Welcome to TechNet Blogs Sign in | Join | Help

March 2006 - Posts

Dave Sayers has written an article that takes a look at the automated patching mechanisms provided by Microsoft. Browse here to view the article for yourself. Dave looks at MBSA, SMS and WSUS in clear concise terms. Read More
Browse here  to find out how to create a muglet  together with a personalised song - you can send it to whomever you choose! Nothing to do with Security but I thought you'd enjoy it. I'm not going to post any more about Muglets now Read More
In a word NO! There's a thorough explaination of the logic behind this answer on the Microsoft Security Response Centre (MSRC) blog here. The MSRC own the responsibility of balancing the compromise between the risk of our customers being exploited Read More
  If you'd like to see my Muglet dance and enjoy the "music" (that term's stretching it somewhat!) then click here Thanks to Eileen for blogging about the Mobile and Embedded DevCon - that's where the Muglet creating site came from. You can Read More
Anyone who's worked as an IT Professional is likely to have faced the challenge of the need to open up access to information to third parties including customers, partners and suppliers WHILST maintaining an acceptable level of information security. Read More
  Brian Tucker is doing a great job of helping the IT PRO community to help itself by hosting your short video demonstrations of how to solve technical problems - otherwise known as blogcasts. The beauty of blogcasts is that you can easily create Read More
Browse here to view Michael Kleef's post linking to some excellent security webcasts for both developers and IT Pros. The webcasts include sessions on network isolation/protection and identity management - they are well worth taking a few minutes Read More
Browse here to read a new interesting security blog written by Paul Vincent - he's titled it "Secure I.T or lose IT" which I particularly like.Paul blogs about "Microsoft security and how we can stop the bad guys from stealing our stuff" - it's well Read More
There's a great deal of chatter on the web with regard to "a new CTP" (Community Technology Preview) of Windows Vista. Personally I'm participating in a Microsoft Most Valuable Professional (MVP) community gathering - just like online there's a great Read More
I've read some entertaining posts about IE 7 beta 2 comparing it to some other browsers. One in particular made me laugh though I can't post it as it included an expletive ;-( and I don't want to offend anyone. I've been surprised by the number of children Read More
I stumbled across a series of step by step migration guidance at the following link. The content is described as follows: "These step-by-step guides will assist IT Professionals in deploying or migrating to Windows Vista. These guides will also provide Read More
I've thoroughly enjoyed watching the MIX06 keynote Live from Las Vegas. Very soon you will be able to view an on demand version at your leisure. Prepare to be amazed at how easily you'll be able to take advantage of the exciting features provided by Read More
Ian has posted about a University in Brazil that has successfully deployed IPsec based network isolation to a thousand desktops in only two days! Ian links directly to a case study article that explains how they went about the task of segmenting their Read More
There are only a few places left! Click here to browse to the event site where you can view the agenda and register. The event itself is taking place near Cardiff in Wales next week. I've seen the presentation decks of some of the other presenters Read More
Trojan horses (software that includes "features" that may work against the user's intentions) are hardly new, nor are keyloggers. I find it interesting that the "My Anti Spyware" blog includes a post detailing reports of an apparently malicious website Read More
Thanks to the "MyAntiSpyware" blog for an interesting article talking about the importance of running Windows without administrative rights for day to day activities. Browse here to read the details for yourself. The author in turn refers to a recent Read More
Keystroke loggers take the form of hardware or software that record the keyboard activity of the target system. There's an interesting article discussing both hardware and software keystroke loggers on the InternetSecurityOnline blog. Reading the Read More
I've spoken to many IT Professionals to find out whether there's a security user group in the UK that provides the opportunity to meet peers and share ideas - I've not been able to find one in the UK though have found many active groups in America. Am Read More
Thanks to Tony Soper for his recent post on Internet Security and Acceleration's quarantine tool Windows Server 2003 Service Pack 1 provides support for network quarantine which can be used to ensure that client computers meet to core aspects of your Read More
Those of you who are taking advantage of the Remote Access Quarantine feature of Windows Server 2003 SP1 may be familiar with establishing a remote VPN connection via Connection Manager along the lines illustrated below. The Quarantine Read More
Click here to browse to the search portal which enables you to search by keyword across all TechNet and MSDN blogs. It's a handy site as you can search for blogs with specific keywords in their title (hence you can find all security oriented blogs) Read More
Security Configuration Wizard (SCW) makes it so easy to roll back a policy that I nearly didn't record this blogcast. I went ahead as I appreciate that you may not have had chance to try this for yourself and it's always nice to see someone else demonstrate Read More