Microsoft has announced the approach it will take to salvage Windows 8. Previously known by the code name “Blue,” Windows 8.1 will be free for current Windows 8 users. Windows 8.1 will not be a simple service pack. It will … Continue Reading
Mike Danseglio has worked in the IT field for more than 20 years. He is an award-winning author, public speaker, and instructor on a variety of technology topics including security, virtualization, cloud computing, wireless and wired networking, and IT lifecycle processes.
His security work has included protecting militaries, government agencies, and private industry around the world. Mike has developed and taught extensive security training on topics including cryptography, security technology, and attacks and countermeasures.
Mike has published several books and numerous papers on computer security including Microsoft's own product security guides. He holds numerous certifications and credentials in technical instruction, security expertise, and across several IT specializations.
Mike Danseglio performed computer security hardening for NATO, wrote many Microsoft product security guides and managed Microsoft’s Xbox LIVE Operations.
Danseglio trains IT professionals to protect their companies’ infrastructure, database systems, websites and customer accounts from threats such as hacking, viruses and corrupted processes.
“I help people understand attacks across all these approaches,” Danseglio says. “I understand how relentless and creative hackers are, and I’ve translated that knowledge into training that’s directly applicable for the IT pro.”
Danseglio has written National Security Agency (NSA) security recommendations and has written and presented on topics such as Active Directory Recovery and Availability in the enterprise, using SSL and Trust Marks and simplifying Compliance.
Mike is a Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH) and Langevin Master Trainer. He has developed and taught security training programs in Cryptography, Security Technology and Attacks and Countermeasures.
Locking Down Microsoft Exchange 2010 Control Panel (ECP) Options - http://t.co/P5YOlHogIf #Exchange2010
Getting Data in and out of #ASP.NET Applications using #AJAX and #jQuery (Part 2) using #WCF - http://t.co/mWHulAcQuY
What do you do when Word 2010 is not saving back to #SharePoint 2010 by default - http://t.co/X6Ejt3i1nI
Is a #Windows 8 upgrade in your future? Get hands-on experience with #Win8. Learn to install, upgrade & configure - http://t.co/et6EPJMjZg
Debugging #SkyDrive for #Windows 8 - http://t.co/K8IDg1WTqb - #Win8
Generating Random Numbers for Cryptography with Lava Lamps? Yes, this is a serious article. Cryptography often requires random numbers. From seed values to cryptographic key material to data obfuscation values to actual keys, random numbers are incredibly important. If there’s … Continue Reading
Have you ever had bogus name resolution data in your DNS cache? This happens when you’re pointed to a DNS server with outdated records, or perhaps a misconfigured server. You might see symptoms like all fully-qualified domain names (FQDNs) resolving … Continue Reading