data protection

  1. MS16-001 - Critical: Cumulative Security Update for Internet Explorer (3124903) - Version: 1.0

    Severity Rating: Critical Revision Note: V1.0 (January 12, 2016): Bulletin published. Summary: This security update resolves vulnerabilities in Internet Explorer. The more severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet...
  2. MS16-001 - Critical: Cumulative Security Update for Internet Explorer (3124903) - Version: 1.0

    Severity Rating: Critical Revision Note: V1.0 (January 12, 2016): Bulletin published. Summary: This security update resolves vulnerabilities in Internet Explorer. The more severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet...
  3. Automated disaster recovery solution using ASR for file shares hosted on StorSimple

    Describes how to configure an automated disaster recovery solution for StorSimple file shares Link Removed
  4. L

    Windows 7 Removing data protected in TrustedInstaller area

    I have found with Disk Investigator scores of urls and passwords on my disk that windows7 has somehow put in the clear on my C drive. I have tried using HxD to overwrite the passwords, but windows7 gives me an 'Access denied' message when I try to save the changes. This write is supposedly...
  5. System Center Technical Preview 4 Data Protection Manager – Evaluation (VHD)

    This download consists of files that you extract into a single pre-configured VHD file for this System Center component. The VHD enables you to create a virtual machine to evaluate the different System Center components. Link Removed
  6. First Major Update for Windows 10 Available Today

    Today, we reach our next milestone as the first major update to Windows 10 is now available* for PCs and tablets. With this update, there are improvements in all aspects of the platform and experience, including thousands of partners updating their device drivers and applications for great...
  7. Azure SQL Database Threat Detection | Data Exposed

    In this Data Exposed episode Scott welcomes Ron Matchoro, a Senior Program Manager on the SQL Security team, to talk about a new Threat Detection feature on Azure SQL Database, which is about to be released for Preview. SQL Database Threat Detection provides a new layer of security, which...
  8. Create more secure apps with less effort (10 by 10)

    In our final post of the Windows 10 by 10 development series, we’ll talk about the feature introductions and enhancements in Windows 10 that help you create more secure apps. When we think of security, we can split it up in these three main areas: authentication, data-in-flight and data-at-rest...
  9. Windows 10 BACKUP

    Dear Guys, I try to use BACKUP that comes with Windows 10. The BACKUP works well but i have some difficulties using the customization. - When i want to exclude folders from Backup, sometimes it works (the folder that i excluded appear in the list), and sometime does not appear. Question: What...
  10. New Surface Enterprise Initiative Will Further Windows 10 Adoption

    From the beginning, Windows 10 was built for the enterprise. Feedback from millions of IT Pros helped shape our Link Removed. Ready for corporate deployments, Windows 10 was designed to help companies protect against modern cyber-attacks, deliver experiences employees will love and enable...
  11. J

    Windows 8 Getting hacked?

    I was lagging, my pc... whenever I typed something, it wouldn't do anything and then after 5 seconds would start typing what I typed 5 seconds ago... I restarted my pc, it was good for 1 min and then it got worse then before. I restarted it once again, and went to get something to eat (I didn't...
  12. Windows 10 – Available for Business Today

    Link Removed, Windows 10 is available in 190 countries beginning today. This is a significant milestone we reached together, as more than 5 million Windows Insiders, 30% of them IT Pros, provided us with feedback and helped us build the best Windows ever. We’re excited to begin to make Windows...
  13. Windows 7 Internet getting dangerous.

    There was once a time when you might only expect to pick up some malicious software on certain types of websites. It seems now, almost anywhere might expose you to such things. I was doing something as innocent as looking for the radio frequencies used in Microwave ovens and ended up getting...
  14. 3057154 - Update to Harden Use of DES Encryption - Version: 1.0

    Revision Note: V1.0 (July 14, 2015): Summary: Microsoft is announcing the availability of an update to harden scenarios in which Data Encryption Standard (DES) encryption keys are used with accounts. Microsoft disabled DES by default starting in Windows 7 and Windows Server 2008 R2. However...
  15. Last Week on Channel 9: June 29th - July 5th, 2015

    Even with a quite week due to the July 4th holiday here in the States, we still have 18 sessions for you to check out... Link Removed Josh Holmes describes Project Nitrogen - a framework that helps maintain data retrieved from hardware devices and stored in the cloud. Link Removed Channel...
  16. Windows 10 Restoring an system copy

    That is a good exercise, isn't it? I made a system copy on an external USB disk, then a repair disk on CD. Because there are more system copies on that USB disk I made a new directory and moved the system copy into that directory. Nothing new, all has been done before. Then I restored...
  17. G

    Windows 7 check recently copied files

    how to check recently copied files on my computer? can anyone help me? I just want to find out whether someone has copied files from my laptop...
  18. Windows 8 bitlocker

    so, i just enabled bitlocker cause my brother is starting to get into hacking and stuff like that, and i dont want him to be messing around with my computer when im not home.. so what i would like to know is, will bitlocker pervent him from disabling my windows password with a USB flashdrive...
  19. TechNet Radio: (Part 20) Building Your Hybrid Cloud - Protecting Data with Encryption |...

    Keith Mayer and Andy Syrewicze are back for the next part in their “Build Your Cloud” series and in today’s episode they discuss how you can protect your data in the cloud through At-Rest Data Encryption. [Link Removed] What are some at-rest data encryption options? [Link RemovedLink Removed...
  20. TA15-120A: Securing End-to-End Communications

    Original release date: April 30, 2015 Systems Affected Networked systems Overview Securing end-to-end communications plays an important role in protecting privacy and preventing some forms of man-in-the-middle (MITM) attacks. Recently, researchers described a MITM attack used to inject...