Jump to content
nsane.forums

Search the Community

Showing results for tags 'windows'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Found 39 results

  1. Patching meltdown: Windows fixes, sloppy .NET, warnings about Word and Outlook If you thought this month’s Windows/Office/.NET patching debacle couldn’t get any worse, hold my beer. Thinkstock On the heels of the Jan. 17 release of 14 Windows and .NET patches, we now have a huge crop of new patches, revised older patches, warnings about bugs, and a bewildered ecosystem of Microsoft customers who can’t figure out what in the blue blazes is going on. Let’s step through the, uh, offerings on Jan. 18. Windows 10 patches Win10 Fail Creators' Update version 1709 — Cumulative update KB 4073291 brings the Meltdown/Spectre patches to 32-bit machines. What, you thought 32-bit machines already had Meltdown/Spectre patches? Silly mortal. Microsoft’s Security Advisory ADV180002 has the dirty details in the fine print, point 7: Q: I have an x86 architecture and the PowerShell Verification output indicates that I am not fully protected from these speculative execution side-channel vulnerabilities. Will Microsoft provide complete protections in the future? A: Addressing a hardware vulnerability with a software update presents significant challenges and mitigations for older operating systems that require extensive architectural changes. The existing 32 bit update packages listed in this advisory fully address CVE-2017-5753 and CVE-2017-5715, but do not provide protections for CVE-2017-5754 at this time. Microsoft is continuing to work with affected chip manufacturers and investigate the best way to provide mitigations for x86 customers, which may be provided in a future update. It appears as if this is the first 32-bit version of Windows that has a patch for the Meltdown vulnerability. Surprise. Like most of the patches I talked about yesterday, this one is available only through the Update Catalog — it won’t be pushed onto your machine. Win10 Fall (“November”) Update version 1511 (Enterprise/Education only) — The cumulative update KB 4075200 continues in the illustrious tradition of the 1703 and 1607 updates I discussed yesterday. It’s the second cumulative update for 1511 so far this month. This patch “addresses [an] issue where some customers with AMD devices get into an unbootable state.” Like all of the Meltdown/Spectre patches, you need to use antivirus software that sets the correct registry key before KB 4075200 will install. KB 4075200 isn’t being pushed out Windows Update; it’s available only by manually downloading it from the Update Catalog. Win10 RTM (“Initial version”) version 1507 (Enterprise LTSC) — Cumulative update KB 4075199. Same story as 1511 above. Win8.1 — Microsoft officially acknowledged what we’ve suspected — that it released two versions of its Win8.1 Security-only update, KB 4056898: one on Jan. 3 and the other on Jan. 5. Except the warning's buried in Security Advisory ADV180002: On January 5, 2018, Microsoft re-released KB4056898 (Security Only) for Windows 8.1 and Windows Server 2012 R2 to address a known issue. Customers who have installed the original package on 1/3/2018 should reinstall the update. I warned you about the switcheroo back on Jan. 10. Now we have official acknowledgment, but still no description of the “known issue.” The KB article still doesn’t acknowledge, or describe, the swicheroo. Some Windows Meltdown/Spectre patches on AMD resume According to Catalin Cimpanu at Bleepingcomputer, Microsoft has started pushing five of the patches that it pulled because they bricked AMD machines. Details are sketchy at this point, but Cimpanu says Microsoft has started pushing all of these patches onto AMD machines: Win10 1709: Cumulative Update KB 4056892 (for 64-bit machines only; see above about 32-bit) Win8.1: Monthly Rollup KB 4056895 and Security-only KB 4056898 Win7: Monthly Rollup KB 4056894 and Security-only KB 4056897 But, per Cimpanu, these patches are still being withheld from AMD machines: Win10 1703: Cumulative Update KB 4056891 Win10 1607: Cumulative Update KB 4056890 Win10 1511 (Enterprise/Education only): KB 4056888 Win10 1507 (Enterprise LTSC): KB 4056893 As best I can tell, there have been no changes made to any of the five patches that are now going out to AMD machines. It’s not at all clear — and Microsoft certainly hasn’t said anything — why these patches are going out now, and how they fixed the manifest problems with the earlier version. Of course, we haven’t received any answer to last week’s question: Microsoft reinstates Meltdown/Spectre patches for some AMD processors — but which ones? Trust us. We’re from Microsoft, and we’re here to help. Symantec Endpoint Protection conflict I found out more about the "Unbootable state for AMD devices" patches that I discussed yesterday. We still don’t have any official answers to the chicken-and-egg nature of a patch specifically issued for machines that have already been bricked by an earlier patch. It still isn’t clear if, after unbricking your machine and installing the new patch, you need to re-install the old patch. But one bit of enlightenment appeared yesterday on, not any Microsoft site, but on the Symantec Endpoint Protection site. Of course. It seems Symantec Endpoint Protection has been suffering from a tray icon bug brought on by Microsoft’s Jan. 3 patches. Symantec issued a hotfix to clear the problem, but that’s been pulled… because Microsoft fixed the bug. According to Symantec, the tray icon bug — introduced by Microsoft on Jan. 3 — has been fixed in: Win10 1709 — KB 4073290 — the “Unbootable state for AMD devices” patch Win10 1703 — KB4057144 — the second Cumulative Update this month Win10 1607/Server 2016 — KB4057142 — the second Cumulative Update this month Win8.1/Server 2012 R2 – KB4057401 — the preview for next month’s Monthly Rollup Server 2012 — KB 4057402 — the preview for next month’s Monthly Rollup More .NET funnies But the barely documented fun 'n games don’t end there. Yesterday, Microsoft changed its documentation for these .NET patches: Win7 .NET 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7 and 4.7.1 — KB 4055532 has been re-released to fix the font problems from Jan. 17. @MrBrian notes on AskWoody: The files ndp47-kb4074880-x64[…].exe and ndp47-kb4074880-x86[…].exe currently in the catalog for KB4055532 (January 2018 .NET Framework monthly rollup for Windows 7) have a digital signature of January 11, 2018, which is newer than the original release date. Also, despite the fact that I installed the January 2018 .NET Framework monthly rollup for Windows 7 on Monday (I have .NET Framework 4.7), it is being offered again in Windows Update (it’s ticked). Win7 .NET 4.6, 4.6.1, 4.6.2, 4.7 and 4.7.1 — KB 4074880 now says it replaces KB 4055002 to take care of the font problems in the earlier rollup. But note that if you install KB 4074880 to fix 4.7.1, you still need to install the earlier update, KB 4054856. Server 2008 SP2 .NET 4.6 — KB 4055002 now says it applies only to Server 2008 SP2. Deep in the Revisions list of CVE-2018-0764, there’s an explanation: To address a regression issue after installing security update 4055002, Microsoft has released security update 4074880 for Microsoft .NET 4.6/4.6.1/4.6.2/4.7/4.7.1 installed on supported editions of Windows 7 and Windows Server 2008 R2. Customers who have already installed KB4055002 should install KB4074880 to be protected from this vulnerability. If you’re keeping a January patch scorecard, it’s official. Your collection of scorecards now need an index. The steaming pile deepens This month’s patches aren’t all about Meltdown and Spectre. Even our good old friend Word has joined the now well-worn “oops we did it again” chorus line. Remember earlier this month when Microsoft fixed the Office Online Server security hole CVE-2018-0792? Yeah, me neither, but on Jan. 9, Microsoft rolled out patch KB 4011021. Except, well, it didn’t install on some machines. No explanation why. Instead, we get this posted nine days later: To address a known issue with installing security update 4011021, Microsoft is announcing the availability of security update 4011022 as a replacement. Customers who experienced problems installing 4011021 should install 4011022. And just to put icing on your buggy patching cake, there’s a reported bug in the KB 4011626 update for Outlook 2016. Microsoft has acknowledged at least part of the problem: After you install this security update, attachments are removed when you forward plain text emails. To work around this issue, save the attachments locally, reattach, and then send the email. But of course there’s no fix. I see continuing discussions on the Microsoft TechNet forum and on Reddit. Advice With (hundreds of?) thousands of PCs bricked by bad patches this month and (hundreds of?) millions of Windows customers bewildered by the avalanche of patches — we’ve seen bucketloads of patches on Jan. 3, 4, 8, 9, 11, 12, 17 and now Jan. 18 — you have to wonder when it will all straighten out. Best I can tell you is to turn off Automatic Update, and wait for some semblance of sanity to return. Thanks to GW, @MrBrian, @abbodi86, @PKCano and many others. Join us on the AskWoody Lounge. Source: Patching meltdown: Windows fixes, sloppy .NET, warnings about Word and Outlook (Computerworld - Woody Leonhard)
  2. Take a look inside the new January Security-only patches specifically for Win7 and 8.1 AMD machines that were blue-screend by the original January Security-only patches. Win10 brickees still in limbo. Thinkstock I’ve seen a lot of bizarre Microsoft patches-of-patches, but the new patches for AMD processors are in a world of their own. The security-only, manually downloadable patches appear to be Meltdown/Spectre patches for machines that were bricked by other bad patches, earlier this month, but they’ve arrived with no instructions — and a strange circular logic. Last week, Microsoft released two patches, with these official titles: KB 4073578: Unbootable state for AMD devices in Windows 7 SP1 and Windows Server 2008 R2 SP1 KB 4073576: Unbootable state for AMD devices in Windows 8.1 and Windows Server 2012 R2 The Win7 KB article says: An update is available to fix the following issue that occurs after you install January 3, 2018—KB4056897 (Security-only update) or January 4, 2018—KB4056894 (Monthly Rollup): AMD devices fall into an unbootable state… This update does not replace a previously released update. The Win8.1 article says the same thing, with reference to the analogous patches KB 4056898 and 4056895. … and that’s all of the description on offer. You can find lots of posts about the two patches and how they fix the “unbootable state” (what most of us would call a BSOD or blue screen), but there’s exactly zero advice on how to use the patches, or what fixes they include. And that part about “does not replace a previously released update” has my head whirling. Just for starters, if you installed one of this month’s buggy Meltdown/Spectre Windows patches on a machine with an older AMD processor (Athlon, Sempron, Turion, Opteron, Phenom and some Ryzen computers), you probably hit a blue screen. Microsoft pulled the patches a few days later, but a whole lot of people had to boot to a recovery environment or re-install Windows, just to get going again. Now we have patches for Win7 and 8.1 that appear to be the Meltdown/Spectre patches specifically for AMD machines. There’s something karmic about a patch that is designed to install on a machine that can’t boot, thus can’t install any patches. But let's move beyond the Kafkaesque dilemma. Here are just a few of the many, many questions swirling around over the weekend: Which AMD machines are targeted? I don’t know. Microsoft isn’t saying. Apparently these patches are meant for machines that threw BSODs with the earlier patches — but do you need to install the original patch and wait to see if you hit a BSOD, before installing these patches? If installing a patch just to see if it bricks your machine doesn’t sound like a fun way to spend a snowy day, can you put these new patches on any AMD machine? If so, what happens? Who knows? Are these patches replacements for the originals — do they cover the same ground — or are they somehow different? Poster @MrBrian on AskWoody says: On Windows 7 x64, I compared what KB4056897 installs vs. what KB4073578 installs. Considering just executable files, KB4073578 installs a newer version of some executable files. … Of the changed executable files between the two Windows 7 x64 updates (inspected with CBS Package Inspector), the only executable file that changed in size is hvax64.exe. So if the old and new versions of this month’s Windows/Spectre patches install different files, should you install the new patch on an AMD machine that somehow installed the old one? For that matter, can you install this newer version on an Intel machine and get away with it? @MrBrian in an intrepid moment tried that. His conclusion: As a test, I installed KB4073578 on two computers with two different Intel CPU models. I then rebooted and logged into a user account on each computer. There were no apparent problems. To recap, we have patches for Win7 and 8.1 AMD computers that officially only apply to bricked AMD computers, but still install on Intel computers, and come up with a newer hvax64.exe file. And the patches are only for Win7 and 8.1, not Win10. Care to chase this down the January patch rabbit hole? For example, as @PKCano notes, the Win8.1 Monthly Rollup appeared after the Win7 Monthly Rollup. Does the Win8.1 Monthly Rollup include the new security files or the old ones? What happens if you install the old patches and the new patches, in any time sequence combination of Security-only, Monthly Rollup, old and new? Let’s not forget that Microsoft started pushing the Meltdown/Spectre patches for some AMD processors, but are they old ones or new ones, and for which processors? Most of all, what happened to Windows 10? Microsoft yanked a half-dozen January Win10 cumulative updates because they were bricking AMD processors. At least some of those cumulative updates are going out again. Do they include the new files or the old ones? Since Microsoft doesn’t release Security-only patches for Win10, are we stuck with the old cumulative updates until the February Patch Tuesday cycle kicks in? What about those who have AMD machines that choke on the cumulative updates? I feel an Excedrin headache coming on. Join me on the AskWoody Lounge. Source: Microsoft's mystifying Meltdown/Spectre patches for AMD processors (Computerworld - Woody Leonhard) Welcome back nsane, missed you...
  3. The Universal USB Installer ais a tiny tool which makes it easy to copy a Linux live CD to a USB stick, so improving performance and making it possible to save files and settings.. The Universal USB Installer is easy to use. Simply choose a Live Linux Distribution, the ISO file, your Flash Drive and, Click Install. Upon completion, you should have a ready to run bootable USB Flash Drive with your select operating system installed. Other features include; Persistence (if available) – note that casper persistence will only work with fat16 or fat32 formatted drives. IMPORTANT: The Windows to Go option requires the USB be formatted NTFS with 20GB free disk space to hold the virtual disk. See FAQ for more info. Changelog: Universal-USB-Installer-1.9.8.0.exe – January 14, 2018 – Changes 01/13/18 – Version 1.9.8.0: Update to support Super Grub2 Disk, All In One-System Rescue Toolkit, Gecko Linux, Q4OS, and Medicat. HomePage Download Universal-USB-Installer-1.9.8.0.exe MD5: 242C5B34A1F90258CE942094A02C6951
  4. Windows 10 Lite version based on en_windows_10_enterprise_2016_ltsb_x64_dvd_9059483.iso. The size of the image is reduced 4 times compared to the original ISO. Save space in the installation media. Windows 10 Ent LTSB x64 2016 Win10.x64.lite-IK.iso (845 MB) English It can be installed in partitions with BIOS or UEFI, MBR or GPT format from the USB drive. There is nothing integrated. Many files are cut but this Windows lite can still be updated. Things Deleted: backgrounds & lockscreens Backup BitLocker Cortana Ease of Access Easy Transfer Face / finger Recognition Fax File History File Sharing option Group Policy IIS Ink Platform Input Method Editor Location / Geolocation Maps Miracast MSMQ MultiPoint Connector OCR Parental Controls Recovery Remote Assisstance Remote Desktop some fonts Speech & voice files Storage Spaces Tethering Web Services Windows To Go XPS viewer and creator Click here to download from this server, here is the torrent file
  5. Microsoft Toolkit 2.6.3

    This is a set of tools and functions for managing licensing, deploying, and activating Microsoft Office and Windows. All output from these functions is displayed in the Information Console. All functions are run in the background and the GUI is disabled to prevent running multiple functions, as they could conflict or cause damage if run concurrently. The Microsoft Office Setup Customization Functions (Customize Setup Tab), AutoKMS Uninstaller (if AutoKMS is installed), AutoRearm Uninstaller (if AutoRearm is installed), Office Uninstaller and Product Key Checker work even if Microsoft Office or Windows is not installed/supported. For information about individual functions, see the program readme. Requirements: Microsoft .NET Framework 4.X (Not 3.5) Microsoft Office 2010 or Later for Office Toolkit Support Windows Vista or Later for Windows Toolkit Support Credits: -Bosh for the original GUI Design and co-development of Office Toolkit -ZWT for the original KMSEmulator -letsgoawayhell, Phazor, nosferati87, and mikmik38 for KMSEmulator fixes and improvements -MasterDisaster, FreeStyler, Daz, nononsense, and janek2012 for work on Key Checker Official Thread : https://forums.mydigitallife.net/threads/microsoft-toolkit-official-kms-solution-for-microsoft-products.28669/ Changelog 2.6.3 : -Support KMS Keys for Project and Visio 2016 C2R-P. -Updated KMS Keys v2.6.3 EXE MD5: e01d03275b9be77dd08e7f141efbe059 EXE SHA-1: c422fe44f61b234235e1bed793aefa88826275d6 Magnet : magnet:?xt=urn:btih:EC0F513C3E2184BCC629B41AF4B3ADB179571454 Mirror : Site: https://www.mirrorcreator.com Sharecode: /files/0IC3UVXO/MTKV263.zip_links
  6. Hi I have a broadband connection and a 4G mobile data service as internet service to my laptop (Windows). The broadband data speed is high but the internet service goes off often and resumes. To manage that I got a 4G mobile data service - internet connection which has lower data speed while is having a daily limit. I always connect both my broadband and 4G mobile data service with my laptop. When both services are up, how to know which internet service (broadband or 4G mobile) is being utilized by system (alternatively, how to assign broadband as preferred internet connection for the system?) Looking for a (internet service / connection fail-over mechanism) software or any internet network configuration such that the internet for laptop works mainly on broadband and should switch AUTOMATICALLY to mobile data service, in case of broadband service failure and switch BACK automatically to broadband, once the broadband service resumes Thank you
  7. I am sure some know already, however sleep function seems to have been modified in the newest Windows Ten (10) version, 1709. Before, I would put P.C. into sleep, then when I wanted it out of sleep, I depress the touch space bar (or another key) and my desktop would appear after sign in. However, it now goes through a modified boot sequence avoiding for example the screen for Macrium Reflect that offers to restore or boot into windows and then desktop appears quickly and all startup items are there ready. Anyone else found this has happened and is there a way to stop the new sleep mode?
  8. General Info:- Name :- Ulti_windows_7_with_sp1_x64_dvd Ulti_windows_7_with_sp1_x86_dvd Architecture :-x86-x64 Size:- 3.57g Languages :- Arabic , French , English Activation:- Complete Updates:- Included all new updates of October 2017 Added Editions :- Windows 7 Ultimate x86 Windows 7 Ultimate x64 ************************************************************** * Including Microsoft updates till 12.09.2017 and Internet Explorer 11 * NO tweaks or add-ons. * NO additional programs and software added. * NO graphics, scripts and wallpapers added or changed. * It's the original image from Microsoft except added updates and IE11! ************************************************************** Description: Assembling made on the basis of original images from MSDN ************************************************************** update notes Improvements and fixes Known issues in this update Symptom Workaround Screen Shots:- Download: Singel links Thanks to mshaz ************************************************************** Direct link Just copy into idm or browser or or Torrent: Copy into browser Download Windows 7 untouched without update: en_windows_7_ultimate_with_sp1_x64_dvd_u_677332 en_windows_7_ultimate_with_sp1_x86_dvd_u_677460 French Windows 7 untouched without update: fr_windows_7_ultimate_with_sp1_x64_dvd_u_677299 fr_windows_7_ultimate_with_sp1_x86_dvd_u_678396
  9. Windscribe VPN 1.80 Build 28 Stable Internet As It Should Be Windscribe is a desktop application and browser extension that work together to block ads and trackers, restore access to blocked content and help you safeguard your privacy online. Learn More. What's New: https://blog.windscribe.com/windscribe-1-80-changelog-bdc9183bcac4 We’ve been working on this version for quite a while, existing installations should prompt you to update the app over the next 48 hrs. Here is what’s new. Changelog: New features LAN proxy gateway — https://windscribe.com/features/proxy-gateway Secure Hotspot (Experimental) — https://windscribe.com/features/secure-hotspot Variable location drawer height Auto login after signup Ability to choose NDIS5 TAP driver Upgrade to OpenVPN 2.4.x with 2.3.x fallback Service notifications Show Pro data-centers to free users Location latency tool-tips added to signal bars Fixed bugs Always on firewall not working on OS boot on some machines Application crashes after connection attempts are exceeded with “minimize to tray” option checked Application freeze with firewall ON requires reboot API calls not made if app starts with no Internet connectivity Custom installation now allows for non-standard install path Auto-enable disabled TAP adapter 100% CPU when app starts with no Internet connectivity Don’t try UDP protocol if system proxy is configured Constant application window size on variable DPI screens Login form DPI bug On multi-screen computers, tool-tips show on primary monitor Other Changes Leave firewall ON if ran out of free bandwidth to prevent IP leak Increase reconnect timeout from 5 min to 1 hour Server list source changed Moved server location update process to separate thread Only do ping tests while disconnected Update available UI change Output installed anti-virus software into debug log for troubleshooting Open survey on application uninstall Installer command line arg support Black and white top bar icon on MacOS Ping nodes in batches instead of all at the same time Allow for verbose OpenVPN logging via Advanced Parameters screen When beta channel is selected, check for updates right away To-do list for next version: IKEv2 protocol support Emergency Connect Firewall whitelisting overhaul Command line interface Wakeup from hibernation fix Add disconnecting state Async DNS resolver Browser Extensions — New Features Downloads: Windscribe for Your Computer: Windscribe for Your Browser: Windscribe for Your Phone: Windscribe for Your Router:
  10. About website Windows ISO Download Database (WIDB) has been made out of the fact that people are searching to download Windows ISO files and there are multiple sources that offer illegal copies bundled with spyware, trojans and scareware. Though it is still possible to find some isos you’re looking for on official microsoft pages, finding them can be a pain in the ***. So we decided to build up a solid, clean and proven source to find all the necessary files you’re looking for in one spot – the Windows ISO Download Database. Windows ISO DB is All images are trademark of microsoft and are used just to illustrate the different software products build by Microsoft. Note : Microsoft Windows 10 1709 Fall Creators Update Available Editions Screenshot Note: Full Download speed It's always recommended to use Internet Download Manager o get full SPEED Check the following link for download Website
  11. Proton VPN 1.2.1 / 1.2.2 / 1.2.3 / 1.2.4 Stable Overview: Screenshots: Downloads: Download: https://protonvpn.com/download/ Windows Client: v1.2.4: https://protonvpn.com/download/ProtonVPN_win_v1.2.4.exe v1.2.3: https://protonvpn.com/download/ProtonVPN_win_v1.2.3.exe v1.2.2: https://protonvpn.com/download/ProtonVPN_win_v1.2.2.exe v1.2.1: https://protonvpn.com/download/ProtonVPN_win_v1.2.1.exe Clients for macOS, Linux, Android, and iOS are still under development, but it is still possible to use ProtonVPN with these operating systems using third-party OpenVPN clients. Setup guides can be found here: MacOS: https://protonvpn.com/support/mac-vpn-setup/ Linux: https://protonvpn.com/support/linux-vpn-setup/ Android: https://protonvpn.com/support/android-vpn-setup/ iOS: https://protonvpn.com/support/ios-vpn-setup/ VPN Servers and Country Code for Linux, Mac, Android and iOS: https://protonvpn.com/support/vpn-servers/ Changelog: v1.2.4: Fixed Fixed Killswitch behavior after failed reconnect: KS will now require user confirm before restoring unencrypted connection v1.2.3: Fixed Fixed crash related to screen resolution changes v1.2.2: Added Added map zoom component support for smaller resolutions Added login window help tooltip Changed Changed app icon Removed empty space in settings window Updated Secure Core route selection Fixed Fixed sidebar toggle button bug after app update v1.2.1: Fixed Fixed crash related to window state change More Info - Articles & Reviews: Three years ago we launched ProtonMail. Today, we’re launching ProtonVPN. Encrypted email provider ProtonMail launches free VPN service to counter increasing online censorship ProtonVPN Swiss-Based VPN Launches Keeping ProtonVPN Secure New WiFi connection vulnerability discovered. Here’s what you need to know about “KRACK”
  12. Bitdefender 2018 Build 22.0.13.169 Overview: The Bitdefender proprietary technologies, based on innovative ideas and leading trends in the information security industry, continue to be internationally recognized as the best Internet security software. The independent organizations which reward BitDefender outstanding results through numerous prizes and certifications are: Av-Test.org, Virus Bulletin, ICSA Lab, Checkmark, PC World Top 100, just to name but a few. Homepage: https://www.bitdefender.com/ Changelog: N/A Update info shared by @boulawan A new Bitdefender Classic Line product update has been released with the following details: Affected software: Bitdefender Total Security 2018 Bitdefender Internet Security 2018 Bitdefender Antivirus Plus 2018 Platform: x86, x64 Version: 22.0.13.169 KB is unavailable at this time. Downloads: Online Installers: Bitdefender Antivirus Plus 2018 22.0.13.169 Online: https://download.bitdefender.com/windows/installer/en-us/bitdefender_antivirus.exe XP | Vista: https://download.bitdefender.com/windows/installer/en-us/xp-vista/bitdefender_antivirus.exe Bitdefender Internet Security 2018 22.0.13.169 Online: https://download.bitdefender.com/windows/installer/en-us/bitdefender_isecurity.exe XP | Vista: https://download.bitdefender.com/windows/installer/en-us/xp-vista/bitdefender_isecurity.exe Bitdefender Total Security 2018 22.0.13.169 Online: https://download.bitdefender.com/windows/installer/en-us/bitdefender_tsecurity.exe XP | Vista: https://download.bitdefender.com/windows/installer/en-us/xp-vista/bitdefender_tsecurity.exe Offline Installers and Install Guide: Bitdefender 2018 Offline Installation Guide:
  13. The media creation tool can be used to upgrade your current PC to Windows 10 or to create a USB or DVD and install Windows 10 on a different PC. Use Windows 10 Media Creation Tool to Create Installation Media or Upgrade PC Along with making the download of Windows 10 ISO file, Microsoft has also made available Windows 10 Installation Media Tool. This Media Creation Tool helps you download Windows 10, and provides the best download experience for customers running Windows 7, Windows 8.1 and Windows 10. Windows 10 Installation Media Tool To download the Windows 10 Installation Media Tool, visit Microsoft.com and scroll down till you see two purple Download Tool Now buttons. The Windows Media Creation Tool will allow you to download the Windows 10 ISO directly from Microsoft, without having a product key. You can use it to clean install or Upgrade to Windows 10. It can be used to download the following editions of Windows 10 – Windows 10 Home, Windows 10 Home N, Windows 10 Home Single Language, Windows 10 Pro and Windows Pro N. The tool includes file formats optimized for download speed, built-in media creation options for USB & DVDs, and allows for optional conversion to ISO file format. There are two versions of the tool available – a 32-bit version and a 64-bit version. Download the appropriate version of the tool and run it. When you run the tool, it creates two directories on your system partition – $WINDOWS.~BT and $Windows.~WS. These folders contain the downloaded setup and installation files, and an option to resume the creation process if it fails. When you click on it to run the tool, you will see the following screen asking you if you want to Upgrade this PC now or Create installation media for another PC. Download: https://go.microsoft.com/fwlink/?LinkId=691209 https://download.microsoft.com/download/0/B/2/0B2BC253-367A-48C3-A25D-402F123676D3/MediaCreationTool.exe https://download.microsoft.com/download/3/8/9/38926395-6FB1-4487-83DF-4241D2EA79F7/products_20171005.cab rename file products_20171005.cab to products․cab, put file products․cab in the same folder where the file MediaCreationTool.exe and run MediaCreationTool.exe /selfhost save boot ISO .. More Details Credits : WZor FYI: The above steps are shared by @Recruit Optional Workaround by @VIKTOR PAVEL: if you use Media Creation Tool and is not work do this: you need download small help file to lead program to correct download server https://download.microsoft.com/download/3/8/9/38926395-6FB1-4487-83DF-4241D2EA79F7/products_20171005.cab - rename help file "products_20171005.cab". to : products.cab - put it in same folder with media creation tool - run as admin : MediaCreationTool.exe /selfhost (or download bat i have make and put it in same folder and run as admin) https://www.upload.ee/files/7549469/MediaCreationTool_Selfhost_Batch.rar.html - done @Recruit Don't make fun when you are the one who made mistake. I searched before posting and none found related to this version post. You should've opened a new thread. It isn't my fault. Also, I'm not using Win10. @[email protected]@Lite and nsane team: Don't you understand the repeated actions without politeness/help from @Recruit? Many others are affected by his rude behavior in many comments. Please do what needs to be done. Don't show mercy for repeated trolls like him/her!
  14. It's been less than a day since the Patch Tuesday patches rolled out, and we're already seeing lots of complaints – and a few unexpected explanations. Thinkstock/Microsoft This month’s massive bundle of Patch Tuesday patches almost certainly contains more than a few surprises, and they’re only starting to surface. Here’s a rundown of what I’ve seen in the wee hours of Wednesday morning. There are lots of reports of delayed, failed and rolled back installations of KB 4041676, the Win10 Creators Update (version 1703) monthly cumulative update, which brings 1703 up to build 15063.674. A quick glance at the KB article confirms that there are dozens and dozens of fixes in this cumulative update — a remarkable state of affairs, considering the Fail Creators' Update, version 1709, is due on Oct. 17. Overnight, Günter Born and Bogdan Popa accumulated long lists of people reporting problems with the update, including reports of hangs, uncontrolled restarts, and exceedingly slow downloads. Born reports that the source of some problems may be attributable to Norton. If you’re having problems, my long-standing advice for cleaning things up and running the Update Troubleshooter may help. For those of you wondering what happened to this month’s Flash security patches, there’s a surprising answer: You aren’t seeing any Adobe security patches this month because there aren’t any! All of this month’s patches are quality updates, er, bug fixes. @PKCano on AskWoody has confirmed that there were no .NET Security-only updates this month. All of the .NET updates contain non-security patches only. @MrBrian found this little gem in two Microsoft posts: All updates for .NET Framework 4.6, 4.6.1, 4.6.2, and 4.7 require the D3 Compiler to be installed. We recommend that you install the included D3 Compiler before applying this update. For more information about the D3 Compiler, see KB 4019990. MrBrian goes on to note On a Windows 7 x64 virtual machine with no Windows monthly rollups installed, and .NET Framework 4.6.1 installed, Windows Update does not list the October 2017 .NET Framework monthly rollup… But the manual installer for the October 2017 .NET Framework monthly rollup successfully installed. Ugh! Tero Alhonen has important information about the TPM vulnerability. You may recall that Microsoft’s Security Advisory ADV170012 contains the warning: Do NOT apply the TPM firmware update prior to applying the Windows operating system mitigation update. Doing so will render your system unable to determine if your system is affected. You will need this information to conduct full remedation. And ZDI illuminates: This is just a stop-gap measure and still requires manual intervention. When the actual firmware updates roll out from TPM vendors, the process will need to happen all over again — except this time, new TPM firmware needs to be installed on every affected device. Which is enough to tie any admin in knots. Alhonen offers some insight: If your hardware is a Surface device, firmware updates are yet not available as of October 10, 2017. Surface Laptop and the Surface Pro (released in June 2017) are NOT affected… [for Surface Pro 3] Infineon firmware version 5.0 TPM is not safe. Please update your firmware. If you’re patching the 2015 LTSC version of Windows 10, you need to see Microsoft's admission that the Windows Presentation Framework may get munged. WPF crashes after the October 2017 Security and Monthly Quality Rollup is applied on Windows 10 version 1507 that has Microsoft .NET Framework 4.6.2 installed. There’s also a lot of confusion about Microsoft’s explanation for its fix of CVE-2017-11776. Microsoft says: “An attacker who exploited the vulnerability could use it to obtain the email content of a user,” when in fact no attack is necessary. The SEC-Consult blog has a detailed explanation: If you used Outlook’s S/MIME encryption in the past 6 months (at least, we are still waiting for Microsoft to release detailed information and update the blog) your mails might not have been encrypted as expected. In the context of encryption this can be considered a worst-case bug. Kevin Beaumont (@GossiTheDog) has tied the pieces together and concluded: Outlook S/MIME bug is absolutely reproducible, I just did it. Does not need an attacker. Microsoft have classified it wrong. So if you used Outlook’s S/MIME encryption for text emails in the past six months, your emails haven’t been encrypted at all. The “encrypted” emails went out in plain text, no antivirus backdoor required. Gotcha. No definitive word as yet on whether the Win 8.1 Monthly Rollup, KB 4041693, or the Security-only update, KB 4041687, fix the baffling problem where Win 8.1 customers can’t sign in with a Microsoft account. That bug was introduced in the September Monthly Rollup. The topic isn’t even mentioned in the KB articles. … and it’s been less than a day since the patches rolled out. Got a patching problem? Hit us on the AskWoody Lounge. Source: Early reports of myriad Microsoft Patch Tuesday problems (Computerworld - Woody Leonhard)
  15. Every version of Windows gets patched, as well as Edge, IE, Skype for Business and Office. Pay special attention to the Word zero-day, the DNS security problem, and the TPM patching madness. Thinkstock/Microsoft It's going to be a banner patching month. I count 151 separate security patches and 48 Knowledge Base articles, as well as the odd Security Advisory. Windows update bugs The Windows patch Release Notes point to four known bugs: The cumulative update for Windows 10 Creators Update, version 1703 — which sports dozens of fixes — has a couple of problems: Systems with support enabled for USB Type-C Connector System Software Interface (UCSI) may experience a blue screen or stop responding with a black screen when a system shutdown is initiated, and it may change Czech and Arabic languages to English for Microsoft Edge and other applications. The cumulative update for Windows 10 Anniversary Update, version 1607, has a handful of problems: Downloading updates using express installation files may fail, after installing a delta update package; the KB numbers appear twice under Installed Updates; and package users may see an error dialog that indicates that an application exception has occurred when closing some applications. The cumulative update for the original version of Windows 10, usually called 1507, has a similar problem: Package users may see an error dialog that indicates an application exception has occurred when closing some applications. Apparently this fix is only for the LTSC version. The Monthly Rollup for Windows 7 also has an acknowledged bug: an error dialog that indicates that an application exception has occurred when closing some applications. Windows security issues Martin Brinkmann has his usual exhaustive list on ghacks: Windows 7: 20 vulnerabilities of which 5 are rated critical, 15 important Windows 8.1: 23 vulnerabilities of which 6 are rated critical, 17 important Windows 10 version 1607: 29 vulnerabilities, 6 critical, 23 important Windows 10 version 1703: 29 vulnerabilities of which 6 are rated critical, 23 important SANS Internet Storm Center has released its list — as has the Zero Day Initiative. There are some worrisome exposures that we’ll be following closely: CVE-2017-11779 — a major problem with DNS security, but it’s only a problem if your DNS server has been overtaken. Nick Freeman at Bishop Fox notes: if an attacker controls your DNS server (e.g., through a man-in-the-middle attack or a malicious coffee-shop hotspot) — they can gain access to your system. This doesn’t only affect web browsers — your computer makes DNS queries in the background all the time, and any query can be responded to in order to trigger this issue. Sounds grisly, but Microsoft says the flaw hasn’t been exploited and rates it as “Exploitation less likely.” If somebody can hijack your DNS server, you’re in a world of hurt anyway. CVE-2017-11826 — a known, and exploited, zero-day attack in Word, discovered by Qihoo 360. It’s another attack that relies on disguising an RTF file as a Word DOC or DOCX, then using the good services of Word (or its Viewer) to pounce on your machine. The Microsoft security advisory says it’s been fixed this month in all versions of Word, the Word Viewer and the Office Compatibility Pack. Finally, Security Advisory ADV170012 — Vulnerability in TPM could allow Security Feature Bypass contains this little gotcha: WARNING: Do NOT apply the TPM firmware update prior to applying the Windows operating system mitigation update. Doing so will render your system unable to determine if your system is affected. You will need this information to conduct full remedation. ZDI goes on to explain: The patch provided by Microsoft is only a temporary measure, though, and here’s where it gets truly complicated. The TPM manufacturers need to produce a firmware update to completely resolve this, as the bug itself is present in the TPM firmware — not in Windows itself. This patch is one of several designed to offer a workaround by generating software-based keys whenever possible. Even after a vendor’s firmware update is applied, you’ll need to re-generate new keys to replace the previously generated weak ones. This is just a stop-gap measure and still requires manual intervention. When the actual firmware updates roll out from TPM vendors, the process will need to happen all over again — except this time, new TPM firmware needs to be installed on every affected device. Sounds like it’s going to be a woolly month. As Computerworld's Gregg Keizer notes, today marks the last update for the Windows 10 Fall Update (later called the November Update), version 1511. Those of you on the Long Term Servicing Channel (formerly the Long Term Servicing Branch) need not fear — 1511 will be supported forever, or at least until Oct. 14, 2025. But those of you who don’t have LTSC and its requisite Volume License with Software Assurance better move beyond 1511. Pro tip: If you’re on 1511, move to 1703 before Oct. 17, after which it’ll be much harder to avoid 1709. Note that Microsoft has, in the past, released truly critical security patches for versions of Windows that are beyond end of life — which is an interesting philosophical observation. Today also memorializes the demise of Office 2007. No, you don’t need to run out and buy Office 2016 or rent Office 365. But you do need to be aware that Office 2007 is going to sprout security holes — and you won’t be getting any patches, unless Redmond relents and figures that fixing the elderly branches of the Office ecosystem is worth the time and effort. Hit a problematic patch? Holler on the AskWoody Lounge. Source: Another banner Patch Tuesday, with a Word zero-day and several bugs (Computerworld - Woody Leonhard)
  16. 8GadgetPack 24.0 Final

    8GadgetPack makes it possible to use gadgets on Windows 10 / 8.1 / 8. 8GadgetPack - a tool that will help bring back the familiar gadgets on the desktop in Windows 8, which will help you quickly get the right information (clock, calendar, weather, currency exchange rates, system, and so on). Gadgets are installed in the same simple manner as earlier. Included with the program are 45 gadgets (official from Microsoft, as well as the most popular), also included is a gadget 7 Sidebar, which mimics the Sidebar gadgets Windows Vista. The program has a set of standard and some additional gadgets, and also supports the installation of new ones. Feature of the program: handy window c settings "8GadgetPack Tools", which contains the following options: - Disable startup programs; - Reset all the gadgets (back to how things were after the installation); - Visit the website of the program; - Leave a review; - Uninstall applications Version History: 2017/10/07: Version 24.0 released. Some compatibility bugfixes for the upcoming Windows 10 version in October. Also fixed some bugs that might occur if you use Clipboarder and Word/Excel (it's actually not Clipboarders fault, but I guess MS will never fix these bugs. So I added a workaround.). Updated some gadgets. Homepage: https://8gadgetpack.net/ Download: https://8gadgetpack.net/download230/8GadgetPackSetup.msi
  17. Windows Firewall Control 5.0.0.0 Changelog: https://www.binisoft.org/changelog.txt Download: https://www.binisoft.org/download/wfc4setup.exe Changes: What's new in version 5.0.0.0 (04.10.2017) - New: Connections Log contains now an "Auto refresh on open" check box which will automatically trigger Refresh when the window is opened. - New: Connections Log contains now an "Auto receive updates" check box which will automatically add the newest entries on top of the list. More info can be found in the user manual. - New: Main Panel displays now the currently connected location of Windows Firewall. - New: Added "Open the website" functionality in the About tab. - Fixed: Duplicate notifications may be displayed if the location of Windows Firewall changes after WFC service start-up and there are rules defined for specific locations. - Fixed: Merge rules functionality from Rules Panel does create the merged rule, but does not remove anymore the old rules. - Fixed: Import policy displays a successful operation result, even if the import has failed due to a file access denied error. - Fixed: Refresh does not work anymore in Connections Log after using the search. The window must be closed and reopened to be able to refresh again the data grid. - Fixed: Some group names from Windows 10 are not recognized. - Fixed: 'mDNS' keyword is not valid in Properties dialog as local port when opening such an inbound rule for UDP protocol. - Updated: The user manual was updated with new screenshots and updated topics.
  18. Mozilla will release Firefox 56.0 to the Stable channel on September 29th, 2017. The new Firefox version will be made available to all users of the Stable channel. The new version of the browser can best be described as a minor release in anticipation of the biggest Firefox release in history: Firefox 57. All Firefox channels are or have been updated to a new release version. Firefox Stable to version 56, Firefox Beta and Developer to version 57, and Firefox Nightly to version 58. The Firefox ESR update brings the version to 52.4. Executive Summary Firefox 56 is the last Stable version of Firefox that supports legacy add-ons. Firefox 57 Stable will support only WebExtensions. Firefox on Android ends support for devices running Android 4.0. Firefox for Android does not support Flash anymore. The Firefox Page Shot tool is available universally now. Firefox 56.0 download and update Existing Firefox users who have automatic updates enabled in the browser -- which is the default setting -- will be updated automatically to Firefox 56.0 once Mozilla publishes it. Firefox does not check for updates in real-time though; you can run a manual check for updates by selecting Menu > Help > About Firefox. Firefox displays the current version in a new window, and runs an update check to find out if a new version is available. This new version will be downloaded and installed automatically by default if that is the case. Direct download links for Firefox installation files: Firefox Stable download Firefox Beta download Nightly download Firefox ESR download Firefox unbranded builds information Firefox 56.0 Changes Firefox Screenshots Firefox's built-in Page Shot tool is available to all users of the browser now. The tool lets you capture part of a web page or all of it, and save it locally or online for easy sharing. Check out our overview of Firefox Screenshots here. It explains how the tool works, and how you can disable it in case you don't need it. Firefox preferences changes Firefox 56.0 ships with a redesigned preferences interface that introduces new features and changes to it. You can load about:preferences to open the starting page of the Firefox options, or click on Menu and select Options from it to do the same. One major change is the integration of a search field that you may use to find preferences quickly. Type cookies for instance, and you get all cookies related preferences displayed to you so that you may interact with them directly. The preferences display four entry points instead of the larger number of pages in Firefox 56.0. You may load them using the following addresses: General: about:preferences#general Search: about:preferences#search Privacy & Security: about:preferences#privacy Firefox account: about:preferences#sync We talked about the change back in early 2017 when it rolled out to Nightly versions. Basically, what the redesign means is that you do less clicking but more scrolling to go through all of the preferences. Mozilla notes that it has updated descriptions to make it clearer how settings affect browsing. Other Firefox 56.0 changes Firefox won't auto-play media anymore that is opened in a background tab. Hardware acceleration support for AES-GCM (most widely used cipher according to Mozilla). Performance improvements on all desktop systems. Safe Browsing protocol updated to version 4. Security improvements for verifying file downloads. Updates are roughly 20% smaller in size when they are downloaded via Firefox's built-in updating system. New Rust character encoding standard-compliant implementation. Form Autofill rollout to En-US. Firefox 56.0 Issues Firefox may crash on startup if RelevantKnowledge adware is installed on the device. Remove it by running software such as AdwCleaner, Malwarebytes Free, or other security software. 64-bit versions of Firefox may crash on Windows 7 if Lenovo's "OneKey Theater" software is installed. Mozilla suggests to re-install a 32-bit version of Firefox to fix the issue. Developer Changes rel="preload" implemented to preload resources that can be cached. (bug 1222633) Intl API enabled on Android (bug 1344625) Firefox for Android does not support plugins anymore. (bug 1381916) URLs are encoded internally by Gecko using punycode to avoid encoding issues. (bug 945240) Firefox on Windows and on Mac OS X can be run in headless mode using the -headless flag. (bug 1355150 and bug 1355147) Lots of WebExtensions changes (see developer link in the resource section below for a full list). Support for <applet> has been dropped. Firefox 56.0 for Android Only a handful of changes in Firefox for Android, but they are major: Flash support is discontinued. Firefox for Android does not support Android 4.0 anymore. Performance and power consumption improvements for WebRTC through the use of hardware encoders. Support for WebExtensions improved. Security updates / fixes Security changes are announced after the official release. We will update the review when Mozilla publishes them. CVE-2017-7793: Use-after-free with Fetch API CVE-2017-7817: Firefox for Android address bar spoofing through fullscreen mode CVE-2017-7818: Use-after-free during ARIA array manipulation CVE-2017-7819: Use-after-free while resizing images in design mode CVE-2017-7824: Buffer overflow when drawing and validating elements with ANGLE CVE-2017-7805: Use-after-free in TLS 1.2 generating handshake hashes CVE-2017-7812: Drag and drop of malicious page content to the tab bar can open locally stored files CVE-2017-7814: Blob and data URLs bypass phishing and malware protection warnings CVE-2017-7813: Integer truncation in the JavaScript parser CVE-2017-7825: OS X fonts render some Tibetan and Arabic unicode characters as spaces CVE-2017-7815: Spoofing attack with modal dialogs on non-e10s installations CVE-2017-7816: WebExtensions can load about: URLs in extension UI CVE-2017-7821: WebExtensions can download and open non-executable files without user interaction CVE-2017-7823: CSP sandbox directive did not create a unique origin CVE-2017-7822: WebCrypto allows AES-GCM with 0-length IV CVE-2017-7820: Xray wrapper bypass with new tab and web console CVE-2017-7811: Memory safety bugs fixed in Firefox 56 CVE-2017-7810: Memory safety bugs fixed in Firefox 56 and Firefox ESR 52.4 Additional information / sources Firefox 56 release notes Firefox 56 Android release notes Add-on compatibility for Firefox 56 Firefox 56 for Developers Site compatibility for Firefox 56 Firefox Security Advisories Firefox Release Schedule Now Read: The state of Mozilla Firefox Source Firefox 56.0 & 52.4.0 ESR Frontpage Downloads:
  19. Bitdefender 2018 Build 22.0.12.161 Overview: The Bitdefender proprietary technologies, based on innovative ideas and leading trends in the information security industry, continue to be internationally recognized as the best Internet security software. The independent organizations which reward BitDefender outstanding results through numerous prizes and certifications are: Av-Test.org, Virus Bulletin, ICSA Lab, Checkmark, PC World Top 100, just to name but a few. Homepage: https://www.bitdefender.com/ Changelog: https://forum.bitdefender.com/index.php?/topic/77459-latest-changelog/ A new Bitdefender Classic Line product update has been released with the following details: Affected software: Bitdefender Total Security 2018 Bitdefender Internet Security 2018 Bitdefender Antivirus Plus 2018 Platform: x86, x64 Version: 22.0.12.161 This version fixes the following issues: Fixed an issue with Active Threat Defense not activating Fixed an issue where the product would show "Last Update Never" Fixed an issue where the offline weekly updates would not detect Bitdefender 2018 Fixed an issue where Google would report SafePay is an outdated browser Fixed an issue where Custom Scans would not be saved after switching to Aggressive Fixed an issue where SafePay couldn't save bank statements(PDF) on hsbc.co.uk The following improvements were included: Wallet's compatibility with several websites Several Improvements to the in-product Support Tool Several interface improvements Various Install Engine optimizations Various SafePay optimizations and security improvements Several Firewall improvements Several Advanced Threat Defense improvements Improved compatibility with upcoming Windows release Several OneClick Optimizer improvements KB is unavailable at this time. Downloads: Online Installers: Bitdefender Antivirus Plus 2018 22.0.12.161 Online: https://download.bitdefender.com/windows/installer/en-us/bitdefender_antivirus.exe XP | Vista: https://download.bitdefender.com/windows/installer/en-us/xp-vista/bitdefender_antivirus.exe Bitdefender Internet Security 2018 22.0.12.161 Online: https://download.bitdefender.com/windows/installer/en-us/bitdefender_isecurity.exe XP | Vista: https://download.bitdefender.com/windows/installer/en-us/xp-vista/bitdefender_isecurity.exe Bitdefender Total Security 2018 22.0.12.161 Online: https://download.bitdefender.com/windows/installer/en-us/bitdefender_tsecurity.exe XP | Vista: https://download.bitdefender.com/windows/installer/en-us/xp-vista/bitdefender_tsecurity.exe Offline Installers and Install Guide: Bitdefender 2018 Offline Installation Guide: Bitdefender 2018 AV Plus / Internet Security / Total Security - Standalone Installers [Windows]: 32bit [x86]: https://download.bitdefender.com/windows/desktop/connect/cl/2018/all/bitdefender_ts_22_32b.exe 64bit [x64]: https://download.bitdefender.com/windows/desktop/connect/cl/2018/all/bitdefender_ts_22_64b.exe Bitdefender Agent - 2018 - Universal [Same Agent for AV Plus / IS / TS]: Note: Bitdefender Agent installer supports both x86 & x64 architecture. Note: Bitdefender Agent installer is the same for Antivirus Plus / Internet Security / Total Security. Direct Download: https://flow.bitdefender.net/connect/2018/en_us/bitdefender_windows.exe Install Notes: Precaution Note: If you've already installed older version of Bitdefender[incl. 2017/2016 version], we are sure that you'll lose your settings. Please take note of configuration, settings. whitelisted files and links Download and Install Bitdefender Agent. When it starts downloading the install files, Stop/Close it immediately. Note: Check whether there the Agent is installed only once in "Add/Remove Programs" or "Programs & Features". Note: Check in "Program Files" for folder named "Bitdefender Agent". Now, start installing offline installer and proceed with installation. Note: Please choose respective download link based on architecture x86/x64 for smooth installation. Note: Don't worry about AV Plus/IS/TS. The installer automatically modifies the installation depending on the license you entered. Once installation is done, configure accordingly for best protection and to avoid files from getting deleted. Configure Whitelist files and links if you have any. It is better to keep note of the configured settings for future use. User Guide: Bitdefender Antivirus Plus 2018: https://download.bitdefender.com/resources/media/materials/2018/userguides/en_EN/bitdefender_av_2018_userguide_en.pdf Bitdefender Internet Security 2018: https://download.bitdefender.com/resources/media/materials/2018/userguides/en_EN/bitdefender_is_2018_userguide_en.pdf Bitdefender Total Security 2018: https://download.bitdefender.com/resources/media/materials/2018/userguides/en_EN/bitdefender_ts_2018_userguide_en.pdf Uninstall Tool: Uninstall Tool For Bitdefender 2018 Products: https://www.bitdefender.com/files/KnowledgeBase/file/Bitdefender_2018_UninstallTool.exe NOTE: Bitdefender 2018 Uninstall Tool require KB2999226. If you didn't install, you'll get error "api-ms-win-crt-runtime-l1-1-0.dll" missing. You can download it here - KB2999226 Uninstall Tool For Bitdefender 2017 Products: https://www.bitdefender.com/files/KnowledgeBase/file/Bitdefender_2017_UninstallTool.exe NOTE: Bitdefender 2017 Uninstall Tool require KB2999226. If you didn't install, you'll get error "api-ms-win-crt-runtime-l1-1-0.dll" missing. You can download it here - KB2999226 Uninstall Tool For Bitdefender 2016 Products: http://www.bitdefender.com/files/KnowledgeBase/file/Bitdefender_2016_UninstallTool.exe Uninstall Tool For Bitdefender 2015 / 2014 / 2013 Products: http://www.bitdefender.com/files/KnowledgeBase/file/The_New_Bitdefender_UninstallTool.exe Uninstall Tool For Bitdefender 2012 Products and Earlier: http://www.bitdefender.com/files/KnowledgeBase/file/BitDefender_Uninstall_Tool.exe
  20. It’s been a rocky month, with buggy security patches and patches-of-patches that never should’ve seen light of day. Is this the new normal? OpenClipArt-Vectors (CC0) Microsoft’s foray into quantum computing sure sounds neat, but those of us stuck with real programs on real computers have been in something of a quandary. Once again this month, we’ve hit a bunch of stumbling blocks, many of which were pushed down the Automatic Update chute. Before we dissect the creepy-crawlies this month, it’s important to remember that you have to get the .Net patches installed, unless you fastidiously refrain from clicking the “Enable Editing” button in Word. Windows 10 After telling us that Windows 10 Creators Update, version 1703, is “the most performant and reliable version of Windows 10 ever!” you might expect some stability with version 1703 patches. This month, that didn’t happen. After releasing cumulative update KB 4038788 on Patch Tuesday, we got a new out-of-band fix for bugs introduced by that same update. The new cumulative update, KB 4040724, appeared in Windows Update on Monday, Sept. 25. It brings 1703 up to build 15063.632. So far, I haven’t heard of any problems with the new cumulative update — but it’s been less than a day. The situation with Win10 Anniversary Update, version 1607, isn’t as straightforward. Apparently, there were a host of problems that appeared after this month’s Patch Tuesday cumulative update, KB 4038782. It isn’t clear if that update introduced bugs of its own, but the situation’s bad enough that we got a second cumulative update this month, again on Monday. KB 4038801 brings Win10 version 1607 to build 14393.1736. It’s a hotfix; it isn’t distributed via Automatic Update. You have to download KB 4038801 and install it manually. I haven’t seen a detailed analysis of the security holes fixed by this odd Monday patch – but to date I haven’t seen any complaints, either. The day is still young. For reasons as yet unexplained, KB 4038801 is only for Win10 1607; it’s explicitly not released for Server 2016. There’s a note on the 1607 patch site that says: Windows Update Client Improvement Microsoft will release an update directly to the Windows Update Client to improve Windows Update reliability. It will only be offered to devices that have not installed any recent cumulative updates and are not currently managed (e.g., domain joined). As noted by @abbodi86 on AskWoody.com: The note means [they] are going to release a separate “small” update for WUC, similar to this one for version 1507. They could also release the update directly as a SelfUpdate for WUC like they used to do with Windows prior [to] Windows 8 (for example, latest for Windows 7 is v7.6.7600.320 before they shifted to separate WUC updates starting with KB2990214). Windows Server 2016 When you run the Get-PhysicalDisk cmdlet, some disks may display an operational status of "In Maintenance Mode." The Get-VirtualDisk cmdlet may also display the operational status of the virtual disk as "Degraded." There’s a manual workaround described in KB 4043361. On Windows Server 2016, when you try to download updates by using Windows Update (stand-alone or WSUS), the process hangs at 0 percent completion. Microsoft has a description of the problem and two manual overrides in KB 4039473. Windows 8.1 Everyone’s favorite whipping boy just took another lash. Many folks report that, after installing KB 4038792 — the September Monthly Rollup for Win 8.1 — they can no longer log on to their computers with a Microsoft account. I posted the details yesterday. Still no word from Microsoft – not even an acknowledgment of the problem on the KB article. Windows 7 There’s a well-publicized problem with Internet Explorer 11 suddenly sprouting a search box on the address bar after installing KB 4038777 (the Windows 7 Monthly Rollup) or KB 4036586 (the September Internet Explorer Security-only patch). For a detailed look at what’s happening, with screenshots, see ElderN’s post on the Microsoft Answers forum. Turns out up the flim-flammery is a result of font sizes changed behind the scenes and a possible undocumented switcheroo in one of the IE settings. See @PKCano’s post. Poster Richard has also identified a problem with starting IE 11 after this month’s Windows 7 updates — and he found a solution. Again, it’s related to undocumented changes in the Tab View settings and in font size. See post 8 on the AskWoody Lounge. Office I’ve seen no change from the sorry state we were in a week ago: Microsoft pulled the September Outlook 2007 security patch KB 4011086 and replaced it with KB 4011110, but you have to manually uninstall the bad patch before you install the new one. Microsoft posted incorrect information about the uninstallation method. Both that patch and the Outlook 2010 patch, KB 4011089, have a nasty habit of changing languages in menus. .Net The .NET Security and Quality Rollups make certain custom images turn black. As Microsoft puts it: “After you install the September 12, 2017, .NET Security and Quality Rollups that apply to the .NET Framework 4.6, 4.6.1, 4.6.2, and 4.7, you experience rendering issues in Windows Presentation Foundation (WPF) applications that use WPF types in a Windows service.” There’s a description of the problem on the Visual Studio forum and a workaround in KB 4043601. The workaround suggests that you uninstall the Security and Quality Rollup and install the Security-only patch. In addition, Microsoft has released a preview of next month’s .Net Framework patches. Recommendations Assuming you don’t click “Enable Editing” in Word, there are no immediately pressing September patches. I say it’s wise to wait and see if any of the outstanding bugs get fixed — and wait to see if the patches-of-patches generate new problems of their own. Remember when patching was easy? Patch issues: September 2017 September’s retinue of Microsoft patches includes one very important .NET fix that blocks a security hole brought to life when you open an RTF file in Word. So far, it's only been seen in the wild in a Russian-language RTF document, apparently generated by NEODYMIUM, allegedly used by a nation-state to snoop on a Russian-speaking target. Several researchers have found ways to leverage the security hole, and it's only a matter of time before some enterprising folks come up with ways to turn it into a widespread infection vector. Bottom line: If you can't keep your finger off the "Enable Editing" button in Word, you better get this month's security patches installed. The Win10 Creators Update cumulative update, KB 4038788, brings Win10 1703 up to build 15063.608. It contains 25 security patches as well as dozens of plain old bug fixes. I’m seeing a number of complaints about Edge misbehaving after the update: behind-the-scenes crashes showing in Event Viewer and Reliability Monitor, and occasional stops with an application error event id of 1000. So far, there aren’t enough reports to confirm that there’s a bona fide problem with Edge, but it’s a concern. The bug in Word and Outlook that I described earlier this week, Buggy Word 2016 non-security patch KB 4011039 can’t handle merged cells, is still around. That’s the same bug I wrote about a couple of weeks ago in Word, Outlook merged-cell problem arises after install of patch KB 3213656. Microsoft has (finally!) confirmed both of the bugs. The only solution offered: "You can uninstall both KBs and your tables will return to normal," Microsoft said. "We anticipate releasing the fix for this issue in the next monthly update, tentatively scheduled for October 3, 2017." Excel 2016’s security patch KB 4011050 can put spurious black borders around rows or cells. If you’re getting unexpected black borders, download and manually install KB 4011165. As best I can tell, that bug isn’t listed on the official Fixes or workarounds for recent issues in Excel for Windows site. Multiple language problems with the Outlook 2007 security patch KB 4011086. Reports of Hungarian switched to Swedish, Italian to Portuguese, Slovenian to Swedish, Italian to Spanish, Dutch to Swedish, and who-knows-what-else. The solution, offered by TechNet poster Sitz-AIR: 1) uninstall KB4011086. If you have two of them listed, uninstall both of them. 2) hide them 3) restart Windows 4) Outlook 2007 UI original correct language was restored. A general reminder: If you have trouble installing Windows 10 updates, make sure you go through the list at Windows 10 install issues -- and what to do about them. Patch issues: August 2017 One week after Patch Tuesday, and would-be Windows Updaters are facing a handful of bugs. Some will find them minor annoyances. Others … not so much. Here are the known bugs, and where we stand in the struggle to resolve the problems. Worthy of note: Microsoft is now acknowledging many bugs that in the past would’ve gone without comment. There’s hope. Here are the known, significant buggy security patches: Windows 10 Anniversary Update, version 1607 – Cumulative update KB 4034658 wipes out Update History, unhides hidden updates, and effectively disconnects some updated computers from WSUS. Microsoft has acknowledged all three of those bugs in the KB 4034658 article with the usual “Microsoft is investigating this issue and will provide an update as soon as possible.” The first undocumented buggy driver this month for the Surface Pro 4, “Surface - System - 7/21/2017 12:00:00 AM - 1.0.65.1,” was released on August 1. It was replaced by a second driver “Surface – System – 7/31/2007 12:00:00 AM - 1.0.75.1” on August 4. The second one was documented. But then we saw four more undocumented Surface Pro 4 drivers — “Intel driver update for Intel(r) Dynamic Platform and Thermal Framework Generic Participant,” “Power Participant,” Processor Participant” and “Manager” — all released on Saturday, August 12. Sometime late on August 14, Microsoft posted information about two of the drivers. Both the Windows 7 August Monthly rollup KB 4034664 and the manually installed security-only patch KB 4034679 are causing problems with two-screen systems: The second screen starts showing gibberish with many applications, including Office. The problem has been widely reported — even replicated with a Proof of Concept program — but Microsoft hasn’t yet acknowledged it. The only bug reported by Microsoft in its August Windows 7 security patches is an old bug, continuing from July, in which a buggy LDAP plugs up TCP dynamic ports. That bug hasn’t been fixed. The Windows 8.1 Monthly rollup listing mentions a known bug: NPS authentication may break, and wireless clients may fail to connect. The solution is to manually set a registry entry on the server. Dozens of patches were made to Office earlier this month but, so far, I’m not aware of any bugs. Depending on which version of Windows you’re using, and how you’re using it, those bugs may be important or they may be annoyances. I continue to recommend that you hold off on applying this month’s patches. I haven’t seen any malware outbreaks that are blocked by the August patches, and we may get some surprises — good, bad or indifferent — later today. Have a question or a bug report? Drop by the AskWoody Lounge. Source: Microsoft Patch Alert: Where we stand with September’s Windows and Office patches (Computerworld - Woody Leonhard)
  21. The Universal USB Installer ais a tiny tool which makes it easy to copy a Linux live CD to a USB stick, so improving performance and making it possible to save files and settings.. The Universal USB Installer is easy to use. Simply choose a Live Linux Distribution, the ISO file, your Flash Drive and, Click Install. Upon completion, you should have a ready to run bootable USB Flash Drive with your select operating system installed. Other features include; Persistence (if available) – note that casper persistence will only work with fat16 or fat32 formatted drives. IMPORTANT: The Windows to Go option requires the USB be formatted NTFS with 20GB free disk space to hold the virtual disk. See FAQ for more info. Changelog: Universal-USB-Installer-1.9.7.9.exe – September 27, 2017 – Changes 09/27/17 – Version 1.9.7.9: Update to support PureOS, CentOS Installer, and Ubuntu Mini (Netboot Installer). Fix broken Debian, Lubuntu, and Xubuntu links. HomePage Download Universal-USB-Installer-1.9.7.9.exe MD5: 029B58D14386E7F4F7721CD93F5982B6
  22. Proton VPN 1.1.0 Stable Overview: ProtonVPN is designed from the ground up with a special emphasis on security and privacy, and features a number of innovations that we have made to harden VPN against compromises. ProtonVPN will eventually feature free and premium versions containing different features. For the beta period, you will be able to test the full-fledged premium version of ProtonVPN for free. Layers of Protection: Limitation / blocking access to the data / application Isolation and create a separate database / application Backup / important data Detecting and deleting viruses / malware. Proton Mail earlier announced beta VPN service for PLUS proton mail users. At this moment, Proton VPN offers 14 countries Australia Canada France Germany Hong Kong Iceland Japan Netherlands Singapore - New Spain Sweden Switzerland United Kingdom United States Standard Servers All of our servers are dedicated to ProtonVPN and feature high bandwidth connections Secure Core Servers Secure Core Servers add an additional layer of protection against VPN endpoint compromise. Learn More More Info: Official Product Homepage / Detailed Features: https://protonvpn.com/home Official Website: https://protonvpn.com/ Register/Signup: https://account.protonvpn.com/signup Login: https://account.protonvpn.com/login/ Open to Free Users Now! - We are opening up our free VPN to the general public – now available for download! Pricing: https://protonvpn.com/pricing VPN Servers: https://protonvpn.com/vpn-servers Security: https://protonvpn.com/secure-vpn VPN Threat Model: https://protonvpn.com/blog/threat-model/ Transparency Report: https://protonvpn.com/blog/transparency-report/ About Us: https://protonvpn.com/about Blog: https://protonvpn.com/blog/ We are open for registration. You can follow ProtonVPN on social media to get the latest news and updates: Facebook: https://facebook.com/ProtonVPN Twitter: https://twitter.com/ProtonVPN Reddit: https://www.reddit.com/r/ProtonVPN/ We would love to hear your feedback on the beta and what we can do to improve ProtonVPN. In addition to the links above, you can also send your suggestions to [email protected] If you run into trouble with ProtonVPN, or have questions, you can search for answers or contact us via the ProtonVPN support site: https://protonvpn.com/support/ Screenshots: Downloads: Download: https://protonvpn.com/download/ Windows Client: https://protonvpn.com/download/ProtonVPN_win_v1.1.0.exe Clients for macOS, Linux, Android, and iOS are still under development, but it is still possible to use ProtonVPN with these operating systems using third-party OpenVPN clients. Setup guides can be found here: MacOS: https://protonvpn.com/support/mac-vpn-setup/ Linux: https://protonvpn.com/support/linux-vpn-setup/ Android: https://protonvpn.com/support/android-vpn-setup/ iOS: https://protonvpn.com/support/ios-vpn-setup/ VPN Servers and Country Code for Linux, Mac, Android and iOS: https://protonvpn.com/support/vpn-servers/ More Info - Articles & Reviews: Three years ago we launched ProtonMail. Today, we’re launching ProtonVPN. Encrypted email provider ProtonMail launches free VPN service to counter increasing online censorship ProtonVPN Swiss-Based VPN Launches Keeping ProtonVPN Secure
  23. ================================================ 64X info ================================================ 86X info Difference between win 10 pro and Win 10 Lite edition Services =Removed components= Updates Packages Removed: Video Lite Edition No More Telemetry Lite Edition Its Close too LTSB Download Singel links 64X 86X
  24. Foundation Server 2017 Update 3 RC Link msdn:
  25. Download Ru and eng Direct links Windows 10 Build 10.0.16288 Changelog: Build 16288 was the 19th Insider Preview build of Windows 10 released after Creators Update build 15063 (RedStone 2). It was released on September 12, 2017. This new build arrived via new "RS3" (RedStone3) development branch. No watermark/build number on Desktop Bug fixes and general improvements
×