Three guys got together over pints in February 2009 and talked about how one of the issues facing Technical Professionals today is keeping their systems patched and up to date. This issue was brought up to them at a User Group meeting they were attending (Ottawa Windows Server User Group) where we were participating in an “Ask the Microsoft Guy” panel discussion.
Over pints at D’Arcy McGee’s, Pierre Roman, Bruce Cowper and I decided we would try to help solve the issue of information overload regarding patching and put together a timely podcast to go live each “Patch Tuesday”.
- Use plain English terms and every day language that any Technical professional can understand – minimize “corporate speak”.
- Breakdown each Security Bulletin with summary information first followed by more details as to the impact an IT Pro would face.
- Outline mitigation factors in case patches couldn’t be tested or applied in a timely fashion
- Keep it top 20 minutes OR LESS. This one is critical – Keep It Simple, repeatable and get out of the IT Pros way to get on with their day.
- Have fun!
Have a listen directly from the embedded Silverlight player OR subscribe to the specific feed and download it to your iTunes / Zune software.
As always - if you have suggestions on making it better - please pass on your comments. Mail me directly – firstname.lastname@example.org
Subscribe to the podcast: (so you don't miss an episode)
Disclaimer: This podcast was produced with the best information available to us at the time of recording. Your primary source for all things Security Bulletin related should always be the Microsoft Security Response Center blog.
Bulletins discussed for September 8th, 2009:
- MS09-045 - Vulnerability in JScript Scripting Engine Could Allow Remote Code Execution (971961)
- MS09-046 - Vulnerability in DHTML Editing Component ActiveX Control Could Allow Remote Code Execution (956844)
- MS09-047 - Vulnerabilities in Windows Media Format Could Allow Remote Code Execution (973812)
- MS09-048 - Vulnerabilities in Windows TCP/IP Could Allow Remote Code Execution (967723)
- MS09-049 - Vulnerability in Wireless LAN AutoConfig Service Could Allow Remote Code Execution (970710)
Podcast Participants: Pierre Roman, Bruce Cowper and myself.
Additional Technical Show Notes:
- The IE8 Block Toolkit that was mentioned during the podcast (in order to block IE8 from downloading on unmanaged machines) can be found at this URL.
- Beverages on Pierre’s patio were Alexander Keith’s Red Amber Ale (http://www.keiths.ca/)