Someone found a way to bypass Windows 7 Extended Security Updates checks
#1
Exclamation 
Quote:
[Image: bypass-security-updates-checks.png]

Someone discovered a way to enable Extended Security Updates on all machines running Microsoft's Windows 7 operating system.

Support for Microsoft's Windows 7 operating system ends after the January 2020 Patch Tuesday. Small businesses and Enterprises may extend support by up to three years for a price.

Small businesses pay Microsoft up to $200 per device and year for extended support, Enterprises up to $200 per user and year. The support program is available already and there are prerequisites that need to be met.

Microsoft won't offer the Extended Security Updates program to Home users even though some would pay Microsoft to extend support for Windows 7. Home users may get some security patches created by third-party company 0Patch, but support will be limited and not as extensive -- likely -- as what Microsoft pushes out via the Extended Security Updates program.

Note: Microsoft released a test update that administrators may attempt to download and install to verify that the device is eligible for Extended Security Updates. This, and other parameters, may change before the program starts officially in January 2020. Creating backups is highly recommended.

Devices or users that participate in the Extended Security Updates program need to install an update that verifies eligibility to receive updates after January 14, 2020. Extended Security Updates must be installed online on live systems; they cannot be integrated or installed offline, at least not right now.

Users on the My Digital Life forum discovered a way to bypass the Extended Security Updates check. The bypass works with Microsoft's test update but it is unclear if it will also work with "real" updates that the company releases after the January 2020 Patch Day.

All that needs to be done currently is to download a small archive from the My Digital Life forum and extract it. The package includes two batch files that enable or disable the bypass on the system, executable files, and the source.

Basically, what happens behind the scene is that verification checks return true all the time through manipulation of these checks.

One interesting aspect of the hack is that it enables support for all Windows 7 editions, even those that Microsoft does not want to support after January 14, 2020. In other words: Windows 7 Home, Starter or Ultimate editions would be able to receive updates provided by the Extended Security Updates program when the bypass is installed.

The developers plan already to extend support to Windows Vista and to support the POSReady 7 SKU which will receive security updates until 2024. (via Deskmodder)
...
Continue Reading
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
QOwnNotes
26.4.0  LanguageT...Kool — 08:39
Surfshark VPN : Award-winning VPN servi...
Surfshark Apps Ver...jasonX — 04:41
Surfshark VPN : Award-winning VPN servi...
Surfshark launches...jasonX — 03:43
ESET 19.1.12.0
Changes in 19.1.12...harlan4096 — 14:49
Vivaldi 7.9 Build 3970.47
Vivaldi 7.9 Build ...harlan4096 — 07:31

[-]
Birthdays
Today's Birthdays
avatar (41)alapesihy
Upcoming Birthdays
avatar (45)wapedDow
avatar (49)oapedDow
avatar (42)Sanchowogy
avatar (46)MeighGoask
avatar (47)creatralGuelm
avatar (38)procnipsut
avatar (44)accenwibly
avatar (41)ahyvily
avatar (38)urumahiz
avatar (44)techlignub
avatar (43)Stevenmam
avatar (50)onlinbah
avatar (50)fuspeukChark
avatar (44)werriewWaiNg
avatar (38)Freemanleo
avatar (48)cticigges
avatar (50)ecoFit
avatar (44)soccejeS
avatar (43)cdoubapKit
avatar (38)lystraPonia
avatar (31)smith8395john
avatar (51)steakelask
avatar (45)Termoplenka
avatar (43)bycoPaist
avatar (49)pieloKat
avatar (43)ilyagNeexy
avatar (51)donitascene
avatar (51)burntLaw
avatar (41)MrDoorsskibheeds
avatar (51)Toligo
avatar (46)Rodneykak
avatar (49)tradeSmode
avatar (39)vemedProkbior
avatar (38)RobertUtelt
avatar (46)JamesZic
avatar (43)Sanfordbup
avatar (38)Der.Reisende
avatar (36)Kiran78

[-]
Online Staff
There are no staff members currently online.

>