Author: Harry Waldron

Roger Zander's Client Center for CM12 Browser Version Doc

At our company, we've elected to offer Roger Zander's Client Center for ConfigMgr 2012 utility to the staff who need to support CM12 clients.  Since often that staff is roaming, instead of deploying the MSI version or instructing them to use the C...

Infographic: Holiday 2011 – Online Shopping Safety Tips

Below are key safety tips from Facecrooks and Trend Micro for the holiday season: Holiday 2011 – Online Shopping Safety Tips http://facecrooks.com/Safety-Center/Internet-Safety-Privacy/Online-Shopping-Safety-Tips.html QUOTE: Black Friday and Cyber Monday are just around the corner. Many shoppers will avoid the mayhem and madness of brick and mortar establishments in favor of online retailers...

Microsoft Security Essentials – New Beta version emerges

A new BETA version of MSE is available with limited participation. Good technical skills are usually required to support beta testing in case issues surface. Microsoft Security Essentials beta registration opens http://blogs.technet.com/b/mmpc/archive/2011/11/18/microsoft-security-essentials-beta-registration-opens.aspx QUOTE: The number of users than can participate in the Beta is limited, so sig...

Mobile Security – List of Vulnerable Android Smartphones

A recent evaluation by Bit9 is noted below and the actual list can be found in links below The 12 Most Vulnerable Smartphones http://securitywatch.pcmag.com/none/290796-the-12-most-vulnerable-smartphones http://www.bit9.com/orphan-android/ QUOTE: How vulnerable is your smartphone to malware attacks? Android is by far the most targeted mobile operating system, but some popular Android phones made b...

Microsoft Hyper-V Security recommendations

Below are key resources for improving Hyper-V security Simple Security Recommendations When Using Hyper-V http://technet.microsoft.com/en-us/security/hh535714 QUOTE: Microsoft has a few articles on TechNet that outline some of the key aspects of a secure deployment of the Hyper-V virtualization technology, a feature of Windows Server 2008 R2. Microsoft Hyper-V Security Best Practices http://techne...

Windows 8 – No increased hardware requirements from Windows 7

Users with modern systems should be able to upgrade without needing more RAM or processor power, as noted below: Windows 8 – No increased hardware requirements from version 7 http://www.pcmag.com/article2/0,2817,2386339,00.asp QUOTE: Microsoft says Windows 7 users won’t need bigger and better hardware to run the freshly unveiled Windows 8. The PC system requirements will be the same if...

Adobe Flash v11 – to offer improved security

Adobe continues to gradually improve internal security in each version of their products as noted below: Adobe Flash v11 – to offer improved security http://securitywatch.pcmag.com/apple/288129-security-of-flash-11 QUOTE: Adobe Flash has struggled over the last few years to conquer a bad security reputation which, combined with ubiquity, as made it one of the more problematic components on t...