Jump to content

Slycer

Member
  • Posts

    9
  • Joined

  • Last visited

  • Donations

    0.00 USD 
  • Country

    Slovenia

Everything posted by Slycer

  1. Want to bump this because it deserves it. Thank you Dennis, great tool!!
  2. Anyone solved this yet? I really need it. Thanks!
  3. Wow awsome program. I especially like those service tweaks. Is there any way to set settings in the Group Policy?
  4. Yes. It's a theorethical question...I even rang up my local MS branch and asked them the same question and they didnt send the police after me. But dont get ur panties in a knot...If it's against the rules...Lock it.
  5. There is NOTHING illegal in this post. Im not asking where to get an illegal copy nor am I using one ATM. Or is theorethical conversation illegal?
  6. Ello. Okay, I'm just wondering if it's possible to download an illegal premade copy of Windows with all the updates and SPs already installed [ For instance: the ETH0 releases ] and then somehow appy my own legal cdkey. I'm asking because I have a strage feeling that the copy I'd make wouldnt be nowhere near as good as the the one I'm able to download off the web. Is this possible?
  7. I'm having massive problems with the updates. I want them all but have no idea how many "all" is. I made a list from several sources. - Software Patches - MSFN List - Windows Update And this is it: PRED SP2: http://support.microsoft.com/?kbid=835732 - Security Update for Microsoft Windows http://support.microsoft.com/?kbid=828741 - Cumulative Update for Microsoft RPC/DCOM http://support.microsoft.com/?kbid=890830 - Windows Malicious Software Removal Tool http://support.microsoft.com/?kbid=905474 - Windows Genuine Advantage Notifications http://support.microsoft.com/?kbid=810833 - Unchecked Buffer in the Locator Service Might Permit Code to Run http://support.microsoft.com/?kbid=834707 - Cumulative Security Update for Internet Explorer http://support.microsoft.com/?kbid=329834 - Unchecked Buffer in PPTP Implementation May Permit Denial-of-Service Attacks http://support.microsoft.com/?kbid=329048 - Unchecked Buffer in File Decompression Functions May Allow Attacker to Run Code http://support.microsoft.com/?kbid=323255 - Unchecked Buffer in Windows Help Facility May Allow Attacker to Run Code http://support.microsoft.com/?kbid=815021 - Unchecked buffer in Windows component may cause Web Server compromise http://support.microsoft.com/?kbid=817606 - Buffer overrun in Windows could lead to data corruption http://support.microsoft.com/?kbid=823559 - Buffer overrun in the HTML converter could allow code execution http://support.microsoft.com/?kbid=329390 - Unchecked Buffer in Windows Shell Might Permit System Compromise http://support.microsoft.com/?kbid=329115 - Certificate validation flaw might permit identity spoofing http://support.microsoft.com/?kbid=329170 - Flaw in SMB Signing May Permit Group Policy to Be Modified http://support.microsoft.com/?kbid=811630 - HTML Help Update to Limit Functionality When It Is Invoked with the window.showHelp( ) Method http://support.microsoft.com/?kbid=810577 - Unchecked buffer in Windows redirector may permit privilege elevation http://support.microsoft.com/?kbid=814078 - Flaw in Windows Script Engine may allow code to run http://support.microsoft.com/?kbid=329441 - You cannot create a network connection after you restore Windows XP PO SP2: http://support.microsoft.com/?kbid=896423 - Vulnerability in Print Spooler service could allow remote code execution http://support.microsoft.com/?kbid=916595 - Stop error message on a Windows XP-based computer: "STOP 0x000000D1" http://support.microsoft.com/?kbid=914388 - A vulnerability in the DHCP Client Service could allow remote code execution http://support.microsoft.com/?kbid=912919 - Vulnerability in graphics rendering engine could allow remote code execution http://support.microsoft.com/?kbid=917159 - Vulnerability in Server service could allow remote code execution http://support.microsoft.com/?kbid=913433 - Vulnerabilities in Macromedia Flash Player from Adobe could allow remote code execution http://support.microsoft.com/?kbid=911280 - Vulnerability in Routing and Remote Access could allow remote code execution http://support.microsoft.com/?kbid=917734 - Vulnerability in Windows Media Player could allow remote code execution http://support.microsoft.com/?kbid=914389 - Vulnerability in Server Message Block could allow elevation of privilege http://support.microsoft.com/?kbid=917344 - Vulnerability in Microsoft JScript could allow remote code execution http://support.microsoft.com/?kbid=918439 - Vulnerability in ART image rendering could allow remote code execution http://support.microsoft.com/?kbid=916281 - Cumulative security update for Internet Explorer http://support.microsoft.com/?kbid=913580 - Vulnerability in Microsoft Distributed Transaction Coordinator could allow denial of service http://support.microsoft.com/?kbid=917953 - Vulnerability in TCP/IP could allow remote code execution http://support.microsoft.com/?kbid=908531 - Vulnerability in Windows Explorer Could Lead to Remote Code Execution http://support.microsoft.com/?kbid=911567 - Cumulative Security Update for Outlook Express http://support.microsoft.com/?kbid=911562 - Vulnerability in Microsoft Data Access Components (MDAC) function could allow code execution http://support.microsoft.com/?kbid=911927 - Vulnerability in WebClient could allow remote code execution http://support.microsoft.com/?kbid=911564 - Vulnerability in Windows Media Player http://support.microsoft.com/?kbid=908519 - Vulnerability in embedded Web fonts could allow remote code execution http://support.microsoft.com/?kbid=910437 - When Windows Automatic Updates tries to download updates on a Windows Server 2003-based http://support.microsoft.com/?kbid=904706 - Vulnerability in DirectShow could allow remote code execution http://support.microsoft.com/?kbid=896424 - Vulnerabilities in graphics rendering engine could allow code execution http://support.microsoft.com/?kbid=905749 - Vulnerability in Plug and Play could allow remote code execution and local elevation of privilege http://support.microsoft.com/?kbid=900725 - Vulnerabilities in the Windows shell could allow for remote code execution http://support.microsoft.com/?kbid=902400 - Vulnerabilities in MS DTC and COM+ could allow remote code execution http://support.microsoft.com/?kbid=899589 - Vulnerability in the Client Service for NetWare could allow remote code execution http://support.microsoft.com/?kbid=901017 - Vulnerability in the Microsoft Collaboration Data Objects could allow code execution (Windows) http://support.microsoft.com/?kbid=905414 - Vulnerability in Network Connection Manager could allow denial of service http://support.microsoft.com/?kbid=893756 - Vulnerability in Telephony service could allow remote code execution http://support.microsoft.com/?kbid=899591 - Vulnerability in Remote Desktop Protocol could allow denial of service http://support.microsoft.com/?kbid=899587 - Vulnerabilities in Kerberos could allow denial of service, information disclosure, and spoofing http://support.microsoft.com/?kbid=894391 - You receive a "Generic Host Process" http://support.microsoft.com/?kbid=896358 - A vulnerability in HTML Help could allow remote code execution http://support.microsoft.com/?kbid=890859 - Vulnerabilities in Windows kernel could allow elevation of privilege and denial of service http://support.microsoft.com/?kbid=901214 - Vulnerability in Microsoft Color Management Module could allow remote code execution http://support.microsoft.com/?kbid=896428 - Vulnerability in Telnet client could allow information disclosure http://support.microsoft.com/?kbid=890046 - Vulnerability in Microsoft agent could allow spoofing http://support.microsoft.com/?kbid=885835 - Vulnerabilities in Windows Kernel and LSASS could allow elevation of privilege http://support.microsoft.com/?kbid=888302 - Vulnerability in Windows could allow information disclosure http://support.microsoft.com/?kbid=887472 - Microsoft has released a security update to Microsoft Windows Messenger http://support.microsoft.com/?kbid=891781 - Vulnerability in the DHTML editing component ActiveX control could allow code execution http://support.microsoft.com/?kbid=888113 - Vulnerability in hyperlink object library could allow remote code execution in Windows Server 2003 http://support.microsoft.com/?kbid=873339 - Vulnerability in HyperTerminal could allow code execution http://support.microsoft.com/?kbid=886185 - Windows Firewall "My Network (subnet) only" scoping in Windows XP Service Pack 2 http://support.microsoft.com/?kbid=885836 - A vulnerability in WordPad could allow code execution http://support.microsoft.com/?kbid=917283 - A vulnerability in ASP.NET could allow information disclosure DRUGO: http://www.microsoft.com/downloads/details.aspx?FamilyID=262d25e3-f589-4842-8157-034d1e7cf3a3&displaylang=en - Microsoft .NET Framework 1.1 http://www.microsoft.com/downloads/details.aspx?FamilyID=2da43d38-db71-4c1b-bc6a-9b6652cd92a3&displaylang=en - DirectX http://www.microsoft.com/downloads/details.aspx?FamilyID=0856eacb-4362-4b0d-8edd-aab15c5e04f5&displaylang=en - Microsoft .NET Framework 2.0 STRAN: http://support.microsoft.com/?kbid=914388 - A vulnerability in the DHCP Client Service could allow remote http://support.microsoft.com/?kbid=917159 - Vulnerability in Server service could allow remote code http://support.microsoft.com/?kbid=917537 - Vulnerability in Internet Information Services that use Active Server Pages could allow remote code http://support.microsoft.com/?kbid=911280 - Vulnerability in Routing and Remote Access could allow remote code execution http://support.microsoft.com/?kbid=914389 - Vulnerability in Server Message Block could allow elevation of privilege http://support.microsoft.com/?kbid=917344 - Vulnerability in Microsoft JScript could allow remote code execution http://support.microsoft.com/?kbid=917953 - Vulnerability in TCP/IP could allow remote code execution http://support.microsoft.com/?kbid=918439 - Vulnerability in ART image rendering could allow remote code execution http://support.microsoft.com/?kbid=913580 - Vulnerability in Microsoft Distributed Transaction Coordinator could allow denial of service http://support.microsoft.com/?kbid=908531 - Vulnerability in Windows Explorer Could Lead to Remote Code Execution http://support.microsoft.com/?kbid=911562 - Vulnerability in Microsoft Data Access Components (MDAC) function could allow code execution http://support.microsoft.com/?kbid=911927 - Vulnerability in WebClient could allow remote code execution http://support.microsoft.com/?kbid=913446 - Vulnerability in TCP/IP could allow denial of service http://support.microsoft.com/?kbid=912919 - Vulnerability in graphics rendering engine could allow remote code execution http://support.microsoft.com/?kbid=908519 - Vulnerability in embedded Web fonts could allow remote code execution http://support.microsoft.com/?kbid=904706 - Vulnerability in DirectShow could allow remote code execution http://support.microsoft.com/?kbid=896424 - Vulnerabilities in graphics rendering engine could allow code execution http://support.microsoft.com/?kbid=901017 - Vulnerability in the Microsoft Collaboration Data Objects could allow code execution (Windows) http://support.microsoft.com/?kbid=900725 - Vulnerabilities in the Windows shell could allow for remote code execution http://support.microsoft.com/?kbid=899589 - Vulnerability in the Client Service for NetWare could allow remote code execution http://support.microsoft.com/?kbid=905414 - Vulnerability in Network Connection Manager could allow denial of service http://support.microsoft.com/?kbid=902400 - Vulnerabilities in MS DTC and COM+ could allow remote code execution http://support.microsoft.com/?kbid=905749 - Vulnerability in Plug and Play could allow remote code execution and local elevation of privilege http://support.microsoft.com/?kbid=893756 - Vulnerability in Telephony service could allow remote code execution http://support.microsoft.com/?kbid=896423 - Vulnerability in Print Spooler service could allow remote code execution http://support.microsoft.com/?kbid=899587 - Vulnerabilities in Kerberos could allow denial of service, information disclosure, and spoofing http://support.microsoft.com/?kbid=899588 - Vulnerability in Plug and Play could allow remote code execution and elevation of privilege http://support.microsoft.com/?kbid=899591 - Vulnerability in Remote Desktop Protocol could allow denial of service http://support.microsoft.com/?kbid=901214 - Vulnerability in Microsoft Color Management Module could allow remote code execution http://support.microsoft.com/?kbid=896358 - A vulnerability in HTML Help could allow remote code execution http://support.microsoft.com/?kbid=890046 - Vulnerability in Microsoft agent could allow spoofing http://support.microsoft.com/?kbid=893066 - Vulnerabilities in TCP/IP could allow remote code execution and denial of service http://support.microsoft.com/?kbid=896422 - Vulnerability in Server Message Block could allow remote code execution http://support.microsoft.com/?kbid=896428 - Vulnerability in Telnet client could allow information disclosure http://support.microsoft.com/?kbid=890859 - Vulnerabilities in Windows kernel could allow elevation of privilege and denial of service http://support.microsoft.com/?kbid=892944 - Vulnerability in MSMQ could allow code execution http://support.microsoft.com/?kbid=893086 - Vulnerability in Windows Shell that could allow remote code execution http://support.microsoft.com/?kbid=888113 - Vulnerability in hyperlink object library could allow remote code execution in Windows Server 2003 http://support.microsoft.com/?kbid=885250 - Vulnerability in server message block could allow remote code execution http://support.microsoft.com/?kbid=873333 - Vulnerability in OLE and COM could allow remote code execution http://support.microsoft.com/?kbid=891781 - Vulnerability in the DHTML editing component ActiveX control could allow code execution http://support.microsoft.com/?kbid=890047 - Vulnerability in Windows shell could allow remote code execution http://support.microsoft.com/?kbid=888302 - Vulnerability in Windows could allow information disclosure http://support.microsoft.com/?kbid=890175 - Vulnerability in HTML Help could allow code execution http://support.microsoft.com/?kbid=886185 - Windows Firewall "My Network (subnet) only" scoping in Windows XP Service Pack 2 http://support.microsoft.com/?kbid=885836 - A vulnerability in WordPad could allow code execution http://support.microsoft.com/?kbid=873339 - Vulnerability in HyperTerminal could allow code execution http://support.microsoft.com/?kbid=885835 - Vulnerabilities in Windows Kernel and LSASS could allow elevation of privilege http://support.microsoft.com/?kbid=885523 - You receive a "Stop: c0000135" and "winsrv was not found" error message after you install Plus the ones in this thread which I havent added yet. And this list is a lot bigger then the one on this site. Partly because I havent deleted the updated that appear twice. But still.. So, my questions: -Is there a list somewhere that list every single update? -The only service pack I need is number 2? (Last time I ask this, I promise )
  8. Is there any need to download Service Pack 1 and Service Pack 2? Does Service Pack 2 incluce all the updates from service pack 1? Thanks.
×
×
  • Create New...