Jump to content

Reino

Member
  • Posts

    267
  • Joined

  • Last visited

  • Days Won

    3
  • Donations

    0.00 USD 
  • Country

    Netherlands

Everything posted by Reino

  1. *Moved to "Software Hangout"*
  2. RyanVM, how whould you categorize the Dutch Update Pack? Lite, Medium or Full?
  3. Well, since I only have "/q /o /n /z" behind the filenames I guess that isn't necessary
  4. My current svcpack.inf [ProductCatalogsToInstall] [SetupHotfixesToRun] KB867282.exe /q /o /n /z KB873333.exe /q /o /n /z KB884020.exe /q /o /n /z KB885835.exe /q /o /n /z KB886185.exe /q /o /n /z KB887797.exe /q /o /n /z KB888113.exe /q /o /n /z KB891781.exe /q /o /n /z qchain.exe Do I also have to put all those hotfixes beneath "[ProductCatalogsToInstall]" like this? [ProductCatalogsToInstall] KB867282.cat KB873333.cat KB884020.cat KB885835.cat KB886185.cat KB887797.cat KB888113.cat KB891781.cat [SetupHotfixesToRun] KB867282.exe /q /o /n /z KB873333.exe /q /o /n /z KB884020.exe /q /o /n /z KB885835.exe /q /o /n /z KB886185.exe /q /o /n /z KB887797.exe /q /o /n /z KB888113.exe /q /o /n /z KB891781.exe /q /o /n /z qchain.exe
  5. I don't know if it's just me but where on the first page exactly can I download the "new" regtweaks?
  6. and this needs to be done with every single hotfix?
  7. DigitalAZ, I'm well aware of these things but since you could have read I didn't know anything about this matter. So, how could have known I had to search with +CheckExeSignatures +RunInvalidSignatures? I knew I had a problem but I didn't know what the problem exactually was or how I it is called! Comeon is it that difficult to understand?
  8. First of all this kinda information is really valuable to me, thank you But I did read the regfile posted in the on the first page, but since I don't have a clue how to call that zoneinformation stuff I also don't know where to search. Offcourse it's your first search result with google since you know with what words you should search with and I don't. I guess that's the reason these forums are here It's kinda hard searching if you don't know what to search for... anyway, thx again for this valuable information
  9. @ war59312: hmm yeah...I dont understand how I could have missed your reply back then Anyway, I tried those registry command just some minutes ago and it seems to be working I'm curious...can I leave out some of those registry keys or are all those keys necessary to disable the whole thing? What is the main registry key that disables the problem I have?
  10. Since this is the registry tweak topic, I was wondering if anyone knows the answer to my question about some problems I have. The answers I'd like to add to my regtweaks file.
  11. Correct me if I'm wrong but is the reason why you put the *.cat files beneath the "[ProductCatalogsToInstall]" so the hotfixes will show up in the Software-list/Installed-programs in the end? And does this apply to all hotfixes?
  12. I came across some nasty things which I whould like to disable and whould like to add to my regtweaks.reg: This happens to me a lot lately: Many times when I whould like to save a normal JPG-file (that picture of System Cleanup is also a JPG-file) somehow I can only save the image as a BMP-file Does anybody know how to "fix" this? And this too...Does anybody knows if there's a register tweak or something to lift that security blockade off downloaded files? It's also very annoying! Thanks in advance CoRoNe
  13. I strongly suggest you take a little peek here: Administratie Tools > Local Security Policy > Local Policies > Safety Options then search for the following: (I'm sorry it's dutch, but I can't seems to translate this one) "Netwerktoegang: opslag van referenties of .NET Passports voor netwerkverificaties niet toestaan" Anyway it's the only sentence with ".NET Passports" in it, so I guess it won't be that difficult to find Oh yeah...make sure this option is disabled, that way MSN stores usernames again good luck
  14. For it to work properly this should be replaced by: ;----- Add Google As Main/default Search Page ;----- [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main] "Use Search Asst"="no" "Search Page"="http://www.google.com" "Search Bar"="http://www.google.com/ie_rsearch.html" [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchURL] @="http://www.google.com/keyword/%s" "provider"="gogl" [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Search] "SearchAssistant"="http://www.google.com/ie_rsearch.html" about "...ie_rsearch.html":
  15. http://www.microsoft.com/technet/security/...n/MS..-....mspx http://support.microsoft.com/?kbid=......
  16. I don't know what specific guide you have been using but I've been using this guide for a long time now and with succes I might add. (and I also have a A7N8X-E Deluxe) So basicly all you have to do is adding the following things to your TXTSETUP.SIF as you can see @ nforcershq.com [SourceDisksFiles] si3112r.sys = 1,,,,,,_x,4,1 [HardwareIdsDatabase] PCI\VEN_1095&DEV_3112&SUBSYS_61121095 = "si3112r" [SCSI.Load] si3112r = si3112r.sys,4 [SCSI] si3112r = "Silicon Image SiI3112A SATA RAID Controller"
  17. Perhaps this "(Replaced) Hotfixes document" I made my self whould help clearing some things out for you guys http://www.microsoft.com/technet/security/bulletin/MS..-....mspx http://support.microsoft.com/?kbid=...... ================================================================ Security Updates included in WinXP SP2: --------------------------------------- MS04-025 KB867801 - Cumulative Security Update for Internet Explorer MS04-024 KB839645 - Vulnerability in Windows Shell Could Allow Remote Code Execution MS04-023 KB840315 - Vulnerability in HTML Help Could Allow Code Execution MS04-022 KB841873 - Vulnerability in Task Scheduler Could Allow Code Execution MS04-018 KB823353 - Cumulative Security Update for Outlook Express MS04-016 KB839643 - Vulnerability in DirectPlay Could Allow Denial of Service MS04-015 KB840374 - Vulnerability in Help and Support Center Could Allow Remote Code Execution MS04-014 KB837001 - Vulnerability in the Microsoft Jet Database Engine Could Allow Code Execution MS04-013 KB837009 - Cumulative Security Update for Outlook Express MS04-012 KB828741 - Cumulative Update for Microsoft RPC/DCOM MS04-011 KB835732 - Security Update for Microsoft Windows MS04-007 KB828028 - ASN.1 Vulnerability Could Allow Code Execution MS04-004 KB832894 - Cumulative Security Update for Internet Explorer MS04-003 KB832483 - Buffer Overrun in MDAC Function Could Allow Code Execution MS03-051 KB813360 - Buffer Overrun in Microsoft FrontPage Server Extensions Could Allow Code Execution MS03-049 KB828749 - Buffer Overrun in the Workstation Service Could Allow Code Execution MS03-048 KB824145 - Cumulative Security Update for Internet Explorer MS03-045 KB824141 - Buffer Overrun in the ListBox and in the ComboBox Control Could Allow Code Execution MS03-044 KB825119 - Buffer Overrun in Windows Help and Support Center Could Lead to System Compromise MS03-043 KB828035 - Buffer Overrun in Messenger Service Could Allow Code Execution MS03-041 KB823182 - Vulnerability in Authenticode Verification Could Allow Remote Code Execution MS03-040 KB828750 - Cumulative Patch for Internet Explorer MS03-039 KB824146 - Buffer Overrun in RPCSS Service Could Allow Code Execution MS03-034 KB824105 - Flaw in NetBIOS Could Lead to Information Disclosure MS03-032 KB822925 - Cumulative Patch for Internet Explorer MS03-030 KB819696 - Unchecked Buffer in DirectX Could Enable System Compromise MS03-027 KB821557 - Unchecked Buffer in Windows Shell Could Enable System Compromise MS03-026 KB823980 - Buffer Overrun in RPC Interface Could Allow Code Execution MS03-024 KB817606 - Buffer Overrun in Windows Could Lead to Data Corruption MS03-023 KB823559 - Buffer Overrun in HTML Converter Could Allow Code Execution MS03-021 KB819639 - Flaw in Windows Media Player May Allow Media Library Access MS03-020 KB818529 - Cumulative Patch for Internet Explorer MS03-018 KB811114 - Cumulative Patch for Internet Information Service MS03-015 KB813489 - Cumulative Patch for Internet Explorer MS03-014 KB330994 - Cumulative Patch for Outlook Express MS03-013 KB811493 - Buffer Overrun in Windows Kernel Message Handling Could Lead to Elevated Privileges MS03-010 KB331953 - Flaw in RPC Endpoint Mapper Could Allow Denial of Service MS03-008 KB814078 - Flaw in Windows Script Engine Could Allow Code Execution MS03-007 KB815021 - Unchecked Buffer in Windows Component Could Cause Server Compromise MS03-005 KB810577 - Microsoft Security Bulletin MS03-005 MS03-004 KB810847 - Cumulative Patch for Internet Explorer MS03-001 KB810833 - Unchecked Buffer in Locator Service Could Lead to Code MS02-072 KB329390 - Unchecked Buffer in Windows Shell Could Enable System Compromise MS02-071 KB328310 - Flaw in Windows WM_TIMER Message Handling Could Enable Privilege Elevation MS02-070 KB329170 - Flaw in SMB Signing Could Enable Group Policy to be Modified MS02-068 KB324929 - Cumulative Patch for Internet Explorer MS02-066 KB328970 - Cumulative Patch for Internet Explorer MS02-063 KB329834 - Unchecked Buffer in PPTP Implementation Could Enable Denial of Service Attacks MS02-062 KB327696 - Cumulative Patch for Internet Information Service MS02-055 KB323255 - Unchecked Buffer in Windows Help Facility Could Enable Code Execution MS02-050 KB329115 - Certificate Validation Flaw Could Enable Identity Spoofing ==================================================================================================== ==== SP1 Hotfixes: ------------- MS03-008 KB814078 - Flaw in Windows Script Engine Could Allow Code Execution (JS56NEN.exe) Switch: /q:a /r:n Replaced by: WinXp SP2 The problematic version of Windows Script 5.6.0.8513 should be replaced by version 5.6.0.8825 > http://www.microsoft.com/downloads/details.aspx?displaylang=nl&FamilyID=c717d943-7e4b-4622-86eb-95a22b832caa MS03-011 KB816093 - Flaw in the Microsoft VM Could Enable System Compromise Switch: /q:a /r:n For XP SP1 and not SP1a KB817778 - Advanced Networking Pack for Windows XP Switch: /q /o /n /z (not svcpack.inf supported) MS03-017 KB817787 - Flaw in Windows Media Player skins downloading could allow code execution Switch: /q:a /r:n (not svcpack.inf supported and applicable upto WMP8 > no WMP9!) KB822603 - Availability of the Windows XP SP1 USB 1.1 and 2.0 Update Switch: /q /o /n /z MS03-041 KB823182 - Vulnerability in Authenticode Verification Could Allow Remote Code Execution Switch: /q /o /n /z Replaced by: WinXP SP2 MS04-018 KB823353 - Cumulative Security Update for Outlook Express Switch: /q:a /r:n Replaced by: WinXP SP2 MS03-034 KB824105 - Flaw in NetBIOS Could Lead to Information Disclosure Switch: /q /o /n /z Replaced by: WinXP SP2 MS03-045 KB824141 - Buffer Overrun in the ListBox and in the ComboBox Control Could Allow Code Execution Switch: /q /o /n /z Replaced by: MS04-032 KB840987, MS04-031 KB841533 and WinXP SP2 MS04-030 KB824151 - Vulnerability in WebDAV XML message handler could lead to a denial of service Switch: /q /o /n /z MS03-044 KB825119 - Buffer Overrun in Windows Help and Support Center Could Lead to System Compromise Switch: /q /o /n /z Replaced by: WinXP SP2 KB826939 - Update Rollup 1 for Windows XP Switch: /q /o /n /z Replaced by: WinXP SP2 (almost completely) KB828026 - Update for Windows Media Player URL Script Command Behavior Switch: /q /o /n /z Replaced by: KB832353 (applicable upto WMP9 > no WMP10!) MS03-043 KB828035 - Buffer Overrun in Messenger Service Could Allow Code Execution Switch: /q /o /n /z Replaced by: WinXP SP2 MS04-012 KB828741 - Cumulative Update for Microsoft RPC/DCOM Switch: /q /o /n /z Replaced by: WinXP SP2 MS04-003 KB832483 - Buffer Overrun in MDAC Function Could Allow Code Execution Switch: /C:""dahotfix.exe /q /n"" /q:a" Replaced by: WinXP SP2 KB832353 - Some URL script commands do not work after you apply the Windows Media update from Knowledge Base article 828026 Switch: /q /o /n /z Replaces: KB828026 (applicable upto WMP9 > no WMP10!) MS04-028 KB833987 - Buffer overrun in JPEG processing (GDI+) could allow code execution Switch: /q /o /n /z MS04-038 KB834707 - Cumulative Security Update for Internet Explorer Switch: /q /o /n /z Replaces: MS04-025 KB867801 Replaced by: KB873377, MS04-040 KB889293 and KB889669 MS04-011 KB835732 - Security Update for Microsoft Windows Switch: /q /o /n /z Replaced by: WinXP SP2 MS04-014 KB837001 - Vulnerability in the Microsoft Jet Database Engine Could Allow Code Execution Switch: /q /o /n /z Replaced by: WinXP SP2 MS04-024 KB839645 - Vulnerability in Windows Shell Could Allow Remote Code Execution Switch: /q /o /n /z Replaced by: MS04-027 KB841356 and WinXP SP2 MS04-023 KB840315 - Vulnerability in HTML Help Could Allow Code Execution Switch: /q /o /n /z Replaced by: WinXP SP2 MS04-015 KB840374 - Vulnerability in Help and Support Center Could Allow Remote Code Execution Switch: /q /o /n /z Replaced by: WinXP SP2 MS04-032 KB840987 - Security Update for Microsoft Windows Switch: /q /o /n /z Replaces: MS03-045 KB824141 MS04-027 KB841356 - Vulnerability in Windows Shell Could Allow Remote Code Execution Switch: /q /o /n /z Replaces: MS04-024 KB839645 MS04-031 KB841533 - Vulnerability in NetDDE Could Allow Remote Code Execution Switch: /q /o /n /z Replaces: MS02-071 KB328310 and MS03-045 KB824141 (both are within WinXP SP2) MS04-022 KB841873 - Vulnerability in Task Scheduler Could Allow Code Execution Switch: /q /o /n /z Replaced by: WinXP SP2 KB842773 - Update for Background Intelligent Transfer Service (BITS) 2.0 and WinHTTP 5.1 Switch: /q /o /n /z MS04-025 KB867801 - Cumulative Security Update for Internet Explorer Switch: /q:a /r:n Replaced by: MS04-038 KB834707 KB870669 - Critical Update for Microsoft Data Access Components - Disable ADODB.Stream object from Internet Explorer Switch: /q:a /r:n KB873374 - Microsoft GDI+ Detection Tool (related to MS04-028 KB833987) The Microsoft GDI+ Detection Tool is not a hotfix but a little program which detects programs that maybe vulnerable to MS04-28 KB833987. MS04-034 KB873376 - Vulnerability in Compressed (zipped) Folders Could Allow Remote Code Execution Switch: /q /o /n /z Replaces: MS02-054 KB329048) KB873377 - Update Rollup for Internet Explorer SP1 Switch: /q /o /n /z Replaces: MS04-038 KB834707 Replaced by: KB889669 KB883357 - Your backup program may fail or incorrectly exclude some files from your backup in Windows XP Switch: /q /o /n /z MS04-044 KB885835 - Vulnerabilities in Windows Kernel and LSASS could allow elevation of privilege Switch: /q /o /n /z MS04-040 KB889293 - Cumulative Security Update for Internet Explorer Switch: /q /o /n /z Replaces: MS04-038 KB834707 Replaced by: KB889669 KB889669 - Update Rollup for Internet Explorer 6 SP1 Switch: /q /o /n /z Replaces: MS04-040 KB889293, KB873377 and MS04-038 KB834707 ==================================================================================================== ======================= SP2 Hotfixes: ------------- KB884020 - Programs that connect to IP addresses that are in the loopback address range may not work as you expect in Windows XP Service Pack 2 Switch: /q /o /n /z MS04-044 KB885835 - Vulnerabilities in Windows Kernel and LSASS could allow elevation of privilege Switch: /q /o /n /z Replaces: MS03-005 KB810577 and MS03-013 KB811493 (both are within WinXP SP2) KB886185 - Critical Update for Windows XP Service Pack 2 Switch: /q /o /n /z KB887797 - Cumulative Update for Outlook Express for Windows XP Switch: /q /o /n /z KB823353 is required to be installed before applying this hotfix!!!
  18. In fact...I think KB823353 is required to be installed before applying KB887797! look here @ Incroyable HULK: So you're saying that... [SetupHotfixesToRun] KB885835.exe /q /o /n /z KB886185.exe /q /o /n /z KB887797.exe /q /o /n /z for instance whouldn't work?
  19. Why is this needed? Doesn't it work the normal way?
  20. I dont know if you mean with the "BEST" decoder around, a decoder with the best quality or performance, but I can tell you that I've been using Zoom Player for a long time now and as the link I give you it will give you all the information you need for the necessary filter to work and I think Windows Media Player will also work with those open source MPEG2 filters. But I always thought... ;Enable DVD function in Windows Media Player [HKEY_CURRENT_USER\Software\Microsoft\MediaPlayer\Player\Settings] "EnableDVDUI"="yes" was enough for playback of DVD's in WMP... The open source splitter splits a MPEG file into a video and audio stream > then being decoded by the open source decoder and most of the times by the AC3 Filter good luck
  21. take a look here > http://www.inmatrix.com/zplayer/formats/mpeg2.shtml
  22. Oke, thanks for the confirmation Now I can safely delete KB873377 from my Update directory.
  23. @ Incroyable HULK I must say your doing a great job keeping the SP1 hotfixes list up to date BUT, it's kinda messed-up You should put the lowest number first (in this case KB814078) and the the highest number last (KB889293) to make a good order. And you should definitely add the replaced/superseded hotfixes after all relevant hotfixes like posted here! Update note to HULK: KB889669 replaces > KB889293 which replaces > KB834707 and since KB834707 is also allready replaced by KB873377, I think this KB889669 also replaces KB873377, right? I just saying that everyone could benefit from a well ordered hotfixes-list! Right now it's a bit messy, sorry
×
×
  • Create New...