• Link for Scoreboard

    Unbelieveable but I seem mess up with links at the moment. Here is the one: http://www.microsoft.com/downloads/details.aspx?familyid=df6a6e6e-21af-4786-ad1d-a38e8bfda82f&displaylang=en

    Roger

  • A Business Critical Application

    I just got a message about an absolutely business critical application - at least starting from 11 days.

    Here you will find the Microsoft Soccer Scoreboard for the Soccer World Championship :-)

    http://blogs.technet.com/controlpanel/blogs/posteditor.aspx?SelectedNavItem=NewPost&sectionid=4630&bpt=1

    Roger

  • Keyboard with integrated Keystroke Logger

    Now it gets scary: I knew that you can buy pretty small keystroke logger to be placed between the keyboard and the PC. Now, the keystroke loggers are even offered to be placed into normal keyboards - and that to be bought via the internet... They are sold as "security keyboard" :-)

    But it is not THAT bad, at least they have a disclaimer:
    Using the KeyGhost to log/record other people's keystrokes, steal passwords or break into another persons computer without his/her knowledge can be considered as an illegal activity. It is the final user's responsibility to obey all applicable local, state, and federal laws. Our hardware is intended for authorized system administrators, employers, and/or owners of the computer. KeyGhost & partners, the device's creator, and it's employees assume no liability and are not responsible for any misuse or damage caused by our KeyGhost product.

    Look at it: http://www.keyghost.com/securekb.htm

    Roger

  • Microsoft Threat Analysis & Modeling v2.0 RC1 - Link

    Do you really want the link :-)?

    http://www.microsoft.com/downloads/details.aspx?familyid=570dccd9-596a-44bc-bed7-1f6f0ad79e3d&displaylang=en&displaylang=en

    Roger

  • Microsoft Threat Analysis & Modeling v2.0 RC1

    We just released Version 2 of our Threat Modelling tool - for free :-)
     
    Microsoft Threat Analysis & Modeling tool allows non-security subject matter experts to enter already known information including business requirements and application architecture which is then used to produce a feature-rich threat model. Along with automatically identifying threats, the tool can produce valuable security artifacts such as:

    - Data access control matrix
    - Component access control matrix
    - Subject-object matrix
    - Data Flow
    - Call Flow
    - Trust Flow
    - Attack Surface
    - Focused reports
     
    Roger