Backup of 揮発性記憶領域/hfslip (3) Back


Back to History list

#navi(../)
*hfslipのWindowsXP用Hotfixのリンク先 [#ee4e949f]
http://users.telenet.be/tc76/winup/_winxpsp2.htmlに記載されているアドレスの日本語版のアドレス

:HFCABS|CAB圧縮ファイルファイルを入れる。(Flash等の.CAB形式のActiveXコンポーネントもここ。)
:HFSVCPACK_SW|メディアプレイヤーなど

''サービスパック''
-[[IT プロフェッショナルおよび開発者用 Windows XP Service Pack 2 ネットワーク インストール パッケージ>http://www.microsoft.com/downloads/details.aspx?displaylang=ja&FamilyID=049C9DBE-3B8E-4F30-8245-9E368D3CDB5A]]

''ブラウザ''
-[[Internet Explorer 7>http://www.microsoft.com/japan/windows/ie/default.mspx]]
-[[Windows Script 5.6>http://www.microsoft.com/downloads/details.aspx?displaylang=ja&FamilyID=C717D943-7E4B-4622-86EB-95A22B832CAA]]
-[[MSXML2>http://support.microsoft.com/kb/823490/]] + [[MSXML2 Update>http://support.microsoft.com/kb/887606/]]
-[[Microsoft XML Core Services 4.0 の脆弱性により、リモートでコードが実行される>http://www.microsoft.com/downloads/details.aspx?displaylang=ja&FamilyID=24B7D141-6CDF-4FC4-A91B-6F18FE6921D4]]
-[[Microsoft XML Core Services 6.0 の脆弱性により、リモートでコードが実行される (927977)>http://www.microsoft.com/downloads/details.aspx?displaylang=ja&FamilyID=9AE7F4E9-8228-4098-AF71-49C35684C17E]]
-[[Adobe Flash Player for IE>http://fpdownload.macromedia.com/get/flashplayer/current/swflash.cab]]

''DirectX''
-[[DirectX End-User Runtimes - 日本語>http://www.microsoft.com/downloads/details.aspx?displaylang=ja&FamilyID=4b1f5d0c-5e44-4864-93cd-464ef59da050]]
>対象ファイル:*d3dx9*x86.cab,*d3dx10*x86.cab,*XACT*x86.cab ,*xinput*x86.cab&br;
表示されるファイルの内、d3dx9とd3dx10の名前がつくファイルのみ
<

''メディアプレイヤー''
-[[Windows Media Player>http://www.microsoft.com/downloads/Browse.aspx?displaylang=ja&categoryid=4]]
-[[DRM 対応メディア プレーヤー用更新プログラム>http://www.microsoft.com/downloads/details.aspx?displaylang=ja&FamilyID=73C2650F-BE61-4BD6-8408-1FD6E7827CD8]]
-[[WindowsXP MCE 2005用ロールアップ修正プログラム2>http://www.microsoft.com/downloads/details.aspx?displaylang=ja&FamilyID=e5daf37e-e243-4410-bc51-81cf2b56fe6e]]
-[[HighMAT サポート CD 書き込みウィザード>http://www.microsoft.com/downloads/details.aspx?displaylang=ja&FamilyID=2ddf1550-1c5c-44b3-87fc-9c6b37403c35]]

''Microsoftからダウンロード''
-[[Windows Genuine Advantage>http://go.microsoft.com/fwlink/?linkid=39204]] [*.CAB]
-[[パッケージインストーラー6.1.22.4>http://www.microsoft.com/downloads/details.aspx?displaylang=ja&FamilyID=50C334E1-9A67-4B99-A65A-069B79267856]]
-[[Office Genuine Advantage>http://go.microsoft.com/fwlink/?linkid=67633]] [*.CAB]
-[[Offceテンプレート、メディアコントロール>http://office.microsoft.com/templates/IEAWSDC.CAB]] [*.CAB]
-[[Windows Update Agent 2.0>http://download.windowsupdate.com/v6/windowsupdate/redist/standalone/WindowsUpdateAgent20-x86.exe]]((解説:[[Windows Updateオフラインスキャンファイルの新しいバージョンについて>http://support.microsoft.com/default.aspx/kb/926464/ja]])) [*.CAB]
-[[Microsoft Update engine>Microsoft Update engine]]

''Microsoftからダウンロード(上級者向け)''
-[[Windows Update v4>http://v4.windowsupdate.microsoft.com/CAB/x86/unicode/IUCTL.CAB]] [*.CAB]
-[[Office Update engine>http://office.microsoft.com/officeupdate/content/OPUC4.CAB]] [*.CAB]&br;
別途[[modifyPE.exe>ftp://ftp.sac.sk/pub/sac/utilprog/modpe081.zip]]をHFTOOLS内に入れる必要あり

''そのほか''
-[[Roots Certificate Update>http://www.download.windowsupdate.com/msdownload/update/v3-19990518/cabpool/rootsupd_963ec3df48991128f4edd42c66f40f144720f759.exe]] [*.EXE]
-[[Microsoft&reg; Windows&reg; 悪意のあるソフトウェアの削除ツール>http://www.microsoft.com/downloads/details.aspx?displaylang=ja&FamilyID=AD724AE0-E72D-4F54-9AB3-75B8EB148356]]
-[[WGA 通知>Windows Genuine Advantage Notifications]] [*.exe]

*HFディレクトリに以下のファイルをダウンロード [#a7fac080]

-[[HMTCDWizard_JPN.exe>http://www.microsoft.com/downloads/details.aspx?displaylang=ja&FamilyID=2ddf1550-1c5c-44b3-87fc-9c6b37403c35]] - HighMAT update for the CD Writing Wizard
-&ref(http://download.microsoft.com/download/b/7/a/b7aef6b4-e20f-402c-b1aa-11012ea259ae/IE7-KB928090-WindowsXP-x86-enu.exe); - Cumulative security update for MSIE7
-&ref(http://download.microsoft.com/download/3/4/5/3457d688-0fad-4232-922e-a038bd7d7a5d/IE7-KB929969-WindowsXP-x86-jpn.exe); - Vulnerability in Vector Markup Language
-&ref(http://download.microsoft.com/download/d/4/8/d488b16c-877d-474d-912f-bb88e358055d/IE7-WindowsXP-x86-jpn.exe); - Internet Explorer 7
-[[wmp11-windowsxp-x86-JA-JP.exe>http://www.microsoft.com/downloads/details.aspx?FamilyID=1d224714-e238-4e45-8668-5166114010ca&DisplayLang=ja]] - Windows Media Player11
-&ref(http://download.microsoft.com/download/8/d/f/8df27d67-e899-4b0c-9c54-fb304ce7a2b3/msxml2.msi); - MSXML2 (msxml2r.dll)
-&ref(http://download.microsoft.com/download/2/6/d/26d27fdc-ce0b-4225-8d7e-94e93f59323f/msxml2sp6-kb887606-x86-jpn.exe); - MSXML2 update (msxml2.dll)
-&ref(http://download.microsoft.com/download/1/9/9/199fa22d-70fc-45d5-9328-acca89647379/msxml4-KB927978-jpn.exe); - MSXML4 (msxml4.dll, msxml4r.dll)
-&ref(http://download.microsoft.com/download/c/4/9/c49e4f49-a11e-413d-8051-17d9470d0a65/msxml6-KB927977-jpn-x86.exe); - MSXML6 (msxml6.dll, msxml6r.dll)
-&ref(http://www.download.windowsupdate.com/msdownload/update/v3-19990518/cabpool/rootsupd_963ec3df48991128f4edd42c66f40f144720f759.exe); - Roots Certificate Update
-[[WindowsInstaller-KB893803-v2-x86.exe>http://www.microsoft.com/downloads/details.aspx?displaylang=ja&FamilyID=889482FC-5F56-4A38-B838-DE776FD4138C]] - Windows Installer 3.1 Redistributable (v2)
-&ref(http://download.microsoft.com/download/4/a/a/4aa524c6-239d-47ff-860b-5b397199cbf8/Windows-KB890830-V1.26.exe); - Malicious Software Removal Tool (multilingual)
-[[Windows-KB909520-v1.000-x86-JPN.exe>http://www.microsoft.com/downloads/details.aspx?displaylang=ja&FamilyID=e8095fd5-c7e5-4bee-9577-2ea6b45b41c6]] - Update for Microsoft Base Smart Card CSP
-&ref(http://download.microsoft.com/download/0/1/9/019ef9ba-392a-46ea-b0a3-94a197e16461/WindowsMedia6-KB925398-x86-JPN.exe); - Vulnerability in Windows Media Format (WMP6)
-&ref(http://download.microsoft.com/download/6/d/4/6d4a04ae-dcaf-45d4-8930-1e2c70887921/WindowsMedia9-KB917734-x86-JPN.exe); - Vulnerability in Windows Media Player
-&ref(http://download.microsoft.com/download/2/d/5/2d55d5dd-3708-46ef-9933-76b48743510d/WindowsMedia-KB911564-x86-JPN.exe); - Vulnerability in Windows Media Player plug-in
-&ref(http://download.microsoft.com/download/1/5/0/150785e3-48d7-40b0-b7f8-564f75a3d680/WindowsRightsManagementServicesSP2-KB917275-Client-JPN-x86.exe); - Windows Rights Management Services Client
-&ref(http://download.windowsupdate.com/v6/windowsupdate/redist/standalone/WindowsUpdateAgent20-x86.exe); - Windows Update Agent 2.0
-&ref(http://download.microsoft.com/download/5/c/5/5c5b703b-98ea-46a2-ba68-fb64db4d3c26/WindowsXP-KB835935-SP2-JPN.exe); - Windows XP Service Pack 2
-&ref(http://download.microsoft.com/download/b/6/9/b699023d-0258-4a65-80fe-1ef7fed55acc/WindowsXP-KB873339-x86-JPN.exe); - Vulnerability in HyperTerminal
-&ref(http://download.microsoft.com/download/8/9/b/89b33bef-7a51-4d8a-8b2d-4dfda65afd86/WindowsXP-KB885626-v2-x86-jpn.exe); - Systems running Prescott C-0 w/o BIOS support
-&ref(http://download.microsoft.com/download/f/a/a/faaf8a53-7adf-4e4a-82fd-7d5d24224b3e/WindowsXP-KB885836-x86-JPN.exe); - Vulnerability in WordPad
-&ref(http://download.microsoft.com/download/a/0/a/a0a9ed8d-1b34-4f33-b81d-e0e850ee2811/WindowsXP-KB886185-x86-jpn.exe); - Vulnerability in Windows Firewall
-&ref(http://download.microsoft.com/download/3/0/8/30890bee-a68f-4838-870d-7b78558d966a/WindowsXP-KB887472-x86-jpn.exe); - Vulnerability in Windows Messenger
-&ref(http://download.microsoft.com/download/6/5/8/658d2c7a-ca71-4b0f-a4d0-43e354b40dd2/WindowsXP-KB888302-x86-JPN.exe); - Vulnerability in Windows
-&ref(http://download.microsoft.com/download/2/f/4/2f417f76-0bde-45fb-860a-3df3a42810aa/WindowsXP-KB890859-x86-JPN.exe); - Vulnerabilities in Windows kernel
-&ref(http://download.microsoft.com/download/e/2/3/e23cb705-9109-4b4c-abc2-ad756b8fc0a3/WindowsXP-KB891781-x86-JPN.exe); - Vulnerability in DHTML Editing (ActiveX control)
-&ref(http://download.microsoft.com/download/4/c/1/4c10ddfb-83f2-4f6a-8559-bc371610634a/WindowsXP-KB893756-x86-JPN.exe); - Vulnerability in Telephony service
-[[WindowsXP-KB896344-v2-x86-JPN.exe>http://www.microsoft.com/downloads/details.aspx?displaylang=ja&FamilyID=6C2F2318-CBDB-47C0-B7C2-77C4CC37A450]] - Cannot transfer from XPSP2 32-bit to XP 64-bit
-&ref(http://download.microsoft.com/download/8/3/e/83e7ee61-db33-4112-a35e-98cd8b455de8/WindowsXP-KB896358-x86-JPN.exe); - Vulnerability in HTML Help
-&ref(http://download.microsoft.com/download/3/4/7/3473ce22-eca3-41a5-935d-d5c9c528222b/WindowsXP-KB896423-x86-JPN.exe); - Vulnerability in Print Spooler service
-&ref(http://download.microsoft.com/download/3/7/5/375d3de3-56a5-4461-8096-b28df911883a/WindowsXP-KB896424-x86-JPN.exe); - Vulnerabilities in graphics rendering engine
-&ref(http://download.microsoft.com/download/d/0/9/d09697d6-19dd-42c6-aa26-63819be5eaf2/WindowsXP-KB896428-x86-JPN.exe); - Vulnerability in Telnet Client
-[[WindowsXP-KB898461-x86-JPN.exe>http://www.microsoft.com/downloads/details.aspx?displaylang=ja&FamilyID=50C334E1-9A67-4B99-A65A-069B79267856]] - Package Installer 6.1.22.4
-&ref(http://download.microsoft.com/download/c/2/d/c2da9f92-22b3-410d-ac5d-22c7b7c67428/WindowsXP-KB899587-x86-JPN.exe); - Vulnerabilities in Kerberos
-&ref(http://download.microsoft.com/download/a/8/1/a81e3b6a-06f3-451a-97af-c85bd708ffdb/WindowsXP-KB899591-x86-JPN.exe); - Vulnerability in Remote Desktop protocol
-[[WindowsXP-KB900485-v2-x86-JPN.exe>http://www.microsoft.com/downloads/details.aspx?displaylang=ja&FamilyID=404280BF-B240-4A34-AE0E-798CDED8CBAF]] - Stop 0x7E in aec.sys" error message
-&ref(http://download.microsoft.com/download/4/3/c/43cf64e6-346b-4b49-81e0-f6ad1f099dc4/WindowsXP-KB900725-x86-JPN.exe); - Vulnerabilities in Windows Shell
-&ref(http://download.microsoft.com/download/2/7/1/271a65ed-a40e-4d8e-b6fc-2856c307f4eb/WindowsXP-KB901017-x86-JPN.exe); - Vulnerability in MS Collaboration Data Objects
-&ref(http://download.microsoft.com/download/b/9/a/b9a52743-fa9f-431b-8cd0-aaa702cb0986/WindowsXP-KB901190-x86-JPN.exe); - Vulnerability in the Korean IME
-&ref(http://download.microsoft.com/download/5/8/5/585094a0-13c1-4b3e-b9a6-cccc45498aa7/WindowsXP-KB901214-x86-JPN.exe); - Vulnerability in MS Color Management Module
-&ref(http://download.microsoft.com/download/7/8/4/78411d13-786e-4632-89bd-f8f9e9f99d80/WindowsXP-KB904706-v2-x86-JPN.exe); - Vulnerability in DirectShow
-[[WindowsXP-KB904942-v2-x86-JPN.exe>http://www.microsoft.com/downloads/details.aspx?displaylang=ja&FamilyID=1F9D33FF-7BFE-4336-9E65-972ED21324C4]] - Issue with MSOE6 when installing MSIE7
-&ref(http://download.microsoft.com/download/1/7/8/178f9344-c44b-4873-b3c0-7c4c8a1b1dc3/WindowsXP-KB905414-x86-JPN.exe); - Vulnerability in Network Connection Manager
-&ref(http://www.download.windowsupdate.com/msdownload/update/v3-19990518/cabpool/WindowsXP-KB905474-ENU-x86_e69cdc796b5c5094328c5cef5374f70948a40446.exe); - Windows Genuine Advantage Notifications
-&ref(http://download.microsoft.com/download/2/d/b/2db4c306-72d4-4555-8eae-8b32ecb806ca/WindowsXP-KB905749-x86-JPN.exe); - Vulnerability in Plug and Play