This document provides an overview of the Win32/Zbot family of password-stealing trojans.
Category: Microsoft Download
Microsoft Download Center RSS Feed
Immunity, Inc. White Paper – A Bounds Check on the Microsoft Exploitability Index
A third-party evaluation on Microsoft’s Exploitability Index
Rethinking the Cyber Threat
Rethinking the Cyber Threat – A Framework and Path Forward
Computer Security One Pager
Computer Security One Pager
The Microsoft Office Visualization Tool (OffVis) Fact Sheet
The Microsoft Office Visualization Tool (OffVis) Fact Sheet
Cloud Computing Security Considerations
This paper provides a high-level discussion of the fundamental challenges and benefits of cloud computing security, and raises some of the questions that cloud service providers and organisations using cloud services need to consider when evaluating a …
Secure Software Development Trends in the Oil & Gas Sectors
How the Microsoft Security Development Lifecycle helps protect critical industries
Identity Management: Manage the identity lifecycle
July 2013
There are a number of solutions and strategies for managing identity in your organization, and it’s essential that you have the right controls in place.
Software Leadership: Manage by leading
July 2013Is it possible to be a good manager, yet a bad leader? Those two skills are not necessarily one and the same.
Virtualization: Software migration
July 2013You have many options when it comes to migrating applications for a data center, from clean installs to hosting and virtualization.
SharePoint 2010: Customize SharePoint content
July 2013SharePoint includes a handful of tools for customizing site content you can use to ensure consistency to corporate standards.
Microsoft Exchange Server 2010: Solo setup
July 2013You can configure Microsoft Exchange 2010 for unattended setup, if you need to take that approach in your environment.
Cloud Computing: Cloud vulnerabilities
July 2013The manner in which you architect your cloud computing infrastructure can have a direct impact on its resistance to failure.
IT Management: Virtual team leadership
July 2013Communication strategies and discipline are required to effectively leading virtual teams in this highly connected world.
Windows Confidential: The story of the $700 pagers
July 2013The behind the scenes drama of the daily build was a curious step in the evolution of smartphones.
Editor’s Note: Living in the virtual world
July 2013Nearly every aspect of the modern infrastructure can be run virtually, from desktops and apps to servers and staff.
Windows and Windows Server compatibility cookbook: Windows 8, Windows 8.1, and Windows Server 2012
This paper provides info about new features of the Windows 8, Windows 8.1, and Windows Server® 2012 operating systems. It provides guidelines for developers to verify the compatibility of their existing and planned apps with the new operating systems. It assumes that the reader is familiar with previous versions of Windows.
Microsoft Software License Terms: Microsoft Dynamics AX 2012 R2 for Windows 8 Approvals, Expenses, and Timesheets
These license terms are an agreement between Microsoft Corporation and you. They apply to the software named above, which includes the media on which you received it, if any.
Third Party Notices for Microsoft Dynamics AX 2012 R2 for Windows 8 Approvals, Expenses, and Timesheets
These notices are provided for informational purposes only and are not the license terms under which Microsoft distributes these Third Party Materials.
Windows Logo Kit 1.6
The Windows Logo Kit (WLK) contains everything needed to certify devices for Windows Server 2003 and Windows Server 2008 — Driver Test Manager (DTM), the required tests, and the documentation to help set up DTM and execute the tests.