Windows Spy Blocker

Mutt

Professional
Messages
1,457
Reaction score
1,266
Points
113
In the modern digital world, a lot of questions "run up" on the problem of tracking personal data, as well as the dark scheme of spying on user activities. In this article, we will talk about how you can fully protect against such problems in the Windows operating system, and also consider the features of the useful Windows Spy Blocker tool.

Windows Spy Blocker
Windows Spy Blocker is designed to block espionage and tracking. The application is executed using the Go programming language. This program captures and analyzes network traffic based on a set of specific tools. It is available for Windows 7 SP1, Windows 8, Windows 10.

Link-> https://github.com/crazy-max/WindowsSpyBlocker/releases/tag/4.16.0

It comes in the form of a lightweight executable file. The good thing is that the executable can be downloaded (option for anyone who hates typing download commands on the command line). The current release is only 5.5 MB. The utility captures and analyzes network traffic based on a set of tools implemented in it.

How Windows Spy Blocker works
In principle, it is clear that the developer wrote this executable file specifically in order to block tracking programs that are detected based on the analysis of network traffic. It is not Russified, and it is not necessary, since it does not have a full-fledged interface, and the program, in fact, is a set of certain rules.

The console appears immediately after the launch permission. The first thing to do is turn on your internet connection if it isn't already on. If it happens that there is no internet connection, an error will appear. The commands are laid out on the console with a description of what each does, so it will be easy for you to figure it out.
WindowsSpyBlocker-no-internet-connection.png


In the main part, the "Telemetry" and "Dev" blocks are presented, which can be started by entering 1 and 2, respectively. These commands call additional subcommands.
Launch-screen-with-main-commands.png


If you depict this information hierarchically, it will look something like this:
jkD_CmloLnw.jpg


The results obtained change according to the command entered. So, to capture and analyze network traffic for telemetry, the developer used QEMU virtual machines on the Proxmox VE platform. This flushes memory dumps daily, comparing the current rules for adding or removing some hosts or firewall rules. The developer indicates that he uses the following tools to capture traffic: Qemu -net dump, Sysmon, Wireshark, Proxifier. All events that occur are saved in the logs folder.
NCSI-test-internet-connection.png


The data folder contains blocking rules based on domains or IP addresses found during the capture process: blocking telemetry, OS updates, blocking third-party applications.

Immediately I advise you to create a special folder under Windows Spy Blocker, where you initially need to save the program itself, and all configurations, logs and folders that the utility will create during operation will be saved there. The program developer recommends copying the hosts file created by the program and located in the Data folder and pasting it into the hosts of your system.

The utility will be in demand among those users who want to monitor their network traffic. Thus, now you can fully use the wonderful Windows Spy Blocker tool with a great motive to help avoid tracking and acceleration. Its functionality is very easy to use, therefore, in the process of its conscientious work, it is unlikely to disappoint you.
 
Top