Quantcast
Channel: Symantec Connect - ブログエントリ
Browsing all 5094 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

How To Create a Single or Multiple GUP

How To Create a GUPFirst Installed SEP client on that machine which you want to create as a GUP. and then follow the below mention steps.1. Login in to SEPM Console.2. Click on Policy.3. Then Click on...

View Article


Image may be NSFW.
Clik here to view.

#Spotthetick to win a £50 Amazon voucher

This Monday, 11 February 2013, we will be giving you the chance to win £50 in Amazon vouchers each week just by Tweeting us the URL of a site where you have spotted the Norton™ Secured Seal.  The...

View Article


5 Weeks in.

A lot of questions for Altiris support today. The product is piloting very well to this point with the exception being the Deployment Solutions.The amount of issues with the product, the oddness of the...

View Article

Symantec at the Mobile World Congress 2013 in Barcelona

Symantec at Mobile World Congress 2013 in Barcelona Symantec’s theme at the upcoming MWC 2013 in Barcelona is ‘Mobility without vulnerability’.For Communication Service Providers we will...

View Article

Symantec™ Validation and ID Protection Service

Securing access to networks and applications.Sophisticated network attacks have rendered simple password authentication insufficient to protect an organization against unauthorized access to its...

View Article


Image may be NSFW.
Clik here to view.

Symantec Secures 27 Honors from Redmond Magazine

Redmond Magazine recently announced the winners of its 2013 Reader’s Choice “Best of the Best” Awards and Symantec came out on top, winning the highest number of awards for a single company this year....

View Article

You Might Be an APT Victim if… - Part 3

In part 1 of this series, we looked at three possible signs you may have been the victim of an APT and how to detect and defend against these activities:  1)Gaps in System and Security Logs; 2)...

View Article

Image may be NSFW.
Clik here to view.

Phishing: The Easy Way to Compromise Twitter Accounts

Last week, Twitter announced that the details of around 250,000 of its users may have been compromised before it discovered and stopped an attack on their network. There is not much you can do when...

View Article


Deep down under the hood

Great call today, Altiris support is like a box of chocolate, unless you are nice to some people and they can get you connected with the right people.Chatted for a while with Thomas Baird today, he's...

View Article


Image may be NSFW.
Clik here to view.

フィッシング: Twitter アカウントへの不正アクセスの手口

先週 Twitter 社は、同社のネットワークが攻撃を受け、攻撃はすぐに止めたものの、それまでの間に約 250,000...

View Article

Is Exchange Journaling insecure?

 Sounds strange doesn't it? Exchange Journaling, the process used by thousands of Exchange customers all over the world to ensure that have a defensible and reliable eDiscovery position, has been...

View Article

Image may be NSFW.
Clik here to view.

Money Transfer Spam Campaign with HTML Attachment

Phishers love to arouse curiosity and/or fear in the user’s mind and this stimulus can compel people to set aside all caution as well as  any safety measures they might have in place to avoid such...

View Article

Image may be NSFW.
Clik here to view.

Cyber Threats Increase around Valentine’s Day

Most people are eagerly waiting for Valentine's Day. The day is an opportunity to spread affection and excitement amongst loved ones by exchanging gifts. Last year we observed prominent spam attacks...

View Article


Image may be NSFW.
Clik here to view.

Phishing – La manera más fácil de comprometer las cuentas de Twitter

La semana pasada, Twitter anunció que la información de alrededor de 250,000 usuarios podría haberse comprometido previo a que descubriera y detuviera un ataque a su red. Es poco lo que se puede hacer...

View Article

Customer Success: Kwizda Holdings GmbH Selects Altiris to Reduce Costs &...

Kwizda, a leading Austrian pharmaceutical company, needed to streamline management and lower costs associated with managing some 900 clients and virtual servers. To further complicate the issue, the...

View Article


Image may be NSFW.
Clik here to view.

Adobe Zero-day Used in LadyBoyle Attack

Yesterday, Adobe released an out of cycle patch that fixed two zero-day vulnerabilities (CVE-2013-0633, CVE-2013-0634) for Adobe Flash Player 11.5.502.146 and earlier versions for both Windows and...

View Article

Homework for the weekend.

Sorted a lot of items today, most discovery and not fixes.Discovery of a lot more issues that is. All DS and imaging related. Here are some of the crazy scenarios.1. Build a machine with the predefined...

View Article


Image may be NSFW.
Clik here to view.

Malvertising and Dynamic DNS: A Never Ending Story

Contributor: John HarrisonSymantec has been tracking a large malvertising campaign for over 5 months now. The campaign is still active and uses Dynamic Domain Name System (DDNS) to prevent itself from...

View Article

Image may be NSFW.
Clik here to view.

How Steve Jobs Influenced the Modern World of Digital Design

If you are a design professional, chances are one of the Apple computers was where you first learned your trade. You would also be somewhat familiar with one of the original men behind the design of...

View Article

Troubleshooting Articles for Repairing the Corrupted Definition

Hi Friends,In this blog i have added some Troubleshooting Articles which can help to Repairing the Corrupted Definition How to clear corrupt Virus Definitions from...

View Article
Browsing all 5094 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>