Geeks With Blogs
ex-blog Information security world July 2004 Entries
WiX updated
Rob Mensching posted version 2.0.1927 of the WiX toolkit on SourceForge. It contains some interesting additions: tallow WiX codegen tool, source code for server custom actions (scaexec and scashed), updated docs and tools [via Loren Halvorson]

Posted On Friday, July 30, 2004 2:46 PM

Passwords considered evil ;-)
Valery posted two interesting articles with some historical facts about password and weakness of password schemes: Passwords. Part I - LM Hash and Passwords. Part II - NIX passwords. At the same time Robert Hensing from PSS Security start blogging with Why you shouldn't be using passwords of any kind on your Windows networks. [subscribed] ......

Posted On Wednesday, July 28, 2004 9:06 PM

Windows Server System Reference Architecture
Windows Server System Reference Architecture documents (follow-up to MSA 2.0) are avaialable for download: WSSRA Overview Documents WSSRA Architecture Blueprints WSSRA Build and Operations Guidance WSSRA Planning Guidance WSSRA Service Blueprints WSSRA is infrastructure architecture for large organizations that ensures an optimized deployment of a Windows-based platform. WSSRA caters to typical organizational scenarios by providing planning and implementation guidance that has been tested in labs ......

Posted On Saturday, July 17, 2004 1:10 PM

Remote Access Quarantine
Remote Access Quarantine Agent and Remote Access Quarantine Tool for ISA Server 2004 are available for download: Windows Resource Kit Tools include two components that work as part of Windows Server 2003 Network Access Quarantine Control: RQS and Remote Access Quarantine Client (RQC). RQS works on the remote access server as a listener component. It informs the remote access server when a client can be taken out of quarantine mode. RQC works on the remote access client as a notification component. ......

Posted On Tuesday, July 13, 2004 6:18 PM

Matt Pietrek on the scene
Matt Pietrek (MSDN Under The Hood fame and developer of Numega Boundschecker) has recently joined Visual Studio Team System team and start blogging [subscribed]! BTW Jeff Prosise, Jeffrey Richter, and John Robbins also started a blog at Wintellect [rss] ......

Posted On Friday, July 9, 2004 7:06 AM

RunAs with Explorer
Aaron Margosis posted about using secondary logon (runas) with Explorer: Many tasks in Windows are most easily performed in Explorer, and some can be performed only in Explorer. But when you try to use Run As with explorer.exe with a default XP configuration, nothing happens. This post is all about how to get it to work ......

Posted On Thursday, July 8, 2004 7:22 AM

SQL related links
As a personal reminder: Govind compiled good list of SQL performance links; Corey Thomas posted differences between SQL Server Express and MSDE and Eric Feng posted some information on SQL Server Express Manager (XM) [Update] SQL Server 2005 Express Documentation and Samples are posted as separate download (previous lack of samples was a little bit disappointed) ......

Posted On Monday, July 5, 2004 8:25 AM

CAcert: Digital certificates for free
Well, what's natural turns out to shift like the sand on a Cape Cod bayside beach when the tide goes out. You can get wireless Internet free, if you happen to live near one of the many municipal hotspots being installed around the world. Competition in domain names is growing, and costs are correspondingly coming just a bit closer to the costs of maintaining the DNS infrastructure (which is quite small). Now, thanks to CAcert, everyone can get a free digital certificate signed by a global player. ......

Posted On Sunday, July 4, 2004 12:32 PM

The Microsoft Security Risk Self-Assessment for Midsize Organizations
The Microsoft Security Risk Self-Assessment for Midsize Organizations: Download the Microsoft Security Risk Self-Assessment Tool (MSRSAT) and install it on your computer to obtain information and recommendations about best practices to help enhance security within your information technology (IT) infrastructure. This application is designed to help organizations with fewer than 1,000 employees assess weaknesses in their current IT security environment. It will help identify processes, resources, ......

Posted On Thursday, July 1, 2004 4:09 PM

Copyright © John Doe | Powered by: GeeksWithBlogs.net | Join free