David Overton's Blog and Discussion Site
This site is my way to share my views and general business and IT information with you about Microsoft, IT solutions for ISVs, technologists and businesses, large and small. I specialise in Windows Intune and SBS 2008.
This blog is purely the personal opinions of David Overton. If you can't find the information you were looking for e-mail me at admin@davidoverton.com.

To find out more about my Windows Intune BOOK - Microsoft Windows Intune 2.0: Quickstart Administration click here

To find out more about my SBS 2008 BOOK - Small Business Server 2008, Installation, Migration and Configuration click here

New blog "hackers @ microsoft"
David Overton's Blog

Buy my books

Windows Intune:Quickstart Administration


This is the RAW book (Read as Written).
Click here for more information
Buy or pre-order today

SBS 2008 - Installation, Migration and Configuration

Small Business Server 2008 – Installation, Migration, and Configuration

Buy today in book or e-book form

Request a Review Copy

Twitter

Syndication

A new blog has opened at Microsoft called "hackers @ microsoft".  As many people know Microsoft is very strongly involved in the security arena.  Part of this is having people who have hacked or now hack against our products to understand how to make them more secure.  This group of people know have a voice in the blogsphere.

Welcome to a new blog from Microsoft.  The focus of this blog is likely to be a little different from most other blogs you'll see on blogs.msdn.com.  Microsoft employs some of the best hackers in the world and actively recruits them and develops them.  They work on all kinds of projects, whether it be in development, research, testing, management and of course security.  Of course, there is controversy even in the word "hacker" but I don't think that should stop us from using it in the manner I think is the most appropriate.  At his or her core, a true hacker is someone who is curious and wants to learn how systems work.  This can and of course at Microsoft is done in an ethical, legal manner.  We employ "white hat hackers" who spend their time pentesting and code reviewing applications and software looking for weaknesses and vulnerabilities so that others don't once we've released that code into the wild.  We employ many many smart testers who know more about some of our software then perhaps the architects who designed it.  We also employ some of the top researchers in their industry, dedicated people working on the bleeding edge of whats going to be common place in the next 5 or 10 years of computing.  So yes, Microsoft does have hackers, and its time to introduce you to some of them and show you what it is, exactly that they do.

Generally most of the content you'll read and people you'll meet on this blog will be somehow related to security but not all by any stretch. 

-techjunkie

hackers @ microsoft

 

ttfn

David

Technorati Tags: , , ,


Posted Thu, Aug 30 2007 12:16 AM by David Overton

Add a Comment

(optional)  
(optional)
(required)  
Remember Me?

(c)David Overton 2006-13