TechNet
Products
IT Resources
Downloads
Training
Support
Products
Windows
Windows Server
System Center
Internet Explorer
Office
Office 365
Exchange Server
SQL Server
SharePoint Products
Lync
See all products »
Resources
Curah! curation service
Evaluation Center
Learning Resources
Microsoft Tech Companion App
Microsoft Technical Communities
Microsoft Virtual Academy
Script Center
Server and Tools Blogs
TechNet Blogs
TechNet Flash Newsletter
TechNet Gallery
TechNet Library
TechNet Magazine
TechNet Subscriptions
TechNet Video
TechNet Wiki
Windows Sysinternals
Virtual Labs
Solutions
Networking
Cloud and Datacenter
Security
Virtualization
Updates
Service Packs
Security Bulletins
Microsoft Update
Trials
Windows Server 2012 R2
System Center 2012 R2
Microsoft SQL Server 2012 SP1
Windows 8.1 Enterprise
See all trials »
Related Sites
Microsoft Download Center
TechNet Evaluation Center
Drivers
Compatability & Converters
Windows Sysinternals
TechNet Gallery
Training
Training Catalog
Class Locator
Microsoft Virtual Academy
Free Windows Server 2012 courses
Free Windows 8 courses
SQL Server training
e-Learning overview
Certifications
Certification overview
MCSA: Windows 8
Windows Server Certification (MCSE)
Private Cloud Certification (MCSE)
SQL Server Certification (MCSE)
Other resources
TechNet Events
Second shot for certification
Born To Learn blog
Find technical communities in your area
Support by product
Exchange Server
Forefront Server
Forefront Edge Security
Forefront Server Security
Internet Explorer
Office
SharePoint
SQL Server
System Center
Windows Server
Windows XP
Windows Vista
Windows 7
Windows 8
Other support links
Microsoft Premier Online
Microsoft Fix It Center
TechNet Forums
MSDN Forums
Security Bulletins & Advisories
International support solutions
Log a support ticket
Look up event IDs and error codes
Not an IT pro?
Microsoft Customer Support
Microsoft Community Forums
Sign in
Roger's Security Blog
As Chief Security Advisor of Microsoft EMEA - lets share interesting security information
Options
About
Email Blog Author
RSS for posts
Atom
RSS for comments
OK
Search Blogs
Tags
Cloud
Cloud Computing
Competition
Consumer
Crime
Critical Infrastructure Protection
cybercrime
Events/Training
Fun
Incident Response
Incidents
Industry Associations
Law Enforcement
Microsoft
Microsoft products
patch management
Policies
Policy
politics
Privacy
Processes
Security
Technology
Terrorism
trends
Archive
Archives
August 2013
(3)
June 2013
(4)
May 2013
(3)
April 2013
(2)
March 2013
(1)
February 2013
(2)
January 2013
(5)
December 2012
(1)
November 2012
(1)
October 2012
(4)
September 2012
(4)
August 2012
(4)
July 2012
(1)
June 2012
(3)
May 2012
(2)
April 2012
(9)
March 2012
(2)
February 2012
(2)
January 2012
(1)
December 2011
(3)
November 2011
(6)
October 2011
(11)
September 2011
(8)
August 2011
(3)
July 2011
(4)
June 2011
(8)
May 2011
(7)
April 2011
(7)
March 2011
(13)
February 2011
(18)
January 2011
(15)
December 2010
(6)
November 2010
(15)
October 2010
(15)
September 2010
(32)
August 2010
(10)
July 2010
(14)
June 2010
(18)
May 2010
(8)
April 2010
(6)
March 2010
(22)
February 2010
(5)
January 2010
(12)
December 2009
(8)
November 2009
(7)
October 2009
(11)
September 2009
(17)
August 2009
(12)
July 2009
(12)
June 2009
(13)
May 2009
(14)
April 2009
(16)
March 2009
(11)
February 2009
(12)
January 2009
(14)
December 2008
(22)
November 2008
(13)
October 2008
(22)
September 2008
(8)
August 2008
(14)
July 2008
(4)
June 2008
(16)
May 2008
(30)
April 2008
(29)
March 2008
(19)
February 2008
(16)
January 2008
(26)
December 2007
(18)
November 2007
(23)
October 2007
(11)
September 2007
(10)
August 2007
(7)
July 2007
(11)
June 2007
(11)
May 2007
(4)
April 2007
(9)
March 2007
(8)
February 2007
(8)
January 2007
(6)
April, 2009
TechNet Blogs
»
Roger's Security Blog
»
April, 2009
Sort by:
Most Recent
|
Most Views
|
Most Comments
Excerpt View
|
Full Post View
Why you should not use P2P Windows 7 Builds
Posted
over 4 years ago
by
rhalbheer
1
Comment
This is not about piracy and not about leaks and not about… I am waiting for the new RC build as you are. I am running an intermediate build between Beta and RC and would love to upgrade all my machines (including my MediaCenter) to RC. However, I refrain...
The Potential of Misinformation on the Web
Posted
over 4 years ago
by
rhalbheer
1
Comment
I am blogging, I am on Twitter , I have a Facebook-Account and many others. I am not always completely clear what the real business model and value of all the tools are but basically there is a lot of fun in it. Additionally information flows much faster...
2007 Microsoft Office Suite – Service Pack 2 released
Posted
over 4 years ago
by
rhalbheer
1
Comment
Just a quick one. We released SP2 for Office 2007. You can download it here . Roger
How much does a lost Laptop cost?
Posted
over 4 years ago
by
rhalbheer
1
Comment
I stumbled upon this study today commissioned by Intel and executed by Ponemon. They key findings were: The average value of a lost laptop is $49,246. This value is based on seven cost components: replacement cost, detection, forensics, data breach, lost...
The Carbon Footprint of Spam
Posted
over 4 years ago
by
rhalbheer
1
Comment
McAfee just published an interesting report as they are taking a different approach on Spam. They were looking at the environmental impact of Spam. So, how much energy do we have to invest in order to fight spam? These are the key findings from their...
RSA Keynote by Scott Charney, VP Trustworthy Computing
Posted
over 4 years ago
by
rhalbheer
Scott held a keynote during RSA this week. Here you find the webcast (it is about 30 minutes) – definitely worth looking at: http://media.omediaweb.com/rsa2009/webcast_exclusive.htm?id=1_4 Roger
Finjan reports world's largest Botnet
Posted
over 4 years ago
by
rhalbheer
I guess you have read it in the meantime: There are a lot of reports out there, that Finjan found a Botnet affecting 1.9 Million computers. This is really bad – obviously. The press now started to cover this and I think we are already losing a little...
The Impact of the Downturn (part 2)
Posted
over 4 years ago
by
rhalbheer
1
Comment
Just a brief one: I wrote an article for Infosecurity which was just published in the latest version covering the economic downturn as well. It is called Time to Step Up and can be found on page 45 of the latest edition . Roger
The Impact of the Downturn on Security
Posted
over 4 years ago
by
rhalbheer
3
Comments
This is a question I often get asked: What is the impact of the economic downturn on security? I am convinced that three things will happen: Cybercrime will grow Security budgets will shrink – it is just open whether the budgets will shrink at the same...
Schedule update on Forefront
Posted
over 4 years ago
by
rhalbheer
You know that I am a big fan of what we are going to deliver with our Forefront Suite in the next version code-named Stirling. You probably heard me talking about compliance (where, from a technical perspective Forefront can play an integral part) and...
Update on Conficker Variants
Posted
over 4 years ago
by
rhalbheer
3
Comments
Over the last few day we have seen a lot of coverage about new Conficker variants. Let me give you a very brief update. But before I start, let me make sure that we are clear on one thing. In the area of security, we often see coverage about somebody...
Security Intelligence Report: “Scareware” on the Raise
Posted
over 4 years ago
by
rhalbheer
2
Comments
You know that we release our Security Intelligence Report twice an year: Today Version 6 is due. Let me try to give you an overview of the “highlights” of the report from my point of view: As I wrote in the title and as I blogged about this summer ( ...
Security Updates on Automatic Update
Posted
over 4 years ago
by
rhalbheer
2
Comments
I basically like the blogosphere. It is a way to express an opinion without having to worry (too much) about censorship. The disadvantage is that there are people who present things as “facts”, which are simply wrong. This happened Thursday on ZDNet....
Conficker – Are you infected?
Posted
over 4 years ago
by
rhalbheer
I just found this pretty clever website which bases its statement with regards to your possible Conficker infection on the information whether you are able to access certain websites: http://www.joestewart.org/cfeyechart.html Pretty clever Roger
Bill would give Obama power to shut down Internet, networks during cyber attacks
Posted
over 4 years ago
by
rhalbheer
2
Comments
Interesting: Bill would give Obama power to shut down Internet, networks during cyber attacks Roger
9 Cameroonians Arrested for Fraud
Posted
over 4 years ago
by
rhalbheer
1
Comment
Since quite a while, when I am talking to government officials (and the private sector) I am asking for new ways of collaboration between Law Enforcement and the industry in order to fight cybercrime. We are already seeing big progress when it comes to...