Paul 365 Posted September 9, 2003 Posted September 9, 2003 Its this stupid forum, its capitalising the lowercase MSFN in my url path.i set up some webspace for this sort of thing and its bloody useles cos we cant enter the url in lower case.grrrrr
webmedic Posted September 9, 2003 Author Posted September 9, 2003 well it's showing up now. Wow that is quite a page of things I have never seen one that big most of them are only little ones showing about 4 or 5 switches. What is that hotfix for?
Paul 365 Posted September 9, 2003 Posted September 9, 2003 I see it fine?ofcourse you see it fine, now that i have deleted the MSFN user account and made a new one called qmsfn.......Your forum s/w is capitalising MSFN even in the image and url code applets.
Paul 365 Posted September 9, 2003 Posted September 9, 2003 well it's showing up now. Wow that is quite a page of things I have never seen one that big most of them are only little ones showing about 4 or 5 switches. What is that hotfix for?Beats me dude, ive just spent the last 30 mins trying to figure out why the image wouldnt show Now ill go find out what h/f caused that....
Paul 365 Posted September 10, 2003 Posted September 10, 2003 I would be able to tell you if VirtualPC was any quicker.The extra install time is making me think its not worth doing the slipstream options and just using an inf file from the desktop at startup.It been sat on 13 mins now for ages.............
webmedic Posted September 10, 2003 Author Posted September 10, 2003 be patient I have the smae problem but I can tell you it goes by much faster when installing on bare hardware. In virtualpc it prababy sits for about 45 minutes at 13 minutes it's normal.
Paul 365 Posted September 10, 2003 Posted September 10, 2003 Dime to a Dollar it's 817778 ...Spot on - That screen dissapeared when i removed this hotfix.@webmedic In your answers to my questions earlier you said that the problem with the mdac h/f was solved but in the last post of your do.cmd the problem is still there.Do you have an updated version or am i jumping the gun.
Igor Posted September 10, 2003 Posted September 10, 2003 I have the same error everytime I try to install the update KB817778.I also have removed this hotfix and the error disappeared. Thanks a lot
webmedic Posted September 10, 2003 Author Posted September 10, 2003 this is the link for that thing kb817778http://support.microsoft.com/?kbid=817778it is not strictly a hotfix it does way more than that as it upgrades major parts of your tcpip stack and just by looking at waht it does. If you guys dont know ipv6 and nat address translation menas that whenever you do anything on the interenet you can be tracked by the mac address of your hardware. As for mac address's every netwrok card or modem or any piece that lets you communicate with the interent has a unique address. This is called a mac address. With that patch they can track everything you do back exactly to you. I don't do a bunch of file sharing but if you do avoid that hotfix like the plague. It will allow you ot be tracked by the hardware in your computer. Now as for the mdac hotfix working or not. Yes it does worl with my latest script but it is a little more work to get installed. Now first thing is you will need to make a few directories.$OEM$\$1\install\tmp$OEM$\$1\install\system$OEM$\$1\install\system\hotfixes3now put the mdac hotfix into hotfixes3 you will need to use the shortend one that do.cmd makes for you which can be found in directory 3. Do will automaticly shorten it for you if it not already. and last but not least here is the last do.cmdCLS@echo off:: setlocal enableextensionsecho. > log.txt:: check if hotfix file existsif not exist 1\*.exe echo No hotfixes present. 2>&1 | bin\mtee/+ log.txtif not exist 1\*.exe echo Please add your hotfixes. 2>&1 | bin\mtee/+ log.txtif not exist 1\*.exe goto _end:: create folders Needed for setupecho. 2>&1 | bin\mtee/+ log.txtecho Creating directories and set up. 2>&1 | bin\mtee/+ log.txtecho __________________________________________________________________________ 2>&1 | bin\mtee/+ log.txtecho. 2>&1 | bin\mtee/+ log.txtSET PrepDir=if "%1" == "/prep" set PrepDir=%2IF DEFINED PrepDir goto :Make_Direcho using for to find dirFOR /F "delims=" %%i IN ('cd') DO SET PrepDir=%%i:Make_Direcho PrepDir = %PrepDir% 2>&1 | bin\mtee/+ log.txtif not exist 4 md 4 2>&1 | bin\mtee/+ log.txtif not exist 5 md 5 2>&1 | bin\mtee/+ log.txtif not exist 5\svcpack md 5\SVCPACK 2>&1 | bin\mtee/+ log.txtif not exist tmp md tmp 2>&1 | bin\mtee/+ log.txt:: delete any files in extract and final folderecho. 2>&1 | bin\mtee/+ log.txtecho Deleteing stale files. 2>&1 | bin\mtee/+ log.txtecho __________________________________________________________________________ 2>&1 | bin\mtee/+ log.txtecho. 2>&1 | bin\mtee/+ log.txtif exist 4\* del /s /q 4\* 2>&1 | bin\mtee/+ log.txtif exist 5\* del /s /q 5\* 2>&1 | bin\mtee/+ log.txt:: extract hotfix to extract folderecho. 2>&1 | bin\mtee/+ log.txtecho Adding hotfixes from hotfix1 folder 2>&1 | bin\mtee/+ log.txtecho __________________________________________________________________________ 2>&1 | bin\mtee/+ log.txtecho. 2>&1 | bin\mtee/+ log.txtfor /f "usebackq delims==" %%i in (`dir /b 1\*.exe`) do COPY /Y "1\%%~ni.EXE" "tmp\????????.EXE" >> log.txtfor /f "usebackq delims==" %%i in (`dir /b 1\*.exe`) do del /f /q 1\%%~ni.EXE >> log.txtfor /f "usebackq delims==" %%i in (`dir /b tmp\*.exe`) do Move /Y tmp\%%~ni.exe 1 >> log.txtfor /f "usebackq delims==" %%i in (`dir /b 1\*.exe`) do 1\%%~ni.exe /q /x:4 >> log.txt:: extract hotfix to extract folder thisis for newer style hot fixesecho. 2>&1 | bin\mtee/+ log.txtecho Adding hotfixes from hotfix2 folder 2>&1 | bin\mtee/+ log.txtecho __________________________________________________________________________ 2>&1 | bin\mtee/+ log.txtecho. 2>&1 | bin\mtee/+ log.txtfor /f "usebackq delims==" %%i in (`dir /b 2\*.exe`) do COPY /Y "2\%%~ni.EXE" "tmp\????????.EXE" >> log.txtfor /f "usebackq delims==" %%i in (`dir /b 2\*.exe`) do del /f /q 2\%%~ni.EXE >> log.txtfor /f "usebackq delims==" %%i in (`dir /b tmp\*.exe`) do MD tmp\%%~ni >> log.txtfor /f "usebackq delims==" %%i in (`dir /b tmp\*.exe`) do tmp\%%~ni.exe /Q /T:%PrepDir%\tmp\%%~ni /C >> log.txtfor /f "usebackq delims==" %%i in (`dir /b tmp\*.exe`) do xcopy /d /h /y tmp\%%~ni\*.* 4 >> log.txtfor /f "usebackq delims==" %%i in (`dir /b tmp\*.exe`) do bin\rm.exe /fvn tmp\%%~ni >> log.txtfor /f "usebackq delims==" %%i in (`dir /b tmp\*.exe`) do Move /Y tmp\%%~ni.exe 2 >> log.txtattrib -R -A -S -H tmp\* /S:: extract hotfix to extract folder thisis for newer style hot fixesecho. 2>&1 | bin\mtee/+ log.txtecho Adding hotfixes from hotfix3 folder 2>&1 | bin\mtee/+ log.txtecho __________________________________________________________________________ 2>&1 | bin\mtee/+ log.txtecho. 2>&1 | bin\mtee/+ log.txtfor /f "usebackq delims==" %%i in (`dir /b 3\*.exe`) do COPY /Y "3\%%~ni.EXE" "tmp\????????.EXE" >> log.txtfor /f "usebackq delims==" %%i in (`dir /b 3\*.exe`) do del /f /q 3\%%~ni.EXE >> log.txtfor /f "usebackq delims==" %%i in (`dir /b 3\*.cmd`) do del /f /q 3\%%~ni.cmd >> log.txtfor /f "usebackq delims==" %%i in (`dir /b tmp\*.exe`) do MD tmp\%%~ni >> log.txtfor /f "usebackq delims==" %%i in (`dir /b tmp\*.exe`) do tmp\%%~ni.exe /Q /T:%PrepDir%\tmp\%%~ni /C >> log.txtfor /f "usebackq delims==" %%i in (`dir /b tmp\*.exe`) do xcopy /d /h /y tmp\%%~ni\*.* 4 >> log.txtfor /f "usebackq delims==" %%i in (`dir /b tmp\*.exe`) do del /f /q tmp\%%~ni\*.* >> log.txtfor /f "usebackq delims==" %%i in (`dir /b tmp\*.exe`) do bin\rm.exe /fvn tmp\%%~ni >> log.txtfor /f "usebackq delims==" %%i in (`dir /b tmp\*.exe`) do Move /Y tmp\%%~ni.exe 3 >> log.txtecho. 2>&1 | bin\mtee/+ log.txtecho Adding cmd files to hotfix3 folder 2>&1 | bin\mtee/+ log.txtecho __________________________________________________________________________ 2>&1 | bin\mtee/+ log.txtecho. 2>&1 | bin\mtee/+ log.txtfor /f "usebackq delims==" %%i in (`dir /b 3\*.exe`) do echo CLS 2>&1 | bin\mtee /+ log.txt 3\%%~ni.cmdfor /f "usebackq delims==" %%i in (`dir /b 3\*.exe`) do echo @echo off 2>&1 | bin\mtee /+ log.txt /+ 3\%%~ni.cmdfor /f "usebackq delims==" %%i in (`dir /b 3\*.exe`) do echo start /wait %systemdrive%\install\system\hotfixes3\%%~ni.exe /T:%systemdrive%\install\tmp /C:"%systemdrive%\install\tmp\dahotfix.exe /q /n" /Q 2>&1 | bin\mtee /+ log.txt /+ 3\%%~ni.cmdfor /f "usebackq delims==" %%i in (`dir /b 3\*.exe`) do echo EXIT 2>&1 | bin\mtee /+ log.txt /+ 3\%%~ni.cmd:: check extraction took placeecho. 2>&1 | bin\mtee/+ log.txtecho Checking for extracted files 2>&1 | bin\mtee/+ log.txtecho __________________________________________________________________________ 2>&1 | bin\mtee/+ log.txtecho. 2>&1 | bin\mtee/+ log.txtif not exist 4\* goto _end:: move hotfix to svcpack folderecho. 2>&1 | bin\mtee/+ log.txtecho Moving hotfixes to svcpack folder. 2>&1 | bin\mtee/+ log.txtecho __________________________________________________________________________ 2>&1 | bin\mtee/+ log.txtecho. 2>&1 | bin\mtee/+ log.txtcopy /y 1\*.exe 5\svcpack >> log.txtcopy /y 2\*.exe 5\svcpack >> log.txtcopy /y 3\*.cmd 5\svcpack >> log.txtcopy /y 3\*.exe 5\svcpack >> log.txt:: delete unwanted files from extract folderecho. 2>&1 | bin\mtee/+ log.txtecho delete unwanted files from extract folder. 2>&1 | bin\mtee/+ log.txtecho __________________________________________________________________________ 2>&1 | bin\mtee/+ log.txtecho. 2>&1 | bin\mtee/+ log.txtfor /f %%i in (files\hotkill.ini) do del /f /q /s 4\%%i 2>&1 | bin\mtee/+ log.txtfor /f %%i in (files\hotkill.ini) do del /f /q /s 4\sp2\%%i 2>&1 | bin\mtee/+ log.txt:: move cat files to svcpack folderecho. 2>&1 | bin\mtee/+ log.txtecho move cat files to svcpack folder. 2>&1 | bin\mtee/+ log.txtecho __________________________________________________________________________ 2>&1 | bin\mtee/+ log.txtecho. 2>&1 | bin\mtee/+ log.txtfor %%i in (4\*.cat 4\update\*.cat 4\sp2\update\*.cat) do move /y %%i 5\svcpack 2>&1 | bin\mtee/+ log.txt::NEW BIT::echo. 2>&1 | bin\mtee/+ log.txtecho Updating sp1.cab. 2>&1 | bin\mtee/+ log.txtecho __________________________________________________________________________ 2>&1 | bin\mtee/+ log.txtecho. 2>&1 | bin\mtee/+ log.txtxcopy /d /h /u /y 4\*.* files\sp1 >> log.txtxcopy /d /h /u /y 4\sp2\*.* files\sp1 >> log.txtbin\cabarc.exe N 5\sp1.cab files\sp1\*.* >> log.txt::END:::COMPRESS:: compress files and copy to output folderecho. 2>&1 | bin\mtee/+ log.txtecho compress files and copy to output folder. 2>&1 | bin\mtee/+ log.txtecho __________________________________________________________________________ 2>&1 | bin\mtee/+ log.txtecho. 2>&1 | bin\mtee/+ log.txtif exist files\winntbbu.dll xcopy /y files\winntbbu.dll 4 >> log.txtbin\compress.exe -d -r -zx21 4\* 5 >> log.txtbin\compress.exe -d -r -zx21 4\sp2\* 5 >> log.txt:: create svcpack.inf fileecho. 2>&1 | bin\mtee/+ log.txtecho create svcpack.inf file. 2>&1 | bin\mtee/+ log.txtecho __________________________________________________________________________ 2>&1 | bin\mtee/+ log.txtecho. 2>&1 | bin\mtee/+ log.txtecho [Version] 2>&1 | bin\mtee /+ log.txt 5\svcpack.infecho Signature="$Windows NT$" 2>&1 | bin\mtee /+ log.txt /+ 5\svcpack.infecho MajorVersion=5 2>&1 | bin\mtee /+ log.txt /+ 5\svcpack.infecho MinorVersion=1 2>&1 | bin\mtee /+ log.txt /+ 5\svcpack.infecho BuildNumber=2600 2>&1 | bin\mtee /+ log.txt /+ 5\svcpack.infecho. 2>&1 | bin\mtee /+ log.txt /+ 5\svcpack.infecho [SetupData] 2>&1 | bin\mtee /+ log.txt /+ 5\svcpack.infecho CatalogSubDir="\i386\svcpack" 2>&1 | bin\mtee /+ log.txt /+ 5\svcpack.infecho. 2>&1 | bin\mtee /+ log.txt /+ 5\svcpack.infecho [SetupHotfixesToRun] 2>&1 | bin\mtee /+ log.txt /+ 5\svcpack.inffor /f "usebackq delims==" %%i in (`dir /b 1\*.exe`) do echo %%~ni.exe /n /q /u /z 2>&1 | bin\mtee /+ log.txt /+ 5\svcpack.inffor /f "usebackq delims==" %%i in (`dir /b 2\*.exe`) do echo %%~ni.exe /Q:A /R:N 2>&1 | bin\mtee /+ log.txt /+ 5\svcpack.inf::for /f "usebackq delims==" %%i in (`dir /b 3\*.exe`) do echo %%~ni.exe /T:C:\\install\tmp /C:"c:\\install\tmp\dahotfix.exe /q /n" /Q >> 5\svcpack.inffor /f "usebackq delims==" %%i in (`dir /b 3\*.cmd`) do echo %%~ni.cmd 2>&1 | bin\mtee /+ log.txt /+ 5\svcpack.infecho. 2>&1 | bin\mtee /+ log.txt /+ 5\svcpack.infecho [ProductCatalogsToInstall] 2>&1 | bin\mtee /+ log.txt /+ 5\svcpack.inffor /f "usebackq delims==" %%i in (`dir /b 5\svcpack\*.cat`) do echo %%~ni.cat 2>&1 | bin\mtee /+ log.txt /+ 5\svcpack.inf:: compress svcpack.infecho. 2>&1 | bin\mtee/+ log.txtecho compress svcpack.inf file. 2>&1 | bin\mtee/+ log.txtecho __________________________________________________________________________ 2>&1 | bin\mtee/+ log.txtecho. 2>&1 | bin\mtee/+ log.txtbin\compress.exe -d -r -zx21 5\svcpack.inf >> log.txt:: comment out the next line if you want to examing svcpack.inf afterwards.:: del /q 5\svcpack.inf:: copy winnt.sif to output folderecho. 2>&1 | bin\mtee/+ log.txtecho copy extra files. 2>&1 | bin\mtee/+ log.txtecho __________________________________________________________________________ 2>&1 | bin\mtee/+ log.txtecho. 2>&1 | bin\mtee/+ log.txtif exist files\winnt.sif xcopy /y files\winnt.sif 5 >> log.txt:: copy dosnet.inf to output folderif exist files\dosnet.inf xcopy /y files\dosnet.inf 5 >> log.txt:: copy TXTSETUP.SIF to output folderif exist files\TXTSETUP.SIF xcopy /y files\TXTSETUP.SIF 5 >> log.txtif exist files\sys\*.sys xcopy /y files\sys\*.sys 5 >> log.txt:: clean up:: if exist 1\* del /s /q 1\*:: if exist 2\* del /s /q 2\*:: if exist 3\* del /s /q 3\*:: attrib -R -A -S -H tmp\* /S:: rd /s /q tmpgoto _end:_endI use a couple external programs for this mtee and rm if you need these let me know. I'll make a new download soon wiht all the little bits I use to get this going.
webmedic Posted September 10, 2003 Author Posted September 10, 2003 I want to add here that this script is not for windows update things persay it is only for security related hotfixes. I guess it could apply to critical updates also. The things that are listed under windows update as just windows xp updates are not intended to be instaled this way. This is only so you have a secure system after install not to slipstream every windows update into place. Now having said that. I have talked to another memeber here that works at micrsoft about slipstreaming other bits and pieces that are normally just windows updates like .net 1.1 and dx9 into the installer and not even those can be done cleanly so you would be best off not trying to do those with the scripts I have posted here.
webmedic Posted September 10, 2003 Author Posted September 10, 2003 Dime to a Dollar it's 817778 ...Just looked at this and it is not a critical update. It is a recommended update. I need to stress this again this script is setup to install critical updates only. If it does happen to work wiht recommended updates then it is only that you are fortunate. Recommended updates are not always intended by micrsoft even to be slipstreamed.
webmedic Posted September 10, 2003 Author Posted September 10, 2003 here is a current list of critical updates for xp sp1328310: Security Update - (Posted Date: June 10, 2003)Download size: 3.9 MBA security vulnerability has been identified that could allow an attacker to compromise a Windows-based computer and gain complete control over it. The attacker would need the ability to log onto the computer to carry out an attack. You can help protect your computer from this specific vulnerability by installing this update from Microsoft. After you install this item, you may have to restart your computer. Read More...329170: Security Update 329170: Security Update - (Posted Date: June 10, 2003)Download size: 483 KBA security vulnerability has been identified that could allow an attacker to disrupt a facility by which security settings are applied to Windows-based computers in a corporate network. This could allow the attacker to loosen settings on his or her own computer or impose tighter ones on someone else's. Network administrators can help eliminate this issue by installing this update. After you install this item, you may have to restart your computer. Read More...330994: April 2003, Security Update for Outlook Express 6 SP1 330994: April 2003, Security Update for Outlook Express 6 SP1 - (Posted Date: April 22, 2003)Download size: 1.9 MBA security issue in Microsoft® Outlook Express® has been identified that could allow an attacker to read files on your computer, or cause a program to run. You can help protect your computer by installing this update. After you install this item, you may have to restart your computer. Read More...331953: Security Update (Windows XP) 331953: Security Update (Windows XP) - (Posted Date: June 03, 2003)Download size: 735 KBA security issue has been identified that could allow an attacker to cause a computer running Microsoft® Windows® to fail. An attacker would need the ability to connect to a process on the computer. You can help protect your computer by installing this update from Microsoft. After you install this item, you may have to restart your computer. Read More...810565: Critical Update 810565: Critical Update - (Posted Date: March 18, 2003)Download size: 5.3 MBThis update contains several fixes to Windows components to better support default Web browsers other than Internet Explorer, as described in Microsoft Knowledge Base (KB) Article 810565. Download now to improve the interaction of certain Windows components with default web browsers other than Internet Explorer. After you install this item, you may have to restart your computer. Once you have installed this item, it cannot be removed. Read More...810577: Security Update 810577: Security Update - (Posted Date: June 03, 2003)Download size: 556 KBA security issue has been identified that could allow an attacker to compromise a computer running Microsoft® Windows® XP and gain control over it. To attempt an attack, the attacker would have to be able to log on to the computer. You can help protect your computer by installing this update from Microsoft. After you install this item, you may have to restart your computer. Read More...810833: Security Update (Windows XP) 810833: Security Update (Windows XP) - (Posted Date: February 19, 2003)Download size: 379 KBA security issue has been identified that could allow an attacker to compromise a computer running Microsoft® Windows® and gain control over it. This issue is most likely to affect computers used as servers. You can help protect your computer by installing this update from Microsoft. After you install this item, you may have to restart your computer. Read More...811493: Security Update (Windows XP) 811493: Security Update (Windows XP) - (Posted Date: June 24, 2003)Download size: 3.2 MBA security issue has been identified that could allow an attacker to compromise a computer running Microsoft® Windows® XP and gain complete control over it. An attacker would need the ability to log onto the computer locally to carry out an attack. You can help protect your computer by installing this update from Microsoft. After you install this update, you may have to restart your computer. Read More...811630: Critical Update (Windows XP) 811630: Critical Update (Windows XP) - (Posted Date: June 10, 2003)Download size: 1.3 MBThis update enables applications to access HTML Help in a new, restricted mode. Future updates of Internet Explorer require this new capability. Download now to ensure that Internet Explorer can properly display HTML Help in HTML pages. Read More...813951: Update for Internet Explorer 6 SP1 813951: Update for Internet Explorer 6 SP1 - (Posted Date: March 25, 2003)Download size: 345 KBThis update fixes an issue caused by Internet Explorer security patch 810847 that can cause authentication issues in Internet Explorer. Download now to avoid continuous authentication requests. After installing this item, you may have to restart your computer. Once you install this update, it cannot be removed. Read More...814033: Critical Update 814033: Critical Update - (Posted Date: March 18, 2003)Download size: 416 KBThis update addresses the "Offered driver may not install using Windows Update" issue in Windows XP, and is discussed in Microsoft Knowledge Base (KB) Article 814033. Download now so you can download drivers that Windows Update offers. After installing this update, you may have to restart your computer. Read More...814078: Security Update (Microsoft Jscript version 5.6, Windows 2000, Windows XP) 814078: Security Update (Microsoft Jscript version 5.6, Windows 2000, Windows XP) - (Posted Date: March 25, 2003)Download size: 361 KBA security issue has been identified that could allow an attacker to run programs on a computer running Microsoft® Windows®. The attacker would first have to send you an e-mail message or entice you into visiting a malicious Web site. You can help protect your computer by installing this update from Microsoft. After you install this item, you may have to restart your computer. Once you have installed this item, it cannot be removed. Read More...816093: Security Update Microsoft Virtual Machine (Microsoft VM) 816093: Security Update Microsoft Virtual Machine (Microsoft VM) - (Posted Date: June 03, 2003)Download size: 5.1 MBThis update helps resolve a vulnerability in the Microsoft virtual machine. After you install this item, you may have to restart your computer. Once you have installed this item, it cannot be removed. Read More...817606: Security Update (Windows XP) 817606: Security Update (Windows XP) - (Posted Date: July 08, 2003)Download size: 416 KBAn identified security issue in Microsoft Windows could allow an attacker to compromise a Microsoft Windows-based system and then take a variety of actions. For example, an attacker could execute code on the system. By installing this update, you can help protect your computer. After you install this item, you may have to restart your computer. Read More...817787: Security Update Windows Media Player for XP 817787: Security Update Windows Media Player for XP - (Posted Date: June 05, 2003)Download size: 359 KBAn identified security issue in Microsoft Windows Media Player 7.1 and Windows Media Player for XP could enable an attacker to read files or run programs on a remote computer. You can help protect your computer by installing this update from Microsoft. After you install this item, you may have to restart your computer. Once you have installed this item, it cannot be removed. Read More...821557: Security Update (Windows XP) 821557: Security Update (Windows XP) - (Posted Date: July 23, 2003)Download size: 5.1 MBAn identified security issue in Microsoft Windows could allow an attacker to compromise a Microsoft Windows-based system and then take a variety of actions. For example, an attacker could execute code on the system. By installing this update, you can help protect your computer. After you install this item, you may have to restart your computer. Read More...823559: Security Update for Microsoft Windows 823559: Security Update for Microsoft Windows - (Posted Date: August 26, 2003)Download size: 375 KBAn identified security issue in Microsoft Windows could allow an attacker to compromise a Microsoft Windows-based system and then take a variety of actions. For example, an attacker could execute code on the system. By installing this update, you can help protect your computer. After you install this item, you may have to restart your computer. Read More...August 2003, Cumulative Patch for Internet Explorer 6 Service Pack 1 (822925) August 2003, Cumulative Patch for Internet Explorer 6 Service Pack 1 (822925) - (Posted Date: August 19, 2003)Download size: 2.1 MBSecurity issues identified in Microsoft Internet Explorer (IE) could allow an attacker to compromise systems with IE installed (even if IE is not used as the Web browser). For example, an attacker could run programs on a computer used to view the attacker's Web site. Download this update from Microsoft to help protect your computer. After installation, you may have to restart your computer. Read More...Flaw In Windows Media Player May Allow Media Library Access (819639) Flaw In Windows Media Player May Allow Media Library Access (819639) - (Posted Date: June 25, 2003)Download size: 1.9 MBAn identified security issue in Windows Media Player 9 could allow an attacker to see certain information on your computer after you viewed a Web page. For instance, this issue could allow an attacker to view information about your media library and modify it. By installing this update, you can help protect your computer. After you install this item, you may have to restart your computer. Once you have installed this item, it cannot be removed. Read More...Microsoft .NET Framework Service Pack 2, English Version Microsoft .NET Framework Service Pack 2, English Version - (Posted Date: August 20, 2003)Download size: 6.4 MBMicrosoft .NET Framework Service Pack 2 resolves various issues found after the initial release of Microsoft .NET Framework. These include both security- and non-security-related issues. Read More...MS03-026: Security Update for Windows XP (823980) MS03-026: Security Update for Windows XP (823980) - (Posted Date: August 26, 2003)Download size: 1.2 MBA security issue has been identified that could allow an attacker to remotely compromise a computer running Microsoft® Windows® and gain complete control over it. This security issue is the vulnerability that is exploited by the blaster worm. You can help protect your computer by installing this update from Microsoft. After you install this item, you may have to restart your computer. Read More...Q323255: Security Update (Windows XP) Q323255: Security Update (Windows XP) - (Posted Date: June 10, 2003)Download size: 697 KBThis update resolves the "Unchecked buffer in HTML Help can lead to Code Execution" security vulnerability in Windows XP. Download now to help prevent a malicious user from running an unauthorized program on your computer. Read More...Q329048: Security Update Q329048: Security Update - (Posted Date: February 18, 2003)Download size: 372 KBThis update resolves the "Unchecked Buffer in File Decompression Functions" security vulnerability in Windows XP. Download now to help prevent a specially malformed file from causing unauthorized code to run on your computer. Read More...Q329115: Security Update (Windows XP) Q329115: Security Update (Windows XP) - (Posted Date: May 06, 2003)Download size: 484 KBThis update resolves the "Certificate Validation Flaw Could Enable Identity Spoofing" vulnerability in Windows XP. Download now to help prevent an attacker from attempting identity spoofing using certificates. After you install this item, you may have to restart your computer. Read More...Q329390: Security Update Q329390: Security Update - (Posted Date: February 18, 2003)Download size: 282 KBAn identified security vulnerability in Windows XP could enable an attacker to compromise a user's Microsoft® Windows®-based computer and gain complete control over it, if the user visited the attacker's web site or took other, less likely, actions. You can help protect your computer from this and other identified security concerns by installing this update. After you install this item, you may have to restart your computer. Read More...Q329441: Critical Update Q329441: Critical Update - (Posted Date: August 26, 2003)Download size: 347 KBThis update addresses the "You Cannot Create a Network Connection After You Restore Windows XP" issue in Windows XP, and is discussed in Microsoft Knowledge Base (KB) Article Q329441. Download now to be able to create network connections after restoring Windows XP. After installing this update, you may have to restart your computer. Read More...Q811632: Critical Update (Windows XP Media Center Edition Product Activation Hotfix) Q811632: Critical Update (Windows XP Media Center Edition Product Activation Hotfix) - (Posted Date: May 14, 2003)Download size: 337 KBThis update resolves an issue where Windows Product Activation, if triggered, cannot complete and may prevent you from logging on to the system. Download now to ensure that Windows Product Activation functions properly. After you install this item, you may have to restart your computer. This hotfix is intended for Windows XP Media Center Edition systems only. Do not apply if you are running any other Windows OS. Read More...Q815487: Critical update for Windows XP Media Center Edition Q815487: Critical update for Windows XP Media Center Edition - (Posted Date: May 06, 2003)Download size: 910 KBThis update provides stability and performance enhancements and replaces Q329979. Read More...Q817287: Critical Update (Catalog Database Corruption in Microsoft Windows XP) Q817287: Critical Update (Catalog Database Corruption in Microsoft Windows XP) - (Posted Date: June 24, 2003)Download size: 333 KBThis update resolves issues associated with the catalog database Windows uses to ensure the integrity of installed binaries. Update 817287 allows the database to repair itself if corruption occurs. This update also improves performance of the catalog database and anything using Microsoft Cryptographic Services NT Service (CryptSvc.dll), including Microsoft Windows Media Player, and Microsoft Media. After you install this item, you may have to restart your computer. Once you have installed this item, it cannot be removed. Read More...Security Update for Microsoft Data Access Components (326573) Security Update for Microsoft Data Access Components (326573) - (Posted Date: August 19, 2003)Download size: 1.6 MBAn identified security issue in Microsoft Data Access Components (MDAC) could allow an attacker to compromise a Microsoft Windows-based system and then take a variety of actions. For example, an attacker could execute code on the system. By installing this update, you can help protect your computer. After you install this item, you may have to restart your computer. Once you have installed this item, it cannot be removed. Read More...Security Update for Microsoft Data Access Components (823718) Security Update for Microsoft Data Access Components (823718) - (Posted Date: August 19, 2003)Download size: 1.6 MBAn identified security issue in Microsoft Data Access Components could allow an attacker to compromise a Microsoft Windows-based system and then take a variety of actions. For example, an attacker could execute code on the system. By installing this update, you can help protect your computer. After you install this item, you may have to restart your computer. Once you have installed this item, it cannot be removed. Read More...Security Update for Microsoft Windows (819696) Security Update for Microsoft Windows (819696) - (Posted Date: August 26, 2003)Download size: 948 KBAn identified security issue in Microsoft DirectX could allow an attacker to run programs on a computer running Microsoft Windows. The attacker would first have to send you an e-mail message or entice you into visiting a malicious Web site. You can help protect your computer by installing this update from Microsoft. Once you have installed this item, it cannot be removed. Read More...Security Update for Microsoft Windows (KB824105) Security Update for Microsoft Windows (KB824105) - (Posted Date: September 02, 2003)Download size: 338 KBA security issue has been identified in Microsoft Windows that could allow an attacker to see information in your computer’s memory over a network. You can help protect your computer by installing this update from Microsoft. After you install this item, you may have to restart your computer. Read More...Security Update for Windows XP (329834) Security Update for Windows XP (329834) - (Posted Date: August 05, 2003)Download size: 212 KBThis update resolves the "Unchecked Buffer in PPTP Implementation Could Enable Denial of Service" security vulnerability in Windows XP and Windows XP Service Pack 1 (SP1). Download now to help prevent an attacker from disrupting service on a server that offers private networking and uses the PPTP protocol. Read More...Security Update for Windows XP (815021) Security Update for Windows XP (815021) - (Posted Date: August 05, 2003)Download size: 525 KBAn identified security vulnerability in Microsoft® Windows NT® 4.0, Windows 2000, and Windows XP could allow an attacker to take control of the computer. This issue is most likely to affect computers used as web servers. You can help protect your computer from this and other identified issues by installing this update from Microsoft. After you install this item, you may have to restart your computer. Read More...Security Update for Windows XP (819696) Security Update for Windows XP (819696) - (Posted Date: August 26, 2003)Download size: 799 KBAn identified security issue in Microsoft® DirectX® could allow an attacker to run programs on a computer running Microsoft® Windows® XP. The attacker would first have to send you an e-mail message or entice you into visiting a malicious Web site. You can help protect your computer by installing this update from Microsoft. Read More...Security Update, February 14, 2002 (Internet Explorer 6) Security Update, February 14, 2002 (Internet Explorer 6) - (Posted Date: July 01, 2003)Download size: 308 KBThis is an updated version of Security Update, February 14, 2002. This update resolves the "Incorrect VBScript Handling can Allow Web Pages to Read Local Files" security vulnerability in Internet Explorer 6 and Windows XP or Windows 2000, and is discussed in Microsoft Security Bulletin MS02-009. Download now to prevent a malicious user from using an unauthorized Web site to read the contents of files on your local computer. Read More...
GreenMachine Posted September 10, 2003 Posted September 10, 2003 Yes, I saw that MSKB article. What rubs me the wrong way is that even following the steps indicated, using the switches they list, it still gives me an error (though I am confident it installs OK). I played around with it for a while directly at the command line, determined that there is a bug in it, and have not looked at it since. (I have enough of my own de-bugging to do ...) Anyway, I'm not crazy about the idea of sharing my MAC address.
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now