Jump to content

wyxchari

Member
  • Posts

    89
  • Joined

  • Last visited

  • Days Won

    1
  • Donations

    0.00 USD 
  • Country

    Spain

Everything posted by wyxchari

  1. Yes, I always do it that way too. Only the cumulative update of IE8 manually and then I search with IE, because it is not always necessary to install them all and it depends on the particular system.
  2. I have tried with VMWare: 1.- Start Windows Embedded PosReady 7. 2.- Windows Update and copy several KB numbers that come out of Windows Embedded Standard 7. 3.- Go to the Microsoft catalog and download them. They are * .msu. 4.- Start Windows 7. 5.- Execute the KB.msu and install perfectly. 6.- During the installation in C: \ a temporary folder appears with the .txt of properties of the update: ApplicabilityInfo = "Windows 7.0 Client SP1; Windows 7.0 Client; Windows 7.0 Embedded SP1; Windows 7.0 Embedded;" Applies to = "Windows 6.1" Build Date = "2011/04/28" Company = "Microsoft Corporation" File Version = "1" Installation Type = "FULL" Installer Engine = "Component Based Servicing - WUSA.exe" Installer Version = "6.0.0.0" KB Article Number = "2532531" Language = "ALL" Package Type = "Security Update" Processor Architecture = "x86" Product Name = "Windows 6.1" Support Link = "http://support.microsoft.com?kbid=2532531" Conclusion: It seems that the updates are made for all versions of Windows 7 and are compatible with each other, or at least they would be the majority.
  3. - I have tried the XP hack (WPA / PosReady) and it does not work. Keep showing normal updates. - From the normal Windows 7, I have started to install Windows PosReady 7 giving to setup.exe and it says that another operating system is detected and it will save it as windows.old, therefore, it does not update it, it is like a clean installation always. http://www.itninja.com/question/installing-windows-updates-for-windows-embedded-posready-2009-machines https://support.microsoft.com/en-za/help/934307/description-of-the-windows-update-standalone-installer-in-windows http://www.winhelponline.com/blog/install-cab-msu-updates-mu-catalog/ http://www.thewindowsclub.com/extract-cab-file-using-command-line "wusa update.msu /extract" -> *.cab, *.xml, *.txt -> "expand *.cab -F:*" ?????? "dism /online /add-package:*.cab" ????? Manually copy the files if the versions already installed are smaller. Those that can not be copied by being in use, would have to restart and use the recovery console or do so from a USB WinPE, USB Linux or USB Wifislax for example.
  4. Somewhere I read that does not work on W7. Anyway, I'm going to try it in VMWare: 1- I install W7. 2- Hack registry for POSReady. 3.- Check for updates to see if I receive POSReady.
  5. I have several computers with W7 in which I finish receiving updates on January 14, 2020. They can not update to W8 or W10 since they are Pentium 4 and the processor does not have the NX bit. Although there are still 2 years left, I am thinking if it is possible to install one of the following to extend the period of updates: Windows 7 Embedded Standard SP1 = October 13, 2020 Windows Embedded POSReady 7 = October 12, 2021 Would it be possible to install it on top or should a clean installation be done?
  6. You're right. According to this very reliable article, they are affected from the Pentium Pro (1995): https://disruptiveludens.wordpress.com/2018/01/05/meltdown-y-spectre/ Intel processors affected in all variants: Pentium Pro, Pentium II, Pentium III, Pentium 4, Pentium D, Pentium M, Core 2 Duo, Core 2 Quad, ... And continue with the expanded official list that Intel published: https://www.techarp.com/guides/complete-meltdown-spectre-cpu-list/ Not affected: Atom before 2013, Itanium.
  7. Spectre: Formerly more than 10 years ago, the processors accessed the cache memory through a bus called FSB, which was outside the processor. Since 2008, to access the cache faster, the FSB was suppressed and this memory was introduced inside the processor chip itself. Since then there are the problems of Spectre. Processor without FSB (CPU access directly to the cache) -> affected by repetitive reading of the cache memory by measuring the access time -> Spectre -> repair with new microcode to the processor using BIOS (causes instability for the moment) Meltdown: Processor since 1995 (not related to the FSB) -> affected by access to speculative data of the cache by jumping privilege levels -> Meltdown -> repair already done by Microsoft patch (already available KB4056892 for Intel and fix error of not boot AMDs with KB4073290) --- There is a lot of publicity on this subject and people think of a real danger. Truly the danger is minimal. The browsers are already updated to mitigate these vulnerabilities regardless of whether you put the Microsoft patches. To this we add that Meltdown is already mitigated with patch. We have for the moment Spectre that to take passwords we must download a malware with our permission and execute it. And it is tremendously complicated because we would have to make a specific malware for each processor. Motherboard manufacturers have already started to release BIOS updates with Intel's new microcode, but they have caused instabilities in the systems. They have recommended going back to the previous BIOS and waiting for Intel to fix the problems. I am really more worried about the MINING on the web than Spectre.
  8. This list of linux is of processors with microcode updated. Not is of processors affected for Spectre or Meltdown. Easy: have FSB = not affected. Without FSB = affected https://ark.intel.com/es-es/products/29758/Intel-Core2-Duo-Processor-T5300-2M-Cache-1_73-GHz-533-MHz-FSB https://ark.intel.com/es-es/products/27255/Intel-Core2-Duo-Processor-T7200-4M-Cache-2_00-GHz-667-MHz-FSB https://ark.intel.com/es-es/products/27977/Intel-Celeron-M-Processor-520-1M-Cache-1_60-GHz-533-MHz-FSB
  9. You're right. I use BOTH because "Adblock plus" with updated lists did not block "elitegol.me" in which I usually enter a lot. I can add custom filters and in fact I have about 500 additions. For me it is easy to see advertising on a website, give the contextual menu to inspect the element, copy the html and paste it into the custom filters. The problem is that it is not practical that in each web that enters, consult the use of CPU to know if there is mined. As Adblock plus, at the moment it does not work for me, I use ALSO "Mining blocker" which is specialized, although I know that in the background it does the same as Adblock plus. Greetings.
  10. That I tried it in my Firefox 52.6.0esr and it blocked well but the icon stays blocked with an exclamation mark even if I keep surfing. That's why you can "Mining blocker." The malicious javascript file is called "/adsensebase.js" for "elitegol.me" in case you want to block in Adblock but any web page can change its name and it does not have to be hosted in a certain web.
  11. Hi. I have just discovered that there are internet pages that use your processor 100% by javascript to generate money without your permission for the web. Example of javascript mining web: http://www.elitegol.me It is not dangerous, simply while visiting that website the processor is set to 100% and consumes more electricity. The latest versions of Firefox and Chrome are already protected, but the latest versions for Windows XP that are Firefox 52.6.0esr and Chrome 49.0.2623.112m are not. Web to test Windows XP browsers: https://cryptojackingtest.com To block the mining, extensions can be placed. One that I have tried and it works well in FF and Chrome for XP is called: Mining blocker
  12. I would not play with these little programs of dubious origin and programmed by strangers. For me, the only valid thing is what the manufacturer says, Intel, and not with much credibility either. According to the referenced comment, it seems that there are disconcerting results not expected by the programmer.
  13. Always leave 2 days late for updates. So if there are errors, Microsoft removes them from the catalog before they are installed.
  14. https://techcrunch.com/2008/11/03/new-intel-processor-does-away-with-front-side-bus-adds-third-level-of-cache-brings-back-hyperthreading/ In 2008, Spectre ruling began and until 2017 they did not discover it or publish it. To speed up CPU access to memory, the FSB or Front Side Bus (north bridge) was removed. The CPU integrates this function into its own chip and the error occurs. No need to test programs to see if your CPU is affected. Just know if your CPU has FSB or not.
  15. If by the old processor model, you already know that it is not vulnerable physically, why check if the vulnerable? The normal thing is that these utilities are thought for vulnerable processors. In old processors they may give diagnostic errors. My Intel Atom N270 on my XP has FSB and it is not affected. Neither appears in the lists of affected cpus. Look what it says. InSpectre is a bad program.
  16. Specter only affects processors without FSB. Celeron M 520, 420 or 380 has FSB: https://ark.intel.com/es-es/search?q=celeron+m+1.60 https://www.techarp.com/guides/complete-meltdown-spectre-cpu-list/ InSpectre is bad. Better to use any of the following: https://github.com/ionescu007/SpecuCheck/releases or https://www.ashampoo.com/en/usd/pin/1304/security-software/spectre-meltdown-cpu-checker or the powershell script of Microsoft: https://support.microsoft.com/en-us/help/4073119/protect-against-speculative-execution-side-channel-vulnerabilities-in
  17. I repeat again. Meltdown and Spectre only affect processors without FSB. In that list appears until the Pentium III . It is a list of updated microcodes, not of processors affected by Spectre.
  18. This month has not come out. I do not know the cause. It has FSB and it is not affected: https://ark.intel.com/es-es/products/35581/Intel-Core2-Duo-Processor-T5800-2M-Cache-2_00-GHz-800-MHz-FSB
  19. https://ark.intel.com/es-es/products/30785/Intel-Core2-Duo-Processor-E6850-4M-Cache-3_00-GHz-1333-MHz-FSB KB4056615 and KB4056941: my old computers are not affected by Meltdown+Spectre but since WU offered me these updates, I ate them.
  20. Fortunately my old CPUs are not affected by Spectre-Meltdown because they have FSB: Intel Pentium III (XP), AMD Athlon XP 1700+ (XP), Intel Atom N270 (XP), Intel Pentium 4 (XP W7 registry forced patch), Intel Pentium D 830 (XP). Affected without FSB: Intel i5-6500 (W10): registry forced patch because Malwarebytes (crack premium version) does not activate the registry. XP KB4056615, W7 KB4056894, W10 KB4056892 Include INTEL AMD ARM: https://www.techarp.com/guides/complete-list-cpus-meltdown-spectre/ NVIDIA chips is affected. New driver. MSI and ASUS motherboards has updated all the BIOS.
  21. Since October 2017, it is usual to update hours and hours, such as 8h, 12h and in November 2017, even days. I always manually install the IE8 and the 2 Office compatibility. For the rest I use WU/MU and it takes very little.
  22. After manually installing the 2 updates of the Office compatibility package (wordconv2007-kb4011607-fullfile-x86-glb.exe and xlconv2007-kb4011605-fullfile-x86-glb.exe), when searching again it shows in 4 minutes:
  23. If it does not end in 3 hours, I will manually install the 2 Office compatibility updates and search again.
×
×
  • Create New...