TechNet
Products
IT Resources
Downloads
Training
Support
Products
Windows
Windows Server
System Center
Internet Explorer
Office
Office 365
Exchange Server
SQL Server
SharePoint Products
Lync
See all products »
Resources
Curah! curation service
Evaluation Center
Learning Resources
Microsoft Tech Companion App
Microsoft Technical Communities
Microsoft Virtual Academy
Script Center
Server and Tools Blogs
TechNet Blogs
TechNet Flash Newsletter
TechNet Gallery
TechNet Library
TechNet Magazine
TechNet Subscriptions
TechNet Video
TechNet Wiki
Windows Sysinternals
Virtual Labs
Solutions
Networking
Cloud and Datacenter
Security
Virtualization
Updates
Service Packs
Security Bulletins
Microsoft Update
Trials
Windows Server 2012 R2
System Center 2012 R2
Microsoft SQL Server 2012 SP1
Windows 8.1 Enterprise
See all trials »
Related Sites
Microsoft Download Center
TechNet Evaluation Center
Drivers
Compatability & Converters
Windows Sysinternals
TechNet Gallery
Training
Training Catalog
Class Locator
Microsoft Virtual Academy
Free Windows Server 2012 courses
Free Windows 8 courses
SQL Server training
e-Learning overview
Certifications
Certification overview
MCSA: Windows 8
Windows Server Certification (MCSE)
Private Cloud Certification (MCSE)
SQL Server Certification (MCSE)
Other resources
TechNet Events
Second shot for certification
Born To Learn blog
Find technical communities in your area
Support by product
Exchange Server
Forefront Server
Forefront Edge Security
Forefront Server Security
Internet Explorer
Office
SharePoint
SQL Server
System Center
Windows Server
Windows XP
Windows Vista
Windows 7
Windows 8
Other support links
Microsoft Premier Online
Microsoft Fix It Center
TechNet Forums
MSDN Forums
Security Bulletins & Advisories
International support solutions
Log a support ticket
Look up event IDs and error codes
Not an IT pro?
Microsoft Customer Support
Microsoft Community Forums
Sign in
Roger's Security Blog
As Chief Security Advisor of Microsoft EMEA - lets share interesting security information
Options
About
Email Blog Author
RSS for posts
Atom
RSS for comments
OK
Search Blogs
Tags
Cloud
Cloud Computing
Competition
Consumer
Crime
Critical Infrastructure Protection
cybercrime
Events/Training
Fun
Incident Response
Incidents
Industry Associations
Law Enforcement
Microsoft
Microsoft products
patch management
Policies
Policy
politics
Privacy
Processes
Security
Technology
Terrorism
trends
Archive
Archives
August 2013
(3)
June 2013
(4)
May 2013
(3)
April 2013
(2)
March 2013
(1)
February 2013
(2)
January 2013
(5)
December 2012
(1)
November 2012
(1)
October 2012
(4)
September 2012
(4)
August 2012
(4)
July 2012
(1)
June 2012
(3)
May 2012
(2)
April 2012
(9)
March 2012
(2)
February 2012
(2)
January 2012
(1)
December 2011
(3)
November 2011
(6)
October 2011
(11)
September 2011
(8)
August 2011
(3)
July 2011
(4)
June 2011
(8)
May 2011
(7)
April 2011
(7)
March 2011
(13)
February 2011
(18)
January 2011
(15)
December 2010
(6)
November 2010
(15)
October 2010
(15)
September 2010
(32)
August 2010
(10)
July 2010
(14)
June 2010
(18)
May 2010
(8)
April 2010
(6)
March 2010
(22)
February 2010
(5)
January 2010
(12)
December 2009
(8)
November 2009
(7)
October 2009
(11)
September 2009
(17)
August 2009
(12)
July 2009
(12)
June 2009
(13)
May 2009
(14)
April 2009
(16)
March 2009
(11)
February 2009
(12)
January 2009
(14)
December 2008
(22)
November 2008
(13)
October 2008
(22)
September 2008
(8)
August 2008
(14)
July 2008
(4)
June 2008
(16)
May 2008
(30)
April 2008
(29)
March 2008
(19)
February 2008
(16)
January 2008
(26)
December 2007
(18)
November 2007
(23)
October 2007
(11)
September 2007
(10)
August 2007
(7)
July 2007
(11)
June 2007
(11)
May 2007
(4)
April 2007
(9)
March 2007
(8)
February 2007
(8)
January 2007
(6)
December, 2007
TechNet Blogs
»
Roger's Security Blog
»
December, 2007
Sort by:
Most Recent
|
Most Views
|
Most Comments
Excerpt View
|
Full Post View
The PICNIC Problem
Posted
over 5 years ago
by
rhalbheer
I hope you know the PICNIC problem ( P roblem i n C hair n ot i n C omputer) – it happened to me L . I get a significant amount of Spam-comments on my blog, which are filtered in the corresponding Spam-filter. From time to time I clean it up. Unfortunately...
How the security magic happens at Microsoft
Posted
over 5 years ago
by
rhalbheer
This is cool: Microsoft Security Elves Roger
Common Criteria and answering the “real” questions
Posted
over 5 years ago
by
rhalbheer
It seems that I am not yet gone J . Eric Bidstrup, a colleague of mine, wrote a great blog post about Common Criteria, where it does a pretty good job and where it fails. Basically he claims – and I could not agree more – that the customer "only" wants...
I am gone – now :-)
Posted
over 5 years ago
by
rhalbheer
Well, not really but I will now leave for the mountains and go skiing for the next week. Therefore, have a good time and "talk" to you in 2008 Roger BTW: Happy new year as soon as is it started!!!
Insights into our Security Vulnerability Research
Posted
over 5 years ago
by
rhalbheer
Secure Windows just started a blog which could be of interest for you as well. They will give some more insights into our vulnerability research and the outcome thereof. Definitely something worth keeping an eye on, especially if you have a technical...
Insight into IPSec
Posted
over 5 years ago
by
rhalbheer
1
Comment
I hope you enjoyed Christmas as much as I did (now working on losing weight again J ). Soon I will be in the mountains but before I leave, I found something pretty interesting to read: Tech Insight: Microsoft's IPSec Roger
Consumer Trust in e-Business
Posted
over 6 years ago
by
rhalbheer
If the light of the latest outreach we did around scam ( Lottery Scam – The voice of the victim ), Research firm Ipsos was retained to conduct research with consumers in Germany, Italy, Denmark, UK and The Netherlands. About 3'500 users were contacted...
Lottery Scam – The voice of the victim
Posted
over 6 years ago
by
rhalbheer
1
Comment
We all know that there are scammers telling you that you won in the lottery. A lot of security people think that the victims are naïve and dumb. We just started to run a story on lottery scam and part of it was an interview with a victim. The victim...
You are hacked – by your toaster :-)
Posted
over 6 years ago
by
rhalbheer
I just read this this morning Man Uses Toaster to Hack Computer . Is this now funny or scary? Roger
HP confirms vulnerabilities on 82 Laptop models.
Posted
over 6 years ago
by
rhalbheer
Remember this post OEMs: Join in to "Secure by Default" ? I wrote it in June… Now, HP just confirmed a vulnerability in their software delivered on 82 laptop models on all the different Windows versions: HP Quick Launch Buttons Critical Security Update...
“Keep Everything Clear of the Doors”
Posted
over 6 years ago
by
rhalbheer
Ed Gibson, the Chief Security Advisor in the UK just wrote an interesting article, I would like to share with you: You've seen it, read it, heard it so many times you've blocked it out … routine, mundane. . . but instinctively you take the necessary...
Have a look at Server and Domain Isolation
Posted
over 6 years ago
by
rhalbheer
I am often talking about different zones in the network and how you can create them. There is no a demo kit available for you to download and "play" with it: Server and Domain Isolation Demo Roger
Nigeria: I told you they are serious
Posted
over 6 years ago
by
rhalbheer
Remember my blog post where I told you not to forget countries like Nigeria ( I was visiting Nigeria – watch out! )? They really seem to be serious. In the last few weeks we had some troubles getting hold of the head of EFCC (I will tell you more in a...
How to Build a Bomb
Posted
over 6 years ago
by
rhalbheer
1
Comment
Well, only partly. I commented several times already about WabiSabiLabi. I especially like their statement "closer to zero risk". At the moment there is an SAP vulnerability at stake. It is initially priced on €4'000. If you read their blog, Focus on...
Once More: Only the Easiest Way is the Secure Way
Posted
over 6 years ago
by
rhalbheer
Well, my credo is well known in the meantime: We have to make it easy for users to work in a secure way. Otherwise the business (say: the users) will find ways around all our security solutions. I customer of us recently said: "I rather accept a little...
A Retrospect on my Trip to Kenya
Posted
over 6 years ago
by
rhalbheer
I asked for feedback from you and got quite some. Some privately and some publically – thank you all who took the time to answer. One of the feedbacks I heard more than once was, that you are interested in my view on the region and the security there...
Update on our Piracy Strategy - Important Changes to WGA
Posted
over 6 years ago
by
rhalbheer
3
Comments
From time to time people ask me about piracy and security. Let's start with piracy first. If you look at the 2007 Global Piracy Study by BSA , the numbers are frightening. Looking at EMEA, it starts with Moldova on 94% pirated software to Denmark with...
Windows Vista is protecting the environment
Posted
over 6 years ago
by
rhalbheer
When we launched Windows Vista, one of the features which was pointed out to me was power management and how it will lower the costs in the enterprise environment. Well, I put my focus on the security technologies (obviously) and ignored the power management...