cryptography

  1. How to restrict the use of certain cryptographic algorithms and protocols in Schannel.dll

    Link Removed
  2. Microsoft Security Advisory (2854544): Updates to Improve Cryptography and Digital Certificate...

    Revision Note: V1.1 (August 13, 2013): Added the 2862966 and 2862973 updates to the Available Updates and Release Notes section. Summary: Microsoft is announcing the availability of updates as part of ongoing efforts to improve cryptography and digital certificate handling in Windows. Microsoft...
  3. Microsoft Security Advisory (2854544): Update to Improve Cryptography and Digital Certificate...

    Revision Note: V1.0 (June 11, 2013): Advisory published. Summary: Microsoft is announcing the availability of an update as part of ongoing efforts to improve cryptography and digital certificate handling in Windows. Over the course of months, Microsoft will continue to announce additional...
  4. MS12-049 - Important : Vulnerability in TLS Could Allow Information Disclosure (2655992) -...

    Severity Rating: Important Revision Note: V1.1 (July 9, 2013): Bulletin revised to announce a detection change in the Windows Vista packages for the 2655992 update to correct a Windows Update reoffering issue. This is a detection change only. Customers who have already successfully updated their...
  5. Microsoft Security Advisory (2854544): Update to Improve Cryptography and Digital Certificate...

    Revision Note: V1.0 (June 11, 2013): Advisory published. Summary: Microsoft is announcing the availability of an update as part of ongoing efforts to improve cryptography and digital certificate handling in Windows. Over the course of months, Microsoft will continue to announce additional...
  6. Improved cryptography infrastructure and the June 2013 bulletins

    It was just over one year ago, May 28, 2012, to be exact, that I transitioned from running active MSRC cases and writing bulletins to my current role managing software security incidents. A lot has changed in that year - and I’ve dealt with some interesting issues during my tenure - but...
  7. Microsoft Security Advisory (2854544): Update to Improve Cryptography and Digital Certificate Handli

    Revision Note: V1.0 (June 11, 2013): Advisory published. Summary: Microsoft is announcing the availability of an update as part of ongoing efforts to improve cryptography and digital certificate handling in Windows. Over the course of months, Microsoft will continue to announce...
  8. "System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing" security s

    Link Removed
  9. RSA key length is increased to 2048 bits for AD RMS in Windows 7 or in Windows Server 2008 R2

    More...
  10. Verifying update hashes

    Some of you may have noticed us improving our defense-in-depth practices for bulletins by supplying sha1 and sha2 hashes in the Knowledge Base (KB) articles. This has been most visible in the KB with the addition of the “File hash information” section, but it is also noted in the...
  11. Microsoft Security Advisory (2661254): Update For Minimum Certificate Key Length - Version: 1.2

    Revision Note: V1.2 (September 11, 2012): Clarified that applications and services that use RSA keys for cryptography and call into the CertGetCertificateChain function could be impacted by this update. Examples of these applications and services include but are not limited to encrypted email...
  12. T

    Windows 7 Problem connecting with a Windows CP computer

    Ok, so I just got my Windows 7 on my HP 6530b laptop, and I have stored my documents on my fathers XP computer meanwhile. Problem is I can't connect to his computer. He can find be but I can't find him. I have been googling for a while now, and the things I have done to fix this is: - Change it...
  13. Security Advisory 2718704: Collision attack details, WU update rollout

    Today, as a part of our continuing phased mitigation strategy recently discussed, we have initiated the additional hardening of Windows Update. We’ve also provided more information about the MD5 hash-collision attacks used by the Flame malware in the SRD blog. This information should help...
  14. Security Advisory 2718704: Update to Phased Mitigation Strategy

    Hello, At Microsoft, our commitment is to help ensure customer trust in their computing experience. That was the impetus for Trustworthy Computing, and central to that is the priority we place on taking the necessary actions to help protect our customers. Yesterday, we issued Security Advisory...
  15. Microsoft releases Security Advisory 2718704

    Hello, We recently became aware of a complex piece of targeted malware known as “Flame” and immediately began examining the issue. As many reports assert, Flame has been used in highly sophisticated and targeted attacks and, as a result, the vast majority of customers are not at...
  16. Error message when you try to validate a copy of Windows: The cryptographic operation failed due to

    When you try to validate a copy of Windows, you may receive an error message that resembles the following: When you try to validate Windows from , Windows downloads an update , however when Windows tries to install the update, the update shows an error... Link Removed
  17. "System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing" security s

    Explains how you can configure the negotiation of stronger, FIPS-compliant cryptography in Windows XP and in later operating systems by enabling certain security settings. Link Removed
  18. Description of the Cryptography API proxy detection mechanism when downloading a Certificate Revocat

    This KB article describes the proxy detection mechanism that the Cryptography (Crypto) API uses to download a CRL from a CRL distribution point. It discusses the locations of the registry where proxy information is found. Link Removed
  19. Microsoft Security Advisory (961509): Research proves feasibility of collision attacks against MD5

    Revision Note: Advisory published Summary: Microsoft is aware that research was published at a security conference proving a successful attack against X.509 digital certificates signed using the MD5 hashing algorithm. This attack method would allow an attacker to generate additional...
  20. Windows 7 Windows 7 security: the complete guide

    Link Removed Windows 7 is just over six months old. It has been quickly adopted by PC users at home and in businesses. However, some IT admins are struggling with the platform's new security features. We take a look at the key features and what you need to know.In addition to changes to User...