Yventaliy
Members
-
Joined
-
Last visited
Reputation Activity
-
Yventaliy reacted to jaynbe in [SVCpack]AddOn CDburnerXP 4.5.1.3870 Intl.CdburnerXP as a SVCpack_Addon
CDBurnerXP is a free application to burn CDs and DVDs, including Blu-Ray and HD-DVDs.
It also includes the feature to burn and create ISOs, as well as a multilanguage interface.
Everyone, even companies, can use it for free.
It does not include adware or similar malicious components.
Website: http://cdburnerxp.se/
Key Features
• burn all kinds of discs
• audio-CDs with or without gaps between tracks
• burn and create ISO files
• data verification after burning process
• create bootable discs
• multi-language interface
• bin/nrg → ISO converter, simple cover printing and much more!
• Operating Systems: Windows 2000/XP/2003 Server/Vista/Windows 7
Installer without PromoWare (no OpenCandy and/or toolbar)
Multimode installer for easy addon modification.
Available switches and modes (edit entries.ini):
" -gm2 -ai" = SVCPACK silent default install
" -gm2 -ai1" = SVCPACK passive
" -gm2 -ai2" = RunOnceEx passive
" -gm2 -ai3" = RunOnceEx silent
Requires dotNET3.5 or higher
CDburnerXP_4.5.3.4748_AddOn.cab
MD5: BCFBF4481C00F3946A4E77E8C3283836Size: 4,63 MB
Url.: http://ge.tt/api/1/files/5CqdHJd1/0/blob?download -
Microsoft .NET Framework AIO ROE x86 - 20131008
includes:
dotNet Framework 2.0 SP2
KB958481 - Application Compatibility Update
KB976569 - Update for the .NET Framework 2.0 SP2 forward compatibility
KB976576 - Rollup Update
KB976765 - ASP.NET update
KB980773 - NCL update
KB2604092 - Vulnerabilities in .NET Framework Could Allow Remote Code Execution
KB2729450 - Vulnerabilities in .NET Framework Could Allow Remote Code Execution
KB2742596 - Vulnerabilities in .NET Framework Could Allow Elevation of Privilege
KB2789643 - Vulnerabilities in .NET Framework Could Allow Elevation of Privilege
KB2833940 - Vulnerabilities in .NET Framework and Silverlight Could Allow Remote Code Execution
KB2836941v2 - Compatibility and Reliability Update
KB2844285v2 - Vulnerabilities in .NET Framework and Silverlight Could Allow Remote Code Execution
KB2863239 - Vulnerabilities in .NET Framework Could Allow Spoofing
dotNet Framework 3.0 SP2
KB958483 - Application Compatibility Update
KB976570 - Forward Comptibility Update
KB976769 - WCF update
KB977354 - This update will disable the Web Browser ActiveX control (WebOC) when running WPF XAML Browser Applications (XBAPs) in the Firefox browser in partial trust
KB2756918 - Vulnerabilities in .NET Framework Could Allow Elevation of Privilege
KB2832411 - Vulnerabilities in .NET Framework and Silverlight Could Allow Remote Code Execution
KB2861189 - Vulnerabilities in .NET Framework Could Allow Remote Code Execution
dotNet Framework 3.5 SP1
KB953595 - The Visual Basic compiler (Vbc.exe) may use 100 percent of the CPU resources when you build a .NET Framework 3.5-based application that has many assemblies and references
KB958484 - Application Compatibility Update
KB960043 - Dual Branch Servicing
KB963707 - Framework Assistant 1.0 for Firefox
KB982306 - ADO.NET Data Services Update
KB2604111 - Vulnerabilities in .NET Framework Could Allow Remote Code Execution
KB2736416 - Vulnerability in Open Data Protocol Could Allow Denial of Service
KB2836940 - Compatibility and Reliability Update
KB2840629 - Vulnerabilities in .NET Framework and Silverlight Could Allow Remote Code Execution
KB2861697 - Vulnerabilities in .NET Framework Could Allow Remote Code Execution
Other Updates
KB951847 = Microsoft .NET Framework 3.5 Family Service Pack 1
KB959209 = KB958481 + KB958483 + KB958484
KB971276 - You receive incorrect print output if the IPrintPipelineProgressReport interface is used in your printing application
dotNet Framework 4.0 Client Profile
KB2468871 - Update for the .NET Framework 4
KB2533523 - Microsoft .NET Framework 4 Reliability Update 1
KB2600217 - Microsoft .NET Framework 4 Reliability Update 2
KB2604121 - Vulnerabilities in .NET Framework Could Allow Remote Code Execution
KB2656351 - Vulnerabilities in .NET Framework Could Allow Elevation of Privilege
KB2729449 - Vulnerabilities in .NET Framework Could Allow Remote Code Execution
KB2736428 - Vulnerability in Open Data Protocol Could Allow Denial of Service
KB2737019 - Vulnerabilities in .NET Framework Could Allow Elevation of Privilege
KB2742595 - Vulnerabilities in .NET Framework Could Allow Elevation of Privilege
KB2789642 - Vulnerabilities in .NET Framework Could Allow Elevation of Privilege
KB2804576 - Vulnerabilities in .NET Framework Could Allow Spoofing
KB2832407 - Vulnerabilities in .NET Framework and Silverlight Could Allow Remote Code Execution
KB2835393 - Vulnerabilities in .NET Framework and Silverlight Could Allow Remote Code Execution
KB2836939v3 - Compatibility and Reliability Update
KB2840628v2 - Vulnerabilities in .NET Framework and Silverlight Could Allow Remote Code Execution
KB2858302v2 - Vulnerabilities in .NET Framework Could Allow Remote Code Execution
KB2861188 - Vulnerabilities in .NET Framework Could Allow Remote Code Execution
note: if you get nagged by MU/WU for KB961118 and/or KB971314 use my Post-SP3 update pack
or one that does include them. XPSP3_QFE_UpdatePack for Windows XP Post-SP3 (user_hidden)
WIC and MSXML6 have been removed from the installer but is of no issue as they are included in Windows XP SP3.
===================================
Addon for RVMi 1.6 or higher.
Integrate this addon to run the installer at RunOnceEX.
There will be progress boxes but NO user interaction is required.
Passive mode is used since setup takes a while, this way you will know
where you are in the setup process. Final installation will take
place after OOBE and before Personalized settings occur.
Link: Addon_Microsoft.Net_AIO_ROE_20131008.7z
CRC-32: 7a0df040
MD4: c54fd5f6d5de102eaa95b9ca68017687
MD5: 845bbb1c60de66df547a715af2e8a9cd
SHA-1: 4af2cae8a7f2411a222e005d715dcc3ad51d94f9
Date: 20131008
OS: Windows XP SP3 (x86)
Size: 53.9 MB
If you unpack the Addon to get access to the multimode installer you'll have access to the following switches:
-ai = Silent
-ai1 = Passive
/h = displays help
===================================
Some utilities:
Aaron Stebner's .NET Framework Cleanup Utility
Aaron Stebner's .NET Framework Setup Verification Tool
dotNetFWVersionChecker.exe - .NET Framework Setup Verification Tool
Free DotNet VersionCheck Utility
===================================
-
Updated .NET_addons, while waiting for YumeYao's:
Microsoft.Net_1.1SP1+3.5SP1_EN_Addon_20120614.cab
MD5: 9DD5AFA7B5FA66C937BC4D80378D2C90
Size: 38,18 MB
Url.:
Microsoft.Net_Framework.AIO_EN_Addon_20120614.cab
MD5: 2E07525E3F8FEE0227B9FC9B91F0718B
Size: 57,24 MB
Url.:
Without .Net1.1SP1 change " -ai" switch to " -ai1".
Integrate VC++_Runtimes prior to .NET Frameworks
http://www.wincert.n...ntimes-2012-03/
EDIT: Urls removed
http://www.ryanvm.net/forum/viewtopic.php?t=9901
-
Hi!
I've discovered an issue with AIO pack and Microsoft Update!
When you install any .NET update from Microsoft Update, it erases ALL the registry keys which created with MUREGFIX.reg!
Since you - user_hidden - are updating .NET AIO pack instantly, this problem only counts when the users want to update only, without downloading .NET AIO.
When users updating, those registry keys are being deleted, and on next Microsoft Update it will offer old updates!
This problem exists also with Automatic Updates!
You can easily check this by installing aio version 2012-may on a clean windows, and then let MU update.NETs, and next time MU offers .NET SP1!!
I have found a solution for this problem also!
We just need to set READ-ONLY ALL the registry entries in MUREGFIX.reg!
Actually, user_hidden, may i suggest you to put the following into Install.vbs? (in aio installer)
ws.Run("regini.exe MUREGFIX.txt"),0,True
And of course we need a MUREGFIX.txt with contents:
\Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\DC3BF90CC0D3D2F398A9A6D1762F70F3\Patches\C3CFBEEB1B8483A43A5C18AB91FDF504 [8]
\Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\DC3BF90CC0D3D2F398A9A6D1762F70F3\Patches\41A670B5874F6653EBA789C5C326F94A [8]
\Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\DC3BF90CC0D3D2F398A9A6D1762F70F3\Patches\295DC294DD789E13083868560A521636 [8]
\Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\DC3BF90CC0D3D2F398A9A6D1762F70F3\Patches\C9FD711D6B973473EB36750D060F6CEB [8]
\Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\DC3BF90CC0D3D2F398A9A6D1762F70F3\Patches\B4DC2171CF6DE183589FF2E42C91F993 [8]
\Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\DC3BF90CC0D3D2F398A9A6D1762F70F3\Patches\842EF927D05A30F3A80C5CD8B48E1278 [8]
\Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\DC3BF90CC0D3D2F398A9A6D1762F70F3\Patches\4F0D74A71940DEB379AB7649296369EA [8]
\Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\0DC1503A46F231838AD88BCDDC8E8F7C\Patches\E54DA494170E9184E8511E40F1FB0F37 [8]
\Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\0DC1503A46F231838AD88BCDDC8E8F7C\Patches\E6477194989C96F318EC3F37C0DCFA7A [8]
\Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\0DC1503A46F231838AD88BCDDC8E8F7C\Patches\24DF66A32D05A9E3185BCE3E5E3C90A7 [8]
\Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\0DC1503A46F231838AD88BCDDC8E8F7C\Patches\17BB7F68F8EF60333A529FE30E46718B [8]
\Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\0DC1503A46F231838AD88BCDDC8E8F7C\Patches\99700303DBD40833B8036913F16A0EFA [8]
\Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\0DC1503A46F231838AD88BCDDC8E8F7C\Patches\497891D0FB691B933A783D2B3D7B3B31 [8]
\Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\26DDC2EC4210AC63483DF9D4FCC5B59D\Patches\2F2AEE7ADCFB45A45A57B7187A686E85 [8]
\Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\26DDC2EC4210AC63483DF9D4FCC5B59D\Patches\20F5EDFF4E4821134944A4D59567245A [8]
\Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\26DDC2EC4210AC63483DF9D4FCC5B59D\Patches\B2AE9C82DC7B3641BFC887275C4F3607 [8]
\Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\26DDC2EC4210AC63483DF9D4FCC5B59D\Patches\CD065AE440321023B9A06BBD39B64D53 [8]
\Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\26DDC2EC4210AC63483DF9D4FCC5B59D\Patches\13CA5F6F338977E3CAE8E819C0BA93EA [8]
\Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\26DDC2EC4210AC63483DF9D4FCC5B59D\Patches\410EFE49775EB0132B5D96372AD1A809 [8]
\Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\5C1093C35543A0E32A41B090A305076A\Patches\244F2594A1C5BE83C8321BE8EF772EC0 [8]
\Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\5C1093C35543A0E32A41B090A305076A\Patches\4A3FC9E53BDA08038AFB79A682437085 [8]
\Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\5C1093C35543A0E32A41B090A305076A\Patches\52A5BB683CC8EC333A39FC820961282B [8]
\Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\5C1093C35543A0E32A41B090A305076A\Patches\7D9BBE18C3713E234B7741C9D80E574E [8]
\Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\5C1093C35543A0E32A41B090A305076A\Patches\8AE88CE9EBA4C39378DB09AEBBC1C4B9 [8]
\Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\5C1093C35543A0E32A41B090A305076A\Patches\A40CEE61429B0E7379FC24D2ECCFB136 [8]
\Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\5C1093C35543A0E32A41B090A305076A\Patches\AA879D4C8662404369ED692EFA6CF27D [8]
\Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\5C1093C35543A0E32A41B090A305076A\Patches\B99F5A76ABE52183D8E2CB524109DDF3 [8]
\Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\5C1093C35543A0E32A41B090A305076A\Patches\CA1699D599C72A63E90F4376A8DE3548 [8]
\Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\FCDAC0A0AD874C333A05DC1548B97920\Patches\4A3FC9E53BDA08038AFB79A682437085 [8]
\Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\FCDAC0A0AD874C333A05DC1548B97920\Patches\E2653A24E4B84A938BD2CC218F82983E [8]
\Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\FCDAC0A0AD874C333A05DC1548B97920\Patches\7D9BBE18C3713E234B7741C9D80E574E [8]
\Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\FCDAC0A0AD874C333A05DC1548B97920\Patches\CA1699D599C72A63E90F4376A8DE3548 [8]
\Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\FCDAC0A0AD874C333A05DC1548B97920\Patches\244F2594A1C5BE83C8321BE8EF772EC0 [8]
(These are the entries in the current MUREGFIX.reg, which are needed to be set read-only)
"[8]" means read-only for "everyone group".
I don't know if we need read-only for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\clr_optimization_v4.0.30319_32 also (this is actually updated by MU: "Start"=dword:00000003 to -> dword:00000002) and for KB932471.reg also...
Thank you for the great job anyways!
Regards,
Fenyo