Jump to content

Microsoft Support & Discussions

Microsoft Windows, Windows Server software, Microsoft 365, Microsoft Azure or any other Microsoft product discussions and help.

  1. Guest Serenity Caldwell
    Started by Guest Serenity Caldwell,

    Hey, smartwatch manufacturers: Ladies want to wear these things, too. I like my 38mm Apple Watch a lot. It fits well into my day-to-day activities, it helps keep me fit, and, oh hey — it fits my wrist. When I first heard about Android Wear last year, I thought the folks behind the OS were doing a lot of things right. And I still do: the approach to notifications is smart, custom watch faces are neat, and Google Now — while creepy — works exceptionally well at providing smart information for your day. There's only one problem: There's not a single Android Wear device designed to fit a small-wristed person. You're wearing it wrong If wearable technology is …

    • 0 replies
    • 60 views
  2. Guest Joseph Keller

    FileMaker has announced the latest version of their FileMaker Platform, which allows businesses to create custom solutions to fit their needs on Mac, Windows, iPhone, iPad, and the web. FileMaker Platform 14 adds several new and powerful features for businesses, making it easier than ever to create customized solutions for multiple platforms. FileMaker lets you get started quickly with pre-existing templates, which you can modify to fit your exact needs. FileMaker 14 adds a number of new tools. For instance, the new Script Workspace can speed up automation of different activities of your business: A Script Workspace speeds automation of common business pro…

    • 0 replies
    • 28 views
  3. Guest iMore.com

    These unique bumper cases fit perfectly around the edges of your device and feature raised side buttons for quick and easy access when you need it most. Even with the combination of aluminum and shock absorbent TPU, the TETRA Case is amazingly thin and lightweight. Available in 6 colors for only $18.95 each Continue reading...

    • 0 replies
    • 27 views
  4. Guest Peter Cohen
    Started by Guest Peter Cohen,

    Think USB-C on the new MacBook is a mistake? Get over it. We're going to be seeing a lot more. The Internet outrage machine has produced much sturm und drang over Apple's the new MacBook and its use of a USB-C connector instead of USB 3.0 or Thunderbolt, as is available on other Mac laptops. I have to say, though: I'm ready for a new peripheral interface. Most of the anger directed at USB-C on the new MacBook isn't because of any inherent flaw in the technology; it's because of the MacBook's use of a singular connector to attach peripherals and power. The MacBook simply isn't designed to be an externally expandable machine, and if you're considering it as one, you…

    • 0 replies
    • 45 views
  5. Guest John Callaham

    Microsoft's Office apps for the iPhone and iPad can all connect to Apple's iCloud storage service to store, open, and edit files, thanks to new updates for those apps. The new versions of the Word, PowerPoint, and Excel iOS apps should make it easier for users to quickly store their documents remotely using iCloud. In addition, each app has their own new additions. The Word app has some new templates to choose from to make creating documents quicker, while the PowerPoint app now allows users to insert images and videos from the iPhone or iPad's camera directly into any presentation. The app also supports a way to quickly change the layout of a presentation slide. …

    • 0 replies
    • 32 views
  6. Guest Joseph Keller
    Started by Guest Joseph Keller,

    Popular drawing app Paper has been updated with Think Kit, a new set of tools for the app that let you quickly create charts, diagrams, and more. Though a little later than expected, FiftyThree has now updated their Paper app for iPad with the new Think Kit tools. Aimed more towards professionals, Think Kit adds three new tools: Diagram, Cut, and Fill. These new tools, all available for free, let you quickly and easily make charts, graphs, diagrams, and more. Diagram Create flow diagrams, org charts, axis lines, and wireframes. Diagram is a smart pen that transforms circles, rectangles, and triangles into corrected "smart shapes" that you can easily fill and…

    • 0 replies
    • 49 views
  7. Guest Microsoft Security

    Severity Rating: Critical Revision Note: V1.0 (May 12, 2015): Bulletin published. Summary: This security update resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if a user opens a specially crafted Journal file. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. Continue reading...

    • 0 replies
    • 47 views
  8. Guest Microsoft Security

    Severity Rating: Important Revision Note: V1.0 (May 12, 2015): Bulletin published. Summary: This security update resolves a vulnerability in Microsoft Silverlight. The vulnerability could allow elevation of privilege if a specially crafted Silverlight application is run on an affected system. To exploit the vulnerability an attacker would first have to log on to the system or convince a logged on user to execute the specially crafted application. Continue reading...

    • 0 replies
    • 50 views
  9. Guest Microsoft Security

    Severity Rating: Critical Revision Note: V1.0 (May 12, 2015): Bulletin published. Summary: This security update resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType fonts. Continue reading...

    • 0 replies
    • 46 views
  10. Guest Microsoft Security

    Severity Rating: Important Revision Note: V1.0 (May 12, 2015): Bulletin published. Summary: This security update resolves vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow elevation of privilege if an attacker sends specially crafted data to a WinForms application running in partial trust. Continue reading...

    • 0 replies
    • 42 views
  11. Guest Microsoft Security

    Severity Rating: Important Revision Note: V1.0 (May 12, 2015): Bulletin published. Summary: This security update resolves a vulnerability in Windows Service Control Manager (SCM), which is caused when SCM improperly verifies impersonation levels. The vulnerability could allow elevation of privilege if an attacker can first log on to the system and then run a specially crafted application designed to increase privileges. Continue reading...

    • 0 replies
    • 57 views
  12. Guest Microsoft Security

    Severity Rating: Important Revision Note: V1.0 (May 12, 2015): Bulletin published. Summary: This security update resolves vulnerabilities in Microsoft Windows. The more severe of these vulnerabilities could allow elevation of privilege if an attacker could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. The vulnerability could not be exploited remotely or by anonymous users. Continue reading...

    • 0 replies
    • 55 views
  13. Guest Microsoft Security

    Severity Rating: Important Revision Note: V1.0 (May 12, 2015): Bulletin published. Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow security feature bypass if an attacker can log on to an affected system and run a specially crafted application. Continue reading...

    • 0 replies
    • 38 views
  14. Guest Microsoft Security

    Severity Rating: Important Revision Note: V1.0 (May 12, 2015): Bulletin published. Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow information disclosure when Secure Channel (Schannel) allows the use of a weak Diffie-Hellman ephemeral (DFE) key length of 512 bits in an encrypted TLS session. Allowing 512-bit DHE keys makes DHE key exchanges weak and vulnerable to various attacks. A server needs to support 512-bit DHE key lengths for an attack to be successful; the minimum allowable DHE key length in default configurations of Windows servers is 1024 bits. Continue reading...

    • 0 replies
    • 61 views
  15. Guest Rich Edmonds

    The next generation iPhone will include Apple's new features and some optical improvements While financial analysts typically serve the interests of their clients, not the general tech reading community, KGI Securities' Ming Chi Kuo has been among the most reliable when it comes to Apple product predictions. This year he's released an investment not that features 11 predictions for the iPhone 6s and iPhone 6s Plus. Force Touch will be the biggest upgraded selling point, but also one of the main bottlenecks of the supply chain. Force Touch can enhance user experience due to more input methods and support of handwritten signatures, which is beneficial for expanding…

    • 0 replies
    • 49 views
  16. Guest Allyson Kazmucha
    Started by Guest Allyson Kazmucha,

    When it comes to waterproof cases for your iPhone 6, it's important to pick a case you can trust. With the summer almost upon us, many of us will be toting our iPhones to the pool or the beach. Aside from keeping sand, water, dust, and other harmful materials out of your iPhone 6 in everyday situations, a good waterproof case also lets you take your iPhone places you normally wouldn't be able to. Whether you're catching waves or flying down the slopes, these are currently the waterproof cases we recommend considering before any others! When purchasing a waterproof case for your iPhone 6, it's important to understand waterproof ratings and what they mean. You'll norm…

    • 0 replies
    • 34 views
  17. Guest Russell Holly
    Started by Guest Russell Holly,

    The folks behind Duet Display have released a Windows client, which allows you to extend your PC to any iOS device. Plugging in a second monitor to extend your computer's display is about as far from a new concept as you can get, but taking an existing piece of technology and using it as a second monitor is something of a challenge. Duet Display was one of the first reliable apps to turn your iOS device into a 60fps second monitor with touch input; now, the app has added support for extending Windows desktops. Duet offers one of the best experiences for temporarily extending your desktop setup when you're on the go. With Windows support now available, Duet Display…

    • 0 replies
    • 40 views
  18. Guest Rich Stevens
    Started by Guest Rich Stevens,

    Ed: Welcome to this week's edition of The Pixel Project: a weekly comic from Diesel Sweeties' Rich Stevens on Apple, technology, and everything in-between. Today: Apple Watch Launch : Day 5,257 Read more comics from the Pixel Project on iMore.com. Continue reading...

    • 0 replies
    • 40 views
  19. Guest Harish Jonnalagadda
    Started by Guest Harish Jonnalagadda,

    Verizon has announced that it will acquire AOL for $4.4 billion, with the deal expected to bolster the carrier's advertising efforts in the mobile video segment. Verizon is launching an mobile-focused video service later this year, and has already inked content deals with several content providers, including the NFL. The carrier will offer paid and ad-supported tiers, which is where AOL's advertising platform — which counts over 30,000 partners — comes in handy. Following the closure of the deal, AOL will continue to operate as a wholly-owned subsidiary of Verizon, with current CEO Tim Armstrong staying on-board to lead AOL's day-to-day operations. In a memo sent …

    • 0 replies
    • 46 views
  20. Guest MSRC Team
    Started by Guest MSRC Team,

    Today, as part of Update Tuesday, we released 13 security bulletins. We encourage customers to apply all of these updates. For more information about this month’s security updates, including a detailed view of the Exploitability Index (XI), visit the Microsoft Bulletin Summary webpage. If you are not familiar with how we calculate the XI, a full description can be found here. We also released one new Security Advisory: Update to Default Cipher Suite Priority Order (3042058) One Security Advisory was revised: Update for Adobe Flash Player in Internet Explorer (2755801) For the latest information, you can follow the Microsoft Security Response Center…

    • 0 replies
    • 52 views
  21. Guest Microsoft Security

    Severity Rating: Important Revision Note: V1.0 (May 12, 2015): Bulletin published. Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow denial of service if a remote, unauthenticated attacker convinces a user to open a share containing a specially crafted .msc file. However, an attacker would have no way of forcing a user to visit the share or view the file. Continue reading...

    • 0 replies
    • 50 views
  22. Guest Microsoft Security

    Severity Rating: Important Revision Note: V1.0 (May 12, 2015): Bulletin published. Summary: This security update resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. Continue reading...

    • 0 replies
    • 56 views
  23. Guest Microsoft Security

    Severity Rating: Critical Revision Note: V1.0 (May 12, 2015): Bulletin published. Summary: This security update resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. Continue reading...

    • 0 replies
    • 59 views
  24. Guest Microsoft Security

    Severity Rating: Important Revision Note: V1.0 (May 12, 2015): Bulletin published. Summary: This security update resolves vulnerabilities in Microsoft Office server and productivity software. The vulnerabilities could allow remote code execution if an authenticated attacker sends specially crafted page content to a SharePoint server. An attacker who successfully exploited these vulnerabilities could run arbitrary code in the security context of the W3WP service account on the target SharePoint site. Continue reading...

    • 0 replies
    • 54 views
  25. Guest Microsoft Security

    Severity Rating: Important Revision Note: V1.0 (May 12, 2015): Bulletin published. Summary: This security update resolves ASLR security feature bypasses in the JScript and VBScript scripting engines in Microsoft Windows. An attacker could use an ASLR bypass in conjunction with another vulnerability, such as a remote code execution vulnerability, that could take advantage of the ASLR bypass to run arbitrary code. For example, a remote code execution vulnerability that is blocked by ASLR could be exploited after a successful ASLR bypass. Continue reading...

    • 0 replies
    • 48 views