TechEd Office announces Service Pack 1 Unveiled for Office 2010 and SharePoint 2010

Scheduled for release at the end of June, SP1 will include updates across the client suites and server products. Check out the list of improvements and new features, and stay tuned for more details, on the Microsoft Office Blog.

Some announced  features include,

Across the client suites and server products, SP1 offers a sprinkling of improvements to make a strong 2010 release wave even stronger. During TechEd and beyond, teams on http://blogs.office.com will update their blogs with more specific details of 2010 Service Pack 1 contents.

There are far too many changes in SP1 to list here, but the list below is a sample of SP1 highlights to get things started. This is a list of things that you can do now that you couldn’t before, or things that are just better than they were with the original release:

  • Outlook fixes an issue where “Snooze Time” would not reset between appointments.
  • The default behavior for PowerPoint "Use Presenter View" option changed to display the slide show on the secondary monitor.
  • Integrated community content in the Access Application Part Gallery.
  • Better alignment between Project Server and SharePoint Server browser support.
  • Improved backup / restore functionality for SharePoint Server
  • The Word Web Application extends printing support to “Edit Mode.”
  • Project Professional now synchronizes scheduled tasks with SharePoint task lists.
  • Internet Explorer 9 “Native” support for Office Web Applications and SharePoint
  • Office Web Applications Support for Chrome
  • Inserting Charts into Excel Workbooks using Excel Web Application
  • Support for searching PPSX files in Search Server
  • Visio Fixes scaling issues and arrowhead rendering errors with SVG export
  • Proofing Tools improve spelling suggestions in Canadian English, French, Swedish and European Portuguese.
  • Outlook Web Application Attachment Preview (with Exchange Online only)
  • Office client suites using “Add Remove Programs” Control Panel, building on our work from Office 2007 SP2

Stay tune for more on this service pack.

Do you have IE6 apps but want to move to Windows 7

I hear this as a issue for a lot of companies.  Yes Microsoft has some great products for virtualizing old applications, But here some special. UniBrows is a add on for IE8 or IE9 that add a Tab in your browser that allow you to run IE-6 dependent web application unmodified in IE8 or IE9.

This solution work for those customers who need JUST browser backward compatibility. The cool thing about this add-on is that now you can migrate to Windows 7 easily.

UniBrows provides full IE6 functionality and behaviors, including ActiveX controls support and JavaScript functionality. Administrator-specified sites are rendered as if IE6 was powering the separate tab while other websites and nonconfigured URIs are loaded natively in IE8. The add-on can be deployed with standard IT methods, managed by Group Policy within IE8 (so company IT administrators can choose IE6-specific sites and applications to render as IE6), and also includes a Microsoft Management Console snap-in. In contrast to heavyweight virtualization-based mechanisms, UniBrows only requires 10MB of memory without changing a single line of code.

You can even had different version of Java running in your browser!

UniBrows-browser-screen-side-by-side

For a Trial Version go Here

Security Breach at Michaels Stores, Inc

MICHAELS ALERTS CUSTOMERS OF POTENTIAL DEBIT AND CREDIT CARD FRAUD

(IRVING, Texas) Michaels Stores, Inc. has learned that PIN pad tampering may have occurred in its Chicago-area stores and that customer credit and debit card information may have been compromised.

The company was contacted this week by banking and law enforcement authorities after some fraudulent debit card transactions were reported over the weekend. Authorities believe the fraudulent transactions may be linked to legitimate transactions in Chicago-area Michaels stores.

Consumers who have purchased items from a Michaels store with a debit or credit card are encouraged to monitor their statements, report any suspicious account activity, and change any PIN numbers and other account security settings. Consumers who believe their accounts were used without authorization should contact the card issuer directly. More consumer protection tips are available at the Federal Trade Commission website at http://www.ftc.gov/bcp/edu/pubs/consumer/alerts/alt150.shtm.

The company is working to assist authorities in the investigation. For additional information and updates, visit Michaels website at www.michaels.com.

 

Security hole in Android Devices

Android devices running versions 2.3.3 and below could be susceptible to attack when they are connected to unencrypted Wi-Fi networks. Anyone else on that network could gain access to, modify or delete Android users’ calendars, photos and contacts.

"It is quite easy," the researchers Ulm University from Ulm University in the southern part of Germany, wrote in a blog post Said  "The implications of this vulnerability reach from disclosure to loss of personal information."

Google has announced they are working on a fix.

 

Free eBook Windows 7 Power Users Guide

Mike Halsey is a Microsoft MVP and author of Troubleshooting Windows 7 Inside Out from Microsoft Press. Mike has created eBook Windows 7 Power Users Guide is now completely FREE. The book is for people of all technical ability from complete novices to IT Pros.

W7PUG-Cover-free-small

The book contains 16 chapters and is a guide on how to get the very best out of Windows 7 from installation to configuration and advanced operations. It includes step-by-step guides, screenshots and diagrams on every page, quick tips throughout the book. This is a great resource for all Windows 7 users.

To download go here

 

Security Hole – Nikon’s Image Authentication System

ElcomSoft Co. Ltd. researched Nikon’s Image Authentication System, a secure suite validating if an image has been altered since capture, and discovered a major vulnerability in the manner the secure image signing key is being handled. In turn, this allowed the company to extract the original signing key from a Nikon camera. The vulnerability, when exploited, makes it possible to produce manipulated images with a fully valid authentication signature. ElcomSoft was able to successfully extract the original image signing key and produce a set of forged images that successfully pass validation with Nikon Image Authentication Software.

ElcomSoft has notified CERT and Nikon about the issue, and prepared a set of digitally manipulated images passing as originals when verified with Nikon’s secure authentication software. Nikon has provided no response nor expressed any interest in the existence of the issue.

This is a Copy of the Notice ElcomSoft posted being cross posted to show an important security issue.

How to Avoid a Cyber Disaster

Date: April 27, 2011
Time: Noon – 1 PM ET

I will be presenting Planning for a cyber disaster makes recovering from one much easier. Still, as important as disaster planning is, it’s often overlooked or put off until it is too late. In this webinar, Global Knowledge instructor Jay Ferron will discuss planning for the unexpected, and he’ll teach simple tricks to reduce your company’s downtime before, during, and after a disaster.

Using a fictional company as an example, Jay will walk you through the disaster planning process a security professional should use.

Outline

    • What a disaster is
    • How to plan
    • Techniques to reduce the impact of a disaster
    • What BCP is
    • Five rules for creating a good disaster plan
    • Testing your disaster plan
    • Funding the plan
    • How and where to get help with your disaster planning process

To attend this session click here

TechED–Talks

I will be presenting at TechEd  May 15 – 19 in Atlanta.

May 15 10:30am-12:30pm           

WCL271-WRK – Introduction to Testing and Remediating Win32 Apps

In this instructor-led workshop, we enhance your skills at troubleshooting and remediating issues with Windows-based applications. We walk you through the process of surfacing and understanding the problem, troubleshooting the root cause, developing and testing remediation options, and providing recommendations on the potential solution options. The lab exercises are designed to be as real-world as possible (you may be troubleshooting real applications!) to help you to practice and develop your ability to overcome issues related to the migration from Windows XP to Windows 7.

Product/Technology: Windows® 7

Audience: Designer, Web Developer/Designer

May 15 1:00pm-3:00pm               

WCL272-WRK – Introduction to Testing and Remediation Web Apps

In this instructor-led workshop, we enhance your skills at troubleshooting and remediating issues with web-based applications. We take you through the process of surfacing and understanding issues with version checks, rendering, ActiveX controls, and scripting, discuss the options for resolving them, and along the way discover and practice using many of the tools that we use daily in troubleshooting Windows-based applications. The lab exercise are designed to be as real-world as possible, to help you to practice and develop your ability to overcome issues related to the migration from Internet Explorer 6 to Internet Explorer 8.

May 15 3:30pm-5:30pm               

WCL272-WRK-R – Introduction to Testing and Remediation Web Apps

(see above description)

May 17 8:30am-10:15pm             

WCL271-WRK-R – Introduction to Testing and Remediating Win32 Apps

(see above description)

May 17 1:30pm-3:00pm               

WCL272-WRK-R2 – Introduction to Testing and Remediation Web Apps

(see above description)