Jump to content
Microsoft Windows Bulletin Board

AWS

Administrators
  • Posts

    13363
  • Joined

  • Last visited

  • Days Won

    4

Everything posted by AWS

  1. The icons on my desktop are way too big as is the rest of my programs. My e-mails are so big I can't get them all on the screen. I have gone into Personalization but can't seem to find settings anywhere. This appeared to happen all by itself as everything was fine until a couple of days ago. What can I do to fix this. Thanks, View this thread
  2. MERCI DE ME REPONDREMICHELE MCDONALDoriginal title: COMMENT IMPRIMER LA LISTE DE MES CONTACTS DANS WINDOWS LIVE View this thread
  3. For the last 3-4 months I cant access one of my email accounts (I have two but one works fine) withough having to sign into BT Yahoo. Also, when I have been signed into Yahoo for a while, I cant access the email account again though MS mail - its almost like it times out? All I keep getting is an error box asking for my password which it wont accept (I have never changed it!). It just keeps going round in circles. I even uninstalled mail but when I reinstalled it - it was the same. Im not technically minded and am starting to lose the will to live. HELP!!! View the thread
  4. during installing some software iam facing this problem please anyone can give solution to this problem in windows 7/64bit sir , i've got this result for your sugession C:>cmd /k set ALLUSERSPROFILE=C:ProgramData APPDATA=C:UsersinnocentAppDataRoaming CommonProgramFiles=C:Program FilesCommon Files CommonProgramFiles(x86)=C:Program Files (x86)Common Files CommonProgramW6432=C:Program FilesCommon Files COMPUTERNAME=INOCENTH ComSpec=C:Windowssystem32cmd.exe configsetroot=C:WindowsConfigSetRoot FP_NO_HOST_CHECK=NO HOMEDRIVE=C: HOMEPATH=Usersinocenth LenovoTestLogFile=preload.log LenovoTestPath=C:prdv10 LOCALAPPDATA=C:UsersinnocentAppDataLocal LOGONSERVER=\INOCENTH NUMBER_OF_PROCESSORS=4 OS=Windows_NT Path=C:Program FilesCommon FilesMicrosoft SharedWindows LiveC:Program File s (x86)Common FilesMicrosoft SharedWindows LiveC:Windowssystem32C:Window sC:WindowsSystem32WbemC:WindowsSystem32WindowsPowerShellv1.0C:Progra m FilesLenovoBluetooth SoftwareC:Program FilesLenovoBluetooth Softwaresy swow64C:Program Files (x86)Windows LiveSharedC:Program Files (x86)Common FilesAutodesk SharedC:Program FilesBroadcomBroadcom 802.11 Network Adapter Driver PATHEXT=.COM.EXE.BAT.CMD.VBS.VBE.JS.JSE.WSF.WSH.MSC PROCESSOR_ARCHITECTURE=AMD64 PROCESSOR_IDENTIFIER=Intel64 Family 6 Model 42 Stepping 7, GenuineIntel PROCESSOR_LEVEL=6 PROCESSOR_REVISION=2a07 ProgramData=C:ProgramData ProgramFiles=C:Program Files ProgramFiles(x86)=C:Program Files (x86) ProgramW6432=C:Program Files PROMPT=$P$G PSModulePath=C:Windowssystem32WindowsPowerShellv1.0Modules PUBLIC=C:UsersPublic SESSIONNAME=Console SystemDrive=C: SystemRoot=C:Windows TEMP=C:UsersinocenthAppDataLocalTemp TMP=C:UsersinocenthAppDataLocalTemp USERDOMAIN=INOCENTH USERNAME=innocent USERPROFILE=C:Usersinocenth windir=C:Windows windows_tracing_flags=3 windows_tracing_logfile=C:BVTBinTestsinstallpackagecsilogfile.log View the thread
  5. Revision Note: V1.0 (June 12, 2012): Advisory published. Summary: Microsoft is investigating reports of a vulnerability in Microsoft XML Core Services. The vulnerability could allow remote code execution if a user views a specially crafted web page using Internet Explorer. An attacker would have no way to force users to visit such a website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website. View this security bulletin
  6. Severity Rating: Important Revision Note: V1.0 (June 12, 2012): Bulletin published. Summary: This security update resolves one privately reported vulnerability and one publicly disclosed vulnerability in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application that exploits the vulnerability. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. The vulnerability could not be exploited remotely or by anonymous users. View this security bulletin
  7. Severity Rating: Important Revision Note: V1.0 (June 12, 2012): Bulletin published. Summary: This security update resolves five privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to a system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit any of these vulnerabilities. View this security bulletin
  8. Severity Rating: Important Revision Note: V1.0 (June 12, 2012): Bulletin published. Summary: This security update resolves one privately reported vulnerability in Microsoft Dynamics AX Enterprise Portal. The vulnerability could allow elevation of privilege if a user clicks a specially crafted URL or visits a specially crafted website. In an email attack scenario, an attacker could exploit the vulnerability by sending an email message that contains the specially crafted URL to the user of the targeted Microsoft Dynamics AX Enterprise Portal site and by convincing the user to click the specially crafted URL. Internet Explorer 8 and Internet Explorer 9 users browsing to a Microsoft Dynamics AX Enterprise Portal site in the Internet Zone are at a reduced risk. By default, the XSS Filter in Internet Explorer 8 and Internet Explorer 9 prevents this attack in the Internet Zone. However, the XSS Filter in Internet Explorer 8 and Internet Explorer 9 is not enabled by default in the Intranet Zone. View this security bulletin
  9. Severity Rating: Important Revision Note: V1.0 (June 12, 2012): Bulletin published. Summary: This security update resolves one publicly disclosed vulnerability and three privately reported vulnerabilities in Microsoft Lync. The most severe vulnerabilities could allow remote code execution if a user views shared content that contains specially crafted TrueType fonts. View this security bulletin
  10. Severity Rating: Critical Revision Note: V1.0 (June 12): Bulletin published. Summary: This security update resolves one privately reported vulnerability in the Microsoft .NET Framework. The vulnerability could allow remote code execution on a client system if a user views a specially crafted webpage using a web browser that can run XAML Browser Applications (XBAPs). Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerability could also be used by Windows .NET Framework applications to bypass Code Access Security (CAS) restrictions. In a web browsing attack scenario, an attacker could host a website that contains a webpage that is used to exploit this vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit these websites. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes users to the attacker's website. View this security bulletin
  11. Severity Rating: Critical Revision Note: V1.0 (June 12, 2012): Bulletin published. Summary: This security update resolves one publicly disclosed and twelve privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. View this security bulletin
  12. Severity Rating: Critical Revision Note: V1.0 (June 12): Bulletin published. Summary: This security update resolves a privately reported vulnerability in the Remote Desktop Protocol. The vulnerability could allow remote code execution if an attacker sends a sequence of specially crafted RDP packets to an affected system. By default, the Remote Desktop Protocol (RDP) is not enabled on any Windows operating system. Systems that do not have RDP enabled are not at risk. View this security bulletin
  13. Severity Rating: Critical Revision Note: V2.0 (June 12, 2012): Bulletin rereleased to reoffer the update for all affected software. Customers who have already successfully installed the update originally offered on April 10, 2012 are encouraged to install the reoffered update. See the Update FAQ for details. Summary: This security update resolves one privately reported vulnerability in Microsoft .NET Framework. The vulnerability could allow remote code execution on a client system if a user views a specially crafted webpage using a web browser that can run XAML Browser Applications (XBAPs). Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerability could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and then executes the page, as could be the case in a web hosting scenario. This vulnerability could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. In a web browsing attack scenario, an attacker could host a website that contains a webpage that is used to exploit this vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit these websites. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes users to the attacker's website. View this security bulletin
  14. Alright, a while ago a bought an academic (student/faculty) version of a windows 7 ultimate upgrade (from vista) and the only CD that came with it was 32 bit version. At the time I thought nothing of it, but now I would like to do a clean install with 64 bit. Here's my question: what's the best way to do this? Im fairly certain that retail versions of windows include both 32 and 64 bit installations using the same product ID, so I'm assuming I can do something similar and just get a 64 bit installer using by existing windows 7 ultimate license. Am I right? Can I just get a new 64 bit installer and use my existing license? If not, is there a cheaper upgrade so I can get a 64 bit install? View the thread
  15. I've got Windows 7, and I'm running Office XP, so I'm trying to figure out why I'm getting updates through Windows Update for Office 2007. Is it the compatibility pack that I downloaded? What is it? I'll download them if I actually need to, but as far as I can tell right now, I don't. View this thread
  16. WQindows XP SP3 : Updates KB2518864, KB2572073, and KB2633880 Updates offered first thru AU. Allowed all. I am on dial up, and it took 4.5 hours to dl them. Got them then they installed. Or so I thought. Problem is, they sort of went into a loop. Continued to offer them to me, and told me to install. In WU, it shows them as installed, 16 times each. NONE are in my add & remove programs. But also, they are showing in event viewer, as installed 32 times. I am NOT trying to be mouthy, but would like an answer, and have asked this before, but got the run around. Any light would be greatly appriciated View this thread
  17. Your version of isn't compatible with this version of Windows. View this thread
  18. I prefer Outlook Express to Windows Live Mail email program, but will Outlook Express even work on my new 64 bit computer (old one is 32 bit)? One of the reasons I do NOT like Windows Live Mail is because it uses the same address book for all the mailboxes, and when you try to migrate the contacts from XP it sometimes does it 2, 3, & 4 times with some of the addresses, creating a mess and is a time consuming operation to clean up. Looking forward to an answer to our question. Your help will be greatly appreciated! Rog View the thread
  19. After the latest windows update installed on 6/5/2012, I am missing drivers for my touchpad, wi-fi and many other drivers on my toshiba L645D laptop. When I troubleshoot the problem, says to reinstall drivers, but troubleshooter can't find the drivers. Would appreciate any help in this matter, as this has happened before, but resolved itself with another update. Just wondering if I have to wait for windows to fix this issue or if I can configure my windows updater to include the updated drivers that work? View this thread
  20. My operating system is Vista, and I keep installing the update and it keeps failing...any help plz? View this thread
  21. windows update for vista fail to install and give error code 80071A30. What is this error and how do I get updates to install? Rod View this thread
  22. Not very computer savvy and need help. Sometimes computer gets the blue screen of death after startup and reboots itself. View this thread
  23. When I try to install Windows updates I get error code 800B0100. I tried to install KB947821, the fix on the Windows download page and it says it is installing but it never does. My virus protection is Windows Security Essentials and I can't figure out how to turn it off when I tried that before downloading. Any suggestions? View this thread
  24. I got a windows phone lumia 710 cant connect to my laptop windows xp. help View this thread
×
×
  • Create New...