See all products »
Curah! curation service
Microsoft Tech Companion App
Microsoft Technical Communities
Microsoft Virtual Academy
Server and Tools Blogs
TechNet Flash Newsletter
Cloud and Datacenter
Windows Server 2012 R2
System Center 2012 R2
Microsoft SQL Server 2012 SP1
Windows 8.1 Enterprise
See all trials »
Microsoft Download Center
TechNet Evaluation Center
Microsoft Virtual Academy
Free Windows Server 2012 courses
Free Windows 8 courses
SQL Server training
MCSA: Windows 8
Windows Server Certification (MCSE)
Private Cloud Certification (MCSE)
SQL Server Certification (MCSE)
Second shot for certification
Born To Learn blog
Find technical communities in your area
For small and midsize businesses
For IT professionals
For technical support
For home users
Microsoft Premier Online
Microsoft Fix It Center
Security Bulletins & Advisories
International support solutions
Log a support ticket
Not an IT pro?
Microsoft Customer Support
Microsoft Community Forums
Steve Lamb's Blog
Development / coding
High Performance Computing
How to Articles
Integration / LINUX
JourneyThrough: Network Access Protection
Microsoft Office Sharepoint Server (MOSS) 2007
Nothing to do with Security whatsoever
SQL Server Business Intelligence
SQL Server Reporting Services
System Center & Management in general
TechNet Conversations podcasts
Viral Content Delivery
Windows 7 / Win7
Windows Phone 7
Windows Server 2008
Browse by Tags
Steve Lamb's Blog
I keep seeing phrases like "secure firewall friendly connection" on products - what does it really mean?
Like many of you I keep seeing and hearing statements like "secure firewall friendly connection" on numerous products. Just think about what this really means - the firewall has little chance of doing anything useful as traffic is being tunnelled through in encrypted form. This is not necessarily...
24 May 2007
IIS 7 will have even better security than IIS 6 due to it's enhanced modular architecture
IIS 6 (Windows Server 2003's web server) has a good security track record as it was developed under Microsoft's Trustworthy Computing initiative. I dare say I'm courting fate by writing about it! Unlike it's predecessor there haven't been any high priority vulnerabilities and there have been very few...
24 May 2007
How to deal with risk?
Following on from my Effective Security Means Doing More with Less Risk post we need to consider how to deal with risk. The options are quite simple. Ignore it and hope the bad thing won't happen. Accept it as being manageable. Take steps to mitigate it thereby reducing the risk to a manageable level...
27 Mar 2007
Free money from Microsoft - I don't think so - Ignore emails claiming to be from the Microsoft Award team
Several people have forwarded me email messages like the following which is bogus - if you receive something similar then disregard it. We don't have a "Ken Gate", nor do we send emails from "yahoo.co.uk" addresses either. From: "KEN GATE" < firstname.lastname@example.org >...
7 Nov 2007
What Virtual Private Networking software would I recommend for Windows and how to set it up?
I was recently asked this very question and I responded with "Windows Server 2008/2003/2000 and Windows Vista/XP" provide excellent built-in Virtual Private Networking features that are standards compliant and assuming they are correctly configured can be highly secure too. There's no additional license...
7 Aug 2008
Get Safe Online's back on the road in the UK
Get Safe Online is an ongoing government initiative that's supported by commercial organisations including Microsoft - I've written about our engagements several times over the last two years. This November the team will be back on the road as they have done for the previous couple of years. The aim...
5 Oct 2007
Dell's built-in Smartcard Reader - I didn't know it was there
I'm a muppet! I've been using a Dell 820 laptop (other machines are available) as my main machine for six months and yet hadn't realised that it had a built-in smartcard reader. I've been using a PCMCIA smartcard reader instead. While I helped James debug his machine sleep problem he asked me "what's...
9 Aug 2007
Here are the results from the Microsoft Security Newsletter Survey
Thanks to those of you who completed August's Security Newsletter Survey and to Phil Cross for sharing the results which are as follows: Survey: (Aug 08) Security Newsletter Survey Client: Microsoft UK Date ranges: All dates ((Aug 08) Security Newsletter Survey) ...
23 Oct 2008
This Road sign has been hacked
I first saw this image some time ago in one of Steve Riley's presentations and stumbled across it again on the MIT Hacks site thanks to Nik following the Halo 3 Master Chief Hack
1 Oct 2007
Tweaking the file level security of the operating system is a bad idea!
Over the last week I've two people who are suffering pain due to corporate laptop builds that have been "secured" - meaning that an untold number of access controls have been changed and parts of the operating system have been removed to "enhance the security" of the system. A complete nightmare. The...
7 Apr 2008
Where to start with Effective Security - why do we need it?
The purpose of Information Technology is to make the right information available to the right people at the right time. The traditional approach to information security is the “no you can’t” syndrome. It's much more effective to define what the business actually needs and implement controls / raise...
17 Dec 2007
Here's how to solve the Facebook messaging problem
* Don't take the post as an endorsement of "Email Me Instead" or of it being fit for purpose - it seems to work for me but could have untold effects on your system, your privacy and the security of your personal information * I love blogging. Helpful people (like you) provide answers to questions...
7 Aug 2007
Windows Powershell security - how to stop malicious scripts from running
There’s an interesting article discussing the security features of Windows Powershell in this month’s TechNet Magazine .Don Jones discusses both the secure by design ethos as applied to Windows Powershell and specifically how to prevent malicious scripts running through the use of digital signatures...
17 Jan 2008
Upcoming Security Webcasts including Vista Wireless Security, Forefront and ISA
TechNet Webcast: Information About Microsoft April Security Bulletins (Level 200) Wednesday, April 11, 2007 - 11:00 AM - 12:00 PM Pacific Time Christopher Budd, CCE, CISA, CISM, CISSP, ISSMP Security Program Manager, Microsoft Corporation Mike Reavey, Lead Security Program Manager, Microsoft Corporation...
19 Mar 2007
How to secure a wireless network: Part 2 of 5 - How to change the SSID
This post follows on from How to secure a wireless network: Part 1 of 5 - Enabling WPA on a wireless router which includes a detailed description of some key security myths pertaining to wireless security. The first post also goes into detail about why these steps are only appropriate for small networks...
17 Aug 2007
Spoof hacker message circulating on Facebook
I received the following message from a friend on Facebook earlier: "Not sure this is true but.....If somebody called email@example.com adds you DON'T accept it because it's a hacker. Tell everyone on your list because if somebody on your list adds them you get them on your list he'll figure out...
10 Aug 2007
How many laptop computers and mobile phones were left in London taxis in a six month period?
Unbelievably 4,073 laptops, 5,838 PDAs and 63,135 mobile phones were left in London taxi seats in a recent six month period according to a survey by the Licensed Taxi Drivers Association - according to the BBC that works out at three devices per cab on average. Many companies are trying to find a...
14 May 2007
How to set up Network Access Protection to measure compliance of DHCP clients
The Step-by-Step Guide: Demonstrate NAP DHCP Enforcement in a Test Lab explains exactly how to set NAP up in a lab to measure compliance (and optionally restrict network access) of DHCP clients. It's well worth a look. If you haven't come across Network Access Protection then I recommend reading my...
1 Apr 2008
Interesting video interviews with the FBI discussing security
Kai Axford has posted a series of short video interviews with representatives of the FBI – they are well worth a look – particularly if you are based in the United States as they include advice regarding whom to report breaches to. Check out The Security Show – the link is to a tag hence future episodes...
26 Aug 2008
What new security features does Microsoft Office Sharepoint (MOSS) 2007 bring?
It seems like a long time since we launched Microsoft Office Sharepoint (MOSS) 2007 and it's great to see how many people are using it day to day. I remember at the Exchange, Vista and Office launch (almost a year ago) and the subsequent roadshow we made a point of showing how Sharepoint made life so...
18 Sep 2007
When will we stop using pen and paper? The lunacy of Legacy Writing Implements!
We have a lovely new building with a Gym in the basement - why on Earth do such places require me to find a legacy writing implement to sign up for a trial! I know that the question kind of answers itself in some respects as it's typically the requirement to "sign" the agreement that takes us back...
8 Oct 2007
What is the best security feature of Windows Server 2008?
There are plenty to choose from including the following: Read Only Domain Controller BitLocker on the server Active Directory Rights Management Active Directory Certificate Services Integrated firewall with IPSec task based interface Architectural improvements Increased scope...
26 Mar 2008
GetSafeOnline: providing advice for consumers to help them stay safe on the Internet without blinding them with science
It's the fourth annual GetSafeOnline campaign week whereby the team will raise the profile of consumer internet safety through a revamped GetSafeOnline website (containing a wealth of commonsense "how to" information) and a range of media activity. It's a great cause as the campaign is not trying to...
17 Nov 2008
Rafal's video on TechNet Edge covering security and IPv6 is well worth a listen
Join Rafal Lukawiecki's interview at TechEd IT Forum on TechNet Edge - he talks about a range of security topics including suite B algorithms, Server 2008 and IPv6. You'll need the Silverlight plugin to view the video - it's only 1.37Mb and is a free download - just follow the link to the video and...
4 Dec 2007
Ooops - "secret" nuclear sub caught on Google Earth
Thanks to Kai Axford for his post Wow! I wonder who's going to take the heat for this? which linked to the following image from the Strategic Security Blog The Strategic Security Blog post titled New Chinese Ballistic Missile Submarine Spotted goes into great depth (no punn intended) into the classification...
3 Aug 2007
© 2014 Microsoft Corporation.
Privacy & Cookies