Patch I for KAVKISKTSKFA 2021 MR3 / KS / VPN / KSOS beta
#1
Information 
Quote:Hi,

Patch is available for testing now.
 
Update sources: http://dnl-test.kaspersky-labs.com/ap2
 
Please note that to install the patch in KSeC (KSDE), you need to update the product from the test server using the commands below.
 
Quote:Windows x86

cd "%ProgramFiles%\Kaspersky Lab\Kaspersky Secure Connection 5.3"avp.com update http://dnl-test.kaspersky-labs.com/ap2

Windows x64

cd "%ProgramFiles(x86)%\Kaspersky Lab\Kaspersky Secure Connection 5.3"avp.com update http://dnl-test.kaspersky-labs.com/ap2

Check the presence of a patch in the standard windows "Support", "About the program."
 
Fixed:
  • Known internal logic and stability issues
To begin testing you need to do next:
1. Install product
2. Update from public servers and reboot OS
3. Enable traces
4. Set Manual mode of Update
5. Set Update source: http://dnl-test.kaspersky-labs.com/ap2
6. Reboot OS
 
As usual I'd like to remind you:
1) If you found any problem, please, re-check it on the previous patch. Here we are looking only for bugs related to current patch.
2) Don't forget about traces and screenshots.
 
Bug report: version 2021MR3
Flood will be deleted.
Source
[-] The following 1 user says Thank You to harlan4096 for this post:
  • ismail
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
Microsoft releases KB5070773 out of ban...
Thanks for the updat...jasonX — 12:07
Google Chrome 141.0.7390.122/.123
Google Chrome 141....harlan4096 — 11:05
AnyViewer Remote Desktop 3.3.1 for macOS
Version 3.3.1 S...harlan4096 — 10:57
AnyViewer Remote Desktop 5.40 for Window...
Version 5.4.0 O...harlan4096 — 08:40
Bitdefender 27.0.55.279
Bitdefender 27.0.5...harlan4096 — 07:40

[-]
Birthdays
Today's Birthdays
avatar (40)Michaelcrini
Upcoming Birthdays
avatar (47)Michaelaceve
avatar (37)QuadirLigh
avatar (38)Mblippek
avatar (44)viecontAceve

[-]
Online Staff
There are no staff members currently online.

>