Jump to content

AWS

FPCH Admin
  • Posts

    27,570
  • Joined

  • Last visited

  • Days Won

    73

Everything posted by AWS

  1. The site will be under going some major changes in the coming weeks. The biggest will be the software change from vbulletin to Invision Power Board. Due to the recent happenings with with vbulletin which I will not go into here I have decided to make the switch. Along with this change will be a new structure to the forum. Stay tuned these are exciting time for the users at Free PC Help Forum.
  2. Stanley A. Miller II New Windows lean, fast - and not Vista Milwaukee Journal Sentinel AP Latest entires from technology reporter Stanley A. Miller II's blog, Gear, Games and Life Online. Windows 7 comes to the masses Thursday, ... Programmer slip-up produces critical bug, Microsoft admitsComputerworld Windows 7 improvements to help audio recordingCNET News The 7 deadly sins of Windows 7TMCnet SDNN: San Diego News Network
  3. Welcome to the site. Hope you enjoy the community.
  4. I'm not sure how you would do it if it can be done at all. maybe someone else knows how to do it.
  5. Make sure you set the sscripts to run in 32 bit mode. There is a post here where someone had the same problem and turning 32 bit compatibility mode solved the problem.
  6. Hello and welcvome to the community. Make your self at home.
  7. I'd like to see Office included and it very well could be. Microsoft is moving to online subscription model for Office. So it wouldn't surprise me if they added Office apps on install and you pay for them when you use them. Also don't expect x86 support. Microsoft has already announced there would be no x86 version of Windows 8. They already don't support x86 in Windows 2008 R2.
  8. The IE Cumulative Security Update for October 2009 is now available via Windows Update or Microsoft Update. This update addresses three privately reported vulnerabilities and one publicly disclosed vulnerability. The security update addresses these vulnerabilities by modifying the way that Internet Explorer processes data stream headers, validates arguments, and handles objects in memory. For detailed information on the contents of this update, please see the following documentation: [*]Microsoft Security Bulletin MS09-054 [*]Microsoft Knowledge Base Article 974455 This security update is rated Critical for all supported releases of Internet Explorer: Internet Explorer 5.01, Internet Explorer 6, Internet Explorer 6 Service Pack 1, Internet Explorer 7, and Internet Explorer 8.
  9. Bulletin Severity Rating:Critical - This security update resolves several privately reported vulnerabilities in Microsoft Windows GDI+. These vulnerabilities could allow remote code execution if a user viewed a specially crafted image file using affected software or browsed a Web site that contains specially crafted content. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. View the full article
  10. Bulletin Severity Rating:Critical - This security update resolves three privately reported vulnerabilities in Microsoft .NET Framework and Microsoft Silverlight. The vulnerabilities could allow remote code execution on a client system if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications, or if an attacker succeeds in persuading a user to run a specially crafted Microsoft .NET application. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerabilities could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and executing it, as could be the case in a Web hosting scenario. Microsoft .NET applications, Silverlight applications, XBAPs and ASP.NET pages that are not malicious are not at risk of being compromised because of this vulnerability. View the full article
  11. Bulletin Severity Rating:Critical - This security update resolves several privately reported vulnerabilities in ActiveX Controls for Microsoft Office that were compiled with a vulnerable version of Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. View the full article
  12. Bulletin Severity Rating:Important - This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker sent a maliciously crafted packet during the NTLM authentication process. View the full article
  13. Bulletin Severity Rating:Important - This security update resolves several privately reported vulnerabilities in the Windows kernel. The most severe of the vulnerabilities could allow elevation of privilege if an attacker logged on to the system and ran a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit any of these vulnerabilities. The vulnerabilities could not be exploited remotely or by anonymous users. View the full article
  14. Bulletin Severity Rating:Important - This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if an attacker set up a malicious Web page that invokes the Indexing Service through a call to its ActiveX component. This call could include a malicious URL and exploit the vulnerability, granting the attacker access to the client system with the privileges of the user browsing the Web page. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. View the full article
  15. Bulletin Severity Rating:Important - This security update resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow spoofing if an attacker gains access to the certificate used by the end user for authentication. View the full article
  16. Bulletin Severity Rating:Critical - This security update addresses a privately reported vulnerability that is common to multiple ActiveX controls and is currently being exploited. The vulnerability that affects ActiveX controls that were compiled using the vulnerable version of the Microsoft Active Template Library (ATL) could allow remote code execution if a user views a specially crafted Web page with Internet Explorer, instantiating the ActiveX control. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. View the full article
  17. Bulletin Severity Rating:Critical - This security update resolves three privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. Firefox users who are running the Windows Presentation Foundation (WPF) plug-in and do not have it disabled should also apply this security update. For more information regarding this issue, please see the FAQ section for HTML Component Handling Vulnerability – CVE-2009-2529. View the full article
  18. Bulletin Severity Rating:Important - This security update resolves two publicly disclosed vulnerabilities in the FTP Service in Microsoft Internet Information Services (IIS) 5.0, Microsoft Internet Information Services (IIS) 5.1, Microsoft Internet Information Services (IIS) 6.0, and Microsoft Internet Information Services (IIS) 7.0. On IIS 7.0, only FTP Service 6.0 is affected. The vulnerabilities could allow remote code execution (RCE) on systems running FTP Service on IIS 5.0, or denial of service (DoS) on systems running FTP Service on IIS 5.0, IIS 5.1, IIS 6.0 or IIS 7.0. View the full article
  19. Windows 7 Can Learn From Vista PC World As Mary-Jo Foley says in a ZDNet blog post, Ballmer told Bloomberg that "The test feedback (on Windows 7) has been good, but the test feedback on Vista was ... I upgraded to Microsoft Windows 7 and survivedTechRepublic Poll: When will you switch to Windows 7?Hot Air (blog) Windows 7: A huge improvement over VistaSan Diego Daily Transcript (subscription) Computerworld New Zealand
  20. Microsoft used to release a new OS every 2 years up until the 5 year wait between XP and Vista. They are getting back to that release cycle again.
  21. The AVG Security Toolbar team has recently released a new version of their toolbar. It has a more predictable user experience and does a better job of allowing users to stay in control of their browser. It’s a great example of the Guidelines for add-on developers in action. It’s encouraging to see the example set by the AVG Security Toolbar team. They’re building valuable add-ons for people and at the same time they’re respecting user choice. Here are some high level examples of the changes they’ve made in the new version of their toolbar: [*]It no longer takes over the search provider. Instead it uses the proper IE8 set default provider API so that users can choose their default. [*]The close button is visible so that users can manage it like other toolbars. Additionally, the toolbar is positioned in a supported location which improves stability and performance. [*]It no longer modifies the new tab page to maintain a predictable new tab experience for users. Kudos goes out to the AVG Security Toolbar team. On behalf of our shared customers, thanks. Following the Guidelines and using supported extensibility points in this way means that people have a consistent and reliable experience that allows them to stay in control of their browser. This is exactly what we’d like to see from all add-on developers. Before: Previous version of AVG Security Toolbar After: Newest version (2.507.24.1) of the AVG Security Toolbar provides a predictable experience and lets users stay in control of their browser -Paul Cutsinger and Herman Ng View the full article
  22. What are you doing when the crash occurs? What programs are you running and what services are running? Have you installed any new software that creates a service that is run by a scheduled task?
  23. Makes no difference. The time is calibrated with an online clack anyway so accuracy isn't an issue.
  24. By posting in the virus forum. They will help you.
  25. No one will be able to connect to the server until some cals are clear. I moved this from the introductions forum. I know it is at the top and easy to just post in it, but, in the future find the best place to post.
×
×
  • Create New...