Roger's Security Blog

As Chief Security Advisor of Microsoft EMEA - lets share interesting security information

March, 2008

  • Sun and Apple Updates – A Sheer Nuisance!!

    As you all know: I rarely blog on competitors and – even rarer – blog about them negatively. But this time I definitely had to: As most of us I have QuickTime on my PC as well as a Java VM. I know that there are alternatives for this software and the...
  • Internet Explorer 8 Beta 1 is available

    We just made Internet Explorer 8 Beta 1 available. This is especially important if you are developing web applications in order to test them. Os, here are the important links: IE 8 Beta 1 Readiness Toolkit Channel 9 discussion on IE8 features ...
  • Technology to Circumvent Censorship

    Well, I was thinking hard whether I shall blog on that or not. But then a friend of mine brought up a valid point: I am always claiming that a lot of issues on the Internet are missing a public debate yet, what is more important - and this might well...
  • Still undecided about Vista?

    To Vista or not to Vista – a question quite some enterprises are asking these days. Mark Russinovich recently hosted a roundtable to discuss Vista deployments including its challenges with different people: Customers who have already deployed as well...
  • DHS Security Level on your Webpage

    A blog reader sent me a mail informing me that he wrote a small application that links the DHS security level to your webpage. I added it to my news section and it looks pretty interesting. If you want to do that as well, here is the link: http://www...
  • Infoworld on Windows Server 2008 Security and Privacy

    We launched Windows Server 2008 (as you hopefully know J ). Infoweb published an article on Windows Server 2008 Security and Privacy: http://www.infoworld.com/article/08/02/27/Microsoft-touts-Longhorn-security_1.html Roger
  • How to handle a security crisis

    Do you know that problem: You are at the beginning of a security crisis and should be able to give an official statement but PR (or whoever is responsible to draft this statement) is not ready yet – but you really, really, urgently need something? Well...
  • External Collaboration Toolkit for Sharepoint

    Often exchanging information and collaborating with external people is a big challenge. Therefore we just published a Solution Accelerator called External Collaboration Toolkit for SharePoint Roger
  • Steve Ballmer on next revolution in computing

    Over the next time (actually starting at RSA) you will hear more from us how we see the future of security. You should watch out for Craig Mundie's keynote there. But last Monday Steve Ballmer had a speech at the CeBIT in Germany on the next revolution...
  • Analysis of Cyber-Terror

    The US Military just released a pretty interesting in-depth article on Cyber-Terrorism and the different aspects of it. Even though it has a little bit more than 40 pages, it is worth reading: Cyber Operations and Cyber Terrorism Roger
  • New Privacy-Technology enables new (private) Business Models

    We announced it recently: Be acquired the U-Prove technology by a company called Credentica and quite some key members of Credentica have joined us. When we announced it, my excitement was – well – limited. It was another company we bought. But when I...
  • New Technology ending Hardware Piracy?

    I just read an interesting article on a new hardware technology that – the patent owner hope – would end piracy on Integrated Circuits. Obviously, piracy s not only a software problem…… New Tech Fights Chip Piracy With Virtual Lock and Key Roger...
  • A New Model to Taylor your Testing

    I guess you know the problem: You ran a development project and have to test the code (if the testing phase did not already have to be cut significantly as you ran out of time – too often seen with projects at customer sites…). A German research now has...
  • Vulnerability in Microsoft Jet Database Engine (Jet) Could Allow Remote Code Execution

    I usually do not blog on Advisories we release as I guess that you subscribed to the corresponding alerts. If not, you should do that now here . This one is a little bit different as I know that quite some people within Microsoft are working during...
  • Sun and Apple Updates – A Sheer Nuisance!! – Part 2

    Quite some of you read my initial post on that – and I like the comments I got. Now, it seems that I am not the only one being angry: I quote from What Microsoft can teach Apple about software updates For the record, I think Apple is dead wrong in...
  • SPAM moving to SMS?

    Well, I do not hope and I do not expect it to. Why? Well, mobile text messages are not free – mails are (at least kind of). Nevertheless, if the "vulnerability" is within the mobile provider, all of a sudden, SMS could become a real SPAM channel. Recently...
  • Pricelist for Botnets

    It is not new and I blogged several times on it: If you own a botnet, you can make quite some money. As the Law Enforcement is going after the bot herder I would not suggest you to enter this business, nevertheless. I just read an article today with...
  • Safari to crash XP

    Not only that it is "forced" on the clients – it seems even to crash Windows XP machines: Safari 3.1 Crashes On Windows XP, Users Complain – and now I stop complaining Roger
  • Open Government Data Principles

    In December about 30 government advocates assembled to decide on - what they called - Open Government Data Principles. Even though the group was very US focused (if you look at the list of participants ), the outcome is very interesting. I quote the main...