-
Posts
9942 -
Joined
-
Last visited
-
Days Won
26
Content Type
Profiles
Forums
Blogs
Events
Resources
Videos
Link Directory
Downloads
Everything posted by AWS
-
I cannot update Windows. I keep getting error code 80244019. I downloaded Windows fix-it, and it detected problems, fixed them, and Windows still would not update. I have done all of the troubleshooting tips, and I have run 3 different anti virus programs, including one that ran 12 hours and checked every file. Everything came up clean. View this thread
-
First, could not update Microsoft Security Essentials. Still cannot. Solution - remove MSE, replace with something that works. Next, Windows Update informs me that important updates need to be downloaded and installed. But it too, like so much of Microsoft's output, does not work. Microsoft then shrugs and says 'sort it out yourselves' - hence this website. So, anyone able to help? Should be grateful for any assistance. Tony View this thread
-
I have Windows XP Professional Version 2002 Service Pack 2 and have spent all day (from 9:00am to 9:25pm) trying to update to XP 2003. I have a Microsoft Office 2003 CD and when I try to download I get a message saying "Required Install File YS561401.CAB could not be found" !I have been going around in circles ALL day!!! Can someone please HELP ME! When I try to set automatic updates for my computer I keep getting this message: "The website has encountered a problem and cannot display the page you are trying to view. The options provided below might help you solve the problem" - None of the options has helped me at all! I've even tried to download "Silverlight" (as recommended) and I get an message ID: 1511 - "Install missing Windows components, download from Windows update!!! ARRRGH! During the day I've also received Error 0x80244019 and Error 0x80240036. What's going on????? View this thread
-
i donot understand why im not getting actual answer to remove above queries from the botton bar, and i am looking after remidies of yhis question You aer requested to ,make crrection and remidies .Being a non technical preson ,I need help from you .Please help me and to reduce my anxiety . indranil View this thread
-
I have installed MS word viewer 2003. And saw somewhere that there's 2007 version. All updates from MS update are installed, but it's still 2003. Is that ok that it's 2003, or i have something to do? View this thread
-
Hey. I have a Dell Axim X50 running Windows Mobile 4 SE and I need to update it to at least Windows Mobile 5 for work. The problem is that I can not find the windows Mobile 5 software anywhere. Does anyone know where to find it and how to install it? Any help anyone can offer would be grand! Thanks! Ken Durham View this thread
-
Error Code 0x8007000D pop up says MS OS not genuine. I purchased it from Microsoft. error ocurred after was after checkng to see if i missed any microsoft updates. which never got that far. If there anyonet knows how to active & prove I do have a geuine Win 7 x64 OS Any advise cis appreciated View this thread
-
I have tried every step on every other topic with regards to 800B0100 error when trying to run Windows update on Windows 7 Professional SP1 x64. In running the system readiness update tool, I got a long list of errors that could not be fixed: Has anyone else had similar issues with none of the fixes working? Is there anything I can do short of a reformat/re-install of Windows? The following are the errors noted in the SURT: Found 21 errors CBS MUM Corrupt Total count: 11 CBS Catalog Corrupt Total count: 10 Unavailable repair files: servicingpackagesWUClient-SelfUpdate-Aux-AuxComp~31bf3856ad364e35~amd64~en-US~7.6.7600.256.mum servicingpackagesWUClient-SelfUpdate-Aux-AuxComp~31bf3856ad364e35~amd64~en-US~7.6.7600.256.mum servicingpackagesWUClient-SelfUpdate-Aux~31bf3856ad364e35~amd64~en-US~7.6.7600.256.mum servicingpackagesWUClient-SelfUpdate-Core-AdmComp~31bf3856ad364e35~amd64~en-US~7.6.7600.256.mum servicingpackagesWUClient-SelfUpdate-Core-AdmComp~31bf3856ad364e35~amd64~en-US~7.6.7600.256.mum servicingpackagesWUClient-SelfUpdate-Core-AdmComp~31bf3856ad364e35~amd64~~7.6.7600.256.mum servicingpackagesWUClient-SelfUpdate-Core-AdmComp~31bf3856ad364e35~amd64~~7.6.7600.256.mum servicingpackagesWUClient-SelfUpdate-Core-CoreComp~31bf3856ad364e35~amd64~en-US~7.6.7600.256.mum servicingpackagesWUClient-SelfUpdate-Core-CoreComp~31bf3856ad364e35~amd64~en-US~7.6.7600.256.mum servicingpackagesWUClient-SelfUpdate-Core-CoreComp~31bf3856ad364e35~amd64~~7.6.7600.256.mum servicingpackagesWUClient-SelfUpdate-Core-CoreComp~31bf3856ad364e35~amd64~~7.6.7600.256.mum servicingpackagesWUClient-SelfUpdate-Core-MiniLP~31bf3856ad364e35~amd64~en-US~7.6.7600.256.mum servicingpackagesWUClient-SelfUpdate-Core-MiniLP~31bf3856ad364e35~amd64~en-US~7.6.7600.256.mum servicingpackagesWUClient-SelfUpdate-Core-UIComp~31bf3856ad364e35~amd64~en-US~7.6.7600.256.mum servicingpackagesWUClient-SelfUpdate-Core-UIComp~31bf3856ad364e35~amd64~en-US~7.6.7600.256.mum servicingpackagesWUClient-SelfUpdate-Core-UIComp~31bf3856ad364e35~amd64~~7.6.7600.256.mum servicingpackagesWUClient-SelfUpdate-Core-UIComp~31bf3856ad364e35~amd64~~7.6.7600.256.mum servicingpackagesWUClient-SelfUpdate-Core~31bf3856ad364e35~amd64~en-US~7.6.7600.256.mum servicingpackagesWUClient-SelfUpdate-Core~31bf3856ad364e35~amd64~en-US~7.6.7600.256.mum servicingpackagesWUClient-SelfUpdate-Core~31bf3856ad364e35~amd64~~7.6.7600.256.mum servicingpackagesWUClient-SelfUpdate-Core~31bf3856ad364e35~amd64~~7.6.7600.256.mum servicingpackagesWUClient-SelfUpdate-Aux-AuxComp~31bf3856ad364e35~amd64~en-US~7.6.7600.256.cat servicingpackagesWUClient-SelfUpdate-Aux-AuxComp~31bf3856ad364e35~amd64~en-US~7.6.7600.256.cat servicingpackagesWUClient-SelfUpdate-Aux~31bf3856ad364e35~amd64~en-US~7.6.7600.256.cat servicingpackagesWUClient-SelfUpdate-Core-AdmComp~31bf3856ad364e35~amd64~en-US~7.6.7600.256.cat servicingpackagesWUClient-SelfUpdate-Core-AdmComp~31bf3856ad364e35~amd64~en-US~7.6.7600.256.cat servicingpackagesWUClient-SelfUpdate-Core-AdmComp~31bf3856ad364e35~amd64~~7.6.7600.256.cat servicingpackagesWUClient-SelfUpdate-Core-AdmComp~31bf3856ad364e35~amd64~~7.6.7600.256.cat servicingpackagesWUClient-SelfUpdate-Core-CoreComp~31bf3856ad364e35~amd64~en-US~7.6.7600.256.cat servicingpackagesWUClient-SelfUpdate-Core-CoreComp~31bf3856ad364e35~amd64~en-US~7.6.7600.256.cat servicingpackagesWUClient-SelfUpdate-Core-CoreComp~31bf3856ad364e35~amd64~~7.6.7600.256.cat servicingpackagesWUClient-SelfUpdate-Core-CoreComp~31bf3856ad364e35~amd64~~7.6.7600.256.cat servicingpackagesWUClient-SelfUpdate-Core-MiniLP~31bf3856ad364e35~amd64~en-US~7.6.7600.256.cat servicingpackagesWUClient-SelfUpdate-Core-MiniLP~31bf3856ad364e35~amd64~en-US~7.6.7600.256.cat servicingpackagesWUClient-SelfUpdate-Core-UIComp~31bf3856ad364e35~amd64~en-US~7.6.7600.256.cat servicingpackagesWUClient-SelfUpdate-Core-UIComp~31bf3856ad364e35~amd64~en-US~7.6.7600.256.cat servicingpackagesWUClient-SelfUpdate-Core-UIComp~31bf3856ad364e35~amd64~~7.6.7600.256.cat servicingpackagesWUClient-SelfUpdate-Core-UIComp~31bf3856ad364e35~amd64~~7.6.7600.256.cat View this thread
-
Today my hp pavilion m6 said it needed to update then restart to finish updating so I did. When the computer was restarting it said "failed to configure updates undoing changes" after a while I said "restarting" then after loading the windows 8 it stays on a blank screen and won't load anything. View this thread
-
Hello, Community Members: I have this problem on my laptop with Windows Defender. It used to work perfectly beside my commercial antivirus program. It was corrupted and I continue to receive the above error no matter what I do. I have not changed the Group Policy settings for it. Therefore, I don't know what the problem is. Of course, I have gone into system settings and run it manually but the dialog box states that the program was terminated by another program before it could run. What is causing this? Thanks everyone. Sincerely, BarelyAlive View this thread
-
I cant open my windos defender and i dont have another a.v.p I cant scan for virus or malware and how do you get rid of dw20.exe it keeps shutimg my windos down View this thread
-
Severity Rating: Important Revision Note: V2.0 (December 11, 2012): Rereleased bulletin to replace the KB2597171 update with the KB2687508 update for all affected editions of Microsoft Visio 2010. Summary: This security update resolves a privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if a user opens a specially crafted Visio file. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. View this security bulletin
-
Severity Rating: Important Revision Note: V1.0 (December 11, 2012): Bulletin published. Summary: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow security feature bypass if an attacker presents a revoked certificate to an IP-HTTPS server commonly used in Microsoft DirectAccess deployments. To exploit the vulnerability, an attacker must use a certificate issued from the domain for IP-HTTPS server authentication. Logging on to a system inside the organization would still require system or domain credentials. View this security bulletin
-
Severity Rating: Important Revision Note: V1.0 (December 11, 2012): Bulletin published. Summary: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if an attacker convinces a user to view a specially crafted Office document with embedded content. An attacker who successfully exploits this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. View this security bulletin
-
Severity Rating: Critical Revision Note: V1.0 (December 11, 2012): Bulletin published. Summary: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user browses to a folder that contains a file or subfolder with a specially crafted name. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. View this security bulletin
-
Severity Rating: Critical Revision Note: V1.0 (December 11, 2012): Bulletin published. Summary: This security update resolves publicly disclosed vulnerabilities and one privately reported vulnerability in Microsoft Exchange Server. The most severe vulnerabilities are in Microsoft Exchange Server WebReady Document Viewing and could allow remote code execution in the security context of the transcoding service on the Exchange server if a user previews a specially crafted file using Outlook Web App (OWA). The transcoding service in Exchange that is used for WebReady Document Viewing is running in the LocalService account. The LocalService account has minimum privileges on the local computer and presents anonymous credentials on the network. View this security bulletin
-
Severity Rating: Critical Revision Note: V1.0 (December 11, 2012): Bulletin published. Summary: This security update resolves a privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if a user opens a specially crafted RTF file. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. View this security bulletin
-
Severity Rating: Critical Revision Note: V1.0 (December 11, 2012): Bulletin published. Summary: This security update resolves one publicly disclosed vulnerability and one privately reported vulnerability in Windows. The most severe of these vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits a malicious webpage that embeds TrueType or OpenType font files. An attacker would have to convince users to visit the website, typically by getting them to click a link in an email message that takes them to the attacker's website. View this security bulletin
-
Severity Rating: Critical Revision Note: V1.0 (December 11, 2012): Bulletin published. Summary: This security update resolves three privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. View this security bulletin
-
Severity Rating: Critical Revision Note: V2.0 (December 11, 2012): Rereleased bulletin to replace the KB2687323 update with the KB2726929 update for Windows common controls on all affected variants of Microsoft Office 2003, Microsoft Office 2003 Web Components, and Microsoft SQL Server 2005. See the update FAQ for details. Summary: This security update resolves a privately reported vulnerability in Windows common controls. The vulnerability could allow remote code execution if a user visits a website containing specially crafted content designed to exploit the vulnerability. In all cases, however, an attacker would have no way to force users to visit such a website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website. The malicious file could be sent as an email attachment as well, but the attacker would have to convince the user to open the attachment in order to exploit the vulnerability. View this security bulletin
-
I've just upgraded to Windows 8 and am finding my way around. This seems like a very basic question to ask but here goes .... Previously if I wanted to scan a file for viruses I would right click and choose "Scan with MSE". I can't do this in Windows 8; I had assumed that it would come up in the same way with "Scan with Defender" but it doesn't. So how do I scan a file for viruses? View this thread
-
Windows update has been returning an error code for Cumulative Update for IE 9. All other updates are successful. It've tried the Fix It three times and disable the Malware and Fire Wall to no avail. Why does Microsoft make updates that do not install? I just tried it again and now it gives a green flag and stated it was installed but further down it says failed? View this thread
-
WindowsUpdate_80070571" "WindowsUpdate_dt000"
AWS posted a topic in Tech Support & Discussions Forum
unable to locate this update I need View this thread