Feeds

Vista SP1 kills and maims security apps, utilities

Check security software before installing

Build a business case: developing custom apps

Microsoft has admitted that Windows Vista service pack one (SP1) renders useless a number of well-known third party security products.

Redmond said in a knowledge base article yesterday that due to "reliability" issues with Vista SP1, it has been forced to prevent some security products from running after the service pack is installed.

So, customers who currently have versions of Jiangmin KV Antivirus or Trend Micro's Internet Security on their Vista computers will no longer be able to use the software, which are suppose to safeguard their machines against hackers and malware, after SP1 is installed.

The two other security products deemed by Microsoft to make Vista SP1 "unreliable" are versions of BitDefender AV and Zone Alarm Security Suite.

It added that it has put a block on Fujitsu's Shock Sensor utility, which protects laptop hard-drives against sudden shocks.

Microsoft also pinpointed a number of products that simply won't work after the service pack, which is expected to be available for download to everyone by the middle of next month, has been installed.

Versions of Iron Speed Designer, Xheo Licensing, and Free Allegiance software are on that particular blacklist.

Meanwhile, Novell's ZCM Agent and the New York Times reader software are among the products listed as having severely reduced functionality post Vista-SP1.

Microsoft said in the article: "A program may experience a loss of functionality after you install Windows Vista SP1. However, most programs will continue to work as expected after you install Windows Vista SP1."

This latest embarrassing cock-up comes just days after Microsoft snatched back a key pre-requisite update for Vista SP1 from its Windows Update website.

It was forced to suspend distribution of its servicing stack KB937287 update after customers complained that their PCs wouldn't boot up properly once it had been applied. ®

Maximizing your infrastructure through virtualization

More from The Register

next story
Whoah! How many Google Play apps want to read your texts?
Google's app permissions far too lax – security firm survey
Chrome browser has been DRAINING PC batteries for YEARS
Google is only now fixing ancient, energy-sapping bug
Do YOU work at Microsoft? Um. Are you SURE about that?
Nokia and marketing types first to get the bullet, says report
Microsoft takes on Chromebook with low-cost Windows laptops
Redmond's chief salesman: We're taking 'hard' decisions
EU dons gloves, pokes Google's deals with Android mobe makers
El Reg cops a squint at investigatory letters
Big Blue Apple: IBM to sell iPads, iPhones to enterprises
iOS/2 gear loaded with apps for big biz ... uh oh BlackBerry
OpenWRT gets native IPv6 slurping in major refresh
Also faster init and a new packages system
Google shows off new Chrome OS look
Athena springs full-grown from Chromium project's head
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.