-
Posts
13363 -
Joined
-
Last visited
-
Days Won
4
Content Type
Profiles
Forums
Events
Articles
Downloads
Everything posted by AWS
-
i donot understand why im not getting actual answer to remove above queries from the botton bar, and i am looking after remidies of yhis question You aer requested to ,make crrection and remidies .Being a non technical preson ,I need help from you .Please help me and to reduce my anxiety . indranil View this thread
-
Salve,ho un problema ,l audio non mi funziona piu,sullo schermo mi appare la cassa dell audio con una x sopra,non riesco a risolvere il problema mi potete aiutare? grazie View the thread
-
I have installed MS word viewer 2003. And saw somewhere that there's 2007 version. All updates from MS update are installed, but it's still 2003. Is that ok that it's 2003, or i have something to do? View this thread
-
Jeg kan ikke installere update filer og kan ikke lave sikkerhedskopier af min disk. Mvh Jørgen Franke View the thread
-
It was suggested that I create a repair disc but when I inserted a blank CD-R disc a message appeared saying 'System Repair Disc could not be created' Parameter incorrect 0x80070057. Could you please advise View the thread
-
With the advent of Win 8 , many of my clients are now starting to consider the possibility of migrating from WinXP to at least Win 7 and then to Win 8. Do we have any documentation/case studies on clients who have successfully transitioned from Xp to Win 7/8 and more importantly what were the key considerations before and challenges they faced along that journey. Hope this makes sense - please come back if additional clarification is required View the full article
-
Hey. I have a Dell Axim X50 running Windows Mobile 4 SE and I need to update it to at least Windows Mobile 5 for work. The problem is that I can not find the windows Mobile 5 software anywhere. Does anyone know where to find it and how to install it? Any help anyone can offer would be grand! Thanks! Ken Durham View this thread
-
Ok, so my Lenovo laptop is about 2 years old. All the garbage on it was slowing it down and I did not want to put all the bloat ware back on it, so I decided to go with a fresh copy of windows 7 instead of lenovos recovery, and install all the needed drivers myself. So everything went fine until I tried to activate it. When I try to activate, it says error code 0xc004e003, and says the key is invalid. I tried phone activation and MS said the same thing that the key is invalid. Whats funny is when I click the button that says purchase a new key, it says "welcome to windows, because the version of windows installed on your pc is valid, enjoy....." It doesn't even give me a link to purchase. Any ideas? View the thread
-
Error Code 0x8007000D pop up says MS OS not genuine. I purchased it from Microsoft. error ocurred after was after checkng to see if i missed any microsoft updates. which never got that far. If there anyonet knows how to active & prove I do have a geuine Win 7 x64 OS Any advise cis appreciated View this thread
-
I have tried every step on every other topic with regards to 800B0100 error when trying to run Windows update on Windows 7 Professional SP1 x64. In running the system readiness update tool, I got a long list of errors that could not be fixed: Has anyone else had similar issues with none of the fixes working? Is there anything I can do short of a reformat/re-install of Windows? The following are the errors noted in the SURT: Found 21 errors CBS MUM Corrupt Total count: 11 CBS Catalog Corrupt Total count: 10 Unavailable repair files: servicingpackagesWUClient-SelfUpdate-Aux-AuxComp~31bf3856ad364e35~amd64~en-US~7.6.7600.256.mum servicingpackagesWUClient-SelfUpdate-Aux-AuxComp~31bf3856ad364e35~amd64~en-US~7.6.7600.256.mum servicingpackagesWUClient-SelfUpdate-Aux~31bf3856ad364e35~amd64~en-US~7.6.7600.256.mum servicingpackagesWUClient-SelfUpdate-Core-AdmComp~31bf3856ad364e35~amd64~en-US~7.6.7600.256.mum servicingpackagesWUClient-SelfUpdate-Core-AdmComp~31bf3856ad364e35~amd64~en-US~7.6.7600.256.mum servicingpackagesWUClient-SelfUpdate-Core-AdmComp~31bf3856ad364e35~amd64~~7.6.7600.256.mum servicingpackagesWUClient-SelfUpdate-Core-AdmComp~31bf3856ad364e35~amd64~~7.6.7600.256.mum servicingpackagesWUClient-SelfUpdate-Core-CoreComp~31bf3856ad364e35~amd64~en-US~7.6.7600.256.mum servicingpackagesWUClient-SelfUpdate-Core-CoreComp~31bf3856ad364e35~amd64~en-US~7.6.7600.256.mum servicingpackagesWUClient-SelfUpdate-Core-CoreComp~31bf3856ad364e35~amd64~~7.6.7600.256.mum servicingpackagesWUClient-SelfUpdate-Core-CoreComp~31bf3856ad364e35~amd64~~7.6.7600.256.mum servicingpackagesWUClient-SelfUpdate-Core-MiniLP~31bf3856ad364e35~amd64~en-US~7.6.7600.256.mum servicingpackagesWUClient-SelfUpdate-Core-MiniLP~31bf3856ad364e35~amd64~en-US~7.6.7600.256.mum servicingpackagesWUClient-SelfUpdate-Core-UIComp~31bf3856ad364e35~amd64~en-US~7.6.7600.256.mum servicingpackagesWUClient-SelfUpdate-Core-UIComp~31bf3856ad364e35~amd64~en-US~7.6.7600.256.mum servicingpackagesWUClient-SelfUpdate-Core-UIComp~31bf3856ad364e35~amd64~~7.6.7600.256.mum servicingpackagesWUClient-SelfUpdate-Core-UIComp~31bf3856ad364e35~amd64~~7.6.7600.256.mum servicingpackagesWUClient-SelfUpdate-Core~31bf3856ad364e35~amd64~en-US~7.6.7600.256.mum servicingpackagesWUClient-SelfUpdate-Core~31bf3856ad364e35~amd64~en-US~7.6.7600.256.mum servicingpackagesWUClient-SelfUpdate-Core~31bf3856ad364e35~amd64~~7.6.7600.256.mum servicingpackagesWUClient-SelfUpdate-Core~31bf3856ad364e35~amd64~~7.6.7600.256.mum servicingpackagesWUClient-SelfUpdate-Aux-AuxComp~31bf3856ad364e35~amd64~en-US~7.6.7600.256.cat servicingpackagesWUClient-SelfUpdate-Aux-AuxComp~31bf3856ad364e35~amd64~en-US~7.6.7600.256.cat servicingpackagesWUClient-SelfUpdate-Aux~31bf3856ad364e35~amd64~en-US~7.6.7600.256.cat servicingpackagesWUClient-SelfUpdate-Core-AdmComp~31bf3856ad364e35~amd64~en-US~7.6.7600.256.cat servicingpackagesWUClient-SelfUpdate-Core-AdmComp~31bf3856ad364e35~amd64~en-US~7.6.7600.256.cat servicingpackagesWUClient-SelfUpdate-Core-AdmComp~31bf3856ad364e35~amd64~~7.6.7600.256.cat servicingpackagesWUClient-SelfUpdate-Core-AdmComp~31bf3856ad364e35~amd64~~7.6.7600.256.cat servicingpackagesWUClient-SelfUpdate-Core-CoreComp~31bf3856ad364e35~amd64~en-US~7.6.7600.256.cat servicingpackagesWUClient-SelfUpdate-Core-CoreComp~31bf3856ad364e35~amd64~en-US~7.6.7600.256.cat servicingpackagesWUClient-SelfUpdate-Core-CoreComp~31bf3856ad364e35~amd64~~7.6.7600.256.cat servicingpackagesWUClient-SelfUpdate-Core-CoreComp~31bf3856ad364e35~amd64~~7.6.7600.256.cat servicingpackagesWUClient-SelfUpdate-Core-MiniLP~31bf3856ad364e35~amd64~en-US~7.6.7600.256.cat servicingpackagesWUClient-SelfUpdate-Core-MiniLP~31bf3856ad364e35~amd64~en-US~7.6.7600.256.cat servicingpackagesWUClient-SelfUpdate-Core-UIComp~31bf3856ad364e35~amd64~en-US~7.6.7600.256.cat servicingpackagesWUClient-SelfUpdate-Core-UIComp~31bf3856ad364e35~amd64~en-US~7.6.7600.256.cat servicingpackagesWUClient-SelfUpdate-Core-UIComp~31bf3856ad364e35~amd64~~7.6.7600.256.cat servicingpackagesWUClient-SelfUpdate-Core-UIComp~31bf3856ad364e35~amd64~~7.6.7600.256.cat View this thread
-
Today my hp pavilion m6 said it needed to update then restart to finish updating so I did. When the computer was restarting it said "failed to configure updates undoing changes" after a while I said "restarting" then after loading the windows 8 it stays on a blank screen and won't load anything. View this thread
-
abrir cd dvd com arquivo cdfs o que fazer View the thread
-
¿Por que la barra de tareas donde aparecen los iconos de INTERNET y el icono de GOOGLE CHROME se situo de la parte inferior de la pantalla a la parte superior de la misma y cada vez que intento abrir una nueva pestaña con el cursor aparece la barra y me impide poscisionarme en el recuadro de nueva pestaña?. Antes mi máquina una MINI LAP, me mandaba una pestaña diciendo que tenia poca batería y que tenia que conectarla o buscar una fuente de energía alterna. ¿Porque ya no me avisa y se va a invernar automáticamente?. Estos dos problemas surgieron después de ingresar a una página sospechosa, ¿Puede tratarse de un virus? View the thread
-
I have a Dell mini laptop with Windows 7 starter. Somehow I unpinned my email icon from the taskbar. how do I get it back? Thank you from a 56 year old beginner. Merry Christmas! View the thread
-
Severity Rating: Important Revision Note: V2.0 (December 11, 2012): Rereleased bulletin to replace the KB2597171 update with the KB2687508 update for all affected editions of Microsoft Visio 2010. Summary: This security update resolves a privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if a user opens a specially crafted Visio file. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. View this security bulletin
-
Severity Rating: Important Revision Note: V1.0 (December 11, 2012): Bulletin published. Summary: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow security feature bypass if an attacker presents a revoked certificate to an IP-HTTPS server commonly used in Microsoft DirectAccess deployments. To exploit the vulnerability, an attacker must use a certificate issued from the domain for IP-HTTPS server authentication. Logging on to a system inside the organization would still require system or domain credentials. View this security bulletin
-
Severity Rating: Important Revision Note: V1.0 (December 11, 2012): Bulletin published. Summary: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if an attacker convinces a user to view a specially crafted Office document with embedded content. An attacker who successfully exploits this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. View this security bulletin
-
Severity Rating: Critical Revision Note: V1.0 (December 11, 2012): Bulletin published. Summary: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user browses to a folder that contains a file or subfolder with a specially crafted name. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. View this security bulletin
-
Severity Rating: Critical Revision Note: V1.0 (December 11, 2012): Bulletin published. Summary: This security update resolves publicly disclosed vulnerabilities and one privately reported vulnerability in Microsoft Exchange Server. The most severe vulnerabilities are in Microsoft Exchange Server WebReady Document Viewing and could allow remote code execution in the security context of the transcoding service on the Exchange server if a user previews a specially crafted file using Outlook Web App (OWA). The transcoding service in Exchange that is used for WebReady Document Viewing is running in the LocalService account. The LocalService account has minimum privileges on the local computer and presents anonymous credentials on the network. View this security bulletin
-
Severity Rating: Critical Revision Note: V1.0 (December 11, 2012): Bulletin published. Summary: This security update resolves a privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if a user opens a specially crafted RTF file. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. View this security bulletin
-
Severity Rating: Critical Revision Note: V1.0 (December 11, 2012): Bulletin published. Summary: This security update resolves one publicly disclosed vulnerability and one privately reported vulnerability in Windows. The most severe of these vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits a malicious webpage that embeds TrueType or OpenType font files. An attacker would have to convince users to visit the website, typically by getting them to click a link in an email message that takes them to the attacker's website. View this security bulletin
-
Severity Rating: Critical Revision Note: V1.0 (December 11, 2012): Bulletin published. Summary: This security update resolves three privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. View this security bulletin
-
Severity Rating: Critical Revision Note: V2.0 (December 11, 2012): Rereleased bulletin to replace the KB2687323 update with the KB2726929 update for Windows common controls on all affected variants of Microsoft Office 2003, Microsoft Office 2003 Web Components, and Microsoft SQL Server 2005. See the update FAQ for details. Summary: This security update resolves a privately reported vulnerability in Windows common controls. The vulnerability could allow remote code execution if a user visits a website containing specially crafted content designed to exploit the vulnerability. In all cases, however, an attacker would have no way to force users to visit such a website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website. The malicious file could be sent as an email attachment as well, but the attacker would have to convince the user to open the attachment in order to exploit the vulnerability. View this security bulletin
-
Jag kan inte öppna .pdf-filer som kommer från Windows Live som bilaga. AcroRd32.exe är inkompatibel. Vad gör jag åt det ? Nosnahoj View the thread