Jump to content

greenhillmaniac

Member
  • Posts

    460
  • Joined

  • Last visited

  • Days Won

    7
  • Donations

    0.00 USD 
  • Country

    Portugal

Posts posted by greenhillmaniac

  1. 8 hours ago, WinClient5270 said:

    Not necessarily. According to @greenhillmaniac, Windows Vista works fine on AMD's Ryzen platform, at least on the first generation Summit Ridge processors.

    Should also work for newer Ryzen's, seeing you can use the same chipset (in my case B350) with the same functioning drivers. The only thing that's incompatible are the GPU drivers for the Ryzen APUs, since the last AMD GPU drivers compatible with Vista were released in mid-2015.

  2. On 4/3/2019 at 1:38 PM, erpdude8 said:

    KB4054542 installs on Win8 embedded & Server 2012 only and not on "normal" win8.0 OS.

    Latest version of .NET Framework that can install on "Win8.0 client" is 4.6.2 from KB3181500.

    Looks can be deceiving, my friend. Just because the embedded PkgProperties on the MSU file says that doesn't mean the update.mum inside the CAB file does ;)

    Just to prove my point I went ahead and installed Windows 8.0 Enterprise on VMWare to test installing the latest .NET Framework 4.8 preview update (build 3745).

    If you try to install it normally from the executable, it will fail with an unsupported OS message, as you'd expect:
    ilZs4gt.png

    So I basically extracted the CAB files relating to 8.0 from the executable and installed them through Dism:
    6taEuUA.png

    And it seemed to go over just fine. Maybe you'd like to try it and see if you get the same results. I haven't tested this extensively, mind you.

  3. 6 hours ago, Jody Thornton said:

    Also I want to see if an ARM version of Edge Browser will released for Windows RT 8.1.

    (I've never really got a clear answer to this, but where is the best place to post about Surface RT tablets and Windows RT questions?)

    If they do release an ARM version of Edge, it will probably be ARM64 because of the whole Windows 10 on ARM effort they've recently been pushing. AFAIK Windows 8.x RT was made for ARM32.

  4. OK, so from what I've gathered, you managed to mod the nVidia RTX drivers to work on Vista? Have you tested them? Do you have screenshots proving the mod works?

    Just posting a bunch of files in the wrong section of the forum (this could've been posted in the Windows Vista category) without any kind of description doesn't help people understand why this was posted.

  5. And here is the repository update for Windows 8.0 for January and February 2019:

    • Replaced Monthly Rollup with the new KB4487025 (located on the root directory of the repository)
    • Replaced Flash Player Security update with KB4487038 (located on the root directory of the repository)
    • Added Security Only Updates, KB4480972 and KB4486993 (located in the folder "/Security Only (Post September 2016)")
    • Replaced Internet Explorer Cumulative Update with KB4486474 (located in the folder "/Security Only (Post September 2016)")
    • Replaced .NET Framework Security and Quality with:
      -KB4483456 for .NET 3.5 SP1 (located in "/.NET Framework 3.5 Updates/Security and Quality Rollup")
      -KB4483454 for .NET 4.5.2 (located in "/.NET Framework 4.5.2 Updates/Security and Quality Rollup")
      -KB4483449 for .NET 4.6.x-4.7.x (located in "/.NET Framework  4.6.x-4.7.x Updates/Security and Quality Rollup")
    • Added .NET Framework September Security Only Updates:
      -KB4480083 and KB4483481 for .NET 3.5 SP1 (located in "/.NET Framework 3.5 Updates/Security Only Updates")
      -KB4480075 and KB4483473 for .NET 4.5.2 (located in "/.NET Framework 4.5.2 Updates/Security Only Updates")
      -KB4480070 and KB4483468 for .NET 4.6.x-4.7.x (located in "/.NET Framework  4.6.x-4.7.x Updates/Security Only Updates")
    • Added extra update KB4490516 (located in "/Extras (Non Security Updates)")

    Can't wait to see how IE11 will work on Windows 8.0...

    https://mega.nz/#F!ExhDEbDA!pUhzXKVp5-hgzvylW_btfQ

  6. Ok, I've had time to update the repository with the January and February updates. Just in time, before Microsoft unleash the March ones.

    • Replaced Monthly Rollup with the new KB4487023 (located on the root directory of the repository)
    • Added Security Only Updates, KB4480957 and KB4487019 (located in the folder "/Security Only (Post August 2018)")
    • Replaced Internet Explorer Cumulative Update with KB4486474 (located in the folder "/Security Only (Post August 2018)")
    • Replaced .NET Framework Security and Quality with:
      -KB4483457 for .NET 2.0 SP2 (located in "/NET 2.0 SP2/Security and Quality Rollup")
      -KB4483455 for .NET 4.5.2 (located in "/NET 4.5.2/Security and Quality Rollup")
      -KB4483451 for .NET 4.6-4.6.1 (located in "/NET 4.6-4.6.1/Security and Quality Rollup")
    • Added .NET Security Only Updates with:
      -KB4480084 and KB4483482 for .NET 2.0 SP2 (located in "/NET 2.0 SP2/Security Only")
      -KB4480076 and KB4483474 for .NET 4.5.2 (located in "/NET 4.5.2/Security Only")
      -KB4480072 and KB4483470 for .NET 4.6-4.6.1 (located in "/NET 4.6-4.6.1/Security Only")
    • Added Extra updates KB4486459, KB4487354 and KB4490514 (located in "/Extras") with an updated readme file

    Funny enough, the timezone update KB4486459 does not replace the previous KB4468323. Also worth noting that KB4487354 in the extras folder is not needed if you install the Monthly Rollups.
    That is all for now :)

    https://mega.nz/#F!txxRyLzC!1vBMGzMHiL864f3bl1Rj1w

    EDIT: I've rearranged the repository for easier navigation. Now the pre-Monthly Rollup Security Updates are in a folder named "Security Updates (May 2017-August 2018)"

  7. 1 hour ago, dencorso said:

    But Windows Embedded POSReady 7 has both x86 and x64 versions and has the same EoS as Windows Thin PC, and its unmodified updates just work, so ...  :yes:

    Wow, I made that post quite a while ago... Yes, I've already figured it out regarding POSReady 7.

    Both Windows Thin PC and POSReady 7 are derived from Embedded Standard 7, meaning all of the OS is componetized. Updates made only for those specific variants of NT 6.1 don't work on regular W7 but, luckily for us, MS tries to make its job easier and Monthly Rollups are universal for all NT 6.1 variants. Considering they will be selling Extended Support until 2023, I doubt they will start making a distinction between those 2 product lines.

  8. 2 hours ago, cc333 said:

    @greenhillmaniac Yes, but are POSReady 7's updates compatible with plain 7, either directly or with minor modifications?

    If they are, then you're correct!

    c

    Even though updates directed at Windows Embedded 7 are structurally different, because they have to target individual packages since the OS is entirely modular, unlike standard Windows 7, they will be providing extended support to Professional and Enterprise users. Although we probably won't have access to those updates, I very much doubt that MS will go to the trouble of doing different kinds of updates for POSReady 7 and the paying volume license costumers who are using the Extended Support. My guess is that POSReady 7 updates will be identical to those supplied to Professional and Enterprise users after EOL, like it has been so far.

  9. Windows 8.0 sure doesn't get any love... To remedy this, I've got a big repository update for ya! Brace yourselves, it's gonna be a big post.
    Here's the usual:

    • Replaced Monthly Rollup with the new KB4471330 (located on the root directory of the repository)
    • Replaced Flash Player Security update with KB4471331 (located on the root directory of the repository)
    • Added Security Only Update, KB4471326 (located in the folder "/Security Only (Post September 2016)")
    • Replaced Internet Explorer Cumulative Update KB4483187 (located in the folder "/Security Only (Post September 2016)")
    • Replaced .NET Framework Security and Quality with:
      -KB4470629 for .NET 3.5 SP1 (located in "/.NET Framework 3.5 Updates/Security and Quality Rollup")
      -KB4470623 for .NET 4.5.2 (located in "/.NET Framework 4.5.2 Updates/Security and Quality Rollup")
      -KB4470638 for .NET 4.6.x-4.7.x (located in "/.NET Framework  4.6.x-4.7.x Updates/Security and Quality Rollup")
    • Added .NET Framework September Security Only Updates:
      -KB4470601 for .NET 3.5 SP1 (located in "/.NET Framework 3.5 Updates/Security Only Updates")
      -KB4470492 for .NET 4.5.2 (located in "/.NET Framework 4.5.2 Updates/Security Only Updates")
      -KB4470492 for .NET 4.6.x-4.7.x (located in "/.NET Framework  4.6.x-4.7.x Updates/Security Only Updates")

    Also decided to install Server 2012 on a VM where I installed all of Windows 8.0 EOL updates and searched WU for the remaining updates. This was the result:
    Ny8lbi5.jpg

    A bunch of non security updates that I didn't include on my repository! I have fixed this, so here's a more detailed list:

    • KB3055343 - Stop error code 0xD1, 0x139, or 0x3B and cluster nodes go down in Windows Server 2012 R2 or Windows Server 2012
    • KB3102429 - Update that supports Azerbaijani Manat and Georgian Lari currency symbols in Windows
    • KB3125424 - LSASS deadlocks cause Windows Server 2012 R2 or Windows Server 2012 not to respond
    • KB3137061 - Windows Azure VMs don't recover from a network outage and data corruption issues occur
    • KB3137726 - "VSS_E_PROVIDER_VETO" error occurs when VSS restore fails in Windows Server 2012
    • KB3137916 - "0x00000027" Stop error and unexpected restart in Windows Server 2012
    • KB3138378 - Update for Journal.dll binary in Windows
    • KB3147071 - Connection to Oracle database fails when you use Microsoft ODBC or OLE DB Driver for Oracle or Microsoft DTC in Windows

    Do note that even though the description for these updates makes it seem as these are fixes specific to Server 2012 they also apply to Windows 8.0 (in some of the KB they specifically say it also applies to Windows 8 Embedded, not to mention some of the updates are also available for W7 and W8.1)
    There's also an important update I didn't include in the list, because I thought it is too important to not be mentioned exclusively. That is:

    • KB3140245 - Update to enable TLS 1.1 and TLS 1.2 as default secure protocols in WinHTTP in Windows

    As you can see, adding support to new security protocols seems important in keeping Windows 8.0 relevant and up to date. You do need to do a few extra steps to fully enable the update's functionality, so I've included a folder with everything you need in the repository.
    All of the updates I've mentioned so far are in the Extras folder, in case you want to install them. Available in both x64 and x86 flavors :)

    https://mega.nz/#F!ExhDEbDA!pUhzXKVp5-hgzvylW_btfQ

  10. Late December repository update... Just a few more days for the January patches.

    • Replaced Monthly Rollup with the new KB4471325 (located on the root directory of the repository)
    • Added Security Only Update, KB4471319 (located in the folder "/Security Only (Post August 2018)")
    • Replaced Internet Explorer Cumulative Update KB4483187 (located in the folder "/Security Only (Post August 2018)")
    • Replaced .NET Framework Security and Quality with:
      -KB4471102 for .NET 3.5 SP1 (located in "/NET 3.5 SP1/Security and Quality Rollup")
      -KB4470637 for .NET 4.5.2 (located in "/NET 4.5.2/Security and Quality Rollup")
      -KB4470640 for .NET 4.6-4.6.1 (located in "/NET 4.6-4.6.1/Security and Quality Rollup")
    • Added .NET Security Only Updates with:
      -KB4470633 for .NET 3.5 SP1 (located in "/NET 3.5 SP1/Security and Quality Rollup")
      -KB4470493 for .NET 4.5.2 (located in "/NET 4.5.2/Security and Quality Rollup")
      -KB4470500 for .NET 4.6-4.6.1 (located in "/NET 4.6-4.6.1/Security and Quality Rollup")

    https://mega.nz/#F!txxRyLzC!1vBMGzMHiL864f3bl1Rj1w

    This must be the first time since Vista's EOL that I've seen an update for .NET Framework 3.5 SP1. Don't forget that even if you have .NET 3.5 installed every .NET 2.0 update still applies!

  11. Why do I get the feeling Microsoft is inventing solutions to problems they created in the first place? Wouldn't this categorization be useless if they just simply returned users control of the updates they installed, just like in every Windows version prior to 10? Isn't inventing an AI system that helps with major releases kinda going the long way to solve a problem that didn't need to exist in the first place?

    Two steps backward and one forward must be the new slogan for MS.

  12. On 12/9/2018 at 6:54 PM, Tamris said:

    The only difference between the two is that my actual Vista is fully updated with all post EOL Server 2008 updates (except the Spectre/Meltdown ones), while the other is only updated till April 2017

    There's the main difference. Every Windows version since 2000 (I think) has 2 main branches of updates: GDR and LDR. If you install an update normally, you default into the GDR branch, meant for general security and feature updates. If you install certain hotfixes, you're bumped into the LDR branch. This is best noted in file versions. If you're on the GDR branch, the updated files will have 6.1.6002.1xxxx version while if you're on the LDR branch the updated files will have 6.1.6002.2xxxx version.

    In this case, ever since the release of Windows 8.1 MS decided to kill this update approach, and as such, all updates released since around 2016 only come in the LDR flavor. Since you have the post EOL updates installed on your Vista machine, one of those updated Windows Media Player into the LDR version.

    If you want more info, MS made a few blog posts explaining in greater detail what I've just said: https://blogs.technet.microsoft.com/mrsnrub/2009/05/14/gdr-qfe-ldr-wth/

  13. Wow, haven't updated the repository since August! Time to fix that :rolleyes:

    • Replaced Monthly Rollup with the new KB4467701 (located on the root directory of the repository)
    • Replaced Flash Player Security update with KB4477029 (located on the root directory of the repository)
    • Added Flash Player update (separate from the security update mentioned above) KB4462930 (located on the root directory of the repository)
    • Added Security Only Update, KB4457140, KB4462931 and KB4467678, equivalent to the September, October and November ones (located in the folder "/Security Only (Post September 2016)")
    • Replaced Internet Explorer Cumulative Update KB4466536 (located in the folder "/Security Only (Post September 2016)")
    • Replaced .NET Framework Security and Quality with:
      -KB4459932 for .NET 3.5 SP1 (located in "/.NET Framework 3.5 Updates/Security and Quality Rollup")
      -KB4459944 for .NET 4.5.2 (located in "/.NET Framework 4.5.2 Updates/Security and Quality Rollup")
      -KB4459940 for .NET 4.6.x-4.7.x (located in "/.NET Framework  4.6.x-4.7.x Updates/Security and Quality Rollup")
    • Added .NET Framework September Security Only Updates:
      -KB4457053 for .NET 3.5 SP1 (located in "/.NET Framework 3.5 Updates/Security Only Updates")
      -KB4457029 for .NET 4.5.2 (located in "/.NET Framework 4.5.2 Updates/Security Only Updates")
      -KB4457025 for .NET 4.6.x-4.7.x (located in "/.NET Framework  4.6.x-4.7.x Updates/Security Only Updates")

    That's a big changelog! Hope it helps whoever's still using Windows 8.0.

    https://mega.nz/#F!ExhDEbDA!pUhzXKVp5-hgzvylW_btfQ

×
×
  • Create New...