Microsoft Office 2010 Patch Archives

Microsoft Office 2010 Patch Archives

Microsoft Office 2010 Patch Archives

Microsoft Office 2010 Patch Archives

Office 2010 activation - How to rearm Office 2010

Office 2010 activation is a new topic that many users and admins face. This article explains how you can activate Office 2010 and rearm Office 2010.
Michael Pietroforte is the founder and editor in chief of 4sysops. He has more than 35 years of experience in IT management and system administration.
Latest posts by Michael Pietroforte (see all)

Update: If you have to rearm Office 2013 SP1, please read my updated article. Things are quite different with Office 2013.

This article explains how you can rearm Office 2010 and for what you need this feature.

Office 2010 is certainly the best Office suite out there. However, compared to Office 2007 it has one major drawback: Like Vista and Windows 7, Office 2010 has to be activated. However, Office 2010 behaves a little different than Windows if it is not activated. Rearming Office 2010, that is resetting the grace period, works similar as rearming Windows.

Office 2010 Reduced Functionality Mode ^

Retail versions of Office 2010 will only run in Reduced Functionality Mode (RFM) after the grace period of 30 days has been exceeded. In RFM Office, documents can only be viewed but not modified.

Volume editions of Office 2010 don't have an RFM. However, Office will start nagging users with messages after 25 days. You can just imagine how many helpdesk calls it will provoke if you don't ensure that Office 2010 has been activated during this grace period.

Activating Office 2010 ^

You can use the latest version of the Key Management Host (KMS) or activate Office 2010 with VAMT. Either way shouldn't be doable within 25 days after the installation.

However, it might be difficult to activate Office 2010 during the grace period if you deploy a pre-installed Office with an OS image. The grace period begins immediately after you installed Office 2010 on your master PC. If you have to perform other configurations before you create the master image, then it is quite possible that 25 days is too short. You also have to take into account that it might take some time until Office finds a KMS host or until you activate it manually.

This is where Office 2010 rearm comes in. This features allows you reset the grace timer to 30 days grace. If you rearm Office right before you create the OS master image, you can be sure that you have the full 25 days before users will bothered with Office activation notifications or before the retail edition goes into Reduced Functionality Mode after 30 days.

How to rearm Office 2010 ^

You will find some complicated instructions on the Web of how to rearm Office 2010. Most of these articles were written before Office 2010 was released. There are also third party tools that allow you to rearm Office 2010. However, I recommend following Microsoft's instructions. This topic is too sensitive to rely on third party tools.

To rearm Office 2010, you only have to run ospprearm.exe in %installdir%\%Program Files%\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform from an elevated command prompt. "%Program Files%" has to be replaced with %Program Files (x86)% if you installed Office 2010 32-bit on Windows 64-bit.

Rearm Office 2010 - ospprearm.exe

Since you can rearm up to 5 times, you can run Office 2010 for 180 days (30 days + 5 x 30 days) without activating it, if you rearm it every time after the 30 days grace period has been reached.

Another effect of rearming Office 2010 is that the client machine ID (CMID) is reset. The KMS host uses the CMID to identify unique clients. This allows the KMS host to count Office 2010 correctly.

Rearming Office 2010 Trial ^

Office 2010 rearm could also be useful if you installed Office 2010 Trial. The Office 2010 Professional Plus Trial comes with a special activation code that will allow you to test Office 2010 for 60 days. There are reports on the web indicating that you can also rearm the trial version of Office 2010. Office 2010 Trial indeed comes with ospprearm.exe. However I doubt that rearming will work after you used the trial activation code because rearming makes only sense with an Office installation that hasn't been activated.

Office 2010 Activation Wizard

You can run Office 2010 Trial without activating it but every time you launch the Office 2010 Activation Wizard will pop up. If you cancel this dialog, you can continue using the Office application. I suppose this will only work for 30 days. If you have experience with rearming Office 2010 Trial, please let me know.

Poll: Does your organization plan to introduce Artifical Intelligence?

Read 4sysops without ads and for free by becoming a member!

Источник: [https://torrent-igruha.org/3551-portal.html]
, Microsoft Office 2010 Patch Archives
Coming soon! hacker:HUNTER: Ha(ck)c1ne - Healthcare on the Edge | Official Teaser

Launching September 25th ||| While the world went into Lockdown, cybercriminals and black-hat hackers looked at the opportunities of the situation. Attacks on hospitals, health organizations and researchers went on a steep rise. This episode of hacker:HUNTER examines how healthcare was attacked during COVID - and how solidarity formed to fight back.

Survey on industrial cybersecurity in 2020

Survey on industrial cybersecurity in 2020

Survey on industrial cybersecurity in 2020

Every security officer views remote connections to corporate systems as a potential threat. For infosec experts at industrial enterprises, and especially at critical infrastructure facilities, the threat feels very real.
Every security officer views remote connections to corporate systems as a potential threat. For infosec experts at industrial enterprises, and especially at critical infrastructure facilities, the threat feels very real.

You can’t blame them for being cautious. Industrial enterprises, for which downtime can mean damage in the millions of dollars, are tempting targets for cybercriminals of all stripes. Ransomware operators are...

Read more...

adminko-vitaminko

21 hours ago

Life of the Kaspersky Lab

Altai-2020: Chulyshman -> Katu-Yarik -> Bashkaus.

Altai-2020: Chulyshman -> Katu-Yarik -> Bashkaus.

Altai-2020: Chulyshman -> Katu-Yarik -> Bashkaus.

In this post there’ll be a lot more photos than there are words. First up – photos of the route to Chulyshman ->

We got there in a small convoy of sturdy vehicles, supplied by the Altai-Guide tourist agency (which we helped with an expedition to Chukotka a while back; the stickers on the vehicles are those left over from then).

We turn into the Chulyshman valley…

The river was at low tide, but it was anything but calm ->

The views everywhere you look – oh my gracious!

The famed Chulyshman rapids:

Not that we’d be white-water rapid-riding here. This stretch is pro-level. Mere amateurs like us – who have a bit of a paddle once every...

Read more...

adminko-vitaminko

21 hours ago

Kaspersky On The Road Again

Zerologon vulnerability threatens domain controllers

Zerologon vulnerability threatens domain controllers

Zerologon vulnerability threatens domain controllers

On August’s Patch Tuesday, Microsoft closed several vulnerabilities, among them CVE-2020-1472. The Netlogon protocol vulnerability was assigned a “critical” severity level (its CVSS score was the maximum, 10.0). That it might pose a threat was never in doubt, but the other day, Secura researcher Tom Tervoort (who discovered it) published a detailed report explaining why the vulnerability, known as Zerologon, is so dangerous and how it can be used to hijack a domain controller.

What is Zerologon all about?

Essentially, CVE-2020-1472 is a result of a flaw in the Netlogon Remote Protocol cryptographic authentication scheme. The protocol...

Read more...

adminko-vitaminko

2 days ago

Life of the Kaspersky Lab

Ode to joy – on Lake Teletskoye.

Ode to joy – on Lake Teletskoye.

Ode to joy – on Lake Teletskoye.

Lake Teletskoye fills you with rapturous joy. Its vastness, its fiord-like vistas, and of course Altai’s mysterious… vibes. Bit more info re these mysterious vibes, btw: They’re not only magically calming-soothing and encourage you to go full-on meditative “we’re-all-one, there’s-only-now”; for some reason they also… keep you from sleeping! I reckon it must be that the part of the brain that’s responsible for all the deep and philosophically pensive activity simply doesn’t permit the rest of brain any room to maneuver: it kinda just hogs all the resources, much like a very old computer antivirus ).

The lake was calm and even-surfaced when we were there,...

Read more...

adminko-vitaminko

2 days ago

Kaspersky On The Road Again

A modern take on the movie Hackers

A modern take on the movie Hackers

A modern take on the movie Hackers

Several common misconceptions hinder the widespread adoption of cybersecurity culture. One myth — hackers are really smart, so it’s pointless to fight them —was popularized in particular by the movie Hackers, released exactly a quarter of a century ago. The movie gave rise to a set of clichés still employed by the film industry.

Indeed, the movie’s misfit heroes and their adversary, Plague, an infosec expert at Ellingson Mineral, are portrayed as highly intelligent geeks able to find and exploit vulnerabilities in any information system.

For example, the main character is equally at ease breaking into a school database and a cable operator’s network....

Read more...

adminko-vitaminko

3 days ago

Life of the Kaspersky Lab

Oh my, oh my: 24 days in Altai!

Oh my, oh my: 24 days in Altai!

Oh my, oh my: 24 days in Altai!

I think I’ve mentioned in passing recently – perhaps more than once – that I took my annual summer vacation this year in Altai. But it’s mid-September already – and still no Altai series of pics and tales? Eh? But don’t worry, it’s on its way – coming up soon. The thing is, there are soooo many photos this year, and so much video too that needs professional digital editing. Still, I am today able to at least give you my traditional taster, aka, starter course, aka aperitif, as a warm-up…

First, I can tell you – no, repeat to you, since I’ve been to Altai before, and even wrote a travelogue-book about the experience – that Altai is one of the most magically...

Read more...

adminko-vitaminko

3 days ago

Kaspersky On The Road Again

Transatlantic Cable podcast, episode 160

Transatlantic Cable podcast, episode 160

Transatlantic Cable podcast, episode 160

We interrupt our regular Kaspersky Transatlantic Cable podcast programming for a look at a new documentary about the Kuril Islands.

The documentary, From Kurils with Love, is a new project from Kaspersky’s Tomorrow Unlocked that takes a look at the Kuril Islands. Check out the trailer here:

For this podcast, I sat down with my coworkers Alejandro Arango and Povel Torudd, who were on the expedition and were involved in the production of the documentary. During our 35-plus-minute conversation, we touched on everything from where the Kuril Islands are, and why they are important, to life on a boat with strangers, and what’s next for Kaspersky. For...

Read more...

adminko-vitaminko

5 days ago

Life of the Kaspersky Lab

Hi Eugene,
Greetings from Team RhymesLyrics. Hope all is well.

Pls. add our website 

https://rhymeslyrics.com
to KSN.

Thank you so much,
​Team RhymesLyrics.

RhymesLyrics

5 days ago

Ask Eugene Kaspersky

What end-to-end encryption is, and why you need it

What end-to-end encryption is, and why you need it

What end-to-end encryption is, and why you need it

In recent years, communications services ranging from WhatsApp to Zoom have announced their implementation of end-to-end encryption. What does that mean? Well, the idea of encryption is pretty straightforward: It turns data into something that cannot be read. But what does end-to-end mean? What are its pros and cons? Without getting into the underlying math and technical terms, we’ll explain it as simply as we can.

What end-to-end encryption is — and its alternatives

End-to-end encryption is the act of applying encryption to messages on one device such that only the device to which it is sent can decrypt it. The message travels all the...

Read more...

adminko-vitaminko

6 days ago

Life of the Kaspersky Lab

Transatlantic Cable podcast, episode 159

Transatlantic Cable podcast, episode 159

Transatlantic Cable podcast, episode 159

It is 2020, and an election year in the US, so Dave and I kick off this week’s Kaspersky Transatlantic Cable podcast by looking at Russian troll farms.

In this story, the FBI tipped off Facebook, which in turn took down a number of accounts tied to the Internet Research Agency. That may have stopped the accounts before the disinformation spice could flow. Staying in the land of fakeness, we jump from news to Amazon reviews. This deep dive from the media exposed some interesting things about product reviews on the e-commerce giant — in the UK, at least.

Our third story stays on the topic of things that aren’t real. Unlike politics and reviews, this...

Read more...

adminko-vitaminko

7 days ago

Life of the Kaspersky Lab

How invulnerable is Linux?

How invulnerable is Linux?

How invulnerable is Linux?

Linux is malware-free — or so many believed for many years. The delusion arose from three bases. First, Linux was a niche system, used far less commonly than Windows. Second, it was used mainly by IT pros, who are savvier than the average user. And third, given the specifics of the system architecture, malware would have to obtain root permissions somehow to cause damage, greatly complicating attacks.

However, times change, and nowadays, Linux-based systems are catching up with Windows in some areas, having long overtaken it in others. What’s more, many developers are trying to make their systems more end-user friendly by providing graphical shells and tools...

Read more...

adminko-vitaminko

7 days ago

Life of the Kaspersky Lab

Bomb threat spam

Bomb threat spam

Bomb threat spam

In late August, our mail traps started picking up some unusual blackmail messages. In them, cybercriminals claim to have planted a tetryl-charged bomb somewhere in the recipient’s office and say it will be detonated unless a ransom is paid or if police activity is observed near the building.

In reality, of course, there is no bomb — it’s an empty threat mailed indiscriminately to companies of all sizes. Cybercriminals count on scaring the victim into a knee-jerk response, because with time to think, they will realize that paying ransom solves nothing — if there is a bomb in the building, it’s not going anywhere.

In terms of structure and delivery method, this type of...

Read more...

adminko-vitaminko

8 days ago

Life of the Kaspersky Lab

Murmansk: the sunny, windless resort!

Murmansk: the sunny, windless resort!

Murmansk: the sunny, windless resort!

The other day – finally! – I was back on the road after a six-month hiatus. It wasn’t my usual globetrotting routine, but it was a trip away – on a plane. Up to Murmansk!

It was just a short trip (over a long weekend), whose main purpose was a spot of fishing in the Barents Sea. Actually (and just as I like it), there was another reason for the trip – a spot of business (discussing certain industrial cybersecurity projects). But enough about work already (more on the work topic in an upcoming post from Sochi); today – it’s all about the fishing!…

We flew (yes – it did all feel a bit alien after half a year!) into Murmansk in the dead of night, but...

Read more...

adminko-vitaminko

8 days ago

Kaspersky On The Road Again

The tracking pixel in service of cybercrime

The tracking pixel in service of cybercrime

The tracking pixel in service of cybercrime

Attackers tend to do painstaking groundwork to engineer business e-mail compromise attacks (BECs). When they pose as someone authorized to transfer funds or send confidential information, their messages need to look as close to legitimate as possible. Details matter.

We recently got our hands on an interesting example of an e-mail sent to a company employee in an attempt to start a conversation.

The text is fairly cut and dried for the type of e-mail in question. The attacker makes it clear that the sender is in a meeting, so not available by other means of communication. They do that to discourage the recipient from checking if they are...

Read more...

adminko-vitaminko

9 days ago

Life of the Kaspersky Lab

Cybersecurity – the new dimension of automotive quality

Cybersecurity – the new dimension of automotive quality

Cybersecurity – the new dimension of automotive quality

Quite a lot of folks seem to think that the automobile of the 21st century is a mechanical device. Sure, it has added electronics for this and that, some more than others, but still, at the end of the day – it’s a work of mechanical engineering: chassis, engine, wheels, steering wheel, pedals… The electronics – ‘computers’ even – merely help all the mechanical stuff out. They must do – after all, dashboards these days are a sea of digital displays, with hardly any analog dials to be seen.

Well, let me tell you straight: it ain’t so!

A car today is basically a specialized computer – a ‘cyber-brain’, controlling the...

Read more...

adminko-vitaminko

13 days ago

Life of the Kaspersky Lab

Transatlantic Cable podcast, episode 158

Transatlantic Cable podcast, episode 158

Transatlantic Cable podcast, episode 158

Dave and I kick off the 158th edition of the Kaspersky Transatlantic Cable podcast by looking at some malware that is now on — gasp — Macs.

In a new post, Patrick Wardle talks about how Shlayer malware was actually approved by Apple. So much for Macs not getting viruses. From there, we move to a story that was practically made for a TV or Netflix movie. The tale looks at espionage and how the FBI and Tesla halted a cyberattack.

Our third story heads to the gaming sector and the illicit marketplace for Fortnite accounts. After that, we discuss a vulnerability in Slack. To close out the podcast, we look at an advisory from the FBI about older daters...

Read more...

adminko-vitaminko

14 days ago

Life of the Kaspersky Lab

The film ‘From Kurils with Love’ – much of it shot from above.

The film ‘From Kurils with Love’ – much of it shot from above.

The film ‘From Kurils with Love’ – much of it shot from above.

Precisely a year ago, a group of like-minded adventurers and I took few weeks to leisurely tour Russia’s far-eastern Kuril Islands on a ship. Click on the link for plenty of pics and words about the expedition, but today I’m not writing about that, I’m writing about something else.

See, the group of like-minded adventurers I was with included a group of curious American documentary makers. Among them: the famous landscape photographer Chris Burkard, the legendary traveler-photographer-climber Renan Ozturk, the documentary filmmaker and conservationist Taylor Rees, their super-professional photography-and-film crew, plus...

Read more...

adminko-vitaminko

14 days ago

Kaspersky On The Road Again

Thin clients from a security perspective

Thin clients from a security perspective

Thin clients from a security perspective

The year 2020, with its pandemic and forced self-isolation, has raised a number of fundamentally new questions for businesses. One — has any company ever had to calculate depreciation for employees’ use of home chairs, monitors, and desks before? — has become quite relevant. The greatest burden has fallen on the IT and security departments. The former had little warning they’d have to provide staff with a remote workplace environment, and the latter needed urgently to develop new information security strategies for a world in which the security perimeter is everywhere.

Pessimists predicted the collapse of IT, but that did not happen; for the most...

Read more...

adminko-vitaminko

15 days ago

Life of the Kaspersky Lab

Cybersecurity – the new dimension of automotive quality.

Cybersecurity – the new dimension of automotive quality.

Cybersecurity – the new dimension of automotive quality.

Источник: [https://torrent-igruha.org/3551-portal.html]
Microsoft Office 2010 Patch Archives

Email retrieval fails after installing Security Patch for Outlook 2007, 2010, 2013 and 2016

Problem

Users will not be able to retrieve emails after installing the associated Microsoft Outlook Security patch, listed below, released on September 12, 2017.
  • KB4011086 Description of the security update for Outlook 2007
  • KB4011089 Security Update for Microsoft Outlook 2010. 32-Bit Edition 
  • KB4011090 Security Update for Microsoft Outlook 2013. 64-Bit Edition
  • KB4011091 Security Update for Microsoft Outlook 2016  64-Bit Edition
When this Microsoft Security patch for Outlook is installed on the client, users are unable to access archived emails.Upon double clicking on the shortcut it will open the shortcut only with the banner: "The item has archived by Enterprise vault. Click here to view the original link"

Outlook will become unresponsive, when clicking on the banner. To determine if this patch has been installed, this command may be run from an elevated command prompt ( Run as Administrator):

Cause

These Microsoft Office security updates have disabled scripts for custom forms. Enterprise Vault's archived item shortcuts are custom forms that require scripting for their retrieval functionality.

Note: Outlook clients without this patch are not affected.

Workaround

Use the DisableCustomFormItemScript and TrustedFormScriptList Registry settings to allow scripting for Enterprise Vault shortcuts. The MS article Custom form script is now disabled by default describes the usage of these settings. The Enterprise Vault custom forms that need to be added to the TrustedFormScriptList are:
IPM.Note.EnterpriseVault.PendingArchive
IPM.Note.EnterpriseVault.PendingArchive.ArchiveMe
IPM.Note.EnterpriseVault.Shortcut.DeleteMe
IPM.Note.EnterpriseVault.Shortcut.RestoreMe
IPM.Note.EnterpriseVault.Shortcut

The Registry location for these settings varies by the version of Outlook and the bitness of the operating system. For convenience, Veritas has made available a downloadable zip file containing Registry Entries (.reg) files to create the required settings to enable scripting for Enterprise Vault's custom forms on each supported version of Outlook.

To create the Registry settings on an affected machine:
  1. Download the Attached ZIP file (linked below in the Downloadssection) and extract it.
  2. Browse to the folder for the appropriate version of Outlook.
  3. Choose the .reg file for the appropriate bitness of Outlook and Windows. For example, if you are running a 32-bit installation of Outlook 2010 on a 64-bit installation of Windows, choose EVClient_OL2010x86_Winx64.reg.
  4. On the affected workstation, import the contents of the .reg file by double-clicking it or by using File > Import from the Regedit application.
  5. Restart Outlook on the affected workstation.

The Registry settings can also be applied to a large number of machines using Group Policy.

As an alternative to modifying the Registry, users can also access their archived items via Enterprise Vault Search instead of using shortcuts.

If this issue is observed for MS Outlook 2019, use the registry patch given for MS Outlook 2016 from the attachments section.

 

Solution

This issue has been addressed in the following releases:

Enterprise Vault 12.2.1

Enterprise Vault 12.3

Note: Only the Enterprise Vault Client needs to be upgraded for this fix.

Источник: [https://torrent-igruha.org/3551-portal.html]
.

What’s New in the Microsoft Office 2010 Patch Archives?

Screen Shot

System Requirements for Microsoft Office 2010 Patch Archives

Add a Comment

Your email address will not be published. Required fields are marked *