<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Patrick Hynds - Blog</title>
    <link>http://localhost:3000</link>
    <description>Technology executive and thought leader with expertise in scaling businesses, building high-performing teams, and driving innovation in the tech industry.</description>
    <language>en-us</language>
    <lastBuildDate>Fri, 06 Mar 2026 20:23:04 GMT</lastBuildDate>
    <atom:link href="http://localhost:3000/rss.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Browser Competition 2.0?</title>
      <link>http://localhost:3000/blog/browser-competition-2-0</link>
      <guid isPermaLink="true">http://localhost:3000/blog/browser-competition-2-0</guid>
      <description>With the recent announcement from Microsoft that they will adopt Chromium for future development of their Edge browser, I think things are going to get interesting and not in the usual bad way that usually means. Here is a link to the post by Joe Belfiore for reference. In decades past we have seen...</description>
      <pubDate>Fri, 07 Dec 2018 16:16:30 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>development</category>
      <category>events</category>
      <category>open-source</category>
      <category>browser</category>
      <category>microsoft</category>
      <category>chromium</category>
      <category>edge</category>
    </item>
    <item>
      <title>Becoming Homo Adaptus</title>
      <link>http://localhost:3000/blog/becoming-homo-adaptus</link>
      <guid isPermaLink="true">http://localhost:3000/blog/becoming-homo-adaptus</guid>
      <description>It has become apparent to me that the world has reached an inflection point.&amp;nbsp;It used to be that when you were in school you had to figure out what you wanted to be when you grow up and work very hard to acquire skills that would determine your success in that chosen profession. I have often...</description>
      <pubDate>Sat, 14 Apr 2018 00:50:42 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>entrepreneurism</category>
      <category>time-management</category>
      <category>career</category>
      <category>world</category>
      <category>adaptus</category>
      <category>homo</category>
      <category>inflection</category>
    </item>
    <item>
      <title>Time Management, Multi-Tasking and Recent Studies</title>
      <link>http://localhost:3000/blog/time-management-multi-tasking-and-recent-studies</link>
      <guid isPermaLink="true">http://localhost:3000/blog/time-management-multi-tasking-and-recent-studies</guid>
      <description>If you are like me, you have been in a constant struggle&amp;nbsp;that finds you&amp;nbsp;striving to get more done in less time.&amp;nbsp; Eventually you get to the point that you have to let things go from your to do list (que Frozen soundtrack here).&amp;nbsp; To top it off there has been a recent backlash...</description>
      <pubDate>Sun, 28 Dec 2014 17:06:21 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>time-management</category>
      <category>less</category>
      <category>productivity</category>
      <category>tablet</category>
      <category>multi</category>
      <category>tasking</category>
      <category>studies</category>
    </item>
    <item>
      <title>Windows Permissions and Ownership for Admins</title>
      <link>http://localhost:3000/blog/windows-permissions-and-ownership-for-admins</link>
      <guid isPermaLink="true">http://localhost:3000/blog/windows-permissions-and-ownership-for-admins</guid>
      <description>A conversation that comes up often concerns what rights a Windows Administrator (domain or local) has to folders and files. The common assumption is that being an Administrator is the backstage pass, but while it is somewhat true, the details are a bit more complex. Windows did not get to survive...</description>
      <pubDate>Sun, 20 Apr 2014 19:43:37 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>network</category>
      <category>security</category>
      <category>windows</category>
      <category>ownership</category>
      <category>administrator</category>
      <category>permissions</category>
      <category>rights</category>
    </item>
    <item>
      <title>Open Mind = Infinite Potential</title>
      <link>http://localhost:3000/blog/open-mind-infinite-potential</link>
      <guid isPermaLink="true">http://localhost:3000/blog/open-mind-infinite-potential</guid>
      <description>As I have been running various organizations I have detected a key trend that I think delivers a critical insight. I find that people who are open to have their perspective changed are able to adapt to our changing technology world much better than those that are not open to changing their mind....</description>
      <pubDate>Fri, 07 Feb 2014 19:46:13 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>management</category>
      <category>personal</category>
      <category>software-dev</category>
      <category>cloud</category>
      <category>their</category>
      <category>changing</category>
      <category>open</category>
    </item>
    <item>
      <title>Thoughts on Voting</title>
      <link>http://localhost:3000/blog/thoughts-on-voting</link>
      <guid isPermaLink="true">http://localhost:3000/blog/thoughts-on-voting</guid>
      <description>As the Presidential elections draw closer here in the US, I have been having conversations with a number of people who do not vote and in many cases have no intention of voting. I found this attitude baffling at first, but have grown to understand that it comes from a lack of understanding of the...</description>
      <pubDate>Tue, 04 Sep 2012 19:46:45 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>personal</category>
      <category>voting</category>
      <category>attitude</category>
      <category>presidential</category>
      <category>elections</category>
      <category>closer</category>
      <category>conversations</category>
    </item>
    <item>
      <title>TechED BOF Session</title>
      <link>http://localhost:3000/blog/teched-bof-session</link>
      <guid isPermaLink="true">http://localhost:3000/blog/teched-bof-session</guid>
      <description>The details of my session at TechEd in Orlando are posted&amp;nbsp; here . Hope to see you there!</description>
      <pubDate>Sat, 05 May 2012 19:47:43 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>events</category>
      <category>speaking</category>
      <category>teched</category>
      <category>session</category>
      <category>orlando</category>
      <category>posted</category>
    </item>
    <item>
      <title>Boston Code Camp Coming Up!</title>
      <link>http://localhost:3000/blog/boston-code-camp-coming-up</link>
      <guid isPermaLink="true">http://localhost:3000/blog/boston-code-camp-coming-up</guid>
      <description>There is still time to sign up for the upcoming Boston Code Camp! Go to here for details. Hope to see you there!</description>
      <pubDate>Tue, 18 Oct 2011 19:49:44 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>events</category>
      <category>boston</category>
      <category>code</category>
      <category>camp</category>
      <category>upcoming</category>
    </item>
    <item>
      <title>User Security</title>
      <link>http://localhost:3000/blog/user-security</link>
      <guid isPermaLink="true">http://localhost:3000/blog/user-security</guid>
      <description>A friend of mine forwarded me a link to a provocative paper by Microsoft Research that called into question whether the security advice provided to users for their online activities is useful based on a risk-reward calculation. The link and the PDF document can be found here . At first glance I...</description>
      <pubDate>Tue, 12 Jul 2011 20:24:02 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>security</category>
      <category>user-group</category>
      <category>best-practice</category>
      <category>microsoft</category>
      <category>browser</category>
      <category>course</category>
      <category>hacker</category>
    </item>
    <item>
      <title>SD Times Here I Come!</title>
      <link>http://localhost:3000/blog/sd-times-here-i-come</link>
      <guid isPermaLink="true">http://localhost:3000/blog/sd-times-here-i-come</guid>
      <description>I am happy to announce that very soon I will be providing a monthly article in the SD Times on Microsoft Technology. With this regular writing task to spur me on I expect (and hope) to be doing alot more blogging as well…</description>
      <pubDate>Tue, 24 May 2011 01:23:44 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>development</category>
      <category>microsoft</category>
      <category>happy</category>
      <category>announce</category>
      <category>providing</category>
      <category>monthly</category>
      <category>technology</category>
    </item>
    <item>
      <title>Disciplined Entrepreneurism</title>
      <link>http://localhost:3000/blog/disciplined-entrepreneurism</link>
      <guid isPermaLink="true">http://localhost:3000/blog/disciplined-entrepreneurism</guid>
      <description>Recently I have had two of my most senior employees come to me seperately and suggest new products for the company to build. I encourage this of course, but find I have to help them understand some things about what I call Disciplined Entrepreneurism. Ultimately when you decide to build a product...</description>
      <pubDate>Sun, 27 Feb 2011 20:36:29 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>entrepreneurism</category>
      <category>software-dev</category>
      <category>wp7</category>
      <category>course</category>
      <category>facebook</category>
      <category>iphone</category>
      <category>windows</category>
    </item>
    <item>
      <title>Juggling Tasks</title>
      <link>http://localhost:3000/blog/juggling-tasks</link>
      <guid isPermaLink="true">http://localhost:3000/blog/juggling-tasks</guid>
      <description>While I resisted Twitter for a long time, not too long ago I started following selected individuals on Twitter including Richard Campbell (richcampbell on twitter). I plan to start using Twitter myself hopefully to communicate things of value, but for now I am using it as a comsumer. This morning...</description>
      <pubDate>Sun, 20 Feb 2011 19:12:50 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>management</category>
      <category>security</category>
      <category>twitter</category>
      <category>juggling</category>
      <category>richard</category>
      <category>tasks</category>
      <category>resisted</category>
    </item>
    <item>
      <title>IBM Cloud Data Center in China = Epic Blunder</title>
      <link>http://localhost:3000/blog/ibm-cloud-data-center-in-china-epic-blunder</link>
      <guid isPermaLink="true">http://localhost:3000/blog/ibm-cloud-data-center-in-china-epic-blunder</guid>
      <description>IBM has decided to build the mother of all Cloud Computing data centers in of all places, China. I will advise all that will listen that this is a fantastic blunder since China is the absolute worst choice for such a resource. I do not want any of my corporate code and data or the data from...</description>
      <pubDate>Fri, 18 Feb 2011 03:00:04 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>cloud</category>
      <category>ibm</category>
      <category>microsoft</category>
      <category>azure</category>
      <category>amazon</category>
      <category>security</category>
      <category>china</category>
    </item>
    <item>
      <title>Look at Azure Now / Again</title>
      <link>http://localhost:3000/blog/look-at-azure-now-again</link>
      <guid isPermaLink="true">http://localhost:3000/blog/look-at-azure-now-again</guid>
      <description>If you looked into playing with Azure in the past, but did not jump in then it is time to take another look. Microsoft has added options over the last year that really remove objections to trying it out. If you have an MSDN subscription then you pretty much get a free playground in Azure that is...</description>
      <pubDate>Tue, 15 Feb 2011 16:46:09 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>development</category>
      <category>software-dev</category>
      <category>web-hosting</category>
      <category>azure</category>
      <category>microsoft</category>
      <category>windows</category>
      <category>playing</category>
    </item>
    <item>
      <title>To Egypt and All My Friends There</title>
      <link>http://localhost:3000/blog/to-egypt-and-all-my-friends-there</link>
      <guid isPermaLink="true">http://localhost:3000/blog/to-egypt-and-all-my-friends-there</guid>
      <description>I have talked to many of you over the course of the past week and have been cautious due to the fact that I was concerned for your safety. A failed rebellion is a painful thing especially when it is not known who will lead the aftermath. Now that I see the resolve in my friends there I know that...</description>
      <pubDate>Fri, 28 Jan 2011 16:09:35 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>personal</category>
      <category>course</category>
      <category>friends</category>
      <category>rebellion</category>
      <category>egypt</category>
      <category>talked</category>
      <category>cautious</category>
    </item>
    <item>
      <title>Good Advice – Setup Edition</title>
      <link>http://localhost:3000/blog/good-advice-setup-edition</link>
      <guid isPermaLink="true">http://localhost:3000/blog/good-advice-setup-edition</guid>
      <description>My friend and collegue Adam Cogan is a big proponent of documenting best practices. In fact his company, SSW puts all kinds of lists of these best practices up on their website. Recently Adam chimed in on a list we are both on with a link to the best practices (Rules) around setup and I realized...</description>
      <pubDate>Thu, 30 Dec 2010 15:09:52 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>software-dev</category>
      <category>best-practice</category>
      <category>sql</category>
      <category>practices</category>
      <category>setup</category>
      <category>advice</category>
      <category>edition</category>
    </item>
    <item>
      <title>SQL Myths – Must Read</title>
      <link>http://localhost:3000/blog/sql-myths-must-read</link>
      <guid isPermaLink="true">http://localhost:3000/blog/sql-myths-must-read</guid>
      <description>Paul Randall has a compiled document with all his blog posts on SQL Myths that I think is a must read if you consider SQL Server part of your core competence. It is probably not very interesting to pure devs, but I would still suggest you take a scan of this so you can avoid making assumptions that...</description>
      <pubDate>Tue, 21 Dec 2010 04:13:08 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>network</category>
      <category>software-dev</category>
      <category>sql-server</category>
      <category>myths</category>
      <category>randall</category>
      <category>compiled</category>
      <category>document</category>
    </item>
    <item>
      <title>Crisis Management</title>
      <link>http://localhost:3000/blog/crisis-management</link>
      <guid isPermaLink="true">http://localhost:3000/blog/crisis-management</guid>
      <description>We have a saying in the various companies with which I associate and it is “Any fool can manage success, but it takes talent to manage a crisis”. The leader, project manager, team leader, or whatever you call the person in charge has to not be wishful. This sounds easy, but in my experience it is...</description>
      <pubDate>Fri, 17 Dec 2010 22:15:08 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>management</category>
      <category>software-dev</category>
      <category>team-lead</category>
      <category>deployment</category>
      <category>leader</category>
      <category>crisis</category>
      <category>wishful</category>
    </item>
    <item>
      <title>New Security Podcast Coming Soon</title>
      <link>http://localhost:3000/blog/new-security-podcast-coming-soon</link>
      <guid isPermaLink="true">http://localhost:3000/blog/new-security-podcast-coming-soon</guid>
      <description>Michele Bustamante and I have started recording the first episodes of our new security focused podcast LockDown. While the website is up, it has place holder content describing Carl Franklin of .Net Rocks fame as our first guest (that was the original plan). However as usual Carl was flying around...</description>
      <pubDate>Thu, 16 Dec 2010 17:37:11 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>development</category>
      <category>lockdown-podcast</category>
      <category>security</category>
      <category>speaking</category>
      <category>dotnet</category>
      <category>soon</category>
      <category>michele</category>
    </item>
    <item>
      <title>Windows Identity Framework Training Kit available</title>
      <link>http://localhost:3000/blog/windows-identity-framework-training-kit-available</link>
      <guid isPermaLink="true">http://localhost:3000/blog/windows-identity-framework-training-kit-available</guid>
      <description>The Microsoft Identity story has matured quite a bit in the last couple of years and now would be a good time to get up to speed if you have been waiting for the train to get some speed. Vittorio Bertocci has pulled together the training he has been delivering around the world into a training kit...</description>
      <pubDate>Tue, 06 Jul 2010 03:09:18 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>security</category>
      <category>time-management</category>
      <category>entity-framework</category>
      <category>training</category>
      <category>windows</category>
      <category>microsoft</category>
      <category>cloud</category>
    </item>
    <item>
      <title>In wielding power Apple has hurt itself</title>
      <link>http://localhost:3000/blog/in-wielding-power-apple-has-hurt-itself</link>
      <guid isPermaLink="true">http://localhost:3000/blog/in-wielding-power-apple-has-hurt-itself</guid>
      <description>I have noticed a very interesting reaction recently to the way Apple has been throwing their weight around controlling who and what can be put in the appstore. Until a month or so ago there was a legion of companies and developers in my own circle, figuring out how they would enter the market and...</description>
      <pubDate>Wed, 02 Jun 2010 15:56:03 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>software-dev</category>
      <category>apple</category>
      <category>iphone</category>
      <category>ipad</category>
      <category>adobe</category>
      <category>rest</category>
      <category>business</category>
    </item>
    <item>
      <title>Advice for Small Org Backup on a Budget</title>
      <link>http://localhost:3000/blog/advice-for-small-org-backup-on-a-budget</link>
      <guid isPermaLink="true">http://localhost:3000/blog/advice-for-small-org-backup-on-a-budget</guid>
      <description>I was recently asked how to cost effectively do backup and Disaster Recovery (DR) for a 50 or so person organization. Here is what I have found to be a pretty good way to go that won’t break the bank. For an organization this size I use Backup Assist (http://www.backupassist.com). It leverages...</description>
      <pubDate>Mon, 08 Feb 2010 02:29:29 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>network</category>
      <category>disaster-recovery</category>
      <category>windows</category>
      <category>exchange</category>
      <category>sql</category>
      <category>office</category>
      <category>less</category>
    </item>
    <item>
      <title>Very sophisticated hack, get used to it…</title>
      <link>http://localhost:3000/blog/very-sophisticated-hack-get-used-to-it</link>
      <guid isPermaLink="true">http://localhost:3000/blog/very-sophisticated-hack-get-used-to-it</guid>
      <description>The latest security threat as outlined here has hit over 100,000 people already and if you read through the details of how organized the attack is you will understand why it has been so successful. The problem is that while we have to protect ourselves from every threat, the bad guys only have to...</description>
      <pubDate>Fri, 11 Dec 2009 04:04:30 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>security</category>
      <category>vulnerability</category>
      <category>threat</category>
      <category>hack</category>
      <category>sophisticated</category>
      <category>outlined</category>
      <category>people</category>
    </item>
    <item>
      <title>Dangerous Interventions</title>
      <link>http://localhost:3000/blog/dangerous-interventions</link>
      <guid isPermaLink="true">http://localhost:3000/blog/dangerous-interventions</guid>
      <description>It seems that everytime the government gets involved in high tech, things go wrong. Today I found out that there is a looming intervention that I think could potentially screw up one of the biggest successes in US based high tech, namely processor technology. If you get time soon check out the...</description>
      <pubDate>Thu, 10 Dec 2009 03:54:36 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>software-dev</category>
      <category>dangerous</category>
      <category>interventions</category>
      <category>everytime</category>
      <category>government</category>
      <category>involved</category>
      <category>looming</category>
    </item>
    <item>
      <title>The Greatest Strength</title>
      <link>http://localhost:3000/blog/the-greatest-strength</link>
      <guid isPermaLink="true">http://localhost:3000/blog/the-greatest-strength</guid>
      <description>Lately I have been helping customers find talented developers. As the topic of many books, courses, web sites and numerous other sources (many of which I have read or used) it is a problem that I find keenly interesting. There are of couse many, many ways to look at it, but I think I have found the...</description>
      <pubDate>Fri, 04 Dec 2009 03:42:33 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>management</category>
      <category>hiring</category>
      <category>strength</category>
      <category>greatest</category>
      <category>lately</category>
      <category>helping</category>
      <category>customers</category>
    </item>
    <item>
      <title>PHP and MySQL vs. ASP.Net and SQL Server</title>
      <link>http://localhost:3000/blog/php-and-mysql-vs-asp-net-and-sql-server</link>
      <guid isPermaLink="true">http://localhost:3000/blog/php-and-mysql-vs-asp-net-and-sql-server</guid>
      <description>Over the last year I have gotten an education on PHP and MySQL web sites to go along with my existing expertise with ASP.Net and SQL Server. It turns out that I purchased a web site a little over a year ago that supports gamers who play World of Warcraft (a game I have played for years). The site...</description>
      <pubDate>Wed, 02 Dec 2009 04:25:14 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>development</category>
      <category>sql-server</category>
      <category>mysql</category>
      <category>dotnet</category>
      <category>asp-net</category>
      <category>iis</category>
      <category>education</category>
    </item>
    <item>
      <title>Usability is King</title>
      <link>http://localhost:3000/blog/usability-is-king</link>
      <guid isPermaLink="true">http://localhost:3000/blog/usability-is-king</guid>
      <description>I have been working on commercial products for a long time and repeatedly have seen companies compete with similar solutions. Often one is the technology leader and innovates while the other plays catch up and only survives by clever marketing. Sometimes the laggard can become the market leader,...</description>
      <pubDate>Sun, 29 Nov 2009 02:34:27 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>software-dev</category>
      <category>leader</category>
      <category>market</category>
      <category>king</category>
      <category>usability</category>
      <category>products</category>
      <category>commercial</category>
    </item>
    <item>
      <title>PDC Notes</title>
      <link>http://localhost:3000/blog/pdc-notes</link>
      <guid isPermaLink="true">http://localhost:3000/blog/pdc-notes</guid>
      <description>I just got back from the Microsoft PDC in LA and have been thinking about what I saw there. It turns out that I have come to a couple of conclusions that I will surely post more about in the future, but for now here is the overview. First there were several Windows Azure announcements that have...</description>
      <pubDate>Mon, 23 Nov 2009 01:36:45 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>development</category>
      <category>events</category>
      <category>azure</category>
      <category>microsoft</category>
      <category>windows</category>
      <category>cloud</category>
      <category>sql</category>
    </item>
    <item>
      <title>Contracts 101</title>
      <link>http://localhost:3000/blog/contracts-101</link>
      <guid isPermaLink="true">http://localhost:3000/blog/contracts-101</guid>
      <description>For many, many years I have been writing and reviewing contracts between my company and clients. As a result I have some insights into how things can be made to work more simply. First up, this is not legal advice, just me sharing some experiences. You should always run your contracts by your...</description>
      <pubDate>Mon, 16 Nov 2009 16:15:39 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>contacts</category>
      <category>management</category>
      <category>software-dev</category>
      <category>business</category>
      <category>rails</category>
      <category>contracts</category>
      <category>clients</category>
    </item>
    <item>
      <title>PDC BOF Session on Security</title>
      <link>http://localhost:3000/blog/pdc-bof-session-on-security</link>
      <guid isPermaLink="true">http://localhost:3000/blog/pdc-bof-session-on-security</guid>
      <description>I am packing tonight to head to the PDC in Los Angeles and wanted to tell anyone else who will be attending that I am hosting a Birds of a Feather session at lunchtime on Thursday on security hype . The thesis is that we are seeing a steady stream of over hyped security “issues” that tend to remind...</description>
      <pubDate>Sat, 14 Nov 2009 03:51:22 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>events</category>
      <category>security</category>
      <category>speaking</category>
      <category>session</category>
      <category>packing</category>
      <category>angeles</category>
      <category>attending</category>
    </item>
    <item>
      <title>Bugs are in the eyes of the beholder</title>
      <link>http://localhost:3000/blog/bugs-are-in-the-eyes-of-the-beholder</link>
      <guid isPermaLink="true">http://localhost:3000/blog/bugs-are-in-the-eyes-of-the-beholder</guid>
      <description>As I work to build commercial software products I am regularly forced to remember that bug is a relative term. That sounds like a weasely way to explain away a fault in your software, but it really does turn out to be true especially when you have been on the ISV side of the conversation. Back in...</description>
      <pubDate>Thu, 12 Nov 2009 21:02:29 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>development</category>
      <category>management</category>
      <category>software-dev</category>
      <category>windows</category>
      <category>microsoft</category>
      <category>business</category>
      <category>product</category>
    </item>
    <item>
      <title>Hints that SilverLight is hitting mainstream</title>
      <link>http://localhost:3000/blog/hints-that-silverlight-is-hitting-mainstream</link>
      <guid isPermaLink="true">http://localhost:3000/blog/hints-that-silverlight-is-hitting-mainstream</guid>
      <description>A friend of mine pointed out that now Dolly Parton is leveraging SilverLight and IE8 Web Slices on the site for her new album. I think this is an interesting signpost that SilverLight is rapidly approaching widespread acceptance. Check it out the web slice at the Add on Gallery .</description>
      <pubDate>Thu, 12 Nov 2009 01:50:43 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>development</category>
      <category>silverlight</category>
      <category>hints</category>
      <category>hitting</category>
      <category>mainstream</category>
      <category>pointed</category>
      <category>dolly</category>
    </item>
    <item>
      <title>Change of venue</title>
      <link>http://localhost:3000/blog/change-of-venue</link>
      <guid isPermaLink="true">http://localhost:3000/blog/change-of-venue</guid>
      <description>Most of you know me from Criticalsites or NTP Software since those are the two companies with which I have been associated for over a decade now. This post is to tell you all that while I am still doing work with both of these companies they are now my clients rather than my employers....</description>
      <pubDate>Wed, 11 Nov 2009 04:30:13 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>personal</category>
      <category>speaking</category>
      <category>training</category>
      <category>security</category>
      <category>business</category>
      <category>criticalsites</category>
      <category>software</category>
    </item>
    <item>
      <title>Countdown to PDC</title>
      <link>http://localhost:3000/blog/countdown-to-pdc</link>
      <guid isPermaLink="true">http://localhost:3000/blog/countdown-to-pdc</guid>
      <description>I am getting ready to go to the PDC this year and I got to thinking that devs need to dig in now more than ever to stay up to date on the latest and greatest tools available to get their jobs done. I spent this last week teaching a class on SQL Server 2008 at Blended Solutions in Manchester, New...</description>
      <pubDate>Fri, 06 Nov 2009 03:51:16 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>events</category>
      <category>sql-server</category>
      <category>microsoft</category>
      <category>countdown</category>
      <category>ready</category>
      <category>greatest</category>
      <category>tools</category>
    </item>
    <item>
      <title>Product Key Rules</title>
      <link>http://localhost:3000/blog/product-key-rules</link>
      <guid isPermaLink="true">http://localhost:3000/blog/product-key-rules</guid>
      <description>Lately I have been working on developing a new product key system and realized that one of the core rules of the road is not documented anywhere I can find (which is crazy in this day and age when everything is supposed to have already been said). The rule is pretty simple once you think of it. You...</description>
      <pubDate>Mon, 28 Sep 2009 21:43:27 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>software-dev</category>
      <category>license</category>
      <category>rules</category>
      <category>product</category>
      <category>simple</category>
      <category>lately</category>
      <category>developing</category>
    </item>
    <item>
      <title>ATL Security Vulnerability</title>
      <link>http://localhost:3000/blog/atl-security-vulnerability</link>
      <guid isPermaLink="true">http://localhost:3000/blog/atl-security-vulnerability</guid>
      <description>Microsoft has just announced that there are security flaws in the Active Template Library (ATL). While many developers will think that this only applies to C programmers and while to some extent they are correct I think it is important to take a lesson from this issue. Micheal Howard has posted a...</description>
      <pubDate>Wed, 29 Jul 2009 00:31:09 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>security</category>
      <category>software-dev</category>
      <category>vulnerability</category>
      <category>microsoft</category>
      <category>developers</category>
      <category>programmers</category>
      <category>announced</category>
    </item>
    <item>
      <title>SilverLight Version 3 Released</title>
      <link>http://localhost:3000/blog/silverlight-version-3-released</link>
      <guid isPermaLink="true">http://localhost:3000/blog/silverlight-version-3-released</guid>
      <description>Microsoft has always done well with version 3 goes the well worn saying. And so I have high expectations for SilverLight 3 which has just released. Being more involved with Security, Business Processes and Enterprise System Development I have not delved as deeply into SilverLight 1 and 2 as I had...</description>
      <pubDate>Fri, 17 Jul 2009 15:39:42 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>development</category>
      <category>microsoft</category>
      <category>security</category>
      <category>business</category>
      <category>enterprise</category>
      <category>deployment</category>
      <category>browser</category>
    </item>
    <item>
      <title>Effort vs. Reward</title>
      <link>http://localhost:3000/blog/effort-vs-reward</link>
      <guid isPermaLink="true">http://localhost:3000/blog/effort-vs-reward</guid>
      <description>I am currently reading the book “Outliers, the Story of Success” by Malcolm Gladwell and while I am very interested in the entire book so far I was very struck by a specific passage about half way through dealing with job satisfaction. The quote is, “three things – autonomy, complexity and a...</description>
      <pubDate>Sun, 17 May 2009 16:32:42 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>management</category>
      <category>performance</category>
      <category>license</category>
      <category>autonomy</category>
      <category>reward</category>
      <category>complexity</category>
      <category>success</category>
    </item>
    <item>
      <title>Marketing Lesson from MS</title>
      <link>http://localhost:3000/blog/marketing-lesson-from-ms</link>
      <guid isPermaLink="true">http://localhost:3000/blog/marketing-lesson-from-ms</guid>
      <description>Over the years Microsoft has pitched alot of product and while I have always liked the technology (MS Bob, et. al. aside of course) they have not always been the most marketing savvy company when it comes to media. Over the weekend I what promises to be the best leverage of new media by Microsoft...</description>
      <pubDate>Mon, 11 May 2009 14:00:53 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>web-hosting</category>
      <category>microsoft</category>
      <category>course</category>
      <category>marketing</category>
      <category>media</category>
      <category>lesson</category>
      <category>pitched</category>
    </item>
    <item>
      <title>My .Net Rocks Show on Why Project Fail</title>
      <link>http://localhost:3000/blog/my-net-rocks-show-on-why-project-fail</link>
      <guid isPermaLink="true">http://localhost:3000/blog/my-net-rocks-show-on-why-project-fail</guid>
      <description>My favorite interviewers Carl Franklin and Richard Campbell invited me to appear again on .Net Rocks recently. We talked at length about the circumstances that we often see that cause technical projects in particular to fail. Initial feedback has been quite positive so if you happen to listen to it...</description>
      <pubDate>Wed, 22 Apr 2009 19:06:07 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>development</category>
      <category>software-dev</category>
      <category>dotnet</category>
      <category>rocks</category>
      <category>fail</category>
      <category>particular</category>
      <category>project</category>
    </item>
    <item>
      <title>Who decides the roadmap for commercial software</title>
      <link>http://localhost:3000/blog/who-decides-the-roadmap-for-commercial-software</link>
      <guid isPermaLink="true">http://localhost:3000/blog/who-decides-the-roadmap-for-commercial-software</guid>
      <description>Most of the people I know feel uniquely qualified to say how a particular commercial software product should work based on their experiences of using it. It doesn’t matter which product you pick, it is always the same. The problem with this is that it is almost impossible for an individual to be...</description>
      <pubDate>Mon, 13 Apr 2009 15:27:35 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>management</category>
      <category>software-dev</category>
      <category>course</category>
      <category>community</category>
      <category>product</category>
      <category>commercial</category>
      <category>their</category>
    </item>
    <item>
      <title>Virus Prevention Advice and Policy</title>
      <link>http://localhost:3000/blog/virus-prevention-advice-and-policy</link>
      <guid isPermaLink="true">http://localhost:3000/blog/virus-prevention-advice-and-policy</guid>
      <description>I sent the following email out to our entire company today and afterwards thought it would be interesting to post if for no other reason than to compare notes with others who grapple with these same issues (i.e. everyone). If you have a company of any size at all I would highly recommend sending...</description>
      <pubDate>Fri, 03 Apr 2009 21:23:30 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>management</category>
      <category>security</category>
      <category>virus</category>
      <category>spam</category>
      <category>business</category>
      <category>malware</category>
      <category>less</category>
    </item>
    <item>
      <title>Stealing Jobs: from offshoring to robots</title>
      <link>http://localhost:3000/blog/stealing-jobs-from-offshoring-to-robots</link>
      <guid isPermaLink="true">http://localhost:3000/blog/stealing-jobs-from-offshoring-to-robots</guid>
      <description>I noticed an article on Wired about robots stealing jobs and got to thinking about outsourcing, this down economy and all the conversations I have had (calm and otherwise) about jobs moving offshore. Ultimately I don’t see any reasonable way to stop jobs from following a well established lifecycle...</description>
      <pubDate>Thu, 02 Apr 2009 13:55:40 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>development</category>
      <category>edge</category>
      <category>course</category>
      <category>teams</category>
      <category>stealing</category>
      <category>robots</category>
      <category>offshore</category>
    </item>
    <item>
      <title>Has the Open Cloud Manifesto jumped the gun?</title>
      <link>http://localhost:3000/blog/has-the-open-cloud-manifesto-jumped-the-gun</link>
      <guid isPermaLink="true">http://localhost:3000/blog/has-the-open-cloud-manifesto-jumped-the-gun</guid>
      <description>In my business we deal with companies that are by their very nature risk averse and hence I only play with the newest tech for our internal projects, the occasional customer emergency and in my free time. Even so I have watched Microsoft’s Azure pretty closely and while I am confident that...</description>
      <pubDate>Wed, 01 Apr 2009 14:41:31 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>development</category>
      <category>web-hosting</category>
      <category>cloud-computing</category>
      <category>azure</category>
      <category>business</category>
      <category>microsoft</category>
      <category>testing</category>
    </item>
    <item>
      <title>NH Code Camp Presentations</title>
      <link>http://localhost:3000/blog/nh-code-camp-presentations</link>
      <guid isPermaLink="true">http://localhost:3000/blog/nh-code-camp-presentations</guid>
      <description>I promised to upload my presentations from last month’s New Hampshire Code Camp so here they are… I delivered the keynote address for the event covering how to survive as a developer in this depressed economy. NH Code Camp Feb 2009 Keynote.ppt (592.5 KB) I also got to debut a new session on How to...</description>
      <pubDate>Fri, 27 Mar 2009 19:28:54 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>management</category>
      <category>software-dev</category>
      <category>speaking</category>
      <category>presentations</category>
      <category>keynote</category>
      <category>session</category>
      <category>code</category>
    </item>
    <item>
      <title>A suggestion for replacing UAC</title>
      <link>http://localhost:3000/blog/a-suggestion-for-replacing-uac</link>
      <guid isPermaLink="true">http://localhost:3000/blog/a-suggestion-for-replacing-uac</guid>
      <description>I am here at the PDC in Los Angeles this week and have heard quite a bit of grumblings about UAC. The MS employees on stage and elsewhere are basically saying that UAC is a necessary evil so that clients do not become vulnerable due to unauthorized software install (and other admin level actions)....</description>
      <pubDate>Tue, 28 Oct 2008 16:43:09 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>security</category>
      <category>malware</category>
      <category>windows</category>
      <category>productivity</category>
      <category>install</category>
      <category>suggestion</category>
      <category>software</category>
    </item>
    <item>
      <title>Code Optimization when speed is not the only goal…</title>
      <link>http://localhost:3000/blog/code-optimization-when-speed-is-not-the-only-goal</link>
      <guid isPermaLink="true">http://localhost:3000/blog/code-optimization-when-speed-is-not-the-only-goal</guid>
      <description>I have worked on many software development projects, both commercial and line of business and every single time I talk about optimization to a developer they always jump to the same conclusion. They think I mean speed of execution. I grant that the majority of the time when people talk about...</description>
      <pubDate>Thu, 18 Sep 2008 21:44:44 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>development</category>
      <category>software-dev</category>
      <category>optimization</category>
      <category>business</category>
      <category>agile</category>
      <category>security</category>
      <category>less</category>
    </item>
    <item>
      <title>Technical Consulting</title>
      <link>http://localhost:3000/blog/technical-consulting</link>
      <guid isPermaLink="true">http://localhost:3000/blog/technical-consulting</guid>
      <description>Life changes pretty fast sometimes when you aren’t watching. I woke up today and realized that much more of my work is involved in keeping projects on the straight and narrow and much less is spent making database fields show up in the right place and with the right user access set. For that reason...</description>
      <pubDate>Wed, 17 Sep 2008 19:02:16 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>time-management</category>
      <category>business</category>
      <category>less</category>
      <category>database</category>
      <category>cloud</category>
      <category>podcast</category>
      <category>security</category>
    </item>
    <item>
      <title>EDC 2008 Session on Index Optimization and Performance Tuning</title>
      <link>http://localhost:3000/blog/edc-2008-session-on-index-optimization-and-performance-tuning</link>
      <guid isPermaLink="true">http://localhost:3000/blog/edc-2008-session-on-index-optimization-and-performance-tuning</guid>
      <description>I have recently finished my last presentation here in Cairo at the EDC 2008 and wanted to start getting my presentations uploaded for all those who were asking about them. To make things run faster I am uploading them each in their own post especially since the AJAX example hasn’t been packaged...</description>
      <pubDate>Mon, 14 Apr 2008 15:19:04 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>sql-server</category>
      <category>optimization</category>
      <category>performance</category>
      <category>ajax</category>
      <category>microsoft</category>
      <category>2008</category>
      <category>session</category>
    </item>
    <item>
      <title>Security Mindset</title>
      <link>http://localhost:3000/blog/security-mindset</link>
      <guid isPermaLink="true">http://localhost:3000/blog/security-mindset</guid>
      <description>I have often thought about the mindset required to be good at the security game. I hang out with Duane Laflotte alot and he has the whole hacker mindset which lends itself nicely to security even when you aren’t trolling on the dark side. But it was an article that got picked up on Slashdot today...</description>
      <pubDate>Fri, 21 Mar 2008 13:31:30 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>security</category>
      <category>hacker</category>
      <category>training</category>
      <category>mindset</category>
      <category>required</category>
      <category>duane</category>
      <category>laflotte</category>
    </item>
    <item>
      <title>EDC Session Topics</title>
      <link>http://localhost:3000/blog/edc-session-topics</link>
      <guid isPermaLink="true">http://localhost:3000/blog/edc-session-topics</guid>
      <description>As I said a couple of days ago, I am speaking again in Cairo in a few weeks at the EDC. I have arrived on the topics that I am presenting. While these are still subject to change it looks like: A session on AJAX A session on Commercial Software Dev (vs. Business development) A session on Indexing...</description>
      <pubDate>Wed, 12 Mar 2008 20:55:48 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>development</category>
      <category>speaking</category>
      <category>sql-server</category>
      <category>ajax</category>
      <category>business</category>
      <category>optimization</category>
      <category>session</category>
    </item>
    <item>
      <title>Technology Reinvented (or Recycled)…</title>
      <link>http://localhost:3000/blog/technology-reinvented-or-recycled</link>
      <guid isPermaLink="true">http://localhost:3000/blog/technology-reinvented-or-recycled</guid>
      <description>Every few years I find that there are pieces (sometimes big ones) that I have not played with or encounted on a customer project and it tends to freak me out a bit. We have now arrived at that point in the cycle yet again! Expression, SilverLight, WPF and the like are all technologies that you will...</description>
      <pubDate>Tue, 11 Mar 2008 14:47:45 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>development</category>
      <category>software-dev</category>
      <category>technology</category>
      <category>reinvented</category>
      <category>recycled</category>
      <category>pieces</category>
      <category>played</category>
    </item>
    <item>
      <title>Egypt Developers Conference (EDC)</title>
      <link>http://localhost:3000/blog/egypt-developers-conference-edc</link>
      <guid isPermaLink="true">http://localhost:3000/blog/egypt-developers-conference-edc</guid>
      <description>I have finally confirmed the final dates for the Egypt Developers Conference which is held every year in Cairo. This year it is in Mid April and again I will be speaking. I really look forward to this event and for a short time I was afraid that the dates would move to a week where I couldn’t...</description>
      <pubDate>Mon, 10 Mar 2008 13:40:53 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>development</category>
      <category>events</category>
      <category>speaking</category>
      <category>conference</category>
      <category>business</category>
      <category>egypt</category>
      <category>developers</category>
    </item>
    <item>
      <title>Back to blogging</title>
      <link>http://localhost:3000/blog/back-to-blogging</link>
      <guid isPermaLink="true">http://localhost:3000/blog/back-to-blogging</guid>
      <description>A very good friend of mine reminded me that I have this blog that I have been neglecting and I must say that he is right. It is easy to fall out of a habit even one so important and I think in my case it has been that I always want to write really interesting things. The problem is that really...</description>
      <pubDate>Mon, 10 Mar 2008 13:36:32 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>personal</category>
      <category>security</category>
      <category>write</category>
      <category>interesting</category>
      <category>blogging</category>
      <category>reminded</category>
      <category>neglecting</category>
    </item>
    <item>
      <title>Best Marketing for a Technology Ever!</title>
      <link>http://localhost:3000/blog/best-marketing-for-a-technology-ever</link>
      <guid isPermaLink="true">http://localhost:3000/blog/best-marketing-for-a-technology-ever</guid>
      <description>Someone in my office just forwarded me a link to a video that has Scott Guthrie talking about ASP.Net.&amp;nbsp; Not very unexpected, but the video turns out to be set inside Halo thanks to the crew a Red vs. Blue and it fabulous. I don’t know what site it was originally hosted on, but if you remotely...</description>
      <pubDate>Fri, 25 May 2007 19:39:30 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>development</category>
      <category>dotnet</category>
      <category>asp-net</category>
      <category>office</category>
      <category>video</category>
      <category>scott</category>
      <category>guthrie</category>
    </item>
    <item>
      <title>Big boost for ASP.Net scalability</title>
      <link>http://localhost:3000/blog/big-boost-for-asp-net-scalability</link>
      <guid isPermaLink="true">http://localhost:3000/blog/big-boost-for-asp-net-scalability</guid>
      <description>StrangeLoop has finally announced their AppScaler device! Richard Campbell told me about his involvement in StrangeLoop a while ago and I have been dying to tell people about it, but until now it has been confidential. Basically the AppScaler takes a web farms major headaches and lifts them into...</description>
      <pubDate>Tue, 22 May 2007 00:24:28 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>development</category>
      <category>management</category>
      <category>network</category>
      <category>software-dev</category>
      <category>web-hosting</category>
      <category>dotnet</category>
      <category>asp-net</category>
    </item>
    <item>
      <title>Being hacked might get even more expensive</title>
      <link>http://localhost:3000/blog/being-hacked-might-get-even-more-expensive</link>
      <guid isPermaLink="true">http://localhost:3000/blog/being-hacked-might-get-even-more-expensive</guid>
      <description>Most companies pay lip service to security, but the emphasis is just not there.&amp;nbsp; There is bluster and maybe even a few conversions soon after an embarrassing security breach, but all too often a scapegoat is found, fired and then it is back to business as usual. The missing element is real...</description>
      <pubDate>Tue, 27 Feb 2007 16:30:06 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>security</category>
      <category>business</category>
      <category>hacked</category>
      <category>companies</category>
      <category>expensive</category>
      <category>service</category>
      <category>emphasis</category>
    </item>
    <item>
      <title>Default Router Passwords</title>
      <link>http://localhost:3000/blog/default-router-passwords</link>
      <guid isPermaLink="true">http://localhost:3000/blog/default-router-passwords</guid>
      <description>ZDNet recently had an article about new attacks that allow systems to be exposed to the worst kind of attacks just by visiting a web page with a bit of Javascript.&amp;nbsp; The root of the problem is actually not changing the default passwords on those ubiquitous home routers from linksys and netgear...</description>
      <pubDate>Fri, 16 Feb 2007 16:28:06 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>security</category>
      <category>javascript</category>
      <category>exploit</category>
      <category>spam</category>
      <category>less</category>
      <category>default</category>
      <category>attacks</category>
    </item>
    <item>
      <title>Tagged</title>
      <link>http://localhost:3000/blog/tagged</link>
      <guid isPermaLink="true">http://localhost:3000/blog/tagged</guid>
      <description>New games all the time, this one is Blog Tag.&amp;nbsp; Don Sorcinelli tagged me via his blog and so now I am to write a blog entry that reveals things about me that you wouldn’t be likely to know and then tag others.&amp;nbsp; I will do the first part to the letter, but will only tag a single individual...</description>
      <pubDate>Mon, 08 Jan 2007 02:55:50 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>personal</category>
      <category>tagged</category>
      <category>games</category>
      <category>sorcinelli</category>
      <category>write</category>
      <category>entry</category>
      <category>reveals</category>
    </item>
    <item>
      <title>Interesting ways to increase security (incrementally)</title>
      <link>http://localhost:3000/blog/interesting-ways-to-increase-security-incrementally</link>
      <guid isPermaLink="true">http://localhost:3000/blog/interesting-ways-to-increase-security-incrementally</guid>
      <description>Forbes.com has a story about the use of typing patterns to identify whether a user is the actual user or a hacker. I like the idea, though I fear it won’t catch on.&amp;nbsp; Defense in depth, adding an edge is important, but the key element from this article comes at the very end where they say that...</description>
      <pubDate>Wed, 03 Jan 2007 22:25:57 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>security</category>
      <category>hacker</category>
      <category>edge</category>
      <category>catch</category>
      <category>interesting</category>
      <category>increase</category>
      <category>incrementally</category>
    </item>
    <item>
      <title>What is a Microsoft Regional Director?</title>
      <link>http://localhost:3000/blog/what-is-a-microsoft-regional-director</link>
      <guid isPermaLink="true">http://localhost:3000/blog/what-is-a-microsoft-regional-director</guid>
      <description>My fellow Microsoft Regional Director, Jonathan Goodyear recently wrote a very full and detailed description of what the Microsoft Regional Director program really is , that should help anyone who still thinks I am a MS employee. I hope this helps clarify things a bit, though I do expect to still...</description>
      <pubDate>Tue, 19 Dec 2006 14:38:13 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>development</category>
      <category>microsoft</category>
      <category>regional</category>
      <category>director</category>
      <category>fellow</category>
      <category>jonathan</category>
      <category>goodyear</category>
    </item>
    <item>
      <title>MS from the Inside and the Developer Community from the Outside</title>
      <link>http://localhost:3000/blog/ms-from-the-inside-and-the-developer-community-from-the-outside</link>
      <guid isPermaLink="true">http://localhost:3000/blog/ms-from-the-inside-and-the-developer-community-from-the-outside</guid>
      <description>My good friend, Eileen Rumwell, has started blogging .&amp;nbsp; Her blog is something I plan to keep watching especially since in the short time it has been up she has already thrown out some great insights.&amp;nbsp; The really cool thing is that having come from a marketing background, Eileen has been...</description>
      <pubDate>Wed, 29 Nov 2006 21:58:37 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>development</category>
      <category>security</category>
      <category>user-group</category>
      <category>community</category>
      <category>microsoft</category>
      <category>eileen</category>
      <category>outside</category>
    </item>
    <item>
      <title>It usually isn’t what we expect that gets us…</title>
      <link>http://localhost:3000/blog/it-usually-isn-t-what-we-expect-that-gets-us</link>
      <guid isPermaLink="true">http://localhost:3000/blog/it-usually-isn-t-what-we-expect-that-gets-us</guid>
      <description>Time magazine’s cover story is about how people are scared of very, very unlikely things such as bird flu which hasn’t killed anyone in the US while the regular flu kills tens of thousands each year. Security is the same way.&amp;nbsp; I often see organizations worrying about “Carlos the mad hacker”...</description>
      <pubDate>Sun, 26 Nov 2006 18:55:19 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>security</category>
      <category>hacker</category>
      <category>expect</category>
      <category>magazine</category>
      <category>cover</category>
      <category>story</category>
      <category>people</category>
    </item>
    <item>
      <title>Cross Site Scripting protection made easy (er)</title>
      <link>http://localhost:3000/blog/cross-site-scripting-protection-made-easy-er</link>
      <guid isPermaLink="true">http://localhost:3000/blog/cross-site-scripting-protection-made-easy-er</guid>
      <description>Microsoft has just released their new Anti-XSS library which helps developers do the right thing more often without as much effort as before. If you are interested in this (and trust me, you are) your first stop is to go to the tutorial and see how it is done.&amp;nbsp; As you will see it isn’t stupid...</description>
      <pubDate>Fri, 24 Nov 2006 00:03:23 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>development</category>
      <category>security</category>
      <category>microsoft</category>
      <category>tutorial</category>
      <category>easy</category>
      <category>library</category>
      <category>cross</category>
    </item>
    <item>
      <title>Preventing Software Piracy</title>
      <link>http://localhost:3000/blog/preventing-software-piracy</link>
      <guid isPermaLink="true">http://localhost:3000/blog/preventing-software-piracy</guid>
      <description>Chad Hower is a smart guy and I came across his post on protecting the software you write from pirates right at a time that we were revisting the question ourselves. On the whole I agree with Chad, while he comes off as against anti-piracy in the beginning of the post, in the end you realize that...</description>
      <pubDate>Mon, 06 Nov 2006 19:07:28 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>security</category>
      <category>software-dev</category>
      <category>piracy</category>
      <category>whole</category>
      <category>agree</category>
      <category>preventing</category>
      <category>hower</category>
    </item>
    <item>
      <title>Data Destruction</title>
      <link>http://localhost:3000/blog/data-destruction</link>
      <guid isPermaLink="true">http://localhost:3000/blog/data-destruction</guid>
      <description>I have commented before on this issue and a recent blog post forwarded to me has dredged up the topic again. If you want to get rid of a drive after retiring a server or getting indicted then most of the things you can think to do to that drive will not remove the data.&amp;nbsp; You can rewrite the...</description>
      <pubDate>Mon, 23 Oct 2006 23:42:52 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>security</category>
      <category>data</category>
      <category>remove</category>
      <category>destruction</category>
      <category>commented</category>
      <category>before</category>
      <category>issue</category>
    </item>
    <item>
      <title>Code Camp 6 in Waltham, MA</title>
      <link>http://localhost:3000/blog/code-camp-6-in-waltham-ma</link>
      <guid isPermaLink="true">http://localhost:3000/blog/code-camp-6-in-waltham-ma</guid>
      <description>Code Camp 6 is tomorrow at the MS office in Waltham and this is the first one since the original world premier Code Camp that I am going to miss. With Thom Robbins moving on to Redmond and the rush of business that everyone seems to be seeing, this 6th edition didn’t come together nearly as early...</description>
      <pubDate>Fri, 20 Oct 2006 18:25:37 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>development</category>
      <category>events</category>
      <category>office</category>
      <category>business</category>
      <category>waltham</category>
      <category>code</category>
      <category>camp</category>
    </item>
    <item>
      <title>FUD</title>
      <link>http://localhost:3000/blog/fud</link>
      <guid isPermaLink="true">http://localhost:3000/blog/fud</guid>
      <description>Sometimes the Fear, Uncertainty and Doubt (FUD) argument is very well disguised.&amp;nbsp; In an article the Chief Scientist at McAfee is decrying some of the new features that MS is putting into Vista to try and stop virus infection and the spread of spyware.&amp;nbsp; This is terribly self serving as in...</description>
      <pubDate>Wed, 18 Oct 2006 18:08:42 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>security</category>
      <category>virus</category>
      <category>argument</category>
      <category>uncertainty</category>
      <category>doubt</category>
      <category>disguised</category>
      <category>chief</category>
    </item>
    <item>
      <title>Disabling Vista’s UAC feature</title>
      <link>http://localhost:3000/blog/disabling-vista-s-uac-feature</link>
      <guid isPermaLink="true">http://localhost:3000/blog/disabling-vista-s-uac-feature</guid>
      <description>As Vista nears launch there are some things you will want to know.&amp;nbsp; Will it support your hardware?&amp;nbsp; Where are the secret buttons that make it usable? Today’s post helps answer that second one. By all reports UAC (User Account Control) can drive even the most security minded user insane...</description>
      <pubDate>Thu, 12 Oct 2006 21:21:19 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>security</category>
      <category>vista</category>
      <category>feature</category>
      <category>disabling</category>
      <category>nears</category>
      <category>launch</category>
      <category>support</category>
    </item>
    <item>
      <title>Mandatory Integrity Control in Vista</title>
      <link>http://localhost:3000/blog/mandatory-integrity-control-in-vista</link>
      <guid isPermaLink="true">http://localhost:3000/blog/mandatory-integrity-control-in-vista</guid>
      <description>Steve Riley had a good long post on his blog about Mandatory Integrity Control as it is implemented in Vista that drew even longer comments. Great concept, as you will see from several of the comments, this isn’t the first implementation, but I expect it will be the first to get nearly universal...</description>
      <pubDate>Wed, 11 Oct 2006 19:43:48 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>security</category>
      <category>mandatory</category>
      <category>integrity</category>
      <category>control</category>
      <category>vista</category>
      <category>comments</category>
      <category>expect</category>
    </item>
    <item>
      <title>Do you believe everything you read?</title>
      <link>http://localhost:3000/blog/do-you-believe-everything-you-read</link>
      <guid isPermaLink="true">http://localhost:3000/blog/do-you-believe-everything-you-read</guid>
      <description>My prolific friend Phil forwarded me a story about Chinese hackers trying to do in the US Commerce Department . There are a couple of interesting points in this story: 1. Why would you need to take Internet access away from users?&amp;nbsp; Aren’t they behind firewalls?&amp;nbsp; Were the hackers luring...</description>
      <pubDate>Tue, 10 Oct 2006 20:58:57 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>security</category>
      <category>story</category>
      <category>hackers</category>
      <category>believe</category>
      <category>commerce</category>
      <category>department</category>
      <category>prolific</category>
    </item>
    <item>
      <title>Specifications</title>
      <link>http://localhost:3000/blog/specifications</link>
      <guid isPermaLink="true">http://localhost:3000/blog/specifications</guid>
      <description>Having been involved in many software projects, some commercial, some consulting, some disasterous, I have noticed some trends that I would like to share. If you are commissioning (read paying or betting your job) a development project, you have to avoid being wishful.&amp;nbsp; If you just trust that...</description>
      <pubDate>Thu, 05 Oct 2006 13:42:37 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>management</category>
      <category>software-dev</category>
      <category>less</category>
      <category>commercial</category>
      <category>consulting</category>
      <category>project</category>
      <category>avoid</category>
    </item>
    <item>
      <title>Command Prompts and other security nightmares</title>
      <link>http://localhost:3000/blog/command-prompts-and-other-security-nightmares</link>
      <guid isPermaLink="true">http://localhost:3000/blog/command-prompts-and-other-security-nightmares</guid>
      <description>The topic of the AT command and the command prompt came up on an internal list I am on with Microsoft the jist of which was, “How do I securely turn this junk off”. The answer is that to some degree the command prompt and especially when coupled with the Task Scheduler&amp;nbsp;is a security hole that...</description>
      <pubDate>Tue, 03 Oct 2006 20:07:10 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>network</category>
      <category>security</category>
      <category>microsoft</category>
      <category>tcp</category>
      <category>windows</category>
      <category>command</category>
      <category>prompt</category>
    </item>
    <item>
      <title>Phishing getting worse</title>
      <link>http://localhost:3000/blog/phishing-getting-worse</link>
      <guid isPermaLink="true">http://localhost:3000/blog/phishing-getting-worse</guid>
      <description>If you want to keep track of how prevelent phishing attacks are from month to month (and I do) then you should check AntiPhishing.org .&amp;nbsp; The site is pretty meager in most regards, but the front page has a bar chart that is pretty staggering when you realize that they are only measuring people...</description>
      <pubDate>Mon, 02 Oct 2006 21:11:19 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>security</category>
      <category>phishing</category>
      <category>pretty</category>
      <category>people</category>
      <category>track</category>
      <category>prevelent</category>
      <category>attacks</category>
    </item>
    <item>
      <title>Considering Compliance implications…</title>
      <link>http://localhost:3000/blog/considering-compliance-implications</link>
      <guid isPermaLink="true">http://localhost:3000/blog/considering-compliance-implications</guid>
      <description>There are many varying opinions on almost everything, but Compliance is one of those topics like economics, everyone has a different opinion it seems. I was reading an article by one of the Systems Engineers at Network Appliance entitled, “ Six Tips for Archive and Compliance Planning ” and while I...</description>
      <pubDate>Fri, 22 Sep 2006 15:19:34 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>network</category>
      <category>security</category>
      <category>encryption</category>
      <category>compliance</category>
      <category>systems</category>
      <category>considering</category>
      <category>implications</category>
    </item>
    <item>
      <title>Patch or die</title>
      <link>http://localhost:3000/blog/patch-or-die</link>
      <guid isPermaLink="true">http://localhost:3000/blog/patch-or-die</guid>
      <description>It seems that even though we all know we need to patch our system, we are now having to do it faster and faster to avoid the vulnerable time between patch availability and exploit.&amp;nbsp; In an article on ZDNet there are details of how the latest exploit is being used, but soon you should see a post...</description>
      <pubDate>Wed, 20 Sep 2006 14:49:16 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>security</category>
      <category>exploit</category>
      <category>availability</category>
      <category>hacker</category>
      <category>patch</category>
      <category>faster</category>
      <category>system</category>
    </item>
    <item>
      <title>.Net Best Practices Source</title>
      <link>http://localhost:3000/blog/net-best-practices-source</link>
      <guid isPermaLink="true">http://localhost:3000/blog/net-best-practices-source</guid>
      <description>I have been casting about for .Net Best Practices and came across Adam Cogan’s lists of how to do pretty much everything.&amp;nbsp; The funny thing is that I have known Adam for years and was aware that he had compiled quite alot of information on his site, but until I started to dig through it I...</description>
      <pubDate>Wed, 06 Sep 2006 13:33:09 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>development</category>
      <category>best-practice</category>
      <category>dotnet</category>
      <category>practices</category>
      <category>source</category>
      <category>casting</category>
      <category>across</category>
    </item>
    <item>
      <title>Hardware Hacking</title>
      <link>http://localhost:3000/blog/hardware-hacking</link>
      <guid isPermaLink="true">http://localhost:3000/blog/hardware-hacking</guid>
      <description>I am sure it is reported elsewhere, but I found an article on a proof of concept virus that targets AMD processors on a magazine site in Australia.&amp;nbsp; The article dismisses the threat of such an item and pretty much holds it up as just a curiosity in the fight against hackers, but I see it...</description>
      <pubDate>Tue, 29 Aug 2006 19:23:44 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>security</category>
      <category>hacking</category>
      <category>virus</category>
      <category>amd</category>
      <category>hardware</category>
      <category>threat</category>
      <category>reported</category>
    </item>
    <item>
      <title>One of those must have URLs</title>
      <link>http://localhost:3000/blog/one-of-those-must-have-urls</link>
      <guid isPermaLink="true">http://localhost:3000/blog/one-of-those-must-have-urls</guid>
      <description>I know it is simple and probably not an amazing tool, but I am finding www.dnsreport.com &amp;nbsp;to be amazingly helpful in some troubleshooting I have had to do recently. Sometimes the most important thing is to just have the right tool…</description>
      <pubDate>Tue, 01 Aug 2006 16:04:53 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>urls</category>
      <category>simple</category>
      <category>amazing</category>
      <category>dnsreport</category>
      <category>helpful</category>
      <category>troubleshooting</category>
      <category>recently</category>
    </item>
    <item>
      <title>Microsoft in 12 step program</title>
      <link>http://localhost:3000/blog/microsoft-in-12-step-program</link>
      <guid isPermaLink="true">http://localhost:3000/blog/microsoft-in-12-step-program</guid>
      <description>Microsoft has released a 12 step plan to help its image and communicate their intent to prevent the kinds of lawsuits like the one going on with the EU. While I think the plan will work on a number of levels, I am disappointed that it had to happen this way.&amp;nbsp; I am not of the belief that...</description>
      <pubDate>Tue, 25 Jul 2006 00:50:31 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>events</category>
      <category>microsoft</category>
      <category>less</category>
      <category>step</category>
      <category>program</category>
      <category>released</category>
      <category>image</category>
    </item>
    <item>
      <title>VS2005 Licensing Explained (Finally)</title>
      <link>http://localhost:3000/blog/vs2005-licensing-explained-finally</link>
      <guid isPermaLink="true">http://localhost:3000/blog/vs2005-licensing-explained-finally</guid>
      <description>I normally don’t post twice in one day, but this blog post by Rob Caron was VERY helpful in understanding VS2005 licensing and the relationship between the products.&amp;nbsp; I expect it will help alot of people grasp it since I get asked this question a fairly often in my roaming. Thanks Rob and...</description>
      <pubDate>Fri, 14 Jul 2006 18:15:26 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>development</category>
      <category>vs2005</category>
      <category>licensing</category>
      <category>explained</category>
      <category>finally</category>
      <category>normally</category>
      <category>twice</category>
    </item>
    <item>
      <title>ASP.Net 2.0 Information Disclosure bug…</title>
      <link>http://localhost:3000/blog/asp-net-2-0-information-disclosure-bug</link>
      <guid isPermaLink="true">http://localhost:3000/blog/asp-net-2-0-information-disclosure-bug</guid>
      <description>I was just thinking about one of the bugs listed in the latest hotfix from MS &amp;nbsp;and realized that while aspx and config files are not at risk since they are mapped to aspnet, the express database if stored in App_Data probably is. We don’t typically use SQL Express, but my bet is that this is...</description>
      <pubDate>Fri, 14 Jul 2006 17:36:04 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>development</category>
      <category>security</category>
      <category>express</category>
      <category>dotnet</category>
      <category>asp-net</category>
      <category>aspnet</category>
      <category>database</category>
    </item>
    <item>
      <title>Mining for Malware</title>
      <link>http://localhost:3000/blog/mining-for-malware</link>
      <guid isPermaLink="true">http://localhost:3000/blog/mining-for-malware</guid>
      <description>When I see an article like this one in eweek , I always wonder about how the people doing this cool thing will make enough money (or any money) so they can continue to do these cool things. Basically they are using the Google Search APIs to ferret out sites on the Internet that are hosting...</description>
      <pubDate>Thu, 13 Jul 2006 15:43:09 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>security</category>
      <category>open-source</category>
      <category>malware</category>
      <category>google</category>
      <category>community</category>
      <category>money</category>
      <category>people</category>
    </item>
    <item>
      <title>Performance Tuning and Version 1.0</title>
      <link>http://localhost:3000/blog/performance-tuning-and-version-1-0</link>
      <guid isPermaLink="true">http://localhost:3000/blog/performance-tuning-and-version-1-0</guid>
      <description>When you are working on commercial software or even just industrial strength business software you have to balance things.&amp;nbsp;&amp;nbsp;Time to market is&amp;nbsp;everything and while you must have usable, quality code, you have to get it done. &amp;nbsp; One of the things that is hardest to balance is...</description>
      <pubDate>Tue, 20 Jun 2006 00:35:53 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>management</category>
      <category>software-dev</category>
      <category>performance</category>
      <category>business</category>
      <category>tuning</category>
      <category>balance</category>
      <category>version</category>
    </item>
    <item>
      <title>Mega User Group Panel tonight</title>
      <link>http://localhost:3000/blog/mega-user-group-panel-tonight</link>
      <guid isPermaLink="true">http://localhost:3000/blog/mega-user-group-panel-tonight</guid>
      <description>Tonight at TechEd in Boston there is the Panel discussion.&amp;nbsp; This is an event by pretty much all the user groups in the area and I will be one of the panelists.&amp;nbsp; The room (251 at the Convention Center, not the Hynes) is open at 6:00 PM with the meeting starting at 6:50 PM.&amp;nbsp; The room...</description>
      <pubDate>Mon, 12 Jun 2006 13:23:17 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>events</category>
      <category>speaking</category>
      <category>user-group</category>
      <category>meeting</category>
      <category>panel</category>
      <category>mega</category>
      <category>teched</category>
    </item>
    <item>
      <title>RC1 of the Threat Analysis &amp; Modeling V2.0 is out</title>
      <link>http://localhost:3000/blog/rc1-of-the-threat-analysis-modeling-v2-0-is-out</link>
      <guid isPermaLink="true">http://localhost:3000/blog/rc1-of-the-threat-analysis-modeling-v2-0-is-out</guid>
      <description>If you are into threat modeling (and you should be) then you should check out the latest version of the product formerly code named “Torpedo”.&amp;nbsp; I think this is the first product to make real strides (bad pun intended) toward making threat modeling more approachable for the average developer....</description>
      <pubDate>Thu, 25 May 2006 19:21:29 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>development</category>
      <category>security</category>
      <category>threat-model</category>
      <category>microsoft</category>
      <category>modeling</category>
      <category>product</category>
      <category>analysis</category>
    </item>
    <item>
      <title>Membership Provider DB Install Scripts</title>
      <link>http://localhost:3000/blog/membership-provider-db-install-scripts</link>
      <guid isPermaLink="true">http://localhost:3000/blog/membership-provider-db-install-scripts</guid>
      <description>At Code Camp 5 in Waltham this past Sunday I was delivering my session entitled “All you need to know about Membership”, when I learned that I didn’t know everything I need to know about membership. Someone asked if the scripts were available that aspnet_regsql.exe uses to create the membership...</description>
      <pubDate>Tue, 09 May 2006 00:06:51 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>development</category>
      <category>events</category>
      <category>security</category>
      <category>speaking</category>
      <category>dotnet</category>
      <category>asp-net</category>
      <category>aspnet</category>
    </item>
    <item>
      <title>VB6 on Vista</title>
      <link>http://localhost:3000/blog/vb6-on-vista</link>
      <guid isPermaLink="true">http://localhost:3000/blog/vb6-on-vista</guid>
      <description>MS has committed, at some level, to support VB6 on Vista.&amp;nbsp; In an article from February there are some details, but we now know that if you have a VB6 application that you cannot live without, you will probably be OK for years to come. This is both good news and bad news.&amp;nbsp; While I feel the...</description>
      <pubDate>Wed, 03 May 2006 18:20:39 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>development</category>
      <category>security</category>
      <category>sql</category>
      <category>vista</category>
      <category>support</category>
      <category>committed</category>
      <category>level</category>
    </item>
    <item>
      <title>CRLF Injection and a bad premise</title>
      <link>http://localhost:3000/blog/crlf-injection-and-a-bad-premise</link>
      <guid isPermaLink="true">http://localhost:3000/blog/crlf-injection-and-a-bad-premise</guid>
      <description>A friend of ours, Phil, sent Duane and I a link to an article about web attacks (Phil does this alot).&amp;nbsp; He commented that he hadn’t heard of CRLF Injection before and while I had heard of it, I realized that I wasn’t comfortable explaining it on the spot with examples so I read the link ....</description>
      <pubDate>Thu, 27 Apr 2006 20:52:34 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>security</category>
      <category>sql</category>
      <category>meta</category>
      <category>injection</category>
      <category>heard</category>
      <category>crlf</category>
      <category>premise</category>
    </item>
    <item>
      <title>ASP.Net Application Pool Gotcha</title>
      <link>http://localhost:3000/blog/asp-net-application-pool-gotcha</link>
      <guid isPermaLink="true">http://localhost:3000/blog/asp-net-application-pool-gotcha</guid>
      <description>Sharing a web server between development teams is always fun (not).&amp;nbsp; We had a problem surface today (or resurface) where if a developer creates a web application on IIS that uses .Net 1.1 for example (not an uncommon occurance) and some other developer creates a web application on that same...</description>
      <pubDate>Thu, 20 Apr 2006 14:42:27 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>development</category>
      <category>web-hosting</category>
      <category>dotnet</category>
      <category>asp-net</category>
      <category>iis</category>
      <category>teams</category>
      <category>application</category>
    </item>
    <item>
      <title>Membership Provider Source Code</title>
      <link>http://localhost:3000/blog/membership-provider-source-code</link>
      <guid isPermaLink="true">http://localhost:3000/blog/membership-provider-source-code</guid>
      <description>Scott Guthrie pointed me at a link to the source code for the ASP.Net 2.0 providers including the Membership and Role Management providers.&amp;nbsp; While I think the Profiles, Web Parts and Site Navigation providers are important and cool, I expect to do much more with the Membership provider.&amp;nbsp;...</description>
      <pubDate>Fri, 14 Apr 2006 17:39:52 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>development</category>
      <category>security</category>
      <category>dotnet</category>
      <category>asp-net</category>
      <category>management</category>
      <category>membership</category>
      <category>providers</category>
    </item>
    <item>
      <title>File System Permissions on copy or move</title>
      <link>http://localhost:3000/blog/file-system-permissions-on-copy-or-move</link>
      <guid isPermaLink="true">http://localhost:3000/blog/file-system-permissions-on-copy-or-move</guid>
      <description>I was recently asked by a very technical and very sharp friend of mine about the symantics of permissions on copy. I figured if he needed some guidance on how this works then there must be a ton of other developers who could use a refresher so here goes: There are alot of reasons that a developer...</description>
      <pubDate>Wed, 12 Apr 2006 07:38:26 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>development</category>
      <category>network</category>
      <category>security</category>
      <category>windows</category>
      <category>permissions</category>
      <category>file</category>
      <category>copy</category>
    </item>
    <item>
      <title>Community Credit</title>
      <link>http://localhost:3000/blog/community-credit</link>
      <guid isPermaLink="true">http://localhost:3000/blog/community-credit</guid>
      <description>Like the Code Camps another good idea is coming out of the Microsoft Developer Evangelists.&amp;nbsp; This time it is a web site with an interesting concept.&amp;nbsp; If you go to http://www.community-credit.com/DevCommunity.aspx you will see it in action and also be able to see the people who are working...</description>
      <pubDate>Wed, 05 Apr 2006 20:22:51 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>development</category>
      <category>community</category>
      <category>microsoft</category>
      <category>credit</category>
      <category>people</category>
      <category>camps</category>
      <category>developer</category>
    </item>
    <item>
      <title>Mini Code Camp Security Edition Slides</title>
      <link>http://localhost:3000/blog/mini-code-camp-security-edition-slides</link>
      <guid isPermaLink="true">http://localhost:3000/blog/mini-code-camp-security-edition-slides</guid>
      <description>As promised, but fashionably late as always, here are the slides from this Saturday’s Mini Code Camp Security Edition. I want to thank everyone that attended and the feedback has been great (no death treats so far)! Membership.ppt (752 KB) Security Best Practices.ppt (579 KB) Check Duane’s blog at...</description>
      <pubDate>Mon, 27 Mar 2006 19:58:01 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>events</category>
      <category>security</category>
      <category>speaking</category>
      <category>best-practice</category>
      <category>slides</category>
      <category>edition</category>
      <category>mini</category>
    </item>
    <item>
      <title>Security etiquette in email for today’s Internet</title>
      <link>http://localhost:3000/blog/security-etiquette-in-email-for-today-s-internet</link>
      <guid isPermaLink="true">http://localhost:3000/blog/security-etiquette-in-email-for-today-s-internet</guid>
      <description>In dealing with our teams of developers and engineers I find myself preaching some basic rules that make life easier for me when I try to deal with the legion of emails I get every day.&amp;nbsp; I thought to document them and in doing so realized that they have a decidedly security slant to them (big...</description>
      <pubDate>Wed, 22 Mar 2006 16:42:47 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>security</category>
      <category>teams</category>
      <category>spam</category>
      <category>outlook</category>
      <category>message</category>
      <category>etiquette</category>
      <category>email</category>
    </item>
    <item>
      <title>Ted Neward has a new site</title>
      <link>http://localhost:3000/blog/ted-neward-has-a-new-site</link>
      <guid isPermaLink="true">http://localhost:3000/blog/ted-neward-has-a-new-site</guid>
      <description>Ted Neward just launched his new site at http://www.tedneward.com .&amp;nbsp; Check it out, Ted is one of the most interesting and intelligent people I know.&amp;nbsp; If you ever need to cross the .Net platform with Java then he is the guy to take a lesson from.</description>
      <pubDate>Sun, 05 Mar 2006 22:44:07 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>development</category>
      <category>dotnet</category>
      <category>java</category>
      <category>neward</category>
      <category>launched</category>
      <category>check</category>
      <category>interesting</category>
    </item>
    <item>
      <title>More on the ClickOnce security question</title>
      <link>http://localhost:3000/blog/more-on-the-clickonce-security-question</link>
      <guid isPermaLink="true">http://localhost:3000/blog/more-on-the-clickonce-security-question</guid>
      <description>Microsoft has chimed in on the questions about ClickOnce security raised by Dominick Baier &amp;nbsp;and basically is asserting that this is a non-issue . I am not buying.&amp;nbsp; I think that using the excuse that older technologies do something a certain way undermines the principle of secure by...</description>
      <pubDate>Wed, 01 Mar 2006 02:10:41 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>development</category>
      <category>security</category>
      <category>microsoft</category>
      <category>clickonce</category>
      <category>question</category>
      <category>chimed</category>
      <category>raised</category>
    </item>
    <item>
      <title>Must See TV</title>
      <link>http://localhost:3000/blog/must-see-tv</link>
      <guid isPermaLink="true">http://localhost:3000/blog/must-see-tv</guid>
      <description>If you are at all into security or even if you just think technology is cool then you have to watch the latest episode of the The Code Room .&amp;nbsp; In this latest episode you will see our own Duane Laflotte, our resident top hacker as part of the team of evil doers that hack a casino in vegas. I...</description>
      <pubDate>Mon, 27 Feb 2006 19:24:29 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>development</category>
      <category>security</category>
      <category>hacker</category>
      <category>episode</category>
      <category>technology</category>
      <category>watch</category>
      <category>duane</category>
    </item>
    <item>
      <title>When you need a Custom Membership provider</title>
      <link>http://localhost:3000/blog/when-you-need-a-custom-membership-provider</link>
      <guid isPermaLink="true">http://localhost:3000/blog/when-you-need-a-custom-membership-provider</guid>
      <description>When I was in Cairo for the MDC a few weeks ago, I gave several talks that touched on the new membership controls in ASP.Net 2.0.&amp;nbsp; One question that came up repeatedly was how far can you stretch the provider before you have to write a custom membership provider.&amp;nbsp; The answer turns out to...</description>
      <pubDate>Fri, 24 Feb 2006 16:02:41 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>development</category>
      <category>security</category>
      <category>dotnet</category>
      <category>asp-net</category>
      <category>database</category>
      <category>aspnet</category>
      <category>proprietary</category>
    </item>
    <item>
      <title>.Net 2.0 ClickOnce Security Concerns</title>
      <link>http://localhost:3000/blog/net-2-0-clickonce-security-concerns</link>
      <guid isPermaLink="true">http://localhost:3000/blog/net-2-0-clickonce-security-concerns</guid>
      <description>Dominick Baier of DevelopMentor, wrote on Saturday about a pretty dramatic change in the way ClickOnce security is configured by default in the RTM version of .Net 2.0.&amp;nbsp; This is a must read if you plan to use ClickOnce and haven’t already revamped the default security settings.&amp;nbsp; If you...</description>
      <pubDate>Tue, 21 Feb 2006 04:22:36 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>development</category>
      <category>security</category>
      <category>dotnet</category>
      <category>microsoft</category>
      <category>clickonce</category>
      <category>default</category>
      <category>concerns</category>
    </item>
    <item>
      <title>Suing over security</title>
      <link>http://localhost:3000/blog/suing-over-security</link>
      <guid isPermaLink="true">http://localhost:3000/blog/suing-over-security</guid>
      <description>A recent court case was brought to my attention in which a user whose personal and financial information was stolen tried to sue the company for not using encryption on the data.&amp;nbsp; The article covering it is explains how the data was stolen and the ruling of the courts. The question raised is...</description>
      <pubDate>Thu, 16 Feb 2006 02:29:49 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>security</category>
      <category>best-practice</category>
      <category>encryption</category>
      <category>stolen</category>
      <category>ruling</category>
      <category>suing</category>
      <category>court</category>
    </item>
    <item>
      <title>CyberStorm reaction and comment</title>
      <link>http://localhost:3000/blog/cyberstorm-reaction-and-comment</link>
      <guid isPermaLink="true">http://localhost:3000/blog/cyberstorm-reaction-and-comment</guid>
      <description>I was asked by my publisher at Sys-Con to send him my reaction to the comments on Slashdot.org about the test this month that the U.S. Dept. of Homeland Security is doing that are being called CyberStorm.&amp;nbsp; Rather than repost I figured I should provide a link to my comments,&amp;nbsp;but I can sum...</description>
      <pubDate>Tue, 07 Feb 2006 21:46:55 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>security</category>
      <category>cyberstorm</category>
      <category>reaction</category>
      <category>comments</category>
      <category>publisher</category>
      <category>slashdot</category>
      <category>homeland</category>
    </item>
    <item>
      <title>Code Camp Security Edition (mini)</title>
      <link>http://localhost:3000/blog/code-camp-security-edition-mini</link>
      <guid isPermaLink="true">http://localhost:3000/blog/code-camp-security-edition-mini</guid>
      <description>Duane and I are doing a mini (one day) Code Camp in Waltham in late March focused on security . We already have a pretty good list signed up so if you really want to come, register today. We are running it on Saturday,&amp;nbsp;March 25th starting first thing in the morning.&amp;nbsp; See you there.</description>
      <pubDate>Wed, 01 Feb 2006 15:59:07 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>events</category>
      <category>security</category>
      <category>speaking</category>
      <category>march</category>
      <category>code</category>
      <category>camp</category>
      <category>mini</category>
    </item>
    <item>
      <title>Creating Presentations</title>
      <link>http://localhost:3000/blog/creating-presentations</link>
      <guid isPermaLink="true">http://localhost:3000/blog/creating-presentations</guid>
      <description>I recently did something I do quite often, namely created a series of PowerPoints for a presentation.&amp;nbsp; I try to use graphics where appropriate or more accurately, pictures consisting of drawn boxes with arrows and other lines. I find that in some ways my presentations are better for lack of...</description>
      <pubDate>Thu, 26 Jan 2006 02:43:56 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>speaking</category>
      <category>training</category>
      <category>presentations</category>
      <category>graphics</category>
      <category>creating</category>
      <category>recently</category>
      <category>namely</category>
    </item>
    <item>
      <title>Languages with purpose</title>
      <link>http://localhost:3000/blog/languages-with-purpose</link>
      <guid isPermaLink="true">http://localhost:3000/blog/languages-with-purpose</guid>
      <description>A number of the Microsoft Regional Directors and I have been posting back and forth all day about the C# vs. VB.Net issue, but not in the way that contentious bone usually plays out. Rocky Lhotka not only started the thread, but he also was the first to bring it into public space with his post and...</description>
      <pubDate>Wed, 18 Jan 2006 02:41:58 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>development</category>
      <category>dotnet</category>
      <category>csharp</category>
      <category>microsoft</category>
      <category>purpose</category>
      <category>rocky</category>
      <category>languages</category>
    </item>
    <item>
      <title>AD Security Feature you should know about</title>
      <link>http://localhost:3000/blog/ad-security-feature-you-should-know-about</link>
      <guid isPermaLink="true">http://localhost:3000/blog/ad-security-feature-you-should-know-about</guid>
      <description>As the title of this site states, it is a real battle to keep up with the technology and an even bigger challenge to have a life along with that effort.&amp;nbsp; On a fairly regular basis now I realize this when a standard feature of a widely available tool or technology is virtually unknown and...</description>
      <pubDate>Fri, 13 Jan 2006 03:47:37 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>network</category>
      <category>security</category>
      <category>feature</category>
      <category>technology</category>
      <category>title</category>
      <category>states</category>
      <category>battle</category>
    </item>
    <item>
      <title>New Cannot Miss Tech Show Premieres</title>
      <link>http://localhost:3000/blog/new-cannot-miss-tech-show-premieres</link>
      <guid isPermaLink="true">http://localhost:3000/blog/new-cannot-miss-tech-show-premieres</guid>
      <description>Carl Franklin has done it again by teaming up with Scott Hanselman to bring us the podcast called HanselMinutes.&amp;nbsp; HanselMinutes is a deep technology podcast that I find very compelling as well as informative.&amp;nbsp; The combination of personalities (both of whom I am very happy to know well) is...</description>
      <pubDate>Wed, 11 Jan 2006 19:20:42 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>development</category>
      <category>podcast</category>
      <category>dotnet</category>
      <category>outlook</category>
      <category>hanselminutes</category>
      <category>miss</category>
      <category>tech</category>
    </item>
    <item>
      <title>Spyware is coming from all directions</title>
      <link>http://localhost:3000/blog/spyware-is-coming-from-all-directions</link>
      <guid isPermaLink="true">http://localhost:3000/blog/spyware-is-coming-from-all-directions</guid>
      <description>Mark Russinovich has posted another excellent article on Spyware , this time pointing out the anti-spyware program as spyware strategem. If you hoped that Spyware would just go out of fashion sometime this year, you are deluded.&amp;nbsp; The advent of better Rootkits, bogus anti-spyware programs (like...</description>
      <pubDate>Wed, 04 Jan 2006 19:28:56 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>security</category>
      <category>spyware</category>
      <category>pointing</category>
      <category>directions</category>
      <category>russinovich</category>
      <category>posted</category>
      <category>excellent</category>
    </item>
    <item>
      <title>Predictions for 2006</title>
      <link>http://localhost:3000/blog/predictions-for-2006</link>
      <guid isPermaLink="true">http://localhost:3000/blog/predictions-for-2006</guid>
      <description>I was asked by Sys-Con to make my predictions for 2006 and while I am loath to do this kind of thing, I did venture some.&amp;nbsp; We will see whether they turn out correct or not in about 12 months.</description>
      <pubDate>Tue, 27 Dec 2005 16:17:02 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>security</category>
      <category>predictions</category>
      <category>2006</category>
      <category>loath</category>
      <category>venture</category>
      <category>whether</category>
      <category>correct</category>
    </item>
    <item>
      <title>Bruce Backa Online</title>
      <link>http://localhost:3000/blog/bruce-backa-online</link>
      <guid isPermaLink="true">http://localhost:3000/blog/bruce-backa-online</guid>
      <description>My old friend and mentor, Bruce Backa is finally blogging and this is a MUST SEE!&amp;nbsp; If you want to learn lessons of business and technology the hard way then by all means ignore this, otherwise put this on your RSS reader and don’t miss a post.&amp;nbsp; I work with Bruce and I still plan to read...</description>
      <pubDate>Thu, 22 Dec 2005 03:20:31 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>events</category>
      <category>mentor</category>
      <category>business</category>
      <category>bruce</category>
      <category>backa</category>
      <category>online</category>
      <category>finally</category>
    </item>
    <item>
      <title>Fast Tips for VS 2005</title>
      <link>http://localhost:3000/blog/fast-tips-for-vs-2005</link>
      <guid isPermaLink="true">http://localhost:3000/blog/fast-tips-for-vs-2005</guid>
      <description>About a month ago I signed up for a newsletter called FastTips by Microsoft.&amp;nbsp; My old friend, Thom Robbins had a big hand in creating this and actually has done many of the demos I have watched (very well I might add).&amp;nbsp; I often get asked where people should go to get up to speed faster and...</description>
      <pubDate>Mon, 19 Dec 2005 15:14:29 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>development</category>
      <category>microsoft</category>
      <category>fast</category>
      <category>tips</category>
      <category>2005</category>
      <category>newsletter</category>
      <category>signed</category>
    </item>
    <item>
      <title>Boston Launch of VS 2005 and SQL 2005</title>
      <link>http://localhost:3000/blog/boston-launch-of-vs-2005-and-sql-2005</link>
      <guid isPermaLink="true">http://localhost:3000/blog/boston-launch-of-vs-2005-and-sql-2005</guid>
      <description>Microsoft held the Boston Launch event at the new Convention Center on Thursday and by all accounts it was very successful.&amp;nbsp; Duane Laflotte and I delivered the Web Development session to a pretty packed room.&amp;nbsp; Overall the event surpassed the 3,000 mark and everyone I talked to seemed very...</description>
      <pubDate>Sat, 17 Dec 2005 16:11:58 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>events</category>
      <category>speaking</category>
      <category>web-development</category>
      <category>sql</category>
      <category>microsoft</category>
      <category>boston</category>
      <category>launch</category>
    </item>
    <item>
      <title>Erik Kurilla might be portrayed by Bruce Willis</title>
      <link>http://localhost:3000/blog/erik-kurilla-might-be-portrayed-by-bruce-willis</link>
      <guid isPermaLink="true">http://localhost:3000/blog/erik-kurilla-might-be-portrayed-by-bruce-willis</guid>
      <description>In a personal topic post (which are fairly rare here I am proud to say) a while ago I reported&amp;nbsp;that a classmate of mine from West Point, Erik Kurilla was wounded in Iraq and gave some details.&amp;nbsp; I had to post a follow up especially given the news that Erik may end up being portrayed by...</description>
      <pubDate>Wed, 14 Dec 2005 04:16:40 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>personal</category>
      <category>kurilla</category>
      <category>portrayed</category>
      <category>erik</category>
      <category>bruce</category>
      <category>willis</category>
      <category>fairly</category>
    </item>
    <item>
      <title>Using the Web for fun and profit…</title>
      <link>http://localhost:3000/blog/using-the-web-for-fun-and-profit</link>
      <guid isPermaLink="true">http://localhost:3000/blog/using-the-web-for-fun-and-profit</guid>
      <description>I was recently in a discussion with some friends about Web 2.0 and what that all meant along with recently finishing a search for a hosting company for our dedicated servers.&amp;nbsp; The two conversations actually led me to do alot of research and to alot of conclusions about the “next big thing” and...</description>
      <pubDate>Mon, 12 Dec 2005 02:39:25 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>web-hosting</category>
      <category>dotnet</category>
      <category>security</category>
      <category>integration</category>
      <category>business</category>
      <category>optimization</category>
      <category>recently</category>
    </item>
    <item>
      <title>Using Basic Auth Correctly</title>
      <link>http://localhost:3000/blog/using-basic-auth-correctly</link>
      <guid isPermaLink="true">http://localhost:3000/blog/using-basic-auth-correctly</guid>
      <description>I am amazed that web developers often don’t know IIS configuration as well as they should given it is the platform all their code must run against.&amp;nbsp; The most pressing misconception concerns Basic Authentication.&amp;nbsp; When you configure a web site to support Basic Authentication...</description>
      <pubDate>Thu, 08 Dec 2005 04:47:02 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>security</category>
      <category>web-developer</category>
      <category>authentication</category>
      <category>iis</category>
      <category>ssl</category>
      <category>against</category>
      <category>support</category>
    </item>
    <item>
      <title>Bluetooth needs a better implementation</title>
      <link>http://localhost:3000/blog/bluetooth-needs-a-better-implementation</link>
      <guid isPermaLink="true">http://localhost:3000/blog/bluetooth-needs-a-better-implementation</guid>
      <description>I was browsing through the list of wireless vulnerabilities on the Wireless Vulnerabilities &amp;amp; Exploits site (our buddy Phil C pointed it out to me) and I was reminded why I always turn Bluetooth off on my devices or avoid them altogether. Maybe it is just that “B” is so early on, but there do...</description>
      <pubDate>Tue, 06 Dec 2005 02:41:24 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>security</category>
      <category>exchange</category>
      <category>bluetooth</category>
      <category>wireless</category>
      <category>vulnerabilities</category>
      <category>exploits</category>
      <category>devices</category>
    </item>
    <item>
      <title>Digital Contracts</title>
      <link>http://localhost:3000/blog/digital-contracts</link>
      <guid isPermaLink="true">http://localhost:3000/blog/digital-contracts</guid>
      <description>A friend of mine who is doing business with us posed an interesting question about the digital nature of our contracts.&amp;nbsp; He said that with paper contracts you have the original that can be examined for changes and modifications.&amp;nbsp; You can’t white out a term or condition or add a few zeros...</description>
      <pubDate>Mon, 05 Dec 2005 02:42:02 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>security</category>
      <category>business</category>
      <category>contracts</category>
      <category>digital</category>
      <category>changes</category>
      <category>document</category>
      <category>signature</category>
    </item>
    <item>
      <title>Total Destruction and a bit about cyanide</title>
      <link>http://localhost:3000/blog/total-destruction-and-a-bit-about-cyanide</link>
      <guid isPermaLink="true">http://localhost:3000/blog/total-destruction-and-a-bit-about-cyanide</guid>
      <description>I try to read the blog of Dave Hitz, one of the founders of Network Appliance, and while I don’t link all the time I found one of his entries pretty on topic. Like my title above, Dave stole the most provocative words from his post to stir interest.&amp;nbsp; His post is titled, “ Beware of Cyanide Gas...</description>
      <pubDate>Mon, 21 Nov 2005 23:52:24 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>security</category>
      <category>cyanide</category>
      <category>total</category>
      <category>destruction</category>
      <category>founders</category>
      <category>network</category>
      <category>appliance</category>
    </item>
    <item>
      <title>Physical Defense</title>
      <link>http://localhost:3000/blog/physical-defense</link>
      <guid isPermaLink="true">http://localhost:3000/blog/physical-defense</guid>
      <description>I had a conversation with a friend of mine recently about the physical protection of his home.&amp;nbsp; I have a bit of a reputation as a gun enthusiast that is somewhat earned.&amp;nbsp; What surprised my friend and got him to urge me to post this entry is that my advice was a surprise to him and...</description>
      <pubDate>Thu, 10 Nov 2005 19:33:39 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>personal</category>
      <category>security</category>
      <category>less</category>
      <category>physical</category>
      <category>defense</category>
      <category>conversation</category>
      <category>recently</category>
    </item>
    <item>
      <title>Sony writes a RootKit</title>
      <link>http://localhost:3000/blog/sony-writes-a-rootkit</link>
      <guid isPermaLink="true">http://localhost:3000/blog/sony-writes-a-rootkit</guid>
      <description>Mark Russinovich is a brilliant guy and likely not so popular with the people at Sony these days.&amp;nbsp; Mark was testing out some root kit detection and removal software and discovered that in their exuberance to implement Digital Rights Management Sony has created a very ham handed solution that...</description>
      <pubDate>Thu, 03 Nov 2005 19:47:12 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>development</category>
      <category>security</category>
      <category>testing</category>
      <category>management</category>
      <category>sony</category>
      <category>rootkit</category>
      <category>writes</category>
    </item>
    <item>
      <title>Issues with generating accounts and passwords</title>
      <link>http://localhost:3000/blog/issues-with-generating-accounts-and-passwords</link>
      <guid isPermaLink="true">http://localhost:3000/blog/issues-with-generating-accounts-and-passwords</guid>
      <description>A friend of mine has a system that will require them to generage a large number of username and passwords for their users and they want to use usernames that make sense to the users.&amp;nbsp; That is a common request, but he is concerned that a saavy user could deduce the username of others based on...</description>
      <pubDate>Mon, 31 Oct 2005 20:31:58 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>development</category>
      <category>security</category>
      <category>windows</category>
      <category>hacking</category>
      <category>vulnerability</category>
      <category>passwords</category>
      <category>username</category>
    </item>
    <item>
      <title>Your Name in Lights…</title>
      <link>http://localhost:3000/blog/your-name-in-lights</link>
      <guid isPermaLink="true">http://localhost:3000/blog/your-name-in-lights</guid>
      <description>Thom Robbins of MS is introducing a really cool competition called the “Launch 2005 Screencast Contest”.&amp;nbsp; The concept is that you get a free 30 day copy of Camtasia and record one or more demos with audio.&amp;nbsp; The entries will be screened and the winners in the major launch cities will win...</description>
      <pubDate>Tue, 25 Oct 2005 18:03:02 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>development</category>
      <category>events</category>
      <category>launch</category>
      <category>your</category>
      <category>name</category>
      <category>contest</category>
      <category>lights</category>
    </item>
    <item>
      <title>Rootkits are everywhere</title>
      <link>http://localhost:3000/blog/rootkits-are-everywhere</link>
      <guid isPermaLink="true">http://localhost:3000/blog/rootkits-are-everywhere</guid>
      <description>In the media and likely on your network!&amp;nbsp; I am suprised (pleasantly) to see so much attention being paid to a lurking menace.&amp;nbsp; Jon Box recently posted about it on his blog and called for a few of us to comment (which I did). The fact of the matter is that Rootkits are like the devil,...</description>
      <pubDate>Mon, 17 Oct 2005 22:03:20 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>rootkits</category>
      <category>media</category>
      <category>network</category>
      <category>posted</category>
      <category>everywhere</category>
      <category>suprised</category>
      <category>pleasantly</category>
    </item>
    <item>
      <title>Prime example of XSS</title>
      <link>http://localhost:3000/blog/prime-example-of-xss</link>
      <guid isPermaLink="true">http://localhost:3000/blog/prime-example-of-xss</guid>
      <description>My nephew, John Hynds, also happens to be a security consultant (big surprise) and he pointed me at a recent what we think it a perfect example of a Cross Site Scripting (XSS) exploit as carried out against MySpace.com . We find that most people have trouble understanding Cross Site Scripting as an...</description>
      <pubDate>Fri, 14 Oct 2005 20:22:32 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>security</category>
      <category>exploit</category>
      <category>sql</category>
      <category>less</category>
      <category>example</category>
      <category>cross</category>
      <category>scripting</category>
    </item>
    <item>
      <title>TechEd Hong Kong Wrap-up</title>
      <link>http://localhost:3000/blog/teched-hong-kong-wrap-up</link>
      <guid isPermaLink="true">http://localhost:3000/blog/teched-hong-kong-wrap-up</guid>
      <description>I have been out of it for about a week due to travel to present 7 sessions at TechEd Hong Kong , but now I am back.&amp;nbsp; It was a great event and as usual was characterized by very high energy keynotes! The highlight for Bruce Backa and I in our presentations was our last session on Server Control...</description>
      <pubDate>Thu, 13 Oct 2005 15:37:59 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>development</category>
      <category>speaking</category>
      <category>dotnet</category>
      <category>asp-net</category>
      <category>ajax</category>
      <category>microsoft</category>
      <category>teched</category>
    </item>
    <item>
      <title>Security Tool moves to Closed Source</title>
      <link>http://localhost:3000/blog/security-tool-moves-to-closed-source</link>
      <guid isPermaLink="true">http://localhost:3000/blog/security-tool-moves-to-closed-source</guid>
      <description>The vulnerability scanner called&amp;nbsp;Nessus will no longer be available under a GPL license starting with the next version (version 3.0). The announcement pointed to the fact that the community has done very little to help the product evolve, but many competitors have exploited the loophole of...</description>
      <pubDate>Fri, 07 Oct 2005 22:24:51 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>security</category>
      <category>vulnerability-scan</category>
      <category>gpl</category>
      <category>license</category>
      <category>community</category>
      <category>version</category>
      <category>tool</category>
    </item>
    <item>
      <title>My Demo on MSDN</title>
      <link>http://localhost:3000/blog/my-demo-on-msdn</link>
      <guid isPermaLink="true">http://localhost:3000/blog/my-demo-on-msdn</guid>
      <description>Microsoft’s Channel 9 web site is putting up demos like mine on Looking at Server Controls with ASP.Net 2.0 (with an AJAX demo) &amp;nbsp;and I must say it is a cool idea.&amp;nbsp; They are like video blog posts.&amp;nbsp; Duane Laflotte also posted like 3 of them on subjects Exploring the Crypto API in .Net...</description>
      <pubDate>Fri, 30 Sep 2005 16:18:21 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>security</category>
      <category>speaking</category>
      <category>dotnet</category>
      <category>asp-net</category>
      <category>microsoft</category>
      <category>ajax</category>
      <category>crypto</category>
    </item>
    <item>
      <title>Credit Company Standard: Friend of Foe?</title>
      <link>http://localhost:3000/blog/credit-company-standard-friend-of-foe</link>
      <guid isPermaLink="true">http://localhost:3000/blog/credit-company-standard-friend-of-foe</guid>
      <description>The three major credit companies are banding together to put all our eggs in one basket.&amp;nbsp; On many levels this kind of uniformity makes sense as it likely means more resources are being put on the problem, the consumers of the credit information are less likely to make mistakes associated with...</description>
      <pubDate>Tue, 27 Sep 2005 21:10:20 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>security</category>
      <category>less</category>
      <category>community</category>
      <category>credit</category>
      <category>three</category>
      <category>means</category>
      <category>company</category>
    </item>
    <item>
      <title>Code Camp 4 is Upon Us</title>
      <link>http://localhost:3000/blog/code-camp-4-is-upon-us</link>
      <guid isPermaLink="true">http://localhost:3000/blog/code-camp-4-is-upon-us</guid>
      <description>New England is where the whole Code Camp phenomenon began and than God that I am not doing 12 sessions in 2 days the way I did for the first one! But I am doing 3 sessions this weekend at the 4th Code Camp themed “Developers Gone Wild”. Thom Robbins has the details posted as well as a link to...</description>
      <pubDate>Fri, 23 Sep 2005 03:18:28 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>events</category>
      <category>speaking</category>
      <category>sessions</category>
      <category>code</category>
      <category>camp</category>
      <category>upon</category>
      <category>england</category>
    </item>
    <item>
      <title>Obscurity Adds to Defense</title>
      <link>http://localhost:3000/blog/obscurity-adds-to-defense</link>
      <guid isPermaLink="true">http://localhost:3000/blog/obscurity-adds-to-defense</guid>
      <description>Many security experts who I hold in the highest esteem are ticking me off! I hear it all over that, “you should never use obscurity as security” and while I agree if you put the word “only” in front of obscurity, but otherwise you are often teaching the wrong lesson. When I was in the Infantry, we...</description>
      <pubDate>Wed, 21 Sep 2005 03:33:47 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>security</category>
      <category>obscurity</category>
      <category>defense</category>
      <category>adds</category>
      <category>front</category>
      <category>lesson</category>
      <category>experts</category>
    </item>
    <item>
      <title>No Photographs Please…</title>
      <link>http://localhost:3000/blog/no-photographs-please</link>
      <guid isPermaLink="true">http://localhost:3000/blog/no-photographs-please</guid>
      <description>While I was at PDC I attended a slew of NDA briefings from Microsoft.&amp;nbsp; During one of them a flash went off and some people got understandably upset that someone might post a picture of a product being shown under strict privacy.&amp;nbsp; It turned out that nothing untoward occurred and no picture...</description>
      <pubDate>Mon, 19 Sep 2005 18:10:45 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>security</category>
      <category>microsoft</category>
      <category>picture</category>
      <category>photographs</category>
      <category>please</category>
      <category>attended</category>
      <category>briefings</category>
    </item>
    <item>
      <title>PDC Last Day</title>
      <link>http://localhost:3000/blog/pdc-last-day</link>
      <guid isPermaLink="true">http://localhost:3000/blog/pdc-last-day</guid>
      <description>As I got caught up on the activities here at the PDC in Los Angeles, I fell off the wagon of posting about what has gone on.&amp;nbsp; Overall it was a good event, but there weren’t a ton of surprises.&amp;nbsp; As I write this I am listening to Michael Howard explain the updated threat modeling thinking...</description>
      <pubDate>Fri, 16 Sep 2005 16:13:49 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>events</category>
      <category>security</category>
      <category>threat-model</category>
      <category>enterprise</category>
      <category>modeling</category>
      <category>activities</category>
      <category>caught</category>
    </item>
    <item>
      <title>PDC Opening Keynote</title>
      <link>http://localhost:3000/blog/pdc-opening-keynote</link>
      <guid isPermaLink="true">http://localhost:3000/blog/pdc-opening-keynote</guid>
      <description>I am writing this from Bill Gates’ keynote at PDC in Los Angeles.&amp;nbsp; User experience is definitely the message of the day.&amp;nbsp; Windows Vista is a clear indication of the MS belief that if you build a better interface then they will come (or stay as the case may be). Atlas, which will allow MS...</description>
      <pubDate>Tue, 13 Sep 2005 16:29:02 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>events</category>
      <category>security</category>
      <category>windows</category>
      <category>phishing</category>
      <category>google</category>
      <category>office</category>
      <category>xml</category>
    </item>
    <item>
      <title>See you at PDC</title>
      <link>http://localhost:3000/blog/see-you-at-pdc</link>
      <guid isPermaLink="true">http://localhost:3000/blog/see-you-at-pdc</guid>
      <description>I am off to Microsoft’s Professional Developer’s Conference (PDC) this weekend.&amp;nbsp; I expect that I will see many of the people who read this at the event in Los Angeles.&amp;nbsp; While there I will be involved in quite a few activities including speaking at the So Cal .Net User Group’s PDC...</description>
      <pubDate>Fri, 09 Sep 2005 20:26:53 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>events</category>
      <category>speaking</category>
      <category>user-group</category>
      <category>dotnet</category>
      <category>conference</category>
      <category>microsoft</category>
      <category>professional</category>
    </item>
    <item>
      <title>Hackers, Terrorists, Same Strategy!</title>
      <link>http://localhost:3000/blog/hackers-terrorists-same-strategy</link>
      <guid isPermaLink="true">http://localhost:3000/blog/hackers-terrorists-same-strategy</guid>
      <description>I had a very interesting discussion that manifested itself as Duane Laflotte and I delivered our popular Hacker vs. Hacker session.&amp;nbsp; I showed a technique that crashes the hacker’s computer when they try to brute force a web site (not for the faint of heart) and the very popular and legitimate...</description>
      <pubDate>Thu, 08 Sep 2005 03:26:24 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>security</category>
      <category>hacker</category>
      <category>strategy</category>
      <category>popular</category>
      <category>terrorists</category>
      <category>interesting</category>
      <category>discussion</category>
    </item>
    <item>
      <title>Where is the Sacrifice?</title>
      <link>http://localhost:3000/blog/where-is-the-sacrifice</link>
      <guid isPermaLink="true">http://localhost:3000/blog/where-is-the-sacrifice</guid>
      <description>In the wake of Hurricane Katrina, I am renewed in my frustration that the US government hasn’t called on the population to buckle down and conserve energy.&amp;nbsp; In light of the Hurricane relief effort it would be, “Save energy and put the money toward relief causes”.&amp;nbsp; During WWII the...</description>
      <pubDate>Thu, 01 Sep 2005 14:33:01 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>personal</category>
      <category>energy</category>
      <category>hurricane</category>
      <category>relief</category>
      <category>government</category>
      <category>population</category>
      <category>conserve</category>
    </item>
    <item>
      <title>Trading CPU for Money</title>
      <link>http://localhost:3000/blog/trading-cpu-for-money</link>
      <guid isPermaLink="true">http://localhost:3000/blog/trading-cpu-for-money</guid>
      <description>The deeper I dig into each generation of tools (VS 2005 at the moment) the more I see the trade off of CPU for developer time.&amp;nbsp; It used to be that the programmer would go to extremes to maximize the performance of their code and that the tools were written in much the same way.&amp;nbsp; Over the...</description>
      <pubDate>Tue, 30 Aug 2005 17:56:29 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>development</category>
      <category>performance</category>
      <category>exchange</category>
      <category>productivity</category>
      <category>tools</category>
      <category>trading</category>
      <category>money</category>
    </item>
    <item>
      <title>Sony Outflanks Hackers</title>
      <link>http://localhost:3000/blog/sony-outflanks-hackers</link>
      <guid isPermaLink="true">http://localhost:3000/blog/sony-outflanks-hackers</guid>
      <description>For a week or so… Sony is now providing an update to their PSP game system that provides a web browser most likely because hackers have been finding ways to enable web browsing on their own.&amp;nbsp; It is a smart move, but it certainly won’t stop users from reverse engineering every single aspect of...</description>
      <pubDate>Tue, 30 Aug 2005 00:32:44 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>security</category>
      <category>browser</category>
      <category>leadership</category>
      <category>hackers</category>
      <category>their</category>
      <category>sony</category>
      <category>providing</category>
    </item>
    <item>
      <title>Code Camp 4</title>
      <link>http://localhost:3000/blog/code-camp-4</link>
      <guid isPermaLink="true">http://localhost:3000/blog/code-camp-4</guid>
      <description>In New England&amp;nbsp;we are holding our fourth Code Camp in late September (24th and 25th) in the Waltham, MA&amp;nbsp;offices of Microsoft.&amp;nbsp; This is where it all began and the fourth will likely be bigger than those before it. I wanted to not only remind people of the date, but also tell about a...</description>
      <pubDate>Wed, 24 Aug 2005 19:30:47 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>events</category>
      <category>speaking</category>
      <category>best-practice</category>
      <category>microsoft</category>
      <category>meeting</category>
      <category>community</category>
      <category>office</category>
    </item>
    <item>
      <title>Wounded in Iraq</title>
      <link>http://localhost:3000/blog/wounded-in-iraq</link>
      <guid isPermaLink="true">http://localhost:3000/blog/wounded-in-iraq</guid>
      <description>A classmate of mine from West Point, LTC Erik Kurilla, was wounded (shot 3 times it seems) while serving as a combat commander in Iraq.&amp;nbsp; While I rarely (almost never) bring personal stuff into my blog and as you will see I will weave this a bit toward my favorite subject of security, but I...</description>
      <pubDate>Mon, 22 Aug 2005 02:50:17 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>personal</category>
      <category>security</category>
      <category>wounded</category>
      <category>kurilla</category>
      <category>combat</category>
      <category>iraq</category>
      <category>commander</category>
    </item>
    <item>
      <title>Phishing Exposed</title>
      <link>http://localhost:3000/blog/phishing-exposed</link>
      <guid isPermaLink="true">http://localhost:3000/blog/phishing-exposed</guid>
      <description>I know there is alot of information about Phishing attacks (attempts to trick users into logging into fake sites with credentials for things like ebay or paypal), but I am seeing more and more sophisticated attacks and felt that I had to raise the warning again.&amp;nbsp; In our company and those...</description>
      <pubDate>Wed, 17 Aug 2005 14:09:09 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>security</category>
      <category>phishing</category>
      <category>logging</category>
      <category>virus</category>
      <category>outlook</category>
      <category>browser</category>
      <category>paypal</category>
    </item>
    <item>
      <title>Shared Hosting Pro and Con</title>
      <link>http://localhost:3000/blog/shared-hosting-pro-and-con</link>
      <guid isPermaLink="true">http://localhost:3000/blog/shared-hosting-pro-and-con</guid>
      <description>I have started to encounter more and more instances where companies want to get out of the business of hosting websites themselves and since the price of outsourced web hosting has dropped the use of shared and dedicated server hosting has accelerated.&amp;nbsp; There are many security as well as...</description>
      <pubDate>Tue, 16 Aug 2005 14:37:04 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>security</category>
      <category>web-hosting</category>
      <category>business</category>
      <category>course</category>
      <category>server</category>
      <category>shared</category>
      <category>price</category>
    </item>
    <item>
      <title>Military Strategy Applied to Security</title>
      <link>http://localhost:3000/blog/military-strategy-applied-to-security</link>
      <guid isPermaLink="true">http://localhost:3000/blog/military-strategy-applied-to-security</guid>
      <description>It is no secret to anyone who knows me or has heard me speak on the subject of security that I have learned quite a bit of my way of thinking about computer and Internet security while serving in the military and while attending the United States Military Academy (West Point).&amp;nbsp; I tend to think...</description>
      <pubDate>Wed, 10 Aug 2005 21:30:05 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>security</category>
      <category>strategy</category>
      <category>hacker</category>
      <category>military</category>
      <category>applied</category>
      <category>secret</category>
      <category>heard</category>
    </item>
    <item>
      <title>Quarantine VPN</title>
      <link>http://localhost:3000/blog/quarantine-vpn</link>
      <guid isPermaLink="true">http://localhost:3000/blog/quarantine-vpn</guid>
      <description>Windows 2003 Server Pack 1 has a new capability that you might want to look into called Quarantine VPN. With this technique you can validate that all clients that connect to your VPN meet specific requirements before they actually get access to network resources.&amp;nbsp; Microsoft has been doing this...</description>
      <pubDate>Mon, 08 Aug 2005 14:57:56 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>network</category>
      <category>security</category>
      <category>vpn</category>
      <category>windows</category>
      <category>microsoft</category>
      <category>quarantine</category>
      <category>capability</category>
    </item>
    <item>
      <title>Change in Blog</title>
      <link>http://localhost:3000/blog/change-in-blog</link>
      <guid isPermaLink="true">http://localhost:3000/blog/change-in-blog</guid>
      <description>As you might have noticed I am reworking my blog (bit of a face lift and some bug fixes), but I am also changing the URL.&amp;nbsp; I registered www.PatrickHynds.com and while I am leaving the blog accessible from the old address I am changing the redirects so let me know if it causes trouble. Lets...</description>
      <pubDate>Fri, 05 Aug 2005 14:50:33 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>changing</category>
      <category>change</category>
      <category>noticed</category>
      <category>reworking</category>
      <category>fixes</category>
      <category>registered</category>
      <category>patrickhynds</category>
    </item>
    <item>
      <title>Least Privilege for Network Administrators</title>
      <link>http://localhost:3000/blog/least-privilege-for-network-administrators</link>
      <guid isPermaLink="true">http://localhost:3000/blog/least-privilege-for-network-administrators</guid>
      <description>The concept of Least Privilege is applied to developers and software testers all the time to advocate that the application be developed and tested using the lowest privileged account possible to get the job done. &amp;nbsp; For our purposes (network administration), I am referring to using...</description>
      <pubDate>Thu, 04 Aug 2005 16:41:36 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>network</category>
      <category>security</category>
      <category>least-privilege</category>
      <category>windows</category>
      <category>administrators</category>
      <category>developers</category>
      <category>administration</category>
    </item>
    <item>
      <title>Who knows the password?</title>
      <link>http://localhost:3000/blog/who-knows-the-password</link>
      <guid isPermaLink="true">http://localhost:3000/blog/who-knows-the-password</guid>
      <description>I have spent alot of time recently talking about passwords and I think the reason that I can’t seem to get off the subject is that there is so much that has to change about the way passwords are actually handled by companies.&amp;nbsp; Most recently I had a discussion that caused me to poll several...</description>
      <pubDate>Tue, 26 Jul 2005 20:45:42 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>security</category>
      <category>best-practice</category>
      <category>cisco</category>
      <category>less</category>
      <category>passwords</category>
      <category>recently</category>
      <category>change</category>
    </item>
    <item>
      <title>Security Sector in Consolidation?</title>
      <link>http://localhost:3000/blog/security-sector-in-consolidation</link>
      <guid isPermaLink="true">http://localhost:3000/blog/security-sector-in-consolidation</guid>
      <description>I am seeing the signs that the Security business is going through a consolidation as some of the bigger names buy up smaller firms to cover their bases.&amp;nbsp; Most recently, VeriSign bought iDefense for $40 Million .&amp;nbsp; I don’t think this is THE consolidation as there are many, many more...</description>
      <pubDate>Fri, 15 Jul 2005 15:30:29 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>security</category>
      <category>business</category>
      <category>consolidation</category>
      <category>sector</category>
      <category>signs</category>
      <category>through</category>
      <category>bigger</category>
    </item>
    <item>
      <title>Tsunami Relief Auction Part 2</title>
      <link>http://localhost:3000/blog/tsunami-relief-auction-part-2</link>
      <guid isPermaLink="true">http://localhost:3000/blog/tsunami-relief-auction-part-2</guid>
      <description>For those of you that haven’t heard, I am participating in yet another Ebay auction to raise money for Tsunami relief.&amp;nbsp; I know the media has moved on, but many people are still in trouble and need help.&amp;nbsp; If you want to be a puppeteer for an hour with me or some of the biggest speakers at...</description>
      <pubDate>Thu, 16 Jun 2005 02:00:02 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>events</category>
      <category>security</category>
      <category>tsunami</category>
      <category>relief</category>
      <category>auction</category>
      <category>haven</category>
      <category>heard</category>
    </item>
    <item>
      <title>TechEd 2005 GrokTalks</title>
      <link>http://localhost:3000/blog/teched-2005-groktalks</link>
      <guid isPermaLink="true">http://localhost:3000/blog/teched-2005-groktalks</guid>
      <description>For those of you going to TechEd this year, I hope we see you at the RD GrokTalks.&amp;nbsp; I would define them here, but Scott Hanselman has already put it so well than I imagine I am best off linking to his post here . Let me know what you think of the idea.</description>
      <pubDate>Tue, 31 May 2005 16:27:28 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>events</category>
      <category>speaking</category>
      <category>teched</category>
      <category>groktalks</category>
      <category>2005</category>
      <category>define</category>
      <category>scott</category>
    </item>
    <item>
      <title>Password Security awareness and the MMORPG</title>
      <link>http://localhost:3000/blog/password-security-awareness-and-the-mmorpg</link>
      <guid isPermaLink="true">http://localhost:3000/blog/password-security-awareness-and-the-mmorpg</guid>
      <description>Just recently I talked about online password security and I referred to the way most sites on the Internet handle passwords as the Ugly in my “the Good, the Bad and the Ugly” slide.&amp;nbsp; Most sites I visit not only allow me to put in a woefully weak password, but don’t allow me to set a strong one...</description>
      <pubDate>Mon, 30 May 2005 19:53:59 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>security</category>
      <category>dotnet</category>
      <category>password</category>
      <category>allow</category>
      <category>online</category>
      <category>awareness</category>
      <category>mmorpg</category>
    </item>
    <item>
      <title>Preventing SQL Injection is not enough</title>
      <link>http://localhost:3000/blog/preventing-sql-injection-is-not-enough</link>
      <guid isPermaLink="true">http://localhost:3000/blog/preventing-sql-injection-is-not-enough</guid>
      <description>A customer said today that they are using stored procedures so unless I knew of any other SQL Injection risks then they thought that was enough.&amp;nbsp; The truth is that the answer is that this is true in most people’s minds.&amp;nbsp; The problem is that this common mindset is exactly the kind of thing...</description>
      <pubDate>Fri, 27 May 2005 20:24:52 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>security</category>
      <category>sql</category>
      <category>hacker</category>
      <category>browser</category>
      <category>injection</category>
      <category>their</category>
      <category>stored</category>
    </item>
    <item>
      <title>Organized Crime’s Link to Spyware</title>
      <link>http://localhost:3000/blog/organized-crime-s-link-to-spyware</link>
      <guid isPermaLink="true">http://localhost:3000/blog/organized-crime-s-link-to-spyware</guid>
      <description>The stereotype of the malware and spyware author is the lone disgruntled hacker who has squandered their talent on rage and hate.&amp;nbsp; Sounds like the perfect villian for a melodrama.&amp;nbsp; It turns out that the truth is much worse.&amp;nbsp; The driving force behind most of this software is actually...</description>
      <pubDate>Thu, 26 May 2005 14:11:14 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>security</category>
      <category>malware</category>
      <category>hacker</category>
      <category>hacking</category>
      <category>spyware</category>
      <category>organized</category>
      <category>crime</category>
    </item>
    <item>
      <title>Comments on Writing Down Passwords</title>
      <link>http://localhost:3000/blog/comments-on-writing-down-passwords</link>
      <guid isPermaLink="true">http://localhost:3000/blog/comments-on-writing-down-passwords</guid>
      <description>I just read an article which quotes Jesper Johansson as saying that we should reverse the long held truism that users should not write their passwords down for their own reference.&amp;nbsp; Jesper is a well respected (though often contreversial) Security Heavyweight who has worked for Microsoft for...</description>
      <pubDate>Tue, 24 May 2005 16:03:15 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>security</category>
      <category>microsoft</category>
      <category>less</category>
      <category>training</category>
      <category>passwords</category>
      <category>their</category>
      <category>jesper</category>
    </item>
    <item>
      <title>TechEd Attendees Gone Wild…</title>
      <link>http://localhost:3000/blog/teched-attendees-gone-wild</link>
      <guid isPermaLink="true">http://localhost:3000/blog/teched-attendees-gone-wild</guid>
      <description>As we start to ramp up for TechEd US things are already getting weird.&amp;nbsp; I shouldn’t be surprised, but two guys that I know well and expect most of the people who read this also know of created a video redolent with inside jokes .&amp;nbsp; Scott Hanselman and Rory Blythe star in this very short...</description>
      <pubDate>Mon, 14 Mar 2005 16:36:25 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>events</category>
      <category>teched</category>
      <category>video</category>
      <category>gone</category>
      <category>wild</category>
      <category>attendees</category>
      <category>weird</category>
    </item>
    <item>
      <title>Don’t be a softer alternative…</title>
      <link>http://localhost:3000/blog/don-t-be-a-softer-alternative</link>
      <guid isPermaLink="true">http://localhost:3000/blog/don-t-be-a-softer-alternative</guid>
      <description>A recent article about terrorists being behind continued attacks on our energy companies in an attempt to disrupt the power grid made me realize that this should serve as a wake up call for the rest of us.&amp;nbsp; If you are running a business related web site in the US or one of its allies you have...</description>
      <pubDate>Sat, 12 Mar 2005 03:58:27 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>security</category>
      <category>rest</category>
      <category>business</category>
      <category>hacker</category>
      <category>hacking</category>
      <category>softer</category>
      <category>alternative</category>
    </item>
    <item>
      <title>Nick Landry (ActiveNick) starts blogging on Mobility…</title>
      <link>http://localhost:3000/blog/nick-landry-activenick-starts-blogging-on-mobility</link>
      <guid isPermaLink="true">http://localhost:3000/blog/nick-landry-activenick-starts-blogging-on-mobility</guid>
      <description>If you have ever seen him speak then I don’t have to go any further than the title.&amp;nbsp; His handle of ActiveNick fits him on so many levels and his blog is no exception.&amp;nbsp; He has posted very regularly and I expect great things from him with lots of cool and insightful things on mobility and...</description>
      <pubDate>Fri, 11 Mar 2005 04:23:18 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>dotnet</category>
      <category>activenick</category>
      <category>mobility</category>
      <category>landry</category>
      <category>blogging</category>
      <category>speak</category>
      <category>title</category>
    </item>
    <item>
      <title>New Version of Device Lock Available</title>
      <link>http://localhost:3000/blog/new-version-of-device-lock-available</link>
      <guid isPermaLink="true">http://localhost:3000/blog/new-version-of-device-lock-available</guid>
      <description>For those of you that don’t know, a big concern in companies vulnerable to corporate espionage (almost everybody) is employees walking away with a USB drive full of confidential data.&amp;nbsp; Device Lock has solved this problem for several of our clients and they have just released a new version. If...</description>
      <pubDate>Mon, 28 Feb 2005 17:51:47 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>security</category>
      <category>version</category>
      <category>device</category>
      <category>lock</category>
      <category>available</category>
      <category>concern</category>
      <category>companies</category>
    </item>
    <item>
      <title>Fear and Loathing…</title>
      <link>http://localhost:3000/blog/fear-and-loathing</link>
      <guid isPermaLink="true">http://localhost:3000/blog/fear-and-loathing</guid>
      <description>In case some of you have noticed recently there was an article on zdnet (not my favorite publication anyways) that quoted James Gosling, Sun’s CTO, stating that “ Microsoft’s decision to support C and C++ in the common language runtime in .Net one of the “biggest and most offensive mistakes that...</description>
      <pubDate>Mon, 07 Feb 2005 20:53:38 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>security</category>
      <category>dotnet</category>
      <category>microsoft</category>
      <category>fear</category>
      <category>loathing</category>
      <category>noticed</category>
      <category>recently</category>
    </item>
    <item>
      <title>Strangest and Coolest thing…</title>
      <link>http://localhost:3000/blog/strangest-and-coolest-thing</link>
      <guid isPermaLink="true">http://localhost:3000/blog/strangest-and-coolest-thing</guid>
      <description>My good buddy, Stephen Forte , had a zany and brilliant idea (we are used to both from him, just not at the same time)! The concept is that about 20 of&amp;nbsp;us that do the book and speaker thing have offered up consulting time to be auctioned off on eBay with all proceeds going to Tsunami...</description>
      <pubDate>Fri, 21 Jan 2005 15:58:49 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>events</category>
      <category>stephen</category>
      <category>strangest</category>
      <category>coolest</category>
      <category>buddy</category>
      <category>forte</category>
      <category>brilliant</category>
    </item>
    <item>
      <title>MSDN Events Winter Schedule</title>
      <link>http://localhost:3000/blog/msdn-events-winter-schedule</link>
      <guid isPermaLink="true">http://localhost:3000/blog/msdn-events-winter-schedule</guid>
      <description>MSDN puts on local events and it is that time again.&amp;nbsp; I just checked out the registration site and have decided to go to the Bedford, NH event this Thursday.&amp;nbsp; I have the added advantage that Joe Stagner runs these events in my area, but I know that other sections of the country also have...</description>
      <pubDate>Tue, 11 Jan 2005 15:36:51 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>events</category>
      <category>msdn</category>
      <category>winter</category>
      <category>schedule</category>
      <category>local</category>
      <category>checked</category>
      <category>registration</category>
    </item>
    <item>
      <title>Test your Browser, then Secure it</title>
      <link>http://localhost:3000/blog/test-your-browser-then-secure-it</link>
      <guid isPermaLink="true">http://localhost:3000/blog/test-your-browser-then-secure-it</guid>
      <description>If you use Internet Explorer then you should pay close attention to this… An exploit to security holes in Internet Explorer (even if you have XP SP2 installed) has been posted by a group called GreyHats.&amp;nbsp; They are not happy that MS has not fixed the exploits since they were made known in...</description>
      <pubDate>Mon, 10 Jan 2005 18:24:07 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>security</category>
      <category>browser</category>
      <category>exploit</category>
      <category>internet</category>
      <category>explorer</category>
      <category>test</category>
      <category>your</category>
    </item>
    <item>
      <title>Google Search as a Virus Vector</title>
      <link>http://localhost:3000/blog/google-search-as-a-virus-vector</link>
      <guid isPermaLink="true">http://localhost:3000/blog/google-search-as-a-virus-vector</guid>
      <description>It seems to hold true that any tool can have a good and a bad use.&amp;nbsp; In a recent attacks, Google was used as a support mechanism for spreading a virus and defacing web sites . While there isn’t anyone who can guarentee that a particular package or product won’t be vulnerable, it does pay to...</description>
      <pubDate>Thu, 23 Dec 2004 14:09:47 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>security</category>
      <category>google</category>
      <category>virus</category>
      <category>search</category>
      <category>vector</category>
      <category>attacks</category>
      <category>support</category>
    </item>
    <item>
      <title>Beta Beware!</title>
      <link>http://localhost:3000/blog/beta-beware</link>
      <guid isPermaLink="true">http://localhost:3000/blog/beta-beware</guid>
      <description>A recent article &amp;nbsp;about a security flaw in the new Google Desktop Beta should serve as another reminder that you should never use beta software on production machines.&amp;nbsp; The rule for me has always gone that if I would be upset by a total rebuild of the box, then only tested and finished...</description>
      <pubDate>Mon, 20 Dec 2004 22:37:39 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>security</category>
      <category>google</category>
      <category>beta</category>
      <category>software</category>
      <category>beware</category>
      <category>desktop</category>
      <category>serve</category>
    </item>
    <item>
      <title>Member Management Component Prototype available</title>
      <link>http://localhost:3000/blog/member-management-component-prototype-available</link>
      <guid isPermaLink="true">http://localhost:3000/blog/member-management-component-prototype-available</guid>
      <description>MS has made available a preview of the Member Management Component that you can use to build into .Net 1.1 sample applications.&amp;nbsp; It isn’t exactly what will be released with VS.Net 2005, but it gives you something to play with so you can get used to the new model. Be advised that it seems that...</description>
      <pubDate>Tue, 14 Dec 2004 19:01:51 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>security</category>
      <category>management</category>
      <category>dotnet</category>
      <category>member</category>
      <category>component</category>
      <category>available</category>
      <category>applications</category>
    </item>
    <item>
      <title>Password Ownership</title>
      <link>http://localhost:3000/blog/password-ownership</link>
      <guid isPermaLink="true">http://localhost:3000/blog/password-ownership</guid>
      <description>Who owns the passwords that you or your users use to access your network or application? If you don’t know, then you have a problem.&amp;nbsp; Your users hopefully memorize their passwords, but therein lies the rub.&amp;nbsp; If an accountant has gone to the trouble of memorizing a complex password then...</description>
      <pubDate>Tue, 07 Dec 2004 04:01:44 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>security</category>
      <category>hacker</category>
      <category>password</category>
      <category>users</category>
      <category>ownership</category>
      <category>access</category>
      <category>network</category>
    </item>
    <item>
      <title>SQL Injection still huge threat!</title>
      <link>http://localhost:3000/blog/sql-injection-still-huge-threat</link>
      <guid isPermaLink="true">http://localhost:3000/blog/sql-injection-still-huge-threat</guid>
      <description>A recent article about how Petco not only was found to be vulnerable to a SQL Injection attack, but also got fined for the false claims this realization cast on their privacy policy just goes to show that no matter how much we talk about it, SQL Injection remains a huge risk. But the stakes have...</description>
      <pubDate>Mon, 29 Nov 2004 16:46:05 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>security</category>
      <category>sql</category>
      <category>injection</category>
      <category>huge</category>
      <category>threat</category>
      <category>petco</category>
      <category>vulnerable</category>
    </item>
    <item>
      <title>C Sharp Group of Greater Boston Event</title>
      <link>http://localhost:3000/blog/c-sharp-group-of-greater-boston-event</link>
      <guid isPermaLink="true">http://localhost:3000/blog/c-sharp-group-of-greater-boston-event</guid>
      <description>On December 7th the C Sharp Group of Greater Boston will host a potluck dinner with two focused discussion groups at the Waltham, MA Microsoft Office. &amp;nbsp; Robert Hurlbut will lead&amp;nbsp; the discussion on&amp;nbsp; development strategies during the first hour. This topic includes test driven...</description>
      <pubDate>Thu, 18 Nov 2004 20:04:40 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>events</category>
      <category>test-driven</category>
      <category>dotnet</category>
      <category>asp-net</category>
      <category>microsoft</category>
      <category>office</category>
      <category>discussion</category>
    </item>
    <item>
      <title>Dell paying attention to Security…</title>
      <link>http://localhost:3000/blog/dell-paying-attention-to-security</link>
      <guid isPermaLink="true">http://localhost:3000/blog/dell-paying-attention-to-security</guid>
      <description>Dell has launched a website designed to help small businesses deal with all the security challenges.&amp;nbsp; The site seems good, but the performance was so bad at one point that I can’t decide whether that means it is a resounding success or a dismal failure. It is very much aimed at selling more...</description>
      <pubDate>Fri, 12 Nov 2004 15:59:57 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>security</category>
      <category>performance</category>
      <category>dell</category>
      <category>paying</category>
      <category>attention</category>
      <category>launched</category>
      <category>website</category>
    </item>
    <item>
      <title>Code Camp Franklin Style!</title>
      <link>http://localhost:3000/blog/code-camp-franklin-style</link>
      <guid isPermaLink="true">http://localhost:3000/blog/code-camp-franklin-style</guid>
      <description>Carl Franklin and the New England office of Microsoft are putting on another edition of the Code Camp event.&amp;nbsp; This time it is a mini-Code Camp with Carl doing the one man band thing all about VB.Net. If you can make it to the MS Waltham office on January 23rd then you should.&amp;nbsp;...</description>
      <pubDate>Wed, 10 Nov 2004 19:51:23 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>events</category>
      <category>office</category>
      <category>dotnet</category>
      <category>microsoft</category>
      <category>franklin</category>
      <category>code</category>
      <category>camp</category>
    </item>
    <item>
      <title>Clusters without LM Hash</title>
      <link>http://localhost:3000/blog/clusters-without-lm-hash</link>
      <guid isPermaLink="true">http://localhost:3000/blog/clusters-without-lm-hash</guid>
      <description>A common bit of advice bandied about lately (by Jesper Johansson of MS, me, and others in and out of MS) is to turn off LM Hashes on your Windows systems and networks.&amp;nbsp; This is great advice, but there is a proviso.&amp;nbsp; Some things depend on LM Hashes to work.&amp;nbsp; Most of them are not an...</description>
      <pubDate>Tue, 02 Nov 2004 21:34:21 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>security</category>
      <category>windows</category>
      <category>advice</category>
      <category>hashes</category>
      <category>clusters</category>
      <category>without</category>
      <category>common</category>
    </item>
    <item>
      <title>Very interesting contest!</title>
      <link>http://localhost:3000/blog/very-interesting-contest</link>
      <guid isPermaLink="true">http://localhost:3000/blog/very-interesting-contest</guid>
      <description>Thom Robbins of MS New England fame has come up with another very interesting event!&amp;nbsp; Right on the heels of a very successful Code Camp 2 this past weekend he has announced a development contest where you can win a Mobile Device. Check out the details on Thom’s Blog . Should be interesting to...</description>
      <pubDate>Wed, 20 Oct 2004 18:28:11 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>mobile</category>
      <category>interesting</category>
      <category>contest</category>
      <category>robbins</category>
      <category>england</category>
      <category>event</category>
      <category>heels</category>
    </item>
    <item>
      <title>Situational Awareness</title>
      <link>http://localhost:3000/blog/situational-awareness</link>
      <guid isPermaLink="true">http://localhost:3000/blog/situational-awareness</guid>
      <description>Often we don’t know we are in danger until we get clobbered. We have all had that feeling in the pit of our stomachs after something heavy falls where we were standing a few minutes ago. In the middle ages ignorance of disease killed many and the same is true of most in the modern world of computer...</description>
      <pubDate>Wed, 29 Sep 2004 20:54:10 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>security</category>
      <category>situational</category>
      <category>awareness</category>
      <category>danger</category>
      <category>clobbered</category>
      <category>stomachs</category>
      <category>heavy</category>
    </item>
    <item>
      <title>But wait there’s more!</title>
      <link>http://localhost:3000/blog/but-wait-there-s-more</link>
      <guid isPermaLink="true">http://localhost:3000/blog/but-wait-there-s-more</guid>
      <description>Now there is an even more dangerous exploit for jpg files.&amp;nbsp; Details can be found here . I have seen an example of this exploit in action.&amp;nbsp; In the demo I got from our security team, displaying the custom crafted jpg image caused the workstation to reboot. If you didn’t take the last...</description>
      <pubDate>Fri, 24 Sep 2004 16:28:38 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>security</category>
      <category>exploit</category>
      <category>wait</category>
      <category>dangerous</category>
      <category>files</category>
      <category>example</category>
      <category>action</category>
    </item>
    <item>
      <title>MS is looking to solve the Backup problem!</title>
      <link>http://localhost:3000/blog/ms-is-looking-to-solve-the-backup-problem</link>
      <guid isPermaLink="true">http://localhost:3000/blog/ms-is-looking-to-solve-the-backup-problem</guid>
      <description>Backup is a fairly antique part of IT nowadays.&amp;nbsp; The trend over the last year or so seemed to be real time backup to SANs at huge cost in terms of infrastructure.&amp;nbsp; Now Microsoft has announced that they are going to put forth an offering that will not only bring this solution down to...</description>
      <pubDate>Thu, 23 Sep 2004 14:36:47 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>network</category>
      <category>microsoft</category>
      <category>backup</category>
      <category>solve</category>
      <category>problem</category>
      <category>fairly</category>
      <category>antique</category>
    </item>
    <item>
      <title>JPEG are now dangerous!</title>
      <link>http://localhost:3000/blog/jpeg-are-now-dangerous</link>
      <guid isPermaLink="true">http://localhost:3000/blog/jpeg-are-now-dangerous</guid>
      <description>Now I have heard it all!&amp;nbsp; Terrorists, Hurricanes and now JPEGs can be used to attack your computer! To see what I am ranting about check out the article .</description>
      <pubDate>Wed, 15 Sep 2004 01:03:57 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>security</category>
      <category>jpeg</category>
      <category>dangerous</category>
      <category>heard</category>
      <category>terrorists</category>
      <category>hurricanes</category>
      <category>attack</category>
    </item>
    <item>
      <title>Cyber-Terrorism on the horizon</title>
      <link>http://localhost:3000/blog/cyber-terrorism-on-the-horizon</link>
      <guid isPermaLink="true">http://localhost:3000/blog/cyber-terrorism-on-the-horizon</guid>
      <description>I just finished reading an upcoming article from Forbes Magazine &amp;nbsp;(unfortunately you will have to register to read it before the September 20th pub date) about the belief that terrorists are turning to hacking as their next major vehicle to do damage. In the article they point out things like,...</description>
      <pubDate>Wed, 08 Sep 2004 20:11:23 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>security</category>
      <category>hacking</category>
      <category>cyber</category>
      <category>terrorism</category>
      <category>horizon</category>
      <category>finished</category>
      <category>reading</category>
    </item>
    <item>
      <title>Security after the SDLC</title>
      <link>http://localhost:3000/blog/security-after-the-sdlc</link>
      <guid isPermaLink="true">http://localhost:3000/blog/security-after-the-sdlc</guid>
      <description>The Software Development Life Cycle (SDLC) is a well established and well thought out concept.&amp;nbsp; There are books and experts and cool slides galore that talk about it and how security should fit into it.&amp;nbsp; The problem that I see is that the process as most people think about it isn’t...</description>
      <pubDate>Tue, 07 Sep 2004 19:33:05 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>security</category>
      <category>application</category>
      <category>sdlc</category>
      <category>process</category>
      <category>software</category>
      <category>development</category>
      <category>cycle</category>
    </item>
    <item>
      <title>Demos from TechEd Hong Kong Sessions</title>
      <link>http://localhost:3000/blog/demos-from-teched-hong-kong-sessions</link>
      <guid isPermaLink="true">http://localhost:3000/blog/demos-from-teched-hong-kong-sessions</guid>
      <description>As promised I am posting all the demos from TechEd Hong Kong last week.&amp;nbsp; DEV370: Developing Applications Under Windows XP Service Pack 2 &amp;nbsp; &amp;nbsp; DEV370 XPSP2.zip (369.75 KB) &amp;nbsp; &amp;nbsp; Special thanks to Jon Box and Dan Fox of Quilogy &amp;nbsp;for developing and presenting this session...</description>
      <pubDate>Fri, 03 Sep 2004 15:00:04 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>events</category>
      <category>speaking</category>
      <category>windows-forms</category>
      <category>dotnet</category>
      <category>asp-net</category>
      <category>aspnet</category>
      <category>performance</category>
    </item>
    <item>
      <title>Don Kiely has something to say</title>
      <link>http://localhost:3000/blog/don-kiely-has-something-to-say</link>
      <guid isPermaLink="true">http://localhost:3000/blog/don-kiely-has-something-to-say</guid>
      <description>I am listening to the Don Kiely interview on Dot Net Rocks &amp;nbsp;and thought that it was worth pointing the security minded toward.&amp;nbsp; I have known Don for a while from conferences out and about, but hadn’t realized how much he has delved into the Least Priviledge issue until listening to Carl...</description>
      <pubDate>Thu, 02 Sep 2004 14:09:38 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>security</category>
      <category>dotnet</category>
      <category>kiely</category>
      <category>listening</category>
      <category>least</category>
      <category>priviledge</category>
      <category>issue</category>
    </item>
    <item>
      <title>AuthDiag 1.0 is available in its final form!</title>
      <link>http://localhost:3000/blog/authdiag-1-0-is-available-in-its-final-form</link>
      <guid isPermaLink="true">http://localhost:3000/blog/authdiag-1-0-is-available-in-its-final-form</guid>
      <description>If you haven’t used it yet then you should get to know this tool.&amp;nbsp; If you have then you should be happy to know that the final 1.0 version of AuthDiag is now available at http://download.microsoft.com/download/6/c/9/6c96682c-8449-4112-a089-3b98c0035d0c/AuthDiag.msi When you are using Windows...</description>
      <pubDate>Wed, 01 Sep 2004 21:04:29 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>security</category>
      <category>access-control</category>
      <category>microsoft</category>
      <category>windows</category>
      <category>authentication</category>
      <category>amd</category>
      <category>intel</category>
    </item>
    <item>
      <title>Back from TechEd Hong Kong…</title>
      <link>http://localhost:3000/blog/back-from-teched-hong-kong</link>
      <guid isPermaLink="true">http://localhost:3000/blog/back-from-teched-hong-kong</guid>
      <description>And it was a great event!&amp;nbsp; For those that attended, I will be posting the demo code before the end of the week so stay tuned!</description>
      <pubDate>Tue, 31 Aug 2004 21:20:25 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>speaking</category>
      <category>hong</category>
      <category>kong</category>
      <category>teched</category>
      <category>event</category>
      <category>attended</category>
      <category>posting</category>
    </item>
    <item>
      <title>Too good to be true…</title>
      <link>http://localhost:3000/blog/too-good-to-be-true</link>
      <guid isPermaLink="true">http://localhost:3000/blog/too-good-to-be-true</guid>
      <description>I was talking to an old friend at the recent Mobility Day held at the Microsoft Office near Boston and he brought up an incident that I have seen happen to others.&amp;nbsp; I realized though that it isn’t something talked about often so it seemed like perfect blog fodder. He told me of working with a...</description>
      <pubDate>Fri, 20 Aug 2004 13:43:53 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>security</category>
      <category>open-source</category>
      <category>code-review</category>
      <category>microsoft</category>
      <category>office</category>
      <category>proprietary</category>
      <category>true</category>
    </item>
    <item>
      <title>Physical Security not a high enough priority…</title>
      <link>http://localhost:3000/blog/physical-security-not-a-high-enough-priority</link>
      <guid isPermaLink="true">http://localhost:3000/blog/physical-security-not-a-high-enough-priority</guid>
      <description>We regularly do network and application reviews for customers to make sure they know where the security problems are hiding.&amp;nbsp; I kind of expect to find servers unpatched, applications accepting unvalidated user input and the raft of standard security faux pas on both the network administrator...</description>
      <pubDate>Tue, 10 Aug 2004 21:14:15 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>security</category>
      <category>sql-server</category>
      <category>windows</category>
      <category>hacking</category>
      <category>vulnerability</category>
      <category>virus</category>
      <category>physical</category>
    </item>
    <item>
      <title>TechEd style Cabana comes to New England…</title>
      <link>http://localhost:3000/blog/teched-style-cabana-comes-to-new-england</link>
      <guid isPermaLink="true">http://localhost:3000/blog/teched-style-cabana-comes-to-new-england</guid>
      <description>Thom Robbins has worked with Chris Pels&amp;nbsp;(and myself as lazy consultant) to&amp;nbsp;create an event that I expect to become as popular as the Code Camps!&amp;nbsp; They are called Cabanas (all the best ideas are stolen anyways) and the first will be held in the Microsoft office in Waltham (outside...</description>
      <pubDate>Tue, 03 Aug 2004 14:13:48 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>speaking</category>
      <category>microsoft</category>
      <category>office</category>
      <category>teched</category>
      <category>style</category>
      <category>cabana</category>
      <category>england</category>
    </item>
    <item>
      <title>Chance to Win a Tablet PC</title>
      <link>http://localhost:3000/blog/chance-to-win-a-tablet-pc</link>
      <guid isPermaLink="true">http://localhost:3000/blog/chance-to-win-a-tablet-pc</guid>
      <description>Carl Franklin is giving away a Tablet PC to someone who fills out his survey.&amp;nbsp; Go to http://www.franklins.net/dnrforms/tabletcontest.aspx &amp;nbsp;to enter.</description>
      <pubDate>Thu, 29 Jul 2004 03:48:11 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>tablet</category>
      <category>dotnet</category>
      <category>chance</category>
      <category>franklin</category>
      <category>fills</category>
      <category>survey</category>
      <category>dnrforms</category>
    </item>
    <item>
      <title>Microsoft has released a tool that removes the trojan used by Download.Ject</title>
      <link>http://localhost:3000/blog/microsoft-has-released-a-tool-that-removes-the-trojan-used-by-download-ject</link>
      <guid isPermaLink="true">http://localhost:3000/blog/microsoft-has-released-a-tool-that-removes-the-trojan-used-by-download-ject</guid>
      <description>In case you need a way to clean up after getting hit by the Download.Ject exploit… Download.Ject malware removal tool released Microsoft has learned of a Trojan program that is downloaded by the Download.Ject malware, also known as Scob, to client machines from infected IIS servers. When a user...</description>
      <pubDate>Wed, 14 Jul 2004 12:37:54 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>security</category>
      <category>microsoft</category>
      <category>malware</category>
      <category>iis</category>
      <category>exploit</category>
      <category>javascript</category>
      <category>monitoring</category>
    </item>
    <item>
      <title>RegEx as a way to better data validation</title>
      <link>http://localhost:3000/blog/regex-as-a-way-to-better-data-validation</link>
      <guid isPermaLink="true">http://localhost:3000/blog/regex-as-a-way-to-better-data-validation</guid>
      <description>Someone recently sent me a link to an MSDN article about 10 must have tools .&amp;nbsp; While looking it over I saw The Regulator listed and started thinking about validation of client data. Everyone has by now heard that you must validate your data from a client before you act on it, but what does...</description>
      <pubDate>Fri, 09 Jul 2004 18:41:07 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>security</category>
      <category>dotnet</category>
      <category>regex</category>
      <category>sql</category>
      <category>hacker</category>
      <category>course</category>
      <category>microsoft</category>
    </item>
    <item>
      <title>Fix available for Download.Ject attack…</title>
      <link>http://localhost:3000/blog/fix-available-for-download-ject-attack</link>
      <guid isPermaLink="true">http://localhost:3000/blog/fix-available-for-download-ject-attack</guid>
      <description>Microsoft has released a Knowledge Base article, 870669 , that describes how to implement a change manually that will disable the browser’s capability to leverage the ADODB.Stream object. This could be a painful fix for many organizations as you may be using that object for certain file based...</description>
      <pubDate>Fri, 02 Jul 2004 17:27:18 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>security</category>
      <category>microsoft</category>
      <category>browser</category>
      <category>exploit</category>
      <category>object</category>
      <category>change</category>
      <category>available</category>
    </item>
    <item>
      <title>New .Net User Group has its first meeting tomorrow night…</title>
      <link>http://localhost:3000/blog/new-net-user-group-has-its-first-meeting-tomorrow-night</link>
      <guid isPermaLink="true">http://localhost:3000/blog/new-net-user-group-has-its-first-meeting-tomorrow-night</guid>
      <description>The Downtown Boston .Net User group is having it’s first meeting tomorrow night.&amp;nbsp; In a coordinated effort with the Boston .Net User group that regularly meets outside Boston in the Microsoft Office in Waltham, MA, Sam Gentile is hosting a downtown version for those that find it hard to escape...</description>
      <pubDate>Wed, 30 Jun 2004 18:45:20 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>events</category>
      <category>user-group</category>
      <category>meeting</category>
      <category>dotnet</category>
      <category>microsoft</category>
      <category>office</category>
      <category>clr</category>
    </item>
    <item>
      <title>Intrusion Detection</title>
      <link>http://localhost:3000/blog/intrusion-detection</link>
      <guid isPermaLink="true">http://localhost:3000/blog/intrusion-detection</guid>
      <description>I have recently been asked by a deeply knowledgable friend of mine, Malek &amp;nbsp;Kemmou , about the latest in Intrusion Detection software.&amp;nbsp; I realized that if he was curious, then this might be a topic worthy of a few words… &amp;nbsp; The bad news is that there is not much out there really...</description>
      <pubDate>Mon, 28 Jun 2004 16:07:10 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>security</category>
      <category>intrusion-detection</category>
      <category>dotnet</category>
      <category>logging</category>
      <category>spam</category>
      <category>iis</category>
      <category>software</category>
    </item>
    <item>
      <title>Firewall or die…</title>
      <link>http://localhost:3000/blog/firewall-or-die</link>
      <guid isPermaLink="true">http://localhost:3000/blog/firewall-or-die</guid>
      <description>There was a time when I believed that I could keep a server secure enough that I could get away with not putting it behind a firewall.&amp;nbsp; This used to entail just having a security plan and minimizing the attack surface.&amp;nbsp; Then it got harder and harder to keep up.&amp;nbsp; I held out for as...</description>
      <pubDate>Wed, 23 Jun 2004 03:54:53 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>firewall</category>
      <category>security</category>
      <category>harder</category>
      <category>believed</category>
      <category>server</category>
      <category>secure</category>
      <category>behind</category>
    </item>
    <item>
      <title>My New York City .Net User Group Presentation…</title>
      <link>http://localhost:3000/blog/my-new-york-city-net-user-group-presentation</link>
      <guid isPermaLink="true">http://localhost:3000/blog/my-new-york-city-net-user-group-presentation</guid>
      <description>went well, except for the 7 hour drive to get there that should have been 3.5!&amp;nbsp; OK, back to the intent which is technology entry…&amp;nbsp; I spoke on Sharepoint Programming and the crowd was varied (never heard of SharePoint to SharePoint guru), but engaged.&amp;nbsp; Single Sign On was the big thing...</description>
      <pubDate>Fri, 18 Jun 2004 03:47:57 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>speaking</category>
      <category>user-group</category>
      <category>single-sign</category>
      <category>sharepoint</category>
      <category>dotnet</category>
      <category>meeting</category>
      <category>office</category>
    </item>
    <item>
      <title>ASPNET_WP.exe, .Net 1.0 and a Domain Controller…</title>
      <link>http://localhost:3000/blog/aspnet-wp-exe-net-1-0-and-a-domain-controller</link>
      <guid isPermaLink="true">http://localhost:3000/blog/aspnet-wp-exe-net-1-0-and-a-domain-controller</guid>
      <description>Jeopardy Answer:&amp;nbsp; What are 3 things that don’t go together easily! If you feel the need to host ASP.Net on a windows domain controller and can’t bring yourself to upgrade to version 1.1 then at least read this KB article . The crux of the problem is that domain controllers on IIS 5.0 servers...</description>
      <pubDate>Thu, 17 Jun 2004 03:10:39 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>security</category>
      <category>dotnet</category>
      <category>asp-net</category>
      <category>aspnet</category>
      <category>windows</category>
      <category>iis</category>
      <category>domain</category>
    </item>
    <item>
      <title>Start with the Administrator Account</title>
      <link>http://localhost:3000/blog/start-with-the-administrator-account</link>
      <guid isPermaLink="true">http://localhost:3000/blog/start-with-the-administrator-account</guid>
      <description>Alot of sources say that you should rename your administrator account on your windows systems and windows network.&amp;nbsp; While I agree with this wholeheartedly, you need to take the war to the hacker. First, renaming the administrator account to admin or adm or something equally obvious when seen...</description>
      <pubDate>Wed, 16 Jun 2004 03:06:35 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>network</category>
      <category>security</category>
      <category>sql-server</category>
      <category>windows</category>
      <category>hacker</category>
      <category>rest</category>
      <category>remote</category>
    </item>
    <item>
      <title>WSE 1.0 Revisited</title>
      <link>http://localhost:3000/blog/wse-1-0-revisited</link>
      <guid isPermaLink="true">http://localhost:3000/blog/wse-1-0-revisited</guid>
      <description>More than a year ago, I spent a day or two wading through WSE 1.0 (hence the title) to prepare a nice demo for a talk on GXA that Andrew Brust and I did at CeBit held in NYC. &amp;nbsp;In my travels, I reviewed Tim Ewald’s white paper called “ Programming with Web Services Enhancements 1.0 ” and soon...</description>
      <pubDate>Fri, 11 Jun 2004 01:49:11 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>security</category>
      <category>dotnet</category>
      <category>asp-net</category>
      <category>microsoft</category>
      <category>revisited</category>
      <category>spent</category>
      <category>wading</category>
    </item>
    <item>
      <title>Blogging enters the battle…</title>
      <link>http://localhost:3000/blog/blogging-enters-the-battle</link>
      <guid isPermaLink="true">http://localhost:3000/blog/blogging-enters-the-battle</guid>
      <description>I have been considering starting to blog for a long time.&amp;nbsp; There were false starts and pronouncements that I would begin that were left unfulfilled.&amp;nbsp; As I write this first entry I realize that I picked the correct name for this journal – Tech Siege .&amp;nbsp; The reason is that since before...</description>
      <pubDate>Fri, 11 Jun 2004 01:13:46 GMT</pubDate>
      <author>contact@patrickhynds.com (Patrick Hynds)</author>
      <category>security</category>
      <category>realize</category>
      <category>blogging</category>
      <category>enters</category>
      <category>battle</category>
      <category>considering</category>
      <category>starting</category>
    </item>
  </channel>
</rss>