bit fast with my comment. Could be worth a try so i will add it to the REPO. Cleaned IP list (afaik only the cmd commands should be needed): Spoiler Code: 8.254.209.254 68.232.34.200 66.119.144.190 65.55.39.10 65.55.252.93 65.55.252.92 65.55.252.71 65.55.252.63 65.55.252.43 65.55.108.23 65.52.108.29 65.52.100.94 65.52.100.93 65.52.100.92 65.52.100.91 65.52.100.9 65.52.100.7 65.52.100.11 64.4.6.100 64.4.54.32 64.4.54.22 23.99.10.11 23.218.212.69 23.102.21.4 216.58.209.166 207.68.166.254 207.46.223.94 207.46.194.25 207.46.101.29 207.123.56.252 204.79.197.200 198.78.208.254 194.44.4.208 194.44.4.200 185.13.160.61 173.194.113.220 173.194.113.219 168.63.108.233 157.56.91.82 157.56.91.77 157.56.77.139 157.56.74.250 157.56.23.91 157.56.121.89 157.55.129.21 134.170.58.189 134.170.58.123 134.170.58.121 134.170.58.118 134.170.53.30 134.170.53.29 134.170.51.190 134.170.185.70 134.170.115.60 131.107.113.238 111.221.29.177 104.82.22.249 104.82.14.146 131.253.18.253
HI, what are you saying. That even with all updates in OP blocked/hidden, your Windows system will still call out and send your data to MS servers? I can't even block 1 address in a hosts file so really not following what you are saying
Would say he used the given IPs (at that time) to block and still noticed traffic, adding the entries shown by wireshark, made them disappear. Date of the post: 09 Sep 2015, 11:54 .
Okay that one is smart @others. Can the automatic reset from "never check" to "auto check/update" be because of restore points you used recently? I do hope so if you follow my logic.
I got a question. Let's say a Windows machine is setup as a user is pleased to have. Is there a way to list all installed updates and use that list. To download these updates for future reinstall? Another one. What if I never use WU to check/install updates. But use WUMT instead on a fresh install. Would it be easier to list lots of updates at a time then say 5-10 at a time through WU?
#1. Yep, one way would be dism in admin cmd: Code: dism /online /get-packages #2. WUMT is a Front end for WU, so it searches using WU.
But we just have to avoid installing those numbers when they come up and we be alright, right? Or.. ?
Code: reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\Gwx /v DisableGwx /t REG_DWORD /d 1 /f reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate /v DisableOSUpgrade /t REG_DWORD /d 1 /f Will this also work for Win8.1 ?
I'm wondering if we're ok if we use simplix pack, since its creators claim to remove the spying updates from it?