Jump to content

DJ Prem

Member
  • Posts

    33
  • Joined

  • Last visited

  • Donations

    0.00 USD 
  • Country

    United Kingdom

About DJ Prem

  • Birthday 11/06/1984

Contact Methods

  • Website URL
    http://www.danilpremgi.com

DJ Prem's Achievements

0

Reputation

  1. I've used the guide in Vista and worked flawlessly trying it Windows 7 and I'm getting error during install.
  2. Microsoft Security Bulletin MS05-053 Vulnerabilities in Graphics Rendering Engine Could Allow Code Execution (896424) Published: November 8, 2005 Version: 1.0 Summary Who should read this document: Customers who use Microsoft Windows Impact of Vulnerability: Remote Code Execution Maximum Severity Rating: Critical Recommendation: Customers should apply the update immediately. Security Update Replacement: This bulletin replaces several prior security updates. See the frequently asked questions (FAQ) section of this bulletin for the complete list. Caveats: None Tested Software and Security Update Download Locations: Affected Software: • Microsoft Windows 2000 Service Pack 4 • Microsoft Windows XP Service Pack 1 and Microsoft Windows XP Service Pack 2 • Microsoft Windows XP Professional x64 Edition • Microsoft Windows Server 2003 and Microsoft Windows Server 2003 Service Pack 1 • Microsoft Windows Server 2003 for Itanium-based Systems and Microsoft Windows Server 2003 with SP1 for Itanium-based Systems • Microsoft Windows Server 2003 x64 Edition Non-Affected Software: • Microsoft Windows 98, Microsoft Windows 98 Second Edition (SE), and Microsoft Windows Millennium Edition (ME) The software in this list has been tested to determine whether the versions are affected. Other versions either no longer include security update support or may not be affected. To determine the support life cycle for your product and version, visit the Microsoft Support Lifecycle Web site. Executive Summary: This update resolves several newly-discovered, privately reported and public vulnerabilities. Each vulnerability is documented in this bulletin in its own "Vulnerability Details" section of this bulletin. An attacker who successfully exploited the most severe of these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. We recommend that customers apply the update immediately. http://www.microsoft.com/technet/security/...n/MS05-053.mspx
  3. KB896727 agreed KB887472 dont show on my WU please inform me how you got WGA.exe & WUv6.exe as I dunno how to make those work. I dont have OEM or MSDN but I do have a passport if you have the link to the site I would really be grateful
  4. Thanks upon comparison i was only missing 900930 I'm all cool... You seem to have 896727 missing and 887472 is useless unless you have Windows Messenger 5 or MSN Messenger 6.1 or 6.2. Also what is WGA.exe & WUv6? EDIT: Any idea where I can get a trial for Microsoft Windows XP as Microsoft dont seem to have it
  5. Can someone be kind enough to please let me know fi I have all the the latest fixes and none old fixes that have been replaced my new fixes Three fixes I have removed KB890830 -› Microsoft® Windows® Malicious Software Removal Tool (v1.9) KB873374 -› Microsoft GDI+ Detection Tool KB885626 -› Your computer stops responding when you restart to complete the installation of Windows XP Service Pack 2 (CD already has SP2) Thanks in advance
  6. REVISED HOTFIXES: MS05-050: Bulletin updated to provide additional clarity around DirectX versions in the "Affected Software" section. Users running DirectX 9.0c on Windows XP SP2 should be advised that their configuration is also affected and should consider apply the security patch. MS05-052: Bulletin updated to revise the log file name, uninstall directory name, and install registry key name for the Internet Explorer Service Pack 1 security update.
  7. KB897663 Microsoft has received a report of an unexpected behavior in the way that the Windows Firewall User Interface handles malformed entries in the Windows Registry. By creating malformed Windows Firewall exception entries in the Windows Registry, an exception could be created in the firewall that would not be displayed in the Windows Firewall User Interface. However, this exception is displayed by the command line firewall administration tools. It is important to note that this is not a vulnerability. Administrative privileges are required to access the associated section of the Windows Registry that contains this configuration information. By using documented methods to manage and create Windows Firewall exceptions, it is unlikely that a malformed registry entry will be produced which would exhibit this behavior. It is more likely that an attacker who has already compromised the system would create such malformed registry entries with intent to confuse a user.
  8. JULY 2005 (Windows XP SP2) Vulnerability in JView Profiler Could Allow Remote Code Execution (903235): MS05-037 - Critical Vulnerability in Microsoft Color Management Module Could Allow Remote Code Execution (901214): MS05-036 - Critical
  9. MSN Messenger has been updated MSN Messenger
  10. Microsoft Windows 2000 Sp4 Rollup Update 1 Link: http://support.microsoft.com/kb/891861
  11. June Hotfixes. http://www.microsoft.com/technet/security/...n/ms05-jun.mspx Waiting for the list to be updated
×
×
  • Create New...