Welcome to TechNet Blogs Sign in | Join | Help

May 2006 - Posts

Thanks to Robert McLaws for commenting on this post to correct me - the following information is obsolete - please ignore! Very weird I know but the key combination you need to switch Aero Glass on / off (given that your system's configured Read More
I'm still struggling with this one. If you know of a reliable way to project or use an external monitor from Windows Vista Beta 2 with Aero Glass then please hit the comment button. I realise that most of you probably haven't had time / access to the Read More
OK so there is a minor practical problem with Windows Vista in it's current Beta form - if you suspend or hibernate your system the display doesn't come back up (on my machine anyway). Thanks to James for sharing with me the tip to get it to come back Read More
As many of you know Aero Glass is the name given to the beautiful high-end interface of Windows Vista. As we've released Beta 2 (build 5384.4) to MSDN (and very soon to TechNet - this delta will dissapear very soon) then many of you will be able to install Read More
Thanks to Michael Howard for posting about "Windows Vista Security Enhancements". Michael's post links to a white paper that gives a relatively high level technical overview of the security systems of Windows Vista. The paper titled "Microsoft Windows Read More
TechEd for Developers and TechEd for IT Pros (Infrastructure - formely known as ITForum) are ready for early registration - if you register before 31st July 2006 you'll receive an early bird discount. The developer oriented sessions run from the Read More
According to Postini 73% of e-mail is spam! Read More
Those of you who read about our GetSafeOnline roadtrip (back in November 2005) may recall that we toured the country (actually England & Scotland) in ten branded Minis. We visited twelve Cities in ten days with the aim of spreading the word Read More
OK so this has nothing whatsoever to do with Security but it's Friday afternoon and I want to share with you the wonderful term "BlogFather" - it made me laugh when I read it. The Internet Explorer team blog is about to be lead by Anurag as Al's moving Read More
Our PressPass announcement provides more information about the stated intent to acquire Whale Communications. Whale Communications are well known as a provider of SSL VPN and Application Security Technologies. What's your view about the role Read More
Following Rafal's excellent Identity Management event in Reading today many people asked when they could hear from Kim Cameron in person - as I mentioned Kim's kindly agreed to speak at our Security Summit in London on the 5th July. As is the norm with Read More
Whilst we were on holiday a few weeks ago one of our cats was sick INTO the back of our television! She likes to sit up there as it's nice and warm. Fortunately she wasn't hurt though the TV faired less well. We were left with a dilema as we had to Read More
Browse to the Channel9 InfoCard video - it's an hour long and promises the following Nigel Watling, InfoCard Technical Evangelist, leads an in depth discussion of how InfoCard works, how it's designed (and why) and how it will evolve in the future(great Read More
Following my post about recent builds of Windows Vista I received a comment from hir8er pertaining to frustration about the cost or difficulty of getting hold of the Beta software. This is the only blog post I've written over the last couple of years Read More
I'm on 5353 which is really stable - so much so I've moved to it for my production system. Having said that the official advice remains "this is a test build and therefore shouldn't be relied upon in production". I like living on "the bleading edge of Read More
"JourneyThrough" is a term I made up last week to signify a way of linking a series of blog entries to take the reader on a journey to introduce a new technology. The idea being that the audience may be entirely new to a technology (in the dark) and Read More
There's a new hotfix for IPsec that makes life much easier for those of you who are interested in taking advantage of network traffic signing encryption and filtering. IPsec is a great way to enforce trust boundaries between groups of Server and Domains Read More
In security circles we tend to view Trust as a Binary property - either we trust someone or we don't. Our application of security controls tends to mirror this. Surely we should reflect that there are degrees of trust. I trust a very small number of intimate Read More
Richard Warren's session titled "Leveraging your Active Directory for Perimeter Defence" is available for free viewing - just follow the link. The session was described as follows: "This session highlights the advantages of using Internet Security and Read More
Thanks to Jeffrey Centex for posting about the NAP team's blog. There are some interesting posts discussing Network Access Protection (NAP) including comment from the RSA Security show. Read More
The Anti-Phishing Working group site is an excellent resource as it contains details of everything you (OK most people!) could ever want to know about Phishing. The site includes an interesting paper titled "Online Identity Theft: Phishing Technology, Read More
I'm really pleased to let you know that Michael Howard and Steve Lipner (both Microsoft security experts) have written a book detailing the Security Development Lifecycle (SDL). If it's half as good as "Writing Secure Code" then it'll be well worth a Read More
Over the coming weeks I'm embarking on a journey through the wonders and mysteries of Windows Vista's Network Access Protection (NAP). All of the content for this journey will be tagged as "JourneyThrough: Network Access Protection". Through a series Read More
Browse here to access the slides yourself. This follows yesterday's post which indicated that the links were broken - thanks to Craig et al who verified the problem. Read More
Click here to download all presentations as used for InfoSec 2006's Microsoft Security Academy. The content includes the following: Secure Messaging (PowerPoint document - 2.1 Mb)  Secure against Malware (PowerPoint document - 4.0 Mb)  Securing Read More
Spurred on by Anil John's (** Edited to correct my earlier typo - sorry Anil **) post (referred to here) here's my list of key security resources - it's not meant to be exhaustive! “Security Matters” Blog ! Prescriptive Guidance, More Prescriptive Read More
Thanks to the dotnetslackers for their post about a "Microsoft Security Resource Guide" - they link to the resource itself which is located on Anil John's blog. Anil has taken the time to put together a list of recommended resources for Microsoft Security Read More
Check out Rodney's post (he's "The Lazy Admin") detailing the changes to Group Policy in Windows Vista - we've doubled the number of Group Policy Objects! Windows XP Service Pack 2 added a wealth of new GPOs - Windows Vista goes a stage further. Read More
The following advice was provided as a comment to my earlier post - it's so useful I want to raise it's profile hence posting this: Steve, some general info for when people arrive at Birmingham International Station. Taxi fare to Motorcycle Museum is Read More