Quantcast
Channel: Symantec Connect - ブログエントリ
Browsing all 5094 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Being scammed at home

If you don't care for the details of this blog, there is a Summary at the bottom. Recently I was called, at home, informing me that my computer was “downloading viruses”. This is the fourth time this...

View Article


Image may be NSFW.
Clik here to view.

Come verificare la versione di Office installata

Per conoscere la versione di Microsoft Office Version installata in un computer, vi sono alcune possibilità ( ad es. aprendo una applicazione Office, da pannello di controllo ecc.). Una soluzione...

View Article


Image may be NSFW.
Clik here to view.

Making Everyday Mandela Day – How Symantec Employees across the Globe are...

“We can change the world and make it a better place. It is in your hands to make a difference.” - Nelson Mandela “We can change the world and make it a better place. It is in your hands to make a...

View Article

Symantec e-Campus for Technical Product Training is free for all!

Better Training for All Members of the Symantec eLibrary receive free access to hundreds of regularly updated on-demand web-based training modules covering the breadth and depth of Symantec's product...

View Article

Cómo perder tu negocio en una semana: caso CODESPACES.COM

En este post me gustaría reflexionar acerca de los riesgos ocultos en cierto tipo de decisiones y elecciones tecnológicas. Las tecnologías como tal no entrañan riesgos (cloud, replicación, snapshots,...

View Article


Vision Symposium Munich

Vision Channel Day, 8th July 2014 | Vision Symposium, 9th July 2014In 2014, Symantec is creating a multi-day, flagship event, Vision Las Vegas, which will kick off a series of two-day events in cities...

View Article

How to lose your business in one week: CODESPACES.COM case

Today I would like to share a few thoughts about the hidden risks there are when we make decisions or choose new types of technology. Technology by itself is not risky (cloud, replication, snapshots,...

View Article

Criminal Motives Are Simple but Tactics are Crafty

The Underground Economy, Pt. 1 As underground hacking business booms, most of us have little to no visibility into what drives this "black" market in the cyber world. With this series, Symantec...

View Article


Image may be NSFW.
Clik here to view.

ITMS 7.5 SP1 HF1 is now available

ITMS 7.5 SP1 HF1 is available through SIM. It has the fix for the following issue:You can access the ITMS 7.5 SP1 HF1 release notes from the following location:Symantec™ IT Management Suite 7.5 SP1 HF1...

View Article


Image may be NSFW.
Clik here to view.

[PowerShell] Monitor File System Activity

There is a Microsoft .NET Framework class library called  FileSystemWatcher.This class monitors file related events like Create, Rename, Delete and run any action that you specify.Following example is...

View Article

Think you're safe? Think again - SSL Attack Survey

This is a supplement article for SSL Ciphers - Beyond Private Key and Certificate Look! I have a lock, I see https://, I even see the Green Bar, I believe I have protected my server and the clients...

View Article

What It Means to Bleed Yellow

As a Symantec alum who co-founded a startup, I’ve had the opportunity to gain a unique perspective on business by working both for a global industry leader, as well as and launching a new venture. I’m...

View Article

Facebook Scam Leads to Nuclear Exploit Kit

Attackers have become more aggressive and are now using Facebook scams to lead to exploit kits so they can control a user’s system.続きを読む...

View Article


Apathy or Denial? Google Claims Security Unnecessary on Android Devices,...

Google's lead engineer for Android security recently announced that the majority of Android users don't need to install mobile security or antivirus, but Symantec and other security organizations have...

View Article

Analysts Unified Over Information Management

The recent visit of several industry analysts in the Green Park EBC created the perfect opportunity to provide insights into Symantec's Unified Information Management Strategy and the Information...

View Article


How does SSL work? What is an SSL handshake?

A special request was made today: "How does SSL work? What is an SSL handshake?"Here are some quick info. SSL/TLS are protocols used for encrypting information between two points. It is usually betwen...

View Article

Update on Outlook versions supported on the Enterprise Vault server

Enterprise Vault’s Exchange archiving agent uses the version of MAPI supplied with Outlook to communicate with Microsoft Exchange. Enterprise Vault currently supports Outlook 2007 only due to...

View Article


Image may be NSFW.
Clik here to view.

Symantec’s Green Teams present “Green Talks” - an Environmental Lecture Series

This month marks the launch of the new environmental lecture series at Symantec, Green Talks. These lectures will provide an opportunity for Symantec employees to learn about external environmental...

View Article

Simple Motives; Crafty Tactics

Check out Part 1 of Symantec's "Underground Economy" blog series.続きを読む...

View Article

Fake US Anti-Spam Law Used in Latest Phishing Campaign

Phishers posing as banks are redirecting victims to a fake website then requesting logon credentials in order to compromise bank accounts.続きを読む...

View Article
Browsing all 5094 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>