Dibya Posted January 15, 2017 Share Posted January 15, 2017 WOW! My granny use both office97 and 95 . Good see more people. I use 2003 & 2010. Link to comment Share on other sites More sharing options...
FranceBB Posted January 15, 2017 Share Posted January 15, 2017 (edited) I personally use Office 2010 and I'm fine with it. Anyway, out of curiosity, I noticed that in a company in which a friend of mine works, they used the same Office product key for 6 machines; would using it on 7 computers (one more computer) cause any issues? Edited January 15, 2017 by FranceBB Link to comment Share on other sites More sharing options...
Mcinwwl Posted January 16, 2017 Share Posted January 16, 2017 No Office 2007 updates as well this week. Nothinig but static... Ah, wait, Flash Player got updated Link to comment Share on other sites More sharing options...
glnz Posted January 19, 2017 Author Share Posted January 19, 2017 (edited) Dear Mathwiz - I just realized your post above at [Link to comment=1133576] quoted my post of a year ago. I still have the install file WindowsXP-KB955704-x86-ENU.exe . It's 3,324 KB. I put it in my OneDrive - try this OneDrive link - https://1drv.ms/u/s!ArpWuno4XUAMgRgqMK0ndGBrBv58 Edited January 19, 2017 by glnz Link to comment Share on other sites More sharing options...
glnz Posted January 21, 2017 Author Share Posted January 21, 2017 Hey Heinoganda and maybe harkaz ? -- I still use your Cert_Updater.exe from time to time on my XP. (By the way, its Modified Date is 2-16-16, so I hope it's still good.) Please take a look at this article on ArsTehnica: http://arstechnica.com/security/2017/01/already-on-probation-symantec-issues-more-illegit-https-certificates/ Given the dates in the article for the bad TLS certificates and the dates I see when I run Cert_Updater.exe (some 2015 and some Nov 2016), I don't think that Cert_Updater.exe is protecting against the bad TLS certificates in the Ars article. What do you think? Happy Trump New Year, and thanks again! Link to comment Share on other sites More sharing options...
5eraph Posted January 21, 2017 Share Posted January 21, 2017 (edited) 108 were just discovered, glnz. When Microsoft updates its files, Heinoganda's tool will download and install them. Edited January 21, 2017 by 5eraph Added link. 2 Link to comment Share on other sites More sharing options...
Sampei.Nihira Posted February 14, 2017 Share Posted February 14, 2017 https://blogs.technet.microsoft.com/msrc/2017/02/14/february-2017-security-update-release/ Link to comment Share on other sites More sharing options...
Dave-H Posted February 14, 2017 Share Posted February 14, 2017 Hmm, is that just for POSReady/WEPOS systems, or for all Windows systems? It does seem a bit vague! Link to comment Share on other sites More sharing options...
Mathwiz Posted February 14, 2017 Share Posted February 14, 2017 I don't see any Win 7 updates today either, so it might be for all - or at least for more than just the POSReady systems. Link to comment Share on other sites More sharing options...
Dave-H Posted February 14, 2017 Share Posted February 14, 2017 (edited) Well I wouldn't see them here in England until tomorrow (Wednesday) morning anyway. As I have Windows XP, Windows 7, Windows 8.1, and Windows 10 installations, I will be interested to see what appears, if anything, on some all or none of them! I'll be a bit surprised if any Flash updates, and the Malicious Software Removal Tool, aren't rolled out to the last three at the normal time anyway. Edited February 14, 2017 by Dave-H Addition Link to comment Share on other sites More sharing options...
heinoganda Posted February 14, 2017 Share Posted February 14, 2017 (edited) Shortly and succinctly, Patch day blown off at the last minute! I could have waited a long time. ( https://blogs.technet.microsoft.com/msrc/2017/02/14/february-2017-security-update-release ) Edited February 14, 2017 by heinoganda Link to comment Share on other sites More sharing options...
Dave-H Posted February 14, 2017 Share Posted February 14, 2017 You're late, that was posted by @Sampei.Nihira three hours ago! Link to comment Share on other sites More sharing options...
heinoganda Posted February 15, 2017 Share Posted February 15, 2017 @Dave-H This is clear that I am too late, the irony lies in this. Had already prepared everything and then ........ waiting! This one has to consider MS to be good, which we have been spared from faulty updates. Link to comment Share on other sites More sharing options...
CRK Posted February 15, 2017 Share Posted February 15, 2017 (edited) On 5/27/2015 at 6:49 AM, w2k4eva said: Edit 29 May 2015 - add green text I think I figured out what's going on, at least for my own system since I've gotten rid of those eventlog entries. And it seems just KB3021674 is the immediate culprit since the KB mentions that one "could leverage the Windows User Profile Service (ProfSvc) to load registry hives that are associated with other user accounts". I think the Local Service and Network Service used to do exactly this to borrow access they should not have had, possibly from SYSTEM, which is why it used to work for me before the update but afterward didn't and actually never should have, given some of my file permission settings. The good news is that the update does not need to be uninstalled to solve it. The first clue is in a thread about this update going wrong for Vista/W7 users, but the basic outline is the same for XP and/or WEPOS 2009 as well even though nobody mentions it... see the third post by Susan Bradley on http://answers.microsoft.com/en-us/windows/forum/windows_7-windows_update/kb3021674-causes-user-profile-event-1542/f203ebf9-08f5-4b95-84af-fbe8c52f3854?page=3 To dencorso and glnz, could you both check what account is the owner of the folders: C:\Documents and Settings\Default User C:\Documents and Settings\Local Service C:\Documents and Settings\Network Service C:\Documents and Settings\ (your account name) Mine are all owned by the "Administators" group, I'm thinking that glnz may have this too but perhaps dencorso does not? Also could you both open a cmd prompt and type cd c:\Documents and Settings cacls "Default User" > perms.txt cacls LocalService >> perms.txt cacls NetworkService >> perms.txt cacls (your account name) >> perms.txt then paste the contents of perms.txt here? In my case these showed that neither Local Service nor Network Service had any access to their own profiles since they were not the owner. The way I see it, the ideal solution would be to change the owner from Administrators group to Local Service and Network Service but the UI does not give me any way to do that... it can TAKE ownership but not give it away, and having it owned by either me or Administrator would not solve the problem. The other interesting post is on page 4 of that thread, in the Susan Bradley reply near the bottom, with the screen shots. But instead of focussing on "anyUser" as she does, check out NT AUTHORITY\Local Service and NT AUTHORITY\Network Service - giving them Full Control solved it for me. Also I had to do this for the entire folder (I also propagated to all children while I was at it), not just the files ntuser.dat and usrclass.dat - doing just those 2 files replaced the 6 errors with a pair of eventID1500's but didn't completely solve it. And yes, the mystery profiles for Temp and TEMP.NT AUTHORITY went away on their own after a reboot once I fixed all the permisssions, I did not need to manually delete the temporary profiles. If you have XP Pro you could follow the screenshots but for Home you would have to either reboot to safemode (so the normally missing security tab can appear on the property sheet), or (to view the current settings) use the command line to enter cd c:\Documents and Settings cacls LocalService "NT AUTHORITY\LOCAL SERVICE" cacls NetworkService "NT AUTHORITY\NETWORK SERVICE" Quote or to actually do the fix: cd c:\Documents and Settings cacls LocalService /t /e /g "NT AUTHORITY\LOCAL SERVICE":F cacls NetworkService /t /e /g "NT AUTHORITY\NETWORK SERVICE":F then for either way, version of the fix, reboot. This worked for me. i can confirm this is working, i use security essential, never used Avast in this machine, i was getting those logs either, after those command only had to give all permission, with my user name, for folder: NetworkService btw i use NTFS and only 1 partition that's all, thanks for sharing !!! :-) Edited February 15, 2017 by CRK more details Link to comment Share on other sites More sharing options...
liamZ Posted February 16, 2017 Share Posted February 16, 2017 https://blogs.technet.microsoft.com/msrc/2017/02/14/february-2017-security-update-release/ UPDATE: 2/15/17: We will deliver updates as part of the planned March Update Tuesday, March 14, 2017. wowww!!! 3 months without any updates on my windows xp pro (posready) !!!!!! Link to comment Share on other sites More sharing options...
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now