Guest Bill DeShawn Posted August 4, 2007 Posted August 4, 2007 Now a PAID subscription? Is this why BigFix stopped doing free updates? -- _________________________ Bill DeShawn bdeshawn@nospamsterling.net http://my.sterling.net/~bdeshawn
Guest Peter Foldes Posted August 5, 2007 Posted August 5, 2007 http://dts-l.org/goodpost.htm -- Peter Please Reply to Newsgroup for the benefit of others Requests for assistance by email can not and will not be acknowledged. "Bill DeShawn" <bdeshawn@nospamsterling.net> wrote in message news:u3KxVbu1HHA.4476@TK2MSFTNGP06.phx.gbl... > Now a PAID subscription? Is this why BigFix stopped doing free updates? > > -- > _________________________ > > Bill DeShawn > bdeshawn@nospamsterling.net > http://my.sterling.net/~bdeshawn > > >
Guest Shenan Stanley Posted August 5, 2007 Posted August 5, 2007 Bill DeShawn wrote: > Now a PAID subscription? Is this why BigFix stopped doing free > updates? First off - what are you talking about? Sorry we did not read your mind and get the part that lead you to this partial tirade - but most of us (even if we have that ability) cannot tell who/where you are very precisely - and perhaps cannot do it over such great distances... Reading minds is as much of an art as a science, you know - and as with everything - has limitations. Are you talking about this third party product: http://www.bigfix.com/products/index.html And which one precisely and what is now a 'paid subscription' that you are complaining (I guess) about? -- Shenan Stanley MS-MVP -- How To Ask Questions The Smart Way http://www.catb.org/~esr/faqs/smart-questions.html
Guest Bill DeShawn Posted August 5, 2007 Posted August 5, 2007 You don't know what I'm talking about??? How odd. First off. All in the same week a well-known company that was providing links to free security updates for Microsoft Office Products as well as Windows XP and Windows 2000, and even Windows 98 and Me, and was doing so for years, has decided to call it quits as Microsoft announces Microsoft Update as an upgrade to Windows Update, meaning that security updates for Microsoft products other than Windows will no longer be free of charge or offered as free downloads. So, my question is, is microsoft partially responsible for BigFix's decision to stop the service? Was their desire to capitalize on security and other broken software "fixes" many of which are needed because Microsoft created the need in the first place somehow influential? Can Microsoft claim that the two events were purely coincidental? Don't worry about me. Mr. Small Potatoes has no influence and nobody is really listening. I just want all of us who may read this to understand that this can very well be a plan to create a cycle of mediocrity and have all the computer consumers pay through the nose for it. Microsoft can make mistake after mistake, then correct it and charge us ALL for the fixes if we want them. I see this as a dirty trick. So, that's my rant. Now I'll stand back and watch while everybody takes a swing at me (cause this is all my fault). -- _________________________ Bill DeShawn bdeshawn@nospamsterling.net http://my.sterling.net/~bdeshawn "Bill DeShawn" <bdeshawn@nospamsterling.net> wrote in message news:u3KxVbu1HHA.4476@TK2MSFTNGP06.phx.gbl... > Now a PAID subscription? Is this why BigFix stopped doing free updates? > > -- > _________________________ > > Bill DeShawn > bdeshawn@nospamsterling.net > http://my.sterling.net/~bdeshawn > > >
Guest Shenan Stanley Posted August 5, 2007 Posted August 5, 2007 Bill DeShawn wrote: > You don't know what I'm talking about??? How odd. First off. All > in the same week a well-known company that was providing links to > free security updates for Microsoft Office Products as well as > Windows XP and Windows 2000, and even Windows 98 and Me, and was > doing so for years, has decided to call it quits as Microsoft > announces Microsoft Update as an upgrade to Windows Update, meaning > that security updates for Microsoft products other than Windows > will no longer be free of charge or offered as free downloads. So, > my question is, is microsoft partially responsible for BigFix's > decision to stop the service? Was their desire to capitalize on > security and other broken software "fixes" many of which are needed > because Microsoft created the need in the first place somehow > influential? Can Microsoft claim that the two events were purely > coincidental? Don't worry about me. Mr. Small Potatoes has no > influence and nobody is really listening. I just want all of us > who may read this to understand that this can very well be a plan > to create a cycle of mediocrity and have all the computer consumers > pay through the nose for it. Microsoft can make mistake after > mistake, then correct it and charge us ALL for the fixes if we want > them. I see this as a dirty trick. > So, that's my rant. Now I'll stand back and watch while everybody > takes a swing at me (cause this is all my fault). Who said it was *your fault*... It was merely pointed out to you that you came out ranting about something - yet never explained yourself. I've seen people do that - usually they are roaming the streets with their shopping carts or in a certain area of the hospitals... Not saying you are one of those people - but you cannot TRUTHFULLY say that you expected the millions of people around the world with access to these newsgroups to have any clue what you were talking about with the little information you provided in the origiinal post. It's like coming out and saying, "They went and did it.. They finally went and did it!" Who is they and what did they do? It's not like the updates weren't freely available before. It's not like there aren't products built into Microsoft Servers (or can be installed freely) that can push out (and give control of said pushing out) update to many computers in an organization. It's not like the updates are difficult to get... It's not like any of the critical updates for any Microsoft product costs you a dime to get (well - other than maybe your ISP charges.) You act like this service was unique or even necessary or easier than the other free methods out there... Let me help you out... Here's some Updates for Windows XP - from SP2 until about April 2007... (If given a choice - be an IT Administrator to get to the standalone update file.) Direct Download of Service Pack 2 (SP2) for Windows XP http://snipurl.com/8bqy Critical Updates ---------------------- Released: -- [ Web Page Address ] -- Description: 9/14/2004 -- [ http://support.microsoft.com/kb/885626 ] -- Critical Update for Windows XP 11/22/2004 -- [ http://support.microsoft.com/kb/887742 ] -- Update for Windows XP 12/13/2004 -- [ http://support.microsoft.com/kb/885835 ] -- Security Update for Windows XP 12/13/2004 -- [ http://support.microsoft.com/kb/885836 ] -- Security Update for Windows XP 12/13/2004 -- [ http://support.microsoft.com/kb/886185 ] -- Critical Update for Windows XP 12/13/2004 -- [ http://support.microsoft.com/kb/873339 ] -- Security Update for Windows XP 2/7/2005 -- [ http://support.microsoft.com/kb/891781 ] -- Security Update for Windows XP 2/7/2005 -- [ http://support.microsoft.com/kb/888302 ] -- Security Update for Windows XP 2/7/2005 -- [ http://support.microsoft.com/kb/887472 ] -- Security Update for Windows Messenger 4/11/2005 -- [ http://support.microsoft.com/kb/890859 ] -- Security Update for Windows XP 5/18/2005 -- [ http://support.microsoft.com/kb/894391 ] -- Update for Windows XP 5/24/2005 -- [ http://support.microsoft.com/kb/896344 ] -- Update for Windows XP 6/13/2005 -- [ http://support.microsoft.com/kb/896358 ] -- Security Update for Microsoft Windows XP 6/13/2005 -- [ http://support.microsoft.com/kb/896428 ] -- Security Update for Windows XP 6/24/2005 -- [ http://support.microsoft.com/kb/900930 ] -- Update for Windows XP 6/27/2005 -- [ http://support.microsoft.com/kb/898461 ] -- Update for Windows XP 7/11/2005 -- [ http://support.microsoft.com/kb/901214 ] -- Security Update for Windows XP 8/8/2005 -- [ http://support.microsoft.com/kb/896423 ] -- Security Update for Windows XP 8/8/2005 -- [ http://support.microsoft.com/kb/899587 ] -- Security Update for Windows XP 8/8/2005 -- [ http://support.microsoft.com/kb/899591 ] -- Security Update for Windows XP 8/8/2005 -- [ http://support.microsoft.com/kb/893756 ] -- Security Update for Windows XP 10/10/2005 -- [ http://support.microsoft.com/kb/901017 ] -- Security Update for Windows XP 10/10/2005 -- [ http://support.microsoft.com/kb/902400 ] -- Security Update for Windows XP 10/10/2005 -- [ http://support.microsoft.com/kb/905749 ] -- Security Update for Windows XP 10/10/2005 -- [ http://support.microsoft.com/kb/905414 ] -- Security Update for Windows XP 10/10/2005 -- [ http://support.microsoft.com/kb/900725 ] -- Security Update for Windows XP 12/12/2005 -- [ http://support.microsoft.com/kb/910437 ] -- Update for Windows XP 12/13/2005 -- [ http://support.microsoft.com/kb/904706 ] -- Security Update for Windows XP 1/9/2006 -- [ http://support.microsoft.com/kb/908519 ] -- Security Update for Windows XP 2/13/2006 -- [ http://support.microsoft.com/kb/911927 ] -- Security Update for Windows XP 4/10/2006 -- [ http://support.microsoft.com/kb/911562 ] -- Security Update for Windows XP 4/18/2006 -- [ http://support.microsoft.com/kb/904942 ] -- Update for Windows XP 4/25/2006 -- [ http://support.microsoft.com/kb/900485 ] -- Update for Windows XP 4/25/2006 -- [ http://support.microsoft.com/kb/908531 ] -- Security Update for Windows XP 5/9/2006 -- [ http://support.microsoft.com/kb/913580 ] -- Security Update for Windows XP 6/6/2006 -- [ http://support.microsoft.com/kb/916595 ] -- Update for Windows XP 6/8/2006 -- [ http://support.microsoft.com/kb/918439 ] -- Vulnerability in ART Image Rendering Could Allow Remote Code Execution in Internet Explorer for Windows XP SP2 6/12/2006 -- [ http://support.microsoft.com/kb/914389 ] -- Security Update for Windows XP 6/12/2006 -- [ http://support.microsoft.com/kb/917953 ] -- Security Update for Windows XP 6/13/2006 -- [ http://support.microsoft.com/kb/917344 ] -- JScript 5.6 Security Update for Windows XP SP1 and SP2 6/27/2006 -- [ http://support.microsoft.com/kb/911280 ] -- Security Update for Windows XP 7/10/2006 -- [ http://support.microsoft.com/kb/917159 ] -- Security Update for Windows XP 7/10/2006 -- [ http://support.microsoft.com/kb/914388 ] -- Security Update for Windows XP 8/7/2006 -- [ http://support.microsoft.com/kb/917422 ] -- Security Update for Windows XP 8/7/2006 -- [ http://support.microsoft.com/kb/920670 ] -- Security Update for Windows XP 8/7/2006 -- [ http://support.microsoft.com/kb/922616 ] -- Security Update for Windows XP 8/7/2006 -- [ http://support.microsoft.com/kb/920683 ] -- Security Update for Windows XP 8/17/2006 -- [ http://support.microsoft.com/kb/920872 ] -- Update for Windows XP 9/11/2006 -- [ http://support.microsoft.com/kb/920685 ] -- Security Update for Windows XP 9/11/2006 -- [ http://support.microsoft.com/kb/922582 ] -- Update for Windows XP 9/11/2006 -- [ http://support.microsoft.com/kb/919007 ] -- Security Update for Windows XP 10/9/2006 -- [ http://support.microsoft.com/kb/922819 ] -- Security Update for Windows XP 10/9/2006 -- [ http://support.microsoft.com/kb/924496 ] -- Security Update for Windows XP 10/9/2006 -- [ http://support.microsoft.com/kb/923414 ] -- Security Update for Windows XP 10/9/2006 -- [ http://support.microsoft.com/kb/923191 ] -- Security Update for Windows XP 11/14/2006 -- [ http://support.microsoft.com/kb/920213 ] -- Vulnerability in Microsoft Agent could allow remote code execution 11/14/2006 -- [ http://support.microsoft.com/kb/923789 ] -- Vulnerabilities in Macromedia Flash Player from Adobe could allow remote code execution 11/14/2006 -- [ http://support.microsoft.com/kb/924270 ] -- Vulnerability in Workstation Service could allow remote code execution 11/14/2006 -- [ http://support.microsoft.com/kb/928088 ] -- Vulnerability in Microsoft XML Core Services could allow remote code execution 11/14/2006 -- [ http://support.microsoft.com/kb/923980 ] -- Vulnerability in the Client Service could allow remote code execution 12/12/2006 -- [ http://support.microsoft.com/kb/926247 ] -- Vulnerability in Simple Network Management Protocol (SNMP) could allow remote code execution 12/12/2006 -- [ http://support.microsoft.com/kb/926255 ] -- Vulnerability in Windows could allow elevation of privilege 12/12/2006 -- [ http://support.microsoft.com/kb/923694 ] -- Cumulative security update for Outlook Express 1/9/2007 -- [ http://support.microsoft.com/kb/929969 ] -- Vulnerability in Vector Markup Language Could Allow Remote Code Execution * If you have installed IE7, also install the IE7 version of this patch! 2/13/2007 -- [ http://support.microsoft.com/kb/928255 ] -- Vulnerability in Windows Shell Could Allow Elevation of Privilege 2/13/2007 -- [ http://support.microsoft.com/kb/927802 ] -- Vulnerability in Windows Image Acquisition Service Could Allow Elevation of Privilege 2/13/2007 -- [ http://support.microsoft.com/kb/928843 ] -- Vulnerability in HTML Help ActiveX Control Could Allow Remote Code Execution 2/13/2007 -- [ http://support.microsoft.com/kb/927779 ] -- Vulnerability in Microsoft Data Access Components Could Allow Remote Code Execution 2/13/2007 -- [ http://support.microsoft.com/kb/926436 ] -- Vulnerability in Microsoft OLE Dialog Could Allow Remote Code Execution 2/13/2007 -- [ http://support.microsoft.com/kb/924667 ] -- Vulnerability in Microsoft MFC Could Allow Remote Code Execution 2/13/2007 -- [ http://support.microsoft.com/kb/918118 ] -- Vulnerability in Microsoft RichEdit Could Allow Remote Code Execution 2/13/2007 -- [ http://support.microsoft.com/kb/928090 ] -- Cumulative Security Update for Internet Explorer * If you have IE7, obtain that version of this update. 4/3/2007 -- [ http://support.microsoft.com/kb/925902 ] -- Vulnerabilities in GDI Could Allow Remote Code Execution 4/10/2007 -- [ http://support.microsoft.com/kb/931261 ] -- Vulnerability in Universal Plug and Play Could Allow Remote Code Execution 4/10/2007 -- [ http://support.microsoft.com/kb/932168 ] -- Vulnerability in Microsoft Agent Could Allow Remote Code Execution 4/10/2007 -- [ http://support.microsoft.com/kb/930178 ] -- Vulnerabilities in CSRSS Could Allow Remote Code Execution 4/10/2007 -- [ http://support.microsoft.com/kb/931784 ] -- Vulnerability in Windows Kernel Could Allow Elevation of Privilege Media Player: ------------------- Released: -- [ Web Page Address: ] -- Description: 9/2/2004 -- [ http://go.microsoft.com/fwlink/?LinkId=30984 ] -- Windows Media Player 10 11/7/2005 -- [ http://support.microsoft.com/kb/902344 ] -- Update for WMDRM-enabled Media Players 2/13/2006 -- [ http://support.microsoft.com/kb/911564 ] -- Security Update for Windows Media Player Plug-in 4/11/2006 -- [ http://support.microsoft.com/kb/911565 ] -- Security Update for Windows Media Player 10 for Windows XP 6/12/2006 -- [ http://support.microsoft.com/kb/917734 ] -- Security Update for Windows Media Player 10 for Windows XP 12/12/2006 -- [ http://support.microsoft.com/kb/923689 ] -- Vulnerability in Windows Media Format Could Allow Remote Code Execution ..NET Framework: ------------------------ Released: -- [ Web Page Address: ] -- Description: 3/30/2004 -- [ http://snipurl.com/10bde ] -- Microsoft .NET Framework Version 1.1 Redistributable Package 8/30/2004 -- [ http://support.microsoft.com/kb/885055 ] -- Microsoft .NET Framework 1.1 Service Pack 1 2/8/2005 -- [ http://support.microsoft.com/kb/887219 ] -- ASP.NET Security Update for Microsoft NET Framework 1.1 Service Pack 1 3/22/2006 -- [ http://snipurl.com/10bdv ] -- Microsoft .NET Framework Version 2.0 Redistributable Package (x86) 7/11/2006 -- [ http://support.microsoft.com/kb/917283 ] -- NDP 2.0 ASP.Net Security Update 10/10/2006 -- [ http://support.microsoft.com/kb/922770 ] -- NET Framework 2.0 SYSTEM.WEB.DLL Security Update Other Updates: --------------------- Released: -- [ Web Page Address: ] -- Description: 9/14/2004 -- [ http://support.microsoft.com/kb/873374 ] -- Microsoft GDI+ Detection Tool 9/2/2005 -- [ http://support.microsoft.com/kb/893803 ] -- Windows Installer 3.1 Redistributable (v2) 10/14/2005 -- [ http://snipurl.com/10bex ] -- Windows Media Connect 2.0 11/29/2005 -- [ http://support.microsoft.com/kb/909520 ] -- Microsoft Base Smart Card Cryptographic Service Provider Package: x86 10/10/2006 -- [ http://support.microsoft.com/kb/890830 ] -- Microsoft® Windows® Malicious Software Removal Tool - November 2006 Purely OPTIONAL: ---------------------- 10/18/2006 -- [ http://www.microsoft.com/windows/ie/downloads/ ] -- Internet Explorer 7.0 10/30/2006 -- [ http://snipurl.com/167ea ] -- Media Player 11 12/8/2006 -- [ http://support.microsoft.com/kb/925876 ] -- Remote Desktop Connection 6.0 client Want to know how to get more? Each month Microsoft releases that month's updates in ISO format: January 2006-current http://support.microsoft.com/kb/913086 If you are more trusting: AutoPatcher http://www.autopatcher.com/ Windows Updates Downloader http://wud.jcarle.com/ You can download each update manually - based off the KB Article number, etc. That way you can back it up/burn a CD of them in case you need them or use them to keep a slipstream/integrated (updated) Windows XP CD. How to use the Windows Update Catalog http://support.microsoft.com/kb/323166 (In order to use the Windows Update Catalog, you must use IE to get the patches..) Windows Update Catalog http://v4.windowsupdate.microsoft.com/catalog/en/default.asp (In order to use the Windows Update Catalog, you must use IE to get the patches..) Creating an Integrated Installation http://snipurl.com/el43 Integrate software updates into your Windows installation source files http://support.microsoft.com/kb/828930 Really customize your CD.. http://unattended.msfn.org/ Produce an up-to-date XP Distribution CD http://xpcreate.com/ AutoStreamer http://www.neowin.net/forum/index.php?showtopic=223562 You can see the critical (security and other) patches released for a given month using the following: http://www.microsoft.com/technet/security/bulletin/ms##-***.mspx At the end of this line you see "ms##-***.mspx" .. If you simply replace ## with the two-digit year and the *** with the three character month abbreviation, you will see the list of "critical" and "important" patches for that month (since it only happens once a month usually, if you check by the second Tuesday (wait until afternoon) of each month - you should be fine) - note that future months will not work. As an example... December 2004's patches.. http://www.microsoft.com/technet/security/bulletin/ms04-dec.mspx March 2005's patches.. None released.. so that one will fail... May 2006's patches.. http://www.microsoft.com/technet/security/bulletin/ms06-may.mspx January 2007's patches.. http://www.microsoft.com/technet/security/bulletin/ms07-jan.mspx Once you get on the page with each month's list of patches.. You can go to the related KB articles and grab the appropriate files from there. Need Microsoft Office updates? http://office.microsoft.com/en-us/downloads/maincatalog.aspx What is it exactly you are babbling about? Windows Update/Microsoft update thing happened... a LONG time ago now. Please - if there is something you do not understand - ask about it, understand it - then rant away.... Did you lose your job at whatever company you are ranting about or something? -- Shenan Stanley MS-MVP -- How To Ask Questions The Smart Way http://www.catb.org/~esr/faqs/smart-questions.html
Recommended Posts