Jump to content
Strawberry Orange Banana Lime Leaf Slate Sky Blueberry Grape Watermelon Chocolate Marble
Strawberry Orange Banana Lime Leaf Slate Sky Blueberry Grape Watermelon Chocolate Marble

MSFN is made available via donations, subscriptions and advertising revenue. The use of ad-blocking software hurts the site. Please disable ad-blocking software or set an exception for MSFN. Alternatively, register and become a site sponsor/subscriber and ads will be disabled automatically. 


Yellow Horror

Member
  • Content count

    75
  • Donations

    $0.00 
  • Joined

  • Last visited

Community Reputation

8 Neutral

About Yellow Horror

Profile Information

  • OS
    XP Pro x86
  • Country

Recent Profile Visitors

621 profile views
  1. Corrupt Java Install

    The same solution works: download jre-8u172-windows-i586.tar.gz archive, extract its content over the existing Java installation. If you need Java to work in IE, on the Security tab of Java Control Panel uncheck "Enable Java content..." apply, then re-check it and apply again.
  2. POSReady 2009 updates ported to Windows XP SP3 ENU

    I think, there should be no problem with KB4011715 because it replaces only 5 of previous updates.
  3. Latest Version of Software Running on XP

    Which values exactly are incorrect? Did you try the v.16.20 also? P.S. For me, any version of Process Explorer i try don't show disk and network activity at all.
  4. Microsoft admits the death of Windows 10 Mobile

    I strongly doubt that they will return to old good desktop OS with new cloud features as a good addition to it. Looks like they wish to finish converting Windows to a dumb advertising/spyware platform in any way they can find.
  5. Corrupt Java Install

    It works for me too. I get a jp2launcher.exe error at re-enabling the option, but then Java works ok in both IE and FF. Thank you!
  6. Corrupt Java Install

    I think, this is untrue conclusion, because the same test page works correctly w/o any proxy with Java 8u152 in IE8/XP.
  7. Corrupt Java Install

    So, the Java version 8u152 will possibly stay the last version supporting IE8?
  8. Corrupt Java Install

    Yes. As i say before, the java works again in IE after i return previously backuped old (8u152) files to the installation folder.
  9. Corrupt Java Install

    Yes. I have similar output in the IE addons window, but when i try the "check your Java version" web page i get the empty rectangle with small red cross instead of Java aplet. UPD: the page start to work again in IE (and recommend me to update) just after i return the previous content to the Java installation folder (which is "C:\Program Files\Java\jre1.8.0_152\" in my case).
  10. Corrupt Java Install

    It don't work for my IE8. Which browser do you use? UPD: it works with Firefox ESR 52.6.0 but not with IE8, i double-check this.
  11. Spectre_Meltdown Erik August + Stephan Vanderkhof Poc

    "SSE2 w/o RDTSCP" can't read "the secret string" on i3 with any threshold i try. "SSE2 w/o RDTSCP" on Core 2 give me some (very unstable) results (few letters of "secret sting" in their right positions, garbage in other positions) with default threshold. With any threshold i try to enter manually it give complete garbage. Both "SSE" versions don't read "the string" on i3. "SSE+RDTSCP" don't work on Core 2. For now it seems that Core 2 and older CPU's are invulnerable to this realization of exploit, but may be vulnerable to a better crafted one (due to partial success of "SSE2 w/o RDTSCP" version on Core 2). This is a bad news, i think.
  12. Spectre_Meltdown Erik August + Stephan Vanderkhof Poc

    I try the exploit on a few hardware sets and figure out: The "SSE2" version works successfully on i3 CPU under XP and unpatched 7 (with threshold 32 or more). The "SSE" version starts but can't read "the secret string" anywhere, even in the vulnerable environment from previous point (i try some different thresholds from 40 to 1000). The "SSE2" version don't work on Pentium 4 (expected, because it don't support SSE2) and on Core 2 CPU that definitely supports SSE2. It exits with error before finishing the first "reading at..." message. MSE is angry about SSE2 version.
  13. Spectre_Meltdown Erik August + Stephan Vanderkhof Poc

    Seems that it can't read "the secret string" on my Pentium 4: L:\>spectre.exe Using a cache hit threshold of 80. Build: RDTSCP_NOT_SUPPORTED MFENCE_NOT_SUPPORTED CLFLUSH_NOT_SUPPORTED Reading 40 bytes: Reading at malicious_x = 00001024... Success: 0xFF=’?’ score=0 Reading at malicious_x = 00001025... Success: 0xFF=’?’ score=0 Reading at malicious_x = 00001026... Success: 0xFF=’?’ score=0 Reading at malicious_x = 00001027... Success: 0xFF=’?’ score=0 Reading at malicious_x = 00001028... Success: 0xFF=’?’ score=0 Reading at malicious_x = 00001029... Success: 0xFF=’?’ score=0 Reading at malicious_x = 0000102a... Success: 0xFF=’?’ score=0 Reading at malicious_x = 0000102b... Success: 0xFF=’?’ score=0 Reading at malicious_x = 0000102c... Success: 0xFF=’?’ score=0 Reading at malicious_x = 0000102d... Success: 0xFF=’?’ score=0 Reading at malicious_x = 0000102e... Success: 0xFF=’?’ score=0 Reading at malicious_x = 0000102f... Success: 0xFF=’?’ score=0 Reading at malicious_x = 00001030... Success: 0xFF=’?’ score=0 Reading at malicious_x = 00001031... Success: 0xFF=’?’ score=0 Reading at malicious_x = 00001032... Success: 0xFF=’?’ score=0 Reading at malicious_x = 00001033... Success: 0xFF=’?’ score=0 Reading at malicious_x = 00001034... Success: 0xFF=’?’ score=0 Reading at malicious_x = 00001035... Success: 0xFF=’?’ score=0 Reading at malicious_x = 00001036... Success: 0xFF=’?’ score=0 Reading at malicious_x = 00001037... Success: 0xFF=’?’ score=0 Reading at malicious_x = 00001038... Success: 0xFF=’?’ score=0 Reading at malicious_x = 00001039... Success: 0xFF=’?’ score=0 Reading at malicious_x = 0000103a... Success: 0xFF=’?’ score=0 Reading at malicious_x = 0000103b... Success: 0xFF=’?’ score=0 Reading at malicious_x = 0000103c... Success: 0xFF=’?’ score=0 Reading at malicious_x = 0000103d... Success: 0xFF=’?’ score=0 Reading at malicious_x = 0000103e... Success: 0xFF=’?’ score=0 Reading at malicious_x = 0000103f... Success: 0xFF=’?’ score=0 Reading at malicious_x = 00001040... Success: 0xFF=’?’ score=0 Reading at malicious_x = 00001041... Success: 0xFF=’?’ score=0 Reading at malicious_x = 00001042... Success: 0xFF=’?’ score=0 Reading at malicious_x = 00001043... Success: 0xFF=’?’ score=0 Reading at malicious_x = 00001044... Success: 0xFF=’?’ score=0 Reading at malicious_x = 00001045... Success: 0xFF=’?’ score=0 Reading at malicious_x = 00001046... Success: 0xFF=’?’ score=0 Reading at malicious_x = 00001047... Success: 0xFF=’?’ score=0 Reading at malicious_x = 00001048... Success: 0xFF=’?’ score=0 Reading at malicious_x = 00001049... Success: 0xFF=’?’ score=0 Reading at malicious_x = 0000104a... Success: 0xFF=’?’ score=0 Reading at malicious_x = 0000104b... Success: 0xFF=’?’ score=0
  14. help, the bios has locked out!.

    Some BIOS'es require the setup entering key to be pressed at certain time of POST. Try to hit F2 multiple times while the PC is starting. Also try to power-up the PC with F2 already pressed. P. S. In some cases USB keyboards can't be used to enter setup, because BIOS initialize USB ports after the right moment. If your keyboard is USB-connected, try PS/2 keyboard instead.
  15. Windows XP License

    Ok, i try the last time: You may do any tricks with licenses for your personal usage at your personal risk. I do not have any complains about it. But if you try the tricks for profit, like "why don't sell this used OEM license i don't need anymore?", you step on another side of law (or honour) from the one where i prefer to stay. Thank you all guys for an interesting discussion. I'm done here.
×