Save the Date: Google+ Hangout – Why Host-Based SSDs are Critical for SLAs in...
Service level agreements (SLAs) must be met whether you’re keeping mission-critical data centers running or serving up frosty beverages. Disasters, configuration errors, poor performance, thirsty...
View ArticleCreating partition on mount points
I have never really been a big fan of mount points, they, I think, can sometimes lead to confusion as to what you are *really* seeing when you view a file / folder structure. Some people love them...
View ArticleDove trovare l'installazione offline di Microsoft .NET Framework
Se avete la necessità di installare .NET Framework in un computer che non è collegato a Internet oppure dovete eseguire l'installazione in più computer, allora è preferibile utilizzare il programma...
View ArticleSustainability Spotlight: Claire Scull, EMEA Corporate Communications
From climate change to cyber security to employee diversity, corporate responsibility (CR) and sustainability touches every aspect of Symantec’s business. We’ve defined our strategy and are continually...
View ArticleNetBackup 7.6 First Availability (FA) Program. October, 2013.
Dear NetBackup Customer: I am pleased to inform you that Symantec NetBackup 7.6 will have a First Availability (FA) program. The FA is expected to be available in early October, 2013. Just as with...
View ArticleGovernment puts faith in mobile platforms
mobilesecurity.com [London, UK] Blackberry may have previously been the preferred smartphone manufacturer for members of the US government, but recent reports suggest that future federal use of...
View ArticleMore Enterprise Vault Process Diagrams
A while ago I wrote about some of the Enterprise Vault process diagrams which have been made available, that post is here.Now there is a nice technote which lists lots, and lots, and lots of different...
View ArticleDefying Convention at VMworld 2013: Designing VMware backups that work!
VMworld 2013 is just a week away. Perhaps this is the one of the biggest technology events where I get to see experts who really get their hands dirty (functional IT staff like system administrators,...
View ArticleWould you disable UAC?
Everything Enterprise Vault client related used to be what I was 'all about' when I was working in Symantec Enterprise Vault Engineering. Okay I also dabbled with tons of other stuff, but I was...
View ArticleSpammers Googly over Ongoing Ashes Series
Contributor: Sujay KulkarniThe Ashes Test cricket series, one of most popular Test series in cricket, is played between England and Australia. It is played alternately in England and Australia and is...
View ArticleWill RSA Survive 2-5 years?”
A few weeks ago at Black Hat 2013 in Las Vegas, there was a particularly interesting presentation entitled, “The Factoring Dead: Preparing for the Cryptopocalypse.” Here at Symantec, we found the topic...
View Article開催中のアッシズシリーズを悪用するスパマー
寄稿: Sujay Kulkarniジ・アッシズ(The Ashes)は、イングランド代表とオーストラリア代表の間で競われるクリケットのテストマッチとして人気の高いシリーズです。両国の間で最も古いテストマッチであり、イングランドとオーストラリアで 1...
View ArticleConnect with us for Symantec Endpoint Protection Technical Support.
Hello,My name is Mithun Sanghavi and I am part of the Technical Support organization at Symantec. I’m sure you have had a few “How do I..." or "Where can I find...?” kind of questions about Symantec...
View ArticleTest your password : TestYourPassword website
A nice resource to test your password is the website TestYourPassword. In a simply interface you can test your passord and see if a psword can be defined weak, good or strong.In the main page you can...
View ArticleInstascam: Instagram for PC Leads to Survey Scam
Instagram, the popular photo and video sharing service acquired by Facebook, is often a target for spam and scams, some of which we have writtenaboutover the past year. This week, a friend shared an...
View ArticleZeroAccess Modifies Peer-to-Peer Protocol for Resiliency
ZeroAccess has always distributed its malicious payloads to infected computers using a peer-to-peer protocol. The use of a peer-to-peer protocol removes the need to maintain centralized...
View ArticleInstascam: アンケート詐欺に誘う Instagram for PC
Facebook に買収された Instagram は、写真とビデオの共有サービスとして人気がありますが、たびたびスパムと詐欺の標的になることも知られています。このブログでも、過去に何度かお伝えしたとおりです(参照 1、参照 2、参照 3)。今週のことですが、友人の Facebook タイムラインで、「Instagram for...
View ArticleEncryption and decryption – the never-ending battle
Ciphers have been in use since around 3,000B.C., but their importance and relevance for information security has really come to the mainstream with the growth of the Internet and the escalating volumes...
View ArticleHow to display all event log sources installed on your system
EventLogSourcesView is a simple portable tool that displays the list of all event log sources installed on your system. For every event log source, the following information is displayed: Event Source...
View ArticleChinese Ransomlock Malware Changes Windows Login Credentials
Although ransomware has become an international problem, we rarely see Chinese versions. Recently, Symantec Security Response noticed a new type of ransomlock malware that not only originates from...
View Article