|
This free software can analyze and benchmark many kinds of hardware, such as CPU performance, hard disk performance, video system information, mainboard information, and many more.
|
|
|
Full View / NID: 11903 / Submitted by: TACKtech Team
|
|
UK workers know the risks, but they can’t help clicking away A survey into the habits of 142 UK office workers conducted by Finjan, the global provider of best-of-breed proactive web security solutions, has uncovered that although they know the security risk to their employers caused by clicking on web-links or opening attachments from unknown sources, they simply can’t help themselves.
|
|
|
Full View / NID: 11896 / Submitted by: RealWire Limited
|
|
Right on the heels of EnterpriseDB's $20 million financing, EnterpriseDB announced today that Sun Microsystems, Inc. has selected EnterpriseDB to provide Sun with technical support and related professional services and training for Sun’s PostgreSQL offering.
|
|
|
Full View / NID: 11853 / Submitted by: The Spirit of Zuron
|
|
The Microsoft Windows Malicious Software Removal Tool checks Windows XP, Windows 2000, and Windows Server 2003 computers for and helps remove infections by specific, prevalent malicious software—including Blaster, Sasser, and Mydoom. When the detection and removal process is complete, the tool displays a report describing the outcome, including which, if any, malicious software was detected and removed. The tool creates a log file named mrt.log in the %WINDIR%\debug folder.
|
|
|
Full View / NID: 11852 / Submitted by: TACKtech Team
|
|
This update provides the Junk E-mail Filter in Microsoft Office Outlook 2003 with a more current definition of which e-mail messages should be considered junk e-mail. This update was released in August 2006.
|
|
|
Full View / NID: 11851 / Submitted by: TACKtech Team
|
|
User Profile Elevation of Privilege Vulnerability - CVE-2006-3443:
There is a privilege elevation vulnerability in the way that Windows 2000 starts applications. This vulnerability could allow a logged on user to take complete control of the system.
|
|
|
Full View / NID: 11850 / Submitted by: TACKtech Team
|
|
Hyperlink COM Object Buffer Overflow Vulnerability - CVE-2006-3086:
A remote code execution vulnerability exists in the Hyperlink Object Library. This problem exists because of an unchecked buffer in the code that is used for handling hyperlinks. An attacker could exploit the vulnerability by constructing a malicious hyperlink which could potentially lead to remote code execution if a user clicks a malicious link within an Office file or e-mail message. An attacker who successfully exploited this vulnerability could take complete control of the affected system. User interaction is required to exploit this vulnerability.
|
|
|
Full View / NID: 11849 / Submitted by: TACKtech Team
|
|
Windows 2000 Kernel Elevation of Privilege Vulnerability - CVE-2006-3444:
There is a privilege elevation vulnerability in Windows 2000 caused by improper validation of system inputs. This vulnerability could allow a logged on user to take complete control of the system.
|
|
|
Full View / NID: 11848 / Submitted by: TACKtech Team
|
|
Microsoft PowerPoint Mso.dll Vulnerability - CVE-2006-3590:
A remote code execution vulnerability exists in PowerPoint and could be exploited when a file containing a malformed shape container is parsed by PowerPoint. Such a file might be included in an e-mail attachment or hosted on a malicious web site. An attacker could exploit the vulnerability by constructing a specially crafted PowerPoint file that could allow remote code execution.
|
|
|
Full View / NID: 11847 / Submitted by: TACKtech Team
|
|
Visual Basic for Applications Vulnerability - CVE-2006-3649:
A remote code execution vulnerability exists in the way that Visual Basic for Applications (VBA) checks the document properties that a host application passes to it when opening a document. This vulnerability could allow an attacker who successfully exploited the vulnerability to take complete control of the affected system.
|
|
|
Full View / NID: 11846 / Submitted by: TACKtech Team
|
|
NOD32 Antivirus System provides well balanced, state-of-the-art protection against threats endangering your PC and enterprise systems running various platforms from Microsoft Windows 95 / 98 / ME / NT / 2000 / 2003 / XP, through a number of UNIX/Linux, Novell, MS DOS operating systems to Microsoft Exchange Server, Lotus Domino and other mail servers.
|
|
|
Full View / NID: 11845 / Submitted by: The Spirit of Zuron
|
|
CUPERTINO, Calif. - Aug. 8, 2006 - Symantec Corp. (Nasdaq: SYMC) today announced that John W. Thompson, Symantec’s chairman and chief executive officer, will deliver keynote remarks at the Air Force Information Technology Conference (AFITC), Aug. 14-17 in Montgomery, Ala......
|
|
|
Full View / NID: 11844 / Submitted by: Sarrgon
|
|
Santa Clara, California (August 8, 2006) Sonic Solutions® (NASDAQ: SNIC) management provided updated financial guidance during its first quarter ended June 30, 2006 earnings conference call today.....
|
|
|
Full View / NID: 11843 / Submitted by: Sarrgon
|
|
Santa Clara, California (August 7, 2006) Sonic Solutions® (NASDAQ: SNIC), the leader in digital media software, today announced Roxio Venue, a comprehensive media application that lets consumers select....
|
|
|
Full View / NID: 11842 / Submitted by: Sarrgon
|
|
SCOTTS VALLEY, Calif.—08 August 2006— Seagate Technology (NYSE: STX) today announced that its Board of Directors has authorized the company to repurchase up to $2.5 billion of its outstanding shares of common stock over the next 24 months....
|
|
|
Full View / NID: 11841 / Submitted by: Sarrgon
|
|
Buffer Overrun in HTML Help Vulnerability - CVE-2006-3357:
A vulnerability exists in the HTML Help ActiveX control that could allow remote code execution on an affected system. An attacker could exploit the vulnerability by constructing a malicious Web page that could potentially allow remote code execution if a user visited that page. An attacker who successfully exploited this vulnerability could take complete control of an affected system.
|
|
|
Full View / NID: 11840 / Submitted by: TACKtech Team
|
|
Folder GUID Code Execution Vulnerability - CVE-2006-3281:
A remote code execution vulnerability exists in Windows Explorer because of the way that Windows Explorer handles Drag and Drop events. An attacker could exploit the vulnerability by constructing a malicious Web page that could potentially allow an attacker to save a file on the user’s system if a user visited a malicious Web site or viewed a malicious e-mail message. An attacker who successfully exploited this vulnerability could take complete control of an affected system. User interaction is required to exploit this vulnerability.
|
|
|
Full View / NID: 11839 / Submitted by: TACKtech Team
|
|
MMC Redirect Cross-Site Scripting Vulnerability - CVE-2006-3643:
There is a remote code execution vulnerability in Windows Management Console that could allow an attacker who successfully exploited this vulnerability to take complete control of the affected system.
|
|
|
Full View / NID: 11838 / Submitted by: TACKtech Team
|
|
MHTML Parsing Vulnerability - CVE-2006-2766:
There is a remote code execution vulnerability in Windows that results from incorrect parsing of the MHTML protocol. An attacker could exploit the vulnerability by constructing a specially crafted Web page or HTML e-mail that could potentially lead to remote code execution if a user visited a specially crafted Web site or clicked a link in a specially crafted e-mail message.
|
|
|
Full View / NID: 11837 / Submitted by: TACKtech Team
|
|
This update resolves several newly discovered, publicly and privately reported vulnerabilities. If a user is logged on with administrative user rights, an attacker who successfully exploited the most severe of these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
|
|
|
Full View / NID: 11836 / Submitted by: TACKtech Team
|
|
Winsock Hostname Vulnerability - CVE-2006-3440:
There is a remote code execution vulnerability in Winsock that could allow an attacker who successfully exploited this vulnerability to take complete control of the affected system. For an attack to be successful the attacker would have to force the user to open a file or visit a website that is specially crafted to call the affected Winsock API.
|
|
|
Full View / NID: 11835 / Submitted by: TACKtech Team
|
|
Buffer Overrun in Server Service Vulnerability - CVE-2006-3439:
There is a remote code execution vulnerability in Server Service that could allow an attacker who successfully exploited this vulnerability to take complete control of the affected system.
|
|
|
Full View / NID: 11834 / Submitted by: TACKtech Team
|
|
Virus definition, or DAT, files contain up-to-date virus signatures and other information that our anti-virus products use to protect your computer against thousands of computer viruses and other potentially harmful software in circulation. Hundreds of new threats appear each month. Every week, we release new DAT files. We also release new DAT files when any threat is assessed by AVERT to have a medium or higher risk.
|
|
|
Full View / NID: 11833 / Submitted by: The Spirit of Zuron
|
|
NOD32 Antivirus System provides well balanced, state-of-the-art protection against threats endangering your PC and enterprise systems running various platforms from Microsoft Windows 95 / 98 / ME / NT / 2000 / 2003 / XP, through a number of UNIX/Linux, Novell, MS DOS operating systems to Microsoft Exchange Server, Lotus Domino and other mail servers.
|
|
|
Full View / NID: 11832 / Submitted by: The Spirit of Zuron
|
|
Added detection of new variant of Worm/Opanki, new variant of trojan Downloader.Obfuskated.
|
|
|
Full View / NID: 11831 / Submitted by: The Spirit of Zuron
|
|
Endcap program unites device manufacturers such as Uniden and Plantronics.
|
|
|
Full View / NID: 11830 / Submitted by: The Spirit of Zuron
|
|
Microsoft announces Office Communications Server with speech platform services; demonstrates Speech Recognition for Windows Vista.
|
|
|
Full View / NID: 11829 / Submitted by: The Spirit of Zuron
|
|
New GetHuman project initiative is intended to set the standard for customer service phone support.
|
|
|
Full View / NID: 11828 / Submitted by: The Spirit of Zuron
|
|
The Official Pattern Release or OPR is Trend Micro's latest compilation of patterns for identified viruses. It is guaranteed to have passed a series of critical tests to ensure that customers get optimum protection from the latest virus threats.
|
|
|
Full View / NID: 11825 / Submitted by: The Spirit of Zuron
|
|
SAN FRANCISCO and PALO ALTO, Calif., August 7, 2006 — VMware, Inc., the global leader in software for industry-standard virtualized desktops and servers, today announced a new product that will enable Intel-based Macs to run x86 operating systems, such as Windows, Linux, NetWare and Solaris, in virtual machines at the same time as Mac OS X. VMware will demo the product today during the Apple Worldwide Developers Conference 2006 in San Francisco.
|
|
|
Full View / NID: 11950 / Submitted by: The Spirit of Zuron
|