Posted by
Unknown
|
Comments:
Posted in
PC Security
,
Troubleshooting
If you use Microsoft's free and excellent anti-virus and anti-spyware product "Microsoft Security Essentials (MSE)", you might already know that it updates its virus definition files using Windows Automatic Update.
If you have disabled Windows Automatic Update, MSE will not update the virus definitions. Then what to do in this case?
Don't worry! In this topic, we'll tell you how to update MSE virus definitions using a built-in MSE command? You don't need Automatic Update enabled to use this command.
=> Simply provide following command in Command Prompt or Startmenu Search box or Run dialog box:
"%programfiles%\Microsoft Security Essentials\MpCmdRun.exe" SignatureUpdate
It'll open a Command Prompt window which will show you a message "Signature update started...". It might take a few minutes depending upon the size of virus definition files.

You can also create a shortcut for the command and place it on Desktop or Quick launch toolbar or pin it to Windows 7 Taskbar. You can even schedule a task for the above mentioned command using Windows Task Scheduler.
Posted by
Unknown
|
Comments:
Posted in
PC Security
,
Softwares
,
Windows 7
,
Windows Vista
,
Windows XP
Windows Intune simplifies how businesses manage and secure PCs using Windows cloud services and Windows 7—so your computers and users can operate at peak performance, from virtually anywhere.
Windows Intune is a comprehensive solution that includes PC management, malware protection, Windows upgrades, and more.
Use the Windows Intune cloud service beta to:
* Manage updates
* Protect PCs from malware
* Proactively monitor PCs
* Provide remote assistance
* Track hardware & software inventory
* Set security policies
The Windows Intune client software
is supported on both 32-bit and 64-bit versions of:
* Windows 7 Enterprise, Ultimate and Professional
* Windows Vista Enterprise, Ultimate, and Business
* Windows XP Professional Service Pack (SP) 2 or SP 3 (recommended)
Posted by
Unknown
|
Comments:
Posted in
PC Security
,
Windows 7
,
Windows Vista
,
Windows XP
Windows Shortcut Exploit, also known as CPLINK, is a zero-day vulnerability in all versions of Windows that allows a Windows shortcut link, known as an .lnk file, to run a malicious DLL file. The dangerous shortcut links can also be embedded on a website or hidden within documents.
The exploit works when you open a device, network share or WebDav point carrying an infection—you don't need to click on anything for the exploit to work, even if you have AutoPlay and AutoRun disabled.
There was no patch from Microsoft to fix this exploit but now Microsoft has released an out-of-band security update to address this exploit.
According to Microsoft Security Bulletin, this security update resolves the vulnerability in Windows Shell. The vulnerability could allow remote code execution if the icon of a specially crafted shortcut is displayed. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
For users using automatic updates
, this update will automatically be applied once it is released. Users not using automatic updates should download, test and deploy this update as quickly as possible.
Download Links:
Windows Shortcut Exploit, also known as CPLINK, is a zero-day vulnerability in all versions of Windows
that allows a Windows shortcut link, known as an .lnk file, to run a malicious DLL file. The dangerous shortcut links can also be embedded on a website or hidden within documents.
The exploit works when you open a device, network share or WebDav point carrying an infection—you don't need to click on anything for the exploit to work, even if you have AutoPlay and AutoRun disabled.
Currently, there is no patch from Microsoft to fix this exploit; however, a free Windows Shortcut Exploit Protection Tool from Sophos will block this exploit from running on your computer.
The Windows Shortcut Exploit affects all Microsoft-supported versions of Windows—anything newer than Windows XP
SP3—as well as older versions.
Download Free Protection Tool
Homepage