Jump to content

How to do raid drivers and hotfixes correctly.


webmedic

Recommended Posts


well it's showing up now. Wow that is quite a page of things I have never seen one that big most of them are only little ones showing about 4 or 5 switches.

What is that hotfix for?

Beats me dude, ive just spent the last 30 mins trying to figure out why the image wouldnt show :)

Now ill go find out what h/f caused that.... :rolleyes:

Link to comment
Share on other sites

I would be able to tell you if VirtualPC was any quicker.

The extra install time is making me think its not worth doing the slipstream options and just using an inf file from the desktop at startup.

It been sat on 13 mins now for ages.............

Link to comment
Share on other sites

Dime to a Dollar it's 817778 ...

Spot on - That screen dissapeared when i removed this hotfix.

@webmedic In your answers to my questions earlier you said that the problem with the mdac h/f was solved but in the last post of your do.cmd the problem is still there.

Do you have an updated version or am i jumping the gun.

Link to comment
Share on other sites

this is the link for that thing kb817778

http://support.microsoft.com/?kbid=817778

it is not strictly a hotfix it does way more than that as it upgrades major parts of your tcpip stack and just by looking at waht it does. If you guys dont know ipv6 and nat address translation menas that whenever you do anything on the interenet you can be tracked by the mac address of your hardware.

As for mac address's every netwrok card or modem or any piece that lets you communicate with the interent has a unique address. This is called a mac address. With that patch they can track everything you do back exactly to you.

I don't do a bunch of file sharing but if you do avoid that hotfix like the plague. It will allow you ot be tracked by the hardware in your computer.

Now as for the mdac hotfix working or not. Yes it does worl with my latest script but it is a little more work to get installed.

Now first thing is you will need to make a few directories.

$OEM$\$1\install\tmp

$OEM$\$1\install\system

$OEM$\$1\install\system\hotfixes3

now put the mdac hotfix into hotfixes3 you will need to use the shortend one that do.cmd makes for you which can be found in directory 3. Do will automaticly shorten it for you if it not already.

and last but not least here is the last do.cmd

CLS
@echo off
:: setlocal enableextensions
echo. > log.txt

:: check if hotfix file exists
if not exist 1\*.exe echo No hotfixes present. 2>&1 | bin\mtee/+ log.txt
if not exist 1\*.exe echo Please add your hotfixes. 2>&1 | bin\mtee/+ log.txt
if not exist 1\*.exe goto _end

:: create folders Needed for setup
echo. 2>&1 | bin\mtee/+ log.txt
echo Creating directories and set up. 2>&1 | bin\mtee/+ log.txt
echo __________________________________________________________________________ 2>&1 | bin\mtee/+ log.txt
echo. 2>&1 | bin\mtee/+ log.txt
SET PrepDir=
if "%1" == "/prep" set PrepDir=%2
IF DEFINED PrepDir goto :Make_Dir
echo using for to find dir
FOR /F "delims=" %%i IN ('cd') DO SET PrepDir=%%i

:Make_Dir
echo PrepDir = %PrepDir% 2>&1 | bin\mtee/+ log.txt
if not exist 4 md 4 2>&1 | bin\mtee/+ log.txt
if not exist 5 md 5 2>&1 | bin\mtee/+ log.txt
if not exist 5\svcpack md 5\SVCPACK 2>&1 | bin\mtee/+ log.txt
if not exist tmp md tmp 2>&1 | bin\mtee/+ log.txt

:: delete any files in extract and final folder
echo. 2>&1 | bin\mtee/+ log.txt
echo Deleteing stale files. 2>&1 | bin\mtee/+ log.txt
echo __________________________________________________________________________ 2>&1 | bin\mtee/+ log.txt
echo. 2>&1 | bin\mtee/+ log.txt
if exist 4\* del /s /q 4\* 2>&1 | bin\mtee/+ log.txt
if exist 5\* del /s /q 5\* 2>&1 | bin\mtee/+ log.txt

:: extract hotfix to extract folder
echo. 2>&1 | bin\mtee/+ log.txt
echo Adding hotfixes from hotfix1 folder 2>&1 | bin\mtee/+ log.txt
echo __________________________________________________________________________ 2>&1 | bin\mtee/+ log.txt
echo. 2>&1 | bin\mtee/+ log.txt

for /f "usebackq delims==" %%i in (`dir /b 1\*.exe`) do COPY /Y "1\%%~ni.EXE" "tmp\????????.EXE" >> log.txt
for /f "usebackq delims==" %%i in (`dir /b 1\*.exe`) do del /f /q 1\%%~ni.EXE >> log.txt
for /f "usebackq delims==" %%i in (`dir /b tmp\*.exe`) do Move /Y tmp\%%~ni.exe 1 >> log.txt
for /f "usebackq delims==" %%i in (`dir /b 1\*.exe`) do 1\%%~ni.exe /q /x:4 >> log.txt

:: extract hotfix to extract folder thisis for newer style hot fixes
echo. 2>&1 | bin\mtee/+ log.txt
echo Adding hotfixes from hotfix2 folder 2>&1 | bin\mtee/+ log.txt
echo __________________________________________________________________________ 2>&1 | bin\mtee/+ log.txt
echo. 2>&1 | bin\mtee/+ log.txt

for /f "usebackq delims==" %%i in (`dir /b 2\*.exe`) do COPY /Y "2\%%~ni.EXE" "tmp\????????.EXE" >> log.txt
for /f "usebackq delims==" %%i in (`dir /b 2\*.exe`) do del /f /q 2\%%~ni.EXE >> log.txt
for /f "usebackq delims==" %%i in (`dir /b tmp\*.exe`) do MD tmp\%%~ni >> log.txt
for /f "usebackq delims==" %%i in (`dir /b tmp\*.exe`) do tmp\%%~ni.exe /Q /T:%PrepDir%\tmp\%%~ni /C >> log.txt
for /f "usebackq delims==" %%i in (`dir /b tmp\*.exe`) do xcopy /d /h /y tmp\%%~ni\*.* 4 >> log.txt
for /f "usebackq delims==" %%i in (`dir /b tmp\*.exe`) do bin\rm.exe /fvn tmp\%%~ni >> log.txt
for /f "usebackq delims==" %%i in (`dir /b tmp\*.exe`) do Move /Y tmp\%%~ni.exe 2 >> log.txt

attrib -R -A -S -H tmp\* /S
:: extract hotfix to extract folder thisis for newer style hot fixes
echo. 2>&1 | bin\mtee/+ log.txt
echo Adding hotfixes from hotfix3 folder 2>&1 | bin\mtee/+ log.txt
echo __________________________________________________________________________ 2>&1 | bin\mtee/+ log.txt
echo. 2>&1 | bin\mtee/+ log.txt

for /f "usebackq delims==" %%i in (`dir /b 3\*.exe`) do COPY /Y "3\%%~ni.EXE" "tmp\????????.EXE" >> log.txt
for /f "usebackq delims==" %%i in (`dir /b 3\*.exe`) do del /f /q 3\%%~ni.EXE >> log.txt
for /f "usebackq delims==" %%i in (`dir /b 3\*.cmd`) do del /f /q 3\%%~ni.cmd >> log.txt
for /f "usebackq delims==" %%i in (`dir /b tmp\*.exe`) do MD tmp\%%~ni >> log.txt
for /f "usebackq delims==" %%i in (`dir /b tmp\*.exe`) do tmp\%%~ni.exe /Q /T:%PrepDir%\tmp\%%~ni /C >> log.txt
for /f "usebackq delims==" %%i in (`dir /b tmp\*.exe`) do xcopy /d /h /y tmp\%%~ni\*.* 4 >> log.txt
for /f "usebackq delims==" %%i in (`dir /b tmp\*.exe`) do del /f /q tmp\%%~ni\*.* >> log.txt
for /f "usebackq delims==" %%i in (`dir /b tmp\*.exe`) do bin\rm.exe /fvn tmp\%%~ni >> log.txt
for /f "usebackq delims==" %%i in (`dir /b tmp\*.exe`) do Move /Y tmp\%%~ni.exe 3 >> log.txt

echo. 2>&1 | bin\mtee/+ log.txt
echo Adding cmd files to hotfix3 folder 2>&1 | bin\mtee/+ log.txt
echo __________________________________________________________________________ 2>&1 | bin\mtee/+ log.txt
echo. 2>&1 | bin\mtee/+ log.txt

for /f "usebackq delims==" %%i in (`dir /b 3\*.exe`) do echo CLS 2>&1 | bin\mtee /+ log.txt 3\%%~ni.cmd
for /f "usebackq delims==" %%i in (`dir /b 3\*.exe`) do echo @echo off 2>&1 | bin\mtee /+ log.txt /+ 3\%%~ni.cmd
for /f "usebackq delims==" %%i in (`dir /b 3\*.exe`) do echo start /wait %systemdrive%\install\system\hotfixes3\%%~ni.exe /T:%systemdrive%\install\tmp /C:"%systemdrive%\install\tmp\dahotfix.exe /q /n" /Q 2>&1 | bin\mtee /+ log.txt /+ 3\%%~ni.cmd
for /f "usebackq delims==" %%i in (`dir /b 3\*.exe`) do echo EXIT 2>&1 | bin\mtee /+ log.txt /+ 3\%%~ni.cmd

:: check extraction took place
echo. 2>&1 | bin\mtee/+ log.txt
echo Checking for extracted files 2>&1 | bin\mtee/+ log.txt
echo __________________________________________________________________________ 2>&1 | bin\mtee/+ log.txt
echo. 2>&1 | bin\mtee/+ log.txt
if not exist 4\* goto _end

:: move hotfix to svcpack folder
echo. 2>&1 | bin\mtee/+ log.txt
echo Moving hotfixes to svcpack folder. 2>&1 | bin\mtee/+ log.txt
echo __________________________________________________________________________ 2>&1 | bin\mtee/+ log.txt
echo. 2>&1 | bin\mtee/+ log.txt
copy /y 1\*.exe 5\svcpack >> log.txt
copy /y 2\*.exe 5\svcpack >> log.txt
copy /y 3\*.cmd 5\svcpack >> log.txt
copy /y 3\*.exe 5\svcpack >> log.txt

:: delete unwanted files from extract folder
echo. 2>&1 | bin\mtee/+ log.txt
echo delete unwanted files from extract folder. 2>&1 | bin\mtee/+ log.txt
echo __________________________________________________________________________ 2>&1 | bin\mtee/+ log.txt
echo. 2>&1 | bin\mtee/+ log.txt
for /f %%i in (files\hotkill.ini) do del /f /q /s 4\%%i 2>&1 | bin\mtee/+ log.txt
for /f %%i in (files\hotkill.ini) do del /f /q /s 4\sp2\%%i 2>&1 | bin\mtee/+ log.txt

:: move cat files to svcpack folder
echo. 2>&1 | bin\mtee/+ log.txt
echo move cat files to svcpack folder. 2>&1 | bin\mtee/+ log.txt
echo __________________________________________________________________________ 2>&1 | bin\mtee/+ log.txt
echo. 2>&1 | bin\mtee/+ log.txt
for %%i in (4\*.cat 4\update\*.cat 4\sp2\update\*.cat) do move /y %%i 5\svcpack 2>&1 | bin\mtee/+ log.txt

::NEW BIT::
echo. 2>&1 | bin\mtee/+ log.txt
echo Updating sp1.cab. 2>&1 | bin\mtee/+ log.txt
echo __________________________________________________________________________ 2>&1 | bin\mtee/+ log.txt
echo. 2>&1 | bin\mtee/+ log.txt
xcopy /d /h /u /y 4\*.* files\sp1 >> log.txt
xcopy /d /h /u /y 4\sp2\*.* files\sp1 >> log.txt
bin\cabarc.exe N 5\sp1.cab files\sp1\*.* >> log.txt
::END::

:COMPRESS
:: compress files and copy to output folder
echo. 2>&1 | bin\mtee/+ log.txt
echo compress files and copy to output folder. 2>&1 | bin\mtee/+ log.txt
echo __________________________________________________________________________ 2>&1 | bin\mtee/+ log.txt
echo. 2>&1 | bin\mtee/+ log.txt
if exist files\winntbbu.dll xcopy /y files\winntbbu.dll 4 >> log.txt
bin\compress.exe -d -r -zx21 4\* 5 >> log.txt
bin\compress.exe -d -r -zx21 4\sp2\* 5 >> log.txt

:: create svcpack.inf file
echo. 2>&1 | bin\mtee/+ log.txt
echo create svcpack.inf file. 2>&1 | bin\mtee/+ log.txt
echo __________________________________________________________________________ 2>&1 | bin\mtee/+ log.txt
echo. 2>&1 | bin\mtee/+ log.txt
echo [Version] 2>&1 | bin\mtee /+ log.txt 5\svcpack.inf
echo Signature="$Windows NT$" 2>&1 | bin\mtee /+ log.txt /+ 5\svcpack.inf
echo MajorVersion=5 2>&1 | bin\mtee /+ log.txt /+ 5\svcpack.inf
echo MinorVersion=1 2>&1 | bin\mtee /+ log.txt /+ 5\svcpack.inf
echo BuildNumber=2600 2>&1 | bin\mtee /+ log.txt /+ 5\svcpack.inf
echo. 2>&1 | bin\mtee /+ log.txt /+ 5\svcpack.inf
echo [SetupData] 2>&1 | bin\mtee /+ log.txt /+ 5\svcpack.inf
echo CatalogSubDir="\i386\svcpack" 2>&1 | bin\mtee /+ log.txt /+ 5\svcpack.inf
echo. 2>&1 | bin\mtee /+ log.txt /+ 5\svcpack.inf
echo [SetupHotfixesToRun] 2>&1 | bin\mtee /+ log.txt /+ 5\svcpack.inf

for /f "usebackq delims==" %%i in (`dir /b 1\*.exe`) do echo %%~ni.exe /n /q /u /z 2>&1 | bin\mtee /+ log.txt /+ 5\svcpack.inf
for /f "usebackq delims==" %%i in (`dir /b 2\*.exe`) do echo %%~ni.exe /Q:A /R:N 2>&1 | bin\mtee /+ log.txt /+ 5\svcpack.inf
::for /f "usebackq delims==" %%i in (`dir /b 3\*.exe`) do echo %%~ni.exe /T:C:\\install\tmp /C:"c:\\install\tmp\dahotfix.exe /q /n" /Q >> 5\svcpack.inf
for /f "usebackq delims==" %%i in (`dir /b 3\*.cmd`) do echo %%~ni.cmd 2>&1 | bin\mtee /+ log.txt /+ 5\svcpack.inf
echo. 2>&1 | bin\mtee /+ log.txt /+ 5\svcpack.inf
echo [ProductCatalogsToInstall] 2>&1 | bin\mtee /+ log.txt /+ 5\svcpack.inf
for /f "usebackq delims==" %%i in (`dir /b 5\svcpack\*.cat`) do echo %%~ni.cat 2>&1 | bin\mtee /+ log.txt /+ 5\svcpack.inf

:: compress svcpack.inf
echo. 2>&1 | bin\mtee/+ log.txt
echo compress svcpack.inf file. 2>&1 | bin\mtee/+ log.txt
echo __________________________________________________________________________ 2>&1 | bin\mtee/+ log.txt
echo. 2>&1 | bin\mtee/+ log.txt
bin\compress.exe -d -r -zx21 5\svcpack.inf >> log.txt
:: comment out the next line if you want to examing svcpack.inf afterwards.
:: del /q 5\svcpack.inf

:: copy winnt.sif to output folder
echo. 2>&1 | bin\mtee/+ log.txt
echo copy extra files. 2>&1 | bin\mtee/+ log.txt
echo __________________________________________________________________________ 2>&1 | bin\mtee/+ log.txt
echo. 2>&1 | bin\mtee/+ log.txt
if exist files\winnt.sif xcopy /y files\winnt.sif 5 >> log.txt

:: copy dosnet.inf to output folder
if exist files\dosnet.inf xcopy /y files\dosnet.inf 5 >> log.txt

:: copy TXTSETUP.SIF to output folder
if exist files\TXTSETUP.SIF xcopy /y files\TXTSETUP.SIF 5 >> log.txt
if exist files\sys\*.sys xcopy /y files\sys\*.sys 5 >> log.txt

:: clean up
:: if exist 1\* del /s /q 1\*
:: if exist 2\* del /s /q 2\*
:: if exist 3\* del /s /q 3\*
:: attrib -R -A -S -H tmp\* /S
:: rd /s /q tmp

goto _end

:_end

I use a couple external programs for this mtee and rm if you need these let me know. I'll make a new download soon wiht all the little bits I use to get this going.

Link to comment
Share on other sites

I want to add here that this script is not for windows update things persay it is only for security related hotfixes. I guess it could apply to critical updates also. The things that are listed under windows update as just windows xp updates are not intended to be instaled this way. This is only so you have a secure system after install not to slipstream every windows update into place.

Now having said that. I have talked to another memeber here that works at micrsoft about slipstreaming other bits and pieces that are normally just windows updates like .net 1.1 and dx9 into the installer and not even those can be done cleanly so you would be best off not trying to do those with the scripts I have posted here.

Link to comment
Share on other sites

Dime to a Dollar it's 817778 ...

Just looked at this and it is not a critical update. It is a recommended update. I need to stress this again this script is setup to install critical updates only. If it does happen to work wiht recommended updates then it is only that you are fortunate. Recommended updates are not always intended by micrsoft even to be slipstreamed.

Link to comment
Share on other sites

here is a current list of critical updates for xp sp1

328310: Security Update - (Posted Date: June 10, 2003)

Download size: 3.9 MB

A security vulnerability has been identified that could allow an attacker to compromise a Windows-based computer and gain complete control over it. The attacker would need the ability to log onto the computer to carry out an attack. You can help protect your computer from this specific vulnerability by installing this update from Microsoft. After you install this item, you may have to restart your computer. Read More...

329170: Security Update

329170: Security Update - (Posted Date: June 10, 2003)

Download size: 483 KB

A security vulnerability has been identified that could allow an attacker to disrupt a facility by which security settings are applied to Windows-based computers in a corporate network. This could allow the attacker to loosen settings on his or her own computer or impose tighter ones on someone else's. Network administrators can help eliminate this issue by installing this update. After you install this item, you may have to restart your computer. Read More...

330994: April 2003, Security Update for Outlook Express 6 SP1

330994: April 2003, Security Update for Outlook Express 6 SP1 - (Posted Date: April 22, 2003)

Download size: 1.9 MB

A security issue in Microsoft® Outlook Express® has been identified that could allow an attacker to read files on your computer, or cause a program to run. You can help protect your computer by installing this update. After you install this item, you may have to restart your computer. Read More...

331953: Security Update (Windows XP)

331953: Security Update (Windows XP) - (Posted Date: June 03, 2003)

Download size: 735 KB

A security issue has been identified that could allow an attacker to cause a computer running Microsoft® Windows® to fail. An attacker would need the ability to connect to a process on the computer. You can help protect your computer by installing this update from Microsoft. After you install this item, you may have to restart your computer. Read More...

810565: Critical Update

810565: Critical Update - (Posted Date: March 18, 2003)

Download size: 5.3 MB

This update contains several fixes to Windows components to better support default Web browsers other than Internet Explorer, as described in Microsoft Knowledge Base (KB) Article 810565. Download now to improve the interaction of certain Windows components with default web browsers other than Internet Explorer. After you install this item, you may have to restart your computer. Once you have installed this item, it cannot be removed. Read More...

810577: Security Update

810577: Security Update - (Posted Date: June 03, 2003)

Download size: 556 KB

A security issue has been identified that could allow an attacker to compromise a computer running Microsoft® Windows® XP and gain control over it. To attempt an attack, the attacker would have to be able to log on to the computer. You can help protect your computer by installing this update from Microsoft. After you install this item, you may have to restart your computer. Read More...

810833: Security Update (Windows XP)

810833: Security Update (Windows XP) - (Posted Date: February 19, 2003)

Download size: 379 KB

A security issue has been identified that could allow an attacker to compromise a computer running Microsoft® Windows® and gain control over it. This issue is most likely to affect computers used as servers. You can help protect your computer by installing this update from Microsoft. After you install this item, you may have to restart your computer. Read More...

811493: Security Update (Windows XP)

811493: Security Update (Windows XP) - (Posted Date: June 24, 2003)

Download size: 3.2 MB

A security issue has been identified that could allow an attacker to compromise a computer running Microsoft® Windows® XP and gain complete control over it. An attacker would need the ability to log onto the computer locally to carry out an attack. You can help protect your computer by installing this update from Microsoft. After you install this update, you may have to restart your computer. Read More...

811630: Critical Update (Windows XP)

811630: Critical Update (Windows XP) - (Posted Date: June 10, 2003)

Download size: 1.3 MB

This update enables applications to access HTML Help in a new, restricted mode. Future updates of Internet Explorer require this new capability. Download now to ensure that Internet Explorer can properly display HTML Help in HTML pages. Read More...

813951: Update for Internet Explorer 6 SP1

813951: Update for Internet Explorer 6 SP1 - (Posted Date: March 25, 2003)

Download size: 345 KB

This update fixes an issue caused by Internet Explorer security patch 810847 that can cause authentication issues in Internet Explorer. Download now to avoid continuous authentication requests. After installing this item, you may have to restart your computer. Once you install this update, it cannot be removed. Read More...

814033: Critical Update

814033: Critical Update - (Posted Date: March 18, 2003)

Download size: 416 KB

This update addresses the "Offered driver may not install using Windows Update" issue in Windows XP, and is discussed in Microsoft Knowledge Base (KB) Article 814033. Download now so you can download drivers that Windows Update offers. After installing this update, you may have to restart your computer. Read More...

814078: Security Update (Microsoft Jscript version 5.6, Windows 2000, Windows XP)

814078: Security Update (Microsoft Jscript version 5.6, Windows 2000, Windows XP) - (Posted Date: March 25, 2003)

Download size: 361 KB

A security issue has been identified that could allow an attacker to run programs on a computer running Microsoft® Windows®. The attacker would first have to send you an e-mail message or entice you into visiting a malicious Web site. You can help protect your computer by installing this update from Microsoft. After you install this item, you may have to restart your computer. Once you have installed this item, it cannot be removed. Read More...

816093: Security Update Microsoft Virtual Machine (Microsoft VM)

816093: Security Update Microsoft Virtual Machine (Microsoft VM) - (Posted Date: June 03, 2003)

Download size: 5.1 MB

This update helps resolve a vulnerability in the Microsoft virtual machine. After you install this item, you may have to restart your computer. Once you have installed this item, it cannot be removed. Read More...

817606: Security Update (Windows XP)

817606: Security Update (Windows XP) - (Posted Date: July 08, 2003)

Download size: 416 KB

An identified security issue in Microsoft Windows could allow an attacker to compromise a Microsoft Windows-based system and then take a variety of actions. For example, an attacker could execute code on the system. By installing this update, you can help protect your computer. After you install this item, you may have to restart your computer. Read More...

817787: Security Update Windows Media Player for XP

817787: Security Update Windows Media Player for XP - (Posted Date: June 05, 2003)

Download size: 359 KB

An identified security issue in Microsoft Windows Media Player 7.1 and Windows Media Player for XP could enable an attacker to read files or run programs on a remote computer. You can help protect your computer by installing this update from Microsoft. After you install this item, you may have to restart your computer. Once you have installed this item, it cannot be removed. Read More...

821557: Security Update (Windows XP)

821557: Security Update (Windows XP) - (Posted Date: July 23, 2003)

Download size: 5.1 MB

An identified security issue in Microsoft Windows could allow an attacker to compromise a Microsoft Windows-based system and then take a variety of actions. For example, an attacker could execute code on the system. By installing this update, you can help protect your computer. After you install this item, you may have to restart your computer. Read More...

823559: Security Update for Microsoft Windows

823559: Security Update for Microsoft Windows - (Posted Date: August 26, 2003)

Download size: 375 KB

An identified security issue in Microsoft Windows could allow an attacker to compromise a Microsoft Windows-based system and then take a variety of actions. For example, an attacker could execute code on the system. By installing this update, you can help protect your computer. After you install this item, you may have to restart your computer. Read More...

August 2003, Cumulative Patch for Internet Explorer 6 Service Pack 1 (822925)

August 2003, Cumulative Patch for Internet Explorer 6 Service Pack 1 (822925) - (Posted Date: August 19, 2003)

Download size: 2.1 MB

Security issues identified in Microsoft Internet Explorer (IE) could allow an attacker to compromise systems with IE installed (even if IE is not used as the Web browser). For example, an attacker could run programs on a computer used to view the attacker's Web site. Download this update from Microsoft to help protect your computer. After installation, you may have to restart your computer. Read More...

Flaw In Windows Media Player May Allow Media Library Access (819639)

Flaw In Windows Media Player May Allow Media Library Access (819639) - (Posted Date: June 25, 2003)

Download size: 1.9 MB

An identified security issue in Windows Media Player 9 could allow an attacker to see certain information on your computer after you viewed a Web page. For instance, this issue could allow an attacker to view information about your media library and modify it. By installing this update, you can help protect your computer. After you install this item, you may have to restart your computer. Once you have installed this item, it cannot be removed. Read More...

Microsoft .NET Framework Service Pack 2, English Version

Microsoft .NET Framework Service Pack 2, English Version - (Posted Date: August 20, 2003)

Download size: 6.4 MB

Microsoft .NET Framework Service Pack 2 resolves various issues found after the initial release of Microsoft .NET Framework. These include both security- and non-security-related issues. Read More...

MS03-026: Security Update for Windows XP (823980)

MS03-026: Security Update for Windows XP (823980) - (Posted Date: August 26, 2003)

Download size: 1.2 MB

A security issue has been identified that could allow an attacker to remotely compromise a computer running Microsoft® Windows® and gain complete control over it. This security issue is the vulnerability that is exploited by the blaster worm. You can help protect your computer by installing this update from Microsoft. After you install this item, you may have to restart your computer. Read More...

Q323255: Security Update (Windows XP)

Q323255: Security Update (Windows XP) - (Posted Date: June 10, 2003)

Download size: 697 KB

This update resolves the "Unchecked buffer in HTML Help can lead to Code Execution" security vulnerability in Windows XP. Download now to help prevent a malicious user from running an unauthorized program on your computer. Read More...

Q329048: Security Update

Q329048: Security Update - (Posted Date: February 18, 2003)

Download size: 372 KB

This update resolves the "Unchecked Buffer in File Decompression Functions" security vulnerability in Windows XP. Download now to help prevent a specially malformed file from causing unauthorized code to run on your computer. Read More...

Q329115: Security Update (Windows XP)

Q329115: Security Update (Windows XP) - (Posted Date: May 06, 2003)

Download size: 484 KB

This update resolves the "Certificate Validation Flaw Could Enable Identity Spoofing" vulnerability in Windows XP. Download now to help prevent an attacker from attempting identity spoofing using certificates. After you install this item, you may have to restart your computer. Read More...

Q329390: Security Update

Q329390: Security Update - (Posted Date: February 18, 2003)

Download size: 282 KB

An identified security vulnerability in Windows XP could enable an attacker to compromise a user's Microsoft® Windows®-based computer and gain complete control over it, if the user visited the attacker's web site or took other, less likely, actions. You can help protect your computer from this and other identified security concerns by installing this update. After you install this item, you may have to restart your computer. Read More...

Q329441: Critical Update

Q329441: Critical Update - (Posted Date: August 26, 2003)

Download size: 347 KB

This update addresses the "You Cannot Create a Network Connection After You Restore Windows XP" issue in Windows XP, and is discussed in Microsoft Knowledge Base (KB) Article Q329441. Download now to be able to create network connections after restoring Windows XP. After installing this update, you may have to restart your computer. Read More...

Q811632: Critical Update (Windows XP Media Center Edition Product Activation Hotfix)

Q811632: Critical Update (Windows XP Media Center Edition Product Activation Hotfix) - (Posted Date: May 14, 2003)

Download size: 337 KB

This update resolves an issue where Windows Product Activation, if triggered, cannot complete and may prevent you from logging on to the system. Download now to ensure that Windows Product Activation functions properly. After you install this item, you may have to restart your computer. This hotfix is intended for Windows XP Media Center Edition systems only. Do not apply if you are running any other Windows OS. Read More...

Q815487: Critical update for Windows XP Media Center Edition

Q815487: Critical update for Windows XP Media Center Edition - (Posted Date: May 06, 2003)

Download size: 910 KB

This update provides stability and performance enhancements and replaces Q329979. Read More...

Q817287: Critical Update (Catalog Database Corruption in Microsoft Windows XP)

Q817287: Critical Update (Catalog Database Corruption in Microsoft Windows XP) - (Posted Date: June 24, 2003)

Download size: 333 KB

This update resolves issues associated with the catalog database Windows uses to ensure the integrity of installed binaries. Update 817287 allows the database to repair itself if corruption occurs. This update also improves performance of the catalog database and anything using Microsoft Cryptographic Services NT Service (CryptSvc.dll), including Microsoft Windows Media Player, and Microsoft Media. After you install this item, you may have to restart your computer. Once you have installed this item, it cannot be removed. Read More...

Security Update for Microsoft Data Access Components (326573)

Security Update for Microsoft Data Access Components (326573) - (Posted Date: August 19, 2003)

Download size: 1.6 MB

An identified security issue in Microsoft Data Access Components (MDAC) could allow an attacker to compromise a Microsoft Windows-based system and then take a variety of actions. For example, an attacker could execute code on the system. By installing this update, you can help protect your computer. After you install this item, you may have to restart your computer. Once you have installed this item, it cannot be removed. Read More...

Security Update for Microsoft Data Access Components (823718)

Security Update for Microsoft Data Access Components (823718) - (Posted Date: August 19, 2003)

Download size: 1.6 MB

An identified security issue in Microsoft Data Access Components could allow an attacker to compromise a Microsoft Windows-based system and then take a variety of actions. For example, an attacker could execute code on the system. By installing this update, you can help protect your computer. After you install this item, you may have to restart your computer. Once you have installed this item, it cannot be removed. Read More...

Security Update for Microsoft Windows (819696)

Security Update for Microsoft Windows (819696) - (Posted Date: August 26, 2003)

Download size: 948 KB

An identified security issue in Microsoft DirectX could allow an attacker to run programs on a computer running Microsoft Windows. The attacker would first have to send you an e-mail message or entice you into visiting a malicious Web site. You can help protect your computer by installing this update from Microsoft. Once you have installed this item, it cannot be removed. Read More...

Security Update for Microsoft Windows (KB824105)

Security Update for Microsoft Windows (KB824105) - (Posted Date: September 02, 2003)

Download size: 338 KB

A security issue has been identified in Microsoft Windows that could allow an attacker to see information in your computer’s memory over a network. You can help protect your computer by installing this update from Microsoft. After you install this item, you may have to restart your computer. Read More...

Security Update for Windows XP (329834)

Security Update for Windows XP (329834) - (Posted Date: August 05, 2003)

Download size: 212 KB

This update resolves the "Unchecked Buffer in PPTP Implementation Could Enable Denial of Service" security vulnerability in Windows XP and Windows XP Service Pack 1 (SP1). Download now to help prevent an attacker from disrupting service on a server that offers private networking and uses the PPTP protocol. Read More...

Security Update for Windows XP (815021)

Security Update for Windows XP (815021) - (Posted Date: August 05, 2003)

Download size: 525 KB

An identified security vulnerability in Microsoft® Windows NT® 4.0, Windows 2000, and Windows XP could allow an attacker to take control of the computer. This issue is most likely to affect computers used as web servers. You can help protect your computer from this and other identified issues by installing this update from Microsoft. After you install this item, you may have to restart your computer. Read More...

Security Update for Windows XP (819696)

Security Update for Windows XP (819696) - (Posted Date: August 26, 2003)

Download size: 799 KB

An identified security issue in Microsoft® DirectX® could allow an attacker to run programs on a computer running Microsoft® Windows® XP. The attacker would first have to send you an e-mail message or entice you into visiting a malicious Web site. You can help protect your computer by installing this update from Microsoft. Read More...

Security Update, February 14, 2002 (Internet Explorer 6)

Security Update, February 14, 2002 (Internet Explorer 6) - (Posted Date: July 01, 2003)

Download size: 308 KB

This is an updated version of Security Update, February 14, 2002. This update resolves the "Incorrect VBScript Handling can Allow Web Pages to Read Local Files" security vulnerability in Internet Explorer 6 and Windows XP or Windows 2000, and is discussed in Microsoft Security Bulletin MS02-009. Download now to prevent a malicious user from using an unauthorized Web site to read the contents of files on your local computer. Read More...

Link to comment
Share on other sites

Yes, I saw that MSKB article. What rubs me the wrong way is that even following the steps indicated, using the switches they list, it still gives me an error (though I am confident it installs OK). I played around with it for a while directly at the command line, determined that there is a bug in it, and have not looked at it since. (I have enough of my own de-bugging to do ...) Anyway, I'm not crazy about the idea of sharing my MAC address.

Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...