• Technical Tips and Insights on MS07-049 and MS07-044

    Jonathan's team from MSRC, researches potential mitigations and workarounds as part of the comprehensive investigations they do for each security bulletin.  They regularly discover information that could help customers better understand how to protect themselves via mitigations and workarounds. Here are some information about the Virtual PC and Virtual Server bulletin and some "best practices" guidance to help protect yourself from this class of vulnerability. 

    http://blogs.technet.com/msrc/archive/2007/08/23/technical-tips-and-insights-on-ms07-049-and-ms07-044.aspx

    Urs

     

  • Wndows Security - Code Signing: Is it a Security Feature?

    Code signing is a mechanism whereby publishers of software and content can use a certificate-based digital signature to verify their identities to users of the code, thus allowing users to decide whether or not to install it based on whether they trust the publisher. Code signing has been touted as a major security feature, but it’s important for users to understand its uses and its limitations.

    http://www.windowsecurity.com/articles/Code-Signing.html

    Urs

     

  • Windows Security - A Microsoft PKI Quick Guide

    A very good structured and complete quick guide to MS PKI. Also includes many references and examples.

    http://www.windowsecurity.com/articles/Microsoft-PKI-Quick-Guide-Part1.html
    http://www.windowsecurity.com/articles/Microsoft-PKI-Quick-Guide-Part2-Design.html
    http://www.windowsecurity.com/articles/Microsoft-PKI-Quick-Guide-Part3.html

    Urs

     

  • Study Finds Spammers' Weak Spot

    Junk email distributors are much more vulnerable at the receiving end than at the sending end, research finds.

    A given spam campaign may use thousands of mail relay agents to deliver its millions of messages, but it may use only a single server to handle requests from recipients who respond. A single takedown of a scam server -- or a spammer redirect -- can curtail the earning potential of an entire spam campaign...

    http://www.darkreading.com/document.asp?doc_id=131093&WT.svl=news1_2

    Urs


     

  • What your hard drive can tell ID thieves

    Many people believe that when they dispose of their old computer, the files they've erased from the hard drive are gone forever. Wrong. ConsumerReports.org bought a handful of drives on eBay and tried to recover old files by running simple and inexpensive software that anyone can obtain and use.

    http://www.consumerreports.org/cro/electronics-computers/computers/internet-and-other-services/net-threats-9-07/properly-erasing-hard-drives/0709_net_hard.htm

    Urs