This update prevents online files used as a part of a mail merge in Word 2002 from being accessed under improper security settings, and potentially executing macros without warning users.
Like it? Share with your friends!
Other Windows Software of Developer «Microsoft»:
Windows 2000 Desktop Separation Vulnerability In the Windows 2000 security model, a hierarchy of container objects is used to separate processes. Every session contains one or more windows stations; every windows station contains one or more desktops. By design, processes are constrained to run within
Visual FoxPro 6.0 Setup Wizard You do not need to download Setup Wizard if you have downloaded Service Pack 3. This product download contains updated Visual FoxPro 6.0 Setup Wizard files to address several reported customer issues. This version of the Setup Wizard is only for use with V
Microsoft OneNote Microsoft Office OneNote 2003 gives you an easier way to take, organize, and find your notes and information. Like paper, you can take notes anywhere on the page. Like a binder, it lets you organize your information into sections. But with OneNote 2003, yo
Windows 2000 Group Policy File Vulnerability Patch This update resolves the "Opening Group Policy Files for Exclusive Read Access Blocks Policy Application" issue affecting Windows 2000 domain controllers and is discussed in Microsoft Security Bulletin MS02-016. Download it to prevent an attacker from bloc
Microsoft Software Inventory Analyzer The Microsoft Software Inventory Analyzer (MSIA) is a tool designed to help small and medium-sized businesses inventory their key Microsoft software. It's easy to use, lets you perform the inventory yourself, and works whether you have a single computer or
Microsoft Visio Premium 2010 (64-bit) Microsoft Visio Premium 2010 (64-bit) takes diagramming to a new level with dynamic, data-driven visualization tools and templates, enhanced process management capabilities, and advanced Web sharing. Bring real-time data together from multiple sources, inc
Search Engine Optimization Toolkit for IIS (64-bit) The IIS Search Engine Optimization (SEO) Toolkit helps Web developers, hosting providers, and Web server administrators to improve their Web site's relevance in search results by recommending how to make the site content more search engine-friendly. The II
Security Update for Word 2000 (KB934392) A security vulnerability exists in Microsoft Word 2000 that could allow remote code execution. This update resolves that vulnerability. This version is the first release on CNET Download.com.What is new in this release:This version is the first release on
Encrypt Care Encrypt Care is an easy to use, but powerful encryption software which allows user to encrypt or decrypt text and files in batch mode, generate, verify and export ckecksums. Encrypt Care allows you to protect your data using the most powerful encryption al
SteadyCrypt (64-Bit) SteadyCrypt (64-Bit) is an encryption tool for quickly encrypting confidential files to prevent unauthorized usage. It supports simple drag & drop behavior to specify folders and files which are to be encrypted. The encrypted containers are secured with a
Sheet Encryptor A freeware program that does encryption for Excel spreadsheets. Does not use any built-in Excel protection construct. Instead, it alters cells values in sheets (or ranges) selected by the user. Uses an external encryption key text file that is read in b
Active Keyring Login details for Web sites and applications are stored in Active Keyring and protected with a single password. The data is encrypted and stored as an XML file on your local hard drive. When a password entry in the folder list is chosen, the username or pa
Cipherlok From the developer: "Cipherlok is a data security product that provides easy to use yet highly secure encryption of files on your PC or notebook using the Blowfish algorithm. Files or folders can be encrypted directly by right clicking them within Windows
12Ghosts Shredder Overwrite, truncate length to zero, rename, set file date to 1/1/80, and delete files and folders. Even if the file is locked!! No trails are left of any compromising or confidential information. Nobody will ever be able to recover these files. Nobody will
PasswordKeeper PasswordKeeper is designed to keep track of all you passwords safely in one convenient place. It uses sophisticated encryption to ensure that your details are kept safe. It can store Web site details, e-mail address, passwords and any other sensitive infor
nGuard Drive nGuard Drive protect safely user data from lost usb.
nGuard is secure application to protect your USB data, safely.
nGuard has a handy interface and it can create secure volume easily.Limitations:500-MB limit
Crococrypt Crococrypt is an encryption tool which mirrors complete folders to encrypted folders. The encryption algorithms that are used are AES and Twofish (256 bits, cascading). The keyfile is secured by a password using PKCS #5 (PBKDF2) with a SHA512/Whirlpool bas
File Eraser When you delete a file, Windows changes a special byte and marks the occupied space as free space. But the file contents remains unchanged on the disk. You can easily restore such a file with special software. It is not the way to delete confidential infor
Supported Operating Systems:
Windows 2000 |
Windows 98 |
Windows Me |
Windows NT |
Windows XP |
Comments on Microsoft Word 2002 Update:
Comments not found
Windows Software - Free Windows Downloads, Apps, Games, Freeware, Skype, Media Player, Antivirus, Gimp, Live, Starter for Windows XP, Vista, 7, 8, 10