Do you use Microsoft Office and want to try Google Docs? Do you use both Google Docs and Microsoft Office? Would you like to backup and access your Office files from anywhere? Well now you can with a new service that Google has launched called Google Cloud Connect.
What this program does is it allows users to backup and share their documents that have been created with the Microsoft Office Products and use them on Google Docs. Google Cloud Connect supports Word, Excel, and PowerPoint documents in the 2003-2010 versions of Microsoft Office.
It is fairly simple to setup. All you need to do is download a little plug-in for Microsoft Office and have a Google Docs account. A little toolbar is installed and it is as simple as selecting the sync button and it will sync it up to the cloud.
Check out the video below!
Here is a simple walk through on how to add public calendars to your outlook profile.
Within your outlook, go to the bottom left corner and click on the Folder List button (figure A). This will bring up additional folders that you do not normally see (Figure B).
If you expand public folders, you will see all of the public folders for your organization. These are all hosted on the Exchange server. If you would like to add a calendar to your profile you would browse down to the calendar and add it to your favorites.
In this case, you would expand Public Folders > All Public Folders > Calendars. Inside the calendars folder is the list of available calendars. Right click the calendar you want and select add to favorites. You will see the ‘add to favorites’ dialogue, and you just click add.
Once you have added the calendar to your favorites, you should be able to go to your calendars and the calendar you just added to your favorites should be listed under “other calendars.”
You should be able to repeat this process for any other public folder calendars that you want to add to your outlook profile.
Microsoft on Tuesday released 17 updates that fix 40 separate vulnerabilities, several of which are being exploited. Only two of the updates fix vulnerabilities rated critical. The two critical updates include MS10-090, which fixes seven bugs in Internet Explorer. Every supported version of IE on every supported platform is affected by at least one critical vulnerability, and client versions have at least three. Six of the seven are memory corruption vulnerabilities and the seventh is a cross-domain information disclosure that is being exploited in the wild. At least six of these were reported by professional researchers. The second critical vulnerability is MS10-091, wihch includes three bugs in the OpenType font driver that could allow for remote code execution. All versions of Windows are affected, although on Windows XP and Server 2003 only a privilege elevation is possible. Fourteen of the remaining 15 vulnerabilities fixed today have a maximum rating of important:
* MS10-092: A local user can elevate privileges by exploiting a bug in the Task Scheduler.
* MS10-093: This is one of the Insecure DLL loading vulnerabilities, affecting Windows Movie Maker on Vista. The user would have to load an untrusted file from a network share or WebDAV site.
* MS10-094: Another Insecure DLL loading vulnerability, this one is in Windows Media Encoder. The user would have to load a WME profile (.prx) file from an untrusted network share.
* MS10-095: An Insecure DLL loading vulnerability in Windows Live Mail and Live Writer.
* MS10-096: An Insecure DLL loading vulnerability in the Windows Address Book.
* MS10-097: An Insecure DLL loading vulnerability in the Windows Internet Connection Signup Wizard in XP and Server 2003.
* MS10-098: Six separate vulnerabilities in Windows related to Kernel Mode Drivers, one publicly-disclosed, could allow a user who is logged in locally to elevate privilege.
* MS10-099: The NDProxy component of Routing and Remote Access in Windows XP add Server 2003 is vulnerable to an elevation of privilege.
* MS10-100: An error in the way the Consent User Interface in Windows Vista, Windows 7, and Windows Server 2008 processes certain registry data could lead to privilege elevation.
* MS10-101: A null dereference in netlogon in Windows Server could lead to a denial of service.
* MS10-102: An authenticated user in a guest VM could send a packet, which would cause a denial of service in Hyper/V.
* MS10-103: Five vulnerabilities in all versions pf Microsoft Publisher could lead to remote code execution.
* MS10-104: A user can trigger remote code execution on Sharepoint Server 2007 with a special SOAP request. The affected services, Document Conversions Load Balancer Service and Document Conversions Launcher Service, are not enabled by default, and the user context of the attacker would be guest with access only to the temp directory.
* MS10-105: Seven vulnerabilities in the graphics import filters in Office XP, Office 2003, the Office Converter Pack and Works 9 could allow remote code execution. In a strange move, Microsoft is recommending that Office 2007 and 2010 users apply the patch as well, even though it says those versions are not vulnerable.
* The final update, MS10-106, fixes a single vulnerability rated moderate. Authenticated users could trigger a denial of service in Exchange 2007 Server. The server would have to be manually restarted.