Nuclear Controls

On a nuclear submarine, it takes two keys to initiate the launch of a nuclear missile (if movies like Hunt for the Red October are to be believed).  At Microsoft, it looks like we use THREE cards to allow access to our Public Key Infrastructure. Microsoft IT created security worlds with administrative card sets composed…

0

CISSP® Baby!

In my Inbox today from (ISC)2: Congratulations! It gives me great pleasure to be the first to address you with the Certified Information Systems Security Professional (CISSP®) designation! Based upon your examination results, a review of your application and acceptance of your endorsement, the (ISC)2 Board of Directors awarded you with the CISSP designation. Yaaay!…

3

Threats and Countermeasures Guide updated for Windows Vista

It looks like the Threats and Countermeasures guide has been updated for Windows Vista. This guide is a reference to security settings that provide countermeasures for specific threats against current versions of the Windows® operating systems. This guide is a companion for two other publications that are available from Microsoft: Windows Server 2003 Security Guide…

0

Process Monitor 2 Released – Now with more cowbell!

If you have any need to find out what your computer is really doing under the hood, you know that Process Monitor is the tool.  Today, Process Monitor 2.0 was released.  From the Sysinternals blog: This major update to Process Monitor adds real-time TCP and UDP monitoring to its existing process, thread, DLL, file system…

2