Question about PC Desktops

1 Answer

I bought a refurbished hp computer. It came with a note that this model has a potential security vulnerability with the hp quick lanuch buttons software installed on this computer. I says, go to http://www.hp.com Search for SP38166 Slick the link under search results Download and Run I CANT FIND THE WEBSITE THAT OFFERS THIS DOWNLOAD. I went to hp.com and several of your sites. Please help

Posted by on

1 Answer

  • Level 1:

    An expert who has achieved level 1.

    Hot-Shot:

    An expert who has answered 20 questions.

    Corporal:

    An expert that hasĀ over 10 points.

    Mayor:

    An expert whose answer gotĀ voted for 2 times.

  • Contributor
  • 32 Answers

Http://h20000.www2.hp.com/bizsupport/TechSupport/SoftwareDescription.jsp?swItem=ob-56385-1&lang=en&cc=us&idx=2&mode=4&

Just paste the above link including the & symbol in your browser address bar. On the page that opens click the black download button.

Posted on May 03, 2008

Add Your Answer

Uploading: 0%

my-video-file.mp4

Complete. Click "Add" to insert your video. Add

×

Loading...
Loading...

Related Questions:

1 Answer

Error on windows xp desktop page_fault_in_nonpage_area


You receive "Stop error code 0x00000050 (PAGE_FAULT_IN_NONPAGED_AREA)" or "Stop error code 0x0000008E (KERNEL_MODE_EXCEPTION_NOT_HANDLED)" when you restart a Windows XP-based computer uparrow.gifBack to the top ' Give Feedback 20x20_grey_minus.png954211 MS08-061: Vulnerabilities in Windows kernel could allow elevation of privilege
  • 959252 Error message when you switch the operating system from a dual monitor setting to a single monitor setting on a Windows XP-based computer or on a Windows Server 2003-based computer that has the security update 954211 installed: "Stop 0x0000008E"
  • Note Update 959252 addresses a known issue that was introduced by update 954211.uparrow.gifBack to the top ' Give Feedback 20x20_grey_minus.pnguparrow.gifBack to the top ' Give Feedback 20x20_grey_minus.png824684 Description of the standard terminology that is used to describe Microsoft software updates

    Jan 06, 2014 | HP PC Desktops

    Tip

    How to keep installed software up to date, for free!


    Software installed on your computer can quickly become outdated, and security holes can leave your computer vulnerable to infection, data leakage, or worse!

    Secunia Personal Software Inspector will scan your computer, and show you which software is out of date, and even help you update your software to eliminate security issues.

    Download Secunia PSI software here:
    http://secunia.com/vulnerability_scanning/personal/

    on Jan 13, 2010 | PC Desktops

    1 Answer

    Trying get the top of my hp compaq off


    It slides right back and off. Make there is no security screw or tab in the back.

    Jan 31, 2013 | HP Compaq DC5100 3.2G40GB SFF Computer...

    1 Answer

    HP Pavilion a6110n PC won't update windows driver KB2761494


    Method 1: Disable the security software temporarily. Note: Antivirus software can help protect your computer against viruses and other security threats. In most cases, you should not disable your antivirus software. If you do have to temporarily disable it to install other software, you should re-enable it as soon as you're done. If you are connected to the Internet or a network during the time your antivirus software is disabled, your computer is vulnerable to attacks. Method 2: Place the computer in a Clean Boot state to see if there is any software conflict as clean boot helps to eliminate software conflicts. Note: After performing the troubleshooting steps in clean boot, follow Step 3 from the article to start the computer to Normal startup mode. Method 3: You can also install the updates (KB number) manually by downloading from Microsoft download center. http://www.microsoft.com/downloads/en/default.aspx Method 4: Follow the steps from the article. How do I reset Windows Update components? Hope this helps

    Jan 11, 2013 | HP Pavilion a6110n PC Desktop

    1 Answer

    Data Breach SCDOR123


    Click start control panel administrative tools computer management then select event viewer this may vary depending on what operating system you have extend the events there you will see errors in red you will no what exactly what the error was and at what time it occured Right click on the error message select properties you will see all details about the error or click start type in event viewer press ENTER you might be able work your way through the problem
    Data and security breaches Businesses store vast amounts of information. A security breach occurs when an intruder, employee or outsider gets past an organization's security measures and policies to access the data. This sort of security breach could compromise the data and harm people. There are various state laws that require companies to notify people who could be affected by security breaches.

    Physical Security Breach One form of breach is a physical security breach, wherein the intruder steals physical data, such as files or equipment that contains the data. Intruders could steal computers, particularly laptops, for this purpose. Businesses should monitor access to their property to cut down on such incidents and require employees to lock away their laptops when not in use. b> Electronic Security Breach b> Another form of breach is an electronic security breach, wherein the intruder gets into a business' systems to access sensitive data. The intruder gains such access by taking advantage of any weaknesses in the systems, such as inadequate firewall protection. This could also happen if the organization does not have adequate password protection for sensitive data. This sort of security breach is one reason businesses should perform constant security updates. b> Data Capture Security Breach b> Data capture, or skimming, is a practice whereby the intruder captures and records the data on a magnetic card stripe, such as on a credit card. This form of security breach helps the intruder produce copies of credit and debit cards. The intruder could either be an employee of a merchant who handles the customer's card, or it could be an external intruder. An external intruder could attach a device to card readers or ATM machines to skim information. b> Business Response b> Businesses should be wary of security breaches. Best practices for businesses to follow include having a policy in place to deal with any incidents of security breaches. They should identify what information has been compromised and decide who are the appropriate regulatory authorities to which they should report. Affected customers should also be notified. b> Potential Threats b> Start by identifying potential threats and vulnerabilities in your organization. Employees, temps or newly fired workers who have access to data represent one such threat. Hackers trying to crack your security are another. If your business or customer data passes into the hands of third parties -- vendors, business partners or bankers, for instance -- those parties may prove to be another weak spot. Review your security systems for any obvious flaws; Risk Analytics rates incorrectly configured firewalls as one of the top security threats. b> Calculating Risk b> Once you have a list of potential threats, document which ones represent serious risks. A low-level employee who doesn't have computer access poses less of a risk than an IT staffer with a grudge. If your company doesn't have data-handling procedures to prevent accidentally revealing customer data, that's another serious risk. When calculating the level of risk, consider all the potential negative effects, such as the loss of customers, the loss of money, having to shut down your network temporarily and the blow to your company's image. Security b> Once you document the breach risks, shore up your security to prevent them. Start with the most potentially catastrophic breaches. Preventing breaches requires more than encryption and other technical fixes: Consider the human side of security, such as employees who use easily hackable passwords or don't take security seriously. Think about the security of your business partners' operation as well as your own. If you encrypt key data and carefully regulate access, you still have a problem if your partners don't follow equally strict policies. b> Rethinking b> Never assume that, once you've documented your breach risks, you can rest easy. The information technology landscape changes constantly, creating new vulnerabilities. Mobile-payment technologies that allow shoppers to make credit and debit purchases with smartphones, for instance, are a new field. The field is growing steadily, but it lacks any common security standard. The apps are easy to develop, but developers do not always make security a priority. Review the risks created by new technology if you want to stay on top of new breach dangers. Hope this helps


    b>

    Dec 31, 2012 | PC Desktops

    1 Answer

    Hp pc motherboard is heating up v quickly


    Is the system free of dust?
    If not, you can buy a computer duster and clear out the dust. If it is, Open your case and check if all the fans are connected and spinning.

    Good luck, I hope this helps!

    Jul 15, 2012 | HP Pavilion Slimline S3123W Desktop PC -...

    1 Answer

    Why wont my hp pavilion slimline play my cds


    first go to my computer and click with the right mouse button then choose properties then hardware devices and see if the cd have an yellow icon, if so you need to upgrade your drive.
    you also can go to the hp website and on the support option you put your model and get the drivers from there, if nothing works, your cd lent is faulty or needs to bee cleaned.
    Thanks

    May 25, 2010 | HP Pavilion Slimline S3123W Desktop PC -...

    1 Answer

    Time/date/Calendar wrong


    It's the RTC battery 100% sure. Just change it.

    Apr 04, 2009 | HP Pavilion a620n (PC028A) PC Desktop

    1 Answer

    Savedump.exe error


    Hi there
    Savedump.exe is located in the folder C:\Windows\System32. The file is a Windows core system file. The program has no visible window. savedump.exe is a Microsoft signed file. Therefore the technical security rating is 4% dangerous.
    Some malware camouflage themselves as savedump.exe, particularly if they are located in c:\windows or c:\windows\system32 folder. Thus check the savedump.exe process on your pc whether it is pest. I recommend Security Task Manager for verifying your computer's security.

    If you want to get the full potential of 64bit processor then you will have install XP X64 and yes i'm sure SP3 will install.

    Good luck and thanks for using Fixya!!

    Feb 11, 2009 | HP Pavilion A1130N Athlon 64 3500+ DVD+RW...

    1 Answer

    I ran a Belarc Advisor test on my computer today. The score result was just 3.13 & fairly low. The Belarc Advisor performed a security audit of my system using the CIS Level-I benchmark appropriate...


    OS means Operating System.

    On your machine, disable Windows Firewall as it is known to conflict with Norton's Firewall and leave you disabled.

    Also, go to windows.com click on the Continue Button start downloading Windows Defender and install it.

    Then rerun your protection score and post back any change.

    Belarc is not considered to be the software to own and use for benchmarking your computer's vulnerability.

    Regards,
    Worldvet

    Aug 18, 2008 | PC Desktops

    Not finding what you are looking for?
    PC Desktops Logo

    Related Topics:

    28 people viewed this question

    Ask a Question

    Usually answered in minutes!

    Top PC Desktops Experts

    joecoolvette
    joecoolvette

    Level 3 Expert

    5660 Answers

    Brian Sullivan
    Brian Sullivan

    Level 3 Expert

    27725 Answers

    Les Dickinson
    Les Dickinson

    Level 3 Expert

    18297 Answers

    Are you a PC Desktop Expert? Answer questions, earn points and help others

    Answer questions

    Manuals & User Guides

    Loading...