Discover microsoft software security, include the articles, news, trends, analysis and practical advice about microsoft software security on alibabacloud.com
Beijing time September 18 Morning News, Microsoft China Co., Ltd. announced today that Windows PC users who have been authenticated by genuine certification will be able to download and install the Microsoft Security Essentials (MSE) Chinese beta antivirus software free of charge from Microsoft's official website. The
of using Registry Editor is your own responsibility. Open Registry Editor. Access the following registry location:
[Hkey_local_machine\system\currentcontrolset\control\securityproviders\schannel\keyexchangealgorithms\ Diffie-hellman]
Update the following DWORD value to:
"Serverminkeybitlength" =dword:00000800
other recommended measuresProtect your PC
We still encourage our customers to follow the "Protect your computer" guide to enable firewalls, get soft
Generally, if Microsoft publishes a security notice, it will notify the subscriber of the reminder service by email. However, it has been found that many malicious people use spoofed methods to forge Microsoft's Security Bulletin emails. Some emails also trick the recipient into connecting to some websites to download malicious programs, or the emails themselves
As part of Microsoft's monthly patch release, Microsoft will provide users with patch-related information one week before the patch release, including the number of patches, affected software, and severity levels. This notification aims to help users arrange patch deployment plans better.
Microsoft plans to release six secur
Microsoft's China official has announced cooperation with 360 companies to provide security protection services to Chinese XP users, as well as WINDOWS8 upgrade programs. This January, Microsoft announced that XP would stop service on April 8, 2014. According to third party data, at least 200 million users in China still use XP.
As early as February 26 this year, 360 announced that it will continue
Several security companies have issued a warning that a fake Microsoft Security upgrade email is displayed on the Internet. Users can automatically download and run malicious code after opening the website to which the email points.According to foreign media reports, the title of the spam is "Microsoft
effort to promote their online application software model last year, and claimed that traditional desktop applications are outdated, my online software has a high download rate. Why did I return to the desktop again this year? What does this phenomenon mean?
As we all know, with the popularity of cloud computing in the web era (even the founder of Google thinks that cloud computing is only in its infancy)
The software released the Security Bulletin on July 15, July 2014 on time. It mainly Fixed Multiple Security Vulnerabilities (up to 29 in total) in IE browser and Windows Components ). Including remote code execution, Elevation of Privilege, and denial of service. Server Security dogs have also pushed these patches. To
??As part of Microsoft's monthly patch release, Microsoft will provide users with information about patches, including the number of patches, affected software, and severity levels, one week before the patch is released. The purpose of this notification is to be able to better assist users in scheduling patch deployment plans.Microsoft plans to release 7 security
the answers to the questionnaire, determine which security tests are required for the software.
The final security check requires at least 80% of employees to have an opportunity to learn security knowledge once a year and record it. Microsoft provides many online resources
Every year, Microsoft Security Response Center investigates thousands of Security reports. In some cases, once one of the reports finds that a security vulnerability is caused by a product defect, microsoft will develop patches as soon as possible to fix errors (see
On June 23, April 28, Microsoft urgently released a patch to fix a serious security vulnerability in Hotmail. This security vulnerability allows a hacker to reset the password of a Hotmail account so that the owner cannot log on and allow the attacker to access the user's inbox.
Microsoft released this patch because s
Microsoft
Bill Gates has played another card.
There is no software in the computer, each software is on the Internet, consumers can access the Internet to arbitrary demand for their own software, which is the future of the Internet world, the application of the law is Microsoft
cards. You can also package the virus files in a compressed package of a normal program. When a virus is copied to or extracted to the target location and you use some Resource Manager software to access these folders, the virus program will be executed immediately without any other operations.
If the virus is stored in USB memory, most computers that have enabled the USB flash drive's automatic operation function can insert a USB flash drive to run
The latest 0-day IE has affected Microsoft's entire system, and no patches are currently available. Microsoft recently released a security bulletin to guide you on how to temporarily block this vulnerability.The vulnerability lies in OLEDB32.dll. So our goal is to block this file. In this regard, Microsoft has made four kill:
1. SACL method (applicable only to Vi
IntroductionIn earlier versions of Microsoft®In Access (before Microsoft Access 2000), security-related knowledge is sometimes considered impossible for anyone to master and apply. You need to perform many steps in order. If you omit or reverse a step, it will have disastrous consequences. With Microsoft Access for
Introduction
The security of a database is defined as the protection of the database against data disclosure, alteration, or destruction caused by unlawful use. It is one of the main indexes of the database system whether the system safety protection measures are effective. The security of the database and the security of the computer system, including the opera
Brief introduction
In earlier versions of Microsoft®access (prior to Microsoft Access 2000), knowledge about security was sometimes considered impossible for anyone to master and apply. You need to perform a number of steps sequentially, which can have disastrous consequences if you omit a step or reverse the sequence. With the advent of the
While most it people know about virtual desktops and know they can be used in data centers, a useful use of this technique is often overlooked. Desktop virtualization is now very lightweight, and employees can connect remotely to the applications they need, while at the same time better secure their devices.
I recently talked to an Atlanta financial company who used the security technology of Ringcube Technologies company Virtual desktops and the Saf
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.