TheCrowX Posted July 26, 2006 Posted July 26, 2006 hi everyone i wonder if it is ok if i add all the new hotfixes without removing some old ones cuz i don t know know the ones that are useless by the last updateand anyone can give me a direct french link to download this hotfix " High Definition Audio Driver Package - KB835221 "Thanx in advance
Sonic Posted July 26, 2006 Posted July 26, 2006 Your audio drivers contain the High Definition patch. But you can extract the patch only for example from realtek.com.tw in the package for Realtek ALC880 series ...(two pages before ... http://www.tastycomputers.com/support/download/c_media.htm )
rado354 Posted July 27, 2006 Posted July 27, 2006 (edited) Can someone provide a direct link for KB900485?Those from the site of Microsoft do not work Thanks in advance!http://download.microsoft.com/download/e/3...485-x86-ENU.exeSee? For some stupid reason the page couldn't be displayed Edited July 27, 2006 by rado354
the_guy Posted July 27, 2006 Posted July 27, 2006 900485 has been updated to v2.Link to download page is herethe_guy
rado354 Posted July 27, 2006 Posted July 27, 2006 Thanks for the fast response, the_guy!I couldn't open your link (IE, Firefox, nothing...)However I suppose this is what I need:http://download.microsoft.com/download/e/3...-v2-x86-ENU.exe
cumminbk Posted July 27, 2006 Posted July 27, 2006 (edited) Direct link for KB914440 (v10) ?plz Edited July 27, 2006 by cumminbk
TheCrowX Posted July 27, 2006 Posted July 27, 2006 If you are running XP SP2,ADD: 917159 and 914388. (not sure about 917537)REMOVE: 896422.If you are installing dotnet2:ADD: 917283 (ryan's switchless installer already includes this) (if not using ryan's installer, make sure this is installed AFTER dotnet 2.the_guyhi but isn t KB916595 a critical one it shows on my updatesfor KB896422 are u sure this one must be removed are there any others ?!and by the way if i keep one old hotfix in my windows will that matter ?Thanx in advance
ari Posted July 28, 2006 Posted July 28, 2006 Direct link for KB914440 (v10) ?MS DL PageThis is a optional Patch with WGA Check. Nobody can post a directlink to the *.exe. hi for KB896422 are u sure this one must be removed are there any others ?!and by the way if i keep one old hotfix in my windows will that matter ?Thanx in advanceKB896422 is replace with KB917159Both Patches install the File srv.sys, KB896422 Vers. 5.1.2600.2673 & KB917159 Vers. 5.1.2600.2893 from this file
rado354 Posted July 28, 2006 Posted July 28, 2006 This is a optional Patch with WGA Check. Nobody can post a directlink to the *.exe. Well, KB900485 had a WGA check too, but I was still able to find a direct link to the *.exe
Slycer Posted July 28, 2006 Posted July 28, 2006 Is there any need to download Service Pack 1 and Service Pack 2?Does Service Pack 2 incluce all the updates from service pack 1?Thanks.
Slycer Posted July 29, 2006 Posted July 29, 2006 yesThat's a yes to what, the first question or the second?
rado354 Posted July 29, 2006 Posted July 29, 2006 (edited) SP2 includes all the updates from SP1. So if you have SP2 you don't need SP1.SP2 could be downloaded here Edited July 29, 2006 by rado354
Slycer Posted July 29, 2006 Posted July 29, 2006 I'm having massive problems with the updates. I want them all but have no idea how many "all" is.I made a list from several sources.- Software Patches- MSFN List- Windows UpdateAnd this is it:PRED SP2:http://support.microsoft.com/?kbid=835732 - Security Update for Microsoft Windowshttp://support.microsoft.com/?kbid=828741 - Cumulative Update for Microsoft RPC/DCOMhttp://support.microsoft.com/?kbid=890830 - Windows Malicious Software Removal Toolhttp://support.microsoft.com/?kbid=905474 - Windows Genuine Advantage Notificationshttp://support.microsoft.com/?kbid=810833 - Unchecked Buffer in the Locator Service Might Permit Code to Runhttp://support.microsoft.com/?kbid=834707 - Cumulative Security Update for Internet Explorerhttp://support.microsoft.com/?kbid=329834 - Unchecked Buffer in PPTP Implementation May Permit Denial-of-Service Attackshttp://support.microsoft.com/?kbid=329048 - Unchecked Buffer in File Decompression Functions May Allow Attacker to Run Codehttp://support.microsoft.com/?kbid=323255 - Unchecked Buffer in Windows Help Facility May Allow Attacker to Run Codehttp://support.microsoft.com/?kbid=815021 - Unchecked buffer in Windows component may cause Web Server compromisehttp://support.microsoft.com/?kbid=817606 - Buffer overrun in Windows could lead to data corruptionhttp://support.microsoft.com/?kbid=823559 - Buffer overrun in the HTML converter could allow code executionhttp://support.microsoft.com/?kbid=329390 - Unchecked Buffer in Windows Shell Might Permit System Compromisehttp://support.microsoft.com/?kbid=329115 - Certificate validation flaw might permit identity spoofinghttp://support.microsoft.com/?kbid=329170 - Flaw in SMB Signing May Permit Group Policy to Be Modifiedhttp://support.microsoft.com/?kbid=811630 - HTML Help Update to Limit Functionality When It Is Invoked with the window.showHelp( ) Methodhttp://support.microsoft.com/?kbid=810577 - Unchecked buffer in Windows redirector may permit privilege elevationhttp://support.microsoft.com/?kbid=814078 - Flaw in Windows Script Engine may allow code to runhttp://support.microsoft.com/?kbid=329441 - You cannot create a network connection after you restore Windows XPPO SP2:http://support.microsoft.com/?kbid=896423 - Vulnerability in Print Spooler service could allow remote code executionhttp://support.microsoft.com/?kbid=916595 - Stop error message on a Windows XP-based computer: "STOP 0x000000D1"http://support.microsoft.com/?kbid=914388 - A vulnerability in the DHCP Client Service could allow remote code executionhttp://support.microsoft.com/?kbid=912919 - Vulnerability in graphics rendering engine could allow remote code executionhttp://support.microsoft.com/?kbid=917159 - Vulnerability in Server service could allow remote code executionhttp://support.microsoft.com/?kbid=913433 - Vulnerabilities in Macromedia Flash Player from Adobe could allow remote code executionhttp://support.microsoft.com/?kbid=911280 - Vulnerability in Routing and Remote Access could allow remote code executionhttp://support.microsoft.com/?kbid=917734 - Vulnerability in Windows Media Player could allow remote code executionhttp://support.microsoft.com/?kbid=914389 - Vulnerability in Server Message Block could allow elevation of privilegehttp://support.microsoft.com/?kbid=917344 - Vulnerability in Microsoft JScript could allow remote code executionhttp://support.microsoft.com/?kbid=918439 - Vulnerability in ART image rendering could allow remote code executionhttp://support.microsoft.com/?kbid=916281 - Cumulative security update for Internet Explorerhttp://support.microsoft.com/?kbid=913580 - Vulnerability in Microsoft Distributed Transaction Coordinator could allow denial of servicehttp://support.microsoft.com/?kbid=917953 - Vulnerability in TCP/IP could allow remote code executionhttp://support.microsoft.com/?kbid=908531 - Vulnerability in Windows Explorer Could Lead to Remote Code Executionhttp://support.microsoft.com/?kbid=911567 - Cumulative Security Update for Outlook Expresshttp://support.microsoft.com/?kbid=911562 - Vulnerability in Microsoft Data Access Components (MDAC) function could allow code executionhttp://support.microsoft.com/?kbid=911927 - Vulnerability in WebClient could allow remote code executionhttp://support.microsoft.com/?kbid=911564 - Vulnerability in Windows Media Player http://support.microsoft.com/?kbid=908519 - Vulnerability in embedded Web fonts could allow remote code executionhttp://support.microsoft.com/?kbid=910437 - When Windows Automatic Updates tries to download updates on a Windows Server 2003-basedhttp://support.microsoft.com/?kbid=904706 - Vulnerability in DirectShow could allow remote code executionhttp://support.microsoft.com/?kbid=896424 - Vulnerabilities in graphics rendering engine could allow code executionhttp://support.microsoft.com/?kbid=905749 - Vulnerability in Plug and Play could allow remote code execution and local elevation of privilegehttp://support.microsoft.com/?kbid=900725 - Vulnerabilities in the Windows shell could allow for remote code executionhttp://support.microsoft.com/?kbid=902400 - Vulnerabilities in MS DTC and COM+ could allow remote code executionhttp://support.microsoft.com/?kbid=899589 - Vulnerability in the Client Service for NetWare could allow remote code executionhttp://support.microsoft.com/?kbid=901017 - Vulnerability in the Microsoft Collaboration Data Objects could allow code execution (Windows)http://support.microsoft.com/?kbid=905414 - Vulnerability in Network Connection Manager could allow denial of servicehttp://support.microsoft.com/?kbid=893756 - Vulnerability in Telephony service could allow remote code executionhttp://support.microsoft.com/?kbid=899591 - Vulnerability in Remote Desktop Protocol could allow denial of servicehttp://support.microsoft.com/?kbid=899587 - Vulnerabilities in Kerberos could allow denial of service, information disclosure, and spoofinghttp://support.microsoft.com/?kbid=894391 - You receive a "Generic Host Process"http://support.microsoft.com/?kbid=896358 - A vulnerability in HTML Help could allow remote code executionhttp://support.microsoft.com/?kbid=890859 - Vulnerabilities in Windows kernel could allow elevation of privilege and denial of servicehttp://support.microsoft.com/?kbid=901214 - Vulnerability in Microsoft Color Management Module could allow remote code executionhttp://support.microsoft.com/?kbid=896428 - Vulnerability in Telnet client could allow information disclosurehttp://support.microsoft.com/?kbid=890046 - Vulnerability in Microsoft agent could allow spoofinghttp://support.microsoft.com/?kbid=885835 - Vulnerabilities in Windows Kernel and LSASS could allow elevation of privilegehttp://support.microsoft.com/?kbid=888302 - Vulnerability in Windows could allow information disclosurehttp://support.microsoft.com/?kbid=887472 - Microsoft has released a security update to Microsoft Windows Messengerhttp://support.microsoft.com/?kbid=891781 - Vulnerability in the DHTML editing component ActiveX control could allow code executionhttp://support.microsoft.com/?kbid=888113 - Vulnerability in hyperlink object library could allow remote code execution in Windows Server 2003 http://support.microsoft.com/?kbid=873339 - Vulnerability in HyperTerminal could allow code executionhttp://support.microsoft.com/?kbid=886185 - Windows Firewall "My Network (subnet) only" scoping in Windows XP Service Pack 2http://support.microsoft.com/?kbid=885836 - A vulnerability in WordPad could allow code executionhttp://support.microsoft.com/?kbid=917283 - A vulnerability in ASP.NET could allow information disclosureDRUGO:http://www.microsoft.com/downloads/details.aspx?FamilyID=262d25e3-f589-4842-8157-034d1e7cf3a3&displaylang=en - Microsoft .NET Framework 1.1 http://www.microsoft.com/downloads/details.aspx?FamilyID=2da43d38-db71-4c1b-bc6a-9b6652cd92a3&displaylang=en - DirectXhttp://www.microsoft.com/downloads/details.aspx?FamilyID=0856eacb-4362-4b0d-8edd-aab15c5e04f5&displaylang=en - Microsoft .NET Framework 2.0STRAN:http://support.microsoft.com/?kbid=914388 - A vulnerability in the DHCP Client Service could allow remotehttp://support.microsoft.com/?kbid=917159 - Vulnerability in Server service could allow remote code http://support.microsoft.com/?kbid=917537 - Vulnerability in Internet Information Services that use Active Server Pages could allow remote codehttp://support.microsoft.com/?kbid=911280 - Vulnerability in Routing and Remote Access could allow remote code executionhttp://support.microsoft.com/?kbid=914389 - Vulnerability in Server Message Block could allow elevation of privilegehttp://support.microsoft.com/?kbid=917344 - Vulnerability in Microsoft JScript could allow remote code executionhttp://support.microsoft.com/?kbid=917953 - Vulnerability in TCP/IP could allow remote code executionhttp://support.microsoft.com/?kbid=918439 - Vulnerability in ART image rendering could allow remote code executionhttp://support.microsoft.com/?kbid=913580 - Vulnerability in Microsoft Distributed Transaction Coordinator could allow denial of servicehttp://support.microsoft.com/?kbid=908531 - Vulnerability in Windows Explorer Could Lead to Remote Code Executionhttp://support.microsoft.com/?kbid=911562 - Vulnerability in Microsoft Data Access Components (MDAC) function could allow code executionhttp://support.microsoft.com/?kbid=911927 - Vulnerability in WebClient could allow remote code executionhttp://support.microsoft.com/?kbid=913446 - Vulnerability in TCP/IP could allow denial of servicehttp://support.microsoft.com/?kbid=912919 - Vulnerability in graphics rendering engine could allow remote code executionhttp://support.microsoft.com/?kbid=908519 - Vulnerability in embedded Web fonts could allow remote code executionhttp://support.microsoft.com/?kbid=904706 - Vulnerability in DirectShow could allow remote code executionhttp://support.microsoft.com/?kbid=896424 - Vulnerabilities in graphics rendering engine could allow code executionhttp://support.microsoft.com/?kbid=901017 - Vulnerability in the Microsoft Collaboration Data Objects could allow code execution (Windows)http://support.microsoft.com/?kbid=900725 - Vulnerabilities in the Windows shell could allow for remote code executionhttp://support.microsoft.com/?kbid=899589 - Vulnerability in the Client Service for NetWare could allow remote code executionhttp://support.microsoft.com/?kbid=905414 - Vulnerability in Network Connection Manager could allow denial of servicehttp://support.microsoft.com/?kbid=902400 - Vulnerabilities in MS DTC and COM+ could allow remote code executionhttp://support.microsoft.com/?kbid=905749 - Vulnerability in Plug and Play could allow remote code execution and local elevation of privilegehttp://support.microsoft.com/?kbid=893756 - Vulnerability in Telephony service could allow remote code executionhttp://support.microsoft.com/?kbid=896423 - Vulnerability in Print Spooler service could allow remote code executionhttp://support.microsoft.com/?kbid=899587 - Vulnerabilities in Kerberos could allow denial of service, information disclosure, and spoofinghttp://support.microsoft.com/?kbid=899588 - Vulnerability in Plug and Play could allow remote code execution and elevation of privilegehttp://support.microsoft.com/?kbid=899591 - Vulnerability in Remote Desktop Protocol could allow denial of servicehttp://support.microsoft.com/?kbid=901214 - Vulnerability in Microsoft Color Management Module could allow remote code executionhttp://support.microsoft.com/?kbid=896358 - A vulnerability in HTML Help could allow remote code executionhttp://support.microsoft.com/?kbid=890046 - Vulnerability in Microsoft agent could allow spoofinghttp://support.microsoft.com/?kbid=893066 - Vulnerabilities in TCP/IP could allow remote code execution and denial of servicehttp://support.microsoft.com/?kbid=896422 - Vulnerability in Server Message Block could allow remote code executionhttp://support.microsoft.com/?kbid=896428 - Vulnerability in Telnet client could allow information disclosurehttp://support.microsoft.com/?kbid=890859 - Vulnerabilities in Windows kernel could allow elevation of privilege and denial of servicehttp://support.microsoft.com/?kbid=892944 - Vulnerability in MSMQ could allow code executionhttp://support.microsoft.com/?kbid=893086 - Vulnerability in Windows Shell that could allow remote code executionhttp://support.microsoft.com/?kbid=888113 - Vulnerability in hyperlink object library could allow remote code execution in Windows Server 2003http://support.microsoft.com/?kbid=885250 - Vulnerability in server message block could allow remote code executionhttp://support.microsoft.com/?kbid=873333 - Vulnerability in OLE and COM could allow remote code executionhttp://support.microsoft.com/?kbid=891781 - Vulnerability in the DHTML editing component ActiveX control could allow code executionhttp://support.microsoft.com/?kbid=890047 - Vulnerability in Windows shell could allow remote code executionhttp://support.microsoft.com/?kbid=888302 - Vulnerability in Windows could allow information disclosurehttp://support.microsoft.com/?kbid=890175 - Vulnerability in HTML Help could allow code executionhttp://support.microsoft.com/?kbid=886185 - Windows Firewall "My Network (subnet) only" scoping in Windows XP Service Pack 2http://support.microsoft.com/?kbid=885836 - A vulnerability in WordPad could allow code executionhttp://support.microsoft.com/?kbid=873339 - Vulnerability in HyperTerminal could allow code executionhttp://support.microsoft.com/?kbid=885835 - Vulnerabilities in Windows Kernel and LSASS could allow elevation of privilegehttp://support.microsoft.com/?kbid=885523 - You receive a "Stop: c0000135" and "winsrv was not found" error message after you installPlus the ones in this thread which I havent added yet. And this list is a lot bigger then the one on this site.Partly because I havent deleted the updated that appear twice. But still..So, my questions:-Is there a list somewhere that list every single update?-The only service pack I need is number 2? (Last time I ask this, I promise )
Recommended Posts