Related Posts
  • Blog Post: 10 Things - Using BitLocker, even without a TPM

    While you may have heard of BitLocker, what you may not know is that you don't need Trusted Platform Module to use it on your system. BitLocker Drive Encryption is a new security feature integrated into the Windows Vista operating system that provides considerable protection to the OS and data stored...
  • Blog Post: Family Safe Computing & Microsoft

    Hi all: I'd like to introduce you to David George, Director of Trustworthy Computing for Windows Vista and one of the individuals responsible for the Family Safe Computing initiative. David in this article gives an overview of the new Parental Controls and also a little insight into the philosophy behind...
  • Blog Post: Upgrade to Next Version of Windows Live OneCare Announced for All Subscribers

    The new version of the Windows Live OneCare service is being made available today, running on both 32- and 64-bit Windows Vista systems (32-bit Windows XP SP2 is also supported). We built OneCare because we know that most homes have more than a single computer (surely not news to you if you're a reader...
  • Blog Post: Check out the Windows Live OneCare 2.0 Beta

    The Windows Live OneCare team today released the Beta version of OneCare 2.0 -- you can download it here . Windows Live OneCare 2.0 is designed to make it easier to secure and maintain multiple PCs on a network so that households and small businesses alike can manage their PCs from a single control panel...
  • Blog Post: Keeping it real

    In a recent post to his blog, Alex Kochis, Senior Product Manager for Windows Genuine Advantage, discusses the on-going work on anti-piracy features incorporated into many of the products Microsoft releases. Part of the job is to communicate advances that keep pace with those of pirates, so his team...
  • Blog Post: eWeek Labs Praises Windows Vista’s UAC

    eWeek Labs recently took some time to dig deeper into Windows Vista’s User Access Control (UAC), praising Microsoft for their dedication to securing Windows Vista. " With Vista's UAC, Microsoft has finally gotten serious about securing the Windows operating system by limiting a user's rights during day...
  • Blog Post: Windows Vista Security Center

    In a recent meeting with my colleagues Mike Burk, a Security Center Program Manager, and Austin Wilson, a Director from Windows Client Marketing, I had the opportunity to find out more about how and why the Windows Vista Security Center evolved. If you've used Windows Vista, I’m sure you've noticed that...
  • Blog Post: Positive progess on security APIs

    Back in September, several of our security partners expressed concern over certain key technologies in Windows Vista such as Windows Security Center and Windows PatchGuard, a technology designed to protect the Windows kernel from advanced attacks such as rootkits . We were quick to respond to these concerns...
  • Blog Post: UAC - And why you shouldn't disable it

    I think we've all seen lots of articles about User Account Control (UAC) and the complaint that it "interferes" with the use of your own computer. I've noticed that the longer I've used Windows Vista, the less the UAC prompt shows up. To put it simply, UAC isn't something that should just be disabled...
  • Blog Post: How to Download the Localized Version of Windows Vista Hardware Assessment 2.1?

    Hello Windows Vista Team Blog readers, We've heard that some of you are very interested in getting the localized version of the Windows Vista Hardware Assessment 2.1 but was not sure how the download process works for this globalized integrated download. To clarify, the Windows Vista Hardware Assessment...
  • Blog Post: Accessible UAC Prompts

    There have been some comments on the blog recently suggesting that the UAC dialog boxes in Windows Vista are not accessible and I just wanted to clear up the confusion here. First, to set the scene though. When a user attempts to access an application or setting that requires elevated privileges to...
  • Blog Post: Teched 2007 Finale: Data Encryption Toolkit for Mobile PCs

    One more thing we announced at TechEd last week was the release of the Data Encryption Toolkit for Mobile PCs . The Toolkit is the newest in a suite of Windows Vista Solution Accelerators, and provides tested guidance and powerful tools to help you protect your most vulnerable information - the data...
  • Blog Post: Taking a detailed look at Windows Vista DVD hologram

    An astute Windows user was intrigued by the holographic image on the face of the Windows Vista Business DVD and decided to take a much closer look, discovering in the margin a microscopic photograph of three men. Just who they could be? The user posted a blog entry mentioning the discovery, which was...
  • Blog Post: Windows Vista: Defense in depth

    Wow, you describe a specific situation and suddenly people extrapolate something completely different! During a recent discussion with journalists about the release to manufacturing for Windows Vista, I made a comment about how attacks on the Internet are getting more and more sophisticated, and some...
  • Blog Post: Windows Vista and protection from malware

    This entry updated at 8:49 PST on Tuesday 19 December 2006. On November 30, Sophos issued its monthly report on the top ten threats reported to them in November of 2006. As a part of this, Sophos also studied Windows Vista's vulnerability to these malware threats. I found the information and press...
  • Blog Post: Video Demo: Identifying Security Vulnerabilities for Your Desktop Infrastructure

    Whether you are planning to deploy Windows Vista or already did, it is important that you keep security high on your list and make sure that all of your desktops are secured. So, how do you know if your desktops have Windows Firewall settings turned off? What if some desktops do not have Anti-Virus or...
  • Blog Post: Security Features vs. Convenience

    One of the most basic conundrums in computer security is the constant trade-off between security and usability. At the end of the day, if security is too complicated to use, then it simply won't be used. Even if a feature offers a good level of security protections, if it is complicated or has poor usability...
  • Blog Post: Microsoft a Secure OS Vendor?

    Roger Grimes, who serves as Security Advisor at InfoWorld, has gathered quite an extensive list of security features and enhancements that are shipping with Windows Vista to protect its users. He's counted more than 180, among them ASLR , Windows Defender and folder and registry key virtualization -...
  • Blog Post: "Keep Everything Clear of the Doors"

    As we wind up 2007, I thought I'd share with you an emailed security communiqué sent last week by Ed Gibson, Chief Security Advisor at our Microsoft UK office in Reading, providing a gentle reminder to take the necessary precautionary measures to ensure you're safe when using the Web. As Ed mentions...
  • Blog Post: A Review of Windows Vista's Parental Controls

    I caught this via ActiveWin today: Tommy from IMSafer Nerd Blog decided to give Windows Vista’s Parental Controls a closer look. He outlines the Parental Controls features and explains what parents can do with the features. He puts in bold his opinion regarding each Parental Control feature, and although...
  • Blog Post: Sting! The biggest software counterfeiting bust in history

    [This is a post originally penned by Alex Kochis over on the WGA blog.] Earlier today the Chinese Public Security Bureau and the FBI announced the largest bust of counterfeit software manufacturing or distribution ever. The bust took place in the southern Chinese province of Guangdong and includes...