security update xp Results

Page 13 of 34.
Results 241...260 of 680

Sponsored Links:

Bulletin Severity Rating:Critical - This security update resolves a publicly disclosed vulnerability in the Windows Help and Support Center feature that is delivered with supported editions of Windows XP and Windows Server 2003. This vulnerability could allow remote code execution if a user views a specially crafted Web page using a Web browser or clicks a specially crafted link in an e-mail message. The vulnerability cannot be exploited automatically through e-mail. For an attack to be successful, a user must click a link listed within an e-mail message.


At the end of each year, some folks take a moment to jot down predictions about what the coming year has in store. I, on the other hand, do not do predictions. I am neither prognosticator, seer, fortune teller, prophet, clairvoyant, soothsayer, nor medium; although I have been accused of being a thaumaturge and security gnome, but only in good ways, of course. Fortunately, Microsoft Trustworthy Computing’s own Tim Rains, director of product Management, has offered predictions about the security landscape in 2013.
Of the five, number four resonates most with me as we think about forthcoming security updates in the New Year;
Prediction #4: Software updating gets easier and exploiting vulnerabilities gets harder.
We’ve worked hard to ensure our security updates are as easy to install as possible, and thanks to technologies like automatic updating and Windows Software Update Services (WSUS), this is largely true. Still, we realize these technologies don’t cover all of the software that you may have installed on your system, and that’s why I’m counting on Tim’s predictions coming to pass. From Tim’s blog posting:
As vendors like Adobe, Oracle, and others make it easier and easier for customers to keep ubiquitous software updated, the window of opportunity for attackers to exploit old vulnerabilities will get smaller and smaller.
We may never have completely perfect software; however, it is encouraging to see the industry as a whole moving toward an easier update process.
Now, on to the news of the day; today we’re releasing seven bulletins, two Critical-class and five Important-class, addressing 12 vulnerabilities in Microsoft Windows, Office, Developer Tools and Windows Server. For those who need to prioritize deployment, we recommend focusing on the following Critical updates first:
MS13-002 (Microsoft XML Core Services)
This security update resolves two issues in Microsoft XML Core Services that could allow remote code execution if an affected system browsed to a specially crafted website. You’ll notice there are updates available for supported versions of Microsoft Windows and Office, as well as certain Developer Tools and Server Software. This means you may be offered more than one update for this issue. Along with all of the other bulletins releasing today, the issues were privately disclosed and we’re not aware of any attacks or customer impact.
Security Advisory 2755801
With this month’s release, we are revising Security Advisory 2755801 to provide the latest update addressing issues in Adobe Flash Player for IE 10. This is a cumulative update, which means customers do not need to install previous updates as a prerequisite for installing the current update. We remain committed to working closely with Adobe to deliver quality protections that are aligned with Adobe’s update process.
Security Advisory 973811
This advisory is being revised to add a Fix it that automatically sets Windows XP and Server 2003 systems to only allow NTLMv2. This has long been considered a best practice, and this release will make it even easier to implement. The KB article has also been updated to include all recommendations and best practices for various NTLM authentication scenarios. Applying the Fix it also enables the NTLMv2 settings required for users to take advantage of Extended Protection for Authentication as described in the advisory.
Please watch the bulletin overview video below for a quick summary of today’s releases.

As always, we recommend that our customers deploy all security updates as soon as possible. Our deployment priority guidance is below to further assist in deployment planning (click for larger view).

Our risk and impact graph shows an aggregate view of this month's severity and exploitability index (click for larger view).

For more information about this month's security updates, visit the Microsoft Security Bulletin summary webpage.
Andrew Gross and I will host the monthly technical webcast, scheduled for Wednesday, Jan. 9, 2013 at 11 a.m. PST. I invite you to register here, and tune in and learn more about the January security bulletins and advisories.
For all the latest information, you can also follow the MSRC team on Twitter at @MSFTSecResponse.
I hope all of your New Year’s resolutions are still intact, and all of your (positive) predictions for 2013 come true. I look forward to hearing your questions during the webcast.
Dustin Childs
Group Manager
Trustworthy Computing


Today we released Security Advisory 2798897 to notify customers that we are aware of active attacks using a fraudulent digital certificate issued by TURKTRUST Inc. To help protect customers, we have updated the Certificate Trust List (CTL) to remove the trust of the certificates causing this issue, and we encourage customers follow the guidance in Security Advisory 2798897.
TURKTRUST Inc. incorrectly created two subsidiary Certificate Authorities: (*.EGO.GOV.TR and The *.EGO.GOV.TR subsidiary CA was then used to issue a fraudulent digital certificate to *
There is no action for customers using versions of Windows Vista and newer who have installed the Certificate Trust List feature, which we released in June. This feature helps protect customers from any potential issues caused by these certificates.
For Windows XP and Windows Server 2003 customers, or customers who chose not to install the Certificate Trust List feature, also known as Microsoft Knowledge Base Article 2677070, we recommend that this update be applied immediately using update management software, by checking for updates using the Microsoft Update service, or by downloading and applying the update manually.
For more information and details about the update, please see Security Advisory 2798897.
Dustin Childs
Group Manager, Response Communications
Trustworthy Computing


Severity Rating: Important
Revision Note: V1.0 (October 9, 2012): Bulletin published.
Summary: This security update resolves a privately reported vulnerability in all supported releases of Microsoft Windows except Windows 8 and Windows Server 2012. This security update is rated Important for all supported editions of Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2. For more information, see the subsection, Affected and Non-Affected Software, in this section.


Severity Rating: Important
Revision Note: V1.0 (December 13, 2011): Bulletin published.
Summary: This security update resolves a privately reported vulnerability in all supported editions of Windows XP and Windows Server 2003. This security update is rated Important for all supported editions of Windows XP and Windows Server 2003. Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2 are not affected by the vulnerability. For more information, see the subsection, Affected and Non-Affected Software, in this section. The vulnerability could allow remote code execution if a user opens a file that contains a specially crafted OLE object. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.


A recent look at computer security shows online identity theft scams becoming easy for nefarious individuals who prey on those who lack essential security updates. Anyone experienced in the business need only to look at the serious manner of many, many businesses still running Windows XP without any group policy, domain controller policies, or end-of-life cycle goals. Many of these companies are simply unaware of the fate that will befall their entire network. Others have no problem incurring massive invoices, bills, and charges as a potential tax write-off at the end of the year for providing maintenance for ancient computers.

In this video we took at the specific incidents that lead to identity theft. Particularly in the area of fraudulent telephony, scareware, inefficiently secured systems, and our goal, ultimately, is to educate the audience. This video lacks essential terminology, including a glossary of information as well as an overall view of the problem from a macro perspective.

But what it does offer is the user the ability to take a look at just a small sample of scams out there, and start thinking critically. Like it or not, most adults lack critical thinking skills: Either they forgot them after years of not using them, they lack the intellectual capacity for it, or they were simply never taught it. This video teaches you to view with suspicion and not to trust someone just because they seem to act as an authority figure.

There is much more to talk about regarding this subject, but here is a start. Enjoy the video and beware of these threats. They are very real. Anecdotal story-telling has been used to explain the danger, concrete isolation of cause and effect has taken place. The bottom line is that the theft of information, especially from people in North America and Western Europe is a dream for many cybercriminals in developing areas of the world.

As we begin to understand this, we can talk even more about cyber-security in our videos. I hope that this has genuinely been helpful to you and that you enjoy the presentation.

The goals set forth in this video demonstration and presentation:
Help end-users understand the seriousness of online identity theft and how prevalent it has become that even a computer voice or real person will actually call you.Help end-users find ways to mitigate these attacks, using many common sense tactics.Help end-users shed some light on this subject, enticing them to think critically about the issue and take a pro-active stance against cyber-crime, cyber-bullying, and information theft.Help the end-users develop an understanding that is owned by an ethical professional and operated by highly accredited individuals as well. This means data security, concrete privacy policies, and no unauthorized information disclosures.We will start with the basics and look at ways to make future presentations about security vulnerabilities that can often plague very active members of the Internet community.Internet users who can honestly classify themselves as novices who find computers difficult to use could be the most at risk. In this case, it is very important to know what to do if you are plagued with these kinds of problems.Again, this video is the tip of the iceberg. But I personally hope it will help someone out there. And with time, we will continue to document ways to save information from data miners, aggregates, and the perpetrators of online fraud. This clearly goes above and beyond e-mails from Nigeria about a king's inheritance and bounty. We are now talking about real life consequences if one were to lose a SmartPhone connected to many different accounts, and so forth. This is why the necessity of such discussion will be extraordinarily important in the future if we are to take security risks seriously.

Users of Microsoft’s free security solution for Windows 7, Windows Vista and Windows XP will get a new antimalware engine this week, according to the Redmond company.
As is the case with all security solutions, Microsoft Security Essentials evolves at a fast pace, to keep up with the changes of the threat landscape.
This is the main reason why the software giant is pushing a new version of the antimalware engine for Microsoft Security Essentials 2.1, which is scheduled for release in just a couple of days, on July 20.
Softpedia readers might already be aware of the fact that the Redmond company has been kicking up a notch the technology behind MSE and other of its security solutions with monthly updates.

New Microsoft Security Essentials 2.1 Antimalware Engine Comes This Week - Softpedia

Are you a Windows user? Do you make sure that your antivirus program is updated regularly? Do you feel safe? You shouldn’t! Read on to find out why …
Security researchers at have come up with an ingenious attack that can bypass every Windows security product tested and allow malicious code to make its way to your system.

Yes, you read that right - every Windows security product tested. And the list is both huge and sobering:
3D EQSecure Professional Edition 4.2avast! Internet Security 5.0.462AVG Internet Security 9.0.791Avira Premium Security Suite Total Security 2010 Professional 4.6.1CA Internet Security Suite Plus 2010 Internet Security Free 4.0.138377.779DefenseWall Personal Firewall 3.00Dr.Web Security Space Pro Smart Security Internet Security 2010 10.00 build 246G DATA TotalCare 2010Kaspersky Internet Security 2010 Personal Firewall 9 Plus 2009.05.07.70Malware Defender 2.6.0McAfee Total Protection 2010 10.0.580Norman Security Suite PRO 8.0Norton Internet Security 2010 Armor Premium Solutions Security Suite 1.5.14905.0Outpost Security Suite Pro Security Suite Pro 7.0.3330.505.1221 BETA VERSIONPanda Internet Security 2010 15.01.00PC Tools Firewall Plus Shield 2010 Endpoint Security and Control 9.0.5ThreatFire Micro Internet Security Pro 2010 17.50.1647.0000Vba32 Personal Antivirus Premium 4.0.3272VirusBuster Internet Security Suite 3.2Webroot Internet Security Essentials Extreme Security 9.1.507.000probably other versions of above mentioned softwarepossibly many other software products that use kernel hooks to implement security featuresThe attack is a clever “bait-and-switch” style move. Harmless code is passed to the security software for scanning, but as soon as it’s given the green light, it’s swapped for the malicious code. The attack works even more reliably on multi-core systems because one thread doesn’t keep an eye on other threads that are running simultaneously, making the switch easier.
The attack, called KHOBE (Kernel HOok Bypassing Engine), leverages a Windows module called the System Service Descriptor Table, or SSDT, which is hooked up to the Windows kernel. Unfortunately, SSDT is utilized by antivirus software.
Note: The issue affecting SSDT have been known for some time but as yet haven’t been leveraged by attackers. However, as multi-core systems make this attack more reliable, and they are now becoming the norm, this is now a much greater threat.Oh, and don’t think that just because you are running as a standard user that you’re safe, you’re not. This attack doesn’t need admin rights.
However, it does require a lot of code to work, so it’s far from ideal for attackers. That said, its ability to completely neuter security software is quite frightening. I assume that security vendors the world over are now scrambling to come up with a fix for this issue.
[UPDATE: Graham Cluley, Senior Technology Consultant at Sophos, has this to say:
The dramatic headlines might make you think that this is TEOTWAWKI*, but the truth is somewhat different.
Because KHOBE is not really a way that hackers can avoid detection and get their malware installed on your computer. What Matousec describes is a way of "doing something extra" if the bad guys' malicious code manages to get past your anti-virus software in the first place.
In other words, KHOBE is only an issue if anti-virus products such as Sophos (and many others) miss the malware. And that's one of the reasons, of course, why we - and to their credit other vendors - offer a layered approach using a variety of protection technologies.While Cluley has a point here in that AV companies will still be able to add signatures to detect any KHOBE-like package in the wild, thus labeling the whole thing as malware and preventing it from getting a foothold on a system in the first place. But this still doesn't change the fact that there's one vulnerability here that basically "rules them all."
Paul Ducklin, Sophos's Head of Technology, has this to add:
So the Khobe "attack" boils down to this: if you can write malware which already gets past Sophos's on-access virus blocker, and past Sophos's HIPS, then you may be able to use the Khobe code to bypass Sophos's HIPS - which, of course, you just bypassed anyway. Oh, and only if you are using Windows XP.
In short: Sophos's on-access anti-virus scanner doesn't uses SSDT hooks, so it's fair for us to say that this isn't a vulnerabilty for us at all. But what about other anti-virus software? Though I'm not usually an apologist for our competitors, I feel compelled to speak out in this case.
The fuss about Khobe is in my opinion unwarranted, and the claims that it "bypasses virtually all anti-virus software" is scaremongering.While I agree with the majority of what Ducklin has to say, I take issue with two points. First, that throwaway "Oh, and only if you are using Windows XP" line belittles the fact that while Vista and 7 users are safe, some 60% of PCs still use XP, and quite a lot of these are multi-core equipped. Secondly, while Sophos's own on-access scanner might not use SSDT hooks, it's clear that a lot of products do.
F-Secure has the following on KHOBE:
This is a serious issue and Matousec's technical findings are correct. However, this attack does not "break" all antivirus systems forever. Far from it.
First of all, any malware that we detect by our antivirus will still be blocked, just like it always was.
So the issue only affects new, unknown malware that we do not have signature detection for.
To protect our customers against such unknown malware, we have several layers of sensors and generic detection engines. Matousec's discovery is able to bypass only a few of these sensors.
We believe our multi-layer approach will provide sufficient protection level even if malicious code were to attempt use of Matousec's technique.
And if we would see such an attack, we would simply add signature detection for it, stopping it in its tracks. We haven't seen any attacks using this technique in the wild.Are you reassured?]
Mac and Linux users, feel free to engage “smug mode” for a little while …

UPDATE - New attack bypasses EVERY Windows security product | ZDNet

Correct me if I'm wrong but I don't see MSE mentioned....

I only got my very first computer last year in April 2011. So my only experience of using a computer at home has been with Windows 7. Before that I was going to Internet cafes to use the computer. And of course there they had Windows XP. But using a computer in an Internet cafe is very different from using it at home. As you do not have to manage any settings like you have to with your own computer. I have 3 Windows 7 netbooks,all HP Mini 210,with Windows 7 Starter, and the two others are Windows 7 Professionall. Which I upgraded,from Windows 7 Starter using Windows Anytime Upgrade.

But I wanted to try Windows XP,because I am a great fan of Windows.And based on my experience with Windows 7,it is very user friendly. So a week ago I went and bought a brand new Windows XP 1GB netbook from a department store. I was very lucky to get this netbook ,because in England they are no longer making Windows XP or Windows Vista computers and laptops. They are all being replaced with Windows 7. So you cannot buy Windows XP or Windows Vista laptops in most shops now. But I was lucky because the Windows XP netbook I bought was the last one they had in the store. And they told me that they are not getting any more in stock.

The netbook is an Acer Aspire one Windows XP Home Edition service pack 3 operating system. I would have liked to have got an HP netbook as I am used to using that. But because all of the computers now are being made with Windows 7 only,the Acer was the only Windows XP laptop that they has in the shop. And I looked in other shops and stores, and I could not find Windows XP anywhere. So I bought the Acer Windows XP netbook.

Most people would probably just install Windows XP over their Windows 7. And I have read online that there is a way to do this. But I have limited experience with computers. So I would not have a clue how to do this. And also you must have a valid and activated copy of Windows XP. Which I don't thing you can download or get now from the Microsoft website.As I read that they are ending support for both Windows XP and Windows Vista,in a few years time. So I did the easiest thing and just bought a Windows XP laptop. But is it as good or user friendly as Windows 7 is? Read on-

The edition of Windows XP I have on my netbook is Windows XP Home Edition service pack 3. Which I think is equivalent to our Windows 7 Home Premium.The first thing I noticed was that Windows XP booted up faster than Windows 7. And then of course I had to set up my account on Windows. And I was very happy to find that I did not have to have a password. Windows XP only requires you to set up a computer name-for example- Andrea. But on Windows XP like on Windows 7, you DO NOT have to have a password if you do not want one. Which is great as I hate having to log in with a password and enter it every time I do some thing on my own computer. Also on Windows XP you are set up as an Administrator by default,just like Windows 7.

Then of course I had to remove all of that branded and unwanted Acer software. I found that on Windows XP programs uninstall a lot faster than what they do on Windows 7. And I also found downloading software from the Internet to be a lot faster on Windows XP than on Windows 7.In fact Windows XP is a lot faster than Windows 7,to my surprise .

Then there are other questions that I and other Windows 7 users may be asking. On Windows 7,I have uninstalled the Internet Explorer browser,and I would like to do the same thing on Windows XP. I tested this out to and the answer is-YES,you can uninstall IE on Windows XP by deleting the IE file in programs on C/drive.And I did this with the help of a tool called Unlocker. And I found that removing Internet Explorer on Windows XP did not effect Windows at all. I was also able to remove Outlook Express,an email client which I and most people cannot use, as well. And Windows was not effected by this either. I found that I was still able to get and install updates on Windows XP without IE.

On Windows XP you have two choices of installing updates-

1-You can go directly onto the Windows Update website in a web browser. But the disadvantage of this is that you cannot do this on Firefox or Google Chrome. You can only install updates from the website in Internet Explorer or on another Internet Explorer engine based browser,such as Green browser or Avant browser.So although I did not have IE,I was able to install updates from the website in Advanced browser and Deepnet Explorer.Which are the Trident(IE engine based) browsers I use instead of Internet Explorer. So if you want to install updates directly from the website on Windows XP, but do not want to use Internet Explorer. You can use Avant browser,Advanced browser or another IE engine based browser instead of IE.But this will only work with Trident engine browsers only,not with Firefox,chrome or Web Kit based browsers.

2-You can also install updates directly from control panel without going onto a web browser just like you do in Windows 7. I choose this method because I think it is safer than going onto a web browser. You can also choose to turn off automatic updating and install only the updates that you want,when you want to. Just like you do on Windows 7 and I found that updates took a lot less time to install than on Windows 7. On Windows 7,if you have 50 updates it can take up to 30 minutes to install. But on Windows XP it takes just 10 minutes or less.So installing updates is faster on Windows XP.

Then there is the security issue. And it is true that based on what I have read, Windows XP is not as secure as Windows 7. And there is a higher risk of computer viruses and malware on Windows XP than what there is on Windows 7.But having said that, on Windows 7, I do not have any anti-virus programs on my computer. Because I don't believe in those. And so I do not have an anti-virus program on Windows XP either. And I do not intend to install any in the future on Windows XP.

But what I do have on Windows XP is Windows Defender. Windows Defender is bundled with both Windows 7 and Windows Vista. And Windows Defender can scan and check for spyware,and remove any it finds. But it is not an anti-virus program so although it scans and removes malware,it does not impose security settings or block programs, the way an anti-virus program does. Which is why I never use an anti-virus program. But PLEASE NOTE-Windows Defender is not included in Windows XP. But you can download and install it from the Microsoft website. Which is what I did. And I find that the Windows XP version of Windows Defender has additional settings that the Windows 7 version does not have. For example there is an option to set Windows Defender to keep a record of any new software you install,an option not included in the Windows 7 version. The Malicious Software removal Tool-MRT is also included on Windows XP like it is on Windows 7.

There was also a control panel but settings are not as clearly visible as they are on Windows 7. Windows XP also has Windows search and it found most files but not all. So I had to open some files myself and search inside of them. Where as the Windows 7 search finds everything.

Windows XP had no trouble finding my wireless network,which I was able to connect to. But there was no option to set it to a home or public network,like there is on Windows 7. Although I was able to enable the Windows XP version of Network Discovery and see my other Windows 7 computer on my Windows XP computer. Just like you can see your other computers on your network in Windows 7.

There is also the option to turn of some of the Windows programs in Windows XP.This can be found in under"add or remove Windows components."But this does not remove the programs,it just turns them off or disables them. And is the equivalent to Windows 7's" turn Windows features on or off." You can also turn off disable Outlook Express and IE6 by just un ticking the box here. But I found that on Windows XP it does not turn off the features completly like it does in Windows 7. That is it disabled some of the programs, but not all. For example,Outlook Express still popped up on my webpage,when I clicked on a email link. Even though I had unticked that box to turn it off. So from my experience it does disable IE6 and other Windows features and they do not appear in the start menu. But enables them if they are needed. Unlike on Windows 7,where the programs stay turned off, until you tick that box to turn them on again. You can also enable Windows features again in Windows XP by ticking the box.

I find Windows XP to be faster than Windows 7,and it installs and uninstalls programs faster than Windows 7. It also starts up and shuts down quicker than Windows 7. And another thing is that I tested out the restore to factory condition setting and I found that on Windows XP. My computer was restored to factory condition, that is a reinstall of Windows in -wait for it- 20 minutes. But on Windows 7 a factory restore takes from 2 to 4 hours to complete! What a difference!

Overall,Windows XP, despite being an older version of Windows is user friendly,unlike Linux which is not. It is faster than Windows 7 although Windows 7 is fast too . Windows XP takes up less space on your hard drive so you can store double the amount of programs on a netbook.But Windows 7 takes up more space. And there are a lot more default Windows programs on Windows XP than on windows 7.But then you have plenty of space.You can install and run all of the programs that you run on Windows 7 on windows XP. In fact most of the web browsers and media players we use on Windows 7 are older programs. Made for Windows XP but they run on Windows 7.

The disadvantages of Windows XP are that it has got Internet Explorer 6 and Outlook Express. But then we have also got several clones of Outlook Express on Windows 7 too. Another disadvantage is that the control panel settings are not as clearly listed as in Windows 7.But you can still find settings. Also there is no option to set your network to a home network,which would be a lot safer. There is just a general network setting only. On Windows 7 you set your network to either a home,office,or public network and Windows Firewall applies the settings. So you are more secure. But not on Windows XP,where there is just one setting,although they do have Windows Firewall. That you can turn on or off just like you can on Windows 7. But there is no Windows Defender on Windows XP,which is some thing that they should have included in this edition of Windows. And although you can install Windows Defender yourself,some people new to computers may not know about this. IE6 is also not very secure for browsing and not a very good browser anyway. But it is bundled with Windows XP,but then so is IE8 with Windows 7. But you can use other web browsers.

And some of the other software is out of date,such as MSN Windows Messenger 4.7 but you could uninstall it as I did or upgrade it. The version of Windows Media Player on Windows XP is,Windows Media Player 9, but it is working well. So I have decided to leave that and after I tested out the factory restore setting,I got IE6 back. But this time I am going to leave that and just use another web browser,Safefox or Google Chrome instead.

But I have found Windows XP to be user friendly and very fast and as good as Windows 7 but different of course. A lot of people install Windows XP on Virtual Box on Windows 7 but I do not know how to use that. And now days it is very difficult in England to find a Windows XP computer in the shops. But if you are lucky to find one like I did. Why install Windows XP on virtual machine,when you can have the real thing?

So now I have got my Windows 7 netbooks and my Windows XP netbook. And windows XP is a very rich and fully functional operating system,just like Windows 7 is. In fact windows XP is like Windows 7 just an earlier version of it. So if you do have Windows XP on your computer,you can still use it. As well as your Windows 7 computer. Andrea Borman.

Hi everybody out there.

I just really wanted to post this article/thread about why you should love Windows 7.

I'm born XP fan, and after Windows 7 came out, and i wanted a new PC, i was 100% sure i wanted Windows XP for everything, because XP is the OS i have had most best experience with (and very bad experience with Windows Vista ).

But my brother told me i should try Windows 7 - just try it out for his sake - and so i did. I am SO happy i tried it out, because it is really a amazing OS. It's not only fast, but compatible, secure and less annoying than Vista or EVEN XP is.

I first got Windows 7 Ultimate 64-Bit on my brand new MM-Vision laptop (danish brand) and works perfectly, everything is just working 100% without problems, and compatible with every software. Nothing to complain about, as it is a brand new computer, and everything should just work.

Last week i got Windows 7 on my old Inspirion 1525 who also had Windows XP installed, and i was amazed that Windows 7 Ultimate 64-Bit worked perfectly on it. As i did in the "old" days when i needed to reinstall it (as i did a couple of times) i always had to remember to install a lot of network (Wireless/LAN), grapich and all kind of drivers. But amazingly Windows 7 did all this for me. I just popped the Windows 7 installation CD in, and after about 30-35 minutes the old drive(harddisk) was formated and filled with brand new Windows 7. I configured it easily just like Windows XP (even faster and more "pain"-less). It restarted and boom - i could surf around the internet already without installing any drivers from dell manually. I was even testing my webcam, and amazlingly the "Dell Webcam Manager" software popped up (and i have NO idea why or how it got it, because the Windows 7 i got was not from dell, and had nothing to do with it). So i reinstalled my Inspirion 1525 faster than i ever reinstalled a computer, without having to install boring drivers or so.

I also just 2 days ago reinstalled my Dell Studio with Windows Vista to Windows 7 - as perfect as on my Inspirion!

So here are some good reasons to love Windows 7 more than you'll probbaly love Windows XP.

It's more faster than Windows XP, it's not just something i say. Even you think the Aero design should take a lot of your CPU - well - it doesn't.It automaticly installs your drivers (the most common at least, like network/LAN/etc) - which XP doesn't. Not to mention it takes around 30-40 minutes ONLY (or less) to reinstall it.It's not as annoying as Windows Vista is with all the security and administrator privileges if you ever tried it out. You might have to allow a specific program to be runned as administrator (which is pretty understandable) but you only need to click once It's as easy to understand as Windows XP is.
There's a lot of other articles about smart things you can do with Windows 7, so I'm not going to post it all here. But i could recommend this review: YouTube - Windows 7 Review.

I recommend Windows 7 for you, as i really ONLY experienced good things with this OS.

Remember, i was an incarnated Windows XP user, and could never dream about having anything else - but i took the chance and as i already told, i never regretted my choice. If you have to chance to choose Windows 7 then DO IT! XP will be outdated within a couple of years..

I will update the thread as i see fit.

7 is almost immune to a piece of malware that has proven a real nightmare to users running older versions of the Windows client. Windows XP SP3 customers particularly have been hit extremely hard by Alureon, a rootkit that failed to play nice with a Windows kernel update and ended up rendering unbootable infected PCs earlier this year. Microsoft’s Malicious Software Removal Tool cleaned no less than 356,959 Windows computers infected with Alureon, with the Redmond company pointing out that the statistics are associated exclusively with the May release of MSRT. Out of all the machines cleaned by the software giant’s free security tool, only 3.5% were running Windows 7.

In this context, Alureon comes to prove just how unsafe are older versions of Windows, as XP SP3 PCs account for the bulk of infections, no less than 64.8%. The runner-up is XP SP2 with 13.6%, Vista SP2 with 7.3%, Vista RTM with 6.9% and Vista SP2 with 3.8%. Combined, machines running XP SP2 and SP3 make up 78.4% of all the Windows computers compromised by the rootkit. At this point in time, Virus:Win32/Alureon.H is the most prevalent flavor of the browser, having been cleaned from 155,394 PCs, Vishal Kapoor and Joe Johnson, from the Microsoft Malware Protection Center, note.

“The new .H variant is the most prominent in terms of prevalence. There were several changes to the design of the rootkit to avoid detection and cleaning, revealing that the rootkit is still under active development and distribution. One of the notable changes was to infect arbitrary system drivers instead of only the hooked miniport driver. Expectedly, this can have negative side effects on the machine depending on the chosen driver. For example, we’ve seen some machines having their keyboard disabled as a result of an infection. On other machines, Windows XP unexpectedly requests reactivation because the infection appears like a significant hardware change,” Johnson reveals.

The Redmond company indicates that the authors of Alureon are working to upgrade older versions of the rootkit to the most recent builds, which are better equipped to dodge antivirus products. The April version of the MSRT cleaned Alureon from 262,969 machines, namely 37% less compared with May. As far as the MSRT May malware families go, Alureon has climbed to the first spot, the software giant notes.

“Continuing the trend from last month, more than three-quarters of the infections occur on machines running Windows XP. This is likely due to better security in the later versions of the Microsoft Windows operating systems. The dominance of XP SP3 can be attributed to the combination of the above in conjunction with its high prevalence of use,” Johnson adds.

Out of the box, Win 7 less secure than Vista | Hardware 2.0 |

According to a well respected security firm, Microsoft’s flagship Windows 7 operating system is less secure in its default configuration that Vista.
Trend Micros CEO Raimund Genes believes that Microsoft has put usability ahead of security:
“I’m not saying Windows 7 is insecure, but out of the box Vista is better.”
“I was disappointed when I first used a Windows 7 machine that there was no warning that I had no anti-virus, unlike Vista. There are no file extension hidden warnings either. Even when you do install anti-virus, warnings that it has not been updated are almost invisible.”
“Windows 7 may be an improvement in terms of usability but in terms of security it’s a mistake, though one that isn’t that surprising. When Microsoft’s developers choose between usability and security, they will always choose usability.”Interestingly, Genes believes that the XP Mode feature present in some editions of Windows 7 actually improves security because it makes available a sandboxed OS. Other security firms (in particular Sophos) have criticized XP Mode, labeling it a security risk because it needs to be patched separately.
So, for a more secure Windows 7, Trend Micro recommends upping your UAC setting higher.

I am glad to see this thread. I must be one of the only 3 people in the world that are still using Windows 2000. I have some old software (remember 8 character file name limitation?) that does what I need better than anything since that will not run well even on XP. I also have a flatbed scanner that scans better than any of the current multifunction scanners now available. I also find Windows 2000 to be the most stable and generally "smoothest" OS ever from Redmond. Guess what! I am still receiving security updates for this OS. Were it not for lack of support by application developers, I would still be using this as my primary OS.

The latest updates to Apple's Safari WebKit-based browser, versions 5.0.1 and 4.1.1, include several new features, such as enabling Safari Extensions and introducing the Safari Extensions Gallery,. They also address a number of security vulnerabilities. In total, the Safari updates close 15 security holes, many of them rated as critical by Apple.

In total, 13 of the vulnerabilities are related to problems caused by the browsers open source WebKit rendering engine, all of which could allow an attacker to crash a victims browser or execute arbitrary code on a user's system. The issues range from heap buffer overflows in the rendering engine's handling of JavaString objects, to memory corruption issues in the handling of floating elements in SVG documents and an uninitialized memory access issue in SVG text elements. According to Apple, for an attack to be successful, a victim must first visit a specially crafted web page.

The updates also address a cross-site scripting (XSS) issue in the way that Safari handles RSS feeds that could have allowed a maliciously crafted RSS feed to send files from the user's system to a remote server and an information disclosure vulnerability in the auto-complete feature used by the browser to fill in frequently used form fields, such as names or email addresses. As previously reported, the auto-complete vulnerability was discovered by Jeremiah Grossman of White Hat Security and initially reported to Apple on the 17th of June.

The vulnerability allows an attacker to retrieve auto-complete data from the browser using a simple script on a specially crafted web page. The malicious page would contain various input fields, such as name, email address or credit card number, and the script would try out all possible characters for the first character in these fields, in an attempt to trigger the auto-complete feature. If the browser then auto-completes the entry, the attackers script saves the resulting entry. A similar form of this attack scenario is already familiar from versions 6 and 7 of Microsoft Internet Explorer. Grossman says that, in combination with cross-site scripting, Chrome and Firefox are also said to be vulnerable.

Safari 5.0.1 is available to download for Mac OS X 10.5.8 Leopard, 10.6.2 Snow Leopard and Windows XP SP2 or later. Alternatively, Safari 4.1.1 provided for users running Mac OS X 10.4.11 Tiger. Mac OS X users can upgrade to the latest release via the built-in Software Update function. All users are advised to upgrade to the latest release as soon as possible.

See also:
About the security content of Safari 5.0.1 and Safari 4.1.1, security advisory from Apple.Apple Updates Safari 5, press release from Apple.Apple's Safari 5 Reader incorporates open source tool, a report from The H.

Revision Note: V2.0 (October 9, 2012): Revised advisory to rerelease the KB2661254 update for Windows XP and to announce that the KB2661254 update for all supported releases of Microsoft Windows is now offered through automatic updating. Customers who previously applied the KB2661254 update do not need to take any action. See advisory FAQ for details.
Summary: Microsoft is announcing the availability of an update to Windows that restricts the use of certificates with RSA keys less than 1024 bits in length. The private keys used in these certificates can be derived and could allow an attacker to duplicate the certificates and use them fraudulently to spoof content, perform phishing attacks, or perform man-in-the-middle attacks.


I have been having problems with MS Security Essentials Anti-Virus. When the computer starts up i notice it to be very slow, i cannot access network links and i notice that the network icon does not load until i end "MsMpEng.exe" which i know is related to MSE.

I have seen this on numerous client computers running XP & Win7 at different locations. I have down malware scan and spyware scans and all is clean.

I have taken off this AV in the meantime until it gets fixed (re-installing MSE does not help). I just want to know if anyone have come across this before and is there a fix/workaround?

I am guessing windows has done some updates or MSE Has done a faulty update to cause this.

Microsoft has released a new Version 1.0.1963.0 of its free Microsoft Security Essentials (MSE) anti-malware package for Windows XP, Vista and 7. The update is available through MSE itself or via Windows Update.

Since a few weeks ago (no system changes e.g. Updates TMK), my Win 7 machine BETA fails to connect to shared drives on my Win XP Home machine ADVENT after ADVENT has been powered off/on, saying:

Location is not available

[drive] is not accessible
Logon failure: unknown username or bad password

ADVENT fails to show in BETA Explorer Network. FWIW, ADVENT can successfully remote connect to BETA.

After restart of BETA, problem is gone. Anyone know a better workaround/fix? Thanks.


* And entering ADVENT yields this Windows Security dialog:

if I enter my ADVENT username/password (despite that the dialog says Domain
BETA), I get "advant is not accessible":


I keep being offered this Security Update Microsoft .NET Frame 3.0 SP2 Update and it is already installed. I have uninstalled it a number if times and themn reinstalled it but this Update message will not go away. Any help would be appreciated.

System: 2.85 Gigahertz Intel Core2 Quad Q9550, twin 500GB Raid Mirrored HDDs, 4GB RAM, External 1.5TB HDD, Windows XP Professional Service Pack 3 (build 2600) (32 bit) with HL-DT-ST BDDVDRW GGC-H20L [CD-ROM drive] and NVIDIA GeForce GT 440 1GB DDR3 [Display adapter], LG Flatron E2441IV [Monitor] (24.0")

Brats (1930)

Stan Sr.: Remember the old adage: You can lead a horse to water, but a pencil must be lead.

Microsoft has confirmed that a recent security update (KB977165) may be causing restart issues for some Windows XP users. This update is no longer being issued through Windows Update, and Microsoft is investigating the root cause of these problems. If you believe you are experiencing problems due to this patch, a solution is offered here.

MS10-015: Vulnerabilities in Windows kernel could allow elevation of privilege

Page 13 of 34.
Results 241...260 of 680