Skip to main content

Keeping Up With Windows Update

Continue reading the main storyShare This Page
Keeping Up
With Windows
Q. What is Microsoft fixing every month when I get Windows Update notices on my PC?
A. Those Windows Update notices usually contain Microsoft’s latest security patches and improvements to its Windows operating system. The company tends to release all its non-emergency updates on the second Tuesday of every month, a day that has come to be known as Patch Tuesday, although additional updates during the month are not uncommon.
Although it can be a bit technical, Microsoft posts information about its security updates at technet.microsoft.com/security/bulletin if you want to find out what each patch is supposed to repair; the Microsoft Security Response Center blog at blogs.technet.com/b/msrc also has details. While the updates are intended to plug security holes and take care of other issues, the new code can sometimes break other programs.
If an application does not work properly after you have installed Windows updates, a quick web search (or a visit to the support forums for the affected program) may offer workarounds until yet another patch is issued.
Scanning a Mac
For Malware
Q. My Mac has been acting weird, and I’m worried it might be because of spyware, although I’m not sure how I got it. How can I find out and remove it?
A. Apple has a number of security features built into its OS X system, but it is still possible for malicious software to plague your Mac. Unexpected pop-up ads, fake security alerts and web pages that behave oddly are common symptoms of a malware infection.
Apple has warned about the Flashback and Mac Defender malware that have targeted its systems and recommends that you download and install all the security patches available thought the Mac’s Software Update tool, which is available under the Apple Menu.
Although Macs have been targeted far less than Windows systems, malware can still invade through things like security flaws in Java or “free” programs from the web that also include spyware.
If you suspect your Mac is infected, scan your system with security software from a reputable company. The independent institute AV Test has reviewedmore than a dozen security programs for OS X, including paid programs likeBitdefender, as well as free utilities like those from Avast and Sophos.
TIP OF THE WEEK Online productivity tools like Google DocsMicrosoft Office Online and Apple’s iWork for iCloud beta are among the services that let you create and edit documents without having to pay for a dedicated word-processing program for your PC or Mac. However, if you do not always have an Internet connection, or would prefer to keep the files locally on your computers, both Windows and Mac OS X come with a built-in word processor that does much more than simple text editing.
Microsoft’s WordPad program (found in the Start menu’s Accessories folder in Windows 7 or in the Windows Accessories area of the All Apps screen in Windows 8.1) uses a simpler version of the Ribbon toolbar similar to that in Microsoft Word. Documents created in WordPad can include embedded photos and graphics, bold and italic text styles and other formatting features like bulleted lists.
Apple’s TextEdit program for OS X lives in the Mac’s Applications folder and offers similar formatting tools. In OS X 10.8 and later, the Mac’s Dictationtool can be used to convert spoken words into type in TextEdit. While the standard Dictation software requires an Internet connection, the Enhanced Dictation program for OS X 10.9 and later works right on the Mac — just turn on the Enhanced Dictation checkbox in the Dictation & Speech area of the System Preferences to download the necessary software.
J. D. BIERSDORFER

Popular posts from this blog

Hidden Wiki

Welcome to The Hidden WikiNew hidden wiki url 2015 http://zqktlwi4fecvo6ri.onion Add it to bookmarks and spread it!!!
Editor's picks Bored? Pick a random page from the article index and replace one of these slots with it.
The Matrix - Very nice to read. How to Exit the Matrix - Learn how to Protect yourself and your rights, online and off. Verifying PGP signatures - A short and simple how-to guide. In Praise Of Hawala - Anonymous informal value transfer system. Volunteer Here are five different things that you can help us out with.
Plunder other hidden service lists for links and place them here! File the SnapBBSIndex links wherever they go. Set external links to HTTPS where available, good certificate, and same content. Care to start recording onionland's history? Check out Onionland's Museum Perform Dead Services Duties. Introduction PointsAhmia.fi - Clearnet search engine for Tor Hidden Services (allows you to add new sites to its database). DuckDuckGo - A Hidden S…

[SOLVED] IDM WAS REGISTERED WITH A FAKE SERIAL NUMBER

[SOLVED] IDM WAS REGISTERED WITH A FAKE SERIAL NUMBER
Good News [May 08, 2015]: IDM developers got smarter, but the crackers are always a step ahead. Follow this article and send an email to uglyduckblog@gmail.com if you are desperate. I can NOT post any crack here for legal reasons. Happy Downloading with IDM. ;) *********** first tip is to use latest crack for idm from  onhax.net idm universal web crack and make sure u are using all latest vers I am sure many of us are too much dependent on Internet Download Manager a.k.a. IDM. The main reason didn’t permanently switch to linux was IDM. I mainly use it for batch downloading and download streaming videos. Till yesterday, IDM was working fine with me (of course with fake serial numbers, keygen, crack, patch etc. which could be found with little effort). But few days ago, with the latest update version 6.18 build 7 (released on Nov 09, 2013) Internet Download Manager was literally had a breakthrough and crushed all the serial numbers, …

DoubleAgent Attack Turns Your Antivirus Into Malware And Hijacks Your PC



Short Bytes: Cybellum security researchers have uncovered a new attack mechanism that can be used to take control of your antivirus and turn it into a malware. Called DoubleAgent, this attack exploits an old and undocumented vulnerability in Windows operating system. This Zero Day code injection technique affects all major antivirus vendors and has the power to hijack permissions. The security researchers from Cybellum have found a new technique that can be used by the cybercriminals to hijack your computer by injecting malicious code. This new Zero-Day attack can be used to take full control over all the major antivirus software. Instead of hiding from the antivirus, this attack takes control of the antivirus itself. Called DoubleAgent, this attack makes use of a 15-year-old legitimate feature of Windows (read vulnerability)–that’s why it can’t be patched. It affects all versions of Microsoft Windows. Cybellum blog mentions that this flaw is still unpatched by most antivirus v…