Compatibility pack for Business Contact Manager for Microsoft Outlook
Microsoft Security Compliance Manager
This Solution Accelerator provides centralized security baseline management features, a baseline portfolio, customization capabilities, and security baseline export flexibility to accelerate your organization’s ability to efficiently manage the security and compliance process for the most widely used Microsoft technologies.
TCP/IP Registry Values for Microsoft Windows Vista and Windows Server 2008
Windows Vista and Windows Server 2008 allow you to modify TCP/IP behavior with registry values.
Extensible Application Markup Language (XAML)
The Microsoft Extensible Application Markup Language (XAML) technical documentation set provides preliminary technical specifications for this language based on Extensible Markup Language (XML) that enables developers to specify a hierarchy of objects.
Windows Azure HPC Scheduler SDK (1.7, June 2012)
Windows Azure HPC Scheduler SDK
Windows Azure HPC Scheduler SDK (1.6, November 2011)
Windows Azure HPC Scheduler SDK (November 2011)
Using Windows Azure to Create a Multi-Platform Application
The Microsoft IT Volume Licensing team architected and redeployed a business critical application, with full security review and approval, to Windows Azure. The resulting solution delivers lower cost and improved scalability, performance, and reliabili…
Update for Internet Explorer Flash Player for Windows Server 2012 (KB2796096)
This update addresses the vulnerability discussed in Microsoft Security Advisory (KB2796096).To find out if other security updates are available for you, see the Additional Information section at the bottom of this page.
Update for Internet Explorer Flash Player for Windows 8 (KB2796096)
This update addresses the vulnerability discussed in Microsoft Security Advisory (KB2796096).To find out if other security updates are available for you, see the Additional Information section at the bottom of this page.
Update for Internet Explorer Flash Player for Windows 8 x64 (KB2796096)
This update addresses the vulnerability discussed in Microsoft Security Advisory (KB2796096).To find out if other security updates are available for you, see the Additional Information section at the bottom of this page.
Security Update for Windows Embedded Standard 7 for x64-based Systems (KB2757638)
A security issue has been identified that could allow an unauthenticated remote attacker to compromise your system and gain control over it.
Security Update for Windows 7 (KB2757638)
A security issue has been identified that could allow an unauthenticated remote attacker to compromise your system and gain control over it.
Security Update for Windows 8 for x64-based Systems (KB2757638)
A security issue has been identified that could allow an unauthenticated remote attacker to compromise your system and gain control over it.
Security Update for Windows 8 (KB2757638)
A security issue has been identified that could allow an unauthenticated remote attacker to compromise your system and gain control over it.
Security Update for Windows 7 for x64-based Systems (KB2757638)
A security issue has been identified that could allow an unauthenticated remote attacker to compromise your system and gain control over it.
Security Update for Windows Embedded Standard 7 (KB2757638)
A security issue has been identified that could allow an unauthenticated remote attacker to compromise your system and gain control over it.
Security Update for Windows Vista (KB2757638)
A security issue has been identified that could allow an unauthenticated remote attacker to compromise your system and gain control over it.
Security Update for Windows Vista (KB2778930)
A security issue has been identified that could allow an authenticated local attacker to compromise your system and gain control over it.
Security Update for Windows Embedded Standard 7 (KB2769369)
A security issue has been identified that could allow an authenticated remote attacker to compromise your system and gain control over it.
Security Update for Windows XP (KB2757638)
A security issue has been identified that could allow an unauthenticated remote attacker to compromise your system and gain control over it.