Post-SP2 Update Pack September 2007
Post-SP2 Update Pack September 2007
XP Post-SP2 Update Pack Dutch
MD5 Hash = a476f33c912b6fc1acd49df277e1f409
KB873339 - Vulnerability in HyperTerminal could allow code execution
KB873374 - Microsoft GDI+ Detection Tool
KB884575 - Battery power may be drained more quickly than expected on Windows XP-based laptop
KB885836 - Vulnerability in WordPad could allow code execution
KB886185 - Narrow definition of My network or local subnet restriction option in Windows Firewall
KB887472 - Security update for Microsoft Windows Messenger
KB887606 - Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution (xml2)
KB888111 - Universal Audio Architecture High Definition Audio Class Driver
KB888302 - Vulnerability in Windows could allow information disclosure
KB890830 - Microsoft Malicious Software Removal Tool 1.33
KB890859 - Vulnerabilities in Windows kernel could allow elevation of privilege and denial of service
KB891781 - Vulnerability in DHTML editing ActiveX control could allow code execution
KB892130 - Windows Genuine Advantage Validation Tool 1.7.0036.0
KB893756 - Vulnerability in Telephony service could allow remote code execution
KB893803 - Windows Installer 3.1
KB894391 - Attachment names not displayed in e-mails or "Generic Host Process" error after installing MS05-012 update
KB896358 - Vulnerability in HTML Help could allow remote code execution
KB896423 - Vulnerability in Print Spooler service could allow remote code execution
KB896428 - Vulnerability in Telnet client could allow information disclosure
KB898461 - Permanent copy of the Package Installer for Windows
KB899587 - Vulnerabilities in Kerberos could allow denial of service, information disclosure, and spoofing
KB899591 - Vulnerability in Remote Desktop Protocol could allow denial of service
KB900485 - Error message in Windows XP Service Pack 2: "Stop 0x7E"
KB900725 - Vulnerabilities in Windows Shell Could Allow Remote Code Execution
KB901017 - Vulnerability in the Microsoft Collaboration Data Objects could allow code execution
KB901214 - Vulnerability in Microsoft Color Management Module could allow remote code execution
KB902400 - Vulnerabilities in MS DTC and COM+ Could Allow Remote Code Execution
KB904706 - Vulnerability in DirectShow Could Allow Remote Code Execution
KB904942 - Authentication fails when you use Outlook to try to log on to a HTTP-based mail server if you use IE 7.0
KB905414 - Vulnerability in Network Connection Manager Could Allow Denial of Service
KB905749 - Vulnerability in Plug and Play Could Allow Remote Code Execution and Local Elevation of Privilege
KB908519 - Vulnerability in Embedded Web Fonts Could Allow Remote Code Execution
KB908531 - Vulnerability in Windows Explorer Could Allow Remote Code Execution
KB909520 - Microsoft Base Smart Card Cryptographic Service Provider Package
KB910437 - Automatic Updates can no longer download updates after an Access Violation error occurs
KB911280 - Vulnerability in Routing and Remote Access could allow remote code execution
KB911562 - Vulnerability in the Microsoft Data Access Components (MDAC) Function Could Allow Code Execution
KB911564 - Vulnerability in Media Player Plug-in with Non-Microsoft Browsers Could Allow Remote Code Execution
KB911927 - Vulnerability in Web Client Service Could Allow Remote Code Execution
KB913580 - Vulnerability in Microsoft Distributed Transaction Coordinator could allow denial of service
KB914388 - A vulnerability in the DHCP Client Service could allow remote code execution
KB914389 - Vulnerability in Server Message Block could allow elevation of privilege
KB914440 - Network Diagnostics for Windows XP
KB915378 - Update for Add New Hardware Control Panel
KB916595 - Stop error message on a Windows XP-based computer: "STOP 0x000000D1"
KB917275 - Windows Rights Management Services SP2
KB917953 - Vulnerability in TCP/IP could allow remote code execution
KB918118 - Vulnerability in Microsoft RichEdit could allow remote code execution
KB918439 - Vulnerability in ART image rendering could allow remote code execution
KB919007 - Vulnerability in Pragmatic General Multicast (PGM) Could Allow Remote Code Execution
KB920213 - Vulnerability in Microsoft Agent Could Allow Remote Code Execution
KB920342 - Update to upgrade PNRP to PNRP version 2.0
KB920683 - Vulnerabilities in DNS Resolution Could Allow Remote Code Execution
KB920670 - Vulnerabilities in Microsoft Windows Hyperlink Object Library Could Allow Remote Code Execution
KB920685 - Vulnerability in Indexing Service Could Allow Cross-Site Scripting
KB920872 - Audio playback does not play the audio file from the correct position after you pause it
KB921401 - A non-paged pool memory leak occurs when you capture specific MIDI SYSEx messages
KB921503 - Vulnerability in OLE Automation Could Allow Remote Code Execution
KB922582 - Error message when you try to update a Microsoft Windows-based computer: "0x80070002"
KB922819 - Vulnerabilities in TCP/IP IPv6 Could Allow Denial of Service
KB923191 - Vulnerability in Windows Explorer Could Allow Remote Execution
KB923414 - Vulnerability in Server Service Could Allow Denial of Service and Remote Code Execution
KB923789 - Macromedia Shockwave Flash 9.0.47.0 ActiveX
KB923980 - Vulnerabilities in Client Service for NetWare Could Allow Remote Code Execution
KB924270 - Vulnerability in Workstation Service Could Allow Remote Code Execution
KB924667 - Vulnerability in Microsoft Foundation Classes could allow for remote code execution
KB925398 - Vulnerability in Windows Media Format Could Allow Remote Code Execution
KB926464 - Windows Update Engine 7.0.6000.381
KB925720 - Windows CardSpace hotfix rollup package
KB925876 - Remote Desktop Connection 6.0 Client
KB925902 - Vulnerability in GDI could allow remote code execution
KB926255 - Vulnerability in Windows could allow elevation of privilege
KB926436 - Vulnerability in Microsoft OLE Dialog could allow remote code execution
KB927779 - Vulnerability in Microsoft Data Access Components could allow remote code execution
KB927802 - Vulnerability in Windows Image Acquisition Service could allow elevation of privilege
KB927891 - Access violation received when trying to install an update from Windows Update
KB928255 - Vulnerability in Windows Shell could allow elevation of privilege
KB929123 - Security Update for Outlook Express
KB930178 - Vulnerability in Windows CSRSS could allow remote code execution
KB931125 - Microsoft Root Certificate Update
KB931261 - Vulnerability in UPnP could allow remote code execution
KB931784 - Vulnerability in the Windows kernel could allow elevation of privilege
KB932168 - Vulnerability in Microsoft Agent could allow remote code execution
KB933360 - Cumulative time zone update for Microsoft Windows operating systems
KB933579 - Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution (xml6)
KB933876 - The USN journal record contains an incorrect file name when you move a file
KB935448 - Certain third-party applications may not start, and "Illegal System DLL Relocation" error message received
KB935839 - Vulnerability in the Win32 API could allow remote code execution
KB935840 - Vulnerability in Schannel could allow remote code execution
KB936021 - Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution (xml3)
KB936181 - Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution (xml4)
KB936357 - Update that improves the reliability of systems that use Intel processors
KB938828 - Explorer.exe process crashes on a Windows XP SP2-based computer: "STOP 0xc0000005"
KB938829 - Vulnerability in GDI could allow remote code execution
-----------------------------------------------------------------------------------------------------------------------------
Windows Internet Explorer 7 Dutch Addon
MD5 Hash = 0c87b8d5fdd7563013e64c6897b788e5
Windows Internet Explorer 7
KB928090 - Cumulative security update for corpol.dll
KB937143 - Cumulative security update for Internet Explorer
KB938127 - Vulnerability in Vector Markup Language could allow remote code execution
-----------------------------------------------------------------------------------------------------------------------------
Windows Media Player 11 Dutch Addon
MD5 Hash = bdc3cc7269fcbe57356b1a3ff07dc886
Windows Media Player 11
KB929399 - Subscription music services cannot extract metering data
KB936782 - Vulnerability in Windows Media Player could allow remote code execution
KB939683 - Update to improve how Windows Media Player manages shortcuts
-----------------------------------------------------------------------------------------------------------------------------
MD5 Hash = a476f33c912b6fc1acd49df277e1f409
KB873339 - Vulnerability in HyperTerminal could allow code execution
KB873374 - Microsoft GDI+ Detection Tool
KB884575 - Battery power may be drained more quickly than expected on Windows XP-based laptop
KB885836 - Vulnerability in WordPad could allow code execution
KB886185 - Narrow definition of My network or local subnet restriction option in Windows Firewall
KB887472 - Security update for Microsoft Windows Messenger
KB887606 - Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution (xml2)
KB888111 - Universal Audio Architecture High Definition Audio Class Driver
KB888302 - Vulnerability in Windows could allow information disclosure
KB890830 - Microsoft Malicious Software Removal Tool 1.33
KB890859 - Vulnerabilities in Windows kernel could allow elevation of privilege and denial of service
KB891781 - Vulnerability in DHTML editing ActiveX control could allow code execution
KB892130 - Windows Genuine Advantage Validation Tool 1.7.0036.0
KB893756 - Vulnerability in Telephony service could allow remote code execution
KB893803 - Windows Installer 3.1
KB894391 - Attachment names not displayed in e-mails or "Generic Host Process" error after installing MS05-012 update
KB896358 - Vulnerability in HTML Help could allow remote code execution
KB896423 - Vulnerability in Print Spooler service could allow remote code execution
KB896428 - Vulnerability in Telnet client could allow information disclosure
KB898461 - Permanent copy of the Package Installer for Windows
KB899587 - Vulnerabilities in Kerberos could allow denial of service, information disclosure, and spoofing
KB899591 - Vulnerability in Remote Desktop Protocol could allow denial of service
KB900485 - Error message in Windows XP Service Pack 2: "Stop 0x7E"
KB900725 - Vulnerabilities in Windows Shell Could Allow Remote Code Execution
KB901017 - Vulnerability in the Microsoft Collaboration Data Objects could allow code execution
KB901214 - Vulnerability in Microsoft Color Management Module could allow remote code execution
KB902400 - Vulnerabilities in MS DTC and COM+ Could Allow Remote Code Execution
KB904706 - Vulnerability in DirectShow Could Allow Remote Code Execution
KB904942 - Authentication fails when you use Outlook to try to log on to a HTTP-based mail server if you use IE 7.0
KB905414 - Vulnerability in Network Connection Manager Could Allow Denial of Service
KB905749 - Vulnerability in Plug and Play Could Allow Remote Code Execution and Local Elevation of Privilege
KB908519 - Vulnerability in Embedded Web Fonts Could Allow Remote Code Execution
KB908531 - Vulnerability in Windows Explorer Could Allow Remote Code Execution
KB909520 - Microsoft Base Smart Card Cryptographic Service Provider Package
KB910437 - Automatic Updates can no longer download updates after an Access Violation error occurs
KB911280 - Vulnerability in Routing and Remote Access could allow remote code execution
KB911562 - Vulnerability in the Microsoft Data Access Components (MDAC) Function Could Allow Code Execution
KB911564 - Vulnerability in Media Player Plug-in with Non-Microsoft Browsers Could Allow Remote Code Execution
KB911927 - Vulnerability in Web Client Service Could Allow Remote Code Execution
KB913580 - Vulnerability in Microsoft Distributed Transaction Coordinator could allow denial of service
KB914388 - A vulnerability in the DHCP Client Service could allow remote code execution
KB914389 - Vulnerability in Server Message Block could allow elevation of privilege
KB914440 - Network Diagnostics for Windows XP
KB915378 - Update for Add New Hardware Control Panel
KB916595 - Stop error message on a Windows XP-based computer: "STOP 0x000000D1"
KB917275 - Windows Rights Management Services SP2
KB917953 - Vulnerability in TCP/IP could allow remote code execution
KB918118 - Vulnerability in Microsoft RichEdit could allow remote code execution
KB918439 - Vulnerability in ART image rendering could allow remote code execution
KB919007 - Vulnerability in Pragmatic General Multicast (PGM) Could Allow Remote Code Execution
KB920213 - Vulnerability in Microsoft Agent Could Allow Remote Code Execution
KB920342 - Update to upgrade PNRP to PNRP version 2.0
KB920683 - Vulnerabilities in DNS Resolution Could Allow Remote Code Execution
KB920670 - Vulnerabilities in Microsoft Windows Hyperlink Object Library Could Allow Remote Code Execution
KB920685 - Vulnerability in Indexing Service Could Allow Cross-Site Scripting
KB920872 - Audio playback does not play the audio file from the correct position after you pause it
KB921401 - A non-paged pool memory leak occurs when you capture specific MIDI SYSEx messages
KB921503 - Vulnerability in OLE Automation Could Allow Remote Code Execution
KB922582 - Error message when you try to update a Microsoft Windows-based computer: "0x80070002"
KB922819 - Vulnerabilities in TCP/IP IPv6 Could Allow Denial of Service
KB923191 - Vulnerability in Windows Explorer Could Allow Remote Execution
KB923414 - Vulnerability in Server Service Could Allow Denial of Service and Remote Code Execution
KB923789 - Macromedia Shockwave Flash 9.0.47.0 ActiveX
KB923980 - Vulnerabilities in Client Service for NetWare Could Allow Remote Code Execution
KB924270 - Vulnerability in Workstation Service Could Allow Remote Code Execution
KB924667 - Vulnerability in Microsoft Foundation Classes could allow for remote code execution
KB925398 - Vulnerability in Windows Media Format Could Allow Remote Code Execution
KB926464 - Windows Update Engine 7.0.6000.381
KB925720 - Windows CardSpace hotfix rollup package
KB925876 - Remote Desktop Connection 6.0 Client
KB925902 - Vulnerability in GDI could allow remote code execution
KB926255 - Vulnerability in Windows could allow elevation of privilege
KB926436 - Vulnerability in Microsoft OLE Dialog could allow remote code execution
KB927779 - Vulnerability in Microsoft Data Access Components could allow remote code execution
KB927802 - Vulnerability in Windows Image Acquisition Service could allow elevation of privilege
KB927891 - Access violation received when trying to install an update from Windows Update
KB928255 - Vulnerability in Windows Shell could allow elevation of privilege
KB929123 - Security Update for Outlook Express
KB930178 - Vulnerability in Windows CSRSS could allow remote code execution
KB931125 - Microsoft Root Certificate Update
KB931261 - Vulnerability in UPnP could allow remote code execution
KB931784 - Vulnerability in the Windows kernel could allow elevation of privilege
KB932168 - Vulnerability in Microsoft Agent could allow remote code execution
KB933360 - Cumulative time zone update for Microsoft Windows operating systems
KB933579 - Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution (xml6)
KB933876 - The USN journal record contains an incorrect file name when you move a file
KB935448 - Certain third-party applications may not start, and "Illegal System DLL Relocation" error message received
KB935839 - Vulnerability in the Win32 API could allow remote code execution
KB935840 - Vulnerability in Schannel could allow remote code execution
KB936021 - Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution (xml3)
KB936181 - Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution (xml4)
KB936357 - Update that improves the reliability of systems that use Intel processors
KB938828 - Explorer.exe process crashes on a Windows XP SP2-based computer: "STOP 0xc0000005"
KB938829 - Vulnerability in GDI could allow remote code execution
-----------------------------------------------------------------------------------------------------------------------------
Windows Internet Explorer 7 Dutch Addon
MD5 Hash = 0c87b8d5fdd7563013e64c6897b788e5
Windows Internet Explorer 7
KB928090 - Cumulative security update for corpol.dll
KB937143 - Cumulative security update for Internet Explorer
KB938127 - Vulnerability in Vector Markup Language could allow remote code execution
-----------------------------------------------------------------------------------------------------------------------------
Windows Media Player 11 Dutch Addon
MD5 Hash = bdc3cc7269fcbe57356b1a3ff07dc886
Windows Media Player 11
KB929399 - Subscription music services cannot extract metering data
KB936782 - Vulnerability in Windows Media Player could allow remote code execution
KB939683 - Update to improve how Windows Media Player manages shortcuts
-----------------------------------------------------------------------------------------------------------------------------
Last edited by MEULC on Mon Oct 22, 2007 5:44 am, edited 1 time in total.
.Net Framework Addon
Dit is de nieuwe addon die ik van scratch ben begonnen (voorlopig een beta versie). Is ook een stuk kleiner dan de vorige. En Framework 3.0 wordt geinstalleerd tijdens eerste logon. Het kan dus zijn dat het nog niet perfect werkt. Daarom is commentaar altijd welkom.
Dit is de nieuwe addon die ik van scratch ben begonnen (voorlopig een beta versie). Is ook een stuk kleiner dan de vorige. En Framework 3.0 wordt geinstalleerd tijdens eerste logon. Het kan dus zijn dat het nog niet perfect werkt. Daarom is commentaar altijd welkom.
thx again
maar
Dus geef mij de oude nog maar ff.
maar
Dit is al ooit eens eerder geweest, en toen kreeg ik problemen met apps installeren via wpi etc.En Framework 3.0 wordt geinstalleerd tijdens eerste logon
Dus geef mij de oude nog maar ff.
Last edited by muiz on Wed Sep 19, 2007 3:08 am, edited 2 times in total.
Ik heb een nieuwe cd gemaakt met de updatepacks (inclusief de beta van het .NET addon)
Nu heb ik na de installatie 3 errors en een hele hoop waarschuwingen:
Weet iemand hoe je kan testen of .NET goed werkt?
Nu heb ik na de installatie 3 errors en een hele hoop waarschuwingen:
Weet iemand hoe je kan testen of .NET goed werkt?
Code: Select all
id: 1013
Product: Microsoft .NET Framework 2.0 Language Pack - NLD -- VoerInstall.exe uit om dit product te installeren
id: 1000
Faulting application mscorsvw.exe, version 2.0.50727.832, stamp461eee0a, faulting module kernel32.dll, version 5.1.2600.3119, stamp4623a044, debug? 0, fault address 0x00012a7b.
id: 1111
.NET Runtime Optimization Service (clr_optimization_v2.0.50727_32) -Service reached limit of transient errors. Will shut down. Last errorreturned from Service Manager: 0x800736b1.
-
- Posts: 103
- Joined: Mon Jul 17, 2006 12:17 pm
Die krijg ik niet te zien, ik krijg alleen deze te zien:TheSickman wrote:met de .net addon
als in ms update doe
dan mist tie alleen
Microsoft .NET Framework 2.0 Language Pack x86 ( KB829019 )
voor derest gaat tie as een trein
KB914440: Diagnostische gegevens van het netwerk.
Maar die was er toch om een bepaalde reden uitgelaten?
SeptemberPack + BetaDotNet + updates (naar unattended gefixed)
`
Als basis een Retail XP home SP2 met nLite streamen:
eerste sessie:
[Hotfixes]
<drive>:\nLite\addons\sept2007\xpsp2_updatepack.7z
<drive>:\nLite\addons\sept2007\KB883667.exe
tweede sessie:
[Hotfixes]
<drive>:\nLite\addons\sept2007\Dotnet\netfx_beta_addon.7z
De hiermee aangepaste unattended bleek na install nog een
aantal updates te missen. (ie7 en MP11 buiten beschouwing)
890046, 917344, 924496, 936782, 937143 en 938127.
Nog drie updates misten, maar deze bleken na streamen
toch niet te "pakken". Hier kom ik later nog op terug.
derde sessie:
[Hotfixes]
<drive>:\nLite\addons\sept2007\Home\938127.exe
<drive>:\nLite\addons\sept2007\Home\890046.exe
<drive>:\nLite\addons\sept2007\Home\917344.exe
<drive>:\nLite\addons\sept2007\Home\924496.exe
<drive>:\nLite\addons\sept2007\Home\936782.exe
<drive>:\nLite\addons\sept2007\Home\937143.exe
Nu bleek na install van de hiermee aangepaste unattended
dat nog drie updates misten. ( behalve ie7 en MP11):
923689, 891122 /902344.
Via XPstart.CMD uit "$OEM$ / $1 / Install" kon ik
in de unattended 902344 en 923689 na-updaten:
start /wait %systemdrive%\install\923689.exe /quiet /norestart
start /wait %systemdrive%\install\902344.exe /quiet /norestart
Voor 891122 kon ik geen oplossing vinden.
De unattended XP Home laat nu na installatie nog 3 items over
na full update (De knop "Aangepast") bij Microsoft, te weten:
IE7, MP11, (beide opzettelijk niet meegenomen) en KB891122.
.
Als basis een Retail XP home SP2 met nLite streamen:
eerste sessie:
[Hotfixes]
<drive>:\nLite\addons\sept2007\xpsp2_updatepack.7z
<drive>:\nLite\addons\sept2007\KB883667.exe
tweede sessie:
[Hotfixes]
<drive>:\nLite\addons\sept2007\Dotnet\netfx_beta_addon.7z
De hiermee aangepaste unattended bleek na install nog een
aantal updates te missen. (ie7 en MP11 buiten beschouwing)
890046, 917344, 924496, 936782, 937143 en 938127.
Nog drie updates misten, maar deze bleken na streamen
toch niet te "pakken". Hier kom ik later nog op terug.
derde sessie:
[Hotfixes]
<drive>:\nLite\addons\sept2007\Home\938127.exe
<drive>:\nLite\addons\sept2007\Home\890046.exe
<drive>:\nLite\addons\sept2007\Home\917344.exe
<drive>:\nLite\addons\sept2007\Home\924496.exe
<drive>:\nLite\addons\sept2007\Home\936782.exe
<drive>:\nLite\addons\sept2007\Home\937143.exe
Nu bleek na install van de hiermee aangepaste unattended
dat nog drie updates misten. ( behalve ie7 en MP11):
923689, 891122 /902344.
Via XPstart.CMD uit "$OEM$ / $1 / Install" kon ik
in de unattended 902344 en 923689 na-updaten:
start /wait %systemdrive%\install\923689.exe /quiet /norestart
start /wait %systemdrive%\install\902344.exe /quiet /norestart
Voor 891122 kon ik geen oplossing vinden.
De unattended XP Home laat nu na installatie nog 3 items over
na full update (De knop "Aangepast") bij Microsoft, te weten:
IE7, MP11, (beide opzettelijk niet meegenomen) en KB891122.
.
Re: SeptemberPack + BetaDotNet + updates (naar unattended gefixed)
Dat is normaal, want dit zijn hotfixes voor IE6 en WMP9.Ghost wrote:De hiermee aangepaste unattended bleek na install nog een aantal updates te missen. (ie7 en MP11 buiten beschouwing)
890046, 917344, 924496, 936782, 937143 en 938127.
Die zitten niet in het pack, net omdat er een IE7 en WMP11 addon is.
Ik heb de nieuwe .Net(beta) al een flink aantal keren geïnstalleerd,
en steeds met goed resultaat. Wat ik nu wel mis is een voortgangs-
indicator of tenminste een scherm-melding m.b.t. het installeren.
Als ik niet goed op de schijfindicator zou letten, wist ik niet beter
of de machine was vastgelopen na de reboot
Met dank,
Ghost
en steeds met goed resultaat. Wat ik nu wel mis is een voortgangs-
indicator of tenminste een scherm-melding m.b.t. het installeren.
Als ik niet goed op de schijfindicator zou letten, wist ik niet beter
of de machine was vastgelopen na de reboot

Met dank,
Ghost
dutch update pack
waar kan ik deze updates downloaden?
dutch update pack
lukt niet om te instaleren,
in de winrar
in de winrar
ik doe alles in 1 keer met nlite vanuit een xp sp220421 wrote:Robocop, gewoon op de dik gedrukte titels klikken (XP Post-SP2 Update Pack Dutch etc.)
Wat is de beste manier/volgorde om de update packs te slipstreamen(middels nlite), alles in een keer vanaf een "kale" XP-SP2 of pack voor pack vanuit de steeds ontstane nieuwe XP?
geen probs
Latest Changes:
WGA Removed
The menu bar is now visible by default
The Internet Explorer 7 online tour has updated how-to’s. Also, the “first-run” experience includes a new overview
We’ve included a new MSI installer that simplifies deployment for IT administrators in enterprises
het eerste zal velen interessen :p
WGA Removed
The menu bar is now visible by default
The Internet Explorer 7 online tour has updated how-to’s. Also, the “first-run” experience includes a new overview
We’ve included a new MSI installer that simplifies deployment for IT administrators in enterprises
het eerste zal velen interessen :p
-
- Posts: 214
- Joined: Sun Nov 06, 2005 2:36 pm
- Location: Holland
Ik kan me vaagjes herinneren dat er een probleem was met de microsoftsite. En aangezien dit alleen windowspakketjes zijn en geen office denk ik dat er daarom voor WU is gekozen. Maar MEULC zal het priecieze antwoord wel weten, hij bouwt de pakketjes immers...janpower wrote:ik heb nog een cdtje liggen met de updattes van april en als ik die instaleer dan staat de koppeling micosoft update in het start menu
maar dat wat niet mijn vraag
mijn vraag was
waarom windows update inplaats van microsoft update
is de microsoft update niet goed meer dan of zo?
-
- Posts: 214
- Joined: Sun Nov 06, 2005 2:36 pm
- Location: Holland
Klopt, het is immers weer patch dag geweestgryffin53 wrote:ik heb daarnet nog een aantal (4) updates gehad van microsoft..
mss tijd voor een nieuwe pack?

Ik krijg de volgende updates:
KB933729: Beveiligingsupdate voor Windows XP
KB939653: Cumulatieve beveiligingsupdate voor Internet Explorer 7 voor Windows XP
KB941202: Beveiligingsupdate voor Outlook Express voor Windows XP
Windows Hulpprogramma voor verwijderen van schadelijke software - okt 2007 (KB890830)
Update voor basiscertificaten
-
- Posts: 214
- Joined: Sun Nov 06, 2005 2:36 pm
- Location: Holland
http://core.tweakers.net/nieuws/49757/n ... maakt.htmlmuiz wrote:Is niet legaal om te posten hierarco wrote:De echte XP SP3 is gespotted op Connect.
>[url=hxxp://xxxxxx.com]Bron[/url]
Tis nou wel officieel niet illegaal als het op tweakers.net staat.
-
- Posts: 214
- Joined: Sun Nov 06, 2005 2:36 pm
- Location: Holland
Voor degene die de nieuwe packs willen testen:
XP Post-SP2 Update Pack Dutch
Windows Internet Explorer 7 Dutch Addon
Windows Media Player 11 Dutch Addon
Microsoft .Net Framework Dutch Addon
Opmerkingen:
Deze packs zijn enkel bedoeld voor de nedelandse versie van Windows XP (Home/Pro)
De zuiverste integratie is via RVMintegrator.
Nlite werkt in principe ook, maar daar lever ik geen support voor.
Het main updatepack bevat geen updates voor IE6 en WMP9!
Integreer je de addons niet, dan zullen deze updates verschijnen op Windows Update.
Als je de .net addon gebruikt, zullen er meldingen staan in het logboek.
Dit is doordat .net framework geinstalleerd wordt op T13, en deze meldingen zijn niet te vermijden.
Deze meldingen hebben echter geen gevolgen. Alles zal perfect werken.
Wil je dit echter niet, dan zul je .net framework handmatig moeten installeren nadat de windows setup volledig voltooid is.
XP Post-SP2 Update Pack Dutch
Windows Internet Explorer 7 Dutch Addon
Windows Media Player 11 Dutch Addon
Microsoft .Net Framework Dutch Addon
Opmerkingen:
Deze packs zijn enkel bedoeld voor de nedelandse versie van Windows XP (Home/Pro)
De zuiverste integratie is via RVMintegrator.
Nlite werkt in principe ook, maar daar lever ik geen support voor.
Het main updatepack bevat geen updates voor IE6 en WMP9!
Integreer je de addons niet, dan zullen deze updates verschijnen op Windows Update.
Als je de .net addon gebruikt, zullen er meldingen staan in het logboek.
Dit is doordat .net framework geinstalleerd wordt op T13, en deze meldingen zijn niet te vermijden.
Deze meldingen hebben echter geen gevolgen. Alles zal perfect werken.
Wil je dit echter niet, dan zul je .net framework handmatig moeten installeren nadat de windows setup volledig voltooid is.