Thought of buying a Wii? Think again
I have to admit: Not really security related but really, really, really cool. Look at this Xbox trailer: http://www.gametrailers.com/video/e3-09-project-natal/50017?type=wmv
Roger
I have to admit: Not really security related but really, really, really cool. Look at this Xbox trailer: http://www.gametrailers.com/video/e3-09-project-natal/50017?type=wmv
Roger
You heard it: We went live with our new search engine called Bing on bing.com as we are convinced that you should not search – but find!
You should have a look at it especially as we got some outstanding third-party feedback.
Roger
A lot of people and companies are talking about “the Cloud†today. I guess that there are not too many companies that share the same track record of running online services as Microsoft. 1994 we launched MSN and since then we are in this business. Microsoft Global Foundation Services (the group responsible for this infrastructure)…
DetailsYou might know that we have something we call the Microsoft IT Showcase, where our internal IT shows how they use our technology to run our environment. Now, we just published a new article, which might be interesting for you to read called Using DirectAccess to Provide Secure Access to Corporate Resources from Anywhere. I…
DetailsAs you might have read, I recently blogged about my infrastructure and the future of a platform towards a better management of compliance – honestly, I actually played with our latest technology . I wrote about Deploying PKI Time Sync on Virtual DCs Now, a necessary and very important next step towards compliance as well…
DetailsYou might remember it: January 15th, 2002 Bill Gates wrote the famous memo on Trustworthy Computing to all the employees at Microsoft. This was probably one of the biggest initiatives at Microsoft and radically changed the way we develop software (and much, much more). I remember when I was the first time on stage talking…
DetailsWe recently revealed the File Classification Infrastructure in Windows Server 2008 R2. This infrastructure can help you to classify files not only based on the location where it is stored but based on content as well. However, there is not too much value for me to blog more about that, let the experts speak: Classifying…
DetailsOur Security Research and Defense team blogged on the PowerPoint security update we published on Tuesday. There are a few things which were not “business as usualâ€: The update for the Windows version of PowerPoint went out before the Mac version. The reason is that we did not want to hold the Windows-version which could…
DetailsThis is a very tough legislation: France just agreed on a new Internet Piracy Bill. If you violate piracy laws three times, you will be banned from the Internet up to an year:
Interesting approach
Roger
This morning I opened one of the Swiss Sunday newspapers and Google Chrome made it to the front-page with a “best practice approach†for deploying security updates. In the article itself it was claimed that Chrome is one of the best browsers with regards to security as the deploy patches silently, without letting the user…
DetailsRepublished with the fixed link (thank you for the one who told me via messenger) In my last blog post Direct Access – A Step by Step Guide I just linked to a paper showing how you can set it up. However, based on that I got questions on both of my blogs how it…
DetailsDirect Access is one of the coolest features I used since a quite while. I am part of our internal pilot since months and it is absolutely great: You connect to the Internet and you are immediately connected to the corporate network. No VPN, nothing. If you want to know how to set this up,…
DetailsMichael Howard, one of our gurus, when it comes to secure code development, wrote a dialogue on SDL and Threat Modeling called A Conversation About Threat Modeling – this is definitely a must read, even if you are not a developer
Roger
This is impressive to me: I was looking at the website of the Centers for Disease Control and Prevention and the way they use the Internet and social media to communicate about the Swine Flu. They use all the latest media like Widgets, websites for mobile browsers, buttons to add to your website, online videos,…
DetailsThis is not about piracy and not about leaks and not about… I am waiting for the new RC build as you are. I am running an intermediate build between Beta and RC and would love to upgrade all my machines (including my MediaCenter) to RC. However, I refrain from downloading it from any of…
DetailsJust a quick one. We released SP2 for Office 2007. You can download it here.
Roger
Scott held a keynote during RSA this week. Here you find the webcast (it is about 30 minutes) – definitely worth looking at:
Roger
I guess you have read it in the meantime: There are a lot of reports out there, that Finjan found a Botnet affecting 1.9 Million computers. This is really bad – obviously. The press now started to cover this and I think we are already losing a little bit of focus in the discussion. I…
DetailsJust a brief one: I wrote an article for Infosecurity which was just published in the latest version covering the economic downturn as well. It is called Time to Step Up and can be found on page 45 of the latest edition.
Roger