-
Posts
27,570 -
Joined
-
Last visited
-
Days Won
73
Content Type
Forums
Blogs
Events
Resources
Downloads
Gallery
Store
Everything posted by AWS
-
Seven new things to know about Windows Phone 7
AWS posted a topic in Microsoft Support & Discussions
October 11 was the official Microsoft launch of Windows Phone 7. I asked readers what they wanted to know and have gotten a number of questions about Microsoft’s strategy, the products and the future. Here are the answers I’ve been able to get (so far). View the full article -
Bulletin Severity Rating:Moderate - This security update resolves a privately reported vulnerability in Windows shared cluster disks. The vulnerability could allow data tampering on the administrative shares of failover cluster disks. By default, Windows Server 2008 R2 servers are not affected by this vulnerability. This vulnerability only applies to cluster disks used in a failover cluster. View the full article
-
Bulletin Severity Rating:Important - This security update resolves a privately reported vulnerability in the Secure Channel (SChannel) security package in Windows. The vulnerability could allow denial of service if an affected Internet Information Services (IIS) server hosting a Secure Sockets Layer (SSL)-enabled Web site received a specially crafted packet message. By default, IIS is not configured to host SSL Web sites. View the full article
-
Bulletin Severity Rating:Important - This security update resolves a privately reported vulnerability in Microsoft Windows. This security update is rated Important for all supported editions of Windows XP and Windows Server 2003. All supported editions of Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2 are not affected by the vulnerability. For more information, see the subsection, Affected and Non-Affected Software, in this section. View the full article
-
Bulletin Severity Rating:Important - This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted file using WordPad or selects or opens a shortcut file that is on a network or WebDAV share. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. View the full article
-
Bulletin Severity Rating:Important - This security update resolves a privately reported vulnerability in Windows Media Player. The vulnerability could allow remote code execution if Windows Media Player opened specially crafted media content hosted on a malicious Web site. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. View the full article
-
Bulletin Severity Rating:Important - This security update resolves a privately reported vulnerability in the Windows common control library. The vulnerability could allow remote code execution if a user visited a specially crafted Web page. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs view, change, or delete data or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. View the full article
-
Bulletin Severity Rating:Important - This security update resolves thirteen privately reported vulnerabilities in Microsoft Office. The vulnerabilities could allow remote code execution if a user opens a specially crafted Excel file or a specially crafted Lotus 1-2-3 file. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. View the full article
-
Bulletin Severity Rating:Important - This security update resolves eleven privately reported vulnerabilities in Microsoft Office. The vulnerabilities could allow remote code execution if a user opens a specially crafted Word file. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. View the full article
-
Bulletin Severity Rating:Important - This security update resolves two privately reported vulnerabilities in the Windows OpenType Font (OTF) format driver. This security update is rated Important for all supported editions of Windows XP and Windows Server 2003. All supported editions of Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2 are not affected by the vulnerability. For more information, see the subsection, Affected and Non-Affected Software, in this section. View the full article
-
Bulletin Severity Rating:Critical - This security update resolves a privately reported vulnerability in Microsoft .NET Framework. The vulnerability could allow remote code execution on a client system if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs). Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerability could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and then executes the page, as could be the case in a Web hosting scenario. View the full article
-
Hello and welcome.
-
Just blocks from the New York City GooglePlex and Apple’s flagship West Village store, Microsoft and partners will be launching Windows Phone 7 on October 11. I’ll be there with my ZDNet blogging colleagues. What do you want to know? View the full article
-
Search the error logs on the server and see if it sheds any light on what may be happening.
-
Do a search here for DCOM. This has to do with legacy apps not being enabled on Windows 2008.
-
Make sure RDP is enabled on the server and that terminal services is enabled.
-
Use Server 2K3 As License Server In 2K8 Server
AWS replied to plastopil's topic in Tech Help and Discussions
You posted this in the introductions forum. I have moved it to the appropriate forum. You have to allow older OS host to interact with RDP. It is setting on the RDP users screen in win2k8. -
In this week's mailbag, how to remove Windows XP from a dual-boot with Windows 7, Internet Explorer 9 doesn't load add-ons in pinned web sites, 64-bit IE 9 and pinned web sites, a TechNet Standard subscription service scale-back, GOG.com goes dark, and Ed Bott's guide to installing iTunes 10 without the bloat. View the full article
-
The first of the baselines included in the Security Compliance Manager Baseline Beta Review Program is now available for download. The Windows Server 2008 R2 Security Baseline is a new addition to the security baselines released earlier this year that can be used in combination with the Security Compliance Manager tool. The security baseline for Windows Server 2008 R2 provides you with free Microsoft-recommended solutions to meet today's security challenges. In combination with best-practice guidance and the Security Compliance Manager tool, the baseline is designed to help you plan, deploy, and monitor the security of Windows Server 2008 R2. This release also includes a settings pack for Windows Server 2008 R2, enabling you to define baselines that include settings outside the scope of the security baselines from Microsoft. To learn more, visit the TechNet Library: http://go.microsoft.com/fwlink/?LinkId=200483 New users can access this baseline by visiting the Microsoft Download Center to download the Security Compliance Manager tool: http://go.microsoft.com/fwlink/?LinkId=113939 Existing Security Compliance Manager tool users can access this baseline by clicking the Tools menu, and then clicking Check for Baselines. Security Compliance Manager Baseline Beta Review Program If you have not yet provided feedback on the previously announced beta baseline release for Microsoft Office 2010, or the new settings packs for Windows 7 and Windows Internet Explorer 8, join the Security Compliance Manager Baseline Beta Review Program: https://connect.microsoft.com/InvitationUse.aspx?ProgramID=5758&InvitationID=SOL-D2BR-VFJ2&SiteID=715 The Security Solution Accelerators team is developing new baselines and settings, all of which are designed to help your organization plan and deploy security baselines with ease and confidence. These new baselines and supporting best-practice guidance are available as part of the Security Compliance Manager Baseline Beta Review Program. The scope of this program includes security baselines for Microsoft Exchange Server 2007, Office 2010, SQL Server 2008, SQL Server 2008 R2, and Windows Server 2008 R2 and settings packs for Windows 7 and Internet Explorer 8. The beta releases in this program are formatted to be imported for use in the Security Compliance Manager tool, which released in early 2010. This powerful tool provides guidance to work with other tools and features of Microsoft products to help you plan, deploy, and monitor your security baselines. The tool enables you to access and automate all of your organizations baselines in one centralized location, balancing your needs for security and functionality. To learn more about the Security Compliance Manager tool, visit the TechNet Library: http://go.microsoft.com/fwlink/?LinkId=113940 To download the tool, click here: http://go.microsoft.com/fwlink/?LinkId=182512 Please send any questions or comments to the Solution Accelerators Security Team: Secwish@microsoft.com.
-
Testing with Opera. Everything seems to functions as it should.