PC Advisor, Feb 2012
The professional market was also weak as austerity measures hit the education segment. Mini-notebook shipments declined more than 50 percent in the fourth quarter of , indicating the final stage in a shift away from these devices by PC vendors in the third quarter of these devices represented over 30 percent of the U.
Four of the top five vendors performed poorly. Only Apple achieved growth, which consolidated its hold on the No. The introduction of Ultrabooks in late is desperately needed," said Mr.
Executive Summaries
Table 2 United Kingdom: PC shipments in France totaled 2. In as a whole, PC shipments numbered As a result, the PC market in France recorded its sixth consecutive quarterly decline in shipments.
The consumer market declined The professional market declined 13 percent in the fourth quarter , despite a number of deals being signed in the public sector. In the fourth quarter of , the mobile PC market accounted for 68 percent of total PC shipments in France, while shipments declined 9.
Desk-based PC shipments declined Shipments of mini-notebooks decreased Of the top five vendors, only Asus and Apple grew in the fourth quarter Asus achieved the strongest growth and claimed the No. HP regained the No. Media tablets are excluded Source: PC shipments in Germany totaled 3. This was the sixth consecutive decline for the German PC market. In as a whole, PC shipments declined 11 percent from Mobile PC shipments ell 9. This decrease was steeper than that of the desk-based PC market, which declined 6 percent. After three difficult quarters, Acer regained the No.
Lenovo nearly doubled its shipments through the Medion acquisition, which helped it stay ahead of HP.
Lenovo's ThinkPad line, which used to have a high price premium, is now available at very attractive prices. In the consumer sector, Lenovo continued to expand its retail presence with its IdeaPad line. HP had to battle aggressive pricing from competitors and deal with weak consumer PC demand during the holiday season, but it remained the leader in the desk-based PC segment. Asus continued to expand its notebook line, replacing mini-notebooks with mainstream mobile PCs, but it was competing against its own very strong shipments from Dell secured several large enterprise and government deals.
It was the only top-five vendor to increase its shipments, aided by its lower reliance on the consumer business. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. If a user is logged on with administrative user rights, an attacker could take complete control of the affected system.
The vulnerabilities could allow remote code execution if a user opens a specially crafted Visio file. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the logged-on user. The following table provides an exploitability assessment of each of the vulnerabilities addressed this month.
Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included. Use this table to learn about the likelihood of code execution and denial of service exploits within 30 days of security bulletin release, for each of the security updates that you may need to install.
- PC Advisor, UK - Awards & Reviews | ZyXEL.
- Political Poetry Previously Performed At The Poor Poets Pub Primarily Picking On Professional Politicians And Other Hard-core Unemployables.
- Exploitability Index.
- PC Advisor Announces rCube as Nominee in Awards.
Review each of the assessments below, in accordance with your specific configuration, to prioritize your deployment of this month's updates. For more information about what these ratings mean, and how they are determined, please see Microsoft Exploitability Index. In the columns below, "Latest Software Release" refers to the subject software, and "Older Software Releases" refers to all older, supported releases of the subject software, as listed in the "Affected Software" and "Non-Affected Software" tables in the bulletin. Use these tables to learn about the security updates that you may need to install.
You should review each software program or component listed to see whether any security updates pertain to your installation. If a software program or component is listed, then the available software update is hyperlinked and the severity rating of the software update is also listed. Note You may have to install several security updates for a single vulnerability. Review the whole column for each bulletin identifier that is listed to verify the updates that you have to install, based on the programs or components that you have installed on your system.
This update applies, with the same severity rating, to supported editions of Windows Server or Windows Server R2 as indicated, whether or not installed using the Server Core installation option. The vulnerabilities addressed by this update do not affect supported editions of Windows Server or Windows Server R2 as indicated, when installed using the Server Core installation option. This update applies, with a lower severity rating, to supported editions of Windows Server or Windows Server R2 as indicated, when installed using the Server Core installation option.
However, as a defense-in-depth measure, Microsoft recommends that customers of this software apply this security update. NET Framework 4 and. NET Framework version 4 redistributable packages are available in two profiles: The vulnerability addressed in this update affects both. See also other software categories under this section, Affected Software and Download Locations , for more update files under the same bulletin identifier.
Zen Internet Named UK Best Home Broadband ISP in PC Advisor Survey − ISPreview UK News
This bulletin spans more than one software category. Manage the software and security updates you need to deploy to the servers, desktop, and mobile computers in your organization. Consumers can visit Security At Home , where this information is also available by clicking "Latest Security Updates". Security updates are available from Microsoft Update and Windows Update. Security updates are also available at the Microsoft Download Center.
You can find them most easily by doing a keyword search for "security update". For more information about using Microsoft AutoUpdate for Mac, see Check for software updates automatically. Finally, security updates can be downloaded from the Microsoft Update Catalog. The Microsoft Update Catalog provides a searchable catalog of content made available through Windows Update and Microsoft Update, including security updates, drivers and service packs.
By searching using the security bulletin number such as, "MS" , you can add all of the applicable updates to your basket including different languages for an update , and download to the folder of your choosing. Microsoft provides detection and deployment guidance for security updates.
This guidance contains recommendations and information that can help IT professionals understand how to use various tools for detection and deployment of security updates. For more information, see Microsoft Knowledge Base Article The Microsoft Baseline Security Analyzer MBSA allows administrators to scan local and remote systems for missing security updates as well as common security misconfigurations.
Awards & Reviews
Configuration Manager Software Update Management simplifies the complex task of delivering and managing updates to IT systems across the enterprise. With Configuration Manager , IT administrators can deliver updates of Microsoft products to a variety of devices including desktops, laptops, servers, and mobile devices.
The automated vulnerability assessment in Configuration Manager discovers needs for updates and reports on recommended actions. For more information about how administrators can use Configuration Manager to deploy updates, see Software Update Management. By using SMS, administrators can identify Windows-based systems that require security updates and to perform controlled deployment of these updates throughout the enterprise with minimal disruption to end users.
Note System Management Server is out of mainstream support as of January 12, For more information on product lifecycles, visit Microsoft Support Lifecycle. Software Distribution and Patch Management. Some software updates may not be detected by these tools. Administrators can use the inventory capabilities of SMS in these cases to target updates to specific systems. Some security updates require administrative rights following a restart of the system. Updates often write to the same files and registry settings required for your applications to run.
This can trigger incompatibilities and increase the time it takes to deploy security updates. You can streamline testing and validating Windows updates against installed applications with the Update Compatibility Evaluator components included with Application Compatibility Toolkit.
The Application Compatibility Toolkit ACT contains the necessary tools and documentation to evaluate and mitigate application compatibility issues before deploying Windows Vista, a Windows Update, a Microsoft Security Update, or a new version of Windows Internet Explorer in your environment. To improve security protections for customers, Microsoft provides vulnerability information to major security software providers in advance of each monthly security update release.
Security software providers can then use this vulnerability information to provide updated protections to customers via their security software or devices, such as antivirus, network-based intrusion detection systems, or host-based intrusion prevention systems. To determine whether active protections are available from security software providers, please visit the active protections Web sites provided by program partners, listed in Microsoft Active Protections Program MAPP Partners.
UK ISP News Archives
Microsoft thanks the following for working with us to help protect customers:. The information provided in the Microsoft Knowledge Base is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages.
Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply. February 14, Version: Bulletin Information Executive Summaries The following table summarizes the security bulletins for this month in order of severity. Important Remote Code Execution May require restart Microsoft Office Exploitability Index The following table provides an exploitability assessment of each of the vulnerabilities addressed this month.