Jump to content


  • Posts

  • Joined

  • Last visited

  • Days Won

  • Donations

  • Country


Everything posted by greenhillmaniac

  1. Here's the list of unwanted updates for Windows 8.0: KB2871389 - Update is available that prepares Windows 8 and Windows RT-based computers for the update to Windows 8.1 and Windows 8.1 RT KB2885699 - Update is available that enables a notification to be displayed that helps you update Windows 8 or Windows RT to Windows 8.1 or Windows RT 8.1 KB2957026 - Update for Windows 8.1 Upgrade notification in Windows 8 and Windows RT KB2976978 - Compatibility update for keeping Windows up-to-date in Windows 8.1 (It says 8.1 but it's also available for 8.0) KB3008273 - An update to enable an automatic update from Windows 8 to Windows 8.1 KB3150513 - Latest compatibility definition update for Windows KB3163589 - "Your PC is running an outdated version of Windows" notification (MS released this after 8.0's EOL) If you go into the Server 2012 Update history site, you can download the list of files contained in each update in a CSV format. Opening it with a decent text editor you can search for the telemetry components listed in the OP and, so far, the files weren't listed in them (once again, good news for 8.0 users).
  2. AFAIK these telemetry updates are only included in the 8.1 and 7 Monthly Rollups. Windows 8 still hasnt incorporated any kind of telemetry in its Rollups. I've been compiling EOL updates for Windows 8.0 (basically from its launch all the way to January 2016) and have a sort of list of updates that either: a) Add telemetry b) Add upgrade components for Windows 8.1 c) Add nag screen for you to upgrade to either Windows 8.1 or Windows 10 I'll let you know when I get to my main PC, where I stored those files. It also contains an update for several files for Windows Update, which means most tools to circumvent the CPU block are now useless... Beware anyone with a Kaby Lake CPU or a Ryzen.
  3. It gets worse: the WMF 5.1 update corrupts the component store on non EN-US installs of Windows 8.1 because they named one of the language resource files incorrectly... And Microsoft as yet to even acknowledge this as a known issue!
  4. Thanks, made it myself with my (limited) knowledge of cmd scripting.
  5. Yes, no problem. .NET 4.6.1 replaces .NET 4.5.2 so it's perfectly normal that all of the latter's updates are removed. You just need to install all of the .NET 4.6.x updates now.
  6. First install the updates from this topic, to make Windows Update search for all of the updates you need faster: https://answers.microsoft.com/en-us/windows/forum/windows_vista-update/why-has-vista-stopped-automatic-updates/42c98c78-157b-44b7-858a-3ba92933cb90 Then run WU and install all it offers (no telemetry is contained in any update, so it's all good). Then download my repository and use the script I included at the root of it to install updates (if I recall correctly, you have to open it and change the directory it uses to install all of the updates in a folder). After all that you should have an up to date Vista install with no vulnerabilities whatsoever (in practice, anyway)
  7. Another month, another batch of patches (try saying that three times in a row!) Added Monthly Rollup, KB4463097 (located on the root directory of the repository) Added Security Only Update, KB4463104 (located in the folder "/Security Only (Post August 2018)") Replaced Internet Explorer Cumulative Update KB4462949 (located in the folder "/Security Only (Post August 2018)") Replaced .NET Framework Security and Quality with: -KB4457007 for .NET 2.0 SP2 (located in "/NET 2.0 SP2/Security and Quality Rollup") -KB4457019 for .NET 4.5.2 (located in "/NET 4.5.2/Security and Quality Rollup") -KB4457016 for .NET 4.6-4.6.1 (located in "/NET 4.6-4.6.1/Security and Quality Rollup") I've decided to not include the Preview of Monthly Rollups MS releases in the middle of each month, mostly due to stability concerns (usually MS uses those releases to test the waters by releasing telemetry and/or new bugfixes). That will be all https://mega.nz/#F!txxRyLzC!1vBMGzMHiL864f3bl1Rj1w
  8. Actually, Office 2019 works just fine on both 7 and 8.1... Since Office 2019 shares the same version files as Office 2016 and 365 (which both work on 7 and 8.1), you need to circumvent the artificial block. It just requires a bit of work with some hidden executable. I would direct everyone to this thread on MyDigitalLife, where user ratzlefatz made a tool to install Office 2019 on 7 and 8.1. In case you need proof, I used it to install it on my 7 VM: https://forums.mydigitallife.net/threads/how-to-support-chat-office-c2r-download-install-activation.62571/page-14#post-1125229
  9. https://blogs.technet.microsoft.com/ukplatforms/2018/06/11/say-no-to-long-term-servicing-channel-ltsc/
  10. Just a quick update on the repository, as I've decided to reorganize the folder structure so it would make a bit more sense and would be easier to organize (I mean, the 2016 regular updates were still in the root of the repository and the .NET updates are all over the place). Taking cues from my Vista update repository, I've decided to go with the following folder structure: Each .NET Framework version now gets its own folder with everything associated with it on it (includes all of the updates from 2016 pre update rollups and post) Pre Monthly Rollup updates (from February 2016 until September 2016) are now all accumulated into one folder (I find it easier to install them that way) Tell me what you think of it... I think it's better organized and easier to use when fresh installing 8.0. Also, added .NET Framework 4.7.2 installer in the "Extras" folder for anybody who wishes to stay up to date (yes, it installs without any modification on 8.0). Happy patching https://mega.nz/#F!ExhDEbDA!pUhzXKVp5-hgzvylW_btfQ
  11. Uau, Server 2008 now recieves Monthly Rollups and Security Only updates just like the rest of the big boys? I'm actually surprised! Now only Windows POSReady 2009 (XP) recieves individual updates. This actually makes my job easier Here's the page with the updates info: https://support.microsoft.com/en-us/help/4343218 More info on the subject: https://cloudblogs.microsoft.com/windowsserver/2018/06/12/windows-server-2008-sp2-servicing-changes/ My theory - they changed the updating scheme to be like the rest of the supported Windows versions because of the paid support they're providing for any company who sticks with Server 2008 (https://aka.ms/eos-offer-faq) Anyway: Added Monthly Rollup, KB4458010 (located on the root directory of the repository) Added Security Only Update, KB4457984 (located in the folder "/Security Only (Post August 2018)") Replaced Internet Explorer Cumulative Update KB4457426 (located in the folder "/Security Only (Post August 2018)") Replaced .NET Framework Security and Quality with: -KB4457043 for .NET 2.0 SP2 (located in "/NET 2.0 SP2/Security and Quality Rollup") -KB4457038 for .NET 4.5.2 (located in "/NET 4.5.2/Security and Quality Rollup") -KB4457035 for .NET 4.6-4.6.1 (located in "/NET 4.6-4.6.1/Security and Quality Rollup") Added .NET Framework Security Only updates: -KB4457054 for .NET 2.0 SP2 (located in "/NET 2.0 SP2/Security Only") -KB4457030 for .NET 4.5.2 (located in "/NET 4.5.2/Security Only") -KB4457027 for .NET 4.6-4.6.1 (located in "/NET 4.6-4.6.1/Security Only") I think that's everything... Let me know if I missed anything! https://mega.nz/#F!txxRyLzC!1vBMGzMHiL864f3bl1Rj1w
  12. https://www.microsoft.com/en-us/microsoft-365/blog/2018/09/06/helping-customers-shift-to-a-modern-desktop/ Microsoft changes their mind so frequently... Does this mean Windows 7's updates will practically continue until 2023 just like 8.1? That would be nice.
  13. These are actually just regular updates to fix bugs in the .NET July Updates. I did not come across them from my regular sources, so good catching! I'll be adding them to the repository. These are just the Security and Quality Rollups of July 2018, and those are always superseeded by the newest ones available (in this case, the August ones, which I already have in the repository). Thank you so much. Just having people using the repo is enough motivation to keep it updated from month to month. If this makes it easier for people to stay on anything that is not W10, it's a victory
  14. Indeed, I am I've edited my post and added those updates to the repository. BTW, I wasn't sure if I should add the July 2017 Security Only .NET updates because of all the issues they caused, but I guess the August updates fixed all of the issues, so I'll add the updates aswell
  15. The program doesn't work on Vista because it uses Electron, based on Google Chrome's latest Javascript engine.
  16. Time to make things right and update the repository for July and August's updates. JULY 2018 SECURITY - ("7 - July 2018" Folder) KB4291391 - Description of the security update for the Windows DNSAPI denial of service vulnerability http://support.microsoft.com/help/4291391 http://catalog.update.microsoft.com/v7/site/search.aspx?q=4291391 KB4293756 - Description of the security update for the Windows FTP Server denial of service vulnerability http://support.microsoft.com/help/4293756 http://catalog.update.microsoft.com/v7/site/search.aspx?q=4293756 KB4295656 - Description of the security update for the Windows kernel elevation of privilege vulnerability http://support.microsoft.com/help/4295656 http://catalog.update.microsoft.com/v7/site/search.aspx?q=4295656 KB4339291 - Description of the security update for the security feature bypass vulnerability https://support.microsoft.com/en-us/help/4339291 http://catalog.update.microsoft.com/v7/site/search.aspx?q=4339291 KB4339503 - Description of the security update for the Windows elevation of privilege vulnerability http://support.microsoft.com/help/4339503 http://catalog.update.microsoft.com/v7/site/search.aspx?q=4339503 KB4339854 - Description of the security update for the Win32k elevation of privilege vulnerability https://support.microsoft.com/en-us/help/4339854 http://catalog.update.microsoft.com/v7/site/search.aspx?q=4339854 KB4340583 - Description of the security update for the Windows denial of service vulnerability (Spectre for Intel and AMD fix!) http://support.microsoft.com/help/4340583 http://catalog.update.microsoft.com/v7/site/search.aspx?q=4340583 AUGUST 2018 SECURITY - ("8 - August 2018" Folder) KB4338380 - Description of the security update for the Windows kernel information disclosure vulnerability http://support.microsoft.com/help/4338380 http://catalog.update.microsoft.com/v7/site/search.aspx?q=4338380 KB4340937 - Description of the security update for the remote code execution vulnerability http://support.microsoft.com/help/4340937 http://catalog.update.microsoft.com/v7/site/search.aspx?q=4340937 KB4340939 - Description of the security update for the remote code execution vulnerability http://support.microsoft.com/help/4340939 http://catalog.update.microsoft.com/v7/site/search.aspx?q=4340939 KB4341832 - Description of the security update for the L1TF variant vulnerabilities (Meltdown and Spectre fix!) http://support.microsoft.com/help/4341832 http://catalog.update.microsoft.com/v7/site/search.aspx?q=4341832 KB4343674 - Description of the security update for the GDI vulnerabilities http://support.microsoft.com/help/4343674 http://catalog.update.microsoft.com/v7/site/search.aspx?q=4343674 KB4344104 - Description of the security update for the font library vulnerability http://support.microsoft.com/help/4344104 http://catalog.update.microsoft.com/v7/site/search.aspx?q=4344104 NON-SECURITY - ("Extras" Folder) KB4339284 - Time zone and DST changes in Windows for North Korea https://support.microsoft.com/help/4339284 http://www.catalog.update.microsoft.com/search.aspx?q=4339284 .NET FRAMEWORK SECURITY AND QUALITY ROLLUP https://support.microsoft.com/help/4345593 http://www.catalog.update.microsoft.com/Search.aspx?q=4345593 KB4344151 - .NET Framework 2.0 SP2 (".NET 2.0 SP2\Security and Quality Rollup") https://support.microsoft.com/help/4344151 KB4344149 - .NET Framework 4.5.2 (".NET 4.5.2\Security and Quality Rollup") https://support.microsoft.com/help/4344149 KB4344146 - .NET Framework 4.6/4.6.1 (".NET 4.6-4.6.1\Security and Quality Rollup") https://support.microsoft.com/help/4344146 JULY 2018 .NET SECURITY ONLY https://support.microsoft.com/en-us/help/4340007 http://www.catalog.update.microsoft.com/Search.aspx?q=4340007 KB4344176 - .NET Framework 2.0 SP2 (".NET 2.0 SP2\Security Only") https://support.microsoft.com/help/4338611 KB4344173 - .NET Framework 4.5.2 (".NET 4.5.2\Security Only") https://support.microsoft.com/help/4338602 KB4344167 - .NET Framework 4.6/4.6.1 (".NET 4.6-4.6.1\Security Only") https://support.microsoft.com/help/4338606 AUGUST 2018 .NET SECURITY ONLY https://support.microsoft.com/help/4345682 http://www.catalog.update.microsoft.com/Search.aspx?q=4345682 KB4344176 - .NET Framework 2.0 SP2 (".NET 2.0 SP2\Security Only") https://support.microsoft.com/help/4344176 KB4344173 - .NET Framework 4.5.2 (".NET 4.5.2\Security Only") https://support.microsoft.com/help/4344173 KB4344167 - .NET Framework 4.6/4.6.1 (".NET 4.6-4.6.1\Security Only") https://support.microsoft.com/help/4344167 INTERNET EXPLORER - (Root folder of x86 or x64) https://support.microsoft.com/en-us/help/4343205 http://catalog.update.microsoft.com/v7/site/search.aspx?q=KB4343205 I wonder who needs that timezone update for North Korea The Spectre and Meltdown related updates are marked as such in the repository so you can avoid them if you want. Good patching! https://mega.nz/#F!txxRyLzC!1vBMGzMHiL864f3bl1Rj1w
  17. I will post the link with all of the hotfixes I've gathered for Windows 8.0 x64. Here it is: https://mega.nz/#F!k0hkUC4L!msN9hqiqcYu_hwnxW5UGlg If there's a problem with this getting removed, just PM me and I'll find a way to get you the hotfixes.
  18. After a brief hiatus, I bring you July and August's updates to the repository. Do note that these two month's Monthly Rollups and Security Only updates seem to only fix CPU vulnerabilities, both on AMD and Intel chips, which could lead to performance loss? (Haven't actually tested) Replaced Monthly Rollup with KB4343901; Replaced the Flash Player update with KB4343902; Replaced the Internet Explorer cumulative update with KB4343205; Added July and August Security Only updates, KB4338820 and KB4343896, respectively; Replaced .NET Framework Security and Quality Rollup updates with: KB4344150 for .NET 3.5.1; KB4344148 for .NET 4.5.2 and KB4344144 for .NET 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1 and 4.7.2; Added August .NET Security Only updates: KB4344175 for .NET 3.5.1; KB4344172 for .NET 4.5.2 and KB4344165 for .NET 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1 and 4.7.2. That's a lot of .NET versions Anyway, to clear any confusion: Monthly Rollup and Flash Player updates are in the root folder of their respective CPU architecture types (for example, x64 or x86); Security Only and Internet Explorer cumulative updates are in the "Security Only Updates (Post September 2016)" folder; Security and Quality Rollups for .NET Framework are in the "NET Security and Quality Rollup" folder; Security Only .NET Framework updates are in the "NET Security Only Updates" folder. As you know, if you install Monthy Rollups you do not need to install the Internet Explorer cumulative update each month, because they're already included in the update. Same goes for the Security Only updates. The same deal applies to .NET Security and Quality Rollups where you do not need to install the Security Only updates if you install the former. Happy patching! https://mega.nz/#F!ExhDEbDA!pUhzXKVp5-hgzvylW_btfQ
  19. Here's my experience with AMD Ryzen CPUs on Vista: they work great! There are no random BSOD or services not starting like Haswell or above. USB 3.x drivers for Windows 7 work just fine on Vista, but you can't slipstream them into the installation, because they are not signed for NT 6.0. You'll need to have a PS/2 keyboard at hand (you only really need the keyboard). A few drivers you should not install, because they do not work: AMD PCI AMD GPIO (this one will make your system unbootable!) Everything else works just fine. I've used a MSI B350 PC Mate motherboard with 16GB of DDR4 RAM. Had to enable legacy USB, enable CSM and disable Secure Boot. After that, I was able to boot Vista in UEFI. Hope this (really late) post helps, since you've asked ages ago @WinClient5270
  20. Oof... listing 328 Microsoft KB pages seems counterproductive, considering you need to suply your email address for them to mail you the link to the hotfix. The whole point of this was to host the hotfixes all together for easy access. Makes me wonder if my update repository for 8.0 and Vista updates is considered "legal"
  21. Most of these hotfixes were released in Windows 8.1 as part of its Update 1 and Update 3, so you could say these updates just bring bug fixing parity to 8.0. Hosting these shouldn't be a problem, so don't worry about that
  22. Can't remember... had to sip through over 300 support pages from Microsoft I do remember seeing a couple hotfixes for login issues and a few related to DWM consuming too much CPU and having a memory leak where it reached 2GB of use.
  23. Finally... Just finished compilling 328 unreleased hotfixes for Windows 8.0 x64! Any interest in me releasing these files publicaly?
  24. Another interesting hotfix not released in WU for 8.0 https://support.microsoft.com/en-us/help/3002653
  25. I've been delving into the world of Windows 8.0 hotfixes, which basically are updates that fix very specific issues that Microsoft didn't issue in Windows Update, that got released in the timeframe of 8.0's release up until the beggining of 2016, and I discovered a very interesting one: https://support.microsoft.com/en-us/help/2929742 Lol, gramatical error on a KB article Anyway, if you apply this hotfix and put a registry key that they describe in the article you could reenable verbose BSOD just like in Windows 7 and earlier! This hotfix also exists for 8.1, but got bundled in a security update that was released in Windows Update, so everybody running 8.1 already has this possibility.

  • Create New...