Jump to content

Yventaliy

Members
  • Posts

    3
  • Joined

  • Last visited

Reputation Activity

  1. Like
    Yventaliy reacted to jaynbe in [SVCpack]AddOn CDburnerXP 4.5.1.3870 Intl.   
    CdburnerXP as a SVCpack_Addon

    CDBurnerXP is a free application to burn CDs and DVDs, including Blu-Ray and HD-DVDs.
    It also includes the feature to burn and create ISOs, as well as a multilanguage interface.
    Everyone, even companies, can use it for free.
    It does not include adware or similar malicious components.

    Website: http://cdburnerxp.se/

    Key Features
    • burn all kinds of discs
    • audio-CDs with or without gaps between tracks
    • burn and create ISO files
    • data verification after burning process
    • create bootable discs
    • multi-language interface
    • bin/nrg → ISO converter, simple cover printing and much more!
    • Operating Systems: Windows 2000/XP/2003 Server/Vista/Windows 7


    Installer without PromoWare (no OpenCandy and/or toolbar)

    Multimode installer for easy addon modification.
    Available switches and modes (edit entries.ini):
    " -gm2 -ai" = SVCPACK silent default install
    " -gm2 -ai1" = SVCPACK passive
    " -gm2 -ai2" = RunOnceEx passive
    " -gm2 -ai3" = RunOnceEx silent

    Requires dotNET3.5 or higher


              CDburnerXP_4.5.3.4748_AddOn.cab
     MD5: BCFBF4481C00F3946A4E77E8C3283836Size: 4,63 MB
    Url.: http://ge.tt/api/1/files/5CqdHJd1/0/blob?download
  2. Like
    Yventaliy reacted to user_hidden in [Addon] Microsoft .NET Framework AIO ROE x86 - 20131008   
    Microsoft .NET Framework AIO ROE x86 - 20131008
    includes:
    dotNet Framework 2.0 SP2
    KB958481 - Application Compatibility Update
    KB976569 - Update for the .NET Framework 2.0 SP2 forward compatibility
    KB976576 - Rollup Update
    KB976765 - ASP.NET update
    KB980773 - NCL update
    KB2604092 - Vulnerabilities in .NET Framework Could Allow Remote Code Execution
    KB2729450 - Vulnerabilities in .NET Framework Could Allow Remote Code Execution
    KB2742596 - Vulnerabilities in .NET Framework Could Allow Elevation of Privilege
    KB2789643 - Vulnerabilities in .NET Framework Could Allow Elevation of Privilege
    KB2833940 - Vulnerabilities in .NET Framework and Silverlight Could Allow Remote Code Execution
    KB2836941v2 - Compatibility and Reliability Update
    KB2844285v2 - Vulnerabilities in .NET Framework and Silverlight Could Allow Remote Code Execution
    KB2863239 - Vulnerabilities in .NET Framework Could Allow Spoofing
    dotNet Framework 3.0 SP2
    KB958483 - Application Compatibility Update
    KB976570 - Forward Comptibility Update
    KB976769 - WCF update
    KB977354 - This update will disable the Web Browser ActiveX control (WebOC) when running WPF XAML Browser Applications (XBAPs) in the Firefox browser in partial trust
    KB2756918 - Vulnerabilities in .NET Framework Could Allow Elevation of Privilege
    KB2832411 - Vulnerabilities in .NET Framework and Silverlight Could Allow Remote Code Execution
    KB2861189 - Vulnerabilities in .NET Framework Could Allow Remote Code Execution
    dotNet Framework 3.5 SP1
    KB953595 - The Visual Basic compiler (Vbc.exe) may use 100 percent of the CPU resources when you build a .NET Framework 3.5-based application that has many assemblies and references
    KB958484 - Application Compatibility Update
    KB960043 - Dual Branch Servicing
    KB963707 - Framework Assistant 1.0 for Firefox
    KB982306 - ADO.NET Data Services Update
    KB2604111 - Vulnerabilities in .NET Framework Could Allow Remote Code Execution
    KB2736416 - Vulnerability in Open Data Protocol Could Allow Denial of Service
    KB2836940 - Compatibility and Reliability Update
    KB2840629 - Vulnerabilities in .NET Framework and Silverlight Could Allow Remote Code Execution
    KB2861697 - Vulnerabilities in .NET Framework Could Allow Remote Code Execution
    Other Updates
    KB951847 = Microsoft .NET Framework 3.5 Family Service Pack 1
    KB959209 = KB958481 + KB958483 + KB958484
    KB971276 - You receive incorrect print output if the IPrintPipelineProgressReport interface is used in your printing application
    dotNet Framework 4.0 Client Profile
    KB2468871 - Update for the .NET Framework 4
    KB2533523 - Microsoft .NET Framework 4 Reliability Update 1
    KB2600217 - Microsoft .NET Framework 4 Reliability Update 2
    KB2604121 - Vulnerabilities in .NET Framework Could Allow Remote Code Execution
    KB2656351 - Vulnerabilities in .NET Framework Could Allow Elevation of Privilege
    KB2729449 - Vulnerabilities in .NET Framework Could Allow Remote Code Execution
    KB2736428 - Vulnerability in Open Data Protocol Could Allow Denial of Service
    KB2737019 - Vulnerabilities in .NET Framework Could Allow Elevation of Privilege
    KB2742595 - Vulnerabilities in .NET Framework Could Allow Elevation of Privilege
    KB2789642 - Vulnerabilities in .NET Framework Could Allow Elevation of Privilege
    KB2804576 - Vulnerabilities in .NET Framework Could Allow Spoofing
    KB2832407 - Vulnerabilities in .NET Framework and Silverlight Could Allow Remote Code Execution
    KB2835393 - Vulnerabilities in .NET Framework and Silverlight Could Allow Remote Code Execution
    KB2836939v3 - Compatibility and Reliability Update
    KB2840628v2 - Vulnerabilities in .NET Framework and Silverlight Could Allow Remote Code Execution
    KB2858302v2 - Vulnerabilities in .NET Framework Could Allow Remote Code Execution
    KB2861188 - Vulnerabilities in .NET Framework Could Allow Remote Code Execution
    note: if you get nagged by MU/WU for KB961118 and/or KB971314 use my Post-SP3 update pack
    or one that does include them. XPSP3_QFE_UpdatePack for Windows XP Post-SP3 (user_hidden)
    WIC and MSXML6 have been removed from the installer but is of no issue as they are included in Windows XP SP3.
    ===================================
    Addon for RVMi 1.6 or higher.
    Integrate this addon to run the installer at RunOnceEX.
    There will be progress boxes but NO user interaction is required.
    Passive mode is used since setup takes a while, this way you will know
    where you are in the setup process. Final installation will take
    place after OOBE and before Personalized settings occur.
    Link: Addon_Microsoft.Net_AIO_ROE_20131008.7z
    CRC-32: 7a0df040
    MD4: c54fd5f6d5de102eaa95b9ca68017687
    MD5: 845bbb1c60de66df547a715af2e8a9cd
    SHA-1: 4af2cae8a7f2411a222e005d715dcc3ad51d94f9
    Date: 20131008
    OS: Windows XP SP3 (x86)
    Size: 53.9 MB
    If you unpack the Addon to get access to the multimode installer you'll have access to the following switches:
    -ai = Silent
    -ai1 = Passive
    /h = displays help
    ===================================
    Some utilities:
    Aaron Stebner's .NET Framework Cleanup Utility
    Aaron Stebner's .NET Framework Setup Verification Tool
    dotNetFWVersionChecker.exe - .NET Framework Setup Verification Tool
    Free DotNet VersionCheck Utility
    ===================================
  3. Like
    Yventaliy reacted to jaynbe in [Release] .NET Framework Collection 20111019(1.1/2.0/3.5/4.0)   
    Updated .NET_addons, while waiting for YumeYao's:
    Microsoft.Net_1.1SP1+3.5SP1_EN_Addon_20120614.cab
    MD5: 9DD5AFA7B5FA66C937BC4D80378D2C90
    Size: 38,18 MB
    Url.:
    Microsoft.Net_Framework.AIO_EN_Addon_20120614.cab
    MD5: 2E07525E3F8FEE0227B9FC9B91F0718B
    Size: 57,24 MB
    Url.:
    Without .Net1.1SP1 change " -ai" switch to " -ai1".
    Integrate VC++_Runtimes prior to .NET Frameworks
    http://www.wincert.n...ntimes-2012-03/
    EDIT: Urls removed
    http://www.ryanvm.net/forum/viewtopic.php?t=9901
  4. Like
    Yventaliy reacted to fenyo1 in [Addon] Microsoft .NET Framework AIO ROE x86 - 20131008   
    Hi!
    I've discovered an issue with AIO pack and Microsoft Update!
    When you install any .NET update from Microsoft Update, it erases ALL the registry keys which created with MUREGFIX.reg!
    Since you - user_hidden - are updating .NET AIO pack instantly, this problem only counts when the users want to update only, without downloading .NET AIO.
    When users updating, those registry keys are being deleted, and on next Microsoft Update it will offer old updates!
    This problem exists also with Automatic Updates!
    You can easily check this by installing aio version 2012-may on a clean windows, and then let MU update.NETs, and next time MU offers .NET SP1!!
    I have found a solution for this problem also!
    We just need to set READ-ONLY ALL the registry entries in MUREGFIX.reg!
    Actually, user_hidden, may i suggest you to put the following into Install.vbs? (in aio installer)
    ws.Run("regini.exe MUREGFIX.txt"),0,True
    And of course we need a MUREGFIX.txt with contents:


    \Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\DC3BF90CC0D3D2F398A9A6D1762F70F3\Patches\C3CFBEEB1B8483A43A5C18AB91FDF504 [8]
    \Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\DC3BF90CC0D3D2F398A9A6D1762F70F3\Patches\41A670B5874F6653EBA789C5C326F94A [8]
    \Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\DC3BF90CC0D3D2F398A9A6D1762F70F3\Patches\295DC294DD789E13083868560A521636 [8]
    \Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\DC3BF90CC0D3D2F398A9A6D1762F70F3\Patches\C9FD711D6B973473EB36750D060F6CEB [8]
    \Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\DC3BF90CC0D3D2F398A9A6D1762F70F3\Patches\B4DC2171CF6DE183589FF2E42C91F993 [8]
    \Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\DC3BF90CC0D3D2F398A9A6D1762F70F3\Patches\842EF927D05A30F3A80C5CD8B48E1278 [8]
    \Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\DC3BF90CC0D3D2F398A9A6D1762F70F3\Patches\4F0D74A71940DEB379AB7649296369EA [8]
    \Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\0DC1503A46F231838AD88BCDDC8E8F7C\Patches\E54DA494170E9184E8511E40F1FB0F37 [8]
    \Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\0DC1503A46F231838AD88BCDDC8E8F7C\Patches\E6477194989C96F318EC3F37C0DCFA7A [8]
    \Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\0DC1503A46F231838AD88BCDDC8E8F7C\Patches\24DF66A32D05A9E3185BCE3E5E3C90A7 [8]
    \Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\0DC1503A46F231838AD88BCDDC8E8F7C\Patches\17BB7F68F8EF60333A529FE30E46718B [8]
    \Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\0DC1503A46F231838AD88BCDDC8E8F7C\Patches\99700303DBD40833B8036913F16A0EFA [8]
    \Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\0DC1503A46F231838AD88BCDDC8E8F7C\Patches\497891D0FB691B933A783D2B3D7B3B31 [8]
    \Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\26DDC2EC4210AC63483DF9D4FCC5B59D\Patches\2F2AEE7ADCFB45A45A57B7187A686E85 [8]
    \Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\26DDC2EC4210AC63483DF9D4FCC5B59D\Patches\20F5EDFF4E4821134944A4D59567245A [8]
    \Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\26DDC2EC4210AC63483DF9D4FCC5B59D\Patches\B2AE9C82DC7B3641BFC887275C4F3607 [8]
    \Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\26DDC2EC4210AC63483DF9D4FCC5B59D\Patches\CD065AE440321023B9A06BBD39B64D53 [8]
    \Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\26DDC2EC4210AC63483DF9D4FCC5B59D\Patches\13CA5F6F338977E3CAE8E819C0BA93EA [8]
    \Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\26DDC2EC4210AC63483DF9D4FCC5B59D\Patches\410EFE49775EB0132B5D96372AD1A809 [8]
    \Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\5C1093C35543A0E32A41B090A305076A\Patches\244F2594A1C5BE83C8321BE8EF772EC0 [8]
    \Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\5C1093C35543A0E32A41B090A305076A\Patches\4A3FC9E53BDA08038AFB79A682437085 [8]
    \Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\5C1093C35543A0E32A41B090A305076A\Patches\52A5BB683CC8EC333A39FC820961282B [8]
    \Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\5C1093C35543A0E32A41B090A305076A\Patches\7D9BBE18C3713E234B7741C9D80E574E [8]
    \Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\5C1093C35543A0E32A41B090A305076A\Patches\8AE88CE9EBA4C39378DB09AEBBC1C4B9 [8]
    \Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\5C1093C35543A0E32A41B090A305076A\Patches\A40CEE61429B0E7379FC24D2ECCFB136 [8]
    \Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\5C1093C35543A0E32A41B090A305076A\Patches\AA879D4C8662404369ED692EFA6CF27D [8]
    \Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\5C1093C35543A0E32A41B090A305076A\Patches\B99F5A76ABE52183D8E2CB524109DDF3 [8]
    \Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\5C1093C35543A0E32A41B090A305076A\Patches\CA1699D599C72A63E90F4376A8DE3548 [8]
    \Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\FCDAC0A0AD874C333A05DC1548B97920\Patches\4A3FC9E53BDA08038AFB79A682437085 [8]
    \Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\FCDAC0A0AD874C333A05DC1548B97920\Patches\E2653A24E4B84A938BD2CC218F82983E [8]
    \Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\FCDAC0A0AD874C333A05DC1548B97920\Patches\7D9BBE18C3713E234B7741C9D80E574E [8]
    \Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\FCDAC0A0AD874C333A05DC1548B97920\Patches\CA1699D599C72A63E90F4376A8DE3548 [8]
    \Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\FCDAC0A0AD874C333A05DC1548B97920\Patches\244F2594A1C5BE83C8321BE8EF772EC0 [8]


    (These are the entries in the current MUREGFIX.reg, which are needed to be set read-only)
    "[8]" means read-only for "everyone group".
    I don't know if we need read-only for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\clr_optimization_v4.0.30319_32 also (this is actually updated by MU: "Start"=dword:00000003 to -> dword:00000002) and for KB932471.reg also...
    Thank you for the great job anyways!
    Regards,
    Fenyo
×
×
  • Create New...