Friday 3 March 2017

Extended XP :Lets patch XP for newer apps

==================================================================================
# Special thanks to 5eraph and Ramsey (admin of zone54)
#Special thanks to My close friends BHlPT, Dencorso , FranceBB , GreenhillManiac , 5eraph , neverseen , tomy , Samuka ,Rloew,neverseen,Dubby,Overflow
#Special thanks to neverseen for support
#Special thanks to FranceBB for testing
#Special thanks to everyone who use and love Xp
#Special thanks to great moders like Rloew, BlackWingCat ,Wildbill
#Special Thanks to Syvet for WineD3D
#Special Thanks to wine and reactos team.
# Special to user_hidden for update pack
# Special  thanks to harkaz & tomasz86 for their repacking skills
#Special thanks to leecher , jumper ,tumagonx
# -------------------------------------------------------------------------------------------------------------------------------------------------------------------
# This file contains a list of all entries that need to be added to various Windows
# Thanks a  lot to all guys/gals of zone62,msfn,driverpackforum, ryanvm forum,wincert,overclocker.
# Greatest respect and thanks to nuhi for nlite and Ryan ,Signet for RVMi
===================================================================================
ExtendedXP ::
ExtendedXP is a compability layer based on patching official system files .
It aims at adding missing api that does not exists in XP but in newer version of windows.
Most of the people may be thinking why a person need to take so much hectic job , programs simply can be run by upgrading to newer versions of windows like 7/8/10.
XP is needed in real life . It is very fast and stable if we compare with newer version of windows . It is one of the most secure version of windows as newer
secuirity risks depends on features of vista and up.
Note :: It is not a official MS Product . Its a gift from loyal Windows XP community
ExtendedXP Version :: 1.0
Update Type :: Platform update (Unofficial)
Added Function to Kernel32.dll
AcquireSRWLockExclusive
AcquireSRWLockShared
InitializeSRWLock 
ReleaseSRWLockExclusive 
ReleaseSRWLockShared
TryAcquireSRWLockExclusive
TryAcquireSRWLockShared
QueryThreadCycleTime
SetThreadStackGuarantee
InitializeCriticalSectionEx
FlsAlloc
FlsFree
FlsGetValue
FlsSetValue
GetTickCount64
K3EmptyWorkingSet
K32EnumDeviceDrivers
K32EnumPageFilesA
K32EnumPageFilesW
K32EnumProcesses
K32EnumProcessModules
K32EnumProcessModulesEx
K32GetDeviceDriverBaseNameA
K32GetDeviceDriverBaseNameW
K32GetDeviceDriverFileNameA
K32GetDeviceDriverFileNameW
K32GetMappedFileNameA
K32GetMappedFileNameW
K32GetModuleBaseNameA
K32GetModuleBaseNameW
K32GetModuleFileNameExA
K32GetModuleFileNameExW
K32GetModuleInformation
K32GetPerformanceInfo
K32GetProcessImageFileNameA
K32GetProcessImageFileNameW
K32GetProcessMemoryInfo
K32GetWsChanges
K32GetWsChangesEx
K32InitializeProcessForWsWatch
K32QueryWorkingSet
K32QueryWorkingSetEx
Windows Symbolic Debugger Engine 6.2.9200.16384
Windows Image Helper 6.2.9200.16384
Symbolic Debugger for Windows 6.2.9200.16384
Desktop Window Manager API 6.0.6000.16386
Microsoft GDI+ 6.0.6002.23998
Visual Basic Virtual Machine 6.00.9832
Windows NT IOStreams DLL 7.0.6000.16386
Windows NT C++ Runtime Library DLL 7.0.6000.16386
Windows NT CRT DLL 7.0.6002.22755
MSXML 6.0 SP3 6.30.7601.22640
Process Status Helper 6.0.6000.16386
Uniscribe Unicode script processor 1.0626.7601.22666
Version Checking and File Installation Libraries 6.0.6002.18005
Rich Text Edit Control, v4.1 v5.41.21.2512
Microsoft(R) Delta Package Expander 6.1.7601.23505
Microsoft Patch Engine 6.1.7601.23505
Microsoft File Patch Application API 6.1.7601.23505
Microsoft XmlLite Library 1.3.1001.0
LZ Expansion Utility 6.1.7600.16385
Download here:
http://www78.zippyshare.com/v/dq8PL157/file.html]WindowsXP-KB3126593-v3-x86-ENU.exe
CRC32: 22BCF46E
MD5: 11867F902F15C909E66A639CE86FD18E
SHA-1: E96F54413DF0688B801D16B151A978DC79039F70

Sunday 11 December 2016

does xp is really vulnerable?


does xp is really vulnerable?

Tech writers went mad in saying XP is not secure but truth is something different.
http://news.softpedia.com/news/living-in-the-past-windows-xp-powering-9-out-of-10-pcs-in-uk-hospitals-510844.shtml
 Not only softpedia but also Zdnets and others also in full form to insult XP.
There are few millions of exploit kit in black markets which effect vista and up but cannot do anything with 2000/XP/2003.
Few months ago Korean hackers found vulnerabilities in dwmapi but Microsoft still now not patched knowing it . Dwmapi exists in Vista and up systems not in XP . This vulnerability is used by hundreds of cryptologers to get into pc . More over Kernel32 function FLSALLOC (Exists in vista and up system) found vulnerable but still now it is not patched by Microsoft over 8 years.
One of My XP pc there is no antivirus  still now i have not faced any virus but my windows 7 laptop with Norton internet security got infected 8 time in year.
As per this there is no vulnerability for xp found in 2016 .
 http://techtalk.gfi.com/2015s-mvps-the-most-vulnerable-players/
as per this test windows xp not in top 15 places .
According to the U.S. National Vulnerability Database, there were three new Windows XP Common Vulnerabilities and Exposures (CVEs) discovered from April to December 2014, one new CVE discovered in 2015, and none so far in 2016.
Compare that to Windows 7, which had 30 new CVEs discovered April-December 2014, 147 new CVEs in all of 2015 (no doubt thanks to Microsoft's "Get Windows 10 App" nagware), and 126 new CVEs so far in 2016.
Windows 7 and up systems your privacy is going to hell due to some nsa backdoors and some updates introduced by Microsoft read more here
Even Windows Server 2003 quite same to xp is less vulnerable than debian linux . As xp and 2003 are patched for decades .
http://www.infoworld.com/article/2981947/microsoft-windows/the-truth-about-windows-7-and-81-spy-patches-kb-3068708-3022345-3075249-and-3080149.html \
My recommendation for XP users:-
*Apply Posready 2009 update tricks . XP sp3 and posready2009 uses same kernel so there is no problem
*Keep your all sense open because user is the biggest vulnerability which cannot be patched