-
Posts
9942 -
Joined
-
Last visited
-
Days Won
26
Content Type
Profiles
Forums
Blogs
Events
Resources
Videos
Link Directory
Downloads
Everything posted by AWS
-
Before the latest engine update, there was an option in Real Time Protection to change the scanning mode of MSE from scanning both incoming and outgoing files to either just scanning incoming only, outgoing, and even both incoming and outgoing. I noticed an huge performance issue increase when I set it to scanning incoming files only, which is the way it should be set in my opinion. Why would anyone want to be double scanning a file after it has been scanned once as it came into the protected file system, scanning a file as it is leaving the system only takes up more resources and performace. Why could the STUPID Programer that made the program take that option away? That was the worse decision that anyone could have made on this program, since that option has been taken away the performance on my pc has gone down over 85% and all of my programs are running slow now. Will the person(s) that done that STUPID change put it back so people can get their performance back? Other than that change the MSE program has been working flawlessly and has been a great tool in the arsenal for Anti-virus, Greyware, Spyware and other protection. Just remember one thing you STUPID people, if you follow one rule you can never go wrong....KISS (Keep It Simple Stupid) My motto has always been the same .... Get it right the first time and you will never have to go back to fix a STUPID mistake!!!!!!! View this thread
-
Microsoft security essential is quite simple...!is it able to remove trojans,rootkits,bootkits and other dangerous worms..!!!! mse doesnt even have browser protection ,no sandboxie ,no virus chest ,will it still be able to cope with such dangerous malwares..! and neither windows update can save u from such threats cuz hackers easy fool it..!!!'[ wat r u saying about it??? View this thread
-
i am now using M.S.E 4.. but it is quite simple no sandboxie or virus chest to send the maliciuos file,,no browser protection..!now adays even u update ur browser or windows hackers can easily fool it..as happened many times..! can microsoft make it more protective by adding such features...! if they do it would be more protective..! only scan option is not enough...!!! tnxxx View this thread
-
I can run a "full" scan, and the next day when I boot up my computer, I get the same message: You haven't run a scan on your PC for a while. This could put your PC at risk. My Real-Time protection is on. My virus and spyware definitions are up to date. I can find nothing in the forums on this issue...Do I just need to find another program to protect my computer? This is very FRUSTRATING... I am running Windows Vista Business, Service Pack 2, 4 G Ram... Any thoughts, hints or suggestions would be greatly appreciated... View this thread
-
I have another virus quarantined called Win32/Bumat!rts. Can you please advise how to remove this one too. Thanks View this thread
-
Can anyone please advise how to remove a Rogue:Win32/Winwebsec, Microsoft essentials have given me the file location only thanks View this thread
-
my email is inficted & sinding spam masseges to my contacts View this thread
-
Revision Note: V1.0 (June 12, 2012): Advisory published. Summary: Microsoft is investigating reports of a vulnerability in Microsoft XML Core Services. The vulnerability could allow remote code execution if a user views a specially crafted web page using Internet Explorer. An attacker would have no way to force users to visit such a website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website. View this security bulletin
-
Severity Rating: Important Revision Note: V1.0 (June 12, 2012): Bulletin published. Summary: This security update resolves one privately reported vulnerability and one publicly disclosed vulnerability in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application that exploits the vulnerability. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. The vulnerability could not be exploited remotely or by anonymous users. View this security bulletin
-
Severity Rating: Important Revision Note: V1.0 (June 12, 2012): Bulletin published. Summary: This security update resolves five privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to a system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit any of these vulnerabilities. View this security bulletin
-
Severity Rating: Important Revision Note: V1.0 (June 12, 2012): Bulletin published. Summary: This security update resolves one privately reported vulnerability in Microsoft Dynamics AX Enterprise Portal. The vulnerability could allow elevation of privilege if a user clicks a specially crafted URL or visits a specially crafted website. In an email attack scenario, an attacker could exploit the vulnerability by sending an email message that contains the specially crafted URL to the user of the targeted Microsoft Dynamics AX Enterprise Portal site and by convincing the user to click the specially crafted URL. Internet Explorer 8 and Internet Explorer 9 users browsing to a Microsoft Dynamics AX Enterprise Portal site in the Internet Zone are at a reduced risk. By default, the XSS Filter in Internet Explorer 8 and Internet Explorer 9 prevents this attack in the Internet Zone. However, the XSS Filter in Internet Explorer 8 and Internet Explorer 9 is not enabled by default in the Intranet Zone. View this security bulletin
-
Severity Rating: Important Revision Note: V1.0 (June 12, 2012): Bulletin published. Summary: This security update resolves one publicly disclosed vulnerability and three privately reported vulnerabilities in Microsoft Lync. The most severe vulnerabilities could allow remote code execution if a user views shared content that contains specially crafted TrueType fonts. View this security bulletin
-
Severity Rating: Critical Revision Note: V1.0 (June 12): Bulletin published. Summary: This security update resolves one privately reported vulnerability in the Microsoft .NET Framework. The vulnerability could allow remote code execution on a client system if a user views a specially crafted webpage using a web browser that can run XAML Browser Applications (XBAPs). Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerability could also be used by Windows .NET Framework applications to bypass Code Access Security (CAS) restrictions. In a web browsing attack scenario, an attacker could host a website that contains a webpage that is used to exploit this vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit these websites. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes users to the attacker's website. View this security bulletin
-
Severity Rating: Critical Revision Note: V1.0 (June 12, 2012): Bulletin published. Summary: This security update resolves one publicly disclosed and twelve privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. View this security bulletin
-
Severity Rating: Critical Revision Note: V1.0 (June 12): Bulletin published. Summary: This security update resolves a privately reported vulnerability in the Remote Desktop Protocol. The vulnerability could allow remote code execution if an attacker sends a sequence of specially crafted RDP packets to an affected system. By default, the Remote Desktop Protocol (RDP) is not enabled on any Windows operating system. Systems that do not have RDP enabled are not at risk. View this security bulletin
-
Severity Rating: Critical Revision Note: V2.0 (June 12, 2012): Bulletin rereleased to reoffer the update for all affected software. Customers who have already successfully installed the update originally offered on April 10, 2012 are encouraged to install the reoffered update. See the Update FAQ for details. Summary: This security update resolves one privately reported vulnerability in Microsoft .NET Framework. The vulnerability could allow remote code execution on a client system if a user views a specially crafted webpage using a web browser that can run XAML Browser Applications (XBAPs). Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerability could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and then executes the page, as could be the case in a web hosting scenario. This vulnerability could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. In a web browsing attack scenario, an attacker could host a website that contains a webpage that is used to exploit this vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit these websites. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes users to the attacker's website. View this security bulletin
-
I've got Windows 7, and I'm running Office XP, so I'm trying to figure out why I'm getting updates through Windows Update for Office 2007. Is it the compatibility pack that I downloaded? What is it? I'll download them if I actually need to, but as far as I can tell right now, I don't. View this thread
-
WQindows XP SP3 : Updates KB2518864, KB2572073, and KB2633880 Updates offered first thru AU. Allowed all. I am on dial up, and it took 4.5 hours to dl them. Got them then they installed. Or so I thought. Problem is, they sort of went into a loop. Continued to offer them to me, and told me to install. In WU, it shows them as installed, 16 times each. NONE are in my add & remove programs. But also, they are showing in event viewer, as installed 32 times. I am NOT trying to be mouthy, but would like an answer, and have asked this before, but got the run around. Any light would be greatly appriciated View this thread
-
After the latest windows update installed on 6/5/2012, I am missing drivers for my touchpad, wi-fi and many other drivers on my toshiba L645D laptop. When I troubleshoot the problem, says to reinstall drivers, but troubleshooter can't find the drivers. Would appreciate any help in this matter, as this has happened before, but resolved itself with another update. Just wondering if I have to wait for windows to fix this issue or if I can configure my windows updater to include the updated drivers that work? View this thread
-
My operating system is Vista, and I keep installing the update and it keeps failing...any help plz? View this thread
-
windows update for vista fail to install and give error code 80071A30. What is this error and how do I get updates to install? Rod View this thread