The Microsoft Extensible Application Markup Language (XAML) technical documentation set provides preliminary technical specifications for this language based on Extensible Markup Language (XML) that enables developers to specify a hierarchy of objects.
Category: Microsoft Download
Microsoft Download Center RSS Feed
TCP/IP Registry Values for Microsoft Windows Vista and Windows Server 2008
Windows Vista and Windows Server 2008 allow you to modify TCP/IP behavior with registry values.
Update for Internet Explorer Flash Player for Windows 8 (KB2796096)
This update addresses the vulnerability discussed in Microsoft Security Advisory (KB2796096).To find out if other security updates are available for you, see the Additional Information section at the bottom of this page.
Update for Internet Explorer Flash Player for Windows Server 2012 (KB2796096)
This update addresses the vulnerability discussed in Microsoft Security Advisory (KB2796096).To find out if other security updates are available for you, see the Additional Information section at the bottom of this page.
Using Windows Azure to Create a Multi-Platform Application
The Microsoft IT Volume Licensing team architected and redeployed a business critical application, with full security review and approval, to Windows Azure. The resulting solution delivers lower cost and improved scalability, performance, and reliabili…
Security Update for Windows 8 for x64-based Systems (KB2757638)
A security issue has been identified that could allow an unauthenticated remote attacker to compromise your system and gain control over it.
Security Update for Windows 7 (KB2757638)
A security issue has been identified that could allow an unauthenticated remote attacker to compromise your system and gain control over it.
Security Update for Windows Embedded Standard 7 for x64-based Systems (KB2757638)
A security issue has been identified that could allow an unauthenticated remote attacker to compromise your system and gain control over it.
Update for Internet Explorer Flash Player for Windows 8 x64 (KB2796096)
This update addresses the vulnerability discussed in Microsoft Security Advisory (KB2796096).To find out if other security updates are available for you, see the Additional Information section at the bottom of this page.
Security Update for Windows Vista (KB2778930)
A security issue has been identified that could allow an authenticated local attacker to compromise your system and gain control over it.
Security Update for Windows Vista (KB2757638)
A security issue has been identified that could allow an unauthenticated remote attacker to compromise your system and gain control over it.
Security Update for Windows Embedded Standard 7 (KB2757638)
A security issue has been identified that could allow an unauthenticated remote attacker to compromise your system and gain control over it.
Security Update for Windows 7 for x64-based Systems (KB2757638)
A security issue has been identified that could allow an unauthenticated remote attacker to compromise your system and gain control over it.
Security Update for Windows 8 (KB2757638)
A security issue has been identified that could allow an unauthenticated remote attacker to compromise your system and gain control over it.
Update for Windows Vista for x64-based Systems (KB2763674)
Install this update to resolve issues in Windows.
Update for Windows 8 (KB2785094)
These updates (*.msu) provide a collection of performance and reliability improvements that are designed to improve the Windows 8 experience.
Security Update for Windows 8 for x64-based Systems (KB2778930)
A security issue has been identified that could allow an authenticated local attacker to compromise your system and gain control over it.
Update for Windows 7 for x64-based Systems (KB2726535)
Install this update to resolve issues in Windows.
Security Update for Windows XP (KB2757638)
A security issue has been identified that could allow an unauthenticated remote attacker to compromise your system and gain control over it.
Security Update for Windows Embedded Standard 7 (KB2769369)
A security issue has been identified that could allow an authenticated remote attacker to compromise your system and gain control over it.