New Microsoft Touch Mouse Announced

image

 

Microsoft Touch Mouse is the new multitouch mouse for Windows 7 that will let you click, flick, scroll and swipe so it’s easy and fun to interact with your PC.

Designed to enhance your Windows 7 usage, the Touch Mouse combines the virtues of a mouse with the rich natural language of gesture to offer a more intuitive way to navigate your PC. Touch Mouse also features BlueTrack Technology so you can track virtually anywhere, anytime.1

Top Features and Benefits

· New! Multitouch surface lets you use natural gestures to snap, navigate and control content with a touch of a finger.

· New! Flick scrolling functionality lets you quickly scroll and pan through windows and documents.

· New! Improved task switching on Windows 7 gives you superior mouse performance and experience on the PC.

· BlueTrack Technology allows you to ditch your mouse pad and mouse on virtually any surface,1 including granite, marble, carpet and wood.

· Snap-in Nano transceiver gives you the option to leave the transceiver plugged into the computer or conveniently store it in the bottom of the mouse.

· 2.4GHz wireless technology gives you a confident wireless connection.

· Ambidextrous design for use with either hand.

See the Difference

Touch Mouse Gestures — Easy as 1, 2, 3

Touch Mouse lets you do everything you’re used to doing with a mouse, such as point and click, but also adds gestures with one, two or three fingers to amplify the Windows 7 operating system by creating simple shortcuts to the tasks you want to do most. clip_image002

Shorter Shortcuts for Windows 7

With the Touch Mouse, you can use your mouse to do tasks that normally involve the keyboard.

clip_image004

Availability and Pricing

Touch Mouse will be available in June 2011 for the estimated retail price of $79.95 (U.S.).2 It will be available for presale starting today at Amazon.com and the Microsoft Store online.

Touch Mouse is backed by a worldwide three-year limited hardware warranty. The limited warranty and license agreement are available at http://www.microsoft.com/hardware/warranty.

Some information in this fact sheet relates to pre-release products, which may be substantially modified before they are commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.

1 BlueTrack Technology does not work on clear glass or mirrored surfaces.

2 Estimated retail price. Actual retail price may vary.

 

Technorati Tags:

Data Encryption Toolkit for Mobile PCs

Get tested guidance and powerful tools to help you protect your organization’s most vulnerable data. The strategies outlined in this toolkit are easy to understand, and the guidance shows you how to optimize two key encryption technologies already available to you in Windows XP, Windows Vista, or Windows 7: the Encrypting File System (EFS) and BitLocker Drive Encryption.

Click here

Technorati Tags:

Data Security in Windows Azure

Data Security in Windows Azure: Part 1
Explore the various methods and tools for securing your application data in Windows Azure including methods for securing Azure Storage accounts and data during the transition to the cloud. This video also covers protocols for securing requests to, and responses from, Azure Storage, platform-provided methods for ensuring data integrity, and cryptographic pubic key distribution between Azure roles and Azure Fabric Controller.

Data Security in Windows Azure: Part 2
Learn how to make your Azure Storage container and blob items URL-addressable in a secure fashion, including the setup of permission structure on the URLs, generating hashes to secure individual items and containers, expiration and revocation of storage hashes and keys, and auditing access to the store.

How to Configure SQL Azure Security
Familiarize yourself with security within SQL Azure with demonstrations on the creation of logins, databases and users and information about sys.sql_logins and sys.databases, which allow the display of logins and databases from the master database

How to Configure the SQL Azure Firewall
The Microsoft SQL Azure service prevents access to your SQL Azure server with the SQL Azure firewall. You can use the SQL Azure portal or master database to review and edit your firewall configuration. This topic describes how you can define firewall settings to specify which clients should have access to your SQL Azure server. For more information, see SQL Azure Firewall.

How to Configure the SQL Azure Firewall
The Microsoft SQL Azure service prevents access to your SQL Azure server with the SQL Azure firewall. You can use the SQL Azure portal or master database to review and edit your firewall configuration. This topic describes how you can define firewall settings to specify which clients should have access to your SQL Azure server. For more information, see SQL Azure Firewall.

Technorati Tags:

Microsoft Security Resources

New Version of Microsoft Security Compliance Manager (SCM) Version Now Available
Now updated to work reliably behind corporate proxy servers; Microsoft SCM v.1.1.2 also features security baselines for Windows 7, Microsoft Office 2010, Windows Server 2008 R2, and Windows Internet Explorer 8. Download the latest version of this free tool and starting moving toward more effective security and compliance processes for some of the most widely-used Microsoft products.

Securing Client Access Servers in Exchange Server 2010
Learn how to manage security and authentication related options available for a computer running Microsoft Exchange Server 2010 that has the Client Access server role installed.

Hardening SQL Server for SharePoint Environments
Get a summary of hardening recommendations then specific details on how to configure a SQL Server instance to listen on a non-default port, how to configure and test a SQL client alias, and much more.

BranchCache Security Guide
Get comprehensive guidance on how to manage the security of the Microsoft BranchCache feature introduced in Windows Server 2008 R2 and Windows 7.

Securing Windows Server
Get a consolidated view of the feature overviews, step-by-step-guides, and configuration tips for the various security and protection technologies in Windows Server 2008 and Windows Server 2008 R2 from authorization and information protection to security management and network security.

Windows Server 2008 and Windows Server 2008 R2 IT Compliance Management
Download the IT Compliance Management Series to access free tools and guidance to help you configure Windows Server 2008 and Windows Server 2008 R2 to address specific IT governance, risk, and compliance (GRC) requirements.

Security Tip of the Month: Using the Enhanced Mitigation Experience Toolkit to Safeguard Against Zero Days
There have been a number of zero-day vulnerabilities circulating around the Internet recently. Find out how the Enhanced Mitigation Experience Toolkit (EMET) can help you manage security mitigations for your systems.

And do not forget for the Home user if they get Virus, Malware or failed security up date they get free support by calling 1-866 PCSAFETY

 

Windows 7 Development Boot Camp

For the Win: Windows 7 Development Boot Camp
January and February 2011
Web and cloud may be all the rage, but many developers are still doing hardcore client development. If you are among them, this Boot Camp is for you. In this full-day event, we will explore how to maximize your impact on the Windows client. Interactive sessions will include topics from throughout the Windows development platform. We will look at application compatibility and transitioning your applications to Windows 7, integrating with the Windows Taskbar, developing for Internet Explorer 9, utilizing the cool functionality in the Sensors and Location Platform so that your application better responds to its current environment, and leveraging multi-touch capabilities.
Click on your desired city below to register:

Cross Post from Microsoft

 

Technorati Tags:

Bulk exam vouchers with free exam retakes

Save 15% on Microsoft Certification For Your IT Team
Organizations with more certified staff see a 10% increase in on-time and on-budget deployments. Microsoft Certification can help ensure your IT team has the qualifications to deploy, use, and manage Windows 7. Learn how you can save 15% when you purchase a 10-pack of Microsoft Certification exam vouchers with free exam retakes for your team.

 

Technorati Tags:

New Springboard Resources

Deploying the Core Optimized Desktop Using the Microsoft Deployment Toolkit (MDT)
Get step-by-step guidance on how to use MDT 2010 to automate the installation and configuration of the core Optimized Desktop technologies: Windows 7, the Microsoft Desktop Optimization Pack (MDOP), Forefront, and Microsoft Office 2010. Guidance on deploying the core Optimized Desktop using System Center Configuration Manager 2007 R2 is also available.

Local P2V Migration Using MDT 2010 and Sysinternals Disk2VHD
Find out how to use MDT 2010 and Sysinternals Disk2VHD to redeliver users’ old desktops as fully functional virtual machines. Following these steps can provide a safety net by enabling continued access to users’ previous computing environment during Windows 7 deployment.

Updated: Windows 7 Application Compatibility List for IT Professionals
Download this Microsoft Office Excel-based spreadsheet for a list of software applications that have met Windows 7 Logo Program testing requirements for compatibility with 32-bit and 64-bit Windows 7. This list includes applications with the following compatibility statuses: "Compatible," "Free Update Required," "Paid Update Required," "Future Compatibility," and "Not Compatible." These statuses are based upon the software publishers’ statements of compatibility.

Go to Springboard site for Lots of great information click here

 

Phishing how to protect yourself

Phishing is  method that criminals use to steal you identity online. It uses email and fraudulent websites that are designed to steal your personal data or information such as credit card numbers, passwords, account data, or other information.

Phishing send millions of fraudulent email messages with links to fraudulent websites that appear to come from websites you trust, like your bank or credit card company, and request that you provide personal information. Criminals can use this information for many different types of fraud, such as to steal money from your account, to open new accounts in your name, or to obtain official documents using your identity.

Prevent ID theft from phishing scams do the following to help protect yourself from phishing scams:

  • Don’t click links in email messages.

 

  • Type addresses directly into your browser or use your personal bookmarks.

 

  • Check the site’s security certificate before you enter personal or financial information into a website.

 

  • Don’t enter personal or financial information into pop-up windows.

 

  • Keep your computer software current with the latest security updates.

If you suspect that you’ve responded to a phishing scam with personal or financial information, do the following;

  • Change the passwords or PINs on all your online accounts that you think could be compromised.

 

  • Place a fraud alert on your credit reports. Check with your bank or financial advisor if you’re not sure how to do this.

 

  • Contact the bank or the online merchant directly. Do not follow the link in the fraudulent email.

 

  • If you know of any accounts that were accessed or opened fraudulently, close those accounts.

 

  • Routinely review your bank and credit card statements monthly for unexplained charges or inquiries that you didn’t initiate.

How do I report a possible phishing scam?

  • Internet Explorer. While you are on a suspicious site, click the Safety button or menu in Internet Explorer 8 and point to SmartScreen Filter. Then click Report Unsafe Website and use the webpage that is displayed to report the website.

 

  • Windows Live Hotmail. If you receive a suspicious email that asks for personal information, click the check box next to the message in your Hotmail inbox. Click Mark as and then point to Phishing scam.

 

 

The Bottom Line THINK if you not sure do not respond even better do not open the email….

Technorati Tags: ,

Web talks that I am doing

As an IT professional, you deal with securing operating systems, patching software, and installing and configuring firewall and routers on a daily basis," said Ferron. "But what about the physical infrastructure? Do you understand how simple techniques can allow theft of your company resources? In this webinar, we will discuss one of the most important yet least-considered areas of security by IT professionals."

Webinar: Understanding Cyber Security Physical Security

Live Presentation: Wednesday, December 1, 2010, 12:00-1:00 pm EST

Ferron will also host "Understanding Cyber Security Patch Management" at 12 pm EST Wednesday, December 15. In this hour-long webinar, attendees will examine the area of systems management that involves acquiring, testing, and installing appropriate patches to administered systems.

"In this session, we will develop an actual process to secure hardware and software systems using a fictional company," said Ferron. "We will discuss automated systems versus manual systems, as well as incorporating virtualization and an audit process for patch management."

Webinar: Understanding Cyber Security Patch Management

Live Presentation: Wednesday, December 15, 2010, 12:00-1:00 pm EST

Register for Understanding Cyber Security Physical Security and Understanding Cyber Security Patch Management on the Global Knowledge web site. Recorded versions will also be available.