Microsoft Update and BigFix

  • Thread starter Thread starter Bill DeShawn
  • Start date Start date
http://dts-l.org/goodpost.htm

--
Peter

Please Reply to Newsgroup for the benefit of others
Requests for assistance by email can not and will not be acknowledged.

"Bill DeShawn" <bdeshawn@nospamsterling.net> wrote in message news:u3KxVbu1HHA.4476@TK2MSFTNGP06.phx.gbl...
> Now a PAID subscription? Is this why BigFix stopped doing free updates?
>
> --
> _________________________
>
> Bill DeShawn
> bdeshawn@nospamsterling.net
> http://my.sterling.net/~bdeshawn
>
>
>
 
Bill DeShawn wrote:
> Now a PAID subscription? Is this why BigFix stopped doing free
> updates?


First off - what are you talking about? Sorry we did not read your mind and
get the part that lead you to this partial tirade - but most of us (even if
we have that ability) cannot tell who/where you are very precisely - and
perhaps cannot do it over such great distances... Reading minds is as much
of an art as a science, you know - and as with everything - has limitations.

Are you talking about this third party product:
http://www.bigfix.com/products/index.html

And which one precisely and what is now a 'paid subscription' that you are
complaining (I guess) about?

--
Shenan Stanley
MS-MVP
--
How To Ask Questions The Smart Way
http://www.catb.org/~esr/faqs/smart-questions.html
 
You don't know what I'm talking about??? How odd. First off. All in the
same week a well-known company that was providing links to free security
updates for Microsoft Office Products as well as Windows XP and Windows
2000, and even Windows 98 and Me, and was doing so for years, has decided to
call it quits as Microsoft announces Microsoft Update as an upgrade to
Windows Update, meaning that security updates for Microsoft products other
than Windows will no longer be free of charge or offered as free downloads.
So, my question is, is microsoft partially responsible for BigFix's decision
to stop the service? Was their desire to capitalize on security and other
broken software "fixes" many of which are needed because Microsoft created
the need in the first place somehow influential? Can Microsoft claim that
the two events were purely coincidental? Don't worry about me. Mr. Small
Potatoes has no influence and nobody is really listening. I just want all
of us who may read this to understand that this can very well be a plan to
create a cycle of mediocrity and have all the computer consumers pay through
the nose for it. Microsoft can make mistake after mistake, then correct it
and charge us ALL for the fixes if we want them. I see this as a dirty
trick.

So, that's my rant. Now I'll stand back and watch while everybody takes a
swing at me (cause this is all my fault).
--
_________________________

Bill DeShawn
bdeshawn@nospamsterling.net
http://my.sterling.net/~bdeshawn


"Bill DeShawn" <bdeshawn@nospamsterling.net> wrote in message
news:u3KxVbu1HHA.4476@TK2MSFTNGP06.phx.gbl...
> Now a PAID subscription? Is this why BigFix stopped doing free updates?
>
> --
> _________________________
>
> Bill DeShawn
> bdeshawn@nospamsterling.net
> http://my.sterling.net/~bdeshawn
>
>
>
 
Bill DeShawn wrote:
> You don't know what I'm talking about??? How odd. First off. All
> in the same week a well-known company that was providing links to
> free security updates for Microsoft Office Products as well as
> Windows XP and Windows 2000, and even Windows 98 and Me, and was
> doing so for years, has decided to call it quits as Microsoft
> announces Microsoft Update as an upgrade to Windows Update, meaning
> that security updates for Microsoft products other than Windows
> will no longer be free of charge or offered as free downloads. So,
> my question is, is microsoft partially responsible for BigFix's
> decision to stop the service? Was their desire to capitalize on
> security and other broken software "fixes" many of which are needed
> because Microsoft created the need in the first place somehow
> influential? Can Microsoft claim that the two events were purely
> coincidental? Don't worry about me. Mr. Small Potatoes has no
> influence and nobody is really listening. I just want all of us
> who may read this to understand that this can very well be a plan
> to create a cycle of mediocrity and have all the computer consumers
> pay through the nose for it. Microsoft can make mistake after
> mistake, then correct it and charge us ALL for the fixes if we want
> them. I see this as a dirty trick.
> So, that's my rant. Now I'll stand back and watch while everybody
> takes a swing at me (cause this is all my fault).


Who said it was *your fault*...

It was merely pointed out to you that you came out ranting about something -
yet never explained yourself. I've seen people do that - usually they are
roaming the streets with their shopping carts or in a certain area of the
hospitals... Not saying you are one of those people - but you cannot
TRUTHFULLY say that you expected the millions of people around the world
with access to these newsgroups to have any clue what you were talking about
with the little information you provided in the origiinal post.

It's like coming out and saying, "They went and did it.. They finally went
and did it!" Who is they and what did they do?

It's not like the updates weren't freely available before. It's not like
there aren't products built into Microsoft Servers (or can be installed
freely) that can push out (and give control of said pushing out) update to
many computers in an organization. It's not like the updates are difficult
to get... It's not like any of the critical updates for any Microsoft
product costs you a dime to get (well - other than maybe your ISP charges.)

You act like this service was unique or even necessary or easier than the
other free methods out there...

Let me help you out...

Here's some Updates for Windows XP - from SP2 until about April 2007...
(If given a choice - be an IT Administrator to get to the standalone update
file.)

Direct Download of Service Pack 2 (SP2) for Windows XP
http://snipurl.com/8bqy

Critical Updates
----------------------
Released: -- [ Web Page Address ] -- Description:
9/14/2004 -- [ http://support.microsoft.com/kb/885626 ]
-- Critical Update for Windows XP
11/22/2004 -- [ http://support.microsoft.com/kb/887742 ]
-- Update for Windows XP
12/13/2004 -- [ http://support.microsoft.com/kb/885835 ]
-- Security Update for Windows XP
12/13/2004 -- [ http://support.microsoft.com/kb/885836 ]
-- Security Update for Windows XP
12/13/2004 -- [ http://support.microsoft.com/kb/886185 ]
-- Critical Update for Windows XP
12/13/2004 -- [ http://support.microsoft.com/kb/873339 ]
-- Security Update for Windows XP
2/7/2005 -- [ http://support.microsoft.com/kb/891781 ]
-- Security Update for Windows XP
2/7/2005 -- [ http://support.microsoft.com/kb/888302 ]
-- Security Update for Windows XP
2/7/2005 -- [ http://support.microsoft.com/kb/887472 ]
-- Security Update for Windows Messenger
4/11/2005 -- [ http://support.microsoft.com/kb/890859 ]
-- Security Update for Windows XP
5/18/2005 -- [ http://support.microsoft.com/kb/894391 ]
-- Update for Windows XP
5/24/2005 -- [ http://support.microsoft.com/kb/896344 ]
-- Update for Windows XP
6/13/2005 -- [ http://support.microsoft.com/kb/896358 ]
-- Security Update for Microsoft Windows XP
6/13/2005 -- [ http://support.microsoft.com/kb/896428 ]
-- Security Update for Windows XP
6/24/2005 -- [ http://support.microsoft.com/kb/900930 ]
-- Update for Windows XP
6/27/2005 -- [ http://support.microsoft.com/kb/898461 ]
-- Update for Windows XP
7/11/2005 -- [ http://support.microsoft.com/kb/901214 ]
-- Security Update for Windows XP
8/8/2005 -- [ http://support.microsoft.com/kb/896423 ]
-- Security Update for Windows XP
8/8/2005 -- [ http://support.microsoft.com/kb/899587 ]
-- Security Update for Windows XP
8/8/2005 -- [ http://support.microsoft.com/kb/899591 ]
-- Security Update for Windows XP
8/8/2005 -- [ http://support.microsoft.com/kb/893756 ]
-- Security Update for Windows XP
10/10/2005 -- [ http://support.microsoft.com/kb/901017 ]
-- Security Update for Windows XP
10/10/2005 -- [ http://support.microsoft.com/kb/902400 ]
-- Security Update for Windows XP
10/10/2005 -- [ http://support.microsoft.com/kb/905749 ]
-- Security Update for Windows XP
10/10/2005 -- [ http://support.microsoft.com/kb/905414 ]
-- Security Update for Windows XP
10/10/2005 -- [ http://support.microsoft.com/kb/900725 ]
-- Security Update for Windows XP
12/12/2005 -- [ http://support.microsoft.com/kb/910437 ]
-- Update for Windows XP
12/13/2005 -- [ http://support.microsoft.com/kb/904706 ]
-- Security Update for Windows XP
1/9/2006 -- [ http://support.microsoft.com/kb/908519 ]
-- Security Update for Windows XP
2/13/2006 -- [ http://support.microsoft.com/kb/911927 ]
-- Security Update for Windows XP
4/10/2006 -- [ http://support.microsoft.com/kb/911562 ]
-- Security Update for Windows XP
4/18/2006 -- [ http://support.microsoft.com/kb/904942 ]
-- Update for Windows XP
4/25/2006 -- [ http://support.microsoft.com/kb/900485 ]
-- Update for Windows XP
4/25/2006 -- [ http://support.microsoft.com/kb/908531 ]
-- Security Update for Windows XP
5/9/2006 -- [ http://support.microsoft.com/kb/913580 ]
-- Security Update for Windows XP
6/6/2006 -- [ http://support.microsoft.com/kb/916595 ]
-- Update for Windows XP
6/8/2006 -- [ http://support.microsoft.com/kb/918439 ]
-- Vulnerability in ART Image Rendering Could Allow Remote Code
Execution in Internet Explorer for Windows XP SP2
6/12/2006 -- [ http://support.microsoft.com/kb/914389 ]
-- Security Update for Windows XP
6/12/2006 -- [ http://support.microsoft.com/kb/917953 ]
-- Security Update for Windows XP
6/13/2006 -- [ http://support.microsoft.com/kb/917344 ]
-- JScript 5.6 Security Update for Windows XP SP1 and SP2
6/27/2006 -- [ http://support.microsoft.com/kb/911280 ]
-- Security Update for Windows XP
7/10/2006 -- [ http://support.microsoft.com/kb/917159 ]
-- Security Update for Windows XP
7/10/2006 -- [ http://support.microsoft.com/kb/914388 ]
-- Security Update for Windows XP
8/7/2006 -- [ http://support.microsoft.com/kb/917422 ]
-- Security Update for Windows XP
8/7/2006 -- [ http://support.microsoft.com/kb/920670 ]
-- Security Update for Windows XP
8/7/2006 -- [ http://support.microsoft.com/kb/922616 ]
-- Security Update for Windows XP
8/7/2006 -- [ http://support.microsoft.com/kb/920683 ]
-- Security Update for Windows XP
8/17/2006 -- [ http://support.microsoft.com/kb/920872 ]
-- Update for Windows XP
9/11/2006 -- [ http://support.microsoft.com/kb/920685 ]
-- Security Update for Windows XP
9/11/2006 -- [ http://support.microsoft.com/kb/922582 ]
-- Update for Windows XP
9/11/2006 -- [ http://support.microsoft.com/kb/919007 ]
-- Security Update for Windows XP
10/9/2006 -- [ http://support.microsoft.com/kb/922819 ]
-- Security Update for Windows XP
10/9/2006 -- [ http://support.microsoft.com/kb/924496 ]
-- Security Update for Windows XP
10/9/2006 -- [ http://support.microsoft.com/kb/923414 ]
-- Security Update for Windows XP
10/9/2006 -- [ http://support.microsoft.com/kb/923191 ]
-- Security Update for Windows XP
11/14/2006 -- [ http://support.microsoft.com/kb/920213 ]
-- Vulnerability in Microsoft Agent could allow remote code
execution
11/14/2006 -- [ http://support.microsoft.com/kb/923789 ]
-- Vulnerabilities in Macromedia Flash Player from Adobe
could allow remote code execution
11/14/2006 -- [ http://support.microsoft.com/kb/924270 ]
-- Vulnerability in Workstation Service could allow
remote code execution
11/14/2006 -- [ http://support.microsoft.com/kb/928088 ]
-- Vulnerability in Microsoft XML Core Services could
allow remote code execution
11/14/2006 -- [ http://support.microsoft.com/kb/923980 ]
-- Vulnerability in the Client Service could allow remote code
execution
12/12/2006 -- [ http://support.microsoft.com/kb/926247 ]
-- Vulnerability in Simple Network Management Protocol (SNMP)
could allow remote code execution
12/12/2006 -- [ http://support.microsoft.com/kb/926255 ]
-- Vulnerability in Windows could allow elevation of privilege
12/12/2006 -- [ http://support.microsoft.com/kb/923694 ]
-- Cumulative security update for Outlook Express
1/9/2007 -- [ http://support.microsoft.com/kb/929969 ]
-- Vulnerability in Vector Markup Language
Could Allow Remote Code Execution
* If you have installed IE7, also install the IE7 version
of this patch!
2/13/2007 -- [ http://support.microsoft.com/kb/928255 ]
-- Vulnerability in Windows Shell Could Allow Elevation
of Privilege
2/13/2007 -- [ http://support.microsoft.com/kb/927802 ]
-- Vulnerability in Windows Image Acquisition Service
Could Allow Elevation of Privilege
2/13/2007 -- [ http://support.microsoft.com/kb/928843 ]
-- Vulnerability in HTML Help ActiveX Control Could
Allow Remote Code Execution
2/13/2007 -- [ http://support.microsoft.com/kb/927779 ]
-- Vulnerability in Microsoft Data Access Components
Could Allow Remote Code Execution
2/13/2007 -- [ http://support.microsoft.com/kb/926436 ]
-- Vulnerability in Microsoft OLE Dialog Could Allow
Remote Code Execution
2/13/2007 -- [ http://support.microsoft.com/kb/924667 ]
-- Vulnerability in Microsoft MFC Could Allow Remote
Code Execution
2/13/2007 -- [ http://support.microsoft.com/kb/918118 ]
-- Vulnerability in Microsoft RichEdit Could Allow
Remote Code Execution
2/13/2007 -- [ http://support.microsoft.com/kb/928090 ]
-- Cumulative Security Update for Internet Explorer
* If you have IE7, obtain that version of this update.
4/3/2007 -- [ http://support.microsoft.com/kb/925902 ]
-- Vulnerabilities in GDI Could Allow Remote Code Execution
4/10/2007 -- [ http://support.microsoft.com/kb/931261 ]
-- Vulnerability in Universal Plug and Play Could
Allow Remote Code Execution
4/10/2007 -- [ http://support.microsoft.com/kb/932168 ]
-- Vulnerability in Microsoft Agent Could Allow Remote
Code Execution
4/10/2007 -- [ http://support.microsoft.com/kb/930178 ]
-- Vulnerabilities in CSRSS Could Allow Remote Code
Execution
4/10/2007 -- [ http://support.microsoft.com/kb/931784 ]
-- Vulnerability in Windows Kernel Could Allow
Elevation of Privilege

Media Player:
-------------------
Released: -- [ Web Page Address: ] -- Description:
9/2/2004 -- [ http://go.microsoft.com/fwlink/?LinkId=30984 ]
-- Windows Media Player 10
11/7/2005 -- [ http://support.microsoft.com/kb/902344 ]
-- Update for WMDRM-enabled Media Players
2/13/2006 -- [ http://support.microsoft.com/kb/911564 ]
-- Security Update for Windows Media Player Plug-in
4/11/2006 -- [ http://support.microsoft.com/kb/911565 ]
-- Security Update for Windows Media Player 10 for Windows XP
6/12/2006 -- [ http://support.microsoft.com/kb/917734 ]
-- Security Update for Windows Media Player 10 for Windows XP
12/12/2006 -- [ http://support.microsoft.com/kb/923689 ]
-- Vulnerability in Windows Media Format Could Allow Remote
Code Execution

..NET Framework:
------------------------
Released: -- [ Web Page Address: ] -- Description:
3/30/2004 -- [ http://snipurl.com/10bde ]
-- Microsoft .NET Framework Version 1.1 Redistributable Package
8/30/2004 -- [ http://support.microsoft.com/kb/885055 ]
-- Microsoft .NET Framework 1.1 Service Pack 1
2/8/2005 -- [ http://support.microsoft.com/kb/887219 ]
-- ASP.NET Security Update for Microsoft NET Framework 1.1
Service Pack 1
3/22/2006 -- [ http://snipurl.com/10bdv ]
-- Microsoft .NET Framework Version 2.0 Redistributable
Package (x86)
7/11/2006 -- [ http://support.microsoft.com/kb/917283 ]
-- NDP 2.0 ASP.Net Security Update
10/10/2006 -- [ http://support.microsoft.com/kb/922770 ]
-- NET Framework 2.0 SYSTEM.WEB.DLL Security Update

Other Updates:
---------------------
Released: -- [ Web Page Address: ] -- Description:
9/14/2004 -- [ http://support.microsoft.com/kb/873374 ]
-- Microsoft GDI+ Detection Tool
9/2/2005 -- [ http://support.microsoft.com/kb/893803 ]
-- Windows Installer 3.1 Redistributable (v2)
10/14/2005 -- [ http://snipurl.com/10bex ]
-- Windows Media Connect 2.0
11/29/2005 -- [ http://support.microsoft.com/kb/909520 ]
-- Microsoft Base Smart Card Cryptographic Service Provider
Package: x86
10/10/2006 -- [ http://support.microsoft.com/kb/890830 ]
-- Microsoft® Windows® Malicious Software Removal Tool
- November 2006

Purely OPTIONAL:
----------------------
10/18/2006 -- [ http://www.microsoft.com/windows/ie/downloads/ ]
-- Internet Explorer 7.0
10/30/2006 -- [ http://snipurl.com/167ea ]
-- Media Player 11
12/8/2006 -- [ http://support.microsoft.com/kb/925876 ]
-- Remote Desktop Connection 6.0 client

Want to know how to get more?

Each month Microsoft releases that month's updates in ISO format:
January 2006-current
http://support.microsoft.com/kb/913086

If you are more trusting:

AutoPatcher
http://www.autopatcher.com/

Windows Updates Downloader
http://wud.jcarle.com/

You can download each update manually - based off the KB Article number,
etc. That way you can back it up/burn a CD of them in case you need them or
use them to keep a slipstream/integrated (updated) Windows XP CD.

How to use the Windows Update Catalog
http://support.microsoft.com/kb/323166
(In order to use the Windows Update Catalog, you must use IE to get the
patches..)

Windows Update Catalog
http://v4.windowsupdate.microsoft.com/catalog/en/default.asp
(In order to use the Windows Update Catalog, you must use IE to get the
patches..)

Creating an Integrated Installation
http://snipurl.com/el43

Integrate software updates into your Windows installation source files
http://support.microsoft.com/kb/828930

Really customize your CD..
http://unattended.msfn.org/

Produce an up-to-date XP Distribution CD
http://xpcreate.com/

AutoStreamer
http://www.neowin.net/forum/index.php?showtopic=223562

You can see the critical (security and other) patches released for a given
month using the following:

http://www.microsoft.com/technet/security/bulletin/ms##-***.mspx

At the end of this line you see "ms##-***.mspx" .. If you simply replace ##
with the two-digit year and the *** with the three character month
abbreviation, you will see the list of "critical" and "important" patches
for that month (since it only happens once a month usually, if you check by
the second Tuesday (wait until afternoon) of each month - you should be
fine) - note that future months will not work.

As an example...

December 2004's patches..
http://www.microsoft.com/technet/security/bulletin/ms04-dec.mspx

March 2005's patches..
None released.. so that one will fail...

May 2006's patches..
http://www.microsoft.com/technet/security/bulletin/ms06-may.mspx

January 2007's patches..
http://www.microsoft.com/technet/security/bulletin/ms07-jan.mspx


Once you get on the page with each month's list of patches.. You can go to
the related KB articles and grab the appropriate files from there.

Need Microsoft Office updates?
http://office.microsoft.com/en-us/downloads/maincatalog.aspx

What is it exactly you are babbling about?
Windows Update/Microsoft update thing happened... a LONG time ago now.

Please - if there is something you do not understand - ask about it,
understand it - then rant away.... Did you lose your job at whatever company
you are ranting about or something?

--
Shenan Stanley
MS-MVP
--
How To Ask Questions The Smart Way
http://www.catb.org/~esr/faqs/smart-questions.html
 
Back
Top