Is that NVME ? XPx64 used to fail CHKDSK inside CMD even with driver from Toshiba , it was just a storage drive to XPx64 even though its boot drive to 8.1
Don't use Export table tester to add export .it will cause certain tables to break . Never add a section after resources table in NT system files
Use Petools to move Table to new section before .reloc then add anything you like.
If you are not using vanilla file , then wildbill/bwc shall have enough space .
Use the blank space inside .TXT , no need to add another section for code
Well guys I can't get printdemon to work under XP .
https://github.com/BC-SECURITY/Invoke-PrintDemon
Is XP already Exorcises this demon?
Need some confirmation .
Some one run and see this powershell script.
Well it is not a port of newer jscript , it patches out vulnerability in windows XP IE8 file .
i never said as such to FranceBB i think its a miss understanding
JScript of vista will require expansion of kernel with new api , which i am not willing to do since it may break old XP only programs
implementation of patch is unique as it prevent any such vulnerability .
CVE2020-0674(0 Day) is variant of CVE2019-1429(0 Day)
Let me fix the uninstaller first . @win32 pointed it out. Then if theirs a bug anyone can uninstall it .
Well anyone have any idea how much dangerous CVE-2020-1048 is .
https://windows-internals.com/printdemon-cve-2020-1048/
In Their blog ,
https://blog.0patch.com/2020/05/micropatching-printdemon-vulnerability.html
0patch Fix mentions LcmCreatePortEntry but nowhere IDA Pro , Relyze & PEExplorer find such reference .
CVE2020-0674(0 Day),CVE2019-1429(0 day) are variant of each other . Microsoft did some quick fix but bad guys can easily work around it so i made a own patch to harden it.
I have carefully studied work of 0patch but their patch is kill switch for JScript.
So I made my own work around to fix it .
https://blog.0patch.com/2020/01/micropatching-workaround-for-cve-2020.html
My patch in action
https://i.ibb.co/jhpqgrN/Vulnerability-Fixed.png
It prevents both JSEncode & JSCompat vulnerability (Thanks to 0patch to find out JSCompat too can be used)
Edit: I had no intention to share this patch but shared it as my friends asked me to .
Some people likes to judge on basis of your age not your skill . Mastering x86 Assembly takes time .
People are using my patch in wrong way then blaming me , Like using nlite addon without nlite despite knowing SFC can replace back original files from SP3.cab
Many russian and chinese devs copied my RAM patch without my consent .
one of my friends sent me
''I tried this too before. Don't expect too much from it as it was made by some teenage indian dude lol" Sounded racist to me .
First they are dump to use nlite addon in wrong way and blame me without disabling SFC.
In future , I will keep my patches to me . Why shall i bother ? WHat is the use of sharing and caring philosophy ? why shall i waste my bandwidth which i could use to watch anime ?
You didn't add any code with hex editor. That's the reason.
I am comparing dlls with sp3 , I am looking out for changes made if any fix needed.
Just wait I will do it for you .
Kinda actually , Biostar re released H61 chipset motherboard.
link
You can grab i5 3570 for $20 from eBay .So a new xp compatible computer under $150 is very much possible.