![]() ![]() Understand though, that I wipe and reload Windows on my laptop approximately once every 14 months, meaning I’m not woefully out of date.The w10privacy.exe file is a legitimate executable file that is commonly found in c:\users\ bederdindesktopespion w10w10privacyw10privacy.exe. Okay, those are the majors, and the required stuff for me when I first wipe and reload Windows 10 on my laptop. For added paranoia, if your firewall runs Tomato, you can use the integrated Adblocker to utilize this hosts file at the router level, though obviously this only protects you while you’re connected to that router. Copy/paste this list of host file entries into yours.Reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\DataCollection" /v AllowTelemetry /t REG_DWORD /d 0 /f Run these commands from an elevated command prompt:Įcho "" > C:\ProgramData\Microsoft\Diagnosis\ETLLogs\AutoLogger\AutoLogger-Diagtrack-Listener.etl.ESET NOD32 is my personal favorite, and it’s frequently on sale on Newegg. ![]() However, I strongly recommend using a third party antivirus since Windows Defender will clear the hosts file entries when it runs scans. Most of this was addressed with W10 Privacy, as it adds a whole lot of entries to your “hosts” file to minimize the output.At the very least, install Classic Shell provisionally, as it gives ‘uninstall’ options for a number of Win10 apps that Windows won’t allow, leaving you with just the core. If you want to use the stock Windows 10 start menu, you’re weird, but you won’t see random apps starting up. If you’re skittish about that, the five bucks Stardock wants for Start10 is perfectly reasonable. With Windows Update neutered, MS won’t be messing with it, so the final release will be just fine and very reliable. Go back up to the last step about applying read-only permissions to “System” and “TrustedInstaller”, then do those exact same steps on this folder.You will also wait forever for file system searches to be performed, though if you’re not using Everything to do your file system searches instantly instead of battling the green bar, you don’t know what your missing. A word of caution though, if you use Outlook, you won’t be able to do search-as-you-type. Click OK, then OK again to commit the changes. For added paranoia, remove everyone except “System” and “TrustedInstaller” so that it can’t run in a user context. Do the same for the “System”, “Users”, “ALL APPLICATION PACKAGES”, and “ALL RESTRICTED APPLICATION PACKAGES” accounts as well. Uncheck everything except ‘Read’ (Windows Defender will replace it if you delete it or deny it ‘Read’ permissions). Click ‘TrustedInstaller’, then ‘Edit’.Click ‘Change Permissions’, approving the UAC prompt if needed.Click OK again to close out the “Advanced” window, then click ‘Advanced’ again to re-open it with the ownership changes. Type your user account name, then click OK. On the top where it lists the owner as “TrustedInstaller”, click ‘Change’.Double click it, set it to ‘disabled’ (if it isn’t already), then click ‘stop’ (if it isn’t already). When it loads, scroll down to “Windows Update”. After rebooting, from a ‘run’ prompt or a command line (or the start menu search), type “services.msc”.It’ll take a few minutes to finish everything. Click ‘Set Changed Settings’, then confirm it.This is the config I use on my computer, but your needs may be different, so give it a quick once-over. Go through the different tabs and make sure there’s nothing you’d like to change.Use ‘Choose Path’ to navigate to where you extracted the ZIP file, and import the INI file. Take care of the major stuff in one shot….This should also include the SMBv1 fix no sense in keeping yourself open to WannaCry. ![]() You probably don’t want to be running on two-year-old install media.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |