12 minutes read

The Anatomy of a Security Breach

Without going into too much detail, there is a guy who the security industry collectively hates.  When you hear a statement like that, the happy parts of our brains think…..

4 minutes read

Kerberos: Very Claims-y

I’ve always found Kerberos to be an interesting protocol.  It works by way of a trusted third party which issues secured tickets based on an authentication or previous session.   These…..

0 minutes Less than a minute read

WinFS

WinFS has been puttering around my idle thoughts lately.  Yep, weird. Why is it still available on MSDN and TechNet subscriptions? Food for thought.

8 minutes read

Bad User Interfaces are Insecure

The Best of Intentions So you’ve built this application.  It’s a brilliant application.  It’s design is spectacular, the architecture is flawless, the coding is clean and coherent, and you even…..

2 minutes read

A Thought on Windows Mobile 7

The other day while I was sitting in the airport in Washington, D.C., I had a random thought.  When the ZuneHD first hit the shelves people were talking about how…..

0 minutes Less than a minute read

Pictures from Techdays and FailCamp in Toronto

After getting my camera back from Mitch Garvis after Techdays and FailCamp in Toronto, I decided to upload photos from the events, and to my surprise there were some pretty…..

3 minutes read

The Boston Tea Party has gone Batty

This morning I saw an interesting post on Twitter.  Which in-and-of-itself is kinda amazing, but that’s not the point.  The post was on something called the Windows 7 Sins site. …..