Installing SP3 on Windows XP eliminates the operating system’s ability to install important security patches for Microsoft’s .NET technology and possibly other software.
This problem forces XP SP3 users to apply patches manually to complete vital updates.
A vulnerability that allows remote-code execution via the Server Message Block protocol has long been known to affect all Windows PCs and servers.
This week, Microsoft finally found a way to fix the problem, first described in 2001.
Following Microsoft’s release last Friday of a critical, out-of-cycle patch, only sporadic reports of attacks based on this weakness have been received — but that may not last.
Apply the patch referred to in MS08-067 right away, because Trojan horses that take advantage of this security breach are sure to hit us soon.
A remote-code exploit that could spread rapidly like the 2003 MSBlaster worm is putting all versions of Windows at risk.
I recommend that you immediately install a patch that Microsoft has just issued to protect your system from a vulnerability in the Server service.
Once again, a Windows security patch is causing users of ZoneAlarm security software on XP systems to lose their Internet connection.
It’s important for users of many different ZoneAlarm products to update their programs before installing this week’s XP patches.
The move from 32-bit Vista to its 64-bit counterpart can be rocky, so be sure to check for device drivers beforehand.
I’ve got some other early-implementer advice on how to keep the migration to 64-bit computing a smooth ride.
Fake security programs are taking advantage of user gullibility in order to hold people’s PCs for ransom.
Windows XP users who are running with administrator rights are especially vulnerable to these drive-by downloads.
Microsoft’s GDI+ graphics system could be exploited to allow hackers to use image files to launch attacks on your system.
In addition to patching Windows, this bug requires that you update your Office apps, Works 8, Digital Image Suite 2006, and nearly every Microsoft application development product.
As usual, patching the browser could lead to conflicts with third-party security programs.
Still, now that malware can be found on legitimate Web sites, you need to install the latest Internet Explorer patches right away.
The new version of Check Point’s ZoneAlarm firewall solves one problem, but Windows Small Business Server 2003 still needs a patch for the DNS patch.
A change in how Windows’ DNS client chooses ports caught ZoneAlarm’s developers — and users — by surprise.