|
Use Ad-Aware’s built-in update feature to enable it to recognize the latest spyware. Alternatively, you can manually download the latest definitions and unzip them into the Ad-Aware program folder.
|
|
|
Full View / NID: 35256 / Submitted by: The Zilla of Zuron
|
|
Adding 6450 new threats.
|
|
|
Full View / NID: 35248 / Submitted by: The Zilla of Zuron
|
|
Messenger Plus! Live is an add-on for Windows Live Messenger which adds lots of features and extras that make your instant messenger easier, more useful or just tons more entertaining.
|
|
|
Full View / NID: 39460 / Submitted by: TACKtech Team
|
|
Most of the features present in other BitTorrent clients are present in µTorrent, including bandwidth prioritization, scheduling, RSS auto-downloading and Mainline DHT (compatible with BitComet). Additionally, µTorrent supports the Protocol Encryption joint specification (compatible with Azureus 2.4.0.0 and above, BitComet 0.63 and above) and peer exchange.
|
|
|
Full View / NID: 35710 / Submitted by: TACKtech Team
|
|
The most full-featured Internet power tool on the market, Opera includes pop-up blocking, tabbed browsing, integrated searches, and advanced functions like Opera's groundbreaking E-mail program, RSS Newsfeeds and IRC chat. And because we know that our users have different needs, you can customize the look and content of your Opera browser with a few clicks of the mouse.
|
|
|
Full View / NID: 35266 / Submitted by: TACKtech Team
|
|
ObjectDock is a program that allows you to have a nice animated launchbar/taskbar on your screen that reacts to your mouse when you mouse over it. In short, it's a task bar and program launcher that does it with style.
|
|
|
Full View / NID: 35255 / Submitted by: TACKtech Team
|
|
Java allows you to play online games, chat with people around the world, calculate your mortgage interest, and view images in 3D. These applications, written in the Java programming language and access from your browse, are called "applets". Corporations also use Java applets for intranet applications and other e-business solutions.
|
|
|
Full View / NID: 35254 / Submitted by: TACKtech Team
|
|
Notepad++ is a free source code editor (and Notepad replacement), which supports several programming languages, running under the MS Windows environment. This project, based on the Scintilla edit component (a very powerful editor component), written in C++ with pure win32 api and STL (that ensures the higher execution speed and smaller size of the program), is under the GPL License.
|
|
|
Full View / NID: 35253 / Submitted by: TACKtech Team
|
|
The Microsoft Windows Malicious Software Removal Tool checks Windows Vista, Windows 7, Windows XP, Windows 2000, and Windows Server 2003 computers for and helps remove infections by specific, prevalent malicious software—including Blaster, Sasser, and Mydoom. When the detection and removal process is complete, the tool displays a report describing the outcome, including which, if any, malicious software was detected and removed.
|
|
|
Full View / NID: 35252 / Submitted by: TACKtech Team
|
|
Bulletin Severity Rating:Critical - This security update resolves seven privately reported vulnerabilities and three publicly disclosed vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
|
|
|
Full View / NID: 35247 / Submitted by: The Zilla of Zuron
|
|
Bulletin Severity Rating:Important - This security update resolves one publicly disclosed vulnerability and one privately reported vulnerability in Microsoft SharePoint and Windows SharePoint Services. The vulnerabilities could allow information disclosure if an attacker submits specially crafted script to a target site using SafeHTML.
|
|
|
Full View / NID: 35246 / Submitted by: The Zilla of Zuron
|
|
Bulletin Severity Rating:Important - This security update resolves several publicly disclosed vulnerabilities in the Windows kernel-mode drivers. The most severe of these vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. The vulnerability could not be exploited remotely or by anonymous users.
|
|
|
Full View / NID: 35245 / Submitted by: The Zilla of Zuron
|
|
Bulletin Severity Rating:Moderate - This security update resolves a publicly disclosed vulnerability in the Microsoft Foundation Class (MFC) Library. The vulnerability could allow remote code execution if a user is logged on with administrative user rights and opens an application built with the MFC Library. An attacker who successfully exploited this vulnerability could obtain the same permissions as the currently logged-on user. If a user is logged on with administrative user rights, an attacker could take complete control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
|
|
|
Full View / NID: 35244 / Submitted by: The Zilla of Zuron
|
|
Bulletin Severity Rating:Critical - This security update resolves a privately reported vulnerability in the Microsoft Windows Media Player Network Sharing Service. The vulnerability could allow remote code execution if an attacker sent a specially crafted RTSP packet to an affected system. However, Internet access to home media is disabled by default. In this default configuration, the vulnerability can be exploited only by an attacker within the same subnet.
|
|
|
Full View / NID: 35243 / Submitted by: The Zilla of Zuron
|
|
Bulletin Severity Rating:Critical - This security update resolves a privately reported vulnerability in a Microsoft Windows component, the Embedded OpenType (EOT) Font Engine. The vulnerability could allow remote code execution. An attacker who successfully exploited this vulnerability could take complete control of an affected system remotely. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
|
|
|
Full View / NID: 35242 / Submitted by: The Zilla of Zuron
|
|
Bulletin Severity Rating:Critical - This security update resolves a privately reported vulnerability in Microsoft .NET Framework. The vulnerability could allow remote code execution on a client system if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs). Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerability could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and then executes the page, as could be the case in a Web hosting scenario.
|
|
|
Full View / NID: 35241 / Submitted by: The Zilla of Zuron
|
|
Bulletin Severity Rating:Important - This security update resolves two privately reported vulnerabilities in the Windows OpenType Font (OTF) format driver. This security update is rated Important for all supported editions of Windows XP and Windows Server 2003. All supported editions of Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2 are not affected by the vulnerability. For more information, see the subsection, Affected and Non-Affected Software, in this section.
|
|
|
Full View / NID: 35240 / Submitted by: The Zilla of Zuron
|
|
Bulletin Severity Rating:Important - This security update resolves eleven privately reported vulnerabilities in Microsoft Office. The vulnerabilities could allow remote code execution if a user opens a specially crafted Word file. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
|
|
|
Full View / NID: 35239 / Submitted by: The Zilla of Zuron
|
|
Bulletin Severity Rating:Important - This security update resolves thirteen privately reported vulnerabilities in Microsoft Office. The vulnerabilities could allow remote code execution if a user opens a specially crafted Excel file or a specially crafted Lotus 1-2-3 file. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
|
|
|
Full View / NID: 35238 / Submitted by: The Zilla of Zuron
|
|
Bulletin Severity Rating:Important - This security update resolves a privately reported vulnerability in the Windows common control library. The vulnerability could allow remote code execution if a user visited a specially crafted Web page. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
|
|
|
Full View / NID: 35237 / Submitted by: The Zilla of Zuron
|
|
Bulletin Severity Rating:Important - This security update resolves a privately reported vulnerability in Windows Media Player. The vulnerability could allow remote code execution if Windows Media Player opened specially crafted media content hosted on a malicious Web site. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
|
|
|
Full View / NID: 35236 / Submitted by: The Zilla of Zuron
|
|
Bulletin Severity Rating:Important - This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted file using WordPad or selects or opens a shortcut file that is on a network or WebDAV share. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
|
|
|
Full View / NID: 35235 / Submitted by: The Zilla of Zuron
|
|
Bulletin Severity Rating:Important - This security update resolves a privately reported vulnerability in Microsoft Windows. This security update is rated Important for all supported editions of Windows XP and Windows Server 2003. All supported editions of Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2 are not affected by the vulnerability. For more information, see the subsection, Affected and Non-Affected Software, in this section.
|
|
|
Full View / NID: 35234 / Submitted by: The Zilla of Zuron
|
|
Bulletin Severity Rating:Important - This security update resolves a privately reported vulnerability in the Secure Channel (SChannel) security package in Windows. The vulnerability could allow denial of service if an affected Internet Information Services (IIS) server hosting a Secure Sockets Layer (SSL)-enabled Web site received a specially crafted packet message. By default, IIS is not configured to host SSL Web sites.
|
|
|
Full View / NID: 35233 / Submitted by: The Zilla of Zuron
|
|
Bulletin Severity Rating:Moderate - This security update resolves a privately reported vulnerability in Windows shared cluster disks. The vulnerability could allow data tampering on the administrative shares of failover cluster disks. By default, Windows Server 2008 R2 servers are not affected by this vulnerability. This vulnerability only applies to cluster disks used in a failover cluster.
|
|
|
Full View / NID: 35232 / Submitted by: The Zilla of Zuron
|
|
The Official Pattern Release or OPR is Trend Micro's latest compilation of patterns for identified viruses. It is guaranteed to have passed a series of critical tests to ensure that customers get optimum protection from the latest virus threats.
|
|
|
Full View / NID: 35231 / Submitted by: The Zilla of Zuron
|
|
Virus definition, or DAT, files contain up-to-date virus signatures and other information that our anti-virus products use to protect your computer against thousands of computer viruses and other potentially harmful software in circulation. Hundreds of new threats appear each month. Every week, we release new DAT files. We also release new DAT files when any threat is assessed by AVERT to have a medium or higher risk.
|
|
|
Full View / NID: 35230 / Submitted by: The Zilla of Zuron
|
|
MOUNTAIN VIEW, Calif. – October 12, 2010 – Symantec Corp. (Nasdaq: SYMC) today announced new releases of Veritas Operations Manager and its Veritas Storage Foundation High Availability (S...
|
|
|
Full View / NID: 35229 / Submitted by: The Zilla of Zuron
|
|
MOUNTAIN VIEW, Calif. – October 12, 2010 – Symantec Corp. (Nasdaq: SYMC) today announced availability of the public beta of Norton 360 version 5.0, an award-winning premium all-in-one sec...
|
|
|
Full View / NID: 35228 / Submitted by: The Zilla of Zuron
|
|
Two new technologies are showcased at the eScience Workshop to fuel advancement of data-driven research in healthcare and environmental fields.
|
|
|
Full View / NID: 35227 / Submitted by: The Zilla of Zuron
|