Search This Blog

Tuesday, September 29, 2009

Whitelists, blacklists and AppLocker goodness

From Microsoft Subnet; Multi-core CPUs: the end of Moore's law
Network World logo

Microsoft Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by Cisco
rule

Beefing up Email Security by Teaming with a Leader
Improve your email security practices after watching this Live Webcast on Wednesday, September, 30 at 1:00 p.m. ET/10:00 a.m. PT. Your email security choices extend beyond on-premise only solutions. Improve your anti-spam, visibility, content filtering and encryption support with hosted, hybrid and managed email security services.

Register for this live event now.

rule

Spotlight Story
Whitelists, blacklists and AppLocker goodness

Tyson Kopczynski: It so happens that the topic of whitelists vs. blacklists comes up a lot when I'm talking to clients. The questions seem to always revolve around the pros and cons. For some reason, there seems to be fear around implementing whitelists. A really great example of a whitelist solution is Microsoft's AppLocker. The methodology for defining rules is flexible enough to effectively balance enforcement, management, and productivity, although I wouldn't say that AppLocker is the end-game in end-point protection. Read full story

Related News:

From Microsoft Subnet
This is Network World's Microsoft Subnet news alert in which we focus on the top items from Microsoft Subnet, your daily source for Microsoft news, blogs, discussion items, security alerts, giveaways and more.

Multi-core CPUs: the end of Moore's law
Michael Surkan: While Moore's law may still be technically valid, for all intents and purposes it is no longer true. Unfortunately, all these extra CPUs haven't done much to speed up computers, or offer much in the way of appreciable benefits to users. Nor are they likely to in the foreseeable future.

SQL Server 2008 R2 CTP available
Brian Egler: SQL Server 2008 R2 CTP is available for testing. The official release is slated for the first half of 2010. I am in the process of testing the new features myself.

Microsoft, researchers release new operating system project: Barrelfish
The Microsoft Subnet blog: You've likely heard of Microsoft's next-gen operating system projects Midori and Singularity, but earlier this month researchers released a prototype for another OS, code-named Barrelfish.

Replicate down or up-level - your choice
Brian Egler: I was asked recently about replication with different versions of SQL Server i.e. multiple versions of SQL Server in a replication topology. Generally, Microsoft supports replication back to two previous versions. We just need to know the rules.

Wireshark Errors - Or Are They?
Glenn Weadock: One of the features of Wireshark that you may have noticed is that the program color-codes packets in the packet list pane. For example, if Wireshark detects potential problems, it colors them with red text on a black field.

Remote Desktop Services: Some help to keep you from feeling 'Terminal'-ly lost
Ron Barrett: So with all the changes to Terminal Services (including a new name) that R2 will bring, I thought it would be helpful to look at each new service in Windows Server 2008 R2.

Microsoft: All I Have To Say Is 'Fix Your Browser'
Mitchell Ashley: The issue of Google's gutsy move to step in and solve IE8's performance problem is pretty short and sweet from my perspective. If IE8 wasn't such a slow pig of a browser, there wouldn't be an opportunity for Google to fix it by using Google's WebKit display engine.

Viewing Network Conversations in Wireshark
Glenn Weadock: Last post we discussed filtering packets in Wireshark to restrict the displayed packets according to specified criteria. Another way to zero in on traffic of interest is to view a "conversation" between two specific systems.

Microsoft "Courier" Tablet: The Right Stuff To Compete Against The Apple Tablet?
Mitchell Ashley: More than just photos are leaking out about Courier, Microsoft's booklet sized tablet currently in development. I'm iffy about the idea of a pen/digital ink interface.

ExRCA: Test your Exchange Server 2007 remote connectivity
Ron Barrett: In Exchange 2007 client access is handled by, of course the Client Access Server (CAS). But even if CAS is working ok, your users still may not be able to connect.

Microsoft retires Filemon and Regmon from Sysinternals
The Microsoft Subnet blog: On Friday, Microsoft retired two all-time favorite Sysinternals tools, Filemon and Regmon. The Process Monitor utility has officially replaced them. NewSID will be retired on November 2.

Microsoft Subnet is giving away training from New Horizons and 15 copies of Windows Server 2008 How-To. Cisco Subnet is giving away 15 copies of Interconnecting Data Centers Using VPLS. Google Subnet is hosting many new bloggers (watch for giveaway information soon.) Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


Are netbooks ready for the enterprise?
NetbooksFive reasons to deploy netbooks and five reasons not to.

Demo's biggest stars ever
Demo1,500 innovators have presented at Demo. Here are the best.

Is Anti-Virus Dead?
This paper discusses the security implications of modern threats, analyzes where emerging technologies can add real value, and highlights five key strategies for ensuring solid malware protection.
Learn more.


 

September 29, 2009

MOST-READ STORIES

  1. Cell towers that blend vs. those that offend
  2. Microsoft, researchers release new operating system project
  3. Xerox will buy ACS for $6.4 billion
  4. AT&T accuses Google of violating telecom law
  5. To fight worms, use ants
  6. Judge berates Apple over Snow Leopard timing in Psystar case
  7. What to do about bandwidth hogs?
  8. Citrix planning major desktop virtualization push
  9. John Chambers slams Cisco with $2.3 million in private jet expenses
  10. Lotus goes after Microsoft's 'ridiculous and fabricated' figures

Identity Management E Guide
Identity management cannot be ignored – it is the key to preventing data breaches. This Network World Executive Guide provides in-depth information on today's most pressing security issues.
Read More



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments: