0patch

@0patch

Microscopic cures for big security holes. 0patch (pronounced 'zero patch')

in every running process
Vrijeme pridruživanja: ožujak 2012.

Tweetovi

Blokirali ste korisnika/cu @0patch

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @0patch

  1. Prikvačeni tweet
    17. sij

    Enterprises and governments still on Windows 7 and Server 2008 R2! We'll keep your computers security-patched up to 3 more years. No reboots, instantly apply and remove patches while users are working, central management. Contact sales@0patch.com

    Poništi
  2. 31. sij

    How will our users running Windows 7 and Windows Server 2008 R2 learn about the status of our monthly security micropatches?

    Poništi
  3. 30. sij

    Upon popular demand, we have just ported our "CVE-2020-0674 workaround" micropatch to both 32-bit and 64-bit: Windows 10 v1903 Windows 10 v1909 Both are included in 0patch FREE

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    30. sij

    Malicious RTF files exploiting Equation Editor vulnerabilities are being detected across the globe. Everyone: 0patch FREE includes free micropatches for all known Equation Editor vulnerabilities and will block these attacks. Did I mention it was FREE? Use it.

    Poništi
  5. proslijedio/la je Tweet
    29. sij

    Project: Windows 7/Server 2008/R2 Life Extension & 0patch one month trial

    Poništi
  6. proslijedio/la je Tweet
    29. sij

    Windows 7/Server 2008/R2 Life Extension-Projekt & 0patch Probemonat Borns IT- & Windows-Blog

    Poništi
  7. 29. sij

    Deciding between 0patch and Extended Security Updates for your Windows 7 and Server 2008 R2 computers? We'll give you a one-month free trial for your entire Windows fleet so you can test us. If you don't like what you get, you can still go with ESU. Email sales@0patch.com

    Poništi
  8. 28. sij

    A good article on recent exploitation of CVE-2017-11774 by Iran-nexus threat actors from :

    Prikaži ovu nit
    Poništi
  9. 28. sij

    The micropatch is currently written for the last vulnerable version of Outlook 2016 but it will be trivial to port it to any other affected Outlook version. Anyone interested is welcome to contact us at sales@0patch.com

    Prikaži ovu nit
    Poništi
  10. 28. sij

    The micropatch simply overrides Outlook's reading of WebView settings for determining whether Home Page is enabled, and makes Outlook believe the answer is "disabled" regardless of what the Registry says. This prevents the bypass. Source code contains just one instruction:

    Prikaži ovu nit
    Poništi
  11. 28. sij

    We issued a micropatch for CVE-2017-11774, a remote code execution vulnerability in Outlook that has been widely exploited and remains popular with attackers. In contrast to official patch which could be reverted by non-admins, micropatch will reliably disable Outlook Home Page.

    Prikaži ovu nit
    Poništi
  12. 27. sij

    Banks worldwide! You now have, and will continue to have, hundreds of millions of users on Windows 7 without security updates. Buying them a 0patch license just might be a net positive for you.

    Poništi
  13. proslijedio/la je Tweet
    23. sij

    January Patch Tuesday crop looks relatively benign, if you're an individual. For admins, it's been one jolt after another. Still no working exploit for the NSA-advertised Crypto CurveBall hole. Win7 gets its butt bumped twice on the way out the door.

    Poništi
  14. proslijedio/la je Tweet
    23. sij

    I mean IDA Pro is a fine tool for analyzing a vuln but if it takes more than 24 hours to process mshtml.dll one needs to be able to make a micropatch using WinDbg only :) -2020-0674

    Poništi
  15. proslijedio/la je Tweet

    You can still get Windows 7 updates without paying a penny to Microsoft... thanks, !

    Poništi
  16. proslijedio/la je Tweet
    23. sij

    Worried about the latest JScript security hole? If MS Advisory ADV200001, CVE-2020-0674, concerns you, there’s a patch from 0patch that should be of interest. Thx

    Poništi
  17. proslijedio/la je Tweet
    22. sij

    0patch releases micropatch for Internet Explorer vulnerability -- including for Windows 7

    Poništi
  18. proslijedio/la je Tweet
    22. sij

    Governments worldwide, start your 0patch pilot now so that next year you'll pay half the price for 0patch Windows 7 security micropatches compared to ESU.

    Poništi
  19. proslijedio/la je Tweet
    22. sij

    0patch has released a micropatch for the recently disclosed Internet Explorer zero-day vulnerability. The micropatch is free for consumers

    Poništi
  20. proslijedio/la je Tweet
    22. sij

    This article on the CVE-2020-0674 0day has now been updated with new information regarding the availability of a temporary patch. Good news for and users in particular.

    Poništi
  21. proslijedio/la je Tweet

    Micropatch simulates workaround for recent zero-day IE flaw, removes negative side effects - -

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·