Germany provides a secure way to deal with spam

“In theory, stopping spam is easy: just make it uneconomic to send millions of messages by charging for each one sent, or make senders authenticate their identity to stop address spoofing and simplify blocking. In practice, that would involve building a secure, parallel email infrastructure linking electronic authentication with real-world identities: a daunting task. Yet…

1

Windows 7 Security Primer

Good series of articles about Windows 7 security:http://www.windowsecurity.com/articles/Windows-7-Security-Primer-Part1.htmlhttp://www.windowsecurity.com/articles/Windows-7-Security-Primer-Part2.htmlhttp://www.windowsecurity.com/articles/Windows-7-Security-Primer-Part3.html These articles cover the fundamental information how to secure Windows 7 and some of the lesser known security functionality it provides. – Urs  

1

A strong Password isn’t the strongest Security

Make your password strong, with a unique jumble of letters, numbers and punctuation marks. But memorize it — never write it down. And, oh yes, change it every few months… Yes, that’s it? Or not?  “Keeping a keylogger off your machine is about a trillion times more important than the strength of any one of…

5

Anti-DoS Dynamic IP Restrictions for IIS 7.0 Hits Beta2

Microsoft has made available for download the second Beta development milestone of an anti-DoS extension for version 7.0 of Internet Information Services [IIS]. The Microsoft Dynamic IP Restrictions for IIS 7.0 has reached Beta2 and is up for grabs via the Microsoft Download Center in two flavors, 32-bit (x86) and 64-bit (x64). http://www.microsoft.com/downloads/details.aspx?displaylang=en&FamilyID=a0920a32-b63d-4e13-8e42-7ad7ad9b3168 The Dynamic…

1

Microsoft Security Compliance Manager released

The Security Compliance Manager will help you accelerate knowledge to merge best practices, customize once to centralize decision making, and export to multiple formats to enable monitoring, verification, and compliance. The tool is designed to help accelerate your organization’s ability to efficiently manage the security and compliance process for the most widely used Microsoft technologies….

0

Seattle Tops List of Riskiest Cyber Crime Cities!

MSNBC:Seattle is the riskiest online city, according to a new survey. Symantec says Seattle tops the list because people are more likely to access the Web each day and use the Internet for shopping and banking, and because of the proliferation of wireless Internet access. http://www.msnbc.msn.com/id/35985828  Ups.. as I am currently in Seattle and knowing…

0

The Biggest Cloud on the Planet is Owned by ... the Crooks!

Network World: Who’s got the biggest cloud in the tech universe? Google? Pretty big, but no. Amazon? Lots and lots of servers, but not even close. Microsoft? They’re just getting started. Household names all, but their capacity pales to that of the biggest cloud on the planet, the network of computers controlled by the Conficker…

1

Newest Security Reports Show Changing Threats

Scott Hogg, Core Networking and Security: “I find it useful to seek out new perspectives on the ever-changing security realm. By reviewing these [security] reports, we can gain a greater understanding of the emerging Internet threats our organizations are facing.” Includes links to various security reports:http://www.networkworld.com/community/node/58241 -Urs  

0

Guidelines for the Secure Deployment of IPv6 (Draft)

[NIST] With the dwindling number of IPv4 addresses, the Office of Management and Budget (OMB) mandated that U.S. federal agencies begin using the IPv6 protocol. This document provides guidelines for organizations to securely deploy IPv6. http://csrc.nist.gov/publications/drafts/800-119/draft-sp800-119_feb2010.pdf Urs  

0