aila2-version 1: quick usage overview
Here is an overview of how I am currently using the aila2 tools release here on Connect to provide updated data to users.Only a couple of elements are missing from the image below:A run batch file...
View ArticleMLK Day of Service: What are You Doing for Others?
Dr. Martin Luther King, Jr. once said, “Life’s most persistent and urgent question is: ‘What are you doing for others?’”Today – January 20, 2014 – is the MLK Day of Service, a part of United We Serve,...
View ArticleITMS 7.5 HF3 is out
HF3 for ITMS 7.5 is now available via SIM. Please review the attached screenshot for the seven products that it can update.
View ArticleWe’re hiring! MSS is currently looking for Security Analysts to join our team...
Are you passionate about security? Love solving difficult problems? Want to work with a wide variety of technologies and platforms? Come work with Symantec! Security Analysts in Symantec's Managed...
View ArticleCase Study from the Spammer's Perspective: Crafting Spam Content to Increase...
Spammer success is dependent on two factors:Evading spam filters so the spam message arrives in the recipient inboxCrafting messages so that the recipient is enticed to open and perform desired...
View ArticleHow To Recover from Windows 8/8.1 Disable/Enable User Access Control (UAC)...
After Disabling UAC via Domain GPO and Re-enabling it Users that logged in with account when UAC was disabled are now broken and need to be recreated.
View ArticleThe Internet of Things: New Threats Emerge in a Connected World
Could your baby monitor be used to spy on you? Is your television keeping tabs on your viewing habits? Is it possible for your car to be hacked by malicious attackers? Or could a perfectly innocent...
View ArticleITMS 7.5 Hotfix 3 release details
The Symantec Product Listing XML was updated on 20th January 2014 with new data for the release of the 7.5 hotfix 3.
View Articleスパマーの視点に立った事例紹介: 成功率の高いスパムコンテンツの作成
スパマーにとって、成功を収めるには 2 つの要因があります。スパムメッセージがスパムフィルタをすり抜けて、相手の受信ボックスに届くこと受信者が思わず開封し、コールトゥアクション(リンクをクリックする、添付ファイルを開く、など)を実行したくなるようなメッセージを作成することスパマーは、巧妙なバランスでこの 2...
View ArticleHeads up: SMP 7.5 does not record report outputs in its logs like 7.1 does
One unfortunate difference between SMP 7.1 and 7.5 is that in 7.1, when you run a report, the SMP records a number of "Altiris.Reporting....." entries in its logs; two of which were high useful:...
View ArticleThe Worst Passwords of 2013
SplashData has compiled a list of the 25 worst passwords of 2013. This list is from files containing stolen passwords posted online during the previous year.This year's list is heavily influenced by...
View ArticleNetBackup Appliance 2.6 Release Overview
Symantec announces the availability of Symantec NetBackup appliance software version 2.6 based on Symantec NetBackup 7.6 release. This release addresses virtual machine sprawl, lowers the barriers to...
View ArticleNetBackup Appliance 2.6 Release: NetBackup 5230–14TB Configuration
If Goldilocks had stumbled upon the NetBackup 5230 - 14 TB configuration appliance in her journey, her assessment of it would be “just right”. It is just right as it addresses our customer’s capacity...
View ArticleNetBackup Appliance 2.6 Release: New Diagnostics Center
A third area the NetBackup Appliance 2.6 Release focuses on is improved supportability. Refer to the two previous blogs; NetBackup Appliance 2.6 Release Overview and NetBackup 5230 – 14TB...
View ArticleHealthcare Take Notice - a Warning from Down Under
Medical Records held for Ransom Pharmacy Board of Australia issuing formal warning on records held for ransom based on 10 reported incidents.
View ArticleJAVA 7u45 and 7u51 not compatible with Package Import/Edit tool Altiris 7 web...
incompatibilité entre les derniers update JAVA, et la console Altiris 7 Attention aux mises à jour JAVA pour les administrateurs Altiris, problème remonté par Xavier (Merci à lui ;)Attention aux mises...
View ArticleDisk-based data backup and tape storage based recovery-Get baest out of your...
Respected forum members,This is my first ever thread. I have tried to make it as informative as possible.This blog is inspired by Curtis Preston's blog...
View ArticleCalling Korea: How to Stay Safe Online
You need to think global in the 21st century. But sometimes it’s vital to keep a local perspective too. Take internet security. Many threats have a worldwide character but, in every country, consumers...
View ArticleA Winning Formula In A Rapidly Changing World: An Interview with Lotus F1 Team
As fans of Formula 1 eagerly await the new season, big changes are coming that will have a major impact on the sport. It’s something that Lotus F1 Team readily acknowledges will be a huge challenge....
View ArticleShortcut Content - How big, or how small?
Setting up the content of Exchange shortcuts that Enterprise Vault should create is something that should be given due time and consideration. There are many factors to consider, so let's describe...
View Article