Make Homepage | Add To Favorites | Print Page | Submit News | Feedback | Contact | 

Your Technical Computer Information Resource!  
     
  OS Technical Updates [Page: 6 of 275] @ TACKtech Corp.  

10.31.2014 - Bing gets freaky this Halloween



View Microsoft-Press related news.

Halloween can be a scary or fun time depending on who you talk to. Traditionally, Halloween or All Hallows Eve is a day to commemorate the dead. It’s now a day for frights, fun and fantastic costumes, making it one of the most anticipated and feared days of the year.

It’s also a time for people to search Bing for everything from paranormal activity to costumes. According to Bing’s top Halloween searches, the most searched for haunted destination in the UK is Enfield, London with the Green Street Poltergeist. If you fancy a ghostly encounter this Halloween, other destinations in the list are the Tower of London, Hampton Court Palace, and Jamaica Inn in Cornwall.

On a less eerie note, Bing has also revealed the most searched-for celebrity costumes for Halloween. Topping the list in the UK is US wild child popstar, Miley Cyrus. The notorious twerking singer is closely followed by Lady Gaga with her outrageous costumes, Michael ‘Thriller’ Jackson, Marilyn Monroe and teen heartthrob, Justin Bieber. The only Brit to feature in the Top 10 is X Factor judge Cheryl Fernandez-Versini.

One of Bing's Halloween homepages
One of Bing's Halloween homepages
October 30, 2014

Bing is getting into the Halloween spirit this year with a fully immersive and interactive homepage dedicated to three famous ghostly tales: the weeping woman La Llorona, legendary ghost ship The Flying Dutchman and future gazing spirit Bloody Mary. Head to www.bing.com today to see the homepage.

Bing celebratets Halloween with a selection of spooky homepages
Bing celebratets Halloween with a selection of spooky homepages
October 30, 2014

Another Halloween homepage from Bing
Another Halloween homepage from Bing
October 30, 2014

Bing's selection of Halloween homepages
Bing's selection of Halloween homepages
October 30, 2014

Full View / NID: 51730 / Submitted by: The Zilla of Zuron

10.30.2014 - This month’s latest and greatest apps



View Microsoft-Press related news.

With so many new, informative and fun apps available on a daily basis, it can be hard to pinpoint the best apps for you. To make your life easier, here’s our monthly app update, which includes the latest and greatest apps on Windows Phone as well as new updates to our favourite apps and seasonal fun!

Despicable Me: Minion Rush (FREE)
Despicable Me: Minion Rush (FREE)
October 31, 2014
Gru’s loyal yellow gibberish-speaking Minions are ready for their toughest challenge in Despicable Me: Minion Rush. Play as a Minion and compete with others in hilarious, fast-paced challenges in order to impress your boss, (former?) super-villain Gru! With all the heart and humour of Despicable Me, you’re sure to love this innovative and original game.

British Airways (FREE)
British Airways (FREE)
October 30, 2014
The British Airways app guides you smoothly through each step of your journey with instant access to live information about your next flight. Plus, you can use your phone as a boarding pass on many routes. This app has received new updates, which includes an extra level of flight information detail within the app. It will allow you to put your next flight information and destination photos on your screen as a Live Tile, pin boarding passes as secondary tiles and allows you to manage your flight and check-in via the improved British Airways mobile site.

Dream League Soccer (FREE)
Dream League Soccer (FREE)
October 30, 2014
Football as we know it has changed! Dream League Soccer is YOUR chance to build THE best team on the planet. Recruit new Players, upgrade your Stadium, and train your team as you march towards glory, on your road to Soccer Super Stardom!

Enter Orc Kid  (0.79p)
Enter Orc Kid (0.79p)
October 31, 2014
The Orcs have been pushed to the brink of extinction. In a last desperate bid for bloody revenge the offering has been made to the petty gods for a stone hearted warrior of pure death! Enter OrcKid is a fast paced action title sending you on a warrior’s quest to hack a bloody swathe through the enemies of your Orcish brethren. Featuring a plethora of funny items to unlock and customise your warrior with, a rich combat animation system and intuitive and original touchscreen controls, this game will keep you entertained for hours!

Full View / NID: 51731 / Submitted by: The Zilla of Zuron

10.29.2014 - A piece of Surface Pro 3 artwork?



View Microsoft-Press related news.

Last night attendees at the opening of renowned ballpoint artist, James Mylne’s latest exhibition, Something More, were treated to a first look of his new Surface Pro 3 artwork.

Having previously recreated famous portraits from the National Portrait Gallery using the Surface Pro 3, Pen and the Fresh Paint app, Mylne unveiled a new digital portrait of British TV Presenter and model Alexa Chung.

James Mylne creates a portrait of Alexa Chung using the Surface Pro 3
James Mylne creates a portrait of Alexa Chung using the Surface Pro 3
October 28, 2014


If you want to see the new Surface Pro 3 portrait for yourself, along with other original artworks created by the talented James Mylne, head over to 340 Kings Road SW3 5UR. Something More is Mylne’s largest solo exhibition to date and runs until November 2nd.


Full View / NID: 51732 / Submitted by: The Zilla of Zuron

10.16.2014 - Vulnerability in Windows OLE Could Allow Remote Code Execution - Version: 1.1



View Microsoft related news. Severity Rating: Important
Revision Note: V1.1 (October 16, 2014): Corrected Updates Replaced entries in the Affected Software table for Windows 7 and Windows 2008 R2. This is an informational change only. Customers who have already successfully installed the update do not have to take any action.
Summary: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a Microsoft Office file that contains a specially crafted OLE object. An attacker who successfully exploited this vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
Full View / NID: 51554 / Submitted by: The Zilla of Zuron

10.16.2014 - MS14-060 - Important: Vulnerability in Windows OLE Could Allow Remote Code Execution (3000869) - Version: 1.1



View Microsoft related news. Severity Rating: Important
Revision Note: V1.1 (October 16, 2014): Corrected Updates Replaced entries in the Affected Software table for Windows 7 and Windows 2008 R2. This is an informational change only. Customers who have already successfully installed the update do not have to take any action.
Summary: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a Microsoft Office file that contains a specially crafted OLE object. An attacker who successfully exploited this vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
Full View / NID: 51481 / Submitted by: The Zilla of Zuron

10.14.2014 - Vulnerability in Microsoft Word and Office Web Apps Could Allow Remote Code Execution - Version: 1.0



View Microsoft related news. Severity Rating: Important
Revision Note: V1.0 (October 14, 2014): Bulletin published.
Summary: This security update resolves one privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if an attacker convinces a user to open a specially crafted Microsoft Word file. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
Full View / NID: 51557 / Submitted by: The Zilla of Zuron

10.14.2014 - Vulnerability in FAT32 Disk Partition Driver Could Allow Elevation of Privilege - Version: 1.0



View Microsoft related news. Severity Rating: Important
Revision Note: V1.0 (October 14, 2014): Bulletin published.
Summary: This security update resolves a privately reported vulnerability in Microsoft Windows. An elevation of privilege vulnerability exists in the way the Windows FASTFAT system driver interacts with FAT32 disk partitions. An attacker who successfully exploited this vulnerability could execute arbitrary code with elevated privileges.
Full View / NID: 51556 / Submitted by: The Zilla of Zuron

10.14.2014 - Vulnerability in Message Queuing Service Could Allow Elevation of Privilege - Version: 1.0



View Microsoft related news. Severity Rating: Important
Revision Note: V1.0 (October 14, 2014): Bulletin published.
Summary: This security update resolves a publicly disclosed vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker sends a specially crafted input/output control (IOCTL) request to the Message Queuing service. Successful exploitation of this vulnerability could lead to full access of the affected system. By default, the Message Queuing component is not installed on any affected operating system edition and can only be enabled by a user with administrative privileges. Only customers who manually enable the Message Queuing component are likely to be vulnerable to this issue.
Full View / NID: 51555 / Submitted by: The Zilla of Zuron

10.14.2014 - MS14-060 - Important: Vulnerability in Windows OLE Could Allow Remote Code Execution (3000869) - Version: 1.0



View Microsoft related news. Severity Rating: Important
Revision Note: V1.0 (October 14, 2014): Bulletin published.
Summary: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a Microsoft Office file that contains a specially crafted OLE object. An attacker who successfully exploited this vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
Full View / NID: 51472 / Submitted by: The Zilla of Zuron

10.14.2014 - MS14-058 - Critical: Vulnerabilities in Kernel-Mode Driver Could Allow Remote Code Execution (3000061) - Version: 1.0



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.0 (October 14, 2014): Bulletin published.
Summary:
Full View / NID: 51471 / Submitted by: The Zilla of Zuron

10.14.2014 - MS14-056 - Critical: Cumulative Security Update for Internet Explorer (2987107) - Version: 1.0



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.0 (October 14, 2014): Bulletin published.
Summary: This security update resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
Full View / NID: 51462 / Submitted by: The Zilla of Zuron

10.14.2014 - MS14-061 - Important: Vulnerability in Microsoft Word and Office Web Apps Could Allow Remote Code Execution (3000434) - Version: 1.0



View Microsoft related news. Severity Rating: Important
Revision Note: V1.0 (October 14, 2014): Bulletin published.
Summary: This security update resolves one privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if an attacker convinces a user to open a specially crafted Microsoft Word file. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
Full View / NID: 51461 / Submitted by: The Zilla of Zuron

10.14.2014 - MS14-063 - Important: Vulnerability in FAT32 Disk Partition Driver Could Allow Elevation of Privilege (2998579) - Version: 1.0



View Microsoft related news. Severity Rating: Important
Revision Note: V1.0 (October 14, 2014): Bulletin published.
Summary: This security update resolves a privately reported vulnerability in Microsoft Windows. An elevation of privilege vulnerability exists in the way the Windows FASTFAT system driver interacts with FAT32 disk partitions. An attacker who successfully exploited this vulnerability could execute arbitrary code with elevated privileges.
Full View / NID: 51459 / Submitted by: The Zilla of Zuron

10.14.2014 - MS14-059 - Important: Vulnerability in ASP.NET MVC Could Allow Security Feature Bypass (2990942) - Version: 1.0



View Microsoft related news. Severity Rating: Important
Revision Note: V1.0 (October 14, 2014): Bulletin published.
Summary: This security update resolves a publicly disclosed vulnerability in ASP.NET MVC. The vulnerability could allow security feature bypass if an attacker convinces a user to click a specially crafted link or to visit a webpage that contains specially crafted content designed to exploit the vulnerability. In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability through a web browser, and then convince a user to view the website. The attacker could also take advantage of compromised websites and websites that accept or host user-provided content or advertisements. These websites could contain specially crafted content that could exploit these vulnerabilities. In all cases, however, an attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or in an Instant Messenger message that takes them to the attacker's website, or by getting them to open an attachment sent through email.
Full View / NID: 51458 / Submitted by: The Zilla of Zuron

10.14.2014 - MS14-062 - Important: Vulnerability in Message Queuing Service Could Allow Elevation of Privilege (2993254) - Version: 1.0



View Microsoft related news. Severity Rating: Important
Revision Note: V1.0 (October 14, 2014): Bulletin published.
Summary: This security update resolves a publicly disclosed vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker sends a specially crafted input/output control (IOCTL) request to the Message Queuing service. Successful exploitation of this vulnerability could lead to full access of the affected system. By default, the Message Queuing component is not installed on any affected operating system edition and can only be enabled by a user with administrative privileges. Only customers who manually enable the Message Queuing component are likely to be vulnerable to this issue.
Full View / NID: 51457 / Submitted by: The Zilla of Zuron

10.14.2014 - MS14-057 - Critical: Vulnerabilities in .NET Framework Could Allow Remote Code Execution (3000414) - Version: 1.0



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.0 (October 14, 2014): Bulletin published.
Summary: This security update resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application, causing ASP.NET to generate incorrectly constructed URIs. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled.
Full View / NID: 51456 / Submitted by: The Zilla of Zuron

10.14.2014 - MS14-042 - Moderate: Vulnerability in Microsoft Service Bus Could Allow Denial of Service (2972621) - Version: 2.0



View Microsoft related news. Severity Rating: Moderate
Revision Note: V2.0 (October 14, 2014): Bulletin rereleased to announce the offering of the security update via Microsoft Update, in addition to the Download-Center-only option that was provided when this bulletin was originally released.
Summary: This security update resolves one publicly disclosed vulnerability in Microsoft Service Bus for Windows Server. The vulnerability could allow denial of service if a remote authenticated attacker creates and runs a program that sends a sequence of specially crafted Advanced Message Queuing Protocol (AMQP) messages to the target system. Microsoft Service Bus for Windows Server is not shipped with any Microsoft operating system. For an affected system to be vulnerable Microsoft Service Bus must first be downloaded, installed, and configured, and then its configuration details (farm certificate) shared with other users.
Full View / NID: 51455 / Submitted by: The Zilla of Zuron

10.08.2014 - MS14-051 - Critical: Cumulative Security Update for Internet Explorer (2976627) - Version: 1.1



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.1 (October 8, 2014): Corrected the severity table and vulnerability information to add CVE-2014-4145 as a vulnerability addressed by this update. This is an informational change only. Customers who have already successfully installed the update do not have to take any action.
Summary: This security update resolves one publicly disclosed and twenty-five privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
Full View / NID: 51414 / Submitted by: The Zilla of Zuron

10.02.2014 - MS14-030 - Important: Vulnerability in Remote Desktop Could Allow Tampering (2969259) - Version: 1.3



View Microsoft related news. Severity Rating: Important
Revision Note: V1.3 (October 2, 2014): Bulletin revised to clarify the conditions under which Windows 7 editions are affected. See the Update FAQ for more information.
Summary: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow tampering if an attacker gains access to the same network segment as the targeted system during an active RDP session, and then sends specially crafted RDP packets to the targeted system.
Full View / NID: 51359 / Submitted by: The Zilla of Zuron

09.30.2014 - Microsoft Office 365 is the formula for enhanced connectivity at BASF



View Microsoft-Press related news.

UNTERSCHLEISSHEIM , Germany Sept. 30 , 2014 BASF is focused on innovative technology. To enable its 112,000 staff members to collaborate even more efficiently, the company relies on a collaborative communication infrastructure based on a Microsoft solution. By mid-2015, all employee accounts are to be migrated to Microsoft Office 365.

Because BASF decided to implement Office 365, all its staff members will be empowered to access their emails and documents from anywhere. At the same time, the intuitive use of the graphical user interface of Office ensures that they work productively in an integrated environment. The Office 365 cloud solution can be scaled more flexibly than stationary IT and be expanded easily and rapidly as the size of the organization grows.

BASF uses Office 365 for modern knowledge organization

“The goal of the global implementation of Microsoft Office 365 is to establish an efficient and user-friendly IT solution that supports our business processes optimally — and works independent of the devices our staff members use,” said Wiebe van der Horst, senior vice president, Global Process & Enterprise Architecture of the BASF Group Information Services & Supply Chain Operations.

BASF uses the Microsoft cloud as an integrated platform to connect phones, tablets and traditional computers. As a result, staff members benefit from a highly state-of-the-art working environment. In the future, BASF will also rely on Microsoft technology for managing the company’s smartphones. Using Windows Intune, BASF will be able to administer the mobile devices far more efficiently from the cloud.

“Microsoft supports BASF in this comprehensive and complex project by being available as a partner,” said Thomas Schröder, general manager, Enterprise and Partner Group, Microsoft Deutschland GmbH, who is responsible for Microsoft’s key accounts and partners. “The key criterion for BASF was the ability to transition smoothly, with the support of IT tools, so ongoing operations were not impaired.”

Experience in this field and high-quality standards in security as well as the ease of use and scalability of Office 365 were crucial for the decision in favor of the Microsoft solution as compared with competitors.

Microsoft helps companies combine a more flexible style of working with the opportunities of digital technology and security. The company recently published a manifesto for the new workplace aimed at reshaping the understanding of digital collaboration. By establishing the Office 365 Trust Center, Microsoft also created a standard for security in the cloud.

About Microsoft Deutschland GmbH

Microsoft Deutschland GmbH, founded in 1983, is a subsidiary of Microsoft Corporation, Redmond, U.S.A., the world’s leading manufacturer of standard software, services and solutions, generating $77.85 billion in revenue and $26.76 billion in operating income (in fiscal year 2013; as of June 30, 2013). Alongside its headquarters in Unterschleissheim near Munich, Microsoft Deutschland GmbH operates six regional offices in Germany and employs more than 2,700 staff members. In association with 36,500 partners, Microsoft Deutschland GmbH serves companies of all sizes across all industries. The Advanced Technology Labs Europe (ATLE) in Munich is focused on research in IT security, privacy, mobility, mobile applications and Web services.

For more information about BASF:

www.basf.com

Note to editors: For more information, news and perspectives from Microsoft, please visit the Microsoft News Center at http://www.microsoft.com/news. Web links, telephone numbers and titles were correct at time of publication, but may have changed. For additional assistance, journalists and analysts may contact Microsoft’s Rapid Response Team or other appropriate contacts listed at http://www.microsoft.com/news/contactpr.mspx.

Full View / NID: 51337 / Submitted by: The Zilla of Zuron
  Most Viewed  
  Quick Links  
  Top Affiliates  
.......