Onepiece's Win2k3 post-SP2 Update Pack

Windows Server 2003 Update Pack discussion.
Post Reply
User avatar
nonno fabio
Posts: 1627
Joined: Mon Jun 06, 2005 10:36 am
Location: Northern Italy
Contact:

Onepiece's Win2k3 post-SP2 Update Pack

Post by nonno fabio » Sat Nov 24, 2007 2:46 am

Onepiece's Windows Server 2003 x86 Post-SP2 Update Pack

OnePiece Win2K3 Post-SP2 UpdatePack v1.0.1 FINAL ENU
Image Update (24 June 2017)
Image Update (24 June 2017)
Hash MD5 F9CBE65287F23DD2252C21B52DE70344
Filesize: 176 MB (184548439 bytes)

Onepiece's Windows 2003 Update Pack can be used along with Nlite from v1.4.9.1 and RVM Integrator from v1.6.1 b2.1, on a clean Server 2k3 SP2 ENU source.

The pack contains:
KB923845 - An update package for Background Intelligent Transfer Service (BITS) is now available for Windows Server 2003 and for Windows XP
KB925398 - MS06-078: Vulnerability in Windows Media Format could allow remote code execution
KB925902 - MS07-017: Vulnerability in GDI could allow remote code execution
KB929123 - MS07-034: Cumulative security update for Outlook Express and for Windows Mail
KB932168 - MS07-020: Vulnerability in Microsoft Agent could allow remote code execution
KB932716 -v2 - Description of the Image Mastering API v2.0 (IMAPIv2.0) update package that is dated June 26, 2007
KB933854 - Description of the security update for the .NET Framework 1.1 Service Pack 1 for Windows Server 2003: July 10, 2007
KB936357 -v2 - A microcode reliability update is available that improves the reliability of systems that use Intel processors
KB941569 - MS07-068: Vulnerability in Windows Media file format could allow remote code execution
KB942288 - Windows Installer 4.5 is available
KB942831 - MS08-005: Vulnerability in Internet Information Services could allow elevation of privileges
KB943295 - An update enables support for Storport virtual miniports in Windows Server 2003
KB943729 - Information about new Group Policy preferences in Windows Server 2008
KB944043 -v3 - Description of the Windows Server 2008 read-only domain controller compatibility pack for Windows Server 2003 clients and for Windows XP clients and for Windows Vista
KB944653 - MS07-067: Vulnerability in Macrovision driver could allow local elevation of privilege
KB948496 - An update to turn off default SNP features is available for Windows Server 2003-based and Small Business Server 2003-based computers
KB950762 - MS08-036: Vulnerabilities in Pragmatic General Multicast (PGM) could allow denial of service
KB950974 - MS08-049: Vulnerability in Event System could allow remote code execution
KB952004 - MS09-012: Description of the security update for MSDTC Transaction Facility: April 2009
KB952069 - MS08-076: Description of the security update for Windows Media Format Runtime 7.1, 9.0, 9.5, and 11 and Media Foundation: December 9, 2008
KB952954 - MS08-046: Vulnerabilities in Microsoft Windows Image Color Management could allow remote code execution
KB953155 - MS08-062: Vulnerability in Windows Internet Printing service could allow remote code execution
KB954155 - MS09-051: Description of the security update for Windows Media Audio Voice Decoder: October 13, 2009
KB954430 - MS08-069: Description of the security update for XML Core Services 4.0: November 11, 2008
KB954920 - When an application requests a result set from new SQL Server 2008 collations, you may receive an "MSG 40242" or "MSG 40205" error when the ODBC driver for SQL Server is used or an "MSG 40234" error when the SQL OLE DB provider is used
KB955417 - Protected storage (PStore) uses a lower-quality cryptographic function when the system locale is set to French (France) on a Microsoft Windows-based computer
KB955704 - Description of the exFAT file system driver update package
KB956572 - MS09-012: Description of the security update for Windows Service Isolation: April 2009
KB956802 - MS08-071: Vulnerabilities in GDI could allow remote code execution
KB956844 - MS09-046: Vulnerability in the DHTML Editing Component ActiveX control could allow remote code execution
KB958655 -v2 - Error message when you use Windows Installer (MSI) 4.5 to install multiple MSI packages in Windows Server 2008, Windows Vista, Windows Server 2003 or Windows XP: "API call rejected - No actions in Context"
KB960680 -v2 - An update is available to update the Slovak koruna currency symbol (Sk) to the Euro currency symbol (€) and to update the Turkish currency symbol from Yeni Türk Lirası (YTL) to Türk Lirası (TL)
KB960859 - MS09-042: Vulnerability in Telnet could allow remote code execution
KB961118 - All the PCL inbox printer drivers become unsigned after you install the Microsoft .NET Framework 3.5 Service Pack 1
KB963093 - MS09-023: Vulnerability in Windows Search could allow information disclosure
KB967723 - MS09-048: Vulnerabilities in Windows TCP/IP could allow remote code execution
KB968389 - Extended Protection for Authentication
KB969059 - MS09-057: Vulnerability in Indexing Service could allow remote code execution
KB970483 - MS09-020: Vulnerabilities in Internet Information Services (IIS) could allow elevation of privilege
KB971029 - Update to the AutoPlay functionality in Windows
KB971032 - MS09-040: Vulnerability in Message Queuing could allow elevation of privilege
KB971276 -v2 - You receive incorrect print output if the IPrintPipelineProgressReport interface is used in your printing application on a Windows XP SP3 or Windows Server 2003 SP2-based computer
KB971314 - All PCL inbox printer drivers become unsigned after you install the Microsoft .NET Framework 3.5 SP1 or the XPS Essentials Pack in Windows XP or in Windows Server 2003
KB971657 - MS09-041: Vulnerability in the Workstation Service could allow elevation of privilege
KB972270 - MS10-001: Vulnerability in the Embedded OpenType Font Engine could allow remote code execution
KB973507 - MS09-037: Description of the security update for the Active Template Library: August 11, 2009
KB973540 - MS09-037: Description of the security update for Windows Media Player: August 11, 2009
KB973815 - MS09-037: Description of the security update for Microsoft MSWebDVD ActiveX Control in Windows XP and Windows Server 2003: August 11, 2009
KB973825 - Error message when you try to install a large Windows Installer package or a large Windows Installer patch package in Windows Server 2003 Service Pack 2: "Error 1718 File was rejected by digital signature policy"
KB973869 - MS09-037: Description of the security update for the DHTML editing component ActiveX control: August 11, 2009
KB974112 - MS09-052: Vulnerability in Windows Media Player could allow remote code execution
KB974571 - MS09-056: Vulnerabilities in CryptoAPI could allow spoofing
KB975025 - MS09-051: Description of the security update for Audio Compression Manager: October 13, 2009
KB975254 - MS09-053: Vulnerabilities in FTP Service for Internet Information Services could allow remote code execution
KB973039 - MS09-066: Description of the security update for Active Directory Application Mode (ADAM): November 2009
KB973686 - Description of an update for MSXML Core Services 6.0 Service Pack 2
KB973904 - MS09-073: Description of the security update for Windows XP, Windows 2000, and Windows Server 2003: December 8, 2009
KB974318 - MS09-071: Vulnerabilities in the Internet Authentication service could allow remote code execution
KB974392 - MS09-069: Vulnerability in the Local Security Authority Subsystem service could allow denial of service
KB975558 - MS10-062: Vulnerability in MPEG-4 Codec could allow remote code execution
KB975560 - MS10-013: Description of the security update for Quartz: February 9, 2010
KB976323 - MS10-024: Description of the security update for Windows SMTP Service: April 13, 2010 and July 13, 2010
KB977816 - MS10-026: Vulnerability in Microsoft MPEG Layer-3 codec could allow remote code execution
KB977914 - MS10-013: Description of the security update for AVI filter: February 09, 2010
KB978338 - MS10-029: Vulnerability in Windows ISATAP Component could allow spoofing
KB978542 - MS10-030: Vulnerability in Outlook Express and Windows Mail could allow remote code execution
KB978695 - MS10-033: Description of the security update for Media Format Runtime 9, for Media Format Runtime 9.5, and for Media Format Runtime 11: June 8, 2010
KB978706 - MS10-005: Vulnerability in Microsoft Paint could allow remote code execution
KB979309 - MS10-019: Description of the security update for Windows Cabinet File Viewer Shell Extension: April 13, 2010
KB979482 - MS10-033: Description of the security update for Asycfilt.dll (COM component): June 8, 2010
KB979687 - MS10-083: Description of the security update for WordPad: October 12, 2010
KB979907 - MS10-041: Description of the security update for the .NET Framework 1.1 Service Pack 1 for x86-based versions of Windows Server 2003 and of Windows Server 2003 R2: June 8, 2010
KB980232 - MS10-020: Vulnerabilities in SMB client could allow remote code execution
KB982132 - MS10-076: Vulnerability in the Embedded OpenType Font Engine could allow remote code execution
KB982316 - An update is available for the Windows Telephony Application Programming Interface (TAPI)
KB982666 - MS10-040: Vulnerability in Internet Information Services could allow remote code execution
KB2115168 - MS10-052 Vulnerability in Microsoft MPEG Layer-3 codecs could allow remote code execution
KB2124261 - MS10-065: Description of the security update for Internet Information Services ASP: September 14, 2010
KB2229593 - MS10-042: Vulnerability in Help and Support Center could allow remote code execution
KB2264107 - A new CWDIllegalInDllSearch registry entry is available to control the DLL search path algorithm
KB2345886 - Description of the update that implements Extended Protection for Authentication in the Server service
KB2347290 - MS10-061: Vulnerability in Print Spooler Service could allow remote code execution
KB2378111 - MS10-082: Vulnerability in Windows Media Player could allow remote code execution
KB2387149 - MS10-074: Vulnerability in Microsoft Foundation Classes could allow remote code execution
KB2393802 - MS11-011: Vulnerabilities in Windows Kernel could allow elevation of privilege
KB2419635 - MS11-002: Description of the security update for Microsoft Data Access Components 2.8 Service Pack 2: January 11, 2011
KB2423089 - MS10-096: Vulnerability in Windows Address Book could allow remote code execution
KB2443105 - MS10-097: Insecure Library Loading in Internet Connection Signup Wizard could allow remote code execution
KB2443685 - December 2010 cumulative time zone update for Windows operating systems
KB2476490 - MS11-038: Vulnerability in OLE Automation could allow remote code execution: June 14, 2011
KB2478953 - MS11-005: Vulnerability in Active Directory could allow denial of service
KB2478960 - MS11-014: Vulnerability in Local Security Authority Subsystem Service could allow local elevation of privilege
KB2478971 - MS11-013: Description of the security update for Kerberos in Windows XP and in Windows Server 2003: February 8, 2011
KB2481109 - MS11-017: Description of the security update for Remote Desktop client 6.1 and Remote Desktop client 6.0: March 8, 2011
KB2483185 - MS11-006: Vulnerability in Windows Shell Graphics Processing could allow remote code execution
KB2485663 - MS11-033: Vulnerability in WordPad text converters could allow remote code execution: April 12, 2011
KB2491683 - MS11-024: Description of the security update for Windows Fax Cover Page Editor: April 12, 2011
KB2492386 - Application Compatibility Update for Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2: April 2011
KB2506212 - MS11-024: Description of the security update for Windows Fax Cover Page Editor MFC components: April 12, 2011
KB2508429 - MS11-020: Vulnerabilities in SMB Server could allow remote code execution: April 12, 2011
KB2518295 - MS11-051: Vulnerability in Active Directory Certificate Services Web Enrollment could allow elevation of privilege: June 14, 2011
KB2535512 - MS11-042: Vulnerabilities in Distributed File System could allow remote code execution: June 14, 2011
KB2536276-v2 - MS11-043: Vulnerability in SMB Client could allow remote code execution: June 14, 2011
KB2544893-v2 - MS11-037: Vulnerability in MHTML could allow information disclosure: June 14, 2011
KB2564958 - MS11-058: Vulnerabilities in DNS Server could allow remote code execution: August 9, 2011
KB2566454 - MS11-062: Vulnerability in Remote Access Service NDISTAPI driver could allow elevation of privilege: August 9, 2011
KB2570947 - MS11-071: Vulnerability in Windows Components could allow remote code execution: September 13, 2011
KB2571621 - MS11-070: Vulnerability in WINS could allow elevation of privilege: September 13, 2011
KB2584146 - MS12-005: Vulnerability in Microsoft Windows could allow remote code execution: January 10, 2012
KB2598479 - MS12-004: Description of the security update for Windows Multimedia Library for Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008: January 10, 2012
KB2603381 - MS12-002: Vulnerability in Windows Object Packager could allow remote code execution: January 10, 2012
KB2620712 - MS11-097: Vulnerability in Windows Client/Server Runtime Subsystem could allow elevation of privilege: December 13, 2011
KB2631813 - MS12-004: Description of the security update for DirectShow: January 10, 2012
KB2638806 - MS12-006: Description of the security update for Winhttp in Windows Server 2003 and Windows XP Professional x64 Edition: January 10, 2012
KB2644615 - MS12-001: Vulnerability in Windows Kernel could allow security Feature bypass: January 10, 2012
KB2647170 - MS12-017: Vulnerability in DNS Server could allow denial of service: March 13, 2012
KB2655992 - MS12-049: Vulnerability in TLS could allow information disclosure: July 10, 2012
KB2685939 - MS12-036: Vulnerabilities in Remote Desktop could allow remote code execution: June 12, 2012
KB2686509 - Known issues that occur when you install update 2509553 for Windows Server 2003
KB2691442 - MS12-048: Vulnerability in Windows Shell could allow remote code execution: July 10, 2012
KB2698365 - MS12-045: Vulnerability in Microsoft Data Access Components could allow remote code execution: July 10, 2012
KB2705219 v2 - MS12-054: Description of the security update for Windows Networking Components: August 14, 2012
KB2712808 - MS12-054: Description of the security update for Windows Networking Components: August 14, 2012
KB2727528 - MS12-072: Vulnerabilities in Windows shell could allow remote code execution: November 13, 2012
KB2742604 - MS13-004: Description of the security update for the .NET Framework 1.1 Service Pack 1 on x86-based versions of Windows Server 2003 Service Pack 2: January 8, 2013
KB2748349 - Corrupted files are found in backup data that is restored by using the Windows Volume Shadow Copy feature in Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, or Windows Server 2008 R2
KB2749655 - Microsoft Security Advisory: Compatibility issues affecting signed Microsoft binaries
KB2770660 - MS12-082: Vulnerability in DirectPlay could allow remote code execution: December 11, 2012
KB2772930 - MS13-032: Description of the security update for Active Directory: April 9, 2013
KB2780091 - MS13-011: Vulnerability in media decompression could allow remote code execution: February 12, 2013
KB2803821 v2 - MS13-057: Description of the security update for Windows Media Format Runtime 9 and 9.5 (wmvdmod.dll), and for Windows Media Player 11 and 12: July 9, 2013
KB2807986 - MS13-027: Vulnerabilities in Windows Kernel-Mode drivers could allow elevation of privilege: March 12, 2013
KB2808679 - Update that protects from internal URL port scanning is available for Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, Windows Server 2008 R2, Windows 8, and Windows Server 2012
KB2813345 - MS13-029: Description of the security update for Remote Desktop Connection 6.1 Client: April 9, 2013
KB2820917 - MS13-033: Vulnerability in Windows Client/Server Run-time Subsystem (CSRSS) could allow elevation of privilege: April 9, 2013
KB2836198 - An update is available that removes the CSP signature check in Windows XP SP3 and Windows Server 2003 SP2
KB2838727 - MS13-048: Vulnerability in Windows kernel could allow information disclosure: June 11, 2013
2833949
KB2847311 - MS13-081: Description of the security update for kernel-mode drivers: October 8, 2013
KB2859537 - MS13-060: Vulnerability in Unicode Scripts Processor could allow remote code execution: August 13, 2013
KB2862152 - Microsoft security advisory: Vulnerability in DirectAccess could allow security feature bypass
KB2862330 - MS13-081: Description of the security update for USB drivers: October 8, 2013
KB2862335 - MS13-081: Description of the security update for USB drivers: October 8, 2013
KB2864058 - MS13-083: Vulnerability in Windows Common Control Library could allow remote code execution: October 8, 2013
KB2864063 - MS13-071: Vulnerability in Windows Theme file could allow remote code execution: September 10, 2013
KB2868038 - MS13-081: Description of the security update for USB drivers: October 8, 2013
KB2868626 - MS13-095: Vulnerability in XML digital signatures could allow denial of service: November 12, 2013
KB2868846 - MS13-066: Description of the security update for Active Directory Federation Services 1.x: August 13, 2013
KB2876217 - MS13-070: Vulnerability in OLE could allow remote code execution: September 10, 2013
KB2876331 - MS13-089: Vulnerability in Windows Graphics Device Interface could allow remote code execution: November 12, 2013
KB2884256 - MS13-081: Description of the security update for USB drivers: October 8, 2013
KB2892075 - MS13-099: Description of the security update for Windows Script 5.7: December 10, 2013
KB2893294 - MS13-098: Vulnerability in Windows could allow remote code execution: December 10, 2013
KB2894845 - Description of the security update for the .NET Framework 1.1 Service Pack 1 on Windows Server 2003 Service Pack 2 32-bit Edition: December 10, 2013
KB2898715 - MS13-102: Vulnerability in LRPC client could allow elevation of privilege: December 10, 2013
KB2900986 - MS13-090: Cumulative security update for ActiveX Kill Bits: November 12, 2013
KB2901115 - MS14-009: Description of the security update for the .NET Framework 1.1 Service Pack 1 for Windows Server 2003 Service Pack 2: February 11, 2014
KB2914368 - MS14-002: Vulnerability in Windows kernel could allow elevation of privilege: January 14, 2014
KB2922229 - MS14-019: Vulnerability in Windows file handling component could allow remote code execution: April 8, 2014
KB2923392 - MS14-016: Description of the security update for Active Directory: March 11, 2014
KB2926765 - MS14-027: Description of the security update for Windows systems that have update 2919355 installed: May 13, 2014
KB2927811 - Password cannot be changed in a Windows Server 2003 SP2 domain
KB2929961 - MS14-013: Vulnerability in Microsoft DirectShow could allow remote code execution: March 11, 2014
KB2930275 - MS14-015: Vulnerabilities in Windows kernel mode driver could allow elevation of privilege: March 11, 2014
KB2931352 - MS14-026: Description of the security update for the .NET Framework 1.1 Service Pack 1 on Windows Server 2003 Service Pack 2 32-bit Edition: May 13, 2014
KB2933528 - MS14-016: Description of the security update for Active Directory Application Mode: March 11, 2014
KB2935092 - Daylight saving time (DST) changes for Chile, Turkey, and Paraguay
KB2939576 - MS14-033: Description of the security update for MSXML: June 10, 2014
KB2957503 - MS14-036: Description of the security update for Windows 7, Windows Server 2008 R2, Windows Server 2008, Windows Vista, and Windows Server 2003: June 10, 2014
KB2957509 - MS14-033: Description of the security update for MSXML: June 10, 2014
KB2961072 - MS14-040: Description of the security update for an ancillary function driver: July 8, 2014

Internet Explorer 8 (uninstallable from Windows Component Wizard and a clean 2003 source), included:
KB2467659 - An update is available for Internet Explorer: December 14, 2010
KB2598845 - A Compatibility View list update is available for Windows Internet Explorer 8: October 25, 2011
KB2632503 - FIX: Array elements in very large loops may be returned as undefined in JScript 5.8
KB2909210 - MS14-011: Description of the security update for Visual Basic Scripting Edition (VBScript) 5.8: February 11, 2014
KB2962872 - MS14-035: Security update for Internet Explorer versions 6, 7, 8, 9, 10, and 11: June 10, 2014

Microsoft.NET Framework 3.5 SP1 family (v2.0.50727.3658+v3.2.30729.4058.2+v3.5.30729.4056.2 - February 2014 update)
Microsoft.NET Framework 4.0 (v4.0.30319.1022 - February 2014 update)
DirectX for WinXP Post-SP3 June 2010 Update (including DirectX for Managed Code for .NET 1.x)
Windows Update v7.6.7600.256 (including Windows Update Web Control v7.6.7600.257)
Microsoft Update v7.6.7600.257
Microsoft Update Catalog Web Control v7.4.7057.249
Adobe Flash Player v14.0.0.145 ActiveX control
Windows Imaging Component v3.0.0.0
(KB890830) Malicious Software Removal Tool v5.14
(KB940157) Windows Search 4.0 (including KB915800-v9)
(KB952011) Image Mastering API
(KB955360-v3) Windows Script 5.7
(KB968930) Windows Management Framework Core - includes: Windows PowerShell 2.0 and WinRM 2.0
(KB979099) Windows Rights Management Client
(KB2758694) MSXML 4.0 SP3
(KB2957482) MSXML 6.0 SP2
(KB2917500) Revoked Roots
(KB2932677) Microsoft Silverlight v5.1.30214.0


changelog:
1.0.1 (2007-11-23): first release
1.1.0 (2007-11-27): updated KB936357 to v2
1.1.1 (2007-12-08 ): added KB925876-v2 and KB943295
1.2.0-1.2.1 (2007-12-19): added KB941568, KB941569, KB942615, KB942763, KB942840, KB944653 and KB945007; removed KB933360 and KB939653
1.3.0 (2008-01-10): added KB941644 and KB943485
1.3.1 (2008-01-23): added KB932762
1.4.0 (2008-02-20): added KB942830, KB942831, KB943055, KB943484, KB944533, KB947518 and KB946026; removed KB921503, KB926122, KB942615 and KB945007
1.5.0 (2008-06-23): removed KB927891, KB938127, KB941568, KB944533 and KB947518; added IE7, KB933579, KB941693, KB941833, KB942288, KB943729, KB945553, KB948496, KB948590, KB949269, KB950760, KB950762, KB951698, Microsoft Update v7.0.6000.381, Windows Update v7.1.6001.65, Microsoft Silverlight v1.0.30401.0 and Flash Player v9.0.124.0
1.6.0 (2008-07-13): added full DirectX, KB943729 (new release), KB951072 and KB951748; removed KB941644 and KB942763
1.7.0 (2008-08-25): added KB889333-IE7, KB928090-IE7, KB935560-IE7, KB949014, KB950582, KB950974, KB951066, KB951072-v2, KB952954, KB953838-IE7, KB953839, KB955417, Microsoft Update & Windows Update v7.2.6001.784, Microsoft Update Catalog Web Control v7.0.6000.569, Microsoft Silverlight v1.0.30716.0, Microsoft Windows Malicious Software Removal Tool v2.1, Directx August Update;
removed KB941202, KB942840, KB943460, KB943484, KB950759-IE7, KB951072
1.8.0 (2008-09-14): added KB938464; updated KB943729; unified Nlite and RVMi versions
1.9.0 (2008-10-20): added KB956390-IE7 (supersedes KB953838-IE7), KB953155, KB954211 (supersedes KB941693), KB954920, KB956391 (supersedes KB953839), KB956803, KB956841 (supersedes KB931784), KB957095; updated Malware Removal Tool to v2.3, Microsoft Silverlight to v2.0.31005.0, Flash Player to v10.0.12.36
2.0.0 (2008-11-25) Added KB958644, KB954430 (supersedes KB941833), KB954459 (supersedes KB933579), KB955069 (supersedes KB936021), KB957097; updated Windows Update to v7.2.6001.788 and MRT to 2.4
2.1.0 (2009-01-22) Added KB958215-IE7 (supersedes KB956390), KB960714-IE7, KB952069, KB954600, KB955839 (supersedes KB951072-v2), KB956802 (supersedes KB948590), KB958655, KB958687 (supersedes KB957095), KB958752 (supersedes KB956803), KB940157 (WindowsSearch & KB915800-v9), MRT to 2.6, and qfecheck.exe.
2.2.0 (2009-04.23) added KB923561, KB938464-v2 (supersedes KB938464), KB952004, KB956572 (supersedes KB956841 & KB943485), KB958655-v2 (supersedes KB958655), KB958690 (supersedes KB954211), KB959426 (supersedes KB935839), KB960225 (supersedes KB935840), KB960680-v2, KB960715 (supersedes KB956391 & KB950760) KB960803, KB961373 (supersedes KB951698), KB967715 (supersedes KB950582), (KB952011) Image Mastering API, (KB926139-v2) Windows PowerShell 1.0 (requires .NET Framework 2.0); updated (KB890830) Malware Removal Tool to v2.9, MSXML 4.0 to SP3 v4.30.2100.0, DirectX to March Update, (KB955305) Microsoft Silverlight to v2.0.40115.0, Adobe Flash Player to v10.0.22.87, Internet Explorer to v8 (Roll Back enabled); Improved Windows Search integration
2.3.0 (2009-06-16): KB957579 (supersedes KB945553 KB951748 KB958752), KB961501, KB963093, KB968537 (supersedes KB958690), KB969805 (supersedes KB949014), KB969897-IE8, KB969898 (supersedes KB960715), KB970238 (supersedes KB933729), KB970437, KB970483, KB971180-IE8, KB926141 powershell mui pack, updated Malware Removal Tool to v2.11
2.3.1 (2009-06-24): added KB944043-v5 and KB971930_IE8 (supersedes KB971180_IE8); improved Winnt32.exe setup compatibility
2.4.0 (2009-07-17): added KB961371, KB971633 (supersedes KB961373), KB973346 (supersedes KB969898); updated Microsoft Silverlight to v3.0.40624.0, MRT to v2.12
2.4.1 (2009-07-25): added KB970653-v3 (supersedes KB955839)
KB972636-IE8 (supersedes KB971930-IE8)
2.4.2 (2009-07-30): added KB972260-IE8 (supersedes KB969897-IE8), KB973825
2.4.3 (2009-07-31): updated Adobe Flash Player to v10.0.32.18, Microsoft Silverlight to v3.0.40723.0
2.5.0 (2009-08-15): added KB956744, KB960859, KB968389 (supersedes KB960225), KB971032, KB971557, KB971657, KB973354, KB973507, KB973815, KB973869, MRT to v2.13
2.6.0 (2009-09-15): added KB955704, KB956844, KB958911 (supersedes KB938464-v2), KB961371-v2 (supersedes KB961371), KB967723, KB968816, KB971029 (supersedes KB967715), KB971276-v2, KB971314, KB971961-IE8, KB973540 (supersedes KB936782), KB973874-IE8 (supersedes KB); updated MU & WU to v7.4.7600.226, SilverLight to v3.0.40818.0, DirectX Updates to August 2009 release
2.7.0 (2009-10-17): added KB974455-IE8 (supersedes KB972260-IE8), KB932716-v2, KB953298, KB954155, KB958869 (supersedes KB958911), KB969059, KB971486, KB973525 (supersedes KB973346), KB974112, (supersedes KB954600), KB974571, KB975025, KB975254, KB975467; updated Malware Removal Tool to v3.0
2.8.0 (2009-12-13): Updated MRT to v3.2; Adobe Flash Player to v10.0.42.34, KB943729; added KB969947 (supersedes KB968537), KB971513, KB971726, KB971737 (supersedes KB960803), KB973037 (supersedes KB969805), KB973039 (supersedes KB949269), KB973685, KB973686 (supersedes KB954459), KB973687 (supersedes KB955069), KB973904, KB973917, KB974318, KB974392, KB975364-IE8 (supersedes KB973874-IE8), KB976098-v2 (supersedes KB970653-v3), KB976325-IE8 (supersedes KB974455-IE8), Microsoft Update Catalog Web Control v7.4.7057.223, Windows Imaging Component v3.0.0.0, Windows Management Framework Core (KB968930) - includes: Windows PowerShell 2.0 and WinRM 2.0
2.9.0 (2010-02-17): added KB971468 (supersedes KB958687), KB972270 (supersedes KB961371-v2), KB975560 (supersedes KB971633), KB975713, KB977165 (supersedes KB971486), KB977290, KB977377 (supersedes KB975467), KB977914 (supersedes KB971557), KB978037, KB978251 (supersedes KB957097), KB978262 (supersedes KB973525), KB978506-IE8 (supersedes KB975364-IE8), KB978207-IE8 (supersedes KB976325-IE8), KB978706, Windows Rights Management Client (KB979099); updated Microsoft Silverlight to v3.0.50106.0, Adobe Flash Player to v10.0.45.2, (KB890830) MRT to v3.4
3.0.0 (2010-03-10): added KB973917-v2 (supersedes KB973917),
KB976002-v5, KB976662-IE8 (supersedes KB971961-IE8), KB979306 (supersedes KB976098-v2); added Windows Script 5.7 (KB955360-v3) - uninstallable from Windows Component Wizard (a clean W2k3 source is needed then IE7/IE8 must be reinstalled); updated MRT to v3.5
3.1.0 (2010-04-17) added KB961118, KB976323, KB977816, KB978338, KB978601, KB979309, KB979683 (supersedes KB977165), KB980182-IE8 (supersedes KB978207), KB980232 (supersedes KB978251), KB980302-IE8 (supersedes KB978506), KB981332-IE8, Microsoft.NET Framework v3.5 SP1; updated Silverlight to v4, MRT to v3.6
3.1.1 (2010-04-26): added .Net Framerwork 4.0; added a link to MRT in Control Panel
3.2.0-100513: added KB978542 (supersedes KB951066 and KB973354); updated MRT to v3.7
3.3.0-100611: added KB982381-IE8 (supersedes KB980182-IE8), KB982632-IE8 (supersedes KB980302-IE8), KB975562, KB978695 (supersedes KB968816), KB979482, KB979559 (supersedes KB969947), KB979907, KB979909, KB980195 (supersedes KB978262), KB980218 (supersedes KB952909-v2), KB981793 (supersedes KB979306), KB982168, KB982666 (supersedes KB973917-v2); updated DirectX Updates to June 2010, Adobe Flash Player to v10.1.53.64, Silverlight to v.4.0.50524.0, MRT to v3.8
3.4.0-100716: added KB2229593, KB2264107 (supersedes KB946026); updated Windows Update to v7.4.7600.229, MRT to v3.9, MSXML6 to v6.20.2005.0 (KB982847), .NET 4.0 to v4.0.30320 (added KB982638, KB2028562, KB2028391, KB2066987), .NET 3.5 to latest build; new feature: .NETs are uninstallable from Add/Remove Windows Components window
3.5.0-100815: added KB980436 (supersedes KB977377), KB982214 (supersedes KB971468), KB982316, KB2079403 (supersedes KB973687), KB2115168, KB2160329 (supersedes KB979559), KB2286198, KB982664-IE8 (supersedes KB982632), KB2183461-IE8 (supersedes KB982381); updated MRT to v3.10, Adobe Flash Player 10 ActiveX to v10.1.82.76; switched .Net updates from QFE to GDR branch to improve MU/WU compatibility
3.6.0-101110: added KB975558, KB979687, KB981322, KB981550 (supersedes KB973037), KB981957 (supersedes KB2160329), KB982000 (supersedes KB970437 & KB973039), KB982132, KB2121546 (supersedes KB930178), KB2124261 (supersedes KB942830), KB2141007, KB2158563 (supersedes KB981793), KB2259922 (supersedes KB923561), KB2279986 (supersedes KB980218), KB2296011, KB2345886 (supersedes KB982214), KB2347290, KB2360937 (supersedes KB970238), KB2378111, KB2387149 (supersedes KB924667-v2), KB2388210 (supersedes KB955759), KB2416451, KB2360131-IE8 (supersedes KB2183461); updated (KB890830) MRT to v3.13, all DotNets, Flash Player to v10.1.102.64, Microsoft Silverlight to v4.0.50917.0
3.7.0-110210: KB2393802 (supersedes KB979683), KB2419635, KB2423089, KB2440591, KB2443105, KB2443685 (supersedes KB2158563), KB2476687 (supersedes KB978037), KB2478953 (supersedes KB2207559), KB2478953 (supersedes KB981550), KB2478960, KB2478971 (supersedes KB977290), KB2479628 (supersedes KB2436673 & KB981957), KB2483185 (supersedes KB2286198), KB2485376 (supersedes KB2296199 & bKB2279986), KB923845, KB2482017-IE8 (supersedes KB2416400-IE8 & KB2360131-IE8), IE KB2467659; updated MRT to v3.16, Microsoft Silverlight to v4.0.51204.0, Adobe Flash Player to v10.2.152.26
3.8.0-111220: added KB2412687 (supersedes KB958869), KB2443685 (supersedes KB2570791), KB2476490 (supersedes KB943055), KB2481109 (supersedes KB925876 & KB956744), KB2485663 (supersedes KB2259922), KB2491683, KB2492386 (supersedes KB2388210), KB2506212, KB2507618 (supersedes KB2485376), KB2508429, KB2509553 (supersedes KB957579), KB2518295, KB2535512, KB2536276-v2 (supersedes KB2616676 & KB2607712 & KB2536276 & KB2524375 & KB2511455), KB2544893-v2 (supersedes KB2141007 & KB2544893 & KB2503658), KB2562485, KB2564958 (supersedes KB971513), KB2566454, KB2567680 (supersedes KB2121546), KB2570222, KB2570947, KB2571621, KB2572069 (supersedes KB953298), KB2592799 (supersedes KB2503665), KB2618451 (supersedes KB980195 & KB2562937 & KB2508272) KB2620712 (supersedes KB2476687), KB2621146 (supersedes KB2601626), KB2624667, KB2626416 (supersedes KB982000 & KB2616310), KB2633171, KB2639417 (supersedes KB2479628 & KB2567053 & KB2555917 & KB2525694 & KB2506223), KB2641690 v2, KB2510531-IE8 (supersedes KB976662-IE8 & KB981332-IE8), KB2544521-IE8, KB2618444-IE8 (supersedes KB2586448-IE8 & KB2559049-IE8 & KB2530548-IE8 & KB2497640-IE8 & KB2482017-IE8); updated Microsoft.NET Framework 3.5 to v3.5.30729.3644.5 (October 2011), Microsoft.NET Framework 4 to v4.0.30319.239 (October 2011), MRT to v4.3, Adobe Flash Player 11 ActiveX to v11.1.102.55, Microsoft Silverlight to v5.0.61118.0, Windows Update to v7.4.7600.243
3.9.0-120113: added KB2584146, KB2585542 (supersedes KB980436), KB2598479, KB2603381, KB2631813 (supersedes KB975562), KB2638806 (supersedes KB971737), KB2644615, KB2646524 (supersedes KB2567680), KB2656358 (supersedes KB2416451), KB2632503-IE8; updated MRT to v4.4, all DotNets to january releases
4.0.0-20120217: added KB2647516-IE8 (supersedes KB2618444-IE8), KB2657025 (supersedes KB2633952-v2), KB2660465 (supersedes KB2639417), KB2645640 (supersedes KB2592799); updated MRT to v4.5, Adobe Flash Player ActiveX to v11.1.102.62, .net 3.5 family and 4.0 to latest builds.
4.0.1-20120221: fixed a bug with Windows Presentation Foundation Font Cache 4.0.0.0 service
4.1.0-20120319: added KB2621440 (supersedes KB2570222), KB2641653 (supersedes KB2660465), KB2647170 (supersedes KB2562485), KB2647518 (supersedes KB2618451); updated (KB890830) MRT to v4.6, Adobe Flash Player 11 ActiveX to v11.1.102.63, Microsoft.NET Framework 4.0 to v4.0.30319.276.1 - March 2012
4.2.0-20120412: added KB2675157-IE8 (supersedes KB2647516-IE8), KB2653956 (supersedes KB978601), KB2656376, KB2669182 (supersedes KB2509553); updated Malicious Software Removal Tool to v4.7, Adobe Flash Player 11 ActiveX to v11.2.202.228, .net 3.5 family and 4.0 to latest builds.
4.3.0-20120726: added KB2604078 (supersedes KB2572069), KB2655992 (supersedes KB2585542), KB2656376-v2 (supersedes KB2656376), KB2659262 (supersedes KB2412687), KB2685939 (supersedes KB2621440), KB2686509, KB2691442, KB2695962 (supersedes KB2647518), KB2698365, KB2698707 (supersedes KB2657025), KB2707511 (supersedes KB2676562 & KB2633171), KB2718523 (supersedes KB2709162 & KB2641653), KB2718704 (supersedes KB2641690-v2), KB2719985 (supersedes KB2079403), KB2699988-IE8 (supersedes KB2675157-IE8) MSXML 6.0 SP2 (KB2721693) (supersedes KB982847), MSXML 4.0 SP3 Parser (KB2721691) (supersedes KB973685); updated MRT to v4.10, Microsoft Silverlight to v5.1.10411.0, Adobe Flash Player ActiveX to v11.3.300.257, Windows Update to v7.6.7600.256 (including Windows Update Web Control v7.6.7600.257), Microsoft Update to v7.6.7600.257, Microsoft Update Catalog Web Control to v7.4.7057.249; added Revoked Roots (KB2728973)
4.4.0-20120816: added KB2661254 (supersedes KB2718704), KB2705219 (supersedes KB932762 & KB958644), KB2712808 (supersedes KB961501), KB2731847 (supersedes KB2718523), KB2732052 (supersedes KB2698707), KB2722913-IE8 (supersedes KB2699988-IE8); updated
Adobe Flash Player ActiveX to v11.3.300.271, MRT to v4.11
4.5.0-20120911: added KB2736233 (supersedes KB2695962); updated (KB890830) MSRT to v4.12, Adobe Flash Player 11 ActiveX to v11.4.402.265
4.5.1-20120921: added KB2744842-IE8 (supersedes KB2722913-IE8); updated Adobe Flash Player ActiveX to v11.4.402.278
4.6.0-20121015: added KB2705219-v2 (supersedes KB2705219), KB2724197 (supersedes KB2707511), KB2731847-v2 (supersedes KB2731847), KB2749655, KB2756822 (supersedes KB2732052); updated (KB890830) MSRT to v4.13, Adobe Flash Player 11 ActiveX to v11.4.402.287
4.7.0-20121116: added KB2698032, KB2727528, KB2761226 (supersedes KB2731847-v2); updated MSRT to v4.14, Adobe Flash Player ActiveX to v11.5.502.110, Microsoft.NET Framework 3.5 family to v3.5.30729.3678.4, Microsoft.NET Framework 4.0 to v4.0.30319.298
4.8.0-20121212: added KB2748349, KB2753842 (supersedes KB2507618), KB2758857 (supersedes KB959426), KB2761465-IE8 (supersedes KB2744842-IE8), KB2770660, KB2779030 (supersedes KB2761226), KB2779562 (supersedes KB2756822); updated (KB890830) MSRT to v4.15, Adobe Flash Player 11 ActiveX to v11.5.502.135
4.8.1-20121221: added KB2753842-v2 (supersedes KB2753842)
4.9.0-20130111: added KB2742604 (supersedes KB2698032, KB2604078, KB2656376-v2), (KB2758694) MSXML4 SP3 (supersedes MSXML4 SP3 KB2721691), (KB2758696) MSXML 6 SP2 v6.20.2016.0 (supersedes MSXML6 SP2 KB2721693), (KB2798897) rvkroots (supersedes rvkroots KB2728973); updated Microsoft Malicious Software Removal Tool to v4.16, Adobe Flash Player ActiveX Control to 11.5.502.146, all Microsoft.NET Frameworks to January 2013 releases
4.9.1-20130114: added KB2799329
5.0.0-20130213: added KB2778344 (supersedes KB2779030), KB2780091, KB2794119 (supersedes KB2779562), KB2799494 (supersedes KB2724197), KB2792100-IE8 (supersedes KB2761465-IE8), KB2797052-IE8 (supersedes KB2544521-IE8); updated MSRT to v4.17, Adobe Flash Player ActiveX to v11.6.602.168, Microsoft.NET Frameworks 3.5 sp1 family and 4.0 to January 2013 releases
5.1.0-20130313: added KB2807986, KB2809289-IE8 (supersedes KB2792100-IE8); updated MSRT to v4.18, Adobe Flash Player ActiveX to v11.6.602.180,
Microsoft Silverlight to v5.1.20125.0
5.2.0-20130410: added KB2772930 (supersedes KB2621146), KB2801109 (supersedes KB2626416), KB2808735 (supersedes KB2778344), KB2813170 (supersedes KB2799494), KB2813345, KB2817183-IE8 (supersedes KB2809289-IE8 KB2797052-IE8), KB2820917 (supersedes KB2646524); updated MRT to v4.19, Adobe Flash Player ActiveX to v11.7.700.169
5.3.0-20130515: added KB2820197 (supersedes KB2736233), KB2829361 (supersedes KB2808735), KB2836198 (supersedes KB973825), KB2829530-IE8 (supersedes KB2817183-IE8), KB2847204-IE8; updated Microsoft Malicious Software Removal Tool to v4.20, Adobe Flash Player ActiveX to v11.7.700.202, Microsoft.NET Framework 3.5 SP1 family to v3.5.30729.4039.2, Microsoft.NET Framework v.4.0 to v4.0.30319.1004
5.4.0-20130612: added KB2808679 (supersedes KB2661254-v2), KB2838727-IE8 (supersedes KB2829530-IE8 & KB2847204-IE8), KB2839229 (supersedes KB2813170); updated MSRT to v5.1, Adobe Flash Player ActiveX to v11.7.700.224, Microsoft.NET Framework 3.5 family to v3.5.30729.4051 (Update June 2013), Microsoft.NET Framework 4.0 to v4.0.30319.1008 (Update June 2013)
5.5.0-20130713: added KB2803821, KB2833949, KB2834886 (supersedes KB2659262), KB2845187, KB2846071-IE8 (supersedes KB2838727-IE8), KB2850851 (supersedes KB2829361); updated MSRT to v5.2, Microsoft Silverlight to v5.1.20513.0 (KB2847559), Adobe Flash Player ActiveX to v11.8.800.94, Microsoft.NET Framework 3.5 SP1 family to v2.0.50727.3650+v3.2.30729.4050+v3.5.30729.4052 - July 2013, Microsoft.NET Framework to 4.0 (v4.0.30319.1009) - July 2013
5.6.0-20130814: added KB2849470 (supersedes KB2360937), KB2850869 (supersedes KB981322), KB2859537 (supersedes KB2839229), KB2862772-IE8 (supersedes KB2846071-IE8), KB2863058 (supersedes KB2794119), KB2868846 (supersedes KB971726); updated MSRT to v5.3; Microsoft.NET Framework v3.5 family to August releases (v3.5.30729.4052.1), Microsoft.NET Framework v4.0 to August release (v4.0.30319.1015)
5.7.0-20130911: added KB2870699-IE8 (supersedes KB2862772-IE8), KB2803821-v2 (supersedes KB2803821), KB2864063, KB2876217 (supersedes KB2624667), KB2876315 (supersedes KB2850851); updated MRT to v5.4, Adobe Flash Player ActiveX to v11.8.800.168
5.8.0-20131010: added KB2847311 (supersedes KB2753842-v2), KB2862330, KB2862335, KB2864058 (supersedes KB2296011), KB2868038, KB2883150 (supersedes KB2876315), KB2884256, KB2879017-IE8 (supersedes KB2870699-IE8); updated MRT to v5.5, Adobe Flash Player ActiveX to v11.9.900.117, Silverlight v5.1.20913.0, Microsoft.NET Framework 3.5 family to v3.5.30729.4056 (October GDR updates)
Microsoft.NET Framework 4 to v4.0.30319.1016 (October GDR updates)
5.9.0-20131113: added KB2862152 (supersedes KB974392), KB2868626, KB2876331 (supersedes KB959554), KB2890882 (supersedes KB2863058), KB2900986 (supersedes KB2820197), KB2888505-IE8 (supersedes KB2879017-IE8); updated MRT to v5.6, Adobe Flash Player ActiveX to v11.9.900.152
6.0.0.-20131211: added KB2892075, KB2893294 (supersedes KB2653956), KB2893984 (supersedes KB2883150), KB2898715 (supersedes KB2849470), KB2898785-IE8 (supersedes KB2888505-IE8), KB2904266 (supersedes KB2890882); updated Adobe Flash Player ActiveX to v11.9.900.170, MRT to v5.7, OnePiece Microsoft.NET Framework v.3.5 SP1 family to v2.0.50727.3657+ 3.2.30729.4058.1+v3.5.30729.4056.1, OnePiece Microsoft.NET Framework v4 to v4.0.30319.1017
6.1.0-20140115: added KB2914368 (supersedes KB2440591), Revoked Roots (KB2917500) (supersedes Revoked Roots KB2798897); updated Malicious Software Removal Tool to v5.8, Adobe Flash Player ActiveX to v12.0.0.38
6.2.0-20140212: added KB2898860 (supersedes KB2833949), KB2901115, KB2916036 (supersedes KB2719985), KB2909210-IE8 (supersedes KB2510531-IE8), KB2909921-IE8 (supersedes KB2898785-IE8); updated MRT to v5.9, Adobe Flash Player ActiveX to v12.0.0.44, Microsoft.NET Framework 3.5 family to v2.0.50727.3658+v3.2.30729.4058.2+v3.5.30729.4056.2 (February 2014 update), Microsoft.NET Framework 4.0 to v4.0.30319.1022 (February 2014 update)
6.3.0-20140312: added KB2923392, KB2925418-IE8 (supersedes KB2909921-IE8), KB2927811, KB2929961 (supersedes KB2845187), KB2930275 (supersedes KB2893984), KB2933528 (supersedes KB2801109), KB2935092 (supersedes KB2922717 & KB2904266); updated MRT to v5.10, Adobe Flash Player ActiveX to v12.0.0.77, Microsoft Silverlight to v5.1.30214.0 (KB2932677)
6.4.0-20140408: added KB2922229 (supersedes KB2758857), KB2936068-IE8 (supersedes KB2925418-IE8); updated MRT to v5.11, Adobe Flash Player ActiveX to v13.0.0.182
6.5.0-20140514: added KB2926765 (supersedes KB975713), KB2931352 (supersedes KB2898860), KB2953522-IE8 (supersedes KB2964358-IE8); updated MRT to v5.12, Adobe Flash Player ActiveX to v13.0.0.214
6.6.0-20140612: added KB2939576 (supersedes KB2916036), KB2957503 (supersedes KB2834886), KB2957509 (supersedes KB2850869), KB2957689-IE8 (supersedes KB2936068-IE8 & KB2953522-IE8); updated MRT to v5.13, (KB2957482) MSXML 6 SP2 to v6.20.2017.0 (supersedes KB2758696), Adobe Flash Player ActiveX to v14.0.0.125
6.7.0-20140711: added KB2961072 (supersedes KB2645640), KB2962872-IE8 (supersedes KB2957689-IE8); updated MRT to v5.14, Adobe Flash Player ActiveX to v14.0.0.145
Last edited by nonno fabio on Sat Jun 24, 2017 8:54 am, edited 216 times in total.

User avatar
nonno fabio
Posts: 1627
Joined: Mon Jun 06, 2005 10:36 am
Location: Northern Italy
Contact:

Windows 2003 DIY Update Pack

Post by nonno fabio » Sat Nov 24, 2007 2:55 am

another way to integrate W2k3 hotfixes (for DIY) is using:
Universal Addon/Update Pack Maker
http://www.ryanvm.net/forum/viewtopic.php?p=97019#97019
You must download all of the hotfixes and optional components listed in previous post, including ASMS01.CAB --> Copy from the i386 folder of your Windows CD
directx_%version%_redist.exe
IMAPI_XP_SRV2003_x86 %LANG%.exe
install_flash_player_10_active_x.exe
msxml4-KB973685-%LANG%.exe
msxml6-KB973686-%LANG%-x86.exe
MuCatalogWebControl.cab --> http://www.ryanvm.net/forum/viewtopic.p ... ontrol+cab
mucltui.cab --> http://www.ryanvm.net/forum/viewtopic.p ... ontrol+cab
mucltui_%LOCAL%.cab --> http://www.ryanvm.net/forum/viewtopic.p ... ontrol+cab
muweb.cab --> http://www.ryanvm.net/forum/viewtopic.p ... ontrol+cab
Silverlight.exe
wic_x86_%LANG%.exe
windows-kb890830-vx.x.exe
WindowsUpdateAgent30-x86.exe --> http://download.windowsupdate.com/windo ... 30-x86.exe, then
change following variables with your correct country code:
%LANG% = ITA, DEU, FRA
%LOCAL% = EN, IT, DE, FR ect
%MuiCultureDirectory% = en-US, it-IT, de-DE, fr-FR ect
Last edited by nonno fabio on Thu Mar 11, 2010 3:26 am, edited 37 times in total.

User avatar
Siginet
Site Admin
Posts: 2894
Joined: Fri May 27, 2005 1:07 pm
Location: Planet Earth
Contact:

Post by Siginet » Sat Nov 24, 2007 10:34 am

Only for Integrator users: during integration, Integrator deletes netfx.cat file causing the process to fail. You must copy netfx.cat in another position then, after integration and before creating iso, restore it in the original place.
I'll look into this. It should just be compressing the file. Does netfx.ca_ exist? Where exactly is the file suppose to be residing when there is an issue?

The batch file sounds very cool! :D
Image
--Siginet--

Techware
Your Virtual Technician
Computer Management Software

User avatar
nonno fabio
Posts: 1627
Joined: Mon Jun 06, 2005 10:36 am
Location: Northern Italy
Contact:

Post by nonno fabio » Sun Nov 25, 2007 11:13 am

DotNet 1.1 is part of Windows Server 2003.
Netfx.cat and netfx.cab are in the same folder (I386) and both not compressed.
Update Pack changes original netfx.cab with a new netfx.cab, containing a .net 1.1 hotfix, kb 933854. With Integrator, this replacement works flawlessly but unfortunately it causes netfx.cat to disappear and without netfx.cat, setup from CD will fail.
Onepiece tried to insert in UpdatePack another netfx.cat, as a workaround, but this caused netfx.cab to be deleted during integration

maveric73ph
Posts: 65
Joined: Sun Jun 11, 2006 8:06 am
Location: Asia

Post by maveric73ph » Sun Nov 25, 2007 11:39 am

Gasp! Simply amazing! I'll have to say Onepiece plans it and creates it anyway. If I had a brain that works that fast I could have been a computer :lol: Thanks again for another great addon Nonnofabio and OnePiece!

Downloading now...

maveric73ph
Posts: 65
Joined: Sun Jun 11, 2006 8:06 am
Location: Asia

Post by maveric73ph » Mon Nov 26, 2007 6:43 am

Just finished testing on VMWare. Works real fine, NO problem/s encountered. Used nlite to integrate everything as well as removals. Below are the things I integrated:

OnePiece.Win2K3SP2.UpdatePack.1.0.1.ENU.7z
OnePiece_IE7_For_Win2K3SP2_AddOn_ENU.7z
DirectX9.0cNovember2007AddOn0.3.4CNC.7z
ProgramAddons Firefox 2.0.0.9.cab
ProgramAddons_Java_Runtime_Environment_6u3.cab
Ricks_WinRAR_AddOn_v3.7.cab
RogueSpearAddonsDotNET20.zip
xable_HashTab-x32-v2.04_addon.cab

Checked on Windows Update...
Image

Great job Onepiece!
[/img]

User avatar
Siginet
Site Admin
Posts: 2894
Joined: Fri May 27, 2005 1:07 pm
Location: Planet Earth
Contact:

Post by Siginet » Mon Nov 26, 2007 6:37 pm

nonno fabio wrote:DotNet 1.1 is part of Windows Server 2003.
Netfx.cat and netfx.cab are in the same folder (I386) and both not compressed.
Update Pack changes original netfx.cab with a new netfx.cab, containing a .net 1.1 hotfix, kb 933854. With Integrator, this replacement works flawlessly but unfortunately it causes netfx.cat to disappear and without netfx.cat, setup from CD will fail.
Onepiece tried to insert in UpdatePack another netfx.cat, as a workaround, but this caused netfx.cab to be deleted during integration
Hmmm... I will need to test this myself. What I think may be the problem is it is seeing the netfx.cat file and compressing it because it is listed as possible to compress... and for some reason instead of deleting the cat file it deletes the cab file. Which is very odd. I'll make sure whatever is the problem it will be fixed in the final v1.5. ;)
Image
--Siginet--

Techware
Your Virtual Technician
Computer Management Software

User avatar
tarquel
Posts: 15
Joined: Fri Jul 28, 2006 5:23 am
Location: Mid-Wales, UK

Post by tarquel » Wed Nov 28, 2007 10:33 am

Doh! Cant seem to get the download to link to work.

Is there any mirrors for it at all? Can anyone PM me with a temp link to it?

Or the script in code form via PM would be a great great help too :)

Typical when I'm creating a build that needs to be deployed asap lol

just a quick question but is the netfx.cat problem sorted now in 1.1.0?

Regards.
Nath
Nathan Harmsworth
ICT Messaging & Security Development Officer @ CCC [Gov}

User avatar
5eraph
Site Admin
Posts: 4621
Joined: Tue Jul 05, 2005 9:38 pm
Location: Riverview, MI USA

Post by 5eraph » Wed Nov 28, 2007 11:43 am

YGPM, tarquel.

User avatar
nonno fabio
Posts: 1627
Joined: Mon Jun 06, 2005 10:36 am
Location: Northern Italy
Contact:

Post by nonno fabio » Wed Nov 28, 2007 12:24 pm

however the download link works fine, at the moment...

No, 1.1.0 don't fix the problem because seems to be related to Integrator. If you need to use Integrator anyway, the workaround posted is easy to apply
Don't ask for a different configuration of Onepiece's XP AIO Update Pack: use one of the existing vanilla XP UpdatePack with your preferred addons instead

armond
Posts: 263
Joined: Tue Sep 13, 2005 11:43 am
Location: Glendale, CA USA

Post by armond » Wed Nov 28, 2007 4:38 pm

Hi, nonno fabio,
Thanks for this grate update pack!
What about adding the KB925876?
Also, On systems that using the High Definition Audio drivers, WU shows an updated version of the Microsoft UAA Bus Driver for HD Audio. When the update is installed, You can find its CAB file in %SystemDrive%\Windows\SoftwareDistribution\Download folder.
This is the first line of its hdaudbus.inf file:
;Copyright (c) Microsoft Corporation. All rights reserved.
;
;Module Name:
; HDAUDBUS.INF
;
;Abstract:
; INF file for installing the Microsoft UAA Bus Driver for HD Audio
The CAB archive contains 3 files: hdaudbus.cat, hdaudbus.inf, and hdaudbus.sys. (hdaudbus.sys version: 5.10.1.5013).
You may download the driver here:
http://rapidshare.com/files/72965017/HDA_Driver.rar
I don't have the direct download link from Microsoft for it. Sorry.

User avatar
nonno fabio
Posts: 1627
Joined: Mon Jun 06, 2005 10:36 am
Location: Northern Italy
Contact:

Post by nonno fabio » Thu Nov 29, 2007 9:26 am

are you sure about WU and HDA? Because hdaudbus.sys 5.10.1.5013 seems to be already in w2k3sp2 CD...
Don't ask for a different configuration of Onepiece's XP AIO Update Pack: use one of the existing vanilla XP UpdatePack with your preferred addons instead

armond
Posts: 263
Joined: Tue Sep 13, 2005 11:43 am
Location: Glendale, CA USA

Post by armond » Thu Nov 29, 2007 10:16 am

Yes. I'm sure. Yes. That file is already in I386. I installed my Realtek HD audio with updating the "Audio Device on High Definition Audio" (or something similar, I'm not sure) in Device Manager. I did not overwrite the original windows file. When comparing the two hdaudbus.sys files, their MD5 are the same...

maveric73ph
Posts: 65
Joined: Sun Jun 11, 2006 8:06 am
Location: Asia

Post by maveric73ph » Tue Dec 04, 2007 12:22 am

I tried using the RVM Integrator 1.4.3 for your Update Pack. I seems to work fine. I don't know if RogueSpear's Net2.0 addon got something to do wih it but I will try again later. :)

User avatar
beats
Posts: 772
Joined: Tue Nov 27, 2007 4:11 am
Location: Netherlands

Post by beats » Tue Dec 04, 2007 3:49 am

Thanks nonno fabio, great job. :)

Pistolero
Posts: 86
Joined: Sun Oct 01, 2006 3:27 pm

Post by Pistolero » Wed Dec 19, 2007 4:54 pm

Thank you Thank you Thank you!

Any plans to update this to include this month's updates?

Did I say thank you?

User avatar
nonno fabio
Posts: 1627
Joined: Mon Jun 06, 2005 10:36 am
Location: Northern Italy
Contact:

Post by nonno fabio » Thu Dec 20, 2007 1:58 am

December updates are already in the Update Pack: check the list
Don't ask for a different configuration of Onepiece's XP AIO Update Pack: use one of the existing vanilla XP UpdatePack with your preferred addons instead

Tr110022
Posts: 21
Joined: Thu Apr 13, 2006 2:15 am

Post by Tr110022 » Wed Feb 20, 2008 2:26 pm

thanks for the update

Sm0ker
Posts: 107
Joined: Mon Jan 03, 2005 5:45 pm
Location: UK

Post by Sm0ker » Thu Feb 21, 2008 4:29 am

Thanks for the update

User avatar
nonno fabio
Posts: 1627
Joined: Mon Jun 06, 2005 10:36 am
Location: Northern Italy
Contact:

Post by nonno fabio » Thu Feb 21, 2008 8:08 am

Tr110022 and Sm0ker: you're welcome, mates
Don't ask for a different configuration of Onepiece's XP AIO Update Pack: use one of the existing vanilla XP UpdatePack with your preferred addons instead

User avatar
Siginet
Site Admin
Posts: 2894
Joined: Fri May 27, 2005 1:07 pm
Location: Planet Earth
Contact:

Post by Siginet » Tue Mar 04, 2008 1:33 pm

Not sure if I did something wrong. But when I use OnePiece.Win2K3SP2.UpdatePack.1.4.0.INTL_For_RVMi.7z it seems to integrate just fine. Textmode setup finishes 100%... but as soon as I get into guimode setup I get a corruption error and setup cancels. :( I have verified that I downloaded all of the correct hotfixes.

I did however have a hard drive that was giving bad sectors recently and had copied my 2003 source off of that drive. So I suppose it could be possible that my source files had gotten corrupt. But... when I test the source files without integrating the OnePiece.Win2K3SP2.UpdatePack.1.4.0.INTL_For_RVMi.7z pack setup does finish successfully.


Edit: I just tested with OnePiece.Win2K3SP2.UpdatePack.1.4.0.ENU_RVM_Mod.7z as well and got the same error. So I am thinking my source is corrupt and it has nothing to do with your UpdatePacks.
Image
--Siginet--

Techware
Your Virtual Technician
Computer Management Software

User avatar
RogueSpear
Posts: 1155
Joined: Tue Nov 23, 2004 9:50 pm
Location: Buffalo, NY

Post by RogueSpear » Mon May 26, 2008 6:16 pm

I had a hard drive with a bad sector and it cost me about a week of my life. The Update Pack happened to be sitting on it too. But even still it would generate the proper MD5 :shock: To this day I fail to see how this was possible and can only surmise the file was only readable enough to generate the hash, but not to properly extract from.

If I copied the file to another hard drive and that copy would not pass MD5. Anyway it took ages for me to nail this down due to MD5 passing and the Integrator decompressing it without spitting out an error.

It really sucks you had to go through this. I only bring up my story and reply to the thread so hopefully people will realize this is a real issue and it can happen. Lesson learned: MD5 is not the end all be all and 7-Zip does not always generate an error or halt when decompressing a corrupt archive file.

maveric73ph
Posts: 65
Joined: Sun Jun 11, 2006 8:06 am
Location: Asia

Post by maveric73ph » Fri Jun 13, 2008 10:22 pm

Sirs, any planned updates coming out?
Thank for this great update pack... Won't do another UACD without it...
:wink:

User avatar
nonno fabio
Posts: 1627
Joined: Mon Jun 06, 2005 10:36 am
Location: Northern Italy
Contact:

Post by nonno fabio » Sat Jun 14, 2008 5:55 am

Onepiece is very busy at the moment (he has even released an italian XP SP3 Update Pack with integrated IE7-DX9-WMP11 and request-only hotfixes...) but I guess in a few days Win2k3 UpdatePack will be out too
Don't ask for a different configuration of Onepiece's XP AIO Update Pack: use one of the existing vanilla XP UpdatePack with your preferred addons instead

maveric73ph
Posts: 65
Joined: Sun Jun 11, 2006 8:06 am
Location: Asia

Post by maveric73ph » Sun Jun 15, 2008 3:31 am

:shock: Haven't used anything like that. I hope he releases an english version. :D No hurry sir, just asking... Thanks again!

User avatar
nonno fabio
Posts: 1627
Joined: Mon Jun 06, 2005 10:36 am
Location: Northern Italy
Contact:

Post by nonno fabio » Mon Jun 23, 2008 7:58 am

Released new Win2k3 UpdatePack (and XP AIO Update Pack).

Now it includes Internet Explorer 7: if you don't like it, use Siginet's pack instead
Don't ask for a different configuration of Onepiece's XP AIO Update Pack: use one of the existing vanilla XP UpdatePack with your preferred addons instead

maveric73ph
Posts: 65
Joined: Sun Jun 11, 2006 8:06 am
Location: Asia

Post by maveric73ph » Mon Jun 23, 2008 9:13 am

What's not to like? Thanks to both of you!!!

User avatar
nonno fabio
Posts: 1627
Joined: Mon Jun 06, 2005 10:36 am
Location: Northern Italy
Contact:

Post by nonno fabio » Mon Jun 23, 2008 9:42 am

I mean "if you don't like IE7". ;)

Thanks
Don't ask for a different configuration of Onepiece's XP AIO Update Pack: use one of the existing vanilla XP UpdatePack with your preferred addons instead

User avatar
NobodyImportant
Posts: 2
Joined: Mon Jun 23, 2008 3:32 pm

Post by NobodyImportant » Mon Jun 23, 2008 3:35 pm

nonno fabio wrote:I mean "if you don't like IE7". ;)

Thanks
What if your source already has IE7 slipstreamed into it? Will this cause problems?
N.I.

User avatar
roirraWedorehT
Posts: 762
Joined: Sun Oct 15, 2006 2:25 pm

Post by roirraWedorehT » Mon Jun 23, 2008 3:42 pm

It's never a good idea to double-integrate, so I wouldn't advise it. As to whether it works or not, you would probably have to let us know.
Gigabyte case GZ-FA2CA-AJB
Gigabyte MA790X-UD4P with Realtek High Definition Audio
HIS Radeon HD 4850 512MB
AMD Athlon 64 X2 4400+ 2.3GHz
Corsair 4GB DDR2-6400 4-4-4-12
4x1TB SATA RAID 0+1/2x640GB SATA RAID 0/Misc. PATA
Windows 7 x64

User avatar
NobodyImportant
Posts: 2
Joined: Mon Jun 23, 2008 3:32 pm

Post by NobodyImportant » Mon Jun 23, 2008 7:17 pm

[quote="roirraW "edor""]It's never a good idea to double-integrate, so I wouldn't advise it. As to whether it works or not, you would probably have to let us know.[/quote]That's why I ask. I was hoping he would clarify "how" it is implemented(i.e. if his pack does any checks to see what is already present).

User avatar
nonno fabio
Posts: 1627
Joined: Mon Jun 06, 2005 10:36 am
Location: Northern Italy
Contact:

Post by nonno fabio » Wed Jun 25, 2008 10:57 am

an Update Pack is like "paint" for your SO source (your "wall" to paint), while integration tools like Nlite or Integrator are the "house painter": all checks are obviously painter's tasks because paint is not able to do them by itself ;)

Integrating over IE7 shouldn't cause problems but it's always better use a clean source to avoid failed integrations (as well it's better to whitewash a clean wall rather than a dirty one: the final result could be the same but risk of a bad job and time waste is higher)
Don't ask for a different configuration of Onepiece's XP AIO Update Pack: use one of the existing vanilla XP UpdatePack with your preferred addons instead

User avatar
roirraWedorehT
Posts: 762
Joined: Sun Oct 15, 2006 2:25 pm

Post by roirraWedorehT » Wed Jun 25, 2008 7:28 pm

Good analogy.
Gigabyte case GZ-FA2CA-AJB
Gigabyte MA790X-UD4P with Realtek High Definition Audio
HIS Radeon HD 4850 512MB
AMD Athlon 64 X2 4400+ 2.3GHz
Corsair 4GB DDR2-6400 4-4-4-12
4x1TB SATA RAID 0+1/2x640GB SATA RAID 0/Misc. PATA
Windows 7 x64

maveric73ph
Posts: 65
Joined: Sun Jun 11, 2006 8:06 am
Location: Asia

Post by maveric73ph » Wed Jul 02, 2008 3:10 am

Hello nonno fabio, can I ask for another mirror link? I have been having troubles connecting to adrive these past 2 days. I had just found out that my first download was whacked which made the integrations to fail.:cry:

Thanks!

User avatar
nonno fabio
Posts: 1627
Joined: Mon Jun 06, 2005 10:36 am
Location: Northern Italy
Contact:

Post by nonno fabio » Wed Jul 02, 2008 4:10 am

try using FF
Don't ask for a different configuration of Onepiece's XP AIO Update Pack: use one of the existing vanilla XP UpdatePack with your preferred addons instead

User avatar
roirraWedorehT
Posts: 762
Joined: Sun Oct 15, 2006 2:25 pm

Post by roirraWedorehT » Wed Jul 02, 2008 5:20 am

Which of these addons do you need a mirror for, maveric73ph?
Gigabyte case GZ-FA2CA-AJB
Gigabyte MA790X-UD4P with Realtek High Definition Audio
HIS Radeon HD 4850 512MB
AMD Athlon 64 X2 4400+ 2.3GHz
Corsair 4GB DDR2-6400 4-4-4-12
4x1TB SATA RAID 0+1/2x640GB SATA RAID 0/Misc. PATA
Windows 7 x64

maveric73ph
Posts: 65
Joined: Sun Jun 11, 2006 8:06 am
Location: Asia

Post by maveric73ph » Wed Jul 02, 2008 6:32 am

Well ain't that something, I was about to tell you that I still can't connect/download so I checked again just this time, and I got through. Hmm I didn't know how it got fixed but it looks like they made some changes? The welcome page seems different.

Anyway thanks nonno fabio and roirraW "edor", please disregard my previous request for the mirror. Adrive is working fine for me now.

Btw @nonno fabio, I use Firefox 2.0.0.14.

Thanks again for this ever trusty update pack from onepiece... Almost finished downloading... Can't wait to start... :D

User avatar
nonno fabio
Posts: 1627
Joined: Mon Jun 06, 2005 10:36 am
Location: Northern Italy
Contact:

Post by nonno fabio » Wed Jul 02, 2008 6:41 am

Sorry, I've heard only now by some guys of our italian community that Adrive has done some maintenance works yesterday and it was offline.

thanks for your appreciation.
Don't ask for a different configuration of Onepiece's XP AIO Update Pack: use one of the existing vanilla XP UpdatePack with your preferred addons instead

User avatar
roirraWedorehT
Posts: 762
Joined: Sun Oct 15, 2006 2:25 pm

Post by roirraWedorehT » Wed Jul 02, 2008 4:54 pm

OBKB. :D You're welcome.
Gigabyte case GZ-FA2CA-AJB
Gigabyte MA790X-UD4P with Realtek High Definition Audio
HIS Radeon HD 4850 512MB
AMD Athlon 64 X2 4400+ 2.3GHz
Corsair 4GB DDR2-6400 4-4-4-12
4x1TB SATA RAID 0+1/2x640GB SATA RAID 0/Misc. PATA
Windows 7 x64

maveric73ph
Posts: 65
Joined: Sun Jun 11, 2006 8:06 am
Location: Asia

Post by maveric73ph » Fri Jul 04, 2008 10:09 am

I'm happy to report that this works without a glitch on integration and installation. Have installed the O/S on working machine and been using for 2 days. No problems whatsoever. Great job once again from Onepiece and Nonno Fabio. Thanks guys!

User avatar
nonno fabio
Posts: 1627
Joined: Mon Jun 06, 2005 10:36 am
Location: Northern Italy
Contact:

Post by nonno fabio » Mon Jul 14, 2008 7:31 am

New release, now with DirectX
Don't ask for a different configuration of Onepiece's XP AIO Update Pack: use one of the existing vanilla XP UpdatePack with your preferred addons instead

maveric73ph
Posts: 65
Joined: Sun Jun 11, 2006 8:06 am
Location: Asia

Post by maveric73ph » Wed Jul 16, 2008 11:22 am

Thanks for this... will give this a try this weekend. 8)

BZJoe
Posts: 35
Joined: Sun Apr 16, 2006 1:19 pm

Post by BZJoe » Thu Jul 17, 2008 1:53 pm

Downloading to test and will report if I run into any problems.


Thanks for this Update Pack!!

User avatar
grinenko
Posts: 2
Joined: Thu Jul 17, 2008 2:58 pm

Post by grinenko » Thu Jul 17, 2008 3:15 pm

while setup copying files error with missing files:
d3dx9_24.inf till d3dx9_32.inf
and
xinput11.inf
xinput12.inf


List of used addons:

self maded:
Damian's_7Zip_459a4_Addon.7z
Damian's_CCleaner_2.09.600_Addon.7z
Damian's_Cursor_Pack_Addon.7z
Damian's_Everest_4.50.1426_Addon.7z
Damian's_K-Lite_Mega_Codec_Pack_4.0.0_Addon.7z
Damian's_MS_Silverlight_2.b2_Addon.7z
Damian's_Russian_MUI_Addon.7z
Damian's_SPTD_1.56_Addon.7z
Damian's_Themes_Pack_Addon.7z
Damian's_Tools_Pack_Addon.7z
Damian's_TotalCommander_PowerPack_2.70_Addon.7z
Damian's_Tweak_Addon.7z
Damian's_WinHex_Addon.7z
Damian's_WinRAR_3.80b3_RU_Addon.7z
Damian's_JRE_6U10b25_Addon.7z

downloaded from this forum:
DotNetFx_All_In_1_Addon_v2.1.7z
Entries_2K3_Tweak-Disable_Shutdown_Event_Tracker.ini
ENU_AddOns_SpeedUp_1.5.zip
Kels_CPLBonus_addon_v8.2.5.CAB
Kels_Runtimes_addon_v4.3.CAB
ProgramAddons HashTab 2.1.0.cab
Ricks_VistaRTMFonts_AddOn_v1.1.7z
Ricks_vpc07-sp1_Lite_EN_AddOn.7z
Xable_Foxit_v3.0_addon.cab
xable_WGAV-v1.3_addon.cab
BRGDS & TNX 4 COOP,
Damian.

Pistolero
Posts: 86
Joined: Sun Oct 01, 2006 3:27 pm

Post by Pistolero » Thu Jul 17, 2008 7:03 pm

I am getting an advanced INF install error at T-12... what gives?

User avatar
nonno fabio
Posts: 1627
Joined: Mon Jun 06, 2005 10:36 am
Location: Northern Italy
Contact:

Post by nonno fabio » Fri Jul 18, 2008 4:43 pm

@Grinenko: it seems a failed integration. Sometimes it happens. Please retry on a clean w2k3 source and if this happens again, try with UpdatePack only. If it works, you would find if there's an addon which causes it
@Pistolero: never seen such an error in w2k3, you're the very first one. There's nothing integrate by this pack which executes at t-12. Can you tell us something more about what have you done?
Don't ask for a different configuration of Onepiece's XP AIO Update Pack: use one of the existing vanilla XP UpdatePack with your preferred addons instead

User avatar
nonno fabio
Posts: 1627
Joined: Mon Jun 06, 2005 10:36 am
Location: Northern Italy
Contact:

Post by nonno fabio » Mon Jul 21, 2008 3:31 am

also updated W2k3 Addon Maker
Don't ask for a different configuration of Onepiece's XP AIO Update Pack: use one of the existing vanilla XP UpdatePack with your preferred addons instead

Pistolero
Posts: 86
Joined: Sun Oct 01, 2006 3:27 pm

Post by Pistolero » Tue Jul 22, 2008 1:34 pm

nonno fabio wrote: @Pistolero: never seen such an error in w2k3, you're the very first one. There's nothing integrate by this pack which executes at t-12. Can you tell us something more about what have you done?
Hi Nonno Fabio,

Here is the screenie from the "Advanced INF Install" error I am getting @ T-12:

Image

And here is the nLite session snippet:

[Hotfixes]
P:\Unattended\nLite Addons\nLite OS Addons\Server 2003\OnePiece_Win2K3_Post-SP2_UpdatePack_v1.6.0_ENU_nLite_MOD.7z
P:\Unattended\nLite Addons\nLite OS Addons\Updates and Browsers\CyberMacGyver_SP2_Administration_Tools_Pack_AddOn.cab
P:\Unattended\nLite Addons\nLite OS Addons\Server 2003\CyberMacGyver_HardLink_Shell_Extension_2.9.5.3_AddOn.cab
P:\Unattended\nLite Addons\nLite OS Addons\Server 2003\CyberMacGyver_SysInternals_Tools_AddOn_1.0.cab
P:\Unattended\nLite Addons\nLite OS Addons\Server 2003\CyberMacGyver_Microsoft_Virtual_Server_2005_R2_VM_Additions_Addon.cab
P:\Unattended\nLite Addons\nLite OS Addons\Server 2003\CyberMacGyver_VMware_Server_1.0.4_Tools_Addon.cab

Please note I do not receive this error with your 1.50 update pack.

Thanks for any help you can offer.

EDIT: I will make an ISO only with your 1.60 UP. I'll let you know how that turns out.

EDIT2: SSDD. Same error with nothing but your update pack integrated... but this may be an nLite issue... let me investigate further.

Pistolero
Posts: 86
Joined: Sun Oct 01, 2006 3:27 pm

Post by Pistolero » Tue Jul 22, 2008 4:30 pm

Here is the nLite INF which runs @ T-12, called with this line in CMDLINES.TXT ("rundll32 advpack.dll,LaunchINFSection nLite.inf,U"), which I believe is the source of the INF error when coupled with UpdatePack 1.60 (please note that this error does *not* occur with your older UpdatePacks):

Code: Select all

[Version]
Signature    = "$Windows NT$"
[Optional Components]
nLite
[nLite]
OptionDesc   = "nLite"
Tip          = "Windows component removal adjustments and tweaks."
Modes        = 0,1,2,3
AddReg       = T
AddReg       = TO
[U]
AddReg       = T
[T]
HKLM,"SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update","AUOptions",0x00010001,3
HKLM,"Software\Policies\Microsoft\Windows\WindowsUpdate\AU","AutoInstallMinorUpdates",0x00010001,1
HKLM,"SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update","AutoInstallMinorUpdates",0x00010001,1
HKLM,"SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon","AutoAdminLogon",0x00000000,1
HKLM,"SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon","DefaultUserName",0x00000000,"Administrator"
HKLM,"SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon","DefaultPassword",0x00000000,"34
1n'8o06eR$!"
HKLM,"Software\Policies\Microsoft\Windows NT\Reliability","ShutdownReasonOn",0x00010001,0
HKLM,"SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System","DisableStatusMessages",0x00010001,0
HKLM,"SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System","VerboseStatus",0x00010001,1
HKCU,"SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer","ForceClassicControlPanel",0x00010001,1
HKLM,"SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer","ShowDriveLettersFirst",0x00010001,4
HKCR,"CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\ControlPanel","",0x00020000,"@%SystemRoot%\system32\shell32.dll,-30488"
HKCR,"CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\ControlPanel\command","",0x00000000,"rundll32.exe shell32.dll,Control_RunDLL"
HKCR,"CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\DevMgr","",0x00020000,"@%SystemRoot%\system32\devmgr.dll,-4"
HKCR,"CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\DevMgr","SuppressionPolicy",0x00010001,1073741884
HKCR,"CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\DevMgr\command","",0x00020000,"%SystemRoot%\system32\mmc.exe /s %SystemRoot%\system32\devmgmt.msc"
HKLM,"SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{D6277990-4C6A-11CF-8D87-00AA0060F5BF}"
HKCR,"CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\services","",0x00020000,"@%SystemRoot%\system32\shell32.dll,-22059"
HKCR,"CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\services","SuppressionPolicy",0x00010001,1073741884
HKCR,"CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\services\command","",0x00020000,"%SystemRoot%\system32\mmc.exe /s %SystemRoot%\system32\services.msc"
HKCR,"CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\appwizcpl","",0x00020000,"@%SystemRoot%\system32\shell32.dll,-32006"
HKCR,"CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\appwizcpl\command","",0x00000000,"rundll32.exe shell32.dll,Control_RunDLL appwiz.cpl,,0"
HKLM,"SYSTEM\CurrentControlSet\Control\Terminal Server","fAllowToGetHelp",0x00010001,1
HKLM,"SYSTEM\CurrentControlSet\Control\Terminal Server","fAllowFullControl",0x00010001,1
HKLM,"SYSTEM\CurrentControlSet\Services\NetBT\Parameters","EnableLMHOSTS",0x00010001,0
HKLM,"SYSTEM\CurrentControlSet\Control\Terminal Server","AllowTSConnections",0x00010001,1
HKLM,"SYSTEM\CurrentControlSet\Control\Terminal Server","fDenyTSConnections",0x00010001,0
HKLM,"SOFTWARE\Microsoft\Windows\CurrentVersion\OptimalLayout","EnableAutoLayout",0x00010001,0
HKLM,"SOFTWARE\Microsoft\PCHealth\ErrorReporting","DoReport",0x00010001,0
HKLM,"SOFTWARE\Microsoft\PCHealth\ErrorReporting","ShowUI",0x00010001,0
HKLM,"SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System","NoInternetOpenWith",0x00010001,1
HKCU,"SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer","NoSMMyPictures",0x00010001,1
[C]
AddReg       = CT
[CT]
HKCU,"SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\ClassicStartMenu","{871C5380-42A0-1069-A2EA-08002B30309D}",0x00010001,0
HKCU,"SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel","{871C5380-42A0-1069-A2EA-08002B30309D}",0x00010001,0
HKCU,"SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\ClassicStartMenu","{20D04FE0-3AEA-1069-A2D8-08002B30309D}",0x00010001,0
HKCU,"SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel","{20D04FE0-3AEA-1069-A2D8-08002B30309D}",0x00010001,0
HKCU,"SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\ClassicStartMenu","{450D8FBA-AD25-11D0-98A8-0800361B1103}",0x00010001,0
HKCU,"SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel","{450D8FBA-AD25-11D0-98A8-0800361B1103}",0x00010001,0
HKCU,"SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\ClassicStartMenu","{208D2C60-3AEA-1069-A2D7-08002B30309D}",0x00010001,0
HKCU,"SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel","{208D2C60-3AEA-1069-A2D7-08002B30309D}",0x00010001,0
HKCU,"SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\ClassicStartMenu","{645FF040-5081-101B-9F08-00AA002F954E}",0x00010001,0
HKCU,"SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel","{645FF040-5081-101B-9F08-00AA002F954E}",0x00010001,0
HKCU,"SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer","SearchSystemDirs",0x00010001,1
HKCU,"SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer","SearchHidden",0x00010001,1
HKCU,"SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer","IncludeSubFolders",0x00010001,1
HKCU,"SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer","link",0x00000001,00,00,00,00
HKCU,"SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced","PersistBrowsers",0x00010001,1
HKCU,"SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced","HideFileExt",0x00010001,0
HKCU,"SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced","Hidden",0x00010001,1
HKCU,"SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced","MapNetDrvBtn",0x00010001,1
HKCU,"SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced","ShowSuperHidden",0x00010001,1
HKCU,"SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced","SuperHidden",0x00010001,0
HKCU,"SOFTWARE\Microsoft\Internet Explorer\Main","StatusBarOther",0x00010001,1
HKCU,"SOFTWARE\Microsoft\Internet Explorer\Main","StatusBarWeb",0x00010001,1
HKCU,"SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CabinetState","FullPathAddress",0x00010001,1
HKCU,"SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CabinetState","FullPath",0x00010001,1
HKCU,"SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SmallIcons","SmallIcons",0x00000000,"yes"
HKCU,"SOFTWARE\Microsoft\Internet Explorer\SearchUrl\g","",0x00000000,"http://www.google.com/search?q=%s"
HKCU,"Software\Microsoft\Internet Explorer\URLSearchHooks","{CFBFAE00-17A6-11D0-99CB-00C04FD64497}",0x00000000,""
HKCU,"SOFTWARE\Microsoft\Internet Explorer\Main","Start Page",0x00000000,"http://www.google.com/"
HKCU,"SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\HideMyComputerIcons","{21EC2020-3AEA-1069-A2DD-08002B30309D}",0x00010001,0
HKCU,"SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced","NoNetCrawling",0x00010001,1
HKCU,"SOFTWARE\Microsoft\Windows\CurrentVersion\App Management","ShowUpdates",0x00010001,1
HKCU,"SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced","StartMenuAdminTools",0x00010001,1
HKCU,"SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced","Start_AdminToolsRoot",0x00010001,2
HKCU,"SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced","CascadeControlPanel",0x00000000,"YES"
HKCU,"SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced","Start_ShowControlPanel",0x00010001,2
HKCU,"SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced","Start_ShowMyComputer",0x00010001,2
HKCU,"SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced","Start_ShowMyDocs",0x00010001,1
HKCU,"SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced","CascadeMyDocuments",0x00000000,"NO"
HKCU,"SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced","Start_ShowMyMusic",0x00010001,0
HKCU,"SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced","Start_ShowNetPlaces",0x00010001,0
HKCU,"SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced","Start_ShowMyPics",0x00010001,0
HKCU,"SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced","Start_ShowNetConn",0x00010001,1
HKCU,"SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced","Start_MinMFU",0x00010001,30
HKCU,"SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced","CascadePrinters",0x00000000,"no"
HKCU,"SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced","Start_ShowPrinters",0x00010001,1
HKCU,"SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced","Start_LargeMFUIcons",0x00010001,0
HKCU,"SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced","Start_LargeIcons",0x00010001,0
HKCU,"SOFTWARE\Microsoft\CTF\LangBar","ShowStatus",0x00010001,3
HKCU,"SOFTWARE\Microsoft\MediaPlayer\Preferences","AutoAddMusicToLibrary",0x00010001,0
HKCU,"SOFTWARE\Microsoft\MediaPlayer\Preferences","StartInMediaGuide",0x00010001,0
HKCU,"SOFTWARE\Microsoft\MediaPlayer\Preferences","ShowControlsOnEveryMouseMove",0x00010001,0
HKCU,"SOFTWARE\Microsoft\MediaPlayer\Preferences","FSControls_ControlsTimeout",0x00010001,1
HKCU,"SOFTWARE\Microsoft\MediaPlayer\Preferences","FSControls_CursorTimeout",0x00010001,1
HKCU,"SOFTWARE\Microsoft\MediaPlayer\Preferences","FSControls_MoveSpeed",0x00000001,00,00,c8,42
HKCU,"SOFTWARE\Microsoft\MediaPlayer\Preferences","ClipFullScreen",0x00010001,1
[TO]
HKLM,"SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce","nlite_post_00",0x00000000,"nhelper net1 accounts /maxpwage:unlimited"
HKLM,"SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce","nlite_post_s01",0x00000000,"rundll32 advpack.dll,LaunchINFSection nlite.inf,U"
HKLM,"SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce","nlite_post_s02",0x00020000,"nhelper del /q /s """"%10%\SET*.TMP"""""
HKLM,"SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce","nlite_post_s03",0x00020000,"nhelper delete ""%10%\SET3.TMP"""
HKLM,"SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce","nlite_post_s04",0x00020000,"nhelper delete ""%17%\INFCACHE.1"""
HKU,".DEFAULT\Software\Microsoft\Windows\CurrentVersion\RunOnce","nltide_3",0x00020000,"rundll32 advpack.dll,LaunchINFSectionEx nLite.inf,C,,4,N"
HKLM,"SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce","nlite_post_s07",0x00020000,"nhelper delete ""%11%\nhelper.exe"""
I believe the error stems from differences in the All-In-One pack as opposed to separate OS and IE packs...

Hope this helps you find a cure...

User avatar
nonno fabio
Posts: 1627
Joined: Mon Jun 06, 2005 10:36 am
Location: Northern Italy
Contact:

Post by nonno fabio » Wed Jul 23, 2008 5:23 am

try deleting the space between "34" and "1n'8o06eR$!" in your selected default password because seems that Nlite misundertands it and splits the regline in two different lines, the second of them invalid and causing the inf. error.

like this, for example
HKLM,"SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon","DefaultPassword",0x00000000,"34_1n'8o06eR$!"
not as now
HKLM,"SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon","DefaultPassword",0x00000000,"34
1n'8o06eR$!"
Don't ask for a different configuration of Onepiece's XP AIO Update Pack: use one of the existing vanilla XP UpdatePack with your preferred addons instead

Post Reply