Compartir a través de


Steve Lamb's Blog

Security Matters

Browse to the Channel9 InfoCard video - it's an hour long and promises the following Nigel Watling,...

Author: Steve Lamb Date: 05/16/2006

How can I get hold of Windows Vista Beta software? How much is TechNet Plus?

Following my post about recent builds of Windows Vista I received a comment from hir8er pertaining...

Author: Steve Lamb Date: 05/12/2006

We're getting really close to Beta 2 of Windows Vista - I've moved across to one of the latest builds

I'm on 5353 which is really stable - so much so I've moved to it for my production system. Having...

Author: Steve Lamb Date: 05/11/2006

Introducing the idea of a "JourneyThrough" a new technology

"JourneyThrough" is a term I made up last week to signify a way of linking a series of blog entries...

Author: Steve Lamb Date: 05/11/2006

How to simplify the creation and maintenance of Internet Protocol (IPsec) security filters in a Windows Server 2003-based environment

There's a new hotfix for IPsec that makes life much easier for those of you who are interested in...

Author: Steve Lamb Date: 05/11/2006

Why do we treat Trust as a Binary property?

In security circles we tend to view Trust as a Binary property - either we trust someone or we...

Author: Steve Lamb Date: 05/10/2006

Webcast showing how to make the most of Internet Security and Acceleration Server to bolster your perimeter defences

Richard Warren's session titled "Leveraging your Active Directory for Perimeter Defence" is...

Author: Steve Lamb Date: 05/09/2006

The Microsoft Network Access Protection (NAP) Team have a blog at last

Thanks to Jeffrey Centex for posting about the NAP team's blog. There are some interesting posts...

Author: Steve Lamb Date: 05/09/2006

The Anti-Phishing Working group site is an excellent resource as it contains details of everything...

Author: Steve Lamb Date: 05/09/2006

Michael Howard's written another book - this time on the Security Development Lifecycle (SDL)

I'm really pleased to let you know that Michael Howard and Steve Lipner (both Microsoft security...

Author: Steve Lamb Date: 05/08/2006

Over the next few week's I'll teach you all about Network Access Protection

Over the coming weeks I'm embarking on a journey through the wonders and mysteries of Windows...

Author: Steve Lamb Date: 05/05/2006

Browse here to access the slides yourself. This follows yesterday's post which indicated that the...

Author: Steve Lamb Date: 05/05/2006

Where can I download the Microsoft Security Academy slides for InfoSec 2006?

Click here to download all presentations as used for InfoSec 2006's Microsoft Security Academy. The...

Author: Steve Lamb Date: 05/04/2006

Excellent security resources I've mentioned at InfoSec, the Technical (TechNet & MSDN) Roadshow and at TechEd / IT Forum

Spurred on by Anil John's (** Edited to correct my earlier typo - sorry Anil **) post (referred to...

Author: Steve Lamb Date: 05/03/2006

Thanks to the dotnetslackers for their post about a "Microsoft Security Resource Guide" - they link...

Author: Steve Lamb Date: 05/03/2006

What's new in Windows Vista Group Policy?

Check out Rodney's post (he's "The Lazy Admin") detailing the changes to Group Policy in Windows...

Author: Steve Lamb Date: 05/02/2006

The Cheapest way to (safely!) get from Birmingham International Station to the TechNet/MSDN Roadshow

The following advice was provided as a comment to my earlier post - it's so useful I want to raise...

Author: Steve Lamb Date: 05/01/2006

Accept the Geek in you - join a Geek Dinner!

Browse here to find out more about the most recent London Geek dinner. There's another one coming up...

Author: Steve Lamb Date: 04/30/2006

What should a User Group be? A New Information Security User Group is taking form

Many people at InfoSec expressed great interest in joining a new User Group that's focused 100% on...

Author: Steve Lamb Date: 04/29/2006

Is there any way for Malware to attach itself to Word Documents OTHER THAN VIA MACROS?

There are many well known pieces of Malware that target Microsoft Word Macros - hence they are...

Author: Steve Lamb Date: 04/29/2006

Update re. how to deal with Phishing on OSX

Following my recent post, James has referred me to Mactopia which confirms that IE has indeed been...

Author: Steve Lamb Date: 04/29/2006

Information is NOT Power. Effective Security enables Powerful decisions

Information is NOT Power. Timely access to accurate information can give the holder the ability to...

Author: Steve Lamb Date: 04/29/2006

Is there a way to stop Phishing on the Apple Mac's Safari Browser?

I'm not casting aspertions on Apple's Safari browser in any way. @ InfoSec I discussed Internet...

Author: Steve Lamb Date: 04/27/2006

How to improve the level of assurity in your Windows System integriry and data integrity - Windows Vista's Bitlocker feature

The most popular area of discussion I experience regarding Microsoft @ InfoSec related to Bitlocker...

Author: Steve Lamb Date: 04/27/2006

It was great to see so many of you @ InfoSec in London this week.

InfoSec (uber security show in London >10,000 attendees) this week has been great fun. Hard work...

Author: Steve Lamb Date: 04/27/2006

Looking for increased security via Trusted Platform Module (TPM) support such as Windows Vista's Bitlocker

Andy made an interesting comment regarding his interest in Trusted Platform Module (TPM) hardware...

Author: Steve Lamb Date: 04/27/2006

What's your view of multi-factor authentication?

Steve Riley's looking for your feedback on what works for you - please browse to here and give him...

Author: Steve Lamb Date: 04/26/2006

Internet Explorer 7 Beta 2 is now available - download IE7 here

Click here to download Internet Explorer 7 Beta 2. IE 7 is nearing release bringing with it a wealth...

Author: Steve Lamb Date: 04/25/2006

Join Rafal for a free event covering Identity Management

Browse here to register for Rafal's free event - it's running in the UK (Reading) on the 17th May....

Author: Steve Lamb Date: 04/24/2006

Will end users turn off Windows Vista's User Account Control feature?

This is the final part of a three part response to a comment made by Matt in his comment regarding...

Author: Steve Lamb Date: 04/21/2006

How will Windows Vista's User Account Control (UAC) work?

This is the second part of a three part response to a comment made by Matt in his comment regarding...

Author: Steve Lamb Date: 04/20/2006

How to keep your system(s) safe from Malware including Spyware, Worms, Viruses and Rootkits

Many of us are concerned about the ever increasing threat to information security and business...

Author: Steve Lamb Date: 04/19/2006

How is privilege used in Windows XP, NT, 2000 and 2003. What are DACLs and SACLs

This is the first part of a three part response to a comment made by Matt in his comment regarding...

Author: Steve Lamb Date: 04/18/2006

InfoSec 2006 is just around the corner - if you're in the UK and interested in security it's well worth a visit

Browse here to find out more about the event. InfoSecurity (InfoSec) Europe 2006 is an exhibition...

Author: Steve Lamb Date: 04/17/2006

A "Plain English" description of what we mean by RPC over HTTP(S)

Eileen's posted a nice concise description explaining "what is RPC over HTTP(S)". As we move away...

Author: Steve Lamb Date: 04/14/2006

Who do all those acronyms mean? Where's an accurate technical dictionary of Microsoft terminology?

The Microsoft Developer Network (MSDN) provides an excellent technical reference for terminology...

Author: Steve Lamb Date: 04/14/2006

How to mitigate the threat posed by malware and how Windows Vista will help in the long run

Many of us are concerned about the ever increasing threat to information security and business...

Author: Steve Lamb Date: 04/13/2006

Why doesn't SMS check to see whether I've actually installed security updates before inflicting them upon me?

The SMS client is present on my computer (Windows XP SP2) to ensure that it's up to date with...

Author: Steve Lamb Date: 04/12/2006

What is a firewall, ISA Server and caching in laymans terms - here's a simple analogy

Earlier today I was asked "what is ISA Server?" - the person who asked me was completely...

Author: Steve Lamb Date: 04/11/2006

How to recover from Malware infestation? How to avoid getting malware in the first place

I encourage customers to architect machines such that data is stored in a separate partition of the...

Author: Steve Lamb Date: 04/10/2006

Traffic information MashUp

Click here to play with the Traffic Information MashUP - and here to find out what a MashUP is! In...

Author: Steve Lamb Date: 04/07/2006

Why can't regular users shutdown Windows Server 2003?

Perhaps this is obvious for a production system - you'd hardly want end-users to be able to shutdown...

Author: Steve Lamb Date: 04/07/2006

I'm NOT a Girl!

...but I have been to a Girl Geek Dinner and plan to go to more. As the name suggests they focus on...

Author: Steve Lamb Date: 04/07/2006

Security Quick Reference - here's a list of security resources for IT Pro, Dev and Consumers alike

Security Quick Reference Guidance The Security Guidance Centers provide the most prescriptive...

Author: Steve Lamb Date: 04/06/2006

Here are some Online Technical Security resources that will help you keep up with Microsoft Security Innovations

The Microsoft Security Newsletter is a monthly electronic newsletter that's tailored for IT...

Author: Steve Lamb Date: 04/06/2006

Is Effective Information Security an ART or a Science?

Let's start with a definition to set the tone - this is one I've made up: "Effective Security is...

Author: Steve Lamb Date: 04/05/2006

Get answers to difficult questions and debate security solutions with experts at InfoSec 2006 in London

Browse to our InfoSec2006 page to read about the free education sessions and debates we'll be...

Author: Steve Lamb Date: 04/05/2006

Where can I find out how to write secure code?

The Microsoft Application Security Website is a UK based resource that aims to help you write more...

Author: Steve Lamb Date: 04/04/2006

MSDN invite you to join SPI Dynamics for a "Web Application Hacking Workshop"

Let's get this straight to start with MICROSOFT WILL NOT BE TEACHING YOU HOW TO HACK! Our partner...

Author: Steve Lamb Date: 04/04/2006

<Previous Next>