A security issue has been identified that could allow an unauthenticated remote attacker to compromise your system and gain access to information.
Category: Microsoft Download
Microsoft Download Center RSS Feed
Security Update for Windows 7 (KB2769369)
A security issue has been identified that could allow an authenticated remote attacker to compromise your system and gain control over it.
Security Update for Windows Embedded Standard 7 for x64-based Systems (KB2785220)
A security issue has been identified that could allow an unauthenticated remote attacker to compromise your system and gain access to information.
Update for Windows 7 (KB2786081)
Install this update to resolve issues in Windows.
Security Update for Windows 7 for x64-based Systems (KB2769369)
A security issue has been identified that could allow an authenticated remote attacker to compromise your system and gain control over it.
Update for Windows 7 (KB2773072)
Install this update to resolve issues in Windows.
Update for Windows 7 for x64-based Systems (KB2786400)
Install this update to resolve issues in Windows.
Security Update for Windows 8 for x64-based Systems (KB2785220)
A security issue has been identified that could allow an unauthenticated remote attacker to compromise your system and gain access to information.
January 2013 Security Release ISO Image
This DVD5 ISO image file contains the security updates for Windows released on Windows Update on January 8, 2013.
Security Update for Windows Vista (KB2785220)
A security issue has been identified that could allow an unauthenticated remote attacker to compromise your system and gain access to information.
Letters: Readers Speak Out
February 2008Letters: Readers Speak Out
From the Editor: Dealing with Information Overload
February 2008From the Editor: Dealing with Information Overload
Security Watch: Island Hopping: Mitigating Undesirable Dependencies
February 2008Unwanted security dependencies can expose your entire network to attacks. Find out how security dependencies work so you can analyze dependencies in your environment and resolve potential problems.
Windows Confidential: Scrapping the Scraps
February 2008Here’s some history about how a couple of not so incredibly popular features disappeared.
Field Notes: Donate Your PC
February 2008When you donate and reuse old hardware, you keep old hardware out of landfills-and that helps to preserve our environment. These tips can help you effectively delete personal data from your old computer equipment so it will be ready for re…
High Performance Computing: An Introduction to Windows Compute Cluster Server
February 2008Rather than relying on large specialized systems, high performance computing uses clusters of smaller, standard systems. Spreading the workload in this fashion offers an economical solution for solving complex problems quickly. Explore the…
Utility Spotlight: ADMX Migrator
February 2008With Windows Vista, the format for Group Policy templates has changed to an XML-based structure. The ADMX Migrator utility can convert your legacy ADM files into the new ADMX format, as well as help you easily create your own custom ADMX f…
Online Extra: Deploy the 2007 Office System with Terminal Services
February 2008The 2007 Microsoft Office system includes design changes you must be aware of before deploying it in your Terminal Services server farm. This article gives you an overview of the changes.
Windows PowerShell: Shell Permissions
February 2008Permissions in Windows are, unfortunately, innately complicated. But Windows PowerShell can help. Get a quick overview of how permissions in Windows work and find out how you can simplify the task of working with them.
Toolbox: New Products for IT Pros
February 2008Toolbox: New Products for IT Pros