-
-
Save jrnt30/0044c45c81f353c986b2 to your computer and use it in GitHub Desktop.
Windows 10 seems to be an privacy nightmare, here is how you can stop the home calling function
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
@echo off | |
cls | |
echo This Script will do the following: | |
echo Disable Data Logging Services | |
echo Configure Windows Explorer | |
echo Uninstall Onedrive | |
echo Edit the Hosts file to block sending Telemetry Data to Microsoft | |
echo. | |
echo press any key to continue... | |
pause > NUL | |
echo Checking for Administrator elevation... | |
echo. | |
openfiles > NUL 2>&1 | |
if %errorlevel%==0 ( | |
echo Elevation found! Proceeding... | |
) else ( | |
echo You are not running as Administrator... | |
echo This batch cannot do it's job without elevation! | |
echo. | |
echo Right-click and select ^'Run as Administrator^' and try again... | |
echo. | |
echo Press any key to exit... | |
pause > NUL | |
exit | |
) | |
echo. | |
echo Disabling Data Logging Services | |
sc config diagtrack start=disabled | |
sc config dmwappushservice start=disabled | |
sc config RetailDemo start=disabled | |
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\DataCollection" /v AllowTelemetry /t REG_DWORD /d 0 /f > NUL 2>&1 | |
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Policies\DataCollection" /v AllowTelemetry /t REG_DWORD /d 0 /f > NUL 2>&1 | |
schtasks /change /TN "\Microsoft\Windows\Application Experience\Microsoft Compatibility Appraiser" /DISABLE | |
schtasks /change /TN "\Microsoft\Windows\Application Experience\ProgramDataUpdater" /DISABLE | |
schtasks /change /TN "\Microsoft\Windows\Customer Experience Improvement Program\Consolidator" /DISABLE | |
schtasks /change /TN "\Microsoft\Windows\Customer Experience Improvement Program\KernelCeipTask" /DISABLE | |
schtasks /change /TN "\Microsoft\Windows\Customer Experience Improvement Program\UsbCeip" /DISABLE | |
echo. | |
echo Removing all Folders from MyPC | |
REG DELETE "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{088e3905-0323-4b02-9826-5d99428e115f}" /f > NUL 2>&1 | |
REG DELETE "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{1CF1260C-4DD0-4ebb-811F-33C572699FDE}" /f > NUL 2>&1 | |
REG DELETE "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{24ad3ad4-a569-4530-98e1-ab02f9417aa8}" /f > NUL 2>&1 | |
REG DELETE "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{374DE290-123F-4565-9164-39C4925E467B}" /f > NUL 2>&1 | |
REG DELETE "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{3ADD1653-EB32-4cb0-BBD7-DFA0ABB5ACCA}" /f > NUL 2>&1 | |
REG DELETE "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{3dfdf296-dbec-4fb4-81d1-6a3438bcf4de}" /f > NUL 2>&1 | |
REG DELETE "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{A0953C92-50DC-43bf-BE83-3742FED03C9C}" /f > NUL 2>&1 | |
REG DELETE "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{A8CDFF1C-4878-43be-B5FD-F8091C1C60D0}" /f > NUL 2>&1 | |
REG DELETE "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{B4BFCC3A-DB2C-424C-B029-7FE99A87C641}" /f > NUL 2>&1 | |
REG DELETE "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{d3162b92-9365-467a-956b-92703aca08af}" /f > NUL 2>&1 | |
REG DELETE "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{f86fa3ab-70d2-4fc7-9c99-fcbf05467f3a}" /f > NUL 2>&1 | |
echo. | |
echo Setup Windows Explorer View | |
REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v LaunchTo /t REG_DWORD /d 1 /f > NUL 2>&1 | |
REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v HideFileExt /t REG_DWORD /d 0 /f > NUL 2>&1 | |
REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v Hidden /t REG_DWORD /d 1 /f > NUL 2>&1 | |
REG DELETE "HKEY_CLASSES_ROOT\CABFolder\CLSID" /f > NUL 2>&1 | |
REG DELETE "HKEY_CLASSES_ROOT\SystemFileAssociations\.cab\CLSID" /f > NUL 2>&1 | |
REG DELETE "HKEY_CLASSES_ROOT\CompressedFolder\CLSID" /f > NUL 2>&1 | |
REG DELETE "HKEY_CLASSES_ROOT\SystemFileAssociations\.zip\CLSID" /f > NUL 2>&1 | |
echo. | |
echo Uninstalling OneDrive | |
set x86="%SYSTEMROOT%\System32\OneDriveSetup.exe" | |
set x64="%SYSTEMROOT%\SysWOW64\OneDriveSetup.exe" | |
taskkill /f /im OneDrive.exe > NUL 2>&1 | |
ping 127.0.0.1 -n 5 > NUL 2>&1 | |
if exist %x64% ( | |
%x64% /uninstall | |
) else ( | |
%x86% /uninstall | |
) | |
ping 127.0.0.1 -n 8 > NUL 2>&1 | |
rd "%USERPROFILE%\OneDrive" /Q /S > NUL 2>&1 | |
rd "C:\OneDriveTemp" /Q /S > NUL 2>&1 | |
rd "%LOCALAPPDATA%\Microsoft\OneDrive" /Q /S > NUL 2>&1 | |
rd "%PROGRAMDATA%\Microsoft OneDrive" /Q /S > NUL 2>&1 | |
echo. | |
echo Removeing OneDrive from the Explorer Side Panel. | |
REG DELETE "HKEY_CLASSES_ROOT\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}" /f > NUL 2>&1 | |
REG DELETE "HKEY_CLASSES_ROOT\Wow6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}" /f > NUL 2>&1 | |
echo. | |
echo Editing Hosts File | |
SET NEWLINE=^& echo. | |
FIND /C /I "telemetry.microsoft.com" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1 | |
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 telemetry.microsoft.com>>%WINDIR%\System32\drivers\etc\hosts | |
FIND /C /I "vortex.data.microsoft.com" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1 | |
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 vortex.data.microsoft.com>>%WINDIR%\System32\drivers\etc\hosts | |
FIND /C /I "vortex-win.data.microsoft.com" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1 | |
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 vortex-win.data.microsoft.com>>%WINDIR%\System32\drivers\etc\hosts | |
FIND /C /I "telecommand.telemetry.microsoft.com" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1 | |
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 telecommand.telemetry.microsoft.com>>%WINDIR%\System32\drivers\etc\hosts | |
FIND /C /I "telecommand.telemetry.microsoft.com.nsatc.net" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1 | |
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 telecommand.telemetry.microsoft.com.nsatc.net>>%WINDIR%\System32\drivers\etc\hosts | |
FIND /C /I "oca.telemetry.microsoft.com" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1 | |
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 oca.telemetry.microsoft.com>>%WINDIR%\System32\drivers\etc\hosts | |
FIND /C /I "oca.telemetry.microsoft.com.nsatc.net" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1 | |
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 oca.telemetry.microsoft.com.nsatc.net>>%WINDIR%\System32\drivers\etc\hosts | |
FIND /C /I "sqm.telemetry.microsoft.com" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1 | |
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 sqm.telemetry.microsoft.com>>%WINDIR%\System32\drivers\etc\hosts | |
FIND /C /I "sqm.telemetry.microsoft.com.nsatc.net" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1 | |
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 sqm.telemetry.microsoft.com.nsatc.net>>%WINDIR%\System32\drivers\etc\hosts | |
FIND /C /I "watson.telemetry.microsoft.com" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1 | |
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 watson.telemetry.microsoft.com>>%WINDIR%\System32\drivers\etc\hosts | |
FIND /C /I "watson.telemetry.microsoft.com.nsatc.net" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1 | |
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 watson.telemetry.microsoft.com.nsatc.net>>%WINDIR%\System32\drivers\etc\hosts | |
FIND /C /I "redir.metaservices.microsoft.com" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1 | |
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 redir.metaservices.microsoft.com>>%WINDIR%\System32\drivers\etc\hosts | |
FIND /C /I "choice.microsoft.com" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1 | |
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 choice.microsoft.com>>%WINDIR%\System32\drivers\etc\hosts | |
FIND /C /I "choice.microsoft.com.nsatc.net" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1 | |
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 choice.microsoft.com.nsatc.net>>%WINDIR%\System32\drivers\etc\hosts | |
FIND /C /I "df.telemetry.microsoft.com" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1 | |
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 df.telemetry.microsoft.com>>%WINDIR%\System32\drivers\etc\hosts | |
FIND /C /I "wes.df.telemetry.microsoft.com" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1 | |
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 wes.df.telemetry.microsoft.com>>%WINDIR%\System32\drivers\etc\hosts | |
FIND /C /I "reports.wes.df.telemetry.microsoft.com" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1 | |
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 reports.wes.df.telemetry.microsoft.com>>%WINDIR%\System32\drivers\etc\hosts | |
FIND /C /I "services.wes.df.telemetry.microsoft.com" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1 | |
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 services.wes.df.telemetry.microsoft.com>>%WINDIR%\System32\drivers\etc\hosts | |
FIND /C /I "sqm.df.telemetry.microsoft.com" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1 | |
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 sqm.df.telemetry.microsoft.com>>%WINDIR%\System32\drivers\etc\hosts | |
FIND /C /I "watson.ppe.telemetry.microsoft.com" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1 | |
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 watson.ppe.telemetry.microsoft.com>>%WINDIR%\System32\drivers\etc\hosts | |
FIND /C /I "telemetry.appex.bing.net" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1 | |
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 telemetry.appex.bing.net>>%WINDIR%\System32\drivers\etc\hosts | |
FIND /C /I "telemetry.urs.microsoft.com" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1 | |
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 telemetry.urs.microsoft.com>>%WINDIR%\System32\drivers\etc\hosts | |
FIND /C /I "telemetry.appex.bing.net:443" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1 | |
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 telemetry.appex.bing.net:443>>%WINDIR%\System32\drivers\etc\hosts | |
FIND /C /I "settings-sandbox.data.microsoft.com" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1 | |
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 settings-sandbox.data.microsoft.com>>%WINDIR%\System32\drivers\etc\hosts | |
FIND /C /I "vortex-sandbox.data.microsoft.com" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1 | |
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 vortex-sandbox.data.microsoft.com>>%WINDIR%\System32\drivers\etc\hosts | |
FIND /C /I "watson.microsoft.com" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1 | |
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 watson.microsoft.com>>%WINDIR%\System32\drivers\etc\hosts | |
FIND /C /I "survey.watson.microsoft.com" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1 | |
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 survey.watson.microsoft.com>>%WINDIR%\System32\drivers\etc\hosts | |
FIND /C /I "watson.live.com" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1 | |
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 watson.live.com>>%WINDIR%\System32\drivers\etc\hosts | |
FIND /C /I "statsfe2.ws.microsoft.com" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1 | |
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 statsfe2.ws.microsoft.com>>%WINDIR%\System32\drivers\etc\hosts | |
FIND /C /I "corpext.msitadfs.glbdns2.microsoft.com" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1 | |
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 corpext.msitadfs.glbdns2.microsoft.com>>%WINDIR%\System32\drivers\etc\hosts | |
FIND /C /I "compatexchange.cloudapp.net" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1 | |
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 compatexchange.cloudapp.net>>%WINDIR%\System32\drivers\etc\hosts | |
FIND /C /I "cs1.wpc.v0cdn.net" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1 | |
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 cs1.wpc.v0cdn.net>>%WINDIR%\System32\drivers\etc\hosts | |
FIND /C /I "a-0001.a-msedge.net" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1 | |
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 a-0001.a-msedge.net>>%WINDIR%\System32\drivers\etc\hosts | |
FIND /C /I "fe2.update.microsoft.com.akadns.net" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1 | |
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 fe2.update.microsoft.com.akadns.net>>%WINDIR%\System32\drivers\etc\hosts | |
FIND /C /I "statsfe2.update.microsoft.com.akadns.net" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1 | |
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 statsfe2.update.microsoft.com.akadns.net>>%WINDIR%\System32\drivers\etc\hosts | |
FIND /C /I "sls.update.microsoft.com.akadns.net" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1 | |
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 sls.update.microsoft.com.akadns.net>>%WINDIR%\System32\drivers\etc\hosts | |
FIND /C /I "diagnostics.support.microsoft.com" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1 | |
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 diagnostics.support.microsoft.com>>%WINDIR%\System32\drivers\etc\hosts | |
FIND /C /I "corp.sts.microsoft.com" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1 | |
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 corp.sts.microsoft.com>>%WINDIR%\System32\drivers\etc\hosts | |
FIND /C /I "statsfe1.ws.microsoft.com" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1 | |
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 statsfe1.ws.microsoft.com>>%WINDIR%\System32\drivers\etc\hosts | |
FIND /C /I "pre.footprintpredict.com" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1 | |
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 pre.footprintpredict.com>>%WINDIR%\System32\drivers\etc\hosts | |
FIND /C /I "i1.services.social.microsoft.com" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1 | |
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 i1.services.social.microsoft.com>>%WINDIR%\System32\drivers\etc\hosts | |
FIND /C /I "i1.services.social.microsoft.com.nsatc.net" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1 | |
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 i1.services.social.microsoft.com.nsatc.net>>%WINDIR%\System32\drivers\etc\hosts | |
FIND /C /I "feedback.windows.com" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1 | |
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 feedback.windows.com>>%WINDIR%\System32\drivers\etc\hosts | |
FIND /C /I "feedback.microsoft-hohm.com" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1 | |
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 feedback.microsoft-hohm.com>>%WINDIR%\System32\drivers\etc\hosts | |
FIND /C /I "feedback.search.microsoft.com" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1 | |
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 feedback.search.microsoft.com>>%WINDIR%\System32\drivers\etc\hosts | |
echo. | |
echo. | |
echo Please make sure you do the following as well: | |
echo Head to Settings > Privacy, and disable everything, unless there are some things you really need. | |
echo While within the Privacy page, go to Feedback, select Never in the first box, and Basic in the second box | |
pause | |
pause |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
' VBS Script to get the Windows Product Key from a PC's registry. | |
' | |
' Save the VBScript as "getwinkey.vbs" somewhere on your WindowsPC. | |
' Now, when you double-click the local script file an alertbox pops up | |
' displaying the product key stored in the machine's Windows registry. | |
Set WshShell = WScript.CreateObject("WScript.Shell") | |
KeyPath = "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\DigitalProductId" | |
MsgBox ExtractKey(WshShell.RegRead(KeyPath)) | |
Function ExtractKey(KeyInput) | |
Const KeyOffset = 52 | |
i = 28 | |
CharWhitelist = "BCDFGHJKMPQRTVWXY2346789" | |
Do | |
Cur = 0 | |
x = 14 | |
Do | |
Cur = Cur * 256 | |
Cur = KeyInput(x + KeyOffset) + Cur | |
KeyInput(x + KeyOffset) = (Cur \ 24) And 255 | |
Cur = Cur Mod 24 | |
x = x -1 | |
Loop While x >= 0 | |
i = i -1 | |
KeyOutput = Mid(CharWhitelist, Cur + 1, 1) & KeyOutput | |
If (((29 - i) Mod 6) = 0) And (i <> -1) Then | |
i = i -1 | |
KeyOutput = "-" & KeyOutput | |
End If | |
Loop While i >= 0 | |
ExtractKey = KeyOutput | |
End Function |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
For the home versions you should change the registry yourself: | |
HKLM\SOFTWARE\Policies\Microsoft\Windows\DataCollection, find the key 'AllowTelemetry' and put it on 0. (also check HKLM\SOFTWARE\Wow6432Node\Policies\Microsoft\ on 64 bit systems) HKLM\SOFTWARE\Policies\Microsoft\Windows\OneDrive, find the key 'DisableFileSyncNGSC' and put it on 1. (also check HKLM\SOFTWARE\Wow6432Node\Policies\Microsoft\ on 64 bit systems) HKLM\SOFTWARE\Policies\Microsoft\Windows Defender, find the key 'DisableAntiSpyware' and put it on 1. (also check HKLM\SOFTWARE\Wow6432Node\Policies\Microsoft\ on 64 bit systems) | |
See also: | |
https://www.microsoft.com/en-us/download/details.aspx?id=25250 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
0.0.0.0 adnxs.com | |
0.0.0.0 c.msn.com | |
0.0.0.0 g.msn.com | |
0.0.0.0 h1.msn.com | |
0.0.0.0 msedge.net | |
0.0.0.0 ads.msn.com | |
0.0.0.0 adnexus.net | |
0.0.0.0 ac3.msn.com | |
0.0.0.0 c.atdmt.com | |
0.0.0.0 m.adnxs.com | |
0.0.0.0 rad.msn.com | |
0.0.0.0 so.2mdn.net | |
0.0.0.0 ads1.msn.com | |
0.0.0.0 ec.atdmt.com | |
0.0.0.0 flex.msn.com | |
0.0.0.0 rad.live.com | |
0.0.0.0 ui.skype.com | |
0.0.0.0 msftncsi.com | |
0.0.0.0 a-msedge.net | |
0.0.0.0 a.rad.msn.com | |
0.0.0.0 b.rad.msn.com | |
0.0.0.0 cdn.atdmt.com | |
0.0.0.0 m.hotmail.com | |
0.0.0.0 ads1.msads.net | |
0.0.0.0 a.ads1.msn.com | |
0.0.0.0 a.ads2.msn.com | |
0.0.0.0 apps.skype.com | |
0.0.0.0 b.ads1.msn.com | |
0.0.0.0 view.atdmt.com | |
0.0.0.0 watson.live.com | |
0.0.0.0 aidps.atdmt.com | |
0.0.0.0 preview.msn.com | |
0.0.0.0 static.2mdn.net | |
0.0.0.0 a.ads2.msads.net | |
0.0.0.0 b.ads2.msads.net | |
0.0.0.0 db3aqu.atdmt.com | |
0.0.0.0 secure.adnxs.com | |
0.0.0.0 www.msftncsi.com | |
0.0.0.0 cs1.wpc.v0cdn.net | |
0.0.0.0 live.rads.msn.com | |
0.0.0.0 ad.doubleclick.net | |
0.0.0.0 bs.serving-sys.com | |
0.0.0.0 a-0001.a-msedge.net | |
0.0.0.0 pricelist.skype.com | |
0.0.0.0 a-0002.a-msedge.net | |
0.0.0.0 a-0003.a-msedge.net | |
0.0.0.0 a-0004.a-msedge.net | |
0.0.0.0 a-0005.a-msedge.net | |
0.0.0.0 a-0006.a-msedge.net | |
0.0.0.0 a-0007.a-msedge.net | |
0.0.0.0 a-0008.a-msedge.net | |
0.0.0.0 a-0009.a-msedge.net | |
0.0.0.0 choice.microsoft.com | |
0.0.0.0 watson.microsoft.com | |
0.0.0.0 feedback.windows.com | |
0.0.0.0 aka-cdn-ns.adtech.de | |
0.0.0.0 cds26.ams9.msecn.net | |
0.0.0.0 lb1.www.ms.akadns.net | |
0.0.0.0 corp.sts.microsoft.com | |
0.0.0.0 az361816.vo.msecnd.net | |
0.0.0.0 az512334.vo.msecnd.net | |
0.0.0.0 telemetry.microsoft.com | |
0.0.0.0 msntest.serving-sys.com | |
0.0.0.0 secure.flashtalking.com | |
0.0.0.0 telemetry.appex.bing.net | |
0.0.0.0 pre.footprintpredict.com | |
0.0.0.0 vortex.data.microsoft.com | |
0.0.0.0 statsfe2.ws.microsoft.com | |
0.0.0.0 statsfe1.ws.microsoft.com | |
0.0.0.0 df.telemetry.microsoft.com | |
0.0.0.0 oca.telemetry.microsoft.com | |
0.0.0.0 sqm.telemetry.microsoft.com | |
0.0.0.0 telemetry.urs.microsoft.com | |
0.0.0.0 survey.watson.microsoft.com | |
0.0.0.0 compatexchange.cloudapp.net | |
0.0.0.0 feedback.microsoft-hohm.com | |
0.0.0.0 s.gateway.messenger.live.com | |
0.0.0.0 vortex-win.data.microsoft.com | |
0.0.0.0 feedback.search.microsoft.com | |
0.0.0.0 schemas.microsoft.akadns.net | |
0.0.0.0 watson.telemetry.microsoft.com | |
0.0.0.0 choice.microsoft.com.nsatc.net | |
0.0.0.0 wes.df.telemetry.microsoft.com | |
0.0.0.0 sqm.df.telemetry.microsoft.com | |
0.0.0.0 settings-win.data.microsoft.com | |
0.0.0.0 redir.metaservices.microsoft.com | |
0.0.0.0 i1.services.social.microsoft.com | |
0.0.0.0 vortex-sandbox.data.microsoft.com | |
0.0.0.0 diagnostics.support.microsoft.com | |
0.0.0.0 watson.ppe.telemetry.microsoft.com | |
0.0.0.0 msnbot-65-55-108-23.search.msn.com | |
0.0.0.0 telecommand.telemetry.microsoft.com | |
0.0.0.0 settings-sandbox.data.microsoft.com | |
0.0.0.0 sls.update.microsoft.com.akadns.net | |
0.0.0.0 fe2.update.microsoft.com.akadns.net | |
0.0.0.0 vortex-bn2.metron.live.com.nsatc.net | |
0.0.0.0 vortex-cy2.metron.live.com.nsatc.net | |
0.0.0.0 oca.telemetry.microsoft.com.nsatc.net | |
0.0.0.0 sqm.telemetry.microsoft.com.nsatc.net | |
0.0.0.0 reports.wes.df.telemetry.microsoft.com | |
0.0.0.0 corpext.msitadfs.glbdns2.microsoft.com | |
0.0.0.0 services.wes.df.telemetry.microsoft.com | |
0.0.0.0 watson.telemetry.microsoft.com.nsatc.net | |
0.0.0.0 statsfe2.update.microsoft.com.akadns.net | |
0.0.0.0 i1.services.social.microsoft.com.nsatc.net | |
0.0.0.0 telecommand.telemetry.microsoft.com.nsatc.net | |
0.0.0.0 telemetry.appex.bing.com | |
0.0.0.0 nsa | |
0.0.0.0 ns4.1-800-hosting.com | |
0.0.0.0 ns3.1-800-hosting.com | |
0.0.0.0 ns2.1-800-hosting.com | |
0.0.0.0 ns1.1-800-hosting.com | |
0.0.0.0 ns7.dns-net.de | |
0.0.0.0 ns1.dns-net.de | |
0.0.0.0 ns2.21vianet.com.cn | |
0.0.0.0 ns1.21vianet.com.cn | |
0.0.0.0 dns.east3.247realmedia.com | |
0.0.0.0 dns.east1.247realmedia.com | |
0.0.0.0 name2.my7star.com | |
0.0.0.0 name1.my7star.com | |
0.0.0.0 warrane.connect.com.au | |
0.0.0.0 yarrina.connect.com.au | |
0.0.0.0 ns2.abac.com | |
0.0.0.0 ns1.abac.com | |
0.0.0.0 ns.above.net | |
0.0.0.0 ns3.above.net | |
0.0.0.0 dns2.accesscomm.ca | |
0.0.0.0 dns1.accesscomm.ca | |
0.0.0.0 ns2.pnap.net | |
0.0.0.0 ns1.pnap.net | |
0.0.0.0 ns3.pnap.net | |
0.0.0.0 dns2.artelecom.pt | |
0.0.0.0 dns1.artelecom.pt | |
0.0.0.0 ns.relc.com | |
0.0.0.0 ns.ukrnet.net | |
0.0.0.0 ns.ua.net | |
0.0.0.0 ns.lucky.net | |
0.0.0.0 ns.adams.net | |
0.0.0.0 lx.adams.net | |
0.0.0.0 ns2.acnusa.net | |
0.0.0.0 ns1.acnusa.net | |
0.0.0.0 ns2.eatel.net | |
0.0.0.0 gamma.aei.ca | |
0.0.0.0 delta.aei.ca | |
0.0.0.0 dns1.aeronetpr.com | |
0.0.0.0 dns2.aeronetpr.com | |
0.0.0.0 ns1.acelerate.com | |
0.0.0.0 ns2.acelerate.com | |
0.0.0.0 ns1.afrinic.net | |
0.0.0.0 ns.ati.tn | |
0.0.0.0 ns2.ati.tn | |
0.0.0.0 gate.aikotech.com.ua | |
0.0.0.0 ns.secondary.net.ua | |
0.0.0.0 dca-ans-01.inet.qwest.net | |
0.0.0.0 svl-ans-01.inet.qwest.net | |
0.0.0.0 ns2.calpop.com | |
0.0.0.0 ns1.calpop.com | |
0.0.0.0 thunder.lightning.net | |
0.0.0.0 storm.lightning.net | |
0.0.0.0 ns1.scservers.com | |
0.0.0.0 ns2.scservers.com | |
0.0.0.0 dns.jefftech.tec.pa.us | |
0.0.0.0 dns2.telia.com | |
0.0.0.0 dns1.telia.com | |
0.0.0.0 sns.tiscali.net | |
0.0.0.0 pns.tiscali.net | |
0.0.0.0 ns0.interoute.net.uk | |
0.0.0.0 ns1.interoute.net.uk | |
0.0.0.0 dns3.xspedius.net | |
0.0.0.0 dns2.xspedius.net | |
0.0.0.0 dns1.xspedius.net | |
0.0.0.0 ns2.level3.net | |
0.0.0.0 ns1.level3.net | |
0.0.0.0 proof.rain.fr | |
0.0.0.0 ns.ripe.net | |
0.0.0.0 bow.rain.fr | |
0.0.0.0 ya.akamai.com | |
0.0.0.0 access.akamai.com | |
0.0.0.0 ns1.amstec.net | |
0.0.0.0 ns2.amstec.net | |
0.0.0.0 authns3.sttl.qwest.net | |
0.0.0.0 authns2.dnvr.qwest.net | |
0.0.0.0 authns1.mpls.qwest.net | |
0.0.0.0 ns2.nlayer.net | |
0.0.0.0 ns1.nlayer.net | |
0.0.0.0 castor.teleglobe.net | |
0.0.0.0 pollux.teleglobe.net | |
0.0.0.0 ns1.jsv.qwest.net | |
0.0.0.0 ns1.ewr.qwest.net | |
0.0.0.0 ns1.iad.qwest.net | |
0.0.0.0 ns1.bur.qwest.net | |
0.0.0.0 ns3.he.net | |
0.0.0.0 ns2.he.net | |
0.0.0.0 ns1.he.net | |
0.0.0.0 mum.neric.org | |
0.0.0.0 dns2.neric.org | |
0.0.0.0 cva2.cableonline.com.mx | |
0.0.0.0 cva1.cableonline.com.mx | |
0.0.0.0 ns.alfa.com.ni | |
0.0.0.0 dns2.alfanumeric.com.ni | |
0.0.0.0 ns2.business.allstream.net | |
0.0.0.0 ns1.business.allstream.net | |
0.0.0.0 ns4-auth.alltel.net | |
0.0.0.0 ns2-auth.alltel.net | |
0.0.0.0 ns3-auth.alltel.net | |
0.0.0.0 ns1-auth.alltel.net | |
0.0.0.0 ns4-auth.windstream.net | |
0.0.0.0 ns2-auth.windstream.net | |
0.0.0.0 ns3-auth.windstream.net | |
0.0.0.0 ns1-auth.windstream.net | |
0.0.0.0 dns3.alphared.com | |
0.0.0.0 dns2.alphared.com | |
0.0.0.0 dns1.alphared.com | |
0.0.0.0 ns4.yahoo.com | |
0.0.0.0 ns2.yahoo.com | |
0.0.0.0 ns5.yahoo.com | |
0.0.0.0 ns1.yahoo.com | |
0.0.0.0 ns3.yahoo.com | |
0.0.0.0 ns1.nosc.mil | |
0.0.0.0 hamradio.ucsd.edu | |
0.0.0.0 dns.iarc.org | |
0.0.0.0 haig.cs.ucl.ac.uk | |
0.0.0.0 munnari.oz.au | |
0.0.0.0 hpcsos.col.hp.com | |
0.0.0.0 pdns3.ultradns.org | |
0.0.0.0 pdns1.ultradns.net | |
0.0.0.0 pdns2.ultradns.net | |
0.0.0.0 ns2.americatelnet.com.pe | |
0.0.0.0 ns1.americatelnet.com.pe | |
0.0.0.0 ns2.amis.net | |
0.0.0.0 ns1.amis.net | |
0.0.0.0 ns1.wa.amnet.net.au | |
0.0.0.0 ns2.wa.amnet.net.au | |
0.0.0.0 dns1.amnetsal.com | |
0.0.0.0 dns2.amnetsal.com | |
0.0.0.0 tungurahua.andinanet.net | |
0.0.0.0 pichincha.andinanet.net | |
0.0.0.0 mag2.magmacom.com | |
0.0.0.0 mag1.magma.ca | |
0.0.0.0 ns64.worldnic.com | |
0.0.0.0 ns63.worldnic.com | |
0.0.0.0 ns2.anteldata.com.uy | |
0.0.0.0 ns1.anteldata.com.uy | |
0.0.0.0 dns-06.ns.aol.com | |
0.0.0.0 dns-07.ns.aol.com | |
0.0.0.0 daha-07.ns.aol.com | |
0.0.0.0 daha-02.ns.aol.com | |
0.0.0.0 daha-01.ns.aol.com | |
0.0.0.0 dns-02.ns.aol.com | |
0.0.0.0 dns-01.ns.aol.com | |
0.0.0.0 ns2.apogeetelecom.com | |
0.0.0.0 ns1.apogeetelecom.com | |
0.0.0.0 nserver2.apple.com | |
0.0.0.0 nserver.apple.com | |
0.0.0.0 nserver.euro.apple.com | |
0.0.0.0 nserver.asia.apple.com | |
0.0.0.0 ns1.pbi.net | |
0.0.0.0 ns2.pbi.net | |
0.0.0.0 ns1.arabtel.net | |
0.0.0.0 ns2.arabtel.net | |
0.0.0.0 ns3.arcor-ip.de | |
0.0.0.0 ns1.arcor-ip.de | |
0.0.0.0 ns2.arcor-ip.de | |
0.0.0.0 point.areality.net | |
0.0.0.0 cover.areality.net | |
0.0.0.0 ns2.zbzoom.net | |
0.0.0.0 ns1.zbzoom.net | |
0.0.0.0 ns.embratel.net.br | |
0.0.0.0 ns2.embratel.net.br | |
0.0.0.0 ns1.landsraad.net | |
0.0.0.0 ns2.landsraad.net | |
0.0.0.0 ns2.arrival.net | |
0.0.0.0 ns1.arrival.net | |
0.0.0.0 ns2.arrownet.dk | |
0.0.0.0 ns1.arrownet.dk | |
0.0.0.0 ns2.romtelecom.net | |
0.0.0.0 ns1.romtelecom.net | |
0.0.0.0 ns1-lon.as5587.net | |
0.0.0.0 ns0-lon.as5587.net | |
0.0.0.0 ns2.asianetindia.com | |
0.0.0.0 ns1.asianetindia.com | |
0.0.0.0 dns.octor.com | |
0.0.0.0 dns.apol.com.tw | |
0.0.0.0 dns.ht.net.tw | |
0.0.0.0 ns3.mci.net | |
0.0.0.0 ns2.asp.bg | |
0.0.0.0 ns1.asp.bg | |
0.0.0.0 abac.au.ac.th | |
0.0.0.0 ns1.asta-net.pl | |
0.0.0.0 ns2.asta-net.pl | |
0.0.0.0 ns1.astral.ro | |
0.0.0.0 ns2.astral.ro | |
0.0.0.0 ns0.b.astral.ro | |
0.0.0.0 ns4.astral.ro | |
0.0.0.0 ns3.astral.ro | |
0.0.0.0 ns1.home.ne.jp | |
0.0.0.0 ns2.home.ne.jp | |
0.0.0.0 ns.uk.prserv.net | |
0.0.0.0 ns.nl.prserv.net | |
0.0.0.0 ns.de.prserv.net | |
0.0.0.0 dbru.br.ns.els-gms.att.net | |
0.0.0.0 cbru.br.ns.els-gms.att.net | |
0.0.0.0 dmtu.mt.ns.els-gms.att.net | |
0.0.0.0 cmtu.mt.ns.els-gms.att.net | |
0.0.0.0 fbru.br.ns.els-gms.att.net | |
0.0.0.0 fmtu.mt.ns.els-gms.att.net | |
0.0.0.0 ebru.br.ns.els-gms.att.net | |
0.0.0.0 emtu.mt.ns.els-gms.att.net | |
0.0.0.0 ns2.swbell.net | |
0.0.0.0 ns1.swbell.net | |
0.0.0.0 ns4.asp.att.net | |
0.0.0.0 ns3.asp.att.net | |
0.0.0.0 ns2.asp.att.net | |
0.0.0.0 ns1.asp.att.net | |
0.0.0.0 dns01.ono.com | |
0.0.0.0 dns02.ono.com | |
0.0.0.0 dns03.ono.com | |
0.0.0.0 dns1.avantel.net.mx | |
0.0.0.0 dns2.avantel.net.mx | |
0.0.0.0 ns2.betherenow.co.uk | |
0.0.0.0 ns1.betherenow.co.uk |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Windows Registry Editor Version 5.00 | |
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\DataCollection] | |
"AllowTelemetry"=dword:00000000 | |
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\DataCollection] | |
"AllowTelemetry"=dword:00000000 | |
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Policies\DataCollection] | |
"AllowTelemetry"=dword:00000000 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
@echo off | |
cls | |
set x86="%SYSTEMROOT%\System32\OneDriveSetup.exe" | |
set x64="%SYSTEMROOT%\SysWOW64\OneDriveSetup.exe" | |
echo Closing OneDrive process. | |
echo. | |
taskkill /f /im OneDrive.exe > NUL 2>&1 | |
ping 127.0.0.1 -n 5 > NUL 2>&1 | |
echo Uninstalling OneDrive. | |
echo. | |
if exist %x64% ( | |
%x64% /uninstall | |
) else ( | |
%x86% /uninstall | |
) | |
ping 127.0.0.1 -n 5 > NUL 2>&1 | |
echo Removing OneDrive leftovers. | |
echo. | |
rd "%USERPROFILE%\OneDrive" /Q /S > NUL 2>&1 | |
rd "C:\OneDriveTemp" /Q /S > NUL 2>&1 | |
rd "%LOCALAPPDATA%\Microsoft\OneDrive" /Q /S > NUL 2>&1 | |
rd "%PROGRAMDATA%\Microsoft OneDrive" /Q /S > NUL 2>&1 | |
echo Removeing OneDrive from the Explorer Side Panel. | |
echo. | |
REG DELETE "HKEY_CLASSES_ROOT\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}" /f > NUL 2>&1 | |
REG DELETE "HKEY_CLASSES_ROOT\Wow6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}" /f > NUL 2>&1 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
sc config diagtrack start=disabled | |
sc config dmwappushservice start=disabled |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Microsoft's Windows 10 has permission to spy on you | |
Well first of all "spying" is a bit misleading, it's written down in the eula/terms what can be collected, the major problem is that | |
this will be collected even on the first installation without getting any chance to change that. | |
Available Tools: | |
Destroy Windows 10 Spying | |
DoNotSpy10 | |
Be careful with such tools (!), some of them are coming with OpenCandy and other stuff that also affects some security aspects. I not recommed to use | |
such tools. | |
Before/During Installation: | |
• Do not use Express Settings! Hit Customize, and make sure everything is turned off! | |
• It's strongly preferred that you use a local account with Windows 10. | |
After Installation: | |
• Head to Settings > Privacy, and disable everything, unless there are some things you really need. | |
• While within the Privacy page, go to Feedback, select Never in the first box, and Basic in the second box. | |
• Head to Settings > Update and Security > Advanced Options > Choose how updates are delivered, and turn the first switch off. | |
• Disable Cortana by clicking the Search bar/icon. | |
• (Optional) Disable web search in Search by going to Settings, and turning off Search online and include web results. | |
• Change the name of your PC by going to Start (or hitting the Windows key), typing About PC, and clicking Rename PC. | |
Slightly Complex | |
• Open up the Command Prompt by launching cmd as an administrator, and enter the following: | |
sc delete DiagTrack | |
sc delete dmwappushservice | |
echo "" > C:\ProgramData\Microsoft\Diagnosis\ETLLogs\AutoLogger\AutoLogger-Diagtrack-Listener.etl | |
• Open up the Group Policy Editor by launching gpedit.msc as an administrator. Go through Computer Configuration > Administrative Templates > Windows Components > Data Collection and Preview Builds. Double click Telemetry, hit Disabled, then apply. NOTE: This only truly works in the Enterprise edition, but the final step provides a decent enough workaround for Pro users. | |
• While still in the Group Policy Editor, go through Computer Configuration > Administrative Templates > Windows Components > OneDrive, double click Prevent the usage of OneDrive for file storage, hit Enabled, then apply. | |
• While still in the Group Policy Editor, go through Computer Configuration > Administrative Templates > Windows Components > Windows Defender, double click Turn Off Windows Defender, hit Enabled, then apply. | |
• Open up the Registry Editor by launching regedit as an administrator. Go through HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\DataCollection, select AllowTelemetry, change its value to 0, then apply. | |
• First, download the Take Ownership tweak and enable it. Then, head to the Hosts File by going through C:\Windows\System32\Drivers\Etc, take ownership of the hosts file, and add all of the IPs from this page into the file. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
@echo off | |
setlocal enableextensions enabledelayedexpansion | |
:: | |
::Will stop services Diagnostic Tracking Service (diagtrack) and dmwappushservice (dmwappushsvc) | |
:: | |
:BEGIN | |
echo. | |
echo This script MUST be ran as an Administrator in order to work. | |
echo. | |
choice /M "Did you run this as Administrator?" | |
If Errorlevel 2 echo Right click the .bat file and run as Administrator & GOTO END | |
echo. | |
echo Checking state of the Diagnostic Tracking Service... & timeout 1 >nul | |
echo. | |
sc query "diagtrack" & timeout 1 >nul | |
echo. | |
sc query "diagtrack" | findstr "STATE" | findstr "RUNNING" > nul | |
if %errorlevel% == 1 GOTO DIAG_STOPPED | |
if %errorlevel% == 0 GOTO DIAG_RUNNING | |
echo unknown status | |
GOTO END | |
:: | |
:DIAG_STOPPED | |
echo The diagtrack service state is stopped. | |
echo This should prevent the dmwappushservice service from running. & timeout 1 >nul | |
GOTO CHECK_PUSH | |
:: | |
:DIAG_RUNNING | |
echo The diagtrack service is running. & timeout 1 >nul | |
echo. | |
choice /M "Do you want to stop service?" | |
If Errorlevel 2 GOTO END | |
echo. | |
echo Stopping diagtrack service and disabling from startup & timeout 1 >nul | |
echo. | |
sc stop "diagtrack" & timeout 1 >nul | |
echo. | |
sc config "diagtrack" start= disabled & timeout 1 >nul | |
echo. | |
sc query "diagtrack" | findstr "STATE" | findstr "RUNNING" > nul | |
if %errorlevel% == 1 GOTO DIAG_STOP_SUCCESS | |
if %errorlevel% == 0 GOTO DIAG_STOP_FAIL | |
echo unknown status | |
GOTO END | |
:: | |
:DIAG_STOP_SUCCESS | |
echo. | |
echo The Diagtrack service has been stopped! | |
echo This should automatically disable the dmwappushservice service. & timeout 1 >nul | |
GOTO CHECK_PUSH | |
:: | |
:DIAG_STOP_FAIL | |
echo. | |
echo Diagtrack service is still running.. I give up. | |
echo Maybe try and run this as Administrator. | |
pause | |
GOTO END | |
:: | |
:CHECK_PUSH | |
echo. | |
echo Checking the state of dmwappushservice just in case... | |
echo. | |
timeout 1 >nul | |
sc query "dmwappushsvc" >nul & timeout 1 >nul | |
echo. | |
sc query "dmwappushsvc" | findstr "STATE" | findstr "RUNNING" > nul | |
if %errorlevel% == 1 GOTO PUSH_STOPPED | |
if %errorlevel% == 0 GOTO PUSH_RUNNING | |
echo unknown status | |
GOTO END | |
:: | |
:PUSH_STOPPED | |
echo The dmwappushsvc service state is stopped & timeout 1 >nul | |
GOTO END | |
:: | |
:PUSH_RUNNING | |
echo Push srvice is running. & timeout 1 >nul | |
echo. | |
choice /M "Do you want to stop service?" | |
If Errorlevel 2 GOTO END | |
echo. | |
echo Stopping dmwappushsvc service and disabling from startup & timeout 1 >nul | |
echo. | |
sc stop "dmwappushsvc" & timeout 1 >nul | |
echo. | |
sc config "dmwappushsvc" start= disabled & timeout 1 >nul | |
echo. | |
sc query "dmwappushsvc" | findstr "STATE" | findstr "RUNNING" > nul | |
if %errorlevel% == 1 GOTO PUSH_STOP_SUCCESS | |
if %errorlevel% == 0 GOTO PUSH_STOP_FAIL | |
echo unknown status | |
GOTO END | |
:: | |
:PUSH_STOP_SUCCESS | |
echo. | |
echo Push service has been stopped & timeout 1 >nul | |
GOTO CHECK_PUSH | |
:: | |
:PUSH_STOP_FAIL | |
echo. | |
echo Push service is still running.. I give up. | |
echo Maybe try and run this as Administrator. | |
pause | |
GOTO END | |
:: | |
:END | |
echo. | |
echo Nothing left to do. | |
echo. | |
pause |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Computer Configuration > Administrative Templates > Windows Components > Windows Defender, double click Turn Off Windows Defender, hit Enabled, then apply. | |
(Replace with a good Anti-Virus -optional!) | |
Application Experience AND Customer Experience Improvement Program can be disabled by: | |
Right Click Start Menu > Computer Management > Expand 'Task Scheduler' > Expand 'Task Scheduler Library' > Expand 'Microsoft' > Expand 'Windows' > Click on 'Application Experience' > Disable all Tasks in Folder > Click on 'Customer Experience Improvement Program' > Disable all Tasks in Folder | |
Optional: Click on 'Task Scheduler Library' > Disable any Tasks you don't want Enabled. | |
In Computer Management > Expand 'Services and Applications' > Click on 'Services' > Right Click on 'Windows Media Player Network Sharing Service' > Properties > Startup Type 'Disabled' > Stop if running. | |
Ensure 'Windows Defender Service' is not running. | |
Disable / Stop 'Touch Keyboard and Handwriting Panel' | |
(Unless you are using a Touch Screen / Photoshop DrawPad thingy) | |
Disable / Stop 'Secondary Login' | |
(Unless you play Blizzard Entertainment Videogames, it needs this service to update / download games) | |
Disable / Stop 'Retail Demo Service' | |
Ensure 'Remote Registry' is Disabled / Stopped |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment