See all products »
Curah! curation service
Microsoft Tech Companion App
Microsoft Technical Communities
Microsoft Virtual Academy
Server and Tools Blogs
TechNet Flash Newsletter
Cloud and Datacenter
Windows Server 2012 R2
System Center 2012 R2
Microsoft SQL Server 2012 SP1
Windows 8.1 Enterprise
See all trials »
Microsoft Download Center
TechNet Evaluation Center
Compatability & Converters
Microsoft Virtual Academy
Free Windows Server 2012 courses
Free Windows 8 courses
SQL Server training
MCSA: Windows 8
Windows Server Certification (MCSE)
Private Cloud Certification (MCSE)
SQL Server Certification (MCSE)
Second shot for certification
Born To Learn blog
Find technical communities in your area
For small and midsize businesses
For IT professionals
For technical support
For home users
Microsoft Premier Online
Microsoft Fix It Center
Security Bulletins & Advisories
International support solutions
Log a support ticket
Not an IT pro?
Microsoft Customer Support
Microsoft Community Forums
Steve Lamb's Blog
Development / coding
High Performance Computing
How to Articles
Integration / LINUX
JourneyThrough: Network Access Protection
Microsoft Office Sharepoint Server (MOSS) 2007
Nothing to do with Security whatsoever
SQL Server Business Intelligence
SQL Server Reporting Services
System Center & Management in general
TechNet Conversations podcasts
Viral Content Delivery
Windows 7 / Win7
Windows Phone 7
Windows Server 2008
Browse by Tags
Steve Lamb's Blog
I'll be on holiday until 6th October hence any comments posted to this blog won't be published until I return
I really enjoy reading the comments people like you leave on my blog - I appreciate people taking the time to share their ideas, frustrations and general feedback. I moderate the comments on this blog to remove any comment spam that sneaks past the automated filter. Occasionally I have to "bleep out...
17 Sep 2008
Which companies are more successful due to blogging? which are held back?
I think this is an interesting question. OK so I’m rather biased seeing as though I asked it! Some companies encourage their employees to talk openly about the products and services they work with – other companies try to control all outbound messages with the aim of “letting the public relations experts...
12 Aug 2008
Which are the most popular blogs on Microsoft's TechNet and MSDN?
Thanks to Sean for publishing a list of the top twenty five most popular TechNet and MSDN blogs . Thank you for taking the time to read my blog as I'm delighted it's made the top twenty five. There are more than 1600 blogs on TechNet & MSDN. I started off on MSDN three and a half years ago, after...
29 Mar 2008
No I don't want any additional auto insurance, free ring tones or sexual embelishment
Like Steve Riley I'm fed up with receiving a large number of spam comments on my blog. I've just returned from a lovely holiday in the Yorkshire Dales to a large number of nonesense spam comments on this blog. Also like Steve I believe in free speech and hence I post all comments except those which are...
12 Jun 2006
We're getting really close to Beta 2 of Windows Vista - I've moved across to one of the latest builds
I'm on 5353 which is really stable - so much so I've moved to it for my production system. Having said that the official advice remains "this is a test build and therefore shouldn't be relied upon in production". I like living on "the bleading edge of technology" so I'll take my chances. Doug cites...
12 May 2006
The Microsoft Network Access Protection (NAP) Team have a blog at last
Thanks to Jeffrey Centex for posting about the NAP team's blog . There are some interesting posts discussing Network Access Protection (NAP) including comment from the RSA Security show.
9 May 2006
Looking for increased security via Trusted Platform Module (TPM) support such as Windows Vista's Bitlocker
Andy made an interesting comment regarding his interest in Trusted Platform Module (TPM) hardware based security to compliment the software controls in his environment. I'm not familiar with the 3rd party he refers to (Wave) though can highly recommend Windows Vista's Bitlocker implementation that takes...
27 Apr 2006
How to recover from Malware infestation? How to avoid getting malware in the first place
I encourage customers to architect machines such that data is stored in a separate partition of the hard disk – this makes it far less painful should the worst case scenario of machine rebuild be required. It’s certainly true that insidious malicious software often takes advantage of cloaking (rootkit...
10 Apr 2006
I'm NOT a Girl!
...but I have been to a Girl Geek Dinner and plan to go to more. As the name suggests they focus on the female perspective of technology. Of course I have no idea how many of you are Girl Geeks - if you are one then you can add your name to the WIKI and join the Geeky Girls @ their next gathering in...
7 Apr 2006
Where can I find out how to write secure code?
The Microsoft Application Security Website is a UK based resource that aims to help you write more secure code. The site includes links to the Developer Highway Code which is named after something that's only likely to make sense to those of you who have lived in the UK. UK drivers are supposed to...
4 Apr 2006
Secure I.T. or lose IT - an interesting securty blog
Browse here to read a new interesting security blog written by Paul Vincent - he's titled it "Secure I.T or lose IT" which I particularly like. Paul blogs about "Microsoft security and how we can stop the bad guys from stealing our stuff" - it's well worth a look Paul is a friend of mine who contributed...
27 Mar 2006
Evidence of a website that appears to be hosting a malicious keylogger trojan horse
Trojan horses (software that includes "features" that may work against the user's intentions) are hardly new, nor are keyloggers. I find it interesting that the "My Anti Spyware" blog includes a post detailing reports of an apparently malicious website that's hosting a trojan keylogger. Click here to...
15 Mar 2006
How to solve the CreateFile() error encountered when applying SCW policy via the command line (scwcmd configure)
Security Configuration Wizard has a really handy command line as I'll demonstrate in an upcoming BlogCast. To apply an SCW policy you can issue the "scwcmd configure" command. Unlike the other scwcmd commands "configure" does not default to applying to the local machine. If you issue the following...
31 Jan 2006
Teaching Security to Developers
Thanks to everyone @ VBUG Birmingham last night for making me so welcome. I was greated with lots of Halloooween pumpkins - one of which was carved with a semi-colon in it rather than a face - a C# joke apparently! I delved into how Malware gets onto machines, how it works and how to avoid it....
1 Nov 2005
Would you like to limit who can read your blog?
The audience in tonight's TechNet event asked whether there's an easy way to restrict who can access your blog - particularly if you'd like to limit the audience to be friends of your Children. I know that some blog engines provide this granularity (such as www.blogger.com ) - which ones do / which...
13 Oct 2005
The Girl Geek Dinner was fantastic!
Thanks to everyone present for making the evening such a huge success. I'll post more about this later but in particular thanks to Kathi, Kat & Joy for the debate (I started!) about whether the term "Girl Geek" was infact an oxymoron - as you can image we had a lively conversation! You can read...
13 Oct 2005
Marketing Soiree / Geek Dinner tomorrow night in London
I'm looking forward to tomorrow night's Marketing Soiree which is taking place in London. Full details of the event can be found here . Hugh MacLeod and Seth Godin organised the event and set up the wiki - over 150 people are expected :-). Hugh and Seth recently organised a very successful Geek Dinner...
10 Jul 2005
For those who haven't heard yet there's a way to compute SHA-1 hashes faster than brute force
Bruce's recent article has started a great deal of debate. Clearly the implications for the way cryptographic signatures are relied upon more and more come into question. IMHO the sky's not about to fall down but certainly it's sensible for all software authors(Microsoft included) to think how their...
25 Feb 2005
Threats Vulnerabilities and Exploits to mobile phones, PDAs, mobile devices and cars as discussed in a report published this week by IBM Security Intelligence Services
I've just read the summary to an IBM Report which discusses the perceived risk of security problems on mobile devices and even cars akin to those suffered by Personal Computer users today. This is something I've been thinking of writing about for some time - reading the report has finally given me the...
13 Feb 2005
How to give GoogleLove(or MSNLove!) to interesting sites without killing them
The following comments are all IMHO not those of Microsoft.......blah blah blah.... you get the idea! As readers will be aware, I recently linked to content on a third party site. My intent was to advocate the author's content to my followers(both of them!) as in my view it was worthy of attention. Unfortunately...
21 Jan 2005
What is a BlogCast? Robert Scoble discusses the term @ Channel9
Robert posted an entry @ Channel9 - see Eileen's Blog for more information. Finally word is getting out there :-)
19 Jan 2005
Become a Security Insider! Join the most exciting security community in the World!
I'm the lead Technical Security Advisor for Microsoft's ITPro community in the UK. My role involves evangelising the our security technologies(most of which are built into Windows) to help ITPros deliver real world business benefits - reducing costs by enabling businesses to do more with less risk. Every...
17 Jan 2005
Threat Modelling helps Microsoft Developers to build more secure code
Larry Osterman's posted a really interesting article explaining how Threat Modelling helps his team improve the security of the code they develop. As Larry goes on to explain the technique's not new, nor is it rocket science and yet it's often under utilised in development houses. Part of Microsoft's...
16 Jan 2005
What Security topics would you like me to BlogCast about?
Eileen Brown has just posted an interesting article on her Blog which explains a new technique we're going to use to share snippits of content as she explains in the following extract of her post: " Sometimes there just isn't time to view a whole Webcast, when all you want to do is learn something specific...
10 Dec 2004
William Luu's feedback to my last post makes a great deal of sense - "They're just trying to boost their websites' Google Rank. It could very well be one of those bots/scripts doing the rounds" I've looked more closely at the site and can confirm that it doesn't attempt to execute code on the client...
22 Nov 2004
© 2014 Microsoft Corporation.
Privacy & Cookies