20141010. Microsoft notified in advance of the security patch on April 9, October, and 20141010.
As part of Microsoft's monthly patch release, Microsoft will provide users with patch-related information one week before the patch release, including the number of patches, affected software, and severity levels. This notification aims to help users arrange patch deployment plans better.
Microsoft plans to release nine security bulletins in October 15, 2014, which are described below:
AnnouncementID |
Highest Severity Level |
Vulnerability impact |
Restart requirements |
Affected Software |
Patch1 |
Severe |
Remote Code Execution |
Need to restart |
Microsoft Windows, Internet Explorer |
Patch2 |
Severe |
Remote Code Execution |
May require restart |
Microsoft Windows, Microsoft. NET Framework |
Patch3 |
Severe |
Remote Code Execution |
Need to restart |
Microsoft Windows |
Patch4 |
Moderate |
Privilege Escalation |
May require restart |
Microsoft Windows, Microsoft Office |
Patch5 |
Important |
Remote Code Execution |
May require restart |
Microsoft Windows |
Patch6 |
Important |
Remote Code Execution |
May require restart |
Microsoft Office, Microsoft Office Services, Microsoft Office Web Apps |
Patch7 |
Important |
Privilege Escalation |
Need to restart |
Microsoft Windows |
Patch8 |
Important |
Privilege Escalation |
Need to restart |
Microsoft Windows |
Patch9 |
Important |
Bypass security features |
May require restart |
Microsoft Developer Tools |
Before the patch is released, we do not rule out the possibility of changing the above information.
Advance notice webpage:Detailed security bulletins summary can be found on this page details: https://technet.microsoft.com/zh-cn/library/security/ms14-oct (English)
Microsoft WindowsMalware deletion tool:Microsoft will release an updated version of the Microsoft Windows malware deletion tool on Windows Update, Microsoft Update, Windows Server Update Services, and the download center.
Microsoft Global Technical Support Center Security Technology Department
Microsoft was about to take revenge in October 20. When I verified the genuine version, I had to load the activeX plug-in. Is there a problem?
Turn off the "Automatic update" of the system, so Microsoft will not be confused.
The setting is also simple: Right-click my computer and choose "properties"> "Auto Update"> "Disable auto update.
After "auto update is disabled", if the "security alarm" icon in the lower-right corner of the desktop is still inconspicuous, click the icon with the left button to open the security center, click "change security center notification method" and remove the check box before "automatic update.
Some may be worried that Microsoft's patch will be missed after "automatic update" is disabled, and no trojans or viruses can be used to access the Internet in the future? This is troublesome. What is the dilemma? Is it hacked or hacked by Microsoft?
This is easy to handle. In the future, we can use 360 security guard to install patches. 360 will regularly recommend the patches that are really useful. It will not recommend patches that are very large and useless for those files, or even have some negative impacts. So you don't have to worry that 360 will bring back the "black screen" patch. In the past, there was a very brainless saying: "The more systems the patch is, the more secure it is ". Microsoft's "black screen plan" tells us that the patch is not a banknote, and the more it is, the better it will be. Otherwise, the black screen of such a genuine verification patch is enough to crash together with your computer.