microsoft

Network Access Control and IoT Security

Network Access Control,  is an approach to computer security that attempts to unify endpoint security technology (such as antivirus, host intrusion prevention, and vulnerability assessment), user or system authentication and network security enforcement. When a computer connects to a computer network, it is not permitted to access anything unless it complies with a business defined policy: anti-virus protection level, system update level configuration. While the computer is being checked by a pre-installed software agent, it can only access resources that can remediate (resolve or update) any issues and nothing else. Once the policy is met (it has an antivirus, it…


Microsoft EMET has a problem with Java – but who doesn’t ?

EMET stands for Enhanced Mitigation Experience Toolkit – and it is a tool that you MUST have installed on your Windows PC. EMET is a utility that helps prevent vulnerabilities in software from being successfully exploited.EMET achieves this goal by using security mitigation technologies. These technologies function as special protections and obstacles that an exploit author must defeat to exploit software vulnerabilities. These security mitigation technologies do not guarantee that vulnerabilities cannot be exploited. However, they work to make exploitation as difficult as possible to perform. For more information about EMET, click the following article number to view the article…


No Picture

“What do you want to download today?” (free eBooks from Microsoft)

Microsoft finally found out that Free is very, very powerful. Especially when you want to do “free” marketing. For example, this link is going viral across the Internet. So, in the Microsoft way: “What do you want to download today?” 🙂 (I hope this slogan is not copyrighted. 🙂 ) Thank you, Eric Ligman. If you’re not convinced yet to have a look, then start with this one: How To Recover That Un-Saved Office Document  


No Picture

Microsoft, you’re not as smart as you thing you are!

I was installing an update of OneNote and I suddenly received this popup:   Continuing could be expensive” You’re connected to a network that limits downloads every month. We need to stream some large files over your network connection to install Ofifice, so we recommend installing while connected to an unrestricted netowork. … Seriourly, Microsoft? How the hack do you know what kind of contract I have? Or, are you working with NSA and spying on my contract? Or with BND (Bundes Nachrichten Dienst – for Germany) ? For the record, I don’t have a volume base internet access contract….


No Picture

How LinkedIn uses your face for job ads

I saw this picture while being logged in on LinkedIn. I wasn’t doing anything specific and definitely not something related to job  search. This appeared on the right side of the window. The funny thing is that if you click on Apply Now you see that actually the ad is location dependent. This job was in Germany (where I live) and actually relatively near me (Munich is 200 KM near me). No, I didn’t apply 😉    


No Picture

Microsoft Defender and dangerous alert levels

Description: This program changes various computer settings. Advice: This software is typically benign when it runs on your computer, unless it was installed without your knowledge. If you’re not sure whether to permit it, review the alert details or check if you recognize and trust the publisher of the software. Category: Tool       Clicking on the link in the dialog gets you here where it is explained that it is actually a Research Tool.   Research Tool:Win32/EICAR_Test_File Tool:Win32/EICAR_Test_File (?) Encyclopedia entry Published: Mar 08, 2007 Aliases Not available Alert Level (?) Severe Antimalware protection details Microsoft recommends that…


No Picture

Guest blogger: Larry.Walsh: Security Idea: Recall the Internet

I totally agree with this blog post of Larry.Walsh (seen on from CompTIA). Source: http://blog.comptia.org/2010/10/13/security-idea-recall-the-internet/ Author: Larry.Walsh Microsoft’s Scott Charney says we should treat malware-infected PCs in the same manner as 19th century public health officials treated victims of typhoid, tuberculosis and cholera: quarantine. Yes, the head of Microsoft’s Trustworthy Computing believes malware infections are so pervasive and destructive that isolation is the only means for protecting the greater good. Perhaps, but I have a better idea: recall. First, let’s review Charney’s idea – quarantine. “Governments, industry and consumers should support cyber-security efforts modeled on efforts to address human illnesses….



No Picture

10 reasons why I hate MS Outlook

1. It is crashing continuously because it is locked in some intensive I/O and the OS (yes, *their* own OS) is killing the application as being non responsive. 2. Lack of good plugins. In contrary to Thunderbird where there are thousand of plugins, the really good plugins for Outlook are very few. 3. Eats up a lot of memory. Currently, with only one Exchange account, the two instances I have (don’t ask me why I have 2) occupy each 78MB. However, I’ve seen 130 MB used by only one instance. I think that the 2. instance has to do with…


No Picture

32-bit and 64-bit Application Interoperability – Windows (part 1)

I needed a solution for making an application which is native 32b to “discuss” with a 64b client. The client is creating a shared memory in which some data is saved. The server needs to process the data. Amazon: Bestsellers Electronics and Photo Here is how MSDN describes the problem: Running 32-bit Applications (on 64-bit OS): http://msdn.microsoft.com/en-us/library/aa384249(VS.85).aspx And my problem is addresses here: http://msdn.microsoft.com/en-us/library/aa384203(VS.85).aspx Interprocess Communication Amazon: Bestsellers Electronics and Photo The following techniques can be used for communication between 32- and 64-bit applications: * Handles to named objects such as mutexes, semaphores, and file handles can all be shared….


By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close