This update addresses the vulnerability discussed in Microsoft Security Advisory (KB2758994). To find out if other security updates are available for you, see the Additional Information section at the bottom of this page.
Category: Microsoft Download
Microsoft Download Center RSS Feed
Exchange Queue & A: Mysterious Attachment Size Increases, Replicating Public Folders, and More
January 2009Why do attachment sizes increase when sending and receiving e-mail messages? How can you ensure databases on a passive node in a CCR cluster are defragmented during online maintenance? Can you use an external trust between forests? We answ…
Hey, Scripting Guy!: Learning to Excel
January 2009Discover how to use the Excel.Application automation model for a more powerful way to process data from your servers and take advantage of the analysis and charting tools built into Excel.
The Desktop Files: Windows Won’t Start!
January 2009Drivers fail, files get corrupted, disks crash–there are numerous uncontrollable reasons why Windows might fail. But all is not lost. Wes Miller explores the kinds of things that can go wrong in a Windows system, and explains how you can t…
Security Watch: Subjects and Security Principals
January 2009Security principals underlie so much of Windows security that it is essential for any administrator to have at least a basic understanding of how the various types of Security principals work and how they are used. Here’s what you need to k…
Sustainable Computing: How to Plan Your Server-Consolidation Strategy with System Center
January 2009Find out how you can use Microsoft System Center and virtualization software to consolidate servers and reduce your IT costs.
Field Notes: What On Earth Is Green IT?
January 2009Get a quick overview of some simple IT upgrades that can provide both environmental and cost cutting benefits.
Field Notes: IT’s Surprises
January 2009Although many CIOs want to avoid the public eye, a lively discussion at a recent conference revealed that perhaps the opposite is actually true—the IT department should take the time to extol its virtues and reveal its accomplishments to …
Springboard Series Resource Guide for Windows 8
One-page guide to the top technical resources for Windows 8 on TechNet.
Performance tips for Windows Store XAML apps
This paper provides performance tips for Windows Store XAML apps.
Microsoft Malware Protection Center Threat Report: Rootkits
Rootkits provide stealth capabilities to malware. This Microsoft Malware Protection Center threat report examines how attackers use rootkits, and how rootkits function on affected computers.
Windows Confidential: Last Check-In Chicken
January 2009Raymond Chen explains why it is often the developers who have their acts together who end up checking in the final bug fixes to products.
Windows Confidential: Last Check-In Chicken
January 2009Raymond Chen explains why it is often the developers who have their acts together who end up checking in the final bug fixes to products.
Windows Confidential: Last Check-In Chicken
January 2009Raymond Chen explains why it is often the developers who have their acts together who end up checking in the final bug fixes to products.
Windows Confidential: Last Check-In Chicken
January 2009Raymond Chen explains why it is often the developers who have their acts together who end up checking in the final bug fixes to products.
Windows Administration: Deploying Applications with Terminal Services
January 2009Without too much effort, you can deploy a terminal server to host the applications you need in your environment. But there are some important decisions you’ll need to make to ensure your implementation meets user expectations. Greg Shield…
Inside SharePoint: SharePoint Security Accounts
January 2009Take a close look at SharePoint Security Accounts to see how a weak configuration can give an attacker full control over all site collections and sites.
Windows Administration: Expanded Control with Group Policy Preferences
January 2009The new Group Policy Preferences feature found in Windows Server 2008 and Windows Vista provides more than 3,000 settings, greatly expanding what administrators can do with Group Policy. Here’s a guide to using Group Policy Preferences to…
Utility Spotlight: Microsoft Remote Server Administration Tools for Windows Vista
January 2009This column describes the Microsoft Remote Server Administration Tools, which allow administrators to remotely manage roles and features in Windows Server 2008 and Windows Server 2003 from a computer running Windows Vista SP1.
Identity Management: An Introduction to Identity Lifecycle Manager 2
January 2009The upcoming release of Microsoft Identity Lifecycle Manager “2” offers many new features and enhancements. Explore the new portal experience and find out how you can cut costs with self-service tools, increase security compliance with …