jump to navigation

Microsoft to reveal more Windows 8 Enterprise details at CeBIT conference next week | The Verge March 2, 2012

Posted by John Ruby in BlogoSphere, Microsoft, Platforms & EcoSystems, The Verge, Windows.
Tags: , , , , , , , , , , , , , , , , , , , , , , , ,
add a comment

 

By Dieter Bohnon February 29, 2012 11:00 am

Windows 8 Enterprise

During today’s Windows 8 keynote, Microsoft showed off a previously-known Enterprise features like Windows To Go, which allows a computer to boot into Windows 8 off of a USB stick. Microsoft also demoed "Storage Spaces," which allows a Windows 8 machine to act as a hard drive array, providing simple, massive storage to any computer on the network. It seems as though there’s yet more to Windows 8 Enterprise that the company has yet to reveal, but more will be revealed next week at the CeBIT conference in Hanover. The conference begins on March 6th and The Verge will be there to bring you all the details from the next Windows 8 event.

Microsoft also emphasized that enterprise users will benefit from the fact that Windows 8 offers the same experience on all manner of devices, from very small to very large and powerful. It’s a theme that the company hit on consistently throughout the entire keynote, and very likely going to be one of the big talking points when it comes time to directly compete with Apple’s iPad ecosystem.

Read More…Microsoft to reveal more Windows 8 Enterprise details at CeBIT conference next week | The Verge

That’s a great diagram showing how the ecosystem has reach in many spaces.

Windows NT Security Systems March 2, 2012

Posted by John Ruby in Archives, Security, Technologies.
Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,
add a comment

Windows NT Security Systems

The starting point for strong Internet security is the operating system of any machine connected to it. Fortunately for the organizations using IIS 4.0, strong levels of security were built into the core of Windows NT in order to meet and exceed certifiable security standards, i.e. the C2 security guidelines required by the U.S. Department of Defense’s evaluation criteria. Windows NT security contrasts sharply with the thin and weak security layers that are bolted on to the top of some other operating systems.

Compliance with the C2 security standard was originally only required for government organizations. However, many commercial organizations are demanding the same level of security, and they recognize the value that such standards offer. The main requirements for C2 compliance are:

  • User identification and authentication. Before gaining access to the systems, a user must prove their identity. This is typically done by providing a user-id / password combination, for example by entering the details via a keyboard or by the presentation of a device such as a smart card which stores such information.
  • Discretionary access control. Each object within the system, for example files, printers and processes, must have an owner—who can grant or restrict access to the resources at various degrees of granularity.
  • Auditing Capabilities. The system must provide the ability to log all user actions and object access, and include enough information to identify the user that performed any operation. Such information must only be accessible by system administrators.
  • Safe Object reuse. The system must guarantee that any discarded or deleted object cannot be accessed, either accidentally or deliberately, by other entities.
  • System integrity. The system must protect resources belonging to one entity, from being interfered with by another entity.

The C2 guidelines are applicable to standalone systems, and are specified in the document Trusted Computer System Evaluation Criteria (TCSEC). Fortunately, to make life simpler, this is often referred to as the Orange Book, thanks to the color of its cover. Other specifications that expand on the Orange Book include the Red Book for networking, and the Blue Book for subsystems.

Obtaining C2 certification is a long and complex task, and Microsoft are pushing hard for complete certification. Windows NT has passed the Orange Book certification process (for a standalone PC, not connected to a network) and is on the DOD’s official list of evaluated products. At the time of writing, Windows NT 4.0 is undergoing Red and Blue book evaluations.

Read More…Windows NT Security Systems

Windows 8 Consumer Preview ISO formats February 29, 2012

Posted by John Ruby in *New Products, Beta, Downloads Links, Microsoft, Software, Uncategorized, Windows 8.
Tags: , , , , , , , , , , , , , , , , , , , ,
add a comment

 

Windows 8 Consumer Preview ISO formats

Windows home

Windows 8 Consumer Preview ISO images

420965_10150603174698721_20528438720_9242330_625369686_n[1]

Windows 8 Consumer Preview ISO files (.iso) are provided as an alternative to using Windows 8 Consumer Preview Setup. If you are on a PC running Windows and want to install the consumer preview on another partition, another PC, or a virtual machine, we recommend you download Windows 8 Consumer Preview Setup and use the built-in tools for converting an ISO image into installation media, such as a DVD or USB bootable flash drive. You can find additional information, including a list of supported upgrades, in the FAQ.

Note before you download: Windows 8 Consumer Preview is prerelease software that may be substantially modified before it’s commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. Some product features and functionality may require additional hardware or software. If you decide to go back to your previous operating system, you’ll need to reinstall it from the recovery or installation media that came with your PC.



ISO images

An ISO image must be converted into installation media stored on a DVD or a USB flash drive. Instructions are provided on this page. Developer tools are available for download from Windows Dev Center.

English
64-bit (x64) Download (3.3 GB) Sha 1 hash — 1288519C5035BCAC83CBFA23A33038CCF5522749
32-bit (x86) Download (2.5 GB) Sha 1 hash — E91ED665B01A46F4344C36D9D88C8BF78E9A1B39
Product Key: DNJXJ-7XBW8-2378T-X22TX-BKG7J