Backup of 揮発性記憶領域/hfslip (5) Back


Back to History list

#navi(../)
*hfslipのWindowsXP用Hotfixのリンク先 [#ee4e949f]
http://users.telenet.be/tc76/winup/_winxpsp2.htmlに記載されているアドレスの日本語版のアドレス

:HFCABS|CAB圧縮ファイルファイルを入れる。(Flash等の.CAB形式のActiveXコンポーネントもここ。)
:HFSVCPACK_SW|メディアプレイヤーなど

''サービスパック''
-[[IT プロフェッショナルおよび開発者用 Windows XP Service Pack 2 ネットワーク インストール パッケージ>http://www.microsoft.com/downloads/details.aspx?displaylang=ja&FamilyID=049C9DBE-3B8E-4F30-8245-9E368D3CDB5A]]

''ブラウザ''
-[[Internet Explorer 7>http://www.microsoft.com/japan/windows/ie/default.mspx]]
-[[Windows Script 5.6>http://www.microsoft.com/downloads/details.aspx?displaylang=ja&FamilyID=C717D943-7E4B-4622-86EB-95A22B832CAA]]
-[[MSXML2>http://support.microsoft.com/kb/823490/]] + [[MSXML2 Update>http://support.microsoft.com/kb/887606/]]
-[[Microsoft XML Core Services 4.0 の脆弱性により、リモートでコードが実行される>http://www.microsoft.com/downloads/details.aspx?displaylang=ja&FamilyID=24B7D141-6CDF-4FC4-A91B-6F18FE6921D4]]
-[[Microsoft XML Core Services 6.0 の脆弱性により、リモートでコードが実行される (927977)>http://www.microsoft.com/downloads/details.aspx?displaylang=ja&FamilyID=9AE7F4E9-8228-4098-AF71-49C35684C17E]]
-[[Adobe Flash Player for IE>http://fpdownload.macromedia.com/get/flashplayer/current/swflash.cab]]

''DirectX''
-[[DirectX End-User Runtimes - 日本語>http://www.microsoft.com/downloads/details.aspx?displaylang=ja&FamilyID=4b1f5d0c-5e44-4864-93cd-464ef59da050]]
>対象ファイル:*d3dx9*x86.cab,*d3dx10*x86.cab,*XACT*x86.cab ,*xinput*x86.cab&br;
表示されるファイルの内、d3dx9とd3dx10の名前がつくファイルのみ
<

''メディアプレイヤー''
-[[Windows Media Player>http://www.microsoft.com/downloads/Browse.aspx?displaylang=ja&categoryid=4]]
-[[DRM 対応メディア プレーヤー用更新プログラム>http://www.microsoft.com/downloads/details.aspx?displaylang=ja&FamilyID=73C2650F-BE61-4BD6-8408-1FD6E7827CD8]]
-[[WindowsXP MCE 2005用ロールアップ修正プログラム2>http://www.microsoft.com/downloads/details.aspx?displaylang=ja&FamilyID=e5daf37e-e243-4410-bc51-81cf2b56fe6e]]
-[[HighMAT サポート CD 書き込みウィザード>http://www.microsoft.com/downloads/details.aspx?displaylang=ja&FamilyID=2ddf1550-1c5c-44b3-87fc-9c6b37403c35]]

''Microsoftからダウンロード''
-[[Windows Genuine Advantage>http://go.microsoft.com/fwlink/?linkid=39204]] [*.CAB]
-[[パッケージインストーラー6.1.22.4>http://www.microsoft.com/downloads/details.aspx?displaylang=ja&FamilyID=50C334E1-9A67-4B99-A65A-069B79267856]]
-[[Office Genuine Advantage>http://go.microsoft.com/fwlink/?linkid=67633]] [*.CAB]
-[[Offceテンプレート、メディアコントロール>http://office.microsoft.com/templates/IEAWSDC.CAB]] [*.CAB]
-[[Windows Update Agent 2.0>http://download.windowsupdate.com/v6/windowsupdate/redist/standalone/WindowsUpdateAgent20-x86.exe]]((解説:[[Windows Updateオフラインスキャンファイルの新しいバージョンについて>http://support.microsoft.com/default.aspx/kb/926464/ja]])) [*.CAB]
-[[Microsoft Update engine>Microsoft Update engine]]

''Microsoftからダウンロード(上級者向け)''
-[[Windows Update v4>http://v4.windowsupdate.microsoft.com/CAB/x86/unicode/IUCTL.CAB]] [*.CAB]
-[[Office Update engine>http://office.microsoft.com/officeupdate/content/OPUC4.CAB]] [*.CAB]&br;
別途[[modifyPE.exe>ftp://ftp.sac.sk/pub/sac/utilprog/modpe081.zip]]をHFTOOLS内に入れる必要あり

''そのほか''
-[[Roots Certificate Update>http://www.download.windowsupdate.com/msdownload/update/v3-19990518/cabpool/rootsupd_963ec3df48991128f4edd42c66f40f144720f759.exe]] [*.EXE]
-[[Microsoft&reg; Windows&reg; 悪意のあるソフトウェアの削除ツール>http://www.microsoft.com/downloads/details.aspx?displaylang=ja&FamilyID=AD724AE0-E72D-4F54-9AB3-75B8EB148356]]
-[[WGA 通知>Windows Genuine Advantage Notifications]] [*.exe]

*HFディレクトリに以下のファイルをダウンロード [#a7fac080]
+[[HMTCDWizard_JPN.exe>http://www.microsoft.com/downloads/details.aspx?displaylang=ja&FamilyID=2ddf1550-1c5c-44b3-87fc-9c6b37403c35]] - HighMAT update for the CD Writing Wizard
+&ref(http://download.microsoft.com/download/b/7/a/b7aef6b4-e20f-402c-b1aa-11012ea259ae/IE7-KB928090-WindowsXP-x86-enu.exe); - Cumulative security update for MSIE7
+&ref(http://download.microsoft.com/download/3/4/5/3457d688-0fad-4232-922e-a038bd7d7a5d/IE7-KB929969-WindowsXP-x86-jpn.exe); - Vulnerability in Vector Markup Language
+&ref(http://download.microsoft.com/download/d/4/8/d488b16c-877d-474d-912f-bb88e358055d/IE7-WindowsXP-x86-jpn.exe); - Internet Explorer 7
+[[wmp11-windowsxp-x86-JA-JP.exe>http://www.microsoft.com/downloads/details.aspx?FamilyID=1d224714-e238-4e45-8668-5166114010ca&DisplayLang=ja]] - Windows Media Player11
+&ref(http://download.microsoft.com/download/8/d/f/8df27d67-e899-4b0c-9c54-fb304ce7a2b3/msxml2.msi); - MSXML2 (msxml2r.dll)
+&ref(http://download.microsoft.com/download/2/6/d/26d27fdc-ce0b-4225-8d7e-94e93f59323f/msxml2sp6-kb887606-x86-jpn.exe); - MSXML2 update (msxml2.dll)
+&ref(http://download.microsoft.com/download/1/9/9/199fa22d-70fc-45d5-9328-acca89647379/msxml4-KB927978-jpn.exe); - MSXML4 (msxml4.dll, msxml4r.dll)
+&ref(http://download.microsoft.com/download/c/4/9/c49e4f49-a11e-413d-8051-17d9470d0a65/msxml6-KB927977-jpn-x86.exe); - MSXML6 (msxml6.dll, msxml6r.dll)
+&ref(http://www.download.windowsupdate.com/msdownload/update/v3-19990518/cabpool/rootsupd_963ec3df48991128f4edd42c66f40f144720f759.exe); - Roots Certificate Update
+[[WindowsInstaller-KB893803-v2-x86.exe>http://www.microsoft.com/downloads/details.aspx?displaylang=ja&FamilyID=889482FC-5F56-4A38-B838-DE776FD4138C]] - Windows Installer 3.1 Redistributable (v2)
+&ref(http://download.microsoft.com/download/4/a/a/4aa524c6-239d-47ff-860b-5b397199cbf8/Windows-KB890830-V1.26.exe); - Malicious Software Removal Tool (multilingual)
+[[Windows-KB909520-v1.000-x86-JPN.exe>http://www.microsoft.com/downloads/details.aspx?displaylang=ja&FamilyID=e8095fd5-c7e5-4bee-9577-2ea6b45b41c6]] - Update for Microsoft Base Smart Card CSP
+&ref(http://download.microsoft.com/download/0/1/9/019ef9ba-392a-46ea-b0a3-94a197e16461/WindowsMedia6-KB925398-x86-JPN.exe); - Vulnerability in Windows Media Format (WMP6)
+&ref(http://download.microsoft.com/download/6/d/4/6d4a04ae-dcaf-45d4-8930-1e2c70887921/WindowsMedia9-KB917734-x86-JPN.exe); - Vulnerability in Windows Media Player
+&ref(http://download.microsoft.com/download/2/d/5/2d55d5dd-3708-46ef-9933-76b48743510d/WindowsMedia-KB911564-x86-JPN.exe); - Vulnerability in Windows Media Player plug-in
+&ref(http://download.microsoft.com/download/1/5/0/150785e3-48d7-40b0-b7f8-564f75a3d680/WindowsRightsManagementServicesSP2-KB917275-Client-JPN-x86.exe); - Windows Rights Management Services Client
+&ref(http://download.windowsupdate.com/v6/windowsupdate/redist/standalone/WindowsUpdateAgent20-x86.exe); - Windows Update Agent 2.0
+&ref(http://download.microsoft.com/download/5/c/5/5c5b703b-98ea-46a2-ba68-fb64db4d3c26/WindowsXP-KB835935-SP2-JPN.exe); - Windows XP Service Pack 2
+&ref(http://download.microsoft.com/download/b/6/9/b699023d-0258-4a65-80fe-1ef7fed55acc/WindowsXP-KB873339-x86-JPN.exe); - Vulnerability in HyperTerminal
+&ref(http://download.microsoft.com/download/8/9/b/89b33bef-7a51-4d8a-8b2d-4dfda65afd86/WindowsXP-KB885626-v2-x86-jpn.exe); - Systems running Prescott C-0 w/o BIOS support
+&ref(http://download.microsoft.com/download/f/a/a/faaf8a53-7adf-4e4a-82fd-7d5d24224b3e/WindowsXP-KB885836-x86-JPN.exe); - Vulnerability in WordPad
+&ref(http://download.microsoft.com/download/a/0/a/a0a9ed8d-1b34-4f33-b81d-e0e850ee2811/WindowsXP-KB886185-x86-jpn.exe); - Vulnerability in Windows Firewall
+&ref(http://download.microsoft.com/download/3/0/8/30890bee-a68f-4838-870d-7b78558d966a/WindowsXP-KB887472-x86-jpn.exe); - Vulnerability in Windows Messenger
+&ref(http://download.microsoft.com/download/6/5/8/658d2c7a-ca71-4b0f-a4d0-43e354b40dd2/WindowsXP-KB888302-x86-JPN.exe); - Vulnerability in Windows
+&ref(http://download.microsoft.com/download/2/f/4/2f417f76-0bde-45fb-860a-3df3a42810aa/WindowsXP-KB890859-x86-JPN.exe); - Vulnerabilities in Windows kernel
+&ref(http://download.microsoft.com/download/e/2/3/e23cb705-9109-4b4c-abc2-ad756b8fc0a3/WindowsXP-KB891781-x86-JPN.exe); - Vulnerability in DHTML Editing (ActiveX control)
+&ref(http://download.microsoft.com/download/4/c/1/4c10ddfb-83f2-4f6a-8559-bc371610634a/WindowsXP-KB893756-x86-JPN.exe); - Vulnerability in Telephony service
+[[WindowsXP-KB896344-v2-x86-JPN.exe>http://www.microsoft.com/downloads/details.aspx?displaylang=ja&FamilyID=6C2F2318-CBDB-47C0-B7C2-77C4CC37A450]] - Cannot transfer from XPSP2 32-bit to XP 64-bit
+&ref(http://download.microsoft.com/download/8/3/e/83e7ee61-db33-4112-a35e-98cd8b455de8/WindowsXP-KB896358-x86-JPN.exe); - Vulnerability in HTML Help
+&ref(http://download.microsoft.com/download/3/4/7/3473ce22-eca3-41a5-935d-d5c9c528222b/WindowsXP-KB896423-x86-JPN.exe); - Vulnerability in Print Spooler service
+&ref(http://download.microsoft.com/download/3/7/5/375d3de3-56a5-4461-8096-b28df911883a/WindowsXP-KB896424-x86-JPN.exe); - Vulnerabilities in graphics rendering engine
+&ref(http://download.microsoft.com/download/d/0/9/d09697d6-19dd-42c6-aa26-63819be5eaf2/WindowsXP-KB896428-x86-JPN.exe); - Vulnerability in Telnet Client
+[[WindowsXP-KB898461-x86-JPN.exe>http://www.microsoft.com/downloads/details.aspx?displaylang=ja&FamilyID=50C334E1-9A67-4B99-A65A-069B79267856]] - Package Installer 6.1.22.4
+&ref(http://download.microsoft.com/download/c/2/d/c2da9f92-22b3-410d-ac5d-22c7b7c67428/WindowsXP-KB899587-x86-JPN.exe); - Vulnerabilities in Kerberos
+&ref(http://download.microsoft.com/download/a/8/1/a81e3b6a-06f3-451a-97af-c85bd708ffdb/WindowsXP-KB899591-x86-JPN.exe); - Vulnerability in Remote Desktop protocol
+[[WindowsXP-KB900485-v2-x86-JPN.exe>http://www.microsoft.com/downloads/details.aspx?displaylang=ja&FamilyID=404280BF-B240-4A34-AE0E-798CDED8CBAF]] - Stop 0x7E in aec.sys" error message
+&ref(http://download.microsoft.com/download/4/3/c/43cf64e6-346b-4b49-81e0-f6ad1f099dc4/WindowsXP-KB900725-x86-JPN.exe); - Vulnerabilities in Windows Shell
+&ref(http://download.microsoft.com/download/2/7/1/271a65ed-a40e-4d8e-b6fc-2856c307f4eb/WindowsXP-KB901017-x86-JPN.exe); - Vulnerability in MS Collaboration Data Objects
+&ref(http://download.microsoft.com/download/b/9/a/b9a52743-fa9f-431b-8cd0-aaa702cb0986/WindowsXP-KB901190-x86-JPN.exe); - Vulnerability in the Korean IME
+&ref(http://download.microsoft.com/download/5/8/5/585094a0-13c1-4b3e-b9a6-cccc45498aa7/WindowsXP-KB901214-x86-JPN.exe); - Vulnerability in MS Color Management Module
+&ref(http://download.microsoft.com/download/7/8/4/78411d13-786e-4632-89bd-f8f9e9f99d80/WindowsXP-KB904706-v2-x86-JPN.exe); - Vulnerability in DirectShow
+[[WindowsXP-KB904942-v2-x86-JPN.exe>http://www.microsoft.com/downloads/details.aspx?displaylang=ja&FamilyID=1F9D33FF-7BFE-4336-9E65-972ED21324C4]] - Issue with MSOE6 when installing MSIE7
+&ref(http://download.microsoft.com/download/1/7/8/178f9344-c44b-4873-b3c0-7c4c8a1b1dc3/WindowsXP-KB905414-x86-JPN.exe); - Vulnerability in Network Connection Manager
+&ref(http://www.download.windowsupdate.com/msdownload/update/v3-19990518/cabpool/WindowsXP-KB905474-ENU-x86_e69cdc796b5c5094328c5cef5374f70948a40446.exe); - Windows Genuine Advantage Notifications
+&ref(http://download.microsoft.com/download/2/d/b/2db4c306-72d4-4555-8eae-8b32ecb806ca/WindowsXP-KB905749-x86-JPN.exe); - Vulnerability in Plug and Play
+&ref(http://download.microsoft.com/download/3/5/4/354fda3e-c2e9-4759-be6f-3c5416f95653/WindowsXP-KB908519-x86-JPN.exe); - Vulnerability in Embedded Web Fonts
+&ref(http://download.microsoft.com/download/2/4/0/2401490a-6aca-4807-884b-7d2791965648/WindowsXP-KB908531-v2-x86-JPN.exe); - Vulnerability in Windows Explorer
+&ref(http://download.microsoft.com/download/f/9/1/f91c314e-b8a1-4793-8ca0-8b587b4799e5/WindowsXP-KB910437-x86-JPN.exe); - Access Violation error using AU service
+&ref(http://download.microsoft.com/download/6/7/a/67a79d37-cbbd-4e70-8f87-61eb22d979a9/WindowsXP-KB911280-v2-x86-JPN.exe); - Vulnerability in Routing and Remote Access
+&ref(http://download.microsoft.com/download/0/4/9/0496dfa8-e993-4eef-a548-7180039ac7e6/WindowsXP-KB911562-x86-JPN.exe); - Vulnerability in MDAC on WinXP
+&ref(http://download.microsoft.com/download/4/c/3/4c3b7297-91ca-4182-81d6-c31d2b7664a8/WindowsXP-KB911927-x86-JPN.exe); - Vulnerability in the Web Client service
+&ref(http://download.microsoft.com/download/b/6/b/b6bcdb0f-2ed3-4ae7-a85c-128ecef4e201/WindowsXP-KB912817-v2-x86-JPN.exe); - COM+ Hotfix Rollup Package 13
+&ref(http://download.microsoft.com/download/a/8/7/a87ab69d-4fa3-4379-9eae-f0c98a75e5e2/WindowsXP-KB912919-x86-JPN.exe); - Vulnerability in graphics rendering engine
+&ref(http://download.microsoft.com/download/9/6/e/96eece9a-1404-4a78-aef4-236808fd2710/WindowsXP-KB913580-x86-JPN.exe); - Vulnerability in MS DTC
+&ref(http://download.microsoft.com/download/b/a/e/bae9a02d-4404-4bb1-a2f3-a906ef859e66/WindowsXP-KB914388-x86-JPN.exe); - Vulnerability in DHCP Client Service
+&ref(http://download.microsoft.com/download/f/6/f/f6f93460-7c36-4244-b674-d0b0ca163020/WindowsXP-KB914389-x86-JPN.exe); - Vulnerability in Server Message Block
+[[ネットワークの診断ツール>http://www.microsoft.com/downloads/details.aspx?displaylang=ja&FamilyID=EA541E8E-85A3-4D2F-A3A4-B329D03FC2FA]]
+[[WindowsXP-KB916595-x86-JPN.exe>http://www.microsoft.com/downloads/details.aspx?displaylang=ja&FamilyID=39BF8D62-CA70-4E85-BD7B-5566599E1926]] - "Stop 0x05" and "Stop 0xD1" errors
+&ref(http://download.microsoft.com/download/2/c/e/2cea33d7-3c37-4ab8-a856-96187c417c40/WindowsXP-KB917422-x86-JPN.exe); - Vulnerability in Windows Kernel
+&ref(http://download.microsoft.com/download/d/2/8/d28e599f-91fc-468a-b49a-9fec046fe46f/WindowsXP-KB917537-x86-JPN.exe); - Vulnerability in MS IIS using ASP
+&ref(http://download.microsoft.com/download/a/1/b/a1b8b762-2235-4dd5-8e11-122d1c22566a/WindowsXP-KB917953-x86-JPN.exe); - Vulnerability in TCP/IP
+&ref(http://download.microsoft.com/download/4/b/8/4b84ee38-338d-4e92-9a8b-0791e893fe66/WindowsXP-KB918118-x86-JPN.exe); - Vulnerability in Microsoft RichEdit
+&ref(http://download.microsoft.com/download/f/6/d/f6d7666b-d206-4c71-8c12-953484f44c97/WindowsXP-KB918439-x86-JPN.exe); - Vulnerability in ART image rendering
+&ref(http://download.microsoft.com/download/3/c/3/3c364557-e49d-4a56-ae3e-e6ab123ddac5/WindowsXP-KB919007-x86-JPN.exe); - Vulnerability in Pragmatic General Multicast
+&ref(http://download.microsoft.com/download/6/a/7/6a7ca4ab-2f5e-4a0c-b7f1-a0fcb96b618a/WindowsXP-KB920213-x86-JPN.exe); - Vulnerability in Microsoft Agent
+[[WindowsXP-KB920342-x86-JPN.exe>http://www.microsoft.com/downloads/details.aspx?displaylang=ja&FamilyID=55219164-EC71-4A32-A648-4ED2582EBC7C]] - Peer Name Resolution Protocol 2.0
+&ref(http://download.microsoft.com/download/b/7/e/b7ec9e6f-33ec-4de1-b653-e11181ec76bb/WindowsXP-KB920670-x86-JPN.exe); - Vulnerabilities in Hyperlink Object Library
+&ref(http://download.microsoft.com/download/b/f/6/bf69245c-876c-4fd0-be1b-322fa99dc857/WindowsXP-KB920683-x86-JPN.exe); - Vulnerability in DNS Resolution
+&ref(http://download.microsoft.com/download/1/3/a/13a2a4ff-8288-48a6-a383-bc74dcb61510/WindowsXP-KB920685-x86-JPN.exe); - Vulnerability in Indexing Service
+[[WindowsXP-KB920872-x86-JPN.exe>http://www.microsoft.com/downloads/details.aspx?displaylang=ja&FamilyID=8C2E44A5-6A28-4888-93A7-6A6C6A87BE7F]] - Errors playing back audio files
+[[WindowsXP-KB922582-x86-JPN.exe>http://www.microsoft.com/downloads/details.aspx?displaylang=ja&FamilyID=7C48DC3A-E3A2-4681-A0D1-3886AFDC6E73]] - Error message "0x80070002"
+&ref(http://download.microsoft.com/download/e/9/2/e9277def-1660-4caf-bb80-a6d0516cce57/WindowsXP-KB922819-x86-JPN.exe); - Vulnerabilities in TCP/IP IPv6
+&ref(http://download.microsoft.com/download/7/6/5/76523b66-bd77-467f-b36d-c918337d1692/WindowsXP-KB923191-x86-JPN.exe); - Vulnerability in Windows Explorer
+&ref(http://download.microsoft.com/download/7/b/9/7b9e0fa9-0816-4301-a096-c583e91f29a4/WindowsXP-KB923414-x86-JPN.exe); - Vulnerability in Server Service
+&ref(http://download.microsoft.com/download/7/2/9/729df91d-05d7-4945-9c72-e99c655a2b48/WindowsXP-KB923689-x86-JPN.exe); - Vulnerability in Windows Media (WMP9 & 10)
+&ref(http://download.microsoft.com/download/2/f/1/2f181e75-8f07-4827-94e8-4b36b6d42bd8/WindowsXP-KB923694-x86-JPN.exe); - Cumulative security update for MSOE
+&ref(http://download.microsoft.com/download/b/d/4/bd4efc39-9113-431f-969a-53f42b684244/WindowsXP-KB923980-x86-JPN.exe); - Vulnerabilities in Client Service for NetWare
+&ref(http://download.microsoft.com/download/4/7/a/47a177a5-3447-47e3-a446-61d43f9745df/WindowsXP-KB924191-x86-JPN.exe); - Vulnerability in MSXML3 (msxml3.dll)
+&ref(http://download.microsoft.com/download/c/3/9/c3929f17-3317-43ed-ade3-015b84f4c19c/WindowsXP-KB924270-x86-JPN.exe); - Vulnerability in Workstation Service
+&ref(http://download.microsoft.com/download/8/c/8/8c82bcac-23e7-4a9f-be6c-6605e79778a3/WindowsXP-KB924667-x86-JPN.exe); - Vulnerability in Microsoft MFC
+[[WINDOWSXP-KB925876-X86-JPN.EXE>http://www.microsoft.com/downloads/details.aspx?displaylang=ja&FamilyID=26F11F0C-0D18-4306-ABCF-D4F18C8F5DF9]] - Terminal Services Client 6.0
+&ref(http://download.microsoft.com/download/7/f/b/7fb83e0c-e43c-4957-9cb1-0e36615cc544/WindowsXP-KB926247-x86-JPN.exe); - Vulnerability in SNMP
+&ref(http://download.microsoft.com/download/e/b/7/eb74bb1a-60ac-45d8-bb31-3d23c2591388/WindowsXP-KB926255-x86-JPN.exe); - Vulnerability in Windows
+&ref(http://download.microsoft.com/download/f/b/e/fbe56cf3-07af-41cd-a0d0-4bff3a260d9b/WindowsXP-KB926436-x86-JPN.exe); - Vulnerability in Microsoft OLE Dialog
+&ref(http://download.microsoft.com/download/c/f/f/cff5630c-9a32-408e-87e0-b7b07026584f/WindowsXP-KB927779-x86-JPN.exe); - Another vulnerability in MDAC on WinXP
+&ref(http://download.microsoft.com/download/6/7/2/6722f66b-bc0b-43cf-ab2d-3d9396c10f7b/WindowsXP-KB927802-x86-JPN.exe); - Vulnerability in WIA Service
+&ref(http://download.microsoft.com/download/e/7/5/e75f42c9-9b05-4adc-85f8-66d38a0deac3/WindowsXP-KB928255-x86-JPN.exe); - Vulnerability in Windows Shell
+&ref(http://download.microsoft.com/download/9/0/f/90fdc221-6d05-4cff-bf77-3d9446c3991e/WindowsXP-KB928843-x86-JPN.exe); - Vulnerability in HTML Help ActiveX Control
+[[WindowsXP-KB931836-x86-JPN.exe>http://www.microsoft.com/downloads/details.aspx?displaylang=ja&FamilyID=66F1420C-DF2D-400B-A8A9-EF9061A9A3CA]] - 2007 time zone update
+&ref(http://download.microsoft.com/download/0/9/9/099b133b-dcff-4baf-a545-497493fcc6ed/WindowsMedia-KB891122-x86-JPN.exe); - Windows Media 9/10 codecs
#hr
-[[Microsoft 圧縮 (LZH 形式) フォルダ>http://www.microsoft.com/genuine/offers/Details.aspx?displaylang=ja&OfferID=1c76bfa5-7f1b-420b-a8c0-eba75dd6c2ba&cCode=JPN&sGuid=0dd14c81-6165-4b67-99de-a52823b03d23]]
-[[Microsoft Windows Defender>http://www.microsoft.com/genuine/offers/Details.aspx?displaylang=ja&OfferID=d072eaa5-1f77-4662-9c35-e74cbb1b2d5d&cCode=JPN&sGuid=da9c41d2-7e94-4110-bfed-6ba6651b7f33]]
*HFCABSに入れるファイル [#b1f9e195]
-DX9内より
--Apr2005_d3dx9_25_x86.cab
--Apr2006_d3dx9_30_x86.cab
--Aug2005_d3dx9_27_x86.cab
--Dec2005_d3dx9_28_x86.cab
--DEC2006_d3dx10_00_x86.cab
--DEC2006_d3dx9_32_x86.cab
--Feb2005_d3dx9_24_x86.cab
--Feb2006_d3dx9_29_x86.cab
--Jun2005_d3dx9_26_x86.cab
--OCT2006_d3dx9_31_x86.cab
-&ref(http://office.microsoft.com/templates/IEAWSDC.CAB); - Office Template and Media Control
-&ref(http://v4.windowsupdate.microsoft.com/CAB/x86/unicode/IUCTL.CAB); - Windows Update v4
-&ref(http://go.microsoft.com/fwlink/?linkid=39204); - WGA
-&ref(http://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/MUWEB_SITE.CAB); - Microsoft Update
-&ref(http://go.microsoft.com/fwlink/?linkid=67633); - Office Genuine Advantage
-&ref(http://office.microsoft.com/officeupdate/content/OPUC4.CAB); - Office Update
-&ref(http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab); - Adobe Flash Player

*HFTOOLSフォルダへ [#r75e2ec8]
-modifype.exe