I recently bought a notebook PC, and was quite annoyed to find that Intel has magically removed the ability to change the Centrino N 130 wireless adapter's MAC address.
Before the nutters get in here with accusations of "illegal" activity, I feel obligated to point out that there is nothing...
Discusses that the Microsoft Management Console window is not displayed correctly after you resize it in a Windows 7 environment. Provides workarounds for this issue.
Link Removed
Provides workarounds for an issue in which you receive an incorrect statistics report after a ping operation fails. This issue occurs in Windows 7, in Windows Vista, in Windows Server 2008 R2, and in Windows Server 2008.
Link Removed
Revision Note: V1.3 (January 11, 2011): Revised the workaround, Prevent the recursive loading of CSS style sheets in Internet Explorer, to add the impact for the workaround.Summary: Microsoft is investigating new, public reports of limited attacks attempting to exploit a vulnerability in all...
Revision Note: V1.3 (January 11, 2011): Revised the workaround, Prevent the recursive loading of CSS style sheets in Internet Explorer, to add the impact for the workaround. Advisory Summary:Microsoft is investigating new, public reports of limited attacks attempting to exploit a vulnerability...
Revision Note: V1.2 (January 11, 2011): Added the workaround, Prevent the recursive loading of CSS style sheets in Internet Explorer, and revised Executive Summary to reflect investigation of limited attacks. Advisory Summary:Microsoft is investigating new, public reports of targeted attacks...
Revision Note: V1.0 (December 22, 2010): Advisory published. Advisory Summary:Microsoft is investigating new, public reports of a vulnerability in all supported versions of Internet Explorer. The main impact of the vulnerability is remote code execution. This advisory contains workarounds and...
This week, advice for Windows XP users: reasons to switch to Windows 7, plus workarounds for issues with Picture and Fax Viewer, and sleep mode.
More...
Revision Note: V1.1 (November 3, 2010): Added the opening of HTML mail in the Restricted sites zone as a mitigating factor, the automated Microsoft Fix it solution to the CSS workaround, and a finder acknowledgment. Removed reading e-mail in plain text as a workaround. Also clarified content in...
Revision Note: V1.1 (November 3, 2010): Added the opening of HTML mail in the Restricted sites zone as a mitigating factor, the automated Microsoft Fix it solution to the CSS workaround, and a finder acknowledgment. Removed reading e-mail in plain text as a workaround. Also clarified content in...
Revision Note: V1.1 (November 3, 2010): Added the opening of HTML mail in the Restricted sites zone as a mitigating factor, the automated Microsoft Fix it solution to the CSS workaround, and a finder acknowledgment. Removed reading e-mail in plain text as a workaround. Also clarified content in...
advisory
code execution
css
dep
email reading
emet
execution
html mail
impact
internet explorer
investigation
microsoft
mitigations
public reports
remote code
restricted sites
security
vulnerability
workarounds
Revision Note: V1.0 (November 3, 2010): Advisory published. Advisory Summary:Microsoft is investigating new, public reports of a vulnerability in all supported versions of Internet Explorer. The main impact of the vulnerability is remote code execution. This advisory contains workarounds and...
Hi everyone,
We have released Link Removed due to 404 Error, which addresses a publicly reported vulnerability in Windows Shell. Microsoft has found that this vulnerability is most likely to be exploited through removable drives. Currently, we have seen only limited, targeted attacks on this...
Hi everyone,
Today we released Link Removed due to 404 Error describing a publicly disclosed vulnerability in ASP.NET that affects all versions of the .NET Framework. At this time we are not aware of any attacks using this vulnerability and we encourage customers to review the advisory for...
advisory
asp.net
blog
communication
configuration
customers
defense
disclosure
dotnet
framework
investigation
mitigations
protection
research
risk
script
security
update
vulnerability
workarounds
Revision Note: V1.2 (July 20, 2010): Clarified the vulnerability exploit description and updated the workarounds.Summary: Microsoft has completed the investigation into a public report of this vulnerability.
Link Removed due to 404 Error
I have win 7 pro OEM installed on my custom computer. I am trying to change my ASUS P6T Sata setting in BIOS to AHCI. I Get a blue screen when I do this. According to ASUS I must reinstall Windows which is not an option since I have tons of applications installed or they said I can do a repair...
Revision Note: V1.2 (July 20, 2010): Clarified the vulnerability exploit description and updated the workarounds. Advisory Summary:Microsoft is investigating reports of limited, targeted attacks exploiting a vulnerability in Windows Shell, a component of Microsoft Windows. This advisory contains...
Revision Note: V1.0 (July 16, 2010) Advisory published. Advisory Summary:Microsoft is investigating reports of limited, targeted attacks exploiting a vulnerability in Windows Shell, a component of Microsoft Windows. This advisory contains information about which versions of Windows are...
I just installed (clean on new HDD) win 7 x64. The computer is now dual boot with win7 x86.
the problem is that my printer, HP laserjet 4000, will not work through the netgear print server under x64.
It works fine on 2 other computers, laptop with win 7 x86 and old HP vectra under XP pro, as...
Microsoft warns of IE zero day vulnerablity Link Removed due to 404 Error Link Removed due to 404 Error Written by Link Removed due to 404 Error Tuesday, 24 November 2009 10:04
Workarounds for now
Software giant Microsoft has issued a security advisory that provides customers with guidance...
advisory
browser security
cascading style sheets
exploit code
ie 6
ie 7
internet explorer
javascript
microsoft
patch
protected mode
remote code execution
security
vista
vulnerability
windows server
workarounds
zero-day