Jump to content
nsane.forums

Search the Community

Showing results for tags 'windows'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Found 78 results

  1. Just one week after a round of cumulative updates for Windows 10 versions, we get two additional, big patches for Win10 1703 and 1607. There’s also a confusing re-issue of KB 4099950, the largely misunderstood and poorly documented patch for the NIC/static IP bug in Win7. Thinkstock/Microsoft Yesterday, the third Tuesday of the month, Microsoft dumped another big bucket of patches: KB 4093117 brings Win10 1703 up to build 15063.1058, many miscellaneous fixes, no known issues. KB 4093120 brings Win10 1607 to build 14393.2214, a similarly large bunch of fixes, no known issues. KB 4093113 is the regular Monthly Rollup Preview for Win7. KB 4093121 is the similar Monthly Rollup Preview for Win 8.1. The Update Catalog says there’s a new version of KB 4099950, the abandoned patch for fixing the NIC/static IP bug in Win7. There are lots of oddities in this motley collection. The Monthly Rollup Preview for Win7 says: Addresses a stop error that occurred when the previous month’s update was applied to 32-bit (x86) computers with Physical Address Extension (PAE) mode disabled. If you thought we’d already been through that hassle, you’re right. The March Win7 Monthly Rollup and Security-only patch say the problems are fixed by the April patches we got a week ago, KB 4093118 and KB 4093108. (Thx, MrBrian.) Why does the Preview list them as solved, when they were listed as solved last week? Abbodi86 has an answer: The same fix is in both the April Monthly Rollup and in the Preview. I guess they ran out of something extra to list in the page 🙂 KB4093113 (the Monthly Rollup Preview) literally has nothing new over KB4093118 (the Monthly Rollup) except two things: Timezones update (details in KB4093753) Updated Windows Update Agent components I wonder why they didn’t document what's fixed/improved in the Windows Update Agent. Both the Win7 and 8.1 Monthly Rollup Previews released yesterday have the changes. The KB 4099950 patch-of-a-patch-of-a-buggy-patch continues to confuse. It’s supposed to be a precursor to installing the Win7 March Monthly Rollup, KB 4088875, or the Security-only patch, KB 4088878, and it’s designed to bypass the bug in those two March patches that mess up NIC settings and/or static IP addresses. It appears as if the metadata in KB 4099950 changed yesterday, but the files themselves have not. According to the Knowledge Base article: If you have previously installed KB4099950 prior to April 17, 2018 please uninstall the older version of KB4099950 and reinstall to assure you have the most recent version. Alpha128 posed a great question, unanswered by the official docs: So those of us who installed KB4099950 before March Rollup KB4088875, but prior to April 17, 2018, have to uninstall the older version of KB4099950 and reinstall to be sure we have the most recent version? Are we supposed to do that before or after installing April Rollup KB4093118? At this point, I don’t have a definitive answer to the question, although there’s a detailed discussion of the bugs in the earlier version of KB 4099950 starting here. Twbartender goes on to ask: The problem is when you click on the download tab in the catalog, there are 2 separate files being offered for download. One is an .exe file and the other is .msu file. pciclearstalecache_1c944f48bfb21d88a2054683abcd02327ecf6b37.exe windows6.1-kb4099950-x64_245d5aaf7d50587297825f9176be166c47ad10f7.msu Are both of these files required to be installed in order for KB4099950 to function properly? It would be nice of Microsoft if they would give a little more information on how to apply this new update. According to abbodi86, you only need the .msu file update. All of this would be rather funny, in a gallows-humor sort of way, if it weren’t for the fact that plenty of Win7 and Server 2008R2 machines are dropping off their networks because of bugs in last month’s security patches. Microsoft has provided extremely poor, frequently conflicting, documentation of the best way to proceed. Of course, I continue to recommend that you hold off on this month’s patches. Join us for the usual Wednesday-morning quarterbacking on the AskWoody Lounge. Source: Patches for Win10 1703 and 1607, and a brain-twisting update to the Win7 IP bug fix (Computerworld - Woody Leonhard)
  2. Manual Online KMS Activation for Windows, Server & Office Thanks to @november_ra1n Info: KMS Activation last 180 days set by Microsoft however after 180 days you can repeat the activation to gain another 180 days and so on forever. : ) PS: KMS Activation will be succeeded as long as KMS Server Host Address are still online see alternative Working Online KMS servers end of the text.... ====================================================================================== A) Windows & Server Activation: Windows <Type here to search> look for Command Prompt and (Right click and run as administrator) #Keep the Internet Connection on during activation!# 1. Install KMS Client Setup Key according to your Windows: slmgr /ipk <KMS Client Setup Key> NOTE: All Windows & Server KMS Client Setup Keys there (Make sure use right key according to your Windows Edition!): https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/jj612867(v=ws.11) or https://docs.microsoft.com/en-us/windows-server/get-started/kmsclientkeys 2. Run the following command to point Windows to the KMS server: cscript slmgr.vbs /skms kms.digiboy.ir 3. Run the following command to activate Windows: cscript slmgr.vbs /ato 4. Clear the name of KMS server (Optional) slmgr /ckms 5. Finally to find out & display your license information: cscript slmgr.vbs -dli ====================================================================================== Microsoft Office (2016, 2013, or 2010) Activation: NOTE:Unlike Windows for Office you need Volume License Edition to order to activate via KMS! Download Microsoft Office 2016 Volume License ISO [Original from VLSC]: http://bit.ly/2GLb5yY Windows <Type here to search> look for Command Prompt and (Right click and run as administrator) #Keep the Internet Connection on during activation!# 1. Set KMS Host... x64: cscript "%ProgramFiles%\Microsoft Office\Office16\ospp.vbs" /sethst:kmshostaddress x86 installed in Win x64: cscript "%ProgramFiles(x86)%\Microsoft Office\Office16\ospp.vbs" /sethst:kms.digiboy.ir Note:(Office14 = Office 2010; Office15 = Office 2013; Office16 = Office 2016) 2. Request Activation x64: cscript "%ProgramFiles%\Microsoft Office\Office16\ospp.vbs" /act x86 installed in Win x64: cscript "%ProgramFiles(x86)%\Microsoft Office\Office16\ospp.vbs" /act 3. Clear KMS Host (Optional) x64: cscript "%ProgramFiles%\Microsoft Office\Office16\ospp.vbs" /remhst x86 installed in Win x64: cscript "%ProgramFiles(x86)%\Microsoft Office\Office16\ospp.vbs" /remhst 4. Check Activation Status x64: cscript "%ProgramFiles%\Microsoft Office\Office16\ospp.vbs" /dstatus x86 installed in Win x64: cscript "%ProgramFiles(x86)%\Microsoft Office\Office16\ospp.vbs" /dstatus Note: All Office KMS Client Setup Keys can be find it there: http://sapsan.wclub5.com/archives/1230 ====================================================================================== Alternative Working Online KMS servers: kms.digiboy.ir kms.lotro.cc cy2617.jios.org kms.chinancce.com k.zpale.com m.zpale.com mvg.zpale.com kms.shuax.com ======================================================================================
  3. Migration watch: There were unexpected gyrations in the market in March, with Windows 7 gaining strength and Windows 10 falling back. Microsoft Just when it looked like Windows 10 was gathering momentum, the operating system last month sloughed off its biggest-ever chunk of user share, new data showed. According to analytics vendor Net Applications, Windows 10 lost eight-tenths of a percentage point in user share — an estimate of the portion of all PCs powered by that operating system — during March, ending the month on 33.3% of the world’s PCs and 37.4% of all systems running a Microsoft edition. (The second number is larger than the first because Windows accounted for 88.9% of all operating systems, not 100%.) The downturn was the largest ever for Windows 10, which has been trending up since its mid-2015 debut. That movement has not been a straight line, as March’s dip showed, but it has been impressive, averaging more than eight-tenths of a point monthly. It’s certain that Windows 10 will again post gains — there is no other reasonable alternative to Windows 7, which Microsoft will retire in January 2020 — and that last month was a blip. But the screeching stop was accompanied by an even larger increase in Windows 7’s user share: The veteran OS added 1.8 percentage points to its tally, ending March with 43.4%, slightly more than Net Applications had pegged it at in November 2017. Windows 7’s uptick was bad news on multiple fronts. First, if accurate — and there’s no guarantee any third-party measurement is — then Windows 7 will retain a larger number of users than earlier anticipated when it slips off the support list in 21 months. Using the 12-month average of Windows 7’s share movements, Computerworld now forecasts that the 2009 OS will account for about 38% of all active Windows editions in January 2020. At that time, Windows 10 should power approximately 56% of all Windows laptop and desktop PCs. The latest prediction for Windows 7’s end-of-support remainder was three percentage points higher than that of last month, which was calculated the same way. Second, the boost to Windows 7 pushes back the cross-over for Windows 10 — when it will power a larger percentage of all Windows PCs than Windows 7 — from August (as of February’s data from Net Applications) to December (using March’s numbers). The trend line for the two operating systems now indicates that at the end of this year — and just over 12 months from Windows 7’s retirement — Windows 10 will run 45.1% of all Windows systems, while Windows 7 will be on 44.8%. And third, the large jump in user share for Windows 7 immediately raises suspicion that the measurement was flawed, perhaps because fraudulent bot traffic — scoured by Net Applications from its data last year — has returned with a vengeance. If so, it would call into question the entirety of Net Applications’ user share estimates. All of those would point to a failure of sorts for Microsoft, because it would mean there will be many more PCs running Windows 7 in January 2020 than were on Windows XP when that OS exited support in April 2014. During the latter month, XP accounted for about 29% of all Windows editions. Since then, Microsoft has waged an unprecedented campaign on the part of Windows 10, using both strong-arm tactics and a wealth of new tools, to persuade and push customers into migration. Elsewhere in Net Applications’ data, the user share for Apple’s macOS plummeted a full percentage point to 8.9%, making moot its recent charge toward the once-fanciful 10% milestone for the company’s Macintosh line. Source: Windows by the numbers: It’s a topsy-turvy world, with Windows 10 down, 7 up (Computerworld - Gregg Keizer)
  4. Last week ended with a bang -- several bangs, in fact -- including a confusing and potentially damaging fix for the Win7 Total Meltdown hole, a patch for the NIC/static IP bug in Win7, and a laundry list of bluescreen fixes. Thinkstock/Microsoft As many of us were getting ready for the holiday weekend, after the surprise announcement about Windows being torn into three pieces, Microsoft shoveled yet another load of patches out the Automatic Update chute. Think of it as the software equivalent of a Friday night news dump. A destructive fix for Total Meltdown KB 4100480 kicked off the two days from patching purgatory with a Windows 7/Server 2008R2 kernel update for CVE-2018-1038, the “Total Meltdown” bug Microsoft introduced in Win7 back in January. Total Meltdown, you may recall, is a huge security hole implemented by all of these Microsoft security patches: KB 4056894 Win7/Server 2008 R2 January Monthly Rollup. KB 4056897 Win7/Server 2008 R2 January Security-only patch. KB 4073578 Hotfix for “Unbootable state for AMD devices in Windows 7 SP1. and Windows Server 2008 R2 SP1” bug installed in the January Monthly Rollup and Security-only patches. KB 4057400 Win7/Server 2008 R2 Preview of the February Monthly Rollup. KB 4074598 Win7/Server 2008 R2 February Monthly Rollup. KB 4074587 Win7/Server 2008 R2 February Security-only patch. KB 4075211 Win7/Server 2008 R2 Preview of the March Monthly Rollup. KB 4091290 Hotfix for “smart card based operations fail with error with SCARD_E_NO_SERVICE” bug installed in the February Monthly Rollup. KB 4088875 Win7/Server 2008 R2 March Monthly Rollup. KB 4088878 Win7/Server 2008 R2 March Security-only patch. KB 4088881 Win7/Server 2008 R2 Preview of April Monthly Rollup. If you installed any of those 11 patches on your Intel 64-bit Windows 7/Server 2008 R2 computer, you opened up a gaping hole known as “Total Meltdown,” or CVE-2018-1038, that allows any program running on your computer to run in kernel mode. Yes, any program that’s running can read or write into any part of memory. Microsoft infected all of those machines to defend against the professionally marketed Meltdown/Spectre vulnerability, which has never, ever been seen in the wild. Kevin Beaumont (@GossiTheDog on Twitter) said it best: The amazing thing is Meltdown is academic research, which is realistically very difficult to do at scale (ie nobody has managed it) whereas this introduced issue is trivial to exploit — even I can do. And I’m thick. Vess Bontchev goes on to say: The single bug this [KB 4100480] update fixes is catastrophic. Basically a bug that negates the fundamental security protections of the OS and returns it to the times of MS-DOS. Ulf Frisk, the guy who discovered this gaping security hole, said last Wednesday that the March Monthly Rollup, KB 4088875, plugs the hole. The next day he said that, oops, the March Monthly Rollup doesn’t fix the hole. Microsoft has now confirmed that the March Monthly Rollup actually introduces the hole. KB 4100480 cure worse than the disease? With the multitude of problems introduced by the March security patches, you may be wondering if this new (patch of a patch) ^ 12 brings along with it the bugs that have led to Microsoft “unchecking” the patch in Windows Update — to put it bluntly, the March patches stink so badly that Microsoft stopped force-feeding them a week ago. MrBrian has a step-by-step analysis of the bugs in the March patches and whether they’re inherited by KB 4100480. He concludes that the Internet Explorer, phantom NIC and reset manual IP bugs, and bluescreen VALID_POOL_ON_EXIT bugs in the March patches aren’t present in this new patch. The SMB server memory leak bug may or may not be in this new patch, but the bug has been around since January. And the bluescreens for PAE and SIMD may or may not be in the new patch. We’ve had ongoing coverage at AskWoody about the KB 4100480 patch and its mess. Susan Bradley, who has lots of experience with small business installations, has gone so far as to recommend SMEs with 64-bit Win7 machines roll them back to December: If there are users in your patching environment that surf and click on ANYTHING, I’d hope you’d make them do their random surfing on an iPad, not a Windows machine (probably still with local admin rights) until this Windows 7 patching mess gets straightened out. I don’t like telling people to roll back to pre-January updates, but neither do I appreciate Microsoft having constant side effects that are measurable and impactful and all that happens is that they keep on telling us that they are working on the issues and this will be fixed in a future release… If you have any January through March update installed, make sure KB4100480 is installed. Otherwise go into add/remove programs and roll back to December’s KB4054521 (security only) or KB4054518 (rollup) and then hang tight and keep our fingers crossed that April’s updates will resolve these issues. And then Microsoft please please please, do something about these known issues and fix them, because it pains me greatly to publically type this. A fix for patches that don’t have problems Also, on Thursday afternoon, Microsoft dropped a handful of patches that fix other bad bugs in previous patches. Susan Bradley has a short list that includes KB 4096309 for Win10 1607/Server 2016 that “addresses an issue that can cause operational degradation or a loss of environment because of connectivity issues in certain environment configurations after installing KB4088889 (released March 22, 2018) or KB4088787 (released March 13, 2018).” As Susan notes, both of the referenced fixed patches are still listed in their KB articles, as “Microsoft is not currently aware of any issues with this update.” Bluescreen stoppers Then there are the patches that fix bluescreens generated by earlier botched patches: KB 4099467 — Stop error 0xAB when you log off a Windows 7 SP1 or Windows Server 2008 R2 SP1 session. That’s a bug introduced in this month’s Win7/Server2008R2 patches. KB 4099468 — Stop error 0xAB when you log off a Windows Server 2012 session. That bug was introduced in this month’s Server 2012 patches. KB 4096310 — Stop error 0xAB when you log off a Windows Server 2008 session. Ditto ditto ditto. Save your IP if you’re prescient Then there’s KB 4099950, “Network Interface Card settings can be replaced, or static IP address settings can be lost” fix, released Friday, chronicled by MrBrian. Per the KB article: This update addresses issues introduced in KB4088875 and KB4088878 for Windows 7 Service Pack 1 (SP1) and Windows Server 2008 R2 SP1 where a new Ethernet Network Interface Card (NIC) with default settings may replace the previously existing NIC, causing network issues. Also addressed, is an issue where static IP address setting are lost after applying the update. These symptoms may be seen on physical computers and virtual computers running VMWare. Ends up this is just a package for the (modified) VBScript that, when run prior to installing this month’s patches for Win7, avoids the static IP busting nature of the patch. I talk about the VBScript program in my Patch Alert article from last week. Abbodi86 describes it: So it’s the easy automated version of the VBscript. It checks if KB2550978 hotfix is installed (or any superseder). [Note:=KB 2550978 is a many-year-old hotfix, last updated more than a year ago.] ... I wonder why Microsoft didn’t roll out that important fix years ago through Windows Update The important note is that you have to run KB 4099950 before you install this month’s Win7/Server 2008R2 patches. The bottom line I can recall lots of bad Windows patches over the past couple of decades, but I’d be hard-pressed to come up with any that approach this year’s phalanx of Windows 7 screw-ups. It’s as if Microsoft doesn’t care about old multi-billion-dollar businesses. For now, I continue to recommend that individuals stay put and don’t install any of the March patches. For enterprises, follow Bradley’s advice and roll back to December if you have users with indiscriminate clicking fingers. Join us for tea and sympathy on the AskWoody Lounge. Source: Windows patches for Total Meltdown, bluescreens, an IP stopper -- and little documentation (Computerworld - Woody Leonhard)
  5. This is a set of tools and functions for managing licensing, deploying, and activating Microsoft Office and Windows. All output from these functions is displayed in the Information Console. All functions are run in the background and the GUI is disabled to prevent running multiple functions, as they could conflict or cause damage if run concurrently. The Microsoft Office Setup Customization Functions (Customize Setup Tab), AutoKMS Uninstaller (if AutoKMS is installed), AutoRearm Uninstaller (if AutoRearm is installed), Office Uninstaller and Product Key Checker work even if Microsoft Office or Windows is not installed/supported. For information about individual functions, read further. This Pack Contains: HEU KMS Activator 10.0.0 KMSAuto Lite v1.3.5.1 Windows 10 Permanent Activator Ultimate v2.4 KMSAuto Net 2016 1.5.3 KMSpico 10.2.0 Final KMSpico 10.2.0 Portable Microsoft Toolkit 2.6.3 Final Office 2013 KMS Activator Ultimate 2015 1.5 Office 2013 KMS Activator Ultimate 2015 1.5 Portable PIDKey 2.1.2.1016 Portable Re-Loader Activator 2.6 Final Windows KMS Activator by AR_Alex 3.1.0 Windows 10 KMS Activator Ultimate 2016 v1.6 Windows 10 KMS Activator Ultimate 2016 v1.6 Portable Windows KMS Activator Ultimate 2018 4.0 Windows Loader 2.2.2 By DAZ + WAT Fix Office 2016 Permanent Activator Ultimate 1.7 Ratiborus KMS Tools 15.12.2017 Windows 10 Pro Permanent Activator Ultimate v2.2 AAct v3.8.5 AAct Network v1.0.3 Office 2013-2016 C2R Install 6.0.1 Office 2013-2016 C2R Install Lite 6.0.1 Office 2013-2016 C2R License Setup v1.05 KMS Server v1.2.4 KMS Server Service 2.0.4 Garbage Collector v1.3.4 Windows KMS Activator Ultimate 2017 v3.8 Ra1n Act1vat0r 1.0 RC 8 KMS Tools Portable 01.03.2018 PIDKey Lite v1.62.1 Windows 10 Permanent Activator Ultimate 2.5 KMS Lite 1.3.5.2 Supported Operation Systems: Windows 10 32-bit or 64-bit Edition Windows 8 32-bit or 64-bit Edition Windows XP 32-bit SP3 Windows Vista 32-bit and 64-bit with SP2 or higher Windows 7 32-bit and 64-bit Changelog: What`s new: Windows 10 Permanent Activator Ultimate 2.5 Windows 10 Pro Permanent Activator Ultimate 2.2 AAct v3.8.5 AAct Network.1.0.3 KMS Tools Portable 01.03.2018 KMS Lite 1.3.5.2 Download | 319.3 MB: Site: https://www.multiup.eu/en Sharecode[?]: /download/a80926e401e52febe34abac3595af7bf/microsoft-toolkit-collection-pack-march-2018-p2p.rar FYI: Multiup can be .eu or .org. Use the one that work for u. /en is optional. or Site: http://cdn02.r5download.com Sharecode[?]: /f1/MSMarch.2018.rar
  6. Cybercriminals are quite innovative, to be honest; they are always coming up with unique ways of exploiting Windows-based systems. According to the findings of Boston-based cyber-security firm Cybereason, one of their newly identified techniques involves using keylogger malware that exploits AutoIT or AutoHotKey (AHK). Fauxpersky Malware Spreads via malicious USB drives The malware, dubbed by Cybereason researchers as Fauxpersky, is though not as sophisticated as some of the recently discovered malware but it can efficiently steal passwords from Windows systems. It is spread via infected USB drives. Cybereason researchers Amit Serper and Chris Black wrote in the company’s official blog post published on Wednesday: “This malware is by no means advanced or even very stealthy. However, this malware is highly efficient at infecting USB drives and exfiltrating data from the keylogger through Google directly to the attacker’s mailbox.” AutoIT or AHk are quite basic tools used to write small programs for performing a variety of GUI and keyboard automation functions on Windows systems. For instance, AHK uses its own scripting language to let users write code to interact with Windows and perform tasks like reading text or sending keystrokes to other applications. It also lets users create a compiled .exe file. Fauxpersky is capable of impersonating Kaspersky, well-known Russian antivirus software, whereas the keylogger is created by abusing AHK app. The infection is distributed to the system via USB drives and manages to compromise PCs that run Windows by replicating files stored on the device’s listed drives. Four droppers Moreover, researchers also identified four droppers in the computer’s environment and each one had a dedicated name, which was quite similar to the names of Windows OS files. The names are as follows: · Explorers.exe · Spoolsvc.exe · Svhost.exe · Taskhosts.exe The method used by AHK keylogger is quite straightforward; it spreads through self-propagation technique. After being executed initially, the keylogger starts gathering information about all the listed drives on the computer and begins the replication process. When the core files of the malware start running on the system, whatever the user types on the computer gets stored into a text file bearing the respective window’s name. This way, the attacker gets a better idea of the background context of the text that has been keylogged. This text file’s contents are then exfiltrated from the device via a Google Form. The file then gets deleted from the system while the text file is transferred to the attacker via email. Google was notified of this form by Serper and Black, after which it was taken down in an hour. However, Google did not release any statement explaining who created the form. From the way the malware has been designed, it is evident that the developers did not pay attention to key aspects to make it look authentic such as changing the executable’s icon from that of AHk’s default icon or creating a rather unconvincing splash screen, which is an exact replica of Kaspersky’s screen. However, once the malware is spread onto the system, it remains persistent and gets booted up again after Windows system is restarted. It also creates a shortcut for itself in the startup directory of the Start menu. Limited damage and how to get rid of Fauxpersky Malware Currently, it is not clear how many computers have been infected but considering that the malware is distributed through sharing of USB drives, it can be assumed that it hasn’t been spread extensively as yet. If you feel that your computer is also infected, simply access %appdata%\Roaming\ and delete the files related to Kaspersky Internet Security 2017\ directory and the directory itself from the startup directory located in the start menu. Source
  7. Microsoft CEO Satya Nadella on Thursday morning announced a sweeping executive reshuffling. The biggest change: Terry Myerson, Microsoft’s executive vice president of Windows, will leave “in the coming months.” The leader of Microsoft Office, Rajesh Jha, will take control of a new group that encompasses Windows and Office. Other executive moves include a new title for Scott Guthrie, Microsoft’s cloud boss, as the company increases its emphasis on artificial intelligence for business software. Terry Myerson, the executive vice president of Windows who has long been a leader at Microsoft, will leave the company “in the coming months” as part of a big reshuffling of executive leadership announced on Thursday. “His strong contributions to Microsoft over 21 years from leading Exchange to leading Windows 10 leave a real legacy,” CEO Satya Nadella wrote of Myerson in an email to employees announcing the changes. “I want to thank Terry for his leadership on my team and across Microsoft.” As part of the reorganization, Rajesh Jha, the executive VP of Microsoft Office products, will expand his responsibilities to encompass Myerson’s role. Jha will become the leader of a group called Experiences and Devices, bringing Windows and Office together under a single banner. “The purpose of this team is to instill a unifying product ethos across our end-user experiences and devices,” Nadella said. “Computing experiences are evolving to include multiple senses and are no longer bound to one device at a time but increasingly spanning many as we move from home to work and on the go.” Myerson sent his own email to employees about the change, saying that he plans to take time off before his next opportunity. “[It’s] time for me to take a break, and then look forward to my own next chapter. I’m excited to see what’s next professionally. In the meantime, I can’t wait to spend quality time with my family and pursue a few big life goals,” Myerson wrote. Other changes include: Scott Guthrie, Nadella’s right-hand man who’s the executive VP in charge of Microsoft’s fast-growing enterprise cloud business, will lead a new group called Cloud and AI Platform. Jason Zander, a major leader on the Microsoft Azure cloud-computing platform, will be promoted to executive VP, though he will not join Nadella’s senior leadership team, a council of top managers from across the company. Harry Shum will stay in his role as Microsoft’s research boss, but he will work more closely with Guthrie’s and Zander’s teams to help bring more artificial intelligence into the Azure platform. Panos Panay, the exec in charge of Microsoft Surface, will be the chief product officer overseeing the company’s hardware businesses. Alex Kipman, the creator of the Microsoft HoloLens holographic goggles and the Xbox Kinect sensor, is now the leader of a new group called AI Perception and Mixed Reality. In the email, Nadella frames the changes as crucial to the continued growth of Microsoft by bringing together experts in different areas to work more closely with one another. “It will take courage to keep learning and growing together – encouraging one another’s individual strengths, building more diversity and inclusion across our teams, and collaborating as One Microsoft,” Nadella said. Here’s Nadella’s full email announcing the changes: Team, Today, I’m announcing the formation of two new engineering teams to accelerate our innovation and better serve the needs of our customers and partners long into the future. Over the past year, we have shared our vision for how the intelligent cloud and intelligent edge will shape the next phase of innovation. First, computing is more powerful and ubiquitous from the cloud to the edge. Second, AI capabilities are rapidly advancing across perception and cognition fueled by data and knowledge of the world. Third, physical and virtual worlds are coming together to create richer experiences that understand the context surrounding people, the things they use, the places they go, and their activities and relationships. These technological changes represent a tremendous opportunity for our customers, our partners – everyone. With all this new technology and opportunity comes a responsibility to ensure technology’s benefits reach people more broadly across society. It also requires that the technologies we create are trusted by the individuals and organizations that use them. Today’s announcement enables us to step up to this opportunity and responsibility across all our Solution Areas. With change comes transition, and one transition we have been planning for is for Terry Myerson to pursue his next chapter outside Microsoft. Terry has been instrumental in helping me arrive at this new organizational structure, and I deeply appreciate his leadership and insight as we’ve worked through the opportunity that lies ahead. Over the past several years, Terry and the WDG team transformed Windows to create a secure, always up-to-date, modern OS. His strong contributions to Microsoft over 21 years from leading Exchange to leading Windows 10 leave a real legacy. I want to thank Terry for his leadership on my team and across Microsoft. He will work with me on the transition over the coming months. Moving forward, Rajesh Jha will expand his existing responsibilities to lead a new team focused on Experiences & Devices. The purpose of this team is to instill a unifying product ethos across our end-user experiences and devices. Computing experiences are evolving to include multiple senses and are no longer bound to one device at a time but increasingly spanning many as we move from home to work and on the go. These modern needs, habits and expectations of our customers are motivating us to bring Windows, Office, and third-party applications and devices into a more cohesive Microsoft 365 experience. To further this vision, we are making the following leadership changes: Devices: Panos Panay will now serve as our Chief Product Officer and will lead our devices vision and further our product ethos across hardware and software boundaries for our first-party devices, while creating new categories and opportunities for the entire ecosystem. He will be the key leader ensuring end-to-end devices business execution excellence. Windows: Joe Belfiore will continue leading our Windows experiences and will drive Windows innovation in partnership with the PC and device ecosystem. The future of Windows is bright as we continue to innovate across new scenarios and device form factors, and more deeply connect to our Microsoft 365 offerings. Joe will share more about the Windows roadmap at Build. New Experiences and Technology: Kudo Tsunoda will continue to lead this team to define how we engage users with high-value experiences to help them achieve more. Enterprise Mobility and Management: Brad Anderson will continue to lead our Windows Enterprise deployment and management efforts with even tighter alignment across Microsoft 365 and will partner closely with the EMS teams within Cloud + AI Platform. Second, Scott Guthrie will expand his existing responsibilities to lead a new team focused on Cloud + AI Platform. The purpose of this team is to drive platform coherence and compelling value across all layers of the tech stack starting with the distributed computing fabric (cloud and edge) to AI (infrastructure, runtimes, frameworks, tools and higher-level services around perception, knowledge and cognition). To facilitate these new capabilities, we are making the following leadership changes: Azure: Jason Zander is being promoted to executive vice president, Azure, and will lead this team. The Windows platform team led by Harv Bhela, Henry Sanders and Michael Fortin will join Jason’s team. Windows platform is already a core part of Azure across both the cloud and edge, and this shift will enable us to accelerate our efforts to build a unified distributed computing infrastructure and application model. Roanne Sones will continue to lead our technical engagement with OEMs, ODMs and silicon vendors, and her team will also join Jason’s team. Business AI: The Customer Service, Marketing and Sales Insights teams, previously led by Gurdeep Singh Pall, will join James Phillips’ Business Applications Group. I am thankful for Gurdeep’s leadership in building these new AI solutions that are going to help differentiate Microsoft in this area. This is a notable example of taking research breakthroughs to start new product efforts grounded in customer needs and then mainstreaming them. Universal Store and Commerce Platform: Eric Lockard and his team will also join the Cloud + AI Platform team to both help with our own digital transformation and add new capabilities to our business application efforts. AI Perception & Mixed Reality (MR): Alex Kipman will lead this new team, which brings together all our speech, vision, MR and additional perception capabilities into one team. This team will continue to build first-party products and the core building block cloud services for third parties on Azure. XD Huang, Yu-Ting Kuo and their teams will join this group, as well as Gurdeep’s Ambient Intelligence team. Alex and team will take guidance on all AI-related areas from Harry Shum and work very closely with AI + Research (AI+R). AI Cognitive Services & Platform: Eric Boyd will lead this new team and drive our AI Platform, AI Fundamentals, Azure ML, AI Tools and Cognitive Services. Joseph Sirosh and team will join this new group. Eric and team will take guidance on all AI-related areas from Harry Shum and work very closely with AI+R. Harry Shum will continue to lead our third engineering team, AI + Research, which is instrumental in the key technology advances required across all our product teams. When we established AI+R nearly two years ago, our primary goal was to accelerate the adoption of AI innovations from research into product, and the changes we are making today reflect our strong progress. In fact, just yesterday I spent time at TechFest and came away inspired by all the innovations and most importantly how quickly they were making their way into our products. We will continue to drive investments in AI+R across research and AI breakthroughs that are key to our long-term success. As we make technological progress we need to ensure that we are doing so responsibly. To this end, Harry and Brad Smith have established Microsoft’s AI and Ethics in Engineering and Research (AETHER) Committee, bringing together senior leaders from across the company to focus on proactive formulation of internal policies and how to respond to specific issues in a responsible way. AETHER will ensure our AI platform and experience efforts are deeply grounded within Microsoft’s core values and principles and benefit the broader society. Among other steps, we are investing in strategies and tools for detecting and addressing bias in AI systems and implementing new requirements established by the GDPR. While there is great opportunity, ensuring we always act responsibly for our customers and partners will continue to be a hallmark of our work. To truly get the best impact from our efforts, we will have to push ourselves to transcend Conway’s law. Having a deep sense of customers’ unmet and unarticulated needs must drive our innovation. We can’t let any organizational boundaries get in the way of innovation for our customers. This is why a growth mindset culture matters. Each one of us needs to push on what technology can do for people and for our world. It will take courage to keep learning and growing together – encouraging one another’s individual strengths, building more diversity and inclusion across our teams, and collaborating as One Microsoft. It’s amazing what we have been able to accomplish together, and yet I still believe we are in the very early days of what is possible. We’ll talk more about these changes at the Q&A next week and the important work ahead. Satya Here’s Myerson’s memo to employees: Team, It is an emotional day for me as I look toward starting my next chapter outside of Microsoft in a few months. We’ve been discussing this for some time, but today it becomes real. Satya’s leadership and insight in defining a Microsoft 365 experience, built on top of an intelligent edge/intelligent cloud platform is inspiring. I believe in it, and that these changes are great for Microsoft. Change can be invigorating for us all and I’m grateful I had the opportunity to work with Satya on helping define this new structure. I will be around as we work through this transition, and then I will continue to root on Satya and this team every day. Microsoft has been my work, my team, and my purpose for 21 years. Over the years I have worked with so many of you to take on big challenges and serve our customers. I’ve learned so much. We’ve accomplished so much together. And I have had so much fun. Your passion, commitment, and sheer brilliance has kept me inspired. You have taught me new ways of looking at the world. You made me a better leader. And together, we have delivered products that positively changed the way people work and live. I am grateful for each of you. Most recently, with Windows 10 we set out to restore the trust of our consumer and business users and set Windows up to be a key part of the new Microsoft. With us now approaching 700M active Windows 10 users, commercial usage growing 84% YOY, Xbox One running a Windows 10 core, Surface innovation highlighting the Microsoft 365 experience, HoloLens bringing breakthroughs in computer vision, a universal store enabling GamePass, Azure reserved instances, and Office distribution, and a revitalized partner ecosystem – we’ve made incredible progress, and set the foundation for a new chapter to begin. But it’s time for me to take a break, and then look forward to my own next chapter. I’m excited to see what’s next professionally. In the meantime, I can’t wait to spend quality time with my family and pursue a few big life goals. While today I have many emotions, I’m mostly filled with gratitude and optimism – gratitude for the experiences I have had and optimism for the future ahead. Sincerely, thank you for all the incredible experiences we’ve had together. Source
  8. With a smattering of bugs reported in this month’s massive patching trove, Windows 7 has taken one – make that two – on the chin. It’s a classic Win7 damned-if-you-do, clammed-if-you-don’t situation. Thinkstock/Microsoft An enormous number of patches spewed out of Microsoft this month, with two ponderous cumulative updates for each version of Windows 10, a third “bonus” bug fix for Win10 Fall Creators Update (version 1709), and a just-described bug in Windows 7 that’ll leave you begging for a Win7 patch that works. There’s also a bit of comic relief with a patch for Win10 1709, KB 4094276, that “makes improvements to ease the upgrade experience to Windows 10 Version 1709.” That’s a wonderful example of a self-referential fix. Multiple patches for all versions of Win10 If you’re running Win10, you saw multiple big patches in March: Version 1709 – the Fall Creators Update — saw an emergency fix, KB 4090913, on March 5, which fixed a bug introduced in the February round of patches (and rendered some machines unbootable); a “regular” Patch Tuesday patch, KB 4088776 on March 13; and a big out-of-out-of-band patch KB 4089848 on Thursday, March 22. The biggest complaints involve the usual chorus of patches that refuse to install, and driver problems. Reports of INACCESSIBLE_BOOT_DEVICE bluescreens are tapering off. Version 1703 – the Creators Update — also got a bug fix, KB 4092077, on March 8, which fixed an earlier patch that crashed the user interface. 1703 also saw two big cumulative updates, KB 4088782 on Patch Tuesday and KB 4088891 on the really-out-of-band patch date: March 22. Version 1607 and Server 2016 – the Anniversary Update — also got two big cumulative updates, KB 4088787 on Patch Tuesday and a big booster KB 4088889 on the way-out-of-band Thursday. Just a reminder that, unless you’re using 1607 Enterprise or Education, your version runs out of support (as it were) on April 10. March also presented us with the third, uh, opportunity to get forcibly pushed from Win10 1703 to 1709 – even on systems specifically set to block the upgrade. At various points in March, users also saw updates to the Servicing Stacks for all three Win10 versions. Apparently, they resolved the race condition-related bugs that left USB drivers, in particular, dead in the water. If you’re installing the Win10 cumulative updates manually, make sure you install the respective Servicing Stack Update before you install the cumulative update. A little bit of Word poison Microsoft released a buggy Office 2016 security patch, KB 4011730, which left Word 2016 in such a bad state that it couldn’t save – or sometimes even open – files. We discovered later that if you install the March non-security patch for Office 2016, KB 4018295, Word 2016 suddenly got its mojo back. Microsoft is researching this problem and will post more information in this article when the information becomes available. Of course. Windows 7: To patch or not to patch All of which serves as prelude to the massive cluster-cluck that engulfed Windows 7 in March. Win7 and Server 2018 R2 received a relatively modest Monthly Rollup, KB 4088875, and the obligatory Security-only, manually installed patch, KB 4088878, on Patch Tuesday, March 13. Almost immediately, we started seeing reports of networking problems with the patches, and some bluescreens. Shortly afterward, two specific problems with broken manual IP addresses and disabled Network Interface Cards (vNICs) bubbled up. At first, Microsoft didn’t acknowledge the bugs; instead it stopped the Monthly Rollup from installing automatically (for those of you naïve enough to have Automatic Update enabled). As days passed, Microsoft finally published a detailed list of “known issues in this update.” At this point, some users report that KB 4088875 appears in Windows Update as an “important” update that isn’t checked, and which doesn’t install by default. But there’s more. Others say it’s off the Windows Update list, but apparently it’s still being pushed out via WSUS servers. Microsoft released, then re-released, an ad-hoc VBScript program that was supposed to fix the problem. But the script has raised all sorts of questions. Poster MrBrian reports that the script was changed on March 27, with no notification. Poster abbodi86 has an improved version posted on Pastebin. But there’s more to the story. Yesterday, security researcher UlfFrisk posted a report about a new big security hole in Windows 7. Bucking the recent trend, UlfFrisk avoided a massive publicity campaign, replete with pre-defined exploit names and cute logos, but his “Total Meltdown” exploit almost defies imagination. As Günter Born says: Microsoft’s Meltdown updates shipped in January 2018 and February for Windows 7 (and Server 2008 R2) intended to mitigate the Meltdown vulnerability rip open a huge security hole. This allows any process under Windows 7 to read and write to any memory area without exploits… Unfortunately, an accident happened in the January 2018 [Win7] patch (and also in February 2018 patch) when… if a (user) process has read/write access to the page tables, it is [trivial] to access the entire physical memory. This isn’t “Sky is Falling” time. But it means that if you’re running Win7 64-bit or 2008R2 64-bit on an Intel machine, and you installed either the January or February Win7 Monthly Rollups or Security-only patches, Microsoft flipped the wrong bit, and you now have a big hole in your machine that will let any running program look at and change everything in memory. Note that you have to be running a destructive program in the first place – Total Meltdown doesn’t make it easier to run bad programs – but the security hole appears to be massive, by any estimation. The problem is solved by the March Win7 patches, but…, well, you can see what a mess those have become. Thx to @PKCano, @sb, @MrBrian, @abbodi86. Having problems with this month’s patches? Join us on the AskWoody Lounge. Source: Microsoft Patch Alert: Windows 7 takes the brunt of March patching problems (Computerworld - Woody Leonhard) Poster's note: Lengthy multipage article, first page only shown here, use above link for complete article.
  9. Windscribe VPN 1.81 Build 42 / 41 Stable Internet As It Should Be Windscribe is a desktop application and browser extension that work together to block ads and trackers, restore access to blocked content and help you safeguard your privacy online. Learn More. https://assets.windscribe.com/video/windscribe_explainer_480p.mp4 What's New: https://blog.windscribe.com/windscribe-1-81-beta-changelog-b9c557906d60 We’ve been working on this version for quite a while, existing installations should prompt you to update the app over the next 48 hrs. Here is what’s new. Changelog: New features IKEv2 protocol support (manual and automatic mode) Emergency Connect / Secure Login Fixed bugs Wifi-sharing not working after wakeup Forcibly close all TCP sockets after tunnel up Don’t forcibly disconnect if currently connected node is missing from the server list Language detection defaults to English instead of Arabic Reinstall/enable WAN miniport adapters if missing/disabled Adjusted DPI to work with multiple scale factors Other Changes Added “Disconnecting” state Eliminated redundant API calls Reduced the server ping frequency Updated OpenVPN binaries to latest version Don't auto-enable the firewall (in Automatic mode) on computer start up if auto-connect is false Simplified installer flow + additional “custom install” options Async DNS resolver Adjusted node selection algorithm to favor lower latency nodes Forcibly expand certain locations when the country name is clicked Detect if LAN range is RFC-1918 complaint To-do list for next version: CLI interface Favorite locations Dedicated IP support IKEv2 connectivity test SOCKS5 server UDP associate support Fix startup error on multi-user computers Mystery feature 1 Mystery feature 2 Downloads: Windscribe for Your Computer: Windscribe for Your Browser: Windscribe for Your Phone: Windscribe for Your TV: Windscribe for Your Router: Config Generators:
  10. Microsoft continues its any-day-of-the-month patching policy with a highly anticipated preview of the April Win7 Monthly Rollup, complete with multiple known bugs, and a rushed patch for IE on Win7 that resolves a bug introduced two weeks ago. Thinkstock When Microsoft released its gang of patches last Thursday, one patch was remarkably absent: We didn’t get a preview of next month’s Windows 7 Monthly Rollup. Windows 8.1, Server 2012 and Server 2012R2 all got previews, but not Win7 (or Server 2008R2). I hypothesized at the time that Microsoft didn’t release a new Win7 April Monthly Rollup preview because they were still trying to fix the bugs they introduced in this month’s Monthly Rollup for Windows 7 and Server 2008 R2, KB 4088875, and the download-and-manually-install Security-only patch for March, KB 4088878. Microsoft now acknowledges all of these bugs in March’s Win7 Patch Tuesday release: After you install this update, SMB servers may leak memory. A Stop error occurs if this update is applied to a 32-Bit (x86) machine with the Physical Address Extension (PAE) mode disabled. A Stop error occurs on computers that don't support Streaming Single Instructions Multiple Data (SIMD) Extensions 2 (SSE2). A new Ethernet virtual Network Interface Card (vNIC) that has default settings may replace the previously existing vNIC, causing network issues after you apply this update. Any custom settings on the previous vNIC persist in the registry but are unused. IP address settings are lost after you apply this update. All of those bugs were new in the March Monthly Rollup, except the memory leak, which first appeared in January. We’re getting nowhere fast. As usual, the Preview Monthly Rollup contains only non-security patches that are expected to be re-released in next month’s Monthly Rollup. (Of course, I never recommend that you install Previews.) With the new, delayed preview of April’s Win7 Monthly Rollup, you might expect that at least some of those bugs would be fixed. Not so. They’re all still around, per the official write-up. Microsoft is working on a resolution and will provide an update in an upcoming release. Sooner or later. A patch for IE bug In addition to the Friday night Monthly Rollup preview that doesn’t fix the major bugs, Microsoft rolled out a patch for a bug introduced in IE by its Patch Tuesday patch. Another patch of a botched patch. The article for the original Patch Tuesday patch, KB 4089187, has been modified to state: After you install this update, security settings in some organizations that are running Windows 7 SP1 or Windows Server 2008 R2 may prevent Internet Explorer 11 from starting because of an invalid SHA1 certificate. To resolve this issue, use one of the following methods: Whitelist the SHA1 certificate to allow Internet Explorer 11 to start. Install Cumulative update for Internet Explorer: March 23, 2018. If you’re a bit rusty on manually whitelisting an SHA1 certificate, you can run the patch released on Friday night, KB 4089187. Note that this is only for IE 11 running on Windows 7 (and Server 2008R2). I think of it as Mother Microsoft’s way of telling you that you really shouldn’t be using IE. Excuse my snark. Poster Cavalary on AskWoody notes: [It] seems like there are no new fixes in 4096040 (the Friday night patch), and I’d say that if you can start IE with 4089187 (the Patch Tuesday patch) or don’t use it and don’t care whether you can start it, you’re fine without installing 4096040. Günter Born on Born’s Tech and Windows World says: The following CVEs have undergone a major revision increment (with KB 4096040): * CVE-2018-0889 * CVE-2018-0932 * CVE-2018-0891 * CVE-2018-0935 * CVE-2018-0927 * CVE-2018-0942 * CVE-2018-0929 Of course, you’ve been following along here and know that we’re still at MS-DEFCON 2, which means you didn’t install the original buggy patches, anyway. Right? By the by — for those of you who are manually installing the cumulative updates for Windows 10 1709, 1703, or 1607, there’s now an explicit warning in the associated KB articles: Important When installing both the SSU (KB4088825) and the LCU updates from the Microsoft Update Catalog, install the SSU before installing the LCU. Which is an obtuse way of saying that if you’re going to install the Cumulative Update manually, you better get the Servicing Stack Update installed first. MrBrian speculates that the root problem addressed in the Servicing Stack Update is the race condition on installation that Susan Bradley talked about last week. The Servicing Stack updates for 1703 and 1607 were part of last Thursday’s blast. The Servicing Stack update for 1709, KB 4090914, was released on March 5, and the KB article was updated on March 23 — but I don’t see any record of the patch itself being re-issued. It seems that your Patch scorecard now needs its own scorecard. Thx, @MrBrian, @Cavalary Join us for patch noodling — Tuesday, Thursday, Friday or otherwise — on the AskWoody Lounge. Source: 2 Friday night patch specials: A flawed Win7 Monthly Rollup preview and an IE fix (Computerworld - Woody Leonhard)
  11. Hello. I'm new here so I'd request the moderators to help me or to correct me if I'm wrong. I've been searching for Adobe Premiere Pro to download but have failed to find it on this site and ru board because of rank issue I think. Can anyone please provide me with the method for downloading adobe Softwares and patch 'em.
  12. On Thursday Microsoft released new cumulative updates for all Win10 versions, a couple of Servicing Stack updates, two previews of monthly rollups, a refreshed Windows Update cracker — and absolutely nothing that fixes the flaws in this month’s botched Win7 patch. Thinkstock/Microsoft “Hey, Cortana.” (Pause.) “Is my PC working yet?” It’s getting to the point that patches come flying out of Microsoft on any odd day. On most odd days, for that matter. Yesterday, Thursday, was no exception. On March 22 we saw all of these new patches: Cumulative Updates for Win10 All three of the active versions of Win10 got cumulative updates — the second set in the past two weeks: KB 4089848 brings 1709 (Win10 Fall Creators Update) up to Build 16299.334 – seems to have fixed the problem with the January Delta update KB 4088891 brings 1703 (Win10 Creators Update) up to build 15063.994 KB 4088889 brings 1607 (Win10 Anniversary Update) up to build 14393.2155 – this one’s a bit surprising because 1607 is due to go off life support in a couple of weeks. We also got Servicing Stack Updates for two of the three active versions of Win10: KB 4088825, for Win10 1703 KB 4089510, for Win10 1607 I don’t see any Servicing Stack update for 1709. Windows 10 patches are stacking up like jets at JFK in a snowstorm. Problems with KB 4089848 Yesterday’s cumulative update for Win10 Fall Creators Update, KB 4089848, has raised some red flags. It’s still too early to say for sure if there are significant problems, but ... Poster yvrhnl on AskWoody reports: KB 4089848 disabled Start Menu, Notification Centre and Settings Menu. After rollback all enabled again. Poster Robert in PA on the Microsoft Answers forum says: I installed the latest Windows 10 update - KB4089848 - today, 3/22/18. The update prevents my HP printer from printing. I deinstalled the update, and my printer started working again … HP LaserJet Pro MFP M426fdw I cannot print from any application when this KB is installed. The error messages I receive are pop ups that disappear faster than I can write them down. Poster Washingtonian-in-SD on the Microsoft Answers forum says: Update installed successfully (verified in Programs and Features); however, since it was installed, all information has been wiped from the installed update history from Windows Update. Previews of Monthly Rollups — and no respite for Win7 Yesterday, Microsoft also released two previews of upcoming Monthly Rollups: KB 4088882 for Win 8.1 and Server 2012 R2 KB 4088883 for Server 2012 Notably, distressingly, there’s no preview of a Monthly Rollup for Win7. You may recall that this month’s Monthly Rollup for Windows 7 and Server 2008 R2, KB 4088875, and the download-and-manually-install Security-only patch, KB 4088878, have triggered all sorts of problems. Microsoft has acknowledged all of these problems: After you install this update, SMB servers may leak memory. A Stop error occurs if this update is applied to a 32-Bit (x86) machine with the Physical Address Extension (PAE) mode disabled. A Stop error occurs on computers that don't support Streaming Single Instructions Multiple Data (SIMD) Extensions 2 (SSE2). A new Ethernet virtual Network Interface Card (vNIC) that has default settings may replace the previously existing vNIC, causing network issues after you apply this update. Any custom settings on the previous vNIC persist in the registry but are unused. IP address settings are lost after you apply this update. Apparently in response to the multiple screw-ups, it looks like KB 4088875 now appears as an “Important” update in the Windows Update list, but isn’t checked by default, and doesn’t install automatically, even with Automatic Update enabled. I’m seeing conflicting reports about whether KB 4088875 currently appears on the WSUS list. To the best of my knowledge, Microsoft hasn’t yet deigned to explain to us mortals what’s going on with the botched patch — but there’s no doubt that you should avoid it. The Windows Update cracker KB 4023057 is back I don’t know what KB 4023057 actually does, but it’s been implicated as the impetus of the “accidental” forced upgrades from 1703 to 1709 — which happened even if 1703 was set to defer upgrades — that I reported on two weeks ago. Blame has fallen on a mysterious new, uh, feature called “Update Assistant” that bypasses Windows Update settings somehow, and this KB has been linked to the Update Assistant. On AskWoody, poster abbodi86 says about an earlier version of KB 4023057: It evolved from just fixing registry to restore tasks and fix drivers DB, and compatibilty for UAC management. The main purpose or function did not change: re-allow blocked or disabled Windows Update. Of course, Microsoft’s official description is the usual “Nothing to see here, folks” drivel: This update includes reliability improvements that affect the update service components in Windows 10 Versions 1507, 1511, 1607, and 1703. This update includes files and resources that address issues that affect the update processes in Windows 10. These improvements ensure that quality updates are installed seamlessly on your device and help to improve the reliability and security of devices running Windows 10. When Windows update is available for your device, devices that do not have enough disk… Only certain builds of Windows 10 Versions 1507, 1511, 1607, and 1703 require this update. Devices that are running those builds will automatically get the update downloaded and installed through Windows Update. This update is also offered directly to Windows Update Client for some devices that have not installed the most recent updates. This update is not offered from the Microsoft Update Catalog. I just wish Microsoft would speak plainly. In this case, some Win10 users (not sure which ones) are getting a patch that (apparently?) breaks their wuauserv Windows Update server settings. I assume that its entire reason for existence is to push more people onto the next version of Win10. When did Microsoft become the enemy? Keep us posted on the AskWoody Lounge. Source: More Windows patches — and warnings about the Win10 1709 update KB 4089848 (Computerworld - Woody Leonhard)
  13. Auslogics Windows Slimmer is a full-service option to clean up useless data, uninstall software including obsolete Windows versions.The goal here is to slim down non-essential data that is taking up precious space to help improve your machine's performance and speed. Over time your PC accumulates items that are no longer needed (or ever needed) including some non-optimal settings, unused system apps, in the background data transmitting options, etc., these take up space that waste resources and are detrimental to the overall efficiency of your machine. You need to periodically perform a clean up of these junk items to allow your machine to operate at its best. Items such as old System Restore points, Windows Update files, outdated Windows libraries or disabled system components can take up a large amount of disk space over time and reduce performance. Windows Slimmer is designed to enable any user a simple option to remove unneeded Windows components, uninstall obsolete or unused apps and tweak your machine's settings to reduce the footprint of your OS on your drive smaller, and also reduce the amount of memory and CPU power needed for privacy protection by blocking unnecessary data transmissions. You have a choice for the type of maintenance you wish to perform; one-time maintenance which allows you to target specific files and data like disabled components, the Windows.old folder. The other is regular maintenance which as the name implies is to clean up those areas that need constant attention like memory dump files, the recycle bin, temp and cache folders, etc. Lastly, you have the app list clean up where you can uninstall any app from your machine. This option also includes an app rating key providing you with an at-a-glance indicator to the trustworthiness of the app, but we are not sure exactly where the rating was compiled. That said, it is another nice option for cleaning out junk and providing some always needed space. Changelog: 1.0.7.0 The program will now handle folder links and empty folders. Enhanced processing of issues during Regular Maintenance scans. Resolved a few user interface issues. Made some improvements to processing of Retail Demo content. 1.0.6.0 Resolved some user interface issues. Fixed some minor bugs. 1.0.5.0 Made improvements to Scheduler interaction mechanism. Check for updates will now display information on what’s new in the latest version available for download. Fixed all known bugs. 1.0.4.0 Made some enhancements to ensure faster algorithm execution. Made functionality improvements to support the latest changes in Windows 10. Fixed all known bugs. 1.0.3.0 Made functionality improvements to support the latest changes in Windows 10. Fixed all known bugs. Homepage: https://www.auslogics.com/en/software/windows-slimmer/ Changelog: https://www.auslogics.com/en/software/windows-slimmer/popup/history/ Download: http://downloads.auslogics.com/en/windows-slimmer/windows-slimmer-setup.exe
  14. AV-Test 2017: 12 months recovery test for 9 antiviruses and 7 special tools AV-Test examined 9 security suites and 7 special tools in terms of their performance after malware attacks. Test period was 12 months in 2017. Nine security suites were installed on an already infected system. Then antivirus protection was switched off briefly for infection and reactivated. This simulates situation in which malware is able to penetrate the system, and the solution only receives the detection information after infection. Each security suite was required to repair system after 76 attacks in the entire test period. In Antivirus class winners were Kaspersky and Bitdefender. They repaired completely 72 of 76 infections, and in other 4 cases only harmless remnants remained in Windows system. G Data, Avast, Symantec and Avira also performed very well and they left only harmless remnants. Malwarebytes found all malwares but failed repair system in three cases. Microsoft Security Essentials did not remove active malware components 4 times and even failed to detect 2 malwares. Spyhunter didn't detect 6 malwares. In Special tool class winners were Kaspersky Removal Tool and Bitdefender Rescue Disk which removed all active malware components from infected Windows system. Heise Disinfect and G Data BootMedium also found all malware but they left much passive thrash in system. Two Microsoft tools and Avast Rescue Disk were not among the best choices in 2017. Source: https://www.av-test.org/en/news/news-single-view/the-best-after-the-crash-16-security-suites-and-tools-in-the-recovery-test-for-12-months/
  15. Windows 7 Sp1 AIO (x86x64) 13in1 en-us March2018 General Info:- Name :- en_w_7_AIO_x86x64_March_2018 Architecture :-x86-x64 Size:- 3.55gb Language :- English Activation:- In-Complete (Use given Activator) Updates:- Included all new updates of March 2018 Author :- Team OS Added/Removed:- Nothing , its a Complete iso with all new Updates of March 2018 Added Editions :- Windows 7 Starter x86 Windows 7 Home Basic x86 Windows 7 HOme premium x86 Windwos 7 Professional x86 (Retail) Windwos 7 Professional x86 (Volume) Windows 7 Ultimate x86 Windows 7 Enterprises x86 Windows 7 Home Basic x64 Windows 7 Home Premium x64 Windwos 7 Professional x86 (Retail) Windows 7 Professional x64 (Volume) Windows 7 Ultimate x64 Windows 7 Enterprises x64 ************************************************************** * Including Microsoft updates till 13.03.2018 and Internet Explorer 11 * NO tweaks or add-ons. * NO additional programs and software added. * NO graphics, scripts and wallpapers added or changed. * It’s the original image from Microsoft except added updates and IE11! Change log :- Integrated and replaced new Rollup updates Check Sums:- Name: en_w_7_AIO_x86x64_March_2018.iso Date: 3/18/2018 Size: 3.55 GB (3,812,749,312 bytes) Download: https://archive.org/download/FaresCD.Com.W7.AIO.March.2018/FaresCD.Com.W7.AIO.March.2018.iso SHA-1: 8ac53f39dbf743209dc51bcc2ef4088a2672d672 MD5: 871fa534e2475e842a878e747d316cc3 CRC32: 58179dc5 Thanks to Team-OS
  16. Win Update Stop 1.3

    This small Windows OS utility allows you to manually disable or enable automatic Windows updates. Sometimes you may want to stop Windows updates so you can choose when to download and install new Windows updates. As you know, Windows updates are very important but they are also known to occasionally create some incompatibilities or problems with the Operating System and the applications installed. Use this utility to block Windows updates and re-enable them when you desire. First, keep in mind that it is very important to keep your system up-to-date. However, if you want to disable or stop automatic Windows updates, you can use this free utility. There is no built-in option to permanently disable automatic Windows updates via Control Panel or Settings App in Windows 10, and by default Windows automatically installs any update found. With this simple tool you can permanently disable Windows Updates and re-enable Windows Updates when you want. Stop Windows Updates Permanently disable automatic Windows Updates via a simple GUI. Windows Update Status Find out if the Windows Updates are enabled or disabled in your PC. Check for Updates Click on ”Check for Windows Updates” to open the Windows Update App. Works on XP, 7, 8, 10 This tool works on all Windows OS version, from Windows XP to Windows 10. Very Lightweight The software application uses only a few MBs of memory, you will not even notice it. Free to Use This software is completely free to use for anyone, at home and at work. Whats New: + Minor fixes and optimizations Homepage: http://www.novirusthanks.org/products/win-update-stop/ Downloads: Installer: http://downloads.novirusthanks.org/files/win_update_stop_setup.exe Portable: http://downloads.novirusthanks.org/files/portables/win_update_stop_portable.zip
  17. Auslogics Windows Slimmer is a full-service option to clean up useless data, uninstall software including obsolete Windows versions.The goal here is to slim down non-essential data that is taking up precious space to help improve your machine's performance and speed. Over time your PC accumulates items that are no longer needed (or ever needed) including some non-optimal settings, unused system apps, in the background data transmitting options, etc., these take up space that waste resources and are detrimental to the overall efficiency of your machine. You need to periodically perform a clean up of these junk items to allow your machine to operate at its best. Items such as old System Restore points, Windows Update files, outdated Windows libraries or disabled system components can take up a large amount of disk space over time and reduce performance. Windows Slimmer is designed to enable any user a simple option to remove unneeded Windows components, uninstall obsolete or unused apps and tweak your machine's settings to reduce the footprint of your OS on your drive smaller, and also reduce the amount of memory and CPU power needed for privacy protection by blocking unnecessary data transmissions. You have a choice for the type of maintenance you wish to perform; one-time maintenance which allows you to target specific files and data like disabled components, the Windows.old folder. The other is regular maintenance which as the name implies is to clean up those areas that need constant attention like memory dump files, the recycle bin, temp and cache folders, etc. Lastly, you have the app list clean up where you can uninstall any app from your machine. This option also includes an app rating key providing you with an at-a-glance indicator to the trustworthiness of the app, but we are not sure exactly where the rating was compiled. That said, it is another nice option for cleaning out junk and providing some always needed space. Changelog: 1.0.6.0 Resolved some user interface issues. Fixed some minor bugs. 1.0.5.0 Made improvements to Scheduler interaction mechanism. Check for updates will now display information on what’s new in the latest version available for download. Fixed all known bugs. 1.0.4.0 Made some enhancements to ensure faster algorithm execution. Made functionality improvements to support the latest changes in Windows 10. Fixed all known bugs. 1.0.3.0 Made functionality improvements to support the latest changes in Windows 10. Fixed all known bugs. Homepage: https://www.auslogics.com/en/software/windows-slimmer/ Changelog: https://www.auslogics.com/en/software/windows-slimmer/popup/history/ Download: Installer: http://downloads.auslogics.com/en/windows-slimmer/windows-slimmer-setup.exe
  18. WUMT Wrapper Script 2.2.5

    WUMT Wrapper Script is used to launch Windows Update MiniTool and disable Windows Updates until you run it again avoiding unwanted reboots. The script auto-elevates and makes sure the Windows Update service is running, then runs the correct version (x86 or x64) of Windows Update MiniTool in "auto-search for updates" mode. After you close Windows Update MiniTool, it stops and disables the Windows Update service, and it won't run again until you run WUMT Wrapper Script next time. With the Windows 10 Anniversary Edition, Microsoft has once again removed Group Policies and registry tweaks on Windows 10 Pro and Windows 10 Home to protect Windows Updates from being disabled, among other things. As you're well aware, Windows Updates are important so this script, and the Windows Update MiniTool should be used by advanced users. This is distributed as text that you place in Notepad and save as a .cmd. Then you need Windows Updates in the same folder. We have done all of this for you, so all you need to do is download WUMT Wrapper Script.zip, extract to a folder and run Windows Update MiniTool.cmd as needed. Author's Desc + Script + Install Notes v2.2.5: Changes March 10, 2018 Script updated to v2.2.5 Improvements since v2.2.4 Fixed logic of rempl folder renaming in case of re-creation of rempl folder by subsequent updates. Changed order: now usoclient is disabled first, then remsh.exe Homepage Changelogs WUMT Wrapper Script @ Majorgeeks.com Download from Majorgeeks - WUMT Wrapper Script[Only latest build] + Windows Update MiniTool MajorGeeks - Mirror 1 MajorGeeks - Mirror 2
  19. Project Only Works In OOBE Mode. Recommend running the Query Tool "first" before installation, (See Notes below). 100+ OEM's: OEM included: • Acer • Advent • Action • Alienware • AOC • Aquarius • ASI •ASRock • Asus • ATcomputers • ASI • Bangho • Beko • BenQ • BGH-SA • ByteSpeed • Casper • CCE • chiliGREEN • Compaq • crea • CZC • Dell • Depo • digimix • ECS • eMachines • Epson • Equus • Everex • Excimer • EXO • Exper • Extra • Founder • FSC • Fujitsu • Gateway • Genuine • Gericom • Gigabyte • Greatwall • Haier • Hannspree • Hasee • Hampoo • HCL • Hedy • Higrade • HP • Hyrican • IBM • Impression • Infinity • Insys • Intelbras • iQon • Itautec • Jetway • JooyonTech • Kohjinsha • Kouziro • Kraftway • KSystems • Lanix • Lenovo • LG • M&A Technology • Maxdata • Mecer • Medion • Megaware • Mesh • Mitac • Mouse • MSI • NEC • Nokia • Olidata • Olivetti • Onkyo • OQO • Packard Bell • Panasonic • Paradigit • Paragon • Philco • Positivo • PowerSpec • Prolink • qbex • Quanmax • RMplc • Rover • Samsung • SCC • Semp Toshiba • Seneca • Sharp • Sony • Stone • Synnex • Systemax • Tangent • Targa • Tarox • TCL • TTL • Tongfang • Toshiba • Trigem • Twinhead • Velocity • Vestel • Viewsonic • viliv • WD Corporation • Wortmann • xplore • Zoostorm • ZT ~incl. Branding only: BioStar • Foxconn • Intel • M$ $urface • Novatech • VirtualBox • VMware • Hyper-V • Supermicro • XEN • QEMU • ZOTAC OEM's Branded = 130~ • BIOS Mode supported: Legacy MBR and/or UEFI GPT • You can force install 'ANY' brand theme by reading and using the Force_Theme_[readme].txt Editions supported for OEM Activation: • Server 2008 • Server 2008 R2 • Server 2012 • Server 2012 R2 • Win10... • Home • Pro • Win8.x... • Core • Pro • Win7..... • Starter • Home Basic • Home Premium • Pro • Ultimate • Vista..... • Starter • Home Basic • Home Premium • Business • Ultimate These should all brand providing DMI information is present. (N/KN/K/E/S/SN/G/GN and a few others.) Core, CoreN, CoreSingleLanguage, CoreConnectedSingleLanguage, SingleLanguage, CoreConnected. Cloud, CloudN (Windows 10 S) - Note needs special attention to work! Education, EducationN, EducationE, EducationK, EducationKN. Enterprise, EnterpriseN, EnterpriseE, EnterpriseSN, EnterpriseSN, EnterpriseK, EnterpriseKN, EnterpriseSubscription, EnterpriseSubscriptionN, EnterpriseG, EnterpriseGN. Ultimate, UltimateN, UltimateE, UltimateK, UltimateKN. Business, BusinessN, BusinessE, BusinessK, BusinessKN. Professional, ProfessionalWMC, ProfessionalN, ProfessionalE, ProfessionalK, ProfessionalKN, ProfessionalEducation, ProfessionalEducationN, ProfessionalCountrySpecific, ProfessionalSingleLanguage, ProfessionalWorkStation, ProfessionalWorkStationN. PPIPro - For Surface Pro. HomePremium, HomePremiumN, HomePremiumE, HomePremiumK, HomePremiumKN. HomeBasic, HomeBasicN, HomeBasicE, HomeBasicK, HomeBasicKN. Starter, StarterN, StarterE, StarterK, StarterKN. Server 2008, 2008R2, 2012, 2012R2, 2016 now branding, also some can now be OEM SLP activated!, see Server-ReadMe.txt for more details in MRP archive. Note: Some SKU/Editions may not 'exist' as such but have included them for conformity. Evaluation versions can be branded only. They cannot be activated. Objective - add $oem$ folder to .iso /usb. • $oem$ method can be used to apply activation & manufacturer brand to your Win10 • Win 8.x • Win 7 • Vista '.iso'/usb • NOTE:- PC needs (Win8.x and Win10 'OEM-DM' • Win7 '2.1 slic' • Vista '2.0 slic') bios to apply genuine oem activation. • Project includes optional Telemetry disabling, (WinTel.cmd), for all supported OS's and adds domains to block through Route commands. • Optional Retail activation method via online, if needed. How To: Win8.x|Win10 Place the downloaded '$oem$' folder in the 'sources' folder of your 'clean' iso, and add custom 'ei.cfg' file to the same 'sources' folder and edit|save iso. Windows will install the edition identified from 'ei.cfg' file. (Project 'Options' folder includes 'ei.cfg' instructions). OOBE.cmd will call tool that will extract embedded 'OEM-DM' key from bios (if exists), and apply the serial during installation. Note: Win8.x login background limitation, you cannot change system login background color to an external image. Note2: Win10 Login background is limited to user sign off only, not system wide. Win7 Place the downloaded '$oem$' folder in the 'sources' folder of your 'clean' iso, and delete the 'ei.cfg' file from the same 'sources' folder and edit|save iso... during install you will have option to select the edition of 'Win7' you want installed (ie. Starter • Home Basic • Home Premium • Pro • Ultimate)... if you don't delete 'ei.cfg' file, that's OK, just means whichever version the ISO was for will install by default, (Home/Pro etc). Vista Place the downloaded '$oem$' folder in the 'sources' folder of your 'clean' iso, and delete the 'PID.txt' file (if exists) from the same 'sources' folder and edit|save iso... during install you will have option to select the edition of 'Vista' you want installed (ie. Starter • Home Basic • Home Premium • Business • Ultimate)... if you don't delete 'PID.txt' file, that's OK, just means serial used on that file will determine edition installed. Server Editions Place the downloaded '$oem$' folder in the 'sources' folder of your 'clean' iso, and edit|save iso... during install select the edition of 'Server' you want installed making sure it has the GUI installation, NOT the core only version! • Please read the 'Server-ReadMe.txt' file included in the download folder, for additional information. • Please read the 'readme' files included in the downloaded archives for additional information. • "UltraISO" recommended to edit|save your .iso, preserving 'bootable' image. Screenshot - shared by hacker7: Result: in Vmware VirusTotal Results: OEM Query Tool: (Due to compilation method. False positive, it is safe) Multi OEM Project: (Due to extraction method. False positive, it is safe) 'IMPORTANT - Read Me.txt' file within the project's folder for any latest changes etc. Credit: Special thanks to mxman2k for making this happen -The_Guardian for allowing me to keep the project alive. -Collaborative effort for Win 10 telemetry. -Alphawaves = Creating needed tools and advice. -alexwilson = Sharing Win10 logon background method. -Daz = Help and advice. -xinso = Scripting help and testing. -abbodi1406 = Scripting help with project and query tool. -FreeStyler = Cert Collection. -s1ave77 = Scripting help, MSDM key information/scripting. Many thanks. -hmmurdock = Scripting advice. -elnenedelinares = OEM contributor. -ZerOx16x = OEM contributor. -Baltagy = OEM contributor and BETA testing many project revisions. -555LE = OEM contributor. -M&J = Testing. -EFA11 = Additional reg file for Win10 f8 function. {R.I.P EFA11}. -l30 = Testing. -Snuffy = Testing. -apologized = Testing. Server branding beta testing/reports, many thanks for your help. -Mr.X = Testing, OEM contributor, Glitch finder!, Beta tester. -Tito = Vmware bios help. -rockyanexpert = Testing and useful info regarding Win10 Anniversary Builds. -user_hidden = For 7zip compression information. -Enthousiast = Testing, reports, more testing. -MMIKEE = Bug hunting, testing and reports. -twiztidwolf = OEM contributor. -mad_max = Reporting the critical dummy/corrupt MSDM table bug, feedback. -tcntad = Reporting the Server 2016 Desktop Experience error. -b01m = Reporting a glitch in the "Switched Edition's" area in the Query Tool, also for testing the QT. -JanCerny = Supermicro OEM theme set. -bhtbht - Bug report. -Other MDL members who contributed to the original and new project. -Bob 65536 for the KeyInfo.xx.exe program that made the MSDM check/info happen. Many thanks Bob. And finally a big thanks to you for using the OEM Project and to those that give reports and feedback. Note: Important: If you use a 3rd party 'homebrew' ISO for installing Windows from such groups as Gen2 please be aware that due to their 'pre-activation' and 'OEM additions' this may cause your install to fail or 'hang' due to conflicts with MRP. Changelog Summary: + Updated quite a few bits of code. Error checks and some routines adjusted. + Updated the BIOS/BOOT mode line with more accurate detection information. + Enhanced PID.TXT and Retail.txt detection's. For more detailed information see the Changelog. Got to test stage 10 as always thanks to @Enthousiast for helping test MRP85, this one was fun. Released earlier than mentioned as only a few little refinements was needed. Mainly in error checking and a few re-wordings here and there. Download+source: Site: https://justpaste.it Sharecode[?]: /1i3p9 Update with info:
  20. Stop Resetting My Apps can stop Windows 10 from resetting apps which can happen after Windows Update or even a large update to Microsoft Edge, Photos or Groove Music. If you've ever have updated Windows or the default apps, you know the drill. All of a sudden your favorite web browser, email client, graphics viewer or music program is no longer the default app as you wanted. Stop Resetting My Apps does not affect the functionality of those apps. The apps you choose are not listed on the OpenWith menu or the Default apps Windows settings section. Blocked apps will have a red stop sign icon next to each tile. You can easily check or uncheck with the click of a mouse. During testing, it only allowed me to block Edge on my work computer however everything worked in VMware. Stop Resetting My Apps is a portable application. Just double-click on StopResettingMyApps.exe, make any changes and you can delete it when finished. Either save the program until you're sure you're happy with your settings or download it again later to change anything. Homepage: https://www.carifred.com/stop_resetting_my_apps/ Download: https://www.carifred.com/stop_resetting_my_apps/StopResettingMyApps.exe
  21. Win Update Stop 1.2

    This small Windows OS utility allows you to manually disable or enable automatic Windows updates. Sometimes you may want to stop Windows updates so you can choose when to download and install new Windows updates. As you know, Windows updates are very important but they are also known to occasionally create some incompatibilities or problems with the Operating System and the applications installed. Use this utility to block Windows updates and re-enable them when you desire. First, keep in mind that it is very important to keep your system up-to-date. However, if you want to disable or stop automatic Windows updates, you can use this free utility. There is no built-in option to permanently disable automatic Windows updates via Control Panel or Settings App in Windows 10, and by default Windows automatically installs any update found. With this simple tool you can permanently disable Windows Updates and re-enable Windows Updates when you want. Stop Windows Updates Permanently disable automatic Windows Updates via a simple GUI. Windows Update Status Find out if the Windows Updates are enabled or disabled in your PC. Check for Updates Click on ”Check for Windows Updates” to open the Windows Update App. Works on XP, 7, 8, 10 This tool works on all Windows OS version, from Windows XP to Windows 10. Very Lightweight The software application uses only a few MBs of memory, you will not even notice it. Free to Use This software is completely free to use for anyone, at home and at work. Whats New: + Added "More Actions" button to check for Windows Updates, open Windows Services, etc + Added command-line switch /disableupdates to disable updates (program exits once done) + Added command-line switch /enableupdates to enable updates (program exits once done) + Improved disabling of Windows Updates on Windows 10 * If you used a previous version of this program on Windows 10, you'll need to first click on "Enable" button and then on "Disable" button + Show an alert if the 32-bit version is executed on a 64-bit OS + Minor fixes and optimizations Homepage: http://www.novirusthanks.org/products/win-update-stop/ Downloads: Installer: http://downloads.novirusthanks.org/files/win_update_stop_setup.exe Portable: http://downloads.novirusthanks.org/files/portables/win_update_stop_portable.zip
  22. Windows 7 Ultimate 2018 x64 Super Lite 2018 Windows 7 Super Lite x64 is the best Version based on the full version of Ultimate SP1 and the original Microsoft And files were deleted unimportant and unnecessary language packs them Version ships with all features in addition towards the well-known figure pictures que and fascinating themes. Windows 7 Super Lite x64 2018: Original OS: Windows 7 Ultimate SP1 Version: 6.1 (Build 7601, Servicre Pack 1) Language: English Publisher: Microsoft Size: 1000 MB Install Note Create bootable USB drive: You can using Rufus For updating use this tool: Windows Update MiniTool Net Framework: NDP47-KB3186497-x86-x64-AllOS-ENU Activator: Windows Loader 2.2.2 Download Windows 7 Ultimate 2018 x64 Super Lite 2018: (Thanks Hacker 7 for reupload/zippyshae links) Site: http://textuploader.com Sharecode:? /dxfpm Enjoy!
  23. NoVirusThanks Registry DeleteEx 1.1 + Portable NoVirusThanks Registry DeleteEx is a small Windows OS software application that can delete locked registry keys and locked registry values via a kernel-mode driver. Some malware may lock/protect registry keys by changing the registry permissions or by using API hooking techniques. With this little tool you can successfully delete almost any registry key and value that can’t be deleted with Regedit or via traditional methods. Useful to fix problems like “Cannot delete registry key” or “Error while deleting registry key” by forcing the deletion of the locked registry key. Malware and rootkits can be tricky and highly difficult to remove, even for some security software especially when you are dealing with “locked” registry keys and values. The Windows Registry Editor (RegEdit) offers delete options, however they are clearly not strong enough to remove data in these types situations. It’s very frustrating when you encounter “locked” keys/values because they absolutely refuse to be deleted, even in cases when you run as Admin and even take ownership of the key itself. Because we empathize with users who have experienced this we have developed this utility in hopes that we can recover our sanity. Furthermore, regardless of security permissions in place, NoVirusThanks Registry DeleteEx can effortlessly delete these types of keys/values with ease. Of course, make sure to not delete important system registry keys and/or values, as registry modifications are typically the best way to render a machine unbootable if you end up deleting system-imperative data. Know what you’re doing prior to using this tool, it is also recommended that you back up the key and/or values prior to running any delete options within this software. Key features and characteristics Delete locked registry keys and locked registry values Fix errors “Cannot delete key: Error while deleting key.” Option to recursively delete all registry subkeys Effectively delete registry keys and values from kernel-mode Delete registry keys or values locked by malware or rootkits Support all Microsoft Windows operating systems Very lightweight in memory and CPU usage Whats New: + Both 32-bit and 64-bit drivers are now co-signed by Microsoft + Executable files are digitally signed with both SHA1 and SHA256 code sign + Now the program works fine when Secure Boot is enabled + Fixed display of main window on multi-monitors + Minor fixes and improvements Hopmepage: http://www.novirusthanks.org/products/registry-deleteex/ Download Installer: http://downloads.novirusthanks.org/files/registry_deleteex_setup.exe Download Portable: http://downloads.novirusthanks.org/files/portables/registry_deleteex_portable.zip NoVirusThanks Registry DeleteEx 1.1 - PAF Portable - JooSeng: https://www.mirrorcreator.com/files/1FLPKOS1/NoVirusThanksRegistryDeleteExPortable_1.1.0.0_English.paf.exe_links https://www.sendspace.com/file/kwnl18
  24. Kon-Boot is an application which will silently bypass the authentication process of Windows based operating systems. Without overwriting your old password! In other words you can login to your Windows profile without knowing your password. Easy to use and excellent for tech repairs, data recovery and security audits. Fast, tiny and gets your job done! KON-BOOT 2in1 for Windows and Mac OSX. One Kon-Boot pendrive to bypass Windows and Mac OSX authorization process. One Kon-Boot pendrive to rule them all! Kon-Boot 2in1 is basically Kon-Boot for Windows and Kon-Boot for Mac OSX connected together. No need for multiple pendrives anymore. System Requirements: Kon-Boot 2in1 can be only installed on USB thumb drive (there is no .ISO in the package). Windows OS and Internet connection is required for the installation. All other requirements were already presented above (in the Kon-Boot for Windows and Kon-Boot for Mac OSX sections). Supported Operating Systems: All Windows systems starting from Windows XP to Windows 10 (both x86 and x64) Regarding the UEFI support only Windows 8/8.1/10 x64 systems are supported (this is default Microsoft policy, additionally there are virtually none x86 UEFI systems out there). Kon-Boot now is able to bypass online account authorization on Windows 8/8.1. On Windows 10 only local account authorization bypass is available (with possibility to add new administrator account automatically (USB only)). macOS: - macOS High Sierra OSX 10.13 (NEW) - macOS Sierra OSX 10.12 - OSX 10.11 - OSX 10.10 - OSX 10.9 - OSX 10.8 - OSX 10.7 - OSX 10.6 (experimental) Changelog: - Includes fixes for Windows (+awesome feature for Commercial licenses) and Mac OSX (supports 10.13). Complete Changelog: Version 2.7 update released - 03.02.2018: Multiple Kon-Boot installer fixes Version 2.7 released (2.6 version was skipped to match the 2in1 version) - 01.01.2018: Additional features for Commercial version (automatically executed powershell scripts!) (UEFI part only for Windows 8/Windows 10 x64) Multiple fixes for kon-boot stability (UEFI part) Multiple installer fixes (USB installer now requires online activation) CD version is deprecated and will no longer be maintained (last version with CD support is 2.5) UEFI support for x86 bit Windows system is deprecated and will no longer be maintained (there are virtually no x86 UEFI systems out there anyway) Entire documentation updated and moved to online form Homepage: http://www.piotrbania.com/all/kon-boot/ Changelog: https://kon-boot.com/docs/#windows_guide/#changelog Downloads: Kon-Boot 2.7 Full - Win + Mac: Site: https://www.upload.ee Sharecode[?]: /files/8141386/Kon-Boot_2.7.rar.html Mirror: Site: https://www.multiup.eu/en Sharecode[?]: /download/8525461794db0387a206788d25d91c13/Kon-Boot_2.7.rar FYI: Multiup can be .eu or .org. Pls use which is working for your location.
  25. Windows 7 Super Lite Edition X86 V.2017 By Khatmau_sr Windows 7 Super Lite Edition x86 2017 is the best Version based on the full version of Ultimate SP1 and the original Microsoft And files were deleted unimportant and unnecessary language packs them Version ships with all features in addition towards the well-known figure pictures que and fascinating themes. Windows 7 Super Lite Edition x86 2017: Original OS: Windows 7 Ultimate SP1 Version: 6.1 (Build 7601, Servicre Pack 1) Language: English Publisher: Microsoft Author : Khatmau_sr Size: 655 MB Target users – Machine weak (RAM & lt; 2GB), Pentium 4 or less – Or for all types of machines, high-profile, run as fast. – 3GB HDD usage after installation What’s Removed Language Packs DVD Maker ISO Burner Windows Media Center Windows Fax and Scan XPS Viewer Wordpad Zip Folder Recovery Help Games Fonts Extra Themes Download Windows 7 Super Lite Edition X86 V.2017 By Khatmau_sr Site: https://dailyuploads.net Sharecode[?]: /ip8qmer2xbao Site: https://dailyuploads.net Sharecode[?]: /2oajelhuq09p
×