Jump to content

bbmak

Member
  • Posts

    111
  • Joined

  • Last visited

  • Donations

    0.00 USD 
  • Country

    China

Everything posted by bbmak

  1. WinFLP is a fundamental OS, which strips IE, WMP, and other junk softwares for legacy hardwares. more info here http://www.microsoft.com/licensing/sa/bene...ndamentals.mspx ========================================================== Your method is worked, and it installs silently now, but i found a problem is when I put the package in win2003 network share, i have to enter account name and password to run the script. I already set my full permission for "everyone," but i still have to enter the account name and password at the beginning. So I have to put the package in one of the storage drive to skip the account login process.
  2. The installation is worked but I have to hit enter at the beginning when the command prompt pop up to continue the installation here is my code cls @echo off @Echo Willkommen beim Update-Pack von WinBoard @echo ---------------------------------------------------------------- @Echo + This Update Pack is NOT from MICROSOFT + @Echo + It's only a package of patches, released by MICROSOFT + @Echo + + @Echo + Only updates which require no genuineness + @Echo + examination are included + @Echo + + @Echo + We take over no liability for damages on your system + @Echo + + @Echo + Version 2.20 (WinXP) + @Echo + Created by: www.winboard.org (10.10.2006) + @echo ---------------------------------------------------------------- REM ############## section modified ################### PUSHD "%~dp0" set SILENT=false if /I "%~1"=="-silent" set SILENT=true if /I "%~1"=="/silent" set SILENT=true REM ############## section modified ################### set RegHotfixListe=HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Hotfix set LOG="%USERPROFILE%\Desktop\UpdatePack.log" echo WinBoard.org UpdatePack >>%LOG% echo ========================================================= >>%LOG% echo Version 2.20 for Windows XP >>%LOG% echo. >>%LOG% echo Date of installation: %Date%, %Time% >>%LOG% echo ========================================================= >>%LOG% echo. >>%LOG% echo. >>%LOG% @echo CLOSE ALL RUNNING APPLICATIONS REM ############## section modified ################### if %SILENT%==false pause REM ############## section modified ################### @echo. call :Patch1 898461 WindowsXP-KB898461-x86-ENU.exe "Package Installer for Windows" call :Patch1 885894 WindowsXP-KB885894-x86-enu.exe "Computer stops responding when you try to install an update" call :Patch1 885836 WindowsXP-KB885836-x86-ENU.exe "Vulnerability in WordPad" call :Patch1 873339 WindowsXP-KB873339-x86-ENU.exe "Vulnerability in HyperTerminal" call :Patch1 885835 WindowsXP-KB885835-x86-ENU.exe "Vulnerabilities in Windows Kernel and LSASS" REM ++++++++++++++++++++++++++ REM Version 2.4 (Februar 2005) REM ++++++++++++++++++++++++++ call :Patch1 887472 WindowsXP-KB887472-x86-enu.exe "Vulnerability in PNG Processing" call :Patch1 888302 WindowsXP-KB888302-x86-ENU.exe "Vulnerability in Windows Could" call :Patch1 891781 WindowsXP-KB891781-x86-ENU.exe "Vulnerability in the DHTML Editing ActiveX Control" REM ++++++++++++++++++++++++++ REM Version 2.5 (April 2005) REM ++++++++++++++++++++++++++ call :Patch1 890859 WindowsXP-KB890859-x86-ENU.exe "Vulnerability in Windows Kernel" call :Patch1 887742 WindowsXP-KB887742-x86-ENU.exe "You receive the Stop error Stop 0x05 (INVALID_PROCESS_ATTACH_ATTEMPT)" REM ++++++++++++++++++++++++++ REM Version 2.6 (Juni 2005) REM ++++++++++++++++++++++++++ call :Patch1 898458 StepByStepInteractiveTraining-KB898458-x86-ENU.exe "Vulnerability in Step-by-Step Interactive Training" call :Patch1 890046 WindowsXP-KB890046-x86-ENU.exe "Vulnerability in Microsoft Agent" call :Patch1 896358 WindowsXP-KB896358-x86-ENU.exe "Vulnerability in HTML-Help" call :Patch1 896428 WindowsXP-KB896428-x86-ENU.exe "Vulnerability in Windows Telnet Client" REM ++++++++++++++++++++++++++ REM Version 2.7 (Juli 2005) REM ++++++++++++++++++++++++++ call :Patch1 901214 WindowsXP-KB901214-x86-ENU.exe "Vulnerability in Microsoft Color Management Module" REM ++++++++++++++++++++++++++ REM Version 2.8 (August 2005) REM ++++++++++++++++++++++++++ call :Patch1 893756 WindowsXP-KB893756-x86-ENU.exe "Vulnerability in Telephony service" call :Patch1 896423 WindowsXP-KB896423-x86-ENU.exe "Vulnerability in Print Spooler service" call :Patch1 899587 WindowsXP-KB899587-x86-ENU.exe "Vulnerabilities in Kerberos" call :Patch1 899588 WindowsXP-KB899588-x86-ENU.exe "Vulnerability in Plug and Play" call :Patch1 899591 WindowsXP-KB899591-x86-ENU.exe "Vulnerability in Remote Desktop Protocol" REM ++++++++++++++++++++++++++ REM Version 2.9 (Oktober 2005) REM ++++++++++++++++++++++++++ call :Patch1 899589 WindowsXP-KB899589-x86-ENU.exe "Vulnerability in Client Service for Netware" call :Patch1 900725 WindowsXP-KB900725-x86-ENU.exe "Vulnerability in Windows Shell" call :Patch1 901017 WindowsXP-KB901017-x86-ENU.exe "Vulnerability in Collaboration Data Objects" call :Patch1 902400 WindowsXP-KB902400-x86-ENU.exe "Vulnerability in MSDTC und COM+" call :Patch1 904706 WindowsXP-KB904706-v2-x86-ENU.exe "Vulnerability in DirectShow" call :Patch1 905414 WindowsXP-KB905414-x86-ENU.exe "Vulnerability in Network Connection Manager" call :Patch1 905749 WindowsXP-KB905749-x86-ENU.exe "Vulnerability in Plug and Play" REM ++++++++++++++++++++++++++ REM Version 2.10 (November 2005) REM ++++++++++++++++++++++++++ call :Patch1 907865 WindowsXP-KB907865-x86-ENU.exe "Vulnerability in IPSec-Policy Agent" call :Patch1 896424 WindowsXP-KB896424-x86-ENU.exe "Vulnerabilities in Graphics Rendering Engine" REM ++++++++++++++++++++++++++ REM Version 2.11 (Dezember 2005) REM ++++++++++++++++++++++++++ call :Patch1 910437 WindowsXP-KB910437-x86-ENU.exe "Patch for Auto/Windows Update" call :Patch1 908521 WindowsXP-KB908521-x86-ENU.exe "Vulnerability in RPC-Service" REM ++++++++++++++++++++++++++ REM Version 2.12 (Januar 2006) REM ++++++++++++++++++++++++++ call :Patch1 898900 WindowsXP-KB898900-v2-x86-ENU.exe "DFS Namespaces Client failback feature" call :Patch1 912919 WindowsXP-KB912919-x86-ENU.exe "Vulnerability in Graphics Rendering Engine" call :Patch1 900485 WindowsXP-KB900485-v2-x86-ENU.exe "Error Stop 0x7E in Windows XP SP2" call :Patch1 908519 WindowsXP-KB908519-x86-ENU.exe "Vulnerability in Embedded Web Fonts" REM ++++++++++++++++++++++++++ REM Version 2.13 (Februar 2006) REM ++++++++++++++++++++++++++ call :Patch1 911564 WindowsMedia-KB911564-x86-ENU.exe "Vulnerability in Windows Media Player" call :Patch1 911927 WindowsXP-KB911927-x86-ENU.exe "Vulnerability in Web Client Service" call :Patch1 901190 WindowsXP-KB901190-x86-ENU.exe "Vulnerability in the Korean Input Method Editor" REM ++++++++++++++++++++++++++ REM Version 2.14 (11.04.2006) REM ++++++++++++++++++++++++++ call :Patch1 911567 WindowsXP-KB911567-x86-ENU.exe "Cumulative Security Update for Outlook Express" call :Patch1 908531 WindowsXP-KB908531-x86-ENU.exe "Vulnerability in Internet Explorer" call :Patch1 911562 WindowsXP-KB911562-x86-ENU.exe "Vulnerability in Microsoft Data Access Components (MDAC)" REM ++++++++++++++++++++++++++ REM Version 2.15 (09.05.2006) REM ++++++++++++++++++++++++++ call :Patch1 913580 WindowsXP-KB913580-x86-ENU.exe "Vulnerability in MS DTC-Service" call :Patch2 913433 Windows-KB913433-x86-ENU.exe "Vulnerability in Flash Player" REM ++++++++++++++++++++++++++ REM Version 2.16 (13.06.2006) REM ++++++++++++++++++++++++++ call :Patch1 918439 WindowsXP-KB918439-x86-ENU.exe "Vulnerability in Internet Explorer" call :Patch1 911280 WindowsXP-KB911280-v2-x86-ENU.exe "Vulnerability in Routing and Remote Access" call :Patch1 917734_WMP10 WindowsMedia10-KB917734-x86-ENU.exe "Vulnerability in Media Player 10" call :Patch1 917734_WMP9 WindowsMedia9-KB917734-x86-ENU.exe "Vulnerability in Media Player 9" call :Patch1 914389 WindowsXP-KB914389-x86-ENU.exe "Vulnerability in SMB-Service" call :Patch1 917953 WindowsXP-KB917953-x86-ENU.exe "Vulnerability in TCP/IP-Protokoll" call :Patch1 917344 WindowsXP-KB917344-x86-ENU.exe "Vulnerability in Windows Scripting Host" REM ++++++++++++++++++++++++++ REM Version 2.17 (12.07.2006) REM ++++++++++++++++++++++++++ call :Patch3 917283 NDP20-KB917283-X86.exe "Vulnerability in DHCP ASP.NET" call :Patch1 914388 WindowsXP-KB914388-x86-ENU.exe "Vulnerability in DHCP Client Service" call :Patch1 917537 WindowsXP-KB917537-x86-ENU.exe "Vulnerability in Internetinformationservice" REM ++++++++++++++++++++++++++ REM Version 2.18 (08.08.2006) REM ++++++++++++++++++++++++++ call :Patch1 921883 WindowsXP-KB921883-x86-ENU.exe "Vulnerability in Windows Server-Service" call :Patch1 920683 WindowsXP-KB920683-x86-ENU.exe "Vulnerability in DNS Resolution" call :Patch1 918899 WindowsXP-KB918899-x86-ENU.exe "Cumulative Security Update for Internet Explorer" call :Patch1 920214 WindowsXP-KB920214-x86-ENU.exe "Vulnerability in Windows" call :Patch1 921398 WindowsXP-KB921398-x86-ENU.exe "Vulnerability in Windows Explorer" call :Patch1 922616 WindowsXP-KB922616-x86-ENU.exe "Vulnerability in HTML Help" call :Patch1 920670 WindowsXP-KB920670-x86-ENU.exe "Vulnerability in Windows Hyperlink Object Library" call :Patch1 917422 WindowsXP-KB917422-x86-ENU.exe "Vulnerability in Windows Kernel" REM ++++++++++++++++++++++++++ REM Version 2.19 (12.09.2006) REM ++++++++++++++++++++++++++ call :Patch1 920685 WindowsXP-KB920685-x86-ENU.exe "Vulnerability in Index-Service" call :Patch1 919007 WindowsXP-KB919007-x86-ENU.exe "Vulnerability in Reliable Multicast-Protokoll" REM ++++++++++++++++++++++++++ REM Version 2.20 (10.10.2006) REM ++++++++++++++++++++++++++ call :Patch1 925486 WindowsXP-KB925486-x86-ENU.exe "Vulnerability in Vector Markup Language" call :Patch3 922770 NDP20-KB922770-X86.exe "Vulnerability in ASP.NET 2.0" call :Patch1 923191 WindowsXP-KB923191-x86-ENU.exe "Vulnerability in Internet Explorer" call :Patch1 924191 WindowsXP-KB924191-x86-ENU.exe "Vulnerability in XML Core Services" call :Patch1 923414 WindowsXP-KB923414-x86-ENU.exe "Vulnerability in Server Service" call :Patch1 924496 WindowsXP-KB924496-x86-ENU.exe "Vulnerability in TCP/IPv6-Protokoll" call :Patch1 922819 WindowsXP-KB922819-x86-ENU.exe "Vulnerability in Windows Object Packager" CLS @ECHO. @ECHO All hotfixes installed. @ECHO. @ECHO REBOOT IS NECESSARY !!! Please restart the computer. @ECHO. @ECHO. REM ############## section modified ################### if %SILENT%==false pause REM ############## section modified ################### goto:eof :Patch1 @echo INSTALLING Patch KB%1 @echo -------------------------------- @echo %3 Data\reg query "%RegHotfixListe%\KB%1" /v Installed 2>NUL | FIND "0x1" >Nul 2>NUL if "%errorlevel%"=="0" ( echo ++++ Patch already installed echo Patch %1 already installed >>%LOG% ) ELSE ( start /wait Data\%2 /passive /norestart echo Patch %1 installed >>%LOG% ) @echo. goto:eof :Patch2 @echo INSTALLING Patch KB%1 @echo -------------------------------- @echo %3 Data\reg query "%RegHotfixListe%\KB%1" /v Installed 2>NUL | FIND "0x1" >Nul 2>NUL if "%errorlevel%"=="0" ( echo ++++ Patch already installed echo Patch %1 already installed >>%LOG% ) ELSE ( start /wait Data\%2 /Q:A /R:N echo Patch %1 installed >>%LOG% ) @echo. goto:eof :Patch3 @echo INSTALLING Patch KB%1 @echo -------------------------------- @echo %3 Data\reg query "%RegHotfixListe%\KB%1" /v Installed 2>NUL | FIND "0x1" >Nul 2>NUL if "%errorlevel%"=="0" ( echo ++++ Patch already installed echo Patch %1 already installed >>%LOG% ) ELSE ( start /wait Data\%2 /qn /norestart echo Patch %1 installed >>%LOG% ) @echo. goto:eof
  3. Do you have the updated package for Winflp?
  4. Thank you for suggesting, I am trying the 1st method now, which is working great. For second method, winboard.org update pack, I plan to put a run-once command in Windows RIS. Can you provide a detailed explanation? the website is not in english, which i dont know how to created the hotfixes run silently
  5. Hi: I found out that it is very annoying to update all the clients computer through windows update. May I know what is the best way to deploy hotfix from a server? fast and unattended
  6. Hi: I have installed WinFLP in some of my old clients, and i try to deploy office 2003 to winflp with group policy. not The installation runs okay with windows xp client, but not goes through with winflp. I got event error ID 108 & 1085. The policy in winflp client is same as the windows xp client. All my softwares are copyrighted & legal anybody know why i cant deploy the office 2003 into winflp?
  7. I want to automatic and unintended installation with the hotfixes. GPO and RIS method will be fine. one of the idea that i think is to use runonce method in the RIS, but not sure how to do it
  8. I tried the 2nd method, which is work, but it has error during the network boot. It said the installation cannot copy "kbdbhc.dll, and other files." The 3rd method needs to install manually by hand. Are there any MSI files here? I can deploy with GPO
  9. Hi: I have windows xp sp2 in my ris, and i want to know are there any way to add the hotfixes into the RIS, so I dont have to download the hotfixes everytime after i network boot the computer?
  10. There is a windows remote boot disk generator for RIS, but are there windows remote boot cd generator because 1 of the computers doesnt have floppy disk drive
  11. Hi: I have noticed that when I am using ris to install win xp workstations, the format method is always quick format. Are there anyway I can change the quick format to full format in the RIS?
  12. Hi: I try to put WinFLP into the RIS, and i follow the instruction from the WinFLP installation cd. However, when i try to network boot 1 computer, the computer said "The operating system does image you selected doesnt contain the necessary drivers for your network adapter." I have put the .inf and .sys driver files into the winflp image My server: Windows 2003 RIS is working for Win XP SP2
  13. the desktop is pavilion 7950. It has the network boot option in the bios, so i guess the desktop has the network boot option. I also have few pavilion desktops, and i also cannot use network boot on them
  14. How do I do that? I have checked the HP website, and they dont have anything talking about network boot.
  15. Hi: I have few HP pavilion desktops, and they all have built-in lan. I have set the network boot from boot priority to 1st and enabled the on-board lan, but the computers just dont go to the network boot menu when those computers restart. Are there any key I need to press to do the network boot in the HP computers? I am sure that my RIS is working because i have been using the Win RIS to network boot all my workstations, but just cannot boot HP Pavilion computers. Sincerely BBMak
  16. ummm too bad, that screen is much prettier than the classic logon
  17. Hi: I am wondering isnt after you join the domain, you cannot get back to the pretty logon screen. I like the one that you can click your name.
  18. I try to use group policy to deploy windows defender to my client, but it cant get it install. here is the log ========================================================== Event ID:108 Failed to apply changes to software installation settings. Software changes could not be applied. A previous log entry with details should exist. The error was : Fatal error during installation. Event ID:1085 The Group Policy client-side extension Software Installation failed to execute. Please look for any errors reported earlier by that extension. ========================================================== I did search google for a result, it seems like i have to do a kerboros authorization. Is that true? Can anybody shed me some lights
  19. Windows Server CD??? you have the name for that program on the windows server cd?
  20. Hi: I want to know what is the software that is used to make MSI file for the group policy deployment?
  21. Isn't all windows 2003 group policy cannot apply to windows me? because i have a windows me client, i apply the group policy to that computer, but it seems like the computer doesnt change anything.
  22. Problem is solved by changing the DNS in the clients. Ummm... i am so stupid at the beginning because i thought the DNS is the ISP DNS
  23. here is my gpresult from workstation it seems like not applying any result RSOP results for MAKMAK\bbmak on MAKMAK : Logging Mode -------------------------- OS Type: Microsoft Windows XP Professional OS Configuration: Member Workstation OS Version: 5.1.2600 Domain Name: BBMAK0 Domain Type: Windows 2000 Site Name: Default-First-Site-Name Roaming Profile: Local Profile: C:\Documents and Settings\Administrator Connected over a slow link?: Yes COMPUTER SETTINGS ------------------ Last time Group Policy was applied: 6/30/2006 at 9:51:37 PM Group Policy was applied from: N/A Group Policy slow link threshold: 500 kbps Applied Group Policy Objects ---- Local Group Policy The computer is a part of the following security groups: -- BUILTIN\Administrators Everyone NT AUTHORITY\Authenticated Users USER SETTINGS -------------- Last time Group Policy was applied: 6/30/2006 at 9:51:37 PM Group Policy was applied from: N/A Group Policy slow link threshold: 500 kbps Applied Group Policy Objects ---- N/A The following GPOs were not applied because they were filtered out ------------- Local Group Policy Filtering: Not Applied (Empty) The user is a part of the following security groups: --------------------------- None Everyone BUILTIN\Administrators BUILTIN\Users NT AUTHORITY\INTERACTIVE NT AUTHORITY\Authenticated Users LOCAL
  24. no. can you show me the download link and instruction for checking?
×
×
  • Create New...