Windows Azure Developer Camps are free, fun, no-fluff events for developers, by developers. You learn from experts in a low-key, interactive way and then get hands-on time to apply what you’ve learned. Find a camp near you, Here
Windows Azure Developer Camps are free, fun, no-fluff events for developers, by developers. You learn from experts in a low-key, interactive way and then get hands-on time to apply what you’ve learned. Find a camp near you, Here
Scheduled for release at the end of June, SP1 will include updates across the client suites and server products. Check out the list of improvements and new features, and stay tuned for more details, on the Microsoft Office Blog.
Some announced features include,
Across the client suites and server products, SP1 offers a sprinkling of improvements to make a strong 2010 release wave even stronger. During TechEd and beyond, teams on http://blogs.office.com will update their blogs with more specific details of 2010 Service Pack 1 contents.
There are far too many changes in SP1 to list here, but the list below is a sample of SP1 highlights to get things started. This is a list of things that you can do now that you couldn’t before, or things that are just better than they were with the original release:
Stay tune for more on this service pack.
I hear this as a issue for a lot of companies. Yes Microsoft has some great products for virtualizing old applications, But here some special. UniBrows is a add on for IE8 or IE9 that add a Tab in your browser that allow you to run IE-6 dependent web application unmodified in IE8 or IE9.
This solution work for those customers who need JUST browser backward compatibility. The cool thing about this add-on is that now you can migrate to Windows 7 easily.
UniBrows provides full IE6 functionality and behaviors, including ActiveX controls support and JavaScript functionality. Administrator-specified sites are rendered as if IE6 was powering the separate tab while other websites and nonconfigured URIs are loaded natively in IE8. The add-on can be deployed with standard IT methods, managed by Group Policy within IE8 (so company IT administrators can choose IE6-specific sites and applications to render as IE6), and also includes a Microsoft Management Console snap-in. In contrast to heavyweight virtualization-based mechanisms, UniBrows only requires 10MB of memory without changing a single line of code.
You can even had different version of Java running in your browser!
For a Trial Version go Here
MICHAELS ALERTS CUSTOMERS OF POTENTIAL DEBIT AND CREDIT CARD FRAUD
(IRVING, Texas) Michaels Stores, Inc. has learned that PIN pad tampering may have occurred in its Chicago-area stores and that customer credit and debit card information may have been compromised.
The company was contacted this week by banking and law enforcement authorities after some fraudulent debit card transactions were reported over the weekend. Authorities believe the fraudulent transactions may be linked to legitimate transactions in Chicago-area Michaels stores.
Consumers who have purchased items from a Michaels store with a debit or credit card are encouraged to monitor their statements, report any suspicious account activity, and change any PIN numbers and other account security settings. Consumers who believe their accounts were used without authorization should contact the card issuer directly. More consumer protection tips are available at the Federal Trade Commission website at http://www.ftc.gov/bcp/edu/pubs/consumer/alerts/alt150.shtm.
The company is working to assist authorities in the investigation. For additional information and updates, visit Michaels website at www.michaels.com.
Android devices running versions 2.3.3 and below could be susceptible to attack when they are connected to unencrypted Wi-Fi networks. Anyone else on that network could gain access to, modify or delete Android users’ calendars, photos and contacts.
"It is quite easy," the researchers Ulm University from Ulm University in the southern part of Germany, wrote in a blog post Said "The implications of this vulnerability reach from disclosure to loss of personal information."
Google has announced they are working on a fix.
Get the official Microsoft RESOURCE KIT delivers in-depth technical guidance from those who know the technology best—Microsoft MVPs and the Windows 7 team. Covers new features, deployment, administration, security, and other essential topics.
By going to Here Use discount code TSW7R to receive this as a free eBook.
Mike Halsey is a Microsoft MVP and author of Troubleshooting Windows 7 Inside Out from Microsoft Press. Mike has created eBook Windows 7 Power Users Guide is now completely FREE. The book is for people of all technical ability from complete novices to IT Pros.
The book contains 16 chapters and is a guide on how to get the very best out of Windows 7 from installation to configuration and advanced operations. It includes step-by-step guides, screenshots and diagrams on every page, quick tips throughout the book. This is a great resource for all Windows 7 users.
To download go here
ElcomSoft Co. Ltd. researched Nikon’s Image Authentication System, a secure suite validating if an image has been altered since capture, and discovered a major vulnerability in the manner the secure image signing key is being handled. In turn, this allowed the company to extract the original signing key from a Nikon camera. The vulnerability, when exploited, makes it possible to produce manipulated images with a fully valid authentication signature. ElcomSoft was able to successfully extract the original image signing key and produce a set of forged images that successfully pass validation with Nikon Image Authentication Software.
ElcomSoft has notified CERT and Nikon about the issue, and prepared a set of digitally manipulated images passing as originals when verified with Nikon’s secure authentication software. Nikon has provided no response nor expressed any interest in the existence of the issue.
This is a Copy of the Notice ElcomSoft posted being cross posted to show an important security issue.
Date: April 27, 2011
Time: Noon – 1 PM ET
I will be presenting Planning for a cyber disaster makes recovering from one much easier. Still, as important as disaster planning is, it’s often overlooked or put off until it is too late. In this webinar, Global Knowledge instructor Jay Ferron will discuss planning for the unexpected, and he’ll teach simple tricks to reduce your company’s downtime before, during, and after a disaster.
Using a fictional company as an example, Jay will walk you through the disaster planning process a security professional should use.
Outline
To attend this session click here
I will be presenting at TechEd May 15 – 19 in Atlanta.
May 15 10:30am-12:30pm
WCL271-WRK – Introduction to Testing and Remediating Win32 Apps
In this instructor-led workshop, we enhance your skills at troubleshooting and remediating issues with Windows-based applications. We walk you through the process of surfacing and understanding the problem, troubleshooting the root cause, developing and testing remediation options, and providing recommendations on the potential solution options. The lab exercises are designed to be as real-world as possible (you may be troubleshooting real applications!) to help you to practice and develop your ability to overcome issues related to the migration from Windows XP to Windows 7.
Product/Technology: Windows® 7
Audience: Designer, Web Developer/Designer
May 15 1:00pm-3:00pm
WCL272-WRK – Introduction to Testing and Remediation Web Apps
In this instructor-led workshop, we enhance your skills at troubleshooting and remediating issues with web-based applications. We take you through the process of surfacing and understanding issues with version checks, rendering, ActiveX controls, and scripting, discuss the options for resolving them, and along the way discover and practice using many of the tools that we use daily in troubleshooting Windows-based applications. The lab exercise are designed to be as real-world as possible, to help you to practice and develop your ability to overcome issues related to the migration from Internet Explorer 6 to Internet Explorer 8.
May 15 3:30pm-5:30pm
WCL272-WRK-R – Introduction to Testing and Remediation Web Apps
(see above description)
May 17 8:30am-10:15pm
WCL271-WRK-R – Introduction to Testing and Remediating Win32 Apps
(see above description)
May 17 1:30pm-3:00pm
WCL272-WRK-R2 – Introduction to Testing and Remediation Web Apps
(see above description)