Skip to main content

Windows 7, Windows 8.1 & Windows 10 ISO Download – MS Official Links (Product Key not included)

Just like we did some weeks ago with MS Office we share here a list of official URLs to download the ISO images of the most recent versions of Windows OS: Windows 7, Windows 8.1 and Windows 10.

Don’t worry, this is not warez or pirate software: all of these URLs come from the official Microsoft installation tools or are a link to download the tool itself. This also means that if you want to activate the software after installing it you still need to purchase a valid Product Key (not included) from the Microsoft Store or from any official reseller.

If you want to download the ISO images for the latest versions of Microsoft Office (Office 2010, Office 2013, Office 2016 and Office 365) you can also check this post.

Read More

Visual Studio 2017, VS2015, VS2013, VS2012, VS2008, VS2005, VS2003 and VS6 Offline Installers & ISO files for download (All Versions)

Some weeks ago we published a rather comprehensive list of all Microsoft Visual Studio Build Numbers, Version IDs and Default Paths from VS6 to VS2017. For those who keep asking where they can download the ISO files of the older builds, we put together this far-from-complete list containing some of the most known official direct download links for the offline installers and/or ISO files, together with service packs and support files.

IMPORTANT: Let’s make it clear, this is not warez or pirate software: what we’re giving here is merely a list of links to some official Microsoft distributions offline installers public links collected from Google, StackOverflow and some MS support sites & forums.

If you want to add a new direct download link or make us aware of a broken one, write it on a comment and we’ll act accordingly adding or deleting the respective URL. It’s worth noting than we will only accept official links from any certified Microsoft-owned website.

Read More

MS Outlook blocked access to potentially unsafe attachments – How to fix it

If you’ve stumbled upon this post, you most likely experienced one of the nasty new MS Outlook security features shipped with the june 2017 security update, which blocks file attachments containing two or more consecutive periods or an exclamation mark in their name or extension. Here’s the offending message:

Outlook blocked access to the following potentially unsafe attachments: filename.ext

As we already said, the culprit in this case is to be found in the latest MS security patches released after the ever-growing malware threat, which greatly excalated within the past few months. We’re basically talking about a regression bug here, which is rather common in these kind of scenarios: the urge of preventing the user from compromising the system with potentially bad behaviours ends up with blocking a number of other legitimate and perfectly safe activities, such as opening most of these files.

Luckily enough, Microsoft acknowledged the issue and has already released a number of patches to overcome the issue. Too bad that they left out some Outlook builds – such as Outlook 2007, which is still vastly used worldwide – but at least it’s a start.

Here are the patches currently available at the date/time of writing:

Read More

MS Outlook – E-Mail message stuck in Outbox folder: how to fix it

Sometimes, when you send an e-mail message using MS Outlook, it might happen that it gets stuck in your Outbox folder: such a scenario happens to be fairly common when the e-mail message has some rather big attachments (2mb or more).

The issue is often due to the fact that Outlook seems to be unable to move the e-mail message from the Outbox folder to the Sent folder – which is something that happens after the e-mail message has been actually sent: this makes it even worse, because it means that there’s an high chance that the receiver will be flooded by a number of identical e-mail messages until we figure out how to get rid of the problem.

The fix, needless to say, is to find a way to delete the offending message from the Outbox folder: problem is, MS Outlook won’t usually allow to delete message that are in the process of being sent… or moved to the Sent folder… Which takes us back to square one. When this happens, even restarting MS Outlook or even rebooting the machine won’t fix the issue, because the software will most likely go in auto-send (and auto-move in Sent folder) mode right after its initialization… thus blocking the offending message there.

Read More

WannaCry Malware Official Patches – All Windows Versions from Microsoft Technet

If you stumbled upon this post you most certainly know about the recent Ransomware called Ransom:Win32/WannaCrypt, better known as WannaCry, and you want to know if your system is immune to it. To keep it short, there’s a high chance you already are… as long as you patched your OS on regular basis. The SMB Vulnerability Jump which has been exploited by WannaCry/WannaCrypt has been patched since March 2017 and distribuited through the standard Windows Update feature.

If you didn’t patch – as most international companies who have been impacted – you should really spend some valuable time in doing that just now by going to the official Technet resource page for MS17-010 Jump. There you will find all patches for all Windows versions including Windows 10, Windows Server 2003, Windows Server 2008, Windows Server 2012, Windows Server 2012 R2 and Windows Server 2016.

As soon as you did that, you might also want to do the following, as suggested by this other Technet blog post:

  • Check if your system is protected using this Powershell script in order to ensure that you performed the update properly.
  • Block SMB incoming connections (Port 445) from External – Internal Network on Edge Firewalls
  • Upgrade legacy systems to latest OS (Windows 10 , Better Inbuilt protections – Credential Guard, Device Guard, Memory Protections, Secure Kernel, VBS, Edge Browser etc).
  • Microsoft just released emergency security updates/fixes for legacy systems as well (Windows XP , Server 2003 etc). Download links are below (and also in the aforementioned Technet page).

For additional technical info about the malware, I can only suggest reading the following posts from MMPC, FireEye and Technet:

And these are the links for legacy systems:

Read More