-
Posts
9942 -
Joined
-
Last visited
-
Days Won
26
Content Type
Profiles
Forums
Blogs
Events
Resources
Videos
Link Directory
Downloads
Everything posted by AWS
-
Have AVG free and cannot uninstall this or install any Windows updates. message is 'cannot access Windows installer. Get error 641 on windows. OS vista home premium 32 bit. Recently downloaded IOLO System Mechanic recommended by DELL. problem seems to be since then but IOLO dont respond View this thread
-
I have some jpeg of pictures that i took out of a folder and moved to the desktop. Now i can not put them back in the folder without getting the message they can not be moved because the file is either corrupted or unreadable with error code 0x80070570 showing. i can not delete them either. I am an old dude and have no idea what is going on. Somebody PLEASE HELP ME!!! May 20, 2012 Thanks! View this thread
-
i have encountered a Adware:JS?pornpop and i had set the action to remove the particular file.But when i went to the particular folder Items: containerfile:C:UsersmaheshAppDataLocalGoogleChromeUser DataDefaultCachef_00020c file:C:UsersmaheshAppDataLocalGoogleChromeUser DataDefaultCachef_00020c->(SCRIPT0004) to see if the file was deleted to my surprise i found the file to be existing in the cache.I could see the f-00020c file in the cache.It had not deleted the file.can you tell me as to why it didn't remove the file? I have the virus definition files created on May 20th that is 1.127.295.0 and aslo the same spyware definition file The file gets deleted when you clear the cache.I am using google chrome. regards mahesh View this thread
-
I am using Microsoft Security Essentials as my only virus protection. I have Vista Home Premium and IE9. When I start up my computer MSE works for a while and then stops working. I see that by the icon changing from green to orange. I then type in services.msc in the search box. Then enter and then then right click on microsoft antimalware and then click on Properties. Under service status I click on stop. It shows stop and then I click on start and MSE starts working again. It works for another 15 to 30 minutes and stops again. This has been going on for several days now. It worked fine before that. Will someone please e-mail me with a fix if anyone knows. *** Email address is removed for privacy *** Thanks View this thread
-
The most relevant detaqil is that I'm practically computor illiterate! When I first got the computor it came with 1 month of Norton. I installed that and when the month was up I tried to install MSE. I was informed I would to uninstall Norton. I tried but that was unsuccesful. I finally got Norton uninstalled but I can't seem to be able to install MSE? View this thread
-
my window7(home basic) is activated & i am using security essentials for the last 10 months it all went fine but today as i opened my com. a dialog box of securities essential was opened saying that your window did't passed the validation test so security essential will be disabled in 30 days why is it so ? View this thread
-
After upgrade to MS Security Essentials 4, CPU still works on +-30%. It falls down only when i turn off active protection. I have done scan for viruses with MSSE and some free oneuse vireus removers, antispywares, antimalwares .... but it seems to be clean. Thanks for help ... View this thread
-
Severity Rating: Critical Revision Note: V1.1 (May 16, 2012): Added a link to Microsoft Knowledge Base Article 2681578 under Known Issues in the Executive Summary. Also added Microsoft .NET Framework 1.1 Service Pack 1 to the Non-Affected Software table and corrected the update replacement information for Microsoft Office. These were informational changes only. There were no changes to the security update files or detection logic. Summary: This security update resolves three publicly disclosed vulnerabilities and seven privately reported vulnerabilities in Microsoft Office, Microsoft Windows, the Microsoft .NET Framework, and Microsoft Silverlight. The most severe of these vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits a malicious webpage that embeds TrueType font files. An attacker would have no way to force users to visit a malicious website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website. View this security bulletin
-
Severity Rating: Critical Revision Note: V2.0 (May 11, 2012): Added an entry to the update FAQ to communicate that security update KB2656353 addresses the vulnerabilities described in this bulletin for all supported systems running Microsoft .NET Framework 1.1 Service Pack 1, except when installed on Windows Server 2003 Service Pack 2. There were no changes to the security update files. Customers who have successfully installed the update do not need to take any action. Summary: This security update resolves two privately reported vulnerabilities in the .NET Framework. The vulnerabilities could allow remote code execution on a client system if a user views a specially crafted webpage using a web browser that can run XAML Browser Applications (XBAPs). Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. View this security bulletin
-
Revision Note: V2.0 (May 11, 2012): For MS12-035, corrected the security update number to KB2656353 for all supported systems running Microsoft .NET Framework 1.1 Service Pack 1, except when installed on Windows Server 2003 Service Pack 2. There were no changes to the security update files. Customers who have successfully installed the update do not need to take any action. Summary: This bulletin summary lists security bulletins released for May 2012. View this security bulletin
-
Severity Rating: Critical Revision Note: V1.4 (May 11, 2012): Added entry to the update FAQ to announce that KB2656353, offered in this bulletin, also addresses CVE-2012-0160 and CVE-2012-0161, which are documented in MS12-035. Summary: This security update resolves one publicly disclosed vulnerability and three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of these vulnerabilities could allow elevation of privilege if an unauthenticated attacker sends a specially crafted web request to the target site. An attacker who successfully exploited this vulnerability could take any action in the context of an existing account on the ASP.NET site, including executing arbitrary commands. In order to exploit this vulnerability, an attacker must be able to register an account on the ASP.NET site, and must know an existing user name. View this security bulletin
-
Severity Rating: Important Revision Note: V1.0 (May 8, 2012): Bulletin published. Summary: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to a system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. View this security bulletin
-
Severity Rating: Important Revision Note: V1.0 (May 8, 2012): Bulletin published. Summary: This security update resolves one publicly disclosed and one privately reported vulnerability in Microsoft Windows. The more severe of these vulnerabilities could allow elevation of privilege if an attacker logs on to a system and runs a specially crafted application. View this security bulletin
-
Severity Rating: Important Revision Note: V1.0 (May 8, 2012): Bulletin published. Summary: This security update resolves a privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if a user opens a specially crafted Visio file. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. View this security bulletin
-
Severity Rating: Important Revision Note: V1.0 (May 8, 2012): Bulletin published. Summary: This security update resolves one publicly disclosed and five privately reported vulnerabilities in Microsoft Office. The vulnerabilities could allow remote code execution if a user opens a specially crafted Office file. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. View this security bulletin
-
Severity Rating: Critical Revision Note: V1.0 (May 8, 2012): Bulletin published. Summary: This security update resolves a privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if a user opens a specially crafted RTF file. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. View this security bulletin
-
Severity Rating: Critical Revision Note: V2.0 (April 26, 2012): Added Service Pack 1 versions of SQL Server 2008 R2 to the Affected Software and added an entry to the update FAQ to explain which SQL Server 2000 update to use based on version ranges. These are informational changes only. There were no changes to the security update files or detection logic. For a complete list of changes, see the entry to the section, Frequently Asked Questions (FAQ) Related to This Security Update. Summary: This security update resolves a privately disclosed vulnerability in Windows common controls. The vulnerability could allow remote code execution if a user visits a website containing specially crafted content designed to exploit the vulnerability. In all cases, however, an attacker would have no way to force users to visit such a website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website. The malicious file could be sent as an email attachment as well, but the attacker would have to convince the user to open the attachment in order to exploit the vulnerability. View this security bulletin
-
Software I bought died with computer
AWS replied to Edward Pearson's topic in Tech Support & Discussions Forum
As long as you have the license keys for the software then look them up on the web and download them.