I hereby claim:
- I am dyavuz on github.
- I am dyavuz (https://keybase.io/dyavuz) on keybase.
- I have a public key ASD_8fjlhKUs0x66fqL6oX6ULiWnAvaHXmP-xJJpbyXiLgo
To claim this, I am signing this object:
<Configuration> | |
<Add OfficeClientEdition="64" Channel="Current"> | |
<Product ID="O365ProPlusRetail"> | |
<Language ID="MatchOS" /> | |
<Language ID="tr-tr" /> | |
<ExcludeApp ID="Access" /> | |
<ExcludeApp ID="Bing" /> | |
<!-- <ExcludeApp ID="Excel" /> --> | |
<ExcludeApp ID="Groove" /> |
#################################################################################################### | |
# BOOTSTRAP # | |
#################################################################################################### | |
# Run script as Administrator if the session isn't elevated | |
if (-not ([Security.Principal.WindowsPrincipal][Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole]"Administrator")) { | |
$ArgumentList = "-NoExit -NoProfile -ExecutionPolicy Bypass -File `"$PSCommandPath`"" | |
Start-Process -FilePath "powershell.exe" -ArgumentList "$ArgumentList" -Verb RunAs | |
Exit | |
} |
# Disable Windows Defender within Safe Boot | |
$WdServices = $( | |
"MDCoreSvc" | |
"SecurityHealthService" | |
"WdNisSvc" | |
"WinDefend" | |
"wscsvc" | |
) | |
foreach ($WdService in $WdServices) { |
I hereby claim:
To claim this, I am signing this object: