Quantcast
Channel: Symantec Connect - ブログエントリ
Browsing all 5094 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Tor Anonymity Comes Under Attack

On August 4, websites hosted by Freedom Hosting, a service provider that offers anonymous hosting through the Tor network, began to host malicious scripts. This follows media reports from August 3...

View Article


Norton Internet Security 2013 was ranked as one of the most accurate programs...

Dennis Technology Labs offers a range of testing services that are focussed on performance benchmarking hardware and software products.Symantec’s Norton Internet Security 2013 was ranked as one of the...

View Article


Save the Date: Google+ Hangout – What Can the Backup Exec 3600 do to Improve...

Building a traditional backup solution can result in a high level of complexity where the processes are often too siloed and too unreliable to be trusted with your company’s most valuable asset. But,...

View Article

Save the Date: Google+ Hangout – What Can the Backup Exec 3600 do to Improve...

Building a traditional backup solution can result in a high level of complexity where the processes are often too siloed and too unreliable to be trusted with your company’s most valuable asset. But,...

View Article

Internet Encryption Shakeup

This article is written based on wide spread Internet reports from Black Hat Conference at Las Vegas.Recent advances in math and cryptology research in the academic field indicate that there might be...

View Article


Image may be NSFW.
Clik here to view.

Tor の匿名性が攻撃される

8 月 4 日、Freedom Hosting(Tor ネットワークを介して匿名ホスティングサービスを提供するサービスプロバイダ)が運用する Web サイトで、不正なスクリプトのホスティングが見つかりました。これは、Freedom Hosting の代表と見られる人物の引き渡しを米国当局が要請したことに関する、8 月 3 日のメディアレポートに続くものです。見つかったスクリプトは、Firefox...

View Article

Image may be NSFW.
Clik here to view.

Stock Spam: A Sign of Economic Recovery?

It may sound strange, but one surefire sign that the economy is on the mend is an increase in stock spam. Yes, stock spam is a bellwether signal of an economic revival and if you want proof, check your...

View Article

Connect Dev Notes: 07 August 2013

Updates deployed to the Connect production servers as a result of the code sprint that ended 06 August 2013.User Facing: DesktopAdded [brackets] around group names when they appear in the subject lines...

View Article


Image may be NSFW.
Clik here to view.

株関連のスパムは経済回復の兆しか

怪訝に思われるかもしれませんが、株関連のスパムの増加は、経済回復の確かな兆しの 1...

View Article


Symantec’s Cecily Joseph Featured in Triple Pundit’s Women in CSR Column

Triple Pundit, one of the leading media platforms that reports on corporate responsibility and sustainability news, has featured Symantec’s Senior Director of Corporate Responsibility, Cecily Joseph,...

View Article

HIPAA Compliance For Cloud Data

Understanding HIPAA ComplianceThe Health Insurance Portability and Accountability Act (HIPAA) applies to any healthcare provider, health plan, and clearing house that electronically maintains or...

View Article

Spotting Fake Email and SMS Messages

One of the most persistent security issues for mobile and web users is phishing - that’s when thieves try to fool you into giving away your personal data. Fake links can be used to persuade you to part...

View Article

Image may be NSFW.
Clik here to view.

Compromised Accounts Tweeting Links to Malware

It is not uncommon to see social media accounts, specifically Twitter accounts, directing users to malicious sites such as the ones hosting Android.Opfake, an issue we blogged about last year....

View Article


PST Migration with Enterprise Vault 10.0.4

PST files are a bit of a paradox- they’re equally great and painful. End-users love them because they are in total control of how and where they save their valuable messages for easy access later. IT...

View Article

Outlook problem after running FixOrphanedShortcut?

I  know from experience that there many, many registry keys that are public knowledge relating to Enterprise Vault, and also from my 6+ years in Enterprise Vault Engineering there are a whole load of...

View Article


Image may be NSFW.
Clik here to view.

3D Printing Physical Keys

3D printers are fascinating devices that are becoming affordable and widely available.  Many people love to experiment with them, bringing innovation to many different fields. There are so many things...

View Article

Business continuity - a ship that's already sailed?

We've been talking about business continuity for years. No, make that decades. While a standard for business continuity planning has only existed since 2006, organisations have been defining what...

View Article


About MAXTRANSFERSIZE parameter in SQL backup script

First, I just want to clarify that MAXTRANSFERSIZE is not a NetBackup-specific code/parameter.Rather, it's a standard parameter used by Microsoft SQL virtual device (VDI) during backup/restore. Pretty...

View Article

Administrator Account Discovery

One of the most dangerous threats to IT security is abuse of privileged access. Preventing the exploitation of administrator privileges first requires knowledge of who has administrator access whether...

View Article

1st Half 2013 Microsoft Privilege Vulnerabilities

In the past 6 months Microsoft has released 51 Security Bulletins addressing 121 vulnerabilities. Here’s a breakdown of the bulletins and vulnerabilities. Of the 51 Microsoft Security Bulletins...

View Article
Browsing all 5094 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>