Phoenix IT Support

Phoenix Computer Specialists are your local tech support specialists. Contact Us today for all your “Valley Of The Sun” IT and computer support needs.

Do you have an immediate need?

 Yes No

Enter Word Verification



What do you like most about our services?

Communication.  On-site, e-mail, and telephone updates.  The online service portal further helps facilitate the communications process.

Tell us about a specific experience with us that you were happy with.

Friendly, personal service.  Midnight, middle of the week, I'm attending to a server error and Dave and Dianne show up because they "were just down the street."

What are the biggest benefits you've received or experience since hiring us?

1. Technical advisement.  Staff is able to communicate with me at "my" level.

2. Weekly support, updates, and "TLC" (our machines and me!).

Fire Chief Jim Haner
Sun City Fire District
Read more››
Your Phoenix Microsoft Partner

Phoenix Computer Support

Microsoft Moves to Eliminate Threats


On February 14, 2012, Microsoft published two security bulletins, which you can read here and here, about vulnerabilities in several of its software products such as Windows XP Service Pack 3, Windows Vista Service Pack 2 and Windows 7 for x64-based systems and Windows 7 for x64-based systems Service Pack 1, all of which received moderate severity ratings.

Those that received a critical rating – of which there are more than 20 – are, of course, the most vulnerable to “remote code execution.” As Microsoft explains it, “a remote code execution vulnerability exists in the way that the msvcrt DLL calculates the size of a buffer in memory, allowing data to be copied into memory that has not been properly allocated. This vulnerability could allow remote code execution if a user opens a specially crafted media file. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. He could then install programs; view, change, or delete data; or create new accounts with full user rights.”

Naturally, if an attacker gains access through a restricted account, she will not be able to do as much damage as one who gains access to a computer through an account with full administrative rights.

These vulnerability issues are especially relevant to people who use Internet Explorer as their default browser. The severity rating is critical for Internet Explorer 7, Internet Explorer 8 and Internet Explorer 9 users on Windows clients. For Internet Explorer 7, Internet Explorer 8 and Internet Explorer 9 users on Windows servers, the severity rating is moderate.

The good news is that hackers can’t force users to go to malicious websites. Instead, users have to be persuaded to visit malicious websites or open tainted email messages. Sometimes, the email messages themselves are clean but contain links, which lead to malicious websites, that users are invited to click.

People can access updates through the Microsoft Update and Windows Update sites or the Microsoft Download Center. According to Microsoft, those who have set their computers to seek and install updates automatically are already protected.

Microsoft acted quickly to protect its customers from harm once it detected vulnerabilities in its programs. Anyone who uses Internet Explorer 7, 8 or 9 and doesn’t have his computer set up to install updates automatically might want to act quickly.

Need help ensuring your network is as secure as possible?  Give our team of trusted IT security specialists a call immediately.

Comments are closed.