Kerberos...what a name for a protocol eh? Well according to
Wikipedia “The protocol was named after the Greek mythological character Kerberos (or Cerberus), known in Greek Mythology as being the monstrous three-headed guard dog of Hades.” Well whatever you think of the name we are stuck with it…
This is part two of our discussion with Scott Field, one of the minds behind Vista's security architecture (hint: he likes the way onions are constructed...). Jeremy Mazner helps conduct this interview, which contains explicit whiteboard scenes and frank
talk about security and the future of…
Scott Field is an Architect who's been working on software security at Microsoft for twelve years. His most recent work has been focused on improving security in general purpose monolithic operating systems, from the kernel to the shell. You've heard a
lot about how Vista is our most secure OS…
Richard is an architect on the kernel team on Windows Vista. In other words, everything in Windows builds on top of his team's work. Here Charles Torre has a 52 minute conversation with him about the kinds of things that are being done deep inside Windows
from a security perspective. But you'll…
From being an economics major and MBA to working with a veterinary ophthalmologist in Florida, Shawn Richardson tell us about her non-linear path into the world of technology. As a security program manager, Shawn is on the Windows Security Assurance team
where they make sure the OS, when it goes…
geekSpeakJun 28, 2010 at 1:43PM0
MSDN Online Media
As Web applications move beyond simple HTML forms and postbacks, developers must have an effecting testing strategy to address the new capabilities. In this episode of geekSpeak, author Jeff McWherter discusses the importance of testing Web applications,
and he shares strategies for testing key…
Phishing attacks are becoming more frequent. What's a phish attack? When a criminal makes an email that looks like it came from a company like eBay. Tricks the user into entering passwords or credit card numbers. Here's some things to do to protect yourself.
Developers are being asked to create more secure code. The next version of Visual C++, code-named Whidbey, will introduce several new security-protection capabilities. Here Scott Currie, Scott Currie, program manager of Visual C++ discusses the new security-focused
Stephen Toulouse works in the security response center at Microsoft. This is the group that goes to work when a new vulnerability or attack is discovered around the world. During a crisis they'll work around the clock to help customers.
Microsoft's Security Response Center gets a lot of email sent to its
firstname.lastname@example.org alias. Stephen kept talking about "responsible disclosure" with us so we wanted to find out just what he meant by that.