Jump to content
Microsoft Windows Bulletin Board

Microsoft Update and BigFix


Recommended Posts

Guest Peter Foldes
Posted

http://dts-l.org/goodpost.htm

 

--

Peter

 

Please Reply to Newsgroup for the benefit of others

Requests for assistance by email can not and will not be acknowledged.

 

"Bill DeShawn" <bdeshawn@nospamsterling.net> wrote in message news:u3KxVbu1HHA.4476@TK2MSFTNGP06.phx.gbl...

> Now a PAID subscription? Is this why BigFix stopped doing free updates?

>

> --

> _________________________

>

> Bill DeShawn

> bdeshawn@nospamsterling.net

> http://my.sterling.net/~bdeshawn

>

>

>

Guest Shenan Stanley
Posted

Bill DeShawn wrote:

> Now a PAID subscription? Is this why BigFix stopped doing free

> updates?

 

First off - what are you talking about? Sorry we did not read your mind and

get the part that lead you to this partial tirade - but most of us (even if

we have that ability) cannot tell who/where you are very precisely - and

perhaps cannot do it over such great distances... Reading minds is as much

of an art as a science, you know - and as with everything - has limitations.

 

Are you talking about this third party product:

http://www.bigfix.com/products/index.html

 

And which one precisely and what is now a 'paid subscription' that you are

complaining (I guess) about?

 

--

Shenan Stanley

MS-MVP

--

How To Ask Questions The Smart Way

http://www.catb.org/~esr/faqs/smart-questions.html

Guest Bill DeShawn
Posted

You don't know what I'm talking about??? How odd. First off. All in the

same week a well-known company that was providing links to free security

updates for Microsoft Office Products as well as Windows XP and Windows

2000, and even Windows 98 and Me, and was doing so for years, has decided to

call it quits as Microsoft announces Microsoft Update as an upgrade to

Windows Update, meaning that security updates for Microsoft products other

than Windows will no longer be free of charge or offered as free downloads.

So, my question is, is microsoft partially responsible for BigFix's decision

to stop the service? Was their desire to capitalize on security and other

broken software "fixes" many of which are needed because Microsoft created

the need in the first place somehow influential? Can Microsoft claim that

the two events were purely coincidental? Don't worry about me. Mr. Small

Potatoes has no influence and nobody is really listening. I just want all

of us who may read this to understand that this can very well be a plan to

create a cycle of mediocrity and have all the computer consumers pay through

the nose for it. Microsoft can make mistake after mistake, then correct it

and charge us ALL for the fixes if we want them. I see this as a dirty

trick.

 

So, that's my rant. Now I'll stand back and watch while everybody takes a

swing at me (cause this is all my fault).

--

_________________________

 

Bill DeShawn

bdeshawn@nospamsterling.net

http://my.sterling.net/~bdeshawn

 

 

"Bill DeShawn" <bdeshawn@nospamsterling.net> wrote in message

news:u3KxVbu1HHA.4476@TK2MSFTNGP06.phx.gbl...

> Now a PAID subscription? Is this why BigFix stopped doing free updates?

>

> --

> _________________________

>

> Bill DeShawn

> bdeshawn@nospamsterling.net

> http://my.sterling.net/~bdeshawn

>

>

>

Guest Shenan Stanley
Posted

Bill DeShawn wrote:

> You don't know what I'm talking about??? How odd. First off. All

> in the same week a well-known company that was providing links to

> free security updates for Microsoft Office Products as well as

> Windows XP and Windows 2000, and even Windows 98 and Me, and was

> doing so for years, has decided to call it quits as Microsoft

> announces Microsoft Update as an upgrade to Windows Update, meaning

> that security updates for Microsoft products other than Windows

> will no longer be free of charge or offered as free downloads. So,

> my question is, is microsoft partially responsible for BigFix's

> decision to stop the service? Was their desire to capitalize on

> security and other broken software "fixes" many of which are needed

> because Microsoft created the need in the first place somehow

> influential? Can Microsoft claim that the two events were purely

> coincidental? Don't worry about me. Mr. Small Potatoes has no

> influence and nobody is really listening. I just want all of us

> who may read this to understand that this can very well be a plan

> to create a cycle of mediocrity and have all the computer consumers

> pay through the nose for it. Microsoft can make mistake after

> mistake, then correct it and charge us ALL for the fixes if we want

> them. I see this as a dirty trick.

> So, that's my rant. Now I'll stand back and watch while everybody

> takes a swing at me (cause this is all my fault).

 

Who said it was *your fault*...

 

It was merely pointed out to you that you came out ranting about something -

yet never explained yourself. I've seen people do that - usually they are

roaming the streets with their shopping carts or in a certain area of the

hospitals... Not saying you are one of those people - but you cannot

TRUTHFULLY say that you expected the millions of people around the world

with access to these newsgroups to have any clue what you were talking about

with the little information you provided in the origiinal post.

 

It's like coming out and saying, "They went and did it.. They finally went

and did it!" Who is they and what did they do?

 

It's not like the updates weren't freely available before. It's not like

there aren't products built into Microsoft Servers (or can be installed

freely) that can push out (and give control of said pushing out) update to

many computers in an organization. It's not like the updates are difficult

to get... It's not like any of the critical updates for any Microsoft

product costs you a dime to get (well - other than maybe your ISP charges.)

 

You act like this service was unique or even necessary or easier than the

other free methods out there...

 

Let me help you out...

 

Here's some Updates for Windows XP - from SP2 until about April 2007...

(If given a choice - be an IT Administrator to get to the standalone update

file.)

 

Direct Download of Service Pack 2 (SP2) for Windows XP

http://snipurl.com/8bqy

 

Critical Updates

----------------------

Released: -- [ Web Page Address ] -- Description:

9/14/2004 -- [ http://support.microsoft.com/kb/885626 ]

-- Critical Update for Windows XP

11/22/2004 -- [ http://support.microsoft.com/kb/887742 ]

-- Update for Windows XP

12/13/2004 -- [ http://support.microsoft.com/kb/885835 ]

-- Security Update for Windows XP

12/13/2004 -- [ http://support.microsoft.com/kb/885836 ]

-- Security Update for Windows XP

12/13/2004 -- [ http://support.microsoft.com/kb/886185 ]

-- Critical Update for Windows XP

12/13/2004 -- [ http://support.microsoft.com/kb/873339 ]

-- Security Update for Windows XP

2/7/2005 -- [ http://support.microsoft.com/kb/891781 ]

-- Security Update for Windows XP

2/7/2005 -- [ http://support.microsoft.com/kb/888302 ]

-- Security Update for Windows XP

2/7/2005 -- [ http://support.microsoft.com/kb/887472 ]

-- Security Update for Windows Messenger

4/11/2005 -- [ http://support.microsoft.com/kb/890859 ]

-- Security Update for Windows XP

5/18/2005 -- [ http://support.microsoft.com/kb/894391 ]

-- Update for Windows XP

5/24/2005 -- [ http://support.microsoft.com/kb/896344 ]

-- Update for Windows XP

6/13/2005 -- [ http://support.microsoft.com/kb/896358 ]

-- Security Update for Microsoft Windows XP

6/13/2005 -- [ http://support.microsoft.com/kb/896428 ]

-- Security Update for Windows XP

6/24/2005 -- [ http://support.microsoft.com/kb/900930 ]

-- Update for Windows XP

6/27/2005 -- [ http://support.microsoft.com/kb/898461 ]

-- Update for Windows XP

7/11/2005 -- [ http://support.microsoft.com/kb/901214 ]

-- Security Update for Windows XP

8/8/2005 -- [ http://support.microsoft.com/kb/896423 ]

-- Security Update for Windows XP

8/8/2005 -- [ http://support.microsoft.com/kb/899587 ]

-- Security Update for Windows XP

8/8/2005 -- [ http://support.microsoft.com/kb/899591 ]

-- Security Update for Windows XP

8/8/2005 -- [ http://support.microsoft.com/kb/893756 ]

-- Security Update for Windows XP

10/10/2005 -- [ http://support.microsoft.com/kb/901017 ]

-- Security Update for Windows XP

10/10/2005 -- [ http://support.microsoft.com/kb/902400 ]

-- Security Update for Windows XP

10/10/2005 -- [ http://support.microsoft.com/kb/905749 ]

-- Security Update for Windows XP

10/10/2005 -- [ http://support.microsoft.com/kb/905414 ]

-- Security Update for Windows XP

10/10/2005 -- [ http://support.microsoft.com/kb/900725 ]

-- Security Update for Windows XP

12/12/2005 -- [ http://support.microsoft.com/kb/910437 ]

-- Update for Windows XP

12/13/2005 -- [ http://support.microsoft.com/kb/904706 ]

-- Security Update for Windows XP

1/9/2006 -- [ http://support.microsoft.com/kb/908519 ]

-- Security Update for Windows XP

2/13/2006 -- [ http://support.microsoft.com/kb/911927 ]

-- Security Update for Windows XP

4/10/2006 -- [ http://support.microsoft.com/kb/911562 ]

-- Security Update for Windows XP

4/18/2006 -- [ http://support.microsoft.com/kb/904942 ]

-- Update for Windows XP

4/25/2006 -- [ http://support.microsoft.com/kb/900485 ]

-- Update for Windows XP

4/25/2006 -- [ http://support.microsoft.com/kb/908531 ]

-- Security Update for Windows XP

5/9/2006 -- [ http://support.microsoft.com/kb/913580 ]

-- Security Update for Windows XP

6/6/2006 -- [ http://support.microsoft.com/kb/916595 ]

-- Update for Windows XP

6/8/2006 -- [ http://support.microsoft.com/kb/918439 ]

-- Vulnerability in ART Image Rendering Could Allow Remote Code

Execution in Internet Explorer for Windows XP SP2

6/12/2006 -- [ http://support.microsoft.com/kb/914389 ]

-- Security Update for Windows XP

6/12/2006 -- [ http://support.microsoft.com/kb/917953 ]

-- Security Update for Windows XP

6/13/2006 -- [ http://support.microsoft.com/kb/917344 ]

-- JScript 5.6 Security Update for Windows XP SP1 and SP2

6/27/2006 -- [ http://support.microsoft.com/kb/911280 ]

-- Security Update for Windows XP

7/10/2006 -- [ http://support.microsoft.com/kb/917159 ]

-- Security Update for Windows XP

7/10/2006 -- [ http://support.microsoft.com/kb/914388 ]

-- Security Update for Windows XP

8/7/2006 -- [ http://support.microsoft.com/kb/917422 ]

-- Security Update for Windows XP

8/7/2006 -- [ http://support.microsoft.com/kb/920670 ]

-- Security Update for Windows XP

8/7/2006 -- [ http://support.microsoft.com/kb/922616 ]

-- Security Update for Windows XP

8/7/2006 -- [ http://support.microsoft.com/kb/920683 ]

-- Security Update for Windows XP

8/17/2006 -- [ http://support.microsoft.com/kb/920872 ]

-- Update for Windows XP

9/11/2006 -- [ http://support.microsoft.com/kb/920685 ]

-- Security Update for Windows XP

9/11/2006 -- [ http://support.microsoft.com/kb/922582 ]

-- Update for Windows XP

9/11/2006 -- [ http://support.microsoft.com/kb/919007 ]

-- Security Update for Windows XP

10/9/2006 -- [ http://support.microsoft.com/kb/922819 ]

-- Security Update for Windows XP

10/9/2006 -- [ http://support.microsoft.com/kb/924496 ]

-- Security Update for Windows XP

10/9/2006 -- [ http://support.microsoft.com/kb/923414 ]

-- Security Update for Windows XP

10/9/2006 -- [ http://support.microsoft.com/kb/923191 ]

-- Security Update for Windows XP

11/14/2006 -- [ http://support.microsoft.com/kb/920213 ]

-- Vulnerability in Microsoft Agent could allow remote code

execution

11/14/2006 -- [ http://support.microsoft.com/kb/923789 ]

-- Vulnerabilities in Macromedia Flash Player from Adobe

could allow remote code execution

11/14/2006 -- [ http://support.microsoft.com/kb/924270 ]

-- Vulnerability in Workstation Service could allow

remote code execution

11/14/2006 -- [ http://support.microsoft.com/kb/928088 ]

-- Vulnerability in Microsoft XML Core Services could

allow remote code execution

11/14/2006 -- [ http://support.microsoft.com/kb/923980 ]

-- Vulnerability in the Client Service could allow remote code

execution

12/12/2006 -- [ http://support.microsoft.com/kb/926247 ]

-- Vulnerability in Simple Network Management Protocol (SNMP)

could allow remote code execution

12/12/2006 -- [ http://support.microsoft.com/kb/926255 ]

-- Vulnerability in Windows could allow elevation of privilege

12/12/2006 -- [ http://support.microsoft.com/kb/923694 ]

-- Cumulative security update for Outlook Express

1/9/2007 -- [ http://support.microsoft.com/kb/929969 ]

-- Vulnerability in Vector Markup Language

Could Allow Remote Code Execution

* If you have installed IE7, also install the IE7 version

of this patch!

2/13/2007 -- [ http://support.microsoft.com/kb/928255 ]

-- Vulnerability in Windows Shell Could Allow Elevation

of Privilege

2/13/2007 -- [ http://support.microsoft.com/kb/927802 ]

-- Vulnerability in Windows Image Acquisition Service

Could Allow Elevation of Privilege

2/13/2007 -- [ http://support.microsoft.com/kb/928843 ]

-- Vulnerability in HTML Help ActiveX Control Could

Allow Remote Code Execution

2/13/2007 -- [ http://support.microsoft.com/kb/927779 ]

-- Vulnerability in Microsoft Data Access Components

Could Allow Remote Code Execution

2/13/2007 -- [ http://support.microsoft.com/kb/926436 ]

-- Vulnerability in Microsoft OLE Dialog Could Allow

Remote Code Execution

2/13/2007 -- [ http://support.microsoft.com/kb/924667 ]

-- Vulnerability in Microsoft MFC Could Allow Remote

Code Execution

2/13/2007 -- [ http://support.microsoft.com/kb/918118 ]

-- Vulnerability in Microsoft RichEdit Could Allow

Remote Code Execution

2/13/2007 -- [ http://support.microsoft.com/kb/928090 ]

-- Cumulative Security Update for Internet Explorer

* If you have IE7, obtain that version of this update.

4/3/2007 -- [ http://support.microsoft.com/kb/925902 ]

-- Vulnerabilities in GDI Could Allow Remote Code Execution

4/10/2007 -- [ http://support.microsoft.com/kb/931261 ]

-- Vulnerability in Universal Plug and Play Could

Allow Remote Code Execution

4/10/2007 -- [ http://support.microsoft.com/kb/932168 ]

-- Vulnerability in Microsoft Agent Could Allow Remote

Code Execution

4/10/2007 -- [ http://support.microsoft.com/kb/930178 ]

-- Vulnerabilities in CSRSS Could Allow Remote Code

Execution

4/10/2007 -- [ http://support.microsoft.com/kb/931784 ]

-- Vulnerability in Windows Kernel Could Allow

Elevation of Privilege

 

Media Player:

-------------------

Released: -- [ Web Page Address: ] -- Description:

9/2/2004 -- [ http://go.microsoft.com/fwlink/?LinkId=30984 ]

-- Windows Media Player 10

11/7/2005 -- [ http://support.microsoft.com/kb/902344 ]

-- Update for WMDRM-enabled Media Players

2/13/2006 -- [ http://support.microsoft.com/kb/911564 ]

-- Security Update for Windows Media Player Plug-in

4/11/2006 -- [ http://support.microsoft.com/kb/911565 ]

-- Security Update for Windows Media Player 10 for Windows XP

6/12/2006 -- [ http://support.microsoft.com/kb/917734 ]

-- Security Update for Windows Media Player 10 for Windows XP

12/12/2006 -- [ http://support.microsoft.com/kb/923689 ]

-- Vulnerability in Windows Media Format Could Allow Remote

Code Execution

 

..NET Framework:

------------------------

Released: -- [ Web Page Address: ] -- Description:

3/30/2004 -- [ http://snipurl.com/10bde ]

-- Microsoft .NET Framework Version 1.1 Redistributable Package

8/30/2004 -- [ http://support.microsoft.com/kb/885055 ]

-- Microsoft .NET Framework 1.1 Service Pack 1

2/8/2005 -- [ http://support.microsoft.com/kb/887219 ]

-- ASP.NET Security Update for Microsoft NET Framework 1.1

Service Pack 1

3/22/2006 -- [ http://snipurl.com/10bdv ]

-- Microsoft .NET Framework Version 2.0 Redistributable

Package (x86)

7/11/2006 -- [ http://support.microsoft.com/kb/917283 ]

-- NDP 2.0 ASP.Net Security Update

10/10/2006 -- [ http://support.microsoft.com/kb/922770 ]

-- NET Framework 2.0 SYSTEM.WEB.DLL Security Update

 

Other Updates:

---------------------

Released: -- [ Web Page Address: ] -- Description:

9/14/2004 -- [ http://support.microsoft.com/kb/873374 ]

-- Microsoft GDI+ Detection Tool

9/2/2005 -- [ http://support.microsoft.com/kb/893803 ]

-- Windows Installer 3.1 Redistributable (v2)

10/14/2005 -- [ http://snipurl.com/10bex ]

-- Windows Media Connect 2.0

11/29/2005 -- [ http://support.microsoft.com/kb/909520 ]

-- Microsoft Base Smart Card Cryptographic Service Provider

Package: x86

10/10/2006 -- [ http://support.microsoft.com/kb/890830 ]

-- Microsoft® Windows® Malicious Software Removal Tool

- November 2006

 

Purely OPTIONAL:

----------------------

10/18/2006 -- [ http://www.microsoft.com/windows/ie/downloads/ ]

-- Internet Explorer 7.0

10/30/2006 -- [ http://snipurl.com/167ea ]

-- Media Player 11

12/8/2006 -- [ http://support.microsoft.com/kb/925876 ]

-- Remote Desktop Connection 6.0 client

 

Want to know how to get more?

 

Each month Microsoft releases that month's updates in ISO format:

January 2006-current

http://support.microsoft.com/kb/913086

 

If you are more trusting:

 

AutoPatcher

http://www.autopatcher.com/

 

Windows Updates Downloader

http://wud.jcarle.com/

 

You can download each update manually - based off the KB Article number,

etc. That way you can back it up/burn a CD of them in case you need them or

use them to keep a slipstream/integrated (updated) Windows XP CD.

 

How to use the Windows Update Catalog

http://support.microsoft.com/kb/323166

(In order to use the Windows Update Catalog, you must use IE to get the

patches..)

 

Windows Update Catalog

http://v4.windowsupdate.microsoft.com/catalog/en/default.asp

(In order to use the Windows Update Catalog, you must use IE to get the

patches..)

 

Creating an Integrated Installation

http://snipurl.com/el43

 

Integrate software updates into your Windows installation source files

http://support.microsoft.com/kb/828930

 

Really customize your CD..

http://unattended.msfn.org/

 

Produce an up-to-date XP Distribution CD

http://xpcreate.com/

 

AutoStreamer

http://www.neowin.net/forum/index.php?showtopic=223562

 

You can see the critical (security and other) patches released for a given

month using the following:

 

http://www.microsoft.com/technet/security/bulletin/ms##-***.mspx

 

At the end of this line you see "ms##-***.mspx" .. If you simply replace ##

with the two-digit year and the *** with the three character month

abbreviation, you will see the list of "critical" and "important" patches

for that month (since it only happens once a month usually, if you check by

the second Tuesday (wait until afternoon) of each month - you should be

fine) - note that future months will not work.

 

As an example...

 

December 2004's patches..

http://www.microsoft.com/technet/security/bulletin/ms04-dec.mspx

 

March 2005's patches..

None released.. so that one will fail...

 

May 2006's patches..

http://www.microsoft.com/technet/security/bulletin/ms06-may.mspx

 

January 2007's patches..

http://www.microsoft.com/technet/security/bulletin/ms07-jan.mspx

 

 

Once you get on the page with each month's list of patches.. You can go to

the related KB articles and grab the appropriate files from there.

 

Need Microsoft Office updates?

http://office.microsoft.com/en-us/downloads/maincatalog.aspx

 

What is it exactly you are babbling about?

Windows Update/Microsoft update thing happened... a LONG time ago now.

 

Please - if there is something you do not understand - ask about it,

understand it - then rant away.... Did you lose your job at whatever company

you are ranting about or something?

 

--

Shenan Stanley

MS-MVP

--

How To Ask Questions The Smart Way

http://www.catb.org/~esr/faqs/smart-questions.html

×
×
  • Create New...