vinifera

Member
  • Content count

    1,617
  • Joined

  • Last visited

  • Days Won

    1

vinifera last won the day on June 21 2015

vinifera had the most liked content!

Community Reputation

89 Excellent

About vinifera

  • Rank
    <°)))><
  • Birthday

Profile Information

  • OS
    Windows 7 x64
  • Country

Recent Profile Visitors

1,412 profile views
  1. AFAIK telemetry started with XP and Office 2003 had it even more integrated without user knowing it, as they recieved nice data what was clicked on and what was used
  2. its not just development activation servers are killed too which is another stomp
  3. not if its abandoned by developer AFAIK XP was ditched in 2014 (WEPoS doesn't count, as they release it under diff name and "SKU"/licence)
  4. lulz telemetry was hardcoded in NT since XP
  5. sjeez what a BS video like 8.1 is only one that has Embedded SKU btw you can tweak your NTOS more via tools than using Embedded
  6. its in .msstyle you need resource hacker or simmiliar tool to replace resource image
  7. but OS needs some IE components you can see which ones are protected if you go delete them manually
  8. yeah their love for money and spyware
  9. both as some tabs will run in *32 mode system32 is no longer tied to IE as it used to with vista and xp but OS itself does use IE folders (since OS still uses its elements)
  10. so basically titlebar text is white colored as your window frames these things were usually controled within skin itself (.msstyle) dunno if winblows 10 has any decoys
  11. just the folder itself
  12. guess "security" suits from av companies will again shine new blockers will have to be made, ... kinda history repeats itself but, if i live enough, win7 will be my last, as much as i hate it but linux is next logic step winblows in its current way will kill itself
  13. mmm nice article, thanks for link well i'm on android 4.3, butreading that article, i'm doing good haha ad-away + afwall + greenify and removed few services from os base install makes things good even on web they have my wrong location, as they can't pin point me BUT let me ask another question, again security wise having Flash installed on winblows is a medium security risk but what about rooted Android phone ? I have Flash 11.1 (it was last one to be made) installed, naturally blocked by firewall but do android "files" can exploit it via flash like on win32 or not ?