Browse by Tags

Tagged Content List
  • Blog Post: Microsoft SIRv5 Released

    Good day, Paul Cooke here. The Microsoft Malware Protection Center has published volume five of the Microsoft Security Intelligence Report. If you have not taken a look at this report before, I urge you to go download it from http://www.microsoft.com/sir . It provides a thorough view of the current...
  • Blog Post: TechED - EMEA

    Good day, Paul Cooke here. I am in Barcelona getting set up for some sessions at TechEd-EMEA in Barcelona. The weather was a bit dicey for parts of yesterday but today is clear and beautiful. I've got two full sessions and a bit part in a third where I will be talking about Windows 7 security features...
  • Blog Post: Windows Vista Security Stories @ TechEd - Recap

    Good day! Paul Cooke, Director of Enterprise Security, here. Orlando entertained close to 9,500 customers, partners, and staff at the first Microsoft Tech·Ed for IT Professionals. For four days, IT Professionals from around the world experienced in-depth technical learning with more than 770 Breakout...
  • Blog Post: FAQ: Why can’t I bypass the UAC prompt?

    [This item was authored by Aaron Margosis and originally appeared on his Non-Admin Blog .] The frequently asked question, "Why can't I bypass the UAC prompt?" is often accompanied by statements like one or more of the following: "We want our application to run elevated automatically without...
  • Blog Post: Windows Vista Security Testing

    Hi, I’m Austin Wilson , Director of Product Management for Windows Vista security. Our first focus for Windows Vista security is engineering the operating system for security. Windows Vista is the first Windows client release to be developed end to end using the Security Development Lifecycle (SDL) ...
  • Blog Post: Welcome to the Windows Vista Security Blog

    Thousands of people from around the world have been hard at work to ensure that Windows Vista is the most secure versions of Windows ever released. From new engineering best practices as part of the Security Development Lifecycle (SDL) to new data protection features like BitLocker™ drive encryption...
Page 1 of 1 (6 items)