Jump to content

POSReady 2009 updates ported to Windows XP SP3 ENU


glnz

Recommended Posts


11 hours ago, Roffen said:

I'd like to try the POS Ready version of XP instead of Sp4, how do I do it? Presume there is an up to date 'how to do it' somewhere.

Actually someone responded to your question:

10 hours ago, heinoganda said:

Complement:
It is known that WEPOS / POSReady 2009 is not intended for use on a desktop computer

But I''ll make it a bit more verbose. In general, POSReady stands for 'Point Of Service Ready', which means it is designed for devices like Cash machines, ticket machines, and Endpoint for McDonalds employees. It is not designed for Desktop PC, it doesn't have some of Home XP elements, and it was never sold in retail version.

It seems after quick googling that you can download an evaluation CD ISO, burn it into physical disc and install it on your PC.

https://www.microsoft.com/en-us/download/details.aspx?id=11196

But unfortunately, it's 120 days evaluation licence. Maybe you can play a Warez d00d and get illegal activation key, but this will be... uh... illegal ;) They were never sold for Personal users:

https://www.microsoft.com/windowsembedded/en-us/purchase.aspx

Some features might work or not work no POSReady installation, when compared to XP - best review Microsoft pages for list of changes.Example dorm this topic:

11 hours ago, heinoganda said:

officially no Office products are supported!

O, besides, there was actual topic about that on MSFN:

Link to comment
Share on other sites

17 hours ago, mixit said:

In other words, those still using plain XP without getting on the POSReady update train can now get this SMBv1 patch as well. (For those using POSReady updates, this patch has already been superseded by this month's KB4018466.)

CVE-2017-0271 | Windows SMB Information Disclosure Vulnerability
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0271

CVE-2017-0272 | Windows SMB Remote Code Execution Vulnerability
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0272

CVE-2017-0273 | Windows SMB Denial of Service Vulnerability
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0273

CVE-2017-0274 | Windows SMB Information Disclosure Vulnerability
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0274

Security update for the Windows SMB Information Disclosure Vulnerability in Windows Server 2008: May 9, 2017
https://support.microsoft.com/en-us/help/4018466/title

https://isc.sans.edu/forums/diary/Microsoft+Released+Guidance+for+WannaCrypt/22416/

Quote

There are reports that indicate that WannaCry VERSION 2 has been released and the kill switch that had been activated by a security researcher has been removed. If you haven't already applied MS17-010 and blocked inbound SMB traffic, you can still fall victim of this Ransomware.

Maybe it won't take long for someone to exploit yet another vulnerability that's patched earlier this month?

If that were actually happening soon, better install KB4018466 instead of KB4012598 just in case they might decide to "upgrade" WannaCry again:

http://download.windowsupdate.com/c/msdownload/update/software/secu/2017/04/windowsxp-kb4018466-x86-embedded-enu_9152d114029dd47afbf6d5108012ac513a720cf7.exe

BTW, that brought back some memories of Blaster/Welchia/Nimda from 2003 (MS03-026 / MS03-039) and Sasser (MS04-011) from 2004. They're flooding the entire network back then and it took forever to clean things up afterwards.

Link to comment
Share on other sites

Just yesterday my own Updaterollup for May 2017 installed on my host computer (including the successor patch KB4018466 of KB4012598). The users who install the POSReady updates for their Windows XP monthly, I see no problem with this "WannaCrypt" attack. Maybe some users should reconsider it and yet use the POSReady updates for Windows XP.

:)

Link to comment
Share on other sites

Interesting that bulletin still lists Vista as a supported OS. I thought support for that ended a month ago!
Vista users should still have had the patch back in March though.
Are there any instances of machines on current fully patched operating systems being affected by the exploit?
I'd be surprised if Windows 10 was affected, because as we all know, you can't avoid getting patched on that, unless you make a deliberate decision to prevent it!
Let's hope that the next evolution of the malware is blocked before it has a chance to strike.
:yes:
 

Link to comment
Share on other sites

1 hour ago, Dave-H said:

Interesting that bulletin still lists Vista as a supported OS. I thought support for that ended a month ago!
Vista users should still have had the patch back in March though.
Are there any instances of machines on current fully patched operating systems being affected by the exploit?
I'd be surprised if Windows 10 was affected, because as we all know, you can't avoid getting patched on that, unless you make a deliberate decision to prevent it!
Let's hope that the next evolution of the malware is blocked before it has a chance to strike.
:yes:
 

Windows 10 ON THE BANK is fully patched along with creator update as per their it team . only fact is that virus will not spread through smb if patched but what about getting infected from a Linux server 

Link to comment
Share on other sites

1 hour ago, DrWho3000 said:

Can you install PosReady2009 ontop of WinXP Pro SP3, or is this a standalone OS ?

:boring:

On 5/21/2014 at 3:54 PM, Sebijk said:

there is a much easier way:


Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SYSTEM\WPA\PosReady]
"Installed"=dword:00000001

and POSReady2009 Updates will install on XP + Windows Update shows the updates for POSReady 2009 :)

Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...