Microsoft® Internet Security and Acceleration (ISA) Server 2006 Service Pack (SP) 1 will be available for your installation pleasure this summer!
really enjoy the new features
read More
Saturday, May 24, 2008
Thursday, May 22, 2008
Microsoft Offers Cash To Use Its Search Engine
Microsoft plans to entice advertisers and users of its search engine with savings on online purchases on a site called Live Search cashback
Read More
Read More
Thursday, May 15, 2008
Facebook applications exposed as security risk
Take care while you are using Facebook , security report shows Facebook applications exposed as security risk
Speculation on the security of social networking has increased amid reports that applications on Facebook are capable of collecting personal information.
Read The Report
Speculation on the security of social networking has increased amid reports that applications on Facebook are capable of collecting personal information.
Read The Report
Tuesday, May 13, 2008
The Award for “outstanding Individual contributor FY08”
I was very delightful when I received a call from Symantec inviting me to attend the “Symantec Partner Awards Dinner 08” held in Dubai.
At the beginning they insisted to have me there without giving me a reason, I did my best to get the Visa and it did not work , So I wasn’t able to attend.
One of my colleges attended on my behalf and the surprise that I have been awarded as the “outstanding Individual contributor FY08”, Best Pre -Sales in the ME.
Monday, May 12, 2008
Flaw turns Gmail into spamming machine
A "serious security flaw" in Gmail turns Google's e-mail service into a spamming machine, according to a recent security report.
INSERT, the Information Security Research Team, has created a proof of concept that exploits the "trust hierarchy" that exists between mail service providers. By exploiting a flaw in the way Google forwards messages, a spammer can send thousands of bulk e-mails through Google's SMTP service, bypassing Google's 500-address bulk e-mail limit and identity fraud protections.
Read More
INSERT, the Information Security Research Team, has created a proof of concept that exploits the "trust hierarchy" that exists between mail service providers. By exploiting a flaw in the way Google forwards messages, a spammer can send thousands of bulk e-mails through Google's SMTP service, bypassing Google's 500-address bulk e-mail limit and identity fraud protections.
Read More
Wednesday, May 07, 2008
Microsoft is winning the NAC war, expert says
Why Microsoft is doing it right, ACLs are better than VLANs and the dirty dark corner of NAC (management).
By Julie Bort , Network World , 05/06/2008
Security guru Joel Snyder from Opus One recently starred as the guest of a live Network World chat where he discussed the state of network access control. Snyder says that Microsoft is emerging as one of the clear winners of NAC, but that Microsoft's technology is a foundation from which to build, not an end-all. He also says that those who are anti-NAC simply don't understand the technology. He answered a slew of technical questions from attendees including why ACLs are better than VLANs, the dirty dark corner of NAC (management) and the how and why of 802.1X. What follows is a full transcript
Read More
By Julie Bort , Network World , 05/06/2008
Security guru Joel Snyder from Opus One recently starred as the guest of a live Network World chat where he discussed the state of network access control. Snyder says that Microsoft is emerging as one of the clear winners of NAC, but that Microsoft's technology is a foundation from which to build, not an end-all. He also says that those who are anti-NAC simply don't understand the technology. He answered a slew of technical questions from attendees including why ACLs are better than VLANs, the dirty dark corner of NAC (management) and the how and why of 802.1X. What follows is a full transcript
Read More
Subscribe to:
Posts (Atom)