midocity Posted February 5, 2006 Posted February 5, 2006 Hello, every time i try to download the WMP10_Slipstreamer_v3.zip file, the DAP asking for a user name and password, can you help ?midocityLATEST VERSION: 3CREDIT:Bâshrat the Sneaky and Obliviator they've done the most work.CHECK OUT THEIR POSTS:BTS WMP10 SlipstreamerObliviator WMP10 Slipstreamdjbe: FEDIT program used to add entries to various i386 files.(provided to me by BTS)Also boooggy: Thanks for all the testing and info !!! Everyone else who helped out and opted to host for me.. Thanks![DOWNLOAD LINKSlipstreamer V3 Download (340KB). THANK YOU Ben.Hahlen for the download! Slipstreamer V3 Alternate Download Mirror. Thanks RyanVM Changes: Check out the changes.txt file included.. But the sysoc.inf bug should be fixed!
boooggy Posted February 5, 2006 Posted February 5, 2006 (edited) http://rapidshare.de/files/5544115/WMP10_S...mer_v3.zip.htmltry this one..............and for that site u cant use dap or other download managers if u dont have an accont with them.............that means u have to pay.... Edited February 5, 2006 by boooggy
beeker Posted February 6, 2006 Posted February 6, 2006 (edited) Isn't this post outdated now? EDIT: oops, should have read fully, this post has extra features added to WMP10 that RyanVM's may not have. You can also try RyanVM's WMP10 slipstream using RyanVM's Integrator. Edited February 6, 2006 by beeker
RyanVM Posted February 6, 2006 Posted February 6, 2006 I'm pretty sure my addon includes everything listed on the front page. Gnome's original WMP10 pack didn't.
boooggy Posted February 6, 2006 Posted February 6, 2006 the wmp addon has more features then the wmp slipstreamed by this.....
boooggy Posted February 13, 2006 Posted February 13, 2006 (edited) http://rapidshare.de/files/5544115/WMP10_S...mer_v3.zip.htmlsorry to say this but do u read????and this project is out of date...... Edited February 13, 2006 by boooggy
ulysse34 Posted February 25, 2006 Posted February 25, 2006 Hi,is there a way to slipstream WMP 10 +the following updates?windowsmedia10-kb888656-x86-global-enuwindowsmedia10-kb893240-x86-enuwindowsmedia10-kb893241-x86-enuwindowsmedia10-kb895316-x86-fraWindowsMedia10-KB911565-x86-FRAWindowsMedia-KB911564-x86-FRAThanks
Pis19 Posted April 12, 2006 Posted April 12, 2006 Hi,is there a way to slipstream WMP 10 +the following updates?windowsmedia10-kb888656-x86-global-enuwindowsmedia10-kb893240-x86-enuwindowsmedia10-kb893241-x86-enuwindowsmedia10-kb895316-x86-fraWindowsMedia10-KB911565-x86-FRAWindowsMedia-KB911564-x86-FRAThanksI'm interested too to this. It is possible, for example, to use nLite, before creating the ISO slipstreaming WMP10 with WMP10 Slipstreamer v3, than not create the ISO but restart nLite, slipstreaming ONLY the WindowsMedia hotfixes and than create finally the ISO?Thanks! B)
T D Posted April 19, 2006 Posted April 19, 2006 I think you can use the windowsmedia10update_name.exe /Integrate:%windowssourcelocation%\switch, but i'm not sure.If this works then it should work with nLite as well.
Gee Posted April 19, 2006 Posted April 19, 2006 Hi,is there a way to slipstream WMP 10 +the following updates?windowsmedia10-kb888656-x86-global-enuwindowsmedia10-kb893240-x86-enuwindowsmedia10-kb893241-x86-enuwindowsmedia10-kb895316-x86-fraWindowsMedia10-KB911565-x86-FRAWindowsMedia-KB911564-x86-FRAThanksI install all of the above thru SVCPACK.inf with the execption of KB911565, which I install in RunOnceExHere is my svcpack.inf;Windows XP[Version] Signature="$Windows NT$"MajorVersion=5MinorVersion=1BuildNumber=2600[SetupData]CatalogSubDir="\i386\SVCPACK"[ProductCatalogsToInstall][SetupHotfixesToRun]MP10.exe /Q:A /R:x /%systemdrive%"setup_wm.exe /DisallowSystemRestore /Q:A /R:N"KB873339.exe /q /n /z;Vulnerability in HyperTerminal could allow code executionKB884020.exe /q /n /z;Programs that connect to IP addresses that are in the loopback address range may not work as you expect in Windows XP Service Pack 2KB885222.exe /q /n /z;Performance of 1394 devices may decrease after you install Windows XP Service Pack 2KB885250.exe /q /n /z;Vulnerability in server message block could allow remote code executionKB885835.exe /q /n /z;Vulnerabilities in Windows Kernel and LSASS could allow elevation of privilegeKB885836.exe /q /n /z;A vulnerability in WordPad could allow code executionKB886185.exe /q /n /z;Windows Firewall "My Network (subnet) only" scoping in Windows XP Service Pack 2KB886677.exe /q /n /z;Double-byte character set (DBCS) characters may appear corrupted in Internet Explorer on Windows XP when you browse a Web site that uses Shift-JIS character encodingKB887742.exe /q /n /z;You receive the Stop error "Stop 0x05 (INVALID_PROCESS_ATTACH_ATTEMPT)"KB888113.exe /q /n /z;Vulnerability in hyperlink object library could allow remote code executionKB888240.exe /q /n /z;Some add-ons are not listed in the Manage Add-ons dialog box in Internet Explorer on your Windows XP Service Pack 2-based computerKB889527.exe /q /n /z;ICMP packets are dropped even though you have configured the Windows firewall feature to allow ICMP packets on your Windows XP Professional ServiceKB888302.exe /q /n /z;Vulnerability in Windows could allow information disclosureKB890046.exe /q /n /z;Vulnerability in Microsoft agent could allow spoofingKB890830.exe /q ;Microsoft® Windows® Malicious Software Removal ToolKB890859.exe /q /n /z;Vulnerabilities in Windows kernel could allow elevation of privilege and denial of serviceKB891122.exe /q /n /z;Update for Windows Media Digital Rights Management-enabled playersKB891781.exe /q /n /z;Vulnerability in the DHTML editing component ActiveX control could allow code executionKB892130.exe /q /n /z;WGAKB893357.exe /q /n /z;The Wi-Fi Protected Access 2 (WPA2)/Wireless Provisioning Services Information Element (WPS IE) update for Windows XP with Service Pack 2KB893756.exe /q /n /z;Vulnerability in Telephony service could allow remote code executionKB893803.exe /q /n /z;Windows Installer 3.1 (v2) is availableKB894391.exe /q /n /z;FIX: DBCS attachment file names are not displayed in Rich Text e-mail messages and you may receive a "Generic Host Process" error message after you install security update MS05-012KB896358.exe /q /n /z;A vulnerability in HTML Help could allow remote code executionKB896422.exe /q /n /z;Vulnerability in Server Message Block could allow remote code executionKB896423.exe /q /n /z;Vulnerability in Print Spooler service could allow remote code executionKB896424.exe /q /n /z;Vulnerabilities in Graphics Rendering Engine Could Allow Code ExecutionKB896428.exe /q /n /z;Vulnerability in Telnet client could allow information disclosureKB897663.exe /q /n /z;An exception may not show up in the Windows Firewall graphical user interface if you create the exception by modifying the registryKB898461.exe /q /n /z;Installs a permanent copy of the Package Installer for Windows version 6.1.22.4KB899587.exe /q /n /z;Vulnerabilities in Kerberos could allow denial of service, information disclosure, and spoofingKB899589.exe /q /n /z;Vulnerability in the Client Service for NetWare Could Allow Remote Code ExecutionKB899591.exe /q /n /z;Vulnerability in Remote Desktop Protocol could allow denial of serviceKB900725.exe /q /n /z;Vulnerabilities in Windows Shell Could Allow Remote Code ExecutionKB901017.exe /q /n /z;Vulnerability in the Microsoft Collaboration Data Objects could allow code execution (Windows)KB901214.exe /q /n /z;Vulnerability in Microsoft Colour Management Module could allow remote code executionKB902400.exe /q /n /z;Vulnerabilities in MS DTC and COM+ Could Allow Remote Code ExecutionKB904706.exe /q /n /z;Vulnerability in DirectShow Could Allow Remote Code ExecutionKB905414.exe /q /n /z;Vulnerability in Network Connection Manager Could Allow Denial of ServiceKB905749.exe /q /n /z;Vulnerability in Plug and Play Could Allow Remote Code Execution and Local Elevation of PrivilegeKB908519.exe /q /n /z;Vulnerability in Embedded Web Fonts Could Allow Remote Code ExecutionKB908531.exe /q /n /z;Vulnerability in Windows Explorer Could Lead to Remote Code ExecutionKB909520.exe /q /n /z;Microsoft Base Smart Card Cryptographic Service Provider PackageKB909993.exe /q /n /z;Windows Media Connect 2.0KB910437.exe /q /n /z;Automatic Updates can no longer download updates after an Access Violation error occursKB911562.exe /q /n /z;Vulnerability in Microsoft Data Access Components (MDAC) function could allow code executionKB911564.exe /q /n /z;Vulnerability in Windows Media Player plug-in with non-Microsoft Internet browsers could allow remote code execution.KB911927.exe /q /n /z;Vulnerability in Web Client Service could allow remote code execution.KB912812.exe /q /n /z;Cumulative security update for Internet ExplorerKB912919.exe /q /n /z;Vulnerability in Graphics Rendering Engine Could Allow Remote Code ExecutionKB913446.exe /q /n /z;Vulnerability in TCP/IP could allow Denial of Service.MSJava.exenetfxsp1.exeWUA20.exe
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now