-
July 2015 Security Updates
Today we released security updates for Microsoft Windows, Microsoft Office, Microsoft SQL Server, and Internet Explorer. As a best practice, we encourage customers to apply security updates as soon as they are released. For more information about this month’s security updates and Link Removed...- News
- Thread
- 2015 best practices cybersecurity internet explorer it administration microsoft microsoft office msrc patch management response center security updates software security sql server technet update vulnerability
- Replies: 0
- Forum: Security Alerts
-
SQL Server 2016 Upgrade Advisor - code named "DBA Workbench" | Data Exposed
In this episode of Data Exposed, Scott Welcomes Ken Van Hyning, a Principle Software Engineer in the SQL Server team. Today Ken introduces us to the SQL Server 2016 Upgrade Advisor, code named DBA Workbench, a tool that consists of a suite of advisors for upgrading to SQL Server 2016. Ken begins...- News
- Thread
- 2016 advisor analysis analyzer best practices consistency data exposed database upgrade dba workbench demos extensibility ken van hyning new features process recommendations software engineer sql server tools upgrade upgrade workflow
- Replies: 0
- Forum: Live RSS Feeds
-
S
Android Best Server-Side Scripting Languages for Beginners: Recommendations Needed!
Hi everyone, I am new to programming..Can anyone tell me some best server side scripting language..- softwaretesting
- Thread
- best practices coding community development language learning programming scripting server-side web development
- Replies: 3
- Forum: Programming and Scripting
-
SQL Server 2016 Managed Backup | Data Exposed
In this episode of Data Exposed, Scott Welcomes Xin Jin, a Program Manager in the SQL Server team. In this episode of Managed Backup, Xin shows us what's new with Managed Backup. Managed Backup was introduced in SQL Server 2014, so Xin is here to show us what's new with Managed Backup in SQL...- News
- Thread
- backup best practices cloud storage customization data exposed data management database features it solutions managed backup on-premises overview program manager recovery mode security sql server system databases technology version version 2016
- Replies: 0
- Forum: Live RSS Feeds
-
Countdown to Ignite: The One about What to Pack and What’s New, Two Weeks Out! | Microsoft...
With just two weeks until Microsoft Ignite, you're probably finessing your session schedule and starting to think about packing. In this week's Countdown Show, Link Removed and Link Removed talk about what's new on MyIgnite, last-minute tips to maximizing your Ignite experience, and the...- News
- Thread
- airport best practices casual wear chicago colleagues community tips conference event experience gadgets involve team microsoft ignite myignite network packing tips session directory session schedule theater transportation travel tips trip report
- Replies: 0
- Forum: Live RSS Feeds
-
Securing and Hardening Network Device Enrollment Service for Microsoft Intune and System...
This whitepaper describes best practices for securing and hardening NDES to enable the deployment of certificates with Microsoft Intune and System Center Configuration Manager Link Removed- News
- Thread
- best practices certificate configuration deployment devices enrollment hardening intune manager microsoft network paper security services system
- Replies: 0
- Forum: Live RSS Feeds
-
Windows 10 Does One Drive have an Access Log?
Does any know if there is a way to monitor if files in a Public One Drive Folder are being accessed? I am thinking about putting a link in a forum and would like to know if that folder has been accessed and possibly how many times. I found a thread on the Microsoft site where the suggest has...- Saltgrass
- Thread
- accesslog best practices file access file monitoring onedrive public folder security sharepoint sharing
- Replies: 3
- Forum: Windows Help and Support
-
3046015 - Vulnerability in Schannel Could Allow Security Feature Bypass - Version: 1.1
Severity Rating: Important Revision Note: V1.1 (March 5, 2015): Advisory revised to clarify the reason why no workaround exists for systems running Windows Server 2003. See the Advisory FAQ for more information. Summary: Microsoft is aware of a security feature bypass vulnerability in Secure...- News
- Thread
- advisory attack best practices cipher downgrade freak important microsoft mitm schannel security server ssl tls vulnerability windows
- Replies: 0
- Forum: Security Alerts
-
A Call for Better Coordinated Vulnerability Disclosure
For years our customers have been in the trenches against cyberattacks in an increasingly complex digital landscape. We’ve been there with you, as have others. And we aren’t going anywhere. Forces often seek to undermine and disrupt technology and people, attempting to weaken the very devices...- News
- Thread
- advisory best practices collaboration complexity consumer coordinated cvd cybersecurity google information disclosure microsoft patch phishing protection research security software threats trustworthiness vulnerability
- Replies: 0
- Forum: Security Alerts
-
TA14-002A: Malware Targeting Point of Sale Systems
Original release date: January 02, 2014 | Last revised: February 05, 2014 Systems Affected Point of Sale Systems Overview Point of Sale Systems When consumers purchase goods or services from a retailer, the transaction is processed through what are commonly referred to as Point of Sale...- News
- Thread
- antivirus best practices consumer protection credit card cybersecurity data security data theft debit card digital fraud firewall fraud prevention identity theft malware network security phishing point of sale pos systems security best practices skimming track data
- Replies: 0
- Forum: Security Alerts
-
**SOLVED*** Lifehacker just posted this.....
Lifehacker just posted a article on the 5 best antivirus programs. Here's the article link : http://lifehacker.com/five-best-desktop-antivirus-applications-1607557993?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed: lifehacker/full (Lifehacker)- brkkab
- Thread
- antivirus application best practices desktop lifehacker malware protection security software
- Replies: 5
- Forum: Windows Security
-
BizTalk Server 2013 R2 Best Practices Analyzer
The BizTalk Server Best Practices Analyzer examines a BizTalk Server deployment and generates a list of best practices issues it discovers. Link Removed- News
- Thread
- analyzer best practices biztalk deployment issues server
- Replies: 0
- Forum: Live RSS Feeds
-
Kinect Cursor WPF Control
Today Friend of the Gallery is back, today with a cool control you can use in your next Kinect for Windows WPF app. Other recent Gallery Posts for Vangos Pterneas; Understanding the Kinect Coordinate Mapping, with a little help from Vangos Pterneas Looking at the Kinect for Windows v2 Color...- News
- Thread
- best practices control cursor development ebook github hand tracking kinect performance project download usability user control user interface visual studio windows apps wpf xaml
- Replies: 0
- Forum: Live RSS Feeds
-
Theoretical Thinking and the June 2014 Bulletin Release
As security professionals, we are trained to think in worst-case scenarios. We run through the land of the theoretical, chasing “what if” scenarios as though they are lightning bugs to be gathered and stashed in a glass jar. Most of time, this type of thinking is absolutely the correct thing...- News
- Thread
- best practices bulletin critical update customer impact cve cybersecurity flash player internet explorer legacy support microsoft protected mode remote code execution research risk assessment security smartscreen theoretical thinking update vulnerabilities web standards
- Replies: 0
- Forum: Security Alerts
-
Rules Update for Direct Access Best Practice Analyzer for Windows Server 2012 R2 (KB2896496)
You can use the DA Rules update for Best Practices Analyzer to scan a server that is running the DA role. Link Removed- News
- Thread
- analyzer best practices directaccess kb2896496 rule change security compliance server management windows server windows server 2012 r2
- Replies: 0
- Forum: Live RSS Feeds
-
TA14-017A: UDP-based Amplification Attacks
Original release date: January 17, 2014 | Last revised: February 09, 2014 Systems Affected Certain UDP protocols have been identified as potential attack vectors: DNS NTP SNMPv2 NetBIOS SSDP CharGEN QOTD BitTorrent Kad Quake Network Protocol Steam Protocol Overview A Distributed...- News
- Thread
- amplification amplification factor attack bandwidth best practices damage ddos detection drdos impact ingress filtering mitigation network prevention protocol security source ip traffic shaping udp vulnerabilities
- Replies: 0
- Forum: Security Alerts
-
Windows 7 Keeping Your Cool
Electronics and certainly PCs do not like heat. It is important that these devices stay cool @ all times and throughout their lifetime. That said, here is one of those "Best Practice" things that I suggest all too often does not even occur to people and that they do not think about or do on...- Drew
- Thread
- airflow best practices computer care cooling core temp cpu dust removal electronics fans gpu hardware maintenance overheating pc cleanup periodic tasks preventive maintenance preventive measures temperature thermal management utility
- Replies: 3
- Forum: Windows Tutorials
-
Windows 8 Keeping Your Cool
Electronics and certainly PCs do not like heat. It is important that these devices stay cool @ all times and throughout their lifetime. That said, here is one of those "Best Practice" things that I suggest all too often does not even occur to people and that they do not think about or do on...- Drew
- Thread
- airflow best practices cleaning computer care cooling core temp cpu dust removal electronics fans gpu hardware care heat maintenance overheating preventive maintenance temperature control thermal management utilization ventilation
- Replies: 0
- Forum: Windows Tutorials
-
TA13-207A: Risks of Using the Intelligent Platform Management Interface (IPMI)
Original release date: July 26, 2013 | Last revised: July 31, 2013 Systems Affected Any system connected to the internet running the Intelligent Platform Management Interface (IPMI) may be affected. IPMI is resident on many server platforms, and provides low-level access to a system that can...- News
- Thread
- access authentication availability best practices bmc confidentiality encryption hardware integrity ipmi links management network password remote access risk security server traffic vulnerability
- Replies: 0
- Forum: Security Alerts
-
G
Troubleshooting Windows
I have to say, back when the career path for technology led through end user support I learned a lot right out of school. Most of what I learned I still carry with me today. Even so, time and bad habits can cause a person to forget some best practices. When Windows 8 was forced upon my new...- Gary McPherson
- Thread
- antivirus backup best practices ea games end users games it careers origin performance reboot sims 3 software issues stardock support system stability tech tips third party troubleshooting user experience windows 8
- Replies: 0
- Forum: The Water Cooler