Welcome to Community Server Sign in | Join | Help

August 2006 - Posts

A little discussed feature in Windows Vista is Mandatory Integrity Control (MIC). Unlike DACL (Discretionary Access Control Lists), MIC is designed to protect your operating system based on the trustworthiness of the code being run. High integrity files Read More...
Everyone who works in infosec has heard of Bruce Schneier, even though you might not agree with everything he says. He's written a couple of well known books (amongst other things), including "Applied Cryptography" and "Secrets and Read More...
1 Comments
Filed under:
Well it seems Mitch is talking about user-centric identity again. :-) I'd like to say that users should be in control of their identity. And identity exchange systems that make it easier, better and more secure for users to interact with computer Read More...
1 Comments
Filed under:
Seen on bash.org - made my laugh Coke out my nose. does anyone waht error: 0x1d1c4e86 referenced memory at 0x0000000000 the memory could not be read mean? :D yes what does it mean ? i only get it when i'm browsing the harddrives someone forgot to Read More...
What else has changed with services in Vista? The user contexts that services run under has changed dramatically in Windows Vista. Instead of running as LocalSystem, many services now run as lower privileged Network Service or Local Service for most of Read More...
Microsoft ISA Server 2006 has been released. Internally within Avanade we have been using ISA Server 2006 (aka Wolverine) for around six months to publish our internal Early Adopter environment (Exchange 2007, Sharepoint 2007 etc) where we test Microsoft Read More...
MSDN Library is now a freely available download from Microsoft, saving developers and systems administrators who previously had to subscribe to an MSDN Library level subscription. The May MSDN library is available from Microsoft Download Centre . Read More...
2 Comments
Filed under: , ,
Tristan's got a post explaining how to determine whether your client's using NTLM or Kerberos when authenticating to your web application. Is there a better way than looking at the size of the request? I think so (but that's just my opinion). Read More...
2 Comments
Filed under: ,
If you're coming to Tech.Ed Sydney please feel free to drop by and say "Hi!" I'll be presenting two sessions on Wednesday afternoon: 2:00 PM - 3:15 PM WEB201 IIS 7: End-to-End Overview of Microsoft’s New Web Application Server Read More...
4 Comments
Filed under: ,
Welcome to part 1 of a "Why Vista" series. Following on from my previous post, I'll hopefully be presenting a post every few days on what good changes are coming in Vista. None of these are features that will appeal to everyone, but the Read More...