PDA

Показать полную графическую версию : Средства сбора данных телеметрии Windows .:[все вопросы]:.


Страниц : 1 2 [3]

vavun
16-09-2015, 21:24
Кстати, в курсе кто по вчерашним двум обновлениям ?
Пришли в рекомендуемых. Вроде безобидные, добавляют немного "совместимости"
https://support.microsoft.com/ru-ru/kb/3080079
https://support.microsoft.com/ru-ru/kb/2999226

Телеметрия мне не принципиальна, главное чтобы десятку не полезло качать

LongSoft
20-09-2015, 03:21
Роскомнадзор проверил Windows 10 на шпионаж (http://newsland.com/news/detail/id/1609175/)

Speccy
22-09-2015, 00:46
Вот есть еще такое ёпенкос приложение DisableWinTracking https://github.com/10se1ucgo/DisableWinTracking
Знатоки оцените

dimez
22-09-2015, 15:49
Роскомнадзор проверил Windows 10 на шпионаж »
Да конечно, проверили они.
Они в штанах у себя проверить ничего не могут, а тут нате, целую операционку без исходников проверили за неделю.

kosto_
25-09-2015, 02:20
dimez
Да конечно, проверили они.
Они в штанах у себя проверить ничего не могут, а тут нате, целую операционку без исходников проверили за неделю.

Вот такие у "них" нынче низкие стандарты :)

Пуф6707
15-04-2016, 11:36
Нашел вот такую утилиту по удалению "вредных" обновлений в Windows 7 на просторах интернета
135994


CRC32: 7E053AE1
MD5: EA100EE241BA64BA4CF163A951C05408
SHA-1: 2EE05F4D2BA451636EAD6BC7ACF0A13E3016D267

Данная программка удаляет из Windows 7 обновления, которые собирают информацию о пользователе, его программах, статистику веб-сёрфинга и т.д.
Так же, программа удаляет обновления, которые пытаются обновить вашу Windows 7 до версии Windows 10.
Кроме всего прочего, удаляется "вредное" обновление, которое проверяет вашу копию Windows на лицензионность. Полезно, кто использует активатор для регистрации своей копии.
Пользоваться программой очень просто:
1. Запустить программу от имени Администратора
2. Дождаться окончания анализа установленных обновлений
3. Установить/не устанавливать галочки по желанию (рекомендую установить)
4. Нажать единственную кнопку!
5. Дождаться предложения перезагрузки компьютера
p.s. после перезагрузки снова запустить от имени Администратора программу для проверки.
Если какие-либо обновления остались в списке красными, повторить лечение кнопкой «Удалить шпионов и проверку подлинности» с перезагрузкой.
Как пишет автор:
Тестировалось на х86 и х64 Windows 7 + самостоятельное обновление из Центра обновлений Windows после установки х86 и х64

Пуф6707
18-08-2016, 00:57
Нашел интересный обновляемый скрипт Remove-MS-Telemetry-and-Annoyances (https://github.com/simdol/Remove-MS-Telemetry-and-Annoyances)
@echo off
title "Remove Microsoft® Telemetry and Annoyances"
endlocal & setlocal EnableDelayedExpansion

rem Script Updated by <https://github.com/simdol>
rem Script Originally Created by <github.com/tarampampam> #2015
rem Script Version: 0.3.2 <08/07/2016>
rem Supports: Microsoft Windows 7/8/8.1

echo.
echo ***************************************************************************
echo * *
echo * Remove MS Telemetry and Annoyances *
echo * *
echo ***************************************************************************
echo * *
echo * Script support arguments: *
echo * *
echo * -kb ^| -hotfixes Do NOT uninstall updates *
echo * -d ^| -disable Do NOT disable updates *
echo * -t ^| -tasks Do NOT disable tasks *
echo * -s ^| -services Do NOT disable services *
echo * -i ^| -ip Do NOT block IP addresses using route *
echo * -f ^| -firewall Do NOT block IP addresses using firewall *
echo * -h ^| -hosts Do NOT add domains to hosts file *
echo * -u ^| -updates Do NOT change windows update settings *
echo * -l ^| -log Do NOT write messages to .log file *
echo * -e ^| -exit Exit when work is complete *
echo * *
echo * Latest version you can find here: ^<^http://preview.tinyurl.com/j9pvtw2^> *
echo * *
echo ***************************************************************************
echo * *
echo * WARNING WARNING WARNING *
echo * READ THE DOCUMENTATION BEFORE PROCEEDING! *
echo * *
echo ***************************************************************************
echo

rem Setting up default script values and declaring variables
set ExitOnComplete=0
set WriteLogFile=1
set UninstallUpdates=1
set DisableUpdates=1
set DisableTasks=1
set DisableServices=1
set BlockIPaddresses=1
set BlockIPaddressesWithFirewall=1
set AddDomainsToHosts=1
set DisableAutomaticUpdates=1

set FirewallIPlist=
set UpdatesList=
set result=
set LogFilePath="%~f0.log"

rem Parse passed arguments to script
:parse_passed_params
if "%~1"=="" goto end_parse_passed_params
if "%~1"=="-e" set ExitOnComplete=1
if "%~1"=="-exit" set ExitOnComplete=1
if "%~1"=="-kb" set UninstallUpdates=0
if "%~1"=="-hotfixes" set UninstallUpdates=0
if "%~1"=="-d" set DisableUpdates=0
if "%~1"=="-disable" set DisableUpdates=0
if "%~1"=="-t" set DisableTasks=0
if "%~1"=="-tasks" set DisableTasks=0
if "%~1"=="-s" set DisableServices=0
if "%~1"=="-services" set DisableServices=0
if "%~1"=="-i" set BlockIPaddresses=0
if "%~1"=="-ip" set BlockIPaddresses=0
if "%~1"=="-f" set BlockIPaddressesWithFirewall=0
if "%~1"=="-firewall" set BlockIPaddressesWithFirewall=0
if "%~1"=="-h" set AddDomainsToHosts=0
if "%~1"=="-hosts" set AddDomainsToHosts=0
if "%~1"=="-u" set DisableAutomaticUpdates=0
if "%~1"=="-updates" set DisableAutomaticUpdates=0
if "%~1"=="-l" set WriteLogFile=0
if "%~1"=="-log" set WriteLogFile=0
shift & goto parse_passed_params
:end_parse_passed_params

goto:checkPermissions
:begin

if %UninstallUpdates%==1 (
call:title "1/8 - Uninstalling evil updates.."
rem You can find KB description here: https://support.microsoft.com/en-us/kb/%KB_NUMBER%
rem 3080149 - Update for customer experience and diagnostic telemetry // 8.1 / WS 2012 R2, 7 SP1 / WS 2008 R2 SP1
rem 3075249 - Update that adds telemetry points to consent.exe in Windows 8.1 and Windows 7 // 8.1 / RT 8.1 / WS 2012 R2 / 7 SP1 / WS 2008 R2 SP1
rem 2952664 - Compatibility update for upgrading Windows 7 // 7 SP1
rem 3035583 - Update installs Get Windows 10 app in Windows 8.1 and Windows 7 SP1 // 8.1 / 7 SP1 / IE11
rem 3068708 - Update for customer experience and diagnostic telemetry // 8.1 / WS 2012 R2 / 7 SP1 / WS 2008 R2 SP1
rem 3022345 - Update for customer experience and diagnostic telemetry // WS 2012 R2 / 8.1 / WS 2008 R2 SP1 / 7 SP1
rem 3021917 - Update to Windows 7 SP1 for performance improvements // 7 SP1
rem 2976978 - Compatibility update for Windows 8.1 and Windows 8 // 8 / 8.1
rem 3044374 - Update that enables you to upgrade from Windows 8.1 to Windows 10 // WS 2012 R2 / 8.1
rem 2990214 - Update that enables you to upgrade from Windows 7 to a later version of Windows // WS 2008 R2 SP1 / 7 SP1
rem 971033 - Update for Windows Activation Technologies // 7
rem 3075851 - Windows Update Client for Windows 7 and Windows Server 2008 R2: August 2015 // WS 2008 R2 SP1 / 7 SP1 / Embedded Standard 7 SP1
rem 3065988 - Windows Update Client for Windows 8.1 and Windows Server 2012 R2: July 2015 more info // WS 2012 R2 / 8.1
rem 3083325 - Windows Update Client for Windows 8.1 and Windows Server 2012 R2: September 2015 more info // WS 2012 R2 / 8.1
rem 3083324 - Windows Update Client for Windows 7 and Windows Server 2008 R2: September 2015 more info // WS 2008 R2 / 7
rem 3075853 - Windows Update Client for Windows 8.1 and Windows Server 2012 R2: August 2015 more info // WS 2012 R2 / 8.1
rem 3065987 - Windows Update Client for Windows 7 and Windows Server 2008 R2: July 2015 more info // WS 2008 R2 / 7
rem 3050265 - Windows Update Client for Windows 7: June 2015 more info // WS 2008 R2 / 7
rem 3050267 - Windows Update Client for Windows 8.1: June 2015 more info // WS 2012 R2 / 8.1
rem 3046480 - Update helps to determine whether to migrate the .NET Framework 1.1 when you upgrade Windows 8.1 or Windows 7 more info // 7 SP1 / 8.1
rem 2882822 - Update adds ITraceRelogger interface support // 7 SP1 / WS 2008 R2
rem 3083710 - Windows Update Client for Windows 7 and Windows Server 2008 R2: October 2015 // 7 SP1 / WS 2008 R2
rem 3083711 - Windows Update Client for Windows 8.1 and Windows Server 2012 R2: October 2015 // 8.1 / WS 2012 R2
rem 3112343 - Windows Update Client for Windows 7 and Windows Server 2008 R2: December 2015 // 7 / WS 2008 R2
rem 3112336 - Windows Update Client for Windows 8.1 and Windows Server 2012 R2: December 2015 // 8.1 / WS 2012 R2
rem 3112336 - Updated capabilities to upgrade Windows 8.1 and Windows 7 // 8.1 / 7 SP1
rem 3112336 - Windows Update Client for Windows 7 and Windows Server 2008 R2: February 2016 // 7 SP1 / WS 2008 R2 / Embedded Standard 7 SP1
rem 2976978 - Compatibility update for Windows 8.1 and Windows 8 // 8 / 8.1
rem 2977759 - Compatibility update for Windows 7 RTM // 7
rem 3170735 - July 2016 Update for Windows Journal // 7 SP1 / 8 / 8.1
rem 3161102 - Update for Windows Journal component removal // 7 SP1 / 8 / 8.1

for %%? in (
"3080149"
"3075249"
"2952664"
"3035583"
"3068708"
"3022345"
"3021917"
"2976978"
"3044374"
"2990214"
"971033"
"3075851"
"3065988"
"3083325"
"3083324"
"3075853"
"3065987"
"3050265"
"3050267"
"3046480"
"2882822"
"3083710"
"3083711"
"3112343"
"3112336"
"3135445"
"3123862"
"2976978"
"2977759"
"3170735"
"3161102"
) do call:uninstall_update %%?
)

if %DisableUpdates%==1 (
call:title "2/8 - Disabling ^(hiding^) uninstalled updates.."
call:log "It can take a lot of time - wait please, or use -d flag for disable this feature.." "NOTE"
rem To do this, you must init updates list by calling 'call:uninstall_update "123123"' first!
call:disable_updates
)

if %DisableTasks%==1 (
call:title "3/8 - Disabling unneeded scheduled tasks.."
for %%? in (
"\Microsoft\Windows\Application Experience\AitAgent"
"\Microsoft\Windows\Application Experience\Microsoft Compatibility Appraiser"
"\Microsoft\Windows\Application Experience\ProgramDataUpdater"
"\Microsoft\Windows\Autochk\Proxy"
"\Microsoft\Windows\Customer Experience Improvement Program\Consolidator"
"\Microsoft\Windows\Customer Experience Improvement Program\KernelCeipTask"
"\Microsoft\Windows\Customer Experience Improvement Program\UsbCeip"
"\Microsoft\Windows\DiskDiagnostic\Microsoft-Windows-DiskDiagnosticDataCollector"
"\Microsoft\Windows\PI\Sqm-Tasks"
"\Microsoft\Windows\Power Efficiency Diagnostics\AnalyzeSystem"
"\Microsoft\Windows\Windows Error Reporting\QueueReporting"
"\Microsoft\Windows\Maintenance\WinSAT"
"\Microsoft\Windows\Media Center\ActivateWindowsSearch"
"\Microsoft\Windows\Media Center\ConfigureInternetTimeService"
"\Microsoft\Windows\Media Center\DispatchRecoveryTasks"
"\Microsoft\Windows\Media Center\ehDRMInit"
"\Microsoft\Windows\Media Center\InstallPlayReady"
"\Microsoft\Windows\Media Center\mcupdate"
"\Microsoft\Windows\Media Center\MediaCenterRecoveryTask"
"\Microsoft\Windows\Media Center\ObjectStoreRecoveryTask"
"\Microsoft\Windows\Media Center\OCURActivate"
"\Microsoft\Windows\Media Center\OCURDiscovery"
"\Microsoft\Windows\Media Center\PBDADiscovery"
"\Microsoft\Windows\Media Center\PBDADiscoveryW1"
"\Microsoft\Windows\Media Center\PBDADiscoveryW2"
"\Microsoft\Windows\Media Center\PvrRecoveryTask"
"\Microsoft\Windows\Media Center\PvrScheduleTask"
"\Microsoft\Windows\Media Center\RegisterSearch"
"\Microsoft\Windows\Media Center\ReindexSearchRoot"
"\Microsoft\Windows\Media Center\SqlLiteRecoveryTask"
"\Microsoft\Windows\Media Center\UpdateRecordPath"
) do call:disable_task %%?
)

if %DisableServices%==1 (
call:title "4/8 - Disabling unneeded services.."
for %%? in (
"Diagtrack"
"dmwappushservice"
"WerSvc"
) do call:disable_service %%?

set RegDataCollection="HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\DataCollection"
reg query !RegDataCollection!>nul 2>&1 & if %errorLevel%==0 (
reg add !RegDataCollection! /v AllowTelemetry /t REG_DWORD /d 0 /f >nul
)

set RegWindowsReporting="HKEY_CURRENT_USER\Software\Microsoft\Windows\Windows Error Reporting"
reg query !RegWindowsReporting!>nul 2>&1 & if %errorLevel%==0 (
reg add !RegWindowsReporting! /v Disabled /t REG_DWORD /d 1 /f >nul
)
)

if %BlockIPaddresses%==1 (
call:title "5/8 - Blocking MS server's IP addresses.."
for %%? in (
"111.221.29.177"
"111.221.29.253"
"131.253.40.37"
"134.170.30.202"
"134.170.115.60"
"134.170.165.248"
"134.170.165.253"
"134.170.185.70"
"137.116.81.24"
"137.117.235.16"
"157.55.129.21"
"157.55.133.204"
"157.56.121.89"
"157.56.91.77"
"168.63.108.233"
"184.86.56.12"
"185.13.160.61"
"191.232.139.254"
"191.232.80.58"
"191.232.80.62"
"191.237.208.126"
"204.79.197.200"
"207.46.101.29"
"207.46.114.58"
"207.46.223.94"
"207.68.166.254"
"212.30.134.204"
"212.30.134.205"
"23.102.21.4"
"23.99.10.11"
"23.218.212.69"
"64.4.54.22"
"64.4.54.32"
"64.4.6.100"
"65.39.117.230"
"65.52.100.11"
"65.52.100.7"
"65.52.100.9"
"65.52.100.91"
"65.52.100.92"
"65.52.100.93"
"65.52.100.94"
"65.52.108.29"
"65.55.108.23"
"65.55.138.114"
"65.55.138.126"
"65.55.138.186"
"65.55.252.63"
"65.55.252.71"
"65.55.252.92"
"65.55.252.93"
"65.55.29.238"
"65.55.39.10"
) do call:block_route %%?
)

if %BlockIPaddressesWithFirewall%==1 (
call:title "6/8 - Blocking IP addresses to firewall rule.."
rem To do this, you must init IP addresses list by calling 'call:block_route "1.1.1.1"' first!
call:block_routes_with_firewall
)

if %AddDomainsToHosts%==1 (
call:title "7/8 - Finding and adding MS domains to HOSTS file ^(block^).."
for %%? in (
"--title--"
"msedge.net"
"a-msedge.net"
"a-0001.a-msedge.net"
"a-0002.a-msedge.net"
"a-0003.a-msedge.net"
"a-0004.a-msedge.net"
"a-0005.a-msedge.net"
"a-0006.a-msedge.net"
"a-0007.a-msedge.net"
"a-0008.a-msedge.net"
"a-0009.a-msedge.net"
"a1095.g2.akamai.net"
"ad.doubleclick.net"
"adnexus.net"
"adnxs.com"
"secure.adnxs.com"
"m.adnxs.com"
"ads1.msads.net"
"ads1.msn.com"
"ads2.msn.com"
"flex.msn.com"
"g.msn.com"
"h2.msn.com"
"h1.msn.com"
"a.ads1.msn.com"
"a.ads2.msn.com"
"a.ads2.msads.net"
"live.rads.msn.com"
"ads2.msn.com.c.footprint.net"
"aka-cdn-ns.adtech.de"
"az361816.vo.msecnd.net"
"az512334.vo.msecnd.net"
"bs.serving-sys.com"
"msntest.serving-sys.com"
"telemetry.microsoft.com"
"ca.telemetry.microsoft.com"
"c.msn.com"
"aidps.atdmt.com"
"view.atdmt.com"
"ec.atdmt.com"
"c.atdmt.com"
"db3aqu.atdmt.com"
"cdn.atdmt.com"
"choice.live.com"
"choice.microsoft.com"
"choice.microsoft.com.nsatc.net"
"compatexchange.cloudapp.net"
"corpext.msitadfs.glbdns2.microsoft.com"
"corp.sts.microsoft.com"
"cs1.wpc.v0cdn.net"
"df.telemetry.microsoft.com"
"e9946.g.akamaiedge.net"
"fe2.update.microsoft.com.akadns.net"
"fe3.delivery.dsp.mp.microsoft.com.nsatc.net"
"microsoft-hohm.com"
"feedback.microsoft-hohm.com"
"feedback.search.microsoft.com"
"feedback.windows.com"
"i1.services.social.microsoft.com"
"i1.services.social.microsoft.com.nsatc.net"
"i.s1.social.ms.akadns.net"
"lb1.www.ms.akadns.net"
"legacy-redirection-neurope-prod-hp.cloudapp.net"
"oca.telemetry.microsoft.com"
"oca.telemetry.microsoft.com.nsatc.net"
"onesettings-hk2.metron.live.com.nsatc.net"
"pre.footprintpredict.com"
"preview.msn.com"
"ads.msn.com"
"rad.msn.com"
"rad.live.com"
"b.rad.msn.com"
"b.ads2.msads.net"
"b.ads1.msn.com"
"ac3.msn.com"
"a.rad.msn.com"
"cds26.ams9.msecn.net"
"secure.flashtalking.com"
"static.2mdn.net"
"s0.2mdn.net"
"redirection.prod.cms.msn.com"
"redirection.prod.cms.msn.com.akadns.net"
"redir.metaservices.microsoft.com"
"redir.metaservices.microsoft.com.akadns.net"
"redir.metaservices.microsoft.com.edgesuite.net"
"wes.df.telemetry.microsoft.com"
"reports.wes.df.telemetry.microsoft.com"
"services.wes.df.telemetry.microsoft.com"
"settings.data.glbdns2.microsoft.com"
"settings.data.microsoft.com"
"settings-sandbox.data.glbdns2.microsoft.com"
"settings-sandbox.data.microsoft.com"
"settings-win.data.microsoft.com"
"schemas.microsoft.akadns.net"
"siweb.microsoft.akadns.net"
"sls.update.microsoft.com.akadns.net"
"spynet2.microsoft.akadns.net"
"spynet2.microsoft.com"
"spynetalt.microsoft.akadns.net"
"spynetalt.microsoft.com"
"spyneteurope.microsoft.akadns.net"
"sqm.df.telemetry.microsoft.com"
"sqm.telemetry.microsoft.com"
"sqm.telemetry.microsoft.com.nsatc.net"
"ssw.live.com"
"ssw.live.com.nsatc.net"
"statsfe1.ws.microsoft.com"
"statsfe1.ws.microsoft.com.nsatc.net"
"statsfe2.update.microsoft.com.akadns.net"
"statsfe2.ws.microsoft.com"
"statsfe2.ws.microsoft.com.nsatc.net"
"support.msn.microsoft.akadns.net"
"watson.microsoft.com"
"survey.watson.microsoft.com"
"telecommand.telemetry.microsoft.com"
"telecommand.telemetry.microsoft.com.nsatc.net"
"telemetry.appex.bing.net"
"telemetry.appex.search.prod.ms.akadns.net"
"telemetry.urs.microsoft.com"
"t.urs.microsoft.com.nsatc.net"
"vortex.data.glbdns2.microsoft.com"
"vortex.data.metron.live.com.nsatc.net"
"vortex-bn2.metron.live.com.nsatc.net"
"vortex-cy2.metron.live.com.nsatc.net"
"vortex.data.microsoft.com"
"vortex-db5.metron.live.com.nsatc.net"
"vortex-sandbox.data.glbdns2.microsoft.com"
"vortex-sandbox.data.microsoft.com"
"vortex-win.data.metron.live.com.nsatc.net"
"vortex-win.data.microsoft.com"
"watson.live.com"
"watson.microsoft.com.nsatc.net"
"watson.ppe.telemetry.microsoft.com"
"watson.telemetry.microsoft.com"
"watson.telemetry.microsoft.com.nsatc.net"
) do call:add_to_hosts %%?
)

if %DisableAutomaticUpdates%==1 (
call:title "8/8 - Disabling automatic Windows® update ^(make search, but you must manually select updates to install^)"
set RegeditRoot="HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update"
reg add !RegeditRoot! /v AUOptions /t REG_DWORD /d 2 /f>nul
reg add !RegeditRoot! /v IncludeRecommendedUpdates /t REG_DWORD /d 0 /f>nul
)

goto:end

:log
set message=%~1
set type=%~2
if [!type!] EQU [] (
set type=%time%
)
echo [!type!] %message%
if %WriteLogFile%==1 ( if [%LogFilePath%] NEQ [] (
echo [!type!] %message%>>%LogFilePath% 2>&1
))
exit /b

:title
set title=%~1
echo.
echo [i] %title%
if %WriteLogFile%==1 ( if [%LogFilePath%] NEQ [] (
echo.>>%LogFilePath% 2>&1
echo [i] %title%>>%LogFilePath% 2>&1
))
exit /b

:checkPermissions
if exist %SystemRoot%\System32\fsutil.exe (
fsutil dirty query %systemdrive%>nul 2>&1
) else (
net session >nul 2>&1
)
if %errorLevel%==0 (
goto:begin
) else (
call:log "Failure: Please run this script with administrtor's privilege!"
goto:end
)
exit /b

:download_file
set url=%~1
set dest=%~2
powershell -ExecutionPolicy RemoteSigned -NoLogo -Noninteractive -Command "try { Import-Module BitsTransfer; Start-BitsTransfer -Source %url% -Destination %dest%; exit 100; } catch { exit 0; }">nul
exit /b

:install_pswu_module
set ps_modules_dir=%windir%\System32\WindowsPowerShell\v1.0\Modules
set pswu_distr_path="!ps_modules_dir!\PSWindowsUpdate"
set result=0
if exist "!pswu_distr_path!\Hide-WUUpdate.ps1" (
rem call:log "PowerShell module 'PSWindowsUpdate' found"
set result=100
) else (
set local_unzip_tool=0
set local_pswu_module=0
call:log "0/8 - Installing PowerShell module 'PSWindowsUpdate'" "Install update"
if exist "%~dp0\unzip.exe" (
set local_unzip_tool=1
set unzip_tool="%~dp0\unzip.exe"
call:log "Local unzip tool found"
) else (
set unzip_tool="%temp%\unzip.exe"
call:log "Download unzip tool.."
rem Original source: http://stahlworks.com/dev/unzip.exe
call:download_file "https://www.dropbox.com/s/gxf8d4bg0yyozdh/unzip.exe?dl=1" !unzip_tool!
)
if exist !unzip_tool! (
if exist "%~dp0\PSWindowsUpdate.zip" (
set local_pswu_module=1
set pswu_zip="%~dp0\PSWindowsUpdate.zip"
call:log "Local PSWindowsUpdate module found"
) else (
set pswu_zip="%temp%\PSWindowsUpdate.zip"
call:log "Downloading PowerShell module 'PSWindowsUpdate'.."
rem Original source: https://gallery.technet.microsoft.com/scriptcenter/2d191bcd-3308-4edd-9de2-88dff796b0bc/
call:download_file "https://www.dropbox.com/s/z61nlkfecmhabil/PSWindowsUpdate.zip?dl=1" !pswu_zip!
)
if exist !pswu_zip! (
set pswu_temp="%temp%\pswindowsupdate_content"
call:log "Uncompressing module archive.."
!unzip_tool! -oC !pswu_zip! -d !pswu_temp!>nul
if exist !pswu_temp! (
call:log "Moving module files to PowerShell modules directory.."
if exist !pswu_distr_path! (rmdir !pswu_distr_path! /s /q>nul)
move /y "!pswu_temp!\PSWindowsUpdate" !ps_modules_dir!>nul
if "!local_unzip_tool!" NEQ "1" (del /f !unzip_tool!>nul)
if "!local_pswu_module!" NEQ "1" (del /f !pswu_zip!>nul)
rmdir !pswu_temp! /s /q>nul
if exist "!pswu_distr_path!\Hide-WUUpdate.ps1" (
call:log "'PSWindowsUpdate' module for PowerShell installed" "Installation complete"
set result=100
timeout /t 2 /nobreak>nul & tskill powershell>nul 2>&1 & timeout /t 2 /nobreak>nul
) else (
call:log "Failure: Installation module 'PSWindowsUpdate' failed - files in !pswu_distr_path! not found" "Installation failed"
)
)
)
)
)
exit /b

:uninstall_update
set kb_id=%~1
rem Remove update
call:log "Uninstalling KB%kb_id%.."
start /wait wusa /uninstall /norestart /quiet /kb:%kb_id%
if %errorlevel%==2359303 call:log "Update KB%kb_id% is not installed"
if %errorlevel%==1223 call:log "Uninstall cancelled"
if %errorlevel%==3010 call:log "Update KB%kb_id% UNINSTALLED successfully"
rem Add all updates IDs to single string variable (',' is delimiter)
set UpdatesList=%UpdatesList%KB%kb_id%,
exit /b

:disable_updates
rem Adding update to Windows Update exceptions (hide update) using PowerShell
if [!UpdatesList!] EQU [] (
call:log "Failure Update list empty. To add update ID to block list, - uninstall update(s) prior to running this script" "Error"
exit /b
)
rem Remove last (',') char
set UpdatesListForDisabling=!UpdatesList:~0,-1!
call:install_pswu_module
if %result%==100 (
call:log "Disable updates: !UpdatesListForDisabling!.."
powershell -ExecutionPolicy RemoteSigned -NoLogo -Noninteractive -Command "Import-Module PSWindowsUpdate; try { Hide-WUUpdate -KBArticleID !UpdatesListForDisabling! -Confirm:$false; exit 100; } catch { exit 0; }">nul 2>&1
if !errorlevel!==100 (
call:log "Updates successfully DISABLED"
) else (
call:log "Failure Unable to disable updates: Update your PowerShell or install PowerShell module 'PSWindowsUpdate'" "Error"
)
)
exit /b

:block_route
set REDIRECT=0.0.0.0
set ip_addr=%~1
call:log "Blocking: %ip_addr%"
route -p ADD %ip_addr% MASK 255.255.255.255 %REDIRECT%>nul 2>&1
rem Adding all addresses to single string variable (',' is delimiter)
set FirewallIPlist=%FirewallIPlist%%ip_addr%,
exit /b

:block_routes_with_firewall
if [!FirewallIPlist!] EQU [] (
call:log "Failure Empty IP list. For add IP to firewall block list - block ip by route first" "Error"
exit /b
)
if exist %SystemRoot%\System32\netsh.exe (
set FirewallRuleName=Remove MS Telemetry and Annoyances
rem Removing existing rule(s), adding new rule(s), and check that it exists.
netsh advfirewall firewall delete rule name="!FirewallRuleName!">nul
netsh advfirewall firewall add rule name="!FirewallRuleName!" dir=out action=block remoteip=!FirewallIPlist! interfacetype=any>nul
netsh advfirewall firewall show rule name="!FirewallRuleName!">nul
if %errorlevel% EQU 0 (
call:log "IP addresses blocked with firewall rule '!FirewallRuleName!': '!FirewallIPlist:~0,-1!'"
) else (
call:log "Cannot add firewall rule '!FirewallRuleName!' - maybe firewall service disabled^?" "Error"
)
) else (
call:log "Failure Windows Firewall® is not accessible (file 'netsh.exe' does not exist)" "Error"
)
exit /b

:disable_task
set task_name=%~1
call:log "Disable task %task_name%"
schtasks /Change /TN "%task_name%" /DISABLE>nul 2>&1
exit /b

:disable_service
set service_name=%~1
set errors_counter=0
call:log "Disabling service '%service_name%'"
sc query "%service_name%">nul
if %errorlevel% NEQ 1060 (
sc config "!service_name!" start= disabled>nul
if %errorlevel% NEQ 0 set /a errors_counter=errors_counter+1
sc stop "!service_name!">nul
if %errorlevel% NEQ 0 set /a errors_counter=errors_counter+1
if %errors_counter%==0 (
call:log "Service '!service_name!' has been disabled successfully."
)
) else set /a errors_counter=errors_counter+1 & call:log "Service '!service_name!' is not installed"
exit /b

:add_to_hosts
set HOSTS=%SystemRoot%\system32\drivers\etc\hosts
set REDIRECT=0.0.0.0
set block_title=## Block MS telemetry domain names
set write_title=0
set host_name=%~1
if "%host_name%"=="--title--" (
set write_title=1
set host_name=%block_title%
)
find /C /I "%host_name%" %HOSTS%>nul
if %errorlevel% NEQ 0 (
attrib -r %HOSTS%>nul
if !write_title! EQU 1 (
echo.>>%HOSTS%
echo.>>%HOSTS%
echo %block_title%>>%HOSTS%
) else (
echo %REDIRECT% %host_name%>>%HOSTS%
call:log "Blocking Domain %host_name%"
)
) else (
if !write_title! NEQ 1 (
call:log "Existing block: %host_name%"
)
)
exit /b

:end
call:title "The script will exit after 60 seconds has been past. Press any keys to exit the script now."
timeout /t 60>nul 2>&1
endlocal & if %ExitOnComplete%==1 (exit)
echo on

Геннадьевич
29-04-2020, 14:01
Нашел вот такую утилиту по удалению "вредных" обновлений в Windows 7 на просторах интернета »
Данная утилита также предлагает избавиться от обновления KB2670838, которое необходимо для успешной установки и работы браузеров IE 10 / 11 в ОС Windows 7 SP1. Откат KB2670838 повлечёт за собой удаление из системы этих обозревателей!




© OSzone.net 2001-2012