Jump to content

Search the Community

Showing results for tags 'office'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Found 75 results

  1. Note: Preview image may belong to older versions. This tool includes 4 different activation methods. KMS Inject activation, Digital activation, KMS 2038 activation and Online KMS activation There is also a script for convert VOLUME verions from RETAIL version for Office 2016 and 2019 products. While this script is being created, abbodi1406’s (MDL) script is referenced. Thank him so much for being a source of inspiration and help. Some security programs will report infected files, that is false-positive due KMS emulating. Digital and Online KMS activations methods are requires internet connection. If use this tool remove any other KMS solutions and temporary turn off AV security protection. $OEM$ Activation About: 3 methods are (Inject, Digital and KMS38) also $OEM$ activation support. To preactivate the system during installation, copy $OEM$ folder to "sources" folder in the installation media (iso/usb). $OEM$ activation method also enable the KMS task scheduling system during installation. (digital and KMS2038 activation method except) Thanks @ShiningDog for the kms server addresses. It is the only KMS application that hosts all methods and receives zero warning by security programs... 😎 WHAT TO KNOWS: Run KMS Suite either on the desktop or in the root directory of any disk. Do not run through folders with long names and folders inside the folder. If RETAIL Office is installed on your computer, the activation query will not show any results. During normal activation in the Inject method, Windows and Office can be activated separately, but in the KMS Task Scheduling module and the $OEM$ Activation option Windows and Office are activated together KNOWN BUGS: When the KMS Suite is run on RETAIL and OEM Windows 7, sometimes Office products can not detect and activate. If this happens, close and reopen the script and reactivating. Download Links: (English interface) Site: https://mega.nz Sharecode: /#!tEwWCQxA!OpdEC9C_-zwit7YWJao6AUAGA8JbMpFoNoxwvoTZltA File : KMS-Digital-Online_Activation_Suite_v7.8_ENG.rar CRC-32 : 98e4fb70 MD4 : aecea3e773492c805df2c5addf39fd0b MD5 : 2365996cf0155d6873f3a6c002b204c6 SHA-1 : 4aeabbd4bc6b08fa657b02b7bb9f75a2d83f5a9f --------------------------------------------------------------------------------------------- (Turkish interface) Site: https://mega.nz Sharecode: /#!lIoCiA4D!3xlscjHre-oBTIAq6XfslyPpmiKm84Caei7TN6d39dw File : KMS-Dijital-Online_Aktivasyon_Suite_v7.8_TUR.rar CRC-32 : 83b9320a MD4 : da1d40712fdbafde546ca163287cfb82 MD5 : ce8cd204d5198ec54f2b8c8e1ac5439e SHA-1 : abfe9544013324169b074278b8f66b243568b435 RAR Pass: 2019 Note: Use WinRar v5x for extract # Special Thanks TNCTR Family Nsane Family abbodi1406 CODYQX4 Hotbird64 qewlpal s1ave77 cynecx qad Mouri_Naruto WindowsAddict angelkyo mspaintmsi Virustotal results of the application exe and dll files Virustotal results of dll files of KMSInject method x64 KMS.dll (April 27, 2019): https://www.virustotal.com/gui/file/1902f84a3dae23a598ddda1447957b421511d5df77480aa590f6463830685d7e/detection x86 KMS.dll (April 27, 2019): https://www.virustotal.com/gui/file/6a35996e6fc50af1a1a19d39233cc43055da92adf76cb567c39265ad007459e8/detection Virustotal results of exe and dll files of the Digital & KMS38 Activation method: gatherosstate.exe (September 15, 2019) https://www.virustotal.com/gui/file/028c8fbe58f14753b946475de9f09a9c7a05fd62e81a1339614c9e138fc2a21d/detection slc.dll (September 15, 2019) https://www.virustotal.com/gui/file/9395a37c42e83568dc5ecb25d9e9fca4c6c1c4f47e336fb6ccae62df5c696b4d/detection Changelog:
  2. fuzzy

    Office installation

    Looking for guidelines how to install any office pro with permanent activation with activation key. Thanks?
  3. Manual Online KMS Activation for Windows, Server & Office Thanks to @november_ra1n Info: KMS Activation last 180 days set by Microsoft however after 180 days you can repeat the activation to gain another 180 days and so on forever. : ) PS: KMS Activation will be succeeded as long as KMS Server Host Address are still online see alternative Working Online KMS servers end of the text.... ====================================================================================== A) Windows & Server Activation: Windows <Type here to search> look for Command Prompt and (Right click and run as administrator) #Keep the Internet Connection on during activation!# 1. Install KMS Client Setup Key according to your Windows: slmgr /ipk <KMS Client Setup Key> NOTE: All Windows & Server KMS Client Setup Keys there (Make sure use right key according to your Windows Edition!): https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/jj612867(v=ws.11) or https://docs.microsoft.com/en-us/windows-server/get-started/kmsclientkeys 2. Run the following command to point Windows to the KMS server: cscript slmgr.vbs /skms kms.digiboy.ir 3. Run the following command to activate Windows: cscript slmgr.vbs /ato 4. Clear the name of KMS server (Optional) slmgr /ckms 5. Finally to find out & display your license information: cscript slmgr.vbs -dli ====================================================================================== Microsoft Office (2016, 2013, or 2010) Activation: NOTE:Unlike Windows for Office you need Volume License Edition to order to activate via KMS! Download Microsoft Office 2016 Volume License ISO [Original from VLSC]: http://bit.ly/2GLb5yY Windows <Type here to search> look for Command Prompt and (Right click and run as administrator) #Keep the Internet Connection on during activation!# 1. Set KMS Host... x64: cscript "%ProgramFiles%\Microsoft Office\Office16\ospp.vbs" /sethst:kmshostaddress x86 installed in Win x64: cscript "%ProgramFiles(x86)%\Microsoft Office\Office16\ospp.vbs" /sethst:kms.digiboy.ir Note:(Office14 = Office 2010; Office15 = Office 2013; Office16 = Office 2016) 2. Request Activation x64: cscript "%ProgramFiles%\Microsoft Office\Office16\ospp.vbs" /act x86 installed in Win x64: cscript "%ProgramFiles(x86)%\Microsoft Office\Office16\ospp.vbs" /act 3. Clear KMS Host (Optional) x64: cscript "%ProgramFiles%\Microsoft Office\Office16\ospp.vbs" /remhst x86 installed in Win x64: cscript "%ProgramFiles(x86)%\Microsoft Office\Office16\ospp.vbs" /remhst 4. Check Activation Status x64: cscript "%ProgramFiles%\Microsoft Office\Office16\ospp.vbs" /dstatus x86 installed in Win x64: cscript "%ProgramFiles(x86)%\Microsoft Office\Office16\ospp.vbs" /dstatus Note: All Office KMS Client Setup Keys can be find it there: http://sapsan.wclub5.com/archives/1230 ====================================================================================== Alternative Working Online KMS servers: kms.digiboy.ir kms.lotro.cc cy2617.jios.org kms.chinancce.com k.zpale.com m.zpale.com mvg.zpale.com kms.shuax.com ======================================================================================
  4. How to use the first page as the icon for Microsoft Office documents Microsoft Office documents that you save on your computer or device use the same generic icon by default. The only distinguishing factors are the filename and the location of the document because of that, the latter only if save Office documents to different folders. Core Microsoft Office applications support a handy feature to add another distinguishing factor to the documents that you save: to change the generic icon to a thumbnail preview of the first page. The feature does not require the installation of third-party applications or special file handlers as it is a feature of Microsoft Office 2016 and older versions. The feature is not enabled by default and you have the option to enable it for individual Word, Excel or PowerPoint documents only, or globally so that all Office documents are saved with a thumbnail that depicts the first page of the document. Save preview images for individual Microsoft Office documents The feature works in all supported versions of Microsoft Office including Office 2013, 2016 and 2019 except for Office 365. Microsoft calls the feature "thumbnail" and not preview image or Word file icon; this makes it a bit difficult to understand when you encounter the option. Do the following to save individual Word, Excel, or PowerPoing documents with thumbnails: Open the Word, Excel, or PowerPoint document that you want to add a thumbnail to. Select File > Save As or use the keyboard shortcut F12 to save the document. Select a save location. In the Save As dialog, check "Save Thumbnail" at the bottom to make the first page the file icon on the system. Click Save to complete the process. The saved document, regardless of whether it is a new document or one that you have created in the past, shows up with the preview image as its file icon on the system after the operation. Save all Microsoft Office files with the thumbnail image If you like the thumbnail feature of Microsoft Word, you may want to configure Word to always save the thumbnail image so that you don't have to make sure that the box is checked whenever you save a file. This should work in Office 2010, 2013, 2016 and 2019 but not in Office 365. Here is how that is done: Open any Word, Excel, or PowerPoint document on the system or create a blank one. Select File > Info. Click on the small arrow icon next to Properties and select Advanced Properties. In the Window that opens, check the "Save Thumbnails for all [..] Documents". Click ok. Repeat the process for the other document formats as the dialog makes the change for the Office application that you have used to make it only. All Office documents that you save from that point on are saved with the preview image. Source: How to use the first page as the icon for Microsoft Office documents (gHacks - Martin Brinkmann)
  5. It’s time to install most of July's Windows and Office patches If you’ve been keeping your Windows 7/Server 2008 R2 machines clean with “Security-only” patches, July has an important change to consider. For most people, the coast is clear to install the July 2019 patches. Pashaignatov / Getty Images With one glaring exception, July was a rather benign patching month. The Win10 versions got their usual two cumulative updates (the second considered “optional”). Visual Studio had some hiccups, but they’re fixed now. Folks trying to upgrade from Windows 10 version 1803 or 1809 to 1903 encounter various problems, but for now there’s very little reason to push your machine onto 1903. We’ll be talking a lot more about that later this month. When Win7 Security-only patches aren’t The big pimple on the patching butt this month: The Win7/Server 2008 R2 “Security-only” patch. Without any warning or explanation from Microsoft, the July “Security-only” patch installs a full telemetry kit and hooks things up so information gets sent to Microsoft – precisely what most people are trying to avoid by taking the “Security-only” route. We have late-breaking confirmation from Windows guru @abbodi86 that the July Security-only patch installs the same kind of telemetry found in the Monthly Rollups. Many (dare I say “all”?) of the folks who go to the bother of downloading and manually installing the Security-only patches specifically do so to avoid the snooping. But if you want the July security fixes, telemetry comes along for the ride. Fortunately, there are ways to circumvent the telemetry, or at least minimize it. Details following. McAfee Endpoint Protection conflicts – maybe Again this month there are questions about McAfee Endpoint Protection’s interaction with Windows updates. Kevin Beaumont (@GossiTheDog) kicked off the latest round of suspicion and vituperations by posting: McAfee Endpoint Protection has an interesting one, they've added a rule called RDP which I think is designed around BlueKeep (?), but it stops Windows Update applying July's security patches. Günter Born has taken up the call with an article on his Borncity blog, but I’ve been unable to replicate the problem or find calls for help on the McAfee site. Anyway, if you have trouble installing the July patches and you’re using McAfee Endpoint Protection, you might try turning it off before retrying. Update the safe way Here’s how to get your system updated the (relatively) safe way. Step 1. Make a full system image backup before you install the latest patches. There’s a non-zero chance that the patches — even the latest, greatest patches of patches of patches — will hose your machine. Best to have a backup that you can reinstall even if your machine refuses to boot. This comes in addition to the usual need for System Restore points. There are plenty of full-image backup products, including at least two good free ones: Macrium Reflect Free and EaseUS Todo Backup. For Win7 users, If you aren’t making backups regularly, take a look at this thread started by Cybertooth for details. You have good options, both free and not-so-free. Step 2. For Win7 and 8.1 Microsoft is blocking updates to Windows 7 and 8.1 on recent computers. If you are running Windows 7 or 8.1 on a PC that’s 24 months old or newer, follow the instructions in AKB 2000006 or @MrBrian’s summary of @radosuaf’s method to make sure you can use Windows Update to get updates applied. If you’ve been relying on the Security-only “Group B” patching approach to keep Microsoft’s snooping software off your PC, you’re faced with a tough decision: You can hold off on installing any patches this month. Since Security-only patches are not cumulative, you may be able to skate by this month’s fix and pick up next month – assuming Microsoft doesn’t include telemetry with the patches next month – by no means a given. You can switch over to the Monthly Rollups. I’ve been recommending this approach for quite some time, but realize that there are folks who just don’t feel comfortable running Microsoft’s telemetry termites on their machines. If you’ve been installing the Security-only patches and want to continue doing so, be sure to follow @abbodi86’s advice, turn off the Customer Experience Improvement Program (gotta love the name) and, after the July patch is installed, disable the new scheduled tasks. For most Windows 7 and 8.1 users, I recommend following AKB 2000004: How to apply the Win7 and 8.1 Monthly Rollups. Realize that some or all of the expected patches for July may not show up or, if they do show up, may not be checked. DON'T CHECK any unchecked patches. Unless you're very sure of yourself, DON'T GO LOOKING for additional patches. In particular, if you install the July Monthly Rollup, you won’t need (and probably won’t see) the concomitant patches for June. Don't mess with Mother Microsoft. If you see KB 4493132, the “Get Windows 10” nag patch, make sure it’s unchecked. Watch out for driver updates — you’re far better off getting them from a manufacturer’s website. After you’ve installed the latest Monthly Rollup, if you’re intent on minimizing Microsoft’s snooping, run through the steps in AKB 2000007: Turning off the worst Win7 and 8.1 snooping. If you want to thoroughly cut out the telemetry, see @abbodi86’s detailed instructions in AKB 2000012: How To Neutralize Telemetry and Sustain Windows 7 and 8.1 Monthly Rollup Model. Realize that we don’t know what information Microsoft collects on Window 7 and 8.1 machines. But I’d be willing to bet that fully-updated Win7 and 8.1 machines are leaking almost as much personal info as that pushed in Win10. Step 3. For Windows 10 prior to version 1903 If you want to stick with your current version of Win10 Pro — a reasonable alternative — you can follow my advice from February and set “quality update” (cumulative update) deferrals to 15 days, per the screenshot below. If you have quality updates set to 15 days, your machine already updated itself on July 24, and will update again on August 21. Don’t touch a thing and in particular don’t click Check for updates. Microsoft For the rest of you, including those of you stuck with Win10 Home, go through the steps in "8 steps to install Windows 10 patches like a pro." Make sure that you run Step 3 to hide any updates you don’t want (such as the Win10 1903 upgrade or any driver updates for non-Microsoft hardware) before proceeding. If you see a notice that, "You're currently running a version of windows that's nearing the end of support. We recommend you update to the most recent version of Windows 10 now to get the latest features and security improvements" you can safely chill. Win10 1803 is good through November. If you see a link to “Download and install now,” ignore it – for the same reason. Step 3A. For Windows 10 version 1903 If you’ve already moved to Win10 Pro version 1903, and you set a 15-day deferral on quality updates, you’ll no doubt discover that the settings shown in the screenshot are no longer available on your machine. Microsoft hasn’t yet deigned to tell us what’s going on, but you can rest assured that your 15-day deferral was obeyed – and you got the July patches on July 24. Don’t worry about changing the deferral settings just yet. You’re protected until Aug. 21. We’re still experimenting with all of the settings and seeing how they interact with one another, but at this point my best advice if you’re on 1903 is to click the link on the Windows Update page that says “Pause updates for 7 days,” then click on the newly revealed link, which says “Pause updates for 7 more days,” then click it again. By clicking that link three times, you’ll defer cumulative updates for 21 days from the day you started clicking – if you do it today, you’ll be protected until Aug. 23 – which compares favorably to my preferred 15-day deferral, mentioned earlier. There are several group policies and a handful of registry settings working in the background when you make those changes. It still isn’t clear to me how they interact (@PKCano has some details – and they’re hairy). But if you’re using Pro and set the quality update deferral to 15 days, and punch the “Pause updates for 7 days” button three times (on either Home or Pro), you should be in good shape. Thanks to the dozens of volunteers on AskWoody who contribute mightily, especially @sb, @PKCano, @abbodi86 and many others. We’ve moved to MS-DEFCON 4 on the AskWoody Lounge. Source: It’s time to install most of July's Windows and Office patches (Computerworld - Woody Leonhard)
  6. Microsoft: Whatever you do, don't call it Office Online What's in a name? Apparently, for Microsoft, not the word 'online' when it comes to the company's Office apps. Users are not amused. Microsoft Microsoft on Wednesday said it would stop using the word "online" to describe its online versions of Office, instead referring to the online suite as "on the web," "in a browser," or maybe "for the web." The branding change came from the same company that once called its single sign-on solution Microsoft Wallet, then Passport, then .Net Passport, then Microsoft Passport Network, then Windows Live ID, then more simply "Microsoft account." (Passport was resurrected for Windows 10 as the name for part of its two-factor authentication; the label was dumped a second time in a branding consolidation with Microsoft Hello.) "The official product name for what was previously referred to as 'Office Online' is now simply 'Office,'" Bill Doll, a senior product marketing manager, wrote in a post to a company blog. "We have also discontinued use of the 'Online' branding with each of the apps, so 'Word Online' is now 'Word,' 'Excel Online' is now 'Excel,' etc." Doll said the change stems from the fact that because Office now has apps on multiple platforms, "It no longer makes sense to use any platform-specific sub-brands." Even so, Microsoft will continue to refer to "platform-specific sub-brands," such as "Office for Mac" or "Office for Android." Rather than tag the web version of, say, Word, as "Word Online" or Office overall as "Office Online," Microsoft may dub those as "Word for the web," "Office on the web," "Word on Office.com" or "Office in a browser," Doll said. But then Doll metaphorically threw up his hands and just gave up. "We encourage people to use whichever terminology is most appropriate and provides the most clarity for a given context," he said. Okay.... And since "a foolish consistency is the hobgoblin of little minds," Microsoft decided that the new nope-no-online-here rules need not apply to its server-side products. "It is important to note that this branding change only applies to the Office apps," Doll asserted. "There is no change to the branding for our 'Online' server products - specifically Exchange Online, SharePoint Online, Project Online, and Office Online Server." Commentators don't care for the change. "This is just another stupid [Microsoft] marketing move, another in a long history of stupid marketing moves," said someone identified only as ron s.. "Thanks for nothing! This (dis)'improvement' just adds to the confusion." "Seems to me that you've taken what was previous[ly] a very precise and unambiguous label and removed it," added Kevin Crossman, who labeled himself a Microsoft MVP, or Most Valued Professional. "Which no doubt will cause confusion. But, if we can use 'whichever terminology is most appropriate,' I'm going to use the wording that provides the most clarity: Office Online." Office - or Office Online, Office for the web, Office in a browser, and so on and so forth - is available at Office.com and can be used free of charge for non-commercial purposes. Office 365 business subscriptions come with rights to use Office online (see what we did there?) for work-related tasks. Microsoft "Surely, you can't be serious that these apps no longer use the word 'Online.'" "I am serious. And don't call me Shirley." Source: Microsoft: Whatever you do, don't call it Office Online (Computerworld - Gregg Keizer)
  7. It's time to install the June Windows and Office patches June was a lazy, buggy month with silver bullet patches galore. Things have calmed down now, and it’s time to get the lot installed. If you’re using iSCSI, or you have custom views for the Event Viewer, you get to deal with this month’s bugs. Lucky you. But for most folks the patching coast is clear. Microsoft / IDG May had a hair-raising threat from a worm that still hasn’t emerged, but if you’re using Windows 7, 8.1, XP, Vista, or one of the Server variants and skipped the May patches, you need to drop everything and get the May or June patches installed. BlueKeep is coming. Those of you who blocked a specific port to keep BlueKeep at bay may be in for a nasty surprise. Special shout-out for iSCSI and Event Viewer custom views If you have problems connecting to your iSCSI array after installing this month’s patches, you need to click “Check for Updates” and allow Microsoft to install the fix for iSCSI bugs they introduced in earlier patches. If you have custom views in Event Viewer (which is probably more widespread than you think) and after installing this month’s updates you get a “MMC has detected an error in a snap-in and will unload it” error, you didn’t do anything wrong. If it really, uh, bugs you, there’s a fix in the Monthly Rollup previews, KB 450327 for Windows 7 and KB 4503283 for Windows 8.1. Unless you have those specific problems, I recommend (as always) that you avoid anything called “Preview” like the plague. Pass the Preview problems on to the gullible. About Windows 10, version 1903 The latest version of Windows 10, version 1903, is still on my no-fly list. We’re seeing more odd problems emerge, and the Update advanced options vanishing trick remains unexplained. I’m sorely tempted to keep my production machines on 1809 until we see Win10 version 1903 Service Pack 1 - also known as version 1909. Waiting for the first Service Pack is traditionally good advice. How to update your Windows system Here’s how to get your Windows system updated the (relatively) safe way. Step 1. Make a full system image backup before you install the latest patches. There’s a non-zero chance that the patches — even the latest, greatest patches of patches of patches — will hose your machine. Best to have a backup that you can reinstall even if your machine refuses to boot. This, in addition to the usual need for System Restore points. There are plenty of full-image backup products, including at least two good free ones: Macrium Reflect Free and EaseUS Todo Backup. For Windows 7 users, if you aren’t making backups regularly, take a look at this thread started by Cybertooth for details. You have good options, both free and not so free. Step 2a. For Windows XP, Server 2003, and Embedded POSReady 2009 If you haven’t yet installed the May BlueKeep patch, manually download and install KB 4500331. In the Microsoft Update Catalog listing, find the version of Windows XP that concerns you, and on the right, click Download. Choose the language you’re using, and click the link underneath that language. Click Save File. When the windowsxp-kb4500331-blah-blah.exe file has downloaded, double-click on it and stand back. Step 2b. For Windows 7 and 8.1 If you have McAfee Endpoint Security, make sure it’s up to date. Microsoft says it’s still having problems with McAfee. Microsoft is blocking updates to Windows 7 and 8.1 on recent computers. If you are running Windows 7 or 8.1 on a PC that’s 24 months old or newer, follow the instructions in AKB 2000006 or @MrBrian’s summary of @radosuaf’s method to make sure you can use Windows Update to get updates applied. If you’re very concerned about Microsoft’s snooping on you and want to install just security patches, realize that the privacy path is getting more difficult. The old “Group B” — security patches only — isn’t dead, but it’s no longer within the grasp of typical Windows customers, and you absolutely must install the appropriate May security patch. If you insist on manually installing security patches only, follow the instructions in @PKCano’s AKB 2000003 and be aware of @MrBrian’s recommendations for hiding any unwanted patches. For most Windows 7 and 8.1 users, I recommend following AKB 2000004: How to apply the Win7 and 8.1 Monthly Rollups. Realize that some or all of the expected patches for June may not show up. Or if they do show up, they may not be checked. DON'T CHECK any unchecked patches. Unless you're very sure of yourself, DON'T GO LOOKING for additional patches. In particular, if you install the June Monthly Rollup, you won’t need (and probably won’t see) the concomitant patches for May. Don't mess with Mother Microsoft. If you see KB 4493132, the “Get Windows 10” nag patch, make sure it’s unchecked. Watch out for driver updates — you’re far better off getting them from a manufacturer’s website. After you’ve installed the latest Monthly Rollup, if you’re intent on minimizing Microsoft’s snooping, run through the steps in AKB 2000007: Turning off the worst Win7 and 8.1 snooping. If you want to thoroughly cut out the telemetry, see @abbodi86’s detailed instructions in AKB 2000012: How To Neutralize Telemetry and Sustain Windows 7 and 8.1 Monthly Rollup Model. Realize that we don’t know what information Microsoft collects on Window 7 and 8.1 machines. But I’d be willing to bet that fully-updated Win7 and 8.1 machines are leaking almost as much personal info as that pushed in Windows 10. Step 3. For Windows 10 prior to version 1903 If you're running Windows 10 1803 and want to upgrade to Windows 10 1809, just to put off the inevitable push to 1903, there's good news. @PKCano has gone through the steps to navigate an upgrade from 1803 to 1809, without poking the 1903 dog. If you want to stick with your current version of Win10 Pro, you can follow my advice from February and set “quality update” (cumulative update) deferrals to 15 days, per the screenshot below. If you have quality updates set to 15 days, your machine already updated itself on June 26. Don’t touch a thing; in particular, don’t click Check for updates. Woody Leonhard/IDG For the rest of you, including those of you stuck with Windows 10 Home, go through the steps in "8 steps to install Windows 10 patches like a pro." Make sure that you run Step 3 to hide any updates you don’t want (such the Windows 10 1809 upgrade or any driver updates for non-Microsoft hardware) before proceeding. Step 3a. For Windows 10 version 1903 If you’ve already moved to Windows 10 Pro, version 1903, and you set a 15-day deferral on quality updates, you’ll no doubt discover that the settings shown in the screenshot no longer appear on your machine. Microsoft hasn’t yet deigned to tell us what’s going on, but you can rest assured that your 15-day deferral was obeyed — and you got the June patches on June 26. Don’t worry about changing the deferral settings just yet. Windows 10 version 1903 customers are starting to play with the “Pause updates for 7 days” button, but the results I’ve seen aren’t yet conclusive. When we have more experience with the new settings in Windows 10 1903, I’ll update these steps specifically for 1903. Until then, we’re watching and waiting to see how things really work — and in the interim, these steps should work just fine in 1903. Stay tuned for details. Thanks to the dozens of volunteers on AskWoody who contribute mightily, especially @sb, @PKCano, @abbodi86 and many others. We’ve moved to MS-DEFCON 4 on the AskWoody Lounge. Source: It's time to install the June Windows and Office patches (Computerworld - Woody Leonhard)
  8. It’s time to install the May Windows and Office patches Win10 version 1903 isn’t yet ready for prime time, but the other Windows and Office patches are reasonably stable. If you haven’t yet installed the XP/Vista/Win7 patches to guard against the “wormable” BlueKeep Remote Desktop hole, better do so now. Thinkstock/Microsoft May 2019 will go down in the annals of Patch-dom as the month we all ran for cover to fend off another WannaCry-caliber worm, but a convincing exploit never emerged. Microsoft officially released Windows 10 version 1903 on May 21, but I haven’t yet heard from anyone who’s been pushed. All of the complaints I hear are from those “seekers” who went to the download site and installed 1903 with malice and forethought. A triumph of hope over experience. This month, if you let Windows Update have its way on your machine, you may end up with a different build number than the person sitting next to you. Blame the gov.uk debacle for that: Folks with Windows set up for U.K. English get an extra cumulative update pushed onto their machines, whilst those who don’t fly the Union Jack will get the fix in due course next month. The ongoing saga of BlueKeep Remember the “wormable” Remote Desktop security hole that was going to bring down all older Windows machines? As of this writing, early Tuesday morning, there are exactly no known exploits. Lots of people have tried. Plenty of people are selling snake oil. But nobody has yet figured out how to exploit BlueKeep in order to run a nasty program. Before you feel too smug, realize that I continue to recommend that you install the latest Windows 7, XP, Vista, Server 2003, 2008 or 2008 R2 patches. I’m convinced a weapons-grade BlueKeep attack is on the way, and your only gold-standard defense is to fix the bug in Microsoft’s Remote Desktop Protocol. Tell your friends. This is the real thing. The one Windows 7 patch to avoid Once again this month, you should studiously avoid KB 4493132, a Windows 7 patch that does nothing but nag you to move to Windows 10. The case against installing Windows 10 version 1903 right now Windows 10 version 1903 has one truly important new feature: The ability to push off updates. That may be the single most important new feature in Windows 10 since it was released almost four years ago. We still haven’t seen the feature in real-life action, and there’s some ambiguity between the descriptions and the settings, but I have great hope. Don’t make the mistake of jumping in right now before Microsoft’s has a chance to iron out the inevitable problems. At the very least, you should wait until Microsoft declares that version 1903 is stable enough for broad deployment in large organizations. There’s supposed to be a “Download and install now” link arriving soon in Win10 1803 and 1809 to give you some control over when the upgrade to 1903 gets pushed onto your machine. Unfortunately, there’s also a promise from Microsoft that it’ll start pushing 1903 onto 1803 machines this month. We still don’t know when the 1803-to-1903 forced upgrades will start, and we don’t know how hard Microsoft will push. Stay tuned. How to update your Windows system Here’s how to get your system updated the (relatively) safe way. Step 1: Make a full system image backup before you install the latest patches. There’s a non-zero chance that the patches — even the latest, greatest patches of patches of patches — will hose your machine. Best to have a backup that you can reinstall even if your machine refuses to boot. This, in addition to the usual need for System Restore points. There are plenty of full-image backup products, including at least two good free ones: Macrium Reflect Free and EaseUS Todo Backup. For Windows 7 users, if you aren’t making backups regularly, take a look at this thread started by Cybertooth for details. You have good options, both free and not-so-free. Step 2a: For Windows XP, Server 2003, and Embedded POSReady 2009 Manually download and install KB 4500331. In the Microsoft Update Catalog listing, find the version of Windows XP that concerns you and on the right, click Download. Choose the language that you’re using, and click on the link underneath that language. Click Save File. When the windowsxp-kb4500331-blah-blah.exe file has downloaded, double-click on it and stand back. Step 2b: For Windows 7 and 8.1 If you have McAfee Endpoint Security, make sure it’s up to date. Microsoft says it’s still having problems with McAfee. Microsoft is blocking updates to Windows 7 and 8.1 on recent computers. If you are running Windows 7 or 8.1 on a PC that’s 24 months old or newer, follow the instructions in AKB 2000006 or @MrBrian’s summary of @radosuaf’s method to make sure you can use Windows Update to get updates applied. If you’re very concerned about Microsoft’s snooping on you and want to install just security patches, realize that the privacy path’s getting more difficult. The old “Group B” — security patches only — isn’t dead, but it’s no longer within the grasp of typical Windows customers. If you insist on manually installing security patches only, follow the instructions in @PKCano’s AKB 2000003 and be aware of @MrBrian’s recommendations for hiding any unwanted patches. For most Windows 7 and 8.1 users, I recommend following AKB 2000004: How to apply the Win7 and 8.1 Monthly Rollups. Realize that some or all of the expected patches for May may not show up, or if they do show up, they may not be checked. DON'T CHECK any unchecked patches. Unless you're very sure of yourself, DON'T GO LOOKING for additional patches. In particular, if you install the May Monthly Rollups or Cumulative Updates, you won’t need (and probably won’t see) the concomitant patches for April. Don't mess with Mother Microsoft. If you see KB 4493132, the “Get Windows 10” nag patch, make sure it’s unchecked. Watch out for driver updates — you’re far better off getting them from a manufacturer’s website. After you’ve installed the latest Monthly Rollup, if you’re intent on minimizing Microsoft’s snooping, run through the steps in AKB 2000007: Turning off the worst Win7 and 8.1 snooping. If you want to thoroughly cut out the telemetry, see @abbodi86’s detailed instructions in AKB 2000012: How To Neutralize Telemetry and Sustain Windows 7 and 8.1 Monthly Rollup Model. Realize that we don’t know what information Microsoft collects on Windows 7 and 8.1 machines. But I’d be willing to bet that fully-updated Win7 and 8.1 machines are leaking almost as much personal info as that pushed in Windows 10. Step 3: For Windows 10 If you want to stick with your current version of Windows 10 — a reasonable alternative — you can follow my advice from February and set “quality update” (cumulative update) deferrals to 15 days, per the screenshot below. If you have quality updates set to 15 days, your machine already updated itself on May 29. Don’t touch a thing and in particular don’t click Check for updates. Woody Leonhard For the rest of you, including those of you stuck with Win10 Home, go through the steps in "8 steps to install Windows 10 patches like a pro." Make sure that you run Step 3 to hide any updates you don’t want (such the Windows 10 1809 upgrade or any driver updates for non-Microsoft hardware) before proceeding. When we have more experience with the new settings in Windows 10 1903, I’ll update these steps specifically for 1903. Until then, we’re watching and waiting, to see how things really work — and in the interim, these steps should work just fine in 1903. Stay tuned for details. Thanks to the dozens of volunteers on AskWoody who contribute mightily, especially @sb, @PKCano, @abbodi86 and many others. We’ve moved to MS-DEFCON 4 on the AskWoody Lounge. Source: It’s time to install the May Windows and Office patches
  9. Microsoft removes ability to install Office directly from the Microsoft Store on Windows 10 Users are no longer able to install Office directly from the Microsoft Store, and are instead being redirected to the old classic installer. Over the last few weeks, users attempting to download Office applications from the Microsoft Store on Windows 10 have been unable to do so, and instead, are being redirected to the Office website which would then automatically download the classic installer. Naturally, many have been frustrated with this, as downloading from the Microsoft Store directly comes with benefits such as automatic updates through the Store, the ability to choose which Office apps you want installed, and more. But with the classic installer, known as "click-to-run," users have to install all Office products by default and have updates handled through Office's own updater. I much prefer being able to install Office from the Microsoft Store because of these reasons, so not being able to do so over the last couple of weeks has been incredibly frustrating. Unfortunately, it appears this change is deliberate, according to a Microsoft spokesperson: People will continue to be able to find Office in the Store. If the Office image isn't already preinstalled, they will be directed to https://account.microsoft.com/ to install it. The Office apps are still listed in the Store, and they still have "install" buttons on their app pages. But the install button no longer installs the app directly unless your PC came with Office, and instead takes you to the Office website to download the classic Office installer. This experience isn't great and ultimately undermines the whole point of the Microsoft Store. I want the Store to handle all my apps, and now I can't do that with Office. For Windows 10 S users, the classic installer now runs fine with S mode enabled, just as the Microsoft Edge Insider Preview installer does. So this change applies with S mode enabled too. I've asked Microsoft about why it's made Office no longer installable from the Store and will update this article once I hear back. In the meantime, what was your preferred way of installing Office? Source
  10. With one final April patch delivered in May, the time looks ripe to install last month’s patches. One antivirus manufacturer has a significant disagreement with Microsoft about the April patches, but you can easily bypass the problem — if you know the trick. Thinkstock/Microsoft April was a tough month for Win 7, 8.1, Server 2008 R2, 2012 and 2012 R2 customers who ran specific antivirus products. Blue screens, freezes, slow-as-sludge drippings all bedeviled a large number of Sophos, Avira, Avast, AVG and even McAfee users. Looks like we’re over that hump, with the AV manufacturers scurrying to fix their wares. Current state of AV Microsoft claims that it has “mitigated” (interesting choice of terminology) the blue screens and freezes with certain Sophos, McAfee and Avast (including AVG) products. In fact, if you check with the individual manufacturers' websites, they all claim to have shipped and installed fixes of various types that will allow Monthly Rollups and Security-only patches to proceed without gumming up the works. The one holdout? Avira. It’s a particularly interesting exception because Avira has claimed from the start that the April Win10 version 1809 cumulative update also clogged up the works with its antivirus product. I’ve seen rumors — but no definitive confirmation — that other AV products have had the same problem. At any rate, Avira at this point says it’s fixed everything: We have looked into the issue… and have found a way to fix it. We have recently released an update that should fix this issue. Your Avira Product will be automatically updated, and you don’t have to do anything else in the product. In a private communication, an Avira spokesperson says that Microsoft is no longer blocking the problematic patches on machines running Avira. Microsoft has a contrary opinion: Microsoft has temporarily blocked devices from receiving this update if Avira antivirus software is installed. … We are presently investigating this issue with Avira and will provide an update when available. There’s no mention on the Microsoft sites about slowdowns with the Win10 1809 patch. At this point, your best bet is to get Avira updated — manually if need be — and move on. I'd be willing to bet that the patches will install on updated Avira machines. (If you discover something contrary, hit me on AskWoody.com!) This whole incident left a bad taste in my mouth. As I mentioned before, whoever made the decision to release the six (now nine) problematic Windows patches either: Didn’t know they’d wreak havoc on millions of computers, or Didn’t care You can choose which one’s worse. More than that, the incident(s) exposed a bizarre behavior with Avast/AVG products: In order to update the software, you’re supposed to turn on your machine and do nothing for 15 minutes, while the AV package updates itself. As an anonymous poster on AskWoody put it: I have AVG and I have many items blocked in the firewall. Avast / AVG needs to have a way to manually download the patch from the AVG support download site and they need a warning to the person that an AVG update is about to commence, unblock or allow the files and registry keys to be modified. Updating in the background when the operator is away is not a good idea. Avast / AVG should be more transparent. The one Win7 patch to avoid Once again this month, you should studiously avoid KB 4493132, a Win7 patch that does nothing but nag you to move to Windows 10. Looks like the nag hasn’t had much effect, but why install it in the first place? It may be time for 1809 Although there are acknowledged problems with Win10 version 1809, they’re relatively minor. Given that Win10 version 1903 is nipping on our heels, I’m upgrading my Win10 machines to 1809. Better the devil ye ken. If you want to stay with 1803, it’s hard to blame you — the list of new features in 1809 reads like the ingredients list for a bottle of water. Mostly, if you move to 1809, you’re buying yourself six more months before you have to upgrade. Again. Woody Leonhard/IDG The safest way to move to 1809 is to run the “feature update” deferral down to zero and wait for Microsoft to take over. (See general instructions here.) That way the monkey’s on Microsoft’s back to make sure your machine is ready for 1809. Put the branch readiness level at “Semi-Annual Channel,” turn the feature update deferral to 0, and wait. If Microsoft figures your machine can take it, you’ll get 1809 sooner or later. But you won’t get 1903. Why? Even though Microsoft has changed the terminology, we’re assured “Semi-Annual Channel” will keep new versions off your machine until at least 60 days after release — and we’re told that 1903 won’t be released until the end of May. We've also been promised that Win10 1803 will sprout a new "Download and install" link — likely for both Home and Pro — by late May. We still haven't seen it in action, but if it works as promised, that'll be an enormous improvement over the blind-men-and-elephant approach we have right now. Update Here’s how to get your system updated the (relatively) safe way. Step 1. Make a full system image backup before you install the latest patches. There’s a non-zero chance that the patches — even the latest, greatest patches of patches of patches — will hose your machine. Best to have a backup that you can reinstall even if your machine refuses to boot. This, in addition to the usual need for System Restore points. There are plenty of full-image backup products, including at least two good free ones: Macrium Reflect Free and EaseUS Todo Backup. For Win 7 users, If you aren’t making backups regularly, take a look at this thread started by Cybertooth for details. You have good options, both free and not-so-free. Step 2. For Win7 and 8.1 If you have an antivirus product from Sophos, Avira, Avast, AVG or McAfee, make sure it’s up-to-date. Each product’s different. Yes, I know that many products from those vendors don’t have any problems — but it’s better to get buckled up anyway. Microsoft is blocking updates to Windows 7 and 8.1 on recent computers. If you are running Windows 7 or 8.1 on a PC that’s 18 months old or newer, follow the instructions in AKB 2000006 or @MrBrian’s summary of @radosuaf’s method to make sure you can use Windows Update to get updates applied. If you’re very concerned about Microsoft’s snooping on you and want to install just security patches, realize that the privacy path’s getting more difficult. The old “Group B” — security patches only — isn’t dead, but it’s no longer within the grasp of typical Windows customers. If you insist on manually installing security patches only, follow the instructions in @PKCano’s AKB 2000003 and be aware of @MrBrian’s recommendations for hiding any unwanted patches. For most Windows 7 and 8.1 users, I recommend following AKB 2000004: How to apply the Win7 and 8.1 Monthly Rollups. Realize that some or all of the expected patches for April may not show up or, if they do show up, may not be checked. DON'T CHECK any unchecked patches. Unless you're very sure of yourself, DON'T GO LOOKING for additional patches. In particular, if you install the April Monthly Rollups or Cumulative Updates, you won’t need (and probably won’t see) the concomitant patches for March. Don't mess with Mother Microsoft. If you see KB 4493132, the “Get Windows 10” nag patch, make sure it’s unchecked. Watch out for driver updates — you’re far better off getting them from a manufacturer’s website. After you’ve installed the latest Monthly Rollup, if you’re intent on minimizing Microsoft’s snooping, run through the steps in AKB 2000007: Turning off the worst Win7 and 8.1 snooping. If you want to thoroughly cut out the telemetry, see @abbodi86’s detailed instructions in AKB 2000012: How To Neutralize Telemetry and Sustain Windows 7 and 8.1 Monthly Rollup Model. Realize that we don’t know what information Microsoft collects on Window 7 and 8.1 machines. But I’d be willing to bet that fully-updated Win7 and 8.1 machines are leaking almost as much personal info as that pushed in Win10. Step 3. For Windows 10 You can follow the steps at the beginning of this article to leave your machine open for updating to Win10 version 1809 (my new current preference). When Win10 version 1903 appears we’ll have full instructions for blocking it. Of course, all bets are off if Microsoft, uh, forgets to honor its own settings. If you want to stick with your current version of Win10 — a reasonable alternative — you can follow my advice from February and set “quality update” (cumulative update) deferrals to 15 days, per the screenshot. If you have quality updates set to 15 days, your machine already updated itself on April 24. Don’t touch a thing and in particular don’t click Check for updates. Woody Leonhard/IDG For the rest of you, including those of you stuck with Win10 Home, go through the steps in "8 steps to install Windows 10 patches like a pro." Make sure that you run Step 3, to hide any updates you don’t want (such the Win10 1809 upgrade or any driver updates for non-Microsoft hardware) before proceeding. These steps will change drastically when Win10 1903 starts rolling out, particularly if Microsoft keeps its promise about "Download and install now." Stay tuned for details. Thanks to the dozens of volunteers on AskWoody who contribute mightily, especially @sb, @PKCano, @abbodi86 and many others. We’ve moved to MS-DEFCON 4 on the AskWoody Lounge. Source: Now’s the time to install the April Windows and Office patches (Computerworld - Woody Leonhard)
  11. As is common on the first Tuesday of the month, yesterday Microsoft released its hoard of non-security Office patches. This time, though, there’s no official list of the patches — and many of them may have been released in March. Thinkstock The first Tuesday of the month — “A” week in Microsoft’s infamous bafflegab — usually brings a healthy dose of non-security Office patches. This Tuesday was no exception. But there are two big differences. First, there’s no official list of the patches. Second, many of the patches appear to be re-releases of patches that originally appeared in March. Here we go down the rabbit hole. Every month we get a list of Office patches on the MSDN Developer blog, an entry from the Office Sustained Engineering group. This month, the link turns up a "404 — This page has been disabled." Apparently Microsoft’s in the process of moving its blogs from one ill-defined location to another, but in this case they seem to have slipped. As best I can tell, there's no list of this month's patches. AskWoody’s PKCano, relying on data extracted by Patch Lady Susan Bradley, has pieced together a list of the updates with descriptions and links. If you can find a similar list on Microsoft’s site, I’d sure like to know about it. As has always been the case, PKCano’s list covers the MSI “perpetual” versions of Office, not Click-to-Run. Not to be outdone in the vanishing documentation competition, Microsoft’s Latest updates for versions of Office that use Windows Installer (MSI) hasn’t been updated. Nor has Fixes or workarounds for recent Office issues. PKCano’s list includes a number of patches that were apparently released on March 19. For example, if you click the link to KB 4011666, which Microsoft calls the “April 2, 2019, update for Office 2016 (KB4011666)” and then click the download link for that patch, under Details you see the info in the screenshot. Woody Leonhard/IDG Clearly, Microsoft thinks this patch was published on March 19. So we have an unlisted set of 20 patches, claimed to be published on April 2, most (if not all) of which are also claimed to be published on March 19. Is this the point where the rabbit starts muttering, “Oh dear! Oh dear! I shall be too late!”? Off with their heads! on the AskWoody Lounge. Source: Microsoft releases 20 Office non-security patches — and doesn’t bother to document them (Computerworld - Woody Leonhard)
  12. Although it’s much too early to draw any definitive conclusions, initial reports are that the March 2019 Patch Tuesday rollout hasn’t hit any major bumps. There are a few odd nuances, though, that warrant your consideration. Thinkstock/Microsoft Patch Tuesday has come and gone, not with a bang but a whimper. As of this moment, early Wednesday morning, I don’t see any glaring problems with the 124 patches covering 64 individually identified security holes. But the day is yet young. There are a few patches of note. Two zero days Microsoft says that two of this month’s security holes — CVE-2019-0797 and CVE-2019-0808 — are being actively exploited. The latter of these zero days is the one that was being used in conjunction with the Chrome exploit that caused such a kerfuffle last week, with Google urging Chrome browser users to update right away, or risk the slings of nation-state hackers. If you’ve already updated Chrome (which happens automatically for almost everybody), the immediate threat has been thwarted already. These two security holes are Elevation of Privilege bugs, which means that a miscreant who’s already gotten into your system can use the bugs to move up to admin status. So if you’re in charge of systems that are susceptible to sophisticated attacks, these patches warrant concern. For everybody else, they’re not the stuff of Stephen King class nightmares. As usual, Martin Brinkmann on ghacks.net has a thorough listing, the SANS ISC forum has a succinct chart, and Dustin Childs on the Zero Day Initiative blog offers many tech details. Win10 version 1809 oddities The Win10 version 1809 cumulative update, KB 4489899, fixes the “crazy” performance drop in some games, including Destiny 2, that we encountered two weeks ago. However, it doesn’t fix the other bug introduced by the “second February” 1809 cumulative update, KB 4482887, which clobbers audio settings in specific circumstances: After installing this update on machines that have multiple audio devices, applications that provide advanced options for internal or external audio output devices may stop working unexpectedly. This issue occurs for users that select an audio output device different from the “Default Audio Device”. As erpster4 notes on Tenforums: KB 4489899 causes that problem only if there are multiple audio outputs or playback devices for Realtek HD audio (speakers, realtek digital output [SPDIF], etc.) and the output selected is not the "default audio device." If only the "Speakers" output is listed on the Sound properties playback tab for Realtek audio (usually on ALC2xx codecs), then KB 449899 is safe to install. In addition, this month’s KB 4489899 doesn’t fix the MSXML 6 bug introduced by the first cumulative update in January: After installing this update, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode(). Makes you wonder if 1809 will get the "ready for business deployment" imprimatur before 1903 hits the skids. Er, goes out the chute. That's how it's supposed to work, yes? Servicing Stack Update for Win7 Here’s where the going gets a bit thick. As explained in November, Microsoft is changing the way it’s signing patches for Win7. Starting in July, your Win7 machine has to understand SHA-2 encryption in order to receive new patches. (Yes, this is the same Win7 that’ll no longer receive new security patches next January.) Microsoft released two SHA-2 related patches. KB 4490628 is a Servicing Stack Update — it fixes the part of Windows 7 that installs patches. KB 4474419 fixes Windows itself so it can handle SHA-2 encryption. As @DrBonzo explains, and @PKCano reiterates, if you’re manually installing Win7 patches, you need the Servicing Stack Update KB 4490628 before you install this month’s patches. (If you let Windows Update install the patches, it’ll get installed first.) Then the Windows-only fix KB 4474419 can follow along any time before July. If you’re installing the Win7 updates manually, there’s a specific installation sequence detailed by @PKCano that ensures the updates go in the correct order. Dearth of Office patches With all the love being showered on Windows 7 this week (including DirectX 12 for some games, and more annoying “Get Windows 10” nag screens), you might expect more sweetness and light for Office apps. Not so. We only have six new Office security patches, to add to the 28 non-security patches from earlier this month: one for Office 2010 and five for various Server versions. Remarkably, there are no new security patches for Office 2013 or 2016, although we do have two new versions of Office Click-toRun: 15.0.5119.1000 for Office 2013; 14.0.7230.5000 for Office 2010. Thanks to @PKCano, @DrBonz, @abbodi86 and many others who volunteer their help keeping the patching gremlins at bay. Questions? Problems? Hit us on the AskWoody Lounge. Source: March 2019 Windows and Office patches poke a few interesting places (Computerworld - Woody Leonhard)
  13. There are some rather obscure issues, but by and large, now’s a very good time to get Windows and Office caught up on patching. If you want to avoid Win10 1809 for now, block it. Watch out for the, uh, edge cases, and patch away. Thinkstock/Microsoft Compared to some months last year, January has been a Microsoft patching cakewalk. We had several rounds of close calls and missed calls, as I posted earlier this week, but almost everything is cleared up. We’ve seen a few more problems raise their ugly heads in the past few days: Microsoft has confirmed that the latest version of Office Click-to-Run (which you’re likely using if you have Office 365) makes the conversation window disappear in Skype for Business 2016. The Windows 8.1 Monthly Rollup, KB 4480963, breaks the Live Migration feature on older AMD Opteron machines. We’re still waiting for confirmation on that one. Citrix confirms (but Microsoft hasn’t acknowledged) that the latest Win10 1803 cumulative update, KB 4480976, causes page file problems when the page file isn’t sitting on C:. More details on Tenforums. Those are typical Microsoft edge-use bugs: They don’t affect many people, but if you’re one of the stuckees, you’re up the ol’ creek. There’s an additional, ongoing problem that deserves repeating for you Windows 7 customers who are sharing files on home networks. Both KB 4480970, the January Monthly Rollup, and KB 4480960, the Security-only patch, have a bug that can break your network. The only solution is to manually install a Silver Bullet patch, KB 4487345 — and that doesn’t always work. Details in my Patch Alert article. Win10 1809 rolling out slowly, slowly If you have any version of Win10, you’re in the crosshairs for Microsoft’s latest version pushed with the help of a new, improved, extraterrestrial superintelligent next-generation machine-learning model. People ask me why I’m so cynical about 1809. I’m not really all that cynical — in fact, it looks like Microsoft’s trying very hard to make this one better than all that came before. My skepticism stems from the fact that 1809 doesn’t bring to the table anything I want: A new clipboard that’s almost as good as decade-old free plugins; better screenshots with markup; Storage Sense improvements that are disabled by default for good reason; and a handful of ho-hum features. Should you upgrade your machine for that? Bottom line remains the same: Unless you want Win10 version 1809 on your machine, you need to proactively block it until you’re comfortable with moving on to the next, arguably better version of the last version of Windows. Update Here’s how to get your system updated the (relatively) safe way. Step 1. Make a full system image backup before you install the January patches. There’s a non-zero chance that the patches — even the latest, greatest patches of patches of patches — will hose your machine. Best to have a backup that you can reinstall even if your machine refuses to boot. This, in addition to the usual need for System Restore points. There are plenty of full-image backup products, including at least two good free ones: Macrium Reflect Free and EaseUS Todo Backup. For Win 7 users, If you aren’t making backups regularly, take a look at this thread started by Cybertooth for details. You have good options, both free and not-so-free. Step 2. For Win7 and 8.1 Microsoft is blocking updates to Windows 7 and 8.1 on recent computers. If you are running Windows 7 or 8.1 on a PC that’s 18 months old or newer, follow the instructions in AKB 2000006 or @MrBrian’s summary of @radosuaf’s method to make sure you can use Windows Update to get updates applied. If you’re very concerned about Microsoft’s snooping on you and want to install just security patches, realize that the privacy path’s getting more difficult. The old “Group B” — security patches only — isn’t dead, but it’s no longer within the grasp of typical Windows customers. If you insist on manually installing security patches only, follow the instructions in @PKCano’s AKB 2000003 and be aware of @MrBrian’s recommendations for hiding any unwanted patches. For most Windows 7 and 8.1 users, I recommend following AKB 2000004: How to apply the Win7 and 8.1 Monthly Rollups. Realize that some or all of the expected patches for December may not show up or, if they do show up, may not be checked. DON'T CHECK any unchecked patches. Unless you're very sure of yourself, DON'T GO LOOKING for additional patches. In particular, if you install the January Monthly Rollups or Cumulative Updates, you won’t need (and probably won’t see) the concomitant patches for December. Don't mess with Mother Microsoft. Watch out for driver updates — you’re far better off getting them from a manufacturer’s website. After you’ve installed the latest Monthly Rollup, if you’re intent on minimizing Microsoft’s snooping, run through the steps in AKB 2000007: Turning off the worst Win7 and 8.1 snooping. If you want to thoroughly cut out the telemetry, see @abbodi86’s detailed instructions in AKB 2000012: How To Neutralize Telemetry and Sustain Windows 7 and 8.1 Monthly Rollup Model. Realize that we don’t know what information Microsoft collects on Window 7 and 8.1 machines. But I’m starting to believe that information pushed to Microsoft’s servers for Win7 owners is nearing equality to that pushed in Win10. Step 3. For Windows 10 If you’re running Win10 version 1709, or version 1803 (my current preference), you definitely want to block the forced upgrade to Win10 1809. Don’t get caught flat-footed: Microsoft is pushing 1809 slowly, but you don’t have to go when that superintelligent deployment program says you’re ready. Follow the advice in How to block the Windows 10 October 2018 Update, version 1809, from installing. Of course, all bets are off if Microsoft, uh, forgets to honor its own settings. Those of you who run Win10 Pro/Education and followed my advice in November — to set “quality update” (cumulative update) deferrals to 15 days, per the screenshot — don’t need to do anything. Your machine already updated itself on the 23rd. Don’t touch a thing and in particular don’t click "Check for Updates." Woody Leonhard For the rest of you, including those of you stuck with Win10 Home, go through the steps in "8 steps to install Windows 10 patches like a pro." Make sure that you run Step 3, to hide any updates you don’t want (such the Win10 1809 upgrade or any driver updates for non-Microsoft hardware) before proceeding. If you really want to hide everything, including the gonzo KB 4023057 patch I mentioned earlier this week, you need to go through @PKCano’s steps to wring every last update out of your update queue. Microsoft hides some of them. This month make sure you’re the windshield, not the bug. Thanks to the dozens of volunteers on AskWoody who contribute mightily, especially @sb, @PKCano, @abbodi86, and many others. We’ve moved to MS-DEFCON 4 on the AskWoody Lounge. Source: The January Windows and Office patches are good to go (Computerworld - Woody Leonhard)
  14. Microsoft released the first batch of updates for Microsoft Office in 2019; the January 2019 non-security updates for Microsoft Office are available as direct downloads from the Microsoft Download Center and Microsoft Update. Microsoft released updates for Office 2010, 2013 and 2016 on January 2, 2019. The updates apply to MSI-based versions of Microsoft Office only and not click-to-run editions such as Microsoft Office 365. As always, unless you use any of the mentioned Office applications and ran into issues fixed by these updates, it is recommended to wait with the installation. Office 2010 Microsoft released four updates for Office 2010 that address issues in Microsoft Excel 2010. KB4461627 -- Update for Microsoft Excel 2010 that makes changes to the Japanese calendar in the application to ensure that Japanese era names are displayed correctly when an era changes. Requires KB4461616, KB4032225 and KB4032217 as well. Office 2013 Two updates were released for Microsoft Office 2013 in January 2019; they address issues in Microsoft Project 2013 and update Skype for Business 2015. KB4461560 -- Update for Microsoft Project 2013 that adds support for Japanese era changes to the application. KB4461557 -- Update for Skype for Business 2015 (Lync 2013) that increases the version of the application to 15.0.5101.1002. The update upgrades Lync 2013 to Skype for Business. Users may still use the Lync 2013 user interface. Office 2016 Microsoft released a total of eight updates for Office 2016. The updates modify Skype for Business 2016, Microsoft Excel, Project, and Visio 2016. KB4461586 -- Skype for Business 2016 update that brings the version to 16.0.4795.1002. The update fixes several issues including one in which Skype becomes unresponsive when meetings with many participants are joined. The update requires either KB3203472 or KB4011099, and the KB4011669 update released in October 2018. KB4461600 -- Microsoft Excel 2016 update that fixes a good dozen issues in the application: Improves Chinese Simplified and Danish translations. Fixes to the Japanese calendar to address new era issues. Fixed a hang in Excel caused by add-ins with Right-to-left language encoding in XML definition. Fixed an issue with PivotTable getting refreshed when it overlaps another table. Fixed a crash in Excel when selecting "Show items with no tdata" on a PivotTable that contained a specific filter, row setting or column setting. Removed Windows Azure Marketplace dataset as it is deprecated. Fixed an issue in the native Measure Editor caused by inproper handling of semicolons. Fixed another crash in Excel after undoing removing a PivotTable and deleting the worksheet. Other PivotTable related issues including more crash fixes. KB3203480 -- Update for Visio 2016 that improves Japanese new era handling. Requires KB4461531 for Visio 2016 as well. KB4461531 -- Update for Visio 2016 that includes fixes and improvements: Adds Gannen data format support to the Visio Application Programming Interface. Fixes an issue with rotation: rotation would not work if a shape's width or height was 0. KB4032230 -- Fixes an issue in Office applications when starting add-ins in apps that have multiple add-ins started already. The error message in this case is "This add-in could not be started. Close this dialog to ignore the problem or click "Restart" to try again.". KB4461435 -- Updates the database compare tool. It requires the Microsoft Report Viewer 2015 and won't work with older versions of Report Viewer anymore. KB4461533 -- Fixes an issue with antivirus software and degraded scan performance when Office documents are open and multiple antivirus solutions are installed. KB4461587 -- Update for Project 2016 that fixes several issues: Improves the Czech language translation. Fixes a save issue when editing resource properties locally while editing from a master project. You can't create recurring daily exceptions whose periods are more than 1 day and the intervals overlap. In some situations where your project is saved to Project Server and where user updates are protected, you may not be able to indent or outdent a task. Fixes an inconsistent value issue when comparing Actual Work and Actual Overtime Work values. Fixes an issue where some "Enterprise Resource Custom" fields were lost. Source: https://www.ghacks.net/2019/01/04/microsoft-releases-office-january-2019-non-security-updates/ (gHacks - Martin Brinkmann) Breaking news, Office 2010 updates pulled... Office 2010 Updates for January 2019 has been pulled (Born's Tech and Windows World)
  15. WindowsAddict

    Online KMS Activation Script

    This script is now merged in Microsoft Activation Script - (Open Source and clean from Antivirus Detections)
  16. Microsoft loves to make software, sell it as a service, re-org the company and make employees change buildings. According to those with direct knowledge of the company’s plans, Microsoft is shuffling the deck once again. This time around, it’s Harry Shum’s AI org that is being moved about with some speculating that he may be leaving the company. But what is for certain is that Cortana is no longer under the company’s AI org and is now nested inside of Office. For some time, the Office team has been pressuring Shum to move Cortana over to their unit, especially after it became apparent that the digital AI was no longer going to be a stand-alone product. With Cortana now fully inside of Office, expect the assistant to gain new features related to the productivity suite but I also believe that Cortana will simply become another tool for Office, rather than it’s own product. Earlier this month, I wrote about where I thought Cortana was headed following Ignite and this seems to align to that plan. With this change, Cortana is being moved out of the AI and Research organization which paints the picture of how the company now looks at the digital assistant. At this time, the charter for Cortana isn’t clear internally and the dust hasn’t even started to settle on this announcement but understand that going forward, Microsoft is significantly changing the way it thinks about and utilizes Cortana. What I don’t fully know at this time is how widespread the re-org is inside of Microsoft. AI & R is certainly being overhauled and I had heard whispers that the former Windows org would undergo additional changes once RS5 was completed; Microsoft wrapped up development on this feature release a couple weeks back. If I hear of any further changes, I’ll keep this post updated but for now know that Microsoft has repositioned Cortana internally which likely signals the company is moving away from the platform as being a competitor to Alexa, Siri, and Google Assistant and instead is using it as a tool for its own productivity software. Source: Microsoft Shuffles the Deck Again, Cortana Finds a new Home (Petri - Brad Sams)
  17. KMS_VL_ALL_6.6.1 - Online/Offline KMS Activator for Microsoft Windows and Office Volume Licensed Products Information: Supported Volume Licensed Products: (32-bit and 64-bit) Windows Vista/7/8/8.1/10 All KMS Supported Clients Windows Server 2008/2008R2/2012/2012R2 All versions Office 2010 Family on Windows XP SP3 or Newer Office 2013 Family on Windows 7 or Newer Office 2016 Family on Windows 7 or Newer Retail/OEM/MAK Genuine Activations are UNAFFECTED and Converts Notice Period/OOBE-Grace period windows to VL IF they are supported and are then activated. Supported Retail/MAK Unactivated Editions: Win Vista(Business/Enterprise) 7/8/8.1/10 Pro Retail/MAK and their Enterprise editions Server 2008/2008 R2/2012/2012R2 Retail, MAK editions Office 2010/2013 MAK editions only Changelog: 6.6.1 "Requiem for a Dream" - Updated vlmcsd to svn812 - Included Office installation detection and fixes from abbodi1406's v5 mod (Thanks to abbodi1406 and Nucleus) - Other minor tweaks and changes Download: https://userscloud.com/go/jc4hithoa2io/ Tutorial:How to use ? 1. Run KMS_VL_ALL.cmd as Administrator. 2. Done.
  18. !!!LOOK OUT!!! If you like MS Windows and MS Office please buy legal and original copy. This tools can be used for evaluation purposes ONLY. I recommend to buy a legal copy of the product. I will not encourage piracy and misuse of it. Some techniques used can make your antivirus alert. [Multi21*] Re-Loader v3.0 Beta 3 * Requirements .NET 4.0. - Install OEMLogos; - Activate Windows XP/Vista/7/8.x/10/Server 2008 (R2)/Server 2012 (R2)/Server 2016 RTM; - Activate Office 2010/2013/2016; * Before post a question, please read the FAQ. OEMLogo Pack 121 [09/03/2015]: Site: http://pastebin.com Sharecode[?]: /raw.php?i=rSP5spZg Re-Loader v3.0 Beta 3 [02/09/2016]: Site: http://www.mirrorcreator.com Sharecode[?]: /files/UEAVYF7T/ NEW VERSION 04/07/2017: *The interface of this program is available at: Italian, English (tnx to azroach), Slovenian (tnx to CraftByte), Persian (tnx to Behdad Boujari), Portuguese (tnx to roonney), Vietnamese (tnx to vanhoivo), Deutsch (tnx to Ripdevil), Albanian (tnx to BL3D1), Arabic (tnx to alnaloty), Russian, (tnx to Phobos) French (tnx to jordan4x), Romanian (tnx to WebMan), Hebrew, Chinese (tnx to zihan), Serbian (tnx to agasoft), Korean (tnx to mireado), Indonesian (tnx to GlgApr), Polish (tnx to Mr. T), Spanish (tnx to -=4lfre1re=-), Dutch (tnx to Plexxor). on Twitter: @Ra1nReLoader: Be good it is for fun. I'm back on Twitter with the account @Ra1nReLoader This is my original account! other accounts are fake! be careful!
  19. Microsoft’s Obscure ‘Self Service for Mobile’ Office Activation Microsoft requires a product activation after installing. Users of Microsoft Office currently are facing trouble during telephone activation. After dealing with this issue, I came across another obscure behavior, Microsoft’s ‘Self Service for Mobile’ solution to activate Microsoft Office via mobile devices. Microsoft describes how to activate Microsoft Office 2013, 2016 and Office 365 within this document. There are several possibilities to activate an installed product, via Internet or via Telephone for instance. Activation by phone is required, if the maximum Internet activation threshold is reached. But Office activation by phone fails Within my blog post Office Telephone activation is no longer supported error I’ve addressed the basis issue. If a user re-installs Office, the phone activation fails. The activation dialog box shows the message “Telephone activation is no longer supported for your product“. Microsoft has confirmed this issue for Office 2016 users having a non subscriber installation. But also users of Microsoft Office 2010 or Microsoft Office 2013 are affected. A blog reader posted a tip: Use Mobile devices activation… I’ve posted an article Office 2010: Telefonaktivierung eingestellt? – Merkwürdigkeit II about the Office 2010 telephone activation issue within my German blog, back in January 2017. Then a reader pointed me within a comment to a Self Service for Mobile website. The link http: // bit.ly/2cQPMCb, shortened by bit.ly, points to a website https: // microsoft.gointeract.io/mobileweb/… that provides an ability to activate Microsoft Office (see screenshot below). After selecting a 6 or 7 Digits entry, an activation window with numerical buttons to enter the installation id will be shown (see screenshots shown below). The user has to enter the installation id and receives the activation id – plain and simple. Some users commented within my German blog, that this feature works like a charm. Obscurity, conspiracy, oh my God, what have they done? I didn’t inspect the posted link until writing last Fridays blog post Office Telephone activation is no longer supported error. My idea was, to mention the “Self Service for Mobile” page within the new article. I managed to alter the link to direct it to the English Self Service for Mobile language service site. Suddenly I noticed, that both, the German and also the English “Self Service for Mobile” sites uses https, but are flagged as “unsecure” in Google Chrome (see the screenshot below, showing the German edition of this web page. The popup shown for the web site „Self Service for Mobile“ says, that there is mixed content (images) on the page, so it’s not secure. That catches my attention, and I started to investigate the details. Below are the details for the German version of the web site shown in Google Chrome (but the English web site has the same issues). First of all, I noticed, that the „Self Service for Mobile“ site doesn’t belongs to a microsoft.com domain – in my view a must for a Microsoft activation page. Inspecting the details, I found out, the site contains mixed content (an image contained within the site was delivered via http). The content of the site was also delivered by Cloudflare (I’ve never noticed that case for MS websites before). The image flagged in the mixed content issue was the Microsoft logo, shown within the sites header, transferred via http. The certificate was issued by Go Daddy (an US company) and ends on March 2017. I’ve never noticed, that Go Daddy belongs to Microsoft. I came across Go Daddy during analyzing a phishing campaign months ago. A compromised server, used as a relay by a phishing campaign, has been hosted (according to Whois records) by Go Daddy. But my take down notice send to Go Daddy has never been answered. That causes all alarm bells ringing in my head, because it’s a typical behavior used in phishing sites. Also my further findings didn’t calm the alarm bells in my head. The subdomain microsoft used above doesn’t belongs to a Microsoft domain, it points to a domain gointeract.io. Tying to obtain details about the owner of gointeract.io via WhoIs ended with the following record. Domain : gointeract.io Status : Live Expiry : 2021-03-14 NS 1 : ns-887.awsdns-46.net NS 2 : ns-1211.awsdns-23.org NS 3 : ns-127.awsdns-15.com NS 4 : ns-1980.awsdns-55.co.uk Owner OrgName : Jacada Check for 'gointeract.sh' --- http://www.nic.sh/go/whois/gointeract.sh Check for 'gointeract.ac' --- http://www.nic.ac/go/whois/gointeract.ac Pretty short, isn’t it? No Admin c, no contact person, and Microsoft isn’t mentioned at all, but the domain has been registered till 2021. The Owner OrgName Jacada was unknown to me. Searching the web didn’t gave me more insights at first. Overall, the whole site looks obscure to me. The tiny text, shown within the browser’s lower left corner, was a hyperlink. The German edition of the „Self Service for Mobile“ site opens a French Microsoft site – the English site opens an English Microsoft site. My first conclusion was: Hell, I was tricked by a phishing comment – somebody set up this site to grab installation ids of Office users. So I deactivated the link within the comment and I posted a warning within my German blog post, not to use this „Self Service for Mobile“ site. I also tried to contact the user, who has posted the comment, via e-mail. … but “Microsoft” provides these links … User JaDz responded immediately in an additional comment, and wrote, that the link shortened via bit.ly has been send from Microsoft via SMS – after he tried the telephone activation and selected the option to activate via a mobile device. I didn’t noticed that before – so my conclusion was: Hell, this obscure „Self Service for Mobile“ site is indeed related to Microsoft. Then I started again a web search, but this time with the keywords Jacada and Microsoft. Google showed several hits, pointing to the site jacada.com (see screenshot below). It seems that Jacada is a kind of service provider for several customers. I wasn’t able to find Microsoft within the customer reference. But I know, that Microsoft used external services for some activities. Now I suppose, that somebody from Jacada set up the „Self Service for Mobile“ activation site. The Ajax code used is obviously able to communicate with Microsoft’s activation servers and obtain an activation id. And Microsoft’s activation mechanism provides an option to send the bit.ly link via SMS. Closing words: Security by obscurity? At this point I was left really puzzled. We are not talking about a startup located within a garage. We are having dealing with Microsoft, a multi billion company, that claims to run highly secured and trustable cloud infrastructures world wide. But what’s left, after we wipe of the marketing stuff? The Office activation via telephone is broken (Microsoft confirmed that, after it was reported by customers!). As a customer in need to activate a legal owned, but re-installed, Microsoft Office is facing a nasty situation. Telephone activation is refused, the customers will be (wrongly) notified, that this option is no longer supported. Internet activation is refused due “to many online activations” – well done. But we are not finish yet. They set up a „Self Service for Mobile“ activation site in a way, that is frequently used by phishers. They are sending links via SMS to this site requesting to enter sensitive data like install ids. A site that is using mixed content via https, and is displaying an activation id. In my eyes a security night mare. But maybe I’ve overlooked or misinterpreted something. If you have more insights or an idea, or if my assumptions a wrong, feel free, to drop a comment. I will try to reach out and ask Microsoft for a comment about this issue. Article in German Source Alternate Source reading - AskWoody: Born: Office activation site controlled by a non-Microsoft company
  20. This Kms activator is created by abbodi1406 on my digital life. So all credits, thanks and love goes to him The main thing about this activator here is that it is very clean from false positives. and that's what make it different than other kms solutions. (only one of its file is flagged as 1/66 ratio on virus total, and all other files are 100% clean. Read_Me Download Links- File: KMS_VL_ALL-WinDivert-kms-3.7zSHA1: 43fd2939461987e94dbd055ea4999eb52d09000eSHA256: 2d8c8c68be57f9360f369631f06600da800284f2eb408c623c08a1fa5b97f7bd Site: https://drop.me Sharecode: /MOKJXR Site: http://androidhost.org Sharecode: /nE5fx
  21. This is a set of tools and functions for managing licensing, deploying, and activating Microsoft Office and Windows. All output from these functions is displayed in the Information Console. All functions are run in the background and the GUI is disabled to prevent running multiple functions, as they could conflict or cause damage if run concurrently. The Microsoft Office Setup Customization Functions (Customize Setup Tab), AutoKMS Uninstaller (if AutoKMS is installed), AutoRearm Uninstaller (if AutoRearm is installed), Office Uninstaller and Product Key Checker work even if Microsoft Office or Windows is not installed/supported. For information about individual functions, read further. This Pack Contains: HEU KMS Activator 10.0.0 KMSAuto Lite v1.3.5.1 Windows 10 Permanent Activator Ultimate v2.4 KMSAuto Net 2016 1.5.3 KMSpico 10.2.0 Final KMSpico 10.2.0 Portable Microsoft Toolkit 2.6.3 Final Office 2013 KMS Activator Ultimate 2015 1.5 Office 2013 KMS Activator Ultimate 2015 1.5 Portable PIDKey 2.1.2.1016 Portable Re-Loader Activator 2.6 Final Windows KMS Activator by AR_Alex 3.1.0 Windows 10 KMS Activator Ultimate 2016 v1.6 Windows 10 KMS Activator Ultimate 2016 v1.6 Portable Windows KMS Activator Ultimate 2018 4.0 Windows Loader 2.2.2 By DAZ + WAT Fix Office 2016 Permanent Activator Ultimate 1.7 Ratiborus KMS Tools 15.12.2017 Windows 10 Pro Permanent Activator Ultimate v2.2 AAct v3.8.5 AAct Network v1.0.3 Office 2013-2016 C2R Install 6.0.1 Office 2013-2016 C2R Install Lite 6.0.1 Office 2013-2016 C2R License Setup v1.05 KMS Server v1.2.4 KMS Server Service 2.0.4 Garbage Collector v1.3.4 Windows KMS Activator Ultimate 2017 v3.8 Ra1n Act1vat0r 1.0 RC 8 KMS Tools Portable 01.03.2018 PIDKey Lite v1.62.1 Windows 10 Permanent Activator Ultimate 2.5 KMS Lite 1.3.5.2 Supported Operation Systems: Windows 10 32-bit or 64-bit Edition Windows 8 32-bit or 64-bit Edition Windows XP 32-bit SP3 Windows Vista 32-bit and 64-bit with SP2 or higher Windows 7 32-bit and 64-bit Changelog: What`s new: Windows 10 Permanent Activator Ultimate 2.5 Windows 10 Pro Permanent Activator Ultimate 2.2 AAct v3.8.5 AAct Network.1.0.3 KMS Tools Portable 01.03.2018 KMS Lite 1.3.5.2 Download | 319.3 MB: *link removed*
  22. Controlling Which Apps Office 2016 Installs So I got a new computer late last year. When setting it up, I thought, "hey, I may as well put the latest Office on it," and got a copy of 2016 "ProPlus," as I use OneNote, Word, Excel, PowerPoint, and Outlook. The setup was incredibly easy, and in fact, I thought, "hmmm... too easy." I let it run and in a trice, it told me that Office was installed. So I looked on my Start Menu, and what do you know, Office installed all of the Office apps. That unfortunately included stuff I don't use and don't want like Publisher, Project and the like. Looking at the Add/Remove apps section of Control Panel offered no options. I uninstalled Office, paid closer attention as I re-installed it, and still... no choices. A few hours later, I discovered how to get Office to install but a few apps rather than gooping up my drive with the other junk. Basically the trick is to copy the install files to a folder, download the "Office 2016 Deployment Tool" from the Microsoft site, build an XML file (it'll be easy), and run setup — the step-by-steps follow. Get the ProPlus 2016 ISO Create a folder "C:\Officefiles" on your hard drive where you can copy the ISO's contents, as we need to modify it a bit to seize control of our copy of Office. Open the ISO. You'll see two files (autorun.inf and setup.exe) and a folder ("office"). Copy the "office" folder — and not the two other files — to the C:\Officefiles folder. Download the Office 2016 Deployment Tool from http://www.microsoft.com/en-us/download/details.aspx?id=49117> Run the exe. It'll ask where to extract its files — tell it C:\Officefiles . The C:\Officefiles folder will then contain two new files, setup.exe and configuration.xml. Delete that configuration.xml file. Open Notepad and copy the XML text below (starting with "<configuration>" and ending with "</configuration>" into Notepad. If you need a Product Key, replace the bogus value in my example below. (Enterprise customers may not need the line at all — sorry, I don't know as I don't have an Enterprise license for Office.) Save the resulting Notepad contents to c:\Officefiles\configuration.xml: <Configuration> <Add OfficeClientEdition="32" Branch="Current"> <Product ID="ProPlusRetail" PIDKEY="THISD-OESNT-WORKV-XXXXX-X"> <Language ID="en-us" /> <ExcludeApp ID="Access" /> <ExcludeApp ID="Groove" /> <ExcludeApp ID="InfoPath" /> <ExcludeApp ID="OneDrive" /> <ExcludeApp ID="Project" /> <ExcludeApp ID="Publisher" /> <ExcludeApp ID="SharePointDesigner" /> <ExcludeApp ID="Visio" /> </Product> </Add> <Updates Enabled="TRUE" Branch="Current" /> <Display Level="None" AcceptEULA="TRUE" /> <Property Name="AUTOACTIVATE" Value="1" /> <Logging Name="OfficeSetup.txt" Path="d:\OfficeFiles" /> </Configuration> Open an elevated command prompt and type the following: C: CD \OfficeFiles Setup /configure configuration.xml Result: a much trimmer Office install. Of course, you can add things back by removing their appropriate 'ExcludeApp" line in the XML, and if you use 64-bit Office, replace the "32" with "64." Source
  23. Polaris Office 8.1.555.26975 Polaris Office is a free office app with an all-in-one feature to view, edit, share, memo, and archive all types of documents anytime and anywhere. It includes superior editing capabilities for all document formats - all in a single program: Edit Microsoft Office Word, Powerpoint, Excel, Google Docs, Spreadsheet, Slide, TXT, ODF, and Adobe PDF. You also get a powerful PDF reader, editor and converter that allows you to easily view PDFs on your desktop or mobile anytime and annotate important notes. You will always have access to your files no matter where you are with this cloud-based office suite, and your data can be synced through Polaris Drive as well as numerous other cloud storage services. Polaris Office provides a seamless experience on all your devices as well as enabling document collaboration to share files with a simple link and to work simultaneously with your colleagues by utilizing the co-authoring feature to streamline workflow. Homepage: https://www.polarisoffice.com Downloads: Win - http://install.polarisoffice.com/pcoffice/PolarisOfficeSetup.exe iOS - https://itunes.apple.com/ca/app/pollaliseu-opiseu-lingkeu/id698070860?mt=8 Android - https://play.google.com/store/apps/details?id=com.infraware.office.link
  24. !!!LOOK OUT!!! If you like MS Windows and MS Office please buy legal and original copy. This tools can be used for evaluation purposes ONLY. I recommend to buy a legal copy of the product. I will not encourage piracy and misuse of it. Some techniques used can make your antivirus alert. [Reboot] Ra1n Act1vat0r v1.0 RC 8 * Requirements .NET 4.0. - Install Windows OEM Logos; - Activate Windows XP/Vista/7/8.x/10/Server 2008 (R2)/Server 2012 (R2)/Server 2016 RTM; - Activate Office 2010/2013/2016; - Activate Visual Studio 2012/2013/2015/2017; * Before post a question, please read the FAQ. OEMLogo Pack 121 [09/03/2015]: Site: http://pastebin.com Sharecode[?]: /raw.php?i=rSP5spZg Ra1n Act1vat0r v1.0 RC 8 [16/07/2017]: Site: http://www.mirrorcreator.com Sharecode[?]: /files/DLGIC66U/ Virus Total Scan [04/07/2017]: Site: https://www.virustotal.com Sharecode[?]: /file/3db4e947cd2e50f9631a85e977c862b160384ae337eb2fa9fa622d3b0809183d/analysis/1499190243/ *The interface of this program is available at: English (tnx to azroach). on Twitter: @Ra1nReLoader: Be good it is for fun. PLEASE REPORT ANY BUGS I'm back on Twitter with the account @Ra1nReLoader This is my original account! other accounts are fake! be careful!
  25. General Info:-*OS:- Windows Server/7/8/8.1/10 (x64x86) *Size:- 2.10 GB/1.79 GB *Original Install File *Update:- Jan2018 *Language:- English *Nothing removed only updateDescription:-Microsoft Office 2016 is the complete, cross-platform, cross-device solution for the modern workplace, with smart tools for individuals, teams, and businesses. It can open your applications, documents anywhere, across multiple devices. Get the installed applications you know and trust – Word, Excel, PowerPoint, OneNote, *******, Publisher, Access. Always have the latest, full installed versions of Word, Excel, PowerPoint, OneNote, *******, Publisher, and Access and capture your ideas however you work best – using a keyboard, pen, or touchscreen. Microsoft Office 2016 will offer new security, compliance, and deployment features, giving organizations more control over sensitive data and IT more flexibility in deployment and management. Here is a new version of Microsoft Office 2016 - update of one of the most important products of the company, which in spite of the status of the Preview is already quite stable. Microsoft Office 2016 well demonstrates how today has changed the approach to create documents and work with them. Microsoft Office 2016 is the complete Microsoft expanded the Office footprint Microsoft Office 2016 suite includes applications New in Microsoft Office 2016: Collaboration Smart Applications Data analysis made faster and easier – New analysis capabilities are built into Excel, so you can pull, map, analyze and visualize your data faster and easier than ever Package: - Microsoft Office Professional Plus 2016 • Microsoft Access 2016 • Microsoft Excel 2016 • Microsoft InfoPath 2016 • Microsoft OneDrive for business in 2016 • Microsoft OneNote 2016 • Microsoft Outlook 2016 • Microsoft PowerPoint 2016 • Microsoft Publisher 2016 • Skype for business in 2016 • Microsoft Word 2016 Screenshot Download: With Jan2018 Update English: X64 ************************************************************** English: X86 ************************************************************** Download Orginal Untouched ISo without Update: links shared by virge Microsoft Office Professional Plus 2016 VLSC. Microsoft Visio Professional 2016 VLSC: Microsoft Project Professional 2016 VLSC: ************************************************************** ************************************************************** To activate untouched iso use Microsoft Toolkit 2.6.2 Final Note: Office with October update pre-activated ************************************************************** ************************************************************** Added 37 different language All original RTM untouched isos Both X86 X64 Total Size : 80:19 GB Microsoft Office 2016 Professional Plus RTM 16.0.4266.1003 (x86x64) (Retail) Torrent Link: Torrent File Download: Torrent speed: Torrent Screenshot:
×
×
  • Create New...