Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

WindowsSpyBlocker rules #35

Closed
crazy-max opened this issue Jun 23, 2017 · 16 comments
Closed

WindowsSpyBlocker rules #35

crazy-max opened this issue Jun 23, 2017 · 16 comments
Labels

Comments

@crazy-max
Copy link

Hi @henrypp

I'm the developer of WindowsSpyBlocker and i'm glad to see that you're using these rules ;)
I wanted to know if it would interest you that I integrate and directly generates the blocklist.xml in my repository?

The structure would look like this:

data/simplewall/win7/extra.xml
data/simplewall/win7/spy.xml
data/simplewall/win7/update.xml

Then instead of copy / paste the rules from my repository you just have to download directly from your app the rules. A project called HostsMan can manage multi sources from the web and update automatically. I think it might interest you and why not also handle the blocking of domain names.

Let me know if you are interesting.

Thanks

@henrypp
Copy link
Owner

henrypp commented Jun 23, 2017

hi, @crazy-max

nice idea, but why do you categorize rules by OS (win7, win81, win10), not just by spy, extra and update?

why not also handle the blocking of domain names.

i think it possible, but hosts file is better by speed (i think)!

@crazy-max
Copy link
Author

@henrypp Because some probes are OS specific but many are common.

@crazy-max
Copy link
Author

The simplewall data format has been added : https://github.com/crazy-max/WindowsSpyBlocker/tree/master/data/simplewall

@ryanbr
Copy link

ryanbr commented Sep 16, 2017

Would this break users testing the Windows Insider Programme? (Testing beta/alpha pre-release windows)

@henrypp
Copy link
Owner

henrypp commented Sep 19, 2017

@ryanbr, yes it may.

@ltguillaume
Copy link
Contributor

ltguillaume commented Nov 30, 2017

Apparently, Blocklist rules take priority over custom rules. I wanted to allow a VirtualBox.exe instance to ignore the Blocklist rules I've selected for the host system, but still it blocks the connections.

simplewall also fails to pop up a notification for this, even though they're logged to a file. (I do not have "Exclude blocklist rules" enabled; I do not have "Disable notifications" for virtualbox.exe enabled.)

@ltguillaume
Copy link
Contributor

@henrypp henrypp closed this as completed Jun 13, 2018
@ltguillaume
Copy link
Contributor

@ltguillaume
Copy link
Contributor

@ltguillaume
Copy link
Contributor

@ltguillaume
Copy link
Contributor

@ltguillaume
Copy link
Contributor

@ltguillaume
Copy link
Contributor

@henrypp
Copy link
Owner

henrypp commented May 24, 2019

@crazy-max,

Hello, Windows 10 1903 has a problem - it has a some new ip addresses of update servers.

#206 (comment)

@crazy-max
Copy link
Author

crazy-max commented May 24, 2019

Hi @henrypp, thanks for your input, keep you in touch.

@ltguillaume
Copy link
Contributor

@Henry https://github.com/crazy-max/WindowsSpyBlocker/releases/tag/4.22.0

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

4 participants