Jane Lewis's Weblog

Platforms, Active Directory,Administration, Management,Women in Technology, Random Thoughts

Browse by Tags

Related Posts
  • Blog Post: Checking if you Conficker

    Hello Again, I got a really good tip from a Colleague Richard Diver the other day which helps verify whether a customer had the conficker virus. This was a tip passed on to him by Lesley Kipling a Senior Support Engineer within Microsoft Security team in the U.K. Top Tip To prevent panicking your customer...
  • Blog Post: Internet Safety and your Child plus other musings

    One of the most interesting and thought Provoking sessions I attended @ Teched was by Laura Chappell. Her session on Internet Safety was absolutely excellent plus also her session on "Why the network is slow ". This can be viewed from this location webcast . I also recommend you check out her website...
  • Blog Post: Interesting Issue with Major Implications

    Hi , I had an interesting issue with a customer recently. After a recent promotion of a couple of Domain Controllers , it came to light some time later that users were able to set their passwords to 0 e.g. minimum password length = 0. On investigation what was discovered was the following. When the Domain...
  • Blog Post: Fascinating Roots to our Cipher Code Cracking Past

    I seem to be on a run of recommending books, oh well must be that time of year. Anyway one fact you my not know about me is that I used to be in the Royal Navy working in Radio Telecommunications. Therefore I have a background in using Cipher and One time pads and Encryption Technologies. This has been...
  • Blog Post: Microsoft Security Advisory 971492 this may help

    Hi Everyone, If you have received this Security Alert 971492 and you wish to verify whether your IIS 6.0 Web Servers have the Webdav Extension enabled, then please see below for a useful script which you can run across your environment. Please of course test this in a pre-production environment prior...
  • Blog Post: Now remember Wipe your Disk !

    There was recently some articles in the press that received allot of coverage regarding UK Bank details being sold in Nigeria, due to the fact that old recycled PCs had not had their hard disks adequately wiped. Well this got me thinking as both in my personal life and work life I have recently donated...
  • Blog Post: Security it is All our responsiblity

    I came across at the weekend a really interesting article on Wserver News The article that caught my eye talks not only about Bump Keys , but also the physical security, or lack of it for laptop locks . It certainly made me sit back and think, especially after reading Stephen Lambs blog on "where do...
  • Blog Post: Making things a bit clearer about Security Essentials

    I had a few “Hit the button at the wrong time” issues :) with my post about Security Essentials the Other day. So I wanted to make a few things clear.   1. This is the replacement for ONECARE – although we will be supporting customers until the end of their current subscription. 2. Security Essentials...
  • Blog Post: Safer Internet Day 9th February 2010

        Being a Mum of two young boys who avidly use the Facebook, MSN, Online Gaming, Mobile phones I am very aware of the importance of keeping them safe online and clear about what to do if they feel uncomfortable in any way. On the 9th of February Microsoft are taking part in Safer Internet...
  • Blog Post: Steganography and all that !

    I like learning new words. Especially ones that have multiple connotations. The word Steganography is a great example of this. I came across this word when I was reading around security techniques and variations on cryptographic techniques. The discussion veered into security and varying techniques of...
  • Blog Post: Defender Ready to roll

    John Westworth has a nice blog on the advantages of downloading the updated version of Windows Defender . I heartily recommend this as I find one of the most annoying aspect of surfing is the amount of potential spyware that pollutes your p.c. and eventualy chokes it to a standstill. It is one of the...
  • Blog Post: How to modify a system owned object

    Hello, I had an interesting customer request recently that I thought I would share with you. Prior to an upgrade to 2003 they had an account which was used for Remote Desktop Users. On upgrading to 2003 this account became replaced by a System Owned Object with exactly the same name. So their question...
  • Blog Post: Get Safe Online

    My two boys are growing up fast and as a consequence are using the computer more and more. I think I am a responsible parent who is pretty Internet and security savvy and ensure they are exposed to an Internet Environment that I monitor and control. However not everyone is as I.T. Literate plus also...