Welcome to Community Server
Sign in
|
Join
|
Help
Search
Ken Schaefer
200 OK :: Internet Information Services, ASP.NET and other sundry things
RSS 2.0
Atom 1.0
Home
Email
Tags
ASP.NET
Debugging
IIS
Other
Other Tech
Security
Virtualization
Vista / Windows Server 2008
Archives
June 2010 (2)
November 2009 (2)
October 2009 (1)
September 2009 (2)
July 2009 (2)
June 2009 (2)
April 2009 (1)
March 2009 (3)
February 2009 (1)
January 2009 (1)
September 2008 (1)
June 2008 (1)
May 2008 (2)
April 2008 (2)
March 2008 (4)
February 2008 (3)
January 2008 (9)
December 2007 (2)
November 2007 (4)
October 2007 (1)
September 2007 (2)
August 2007 (1)
July 2007 (1)
June 2007 (3)
May 2007 (6)
April 2007 (3)
March 2007 (6)
February 2007 (5)
January 2007 (9)
December 2006 (3)
November 2006 (1)
October 2006 (11)
September 2006 (4)
August 2006 (10)
July 2006 (7)
June 2006 (3)
April 2006 (6)
March 2006 (9)
February 2006 (7)
January 2006 (1)
November 2005 (8)
October 2005 (3)
September 2005 (2)
August 2005 (2)
July 2005 (1)
June 2005 (2)
May 2005 (5)
April 2005 (4)
March 2005 (8)
Blogs Worth Reading
Bernard Cheah (IIS MVP)
Exchange Server Team
IETeam (MSFT)
Raymond Chen (MSFT)
Scott Guthrie (MSFT)
Tess (MSFT)
IIS Digest
Virtual PC Guy
Rakki MK (IIS - MSFT)
Microsoft.com Operations Team
Navigation
adOpenStatic.com Home
Blog Home
August 2006 - Posts
Why Vista? Mandatory Integrity Control (MIC) (Security, Stability, System Integrity)
Posted
Friday, August 18, 2006 8:02 AM
by
Ken
A little discussed feature in Windows Vista is Mandatory Integrity Control (MIC). Unlike DACL (Discretionary Access Control Lists), MIC is designed to protect your operating system based on the trustworthiness of the code being run. High integrity files
Read More...
4 Comments
Filed under:
Vista / Windows Server 2008
,
Security
Security Facts about Bruce Schneier that you may not know - Hilarious!
Posted
Friday, August 18, 2006 1:47 AM
by
Ken
Everyone who works in infosec has heard of Bruce Schneier, even though you might not agree with everything he says. He's written a couple of well known books (amongst other things), including "Applied Cryptography" and "Secrets and
Read More...
1 Comments
Filed under:
Other Tech
On Identity and Authorization
Posted
Tuesday, August 8, 2006 8:33 AM
by
Ken
Well it seems Mitch is talking about user-centric identity again. :-) I'd like to say that users should be in control of their identity. And identity exchange systems that make it easier, better and more secure for users to interact with computer
Read More...
1 Comments
Filed under:
Security
Access Violation - must be mouse drivers!
Posted
Saturday, August 5, 2006 4:23 AM
by
Ken
Seen on bash.org - made my laugh Coke out my nose. does anyone waht error: 0x1d1c4e86 referenced memory at 0x0000000000 the memory could not be read mean? :D yes what does it mean ? i only get it when i'm browsing the harddrives someone forgot to
Read More...
1 Comments
Filed under:
Other Tech
,
Debugging
Why Vista? Changes to services part 2 (Security, Stability, System Integrity)
Posted
Saturday, August 5, 2006 3:57 AM
by
Ken
What else has changed with services in Vista? The user contexts that services run under has changed dramatically in Windows Vista. Instead of running as LocalSystem, many services now run as lower privileged Network Service or Local Service for most of
Read More...
1 Comments
Filed under:
Vista / Windows Server 2008
,
Security
ISA Server 2006 Released
Posted
Wednesday, August 2, 2006 8:05 AM
by
Ken
Microsoft ISA Server 2006 has been released. Internally within Avanade we have been using ISA Server 2006 (aka Wolverine) for around six months to publish our internal Early Adopter environment (Exchange 2007, Sharepoint 2007 etc) where we test Microsoft
Read More...
(Comments Off)
Filed under:
Other Tech
,
Security
MSDN Library now a free download
Posted
Wednesday, August 2, 2006 8:00 AM
by
Ken
MSDN Library is now a freely available download from Microsoft, saving developers and systems administrators who previously had to subscribe to an MSDN Library level subscription. The May MSDN library is available from Microsoft Download Centre .
Read More...
2 Comments
Filed under:
IIS
,
ASP.NET
,
Other Tech
Two easy (easier?) ways to determine Kerberos from NTLM in a HTTP capture
Posted
Wednesday, August 2, 2006 7:49 AM
by
Ken
Tristan's got a post explaining how to determine whether your client's using NTLM or Kerberos when authenticating to your web application. Is there a better way than looking at the size of the request? I think so (but that's just my opinion).
Read More...
2 Comments
Filed under:
IIS
,
Debugging
Tech.Ed Sydney - see you all there!
Posted
Tuesday, August 1, 2006 8:22 AM
by
Ken
If you're coming to Tech.Ed Sydney please feel free to drop by and say "Hi!" I'll be presenting two sessions on Wednesday afternoon: 2:00 PM - 3:15 PM WEB201 IIS 7: End-to-End Overview of Microsoft’s New Web Application Server
Read More...
4 Comments
Filed under:
IIS
,
Other Tech
Why Vista? Changes to services part 1 (Security, Stability, System Integrity)
Posted
Tuesday, August 1, 2006 8:13 AM
by
Ken
Welcome to part 1 of a "Why Vista" series. Following on from my previous post, I'll hopefully be presenting a post every few days on what good changes are coming in Vista. None of these are features that will appeal to everyone, but the
Read More...
1 Comments
Filed under:
Vista / Windows Server 2008
,
Security