Quantcast
Channel: Symantec Connect - ブログエントリ
Browsing all 5094 articles
Browse latest View live

Understanding the ResourceAssociation table

The following query maps item names to the three different guids found within the ResourceAssociation table, allowing you to understand its contents better:SELECT vi1.[Guid] AS...

View Article


Storage and Partitions

Do you store your Enterprise Vault data on locally attached disks to your server (DAS)? Do you use a Storage Area Network (SAN)? Do you use Network Attached Storage (SAN)? Whatever you use, the storage...

View Article


Image may be NSFW.
Clik here to view.

インターネット安心デー(Safer Internet Day)に向けてソーシャルアカウントを保護

10 月の全米サイバーセキュリティ意識向上月間(National Cyber Security Awareness Month)や、2 月のインターネット安心デー(Safer Internet Day)に限らず、日常的にオンラインの安全性を意識することは常に大切です。日常生活へのテクノロジの浸透が進み続けている今、自身の情報やデジタル ID...

View Article

Image may be NSFW.
Clik here to view.

Tiylon: 現代の銀行強盗

史上最悪の銀行強盗は、2005 年にブラジルで起きたものです。この事件で、銀行強盗団は鋼鉄と強化コンクリートでできた厚さ 1.1m もの壁に穴を開け、紙幣が保管されている 3.5 トンものコンテナを運び出しました。このとき、約 1 億 6,000 万ブラジルドル(3 億 8,000...

View Article

Monitoring Android Network Traffic Part I: Installing The Toolchain

TCPDUMP is extremely useful for monitoring network traffic when debugging applications and performing penetration tests. Unfortunately Android mobile devices do not include the TCPDUMP program....

View Article


Monitoring Android Network Traffic Part II: Cross Compiling TCPDUMP

TCPDUMP is extremely useful for monitoring network traffic when debugging applications and performing penetration tests. Unfortunately Android mobile devices do not include the TCPDUMP program....

View Article

Monitoring Android Network Traffic Part III: Installing & Executing TCPDUMP

TCPDUMP is extremely useful for monitoring network traffic when debugging applications and performing penetration tests. Unfortunately Android mobile devices do not include the TCPDUMP program....

View Article

Monitoring Android Network Traffic Part IV: Forwarding To Wireshark

TCPDUMP is extremely useful for monitoring network traffic when debugging applications and performing penetration tests. Unfortunately Android mobile devices do not include the TCPDUMP program....

View Article


Image may be NSFW.
Clik here to view.

The Mask

 Modern cyberespionage campaigns are regularly defined by their level of sophistication and professionalism. “The Mask”, a cyberespionage group unveiled by Kaspersky earlier today, is no exception....

View Article


Symantec MSS Threat Landscape Update: Point of Sale Malware

Credit and debit card data theft is one of the earliest forms of cybercrime and persists today. Cybercrime gangs organize sophisticated operations to steal vast amounts of data before selling it in...

View Article

Image may be NSFW.
Clik here to view.

{CWoC} SWD Trending util progress report

I have progressed the Software Delivery trending tool quite nicely and has it often happen, the (interim) result drives the long term design.So far I have 2 files for the toolkit: an executable that...

View Article

Customer Safaris

On the hunt for Data Scientists, Storage Admins, and DBAs My name is Elizabeth Teffner. I'm a Customer Research Analyst at Symantec. Our Customer Research group is organizing Customer Safaris to...

View Article

Webinar: The Cloud - A Game Changer For Healthcare

Wednesday, February 19, 2014 | 2:00 pm ET/11:00 am PT | Duration: 1 Hour Wednesday, February 19, 2014  |  2:00 pm ET/11:00 am PT  |  Duration: 1 HourThe use of cloud as a deployment alternative for IT...

View Article


Safer Internet Day 2014

What “One Good Thing” Would You Do to Make the Internet Safer? Today is the launch of Safer Internet Day, an annual awareness campaign promoting safer and more responsible use of online technology and...

View Article

Image may be NSFW.
Clik here to view.

My (Failed) Visits to Spammers’ Offices

One of the most popular methods of spamming is snowshoe spam, also known as hit and run spam. This involves spam that comes from many IP addresses and many domains, in order to minimize the effect of...

View Article


Patch Tuesday February 2014 - Security Bulletin Summary from Microsoft

Microsoft Security BulletinOn Tuesday the 11th of FebruaryMicrosoft released the monthly Security Bulletin Summary for February 2014. The summary includes 7 Security Bulletins - 4 are classified as...

View Article

Microsoft Patch Tuesday – February 2014

Hello, welcome to this month's blog on the Microsoft patch release. This month the vendor is releasing seven bulletins covering a total of thirty-one vulnerabilities. Twenty-five of this month's issues...

View Article


At HIMSS 2014 How Important Is . . .

What is big at the big show this year. Recently I got some information from HIMSS regarding the upcoming HIMSS14 and topics that attendees will be focused on. They had a great infographic that...

View Article

12 Things to Look for in a Managed PKI Solution, Part 1

The purpose of this week’s blog post is to make you aware that not all Managed PKI providers are the same. In fact, there are some pretty significant differences between Symantec’s offerings relative...

View Article

Image may be NSFW.
Clik here to view.

The Mask(ザ・マスク)

 最近のサイバースパイ活動は、その精巧さと専門性がたびたび明らかになっています。2 月 10 日に Kaspersky 社が報告した「The Mask(ザ・マスク)」と呼ばれるサイバースパイグループも例外ではありません。シマンテックが The Mask について調査したところ、このグループは 2007...

View Article
Browsing all 5094 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>