XP stability

  • Thread starter Thread starter matthew
  • Start date Start date
M

matthew

hi can anyone tell me any downloads etc i can get to make
my xp home more reliable and stable? also is there
anything i can download to check for hardware and software
problems etc?

Thanks
 
matthew said:
hi can anyone tell me any downloads etc i can get to make
my xp home more reliable and stable? also is there
anything i can download to check for hardware and software
problems etc?

Thanks

XP Home should be *very* reliable. To make it reliable requires a few
things:

- hardware of sufficient specification to run XP (Microsoft documents
what's required and provides tools to help check for it).
- good quality 3rd party hardware with good quality drivers ... cheap
stuff generally has higher risk of causing problems.
- protection of system from *futzing* by user or by viruses, worms, etc.
For the former requires restaint...for the latter requies the user to
follow safe computing practices

Yet *more* downloads won't fix the problem you probably are having.
 
Mathew,

You should use Windows Update to download and install all of the critical
updates. (as well as Service Pack 1)
The SP and a number of the patches include enhancements to application
compatibility and also increase the stability of the OS under certain
operating conditions.
Also look at the other updates Windows Update will recommend - a number of
these are also application compatibility patches.

--
Regards,

Mike
--
Mike Brannigan [Microsoft]

This posting is provided "AS IS" with no warranties, and confers no
rights

Please note I cannot respond to e-mailed questions, please use these
newsgroups
 
I downloaded a book and placed it under the monitor, its alot more stable
now.
 
Where on earth do you get your statistics? Your statement 'these have caused
no end of problems for users' What problems? What users?
 
x-no-archive: yes

Mike Brannigan said:
(e-mail address removed)

I have a large number of systems running with every single patch we
have released for Windows XP - these include 3 PCs 2 laptops and a
TabletPC. On non of these machines (all built from various
components and retail Windows XP) - no patch has ever caused any
stability issues.
In fact my machines do not crash, do not blue screen and have not been
subject to any worm trojan or virus attack.

If by august 15th patches you mean the patch for the MSBlast worm -
then if you had been running automatic or regular Windows updates you
would have received the MS03-026 patch mid July and would have no
need to worry about MSBlast.

Your advice is suspect at best on this matter.

I have had a good overall experience with the WinXP patches, but a
couple of them did cause enough problems that I had to back them out.
 
Obviously you don't read these ngs much. Go back to Aug 15
and take note of the myriad of issues regarding failure to
boot and lockup since the latest patches. Good luck
 
djs said:
x-no-archive: yes



I have had a good overall experience with the WinXP patches, but a
couple of them did cause enough problems that I had to back them out.


There indeed was one patch that caused a performace condition if installed
while running a particular anti virus product.
That patch was withdrawn and reissued and fixed.
--
Regards,

Mike
--
Mike Brannigan [Microsoft]

This posting is provided "AS IS" with no warranties, and confers no
rights

Please note I cannot respond to e-mailed questions, please use these
newsgroups
 
And I forgot to mention the inability to get updates from
Microsoft and the thousands of variants on the issue
caused by the updates prior to Aug15. If you don't feel
this is accurate then go to Microsoft and look at the over
20 pages of issue resolutions available just for the
LovSan patch alone. Good luck.
 
x-no-archive: yes

There indeed was one patch that caused a performace condition if
installed while running a particular anti virus product.
That patch was withdrawn and reissued and fixed.

And when I installed the updated patch, my system started freezing up.
I removed the patch again, and the problem disappeared. (Actually, I
did not nail the problem down enough to know if it was 811493 or 815021.
They were both unimportant patches where I'm concerned anyway.)
 
Mike Branningan
I agree with you about the auto update feature, but it takes forever
to download stuff with that. They why I turned it off. I check
windows update at least once a week with the exception of last week.

I could of read it wrong, Why did Microsoft say system can only get
infected by opening a email attachment. I talking about the one the
government warned everybody about. Is that because you did not
know about the rpc vulnerability? Isnt the email virus also
msblaster?

Greg P Rozelle


There indeed was one patch that caused a performace condition if installed
while running a particular anti virus product.
That patch was withdrawn and reissued and fixed.
--
Regards,

Mike
--
Mike Brannigan [Microsoft]

This posting is provided "AS IS" with no warranties, and confers no
rights

Please note I cannot respond to e-mailed questions, please use these
newsgroups


Disclaimer
My advice is as-is. It could trash your system.
 
Greg P Rozelle said:
Mike Branningan
I agree with you about the auto update feature, but it takes forever
to download stuff with that. They why I turned it off. I check
windows update at least once a week with the exception of last week.

I could of read it wrong, Why did Microsoft say system can only get
infected by opening a email attachment. I talking about the one the
government warned everybody about. Is that because you did not
know about the rpc vulnerability? Isnt the email virus also
msblaster?

The Windows Update auto service using BITS which is very bandwidth
sensitive, so if you are on a slow link and using it to do other downloads
or surf then the transfer to you machine of updates will be very slow, over
a broadband link it is extremely fast.

I have no idea which piece of documentation you are referring to about "only
being infected by e-mail".
The MS03-026 - the original RPC fix (which MSBlast used over a month after
we released the fix) http://support.microsoft.com/default.aspx?kbid=823980
is all about RPC infection not an e-mail delivered worm.
So we knew about and fixed the RPC vulnerability in July and fixed it.
MSBlast exploited the fact that not everyone had applied the Critical
Update.

--
Regards,

Mike
--
Mike Brannigan [Microsoft]

This posting is provided "AS IS" with no warranties, and confers no
rights

Please note I cannot respond to e-mailed questions, please use these
newsgroups

Greg P Rozelle said:
Mike Branningan
I agree with you about the auto update feature, but it takes forever
to download stuff with that. They why I turned it off. I check
windows update at least once a week with the exception of last week.

I could of read it wrong, Why did Microsoft say system can only get
infected by opening a email attachment. I talking about the one the
government warned everybody about. Is that because you did not
know about the rpc vulnerability? Isnt the email virus also
msblaster?

Greg P Rozelle


 
Back
Top