It’s vacation time! Protect your computer, server and other belongings while you are away!

If you are lucky or blessed enough to be able to take off from work and actually get out of town for a summer vacation over the Independence Day holiday this year, hopefully you will be doing a few things to protect your belongings while you are away.

Here are a few examples of things you can do in order to insure your “stuff” is just as you left it when you return:

  • Water – Oh yeah, that’s some nasty stuff…  I once left town to return to tens of thousands of dollars in damage to a home due to a tiny ice maker line developing a leak! Just think how much water could flow from the hot and cold water lines going to your washer. There are even devices that automatically cut off the water in the event of a broken line like that for the washer.
  • Locks – Using quality locks on your doors might keep someone who is not very dedicated to their “job” from breaking in.
  • Lights – Lights left on, or on timers could potentially cause a criminal to move on to the next home. Why take a chance that someone is there?
  • Alarm – Having a quality monitored alarm system is essential! You want glass break detection, as well as a WIRED solution if possible that monitors for door or window openings or breaches, motion (no, your cat won’t trigger them) and fire/heat and carbon monoxide detectors, coupled with loud and annoying sirens. Some of these systems allow you to check the status remotely, assign guest access codes and more.
  • Neighbors – Let a few of your neighbors know you are gone and who they can expect to be at your location. Give them your phone numbers so they can call you if they have any questions.
  • Police – You can alert the police that you are out of town, and ask for extra patrols.
  • Friends – You can ask a friend to stay over, or at the very least to stop in and check on your home just to make sure that the water line going to the fridge doesn’t pour water for days on end.
  • Backup – Consider taking a backup of your data offsite in the event of fire, theft or other disaster. An offsite, online backup solution like our Servosity offering may be best here!
  • Encryption – Encrypting your data could keep someone who steals your computer or server from being able to access important documents.
  • Safe deposit box or offsite storage – Moving expensive items to an offsite location where people are actually watching it could be a good alternative to leaving it unattended.
  • Insurance – This is self-explanatory.

Sure, there’s a lot you can do, and the more you do, the better! One thing we have done is to install a security camera system that monitors our home and businesses from all angles.

At first you might think that a video surveillance system sounds like something you want at your secret underground lair, however, without exception, everyone who installs such a system feels instantly more secure. You grow to rely on it, and often use it to set your mind at ease. Are the kids home yet? A glance or “listen” lets you know.

A basic video camera system may include:

  • Four or more cameras to view your residence from different angles.
  • Instant email complete with a snapshot of the action that triggered it when someone or something enters a secured zone (we love being notified when UPS drops off a package, when the kids get home, etc)
  • Remote viewing of the cameras using a computer, iPad, iPhone, Android phone or Android tablet or just about any smartphone.
  • Ability to listen in to the audio for any camera feed.
  • Night vision – to help with low light situations.
  • Recording, either all the time, or during motion, heat or light events. Searchable for various tags such as “motion”.

More sophisticated systems might consist of:

  • Interior as well as exterior cameras.
  • TWO-WAY audio (you can speak to people using your smartphone, computer, tablet, as well as hear them).
  • Megapixel resolution for stunning quality.
  • Optical AND digital zoom, controllable from anywhere.
  • Pan, tilt and zoom (PTZ lets you move the camera from remote)
  • Tracking of moving objects.
  • Logging of license plates.
  • Facial recognition.
  • Alert to missing items (It might email your TV vanished from the monitored area).
Those are just a few of the features available at very reasonable rates!

Front of House Security Camera during Lightning Strike

 

In the example above, you will see an emailed attachment from one of our cameras as it captured a nearby lightning strike without so much as being blinded from the flash.

No doubt you are now thinking you want your own security cameras! If that is the case, please use the CONTACT link in the site navigation bar or call us at 864.990.4748!

We provide sales, consultation and installation of many brands of surveillance cameras such as AXIS, Panasonic, Cisco, D-Link, TRENDnet, Sony, Speco, Honeywell, Keebox, Intellinet, JVC, Tamron, Toshiba, HAI, Q-see, TP-Link, LinkSys, LevelOne, Foscam, Logitech, ZModo and MANY others.

Additionally, we offer professional systems for your business, school, motel, bus or just about any application you can imagine.

Stay safe!

We’re saying goodbye to an old friend here at Homeland Secure IT

Okay, he’s not that old, he’s my age, and it is not goodbye forever, but none-the-less, our ace desktop technician, Scott Chitwood, has accepted a position with the Charles Lea Center up in Spartanburg.

He’s not taking the new job for the pay, which I could counter if that were the case, he is taking it because it is located in Spartanburg, just a few minutes from his home, saving him nearly 2 hours per day in drive time, wear and tear on his vehicle and letting him spend more time with his family and get to Wednesday night church services in time. Nope, there’s no way to counter that!

I’ve had the pleasure of working with Scott for the last 7 years, and it pains me to let him go! He’s honest to a fault, humble, hardworking and easy going, in addition to being excellent at what he does. Charles Lea is getting an asset they better appreciate.

As far as what we will do here at Homeland Secure IT without Scott, we searched high and low and found an excellent replacement. The fella is a trained and experienced computer service technician, a self-professed geek like myself, an amateur radio operator (hey, that’s pretty cool, right? So am I!) and an all-around nice guy. He also has high security clearances since he worked at the Duke Energy Nuclear facility, and GE prior to that.

Thing is, he has some big shoes to fill! Scott is leaving a legacy behind that everyone that comes after him will have to live up to. Hope it is not too intimidating for them.

For those of you who we provide computer, server and network service and support for with Scott as your primary technician, don’t worry, you’ll be taken care of.  We promise! Greg, Wes (the new guy) and I will work our tail off to insure everything is just as it was with Scott. You don’t have to worry about us learning your systems all over again from scratch because Scott has left detailed notes, and communicated with us throughout the relationship with you. Besides, he is just a phone call or email away if we need him.

Scott, we’ll all miss you, and wish you the best in your new position!  We love ya bud!

John, Pamela, Greg and Megan

PS: If things don’t work out or the grass isn’t actually greener on the other side of the fence, you know where we are! 😉

Need computer repair, service, sales in Greenville SC? Call us!

I was talking with a friend of mine on Facebook today and they were explaining how their computer was giving them grief, and how if only he knew some computer repair business he could trust.

To be honest, I was wondering if he was being sarcastic, hoping I would offer to work on it, or if he honestly didn’t know that I am in the computer service business. Turns out, he really didn’t know what I do! I’ve known the man for several years, mainly via social media, but also have bumped into him at many networking and leads type meetings. Maybe I was under the assumption he knew all along, maybe I thought that since he was a friend that he was not a potential “customer”.

Either way, somewhere along the way, I did a poor job of conveying to him that we actually repair computers. I asked him what he THOUGHT Homeland Secure IT did, and he explained it like this:

“I knew you did SOMETHING with computers, but it seemed like it was more business sales related”.

I gave him the whole spiel, that we fix computers, from simple repairs and service of notebook, laptop and workstation computers for individual home users to the same for small and medium businesses, non-profits, etc. in addition to doing network and server sales, service and consultation. We can and do perform all types of repairs from replacing a broken LCD to hard drive data recovery and everything in between. We’re also dealers for HP, Dell, Toshiba, Acer, Samsung, Lenovo, Nexlink and many other manufactures! We work on Microsoft Windows, Apple Mac OS X and Linux systems.

Long story short, he’s going to bring his broken computer in and we will take care of him.

If you need computer repair, service, support or the like here in Greenville or Upstate, SC, please think of Homeland Secure IT first. Whether it is for your business or your home, we do that!  Call us at 864.990.4748 or use the CONTACT link above.

1

Protect your assets and stay in compliance with Trend Micro Endpoint Encryption

With federal and state agencies now dispensing stiff penalties to companies that do not maintain compliance with the plethora of industry regulations, such as HIPAA, PCI, Sarbanes Oxley, HITECH, FISMA and a slew of others, healthcare, retail and financial service industries need an encryption solution.

Trend Micro Endpoint Encryption offers exactly what most businesses need. Ensure data privacy by encrypting data stored on your endpoints—especially devices like laptops, DVDs, and USB drives, which can easily be lost or stolen. Trend Micro™ Endpoint Encryption provides the endpoint data security you need with full disk encryption, folder and file encryption, and removable media encryption.

  • Protect data at rest with full disk encryption software
  • Automate management with self-encrypting hard drives
  • Secure specific files and shared folders
  • Encrypt private data stored on removable media
  • Set granular policies for device control and data management
  • Easy data recovery in the event of a system failure
  • Simplified key management from a single platform
  • Comprehensive auditing and reporting to demonstrate compliance

WHAT IT DOES:

When unprotected data is stored on mobile computing devices, organizations risk losing intellectual property, credit card information, and private employee and customer data.

Trend Micro™ endpoint encryption helps you prevent this data loss along with the compliance violations, reputation damage, and revenue loss. This comprehensive, easy-to use data encryption solution secures data at rest on your PCs, laptops, notebooks, CDs, DVDs, and USB flash drives. As a centrally managed, policy-driven solution, it helps you meet today’s stringent regulatory compliance mandates for data protection—with less effort.

Centralized policy management server
A single console makes it easy to manage encryption keys and synchronize policy across all encryption components. It also provides the deployment and auditing tools to ensure regulatory compliance. Central policy enforces secure authentication across all devices including many second factor authentication options. Other data management features include real-time auditing, user-based self-help options, and remote device control.

Full disk encryption
In the event your device is lost or stolen, ensure your data is unreadable with full disk encryption. Choose either our software- or hardware-based solution. Software-based full disk encryption uses FIPS-140 certified encryption with a secure pre-boot authentication to protect devices without a high startup cost. When automation and greater ease-of-use are a priority, our hardware-based full disk encryption manages and deploys industry standard self-encrypting drives using the OPAL standard.

Folder and file encryption
Gives users the power to secure specific data through an easy-to-use client software application. Users with a user key, group key, static one-time password, or smartcard certificate can encrypt select files, folders, or external media by using a drag and drop, single-click capability. Files can be encrypted with a self-extracting executable if they are going to be shared outside the organization. The encryption keys and policies of this option are managed by the centralized management console.

Removable media encryption
Allow administrators to enforce policy and protect data that is copied to removable media such as USB drives, CDs and DVDs. From the centralized policy console, encryption can be enforced or made optional for users writing to these devices.

Granular device control and data management
With powerful IT controls, administrators can restrict or deny access to external devices that may be connected to a user’s PC. For example, users may be allowed to access USB drives, but only as read-only. Or exceptions could be created that allow users to save data on specific USB drives, like Trend Micro Secure USBs, described below.

Trend Micro™ secure USBs
These hardened, military-grade, USB drives keep your stored data safe with hardware-based encryption. To minimize IT administration, these small storage devices are managed with the same policies, key management, and authentication as the centralized policy console.

WHY IT’S BETTER:

Real-time reporting and audit-ready user and device management
It’s one thing to ensure you’re following compliance mandates by encrypting devices, but in the event you lose a device, you may be required to prove the device was encrypted. Trend Micro Endpoint Encryption’s advanced management console provides up-to-the-minute status reports, including the encryption state the last time a particular device was connected to your network. And with devices that have network-aware pre-boot options, you can have them “check in” to the management console before they boot up. This allows administrators to reset or “kill” a lost or stolen device before it re-boots. The administrative console has capabilities to recover lost data, update policies, and deploy new devices with ease.

Data encryption and authentication to fit your needs
Trend Micro Endpoint Encryption is available in a variety of platform options. Full disk encryption is available using industry standard, OPAL compliant self-encrypting drives or using software-based encryption. USB encryption is available as software-based encryption or as a secure hardware-based self-encrypting USB drive. Whatever the method, all devices are secured with a robust AES256 encryption algorithm. There are many options for user authentication, from simple username and password to more complex multi-factor authentication, such as RSA SecureID tokens.

Data encryption certifications to ensure compliance
Industry mandates and legislation often prescribe how devices should be encrypted. Many are calling for detailed product certifications. Trend Micro encryption solutions are covered by the most stringent and up-to-date standards to ensure that customers are compliant with the latest mandates, including HIPAA, HITECH Act, PCI, Basel II, FISMA, FCRA, as well as state and regional regulations. Trend Micro Endpoint Encryption products also meet or exceed standards such as FIPS-140-2/3, Common Criteria, and NSTISSP, to name a few.

Lower cost of endpoint encryption
Trend Micro Endpoint Encryption solutions allow you to reduce your cost of ownership through integration with other Trend Micro management tools and innovative deployment capabilities that let you easily deploy without disrupting users. Once deployed, the automated reporting, auditing, and policy updating means that administering encrypted devices is easy. An optional end-user self-service portal for password administration further reduces IT management.

If you would like more information about Trend Micro Endpoint Encryption or any of Trend Micro’s offerings such as Worry Free Business Security, please call us at 864-990-4748 or use our CONTACT information from the link above.

We are your Greenville and Upstate SC Trend Micro partner, offering sales, consultation and support.

2

Customer service is alive and well, at Champion Power Equipment #generators

I know how everyone loves Honda or Yamaha generators, and I don’t blame you, they are considered some of the best (and most expensive) portables you can buy. Nice and quiet and high quality and all.

HOWEVER – 4 years ago, I purchased an inexpensive generator to be used in the event of an emergency, and also for a ham radio event we call “Field Day”, where we operate for 24hrs using emergency power and attempt to contact as many other amateur operators during that time as possible. This hones our skills, and hopefully prepares us to help assist agencies like the American Red Cross, Salvation Army and local, state and federal Emergency Management during disasters.

The model I opted for was a Champion 3500/4000 watt. (model # c40012). It was on sale at Home Depot and to be honest, for less than 200 dollars, I did not expect much. I was pleasantly surprised when I found it has a very stable output, with a sign wave that my sensitive electronics liked. Very little, to zero “hash” (noise that can be heard on audio and raido gear), and fuel consumption of about 8 to 10 hours per tank (4 gallons) depending upon load. The only downside was the volume of the running generator was kind of high, at about 87db, much like a lawn mower.

Another great feature was that it included a “mobility kit”, which consists of some wheels and a handle, so you don’t have to lift and carry it.

Since the day I got it, this generator has always started on the first pull, whether cold, or after refueling during an all night run. (okay, sometimes a 2nd pull was needed if it had not run or completely ran out of fuel)

This weekend is Field Day, and guess what? The generator won’t start. Some idiot left fuel in it since last year, and didn’t let it run dry and shut off the fuel valve, so the carb was filled with debris and stale fuel. I attempted to clean it last night, but the deposits are horrible and it really needs to be dipped and rebuilt.

I called the manufacturer, Champion Power Equipment out on the West Coast, and spoke with tech support. I did not have to wait on hold, the man did not treat me like the idiot I am, he happily looked up the parts I need, and arranged for them to be shipped out today so they would be here on Friday.

More time was spent on the phone telling him what a great generator this has been than on the process of actually ordering the parts.  Oh, and the price was affordable!

One thing is for sure – the majority of computer and electronic customer service or tech support calls do not go that smoothly, regardless of the manufacturer or vendor. Many of the computer and server manufacturers could take a lesson from Champion Power Equipment.

Champion did the following right:

  • They spoke my language (English), probably better than I do.
  • They didn’t leave me on hold or waiting in a queue forEVER.
  • They did not give me the runaround after determining that I might actually know what I was talking about.
  • They gladly looked up the parts, instead of telling me to refer to this document or that document online.
  • They offered to ship in an expedited manner.
  • The pricing was reasonable for replacement parts.
  • The person on the other end of the phone was personable, it actually sounded as if he wanted to be helping me.

You can bet I will be recommending Champion products, not because they are “better” than another brand, I really don’t know that to be true or false, but because in my time of need, their support was superior.

 

Hard drive in action in super slow motion

Ever wanted to see a hard drive in action? If you are the curious type, you probably already have taken a drive apart and noted how quickly the actuator arm moved.

These guys show a drive in super slow motion. (40x reduction in speed) for your viewing pleasure.

LoJack type tracking software helps recover stolen and lost laptops

Two articles are in the news in the last few weeks that have helped increase awareness of LoJack and other tracking software packages.

In one case, Maple Ridge School District in Canada was able to recover four stolen school laptops using this technology STORY HERE and in another, the owner of a stolen notebook used Orbicule Security Software to snap a picture of the person who had stolen his computer along with other information that helped police recover the stolen laptop STORY HERE.

The number of thefts of mobile devices is much higher than it was, but thanks to these tracking programs, the owners have a much higher rate of recovery than ever before. Consider it inexpensive insurance!

If you would like more information about how to protect your computer, or a fleet of computers for your business, please call us at 864.990.4748 or use our CONTACT link above.

New Apple MacBook Pro virtually impossible to upgrade or service by users

Many people are probably drooling over the new line of Apple products, including the MacBook Pro with its awesome retina display, however, many are voicing their opinion of Apple’s continued migration towards machines that are not user-serviceable.

According to articles on iFixit and SlashGear, the new Apple MacBook Pro will pose a number of problems for those who like to work on their own computers, as well as computer repair and service personnel. Here are a few nuggets gleaned from the iFixit teardown:

  • Proprietary fasteners are used, requiring special driver (called “Pentalobe”)
  • RAM is impossible to upgrade – soldered to the motherboard
  • Proprietary SSD drive (no aftermarket alternative as of now)
  • Proprietary battery components glued in place
  • Display is fused – requiring replacement of complete assembly

Along with your expensive MacBook Pro will be expensive maintenance, most certainly accomplished through returning the device to the Apple Store, who will not service it there, sending it to a repair facility.

Turnaround on something as simple as a battery replacement could be a week, or more.  Which could be compared to minutes for many Windows based notebooks.

Replacement of the Retina display in the event is damaged would be quite expensive, probably over 350 dollars, compared to half that for some mainstream Windows based notebooks.

The original article can be found here: Apple MacBook Pro with Retina Display Tear Down and over on SlashGear you can find this article: Retina MacBook Pro teardown reveals new heights of user-inaccessibility

We perform Mac repairs, however, with the move towards this type of construction, we may have to re-evaluate that offering, based on whether parts are made available to us.

Amped Wireless releases industry’s most powerful dual band wi-fi repeater

Our partner, Amped Wireless, has announced what they call the industry’s most powerful dual band wi-fi repeater. Capable of extending ranges up to 10,000 square foot.

The new long-range, high power Wireless-N 600mW GIgabit Dual Band Wi-Fi Repeater is available now and can extend your network up to a quarter of an acre.

Amped SR20000G wi-fi repeater diagram

“Building materials and other electronic devices can all interfere with a wireless signal, distorting it and limiting its range,” stated Jason Owen, CEO at Amped Wireless. “By adding the SR20000G High Power, Wireless-N Gigabit Dual Band Repeater to your network, you are ensuring strong coverage throughout the home or workplace, allowing wireless devices roam and keep their connectivity. This product is a must have if you are looking for high performance signal boost and additional range for your connected TV, game console, tablet or smart phone.”

Designed specifically to meet the needs of the small business office and home office networking requirements, the SR20000G introduces a number of industry firsts, including:

  • The first repeater to include 5 gigabit networking ports for connecting PCs, A/V devices and game consoles at full speed
  • The first repeater to include USB port for sharing files over the local or extended networks

The first repeater to deliver long range, dual band speed of up to 600Mbps for smooth streaming of video, music and uninterrupted gaming across a number of devices, including: Game Consoles, iPads, Internet TVs, Notebooks, PCs, Smart Phones, Tablets, VoIP devices and more.

Built upon the Company’s award-winning Wi-Fi technology, the SR20000G is engineered with the latest state-of-the-art wireless features which includes:

  • Dual high power 2.4Ghz 600mW amplifiers, dual high power 5.0GHz amplifiers and dual low noise amplifiers for improving wireless reception
  • Dual High Gain 5dBi detachable dual band antennas
  • High speed 620MHz internal processor for faster networking
  • Simultaneous 2.4GHz and 5.0GHz dual band 802.11n technology

The combination of advanced power amplifiers, wireless reception amplifiers and high gain antennas, provide users with a significant increase in signal strength over great distances to improve home or office Wi-Fi coverage.

The high power repeater includes premium features such as, guest networks, adjustable Wi-Fi coverage control, user access control and support for the latest Wi-Fi security protocols to secure your Wi-Fi experience.

All Amped Wireless products include industry leading, US based, in-house Elite Support, provided by Amped Concierges and the Wi-Fi Analytics App to assist users in optimizing Wi-Fi networks. In addition, the SR20000G is eligible for Amped Wireless’ Range Increase Guarantee Program. For more information, please visit: http://www.ampedwireless.com/

Pricing and Availability
The new SR20000G High Power Wi-Fi Gigabit Dual Band Repeater retails for $179.99 (USD) and is available immediately.

Please call 864.990.4748 for more information regarding this or any other Amped product or use the CONTACT link from our navigation menu. We also offer installation and configuration of Amped products in the Greenville & Upstate South Carolina area.

Microsoft Patch Tuesday for June offers updates for Windows XP, Vista, 7, Server 2003 & 2008, Office and more!

Microsoft’s June Patch Tuesday bring the individual and IT professional a number of updates to keep your day from being boring.

You will find fixes for Critical issues in Microsoft Windows XP, Vista, 7, Server 2003 and Server 2008, protecting you from Remote Code Execution, and for Microsoft Explorer 6-9 Remote Code Execution & Elevation of Privileges vulnerabilities.

But wait, that’s not all! You will also receive updates to Microsoft Office 2003, 2007, 2010 and Visual Basic for Applications to protect you from Remote Code Execution.

And, if you act immediately, you can install updates to Microsoft Dynamics AX 2012 Enterprise Portal that will fix an Elevation of Privilege issue!!!!!

That’s right! For the low low price of zero dollars, you get all these updates and more.  Please install them immediately to insure your computers are secured from the “bad guys”.

If you require assistance with these or any other security or update issues in the Greenville South Carolina area, please call upon us at 864.990.4748 or use our CONTACT link above.

 

For your reading pleasure, please find the entire MS Bulletin Advance Notification for June 2012 below:

—–BEGIN PGP SIGNED MESSAGE—–

Hash: SHA256

 

********************************************************************

Microsoft Security Bulletin Advance Notification for June 2012

Issued: June 7, 2012

********************************************************************

 

This is an advance notification of security bulletins that Microsoft is intending to release on June 12, 2012.

 

The full version of the Microsoft Security Bulletin Advance Notification for June 2012 can be found at http://technet.microsoft.com/security/bulletin/ms12-jun.

 

This bulletin advance notification will be replaced with the June bulletin summary on June 12, 2012. For more information about the bulletin advance notification service, see http://technet.microsoft.com/security/bulletin/advance.

 

To receive automatic notifications whenever Microsoft Security Bulletins are issued, subscribe to Microsoft Technical Security Notifications on http://technet.microsoft.com/security/dd252948.aspx.

 

Microsoft will host a webcast to address customer questions on these bulletins on June 13, 2012, at 11:00 AM Pacific Time (US & Canada). Register for the Security Bulletin Webcast at http://technet.microsoft.com/security/bulletin.

 

Microsoft also provides information to help customers prioritize monthly security updates with any non-security, high-priority updates that are being released on the same day as the monthly security updates. Please see the section, Other Information.

 

This advance notification provides a number as the bulletin identifier, because the official Microsoft Security Bulletin numbers are not issued until release. The bulletin summary that replaces this advance notification will have the proper Microsoft Security Bulletin numbers (in the MSyy-xxx format) as the bulletin identifier. The security bulletins for this month are as follows, in order of severity:

 

 

Critical Security Bulletins

============================

 

Bulletin 1

 

– Affected Software:

– Windows XP Service Pack 3

– Windows XP Professional x64 Edition Service Pack 2

– Windows Server 2003 Service Pack 2

– Windows Server 2003 x64 Edition Service Pack 2

– Windows Server 2003 with SP2 for Itanium-based Systems

– Windows Vista Service Pack 2

– Windows Vista x64 Edition Service Pack 2

– Windows Server 2008 for 32-bit Systems Service Pack 2

(Windows Server 2008 Server Core installation affected)

– Windows Server 2008 for x64-based Systems Service Pack 2

(Windows Server 2008 Server Core installation affected)

– Windows Server 2008 for Itanium-based Systems Service Pack 2

– Windows 7 for 32-bit Systems and

Windows 7 for 32-bit Systems Service Pack 1

– Windows 7 for x64-based Systems and

Windows 7 for x64-based Systems Service Pack 1

– Windows Server 2008 R2 for x64-based Systems and

Windows Server 2008 R2 for x64-based Systems Service Pack 1

(Windows Server 2008 R2 Server Core installation affected)

– Windows Server 2008 R2 for Itanium-based Systems and

Windows Server 2008 R2 for Itanium-based Systems

Service Pack 1

– Impact: Remote Code Execution

– Version Number: 1.0

 

Bulletin 2

 

– Affected Software:

– Windows XP Service Pack 3:

– Internet Explorer 6

– Internet Explorer 7

– Internet Explorer 8

– Windows XP Professional x64 Edition Service Pack 2:

– Internet Explorer 6

– Internet Explorer 7

– Internet Explorer 8

– Windows Server 2003 Service Pack 2:

– Internet Explorer 6

– Internet Explorer 7

– Internet Explorer 8

– Windows Server 2003 x64 Edition Service Pack 2:

– Internet Explorer 6

– Internet Explorer 7

– Internet Explorer 8

– Windows Server 2003 with SP2 for Itanium-based Systems:

– Internet Explorer 6

– Internet Explorer 7

– Windows Vista Service Pack 2:

– Internet Explorer 7

– Internet Explorer 8

– Internet Explorer 9

– Windows Vista x64 Edition Service Pack 2:

– Internet Explorer 7

– Internet Explorer 8

– Internet Explorer 9

– Windows Server 2008 for 32-bit Systems Service Pack 2:

– Internet Explorer 7

(Windows Server 2008 Server Core installation not affected)

– Internet Explorer 8

(Windows Server 2008 Server Core installation not affected)

– Internet Explorer 9

(Windows Server 2008 Server Core installation not affected)

– Windows Server 2008 for x64-based Systems Service Pack 2:

– Internet Explorer 7

(Windows Server 2008 Server Core installation not affected)

– Internet Explorer 8

(Windows Server 2008 Server Core installation not affected)

– Internet Explorer 9

(Windows Server 2008 Server Core installation not affected)

– Windows Server 2008 for Itanium-based Systems Service Pack 2:

– Internet Explorer 7

– Windows 7 for 32-bit Systems and

Windows 7 for 32-bit Systems Service Pack 1:

– Internet Explorer 8

– Internet Explorer 9

– Windows 7 for x64-based Systems and

Windows 7 for x64-based Systems Service Pack 1:

– Internet Explorer 8

– Internet Explorer 9

– Windows Server 2008 R2 for x64-based Systems and

Windows Server 2008 R2 for x64-based Systems Service Pack 1:

– Internet Explorer 8

(Windows Server 2008 R2 Server Core installation

not affected)

– Internet Explorer 9

(Windows Server 2008 R2 Server Core installation

not affected)

– Windows Server 2008 R2 for Itanium-based Systems and

Windows Server 2008 R2 for Itanium-based Systems

Service Pack 1:

– Internet Explorer 8

– Impact: Remote Code Execution

– Version Number: 1.0

 

Bulletin 3

 

– Affected Software:

– Windows XP Service Pack 3

– Windows XP Professional x64 Edition Service Pack 2

– Windows Server 2003 Service Pack 2

– Windows Server 2003 x64 Edition Service Pack 2

– Windows Server 2003 with SP2 for Itanium-based Systems

– Windows Vista Service Pack 2

– Windows Vista x64 Edition Service Pack 2

– Windows Server 2008 for 32-bit Systems Service Pack 2

(Windows Server 2008 Server Core installation not affected)

– Windows Server 2008 for x64-based Systems Service Pack 2

(Windows Server 2008 Server Core installation not affected)

– Windows Server 2008 for Itanium-based Systems Service Pack 2

– Windows 7 for 32-bit Systems and

Windows 7 for 32-bit Systems Service Pack 1

– Windows 7 for x64-based Systems and

Windows 7 for x64-based Systems Service Pack 1

– Windows Server 2008 R2 for x64-based Systems and

Windows Server 2008 R2 for x64-based Systems Service Pack 1

(Windows Server 2008 R2 Server Core installation affected)

– Windows Server 2008 R2 for Itanium-based Systems and

Windows Server 2008 R2 for Itanium-based Systems

Service Pack 1

– Impact: Remote Code Execution

– Version Number: 1.0

 

 

Important Security Bulletins

============================

 

Bulletin 4

 

– Affected Software:

– Microsoft Office 2003 Service Pack 3

– Microsoft Office 2007 Service Pack 2

– Microsoft Office 2007 Service Pack 3

– Microsoft Office 2010 and Microsoft Office 2010

Service Pack 1 (32-bit editions)

– Microsoft Office 2010 and Microsoft Office 2010

Service Pack 1 (64-bit editions)

– Microsoft Visual Basic for Applications

– Microsoft Visual Basic for Applications SDK

– Impact: Remote Code Execution

– Version Number: 1.0

 

Bulletin 5

 

– Affected Software:

– Microsoft Dynamics AX 2012 Enterprise Portal

– Impact: Elevation of Privilege

– Version Number: 1.0

 

Bulletin 6

 

– Affected Software:

– Windows XP Service Pack 3

– Windows XP Professional x64 Edition Service Pack 2

– Windows Server 2003 Service Pack 2

– Windows Server 2003 x64 Edition Service Pack 2

– Windows Server 2003 with SP2 for Itanium-based Systems

– Windows Vista Service Pack 2

– Windows Vista x64 Edition Service Pack 2

– Windows Server 2008 for 32-bit Systems Service Pack 2

(Windows Server 2008 R2 Server Core installation affected)

– Windows Server 2008 for x64-based Systems Service Pack 2

(Windows Server 2008 R2 Server Core installation affected)

– Windows Server 2008 for Itanium-based Systems Service Pack 2

– Windows 7 for 32-bit Systems and

Windows 7 for 32-bit Systems Service Pack 1

– Windows 7 for x64-based Systems and

Windows 7 for x64-based Systems Service Pack 1

– Windows Server 2008 R2 for x64-based Systems and

Windows Server 2008 R2 for x64-based Systems Service Pack 1

(Windows Server 2008 R2 Server Core installation affected)

– Windows Server 2008 R2 for Itanium-based Systems and

Windows Server 2008 R2 for Itanium-based Systems

Service Pack 1

– Impact: Elevation of Privilege

– Version Number: 1.0

 

Bulletin 7

 

– Affected Software:

– Windows XP Service Pack 3

– Windows Server 2003 Service Pack 2

– Windows 7 for x64-based Systems and

Windows 7 for x64-based Systems Service Pack 1

– Windows Server 2008 R2 for x64-based Systems and

Windows Server 2008 R2 for x64-based Systems Service Pack 1

(Windows Server 2008 R2 Server Core installation affected)

– Impact: Elevation of Privilege

– Version Number: 1.0

 

 

Other Information

=================

 

Follow us on Twitter for the latest information and updates:

http://twitter.com/msftsecresponse

 

Microsoft Windows Malicious Software Removal Tool:

==================================================

Microsoft will release an updated version of the Microsoft Windows Malicious Software Removal Tool on Windows Update, Microsoft Update, Windows Server Update Services, and the Download Center.

 

Non-Security Updates on MU, WU, and WSUS:

========================================================

For information about non-security releases on Windows Update and Microsoft update, please see:

* http://support.microsoft.com/kb/894199: Microsoft Knowledge Base

Article 894199, Description of Software Update Services and

Windows Server Update Services changes in content.

Includes all Windows content.

* http://technet.microsoft.com/en-us/wsus/bb456965.aspx: Updates

from Past Months for Windows Server Update Services. Displays all

new, revised, and rereleased updates for Microsoft products other

than Microsoft Windows.

 

Microsoft Active Protections Program (MAPP) ===========================================

To improve security protections for customers, Microsoft provides vulnerability information to major security software providers in advance of each monthly security update release. Security software providers can then use this vulnerability information to provide updated protections to customers via their security software or devices, such as antivirus, network-based intrusion detection systems, or host-based intrusion prevention systems. To determine whether active protections are available from security software providers, please visit the active protections websites provided by program partners, listed at http://www.microsoft.com/security/msrc/collaboration/mapp.aspx.

 

Recognize and avoid fraudulent email to Microsoft customers:

=============================================================

If you receive an email message that claims to be distributing a Microsoft security update, it is a hoax that may contain malware or pointers to malicious websites. Microsoft does not distribute security updates via email.

 

The Microsoft Security Response Center (MSRC) uses PGP to digitally sign all security notifications. However, PGP is not required for reading security notifications, reading security bulletins, or installing security updates. You can obtain the MSRC public PGP key at https://technet.microsoft.com/security/bulletin/pgp.

 

To receive automatic notifications whenever Microsoft Security Bulletins are issued, subscribe to Microsoft Technical Security Notifications on http://technet.microsoft.com/security/dd252948.aspx.

 

********************************************************************

THE INFORMATION PROVIDED IN THIS MICROSOFT COMMUNICATION IS PROVIDED “AS IS” WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.

IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY NOT APPLY.

********************************************************************

To manage or cancel your subscription to this newsletter, visit the Microsoft.com Profile Center at <http://go.microsoft.com/fwlink/?LinkId=245953> and then click Manage Communications under My Subscriptions in the Quicklinks section.

 

For more information, see the Communications Preferences section of the Microsoft Online Privacy Statement at:

<http://go.microsoft.com/fwlink/?LinkId=92781>.

 

For the complete Microsoft Online Privacy Statement, see:

<http://go.microsoft.com/fwlink/?LinkId=81184>.

 

For legal Information, see:

<http://www.microsoft.com/info/legalinfo/default.mspx>.

 

This newsletter was sent by:

Microsoft Corporation

1 Microsoft Way

Redmond, Washington, USA

98052

 

—–BEGIN PGP SIGNATURE—–

Version: PGP Desktop 10.2.0 (Build 1950)

Charset: utf-8

 

wsFVAwUBT9DhN/qHR30eX+zgAQitBg/+OWJqR8h2ck1OUEvflV2EWSKuJgY5JT05

Z0F4hFQTKbf05RynxCuNmOAfFbqPjx3/Dty31VuMnc3zvdf6wYXJFXk2oqCoV1zv

vP3i8sx6VVY7/EBL6mFfbgXkikAPpnztKr8OKKMczfSuW4OkwkTogds512WLdsVs

1D0bXKWZ65Qx8/RTgGllSiLWKW1csHNsf8VsIV751TjVayHGvIj4q7C0DxTKJx0q

mHwQ/MCifET/EBrQcTtebVDc+M0NLaOh/fA5T0lZcv2Qd/jZpNovLk66VnljIZPH

fvZFuOzGXLV8pbMNuOpUfaheqweG776xHpJ5x4lnqoaVj1gjgfGFNQaoOwyasbbX

CrD/pDA4meMtodf9gv7W1w0w/7XFw+JRXcwtjz1E2eSD9+cMkDeKbtefx8gX6ANZ

wF8wXs0FBRfMKtDogVnWZUIsy4cR5F+qTM3Hho8P9kuOSU46VNz264vcDIWpDcQ7

AToyad0rzalcff2B6yGLQVC8Gw7mmpD7gAuniv66VOOP/9VyNUO6KPgDvi9Ed3se

wqqM7SaLETNL8K2sCVZ0y/teQLyvEILB0XqgKgGfwSM6Zu64LU5ajattocMArWb9

vIELeRBqAPctR/wKXdva+RBPgc4e4UJPabEQcOP4lKSwQ3FubjJPKW9tRiQZhfKV

C1q4t+vA0Aw=

=M6KK

—–END PGP SIGNATURE—–