{"id":451,"date":"2003-10-16T00:00:00","date_gmt":"2003-10-16T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2003\/10\/16\/microsoft-debuts-first-windows-xp-security-pack\/"},"modified":"2021-12-30T11:37:21","modified_gmt":"2021-12-30T11:37:21","slug":"microsoft-debuts-first-windows-xp-security-pack","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2003\/10\/16\/microsoft-debuts-first-windows-xp-security-pack\/","title":{"rendered":"Microsoft Debuts First Windows XP Security Pack"},"content":{"rendered":"<p>Microsoft has unveiled the first Windows XP security rollup, a collection of 22 previously-available patches for that operating system.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Update Rollup 1, which has been in beta testing for the past month, is being positioned by Microsoft as a more convenient way for users to deploy patches they might have missed when the original vulnerabilities &#8212; and associated security bulletins &#8212; were posted on the company&#8217;s Web site.<\/p>\n<p>When discussion of the Rollup first started, analysts saw it as an attempt by Microsoft to provide an interim pack of security updates prior to the release of a second Service Pack for Windows XP, which at that point wasn&#8217;t expected until the middle of 2004.<\/p>\n<p>As recently as last week, however, Microsoft CEO Steve Ballmer, in a wide-ranging talk about Microsoft&#8217;s security plans, repeated that Service Pack 2 (SP2) would not release until the half-way point of next year.<\/p>\n<p>No matter what the time frame for SP2, the recently-released rollup meets only half of the criteria that analyst Michael Cherry, of Directions on Microsoft, a research firm that tracks Microsoft&#8217;s moves in the marketplace, thinks is necessary for success.<\/p>\n<p>Such a CD would be a better way to get the 9MB rollup out to customers, such as consumers and small business users, who access the Internet through slow dial-up connections.<\/p>\n<p>One way that the rollup may be used, he added, would be by OEMs, which could conceivably add it to their Windows XP distributions they pre-load on new PCs.<\/p>\n<p>In his speech last week at the company&#8217;s Worldwide Partner Conference in New Orleans, Ballmer announced that the Redmond, Wash.-based developer would switch to a monthly schedule for non-critical security updates, replacing the sporadic Wednesday bulletins and patches.<\/p>\n<p>Download from: http[url=http:\/\/support.microsoft.com\/default.aspx?scid=kb;en-us;826939]:\/\/support.microsoft.com\/default.aspx?scid=kb;en-us;826939[\/url]<br \/>\nMore info: [url=http:\/\/www.techweb.com\/wire\/story\/TWB20031016S0007]http:\/\/www.techweb.com\/wire\/story\/TWB20031016S0007[\/url]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-451","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/451","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=451"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/451\/revisions"}],"predecessor-version":[{"id":2938,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/451\/revisions\/2938"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=451"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=451"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=451"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}