Cyril Voisin (aka Voy) on security

Security is not important. Well... as long as your level of security is high enough!

Browse by Tags

Related Posts
  • Blog Post: How to use Windows Vista’s Boot Manager to boot Linux

    The Web is full of explanations on how to dual boot Windows and Linux using a Linux boot manager like GRUB or LILO. If you want to dual boot Windows Vista and Linux using Windows Vista’s Boot Manager, please read on. I will assume that you already have installed Linux on your machine using GRUB as your...
  • Blog Post: Services isolation in Session 0 of Windows Vista and Longhorn Server

    You may have heard that built-in services in Windows Vista were specifically hardened by Microsoft engineers during its development process. You might be wondering what that really means, how it works and, if you are a developer, how to harden your own services the Vista way. Jean-Yves Poublan, a Principal...
  • Blog Post: Per-service SID

    (This is part 3 of our series of posts on service hardening.) Under Windows Vista/Longhorn Server, your service can now have its own SID (Security Identifier), which you can then use in ACLs to protect your service resources. You configure your service to be assigned a per-service SID during its installation...
  • Blog Post: Building a dual boot system with Windows Vista BitLocker protection with TPM support

    Updated 2008-05-12 : added a step to turn the TPM on before enabling BitLocker. By the way, someone made me notice this post is now referenced by the official BitLocker FAQ on Microsoft's website. Many people have wondered if it would be possible to dual boot a TPM-bitlockered instance of Windows...
  • Blog Post: Linux-Windows Vista dual boot with BitLocker and a TPM

    Based on my earlier posts, I've recently written a whitepaper for Microsoft France on how to build a machine that is capable of dual booting either Linux or Windows Vista when the latter is protected by BitLocker leveraging a TPM chip. If you understand French, you' ll find the whitepaper, a webcast...
  • Blog Post: Write-restricted token

    ( This is part 4 of our series of posts on service hardening. ) A service can be configured to be write-restricted, in addition to having a per-service SID. To do so, you specify a SID type of "Restricted" when configuring your service (see our previous post “ Per-service SID ”). In that case the...
  • Blog Post: Least privilege for services

    This is part 2 of our series of posts on service hardening. "Need to have" and least privilege principle Executing with least privilege is a good practice of computer security. As with the "need to know" principle for information access, there should be a "need to have" principle for privileges...
  • Blog Post: Network restrictions for service hardening

    ( This is part 5 of our series of posts on service hardening .) Last but not least a service can be (and should be) configured to have network restrictions with what is called the "Windows Service Hardening" rules in the Windows SDK (we'll call those WSH rules for short). As a service developer, it...