mirror of
https://github.com/NexusOne23/noid-privacy.git
synced 2026-02-07 04:01:52 +01:00
Privacy Module: - Fixed 'Applied X settings' to show only registry settings (60/78/86) - Bloatware count no longer added to settings total - Consistent with module prompt (MSRecommended: 60, Strict: 78, Paranoid: 86) DNS Module: - Fixed DoH connectivity test for systems with REQUIRE mode active - Tests HTTPS endpoint (port 443) when classic DNS is blocked - Proper detection of existing DoH configuration Verified: Full Apply/Verify/Restore cycle - 633/633 settings (100%)
39 lines
1.3 KiB
Batchfile
39 lines
1.3 KiB
Batchfile
@echo off
|
|
REM ========================================
|
|
REM NoID Privacy - Interactive Launcher
|
|
REM ========================================
|
|
REM
|
|
REM This script launches NoIDPrivacy-Interactive.ps1 with
|
|
REM Administrator privileges (auto-elevation).
|
|
REM
|
|
REM Author: NexusOne23
|
|
REM Version: 2.2.0
|
|
REM ========================================
|
|
|
|
setlocal
|
|
|
|
title NoID Privacy v2.2.0
|
|
|
|
REM Get the directory where this batch file is located
|
|
set "SCRIPT_DIR=%~dp0"
|
|
|
|
REM Check if already running as administrator (robust method that works even if Server service is disabled)
|
|
>nul 2>&1 "%SYSTEMROOT%\system32\cacls.exe" "%SYSTEMROOT%\system32\config\system"
|
|
if %errorLevel% == 0 (
|
|
REM Already admin, run PowerShell script directly
|
|
echo Running NoID Privacy Interactive Menu with Administrator privileges...
|
|
echo.
|
|
powershell.exe -ExecutionPolicy Bypass -NoProfile -File "%SCRIPT_DIR%NoIDPrivacy-Interactive.ps1" %*
|
|
pause
|
|
exit /b
|
|
)
|
|
|
|
REM Not admin - request elevation
|
|
echo Requesting Administrator privileges...
|
|
echo.
|
|
|
|
REM Use PowerShell to elevate and run the script
|
|
powershell.exe -Command "Start-Process PowerShell.exe -ArgumentList '-ExecutionPolicy Bypass -NoProfile -File \"%SCRIPT_DIR%NoIDPrivacy-Interactive.ps1\" %*' -Verb RunAs"
|
|
|
|
REM Exit this non-elevated instance
|
|
exit /b
|