Jul 18 2008

Websites that are annoying

Published by under General

This is a quick rant about some common annoyances I come across on websites… SnapShots – these are those annoying JavaScript popup windows which appear when you hover your mouse over a link. In theory they are supposed to help you by proving a thumbnail screenshot of the site being linked to, but in practice […]

No responses yet

Apr 07 2008

Find Your Friends with Flickr

Published by under Internet

Flickr unveiled a new feature recently that enables you to search through your address books in various email systems to find contacts that are also on Flickr. If you’ve used one of the many social networking sites, you’ll realise that this isn’t a new feature – most other social networking sites allow you to search […]

No responses yet

Dec 11 2007

Safe computing for your home

Published by under Infrastructure,Internet

On the TV1 Breakfast show this morning, Paul Henry was interviewing Peter Griffin about security software for home computers. In my previous field engineer roles, and my current role as "IT guy" for my extended family, I’ve got a lot of experience setting up and securing home computers as well as small business computers (ones […]

No responses yet

Jul 10 2007

How to choose a secure password

Published by under Infrastructure

[tags]security,passwords,hacking,cracking,microsoft,complex,best-practices[/tags] As a follow-up to the secure USB drive post, I wanted to give some pointers on how to create secure, complex passwords. Complexity… In a Microsoft environment, a complex password must be at least six characters long, cannot contain three or more letters from the user’s username, and must contain characters from at least […]

No responses yet

Jul 09 2007

How to secure a USB drive with TrueCrypt

Published by under General

A quick step-by-step tutorial on how I secure my 4GB USB drive: Create the file… Download TrueCrypt from here: http://www.truecrypt.org/downloads.php Unzip the download, but don’t install it. Browse to the “Setup Files” directory. Run “TrueCrypt.exe” and click the “Create Volume” button to start the wizard. Choose the “Create a standard TrueCrypt volume” option. Click the “Select […]

No responses yet

May 16 2007

Reduced attack surface area

Published by under Infrastructure

Jeff Jones (Strategy Director in the Microsoft Security Technology Unit) has written a post about Server Core and how its reduced footprint increases security dramatically. The key here is “reduced attack surface area” as all of the most insecure areas of a server have been removed, such as IIS, Internet Explorer, Windows Media Player, etc… […]

No responses yet

Apr 10 2007

Citrix Desktop Server

Published by under Infrastructure

This has just been released but I haven’t had a chance to look at it properly yet. Will write more once I have a better understanding of it. Citrix Desktop Server New Citrix Desktop Server revolutionizes desktop delivery and management Managing and securing the Windows Desktop OS is a significant and growing challenge for most […]

No responses yet