Feeds

Vista SP1 kills and maims security apps, utilities

Check security software before installing

Choosing a cloud hosting partner with confidence

Microsoft has admitted that Windows Vista service pack one (SP1) renders useless a number of well-known third party security products.

Redmond said in a knowledge base article yesterday that due to "reliability" issues with Vista SP1, it has been forced to prevent some security products from running after the service pack is installed.

So, customers who currently have versions of Jiangmin KV Antivirus or Trend Micro's Internet Security on their Vista computers will no longer be able to use the software, which are suppose to safeguard their machines against hackers and malware, after SP1 is installed.

The two other security products deemed by Microsoft to make Vista SP1 "unreliable" are versions of BitDefender AV and Zone Alarm Security Suite.

It added that it has put a block on Fujitsu's Shock Sensor utility, which protects laptop hard-drives against sudden shocks.

Microsoft also pinpointed a number of products that simply won't work after the service pack, which is expected to be available for download to everyone by the middle of next month, has been installed.

Versions of Iron Speed Designer, Xheo Licensing, and Free Allegiance software are on that particular blacklist.

Meanwhile, Novell's ZCM Agent and the New York Times reader software are among the products listed as having severely reduced functionality post Vista-SP1.

Microsoft said in the article: "A program may experience a loss of functionality after you install Windows Vista SP1. However, most programs will continue to work as expected after you install Windows Vista SP1."

This latest embarrassing cock-up comes just days after Microsoft snatched back a key pre-requisite update for Vista SP1 from its Windows Update website.

It was forced to suspend distribution of its servicing stack KB937287 update after customers complained that their PCs wouldn't boot up properly once it had been applied. ®

Internet Security Threat Report 2014

More from The Register

next story
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Microsoft: Your Linux Docker containers are now OURS to command
New tool lets admins wrangle Linux apps from Windows
Facebook, working on Facebook at Work, works on Facebook. At Work
You don't want your cat or drunk pics at the office
Soz, web devs: Google snatches its Wallet off the table
Killing off web service in 3 months... but app-happy bonkers are fine
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Seattle children’s accelerates Citrix login times by 500% with cross-tier insight
Seattle Children’s is a leading research hospital with a large and growing Citrix XenDesktop deployment. See how they used ExtraHop to accelerate launch times.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?