Welcome to TechNet Blogs Sign in | Join | Help
If you're into Open Source and or LINUX and plan to be in the UK this weekend perhaps you'd enjoy LURadio Live 2006. There's sure to be plenty of lively debate and if last year's event is anything to go by there are likely to be in excess of six hundred Read More
  Note: I took this picture myself - it's not a fake. Clearly we don't want to use scare tactics for Information Security but my ongoing frustration with users who fail to bother locking their PC desktop sessions when leaving their machines unattended Read More
I've been browsing through my junk email - I'm not quite sure why I'm bothering to do so though sometimes I find a couple of entertaining messages. I particularly like the one that starts "Dear Member, you've been selected for a free holiday...", which Read More
At last - an interface for real people - i.e. those that aren't technical security experts. The following dialog message is part of Windows Vista   The built-in Windows Vista personal firewall settings are automatically configured according to Read More
The IE Team blog have announced that Internet Explorer running on Windows Vista will be known as Internet Explorer 7+ (IE 7+) to distinguish it from IE 7 on Windows XP. This makes sense to me as the prime additional feature of Internet Explorer on Read More
In security circles we tend to view Trust as a Binary property - either we trust someone or we don't. Our application of security controls tends to mirror this. Surely we should reflect that there are degrees of trust. I trust a very small number of intimate Read More
Browse here to access the slides yourself. This follows yesterday's post which indicated that the links were broken - thanks to Craig et al who verified the problem. Read More
Information is NOT Power. Timely access to accurate information can give the holder the ability to make powerful decisions. Effective Information Technology can enable the required flow of information. Inappropriate Information Security Policues, Processes, Read More
Click here to download Internet Explorer 7 Beta 2.  IE 7 is nearing release bringing with it a wealth of security improvements including significant re-engineering and new features including the anti-phishing filter. Much will no doubt be Read More
This is the final part of a three part response to a comment made by Matt in his comment regarding the least privilege model in Windows Vista. Part 1 was: Let's review how privilege is used in Windows NT, XP, 2000 and 2003: Part 2 was: Read More
Browse here to read a new interesting security blog written by Paul Vincent - he's titled it "Secure I.T or lose IT" which I particularly like.Paul blogs about "Microsoft security and how we can stop the bad guys from stealing our stuff" - it's well Read More
You may have seen the short video clips of Bill Gates' keynote speech at RSA 2006. If you're anything like me you'll want to find out exactly what Bill had to say for the entire speech. The transcripts of most speeches made by Microsoft executives Read More
Security Configuration Wizard has a really handy command line as I'll demonstrate in an upcoming BlogCast. To apply an SCW policy you can issue the "scwcmd configure" command. Unlike the other scwcmd commands "configure" does not default to applying Read More
I've heard of this happening from time to time but I've never experienced it myself until just now... I received a telephone call from a Bank with whom I have an account - they asked me to tell them two digits from my security code so that they could Read More
There's a wealth of webcasts available from TechEd Orlando - I know it's a while since the event but the shear breadth of content makes this a handy source of knowledge. Many of the topics remain highly relavent including the following: Michael Howard's Read More
More Posts Next page »