Quantcast
Channel: Symantec Connect - ブログエントリ
Browsing all 5094 articles
Browse latest View live

Save the Date: Google+ Hangout – Why Host-Based SSDs are Critical for SLAs in...

Service level agreements (SLAs) must be met whether you’re keeping mission-critical data centers running or serving up frosty beverages. Disasters, configuration errors, poor performance, thirsty...

View Article


Creating partition on mount points

I have never really been a big fan of mount points, they, I think, can sometimes lead to confusion as to what you are *really* seeing when you view a file / folder structure.  Some people love them...

View Article


Dove trovare l'installazione offline di Microsoft .NET Framework

 Se avete la necessità di installare .NET Framework in un computer che non è collegato a Internet oppure dovete eseguire l'installazione in più computer,  allora è preferibile utilizzare il programma...

View Article

Image may be NSFW.
Clik here to view.

Sustainability Spotlight: Claire Scull, EMEA Corporate Communications

From climate change to cyber security to employee diversity, corporate responsibility (CR) and sustainability touches every aspect of Symantec’s business. We’ve defined our strategy and are continually...

View Article

NetBackup 7.6 First Availability (FA) Program. October, 2013.

Dear NetBackup Customer: I am pleased to inform you that Symantec NetBackup 7.6 will have a First Availability (FA) program.  The FA is expected to be available in early October, 2013.  Just as with...

View Article


Government puts faith in mobile platforms

 mobilesecurity.com [London, UK] Blackberry may have previously been the preferred smartphone manufacturer for members of the US government, but recent reports suggest that future federal use of...

View Article

More Enterprise Vault Process Diagrams

A while ago I wrote about some of the Enterprise Vault process diagrams which have been made available, that post is here.Now there is a nice technote which lists lots, and lots, and lots of different...

View Article

Defying Convention at VMworld 2013: Designing VMware backups that work!

VMworld 2013 is just a week away. Perhaps this is the one of the biggest technology events where I get to see experts who really get their hands dirty (functional IT staff like system administrators,...

View Article


Would you disable UAC?

Everything Enterprise Vault client related used to be what I was 'all about' when I was working in Symantec Enterprise Vault Engineering. Okay I also dabbled with tons of other stuff, but I was...

View Article


Image may be NSFW.
Clik here to view.

Spammers Googly over Ongoing Ashes Series

Contributor: Sujay KulkarniThe Ashes Test cricket series, one of most popular Test series in cricket, is played between England and Australia. It is played alternately in England and Australia and is...

View Article

Will RSA Survive 2-5 years?”

A few weeks ago at Black Hat 2013 in Las Vegas, there was a particularly interesting presentation entitled, “The Factoring Dead: Preparing for the Cryptopocalypse.” Here at Symantec, we found the topic...

View Article

Image may be NSFW.
Clik here to view.

開催中のアッシズシリーズを悪用するスパマー

寄稿: Sujay Kulkarniジ・アッシズ(The Ashes)は、イングランド代表とオーストラリア代表の間で競われるクリケットのテストマッチとして人気の高いシリーズです。両国の間で最も古いテストマッチであり、イングランドとオーストラリアで 1...

View Article

Connect with us for Symantec Endpoint Protection Technical Support.

Hello,My name is Mithun Sanghavi and I am part of the Technical Support organization at Symantec. I’m sure you have had a few “How do I..." or "Where can I find...?” kind of questions about Symantec...

View Article


Image may be NSFW.
Clik here to view.

Test your password : TestYourPassword website

A nice  resource to test your password is the website TestYourPassword. In a simply interface you can test your passord and see if a psword can be defined weak, good or strong.In the main page you can...

View Article

Image may be NSFW.
Clik here to view.

Instascam: Instagram for PC Leads to Survey Scam

Instagram, the popular photo and video sharing service acquired by Facebook, is often a target for spam and scams, some of which we have writtenaboutover the past year. This week, a friend shared an...

View Article


ZeroAccess Modifies Peer-to-Peer Protocol for Resiliency

ZeroAccess has always distributed its malicious payloads to infected computers using a peer-to-peer protocol. The use of a peer-to-peer protocol removes the need to maintain centralized...

View Article

Image may be NSFW.
Clik here to view.

Instascam: アンケート詐欺に誘う Instagram for PC

Facebook に買収された Instagram は、写真とビデオの共有サービスとして人気がありますが、たびたびスパムと詐欺の標的になることも知られています。このブログでも、過去に何度かお伝えしたとおりです(参照 1、参照 2、参照 3)。今週のことですが、友人の Facebook タイムラインで、「Instagram for...

View Article


Encryption and decryption – the never-ending battle

Ciphers have been in use since around 3,000B.C., but their importance and relevance for information security has really come to the mainstream with the growth of the Internet and the escalating volumes...

View Article

Image may be NSFW.
Clik here to view.

How to display all event log sources installed on your system

EventLogSourcesView is a simple portable tool that displays the list of all event log sources installed on your system. For every event log source, the following information is displayed: Event Source...

View Article

Image may be NSFW.
Clik here to view.

Chinese Ransomlock Malware Changes Windows Login Credentials

Although ransomware has become an international problem, we rarely see Chinese versions. Recently, Symantec Security Response noticed a new type of ransomlock malware that not only originates from...

View Article
Browsing all 5094 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>