Microsoft Support & Discussions
Free PC Help Forum microsoft products support and discussions. If you need help with Microsoft Windows, Windows Server software, Microsoft 365, Microsoft Azure or any other Microsoft product you can post here. If you want to discuss Microsoft and their line of products you can do that here also.
84,928 topics in this forum
-
MS15-012 - Important: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution...
by Guest Microsoft Security- 0 replies
- 45 views
Severity Rating: Important Revision Note: V1.0 (February 10, 2015): Bulletin published. Summary: This security update resolves three privately reported vulnerabilities in Microsoft Office. The vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. Continue reading...
-
MS15-013 - Important: Vulnerability in Microsoft Office Could Allow Security Feature Bypass...
by Guest Microsoft Security- 0 replies
- 48 views
Severity Rating: Important Revision Note: V1.0 (February 10, 2015): Bulletin published. Summary: This security update resolves one publicly disclosed vulnerability in Microsoft Office. The vulnerability could allow security feature bypass if a user opens a specially crafted Microsoft Office file. The security feature bypass by itself does not allow arbitrary code execution. However, an attacker could use this security feature bypass vulnerability in conjunction with another vulnerability, such as a remote code execution vulnerability, to run arbitrary code. Continue reading...
-
MS15-014 - Important: Vulnerability in Group Policy Could Allow Security Feature Bypass...
by Guest Microsoft Security- 0 replies
- 53 views
Severity Rating: Important Revision Note: V1.0 (February 10, 2015): V1.0 (February 10, 2015): Bulletin published. Summary: Bulletin published. Continue reading...
-
MS15-015 - Important: Vulnerability in Microsoft Windows Could Allow Elevation of Privilege...
by Guest Microsoft Security- 0 replies
- 64 views
Severity Rating: Important Revision Note: V1.0 (February 10, 2015): Bulletin published. Summary: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an authenticated attacker acquires administrator credentials and runs a specially crafted application designed to increase privileges. Continue reading...
-
MS15-010 - Critical: Vulnerabilities in Windows Kernel-Mode Driver Could Allow Remote Code...
by Guest Microsoft Security- 0 replies
- 58 views
Severity Rating: Critical Revision Note: V1.0 (February 10, 2015): Bulletin published. Summary: This security update resolves six privately reported vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if an attacker convinces a user to open a specially crafted document or to visit an untrusted website that contains embedded TrueType fonts. To exploit the vulnerability an attacker would need to convince a user to open a specially crafted document or visit an untrusted website that contains embedded TrueType Fonts. Continue reading...
-
MS15-017 - Important: Vulnerability in Virtual Machine Manager Could Allow Elevation of...
by Guest Microsoft Security- 0 replies
- 54 views
Severity Rating: Important Revision Note: V1.0 (February 10, 2015): Bulletin published. Summary: This security update resolves a privately reported vulnerability in Virtual Machine Manager (VMM). The vulnerability could allow elevation of privilege if an attacker logs on an affected system. An attacker must have valid Active Directory logon credentials and be able to log on with those credentials to exploit the vulnerability. Continue reading...
-
MS15-011 - Critical: Vulnerability in Group Policy Could Allow Remote Code Execution...
by Guest Microsoft Security- 0 replies
- 56 views
Severity Rating: Critical Revision Note: V1.0 (February 10, 2015): Bulletin published. Summary: This security update resolves a privately reported vulnerability in Microsoft Windows. A remote code execution vulnerability exists in how group policy receives and applies connection data when a domain-joined system connects to a domain controller. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Continue reading...
-
MS15-016 - Important: Vulnerability in Microsoft Graphics Component Could Allow Information...
by Guest Microsoft Security- 0 replies
- 45 views
Severity Rating: Important Revision Note: V1.0 (February 10, 2015): Bulletin published. Summary: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow information disclosure if a user browses to a website containing a specially crafted TIFF image. This vulnerability would not allow an attacker to execute code or to elevate their user rights directly, but it could be used to obtain information that could be used to try to further compromise the affected system. Continue reading...
-
MS15-009 - Critical: Security Update for Internet Explorer (3034682) - Version: 1.0
by Guest Microsoft Security- 0 replies
- 56 views
Severity Rating: Critical Revision Note: V1.0 (February 10, 2015): Bulletin published. Summary: This security update resolves one publicly disclosed and forty privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. Continue reading...
-
-
- FPCH Admin
- 1 follower
- 0 replies
- 1.2k views
When you are testing the Windows 10 Technical Preview on a desktop or laptop it is easy to set things up so you do not lose the ability to have a solid production system running or immediately available. I have successfully installed Windows 10 Build 9926 in virtual machines using Hyper-V on Windows 8.1, in a dual boot configuration on two desktops alongside Windows 8.1 on each of them and I have upgraded at least one Windows 7 system. I know that my fellow SuperSite contributor Rod Trent has also installed the technical preview on his Surface Pro 3. So there are many options for safely testing the technical preview without risking your primary system. Microsoft …
Last reply by allheart55 Cindy E, -
-
The EyePatch case protects and polishes your iPhone cameras
by Guest Peter Cohen- 0 replies
- 37 views
Ever take a selfie on your iPhone only to realize it's blurry or streaky because there's something on the lens? If so, you may be interested in the EyePatch, a case that comes with a simple microfiber-embedded switch that covers both the FaceTime (front-facing) and iSight (rear-facing) cameras. It's available for both iPhone 5 and iPhone 6 (sorry, iPhone 6 Plus users, but it's not ready for your camera quite yet). The EyePatch case is a soft, flexible silicone rubber cover that fits snugly over the iPhone and protects it from dents, dings and scratches. And a cutout on the back enables you to show off your iPhone's Apple logo, so no one thinks you're using any lesser…
-
Swift 1.2 features an improved compiler and Objective-C interactions
by Guest Derek Kessler- 0 replies
- 29 views
Apple's youngest programming language, Swift, received a fairly substantial update with today's first beta of Xcode 6.3, at least in beta form. The Swift 1.2 beta features an improved compiler that's both more stable and more speedy, as well as new Objective-C (the programming language that pre-Swift iOS apps were built on) interactions for building more capable hybrid apps. Here's what's new in the compiler: Incremental builds — Source files that haven't changed will no longer be re-compiled by default, which will significantly improve build times for most common cases. Larger structural changes to your code may still require multiple files to be rebuilt. Faste…
-
First iOS 8.3 beta seeded to developers before iOS 8.2 is even released
by Guest Derek Kessler- 0 replies
- 26 views
Apple today seeded to developers the very first iOS 8.3 beta, as well as a beta for Xcode 6.3 with the version 1.2 of the Swift programming language. Amusingly, this first release of the iOS 8.3 beta comes just a week after the fifth 8.2 beta — a version of the OS that has yet to see public release. While iOS 8.2 will include the WatchKit SDK that developers are using to build apps for the Apple Watch due out in April, we don't have many indications as to what might be in version 8.3 or when we'll see a public release. Source: Apple Continue reading...
-
iOS 9 likely to feature substantial stability improvements
by Guest Derek Kessler- 0 replies
- 37 views
The launch of iOS 8 hasn't been without its hiccups, and it seems that Apple is putting a lot of work into ensuring that its successor — we'll call it iOS 9 (seems like a safe bet) — irons out those kinks. iOS 8 adoption has lagged behind previous major version numbers of iOS, though it's worth noting that it is still doing quite well in comparison to the competition. Regardless, the focus for iOS 9 is said to be on the inner workings of iOS. Says 9to5Mac: For 2015, iOS 9 is going to include a collection of under-the-hood improvements. Sources tell us that iOS 9 engineers are putting a "huge" focus on fixing bugs, maintaining stability, and boosting performance…
-
How about a $3.5 million iPhone 6 bedazzled with 24kt gold and diamonds?
by Guest Derek Kessler- 0 replies
- 45 views
If, for some reason, you have a few million dollars just sitting around and don't feel like spending it on a new house in the Hamptons, a new 100-foot yacht, or a new bespoke Rolls-Royce Phantom, might we suggest that you spend that on a new iPhone instead? Yep, the folks at Goldgenie are at it again, this time taking their 24kt yellow gold, platinum, or rose gold iPhone 6 and wrapping it in precious cut stones. We're not talking about Swarovski crystal encrustment here, no, this is legit bling. Mounting hundreds of tiny diamonds, rubies, sapphires, or other precious stones to the edges of the iPhone 6 (presumably it also helps with grip) doesn't come cheap. Where th…
-
- 1 follower
- 0 replies
- 908 views
with coupon code KSA152764 code needed at checkout with free shipping...I just bought one at $104 so time for another one... Crucial M500 Series 240GB SSD - 2.5" Form Factor, SATA III, Reads 500 MB/s,Writes 400 MB/s, Encryption Technology, Advanced Controller Technology, Adaptive Thermal Protection - CT240M500SSD1 Item#: C19-2001 | Model#: CT240M500SSD1 How about 980 Gb for $399 Crucial M500 Series 960GB SSD - 2.5" Form Factor, SATA III, Encryption Technology, Advanced Controller Technology, Adaptive Thermal Protection - CT960M500SSD1 Item#: C19-2003 | Model#: CT960M500SSD1 http://www.tigerdirect.com/applications/searchtools/item-Details.asp?EdpNo=7869891&…
Last reply by Rich-M, -
- 0 replies
- 1 view
Today we are releasing MS15-011 & MS15-014 which harden group policy and address network access vulnerabilities that can be used to achieve remote code execution (RCE) in domain networks. The MS15-014 update addresses an issue in Group Policy update which can be used to disable client-side global SMB Signing requirements, bypassing an existing security feature built into the product.
Last reply by PCHF Staff, -
- 0 replies
- 1 view
Today, as part of Update Tuesday, we released nine security bulletins– three rated Critical and six rated Important in severity, to address 56 unique Common Vulnerabilities and Exposures (CVEs) in Microsoft Windows, Microsoft Office, Internet Explorer, and Microsoft Server software. We encourage you to apply all of these updates. For more information about this month’s security updates, including the detailed view of the Exploitability Index (XI) broken down by each CVE, visit the Microsoft Bulletin Summary webpage.
Last reply by PCHF Staff, -
Vector 76: Niche Apple blogs are doomed!
by Guest Rene Ritchie- 0 replies
- 31 views
Vector is a news and analysis show focusing on the biggest stories, hottest trends, and most important issues in technology and popular culture. On this week's show, Guy destroys Georgia's dreams of a Holodeck, are you still using our iPads, would a stylus pen make a difference, Rene talks the realities of running an Apple blog (which are all doomed, apparently), and Dave goes to Hogwarts, leaving the Candians. Subscribe in iTunes Subscribe in RSS Download directly Follow on Twitter Panel Georgia Dow of Isometric Guy English of Kickingbear Rene Ritchie of Mobile Nations Feedback Question, comment, recommendation, or something you want us to follow …
-
This is how the iPad changed music for Elliphant
by Guest Rene Ritchie- 0 replies
- 30 views
Apple has released a new video and promotion for the iPad, focusing on how it can be used to make music, and make the world a more musical place. The video features the song "All or Nothing" by Elliphant, more specifically, the Riton iPad Remix featuring The Gaslamp Killer. From Apple: iPad is changing how we live, work, and create more and more each day. For recording artist Elliphant, it's liberating her to make music in a radical new way. And whether she's writing lyrics at home or recording on the road, iPad has become an essential part of her process. It was even used by director So Me to shoot this film. Part of Apple's recent Start Something New campaign…
-
How Jason Snell podcasts
by Guest Rene Ritchie- 0 replies
- 29 views
Jason Snell creates wonderful podcasts on popular culture for The Incomparable and technology for relay.fm. He's not only great at what he does, he's generous in sharing how he does it. First, Jason wrote about how he records podcasts, including multi-enders, where each person records their own audio separately. From Six Colors: Another approach—and the one that I use—is to record conversations via the $30 Call Recorder for Skype by Ecamm Software. This plug-in for Skype records your own microphone input and the output of your Skype call as separate tracks in a single QuickTime movie. (An included utility app allows me to split that file into separate files for each…
-
Review 41: Legend
by Guest Rene Ritchie- 0 replies
- 27 views
Review is like app or game coverage but for movie series, television shows, comic books, and other geeky entertainment. It's great stuff you can watch and enjoy on your iPhone, iPad, or Apple TV! On this week's episode — Legend is Ridley Scott's 1985 fantasy adventure starring Tom Cruise, Mia Sara, and Tim Curry. So gather round as a bunch of nerds who require the solace of the night get together to talk about it, and it's much better Director's Cut. With Don Melton, Matt Drance, Guy English, and Rene Ritchie. Subscribe via RSS Subscribe via iTunes Download Directly Follow on Twitter Show notes Legend (Theatrical Version) - iTunes - Download now Legend (Ult…
-
Save 47% today on these slim hybrid bumper cases for iPhone 6 Plus
by Guest Brent Zaniewski- 0 replies
- 26 views
With this low-profile cover you get transparent, impact resistant hybrid casing with a durable TPU bumper that protects against damage. The bezel surrounding your screen is extended for a lay flat design, too. Get yours today for only $7.95! [/url] Continue reading...
-
Trivia Crack: Top tips, hints, and cheats you need to know!
by Guest Allyson Kazmucha- 0 replies
- 28 views
Trivia Crack is an insanely addicting trivia game that lets you compete against your friends and other random opponents to see who really is smarter. You'll answer questions across six different subjects in order to be the first to collect all six crowns. Along the way you can use challenge mode to steal crowns away from your opponent. The victorious winner will then receive coins and other prizes. These are our top tips, hints, cheats, and strategies to come out on top in Trivia Crack rankings every time! Free with ads - Download Now $2.99, ad free - Download Now 1. Tackle your weakest subjects first When choosing a crown, it's always a good idea to tack…
-
Operation Pawn Storm spyware and what you need to know
by Guest Rene Ritchie- 0 replies
- 26 views
Operation Pawn Storm appears to be the latest in a type of attack that uses jailbreak or enterprise distribution certificates to transfer spyware onto iOS devices. That means, in order to be infected, you have to first remove Apple's built-in security protection by jailbreaking, or tapping to agree to the installation of an app from outside the App Store. In other words, for most people, most of the time, it's something to be informed about but absolutely nothing to be stressed or scared by. Operation Pawn Storm was first reported by TrendLabs: We found two malicious iOS applications in Operation Pawn Storm. One is called XAgent (detected as IOS_XAGENT.A) and the ot…