Windows 7 updates available to all!.. including pirates?

24 06 2009

Yaaarr I be patched I will...

Yaaarr I be patched I will...


Pirated copies of Windows 7 will be kept just as safe as non-genuine variants of previous Windows releases, by Microsoft via security updates. Responding to questions related to how Microsoft keeps Windows users protected on an ongoing basis, Paul Cooke, Microsoft director for Windows Client Enterprise Security, emphasized that security updates were provided to all Windows users, irrespective of whether they are running genuine or pirated editions of Windows. Windows 7 will be by no means an exception to this strategy, designed not to support piracy, but to ensure a healthy Windows environment.

That all sounds pretty great for the pirates at least, but it seems Microsoft are looking at the bigger picture of ensuring a secure environment for everyone while try to maintain their credibility which unpatched pirated software has partially contributed to.

Paul Cooke goes on to say, “Keeping a machine up to date is one of the first steps in helping ensure that they remain reliable, compatible, and safe from threats when they are online. Some of the most famous incidents of malicious software infection have come after security updates were publicly available from Microsoft – Blaster, Zotob, Conficker and Sasser, just to name a few,” Cooke added. “Rest assured that we at Microsoft are committed to making sure that security updates are available to all of our users to help ensure a safe online experience for everyone.”

Advertisements




How to reset local user password to random one

22 06 2009

Handy little command line for creating a completely unique and secure password for a local user.

For this example I have made a user called ‘test’. In a command prompt windows type:

net user test /random
Command line

Command line

The password will be reset and it will be shown to you after you pressed “Enter” button.

The output will be similar to:

Password output

Password output





Control your PC from Twitter?!

16 06 2009

Interesting concept so I thought I would check it out.

A little application called TweetMyPC has the ability to read you tweets on Twitter where ever you are tweeting from, then convert them to a command for you computer to respond to.

For example you are at work and on Twitter. You post a tweet “ip” (without the quotes) your home PC running TweetMyPC will pick this up as a command and reply to you with your home PC’s IP address. There is a number of potentially useful comands which you can find here http://www.codegeeks.net/tweetmypc-what-next.

While this is still an early release of the application and may pose some security/privacy risk, the question has to be asked – are there any limitations  with this seemingly basic social networking site??





Virtualization – yeah I’ve heard of it but what can it do?

15 06 2009

Since it is such a hot topic out in the overly blogged world out there, I thought I might break it down a little!

  • Server Virtualization – consolidating multiple physical servers into virtual servers that run on a single physical server.
  • Application Virtualization– an application runs on another host from where it is installed in a variety of ways. It could be done by application streaming (such as that from a Citrix Presentation server using their Program Neighborhood), desktop virtualization or VDI, or a VM package. Microsoft Softgrid (rebadged Microsoft Application Virtualization) is an example of Application virtualization and the latest example being an integral selling point with some version of Windows 7 (more on that later).
  • Presentation Virtualization– This is what Citrix Met frame (and the ICA protocol) as well as Microsoft Terminal Services (and RDP) are able to create. With presentation virtualization, an application actually runs on another host and all that you see on the client is the screen from where it is run.
  • Network Virtualization– with network virtualization, the network is “carved up” and can be used for multiple purposes such as running a protocol analyzer inside an Ethernet switch. Components of a virtual network could include NICs, switches, VLANs, network storage devices, virtual network containers, and network media.
  • Storage Virtualization– with storage virtualization, the disk/data storage for your data is consolidated to and managed by a virtual storage system. The servers connected to the storage system aren’t aware of where the data really is. Storage virtualization is sometimes described as “abstracting” the logical storage from the physical storage. Commonly used with iSCSI setups

If you want to know more about a specific item just Google any of the text in bold and you will find hundreds of technical explainations and setups.





Windows 7 and Server 2008 RC2 dates made official

15 06 2009

Earlier this month, during a keynote address at Computex 2009 in Taipei, Microsoft’s OEM Division Corporate Vice President Steve Guggenheimer revealed that the company is confident with the progress made with Windows 7 and Windows Server 2008 R2, and that as a result, Microsoft will deliver Release to Manufacturing (RTM) code to partners in the second half of July. Windows 7 will become generally available on Oct. 22, 2009, and Windows Server 2008 R2 will be broadly available at the same time.