As i use my PC for on-line gaming I have always preferred to update my progs manually,this is fine if you remember to do it regularly (i often forget) ::)
Use this thread to post update notices.
1/1/07
AVG - 938 & 673
Ccleaner v1.37.456
SpywareBlaster update today 01.02.2007
Ignore the 1/1/07 date on the post above :-[ by the time i noticed it was too late to edit. ::)
Microsoft has made the first batch of updates for Vista available via the built-in Windows Update client. If you don't see the 22 updates, manually "Check for updates".
5 Updates for both 32bit and 64bit flavours of Vista (KB930857), (KB928089), (KB929427), (KB931573) & (KB929735)
15 Language Packs (Chinese Hong Kong, Chine Simplified, Danish, Dutch, Finnish, French, German, Italian, Japanese, Korean, Norwegian, Portuguese, Russian, Spanish, Swedish)
2 Ultimate Extras (BitLocker and EFS enhancements & Hold Em Poker Game)
http://www.microsoft.com/downloads/Browse.aspx?DisplayLang=en&nr=20&productId=8D7DD8D7-1CA6-4632-BAEF-E7C0750ED02E&sortCriteria=date
:)
Spybot Search & Destroy updates come out every Friday.
Just a reminder that anyone using the free AVG edition will need to download and install version 7.5 from HERE (http://free.grisoft.com/doc/5390/lng/us/tpl/v5#avg-anti-virus-free) by the 18th February version 7.1 cut off date. i know most have already installed it on here but its a reminder if anyone hasn't.
AVG - 946 & 681
Adaware SE1R149
Spy Sweeper program update to 5.3.1 (build 2344)
McAfee VirusScan Enterprise 8.0i now at 4958 :)
Javau J2SE Runtime Environment - 5.0 update 11
http://www.java.com/en/download/manual.jsp
It's patch Wednesday:
Microsoft Security Bulletin Summary for February, 2007
Published: February 12, 2007
Version: 1.0
http://www.microsoft.com/technet/security/bulletin/ms07-feb.mspx
Critical (6)
Bulletin Identifier Microsoft Security Bulletin MS07-008
Bulletin Title
Vulnerability in HTML Help ActiveX Control Could Allow Remote Code Execution (928843)
Executive Summary
This update resolves a vulnerability in HTML Help that could allow remote code execution
http://go.microsoft.com/fwlink/?LinkId=81191
Bulletin Identifier Microsoft Security Bulletin MS07-009
Bulletin Title
Vulnerability in Microsoft Data Access Components Could Allow Remote Code Execution(927779)
Executive Summary
This update resolves a vulnerability in Microsoft Data Access Components that could allow remote code execution.
http://go.microsoft.com/fwlink/?LinkId=80877
Bulletin Identifier Microsoft Security Bulletin MS07-010
Bulletin Title
Vulnerability in Microsoft Malware Protection Engine Could Allow Remote Code Execution (932135)
Executive Summary
This update resolves a vulnerability in the Microsoft Malware Protection Engine that could allow remote code execution
http://go.microsoft.com/fwlink/?LinkId=82708
Bulletin Identifier Microsoft Security Bulletin MS07-014
Bulletin Title
Vulnerabilities in Microsoft Word Could Allow Remote Code Execution (929434)
Executive Summary
This update resolves vulnerabilities in Microsoft Word that could allow remote code execution.
http://go.microsoft.com/fwlink/?LinkId=82736
Bulletin Identifier Microsoft Security Bulletin MS07-015
Bulletin Title
Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (932554)
Executive Summary
This update resolves vulnerabilities in Microsoft Office that could allow remote code execution.
http://go.microsoft.com/fwlink/?LinkId=82738
Bulletin Identifier Microsoft Security Bulletin MS07-016
Bulletin Title
Cumulative Security Update for Internet Explorer (928090)
Executive Summary
This update resolves vulnerabilities in Internet Explorer that could allow remote code execution
http://go.microsoft.com/fwlink/?LinkId=79655
Important (6)
Bulletin Identifier Microsoft Security Bulletin MS07-005
Bulletin Title
Vulnerability in Step-by-Step Interactive Training Could Allow Remote Code Execution (923723)
Executive Summary
This update resolves a vulnerability in Step-by-Step Interactive Training that could allow remote code execution. User interaction is required to exploit this vulnerability.
http://go.microsoft.com/fwlink/?LinkId=73911
Bulletin Identifier Microsoft Security Bulletin MS07-006
Bulletin Title
Vulnerability in Windows Shell Could Allow Elevation of Privilege (928255)
Executive Summary
This update resolves a vulnerability in Windows Shell that could allow elevation of privilege
http://go.microsoft.com/fwlink/?LinkId=81736
Bulletin Identifier Microsoft Security Bulletin MS07-007
Bulletin Title
Vulnerability in Windows Image Acquisition Service Could Allow Elevation of Privilege (927802)
Executive Summary
This update resolves a vulnerability in the Windows Image Acquisition Service that could allow elevation of privilege.
http://go.microsoft.com/fwlink/?LinkId=77834
Bulletin Identifier Microsoft Security Bulletin MS07-011
Bulletin Title
Vulnerability in Microsoft OLE Dialog Could Allow Remote Code Execution (926436)
Executive Summary
This update resolves a vulnerability in Microsoft OLE Dialog that could allow remote code execution. User interaction is required to exploit this vulnerability
http://go.microsoft.com/fwlink/?LinkId=78518
Bulletin Identifier Microsoft Security Bulletin MS07-012
Bulletin Title
Vulnerability in Microsoft MFC Could Allow Remote Code Execution (924667)
Executive Summary
This update resolves a vulnerability in Microsoft MFC that could allow remote code execution. User interaction is required to exploit this vulnerability
http://go.microsoft.com/fwlink/?LinkId=78446
Bulletin Identifier Microsoft Security Bulletin MS07-013
Bulletin Title
Vulnerability in Microsoft RichEdit Could Allow Remote Code Execution 918118
Executive Summary
This update resolves a vulnerability in Microsoft RichEdit that could allow remote code execution. User interaction is required to exploit this vulnerability
http://go.microsoft.com/fwlink/?LinkId=80463
Please note that all of the above updates are now available from the Microsoft update website
http://update.microsoft.com/microsoftupdate/v6/default.aspx?ln=en-us
utorrent 1.6.1 is out.
SpyBot S & D Update.
AVG - 967 - 712
NOD32 - 2093
PLEASE NOTE:
In order to avoid this thread becoming unduly cumbersome, I am removing older update notices periodically.