TechNet
Products
IT Resources
Downloads
Training
Support
Products
Windows
Windows Server
System Center
Internet Explorer
Office
Office 365
Exchange Server
SQL Server
SharePoint Products
Lync
See all products »
Resources
Curah! curation service
Evaluation Center
Learning Resources
Microsoft Tech Companion App
Microsoft Technical Communities
Microsoft Virtual Academy
Script Center
Server and Tools Blogs
TechNet Blogs
TechNet Flash Newsletter
TechNet Gallery
TechNet Library
TechNet Magazine
TechNet Subscriptions
TechNet Video
TechNet Wiki
Windows Sysinternals
Virtual Labs
Solutions
Networking
Cloud and Datacenter
Security
Virtualization
Updates
Service Packs
Security Bulletins
Microsoft Update
Trials
Windows Server 2012 R2
System Center 2012 R2
Microsoft SQL Server 2012 SP1
Windows 8.1 Enterprise
See all trials »
Related Sites
Microsoft Download Center
TechNet Evaluation Center
Drivers
Windows Sysinternals
TechNet Gallery
Training
Training Catalog
Class Locator
Microsoft Virtual Academy
Free Windows Server 2012 courses
Free Windows 8 courses
SQL Server training
e-Learning overview
Certifications
Certification overview
MCSA: Windows 8
Windows Server Certification (MCSE)
Private Cloud Certification (MCSE)
SQL Server Certification (MCSE)
Other resources
TechNet Events
Second shot for certification
Born To Learn blog
Find technical communities in your area
Support options
For small and midsize businesses
For enterprises
For developers
For IT professionals
From partners
For technical support
Support offerings
For home users
More support
Microsoft Premier Online
Microsoft Fix It Center
TechNet Forums
MSDN Forums
Security Bulletins & Advisories
International support solutions
Log a support ticket
Not an IT pro?
Microsoft Customer Support
Microsoft Community Forums
Sign in
Roger's Security Blog
As Chief Security Advisor of Microsoft EMEA - lets share interesting security information
Tags
Advisory
Anti-Malware
Applications
Architecture
Associations
Behaviour
Blog
botnet
Browsing
Chief Security Advisor
Children
Cloud
Cloud Computing
Collaboration
Competition
Compliance
Consumer
cost
Crime
Critical Infrastructure
Critical Infrastructure Protection
cybercrime
Cybersecurity Agenda
Data Protection
Development Lifecycle
Ecosystem
encryption
Event
Events/Training
Family
Freedom of Speech
Fun
Gaming
Government
Hacking
Home
Identity
Identity Theft
Incident Response
Incident Sharing
Incidents
Industry
Industry Associations
Internet Explorer
Interoperability
Law Enforcement
Legislation
Lifecycle
malware
Mass Mailer
Messaging
Microsoft
Microsoft products
Mindset
Mobile
Network
NGO
Online Safety
OpenSource
Passwrods
patch management
People
Phone
Piracy
Policies
Policy
Policy Makers
politics
Privacy
Processes
Products
protection
Real Life
risk assessment
risk management
Securing My Infrastructure
Security
Security Intelligence Report
Security Updates
Social Engineering
social media
Strategy
support
TechEd EMEA
TechEd-ITForum
Technology
Teens
Terrorism
trends
Trip
Trust
Trustworthy Computing
UN
University
Updates
Vulnerabilities
Windows
Windows Phone
worm
XBOX
Browse by Tags
TechNet Blogs
»
Roger's Security Blog
»
All Tags
»
technology
Related Posts
Blog Post:
Dependant on the Internet? Not me!
rhalbheer
I was reading this article this morning Internet failure hits two continents and was thinking about my dependence on the Internet. Well, outch: I am used to get the information I need everywhere! Always! Now! And I am used that the Internet is just here. Always! Might be that it is a little slower one...
on
1 Feb 2008
Blog Post:
Some Thoughts on Today’s Bulletins
rhalbheer
As always: It is the second Tuesday of the months and we released the Security Updates. However, this month is special from one perspective: We released an update for the DNS resolver, which is released simultaneously by a lot of DNS vendors with the same vulnerability. Here are some technical details...
on
9 Jul 2008
Blog Post:
Patch Management, a key step towards compliance!
rhalbheer
As you might have read, I recently blogged about my infrastructure and the future of a platform towards a better management of compliance – honestly, I actually played with our latest technology . I wrote about Deploying PKI Time Sync on Virtual DCs Now, a necessary and very important next step towards...
on
22 May 2009
Blog Post:
Are you ready for your users of the (near) future?
rhalbheer
Yankee Group Study Actually near future might be wrong: I am convinced that the future (with regards to the requirements) is already here. We sponsored a study with Yankee Group with the title Anywhere Access Technologies - Open Enterprise Networks . I read through it and tried to analyze the key findings...
on
20 Nov 2007
Blog Post:
Bug Hidden for more than 25 Years
rhalbheer
Wow, this was impressive: A Swiss Developer posted on Saturday a blog that he found a bug which remained hidden for more than 25 years: When seekdir() Won't Seek to the Right Position . BTW: It is in BSD, where the code is available to everyone and as I am told on most of the panels I am sitting in...
on
14 May 2008
Blog Post:
UNHCR and Microsoft to help refugees
rhalbheer
No, this is not yet another announcement – this is a picture of today’s reality. UNHCR just published a website called Protecting and Empowering Refugees , where the results of the partnership between the UNHCR and Microsoft is shown in a pretty impressive way. On the one hand side it is all about using...
on
5 Oct 2010
Blog Post:
Building a faster Internet
rhalbheer
Does not solve any of the security problems (challenges?) but it sounds promising anyway Building A Faster Internet Roger
on
5 Apr 2008
Blog Post:
Monitoring – a Key Activity to a Trustworthy Infrastructure?
rhalbheer
As you might have read, I recently blogged about my infrastructure and the future of a platform towards a better management of compliance. I wrote about Deploying PKI Time Sync on Virtual DCs Patch Management, a key step towards compliance! Especially the Time Sync post was more about...
on
11 Aug 2009
Blog Post:
Why it pays to be secure – Chapter 3 – But how do I?
rhalbheer
Our EMEA Security Program Manager, Henk van Roest, started this series internally and with his consent I am publishing it here in my blog as I think it contains a lot of great information for you to use. Security — you hear about it every day. Being responsible for information security can be...
on
18 Oct 2009
Blog Post:
Open Source and Hackers
rhalbheer
The debate is probably as old as the Open Source software development model: Which one is more secure: Open Source or shared source as we at Microsoft run it? I know that we could now enter a religious debate about that, which I do not want to as I do not really believe in the value of such debate. ...
on
9 Jun 2010
Blog Post:
Network Access Protection Client for Mac and Linux
rhalbheer
This is very exciting news: Unet , one of our NAP partners now delivers a NAP Client for Mac and Linux . Here are some very cool screenshots from their website: This is the Windows Client : Here for Mac : And finally for Linux : If you are running mixed environments, you should look into Roger
on
7 Jan 2009
Blog Post:
Anti-Phishing-Training
rhalbheer
Wow! Ever thought that you are a phishing-expert? Ever tried to train your users? Carnegie Mellon University developed a game which trains you or tests your knowledge (where ever you are). I like it: http://cups.cs.cmu.edu/antiphishing_phil/ Roger
on
2 Oct 2007
Blog Post:
Not About Security but Cool – Search based on Silverlight
rhalbheer
This has definitely nothing to do with security. But anyway, I thought it worthwhile, to write to blog post about that. I found that today: an absolutely cool new search engine based on our latest development called Silverlight. Simply have a look at it and give it a try. It is definitely worth it...
on
22 Aug 2007
Blog Post:
Security Risks of Virtualization
rhalbheer
One fact strikes me pretty often: Companies have the problem that they have legacy software running on legacy operating systems (e.g. NT4) running on legacy hardware. This is a severe problem as you all know. Now, these companies look into virtualization so solve this problem. From all the three "legacy...
on
21 May 2008
Blog Post:
Have a look at Server and Domain Isolation
rhalbheer
I am often talking about different zones in the network and how you can create them. There is no a demo kit available for you to download and "play" with it: Server and Domain Isolation Demo Roger
on
13 Dec 2007
Blog Post:
Azure Showcase: The Eye on Earth
rhalbheer
Well, you know, fairly often when I look at showcases I am a little bit disappointed I have to admit. Mainly because the technology which is shown is really cool and I would love to leverage it – just it works in the US only. Or better, it works across the globe but the data which is available is fairly...
on
19 Mar 2010
Blog Post:
Monitoring the Blog Hits – Live in Silverlight!
rhalbheer
If you are running a blog, you might most probably use one of the websites which show where your user come from – no? Like Clustrmaps , which I used for a few years. Then I found a new one, which I like much more as it gives me more information. If is called WorldMaps and the best thing is, it is based...
on
15 Mar 2010
<