![]() I did the installation of the 2008 file and the registry changes. This wasn't as straight forward as it seems. ![]() So with full credit to VistaLover, I will quote the instructions here: During that time, the thought occurred to me that if MSFN was indeed gone forever, VistaLover's instructions might also be lost - particularly the necessary registry edits. Update: If you did not install sha2 support in 2019, be advised that the last cumulative update with an sha1 signature was KB4507434.įor the second time in less than a year, MSFN was recently down for about a week. Note: VistaLover suggests installing all updates intended for Server 2008 since support for Vista ended before you begin - an idea that I don't necessarily endorse - but all that is really necessary for this purpose is to install the latest Server 2008 cumulative update for IE9 from Microsoft Update Catalog. Of course every browser nowadays supports at least TLS 1.1 and 1.2, if not 1.3 - but versions old enough to work on Vista are no longer receiving security updates, whereas Microsoft is still issuing cumulative updates for IE9 for the benefit of Server 2008 users. Before long, an MSFN member with screen name VistaLover posted instructions on Enabling TLS 1.1/1.2 support in Vista's Internet Explorer 9. Three months after Microsoft ended support for Vista, they issued an Update to add support for TLS 1.1 and TLS 1.2 in Windows Server 2008 SP2, the server version of Vista which is still under extended support until January 2020. Browser support for Windows Vista is almost nonexistent now - or is it? If they wish to continue thumbing their noses at Microsoft, power users can turn IE9 into a veritable Stegosaurus: well-protected, but still a lumbering dinosaur.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |