|
Security Tip of the Month: Simple Security Recommendations When Using Hyper-V Planning for Hyper-V Security
Hyper-V Security Guide |
Cross Post From Microsoft
|
Security Tip of the Month: Simple Security Recommendations When Using Hyper-V Planning for Hyper-V Security
Hyper-V Security Guide |
Cross Post From Microsoft
SQL Server 2012 Release Candidate (RC) is now will extend beyond traditional database capabilities with a cloud-ready information platform.
With AlwaysOn availability for faster failover and greater hardware utilization and in-memory ColumnStore for 10x the data warehouse performance gains. SQL Server 2012 will also enable breakthrough insights with business intelligence solutions such as Power View for stunning, interactive data visualizations and enhancements to PowerPivot. Lastly, SQL Server 2012 will uniquely support hybrid IT environments with common management and development tools, scale elastically, and extend applications directly to the cloud through SQL Azure.
To Download go HERE
To learn more about SQL Server 2012 , including
SQL Server AlwaysOn Video
SQL Server Column StoreI ndex
SQL Server 2012 Security
go here
Windows Azure Developer Camps are free, fun, no-fluff events for developers, by developers. You learn from experts in a low-key, interactive way and then get hands-on time to apply what you’ve learned. Find a camp near you, Here
Scheduled for release at the end of June, SP1 will include updates across the client suites and server products. Check out the list of improvements and new features, and stay tuned for more details, on the Microsoft Office Blog.
Some announced features include,
Across the client suites and server products, SP1 offers a sprinkling of improvements to make a strong 2010 release wave even stronger. During TechEd and beyond, teams on http://blogs.office.com will update their blogs with more specific details of 2010 Service Pack 1 contents.
There are far too many changes in SP1 to list here, but the list below is a sample of SP1 highlights to get things started. This is a list of things that you can do now that you couldn’t before, or things that are just better than they were with the original release:
Stay tune for more on this service pack.
I hear this as a issue for a lot of companies. Yes Microsoft has some great products for virtualizing old applications, But here some special. UniBrows is a add on for IE8 or IE9 that add a Tab in your browser that allow you to run IE-6 dependent web application unmodified in IE8 or IE9.
This solution work for those customers who need JUST browser backward compatibility. The cool thing about this add-on is that now you can migrate to Windows 7 easily.
UniBrows provides full IE6 functionality and behaviors, including ActiveX controls support and JavaScript functionality. Administrator-specified sites are rendered as if IE6 was powering the separate tab while other websites and nonconfigured URIs are loaded natively in IE8. The add-on can be deployed with standard IT methods, managed by Group Policy within IE8 (so company IT administrators can choose IE6-specific sites and applications to render as IE6), and also includes a Microsoft Management Console snap-in. In contrast to heavyweight virtualization-based mechanisms, UniBrows only requires 10MB of memory without changing a single line of code.
You can even had different version of Java running in your browser!
For a Trial Version go Here
MICHAELS ALERTS CUSTOMERS OF POTENTIAL DEBIT AND CREDIT CARD FRAUD
(IRVING, Texas) Michaels Stores, Inc. has learned that PIN pad tampering may have occurred in its Chicago-area stores and that customer credit and debit card information may have been compromised.
The company was contacted this week by banking and law enforcement authorities after some fraudulent debit card transactions were reported over the weekend. Authorities believe the fraudulent transactions may be linked to legitimate transactions in Chicago-area Michaels stores.
Consumers who have purchased items from a Michaels store with a debit or credit card are encouraged to monitor their statements, report any suspicious account activity, and change any PIN numbers and other account security settings. Consumers who believe their accounts were used without authorization should contact the card issuer directly. More consumer protection tips are available at the Federal Trade Commission website at http://www.ftc.gov/bcp/edu/pubs/consumer/alerts/alt150.shtm.
The company is working to assist authorities in the investigation. For additional information and updates, visit Michaels website at www.michaels.com.
Android devices running versions 2.3.3 and below could be susceptible to attack when they are connected to unencrypted Wi-Fi networks. Anyone else on that network could gain access to, modify or delete Android users’ calendars, photos and contacts.
"It is quite easy," the researchers Ulm University from Ulm University in the southern part of Germany, wrote in a blog post Said "The implications of this vulnerability reach from disclosure to loss of personal information."
Google has announced they are working on a fix.
Get the official Microsoft RESOURCE KIT delivers in-depth technical guidance from those who know the technology best—Microsoft MVPs and the Windows 7 team. Covers new features, deployment, administration, security, and other essential topics.
By going to Here Use discount code TSW7R to receive this as a free eBook.
Mike Halsey is a Microsoft MVP and author of Troubleshooting Windows 7 Inside Out from Microsoft Press. Mike has created eBook Windows 7 Power Users Guide is now completely FREE. The book is for people of all technical ability from complete novices to IT Pros.
The book contains 16 chapters and is a guide on how to get the very best out of Windows 7 from installation to configuration and advanced operations. It includes step-by-step guides, screenshots and diagrams on every page, quick tips throughout the book. This is a great resource for all Windows 7 users.
To download go here
ElcomSoft Co. Ltd. researched Nikon’s Image Authentication System, a secure suite validating if an image has been altered since capture, and discovered a major vulnerability in the manner the secure image signing key is being handled. In turn, this allowed the company to extract the original signing key from a Nikon camera. The vulnerability, when exploited, makes it possible to produce manipulated images with a fully valid authentication signature. ElcomSoft was able to successfully extract the original image signing key and produce a set of forged images that successfully pass validation with Nikon Image Authentication Software.
ElcomSoft has notified CERT and Nikon about the issue, and prepared a set of digitally manipulated images passing as originals when verified with Nikon’s secure authentication software. Nikon has provided no response nor expressed any interest in the existence of the issue.
This is a Copy of the Notice ElcomSoft posted being cross posted to show an important security issue.