|
This update provides the Junk E-mail Filter in Microsoft Office Outlook 2003 with a more current definition of which e-mail messages should be considered junk e-mail.
|
|
|
Full View / NID: 11415 / Submitted by: TACKtech Team
|
|
The Microsoft Windows Malicious Software Removal Tool checks Windows XP, Windows 2000, and Windows Server 2003 computers for and helps remove infections by specific, prevalent malicious software—including Blaster, Sasser, and Mydoom. When the detection and removal process is complete, the tool displays a report describing the outcome, including which, if any, malicious software was detected and removed. The tool creates a log file named mrt.log in the %WINDIR%\debug folder.
|
|
|
Full View / NID: 11414 / Submitted by: TACKtech Team
|
|
Spy Sweeper protects you with a sophisticated database of spyware definitions, the power to disable spyware, and the knowledge you need to analyze your risks. Disable and store spyware in a safe place on your system until you decide whether or not to remove them permanently. This unique approach lets you manage spyware without harming other programs on your computer.
|
|
|
Full View / NID: 11412 / Submitted by: TACKtech Team
|
|
Exclusive online programming combines interactivity, fantasy baseball and reality TV to deliver a grand slam entertainment experience.
|
|
|
Full View / NID: 11403 / Submitted by: The Spirit of Zuron
|
|
New software-as-a-service offering will further extend the power of choice for CRM customers and partners.
|
|
|
Full View / NID: 11402 / Submitted by: The Spirit of Zuron
|
|
Second version of award-winning SBS 2003 expands partner revenue opportunities, provides new value for customers.
|
|
|
Full View / NID: 11401 / Submitted by: The Spirit of Zuron
|
|
With an unprecedented wave of innovation on the horizon, Microsoft prepares its channel of industry partners to empower customers with People-Ready solutions and services.
|
|
|
Full View / NID: 11400 / Submitted by: The Spirit of Zuron
|
|
Nearly 1,000 companies plan to deliver software applications and solutions for Windows Vista; Microsoft unveils programs to help partners realize huge opportunities around Windows Vista.
|
|
|
Full View / NID: 11399 / Submitted by: The Spirit of Zuron
|
|
This update resolves two newly discovered, privately reported vulnerabilities. On vulnerable versions of Office, if a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of the client workstation. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
|
|
|
Full View / NID: 11369 / Submitted by: TACKtech Team
|
|
This update resolves several newly discovered, privately reported and public vulnerabilities. When using vulnerable versions of Office, if a user were logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of the client workstation. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
|
|
|
Full View / NID: 11368 / Submitted by: TACKtech Team
|
|
This update resolves several newly discovered, privately reported and public vulnerabilities. When using vulnerable versions of Office, if a user were logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of the client workstation. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
|
|
|
Full View / NID: 11367 / Submitted by: TACKtech Team
|
|
Buffer Overrun in DHCP Client Service Vulnerability - CVE-2006-2372: There is a remote code execution vulnerability in the DHCP Client service that could allow an attacker who successfully exploited this vulnerability to take complete control of the affected system.
|
|
|
Full View / NID: 11366 / Submitted by: TACKtech Team
|
|
Mailslot Heap Overflow Vulnerability - CVE-2006-1314: There is a remote code execution vulnerability in the Server driver that could allow an attacker who successfully exploited this vulnerability to take complete control of the affected system.
|
|
|
Full View / NID: 11335 / Submitted by: TACKtech Team
|
|
Internet Information Services Using Malformed Active Server Pages Vulnerability - CVE-2006-0026: There is a remote code execution vulnerability in Internet Information Services (IIS). An attacker could exploit the vulnerability by constructing a specially crafted Active Server Pages (ASP) file, potentially allowing remote code execution if the Internet Information Services (IIS) processes the specially crafted file. An attacker who successfully exploited this vulnerability could take complete control of an affected system.
|
|
|
Full View / NID: 11334 / Submitted by: TACKtech Team
|
|
.NET 2.0 Application Folder Information Disclosure Vulnerability - CVE-2006-1300: This Information Disclosure vulnerability could allow an attacker to bypass ASP.Net security and gain unauthorized access to objects in the Application folders explicitly by name. Note that this vulnerability would not allow an attacker to execute code or to elevate their user rights directly, but it could be used to produce useful information that could be used to try to further compromise the affected system.
|
|
|
Full View / NID: 11332 / Submitted by: TACKtech Team
|
|
Virus definition, or DAT, files contain up-to-date virus signatures and other information that our anti-virus products use to protect your computer against thousands of computer viruses and other potentially harmful software in circulation. Hundreds of new threats appear each month. Every week, we release new DAT files. We also release new DAT files when any threat is assessed by AVERT to have a medium or higher risk.
|
|
|
Full View / NID: 11331 / Submitted by: The Spirit of Zuron
|
|
WASHINGTON, DC, Jul 11, 2006 -- Symantec Vision Government 2006 -- Symantec Corp. (NASDAQ: SYMC) executive vice president and chief technology officer, Dr. Ajei Gopal, will today open the company's annual public sector user conference, Symantec Vision Government 2006, by highlighting the company's strategy to provide the comprehensive protection necessary for today's government enterprises tasked with keeping digital infrastructures up and running without sacrificing access to critical information. Gopal's keynote remarks, titled "The Future of Comprehensive Protection," will take place at 8:30 a.m. ET in the Ronald Reagan Building and International Trade Center in Washington, D.C.
|
|
|
Full View / NID: 11329 / Submitted by: TACKtech Team
|
|
AKVIS Coloriage adds color to black and white photos with the same ease with which a child paints images in a coloring book ("coloriage" means a coloring book in French). The colorizing technique is easy: you take the Pencil tool, select a color and draw a rough outline within the area to be colorized; the program recognizes the borders of the area and paints in the new color keeping the tone transitions. No layers manipulation, no manual painting! The list of the tool's uses is practically endless. Home users can apply it to colorize old B&W photos from the family archives, for example, to make a present to the grandma by adding color to her early days' photos. Professional designers can use AKVIS Coloriage to try different color schemes for interior and exterior design, as the program allows changing the color of objects with a mouse click. Anime and manga enthusiasts can apply the program to add color to hand sketch drawings and comics. The software does not only colorize B&W photos, the available Keep-Color tool makes it possible to replace colors only in defined areas of the picture. Thus, you can recolor clothes on your color photo or change the color of the hair, eyes, etc on a portrait. Selective desaturation and selective colorization of a color photo is made easy.
|
|
|
Full View / NID: 11327 / Submitted by: TACKtech Team
|
|
CUPERTINO, Calif. -- July 11, 2006 -- Symantec Corp. (NASDAQ: SYMC) will webcast its quarterly earnings conference call on Wednesday, July 26, 2006, at 5 p.m. ET/2 p.m. PT to discuss the results of its fiscal first quarter 2007, ended June 30, 2006.
|
|
|
Full View / NID: 11318 / Submitted by: TACKtech Team
|
|
SANTA CLARA, CA AND SUNNYVALE, CA -- July 11, 2006 --AMD (NYSE: AMD) and NVIDIA Corporation (Nasdaq: NVDA), a worldwide leader in programmable graphics processor technologies, today announced the results of an independent study testing the stability and performance of NVIDIA Business Platform systems based on the AMD Commercial Stable Image Platform (AMD CSIP) program versus comparable systems based on the Intel commercial PC Stable Image Platform Program. The results, reported by respected third-party testing firm VeriTest™, the testing service of Lionbridge (NASDAQ: LIOX), concluded that NVIDIA Business Platform systems are “as stable, if not more stable,” than competitive solutions.
|
|
|
Full View / NID: 11317 / Submitted by: TACKtech Team
|
|
The Official Pattern Release or OPR is Trend Micro's latest compilation of patterns for identified viruses. It is guaranteed to have passed a series of critical tests to ensure that customers get optimum protection from the latest virus threats.
|
|
|
Full View / NID: 11314 / Submitted by: The Spirit of Zuron
|
|
At the recent London Internet Exchange (LINX) AGM, the 200 strong membership agreed operational principles for spam management teams to share information while ensuring that customer privacy is not infringed.
|
|
|
Full View / NID: 11889 / Submitted by: RealWire Limited
|
|
Stoke Poges, London — July 10, 2006 — Hitachi Data Systems, provider of Application Optimized Storage™ solutions and a wholly owned subsidiary of Hitachi, Ltd. (NYSE: HIT), today introduced Virtual Tape Library (VTL) by Hitachi Data Systems. Virtual Tape Library by Hitachi Data Systems is a new approach to optimised data back-up and protection made available through a global re-seller agreement with Diligent™ Technologies. As part of Hitachi’s Application Optimized Storage solutions approach - which matches specific application requirements with storage attributes - the new solution comprises scalable enterprise-class offerings that emulate tape libraries, enabling existing backup applications to use disk, rather than tape, as their backup medium.
|
|
|
Full View / NID: 11888 / Submitted by: RealWire Limited
|
|
London, July 10th, 2006: Imagination Technologies - a leader in System on Chip Intellectual Property - reports that it has strengthened the business development operation of its technology division by separating the sales and marketing activities to give each the level of focus that the company’s growing business demands.
|
|
|
Full View / NID: 11887 / Submitted by: RealWire Limited
|
|
(Austin, Texas - July 10, 2006) -- Winternals Software® is pleased to announce that it has reached an agreement to settle the copyright infringement lawsuit it filed in April against Best Buy and its subsidiary, Geek Squad.
|
|
|
Full View / NID: 11508 / Submitted by: TACKtech Team
|
|
MagicISO can extract, edit, create and burn ISO/BIN/IMG files directly, and convert almost all CD/DVD image formats to ISO/BIN, Handle DVD image files up to 10GB, make bootable CDs, and make image files from CD/DVD-ROM. + New Features for v4.5(build 107) Supports opening, editing, extracting disk Image file (floppy disk image in 1.2M, 1.44M, 2.88M). Supports loading Multi-Bootable CD/DVD image files from "bootable option" dialog so that the user can install Multiple Operation System from one CD/DVD. Features more command parameters in command line utility (miso.exe) Improves CD/DVD image file processing engine (optimize for speed and space). Fixed some minor error.
|
|
|
Full View / NID: 11477 / Submitted by: TACKtech Team
|
|
Open Technology Group, Inc. announced training supporting the use of the plPHP procedural language.
|
|
|
Full View / NID: 11420 / Submitted by: The Spirit of Zuron
|
|
New licensing and enhancement plan adds simplicity and value, and delivers on the Microsoft Dynamics road map, providing a compelling and consistent way for partners to sell and customers to acquire solutions for the “People-Ready Business.”
|
|
|
Full View / NID: 11404 / Submitted by: The Spirit of Zuron
|
|
Microsoft Dynamics AX general manager Mark A. Jensen discusses new vertical acceleration tools for partners, including new Industry Builder Initiative solutions.
|
|
|
Full View / NID: 11370 / Submitted by: The Spirit of Zuron
|
|
SCOTTS VALLEY, Calif.—10 July 2006— Seagate Technology (NYSE:STX) today introduced a new network storage solution that lets users access, share and protect all their digital content from a centralized location on a small office or home network. The Maxtor Shared Storage(tm) II product family from Seagate easily and automatically backs up business files, accounting records, videos, photos, music and other digital files stored on multiple networked computers every day without the hassle of swapping out tapes, CDs or DVDs. It provides nearly effortless data management and security for up to 20 PC or Mac users, which allows small business owners or "family technology officers" to free themselves of the mundane, yet critical task of ensuring that every computer's precious data is backed up.
|
|
|
Full View / NID: 11311 / Submitted by: Sarrgon
|