Quantcast
Channel: Symantec Connect - ブログエントリ
Browsing all 5094 articles
Browse latest View live

Knowing Is Half the Battle for Today’s CISOs

 By Joe Bertnick, Director of Product Management, Symantec Corp.On the battlefield, a general’s responsibility is to coordinate different bodies of soldiers whose commanders may not know what the...

View Article


We are looking for an Altiris Admin

Hello, We have an immediate opening for an Altiris admin in Redwood City. CA.   If you would like additional details, please contact me directly @ scurran@informatica.com.  Thank you, Sean

View Article


Webcast focused on "How to Virtualize Microsoft Office".

Hello All,Please find the link to this weeks webcast focused on "How to Virtualize Microsoft Office".https://www-secure.symantec.com/connect/blogs/marc...

View Article

Image may be NSFW.
Clik here to view.

Reset Lost Acer Password With Password Recovery Tools

Are you an Acer computer user and Have you ever come across such forgotten Acer password issue? If so, how can you reset lost Acer Password? Actually, you can still make use of the third-party tool to...

View Article

Student wins Brussels cyber readiness challenge

40 security and technology-savvy enthusiasts have participated in Symantec’s first Cyber Readiness Challenge on Belgian soil, last week at Belgium’s Infosecurity 2013 fair in Brussels Expo. The...

View Article


Business advantages from a good Information Management Approach

 A good Information Governance approach that include powerful archiving and eDiscovery tools, seems to be useful only for companies working in US or UK and all the countries where internal regulations...

View Article

Image may be NSFW.
Clik here to view.

SÁLVESE QUIEN PUEDA

El mundo de las redes sociales ha despegado a un ritmo vertiginoso. Sí, se ha vuelto «viral», y tal vez esto sea solo el comienzo. Ahora que millones de personas se han apresurado a comprar los...

View Article

Image may be NSFW.
Clik here to view.

Die Welle souverän reiten

Wie eine Naturgewalt sind die sozialen Medien über uns hereingebrochen. Sie sind allgegenwärtig, und doch ist ihre derzeitige Beliebtheit vielleicht nur der Anfang. Mit welchem Einsatz Millionen...

View Article


Image may be NSFW.
Clik here to view.

New Ransomlock Variant Bypasses Automated Threat Analysis Systems’ Sandboxes

A lot of malware modify themselves to either hide from security software when they copy themselves to the compromised computer or to hinder engineers attempting to analyze the malware by executing the...

View Article


BackupExec 2012 Hotfix 201596 update warning - loss of storage

Backup Exec 2012 v14.0 Rev 1798 (64Bit)Problem:  I used live update to install the 201596 hotfix on my CAS last week.  The update showed successful, but after the reboot there were problems.  The...

View Article

Schedule Update for the next releases of Backup Exec

We've been discussing this topic across a number of threads lately, so I thought I'd drop it here for all to see.The development team has been extremely focused on quailty enhancements, as reflected in...

View Article

NetBackup in VCS environment. Manual start without VCS

My last few cases were cluster related. It's funny, but some customers (and even engineers)  always forget how to manage NBU when it's under cluster control. They also believe that they can easily...

View Article

Image may be NSFW.
Clik here to view.

Unable to Download Application - App Center

Situation:The App Center Icon appears on the home screen. The device is not visible in the App Center yet because the agent software has been dispatched but the rollout of the device has not been...

View Article


Image may be NSFW.
Clik here to view.

Redesign Of Symantec’s Mobile Website

We recently launched a redesign of our Symantec.com mobile website.With the redesign, users can now enjoy a more consistent look and feel on the mobile site as on the desktop version of the site. The...

View Article

Do you have a solid Step-By-Step plan for your SYMC 52X0 Appliances (...

 Disasters strike when you least expect. Total disaster recovery of your NetBackup  appliances requires that you have  a secure and reliable way to recover your data when you need it.  Learn how...

View Article


Image may be NSFW.
Clik here to view.

脅威解析システムのサンドボックスをすり抜ける、Ransomlock の新しい亜種

マルウェアの多くは、自身を変化させる機能を持っています。侵入先のコンピュータに自身をコピーするときにセキュリティソフトウェアの目を逃れること、あるいは解読したメモリ領域を実行したり解読したメモリ値を読み取ったりしてマルウェアを解析しようとするエンジニアの試みを阻害することが目的です。今回のブログでは、メモリを共有して自身の姿を変えるトロイの木馬の動作について説明します。マルウェアのプロセスは、図 1...

View Article

Image may be NSFW.
Clik here to view.

Symantec Wins Best Channel Commitment Award at ASCII Tampa Success Summit

Symantec's dedication to the MSP community has once again been confirmed by our partners.The MSP program's "4 Pillars" allows partners to more efficiently add Symantec solutions to MSP offerings.1....

View Article


Image may be NSFW.
Clik here to view.

Bogus Asian Chat App Steals Login Information

Contributor: Avdhoot PatilNew methods to entice victims into handing over their personal information are always being devised by the people behind phishing websites and the use of fake social...

View Article

Facing authentication threats: one time passwords and transaction signing

Authentication is one of the oldest problems of the information security, and it is always a living matter. Getting a user password is the easiest way to gain access to critical systems, steal...

View Article

It's an exciting time in the industry

 Windows 8 has been released... OK, so I'm not actually that excited about Windows 8 (I'm a Mac user and I like my screen sharp and finger print free).  But as usual it was accompanied by a new version...

View Article
Browsing all 5094 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>