|
-- These laws apply to their customers (the whole world) not to Microsoft of course. http://log.bitpipe.com/log/log?u=http%3A%2F%2Fwww.microsoft.com%2Ftechnet%2Ftr eeview%2Fdefault.asp%3Furl%3D%2Ftechnet%2Fcolumns%2Fsecurity%2F10imlaws.asp&o= 912809075_304&r=1004651354_439&s=tr&sid=32815874&uid=4706915085648304274&x=450 376507 As I read through the detail behind this security guidance, I could not help indulge in some Microsoft bashing. Law # 1 about not running programs on your computer from an untrusted source & I am thinking that for most of us that source is Microsoft. Law # 2 about letting someone else alter the OS of your computer ... who do we know to trust to do this? Every vendor with software to sell us when it is to a Microsoft operating system. Law # 3 if a bad buy has unrestricted access to your computer, its not your computer anymore. Tell me again about this NET thing that will look after MY DATA and let me have access only for a price. Well there's some good advice here ... you have to read it for yourself, but I think it pretty much is more of Microsoft PR taking attention away from their philosophy of developing seriously flawed products from a security perspective then using PR instead of re-engineering to prevent this problem in future versions. The really nice part of all this is IBM managing to slip their ad in front. Do they have an inside agent at Tech Republic who wangled this for them? MacWheel99@aol.com (Alister Wm Macintyre) (Al Mac) -- Date: Fri, 21 Dec 2001 03:32:54 -0500 (EST) From: "Security Solutions at TechRepublic.com" <Online#1.4952.d3-SlYo1S9363LX.1@newsletters.online.com> To: macwheel99@aol.com Subject: The Ten Immutable Laws of Security TechRepublic: www.techrepublic.com Presents your SECURITY SOLUTIONS E-NEWSLETTER for December 21, 2001 <--------------Advertisement------------> Not worried about hackers? You should be. If your customers don't feel comfortable with you online, they'll work with someone else. IBM infrastructure gives you the security your company needs to operate effectively and keep clients comfortable. Find out more from our latest security white paper today. Go to <A HREF="http://click.online.com/Click?q=fd-BXOMQgO-_PnzyP6OlqV6YnTttRRR">http://click.online.com/Click?q=fd-BXOMQgO-_PnzyP6OlqV6YnTttRRR</A> <---------------------------------------> THE TEN IMMUTABLE LAWS OF SECURITY Microsoft is arguably the most successful and influential software vendor on the planet. As such, employing their products brings with it a measure of support and stability that only a dominant market leader can provide. The flipside of this dominance is that Microsoft products are prime targets for hackers not only as a declaration of war against what many view as Microsoft's stranglehold on desktop technology, but also because discovering and exploiting flaws in Microsoft security gives cybercriminals access to the widest number of systems. Microsoft is fully aware of the bull's-eye their success has painted on any system employing their products. To help stem the tide of Microsoft-directed hacker attacks, the Microsoft Security Response Center has developed a top ten list of security polices that go a long way toward locking down your system against potential compromises. These straightforward principles should be your ten commandments for Microsoft asset deployment. Disobey them at your own risk. PUBLISHER: Microsoft Corporation PUBLISHED: Nov. 10, 2001 FORMAT: HTML GET IT NOW! <A HREF="http://click.online.com/Click?q=98-FTtOQ_z5YmVz7siCPO0xCrnYKRRR">http://click.online.com/Click?q=98-FTtOQ_z5YmVz7siCPO0xCrnYKRRR</A> FIND INFORMATION IN RELATED REPORTS FROM OUR RESEARCH INDEX! * LOSS PREVENTION <A HREF="http://click.online.com/Click?q=ad-_4KAQzEWa5ln-3rQuVbxOJkDydRR">http://click.online.com/Click?q=ad-_4KAQzEWa5ln-3rQuVbxOJkDydRR</A> * SECURITY MANAGEMENT <A HREF="http://click.online.com/Click?q=c2-oXmLQUEsqTtWmnlgyi1c3FlzudRR">http://click.online.com/Click?q=c2-oXmLQUEsqTtWmnlgyi1c3FlzudRR</A> ---------------------------------------- BACK BY POPULAR DEMAND HOW TO REPORT CYBERCRIMES Who do you call when your organization has been the victim of a hacker or any type of cybercrime? Many companies don't call anyone, which can be a big mistake. Here is the information you need to take the best course of action as a cybercrime victim. <A HREF="http://click.online.com/Click?q=d7-wk2ZQLWsyTxJk7FRoNFDo6z9k9RR">http://click.online.com/Click?q=d7-wk2ZQLWsyTxJk7FRoNFDo6z9k9RR</A> SECURITY GURU'S NEW BOOK OFFERS OVER 1,100 SECURITY POLICIES Most IT shops have to struggle to put together a single security policy. But with this new book and CD-ROM, you can present individualized security policies to each department in less time than it takes your team to create one policy from scratch. <A HREF="http://click.online.com/Click?q=ec-MHsXQVyT3vt5hP11D5KTiEqya9RR">http://click.online.com/Click?q=ec-MHsXQVyT3vt5hP11D5KTiEqya9RR</A> <--------------Advertisement------------> SPECIAL OFFERS on Check Point SOLUTIONS! Save 40 percent off second SVN, VPN-1 or FireWall-1 unlimited module with HA solution. Trade-up to Check Point and save 50 percent. FREE Reporting Module with purchase of any SVN gateway or module. Accelerate performance of VPN-1 Gateway and save 50 percent or more. Offers end 12/27/01. Click here: <A HREF="http://click.online.com/Click?q=01-9oQDI2jfOOU_jPXvhP6W4lLU6RRR">http://click.online.com/Click?q=01-9oQDI2jfOOU_jPXvhP6W4lLU6RRR</A> <---------------------------------------> TODAY AT TECHREPUBLIC MANAGE MULTIPLE POSSIBILITIES WITH EXCEL SCENARIOS Excel can be a powerful tool for analyzing project costs. Find out how the Scenario Manager can quickly manipulate the data in multiple cells, allowing you to compare multiple "what if" situations. <A HREF="http://click.online.com/Click?q=16-T_rjI4c1y5lg6QpDYenhS3IHRdRR">http://click.online.com/Click?q=16-T_rjI4c1y5lg6QpDYenhS3IHRdRR</A> LEARN THE BASICS AND BEYOND AT THE BUSINESS WRITING CENTER Writing is an integral part of a consultant's work, and the ability to do it well can help or hinder the success of the firm. The Business Writing Center is one option for online training that offers courses specific to IT consultants' needs. <A HREF="http://click.online.com/Click?q=2b-2FwYINzkpKSyIYLwISCHZQyN8dRR">http://click.online.com/Click?q=2b-2FwYINzkpKSyIYLwISCHZQyN8dRR</A> COMPARE SERVER HARDWARE WITH THE HELP OF THIS DOWNLOAD Replacing server hardware involves many decisions, including whether to change hardware vendors. Our server comparison spreadsheet will help you evaluate your new server choices. <A HREF="http://click.online.com/Click?q=40-6PL4IdnckgmpmVFeyU0xKAGE0sRR">http://click.online.com/Click?q=40-6PL4IdnckgmpmVFeyU0xKAGE0sRR</A> ---------------------------------------- NOVELL'S NOS PACKS A POWERFUL PUNCH With NetWare, Novell in essence became the architect of corporate PC networking. Subscribe now to our NetWare tips, delivered Mondays and Thursdays, and we'll fill you in on the latest advances in directory services, data storage, and much more. <A HREF="http://click.online.com/Click?q=55-TAoaIKJcc5RQkelqoLMXNSX1d9RR">http://click.online.com/Click?q=55-TAoaIKJcc5RQkelqoLMXNSX1d9RR</A> --------------------------------------- TechRepublic TechMails may contain links to sites on the Internet that are owned and operated by third parties. TechRepublic, Inc. is not responsible for the content of any such third-party site. To update your TechMails subscription: <A HREF="http://click.online.com/Click?q=6a-z_20IeW7ZJcqvZIzXl0S3i7-PRRR">http://click.online.com/Click?q=6a-z_20IeW7ZJcqvZIzXl0S3i7-PRRR</A> To unsubscribe from this mailing list: <A HREF="http://click.online.com/Click?q=7f-bn6KzqP2qbo5uSKTdI3EetAoUxRR">http://click.online.com/Click?q=7f-bn6KzqP2qbo5uSKTdI3EetAoUxRR</A> Questions or comments: <A HREF="http://click.online.com/Click?q=94-rOwNQaIikF02b3KJvluZrQFvJRRR">http://click.online.com/Click?q=94-rOwNQaIikF02b3KJvluZrQFvJRRR</A> Visit TechRepublic <A HREF="http://click.online.com/Click?q=a9-IlqqQpUeKre7jeEz1YUUtd-IVdRR">http://click.online.com/Click?q=a9-IlqqQpUeKre7jeEz1YUUtd-IVdRR</A> Copyright 2001 CNET Networks, Inc. All rights reserved. TechRepublic is a registered service mark of CNET Networks, Inc.
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.