0patch

@0patch

Microscopic cures for big security holes. 0patch (pronounced 'zero patch')

in every running process
Vrijeme pridruživanja: ožujak 2012.

Medijski sadržaj

  1. 29. sij

    Deciding between 0patch and Extended Security Updates for your Windows 7 and Server 2008 R2 computers? We'll give you a one-month free trial for your entire Windows fleet so you can test us. If you don't like what you get, you can still go with ESU. Email sales@0patch.com

  2. 28. sij

    The micropatch simply overrides Outlook's reading of WebView settings for determining whether Home Page is enabled, and makes Outlook believe the answer is "disabled" regardless of what the Registry says. This prevents the bypass. Source code contains just one instruction:

    Prikaži ovu nit
  3. 28. sij

    We issued a micropatch for CVE-2017-11774, a remote code execution vulnerability in Outlook that has been widely exploited and remains popular with attackers. In contrast to official patch which could be reverted by non-admins, micropatch will reliably disable Outlook Home Page.

    Prikaži ovu nit
  4. 21. sij
    Prikaži ovu nit
  5. 21. sij
    Prikaži ovu nit
  6. 17. sij

    Enterprises and governments still on Windows 7 and Server 2008 R2! We'll keep your computers security-patched up to 3 more years. No reboots, instantly apply and remove patches while users are working, central management. Contact sales@0patch.com

  7. 14. sij

    So you're keeping Windows 7 or Server 2008 R2? We know you have good reasons. And we'll be happy to help you keep them as secure as possible with our security micropatches. You can completely control them or go full "set and forget" with 0patch. See

  8. 14. sij

    Existing and future 0patch users with Windows 7 and Windows Server 2008 R2! Make sure to apply today's (last) Windows Updates, preferably the Monthly Rollup which includes all previous fixes. This will prepare your computer for three years of post-EOS micropatches.

  9. 13. sij

    Tomorrow Windows 7 and Windows Server 2008 R2 get their last regular security updates! Unable to upgrade to newer Windows? We'll provide security micropatches for you for THREE ADDITIONAL YEARS! See for more information.

  10. 10. sij

    Just FOUR days until Windows 7 and Windows Server 2008 R2 get their last regular security updates! Unable to upgrade to newer Windows? We'll provide security micropatches for you for THREE ADDITIONAL YEARS! See for more information.

  11. 6. sij
  12. 4. sij

    It is now 10 days until the last regular Windows 7 and Windows Server 2008 R2 updates. If you are keeping these Windows for whatever reason, we can get you micropatches for their most critical vulnerabilities. Can we handle big orgs too? Yes we can.

  13. 23. pro 2019.

    Give your loved ones a gift of keeping Windows 7 for three more years! Install 0patch PRO on their computers and have security micropatches automatically applied as we issue them. Learn more about our "security-adopting" Windows 7:

  14. 20. pro 2019.

    This is the source code of our micropatch.

    Prikaži ovu nit
  15. 20. pro 2019.

    Less than 48 hours ago, published details of an "arbitrary file overwrite" vulnerability in Dropbox for Windows (no vendor patch available), allowing a local attacker to execute code as System. The issue doesn't have a CVE ID yet, but it now has a FREE micropatch.

    Prikaži ovu nit
  16. 2. pro 2019.

    We're happy to announce that EARLY ACCESS TO 0PATCH CENTRAL IS NOW AVAILABLE! If you have a non-trivial fleet of Windows computers to protect with our micropatches, 0patch Central is your central management solution. Request your access by sending an email to sales@0patch.com!

    Prikaži ovu nit
  17. 29. stu 2019.

    Exciting news! 0patch goes Enterprise with early access to 0patch Central on Monday. If you're interested in trying out central management of 0patch Agents, drop a note to sales@0patch.com and we'll send you an invite. (Let us know which email you're using so we can set it up.)

  18. 28. stu 2019.

    Today we issued a micropatch for CVE-2019-1429, a use-after-free vulnerability in Microsoft Scripting Engine that is being exploited in the wild. While it isn't a 0day (November Windows Updates include a fix), we decided to micropatch it for users who can't apply MS update (yet).

    Prikaži ovu nit
  19. 19. stu 2019.

    0patch Central, our central management app (think of it as "WSUS for 0patch") is coming along nicely and will soon be ready for early access. If you're considering using 0patch in a large network, please contact sales@0patch.com to get early access and some trial licenses.

    Screenshot of 0patch Central
  20. 4. stu 2019.

    Ponemon/ServiceNow report (Cost and Consequences of Gaps in Vulnerability Response): 60% respondents from organizations surviving data breach say these breaches could have occurred because a patch was available for known vulnerability but not applied.

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·