Today we released security updates for Microsoft Windows, Microsoft Office, Microsoft SQL Server, and Internet Explorer.
As a best practice, we encourage customers to apply security updates as soon as they are released. For more information about this month’s security updates and Link Removed...
2015
bestpractices
cybersecurity
internet explorer
it administration
microsoft
microsoft office
msrc
patch management
response center
security updates
software security
sql server
technet
update
vulnerability
In this episode of Data Exposed, Scott Welcomes Ken Van Hyning, a Principle Software Engineer in the SQL Server team. Today Ken introduces us to the SQL Server 2016 Upgrade Advisor, code named DBA Workbench, a tool that consists of a suite of advisors for upgrading to SQL Server 2016. Ken begins...
2016
advisor
analysis
analyzer
bestpractices
consistency
data exposed
database upgrade
dba workbench
demos
extensibility
ken van hyning
new features
process
recommendations
software engineer
sql server
tools
upgrade
upgrade workflow
In this episode of Data Exposed, Scott Welcomes Xin Jin, a Program Manager in the SQL Server team. In this episode of Managed Backup, Xin shows us what's new with Managed Backup. Managed Backup was introduced in SQL Server 2014, so Xin is here to show us what's new with Managed Backup in SQL...
backup
bestpractices
cloud storage
customization
data exposed
data management
database
features
it solutions
managed backup
on-premises
overview
program manager
recovery mode
security
sql server
system databases
technology
version
version 2016
With just two weeks until Microsoft Ignite, you're probably finessing your session schedule and starting to think about packing. In this week's Countdown Show, Link Removed and Link Removed talk about what's new on MyIgnite, last-minute tips to maximizing your Ignite experience, and the...
This whitepaper describes best practices for securing and hardening NDES to enable the deployment of certificates with Microsoft Intune and System Center Configuration Manager
Link Removed
Does any know if there is a way to monitor if files in a Public One Drive Folder are being accessed? I am thinking about putting a link in a forum and would like to know if that folder has been accessed and possibly how many times.
I found a thread on the Microsoft site where the suggest has...
Severity Rating: Important
Revision Note: V1.1 (March 5, 2015): Advisory revised to clarify the reason why no workaround exists for systems running Windows Server 2003. See the Advisory FAQ for more information.
Summary: Microsoft is aware of a security feature bypass vulnerability in Secure...
For years our customers have been in the trenches against cyberattacks in an increasingly complex digital landscape. We’ve been there with you, as have others. And we aren’t going anywhere. Forces often seek to undermine and disrupt technology and people, attempting to weaken the very devices...
Original release date: January 02, 2014 | Last revised: February 05, 2014
Systems Affected
Point of Sale Systems
Overview
Point of Sale Systems
When consumers purchase goods or services from a retailer, the transaction is processed through what are commonly referred to as Point of Sale...
antivirus
bestpractices
consumer protection
credit card
cybersecurity
data security
data theft
debit card
digital fraud
firewall
fraud prevention
identity theft
malware
network security
phishing
point of sale
pos systems
security bestpractices
skimming
track data
Lifehacker just posted a article on the 5 best antivirus programs. Here's the article link : http://lifehacker.com/five-best-desktop-antivirus-applications-1607557993?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed: lifehacker/full (Lifehacker)
The BizTalk Server Best Practices Analyzer examines a BizTalk Server deployment and generates a list of best practices issues it discovers.
Link Removed
Today Friend of the Gallery is back, today with a cool control you can use in your next Kinect for Windows WPF app.
Other recent Gallery Posts for Vangos Pterneas;
Understanding the Kinect Coordinate Mapping, with a little help from Vangos Pterneas
Looking at the Kinect for Windows v2
Color...
bestpractices
control
cursor
development
ebook
github
hand tracking
kinect
performance
project download
usability
user control
user interface
visual studio
windows apps
wpf
xaml
As security professionals, we are trained to think in worst-case scenarios. We run through the land of the theoretical, chasing “what if” scenarios as though they are lightning bugs to be gathered and stashed in a glass jar. Most of time, this type of thinking is absolutely the correct thing...
bestpractices
bulletin
critical update
customer impact
cve
cybersecurity
flash player
internet explorer
legacy support
microsoft
protected mode
remote code execution
research
risk assessment
security
smartscreen
theoretical thinking
update
vulnerabilities
web standards
Original release date: January 17, 2014 | Last revised: February 09, 2014
Systems Affected
Certain UDP protocols have been identified as potential attack vectors:
DNS
NTP
SNMPv2
NetBIOS
SSDP
CharGEN
QOTD
BitTorrent
Kad
Quake Network Protocol
Steam Protocol
Overview
A Distributed...
Electronics and certainly PCs do not like heat. It is important that these devices stay cool @ all times and throughout their lifetime. That said, here is one of those "Best Practice" things that I suggest all too often does not even occur to people and that they do not think about or do on...
Electronics and certainly PCs do not like heat. It is important that these devices stay cool @ all times and throughout their lifetime. That said, here is one of those "Best Practice" things that I suggest all too often does not even occur to people and that they do not think about or do on...
Original release date: July 26, 2013 | Last revised: July 31, 2013
Systems Affected
Any system connected to the internet running the Intelligent Platform Management Interface (IPMI) may be affected. IPMI is resident on many server platforms, and provides low-level access to a system that can...
I have to say, back when the career path for technology led through end user support I learned a lot right out of school. Most of what I learned I still carry with me today. Even so, time and bad habits can cause a person to forget some best practices.
When Windows 8 was forced upon my new...
antivirus
backup
bestpractices
ea games
end users
games
it careers
origin
performance
reboot
sims 3
software issues
stardock
support
system stability
tech tips
third party
troubleshooting
user experience
windows 8