Welcome to TechNet Blogs Sign in | Join | Help

August 2005 - Posts

I received an email that was written in German - my instinctive response was to reply stating that I did not understand, then my paranoia got the better of me so I copied the text into Babelfish and found that the message was actually an attempt Read More
Harlan Carvey has written an interesting article examining misconceptions around incident response - specifically how you deal with a security breach. Like Harlan I've heard many people advocate booting a compromised machine off a LINUX boot disk to perform Read More
Some of you may have read my post "What is R2" and wondered why on earth I only posted a single (not particularly funny) line entry. Many people ask me about R2 and so I figured I'd write a meaningful post - unfortunately I accidentally posted it as it Read More
Nothing to do with D2 before anyone asks!   Read More
 Eileen's posted an interesting entry that links to an interesting webcast by Dave Field (Programme Manager from Redmond for the Mobile Devices Product Group) that explains the new features of Windows Mobile 5 (including the "Messaging and Security Read More
The BBC have recorded a series of very short film clips as part of their "Video Nation" programme - the series is named "BBC Voices" and highlights of it may be used on radio and television in the UK during the week of 22nd August. My film clip looks Read More
MSN Screensaver is now available for free by clicking here - the software is a beta version. I like the screensaver as it includes an RSS aggregator that lists a summary of the latest posts (of blogs you've expressed an interest in). It also links Read More
John Howard is the track owner for core infrastructure - he's been really busy lining up lots of interesting sessions the vast majority of which will be level 400 (deeply technical). If you have suggestions for topics you'd like to see then follow Read More
I'm building a test lab that requires a number of Windows Server 2003 Server Pack 1 virtual machines and hence I've built a single image and have replicated it for each instance. To avoid the problem of each machine having the same identity (computer Read More
I'm a firm believer that running with minimal privileges/rights is a good thing from a security perspective. The challenges of running legacy software without Administrator rights have faced most people who've embraced this approach. Aaron Margosis' blog Read More
Four TechEd Security sessions are available for you to replay in your browser just by following the links. Click here to access the top level page which also provides links to a whole host of other webcasts. I've listed the links for the available TechEd Read More
The National High Tech Crime Unit (NHTCU) is part of UK law enforcement via the national crime squad. The NHTCU are available to investigate high tech crimes that target or originate from the UK. If you suspect that your computer Read More
There are five new planning guides which are available for free download from TechNet - these were written by experts at Microsoft to help you get the best from Windows client and server security features. The following was taken from the MSS description Read More
The next TechNet Security event in the UK is on the 8th September - we don't run events over the peak Summer holiday period - this seems like a long way in the future but I'm sure it will be here in no time. You will get the opportunity to discuss these Read More
For many organisations the challenge of reducing the number of people with administrative rights and the number of instances when those rights are used is a huge challenge. The authors of the majority software seem to assume that the user will be logged Read More