{"id":217,"date":"2008-01-09T09:27:46","date_gmt":"2008-01-09T09:27:46","guid":{"rendered":"http:\/\/parkesy.wordpress.com\/2008\/01\/09\/security-vulnerability-research-defense\/"},"modified":"2008-01-09T09:27:46","modified_gmt":"2008-01-09T09:27:46","slug":"security-vulnerability-research-defense","status":"publish","type":"post","link":"https:\/\/andyparkes.co.uk\/blog\/index.php\/2008\/01\/09\/security-vulnerability-research-defense\/","title":{"rendered":"Security Vulnerability Research &#38; Defense"},"content":{"rendered":"<p>When it comes to computer security most people are happy to ensure automatic updates is turned or WSUS is configured<\/p>\n<p>Some of us go a <a target=\"_blank\" href=\"http:\/\/msmvps.com\/blogs\/bradley\/archive\/2008\/01\/09\/so-what-patching-resources-did-you-read-today.aspx\" title=\"SBS Diva\" class=\"broken_link\">little further than that<\/a>\u00a0and make sure we&#8217;re 100% up-to-date on the latest patches and issues. If Susan&#8217;s blog inspires ONE person to rethink their attitude to patching it&#8217;s a step in the right direction<\/p>\n<p>\u00a0Anyway, last night there were a whole load of security updates on the Microsoft download website.<\/p>\n<p>If you subscribe to the\u00a0<a target=\"_blank\" href=\"http:\/\/blogs.technet.com\/msrc\/default.aspx\">The Microsoft Security Response Center (MSRC)<\/a>\u00a0blog you&#8217;ll already have had advance warning of this. As i was reading  through the January release details they mentioned a blog i hadn&#8217;t seen before. It&#8217;s quite new and is called the <a href=\"http:\/\/blogs.technet.com\/swi\/default.aspx\" id=\"bp___ctl00___bth___BlogTitle\" class=\"headermaintitle\">Security Vulnerability Research &amp; Defense<\/a>\u00a0blog<\/p>\n<p>The blog goes into detail about the information Microsoft discover when researching vulnerabilities. Ensuring your getting updates from the security response center is probably enough, but if\u00a0the geek in you\u00a0wants to know more about\u00a0HOW software gets compromised take a look.<\/p>\n<p>I find the subject fascinating, even if a lot of it does goes straight over my head!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>When it comes to computer security most people are happy to ensure automatic updates is turned or WSUS is configured Some of us go a little further than that\u00a0and make sure we&#8217;re 100% up-to-date on the latest patches and issues. If Susan&#8217;s blog inspires ONE person to rethink their attitude to patching it&#8217;s a step<\/p>\n<p><a class=\"readmore\" href=\"https:\/\/andyparkes.co.uk\/blog\/index.php\/2008\/01\/09\/security-vulnerability-research-defense\/\"><span class=\"arrow-right icon\"><\/span>Read More<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[44],"tags":[],"class_list":["post-217","post","type-post","status-publish","format-standard","hentry","category-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.11 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Security Vulnerability Research &#038; Defense - Andy&#039;s Techie Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/andyparkes.co.uk\/blog\/index.php\/2008\/01\/09\/security-vulnerability-research-defense\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Vulnerability Research &#038; Defense - Andy&#039;s Techie Blog\" \/>\n<meta property=\"og:description\" content=\"When it comes to computer security most people are happy to ensure automatic updates is turned or WSUS is configured Some of us go a little further than that\u00a0and make sure we&#8217;re 100% up-to-date on the latest patches and issues. If Susan&#8217;s blog inspires ONE person to rethink their attitude to patching it&#8217;s a stepRead More\" \/>\n<meta property=\"og:url\" content=\"https:\/\/andyparkes.co.uk\/blog\/index.php\/2008\/01\/09\/security-vulnerability-research-defense\/\" \/>\n<meta property=\"og:site_name\" content=\"Andy&#039;s Techie Blog\" \/>\n<meta property=\"article:published_time\" content=\"2008-01-09T09:27:46+00:00\" \/>\n<meta name=\"author\" content=\"Andy Parkes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Andy Parkes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/andyparkes.co.uk\/blog\/index.php\/2008\/01\/09\/security-vulnerability-research-defense\/\",\"url\":\"https:\/\/andyparkes.co.uk\/blog\/index.php\/2008\/01\/09\/security-vulnerability-research-defense\/\",\"name\":\"Security Vulnerability Research &#38; Defense - Andy&#039;s Techie Blog\",\"isPartOf\":{\"@id\":\"https:\/\/andyparkes.co.uk\/blog\/#website\"},\"datePublished\":\"2008-01-09T09:27:46+00:00\",\"dateModified\":\"2008-01-09T09:27:46+00:00\",\"author\":{\"@id\":\"https:\/\/andyparkes.co.uk\/blog\/#\/schema\/person\/3534e8ac6b1bec765cd061feff56679d\"},\"breadcrumb\":{\"@id\":\"https:\/\/andyparkes.co.uk\/blog\/index.php\/2008\/01\/09\/security-vulnerability-research-defense\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/andyparkes.co.uk\/blog\/index.php\/2008\/01\/09\/security-vulnerability-research-defense\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/andyparkes.co.uk\/blog\/index.php\/2008\/01\/09\/security-vulnerability-research-defense\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/andyparkes.co.uk\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security Vulnerability Research &#38; Defense\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/andyparkes.co.uk\/blog\/#website\",\"url\":\"https:\/\/andyparkes.co.uk\/blog\/\",\"name\":\"Andy&#039;s Techie Blog\",\"description\":\"Professional Geek\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/andyparkes.co.uk\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/andyparkes.co.uk\/blog\/#\/schema\/person\/3534e8ac6b1bec765cd061feff56679d\",\"name\":\"Andy Parkes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/andyparkes.co.uk\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3824cbf53df51d7ca5cf809b6ad81a157fbfff2292e36ab8666f04ddad06bfcc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3824cbf53df51d7ca5cf809b6ad81a157fbfff2292e36ab8666f04ddad06bfcc?s=96&d=mm&r=g\",\"caption\":\"Andy Parkes\"},\"description\":\"Andy Parkes is Technical Director at Coventry based IT support company IBIT Solutions. Formerly, coordinator of AMITPRO and Microsoft Partner Area Lead for 2012-2013. He also isn't a fan of describing himself in the third person.\",\"sameAs\":[\"http:\/\/www.andyparkes.co.uk\/blog\"],\"url\":\"https:\/\/andyparkes.co.uk\/blog\/index.php\/author\/andyparkes\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security Vulnerability Research &#38; Defense - Andy&#039;s Techie Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/andyparkes.co.uk\/blog\/index.php\/2008\/01\/09\/security-vulnerability-research-defense\/","og_locale":"en_US","og_type":"article","og_title":"Security Vulnerability Research &#38; Defense - Andy&#039;s Techie Blog","og_description":"When it comes to computer security most people are happy to ensure automatic updates is turned or WSUS is configured Some of us go a little further than that\u00a0and make sure we&#8217;re 100% up-to-date on the latest patches and issues. If Susan&#8217;s blog inspires ONE person to rethink their attitude to patching it&#8217;s a stepRead More","og_url":"https:\/\/andyparkes.co.uk\/blog\/index.php\/2008\/01\/09\/security-vulnerability-research-defense\/","og_site_name":"Andy&#039;s Techie Blog","article_published_time":"2008-01-09T09:27:46+00:00","author":"Andy Parkes","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Andy Parkes","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/andyparkes.co.uk\/blog\/index.php\/2008\/01\/09\/security-vulnerability-research-defense\/","url":"https:\/\/andyparkes.co.uk\/blog\/index.php\/2008\/01\/09\/security-vulnerability-research-defense\/","name":"Security Vulnerability Research &#38; Defense - Andy&#039;s Techie Blog","isPartOf":{"@id":"https:\/\/andyparkes.co.uk\/blog\/#website"},"datePublished":"2008-01-09T09:27:46+00:00","dateModified":"2008-01-09T09:27:46+00:00","author":{"@id":"https:\/\/andyparkes.co.uk\/blog\/#\/schema\/person\/3534e8ac6b1bec765cd061feff56679d"},"breadcrumb":{"@id":"https:\/\/andyparkes.co.uk\/blog\/index.php\/2008\/01\/09\/security-vulnerability-research-defense\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/andyparkes.co.uk\/blog\/index.php\/2008\/01\/09\/security-vulnerability-research-defense\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/andyparkes.co.uk\/blog\/index.php\/2008\/01\/09\/security-vulnerability-research-defense\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/andyparkes.co.uk\/blog\/"},{"@type":"ListItem","position":2,"name":"Security Vulnerability Research &#38; Defense"}]},{"@type":"WebSite","@id":"https:\/\/andyparkes.co.uk\/blog\/#website","url":"https:\/\/andyparkes.co.uk\/blog\/","name":"Andy&#039;s Techie Blog","description":"Professional Geek","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/andyparkes.co.uk\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/andyparkes.co.uk\/blog\/#\/schema\/person\/3534e8ac6b1bec765cd061feff56679d","name":"Andy Parkes","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/andyparkes.co.uk\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3824cbf53df51d7ca5cf809b6ad81a157fbfff2292e36ab8666f04ddad06bfcc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3824cbf53df51d7ca5cf809b6ad81a157fbfff2292e36ab8666f04ddad06bfcc?s=96&d=mm&r=g","caption":"Andy Parkes"},"description":"Andy Parkes is Technical Director at Coventry based IT support company IBIT Solutions. Formerly, coordinator of AMITPRO and Microsoft Partner Area Lead for 2012-2013. He also isn't a fan of describing himself in the third person.","sameAs":["http:\/\/www.andyparkes.co.uk\/blog"],"url":"https:\/\/andyparkes.co.uk\/blog\/index.php\/author\/andyparkes\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pmvJ6-3v","jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/andyparkes.co.uk\/blog\/index.php\/wp-json\/wp\/v2\/posts\/217","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/andyparkes.co.uk\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/andyparkes.co.uk\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/andyparkes.co.uk\/blog\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/andyparkes.co.uk\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=217"}],"version-history":[{"count":0,"href":"https:\/\/andyparkes.co.uk\/blog\/index.php\/wp-json\/wp\/v2\/posts\/217\/revisions"}],"wp:attachment":[{"href":"https:\/\/andyparkes.co.uk\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=217"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/andyparkes.co.uk\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=217"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/andyparkes.co.uk\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=217"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}