Jump to content
Microsoft Windows Bulletin Board

AWS

Administrators
  • Posts

    13363
  • Joined

  • Last visited

  • Days Won

    4

Everything posted by AWS

  1. unlock g iphone View this thread
  2. Severity Rating: Critical Revision Note: V1.1 (May 16, 2012): Added a link to Microsoft Knowledge Base Article 2681578 under Known Issues in the Executive Summary. Also added Microsoft .NET Framework 1.1 Service Pack 1 to the Non-Affected Software table and corrected the update replacement information for Microsoft Office. These were informational changes only. There were no changes to the security update files or detection logic. Summary: This security update resolves three publicly disclosed vulnerabilities and seven privately reported vulnerabilities in Microsoft Office, Microsoft Windows, the Microsoft .NET Framework, and Microsoft Silverlight. The most severe of these vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits a malicious webpage that embeds TrueType font files. An attacker would have no way to force users to visit a malicious website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website. View this security bulletin
  3. Severity Rating: Critical Revision Note: V2.0 (May 11, 2012): Added an entry to the update FAQ to communicate that security update KB2656353 addresses the vulnerabilities described in this bulletin for all supported systems running Microsoft .NET Framework 1.1 Service Pack 1, except when installed on Windows Server 2003 Service Pack 2. There were no changes to the security update files. Customers who have successfully installed the update do not need to take any action. Summary: This security update resolves two privately reported vulnerabilities in the .NET Framework. The vulnerabilities could allow remote code execution on a client system if a user views a specially crafted webpage using a web browser that can run XAML Browser Applications (XBAPs). Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. View this security bulletin
  4. Revision Note: V2.0 (May 11, 2012): For MS12-035, corrected the security update number to KB2656353 for all supported systems running Microsoft .NET Framework 1.1 Service Pack 1, except when installed on Windows Server 2003 Service Pack 2. There were no changes to the security update files. Customers who have successfully installed the update do not need to take any action. Summary: This bulletin summary lists security bulletins released for May 2012. View this security bulletin
  5. Severity Rating: Critical Revision Note: V1.4 (May 11, 2012): Added entry to the update FAQ to announce that KB2656353, offered in this bulletin, also addresses CVE-2012-0160 and CVE-2012-0161, which are documented in MS12-035. Summary: This security update resolves one publicly disclosed vulnerability and three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of these vulnerabilities could allow elevation of privilege if an unauthenticated attacker sends a specially crafted web request to the target site. An attacker who successfully exploited this vulnerability could take any action in the context of an existing account on the ASP.NET site, including executing arbitrary commands. In order to exploit this vulnerability, an attacker must be able to register an account on the ASP.NET site, and must know an existing user name. View this security bulletin
  6. Revision Note: V1.0 (May 8, 2012): Advisory published. Summary: Microsoft is releasing a new set of ActiveX kill bits with this advisory. View this security bulletin
  7. Severity Rating: Important Revision Note: V1.0 (May 8, 2012): Bulletin published. Summary: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to a system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. View this security bulletin
  8. Severity Rating: Important Revision Note: V1.0 (May 8, 2012): Bulletin published. Summary: This security update resolves one publicly disclosed and one privately reported vulnerability in Microsoft Windows. The more severe of these vulnerabilities could allow elevation of privilege if an attacker logs on to a system and runs a specially crafted application. View this security bulletin
  9. Severity Rating: Important Revision Note: V1.0 (May 8, 2012): Bulletin published. Summary: This security update resolves a privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if a user opens a specially crafted Visio file. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. View this security bulletin
  10. Severity Rating: Important Revision Note: V1.0 (May 8, 2012): Bulletin published. Summary: This security update resolves one publicly disclosed and five privately reported vulnerabilities in Microsoft Office. The vulnerabilities could allow remote code execution if a user opens a specially crafted Office file. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. View this security bulletin
  11. Severity Rating: Critical Revision Note: V1.0 (May 8, 2012): Bulletin published. Summary: This security update resolves a privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if a user opens a specially crafted RTF file. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. View this security bulletin
  12. Severity Rating: Critical Revision Note: V2.0 (April 26, 2012): Added Service Pack 1 versions of SQL Server 2008 R2 to the Affected Software and added an entry to the update FAQ to explain which SQL Server 2000 update to use based on version ranges. These are informational changes only. There were no changes to the security update files or detection logic. For a complete list of changes, see the entry to the section, Frequently Asked Questions (FAQ) Related to This Security Update. Summary: This security update resolves a privately disclosed vulnerability in Windows common controls. The vulnerability could allow remote code execution if a user visits a website containing specially crafted content designed to exploit the vulnerability. In all cases, however, an attacker would have no way to force users to visit such a website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website. The malicious file could be sent as an email attachment as well, but the attacker would have to convince the user to open the attachment in order to exploit the vulnerability. View this security bulletin
  13. Howdy and welcome.
  14. If you read an email it should still remain in the inbox. It will be removed from the unread email folder. Is it possible your mother is confusing the unread email folder with the inbox?
  15. I've never seen that before. Have you scanned for any virus or malware on your computer? It is possible you are infected or it's just possible someone deleted a file needed by the program.
  16. AWS

    Murray

    Have you check the monitor resolution to make sure it is set correctly? Have you tried to have the monitor adjust the the screen size? On most LCD displays there is a button that you can press that will self adjust the height and width to fit full screen.
  17. Just pick the correct forum to post in and we'll help you.
  18. If you download a copy of Windows 7 from Microsoft's site your key will activate it.
  19. I doubt it is. I would try an online virus scanner to check things.
  20. What you need to do is a repair install of Windows 7. Reboot the computer and tap on F8 when the bios screen loads. This will bring to the repair console.
  21. Use this forum to let me know what you like or dislike here at Microsoft Windows Bulletin Board. Also let me know by starting a new thread in this forum if you find a bug or if a feature doesn't work as you expected.
  22. It sound to me like you are hitting some kind of limit in Windows 7 and the way you have it configured to connect.
  23. It sound to me like you are hitting some kind of limit in Windows 7 and the way you have it configured to connect.
  24. It sound to me like you are hitting some kind of limit in Windows 7 and the way you have it configured to connect.
  25. It sound to me like you are hitting some kind of limit in Windows 7 and the way you have it configured to connect.
×
×
  • Create New...