Already a member? Log in

Sign up with your...

or

Sign Up with your email address

Add Tags

Duplicate Tags

Rename Tags

Share It With Others!

Save Link

Sign in

Sign Up with your email address

Sign up

By clicking the button, you agree to the Terms & Conditions.

Forgot Password?

Please enter your username below and press the send button.
A password reset link will be sent to you.

If you are unable to access the email address originally associated with your Delicious account, we recommend creating a new account.

ADVERTISEMENT

Links 1 through 10 of 76 by Justin Mason tagged microsoft

Share It With Others!

Thunderbird's calendar can now integrate properly with MS Exchange 2007 and above via OWA.  (via adulau)

Share It With Others!

"in e-mail from Microsoft employees, you may find a stray J [...] The J started out its life as a smiley-face. The WingDings font puts a smiley face where the letter J goes. [...] As the message travels from machine to machine, the font formatting may get lost or mangled, resulting in the letter J appearing when a smiley face was intended." aha! mystery solved. Amazon is full of mysterious "J"s in emails, and now I know why

Share It With Others!

MS internal politics routinely torpedoed cool new projects. surprise, surprise. 'Engineers in the Windows group falsely claimed [ClearType] made the display go haywire when certain colors were used. The head of Office products said it was fuzzy and gave him headaches. The VP for pocket devices was blunter: he’d support ClearType and use it, but only if I transferred the program and the programmers to his control.'

Share It With Others!

'[Joe] Stewart said the sophistication and stealth of this malware strain has become so bad that it's time for Windows users to start thinking of doing their banking and other sensitive transactions on a dedicated system that is not used for everyday Web surfing.' it's that bad

Share It With Others!

awesome, if terrifying research from Shishir Nagaraja and Ross Anderson on Chinese cyber-surveillance of the Tibetan movement. 'we described how agents of the Chinese government compromised the computing infrastructure of the Office of His Holiness the Dalai Lama. They used social phishing to install rootkits on a number of machines and then downloaded sensitive data. People in Tibet may have died as a result.'

Share It With Others!

interview with MS UK's Head Of Mobile attempting, and failing, to justify their DRM policy. Q: 'If I buy these songs on your service - and they're locked to my phone - what happens when I upgrade my phone in six months' time?' A: 'Well, I think you know the answer to that.'

Share It With Others!

0.6% of malware files reported to MS, ~135000 files, had valid PKI code signatures

Share It With Others!

6 VMs running different versions of Windows, in order to ensure CPAN modules run OK on 'doze. this is awesome, and UNIX vendors should be doing the same

Share It With Others!

about time! This has been necessary for ages. It will, of course, eat McAfee/Symantec/et al's lunch on a huge scale; I guess that was probably the issue

Share It With Others!

ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT