|
NOD32 Antivirus System provides well balanced, state-of-the-art protection against threats endangering your PC and enterprise systems running various platforms from Microsoft Windows 95 / 98 / ME / NT / 2000 / 2003 / XP, through a number of UNIX/Linux, Novell, MS DOS operating systems to Microsoft Exchange Server, Lotus Domino and other mail servers.
|
|
|
Full View / NID: 30558 / Submitted by: The Zilla of Zuron
|
|
Added detection of new variants of trojans Generic14.CCMB, Downloader.Generic8.CBYA, Generic14.CCOK, SHeur2.BKTV, Flooder.HHH, Generic14.CCMQ.
|
|
|
Full View / NID: 30557 / Submitted by: The Zilla of Zuron
|
|
New recommended program update is available for download.
|
|
|
Full View / NID: 30694 / Submitted by: The Zilla of Zuron
|
|
Bulletin Severity Rating:Critical - This security update resolves one publicly disclosed and two privately reported vulnerabilities in Server Message Block Version 2 (SMBv2). The most severe of the vulnerabilities could allow remote code execution if an attacker sent a specially crafted SMB packet to a computer running the Server service. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate from outside the enterprise perimeter. Best practices recommend that systems that are connected to the Internet have a minimal number of ports exposed.
|
|
|
Full View / NID: 30590 / Submitted by: The Zilla of Zuron
|
|
Bulletin Severity Rating:Critical - This security update resolves two privately reported vulnerabilities in Windows Media Runtime. The vulnerabilities could allow remote code execution if a user opened a specially crafted media file or received specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
|
|
|
Full View / NID: 30589 / Submitted by: The Zilla of Zuron
|
|
Bulletin Severity Rating:Critical - This security update resolves a privately reported vulnerability in Windows Media Player. The vulnerability could allow remote code execution if a specially crafted ASF file is played using Windows Media Player 6.4. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
|
|
|
Full View / NID: 30588 / Submitted by: The Zilla of Zuron
|
|
Bulletin Severity Rating:Important - This security update resolves two publicly disclosed vulnerabilities in the FTP Service in Microsoft Internet Information Services (IIS) 5.0, Microsoft Internet Information Services (IIS) 5.1, Microsoft Internet Information Services (IIS) 6.0, and Microsoft Internet Information Services (IIS) 7.0. On IIS 7.0, only FTP Service 6.0 is affected. The vulnerabilities could allow remote code execution (RCE) on systems running FTP Service on IIS 5.0, or denial of service (DoS) on systems running FTP Service on IIS 5.0, IIS 5.1, IIS 6.0 or IIS 7.0.
|
|
|
Full View / NID: 30587 / Submitted by: The Zilla of Zuron
|
|
Bulletin Severity Rating:Critical - This security update resolves three privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
|
|
|
Full View / NID: 30586 / Submitted by: The Zilla of Zuron
|
|
Bulletin Severity Rating:Critical - This security update addresses a privately reported vulnerability that is common to multiple ActiveX controls and is currently being exploited. The vulnerability that affects ActiveX controls that were compiled using the vulnerable version of the Microsoft Active Template Library (ATL) could allow remote code execution if a user views a specially crafted Web page with Internet Explorer, instantiating the ActiveX control. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
|
|
|
Full View / NID: 30585 / Submitted by: The Zilla of Zuron
|
|
Bulletin Severity Rating:Important - This security update resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow spoofing if an attacker gains access to the certificate used by the end user for authentication.
|
|
|
Full View / NID: 30584 / Submitted by: The Zilla of Zuron
|
|
Bulletin Severity Rating:Important - This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if an attacker set up a malicious Web page that invokes the Indexing Service through a call to its ActiveX component. This call could include a malicious URL and exploit the vulnerability, granting the attacker access to the client system with the privileges of the user browsing the Web page. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
|
|
|
Full View / NID: 30583 / Submitted by: The Zilla of Zuron
|
|
Bulletin Severity Rating:Important - This security update resolves several privately reported vulnerabilities in the Windows kernel. The most severe of the vulnerabilities could allow elevation of privilege if an attacker logged on to the system and ran a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit any of these vulnerabilities. The vulnerabilities could not be exploited remotely or by anonymous users.
|
|
|
Full View / NID: 30582 / Submitted by: The Zilla of Zuron
|
|
Bulletin Severity Rating:Important - This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker sent a maliciously crafted packet during the NTLM authentication process.
|
|
|
Full View / NID: 30581 / Submitted by: The Zilla of Zuron
|
|
Bulletin Severity Rating:Critical - This security update resolves several privately reported vulnerabilities in ActiveX Controls for Microsoft that were compiled with a vulnerable version of Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
|
|
|
Full View / NID: 30580 / Submitted by: The Zilla of Zuron
|
|
Bulletin Severity Rating:Critical - This security update resolves three privately reported vulnerabilities in Microsoft .NET Framework and Microsoft Silverlight. The vulnerabilities could allow remote code execution on a client system if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications, or if an attacker succeeds in persuading a user to run a specially crafted Microsoft .NET application. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerabilities could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and executing it, as could be the case in a Web hosting scenario. Microsoft .NET applications, Silverlight applications, XBAPs and ASP.NET pages that are not malicious are not at risk of being compromised because of this vulnerability.
|
|
|
Full View / NID: 30579 / Submitted by: The Zilla of Zuron
|
|
Bulletin Severity Rating:Critical - This security update resolves several privately reported vulnerabilities in Microsoft Windows GDI+. These vulnerabilities could allow remote code execution if a user viewed a specially crafted image file using affected software or browsed a Web site that contains specially crafted content. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
|
|
|
Full View / NID: 30578 / Submitted by: The Zilla of Zuron
|
|
Jitterbit announced the general availability of Jitterbit 3.0, the latest release of the company’s award-winning data integration solution. Jitterbit 3.0 includes new management tools designed for large enterprise use.
|
|
|
Full View / NID: 30575 / Submitted by: The Zilla of Zuron
|
|
This is a bug fix release.
|
|
|
Full View / NID: 30574 / Submitted by: The Zilla of Zuron
|
|
Microsoft has released the Microsoft Windows Malicious Software Removal Tool to help remove specific, prevalent malicious software from computers that are running Windows Vista, Microsoft Windows Server 2003, Microsoft Windows XP, or Microsoft Windows 2000. The Malicious Software Removal Tool supersedes all virus-cleaner tools that were previously released by Microsoft. You can download the Malicious Software Removal Tool from the Microsoft Download Center. You can also run an online version of the tool from the Malicious Software Removal Tool Web site on Microsoft.com. To run the Malicious Software Removal Tool from either location, you must log on to the computer by using an account that is a member of the Administrators group. If you are running Windows Vista, Windows XP, Windows Server 2003, or Windows 2000, you can also run the Malicious Software Removal Tool from the Microsoft Update Web site or by using the Microsoft Update Automatic Updates functionality. If you have chosen not to use Microsoft Update, and you are running Windows Vista, Windows XP or Windows Server 2003 Service Pack 1 (SP1), you may run the Malicious Software Removal Tool from the Windows Update Web site or by using the Windows Update Automatic Updates functionality.
|
|
|
Full View / NID: 30556 / Submitted by: TACKtech Team
|
|
Welcome to the Windows 7 Enterprise 90-day Trial. It is designed specifically for IT Professionals, so that you can test your software and hardware on a final version of the product. In addition, it provides the opportunity for you to become more familiar with the key improvements over previous versions of the Windows operating system, and experience firsthand how Windows 7 can make your PC environment more productive, secure, and manageable.
|
|
|
Full View / NID: 30555 / Submitted by: TACKtech Team
|
|
SANTA CLARA, Calif., Oct. 13, 2009 – Intel Corporation today reported third-quarter revenue of $9.4 billion.
|
|
|
Full View / NID: 30554 / Submitted by: The Zilla of Zuron
|
|
COFEE tool captures live computer evidence and gives law enforcement agencies a technological edge in the battle against digital crimes.
|
|
|
Full View / NID: 30553 / Submitted by: The Zilla of Zuron
|
|
Windows 7 to enhance viewing experience of original variety show special airing Sunday, Nov. 8, on FOX; broader multiplatform marketing initiative also encompasses 20th Century Fox Television, Fox Licensing and Merchandising, FOX Sports, FX, FOX.com, FOX Sports on MSN, and Hulu assets.
|
|
|
Full View / NID: 30552 / Submitted by: The Zilla of Zuron
|
|
Adobe Reader software is the global standard for electronic document sharing. It is the only PDF file viewer that can open and interact with all PDF documents. Use Adobe Reader to view, search, digitally sign, verify, print, and collaborate on Adobe PDF files.
|
|
|
Full View / NID: 30550 / Submitted by: TACKtech Team
|
|
Google Chrome is a browser that combines a minimal design with sophisticated technology to make the web faster, safer, and easier.
|
|
|
Full View / NID: 30549 / Submitted by: TACKtech Team
|
|
K-Lite Codec Pack is a collection of DirectShow filters, VFW/ACM codecs, and tools. Codecs and DirectShow filters are needed for encoding and decoding audio and video formats. The K-Lite Codec Pack is designed as a user-friendly solution for playing all your audio and movie files. With the K-Lite Codec Pack you should be able to play all the popular audio and video formats and even several less common formats.
|
|
|
Full View / NID: 30548 / Submitted by: TACKtech Team
|
|
K-Lite Codec Pack is a collection of DirectShow filters, VFW/ACM codecs, and tools. Codecs and DirectShow filters are needed for encoding and decoding audio and video formats. The K-Lite Codec Pack is designed as a user-friendly solution for playing all your audio and movie files. With the K-Lite Codec Pack you should be able to play all the popular audio and video formats and even several less common formats.
|
|
|
Full View / NID: 30547 / Submitted by: TACKtech Team
|
|
SCOTTS VALLEY, Calif. - October 13, 2009 - Adding to its suite of scalable storage solutions for small business, Seagate (NASDAQ: STX) today announced availability of the BlackArmor ® NAS 110 network storage server. This new offering is the first of the Seagate BlackArmor NAS family to include additional capabilities¹ designed to meet the specific needs of small/home offices and prosumers who crave the latest NAS technology. Available immediately through Seagate.com and leading retailers and e-tailers such as Best Buy, Staples, Amazon.com and Newegg, the BlackArmor NAS 110 server can be purchased for a manufacturer’s suggested retail price (MSRP) of $229.99 for 1TB and $349.99 for 2TB.
|
|
|
Full View / NID: 30542 / Submitted by: TACKtech Team
|
|
Santa Clara, California (October 13, 2009) — Roxio®, a division of Sonic Solutions® (NASDAQ: SNIC), today released Roxio Popcorn® 4, a Mac software application that allows consumers to quickly and easily transfer personal video entertainment from capture devices and DVDs for enjoyment on next-generation consumer electronic devices including game consoles, set-top boxes, and mobile devices.
|
|
|
Full View / NID: 30540 / Submitted by: TACKtech Team
|
|
NOD32 Antivirus System provides well balanced, state-of-the-art protection against threats endangering your PC and enterprise systems running various platforms from Microsoft Windows 95 / 98 / ME / NT / 2000 / 2003 / XP, through a number of UNIX/Linux, Novell, MS DOS operating systems to Microsoft Exchange Server, Lotus Domino and other mail servers.
|
|
|
Full View / NID: 30538 / Submitted by: The Zilla of Zuron
|