Content Type
Profiles
Forums
Events
Everything posted by Dave-H
-
A general personal opinion on the actions of an anonymous large group of people many years ago is fine as far as I'm concerned, as long as it's not based on something like racism of course. That is my final word on this, and it should be yours too. Thank you.
-
Well, I really don't know, but presumably win32ss does! Surely the current ESR version has to be patched until it's superseded, if it's vulnerable, or there's no point in having it. That is 132 as far as I'm aware.
-
Thanks. IIRC does the system indicate that PAE is enabled if Data Execution Prevention is enabled, or am I mis-remembering? Of course that isn't actually doing anything with the RAM availability, as you say.
-
We may be talking about different things here regarding PAE. Standard PAE is enabled on my machine, and always has been. Until recently though, I had not experimented with 'PAE patches' to extend the amount of RAM available on my 32-bit system. I do now have one of those available as an option on boot, and it is possible that my access to the 3TB disk will fail if I use that, if I go over 2TB on the disk. I haven't actually tried that, but certainly with the standard PAE configuration, I went over 2TB on my tests without any apparent problems.
-
I'm pretty sure that when I did my tests, I went well over 2TB on my 3TB disk, with PAE enabled as it always has been, and there were no issues.
-
I don't see why it would be, they are different exploits. I'm sure win32ss knows what needs patching and what doesn't.
-
New security patched release. Supermium 132.0.6834.226 R5.01 "The only substantial change in this release is a patch for vulnerabilities CVE-2025-8010 (CVE-2025-8011 is not applicable to M132) and CVE-2025-6558."
-
Not working here either. If I try with Supermium, it does work, With that, there is code in the box next to the run and reset buttons when the page first loads, which is not there in 360Chrome. I thought uBlock might have been causing the problem, but disabling it made no difference. Don't know why this is I'm afraid.
-
Has anyone here actually got Dibya's patch to work? I've found a couple of supposed sources for it, but they all seem to contain just original system files, with no apparent modifications made to them. The instructions that came with one of them seem very strange indeed - "1. Place contents of the "For System32 folder into C:\WINDOWS\system32; Replace .exe and .dll files in System32 2. Enter "C:\WINDOWS\system32\drivers", copy contents of "For Drivers" folder (all .sys files) to the dictionary 3. Enabling PAE Click the start menu, then run (alternatively pressing win + r). Type "C:\boot.ini" then add "\PAE" at the very end of the last line of text. SAVE the file! 4. Reboot and enjoy up to 128gb of ram on your Windows XP installation" The "For System32" folder contains all the HAL and NTKRNL dll and exe files used for various types of system. They all seem to be unmodified originals. Quite how putting all of them in your System32 folder (when only one pair is needed) will do anything other than produce an error message is puzzling!
-
I think we have to take Shane's word for it that the patch has been applied to Supermium 132. As I said earlier, it's an ESR version, which surely should be capable of having the patch applied to it, as it should be fully supported until the next ESR version is released. I'm not sure how we can test whether the patch has been applied successfully or not.
-
Thanks, very interesting. My authorization.xml file has an expiry date in it of 2014-11-17, so it appears to have expired over ten years ago! The article does say that the expiry of that file is not relevant on the XP version of Microsoft Update when using Legacy Update. "Legacy Update hosts a proxy service to connect to this server, which we use on Windows 2000, XP, and Vista. Due to the way Microsoft Update is designed, configuring a custom server in the registry also inherently allows it to receive Microsoft Update updates. It also means the expiry doesn’t apply, because the authorization file is no longer relevant. This is the workaround we most likely would have used." I don't know if that also applies with the workarounds I and others here are using, but the fact that the file actually expired many years ago would seem to indicate that. So, why isn't it working any more?
-
So has Win32ss engineered the patch for Supermium, even though it's only at Chromium 132? It is based on the ESR version, which should surely be able to have the patch applied?
-
I do hope that remark was a generalisation referring to the software, and not aimed at anyone on this forum personally.
-
Thank you so much, but I'm afraid that is pretty much all completely over my head! Do you know why the /3GB switch cannot be used with the RAM patch applied?
-
Having now reviewed things, I've come to the conclusion that increasing the apparently available RAM won't do anything at all to help with my crashing browser. Correct me if I'm wrong, but from what I've researched, the problem is fundamental, and it's because it's a 32-bit browser on a 32-bit system. My understanding now is that 32-bit processes are limited to accessing 2GB of RAM, and that remains the case regardless of how much RAM is on the system. All the RAM patch will help with is running more processes simultaneously, it won't help at all with giving more memory to individual processes. The Facebook browser tab is constantly running out of memory because of the FB Purity add-on, which is eating huge amounts of it. It appears that there's nothing I can do about that. Although it caused other problems, unfortunately, the only thing which helped was using the /3GB switch in boot.ini, which I gather allows a process to access 3GB of memory instead of 2GB. I've tried using the /3GB switch with the extended RAM patch, but the system then just BSODs on startup, so I assume that configuration isn't an option. Am I right here, and there's actually nothing I can do about the browser problem? Thanks, Dave.
-
New release 132.0.6834.226 R5. This release was expedited to cover critical vulnerability CVE-2025-6554 (#1486). Some other changes were made: (#1480) - "Web Scrobbler" extension should now work on Windows XP, as well as other extensions that create notifications (#1473) - Favicons should no longer slide out of tab bounds when dozens of tabs are open in a given window (#1483) - Support for custom tab and new tab button shapes that are derived from an scs file are disabled by default after some users experienced performance declines after their introduction. This functionality is now gated behind the --enable-advanced-customization switch. Unless someone tells me that CVE-2025-6554 (#1486) is really important, I think I'll pass on this one.
-
Sotwe.com is working fine here in the UK on Supermium 132.0.6834.224 on XP.
-
Members are reminded of forum rule 1a. 1a. This is not a warez site! Links/Requests to warez and/or illegal material (e.g., cracks, serials, etc.) will not be tolerated. Discussion of circumventing WGA/activation/timebombs/license restrictions, use of keygens, or any other illegal activity, including, but not limited to, requests for help where pirated software is being used or being discussed, will also not be tolerated. Offenders may be banned on first violation. It is expressly forbidden to post links to, or to discuss, any form of warez.
-
In case anyone is interested, here attached are the two pairs of files used on the system by daniel_k's patch (hal2.dll and ntkrnl32.exe) and the '64G' patch (hal64g.dll and ntkl64.exe). I'm afraid I don't know how to analyse them to see just how similar they are. Looking with CFF Explorer, the dlls certainly do look very similar (they are exactly the same size), although of course not identical. If anyone with the necessary skills can compare them properly, I would be very interested to know the results! RAM Patches Files.zip