User Controls
Windows 7 and 8 updates spy on you.
-
2015-09-19 at 11:56 AM UTCIf you chose not to update to Windows 10 for privacy concerns, tough shit, Microsoft released auto updates that send microsoft telemetry about everything you do on your PC. FUCK YOU MICROSOFT.
Fear not however Sophie is here to stick it to the man, open up notepad and paste this into it.
wusa /uninstall /kb:3068708 /quiet /norestart
wusa /uninstall /kb:3022345 /quiet /norestart
wusa /uninstall /kb:3075249 /quiet /norestart
wusa /uninstall /kb:3080149 /quiet /norestart
ECHO Done, press any key to exit.
PAUSE
EXIT
Save it as a .bat file, now run it as administrator. There you go, no more spyware updates. Now go to your configuration settings and look for windows update, click to hide kb:3068708 and the other ones from the code above so you won't get them automatically installed once you restart your computer.
-
2015-09-19 at 12:39 PM UTCTo avoid all this work, always run a rule-based software firewall on manual configuration mode, with the default to block all packets in or out until approved. Nothing gets in or out, not even Microsoft and their spyware.
-
2015-09-19 at 12:48 PM UTC
To avoid all this work, always run a rule-based software firewall on manual configuration mode, with the default to block all packets in or out until approved. Nothing gets in or out, not even Microsoft and their spyware.
Lol, what work? I wrote all the commands for the reader so it can be pasted neatly into a batch file to be run automatically. If you're going to be blocking Microsoft with your firewall you're not going to receive ANY updates. It's good policy to keep you OS updated for general security purposes. Sometimes though unwanted updates get installed automatically if you have auto update configured as the general computer user will have, therefore this thread and the little batch file is useful for every day computer users. -
2015-09-19 at 1:30 PM UTCI never update at all. By updating, you are allowing infections. If the thing works decent and fast already, and every single packet and process are being monitored, audited and managed, there's no need to update anything.
-
2015-09-19 at 2:10 PM UTC
I never update at all. By updating, you are allowing infections. If the thing works decent and fast already, and every single packet and process are being monitored, audited and managed, there's no need to update anything.
You are funny. -
2015-09-19 at 7:44 PM UTC
I never update at all.
Then you're stupid.By updating, you are allowing infections.
By not updating your anti virus/malware you're allowing infections, idiot. Or are you so 1337 you don't even need a virus scanner, lmao.every single packet and process are being monitored, audited and managed, there's no need to update anything.
No one does this and you don't either, but by all means keep talking you're only making yourself look ignorant. You may be able to convince people that don't know the first thing about computers of your bullshit but anyone who has the slightest idea of how these things work knows you're full of shit.
-
2015-09-20 at 2:06 PM UTCOne thing you have to admire about SpectraL is that no matter how deep a hole he has dug himself into he just keeps on shoveling the shit.
-
2015-09-20 at 6:59 PM UTCI stopped using Windows this year and doubt I'll be going back. I suggest others do the same.
-
2015-09-20 at 8:20 PM UTC
By not updating your anti virus/malware you're allowing infections, idiot. Or are you so 1337 you don't even need a virus scanner, lmao.
When your operating system is already verified to be clean, it's smart to quarantine it from any and all possible infections, including updates. Just the act of updating opens ports which others could compromise; there's no logic in "protecting" a machine which is already clean.
I don't use a virus scanner either, because most virus scanners are viruses in themselves. Since I know all the files on my machine are already clean, there's no sense scanning them. -
2015-09-20 at 10:26 PM UTC
When your operating system is already verified to be clean, it's smart to quarantine it from any and all possible infections, including updates. Just the act of updating opens ports which others could compromise; there's no logic in "protecting" a machine which is already clean.
I don't use a virus scanner either, because most virus scanners are viruses in themselves. Since I know all the files on my machine are already clean, there's no sense scanning them.
This post alone should be enough for anyone to realize you know nothing. -
2015-09-21 at 1:28 AM UTC
This post alone should be enough for anyone to realize you know nothing.
Please explain.
-
2015-09-25 at 11:49 PM UTC
Please explain.
Exploits, they don't put out updates for no reason. -
2015-09-26 at 12:51 AM UTC
Exploits, they don't put out updates for no reason.
No exploit can get around a rule-based firewall in manual configuration mode. As soon as it tries to make an authorized connection and/or tries to open a port, it is immediately detected and can be blocked before it can complete its attack. At that point, I can manually remove the threat from the file system and delete all references to it in the system registry. I don't need any updates, because exploits are completely ineffective on my machine. -
2015-09-26 at 1:12 AM UTC
No exploit can get around a rule-based firewall in manual configuration mode. As soon as it tries to make an authorized connection and/or tries to open a port, it is immediately detected and can be blocked before it can complete its attack. At that point, I can manually remove the threat from the file system and delete all references to it in the system registry. I don't need any updates, because exploits are completely ineffective on my machine.
That's the nature of an exploit, it exploits ports that are open. Like javascipt or apache and every other web facing service. As long as the internet is nat'ed theres almost point in the average person to run a firewall. -
2015-09-26 at 1:29 AM UTCI suggest Special at least check these tools out. No tricks i swear.
http://www.bleepingcomputer.com/download/combofix/
Advanced malware removal tool, since you claim to know what's what. This will help you sort out anything your 'expert' ass has missed.
http://www.bleepingcomputer.com/download/adwcleaner/
This will remove adware and some hijackers.
http://sourceforge.net/projects/hjt/
While this scans for hijackers specifically. I especially recommend Hijacker removal tools since once you getb these, and you can get these by looking at a malicious ad on your browser, i don't give a fuck how tidy your firewall is, if you browse and allow javascript this is gonna' happen. But to get back on track, a hijacker is designed to hijack a process usually of a browser and have it act like a person in the background to visit random sites, either for hits(web page ranking) or other malware downloads whatever. The reason they hardly get spotted is exactly because they behave like a person using the browser so your AV is like: Lol nothing to see here! -
2015-09-26 at 1:34 AM UTC
I can manually remove the threat from the file system and delete all references to it in the system registry.
Bullshit, what if you got a rootkit? Ain't no one gonna' remove that manually from any PC. And ok, system registry fine, what if the method of delivery involved having the malware add the registry key as system32? Sorry bubba, system32 is always gonna' have more privilege than even administrator accounts, so good luck with that. It's not like Linux where you can basically do anything your heart desires as long as you are root.
-
2015-09-26 at 2:10 AM UTC
No exploit can get around a rule-based firewall in manual configuration mode. As soon as it tries to make an authorized connection and/or tries to open a port, it is immediately detected and can be blocked before it can complete its attack. At that point, I can manually remove the threat from the file system and delete all references to it in the system registry. I don't need any updates, because exploits are completely ineffective on my machine.
Code injection you moron. If your browser is exploited and you've already given your browser permission on your rules set guess what Einstein? The malicious code gets past your firewall because it relies on polling the windows application programming interface to determine which application is attempting to use network resresources.
That doesn't even begin to address root kits which don't report to the API/Task Mangler. Virus writers love morons like you.
-
2015-09-26 at 6:52 AM UTC"wusa is not recognized as an internal or external command, operable program, or batch file". What did I do wrong?
-
2015-09-26 at 10:21 AM UTC
"wusa is not recognized as an internal or external command, operable program, or batch file". What did I do wrong?
Seems your system variables got messed up, try this command: ping google.com
Does it say the same? If so, go to your system properties, and select advanced system properties then press the button 'Environment Variables' check to see if you have an entry under the 'system' user that says: ComSpec %SystemRoot%\system32\cmd.exe, if you don't add it and try again. Dunno' if that's the exact variable though. I think it is, i don't have this problem but i do know for certain it has to do with your system variables. Maybe Beaver knows the exact variable, he used to be sysadmin from what i gather. -
2015-09-26 at 4:54 PM UTC
Bullshit, what if you got a rootkit? Ain't no one gonna' remove that manually from any PC. And ok, system registry fine, what if the method of delivery involved having the malware add the registry key as system32? Sorry bubba, system32 is always gonna' have more privilege than even administrator accounts, so good luck with that. It's not like Linux where you can basically do anything your heart desires as long as you are root.
Rootkits are very easy to detect and remove. You just have to know what to look for and how to challenge it. Rootkits are really no different than any standard virus or trojan, although they do usually operate at a much lower level. As for "the malware adding the registry key as system32", that doesn't make much sense. Do you mean the malware masquerading as a Windows core component, such as a .dll or an .exe? That's still not an issue. There are slight differences between the properties of the genuine file and the doppleganger, and if you know how to tell the difference, it's not hard to kill it and replace it with the original file, even if it's been injected into the core component's process.