Thanks for the warning!
but how the heck is one going to prevent Win 10 from trying to auto upgrade the Windows
I saw a R24K HP system crash today - after it auto updated to this new Windows 10 Creators Update
Had to do a Windows rollback using Win 10 recovery DVD to resolve the issue.
So for now its fixed - but how the heck is one going to prevent Win 10 from trying to auto upgrade the Windows version to this buggy update again?
So anyway - just a warning to all of you - this update may crash your perfectly working HP laptop or desktop. Be warned. It just hangs the whole system and locks you out of Win 10 functions.
Took a while to fix as you can imagine.
https://www.theregister.co.uk/2017/04/26/stop_downloading_win10_creators_update/
I had endless mouse issues after Creators update.
Funny... It is just broken Windows.What mouse issues? Anything to do with Bluetooth?
The old Win8 registry hacks were working before and Microsoft disabled most of them in 1607 and later. Also since the 1607 policy editing in Pro version is ignored. Strictly speaking it is provisional, depends on the current instructions from Microsoft's servers. It is a reason why I received complete "denial of service" UAC on the computer without Internet access with automatic updates disabled in PE. When I posted this picture, Microsoft mole called me an "uneducated lier". Now it is generally acknowledged that Windows do that at will.Who in this day and age Let PC's update automatically?
Seriously?????
Install WSUS point to it and approve what you want esp if you in IT, Hell with a simple reg edit you can even force Home editions to only uses WSUS. Oh and this will also block updates as well. You can even tell it not to push 1 update to 1 PC but approve the rest.
For Home and Home Single, just add contents below into a Update.reg file created with notepad and run it (Replace 127.0.0.1 with your local WSUS server.)
Code:Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate] "AcceptTrustedPublisherCerts"=dword:00000001 "ElevateNonAdmins"=dword:00000001 "TargetGroup"="Workstations" "TargetGroupEnabled"=dword:00000000 "WUServer"="http://127.0.0.1" "WUStatusServer"="http://127.0.0.1" [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU] "AUOptions"=dword:00000004 "AUPowerManagement"=dword:00000001 "AutoInstallMinorUpdates"=dword:00000001 "DetectionFrequency"=dword:0000000a "DetectionFrequencyEnabled"=dword:00000001 "IncludeRecommendedUpdates"=dword:00000001 "NoAUAsDefaultShutdownOption"=dword:00000001 "NoAUShutdownOption"=dword:00000001 "NoAutoRebootWithLoggedOnUsers"=dword:00000001 "NoAutoUpdate"=dword:00000000 "RebootRelaunchTimeout"=dword:0000000a "RebootRelaunchTimeoutEnabled"=dword:00000001 "RescheduleWaitTime"=dword:0000000a "RescheduleWaitTimeEnabled"=dword:00000001 "ScheduledInstallDay"=dword:00000000 "ScheduledInstallTime"=dword:00000003 "UseWUServer"=dword:00000001
Now you can approve the updates to your hearts content. Even better if you have more than on PC you don't have to download the updates more than once.
The old Win8 registry hacks were working before and Microsoft disabled most of them in 1607 and later. Also since the 1607 policy editing in Pro version is ignored. Strictly speaking it is provisional, depends on the current instructions from Microsoft's servers. It is a reason why I received complete "denial of service" UAC on the computer without Internet access with automatic updates disabled in PE. When I posted this picture, Microsoft mole called me an "uneducated lier". Now it is generally acknowledged that Windows do that at will.
Similarly the above registry hack can be ignored in future in a new OS update. You will be used as a livestock to clear the minefield (as the article say) without even knowing it. Not even mentioning Bitcoin mining on your computer - a separate issue. Give up with Windows 10, it is what we can do the best.
Who in this day and age Let PC's update automatically?
Seriously?????
Install WSUS point to it and approve what you want esp if you in IT, Hell with a simple reg edit you can even force Home editions to only uses WSUS. Oh and this will also block updates as well. You can even tell it not to push 1 update to 1 PC but approve the rest.
For Home and Home Single, just add contents below into a Update.reg file created with notepad and run it (Replace 127.0.0.1 with your local WSUS server.)
Code:Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate] "AcceptTrustedPublisherCerts"=dword:00000001 "ElevateNonAdmins"=dword:00000001 "TargetGroup"="Workstations" "TargetGroupEnabled"=dword:00000000 "WUServer"="http://127.0.0.1" "WUStatusServer"="http://127.0.0.1" [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU] "AUOptions"=dword:00000004 "AUPowerManagement"=dword:00000001 "AutoInstallMinorUpdates"=dword:00000001 "DetectionFrequency"=dword:0000000a "DetectionFrequencyEnabled"=dword:00000001 "IncludeRecommendedUpdates"=dword:00000001 "NoAUAsDefaultShutdownOption"=dword:00000001 "NoAUShutdownOption"=dword:00000001 "NoAutoRebootWithLoggedOnUsers"=dword:00000001 "NoAutoUpdate"=dword:00000000 "RebootRelaunchTimeout"=dword:0000000a "RebootRelaunchTimeoutEnabled"=dword:00000001 "RescheduleWaitTime"=dword:0000000a "RescheduleWaitTimeEnabled"=dword:00000001 "ScheduledInstallDay"=dword:00000000 "ScheduledInstallTime"=dword:00000003 "UseWUServer"=dword:00000001
Now you can approve the updates to your hearts content. Even better if you have more than on PC you don't have to download the updates more than once.
Very interesting. Can I use WSUS for a single Windows 10 professional machine?