TechNet
Products
IT Resources
Downloads
Training
Support
Products
Windows
Windows Server
System Center
Internet Explorer
Office
Office 365
Exchange Server
SQL Server
SharePoint Products
Lync
See all products »
Resources
Curah! curation service
Evaluation Center
Learning Resources
Microsoft Tech Companion App
Microsoft Technical Communities
Microsoft Virtual Academy
Script Center
Server and Tools Blogs
TechNet Blogs
TechNet Flash Newsletter
TechNet Gallery
TechNet Library
TechNet Magazine
TechNet Subscriptions
TechNet Video
TechNet Wiki
Windows Sysinternals
Virtual Labs
Solutions
Networking
Cloud and Datacenter
Security
Virtualization
Updates
Service Packs
Security Bulletins
Microsoft Update
Trials
Windows Server 2012 R2
System Center 2012 R2
Microsoft SQL Server 2012 SP1
Windows 8.1 Enterprise
See all trials »
Related Sites
Microsoft Download Center
TechNet Evaluation Center
Drivers
Compatability & Converters
Windows Sysinternals
TechNet Gallery
Training
Training Catalog
Class Locator
Microsoft Virtual Academy
Free Windows Server 2012 courses
Free Windows 8 courses
SQL Server training
e-Learning overview
Certifications
Certification overview
MCSA: Windows 8
Windows Server Certification (MCSE)
Private Cloud Certification (MCSE)
SQL Server Certification (MCSE)
Other resources
TechNet Events
Second shot for certification
Born To Learn blog
Find technical communities in your area
Support by product
Exchange Server
Forefront Server
Forefront Edge Security
Forefront Server Security
Internet Explorer
Office
SharePoint
SQL Server
System Center
Windows Server
Windows XP
Windows Vista
Windows 7
Windows 8
Other support links
Microsoft Premier Online
Microsoft Fix It Center
TechNet Forums
MSDN Forums
Security Bulletins & Advisories
International support solutions
Log a support ticket
Look up event IDs and error codes
Not an IT pro?
Microsoft Customer Support
Microsoft Community Forums
Sign in
Roger's Security Blog
As Chief Security Advisor of Microsoft EMEA - lets share interesting security information
Options
About
Email Blog Author
RSS for posts
Atom
RSS for comments
OK
Search Blogs
Tags
Cloud
Cloud Computing
Competition
Consumer
Crime
Critical Infrastructure Protection
cybercrime
Events/Training
Fun
Incident Response
Incidents
Industry Associations
Law Enforcement
Microsoft
Microsoft products
patch management
Policies
Policy
politics
Privacy
Processes
Security
Technology
Terrorism
trends
Archive
Archives
August 2013
(3)
June 2013
(4)
May 2013
(3)
April 2013
(2)
March 2013
(1)
February 2013
(2)
January 2013
(5)
December 2012
(1)
November 2012
(1)
October 2012
(4)
September 2012
(4)
August 2012
(4)
July 2012
(1)
June 2012
(3)
May 2012
(2)
April 2012
(9)
March 2012
(2)
February 2012
(2)
January 2012
(1)
December 2011
(3)
November 2011
(6)
October 2011
(11)
September 2011
(8)
August 2011
(3)
July 2011
(4)
June 2011
(8)
May 2011
(7)
April 2011
(7)
March 2011
(13)
February 2011
(18)
January 2011
(15)
December 2010
(6)
November 2010
(15)
October 2010
(15)
September 2010
(32)
August 2010
(10)
July 2010
(14)
June 2010
(18)
May 2010
(8)
April 2010
(6)
March 2010
(22)
February 2010
(5)
January 2010
(12)
December 2009
(8)
November 2009
(7)
October 2009
(11)
September 2009
(17)
August 2009
(12)
July 2009
(12)
June 2009
(13)
May 2009
(14)
April 2009
(16)
March 2009
(11)
February 2009
(12)
January 2009
(14)
December 2008
(22)
November 2008
(13)
October 2008
(22)
September 2008
(8)
August 2008
(14)
July 2008
(4)
June 2008
(16)
May 2008
(30)
April 2008
(29)
March 2008
(19)
February 2008
(16)
January 2008
(26)
December 2007
(18)
November 2007
(23)
October 2007
(11)
September 2007
(10)
August 2007
(7)
July 2007
(11)
June 2007
(11)
May 2007
(4)
April 2007
(9)
March 2007
(8)
February 2007
(8)
January 2007
(6)
March, 2010
TechNet Blogs
»
Roger's Security Blog
»
March, 2010
Sort by:
Most Recent
|
Most Views
|
Most Comments
Excerpt View
|
Full Post View
Raise Money for Cancer Research
Posted
over 3 years ago
by
rhalbheer
This is a private post – and does not really have a lot to do with my job at Microsoft. Well, a little… A friend of mine – actually the EMEA Security PR guy at Microsoft – is an addicted dart player and participates often in dart tournaments. Which has...
This cannot be Microsoft Technology :-)
Posted
over 3 years ago
by
rhalbheer
Why Today’s End-User Education Fails!
Posted
over 3 years ago
by
rhalbheer
I was reading a paper recently, where I initially thought it is a joke (it looked scientifically, therefore I was not too scared). But as our research department did it, it is serious and really, really good – at least it definitely made me think. It...
Council of Europe – Octopus Conference (Cooperation against Cybercrime) – Key Messages
Posted
over 3 years ago
by
rhalbheer
I blogged on Day 1 and Day 2 but as I expected, I was unable to blog yesterday on the conference. However, let me just briefly give you my impression of the final day: The core part of this last day was a whole block on Cloud Computing. There were different...
Council of Europe – Octopus Conference (Cooperation against Cybercrime) Day 2
Posted
over 3 years ago
by
rhalbheer
And the second day starts. I just met with Jeremy Kirk from IDG and it is great to see that the press is actually interested in such a conference as well. The day today started with a long session on different initiatives against cybercrime. A lot of...
Council of Europe: We need ONE Cybercrime Convention
Posted
over 3 years ago
by
rhalbheer
As you saw from previous posts, I am at the Octopus Conference on Cooperation against Cybercrime at the moment. We had yesterday the Deputy Secretary General of the Council of Europe and one of her key statements was that different bodies (like the Council...
Council of Europe – Octopus Conference (Cooperation against Cybercrime) Day 1
Posted
over 3 years ago
by
rhalbheer
A few years ago, the Budapest Convention on Cybercrime was signed within the Council of Europe. Since then it was ratified all across the globe by a lot of countries or at least used as the base for legislation. Since a few years as well, the Council...
Run Windows 7 XP Mode on CPU’s without virtualization
Posted
over 3 years ago
by
rhalbheer
I once wanted to text Windows 7 XP Mode on my notebook or my home PC but unfortunately I failed as both CPUs do not support Hardware Assisted Virtualization (HAV). Now, we released an update for Windows 7 64bit systems to remove this requirement: Update...
Want to introduce the Security Development Lifecycle? Play a Game
Posted
over 3 years ago
by
rhalbheer
I was recently pinged by a customer asking for the “real” version of this game. It was distributed at RSA in the US and I do not have any anymore – but you can still print it yourself. So, if you want to introduce SDL or if you introduced it already and...
Results of Operation b49 (Botnet Takedown)
Posted
over 3 years ago
by
rhalbheer
On February 24th we announced the work we did on taking down Waledac – read Tim Cranton’s blog post called Cracking Down on Botnets . Now it is time to look back and try to understand what we learned so far. sudosecure traces the Waledac infections and...
Azure Showcase: The Eye on Earth
Posted
over 3 years ago
by
rhalbheer
Well, you know, fairly often when I look at showcases I am a little bit disappointed I have to admit. Mainly because the technology which is shown is really cool and I would love to leverage it – just it works in the US only. Or better, it works across...
Strong Authentication and Privacy – A Contradiction in Terms?
Posted
over 3 years ago
by
rhalbheer
You know that I am not a big fan of the requirement for having all Internet users authenticate strongly. There are people in the security arena who think that this is the only way to fight cybercrime – and in parallel accept that they would kill freedom...
ATM Skims – would you have figured them?
Posted
over 3 years ago
by
rhalbheer
I was reading two BBC articles this morning. Wow, this is scary, isn’t it? Look at the pictures below: I do not think that I would have seen that… It even has an integrated camera which is switched on, when you move the card in. That’s the original article...
Monitoring the Blog Hits – Live in Silverlight!
Posted
over 3 years ago
by
rhalbheer
2
Comments
If you are running a blog, you might most probably use one of the websites which show where your user come from – no? Like Clustrmaps , which I used for a few years. Then I found a new one, which I like much more as it gives me more information. If is...
Hacking Incidents 2009 – Interesting Data
Posted
over 3 years ago
by
rhalbheer
There is a project called the web hacking incident database (WHID), which collects data and statistics on web-application related security incidents. I was just looking into their report called The Web Hacking Incident Database 2009 which has some pretty...
Insider Threat of Cloud Computing
Posted
over 3 years ago
by
rhalbheer
Tonight I got this article forwarded to me: Afraid of outside cloud attacks? You're missing the real threat . David Linthicum (the author) claimed that if you are looking at the hackers attacking “your” cloud from the outside, you are missing the real...
Data Protection Heat Map
Posted
over 3 years ago
by
rhalbheer
I was looking at some research done by Forrester which could be interesting for you as well. They try to lay out the landscape with regards to data protection for you and it looks fairly compelling. So if you are interested in the situation of the different...
Legal Challenges of International Business and the Cloud
Posted
over 3 years ago
by
rhalbheer
To start with: I am an engineer not a lawyer – and this might be part of the problem… When I started to think about the Cloud and security and thought about all the work I do with Law Enforcement and the challenges they face. Additionally, I started...
Security Development Lifecycle – Website!
Posted
over 3 years ago
by
rhalbheer
I often talk about how we learned to engineer security into the products and the results prove that we are on the right track. One of the challenges we always have is how to help the ecosystem to improve as well. One of the ways is to communicate through...
Why it pays to be secure – Chapter 5 – I need tools!
Posted
over 3 years ago
by
rhalbheer
Our EMEA Security Program Manager, Henk van Roest, started this series internally and with his consent I am publishing it here in my blog as I think it contains a lot of great information for you to use. So far, in the first 4 chapters, we have addressed...
When Security Essentials are not Microsoft Security Essentials
Posted
over 3 years ago
by
rhalbheer
1
Comment
It is so old: Software telling you that you are infected and that you have to install this latest security software immediately. You can bet that this then installs malware on your PC instead of cleaning it. We mentioned this problem already in the first...
The Latest Internet Explorer 0Day
Posted
over 3 years ago
by
rhalbheer
1
Comment
As it happens: I have been skiing last week (the weather was gorgeous) and now I am back (unfortunately) and confronted with the next Internet Explorer 0Day vulnerability, which already causes noise – in my opinion too much for the real technical problem...