Advertisement
If you have a new account but are having problems posting or verifying your account, please email us on hello@boards.ie for help. Thanks :)
Hello all! Please ensure that you are posting a new thread or question in the appropriate forum. The Feedback forum is overwhelmed with questions that are having to be moved elsewhere. If you need help to verify your account contact hello@boards.ie

Microsoft Spying

Options
  • 24-11-2015 12:48am
    #1
    Closed Accounts Posts: 1,202 ✭✭✭


    I whipped open process explorer today on Windows 7 desktop as my pc was lagging and wanted to find out what was causing it and I came across something I've never seen before.

    What I see is a list of expected processes associated with a Local Address namely htpc-pc which is the name I'd given to my pc when I installed the OS.

    But as you can see there a slew of other process including my chrome browser which are associated with another local address of "vortex.data.microsoft.com".

    Can anyone shed any light on this or how to get rid of it.


    TcUl3ry.jpg


Comments

  • Closed Accounts Posts: 12,807 ✭✭✭✭Orion


    add this to your hosts file:
    127.0.0.1 vortex.data.microsoft.com

    file is located in c:\windows\system32\drivers\etc


  • Closed Accounts Posts: 1,202 ✭✭✭colossus-x


    biko wrote: »

    Yes I did.

    I found this utility: http://techtools.net/forum/viewtopic.php?f=135&t=71957

    which put this in my hosts file which doesn't seem have worked for vortex
    # Copyright (c) 1993-2009 Microsoft Corp.
    #
    # This is a sample HOSTS file used by Microsoft TCP/IP for Windows.
    #
    # This file contains the mappings of IP addresses to host names. Each
    # entry should be kept on an individual line. The IP address should
    # be placed in the first column followed by the corresponding host name.
    # The IP address and the host name should be separated by at least one
    # space.
    #
    # Additionally, comments (such as these) may be inserted on individual
    # lines or following the machine name denoted by a '#' symbol.
    #
    # For example:
    #
    # 102.54.94.97 rhino.acme.com # source server
    # 38.25.63.10 x.acme.com # x client host

    # localhost name resolution is handled within DNS itself.
    # 127.0.0.1 localhost
    # ::1 localhost

    127.0.0.1 lmlicenses.wip4.adobe.com
    127.0.0.1 lm.licenses.adobe.com
    127.0.0.1 na1r.services.adobe.com
    127.0.0.1 hlrcv.stage.adobe.com
    127.0.0.1 practivate.adobe.com
    127.0.0.1 activate.adobe.com
    0.0.0.0 vortex.data.microsoft.com
    0.0.0.0 vortex-win.data.microsoft.com
    0.0.0.0 telecommand.telemetry.microsoft.com
    0.0.0.0 telecommand.telemetry.microsoft.com.nsatc.net
    0.0.0.0 oca.telemetry.microsoft.com
    0.0.0.0 sqm.telemetry.microsoft.com
    0.0.0.0 sqm.telemetry.microsoft.com.nsatc.net
    0.0.0.0 watson.telemetry.microsoft.com
    0.0.0.0 watson.telemetry.microsoft.com.nsatc.net
    0.0.0.0 redir.metaservices.microsoft.com
    0.0.0.0 choice.microsoft.com
    0.0.0.0 choice.microsoft.com.nsatc.net
    0.0.0.0 wes.df.telemetry.microsoft.com
    0.0.0.0 services.wes.df.telemetry.microsoft.com
    0.0.0.0 sqm.df.telemetry.microsoft.com
    0.0.0.0 telemetry.microsoft.com
    0.0.0.0 watson.ppe.telemetry.microsoft.com
    0.0.0.0 telemetry.appex.bing.net
    0.0.0.0 telemetry.urs.microsoft.com
    0.0.0.0 telemetry.appex.bing.net:443
    0.0.0.0 settings-sandbox.data.microsoft.com
    0.0.0.0 survey.watson.microsoft.com
    0.0.0.0 watson.live.com
    0.0.0.0 watson.microsoft.com
    0.0.0.0 statsfe2.ws.microsoft.com
    0.0.0.0 corpext.msitadfs.glbdns2.microsoft.com
    0.0.0.0 compatexchange.cloudapp.net
    0.0.0.0 a-0001.a-msedge.net
    0.0.0.0 statsfe2.update.microsoft.com.akadns.net
    0.0.0.0 sls.update.microsoft.com.akadns.net
    0.0.0.0 fe2.update.microsoft.com.akadns.net
    0.0.0.0 diagnostics.support.microsoft.com
    0.0.0.0 corp.sts.microsoft.com
    0.0.0.0 statsfe1.ws.microsoft.com
    0.0.0.0 feedback.windows.com
    0.0.0.0 feedback.microsoft-hohm.com
    0.0.0.0 feedback.search.microsoft.com
    0.0.0.0 rad.msn.com
    0.0.0.0 preview.msn.com
    0.0.0.0 ad.doubleclick.net
    0.0.0.0 ads.msn.com
    0.0.0.0 ads1.msads.net
    0.0.0.0 ads1.msn.com
    0.0.0.0 a.ads1.msn.com
    0.0.0.0 a.ads2.msn.com
    0.0.0.0 adnexus.net
    0.0.0.0 adnxs.com
    0.0.0.0 az361816.vo.msecnd.net
    0.0.0.0 az512334.vo.msecnd.net
    0.0.0.0 ssw.live.com
    0.0.0.0 ca.telemetry.microsoft.com
    0.0.0.0 i1.services.social.microsoft.com
    0.0.0.0 i1.services.social.microsoft.com.nsatc.net
    0.0.0.0 df.telemetry.microsoft.com
    0.0.0.0 reports.wes.df.telemetry.microsoft.com
    0.0.0.0 cs1.wpc.v0cdn.net
    0.0.0.0 vortex-sandbox.data.microsoft.com
    0.0.0.0 oca.telemetry.microsoft.com.nsatc.net
    0.0.0.0 pre.footprintpredict.com
    0.0.0.0 spynet2.microsoft.com
    0.0.0.0 spynetalt.microsoft.com
    0.0.0.0 fe3.delivery.dsp.mp.microsoft.com.nsatc.net
    0.0.0.0 cache.datamart.windows.com
    0.0.0.0 db3wns2011111.wns.windows.com
    0.0.0.0 deploy.static.akamaitechnologies.com
    0.0.0.0 akamaitechnologies.com


  • Registered Users Posts: 81,220 ✭✭✭✭biko


    Yeah, one of my links says the domains are hardcoded so they might not even use the hosts file. It also has a suggestion.


  • Closed Accounts Posts: 68 ✭✭perry123


    colossus-x wrote: »
    I whipped open process explorer today on Windows 7 desktop as my pc was lagging and wanted to find out what was causing it and I came across something I've never seen before.

    What I see is a list of expected processes associated with a Local Address namely htpc-pc which is the name I'd given to my pc when I installed the OS.

    But as you can see there a slew of other process including my chrome browser which are associated with another local address of "vortex.data.microsoft.com".

    Can anyone shed any light on this or how to get rid of it.


    TcUl3ry.jpg
    google spybot SD anti beacons for windows


  • Advertisement
Advertisement