Friday 15 April 2016

Hack Windows XP to get Security Updates until 2019



Microsoft has stopped providing XP users with security updates, forcing them to either upgrade to another, newer operating system, or gamble with their safety. While the latest usage figures show that a large portion of users are moving away from XP, there’s still a sizable number of users who aren’t — or can’t.

If you’re an XP user, or know some XP users, there’s a trick which makes it possible to receive security updates for the aging OS for another five years — right up until April 2019.

The workaround makes use of updates for Windows Embedded Industry (formerly known as Windows Embedded POSReady). This is based on Windows XP Service Pack 3, and the security updates which are being released for it are essentially the same ones Microsoft would have pushed out for XP, if it was still doing so.

You can’t simply install the updates — that would be too easy — and you’ll receive a version mismatch error if you try. But a simple registry tweak is enough to fix that.


STEPS TO FOLLOW:

 ------------------------ 


>Open Notepad and create a new file.


 >Add Below given code to it: Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SYSTEM\WPA\PosReady] "Installed"=dword:00000001


 >Save file as .reg extension and run it by double clicks. 


>Once executed, you will find lots of pending updates in your Windows Action Center. Because the extended support for Windows Embedded POSReady 2009 systems ends after 5 years, Microsoft will continue to deliver new security updates and patches for this version of its embedded operating system till April 9th, 2019, so users can use this trick to get security updates of Windows XP for another five years. Important Note for our Readers - Despite receiving security updates for Windows XP by using such tricks, it is not possible to secure the complete system appropriately. So we highly recommend all of you to upgrade your operating system to the latest versions, i.e. Windows 7 or 8 or any Linux Distro.

0 comments:

Post a Comment