Vista vulnerabilities – a comparison.

Perhaps it’s a bit strong to say “if complete and utter chaos was lightning, Jeff Jones would be the sort to stand on a hilltop in a thunderstorm wearing wet copper armour and shouting ‘All gods are bastards’ ” (as a favourite quote  has it)  but you must admit it’s a better opening than “Blimey, XP was better…

6

Vista SP1 to drop "Reduced functionality mode"

I guess I’m not the only person in Microsoft who thought that stopping software working when it seemed to be pirated was a good idea. To be honest, I still do. However, the process has to be infallible. If it’s 99.9% correct and you sell 100 Million copies that’s 100,000 people who get the wrong experience….

2

Do you trust your search engine ?

No, not a question about the information Google keeps on you… Catching up on my news stories from last week I found Hackers hijack web search results – which was “a campaign to poison web searches and trick people into visiting malicious websites”. The sites concerned used previously patched vulnerabilities so there’s nothing to worry about if…


A police state ?

I’ve talked about serendipity a few times before. And a couple of strands in the News today show it at work. The information commissioner has served notices on 4 polices forces telling them that some information they hold about people is no longer relevant and should be deleted. The BBC has examples of the things he’s talking…

6

Security and blogging.

This would normally be one for Steve, but he’s got a few days away…  Kim Cameron’s blog got hacked; normally I’d just say “Blog hacked: Film at Eleven”. Except Kim is a big noise in the Microsoft security world. ZDNet broke the story,  and the comments to it show Anti Microsoft folks out there laughing…

1

Windows Activation (Server 2008 style)

One of the things we’ve done with Windows over the years is to try to make life a bit harder for people who pirate it. This isn’t just about protecting Microsoft’s revenue (or even keeping that revenue out of the hands of criminals) but investigations have found that pirates expose their “customers” to other risks:…

9

One of those "Oh no" moments

Someone was asking me about gadgets, and went off looking for something and turned up a page at Gadgets.co.uk innocently in a corner is something which you’d expect to find in Q’s lab in a James Bond movie, but not in the “Amuse your friends by plugging into their PC” aisle. A key logger. KeyShark…

4

Privacy. And a tale of headless riders, Police blogs and security theatre

When dealing with data privacy, we need to think about proper use of Personally Identifiable information (PII) – the kind which can be used to identify someone and which tells us something about them. In the UK, the Information Commissioner , oversees operation of the Data Protection Act, which has principles and conditions for processing…

4

Rights managed mail. Windows Mobile 6 pulls a new trick.

Digital rights management get a bad press. To most of us, as consumers of music or video it’s something which limits what we do. We can tell right from wrong, we don’t need stuff to limit us … right ? Of course People who create “intellectual property” have a different view. And that’s not just record companies,…


Ooops. I gave out some duff information about limiting logons

As Eileen has already said our team spent last week at the BETT show. My first “proper” IT job after leaving university was working for RM who are the biggest supplier of IT to education and I did a couple of BETT shows when I worked for them; it’s the main UK IT-in-education show and it’s huge…

2