|
Bracknell, UK 13th October 2011: Panasonic Toughbook today launched its fully rugged Microsoft® Windows® 7 based CF-D1 industrial tablet PC designed for the world of Engine & Machine Diagnostics. The CF-D1 has been designed with and for technicians performing diagnostics on engines, automobiles, trucks and machines in either the workshop or field environment. With its full shift battery life, 13.3" widescreen HD LED display, the latest 2nd Generation Intel® Core™i5-2520M (2.5GHz) standard voltage processor and...
|
|
|
Full View / NID: 39687 / Submitted by: The Zilla of Zuron
|
|
NOD32 Antivirus System provides well balanced, state-of-the-art protection against threats endangering your PC and enterprise systems running various platforms from Microsoft Windows 95 / 98 / ME / NT / 2000 / 2003 / XP, through a number of UNIX/Linux, Novell, MS DOS operating systems to Microsoft Exchange Server, Lotus Domino and other mail servers.
|
|
|
Full View / NID: 39686 / Submitted by: The Zilla of Zuron
|
|
October 12, 2011 - Seagate Technology plc (NASDAQ: STX) today provided an update to its operations in Thailand in light of the severe flooding in the region. Currently, all Seagate factories in Thailand are operational and there are no logistical issues with employees reaching its factories. However, the hard disk drive component supply chain is [...]
|
|
|
Full View / NID: 40023 / Submitted by: The Zilla of Zuron
|
|
Mozilla Thunderbird is a redesign of the Mozilla mail component. Our goal is to produce a cross platform stand alone mail application using the XUL user interface language. Our intended customer is someone who uses Mozilla Firebird (or another stand alone browser) as their primary browser and wants a mail client based on mozilla that "plays nice" with the browser. In addition, by focusing solely on stand alone mail, we believe we can make some dents in the overall footprint and performance of the mail client by removing components and chrome we don't need. On top of that, the UI becomes much cleaner as a stand alone application as opposed to being part of the mozilla suite.
|
|
|
Full View / NID: 39693 / Submitted by: TACKtech Team
|
|
Severity Rating: Critical
Revision Note: V1.1 (October 12, 2011): Added a link to Microsoft Knowledge Base Article 2586448 under Known Issues in the Executive Summary.
Summary: This security update resolves eight privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
|
|
|
Full View / NID: 39685 / Submitted by: The Zilla of Zuron
|
|
Severity Rating: Important
Revision Note: V1.1 (October 12, 2011): Corrected the bulletin replacement information for all supported editions of Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2. This is an informational change only. There were no changes to the detection logic or the update files.
Summary: This security update resolves a privately reported vulnerability in the Microsoft Active Accessibility component. The vulnerability could allow remote code execution if an attacker convinces a user to open a legitimate file that is located in the same network directory as a specially crafted dynamic link library (DLL) file. Then, while opening the legitimate file, the Microsoft Active Accessibility component could attempt to load the DLL file and execute any code it contained. For an attack to be successful, a user must visit an untrusted remote file system location or WebDAV share and open a document from this location that is then loaded by a vulnerable application.
|
|
|
Full View / NID: 39684 / Submitted by: The Zilla of Zuron
|
|
The Official Pattern Release or OPR is Trend Micro's latest compilation of patterns for identified viruses. It is guaranteed to have passed a series of critical tests to ensure that customers get optimum protection from the latest virus threats.
|
|
|
Full View / NID: 39683 / Submitted by: The Zilla of Zuron
|
|
Microsoft Silverlight is a cross-browser, multi-environment plug-in that delivers the next generation of Microsoft .NET-based media experiences and rich interactive applications for the web. This article describes Silverlight 4 general distribution release version 4.0.60831.0. This update is released on October 12, 2011.
|
|
|
Full View / NID: 39682 / Submitted by: TACKtech Team
|
|
WindowBlinds is a program that allows users of Windows 7, Vista, and XP to totally change the look and feel of the Windows GUI to anything they'd like by applying any of the thousands of free skins available. WindowBlinds 7.3 adds a Windows 8 skin along with a Metro skin (for registered users) as well as enhancing skinning support for Office 2010, bug fixes, and a number of other updates.
|
|
|
Full View / NID: 39681 / Submitted by: TACKtech Team
|
|
Before Safari, browsers were an afterthought. Something you put up with if you wanted to surf the internet. One browser looked and felt just like another, so you chose the one that worked the best and crashed the least. They were ugly, cluttered affairs, whose interfaces competed for your attention and made browsing — the very purpose for which they were created — more difficult. Safari changes all that.
|
|
|
Full View / NID: 39680 / Submitted by: TACKtech Team
|
|
Spybot - Search & Destroy detects and removes spyware, a relatively new kind of threat not yet covered by common anti-virus applications. Spyware silently tracks your surfing behaviour to create a marketing profile for you that is transmitted without your knowledge to the compilers and sold to advertising companies. If you see new toolbars in your Internet Explorer that you have not intentionally installed, if your browser crashes inexplicably, or if your home page has been "hijacked" (or changed without your knowledge), your computer is most probably infected with spyware. Even if you do not see the symptoms, your computer may be infected, because more and more spyware is emerging. Spybot-S&D is free, so there is no harm giving it a try to see if something has invaded your computer.
|
|
|
Full View / NID: 39678 / Submitted by: The Zilla of Zuron
|
|
NOD32 Antivirus System provides well balanced, state-of-the-art protection against threats endangering your PC and enterprise systems running various platforms from Microsoft Windows 95 / 98 / ME / NT / 2000 / 2003 / XP, through a number of UNIX/Linux, Novell, MS DOS operating systems to Microsoft Exchange Server, Lotus Domino and other mail servers.
|
|
|
Full View / NID: 39677 / Submitted by: The Zilla of Zuron
|
|
Automobile manufacturer boosts collaboration by bringing employees together on Microsoft’s unified communications system.
|
|
|
Full View / NID: 39676 / Submitted by: The Zilla of Zuron
|
|
Microsoft communications solution saves LA Fitness over $650,000 per year, perpetuates corporate culture and provides a new level of consistent service to members and employees.
|
|
|
Full View / NID: 39675 / Submitted by: The Zilla of Zuron
|
|
New technologies will give businesses a universal platform for data management, access and collaboration.
|
|
|
Full View / NID: 39674 / Submitted by: The Zilla of Zuron
|
|
DVDFab "DVD to DVD" is the most powerful and flexible DVD copying/burning software. With 8 copy modes, you can backup any DVD to DVDR or hard drive in just one or a few clicks.
DVDFab "Blu-ray to Blu-ray" is the first full-featured Blu-ray copying/burning software. With 4 copy modes, you can backup Blu-ray to BD-R or hard drive in just one or a few clicks.
|
|
|
Full View / NID: 39673 / Submitted by: TACKtech Team
|
|
The Official Pattern Release or OPR is Trend Micro's latest compilation of patterns for identified viruses. It is guaranteed to have passed a series of critical tests to ensure that customers get optimum protection from the latest virus threats.
|
|
|
Full View / NID: 39672 / Submitted by: The Zilla of Zuron
|
|
NOD32 Antivirus System provides well balanced, state-of-the-art protection against threats endangering your PC and enterprise systems running various platforms from Microsoft Windows 95 / 98 / ME / NT / 2000 / 2003 / XP, through a number of UNIX/Linux, Novell, MS DOS operating systems to Microsoft Exchange Server, Lotus Domino and other mail servers.
|
|
|
Full View / NID: 39671 / Submitted by: The Zilla of Zuron
|
|
Adding 966 new threats. Keep your AVG software up-to-date by downloading the latest updates. No matter if you are using AVG Antivirus, Internet Security or another product, you are better protected with regular updates.
|
|
|
Full View / NID: 39670 / Submitted by: The Zilla of Zuron
|
|
The Official Pattern Release or OPR is Trend Micro's latest compilation of patterns for identified viruses. It is guaranteed to have passed a series of critical tests to ensure that customers get optimum protection from the latest virus threats.
|
|
|
Full View / NID: 39668 / Submitted by: The Zilla of Zuron
|
|
NOD32 Antivirus System provides well balanced, state-of-the-art protection against threats endangering your PC and enterprise systems running various platforms from Microsoft Windows 95 / 98 / ME / NT / 2000 / 2003 / XP, through a number of UNIX/Linux, Novell, MS DOS operating systems to Microsoft Exchange Server, Lotus Domino and other mail servers.
|
|
|
Full View / NID: 39667 / Submitted by: The Zilla of Zuron
|
|
AMD (NYSE: AMD) today unleashed the AMD FX family of CPUs, delivering a fully unlocked and customizable experience for desktop PC users. The AMD FX series of desktop CPUs includes the first-ever eight-core desktop processor, enabling extreme multi-display gaming, mega-taski..
|
|
|
Full View / NID: 39666 / Submitted by: The Zilla of Zuron
|
|
Adding 1930 new threats. Keep your AVG software up-to-date by downloading the latest updates. No matter if you are using AVG Antivirus, Internet Security or another product, you are better protected with regular updates.
|
|
|
Full View / NID: 39665 / Submitted by: The Zilla of Zuron
|
|
Severity Rating: Important
Revision Note: V1.0 (October 11, 2011): Bulletin published.
Summary: This security update resolves five privately reported vulnerabilities in Forefront Unified Access Gateway (UAG). The most severe of these vulnerabilities could allow remote code execution if a user visits an affected Web site using a specially crafted URL. However, an attacker would have no way to force users to visit such a Web site. Instead, an attacker would have to persuade users to visit the Web site, typically by getting them to click a link in an e-mail message or Instant Messenger message that takes users to the attacker's Web site.
|
|
|
Full View / NID: 39700 / Submitted by: The Zilla of Zuron
|
|
Severity Rating: Important
Revision Note: V1.0 (October 11, 2011): Bulletin published.
Summary: This security update resolves a privately reported vulnerability in the Microsoft Windows Ancillary Function Driver (AFD). The vulnerability could allow elevation of privilege if an attacker logs on to a user's system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit the vulnerability.
|
|
|
Full View / NID: 39699 / Submitted by: The Zilla of Zuron
|
|
Severity Rating: Important
Revision Note: V1.0 (October 11, 2011): Bulletin published.
Summary: This security update resolves two publicly disclosed vulnerabilities in Host Integration Server. The vulnerabilities could allow denial of service if a remote attacker sends specially crafted network packets to a Host Integration Server listening on UDP port 1478 or TCP ports 1477 and 1478. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems that are connected to the Internet have a minimal number of ports exposed. In this case, the Host Integration Server ports should be blocked from the Internet.
|
|
|
Full View / NID: 39698 / Submitted by: The Zilla of Zuron
|
|
AnyDVD is a driver, which descrambles DVD-Movies automatically in the background. This DVD appears unprotected and region code free for all applications and the Windows operating system as well. With AnyDVD's help copy tools like CloneDVD, Pinnacle Instant Copy, InterVideo DVD-Copy, etc. are able to copy CSS and copy protected movies. With the help of AnyDVD you can watch movies with non matching region codes with every DVD Player Software you like!
|
|
|
Full View / NID: 39679 / Submitted by: TACKtech Team
|
|
UltraISO is an ISO CD/DVD image file creating/editing/converting tool and a bootable CD/DVD maker , it can directly edit the CD/DVD image file and extract files and folders from it, as well as directly make ISO files from your CD/DVD-ROM or hard disk. At the same time, you can maintain the ISO bootable information, thus creating your own bootable CD/DVDs. You now have the power to make and edit your own ISO files, and then burn them to CD/DVD for your own needs.
|
|
|
Full View / NID: 39669 / Submitted by: TACKtech Team
|
|
Severity Rating: Important
Revision Note: V1.0 (October 11, 2011): Bulletin published.
Summary: This security update resolves a publicly disclosed vulnerability in Windows Media Center. The vulnerability could allow remote code execution if an attacker convinces a user to open a legitimate file that is located in the same network directory as a specially crafted dynamic link library (DLL) file. Then, while opening the legitimate file, Windows Media Center could attempt to load the DLL file and execute any code it contained. For an attack to be successful, a user must visit an untrusted remote file system location or WebDAV share and open a legitimate file.
|
|
|
Full View / NID: 39664 / Submitted by: The Zilla of Zuron
|
|
Severity Rating: Important
Revision Note: V1.0 (October 11, 2011): Bulletin published.
Summary: This security update resolves a privately reported vulnerability in the Microsoft Active Accessibility component. The vulnerability could allow remote code execution if an attacker convinces a user to open a legitimate file that is located in the same network directory as a specially crafted dynamic link library (DLL) file. Then, while opening the legitimate file, the Microsoft Active Accessibility component could attempt to load the DLL file and execute any code it contained. For an attack to be successful, a user must visit an untrusted remote file system location or WebDAV share and open a document from this location that is then loaded by a vulnerable application.
|
|
|
Full View / NID: 39663 / Submitted by: The Zilla of Zuron
|