Steve Lamb's Blog
Security Matters
Why do most firewalls only inspect packet headers?
The vast majority of firewalls on the market don't inspect the payload of packets - instead they...
Author: Steve Lamb Date: 12/13/2004
Load Balancing a Rights Management Server Cluster using Network Load Balancing
The Microsoft® IT Showcase website is a great resource for learning how we secure our environment at...
Author: Steve Lamb Date: 12/13/2004
How we at Microsoft Secure our own infrastructure
Ever wondered how we secure our own infrastructure? The ITShowCase website provides IT Professionals...
Author: Steve Lamb Date: 12/13/2004
What Security topics would you like me to BlogCast about?
Eileen Brown has just posted an interesting article on her Blog which explains a new technique we're...
Author: Steve Lamb Date: 12/09/2004
How to get around CISCO's Security Agent!
Steve Riley's Blog includes the following post which just shows that even brand new security...
Author: Steve Lamb Date: 11/24/2004
Securing Wireless LANs with PEAP and Passwords
There's a wealth of excellent prescriptive Guidance from Microsoft Consultants which is available...
Author: Steve Lamb Date: 11/23/2004
Apparently Keystroke Logging Isn't Wiretapping
Another interesting article on Slashdot....
Author: Steve Lamb Date: 11/23/2004
Protecting Your Windows Network - paths hackers can use to infiltrate networks
Steve Riley @ Jesper Johansson are writing a book titled "Proecting Your Windows Network" - an...
Author: Steve Lamb Date: 11/22/2004
Why isn't the Firefox code signed?
I'm having a look @ Firefox and have noticed that the code is not signed and therefore it's...
Author: Steve Lamb Date: 11/22/2004
Poetic Justic - the Register advocates XP SP2
https://www.theregister.co.uk/2004/11/21/register_adserver_attack/ I'm not saying that it's good that...
Author: Steve Lamb Date: 11/22/2004
Blog SPAM
William Luu's feedback to my last post makes a great deal of sense - "They're just trying to boost...
Author: Steve Lamb Date: 11/22/2004
Blog Spam / Phishing / Harvesting
Many Blogs are receiving feedback with links to the following URL - DO NOT FOLLOW THIS LINK(that's...
Author: Steve Lamb Date: 11/20/2004
Hacking Vodka!
I came across the following post on slashdot Hacking Vodka Posted by michael on Saturday November...
Author: Steve Lamb Date: 11/20/2004
Don't rely upon 802.1X to secure your wired networks!
Steve Riley gave a fasinating session @ IT Forum where he commented that 802.1X for wired networks...
Author: Steve Lamb Date: 11/20/2004
What are the privacy implications of Moblogs?
It's only a matter of time before Moblogs hit the mainstream. Clearly this is something the mobile...
Author: Steve Lamb Date: 11/20/2004
How to contain hackers and stop worms viruses and spam
It's great to be back in Copenhagen for ITForum 2004. I'm really looking forward to Steve Riley and...
Author: Steve Lamb Date: 11/14/2004
Disclaimer
The information in this weblog is provided "AS IS" with no warranties, and confers no rights. This...
Author: Steve Lamb Date: 11/11/2004
How to encourage users to take security seriously
Such a huge topic. In my experience getting users to buy into their role in security is imperitive...
Author: Steve Lamb Date: 11/10/2004
I thoroughly enjoyed debating whether privacy's dead at the IEE Law and Security event
Details of the event can be found here . The panel session debated whether privacy's dead given the...
Author: Steve Lamb Date: 11/09/2004