Quantcast
Channel: Symantec Connect - ブログエントリ
Browsing all 5094 articles
Browse latest View live

New SORT Release with new features for NetBackup and NetBackup Appliances

https://sort.symantec.com/ On November 4, 2014, Symantec completed another release of SORT. SORT Landing page at https://sort.symantec.com/With this release we added the following features and...

View Article


Exchange 2013 CU6 - Is Enterprise Vault certified?

CU6 of Exchange 2013 is available, should I upgrade? To keep our Exchange 2013 customers informed about Enterprise Vault's certification of CU6 we've created a Technote for you to subscribe too.Use...

View Article


Threats at every turn – time to hit back

The Evolving Threat Landscape is something that is constantly referenced, but just what is that ‘landscape’ and what does it mean for organisations intent on keeping themselves safe from attacks? In...

View Article

Image may be NSFW.
Clik here to view.

Annual G20 summit is attractive target for Flea attack group

Attackers attempt to steal information from targeted officials through spear-phishing emails. Each year, as world leaders come together to discuss a variety of global economic issues at the G20...

View Article

Image may be NSFW.
Clik here to view.

Los cuatro eventos más destacados de seguridad en Internet del 2014

Desde importantes vulnerabilidades hasta el ciberespionaje, Symantec revisa lo sucedido este año y lo que significará para el futuro. Con tanta variedad de incidentes de seguridad en 2014 -desde las...

View Article


Symantec Intelligence Report: October 2014

Welcome to the October edition of the Symantec Intelligence report. Symantec Intelligence aims to provide the latest analysis of cyber security threats, trends, and insights concerning malware, spam,...

View Article

Image may be NSFW.
Clik here to view.

Why We Love Appliances

Part One-- A Simplified World Over time IT professionals have seen the technology we most need change dramatically. Though seemingly small and simple, backup appliances in the data center can be added...

View Article

Image may be NSFW.
Clik here to view.

Enterprise Vault and Microsoft Exchange 2013 Cumulative Update 6

One of the questions which is frequently asked on the forums after a new Exchange Server update is whether or not Enterprise Vault will work with it, and whether it will be supported. For the most part...

View Article


More complex code in Code (Script) Component in workflow

I have found a neate little option to make more with Code (Script) Component due to lack of validation of the code that will enable you to write more complex code. Twitter カードのスタイル:  summary I used...

View Article


Help Improve Symantec's Online Content: Backup Exec, NetBackup, Enterprise...

Please take our online survey and provide your feedback Twitter カードのスタイル:  summary We need your help!  The Symantec Support teams would be grateful if you could give us about five minutes of your time...

View Article

Image may be NSFW.
Clik here to view.

Symantec Named Company of the Year – for the Second Time!

At the 15th Annual Powered by EF Awards, Symantec was named Company of the Year. This is the second time that we have been honored with this award and it clearly demonstrates that we are on the right...

View Article

Keeping Cisco Unified Computing Systems Highly Available with Symantec™...

In October 2014, Symantec Cluster Server announced general availability for Cisco UCS HA solution. The new Cluster Server agent provides high-availability for Cisco UCS servers that had no standard way...

View Article

Image may be NSFW.
Clik here to view.

Taking A Bolder Approach To Protect Identities And Endpoints

Attackers want your employee usernames, their passwords, their authentication codes and access to your approved devices. They want your endpoints. They want to extract the information they contain,...

View Article


Image may be NSFW.
Clik here to view.

針對Windows Sandworm 漏洞的攻擊者避開補丁程序

攻擊者持續運用 Sandworm 這項漏洞,使用可繞過其修正程式的攻擊程式,以電子郵件附加檔案形式傳送受感染的 PowerPoint 文件。 至少有兩群攻擊者仍持續運用近期發現的 Windows Sandworm 漏洞,使用可繞過修正程式的攻擊程式。這項漏洞隨著名為 Sandworm 的團體所撰寫的攻擊程式而曝光,但現在有部分證據顯示,在這些團體中至少有一個團體於 10 月 14...

View Article

To Go Forward, Back Up! Backup Strategies from 8 Leading Asia-Pacific Companies

In business today, the quality of a customer experience that a company provides often depends on technology. Even when a customer is face-to-face with a company employee, or interacting over the phone,...

View Article


How to find computer rebooted to WinPE Automation in DS 7.5

Since Deployment Solution 7.5, computers rebooted to Automation are renamed to their serial numbers rather than "MiniNTxxxx".To retrieve the computer serial number, while in automation, type on the...

View Article

Image may be NSFW.
Clik here to view.

Creating a Lasting Impact on STEM Education with Boys & Girls Clubs of America

Summary:Today, strong partnerships are critical to developing pathways that inspire youth to succeed in STEM careers. Working alongside Boys & Girls Clubs of America, Symantec is playing a key role...

View Article


Image may be NSFW.
Clik here to view.

Rapid Relevance, Precise Production

There is an ongoing debate in the industry around how to treat document families.  But, what is a document family?  Well, there are several kinds of families whether this is an e-mail and its...

View Article

MySQL Injection: Comments On Comments

If you're familiar with web application penetration testing and SQL injection then the classic SQL injection exploit string should ring a bell:' OR 1=1--This exploit string is utilized by attackers to...

View Article

Altiris 7.5 Linux PXE Kernel drivers

A small guide on how to compile Altiris 7.5 Linux PXE Kernel drivers Twitter カードのスタイル:  summary This is only a short guide to help you get started in compiling your own drivers or use my pre-compiled,...

View Article
Browsing all 5094 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>