Looking through the Windows

It's all about Windows, what it does, what you can make it do, what are others making it do.

Browse by Tags

Tagged Content List
  • Blog Post: You received and Ecard!!!

    I am hoping most people have not been affected by these email spreading around. There is a proliferation of SPAM emails going around suggesting that you have received an Ecard from someone… DONT CLICK ON THE LINK . The downside of a connected social experience is that as users we become a bit lax with...
  • Blog Post: Microsoft to offer free consumer security suite | Security - CNET News

    I'm really excited about this announcement. This is a great step forward in making protection of your PC available for all. In the second half of 2009 we will be releasing code-name Morro that will protect customers from trojans, viruses, spyware, rootkits etc. The big thing for people to realise that...
  • Blog Post: Jeff Jones Security Blog : Download: H1 2008 Desktop OS Vendor Report - Vulnerabilities and Days-of-Risk

    Jeff Jones has released his six monthly report on desktop OS security vulnerabilities and Days-Of-Risk. One highlight was the pie chart on security vulnerabilities in the different OSes.   This certainly is in contrast to what a lot people are saying that Linux and Mac are more secure. Jeff Jones...
  • Blog Post: Presenting the security of Windows Server 2008

    On Thursday night I had the privilege of presenting to the OWASP.org user group. Those who are unaware of this group, they are a passionate group of security experts in Singapore.   We had a 30-strong attendance from the group packed in to our Microsoft Innovation Center. My session was a very high...
  • Blog Post: Server Core "Theoretically" reduces the number of Security Bulletins

    Just after publishing our video on Server Core, I visited Jeff Jones Security Blog , and found this post http://blogs.technet.com/security/archive/2008/06/12/download-server-core-potential-security-benefit.aspx on how having a server OS being installed in a "Core" installation mode, would have...
  • Blog Post: Making Security Better for the IT Pro

    I literally just stepped out of keynoting the latest Technet Security Event for Microsoft Singapore. The question I posed to the attendees at the event, "What things can Microsoft be doing better for IT Professionals in Singapore with regards to security." The following were some of the responses...
  • Blog Post: Learning to Love UAC...

    I know a lot of people get annoyed by the UAC feature in Windows Vista, but here is a reason to inspire new love for this protective prompt. " Love or hate its nagging prompts, Vista 's Account Control feature (UAC) has a security feature that marks it out from any other type of Windows security...
  • Blog Post: Microsoft Malware Protection Center - Security Intelligence Report

    Microsoft recently released its Security Intelligence Report Version 4 on April 22 at the Infosecurity Europe event in London. This is no light reading folks, its a big report about 104 pages long, but there are some really interesting facts inside... Malicious Software Removal Tool (MSRT) data shows...
  • Blog Post: Report: Microsoft fastest to issue OS patches, Sun slowest

    Symantec have just released their malware report on security threats in the industry and it is great to see that results are in showing that Microsoft is the fastest in the industry to issue operating system patches to help protect customers from vulnerabilities. You can get the report from the link...
  • Blog Post: Jeff Jones Security Blog : Download: Windows Vista One Year Vulnerability Report

    Hey everyone, Wanted to point you to a report produced by a colleague of mine about Vista vulnerabilities one year after release. It is an in-depth report that compares Windows Vista against Windows XP, Linux and other OS'es. Good news is that our investments in security in our Software Development Lifecycle...
  • Blog Post: Social Engineering

    Social engineering is a very real problem in today's enterprise world. To get an understanding of what Social Engineering is, check out the following video. As they say the chain is only as strongest as the weakest link, so we can all do our part to ensure that we don't become the weakest link, and be...
  • Blog Post: Top 5 security-menace predictions for 2008 - Network World

    Interesting article from Network World on the Top 5 security menace predictions of for 2008. In order Bot Evolution Web Threats (Aimed not only at unsuspecting visitors to social networking sites, such as MySpace, but any type of site or corporate web page) Mobile Threats Virtual Worlds (Think Second...
  • Blog Post: Sneak Peak - How to use Windows Server 2008 Core for PHP, MySQL

    I challenged Dennis Chung (my counterpart in the security bytes video, and one of the smartest guys I know when it comes to IT) recently to see what kind of usage scenarios we could use Windows Server 2008 Core . For those of you who are unaware of what Server Core is, it is an installation type for...
  • Blog Post: Security Bytes 02 - Automated Patch Management... FREE!!!

    Technorati Tags: Security , Security Bytes As our IT environments continually grow in size both on the client and server side, patch management becomes a more complex task. While at Microsoft we try to ensure that we release patches on a predictable schedule so you can test for compatibility, the process...
  • Blog Post: Security Bytes 01 in Silverlight

    Technorati Tags: Security , Security Bytes One of the pieces of advice I got from some people that had seen the video was to try out using Silverlight streaming. So after installing Expression Encoder I encoded the file, uploaded to the streaming service at http://streaming.live.com . I wont go through...
  • Blog Post: Technet Singapore Security Briefing - Friday 28th of September

    Last Friday I had the pleasure of opening the Security Briefings my esteemed colleague Yasmeen Hameed-Chan organized. It was a half day session targeted at IT Pros who   want to learn more about security in the IT enterprise, and how they can apply it for real world needs. The session itself was...
Page 1 of 1 (16 items)