Jump to content
Strawberry Orange Banana Lime Leaf Slate Sky Blueberry Grape Watermelon Chocolate Marble
Strawberry Orange Banana Lime Leaf Slate Sky Blueberry Grape Watermelon Chocolate Marble

greenhillmaniac

Member
  • Content Count

    406
  • Donations

    $0.00 
  • Joined

  • Last visited

  • Days Won

    4

greenhillmaniac last won the day on July 16 2019

greenhillmaniac had the most liked content!

Community Reputation

258 Excellent

3 Followers

About greenhillmaniac

  • Rank
    Update Seeker and Maintainer

Profile Information

  • OS
    Windows 10 x64
  • Country

Recent Profile Visitors

5,786 profile views
  1. Actually, WES7 will still be supported until the end of the year, more or less:
  2. Actually, they will be available in the Update Catalog and documented in the Windows 7 Update History page. The only thing the bypass does is tell the Windows servicing stack that indeed the system does have the ESU bit turned on. No licenses are faked or bypassed. WU won't be able to fetch the ESUs. That will be up to the user (in the same fashion we've been doing with Vista and 8.0). Still, if it's a moderation decision that we won't have any more discussion on the issue, I won't speak about it ever again.
  3. If you disable the disk hungry services, such as the ones I mentioned, you should get just about the same wear level as Windows 7. Though I will admit I've never run Vista on a SSD, but I'm sure other members will share their experiences.
  4. You should also disable Superfetch/Prefetch, since Vista can be quite aggressive with those (it was made in the time when PCs had not a lot of memory but plenty of HDD space). You can use the instructions in this article: https://www.thewindowsclub.com/disable-superfetch-prefetch-ssd Additionally, you can also disable Windows Search, but that one shouldn't be as taxing on the SSD: https://www.howtogeek.com/howto/10246/how-to-disable-search-in-windows-7/ If TRIM is not needed on that SSD, you should be good otherwise.
  5. My update repository is only applicable to Windows 8.0, but I use Windows 8.1 on my daily desktop machine, so I can brief you in how to stay up to date and avoid any undesirable effects . Since you stopped updating in 2017, it should be easy to bring your system up to date again. You'll need: Servicing Stack: KB4524445 (http://download.windowsupdate.com/d/msdownload/update/software/secu/2019/11/windows8.1-kb4524445-x64_a8a5b5fd641b016e8ee0636c1dde808e98656d3a.msu) Monthly Rollup: KB4530702 (http://download.windowsupdate.com/d/msdownload/update/software/secu/2019/12/windows8.1-kb4530702-x64_8a3d5f3eb996149590805699de1e65c37c57a5f1.msu) Flash Player: KB4516115 (http://download.windowsupdate.com/c/msdownload/update/software/secu/2019/09/windows8.1-kb4516115-x64_0d9f83c866638da6434b4f93779faf007d00c774.msu) .NET Framework Updates (I don't know which version of .NET you have installed on your system. By default, Windows 8.1 only has .NET 4.5.2. It's possible to enable .NET 3.5 and install .NET 4.8. I'll leave a link to the latest Security and Quality Rollup) Well, all updates apart from the Servicing Stack are uninstallable, unless you run /resetbase with Dism. The Servicing Stack update is not uninstallable because it updates core servicing components of Windows 8.1. It's perfectly safe to update, with no issues reported. The biggest offender in terms of unwanted side effects are the Monthly Rollups. By default they install telemetry components and enable CPU mitigations that slow down performance. Of course, there are workarounds to these issues. In terms of CPU mitigations, they can be disabled by importing this: Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management] "FeatureSettingsOverride"=dword:00000003 "FeatureSettingsOverrideMask"=dword:00000003 And the telemetry can be disabled by following this guide on Askwoody: https://www.askwoody.com/forums/topic/2000012-neutralize-telemetry-sustain-win-7-8-1-monthly-rollup-model/ This is what I use on my system, and I'm very happy with the results. Mind you, I use a Ryzen CPU, so I also need to have this installed to bypass the Windows Update block MS implemented. Hope this helps
  6. I also created a thread related to this topic. You can find some more information there:
  7. Holiday updates for all! Replaced Monthly Rollup with the new KB4530691 (located on the root directory of the repository) Replaced Servicing Stack with the new KB4532920 (located on the root directory of the repository) Replaced Flash Player update with the new KB4516115 (located on the root directory of the repository) Added Security Only Updates, KB4516062, KB4519985, KB4525253 and KB4530698 (located in the folder "/Security Only (Post September 2016)") Replaced Internet Explorer Cumulative Update with KB4530677 (located in the folder "/Security Only (Post September 2016)") Replaced .NET Framework Security and Quality Rollups: KB4514370 for .NET Framework 3.5 SP1 (located in "/.NET Framework 3.5 Updates/Security and Quality Rollup"); KB4514368 for .NET Framework 4.5.2 (located in "/.NET Framework 4.5.2 Updates/Security and Quality Rollup"); KB4533010 for .NET Framework 4.6.x and 4.7.x (located in "/.NET Framework 4.6x-4.7.x Updates/Security and Quality Rollup"); Added new September .NET Security Only updates: KB4514349 for .NET Framework 3.5 SP1 (located in "/.NET Framework 3.5 Updates/Security Only Updates"); KB4514342 for .NET Framework 4.5.2 (located in "/.NET Framework 4.5.2 Updates/Security Only Updates"); KB4514337 for .NET Framework 4.6.x and 4.7.x (located in "/.NET Framework 4.6x-4.7.x Updates/Security Only Updates"); I'll need to investigate .NET Framework 4.8 and see if it is actually installable on Windows 8.0. For everything else, there's not much to report on. Next month marks the last release of a security update for IE10. Merry Christmas and a Happy New Year to everyone https://mega.nz/#F!ExhDEbDA!pUhzXKVp5-hgzvylW_btfQ
  8. As I've posted in a previous thread, it is possible to get Ryzen working on Vista, but drivers are kind of a pain to get working. Windows 7 USB3 drivers do work on Vista, but don't try and slipstream them, because they're not signed for NT 6.0. I would recommend first installing using a PS/2 keyboard and a DVD, if possible.
  9. It's been a long time, but I finally managed to update the repository: Replaced Monthly Rollup with the new KB4530695 (located on the root directory of the repository) Added Security Only Updates, KB4516051, KB4520009, KB4525239 and KB4530719 (located in the folder "/Security Only (Post August 2018)") Added Servicing Stack Update KB4531787 (located on the root directory of the repository) Replaced Internet Explorer Cumulative Update with KB4530677 (located in the folder "/Security Only (Post August 2018)") Updated SHA2 update KB4474419 to v4 (located in the folder "/SHA2") Replaced .NET Security and Quality Rollups: KB4507003 for .NET Framework 2.0 and 3.0 (located in "/NET 2.0 SP2/Security and Quality Rollup"); KB4507001 for .NET Framework 4.5 (located in "/NET 4.5.2/Security and Quality Rollup"); KB4533012 for .NET Framework 4.6 (located in "/NET 4.6-4.6.1/Security and Quality Rollup"). Updated the TLS 1.1 and 1.2 enabling reg file to include x64 (located in "/Extras") I hope I didn't miss any updates. This should cover the 4 months of updates missing. I think all of these updates require SHA2 support, so be sure to first install the Servicing Stack and SHA2 updates found in the "SHA2" folder. After Server 2008's EOL there might be a chance to use Extended Security updates on Vista until 2023, thanks to @abbodi1406's "Bypass Windows 7 ESU" hosted on MyDigitalLife forums, though I don't think anybody has tested the bypass on an actual Vista install. Merry Christmas, happy New Year and here's to 3 more years of patching https://mega.nz/#F!txxRyLzC!1vBMGzMHiL864f3bl1Rj1w
  10. Yeah, though I still need to revise it for x64.
  11. I'll need to take a look at it, because I created that reg file on a XP installation I did recently.
  12. Are you sure? When it throws that error it's usually already on the system.
  13. Time for the August repository update: Replaced Monthly Rollup with the new KB4512518 (located on the root directory of the repository) Added Security Only Update, KB4517302, (located in the folder "/Security Only (Post September 2016)") Replaced Internet Explorer Cumulative Update with KB4511872 (located in the folder "/Security Only (Post September 2016)") No Flash Player update that I could find this month. Happy patching! https://mega.nz/#F!ExhDEbDA!pUhzXKVp5-hgzvylW_btfQ
  14. Got some time to update the repository and also organize it: Replaced Monthly Rollup with the new KB4512476 (located on the root directory of the repository) Added Security Only Update, KB4517301 (located in the folder "/Security Only (Post August 2018)") Replaced Internet Explorer Cumulative Update with KB4511872 (located in the folder "/Security Only (Post August 2018)") NEW Added instructions on how to install .NET Framework 4.7.2 on the "/Extras" folder NEW Added a Reg file to enable TLS 1.1 and 1.2 after installing KB4019276 located on the "/Extras" folder NEW Reorganized the old 2017-2018 individual security updates so they're easier to manage, removing every superseded update and putting them all in one folder. Check them out for yourself! https://mega.nz/#F!txxRyLzC!1vBMGzMHiL864f3bl1Rj1w This was a slow month for updates (makes my job a lot easier). Hope the repository has been helping everyone
×
×
  • Create New...