Jump to content

Search the Community

Showing results for tags 'windows 8.1'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Found 147 results

  1. It's that time of the month again when Microsoft unleashes an array of updates to all of the supported versions of Windows. This includes, of course, multiple versions of Windows 10, but also Windows 7 and 8.1. As usual, each OS gets two different kinds of updates - a monthly rollup and a security-only update. For Windows 8.1, the monthly rollup update is KB4530702, and it can be downloaded manually from here. It comes with a single change: Security updates to Windows Virtualization, Windows Kernel, Windows Peripherals, the Microsoft Scripting Engine, and Windows Server. The security-only update is KB4530730, and it can be downloaded manually from here. The changelog is very similar, except there's no update for the Microsoft Scripting Engine. Both updates have the same known issue, which has been around for months: Symptom Workaround Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”. This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. Do one of the following: Perform the operation from a process that has administrator privilege. Perform the operation from a node that doesn’t have CSV ownership. Microsoft is working on a resolution and will provide an update in an upcoming release. As for Windows 7, the monthly rollup update is KB4530734, and it can be downloaded manually from here. The changelog is very similar to the one for Windows 8.1: Security updates to Windows Input and Composition, Windows Virtualization, Windows Kernel, Windows Peripherals, the Microsoft Scripting Engine, and Windows Server. The security-only update is KB4530692 and it can be downloaded manually here. It has a similar changelog, but just like Windows 8.1, it doesn't include updates to the Microsoft Scripting Engine. Neither update has any known issues. It's worth noting that this is the second last update you will ever get unless you're using a business machine ad your company opts to pay for extended security updates. Windows 7 support will end on January 15, after which, no more updates will be released. You may want to consider upgrading to a newer version of Windows to stay secure. Source: Here's what's new for Windows 7 and 8.1 this Patch Tuesday (via Neowin)
  2. It's that time of the month again when every supported version of Windows gets an update with a bunch of fixes. This week, in addition to cumulative updates, we saw the release of the Windows 10 November 2019 Update. Windows 7 and 8.1 haven't been forgotten just yet, and there's a couple of updates for these older versions of the OS, too. As usual, this month's updates come in two flavors, a monthly rollup and a security-only update. For Windows 8.1 and Window Server 2012 R2 users, the monthly rollup is KB4525243, and it can be downloaded manually here. The security update is KB4525250, and it can be downloaded manually here. Here's what's new in the monthly rollup update: For the security-only update, only the fourth, fifth, and seventh points apply. Both updates have the same known issues, which has been around for some time now: Symptom Workaround Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”. This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. Do one of the following: Perform the operation from a process that has administrator privilege. Perform the operation from a node that doesn’t have CSV ownership. Microsoft is working on a resolution and will provide an update in an upcoming release. For users still running Windows 7 SP1 or Windows Server 2008 R2 SP1, the monthly rollup is KB4525235 and it can be downloaded manually here. The security-only update is KB4525233 and can be downloaded manually here. Here's what's new in the monthly rollup: For the security-only update, only the second, third, and fifth points apply. Neither of the releases has any known issues to be aware of. If you want to grab the monthly rollup, it'll show up normally in Windows Update, but those looking for the security-only variants will need to download them manually using the links above. Source: Here's what's new in this month's Patch Tuesday for Windows 7 and 8.1 (via Neowin)
  3. Microsoft releases KB4512478 and KB4512514 previews Microsoft released the monthly rollup previews KB4512478 and KB4512514 for Windows 7, Windows 8.1, and Windows Server 2008 R2 and 2012 R2 this weekend. The release on a Saturday is a deviation from the Tuesday or Thursday release schedule for the preview updates. Whether that is a one-time deviation or something that could happen more often in the future remains to be seen. KB4512478 and KB4512514 are preview updates of the monthly rollup patch that Microsoft will release on September 10, 2019. Designed to give organizations time to test changes made in these updates, the previews are available on all devices running one of the supported operating systems. A check on Windows Update will return these as optional updates and they may also be downloaded from the Microsoft Update Catalog. The previews are not available on WSUS but they can be imported to WSUS manually. KB4512514 for Windows 7 SP1 and Windows Server 2008 R2 SP1 Support page Microsoft Update Catalog KB4512514 is a non-security update that fixes two issues on Windows 7 and Windows Server 2008 R2 systems: Fixed an issue affecting svchost.exe hosting WSMan Service (WsmSvc) that caused it to stop working and to stop other services in the same host process. Fixed the long-standing Preboot Execution Environment issue that could prevent devices from starting. Microsoft lists three known issues that affected previous updates as well: IA64 or x64 devices provisioned after the July 9th updates may fail to start with error" File: \Windows\system32\winload.efi Status: 0xc0000428 Info: Windows cannot verify the digital signature for this file." Certain Symantec or Norton security applications may block or delete Windows updates. VBScript should be disabled by default in Internet Explorer 11 but this is apparently not the case all the time. The release notes list only one known issue that Microsoft fixed in the new update; what about the fifth known issue that is no longer listed as a known issue in KB4512514 but also not listed as fixed? It is unclear if the Visual Basic issue is fixed in the preview update; Microsoft makes no mention of it. If you check the August 2019 Monthly Rollup update KB4512506 you find it listed there under known issues and the reference that the optional update KB4517297 fixes it. A quick check of the package details on the Microsoft Update Catalog website shows that KB4517297 is not replaced by this update. KB4512478 for Windows 8.1 and Windows Server 2012 R2 Support page Microsoft Update Catalog KB4512478 is a preview of the monthly rollup for Windows 8.1 and Windows Server 2012 R2 that Microsoft will release on the September 2019 Patch Day. The update fixes the following three issues: Fixed a memory leak issue in LSASS that caused it to grow until it became necessary to restart the device. Fixed an issue that caused rdpdr.sys to stop responding or working. Fixed the Preboot Execution Environment issue. Microsoft lists a single known issue: Operations such as rename may fail on files or folders that are on a Cluster Shared Volume. The August 2019 Monthly Rollup log lists three known issues; the Visual Basic issue is not listed as fixed but it is not listed as a known issue either. Source: Microsoft releases KB4512478 and KB4512514 previews (gHacks - Martin Brinkmann)
  4. dotNET Framework 3.5 Offline Installer Tool is a tool that can be used to easily install the .NET Framework 3.5 offline designed for Windows 8 / 8.1 / 10 Features: ======== - Installing the .NET Framework 3.5 offline (included DVD or Windows installer ISO file) - Supports 2 (two) methods to install (Using Command Prompt and PowerShell) How to use: 1. Insert the DVD or mount the Windows ISO installer file ... 2. Select Drive Windows installer location ... 3. Click the "Install" button ... Changelog: ========= - Version 1.0 (08/03/2019) First release ... Homepage: ========== https://devatakomputer.blogspot.com/ Download Page: ============= https://devatakomputer.blogspot.com/p/dotnet-framework-35-offline-installer.html Download: ========= https://drive.google.com/file/d/119fqlJD9SklfRrhGdEm2CyktsEON5ZIu/view
  5. KB4503277 and KB4503283 for Windows 7 and 8.1 released Microsoft released two update previews for the company's Windows 7 and Windows 8.1 operating systems on June 20, 2019. The updates are also available for Windows Server 2008 R2 Service Pack 1 and Windows Server 2012 R2 and can either be downloaded directly from the Microsoft Update Catalog website or as an optional update through Windows Update. Please note that the updates are considered previews; in other words, they should be considered beta releases. It is advised to stay clear of them until a device is affected by one of the fixed issues or if you want to take the updates for a test drive. Both updates are non-security updates. KB4503277 for Windows 7 SP1 and Windows Server 2008 R2 SP1 Support link: KB4503277 Microsoft Update Catalog Link: link Servicing Stack Update: link KB4503277 "includes improvements and fixes that were part of KB4503292" according to Microsoft's update description. The release notes list the following changes: Fixed an issue that prevented the Calculator application from following Gannen settings when enabled. Addressed an issue with the evaluation of the compatibility status of the Windows operating system. Fixed an issue that caused Internet Explorer 11 to stop working when Scalable Vector Graphics (SVG) markers are opened or interacted with. Fixed the Event Viewer issue that caused custom views to throw an error message on Start. The only known issue listed is the incompatibility with certain McAfee Enterprise products that may slow down the system start or make the system unresponsive altogether. KB4503283 for Windows 8.1 and Windows Server 2012 R2 Support link: KB4503283 Microsoft Update Catalog Link: link KB4503283 "includes improvements and fixes that were part of KB4503283" according to Microsoft's update description. The release notes list the following changes: All changes fixed by the Windows 7 and Windows Server 2008 R2 update. Fixed an issue that caused the user interface to appear frozen during scroll operations (in windows with many child windows). Addressed a reliability issue in Windows (which Microsoft did not reveal anything about other than that it is a reliability issue) Microsoft confirms two known issues, both of which not new. The systems are affected by the same McAfee software issue as the Windows 7 and Windows Server 2008 R2 systems are. The second issue is the longstanding issue on Cluster Shared Volumes that makes certain operations fail with the error "STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)". New Internet Explorer cumulative update as well Woody Leonhard notes that Microsoft released a new cumulative Internet Explorer update for the client operating systems Windows 7 and 8.1, and the Server operating systems Windows Server 2008 R2 and 2012 R2 as well recently. Addressed an issue that caused Internet Explorer 11 to stop working when it opened or interacted with Scalable Vector Graphics (SVG) markers, including Power BI line charts with markers. The cumulative update is available on Microsoft's Update Catalog website. Source: KB4503277 and KB4503283 for Windows 7 and 8.1 released (gHacks - Martin Brinkmann)
  6. While most of Patch Tuesday seems to be going relatively smoothly, Win7, Win8.1, Server 2008 R2 and 2012 R2 machines are seeing multiple problems with this month’s patches, both Security-only updates and Monthly Rollups. Sophos has acknowledged that its products may be at the core of the reports. detsang (CC BY 2.0) Patch Tuesday seemed uneventful until loads of Windows 7 and Server 2008 R2 machines, as well as Win8.1 and Server 2012 R2 machines, rebooted overnight. Looks like we have another throat-clutching bad round of patches to contend with. Sophos Anti-Virus appears to be at the core of many reported bugs, but it’s still too early to tell if other software will get stung by the same changes. Yesterday, as is its wont, Microsoft released a big bunch of patches: 74 separately identified security holes; two of them actively exploited; with every version of Windows, Office, IE and Edge plugged. As of early this morning, the big news is the astounding gaggle of bugs being reported for the Win7 and Server 2008 R2 Monthly Rollup, KB 4493472, and the Win8.1 and Server 2012 R2 Monthly Rollup, KB 4493446. We’re still at the first-survivor’s round of complaints, but so far there have been reports on Spiceworks of: Login screen stuck on Welcome and taking up to an hour to logon. And then even if they can login they freeze up completely. Some of our 2008R2 servers were hanging at "applying computer settings". Including the domain controller. After booting into safe mode and removing the update, the problem was gone. All of our Windows 7 machines auto installed this update so we've spent since 8AM this morning going to each machine and removing it (having to boot into Safe mode). However the update simply will not remove from our HP ProDesk 400 G2 MINI's we've had to take them out of service as they continue to get stuck even after the removal. Over on the Sophos site: Sophos AntiVirus service was logging lots of error messages in event log. Event IDs : 7022 (service hang), 80, 81, 83, 85, 82, 566, 608, 592. The server became unresponsive, no rdp, no file share access, Ctrl Alt Delete not working. The people at Sophos just acknowledged the problem: After installing the following Microsoft Windows updates Sophos has received reports of computers failing to boot: https://support.microsoft.com/en-gb/help/4493467/windows-8-1-update-kb4493467 https://support.microsoft.com/en-gb/help/4493472/windows-7-update-kb4493472 Applies to the following Sophos product(s) and version(s) Sophos Endpoint Security and Control Sophos Central Endpoint Standard/Advanced There’s no apparent solution, other than uninstalling the Windows patch — and that’s pretty complicated because you have to bypass the Sophos Anti-Virus service. Details in the post. It’s not clear from Sophos’s mea culpa precisely which patches are implicated. They list two: KB 4493467 - the April Win8.1 Security-only patch KB 4493472 - the April Win7 Monthly Rollup From that, I would infer (but can’t yet confirm) that two additional patches are involved: KB 4493446 - the April Win8.1 Monthly Rollup KB 4493448 - the April Win7 Security-only patch Microsoft has yet to report on any of this. In particular, we don’t know if the patches only clobber Sophos Anti-Virus, or if there’s more collateral damage. We’re keeping a close eye on the AskWoody Lounge. Source: Widespread reports of freezing with yesterday’s Win7 and 8.1 Monthly Rollups, KB 4493472 and KB 4493446 (Computerworld - Woody Leonhard)
  7. Some Windows 7, 8.1 users reporting Security Essentials and Windows Defender problems Some Windows 7 and 8.1 users are noticing that their automatic anti-malware protection has been turned off and are seeing out-of-date virus definitions. A definition update fix may be coming shortly. A number of Windows 7 and 8.1 users are encountering problems with Microsoft Security Essentials and Windows Defender. Users are seeing their automatic anti-malware protection turned off without their knowledge and are seeing out-of-date virus definitions. The problem is happening with some, but not all, users for the past several hours. Windows 10 users don't seem to be affected. I just tried running a manual Security Essentials scan on my Windows 7 SP1 desktop machine and got error message 0x800106ba. I, like others reporting the issue, received a warning that my PC couldn't be scanned and my ant-malware service had stopped. Microsoft Security Essentials provides a fuller range of protection against malicious software than Windows Defender. MSE is meant to protect against viruses, worms, Trojans, rootkits, spyware and more. I have no idea how many users are affected, but saw early reports of this on AskWoody.com. There are more reports of the same issue on the Microsoft.com Answers site. Some System Center Endpoint Protection users also are reporting problems and have been guessing that a faulty virus definition could be the culprit. I'm hearing from sources that an definition update that will fix the issue should be out in the next hour or so (by 3 pm ET or so). And that the problem, introduced in signatures 1.289.1521.0 could be mitigated in signatures 1.289.1587 or newer. I've asked Microsoft for official comment. No word back so far. Yesterday, March 18, a number of IT administrators were reporting sync issues with Windows Server Update Services (WSUS). That issue also may have had something to do with virus definitions. (Thanks to @d_vickery on Twitter for that reminder.) Source
  8. All Activation Windows 7-8-10 v19.3 - 2018 All methods of activation in the hand tested after the "anti-piracy" KB971033 update DG Win & Soft offers you a complete collection of programs and ways to Activate Windows. All methods and programs personally verified by us many times and we can safely recommend them to you. NOTE: All programs must be Run as Administrator! Additional Information: - If you have a direct hand, you want to activate in the Off-line mode and no longer bother to search for keys every six months, then you are prepared activation via firmware BIOS. But be careful, because if your not the right things, you have a chance to bungle the operation and will have to contact the service center. And keep in mind that for every BIOS (AMI, Award, Phoenix) has its own specific program (AMI - amitool, etc.), what is your BIOS can see when you boot the computer. - If you do not want to make any changes either in your "iron", or in the Windows itself, and that your activation is not distinguished by anything from legal activation, your choice of KMS server. With the use of virtual machines, this method can also be called Off-line. But you should know that this method of activation for six months and 180 days, you again have to repeat it. Also, this method only and Professional version Enterprise - If you did not accept neither the first nor the second of our suggested methods you can use the activators. Without going into too much detail, we can say that activators emulate the BIOS with slicom 2.1. But no one gives a guarantee that Microsoft will not release a patch or update that will detect the presence of emulation and reset the activation. We recommend to start with Windows 7 Activator Loader eXtreme Edition (Napalum), because He has a huge number of settings and features and good will activate automatically What's new in the assembly: Updated KMS section All new marked as (New) Added build option in the form of installation executable file List of programs: Office 2013-2016 C2R (New) Office 2013-2016 C2R License v1.04 (New) Garbage Collector v1.3.4 (New) PIDKey v2.1.2.1017 MSActBackUp v1.2.3 Microsoft Product Keys 2.6.3 Re-Loader Activator 3.0 Beta 3 KMS Tools 08/07/2018 by Ratiborus (New) KMSAuto Lite 1.3.4 KMSAuto Net 2016 1.5.3 KMSmicro WO w7 v1.0.1 KMSpico 10.2.0 Final SuperMini_KMS AAct v3.8.4 (New) AAct Network 1.0.1 (New) Windows 7 Loader eXtremev3.503 Re-Loader Activator 2.6 Final Microsoft Toolkit 2.6.2 ODIN 1.3.7 by secr9tos GUI MBR SLIC Loader 0.621 v1.2 Windows Loader v2.2 WindSLIC-UEFI-SLIC-injector SLIC 2.1 BINS FAQ on creating firmware SLIC_ToolKit_V3.2 Programs for firmware Resetting the trial period (rearm) Three-component activation What's New in Build v19.3: • Added a new language to the shell • Now you can switch the language to English (US) and back to Russian (RU) (the switch is in the top panel) • A new kind of activator for the office + Garbage Collector • Updated other KMS • All marked with (New) Language: Russian, English OS: Windows (XP), Windows (Vista), Windows (7), Windows (8), Windows (10). Download - 326 MB: Site: https://sendit.cloud Sharecode[?]: /paezalxzmnzl Site: https://www.multiup.eu/ Sharecode[?]: download/bdd2bb77d29465432d86ac72a2b664c3/all-activation-windows-7-8-10-v19-3-20_-p2p.rar
  9. After a few days of rumors, Microsoft announced today that it's going to be using Chromium in its browser moving forward and that the new Edge will be coming to Windows 7, 8.1, and macOS. Now, Mozilla CEO Chris Beard has posted a response to the news, saying that it's bad for the internet. Mozilla says that Microsoft's decision to use Chromium and the Blink rendering engine basically gives Google a monopoly on what we see on the internet. Remember, Chromium is the open-source browser that Google Chrome is based on, and other third-party browsers use it too, like Opera, Vivaldi, and more. With Microsoft moving away from EdgeHTML, that's one less competitor in the browser space, growing Chromium's market share. Mozilla worries that when Chromium's usage share gets large enough, web developers won't test their apps against anything else, going so far as to compare this to when Microsoft had a monopoly in browsers in the early 2000s. Mozilla also said that this is why it exists. "We compete with Google not because it’s a good business opportunity," Beard said. "We compete with Google because the health of the internet and online life depend on competition and choice." Source: Neowin
  10. Still likely to end the year ahead THE GAP BETWEEN Windows 7 and Windows 10 use on traditional desktops and laptops continues to narrow, despite the fact that both operating systems lost a small amount of ground this month in the figures produced by Netmarketshare. Windows 7 drops to 38.89 per cent (-0.46) with Windows 10 continuing to snap at its heels at 38.14 (-0.14), meaning that the difference is now just 0.75 per cent, which suggests that Microsoft is still on target to finally overtake itself before the year is out. Just. Possibly. Windows 8.x is now 5.52 per cent (-0.29), with the vast majority on version 8.1. Windows XP has a slight bounce to 4.23 (+0.63). We've stopped mentioning Vista now, such is its rarity. Although the figures from Netmarketshare have a margin of error (or put another way, we take them with a slight pinch of salt) the fact that Windows 10 hasn't grown as a result of Black Friday and Cyber Monday, which both fell in this period is a bit of a curveball - in fact most of the movement has been on the Apple front in the wake of its new Macbook Air made of old tin cans and string. As you'd expect, the latest version, macOS 10.14 has seen the biggest gains of the month standing at 3.57 (+1.52), though the rate of upgrade has been slow by Mac user standards, macOS 10.13 has dropped to 3.2 (-1.43) but it hasn't been the usual swift handover. Even macOS 10.12 still has 1.36 (-0.22) and macOS 10.11 has 1.14 (0.23) which is actually a slight rise. The Linux-based systems continue to hover around the same point - Ubuntu on 0.57 (-0.05), Chrome OS on 0.32 (-0.01) and the rest on 1.47 (0.09). Worth noting there are more people using Mac OS X 10.10 and "Unknown" than Chrome OS right now - though it still has the lead in the browser market. When we remove the filter and look at market share amongst all device types - that is to say any device that has connected to the internet during November, the story changes. Window 7 (which, lest we forget is almost exclusively desktop/laptop machine anyway) is the most popular operating system in the world with 16.08 per cent. Windows 10 comes second with 15.77 and Android 8.0 has 8.62. Generically though, Android is in the lead - 39.34 per cent. Windows stands at 35.98. iOS has 18.51 per cent and Mac OS, 4.02. Linux has 0.88 and despite its popularity is schools, Chrome OS has 0.13. For completeness, below them is Series 40 (Symbian) at 0.04, Windows Phone OS at 0.03 and RIM OS (Blackberry) at just 0.01 per cent market share. Source
  11. Aero Glass integrates into the the Desktop Windows Manager without compromising any system components. It uses the native Direct3D device to render the effects and colors. You can change the transparency and base colors directly from the Windows Colorization Control Panel. This utility returns the complete glass effect into windows frames. - Apply glass look to windows borders - Blur the content behind the borders to improve UI experience - Change amount of transparency in Control panels directly - Change inactive windows borders color - Skin windows borders (add glow, shadows etc.) without changing Windows theme - Fully native including MSStyle themes and DWM API compatibility - Low resources usage Glass look Your windows will be rendered with transparent borders. This look allows you to see what is behind the border. The key element is the blurring of content behind the glass borders to prevent it from being too clear and disturbing. The result is very smart window border! Fully native The utility is completely integrated into Desktop Window Manager without breaking any system protection or modifying system files. All rendering is done via native Direct3D device. Any colorization settings adjusted in Windows Control Panels are respected. Use color intensity slider to adjust the amount of the transparency. No custom skinning engine used. Due to the native nature of this utility your Windows theme is composited together with the glass effect. All features controlled through DWM API (e.g. DwmEnableBlurBehindWindow or DwmExtendFrameIntoClientArea) are supported including the taskbar or custom Start menu blur effect. Low resources usage! This library tries to utilize all DWM resources as much as possible to minimize RAM and VRAM usage. No redudant objects are created, no background service is running (Win8 only; Win8.1 version needs light-weight background process to correctly load user's settings). The result is light-weight library which behaves exactly in the same way as Aero Glass in Windows 7 did. No performance degradation! Theme your windows! You can change the look of your windows borders completely without touching your Windows theme or using unsigned theme. This allows you to bring back several effects such as window shadow, caption glow effect, rounded borders or simply change the appearence of caption buttons. You just modify single bitmap in your favourite image editor and everything will look as you want! Note: This version is up to Win10 10.0.17134. Home: http://www.glass8.eu/ Changelog: http://www.glass8.eu/out/changelogRS2.txt Downloads: Aero Glass for Win8.1+ v1.5.9 - change log This version is up to Win10 10.0.17134. Installer (64-bit Windows) 64-bit Windows Aero Glass for Win8.1+ v1.5.3 - change log This version is for Win10 10.0.14393 only. Installer (32-bit+64-bit Windows) 32-bit Windows 64-bit Windows Windows 10 RS2-4: http://www.glass8.eu/files/setup-wrs-1.5.9.exe v1.5.3 for Windows 10 RS1: http://www.glass8.eu/files/setup-wrs-1.5.3.exe Aero Glass 1.5.9.1345 Ultimate Repack by evgenb82 Site: https://www.upload.ee Sharecode: /files/8712781/Aero_Glass_1.5.9.1345_Ultimate.rar.html Pwd: nsane Mirror without Pwd: Site: https://www.mirrored.to Sharecode: /files/13GKXHQM/Aero_Glass_1.5.9.1345_Ultimate.RePack-N.P.rar_links Thanks to @lil-fella for informing the new release. Thanks to @nacnay for sharing the repack. PS: I posted a new thread for the forum guidelines - "New version - New Thread!"
  12. WPD v1.2.855 Hi there! If you are here you have probably heard about rather tricky and complex Windows 10 privacy settings and how much data it can collect without user’s knowledge or consent. So, we have tried to resolve this problem and created WPD – a tweaker that contains all main settings in one place! You can customize Group Policy, Services and Tasks, responsible for data collection and sending, as you like. And furthermore, if you want, you can block a bunch of Microsoft's ip's to which data is sent. Disable Windows features and make various tweaks Wrapped in a clean and attractive interface, this program provides you with intuitive and practical options for tweaking your computer, whether you're running Windows 7 or 10. It doesn't require installation so you can copy the downloaded package to a USB flash drive to directly launch it on any PC without setup. Administrative rights are required, though. The main app menu is brought up to the screen at startup, allowing you to access the privacy-related features, firewall settings, apps to uninstall, or other tweaks to make. Configure privacy, firewall and app settings When it comes to privacy matters, you can deactivate the steps recorder, advertising ID, search companion, telemetry, Windows Error Reporting, handwriting auto learning, OneDrive (for file storage), and others. Some of the options displayed here might seem confusing. However, you don't have to look up definitions on the web since WPD shows descriptions in tooltips next to each option. Otherwise, you can disable everything listed here with the click of a button. As far as firewall settings are concerned, Windows Privacy Dashboard can be instructed to block Windows telemetry, third-party apps and Windows Updates from establishing Internet connections. If you change your mind and wish to reset these options to default, you can simply delete the newly created rules. Uninstall unwanted apps and perform tweaks Only Modern UI apps can be uninstalled with the aid of this utility, whether they came bundled with the operating system or got installed from other sources. Lastly, the tweaker gives you the possibility to hide sync provider notifications, allow the swap file to be cleared during restart, and prevent apps from using your camera, microphone and other devices. Taking everything into consideration, WPD turns out to be a straightforward and useful system tweaker. It enabled and disabled system settings without any issues on Windows 10 in our tests. WPD is free, totally portable, has a nice user-friendly interface, and doesn't contain any advertisement or malicious code. Currently we don't have a code signing certificate, so Widnows SmartScreen might be little nervous, just skip it. Privacy management Customize Group Policy, Services, Tasks and other settings responsible for data collection and transmission. Firewall rules Block telemetry IP's using firewall rules from the @crazy-max repository. Appx uninstaller Easy remove pre-installed Windows Store garbage or any other app. Supported OS: Windows 10 Enterprise 1803, 1709, 1703, 1607 Windows 10 Enterprise LTSB 2016, 2015 Windows 10 Education 1803, 1709 Windows 10 Pro 1803, 1709, 1703, 1607 Windows 10 Home 1803, 1709, 1703 Windows 8-8.1 Windows 7 Screenshots: Changelog: 1.2.855 7-18-2018 Fixed Windows 10 Home is being detected as unsupported edition. 1.2.853 7-16-2018 Added support for Windows 10 Education. Added unsupported OS warning. Fixed helper() startup error on some machines. Fixed unhandled exception in firewall tab, if third-party app prevents access to firewall. Updated build-in firewall rules. 1.2.777 5-1-2018 Added support for April 2018 Update. Added new privacy settings (depends on Windows version) Added ability to choose between Basic and Security Telemetry levels (Enterprise only) Added new command line arguments. For more info check a Readme file inside the archive. Added ability to see your name in the title bar (for Donators) Removed the Tweaker tab, all privacy related settings moved to Privacy tab. Updated build-in firewall rules. User interface enhancements and improvements. Bug fixes. Home: https://getwpd.com/ Download: https://getwpd.com/get/latest.zip Firewall rules: Jul 9, 2018 CRC32: 4036AF48 gHacks.net Review: Control Windows 10 Privacy with WPD
  13. All Activation Windows 7-8-10 v19.6 - 2018 All methods of activation in the hand tested after the "anti-piracy" KB971033 update DG Win & Soft offers you a complete collection of programs and ways to Activate Windows. All methods and programs personally verified by us many times and we can safely recommend them to you. NOTE: All programs must be Run as Administrator! Additional Information: - If you have a direct hand, you want to activate in the Off-line mode and no longer bother to search for keys every six months, then you are prepared activation via firmware BIOS. But be careful, because if your not the right things, you have a chance to bungle the operation and will have to contact the service center. And keep in mind that for every BIOS (AMI, Award, Phoenix) has its own specific program (AMI - amitool, etc.), what is your BIOS can see when you boot the computer. - If you do not want to make any changes either in your "iron", or in the Windows itself, and that your activation is not distinguished by anything from legal activation, your choice of KMS server. With the use of virtual machines, this method can also be called Off-line. But you should know that this method of activation for six months and 180 days, you again have to repeat it. Also, this method only and Professional version Enterprise - If you did not accept neither the first nor the second of our suggested methods you can use the activators. Without going into too much detail, we can say that activators emulate the BIOS with slicom 2.1. But no one gives a guarantee that Microsoft will not release a patch or update that will detect the presence of emulation and reset the activation. We recommend to start with Windows 7 Activator Loader eXtreme Edition (Napalum), because He has a huge number of settings and features and good will activate automatically What's new in the assembly: Updated KMS section All new marked as (New) Added build option in the form of installation executable file List of programs: Office 2013-2016 C2R 6.2 (New) Office 2013-2016 C2R License v1.05 (New) Garbage Collector v1.3.4 PIDKey v2.1.2.1017 MSActBackUp v1.2.3 Microsoft Product Keys 2.6.3 Re-Loader Activator 3.0 Beta 3 KMS Tools 01.03.2018 by Ratiborus (New) KMSAuto Lite 1.3.5.2 (New) KMSAuto Net 2016 1.5.3 KMSmicro WO w7 v1.0.1 KMSpico 10.2.0 Final SuperMini_KMS AAct v3.8.5(New) AAct Network 1.0.1 Windows 7 Loader eXtremev3.503 Re-Loader Activator 2.6 Final Microsoft Toolkit 2.6.2 ODIN 1.3.7 by secr9tos GUI MBR SLIC Loader 0.621 v1.2 Windows Loader v2.2 WindSLIC-UEFI-SLIC-injector SLIC 2.1 What's New in Build v19.6: AAct 3.8.5 KMS Tools 01.03.2018 KMSAuto Lite 1.3.5.2 Office 2013-2016 C2R License v1.0.5 Office 2013-2016 C2R Install v6.0.2 All marked with (New) Language: Russian, English OS: Windows (XP), Windows (Vista), Windows (7), Windows (8), Windows (10). Download - 327.61 MB: Site: https://openload.co Sharecode[?]: /f/5J9vMtSwvdE/ALTT1962018-MW.rar Pwd: www.megamw.com
  14. WPD v1.1.582 Hi there! If you are here you have probably heard about rather tricky and complex Windows 10 privacy settings and how much data it can collect without user’s knowledge or consent. So, we have tried to resolve this problem and created WPD – a tweaker that contains all main settings in one place! You can customize Group Policy, Services and Tasks, responsible for data collection and sending, as you like. And furthermore, if you want, you can block a bunch of Microsoft's ip's to which data is sent. Disable Windows features and make various tweaks Wrapped in a clean and attractive interface, this program provides you with intuitive and practical options for tweaking your computer, whether you're running Windows 7 or 10. It doesn't require installation so you can copy the downloaded package to a USB flash drive to directly launch it on any PC without setup. Administrative rights are required, though. The main app menu is brought up to the screen at startup, allowing you to access the privacy-related features, firewall settings, apps to uninstall, or other tweaks to make. Configure privacy, firewall and app settings When it comes to privacy matters, you can deactivate the steps recorder, advertising ID, search companion, telemetry, Windows Error Reporting, handwriting auto learning, OneDrive (for file storage), and others. Some of the options displayed here might seem confusing. However, you don't have to look up definitions on the web since WPD shows descriptions in tooltips next to each option. Otherwise, you can disable everything listed here with the click of a button. As far as firewall settings are concerned, Windows Privacy Dashboard can be instructed to block Windows telemetry, third-party apps and Windows Updates from establishing Internet connections. If you change your mind and wish to reset these options to default, you can simply delete the newly created rules. Uninstall unwanted apps and perform tweaks Only Modern UI apps can be uninstalled with the aid of this utility, whether they came bundled with the operating system or got installed from other sources. Lastly, the tweaker gives you the possibility to hide sync provider notifications, allow the swap file to be cleared during restart, and prevent apps from using your camera, microphone and other devices. Taking everything into consideration, WPD turns out to be a straightforward and useful system tweaker. It enabled and disabled system settings without any issues on Windows 10 in our tests. WPD is free, totally portable, has a nice user-friendly interface, and doesn't contain any advertisement or malicious code. Currently we don't have a code signing certificate, so Widnows SmartScreen might be little nervous, just skip it. Supported OS: Windows 10 Enterprise 1709, 1703, 1607 Windows 10 Enterprise LTSB 2016, 2015 Windows 10 Pro 1709, 1703, 1607 Windows 10 Home 1709, 1703 Windows 8-8.1 Windows 7 Screenshots: Changelog: 1.1.582 - 10/18/2017 Added Fall Creators Update support. Added command line arguments. For more info check Readme file inside the archive. Added warning dialog box when trying to delete all apps. Fixed work on Windows 7 and Windows 8 Home. Updated build-in firewall rules. Firewall notification icon now requires only the first rule to be applied. Added notification label showing the date of the latest available rule (built-in or online). User interface improvements. Bug fixes. 1.1.512 - 08/09/2017 Updated build-in firewall rules. Minor fixes. Preparing for the Fall Creators Update. 1.1.475 - 07/03/2017 Appx package errors no longer terminate WPD. 1.1.474 - 07/02/2017 Added ability to create system restore point. Added new settings to the Tweaker tab. Added Windows 8-8.1 support. Updated build-in firewall rules. Better error handling. Minor fixes. 1.1.451 - 06/10/2017 Updated firewall rules. User interface improvements. 1.1.435 - 05/24/2017 Added new firewall tab. Added feedback button. Updated firewall rules. User interface improvements. 1.0.395 - 04/14/2017 Code has been rewritten and optimized. New UI. Added ability to delete built-in Windows Store apps. Added Switch All button to the privacy tab. Added full support of Windows 10 Home. Added new settings to the tweaker tab. Home: https://getwpd.com/ Download: https://getwpd.com/get/latest.zip Firewall rules: Oct 17, 2017 CRC32: 0FF17F90 gHacks.net Review: Control Windows 10 Privacy with WPD
  15. All Activation Windows 7-8-10 v17.0 - 2017 All methods of activation in the hand tested after the "anti-piracy" KB971033 update DG Win & Soft offers you a complete collection of programs and ways to Activate Windows. All methods and programs personally verified by us many times and we can safely recommend them to you. NOTE: All programs must be Run as Administrator! Additional Information: - If you have a direct hand, you want to activate in the Off-line mode and no longer bother to search for keys every six months, then you are prepared activation via firmware BIOS. But be careful, because if your not the right things, you have a chance to bungle the operation and will have to contact the service center. And keep in mind that for every BIOS (AMI, Award, Phoenix) has its own specific program (AMI - amitool, etc.), what is your BIOS can see when you boot the computer. - If you do not want to make any changes either in your "iron", or in the Windows itself, and that your activation is not distinguished by anything from legal activation, your choice of KMS server. With the use of virtual machines, this method can also be called Off-line. But you should know that this method of activation for six months and 180 days, you again have to repeat it. Also, this method only and Professional version Enterprise - If you did not accept neither the first nor the second of our suggested methods you can use the activators. Without going into too much detail, we can say that activators emulate the BIOS with slicom 2.1. But no one gives a guarantee that Microsoft will not release a patch or update that will detect the presence of emulation and reset the activation. We recommend to start with Windows 7 Activator Loader eXtreme Edition (Napalum), because He has a huge number of settings and features and good will activate automatically What's new in the assembly: Updated KMS section All new marked as (New) Added build option in the form of installation executable file List of programs: PIDKey v2.1.2.1017 MSActBackUp 1.1.0 Microsoft Product Keys 2.6.3 Re-Loader Activator 3.0 Beta 3 KMS Tools 12/10/2017 by Ratiborus (New) KMSAuto Lite 1.3.3 KMSAuto Net 2016 1.5.1 2017 KMSmicro WO w7 v1. 0.1 KMSpico 10.2.0 Final SuperMini_KMS AAct v3.7 (New) Windows 7 Loader eXtremev3.503 Re-Loader Activator 2.6 Final Microsoft Toolkit 2.6.2 ODIN 1.3.7 by secr9tos GUI MBR SLIC Loader 0.621 v1.2 Windows Loader v2.2 WindSLIC-UEFI-SLIC-injector SLIC 2.1 BINS FAQ for creating the firmware SLIC_ToolKit_V3.2 Programs for the firmware Reset of the trial period (rearm) Three-component activation Language: Russian, English OS: Windows (XP), Windows (Vista), Windows (7), Windows (8), Windows (10). Download - 490.6 MB: Site: https://www.multiup.eu/en Sharecode[?]: /download/00334f75cc207f13a42d28f9a05454eb/All.activation.Windows.7-8-10.v17.0-P2P.iso
  16. vissha

    8GadgetPack 24.0 Final

    8GadgetPack makes it possible to use gadgets on Windows 10 / 8.1 / 8. 8GadgetPack - a tool that will help bring back the familiar gadgets on the desktop in Windows 8, which will help you quickly get the right information (clock, calendar, weather, currency exchange rates, system, and so on). Gadgets are installed in the same simple manner as earlier. Included with the program are 45 gadgets (official from Microsoft, as well as the most popular), also included is a gadget 7 Sidebar, which mimics the Sidebar gadgets Windows Vista. The program has a set of standard and some additional gadgets, and also supports the installation of new ones. Feature of the program: handy window c settings "8GadgetPack Tools", which contains the following options: - Disable startup programs; - Reset all the gadgets (back to how things were after the installation); - Visit the website of the program; - Leave a review; - Uninstall applications Version History: 2017/10/07: Version 24.0 released. Some compatibility bugfixes for the upcoming Windows 10 version in October. Also fixed some bugs that might occur if you use Clipboarder and Word/Excel (it's actually not Clipboarders fault, but I guess MS will never fix these bugs. So I added a workaround.). Updated some gadgets. Homepage: https://8gadgetpack.net/ Download: https://8gadgetpack.net/download230/8GadgetPackSetup.msi
  17. If you have Windows 8.1 set to update automatically, you may find you can no longer sign in to your PC with a Microsoft account. Looks like the cause is KB 4038792, the September monthly rollup. OpenClipArt-Vectors (CC0) This month’s Patch Tuesday brought some weird Windows bugs, but this one’s probably the worst. I’m seeing reports all over the web that folks running Windows 8.1 aren’t able to log in to their computers using a Microsoft account. Microsoft’s response at this point is that they’re aware of the problem, but if you want to use your machine, you need to log on with a local account. Woody Leonhard/IDG That isn’t a whole lot of help for people who haven’t set up a local account or need to get to something on the machine that’s only available to the Microsoft account. More than a week ago, in a reply on the Microsoft Answers forum, Microsoft employee Yolvi Ell laid the blame firmly at the foot of this month’s Windows 8.1 update: This is a known bug in Windows 8.1 after the latest September update. Our Support Engineers are already looking into it and doing their best to resolve it as quickly as possible so as to minimize the inconvenience to our customers. That would seem to implicate KB 4038792, the 2017-09 monthly rollup for Windows 8.1 and Server 2012 R2. It isn’t clear at this point if the bug also affects the September security-only update for Windows 8.1, KB 4038793. Ell goes on to say, as of early Monday morning: As of the moment, affected Windows 8.1 users may use a local account instead of a Microsoft account while our engineers are fixing the bug. We have not yet received any news about when the fix will be released. We'll update this thread once it's available. How widespread is the problem? I see Microsoft Answers forum posts going back to Sept. 13, the day after the patch was released, here, here, here, here, here, here, here, here and here. There’s a lengthy TechNet thread here. There are discussions on Bleepingcomputer, MS Power User and Windows Central, as well as an early Japanese-language post on livedoor.jp. Those posts describe various parts of the problem, but the common denominator seems to be an unexpected change at the time of this month’s Windows 8.1 security update. Microsoft is fully aware that their Windows 8.1 customers are getting hung out to dry. Instead of answers, we’re getting pablum. Still using Windows 8.1? We feel your pain. Drop by the AskWoody Lounge. Source: Win 8.1 monthly rollup leaves customers unable to use Microsoft account (Computerworld - Woody Leonhard)
  18. It's like the c:\con\con bug all over again. Those of you with long memories might remember one of the more amusing (or perhaps annoying) bugs of the Windows 95 and 98 era. Certain specially crafted filenames could make the operating system crash. Malicious users could use this to attack other people's machines by using one of the special filenames as an image source; the browser would try to access the bad file, and Windows would promptly fall over. It turns out that Windows 7 and 8.1 (and Windows Vista, but that's out of support anyway) have a similar kind of bug. They can be taken advantage of in the same kind of way: certain bad filenames make the system lock up or occasionally crash with a blue screen of death, and malicious webpages can embed those filenames by using them as image sources. If you visit such a page (in any browser), your PC will hang shortly after and possibly crash outright. The Windows 9x-era bug was due to an error in the way that operating systems handled special filenames. Windows has a number of filenames that are "special" because they don't correspond to any actual file; instead, they represent hardware devices. These special filenames can be accessed from any location in the file system, even though they don't exist on-disk. While any of these special filenames would have worked, the most common one used to crash old Windows machines was con, a special filename that represents the physical console: the keyboard (for input) and the screen (for output). Windows correctly handled simple attempts to access the con device, but a filename included two references to the special device—for example, c:\con\con—then Windows would crash. If that file was referenced from a webpage, for example, by trying to load an image from file:///c:/con/con then the machine would crash whenever the malicious page was accessed. The new bug, which fortunately doesn't appear to afflict Windows 10, uses another special filename. This time around, the special filename of choice is $MFT. $MFT is the name given to one of the special metadata files that are used by Windows' NTFS filesystem. The file exists in the root directory of each NTFS volume, but the NTFS driver handles it in special ways, and it's hidden from view and inaccessible to most software. Attempts to open the file are normally blocked, but in a move reminiscent of the Windows 9x flaw, if the filename is used as if it were a directory name—for example, trying to open the file c:\$MFT\123—then the NTFS driver takes out a lock on the file and never releases it. Every subsequent operation sits around waiting for the lock to be released.Forever. This blocks any and all other attempts to access the file system, and so every program will start to hang, rendering the machine unusable until it is rebooted. As was the case nearly 20 years ago, webpages that use the bad filename in, for example, an image source will provoke the bug and make the machine stop responding. Depending on what the machine is doing concurrently, it will sometimes blue screen. Either way, you're going to need to reboot it to recover. Some browsers will block attempts to access these local resources, but Internet Explorer, for example, will merrily try to access the bad file. We couldn't immediately cause the same thing to occur remotely (for example, by sending IIS a request for a bad filename), but it wouldn't immediately surprise us if certain configurations or trickery were enough to cause the same problem. Microsoft has been informed, but at the time of publication has not told us when or if the problem will be patched. Article source
  19. vissha

    8GadgetPack 23.0 Final

    8GadgetPack makes it possible to use gadgets on Windows 10 / 8.1 / 8. Version History: Version 23.0 released. Made some usability tests and quite some issues came up! Added newsletter option so you can get notified about updates via mail. Fixed rare crash in Clipboarder when opening a link. Added workaround for a bug in MS Word when copying a formula while Clipboarder is running (Word crashes when the user copies a formula and then the textformat of the clipboard is requested. Clipboarder detects this now and skips the text formats). Added also another workaround for a minor bug in Word: When a certain clipboard format is requested Word adds a favorit inside the document. That format is now skipped as well. Fixed a bug with the "Enable unformatted paste" option in Clipboarder when used with the right shift-button. Clipboarder now handles images with transparency copied in browsers correctly. Added Date Time, Digitalclock, Turn off PC, CPU and Network Utilization Gadgets. Removed Google Mail gadget (it no longer works). You can place gadgets on the sidebar whereever you want now without snapping while holding Shift. Added workaround for a bug that caused several gadgets to fail sometimes during startup. Fixed a bug that caused gadgets to go behind the sidebar sometimes. Fixed many minor issues. Homepage: http://8gadgetpack.net/ Download: http://8gadgetpack.net/download230/8GadgetPackSetup.msi
  20. Bypass For Windows Update Lock For Next-Gen Processors Found A first workaround for the blocking of Windows Update on Windows 7 or 8.1 PCs with next-generation processors has been discovered. Microsoft blocked the delivery of Windows Updates recently to Windows 7 and 8.1 devices powered by a next-generation processor. The company announced the support change in January 2017. Broken down to the essentials, it means that Intel Kaby Lake and AMD Bristol Ridge processors are only support by Windows 10, and not older versions of Windows. To hammer that home, Microsoft made the decision to block Windows Update on Windows 7 or 8.1 PCs with those next generation processors. The company introduced patches, KB4012218 and KB4012219 for instance, which introduced process generation and hardware support detection on Windows 7 and 8.1 systems. Windows users who run Windows Update get the unsupported hardware error prompt when they try to scan for and download the latest patches for their -- still supported -- operating system. Bypass for Windows Update lock for next-gen processors GitHub user zeffy made the decision to take a closer look at how the actual blocking is done on the operating system level. What he did was the following: Download the Patch KB4012218 from Microsoft. Extract the content of the MSU file using the expand command line tool. Expand basically extracts all files that are part of an update file so that you can analyze each individually. This resulted in a long list of files. He used PowerShell to filter the files for anything starting with "wu" to filter out Windows Update related files. He then ran diff tools to compare the binaries of the files in the new update file with those on the actual operating system. He discovered the dynamic link library wuaueng.dll, and found the two functions IsCPUSupported(void) and IsDeviceServiceable(void) in it. Now that he found the culprits that blocked the installation of updates on machines with next generation processors, he came up with a solution for that. His preferred solution jumps over the whole "IsDeviceServiceable(void)" body so that Windows Update is notified that the CPU on the machine is supported. The solution requires the patching of the dll file. He has uploaded the patched files for 32-bit and 64-bit versions of Windows 7 and Windows 8.1 to the GitHub project page. The source code has been made available there as well for you to check. The patches come as scripts that you just need to run to make the necessary changes. Windows Update should work just like before then even on Windows 7 or Windows 8.1 systems with next generation processors Attention: it is recommended that you create a backup of the wuaueng.dll file before you patch it. Even better, create a backup of the system partition just to be on the safe side of things. One caveat of the method is that any new version of wuaueng.dll that Microsoft releases requires new patching. Microsoft may device other means to block updates on those systems as well in the future. (via Sergey) Now You: What's your take on Microsoft blocking updates for customer systems? Source
  21. Windows 7 reaching end of support in January 2020 Starting this month, Microsoft is no longer shipping updates for Windows 7 and 8.1 when new processors are detected, as the company is only supporting these chips on Windows 10. Part of Redmond’s strategy to encourage the transition to Windows 10, the blocking of updates on Windows 7 and 8.1 systems powered by processors like AMD’s Ryzen or Intel’s Kaby Lake, leaves users with no other option than to upgrade to the latest operating system. A notification that’s displayed to users when trying to update these systems provides them with instructions on how to perform the switch to Windows 10. “Your PC uses a processor that is designed for the latest version of Windows. Because the processor is not supported together with the Windows version that you are currently using, your system will miss the important security updates,” this notification reads. The benefits of moving to Windows 10 It goes without saying that without patches and security updates, systems remain vulnerable just like they are running an unsupported version of Windows, while at the same time missing all the opportunities of new technologies that are bundled into Windows 10. In terms of gaming, for example, users who are upgrading to Windows 10 can use not only the new DirectX 12, but also the Game mode that’s exclusively available in the Windows 10 Creators Update. This new feature boosts gaming performance by setting the game’s main process to high priority level, while also pushing other less critical processes to standby mode for reduced resource usage. Migrating to Windows 10 is a step that sooner or later everyone needs to make, especially because older operating systems are slowly but surely reaching end of support anyway. Windows 7, for example, is projected to stop receiving updates is January 2020, so users running it have less than 3 years to perform the switch to Windows 10. Source
  22. Windows XP Has More Users than Windows Vista and Windows 8 Combined, Avast Says Avast provides Windows usage data in latest report While it’s important to note that these figures come from computers running Avast, they do align with the statistics provided by research firms whose main activity is monitoring operating system usage, so there’s a good chance these are accurate. First and foremost, there’s leader Windows 7. According to Avast, the operating system launched in 2009 is currently powering more than 56 million computers where its antivirus product is installed, and this means a share of no less than 48.35 percent. Windows 10 is growing, the security firm says, and it managed to reach a share of 30.46 percent, which accounts for a little over 35 million devices running Avast security software. Windows XP still a super-popular choice But what’s a little more worrying for everyone, including here Microsoft, users, and Avast itself, is that Windows XP, which was launched in 2001 and no longer receives security updates since April 2014, is still running on more than 6.5 million computers. This means that it has a share of 5.64 percent, more than Windows 8 (2.51 percent) and Windows Vista (2.08 percent) combined. Windows 8 was launched in 2012 as Microsoft’s new revolution, but its small market share is mostly the result of most people choosing the free upgrade to Windows 8.1. The OS launched one year later has a share of 10.96 percent, which represents 12.7 million PCs running Avast. For what it’s worth, Windows Vista is also reaching end of support next month, so users who are still running this OS, and there are at least 2 million according to Avast, should already start planning the upgrade. Windows 10 is the safest bet right now, as Windows 7 itself is also projected to reach EOL in January 2020. Source
  23. Mark your calendar: Microsoft's promise to cut off Win7 and 8.1 support for the latest PCs will cause howls of pain next month Credit: wezlo Events of the past week have drawn into sharp focus the likely result of next month's patching cycle. If you have a Windows 7 or 8.1 PC that you bought, built, or upgraded in the past year or so, it would behoove you to understand exactly what Microsoft plans. Many people -- I'll raise my hand here -- thought that Skylake-based computers would continue to receive Windows 7 and 8.1 patches until the respective end-of-life. We are wrong. Let's start with the basics. Intel introduced its so-called 6th Generation Skylake processor in August 2015. It slowly replaced the older Broadwell series, all of which will continue to work with Win7 and 8.1. Skylake now is slowly being replaced by 7th Generation Kaby Lake processors, which will not get Win7 or 8.1 support from Microsoft. To date, Intel has released 50 or so different Skylake processors. There are also dozens of Kaby Lake processors, which were introduced in August 2016. On the AMD side there's a distinction made between the older Opteron series, the APU series (which includes Kaveri, Carrizo, and Bristol Ridge processors, named Athlon, Sempron, A4, A6, and E4) and the brand-new Ryzen processors, which are only now appearing on store shelves. Most observers say that 7th Generation AMD chips start with the Bristol Ridge APUs, which appeared in May, 2016. There's no change at all between the core architecture of the Carrizo and Bristol Ridge chips. As I'll explain later, the distinction between 6th Generation Carrizo and 7th Generation Bristol Ridge is pivotal. To see if you have a Bristol Ridge chip, as opposed to a Carrizo chip, use Speccy to find your APU model number, then look up your APU model number for Bristol Ridge desktop processors or portable processors. Where the troubles began The whole Windows 7/8.1 support mess started in January of last year, when Windows honcho Terry Myerson declared that "as new silicon generations are introduced, they will require the latest Windows platform at that time for support." At first, Myerson promised: Through July 17, 2017, Skylake devices on the supported list will also be supported with Windows 7 and 8.1. During the 18-month support period, these systems should be upgraded to Windows 10 to continue receiving support after the period ends. After July 2017, the most critical Windows 7 and Windows 8.1 security updates will be addressed for these configurations, and will be released if the update does not risk the reliability or compatibility of the Windows 7/8.1 platform on other devices. Screams from enterprise customers reached all the way to the hallowed halls of Redmond. The promised demise of Win7 on Skylake machines changed later in January, then in March 2016, and in August 2016 they changed again. As of August, Microsoft exec Shad Larsen promised: This policy change primarily applies to our commercial customers who are currently managing deployments with Windows 7 and Windows 8.1, and does not apply to customers running Windows 10 ... future silicon platforms, including Intel's upcoming 7th Gen Intel Core (Kaby Lake) processor family and AMD's 7th generation processors (e.g. Bristol Ridge) will only be supported on Windows 10, and all future silicon releases will require the latest release of Windows 10.... 6th Gen Intel Core devices on Windows 7 and Windows 8.1 will be supported with all applicable security updates until the end of support for Windows 7 and Windows 8.1.... This change is made possible through the strong partnership with our OEM partners and Intel who will be performing security update validation testing and upgrade testing for 6th Gen Intel Core systems running Windows 7 and Windows 8.1 through the end of support dates. On the same day, Microsoft updated a list of Skylake systems supported on Windows 7 and Windows 8.1 that includes links to manufacturer's websites, listing specific model numbers that the manufacturer commits to support with Windows 7 and 8.1 updates. The 12 deputized manufacturers and the links provided by Microsoft are: Acer ASUS Dell Epson (in Japanese) Fujitsu HP Lenovo LG (a Korean-language site that doesn't contain any model numbers) MouseComputer (in Japanese) NEC (in Japanese) Panasonic Positivo (in Brazilian Portuguese) Samsung Toshiba Wortmann (in German) VAIO (in Japanese) Sites like Dell's are just as confused as I was. Dell says, "Microsoft originally indicated Skylake support would end in 2017. Microsoft has now extended Skylake support for Windows 7 through January 14, 2020 and for Windows 8.1 through January 10, 2023." That isn't quite true. Microsoft has said that Dell will extend support for its listed Skylake systems through end-of-life for Win7 and 8.1. Here are the conclusions that I draw from Microsoft's statements: If you have a custom built machine with a Skylake processor, you're out of luck. Since the machine doesn't appear on this list of anointed PCs, Microsoft won't support Win7 or 8.1 on your machine. If you upgraded a machine to a Skylake processor, you're out of luck. If you bought a machine from a different manufacturer, or your specific machine doesn't appear on the manufacturer's indicated website, you're out of luck. Most people -- most manufacturers -- don't understand this. I didn't. I don't know what Microsoft intends to do with AMD chips. The way the announcements stand, AMD Bristol Ridge PCs won't have Win7 or 8.1 support, and there's no magic list of manufacturers or machines that are exempt from the ruling. Where does that leave you? So if you're running a recent-vintage PC and using Windows 7 or 8.1, what happens if you run afoul of the patch police? It's all well and good if Win7 is "no longer supported" on your PC, but what does that mean in real terms? Will your PC halt and catch fire? Thanks to several reports that I talked about yesterday, including the tales of woe from folks who installed a Monthly Rollup Preview, I'm willing to bet that the blockade will unfold like this: Step 1: April 10 rolls around, and about noon, Microsoft pushes its usual Patch Tuesday updates out the automatic update chute. Step 2: Those gullible (or trusting) enough to have Win7 or 8.1 Automatic Update turned on will get the April Monthly Rollup (that is, the "April 2017 Security Monthly Quality Rollup"), which will install the next time the machine's rebooted. Step 3: The Monthly Rollup installs itself and makes changes to Windows Update Agent, effectively preventing Windows Update from running again on this machine. The installer displays this message: IDG The machine won't be destroyed, if this scenario plays out the way I think it will. Your PC will just have Windows Update disabled. (Which some people view as a feature, not a problem, but I digress.) We're still poking and prodding on the AskWoody Lounge to see what, exactly, gets disabled. None of this is documented anywhere, of course. It's important to note that machines connected to a corporate Update Server (WSUS, SCCM, or the like) will only get the Monthly Rollup if it's pushed out by the admin. Even if Windows Update gets clobbered, it's unlikely that domain-managed PCs will suffer any ill effect, as they don't use Windows Update the same way most of us do. I have no idea how Microsoft intends to block Win7 updates on recent PCs attached to an update-managed domain. This scenario brings up an obvious question: Will your machine get update-kneecapped? I don't know. There's no program I know of that you can run (short of a Monthly Rollup Preview, which I never recommend) that will definitively say, "If you install the Monthly Rollup in April, Windows Update will get disabled." At this point, there's no warning either. No "Click here to install the Monthly Rollup and disable Windows Update going forward" safety net. All you get is a loud thud and that Unsupported hardware notice. Will Microsoft go ahead with this latest push to get well-heeled customers, with the latest hardware, to change to Windows 10? Microsoft's under no obligation to support Windows 7 and 8.1 on any hardware that appears at a future date. I think. But this approach, if it unfolds in this manner, is sure to rankle more-advanced users who have paid for both Windows 7 and for a shiny new CPU. We should know a lot more on April 10. Discussion continues on the AskWoody Lounge. Source: Microsoft will kill some Windows 7 and 8.1 support in April (InfoWorld - Woody Leonhard)
  24. Windows 8.1 with Bing - AKA CoreConnected x86/x64 ( Murphy78 ) Description from Murphy Installation Keys [ If needed ] --> http://pastebin.com/U2T8XFj8 Hash File info: X19-57134_SW_DVD9_NTRL_Win_with_Bing_8.1_32BIT_English_OEM.imgSize: 2.77 GBSHA1: 63422A198729941F47E7F3563197B1F3AC8C5640 File info: X19-57272_SW_DVD9_NTRL_Win_with_Bing_8.1_64BIT_English_OEM.imgSize: 3.71 GBSHA1: BDC1E5FDBC1FAD5FE26155BAB6DAB7D95F434DEA Language - en-US (United States locale) x86 http://usersfiles.com/yd0pt26mulh4magnet:?xt=urn:btih:cc9748e655915fbe107ca6196cebda51d544a108&dn=Windows+8.1+with+Bing+-+AKA+CoreConnected+x86&tr=udp%3A//tracker.openbittorrent.com%3A80&tr=udp%3A//tracker.publicbt.com%3A80&tr=udp%3A//tracker.istole.it%3A6969&tr=udp%3A//open.demonii.com%3A1337x64 http://usersfiles.com/o9x7w6g0x33y magnet:?xt=urn:btih:af8ffdaae70636719b0d70f1d30f1ba5359710b8&dn=Windows+8.1+with+Bing+-+AKA+CoreConnected+x64&tr=udp%3A//tracker.openbittorrent.com%3A80&tr=udp%3A//tracker.publicbt.com%3A80&tr=udp%3A//tracker.istole.it%3A6969&tr=udp%3A//open.demonii.com%3A1337i will test this if i had time :P Source
  25. As threatened, Microsoft is actively blocking Windows 7 and 8.1 updates on newer hardware, but users report some success in getting around the ban Credit: cnythxi / iStock Microsoft is carrying through on its threat to actively block Windows 7 and 8.1 updates on the latest Kaby Lake and Ryzen processors. Some folks are looking for ways to get around the block, and they appear to have had some success. We knew this day was coming. A year-old threat from Microsoft that “Windows 10 will be the only supported Windows platform” on Kaby Lake and Ryzen processors re-emerged last week. A thread on Reddit reported that folks who had the nerve to use Windows 7 or 8.1 would be blocked from updates if their PCs had the latest Intel Kaby Lake or AMD Ryzen processors. The blogosphere understandably went wild, even though nobody at that point had actually seen the block in action. That has now changed. Yesterday poster dave1977nj on AskWoody submitted screenshots of his attempts to install the "March 2017 Preview of Monthly Quality Rollup for Windows 7 for x64-based Systems" (KB4012218) on his Kaby Lake PC. InfoWorld InfoWorld Of course I’ve long railed against installing Previews, and you’d be well-advised to avoid them, but the deeper question is what actually happened? The Win7 update history page says this Preview: Enabled detection of processor generation and hardware support when PC tries to scan or download updates through Windows Update. This is all well and good, but how does the detection work? Has Microsoft effectively blocked all security updates on Kaby Lake and Ryzen processors, or is it making life difficult for those users of the new hardware who want to stick with Windows 7 or 8.1? Poster abbodi86 sheds some light: The Preview Rollup itself block future usage of Windows Update on these processors, not that WU blocked Preview Rollup ?. All future rollups will have this restriction, so i guess it’s a lost cause. Manual installation (through dism, not msu) seems to be working fine In other words, by installing this Preview Rollup (and presumably all future Monthly Rollups), Windows Update itself has been changed, so it won’t work on Kaby Lake and Ryzen systems. Once the Preview Rollup is installed, Windows Update turns belly up, with a “could not search for new updates” message. Abbodi86 also says that in the future, Kaby Lake and Ryzen customers won’t be able to install the regular monthly security-only patches by manually downloading the month’s MSU file from the Microsoft Catalog and running the MSU file (an approach I call “Group B”). It isn’t clear to me what will happen when you try to run an MSU file directly, after installing KB 4102218 (or 4102219, the analogous Preview for Win 8.1). We probably won’t know for sure until the security-only patch for April appears. Using the DISM command to install security patches would be a bit convoluted, but possible, if worse comes to worst. It also isn’t clear to me if the Windows Update MiniTool (see Martin Brinkmann on ghacks) will continue to work, or if it can be modified to work. Poster ch100 says: This is an excellent question and the implications are very subtle. WUMT uses the Windows Update agent already installed, but can use any agent, without forcing an upgrade, as WU would do for example with 7.6.7600.256 being upgraded to 7.6.7600.320. I do not endorse this approach of not allowing the normal WU mechanism to complete, but it is a very interesting path to investigate. ? If you’re thinking about using WUMT, please note this caution. Finally, it also isn’t clear to me if uninstalling KB 4012218 (or KB 4012219) will restore Windows Update to its original functionality. For years I’ve resisted disabling Windows Update and the wuauserv service. Windows Update and Microsoft Update pick up patches that manual scans frequently overlook, including IE and .Net patches, and many more subtle fixes. Updating Office without Microsoft Update would take the patience of Job. Some folks disable Windows Update to shut off the flow of unpredictable patches. But if Microsoft itself is going to disable Windows Update, who am I to argue? Look for the latest test results and head-scratchings on the AskWoody Lounge. Source: Search begins for workarounds to Microsoft's Win7/8.1 on Kaby Lake/Ryzen patch ban (InfoWorld - Woody Leonhard)
×
×
  • Create New...