"Teens need more security," Dan Appleman says. Here's the other videos from Dan:
On a security crusade.
Where are teenagers feeling computing pain?
What are some security tips?
How does a teenager differ from a software developer?
You can read more from Dan on his blog.
Dan Appleman is a software developer. But he wrote a security book for teenagers. So, we thought it'd be interesting to ask him to compare the security needs of both.
We're talking, by the way, of a pre-Windows XP Service Pack 2 world (when it comes to getting infected by turning on a new…
"Is your computer acting strange?"
Then you might be a teenager who hasn't secured your computer.
Dan, co-founder of Apress books, talks about the kind of computing pain that teenagers are seeing and how he convinces teenagers to learn how to protect themselves.
He talks about a…
Dan Appleman is on a campaign to secure every computer in the country. To help in that goal he wrote a book:
Always Use Protection: A Teen's Guide to Safe Computing.
But that's not why we put him here on Channel 9 (he's the first non-Microsoft employee to be interviewed for Channel 9, by the…
This is a different kind of interview for us. Dan Appleman doesn't work at Microsoft -- he's the cofounder of the
Apress book publishing company.
So, why is he here?
Well, he's on a crusade to make the geek world more secure. He wrote a book to help teenagers protect their systems…
How do bad guys work to figure out security holes? Michael Howard, Microsoft's top security guy, talks about how the bad guys go about their work.
This video is from an earlier interview we did. Here's the rest of the clips, just in case you missed them:
What are the top things the average…
Frank Swiderski is a security software engineer at Microsoft and wrote
a threat modeling tool. So, we got a demo of the tool and discussed it, and threat modeling in general, with him.
Threat modeling is a process to understand the threats against an application. It's a useful tool to make your…
Listen in as David Lowe, Senior Product Manager for Windows Server, and Matt Hester discuss how Windows Server “Longhorn” has been designed around server roles and workloads that meet customers’ needs. Get an understanding of how
roles map to workloads, how workloads combine to deliver clear…
In this episode of TechNet Radio Kai Axford, Sr Security Strategist from the Trustworthy Computing Team, and Mark Griesi discuss the technical details of the April security bulletins. They also talk about the scenario that led to
the out of band release of MS07-017 which addressed the…
In this episode Matt Hester interviews Jason Buffington about Microsoft Data Protection Manager Version 2 (DPM v2).
DPM v2 blends the best aspects of continuous data protection (CDP) with traditional tape backup into a single and reliable data protection solution that enables IT…