Are you the publisher? Claim or contact us about this channel

Embed this content in your HTML


Report adult content:

click to rate:

Account: (login)

More Channels


Channel Catalog

older | 1 | .... | 143 | 144 | (Page 145) | 146 | 147 | .... | 254 | newer

    0 0

    Vulnerability (CVE-2015-0291) rated as high severity by OpenSSL.


    0 0

    I just wanted to give a shout out to JesusWept3 for 2,000 solutions!  (Actually 2,002 at the time of this writing) 

    Thanks for your many contributions to this forum!

    0 0

    The road to success is never straightforward. This is a tale of a RAT developer’s persistence in the face of endless setbacks.


    0 0

    After each of our annual corporate responsibility reports, we ask for feedback from our stakeholders through the CR Snapshot. The helpful comments we receive guide us to continually improve our communications and disclosure around corporate responsibility issues.

    In the survey completed for Symantec’s 2014 Corporate Responsibility Report, we also asked which partner organization you feel should receive a $50,000 grant from Symantec. Many worthwhile community partners received votes, and the winner of the grant was the World Association of Girl Guides and Girl Scouts (WAGGGS). This grant will build upon Symantec’s past support of WAGGGS and programs like Surf Smart, which teaches young people why and how to stay safe online. We offer our sincere congratulations to WAGGGS for a well-deserved prize!

    Through other responses, you helped us to identify issues in which we have excelled. These include topics such as community investment, promoting privacy, online safety, and protecting against cybercrime. You also highlighted material issues where we might improve, such as environmental performance, and responsible sourcing. The chart below illustrates this feedback.


    When respondents answered what section of the 2014 Corporate Responsibility Report they found most interesting, replies were fairly even across the three main sections: Our People, which covers employee satisfaction, talent management, and diversity and inclusion; Your Information, which covers cybersecurity, online safety, and privacy; and The World, which covers climate change, responsible sourcing and human rights, and community investment. These results can be seen in the following chart:


    This feedback is crucial for us to continue to improve our corporate responsibility programs and reporting, and we always welcome further comments. Please contact us at with any other comments you have on our Corporate Responsibility Report or any other aspects of the way we do business. We look forward to hearing from you!

    0 0

    While mobility in the enterprise is enabling innovation and agility, it is also introducing a number of troubling security risks that represent back door opportunities for cyber criminals. The good news is, enterprises can protect corporate data. By understanding each of the risk areas and employing a layered security approach to address them, you can defend your business. The top seven risks of enterprise mobility include:

    1. Heterogeneous Environment

    Unlike traditional endpoints, mobile devices represent a motley collection of appliances and operating systems. To make matters worse, employees often use multiple devices, which may or may not be owned by the company. In fact, according to Forrester, 53 percent of information workers now use three or more devices for work[1], and 95 percent of organizations allow the use of employee-owned devices in some form[2]. Crucial security measures to manage these challenges include applying consistent policies across mobile operating systems and separating personal and corporate data.

    2. Anytime, Anywhere Connectivity

    Because they are hyper-connected, mobile devices often access unsecured networks, increasing the risk of data loss. 71 percent of all mobile communications are now flowing over WiFi[3], and 90 percent of public WiFi hotspots have inadequate security[4]--ominous indeed. To counter these risks, ensure connectivity via certificate-based network access, and utilize per-app VPNs that encrypt data in transit. In addition, you’ll want to deploy app and email proxies that block unauthorized or non-compliant devices and apps.

    3. Loss and Theft

    Small and portable devices are vulnerable to loss and theft. 3.1 million smartphones were stolen in 2013, nearly twice as many as in 2012[5]. In addition, eight out of ten finders of lost devices were found to have tried to access corporate information on the device[6]. To protect lost or stolen devices, enforce password policies for devices and apps using multi-factor authentication. Provide seamless access to corporate apps and resources with certificates and single sign-on. Encrypt corporate apps and data so they’re protected even if the device is compromised. Finally, employ full or selective device wipe.

    4. Compromised Devices

    Users can tamper with (jailbreak or root) a device’s operating system to gain elevated privileges and install malicious apps from unauthorized app stores. According to Forbes, 18 million iOS devices had been jailbroken within six weeks of jailbreak tool availability[7], and 24 percent of mobile phones currently on corporate networks are jailbroken[8]. To counter this threat, you must continuously monitor device compliance, and identify and block compromised devices from accessing enterprise networks and apps.

    5. Data Leaks

    With ever-greater numbers of workers relying on mobile apps for work and personal use, IT professionals are alarmed. A whopping 87 percent are specifically concerned about mobile data leakage[9], while 46 percent of IT leaders are certain that unmanaged file sharing is causing data leaks[10]. To allay these risks, implement mobile DLP policies like blocking copy and paste actions. Manage “open in” controls to prevent content from being accessed by unapproved apps, and control whether data is allowed to be stored locally or on a Micro-SD card.

    6. Bring Your Own Apps

    Employees are relying on personal apps, such as file sync and sharing tools, for work purposes, increasing the risk of data loss and potential breaches. 25 percent of employees are now bringing their own mobile apps into the workplace to fill a perceived gap of apps not provided by their employers[11], and 75 percent of these apps are expected to fail basic security tests through 2015[12]. To protect your business from these risky apps, begin by providing a curated enterprise app store that offers easy access to approved in-house and third-party apps. In addition, deploy and manage user apps dependent on role, and implement app-level security policies for DLP, encryption, and authentication.

    7. Malicious and Risky Apps

    Apps are fun, helpful—and the weakest point of entry for determined cyber-criminals. All too often, they are installed by users with little or no thought to the dangers they may pose. According to Norton Mobile Insight, as of October 2014, there were three million malicious apps—and eight million apps with risky behaviors—circulating. These risky behaviors included stealing information (19%), tracking the user (22%), posing traditional threats (26%), sending content (13%), and reconfiguring the device (13%)[13]. To guard against these outcomes and ensure devices are protected, implement centrally managed mobile threat protection that can proactively detect and block mobile threats such as malware and risky apps. IT can white- or black-list apps based on app behavior, and prevent access to enterprise apps and services if malware is detected.

    The risks are daunting, but the fact is, you can deliver comprehensive mobile protection without compromising the user experience. Our concise infographic clearly lays out these top seven risks, along with the specific security measures needed to mitigate them, so your data, apps, and users stay connected, productive, and secure.


    [1] Source: 2013 Mobile Workforce Adoption Trends, Forrester, Feb 2013

    [2] Source: Cisco IBSG Horizons Study, Cisco, May 2012

    [3] Source: Wi-Fi Alliance 

    [4] Source: Forbes, May 2013

    [5] Source: 2014 Annual State of the Net Survey, Consumer Reports, May 2014

    [6] Source: Smartphone Honey Stick Project, Symantec, Feb 2012

    [7] Source: Forbes, Mar 2013

    [8] Source: Webroot, Oct 2013

    [9] Source: MobileCON 2013 Survey, Symantec, Oct 2013

    [10] Source: Safe Sharing, Intralinks, June 2014

    [11] Source: Workforce Personas and the Mobile App Gap, Forrester, Nov 2013

    [12] Source: Gartner, Sep 2014

    [13] Source: Symantec Intelligence Report, Symantec, Oct 2014

    0 0

    Estoy recibiendo ultimamente una serie de preguntas acerca de la soportabilidad de NetBackup con VMware 6.0, tal y como comentamos en el User Group de NetBackup una de las vías de trabajo de NetBackup es proteger cada carga de trabajo de la mejor forma posible, y establecer a su vez unos mecanismos de agilidad en la proliferación de soporte de estas cargas de trabajo, tal y como viene siendo habitual en las diferentes versiones de NetBackup.

    De esta forma nos complace informar de que Netbackup tiene soporte de VMware 6.0 en un "Same-Day Support" ya con la versión que esta completamente disponible hace ya algunas semanas.

    Cualquier duda que tengais al respecto, no dudeis en contactar con nosotros.


    0 0
  • 03/24/15--08:20: How to Secure Your Webcam
  • Internet is not a safe world and your webcam is vulnerable. It can be remotely activated wihout any notice.

    Also, most hackers take control of your webcam and make videos and take pictures of you without your knowledge.

    The best suggestion is disable the webcam when it is not used.
    The WebCam On-Off tool allow you to easily manage your webcam, in fact in just one click you are able to enabled or disable when you have to use it or not.

    The WebCam On-Off is a free portable program with only few basic functions :

    • Enable the webcam
    • Disable the webcam
    • Capture an image from a webcam


    PS: This is the IT way to block your webcam, in any case a basic protection could be also cover the webcam with a piece of paper ...

    Supported operating systems: Windows Xp , Vista , Windows 7 , 8 , 8.1 – (x86 & x64)

    License : freeware

    Link :


    0 0


    Going Dark to Celebrate Earth Hour

    On March 28th, 2015, from 8:30 – 9:30 pm local time, citizens, governments, and businesses from over 162 countries will turn off their lights for one hour in a symbolic action to bring attention to climate change and environmental sustainability. Known as “Earth Hour”, the open source movement was created by the World Wildlife Foundation (WWF) in 2007 and has grown from an event in one city to one that is celebrated by millions worldwide each year.  

    Symantec will join this inspiring grassroots movement by powering down nonessential lights in our offices around the world. Additionally, as Earth Hour aims to “turn the inspirations of one hour into the actions of every hour”, we’d like to reflect upon our efforts at Symantec to do this. From the success of our Green Teams to celebrating Earth Day worldwide to green talks inspiring sustainable lifestyles, we strive to operate every day in an environmentally sound manner, both as individuals and as a company.

    Green Team Success

    Symantec’s commitment to environmental stewardship is demonstrated by the activities of our global employee “Green Teams”. Employees who are part of our Green Teams organize environmental initiatives that affect their office and the company at large. An example that unites many of our offices is our ongoing “One Mug, One Planet” campaign to replace the use of paper and plastic cups with reusable cups and mugs. Participating offices have seen direct, tangible results during the first six months of the campaign including:

    • 314,000 fewer disposable cups used
    • A nearly $20,000 decrease in the cost of cups purchased
    • Over 1,300 signed pledges of participation


    Prince Jain and Amit Gadekar show off their Green Team mugs in Pune, India

    Additionally, while we reached our goal of 1,000 pledges, this February, we challenged our employees to go even further, to reach 300 more pledges by Earth Day 2015. We’ve more than doubled this new goal and have reached 2,111 total pledges, with employees at sites in Pune, India, Springfield, OR, and Culver City, CA seeing a surge in participation!

    Green Talk Inspires a Low-Carbon Lifestyle

    The Green Teams have also developed our quarterly Green Talk series, which provides an opportunity for employees to learn about environmental initiatives outside of the company. The talks will alternate topics within Symantec’s environmental strategy including: Green IT, Resource conservation, Responsible Sourcing and Travel and Events.

    In July our first inaugural Green Talk took place at our Mountain View headquarters featuring Fabien Cousteau, grandson of Jacques-Yves Cousteau one of the world’s most well-known underwater researchers. The latest Green Talk organized by our Green Park, UK office this March featured Rob Hopkins, co-founder of the Transition Culture movement, which supports the transition of our society and local communities to a low-carbon and sustainable future.             


    Green Talk speaker, Rob Hopkins, presents the Transition Culture movement in Green Park, UK

    This talk is available to stream online. We are looking forward to our next Green Talk, to take place at our Sydney, Australia site this spring.

    Celebrating Earth Day at our Mountain View Headquarters

    Symantec’s Mountain View office will host an Earth Day Fair on April 16th, 2015. This event will bring over 25 vendors, who will be available to talk to Symantec employees about electric cars, sustainable food, and other green technologies.

    From Earth Hour to Green Team activities to our Earth Day celebrations, Symantec celebrates the inspirational efforts of our employees to demonstrate our commitment to the environment not on just one day, but all days throughout the year.

    Jaime Barclay, Corporate Philanthropy Program Manager and Global Green Team Coordinator

    0 0

    Lone spam operator impersonated major brands and reality TV stars to promote miracle diet pill spam.


    0 0

    CU8 is available, should I upgrade?

    The short answer is: yes!

    Exchange 2013 CU8 has now been certified for use with Symantec Enterprise Vault. Please see TECH225267 for more details. The Enterprise Vault Compatibility Guide will be updated during its next release cycle to reflect this support.

    0 0

    Operador solitário de spam se fez passar por grandes marcas e estrelas de reality shows para promover spam de pílula de dieta milagrosa


    0 0

    As every global business knows, understanding cultural differences can make or break a company. From language to formality to etiquette, the SSC team shares the ins and outs of the Turkish business culture.


    The SSC team.

    With customers across more than 48 countries, Symantec is by definition a global company. As such, many of the decisions we make on a daily basis require a deep understanding of the unwritten rules of international business culture including etiquette and operations, communication, punctuality, and much more—awareness that our company has gathered over time through the many experiences, interactions, and partnerships of our employees.

    Throughout the last four weeks, the 2015 Symantec Service Corps (SSC) team has immersed itself into the Turkish business culture, significantly increasing our cross-cultural knowledge base. In a short time period, they’ve learned to work with a whole new team, enhanced their awareness of the region, gained significant skills and enjoyed intercultural experiences; all which will leave a lasting impact in Ankara and help Symantec successfully conduct global business in this fast-growing region for many years to come.

    A peek inside the Turkish business culture

    The team’s experience in Turkey has been much different than their typical days in their respective countries. Some of this is due to the speed in which their projects must be completed, but much of it can also be attributed to the Turkish business culture.

    FB office.png

    Flying Broom office: A look at the many archives the SSC team is tasked with cataloging.

    After nearly four weeks of working in Ankara, which the team feels has gone by too quickly, they are sharing some of their most memorable experiences about the Turkish culture:

    • Limited formality: “The culture here is more ad-hoc and informal. They do not like to set up meetings in advance.”
    • English helps but language is still a challenge: “Even though English is a language that unites many people, everyone has a different accent and they do not always understand each other due to these accents.”
    • Personal relationships and social interaction strengthen business partnerships: “During our preparation for the trip, we were briefed on business practices in Turkey and the importance of establishing a personal and social relationship prior to delving into business with our clients. We experienced this through meetings with clients in coffee shops and restaurants in which we shared stories about families and travels.”
    • Warmth, sincerity and friendliness reign: “The people of Ankara are warm and friendly. If you throw in a couple of Turkish words, they will go out of their way to help.”
    • Less email and meetings, more interaction: “Unlike our normal routines of meetings, calls and sitting in front of our laptops we are constantly collaborating and bouncing ideas. We are not sending many emails or scheduling meetings since we’re in the same room all day.”
    • Limited use of cell phones during social time: “I really like how people spend more time just talking to each other instead of on their cell phones.”

    Team Flying Broom tackles women empowerment

    Over the past two weeks, we’ve spotlighted Doğa Derneği (Nature Society) and the Association for Solidarity with Asylum Seekers and Migrants—today we are highlighting the Flying Broom team, which includes Archana Rajan (Culver City, CA), Amitoj Duggal (Pune, India), and Travis Goldberg (Dublin, Ireland).

    FlyingBroom lunch.png

    Team Flying Broom enjoys lunch with their clients.

    Flying Broom is a women’s organization that is focused on enhancing gender equality by providing information and training to empower women and women’s organizations, and contributing to the development of effective policies to tackle problems arising from inequality. Their organization’s mission is closely aligned with Symantec’s commitment to diversity and empowering women around the world.

    During their time in Ankara, the Symantec team has worked to improve and protect the tremendous film archives associated with the organization’s 18-year International Women’s Film Festival. Their assignment was to research tools for online archiving and sharing of film materials, and provide recommendations and an action plan to make festival materials available to the public.

    The team got to work and quickly identified a solution based around a NAS (network-attached storage) box which will allow all connected users in the office to share their files, including backup, quicker data access, and easier administration. The client accepted the team’s recommendations and immediately purchased the technology, demonstrating their confidence in the team and the strength of their recommendation. While their days in Turkey are quickly coming to a close, the team is training key users at Flying Broom on how to use and maintain the system so they can enjoy all the benefits of the technology for many years to come.

    “I am inspired by this incredible opportunity to work with fellow colleagues, from around the world, for a great cause, and to engage in a new (to me) culture, with a deep seeded history stretching all the way back to the cradle of civilization,” notes Travis Goldberg, senior pricing and licensing specialist.

    Approaching the end

    There are just days left in Ankara before the SSC team boards their planes and departs for their hometowns, a sad thought for many. The core SSC team was recently joined by Lora Phillips, Senior Manager, Global Corporate Responsibility, who will be in the audience on Friday, March 25 as the nine participants officially wrap up their projects and deliver closing presentations. They’ve not only produced incredible results for their clients but have also immersed themselves in the culture, bringing back many new skills and experiences to share with their teammates and Symantec as a whole.

    Lora joins.jpeg

    Lora Phillips, Senior Manager, Global Corporate Responsibility, joins the team for the last week of the mission.

    Stay tuned as we conclude this series, sharing key accomplishments, lessons learned, and what the team will remember most about Turkey. For more behind the scenes stories and photos, visit the Symantec Service Corps blog, here on the Corporate Responsibility in Action blog, and twitter using hashtag #SSC15.

    Related articles:

    Lora Phillips is Symantec's Senior Manager, Global Corporate Responsibility.

    0 0

    Un operador de spam solitario logró que grandes marcas y estrellas de TV promovieran pastillas milagrosas para bajar de peso


    0 0

    Twitter カードのスタイル: 

    We're pleased to inform you that Symantec DLO8.0 is coming out as a Beta release.

    The 8.0 release brings a bunch of features which customers like you have been asking for. Some of these features will change the way you work with DLO for ensuring better protection and access of your backed up data. Here's a quick glimpse-

    • Backup Over Internet : Your users no longer need to be on the corporate network for backing up their files. DLO will now provide continuous, non-intrusive backup of files over the internet....this will ensure that your corporate data is protected even if your users are working from home or on the road.
    • DLO Mobile App: Your users can now access their backed up files even if they're not in front of their desktop. With the all new DLO mobile, you get instant access to your backed up files on your Android/iOS smart phone. 
    • Quick Browser Restore: Web console provides users a view of their backed up data and allows them to access and restore the backed up files using the browser even if DLO agent is not installed.
    • DLO Diagnostic tool : Have a complex deployment and not sure why a particular agent isn't backing up data? Run the diagnostic tool to narrow down the issue even before you call Support.
    • Admin Dashboard : Colorful graphical dashboard to give you a quick status of your DLO deployment from an Operational, Deployment and Capacity Planning perspective. 
    • Bug Fixes and Stabilization :More bug fixes and stabilization.

    Beta program is scheduled to start in the first week of April.

    Interested?   Please register here to participate in this program.

    So rush and get your test environment ready.

    In order to gear up and start backing up data over internet, there are a couple of simple steps required, that you can initiate with your IT team, so that you're ready  for BOI (Backup over Internet)-

    • DLO Server needs to have a Public IP
    • Port number 443 should be open for HTTPS communication

    Please work with your IT team to ensure that DLO Server is accessible over the internet.

    Seasoned DLO administrators, please note that a new component 'DLO Edge server' should have a public IP; there is no change to existing DLO components.

    As always, look forward to your active participation to build a better DLO!  We’ll keep you updated on what’s happening around DLO. Thank you for your continued support for Symantec DLO.

    0 0

    Attackers have been compromising users’ computers to add them to botnets, which are rented out to artificially inflate Twitch channel audience numbers.


    0 0

    Symantec’s Email Submission Client enables end users to report suspected spam directly from their mailboxes to Symantec Security Response, which helps improve anti-spam research and results.  The Email Submission Client will be updated to support Microsoft Exchange Server 2013, and the new version is scheduled for release on March 28, 2015. Exchange Server 2010 and 2007 will also still be supported.

    The Email Submission Client is designed to be easy to use and does not require the installation of tools or updates on endpoints. Users simply move the unwanted message to a designated folder in their mailbox to send the message to Symantec. Administrators control which users and groups in the organization can submit messages using Active Directory.

    A moderated mode that allows administrators to approve messages before submitting them to Symantec is also available. The Email Submission Client works with multiple email clients, including Microsoft Outlook, Outlook Web Access (OWA), and Exchange ActiveSync.

    Symantec Email customers can download the client from the management portal by navigating to Tools> Downloads.

    Symantec Messaging Gateway and Mail Security for Microsoft Exchange customers can download the client from FileConnect at

    0 0

    CU8 of Exchange 2013 is available, should I upgrade?

    The short answer is: Yes

    Exchange 2013 CU8 has now been certified for use with Symantec Enterprise Vault.

    Please see TECH225267 for more details. The Enterprise Vault Compatibility Guide will be updated during its next release cycle to reflect this support.

    0 0

    Ever wondered how EV performs monitoring in System Center?

    Enterprise Vault includes a management pack for System Center Operations Manager (SCOM). The pack defines rules that enable SCOM to monitor Enterprise Vault components and critical Enterprise Vault events in the Application Event Log on Enterprise Vault servers.

    If you not using SCOM and would like to understand how to implement the same monitoring capabilities with other tools, check out our new monitoring Enterprise Vault guide.

    You can access the guide here:

    0 0

    Delivering a New Level of Data Protection Resiliency with Appliances

    When it comes to backup and recovery as well as a host of other applications, your always-on enterprise demands resiliency. The consequences of downtime can be costly – ranging from lost or deferred revenue to a damaged reputation and reduced confidence in the IT team’s abilities.

    There is no such thing as a “good time” for downtime, which means your organization needs to consistently re-visit its approach to achieving high availability in order to keep your business running 24/7/365 and meet the demands of your employees as well as customers.

    This solution brief examines four (4) critical areas to focus on when it comes to achieving resiliency with Purpose-Built Backup Appliances (PBBAs):

    • Data integrity
    • Threat protection
    • Redundant architecture
    • Environmental and operational efficiency

    These four (4) areas are key contributors to helping your organization minimize its downtime and ensure recovery whenever and wherever it is needed.

    Want to learn more. Please download the full Solution Brief “Delivering a New Level of Data Protection Resiliency with Appliances" attached to this blog post.

    Arjan van Proosdij


    0 0

    Lone spam operator impersonated major brands and reality TV stars to promote miracle diet pill spam.


older | 1 | .... | 143 | 144 | (Page 145) | 146 | 147 | .... | 254 | newer