Microsoft Support & Discussions
Free PC Help Forum microsoft products support and discussions. If you need help with Microsoft Windows, Windows Server software, Microsoft 365, Microsoft Azure or any other Microsoft product you can post here. If you want to discuss Microsoft and their line of products you can do that here also.
84,440 topics in this forum
-
-
- FPCH Admin
- 1 follower
- 0 replies
- 723 views
Whether through a video anomaly, a misbehaving app, or some other strange factor, sometimes you’ll pull up the Windows 10 Start Menu and all your Live Tile counts are gone. And, not just that, but some of the Tiles will actually be blank so that you can’t even tell what app the tile represents. A reboot of the PC absolutely fixes this, but there’s a quicker fix that’s within easy reach. Do this: Run Task Manager and locate “Windows Explorer” in the list of running Processes. (easiest way to locate Task Manager is to right-click on the Windows 10 Taskbar and choose it from the pop-up menu) Right-click on the “Windows Explorer” process and choose “Restart.…
Last reply by allheart55 Cindy E, -
-
Cut your network port count per server by 50% with Windows Server 2016
by Guest Microsoft Windows Server- 0 replies
- 72 views
This post was authored by Don Stanwyck, Senior Program Manager, Windows Server. Network complexity is largely driven by the number of nodes connected to it and the number of paths between them. The situation is compounded when multiple protocols operate over the shared resource. Windows Server 2016 simplifies the network by decreasing the number of connected nodes and increases storage performance because Remote Direct Memory Access (RDMA) and the Hyper-V switch can share the same network interface card (NIC) ports. Network architects can consolidate the physical networking without giving up the higher level benefits that traditional approaches afford, when storage tr…
-
Windows Store Weekly: your must-read for new titles to check out
by Guest Elana Pidgeon- 0 replies
- 86 views
Here’s a roundup of what’s new in the Windows Store this week, including great sales on TV shows and music, plus a new movie! Movies End of Season TV Sale – up to 29% off The TV season may be coming to an end, but there’s an upside – you can catch up on the latest seasons of all your favorite shows and save money doing it with our End of Season TV Sale! Are you behind on The Blacklist? Psyched to rewatch every hilarious episode of The Big Bang Theory? Binge watch these shows and more to your heart’s content, now through May 23, in the Movies & TV section of the Windows Store. Pride and Prejudice and Zombies – Buy for $14.99 It is a truth unive…
-
-
- FPCH Admin
- 1 follower
- 0 replies
- 561 views
Last October, thousands of unbanked consumers who rely on prepaid RushCards were unable to access their funds because of a technical glitch. After toying with the idea of creating a compensation fund for those customers, RushCard announced Thursday that it will pay at least $19 million to card users affected by the weeks-long outage. RushCard will provide at least $100 to each user who could not access their funds during the disturbance as part of an agreement to resolve a class-action lawsuit [PDF] against the company, The Associated Press reports. Compensation could reach as much at $500 for customers who can provide documentation of losses they incurred because …
Last reply by allheart55 Cindy E, -
-
- 1 follower
- 0 replies
- 710 views
The notorious Jigsaw Ransomware has rebranded itself as CryptoHitman and now uses the character from the popular Hitman video games and movies. In addition to adding the Hitman character to its locker screen, CryptoHitman also covers the lock screen with pornographic images that are definitely not safe for work. Blurred out Hitman Ransomware Locker Screen Like the previous Jigsaw ransomware infections, CryptoHitman will encrypt your data with AES encryption and demand a ransom payment before it will decrypt your files. In order to pay this ransom you will be required to send payment to cryptohitman@yandex.com. Unfortunately, this version will still delete …
Last reply by starbuck, -
Wi-Fi Sense is gone from the latest Windows 10 Insider build and will probably disappear from your Windows 10 machines this summer. Sometimes even good ideas just don’t work out in the real world, and to that end, Microsoft recently announced it’s killing Wi-Fi Sense in Windows 10. In fact, the latest Windows preview build for PCs, build 14342, already removed the feature from Windows Insiders' computers. Wi-Fi Sense is a controversial Wi-Fi password sharing feature Microsoft added to the original release of Windows 10. The idea was simple enough: click a check box and the passwords for Wi-Fi networks saved to your PC would be seamlessly shared with your fri…
Last reply by starbuck, -
-
- FPCH Admin
- 1 follower
- 0 replies
- 728 views
Microsoft is removing part of its controversial Wi-Fi Sense feature from Windows 10. "We have removed the Wi-Fi Sense feature that allows you to share Wi-Fi networks with your contacts and to be automatically connected to networks shared by your contacts," says Microsoft's Gabe Aul. "The cost of updating the code to keep this feature working combined with low usage and low demand made this not worth further investment." Wi-Fi Sense was originally introduced on Windows Phone and then updated and included with Windows 10. It's a feature that lets you automatically connect to open hotspots, and share your Wi-Fi passwords with contacts. Some security experts had expressed …
Last reply by allheart55 Cindy E, -
-
Announcing Windows 10 Insider Preview Build 14342
by Guest Gabe Aul- 0 replies
- 56 views
Hi everyone, Today we are releasing Windows 10 Insider Preview Build 14342 to Windows Insiders in the Fast ring. The Language Packs for this build will be live later tomorrow. Here’s what’s new in Build 14342 Updates for Extensions in Microsoft Edge: Instead of extracting and loading extensions from a local folder, all available extensions can now be downloaded directly from the Windows Store. This change means that your currently installed extensions will be removed, and you’ll have to reinstall the ones you want from the Store. Then in future updates, your extensions will be automatically re-downloaded and installed. We also have some new extensions availa…
-
MS16-066 - Important: Security Update for Virtual Secure Mode (3155451) - Version: 1.0
by Guest Microsoft Security- 0 replies
- 64 views
Severity Rating: Important Revision Note: V1.0 (May 10, 2016): Bulletin published. Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow security feature bypass if an attacker runs a specially crafted application to bypass code integrity protections in Windows. Continue reading...
-
MS16-060 - Important: Security Update for Windows Kernel (3154846) - Version: 1.0
by Guest Microsoft Security- 0 replies
- 84 views
Severity Rating: Important Revision Note: V1.0 (May 10, 2016): Bulletin published. Summary: This security update resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application. Continue reading...
-
MS16-064 - Critical: Security Update for Adobe Flash Player (3157993) - Version: 1.0
by Guest Microsoft Security- 0 replies
- 82 views
Severity Rating: Critical Revision Note: V1.0 (May 10, 2016): Bulletin published. Summary: This security update resolves vulnerabilities in Adobe Flash Player when installed on all supported editions of Windows 8.1, Windows Server 2012, Windows Server 2012 R2, Windows RT 8.1, and Windows 10. Continue reading...
-
MS16-059 - Important: Security Update for Windows Media Center (3150220) - Version: 1.0
by Guest Microsoft Security- 0 replies
- 88 views
Severity Rating: Important Revision Note: V1.0 (May 10, 2016): Bulletin published. Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if Windows Media Center opens a specially crafted Media Center link (.mcl) file that references malicious code. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. Continue reading...
-
MS16-061 - Important: Security Update for Microsoft RPC (3155520) - Version: 1.0
by Guest Microsoft Security- 0 replies
- 63 views
Severity Rating: Important Revision Note: V1.0 (May 10, 2016): Bulletin published. Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker with physical access inserts a specially crafted USB device into the system. Continue reading...
-
MS16-056 - Critical: Security Update for Windows Journal (3156761) - Version: 1.0
by Guest Microsoft Security- 0 replies
- 75 views
Severity Rating: Critical Revision Note: V1.0 (May 10, 2016): Bulletin published. Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted Journal file. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. Continue reading...
-
MS16-067 - Important: Security Update for Volume Manager Driver (3155784) - Version: 1.0
by Guest Microsoft Security- 0 replies
- 82 views
Severity Rating: Important Revision Note: V1.0 (May 10, 2016): Click here to enter text. Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow information disclosure if a USB disk mounted over Remote Desktop Protocol (RDP) via Microsoft RemoteFX is not correctly tied to the session of the mounting user. Continue reading...
-
MS16-054 - Critical: Security Update for Microsoft Office (3155544) - Version: 1.0
by Guest Microsoft Security- 0 replies
- 80 views
Severity Rating: Critical Revision Note: V1.0 (May 10, 2016): Bulletin published. Summary: This security update resolves vulnerabilities in Microsoft Office. The vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. Continue reading...
-
MS16-055 - Critical: Security Update for Microsoft Graphics Component (3156754) - Version: 1.0
by Guest Microsoft Security- 0 replies
- 73 views
Severity Rating: Critical Revision Note: V1.0 (May 10, 2016): Bulletin published. Summary: This security update resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits a specially crafted website. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. Continue reading...
-
MS16-062 - Important: Security Update for Windows Kernel-Mode Drivers (3158222) - Version: 1.0
by Guest Microsoft Security- 0 replies
- 61 views
Severity Rating: Important Revision Note: V1.0 (May 10, 2016): Bulletin published. Summary: This security update resolves vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application. Continue reading...
-
MS16-065 - Important: Security Update for .NET Framework (3156757) - Version: 1.0
by Guest Microsoft Security- 0 replies
- 78 views
Severity Rating: Important Revision Note: V1.0 (May 10, 2016): Bulletin published. Summary: This security update resolves a vulnerability in Microsoft .NET Framework. The vulnerability could cause information disclosure if an attacker injects unencrypted data into the target secure channel and then performs a man-in-the-middle (MiTM) attack between the targeted client and a legitimate server. Continue reading...
-
May 2016 security update release
by Guest MSRC Team- 0 replies
- 75 views
Today we released security updates to provide additional protections against malicious attackers. As a best practice, we encourage customers to apply security updates as soon as they are released. More information about this month’s security updates and advisories can be found in the Security TechNet Library. MSRC team Continue reading...
-
A closer look at shielded VMs in Windows Server 2016
by Guest Microsoft Windows Server- 0 replies
- 74 views
This post was authored by Jeff Woolsey, Principal Program Manager, Windows Server. On this week’s Microsoft Mechanics show, we bring you Dean Wells and Matt McSpirit to demonstrate Shielded VMs – another reason why you should be evaluating Windows Server 2016. A little backstory … As someone who has spent a lot of time with hypervisors and virtualization, I’m the first one to tell you that virtual machines are fantastic. If you look at any datacenter today, virtualization is a key element. With virtual machines we’ve made it easier to deploy, manage, service and automate the infrastructure. The benefits are many; however, as much as I love virtualization, I’m…
-
MS16-057 - Critical: Security Update for Windows Shell (3156987) - Version: 1.0
by Guest Microsoft Security- 0 replies
- 65 views
Severity Rating: Critical Revision Note: V1.0 (May 10, 2016): Click here to enter text. Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if an attacker successfully convinces a user to browse to a specially crafted website that accepts user-provided online content, or convinces a user to open specially crafted content. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. Continue…
-
MS16-053 - Critical: Cumulative Security Update for JScript and VBScript (3156764) -...
by Guest Microsoft Security- 0 replies
- 61 views
Severity Rating: Critical Revision Note: V1.0 (May 10, 2016): Bulletin published. Summary: This security update resolves vulnerabilities in the JScript and VBScript scripting engines in Microsoft Windows. The vulnerabilities could allow remote code execution if a user visits a specially crafted website. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited these vulnerabilities could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accou…
-
MS16-052 - Critical: Cumulative Security Update for Microsoft Edge (3155538) - Version: 1.0
by Guest Microsoft Security- 0 replies
- 57 views
Severity Rating: Critical Revision Note: V1.0 (May 10, 2016): Bulletin published. Summary: This security update resolves vulnerabilities in Microsoft Edge. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Microsoft Edge. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users with administrative user rights. Continue reading...
-
MS16-051 - Critical: Cumulative Security Update for Internet Explorer (3155533) - Version: 1.0
by Guest Microsoft Security- 0 replies
- 53 views
Severity Rating: Critical Revision Note: V1.0 (May 10, 2016): Bulletin published. Summary: This security update resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Continue reading...