Yventaliy
				Members
			
		- 
				Joined
- 
					Last visited
Reputation Activity
- 		
			
				 Yventaliy reacted to jaynbe in [SVCpack]AddOn CDburnerXP 4.5.1.3870 Intl.CdburnerXP as a SVCpack_Addon Yventaliy reacted to jaynbe in [SVCpack]AddOn CDburnerXP 4.5.1.3870 Intl.CdburnerXP as a SVCpack_Addon
 CDBurnerXP is a free application to burn CDs and DVDs, including Blu-Ray and HD-DVDs.
 It also includes the feature to burn and create ISOs, as well as a multilanguage interface.
 Everyone, even companies, can use it for free.
 It does not include adware or similar malicious components.
 Website: http://cdburnerxp.se/
 Key Features
 • burn all kinds of discs
 • audio-CDs with or without gaps between tracks
 • burn and create ISO files
 • data verification after burning process
 • create bootable discs
 • multi-language interface
 • bin/nrg → ISO converter, simple cover printing and much more!
 • Operating Systems: Windows 2000/XP/2003 Server/Vista/Windows 7
 Installer without PromoWare (no OpenCandy and/or toolbar)
 Multimode installer for easy addon modification.
 Available switches and modes (edit entries.ini):
 " -gm2 -ai" = SVCPACK silent default install
 " -gm2 -ai1" = SVCPACK passive
 " -gm2 -ai2" = RunOnceEx passive
 " -gm2 -ai3" = RunOnceEx silent
 Requires dotNET3.5 or higher
 CDburnerXP_4.5.3.4748_AddOn.cab
 MD5: BCFBF4481C00F3946A4E77E8C3283836Size: 4,63 MB
 Url.: http://ge.tt/api/1/files/5CqdHJd1/0/blob?download
- 		
			
				 Microsoft .NET Framework AIO ROE x86 - 20131008 Microsoft .NET Framework AIO ROE x86 - 20131008
 includes:
 dotNet Framework 2.0 SP2
 KB958481 - Application Compatibility Update
 KB976569 - Update for the .NET Framework 2.0 SP2 forward compatibility
 KB976576 - Rollup Update
 KB976765 - ASP.NET update
 KB980773 - NCL update
 KB2604092 - Vulnerabilities in .NET Framework Could Allow Remote Code Execution
 KB2729450 - Vulnerabilities in .NET Framework Could Allow Remote Code Execution
 KB2742596 - Vulnerabilities in .NET Framework Could Allow Elevation of Privilege
 KB2789643 - Vulnerabilities in .NET Framework Could Allow Elevation of Privilege
 KB2833940 - Vulnerabilities in .NET Framework and Silverlight Could Allow Remote Code Execution
 KB2836941v2 - Compatibility and Reliability Update
 KB2844285v2 - Vulnerabilities in .NET Framework and Silverlight Could Allow Remote Code Execution
 KB2863239 - Vulnerabilities in .NET Framework Could Allow Spoofing
 dotNet Framework 3.0 SP2
 KB958483 - Application Compatibility Update
 KB976570 - Forward Comptibility Update
 KB976769 - WCF update
 KB977354 - This update will disable the Web Browser ActiveX control (WebOC) when running WPF XAML Browser Applications (XBAPs) in the Firefox browser in partial trust
 KB2756918 - Vulnerabilities in .NET Framework Could Allow Elevation of Privilege
 KB2832411 - Vulnerabilities in .NET Framework and Silverlight Could Allow Remote Code Execution
 KB2861189 - Vulnerabilities in .NET Framework Could Allow Remote Code Execution
 dotNet Framework 3.5 SP1
 KB953595 - The Visual Basic compiler (Vbc.exe) may use 100 percent of the CPU resources when you build a .NET Framework 3.5-based application that has many assemblies and references
 KB958484 - Application Compatibility Update
 KB960043 - Dual Branch Servicing
 KB963707 - Framework Assistant 1.0 for Firefox
 KB982306 - ADO.NET Data Services Update
 KB2604111 - Vulnerabilities in .NET Framework Could Allow Remote Code Execution
 KB2736416 - Vulnerability in Open Data Protocol Could Allow Denial of Service
 KB2836940 - Compatibility and Reliability Update
 KB2840629 - Vulnerabilities in .NET Framework and Silverlight Could Allow Remote Code Execution
 KB2861697 - Vulnerabilities in .NET Framework Could Allow Remote Code Execution
 Other Updates
 KB951847 = Microsoft .NET Framework 3.5 Family Service Pack 1
 KB959209 = KB958481 + KB958483 + KB958484
 KB971276 - You receive incorrect print output if the IPrintPipelineProgressReport interface is used in your printing application
 dotNet Framework 4.0 Client Profile
 KB2468871 - Update for the .NET Framework 4
 KB2533523 - Microsoft .NET Framework 4 Reliability Update 1
 KB2600217 - Microsoft .NET Framework 4 Reliability Update 2
 KB2604121 - Vulnerabilities in .NET Framework Could Allow Remote Code Execution
 KB2656351 - Vulnerabilities in .NET Framework Could Allow Elevation of Privilege
 KB2729449 - Vulnerabilities in .NET Framework Could Allow Remote Code Execution
 KB2736428 - Vulnerability in Open Data Protocol Could Allow Denial of Service
 KB2737019 - Vulnerabilities in .NET Framework Could Allow Elevation of Privilege
 KB2742595 - Vulnerabilities in .NET Framework Could Allow Elevation of Privilege
 KB2789642 - Vulnerabilities in .NET Framework Could Allow Elevation of Privilege
 KB2804576 - Vulnerabilities in .NET Framework Could Allow Spoofing
 KB2832407 - Vulnerabilities in .NET Framework and Silverlight Could Allow Remote Code Execution
 KB2835393 - Vulnerabilities in .NET Framework and Silverlight Could Allow Remote Code Execution
 KB2836939v3 - Compatibility and Reliability Update
 KB2840628v2 - Vulnerabilities in .NET Framework and Silverlight Could Allow Remote Code Execution
 KB2858302v2 - Vulnerabilities in .NET Framework Could Allow Remote Code Execution
 KB2861188 - Vulnerabilities in .NET Framework Could Allow Remote Code Execution
 note: if you get nagged by MU/WU for KB961118 and/or KB971314 use my Post-SP3 update pack
 or one that does include them. XPSP3_QFE_UpdatePack for Windows XP Post-SP3 (user_hidden)
 WIC and MSXML6 have been removed from the installer but is of no issue as they are included in Windows XP SP3.
 ===================================
 Addon for RVMi 1.6 or higher.
 Integrate this addon to run the installer at RunOnceEX.
 There will be progress boxes but NO user interaction is required.
 Passive mode is used since setup takes a while, this way you will know
 where you are in the setup process. Final installation will take
 place after OOBE and before Personalized settings occur.
 Link: Addon_Microsoft.Net_AIO_ROE_20131008.7z
 CRC-32: 7a0df040
 MD4: c54fd5f6d5de102eaa95b9ca68017687
 MD5: 845bbb1c60de66df547a715af2e8a9cd
 SHA-1: 4af2cae8a7f2411a222e005d715dcc3ad51d94f9
 Date: 20131008
 OS: Windows XP SP3 (x86)
 Size: 53.9 MB
 If you unpack the Addon to get access to the multimode installer you'll have access to the following switches:
 -ai = Silent
 -ai1 = Passive
 /h = displays help
 ===================================
 Some utilities:
 Aaron Stebner's .NET Framework Cleanup Utility
 Aaron Stebner's .NET Framework Setup Verification Tool
 dotNetFWVersionChecker.exe - .NET Framework Setup Verification Tool
 Free DotNet VersionCheck Utility
 ===================================
 
- 		
			
				 Updated .NET_addons, while waiting for YumeYao's: Updated .NET_addons, while waiting for YumeYao's:
 Microsoft.Net_1.1SP1+3.5SP1_EN_Addon_20120614.cab
 MD5: 9DD5AFA7B5FA66C937BC4D80378D2C90
 Size: 38,18 MB
 Url.:
 Microsoft.Net_Framework.AIO_EN_Addon_20120614.cab
 MD5: 2E07525E3F8FEE0227B9FC9B91F0718B
 Size: 57,24 MB
 Url.:
 Without .Net1.1SP1 change " -ai" switch to " -ai1".
 Integrate VC++_Runtimes prior to .NET Frameworks
 http://www.wincert.n...ntimes-2012-03/
 EDIT: Urls removed
 http://www.ryanvm.net/forum/viewtopic.php?t=9901
 
- 		
			
				 Hi! Hi!
 I've discovered an issue with AIO pack and Microsoft Update!
 When you install any .NET update from Microsoft Update, it erases ALL the registry keys which created with MUREGFIX.reg!
 Since you - user_hidden - are updating .NET AIO pack instantly, this problem only counts when the users want to update only, without downloading .NET AIO.
 When users updating, those registry keys are being deleted, and on next Microsoft Update it will offer old updates!
 This problem exists also with Automatic Updates!
 You can easily check this by installing aio version 2012-may on a clean windows, and then let MU update.NETs, and next time MU offers .NET SP1!!
 I have found a solution for this problem also!
 We just need to set READ-ONLY ALL the registry entries in MUREGFIX.reg!
 Actually, user_hidden, may i suggest you to put the following into Install.vbs? (in aio installer)
 ws.Run("regini.exe MUREGFIX.txt"),0,True
 And of course we need a MUREGFIX.txt with contents:
 \Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\DC3BF90CC0D3D2F398A9A6D1762F70F3\Patches\C3CFBEEB1B8483A43A5C18AB91FDF504 [8]
 \Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\DC3BF90CC0D3D2F398A9A6D1762F70F3\Patches\41A670B5874F6653EBA789C5C326F94A [8]
 \Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\DC3BF90CC0D3D2F398A9A6D1762F70F3\Patches\295DC294DD789E13083868560A521636 [8]
 \Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\DC3BF90CC0D3D2F398A9A6D1762F70F3\Patches\C9FD711D6B973473EB36750D060F6CEB [8]
 \Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\DC3BF90CC0D3D2F398A9A6D1762F70F3\Patches\B4DC2171CF6DE183589FF2E42C91F993 [8]
 \Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\DC3BF90CC0D3D2F398A9A6D1762F70F3\Patches\842EF927D05A30F3A80C5CD8B48E1278 [8]
 \Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\DC3BF90CC0D3D2F398A9A6D1762F70F3\Patches\4F0D74A71940DEB379AB7649296369EA [8]
 \Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\0DC1503A46F231838AD88BCDDC8E8F7C\Patches\E54DA494170E9184E8511E40F1FB0F37 [8]
 \Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\0DC1503A46F231838AD88BCDDC8E8F7C\Patches\E6477194989C96F318EC3F37C0DCFA7A [8]
 \Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\0DC1503A46F231838AD88BCDDC8E8F7C\Patches\24DF66A32D05A9E3185BCE3E5E3C90A7 [8]
 \Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\0DC1503A46F231838AD88BCDDC8E8F7C\Patches\17BB7F68F8EF60333A529FE30E46718B [8]
 \Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\0DC1503A46F231838AD88BCDDC8E8F7C\Patches\99700303DBD40833B8036913F16A0EFA [8]
 \Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\0DC1503A46F231838AD88BCDDC8E8F7C\Patches\497891D0FB691B933A783D2B3D7B3B31 [8]
 \Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\26DDC2EC4210AC63483DF9D4FCC5B59D\Patches\2F2AEE7ADCFB45A45A57B7187A686E85 [8]
 \Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\26DDC2EC4210AC63483DF9D4FCC5B59D\Patches\20F5EDFF4E4821134944A4D59567245A [8]
 \Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\26DDC2EC4210AC63483DF9D4FCC5B59D\Patches\B2AE9C82DC7B3641BFC887275C4F3607 [8]
 \Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\26DDC2EC4210AC63483DF9D4FCC5B59D\Patches\CD065AE440321023B9A06BBD39B64D53 [8]
 \Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\26DDC2EC4210AC63483DF9D4FCC5B59D\Patches\13CA5F6F338977E3CAE8E819C0BA93EA [8]
 \Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\26DDC2EC4210AC63483DF9D4FCC5B59D\Patches\410EFE49775EB0132B5D96372AD1A809 [8]
 \Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\5C1093C35543A0E32A41B090A305076A\Patches\244F2594A1C5BE83C8321BE8EF772EC0 [8]
 \Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\5C1093C35543A0E32A41B090A305076A\Patches\4A3FC9E53BDA08038AFB79A682437085 [8]
 \Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\5C1093C35543A0E32A41B090A305076A\Patches\52A5BB683CC8EC333A39FC820961282B [8]
 \Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\5C1093C35543A0E32A41B090A305076A\Patches\7D9BBE18C3713E234B7741C9D80E574E [8]
 \Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\5C1093C35543A0E32A41B090A305076A\Patches\8AE88CE9EBA4C39378DB09AEBBC1C4B9 [8]
 \Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\5C1093C35543A0E32A41B090A305076A\Patches\A40CEE61429B0E7379FC24D2ECCFB136 [8]
 \Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\5C1093C35543A0E32A41B090A305076A\Patches\AA879D4C8662404369ED692EFA6CF27D [8]
 \Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\5C1093C35543A0E32A41B090A305076A\Patches\B99F5A76ABE52183D8E2CB524109DDF3 [8]
 \Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\5C1093C35543A0E32A41B090A305076A\Patches\CA1699D599C72A63E90F4376A8DE3548 [8]
 \Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\FCDAC0A0AD874C333A05DC1548B97920\Patches\4A3FC9E53BDA08038AFB79A682437085 [8]
 \Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\FCDAC0A0AD874C333A05DC1548B97920\Patches\E2653A24E4B84A938BD2CC218F82983E [8]
 \Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\FCDAC0A0AD874C333A05DC1548B97920\Patches\7D9BBE18C3713E234B7741C9D80E574E [8]
 \Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\FCDAC0A0AD874C333A05DC1548B97920\Patches\CA1699D599C72A63E90F4376A8DE3548 [8]
 \Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\FCDAC0A0AD874C333A05DC1548B97920\Patches\244F2594A1C5BE83C8321BE8EF772EC0 [8]
 (These are the entries in the current MUREGFIX.reg, which are needed to be set read-only)
 "[8]" means read-only for "everyone group".
 I don't know if we need read-only for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\clr_optimization_v4.0.30319_32 also (this is actually updated by MU: "Start"=dword:00000003 to -> dword:00000002) and for KB932471.reg also...
 Thank you for the great job anyways!
 Regards,
 Fenyo
 
 
			
		
		_14e30a.png) 
    _8126ce.png)