Steve Lamb's Blog
Security Matters
How does InfoCard work? Here's a link to a technical video that explains all
Browse to the Channel9 InfoCard video - it's an hour long and promises the following Nigel Watling,...
Author: Steve Lamb Date: 05/16/2006
How can I get hold of Windows Vista Beta software? How much is TechNet Plus?
Following my post about recent builds of Windows Vista I received a comment from hir8er pertaining...
Author: Steve Lamb Date: 05/12/2006
We're getting really close to Beta 2 of Windows Vista - I've moved across to one of the latest builds
I'm on 5353 which is really stable - so much so I've moved to it for my production system. Having...
Author: Steve Lamb Date: 05/11/2006
Introducing the idea of a "JourneyThrough" a new technology
"JourneyThrough" is a term I made up last week to signify a way of linking a series of blog entries...
Author: Steve Lamb Date: 05/11/2006
How to simplify the creation and maintenance of Internet Protocol (IPsec) security filters in a Windows Server 2003-based environment
There's a new hotfix for IPsec that makes life much easier for those of you who are interested in...
Author: Steve Lamb Date: 05/11/2006
Why do we treat Trust as a Binary property?
In security circles we tend to view Trust as a Binary property - either we trust someone or we...
Author: Steve Lamb Date: 05/10/2006
Webcast showing how to make the most of Internet Security and Acceleration Server to bolster your perimeter defences
Richard Warren's session titled "Leveraging your Active Directory for Perimeter Defence" is...
Author: Steve Lamb Date: 05/09/2006
The Microsoft Network Access Protection (NAP) Team have a blog at last
Thanks to Jeffrey Centex for posting about the NAP team's blog. There are some interesting posts...
Author: Steve Lamb Date: 05/09/2006
Where can I find out about Phishing trends and combat measures?
The Anti-Phishing Working group site is an excellent resource as it contains details of everything...
Author: Steve Lamb Date: 05/09/2006
Michael Howard's written another book - this time on the Security Development Lifecycle (SDL)
I'm really pleased to let you know that Michael Howard and Steve Lipner (both Microsoft security...
Author: Steve Lamb Date: 05/08/2006
Over the next few week's I'll teach you all about Network Access Protection
Over the coming weeks I'm embarking on a journey through the wonders and mysteries of Windows...
Author: Steve Lamb Date: 05/05/2006
The InfoSec slides ARE NOW available - broken links are now fixed
Browse here to access the slides yourself. This follows yesterday's post which indicated that the...
Author: Steve Lamb Date: 05/05/2006
Where can I download the Microsoft Security Academy slides for InfoSec 2006?
Click here to download all presentations as used for InfoSec 2006's Microsoft Security Academy. The...
Author: Steve Lamb Date: 05/04/2006
Excellent security resources I've mentioned at InfoSec, the Technical (TechNet & MSDN) Roadshow and at TechEd / IT Forum
Spurred on by Anil John's (** Edited to correct my earlier typo - sorry Anil **) post (referred to...
Author: Steve Lamb Date: 05/03/2006
Here are some handy Security links for Microsoft technologeis
Thanks to the dotnetslackers for their post about a "Microsoft Security Resource Guide" - they link...
Author: Steve Lamb Date: 05/03/2006
What's new in Windows Vista Group Policy?
Check out Rodney's post (he's "The Lazy Admin") detailing the changes to Group Policy in Windows...
Author: Steve Lamb Date: 05/02/2006
The Cheapest way to (safely!) get from Birmingham International Station to the TechNet/MSDN Roadshow
The following advice was provided as a comment to my earlier post - it's so useful I want to raise...
Author: Steve Lamb Date: 05/01/2006
Accept the Geek in you - join a Geek Dinner!
Browse here to find out more about the most recent London Geek dinner. There's another one coming up...
Author: Steve Lamb Date: 04/30/2006
What should a User Group be? A New Information Security User Group is taking form
Many people at InfoSec expressed great interest in joining a new User Group that's focused 100% on...
Author: Steve Lamb Date: 04/29/2006
Is there any way for Malware to attach itself to Word Documents OTHER THAN VIA MACROS?
There are many well known pieces of Malware that target Microsoft Word Macros - hence they are...
Author: Steve Lamb Date: 04/29/2006
Update re. how to deal with Phishing on OSX
Following my recent post, James has referred me to Mactopia which confirms that IE has indeed been...
Author: Steve Lamb Date: 04/29/2006
Information is NOT Power. Effective Security enables Powerful decisions
Information is NOT Power. Timely access to accurate information can give the holder the ability to...
Author: Steve Lamb Date: 04/29/2006
Is there a way to stop Phishing on the Apple Mac's Safari Browser?
I'm not casting aspertions on Apple's Safari browser in any way. @ InfoSec I discussed Internet...
Author: Steve Lamb Date: 04/27/2006
How to improve the level of assurity in your Windows System integriry and data integrity - Windows Vista's Bitlocker feature
The most popular area of discussion I experience regarding Microsoft @ InfoSec related to Bitlocker...
Author: Steve Lamb Date: 04/27/2006
It was great to see so many of you @ InfoSec in London this week.
InfoSec (uber security show in London >10,000 attendees) this week has been great fun. Hard work...
Author: Steve Lamb Date: 04/27/2006
Looking for increased security via Trusted Platform Module (TPM) support such as Windows Vista's Bitlocker
Andy made an interesting comment regarding his interest in Trusted Platform Module (TPM) hardware...
Author: Steve Lamb Date: 04/27/2006
What's your view of multi-factor authentication?
Steve Riley's looking for your feedback on what works for you - please browse to here and give him...
Author: Steve Lamb Date: 04/26/2006
Internet Explorer 7 Beta 2 is now available - download IE7 here
Click here to download Internet Explorer 7 Beta 2. IE 7 is nearing release bringing with it a wealth...
Author: Steve Lamb Date: 04/25/2006
Join Rafal for a free event covering Identity Management
Browse here to register for Rafal's free event - it's running in the UK (Reading) on the 17th May....
Author: Steve Lamb Date: 04/24/2006
Will end users turn off Windows Vista's User Account Control feature?
This is the final part of a three part response to a comment made by Matt in his comment regarding...
Author: Steve Lamb Date: 04/21/2006
How will Windows Vista's User Account Control (UAC) work?
This is the second part of a three part response to a comment made by Matt in his comment regarding...
Author: Steve Lamb Date: 04/20/2006
How to keep your system(s) safe from Malware including Spyware, Worms, Viruses and Rootkits
Many of us are concerned about the ever increasing threat to information security and business...
Author: Steve Lamb Date: 04/19/2006
How is privilege used in Windows XP, NT, 2000 and 2003. What are DACLs and SACLs
This is the first part of a three part response to a comment made by Matt in his comment regarding...
Author: Steve Lamb Date: 04/18/2006
InfoSec 2006 is just around the corner - if you're in the UK and interested in security it's well worth a visit
Browse here to find out more about the event. InfoSecurity (InfoSec) Europe 2006 is an exhibition...
Author: Steve Lamb Date: 04/17/2006
A "Plain English" description of what we mean by RPC over HTTP(S)
Eileen's posted a nice concise description explaining "what is RPC over HTTP(S)". As we move away...
Author: Steve Lamb Date: 04/14/2006
Who do all those acronyms mean? Where's an accurate technical dictionary of Microsoft terminology?
The Microsoft Developer Network (MSDN) provides an excellent technical reference for terminology...
Author: Steve Lamb Date: 04/14/2006
How to mitigate the threat posed by malware and how Windows Vista will help in the long run
Many of us are concerned about the ever increasing threat to information security and business...
Author: Steve Lamb Date: 04/13/2006
Why doesn't SMS check to see whether I've actually installed security updates before inflicting them upon me?
The SMS client is present on my computer (Windows XP SP2) to ensure that it's up to date with...
Author: Steve Lamb Date: 04/12/2006
What is a firewall, ISA Server and caching in laymans terms - here's a simple analogy
Earlier today I was asked "what is ISA Server?" - the person who asked me was completely...
Author: Steve Lamb Date: 04/11/2006
How to recover from Malware infestation? How to avoid getting malware in the first place
I encourage customers to architect machines such that data is stored in a separate partition of the...
Author: Steve Lamb Date: 04/10/2006
Traffic information MashUp
Click here to play with the Traffic Information MashUP - and here to find out what a MashUP is! In...
Author: Steve Lamb Date: 04/07/2006
Why can't regular users shutdown Windows Server 2003?
Perhaps this is obvious for a production system - you'd hardly want end-users to be able to shutdown...
Author: Steve Lamb Date: 04/07/2006
I'm NOT a Girl!
...but I have been to a Girl Geek Dinner and plan to go to more. As the name suggests they focus on...
Author: Steve Lamb Date: 04/07/2006
Security Quick Reference - here's a list of security resources for IT Pro, Dev and Consumers alike
Security Quick Reference Guidance The Security Guidance Centers provide the most prescriptive...
Author: Steve Lamb Date: 04/06/2006
Here are some Online Technical Security resources that will help you keep up with Microsoft Security Innovations
The Microsoft Security Newsletter is a monthly electronic newsletter that's tailored for IT...
Author: Steve Lamb Date: 04/06/2006
Is Effective Information Security an ART or a Science?
Let's start with a definition to set the tone - this is one I've made up: "Effective Security is...
Author: Steve Lamb Date: 04/05/2006
Get answers to difficult questions and debate security solutions with experts at InfoSec 2006 in London
Browse to our InfoSec2006 page to read about the free education sessions and debates we'll be...
Author: Steve Lamb Date: 04/05/2006
Where can I find out how to write secure code?
The Microsoft Application Security Website is a UK based resource that aims to help you write more...
Author: Steve Lamb Date: 04/04/2006
MSDN invite you to join SPI Dynamics for a "Web Application Hacking Workshop"
Let's get this straight to start with MICROSOFT WILL NOT BE TEACHING YOU HOW TO HACK! Our partner...
Author: Steve Lamb Date: 04/04/2006