Welcome to TechNet Blogs Sign in | Join | Help

April 2006 - Posts

Browse here to find out more about the most recent London Geek dinner. There's another one coming up on Tuesday 16th of May - it's a Girl Geek Dinner so you'll either have to be a Girl or pursuade one to take you along! Full details of the upcoming Read More
Many people at InfoSec expressed great interest in joining a new User Group that's focused 100% on Microsoft Information Security - it's being run by MVPs (Most Valuable Professionals). We discussed the essence of the various different successful User Read More
There are many well known pieces of Malware that target Microsoft Word Macros - hence they are turned off by default in recent versions of the software. Following Yvonne's comment re. how to keep Malware off your systems we spoke to discuss how to clean Read More
Following my recent post, James has referred me to Mactopia which confirms that IE has indeed been discontinued for OSX. I'm sure this isn't exactly ground breaking news to Mac officionados. If any of you are reading this then I'd love Read More
Information is NOT Power. Timely access to accurate information can give the holder the ability to make powerful decisions. Effective Information Technology can enable the required flow of information. Inappropriate Information Security Policues, Processes, Read More
If you're planning to join either TechNet or MSDN @ our Technical Roadshow in Birmingham this week (Tuesday is Infrastructure day, Wednesday is Developer day) then I recommend considering the Train as your means of transport if you're travelling from Read More
I'm not casting aspertions on Apple's Safari browser in any way. @ InfoSec I discussed Internet Explorer 7's Phishing filter (for Windows XP and Windows Vista) - several people asked me WHY Microsoft don't provide something for the Mac to help mitigate Read More
The most popular area of discussion I experience regarding Microsoft @ InfoSec related to Bitlocker (a feature of the high-end SKUs of Windows Vista) - formerly known as Full Volume Encryption and Secure Startup. There's some interesting discussion Read More
InfoSec (uber security show in London >10,000 attendees) this week has been great fun. Hard work by the entire Microsoft and MVP team together with all the associated agencies, crew and behind the scenes folk. Our aim of giving purely technical information Read More
Andy made an interesting comment regarding his interest in Trusted Platform Module (TPM) hardware based security to compliment the software controls in his environment. I'm not familiar with the 3rd party he refers to (Wave) though can highly recommend Read More
Steve Riley's looking for your feedback on what works for you - please browse to here and give him your comments. I like smart cards and wouldn’t dream of accessing sensitive information on a machine that isn't managed by someone I trust. I don’t Read More
Click here to download Internet Explorer 7 Beta 2.  IE 7 is nearing release bringing with it a wealth of security improvements including significant re-engineering and new features including the anti-phishing filter. Much will no doubt be Read More
Browse here to register for Rafal's free event - it's running in the UK (Reading) on the 17th May. Rafal's frequently the top rated security speaker at TechEd and IT Forum. The event is described as follows: "“A typical corporate user spends an average Read More
This is the final part of a three part response to a comment made by Matt in his comment regarding the least privilege model in Windows Vista. Part 1 was: Let's review how privilege is used in Windows NT, XP, 2000 and 2003: Part 2 was: Read More
This is the second part of a three part response to a comment made by Matt in his comment regarding the least privilege model in Windows Vista. Part 1 was: Let's review how privilege is used in Windows NT, XP, 2000 and 2003: The access control Read More
Many of us are concerned about the ever increasing threat to information security and business continuity posed by malicious software. Before delving into ways to deal with malicious software it’s important to ensure that we are all familiar with the Read More
This is the first part of a three part response to a comment made by Matt in his comment regarding the least privilege model in Windows Vista. Let's review how privilege is used in Windows NT, XP, 2000 and 2003: Objects including files, services Read More
Browse here to find out more about the event. InfoSecurity (InfoSec) Europe 2006 is an exhibition and symposium held in London from the 25th to 27th April. As I've mentioned before it's a huge event - typically over 10,000 IT and security professionals Read More
Eileen's posted a nice concise description explaining "what is RPC over HTTP(S)". As we move away from requiring Virtual Private Networks (VPNs) to using Secure Socket Layer (SSL) as a transport we gain flexibility, a better user experience and a reduced Read More
The Microsoft Developer Network (MSDN) provides an excellent technical reference for terminology used in Microsoft products. You don't need an MSDN subscription to access the dictionary - just browse here Read More
Many of us are concerned about the ever increasing threat to information security and business continuity posed by malicious software. The more I study malicious software the more I believe that as an industry we need to focus our efforts upon preventing Read More
The SMS client is present on my computer (Windows XP SP2) to ensure that it's up to date with security updates. I think that's a good thing. I happen to also use Windows Update and therefore tend to have security updates on my machine before I arrive Read More
Earlier today I was asked "what is ISA Server?" - the person who asked me was completely non-technical and therefore I held off from answering "Internet Security and Acceleration Server - it's an Application Layer Firewall with integrated Cache" Read More
I encourage customers to architect machines such that data is stored in a separate partition of the hard disk – this makes it far less painful should the worst case scenario of machine rebuild be required. It’s certainly true that insidious malicious Read More
Click here to play with the Traffic Information MashUP - and here to find out what a MashUP is! In layman's terms a MashUp is where you (as an application developer) build upon an existing application - the term comes from DJ's mixing music samples. Read More
Perhaps this is obvious for a production system - you'd hardly want end-users to be able to shutdown the server. If you're using a Windows Server 2003 system on a laptop as perhaps a demo, dev or test system then you may want regular users to be able Read More
...but I have been to a Girl Geek Dinner and plan to go to more. As the name suggests they focus on the female perspective of technology. Of course I have no idea how many of you are Girl Geeks - if you are one then you can add your name to the WIKI and Read More
Security Quick Reference Guidance The Security Guidance Centers provide the most prescriptive security guidance Microsoft has to offer as well as security tools, security response information, such as security bulletins and virus alerts, to assist in Read More
The Microsoft Security Newsletter is a monthly electronic newsletter that's tailored for IT Professionals and Developers to provide the latest Microsoft Security news together with tips for getting the most from our products.  The Security Webcast Read More
Let's start with a definition to set the tone - this is one I've made up: "Effective Security is enables business to be MORE effective whilst minimising risk to an acceptable level as defined in a meaningful security policy that has teeth". Read More
Browse to our InfoSec2006 page to read about the free education sessions and debates we'll be hosting. The main InfoSec event site is the place to go to secure (no punn intended) a free place at the event - if you turn up on the day (three Read More
The Microsoft Application Security Website is a UK based resource that aims to help you write more secure code. The site includes links to the Developer Highway Code which is named after something that's only likely to make sense to those Read More
Let's get this straight to start with MICROSOFT WILL NOT BE TEACHING YOU HOW TO HACK! Our partner SPI Dynamics are experts in the field of writing secure code and helping customers to measure and improve the quality of software. The event itself Read More
Click here to read devcenter.com's post announcing that Microsoft's Virtual Server 2005 R2 is now available as a free download. There's more information available on the Microsoft Virtual Server website. For more information about Virtual Server 2005 Read More
We hope you can join us for this year's Technical Roadshow - we're visiting five destinations in the UK for a series of technical sessions. Last year's event was successful due to the involvement and interaction of each of the participants. THIS Read More
Internet Security and Acceleration Server is an established security product that's been in production environments since the year 2000. The second major release of the product was denoted "ISA 2004". ISA 2004 majors on protecting Microsoft Server applications Read More
OK so this isn't security related... It's Monday morning and I can't help but share the most amazing day's Windsurfing I've ever enjoyed. I live near London in the South East of England - this is generally the best time of year for wind though rarely Read More
At last week's PKI TechNet event in Reading several people asked how to get around the challenge of allowing multiple certificates to be used (corresponding to individual HTTPS web sites) in conjunction with ISA's web server publishing feature. For those Read More