Mandatory Integrity Control (What,how and why do we care?)

The theory Mandatory Integrity Control (MIC) is an additional layer of security built into Vista andWindows 2008. This particular layer helps Windows protect itself from harmful intentional and unintentionalchanges to important objects. Among the objects protected we can find files, directories, registrykey, printers, and actually any object that has a security descriptor. The beauty of MIC is that it has been there in the background all along protecting you, yet you never knewit existed. You might have actually encountered it by trying to change a file that is protected by it, and eventhough you had the permission you couldn’t… The … Continue reading Mandatory Integrity Control (What,how and why do we care?)

Citrix to acquire XenSource

Somewhat surprising but understandable. The question is how will Citrix size up against Microsoftif Microsoft will see them as a competition and not a partner. Official announcement by Citrix Brian Maddens comments

Windows 2008 Technical Library

With the advent of Windows 2008 (Beta),and basically everyone getting their hands on a copy andtrying to learn how to use it, the Windows 2008 Technical Library can be a great resource.The library describes what’s new and provides step by step guides to explore the features:

Windows Live OneCare 2.0 to feature Online Photo Backup

A post on the Windows Vista team blog promises that the new OneCare will come with 10GB of online storage to be used as a backup location for digital photographs(at a cost). The post providesa short demonstration of the feature. Wow,10GB. Online backup,kind of blows you away and makes you think about how everythingis going online. If network connections speed keeps growing you will no longer need local storageand your data will follow you…Ok,I can’t be that positive, think of the ramifications though,yourpersonal files will be stored on a location that you do not control…

A look at User Account Control (UAC)

Overview UAC (also called Admin Approval Mode) is a new feature introduced with Windows Vista. The main goal of thisfeature is to protect the operating system from malicious or accidental damage. This goal is achieved by requesting consent from the user when an administrative action is attempted (installing an application, openingcomputer management,etc.) UAC has been introduced as the eternal battle between security and functionality rages on. While on one hand wewould like to allow our users to have full access to their systems (which essentially are their tools of trade), on theother hand we are well aware that allowing unlimited access will without any doubt lead to … Continue reading A look at User Account Control (UAC)

Phishing Sites and IE7

Technorati Tags: IE7, rants, general computing I am an Ebay user. As an Ebay user I am a target for phishng attacks. About a week ago I have made a purchaseand I forogt to leave feedback for the seller. A few minutes ago,I received an e-mail saying that I have receiveda message from a seller(nothing special for someone who uses Ebay). I was a bit distracted so I pressed thehyperlink found in the e-mail. In a second I was transported to a message from IE7 saying that I am trying to reach a site that is reported as a known … Continue reading Phishing Sites and IE7

Windows Server 2008 Component Posters

These two posters, originally published in the July 2007 issue of TechNet Magazine, provide astrong visual tool to aide in the understanding of various features and components of WindowsServer 2008. One poster focuses exclusively on powerful new Active Directory technologies,while the other provides a technical look at a variety of new features available in Windows Server2008 (such as Server Core, Network Access Protection, and more).

Events and Errors Message Center

When one of the systems that you manage fails one the best ideas for troubleshooting islooking at the logs. If the OS you are using is from Microsoft the main location for logs is the event viewer. The only problem with logs is that at times they provide very cryptic messages. In order to figureout what the entry in the log means or what remedies can be used I personally use the followingwebsite:http://www.eventid.netA couple of day ago I have noticed a KB article announcing that an “Events and Errors Message Center”has been opened. This center will enable you to search for specific … Continue reading Events and Errors Message Center

Windows 2008 Impressions: Attended Installation

The attended installation process of Windows 2008 has been simplified. Until Windows 2008, the process of installing a Windows system included the basic configuration of the system.In other words the installer was asked a bunch of question he had to answer and once he was done he had a runningsystem. The system still needed to be configured but a basic system was up and running. Windows 2008 changes this, (the installation no longer provides a running system) in order to simplify the installation process almost all configurative questions have been removed and we are left with the bare necessities. The installationprocess … Continue reading Windows 2008 Impressions: Attended Installation