TechNet
Products
IT Resources
Downloads
Training
Support
Products
Windows
Windows Server
System Center
Internet Explorer
Office
Office 365
Exchange Server
SQL Server
SharePoint Products
Lync
See all products »
Resources
Curah! curation service
Evaluation Center
Learning Resources
Microsoft Tech Companion App
Microsoft Technical Communities
Microsoft Virtual Academy
Script Center
Server and Tools Blogs
TechNet Blogs
TechNet Flash Newsletter
TechNet Gallery
TechNet Library
TechNet Magazine
TechNet Subscriptions
TechNet Video
TechNet Wiki
Windows Sysinternals
Virtual Labs
Solutions
Networking
Cloud and Datacenter
Security
Virtualization
Updates
Service Packs
Security Bulletins
Microsoft Update
Trials
Windows Server 2012 R2
System Center 2012 R2
Microsoft SQL Server 2012 SP1
Windows 8.1 Enterprise
See all trials »
Related Sites
Microsoft Download Center
TechNet Evaluation Center
Drivers
Compatability & Converters
Windows Sysinternals
TechNet Gallery
Training
Training Catalog
Class Locator
Microsoft Virtual Academy
Free Windows Server 2012 courses
Free Windows 8 courses
SQL Server training
e-Learning overview
Certifications
Certification overview
MCSA: Windows 8
Windows Server Certification (MCSE)
Private Cloud Certification (MCSE)
SQL Server Certification (MCSE)
Other resources
TechNet Events
Second shot for certification
Born To Learn blog
Find technical communities in your area
Support by product
Exchange Server
Forefront Server
Forefront Edge Security
Forefront Server Security
Internet Explorer
Office
SharePoint
SQL Server
System Center
Windows Server
Windows XP
Windows Vista
Windows 7
Windows 8
Other support links
Microsoft Premier Online
Microsoft Fix It Center
TechNet Forums
MSDN Forums
Security Bulletins & Advisories
International support solutions
Log a support ticket
Look up event IDs and error codes
Not an IT pro?
Microsoft Customer Support
Microsoft Community Forums
Sign in
Roger's Security Blog
As Chief Security Advisor of Microsoft EMEA - lets share interesting security information
Options
About
Email Blog Author
RSS for posts
Atom
RSS for comments
OK
Search Blogs
Tags
Cloud
Cloud Computing
Competition
Consumer
Crime
Critical Infrastructure Protection
cybercrime
Events/Training
Fun
Incident Response
Incidents
Industry Associations
Law Enforcement
Microsoft
Microsoft products
patch management
Policies
Policy
politics
Privacy
Processes
Security
Technology
Terrorism
trends
Archive
Archives
August 2013
(3)
June 2013
(4)
May 2013
(3)
April 2013
(2)
March 2013
(1)
February 2013
(2)
January 2013
(5)
December 2012
(1)
November 2012
(1)
October 2012
(4)
September 2012
(4)
August 2012
(4)
July 2012
(1)
June 2012
(3)
May 2012
(2)
April 2012
(9)
March 2012
(2)
February 2012
(2)
January 2012
(1)
December 2011
(3)
November 2011
(6)
October 2011
(11)
September 2011
(8)
August 2011
(3)
July 2011
(4)
June 2011
(8)
May 2011
(7)
April 2011
(7)
March 2011
(13)
February 2011
(18)
January 2011
(15)
December 2010
(6)
November 2010
(15)
October 2010
(15)
September 2010
(32)
August 2010
(10)
July 2010
(14)
June 2010
(18)
May 2010
(8)
April 2010
(6)
March 2010
(22)
February 2010
(5)
January 2010
(12)
December 2009
(8)
November 2009
(7)
October 2009
(11)
September 2009
(17)
August 2009
(12)
July 2009
(12)
June 2009
(13)
May 2009
(14)
April 2009
(16)
March 2009
(11)
February 2009
(12)
January 2009
(14)
December 2008
(22)
November 2008
(13)
October 2008
(22)
September 2008
(8)
August 2008
(14)
July 2008
(4)
June 2008
(16)
May 2008
(30)
April 2008
(29)
March 2008
(19)
February 2008
(16)
January 2008
(26)
December 2007
(18)
November 2007
(23)
October 2007
(11)
September 2007
(10)
August 2007
(7)
July 2007
(11)
June 2007
(11)
May 2007
(4)
April 2007
(9)
March 2007
(8)
February 2007
(8)
January 2007
(6)
March, 2008
TechNet Blogs
»
Roger's Security Blog
»
March, 2008
Sort by:
Most Recent
|
Most Views
|
Most Comments
Excerpt View
|
Full Post View
Still undecided about Vista?
Posted
over 5 years ago
by
rhalbheer
1
Comment
To Vista or not to Vista – a question quite some enterprises are asking these days. Mark Russinovich recently hosted a roundtable to discuss Vista deployments including its challenges with different people: Customers who have already deployed as well...
Open Government Data Principles
Posted
over 5 years ago
by
rhalbheer
In December about 30 government advocates assembled to decide on - what they called - Open Government Data Principles. Even though the group was very US focused (if you look at the list of participants ), the outcome is very interesting. I quote the main...
Pricelist for Botnets
Posted
over 5 years ago
by
rhalbheer
It is not new and I blogged several times on it: If you own a botnet, you can make quite some money. As the Law Enforcement is going after the bot herder I would not suggest you to enter this business, nevertheless. I just read an article today with...
SPAM moving to SMS?
Posted
over 5 years ago
by
rhalbheer
Well, I do not hope and I do not expect it to. Why? Well, mobile text messages are not free – mails are (at least kind of). Nevertheless, if the "vulnerability" is within the mobile provider, all of a sudden, SMS could become a real SPAM channel. Recently...
Safari to crash XP
Posted
over 5 years ago
by
rhalbheer
Not only that it is "forced" on the clients – it seems even to crash Windows XP machines: Safari 3.1 Crashes On Windows XP, Users Complain – and now I stop complaining Roger
Sun and Apple Updates – A Sheer Nuisance!! – Part 2
Posted
over 5 years ago
by
rhalbheer
1
Comment
Quite some of you read my initial post on that – and I like the comments I got. Now, it seems that I am not the only one being angry: I quote from What Microsoft can teach Apple about software updates For the record, I think Apple is dead wrong in...
Vulnerability in Microsoft Jet Database Engine (Jet) Could Allow Remote Code Execution
Posted
over 5 years ago
by
rhalbheer
I usually do not blog on Advisories we release as I guess that you subscribed to the corresponding alerts. If not, you should do that now here . This one is a little bit different as I know that quite some people within Microsoft are working during...
Sun and Apple Updates – A Sheer Nuisance!!
Posted
over 5 years ago
by
rhalbheer
9
Comments
As you all know: I rarely blog on competitors and – even rarer – blog about them negatively. But this time I definitely had to: As most of us I have QuickTime on my PC as well as a Java VM. I know that there are alternatives for this software and the...
New Technology ending Hardware Piracy?
Posted
over 5 years ago
by
rhalbheer
I just read an interesting article on a new hardware technology that – the patent owner hope – would end piracy on Integrated Circuits. Obviously, piracy s not only a software problem…… New Tech Fights Chip Piracy With Virtual Lock and Key Roger...
Technology to Circumvent Censorship
Posted
over 5 years ago
by
rhalbheer
3
Comments
Well, I was thinking hard whether I shall blog on that or not. But then a friend of mine brought up a valid point: I am always claiming that a lot of issues on the Internet are missing a public debate yet, what is more important - and this might well...
A New Model to Taylor your Testing
Posted
over 5 years ago
by
rhalbheer
I guess you know the problem: You ran a development project and have to test the code (if the testing phase did not already have to be cut significantly as you ran out of time – too often seen with projects at customer sites…). A German research now has...
New Privacy-Technology enables new (private) Business Models
Posted
over 5 years ago
by
rhalbheer
We announced it recently: Be acquired the U-Prove technology by a company called Credentica and quite some key members of Credentica have joined us. When we announced it, my excitement was – well – limited. It was another company we bought. But when I...
Analysis of Cyber-Terror
Posted
over 5 years ago
by
rhalbheer
The US Military just released a pretty interesting in-depth article on Cyber-Terrorism and the different aspects of it. Even though it has a little bit more than 40 pages, it is worth reading: Cyber Operations and Cyber Terrorism Roger
Steve Ballmer on next revolution in computing
Posted
over 5 years ago
by
rhalbheer
Over the next time (actually starting at RSA) you will hear more from us how we see the future of security. You should watch out for Craig Mundie's keynote there. But last Monday Steve Ballmer had a speech at the CeBIT in Germany on the next revolution...
Internet Explorer 8 Beta 1 is available
Posted
over 5 years ago
by
rhalbheer
3
Comments
We just made Internet Explorer 8 Beta 1 available. This is especially important if you are developing web applications in order to test them. Os, here are the important links: IE 8 Beta 1 Readiness Toolkit Channel 9 discussion on IE8 features ...
External Collaboration Toolkit for Sharepoint
Posted
over 5 years ago
by
rhalbheer
Often exchanging information and collaborating with external people is a big challenge. Therefore we just published a Solution Accelerator called External Collaboration Toolkit for SharePoint Roger
How to handle a security crisis
Posted
over 5 years ago
by
rhalbheer
Do you know that problem: You are at the beginning of a security crisis and should be able to give an official statement but PR (or whoever is responsible to draft this statement) is not ready yet – but you really, really, urgently need something? Well...
Infoworld on Windows Server 2008 Security and Privacy
Posted
over 5 years ago
by
rhalbheer
We launched Windows Server 2008 (as you hopefully know J ). Infoweb published an article on Windows Server 2008 Security and Privacy: http://www.infoworld.com/article/08/02/27/Microsoft-touts-Longhorn-security_1.html Roger
DHS Security Level on your Webpage
Posted
over 5 years ago
by
rhalbheer
1
Comment
A blog reader sent me a mail informing me that he wrote a small application that links the DHS security level to your webpage. I added it to my news section and it looks pretty interesting. If you want to do that as well, here is the link: http://www...