Video Screencast Help

Search

Search results

This video is a presentation and demonstration about the DNS Spoofing attack methodology and how to mitigate it using Symantec Endpoint Protection system. Rather than providing ...
Video by Farzad | 26 Sep 2015 | 0 comments
Dear All,  please find attached a (novel) idea in the rough about the evolution of endpoint protection. Your comments, especially on how to improve this paradigm, are welcome. Best, K. Distributed Secure Network Services ...
Idea by secprac313 | 20 Sep 2015 | 0 comments
How to be ahead of Outbreaks! There are two common checkpoints that security administrators or managers inspect a computer or a host for evaluating the security well being. The first stage is the periodic report analysis, which is performed on ...
Article by Farzad | 17 Sep 2015 | 0 comments
Victory Brewing Company Wed, 28 October, 2015 - 12:00 - 16:30 EDT In follow up to the Hershey, ...
Event by Jami | 17 Sep 2015 | 0 comments
Dave & Busters (NEW Location - Walden Galleria in Buffalo, NY) Fri, 23 October, 2015 - 12:00 - 16:30 EDT ...
Event by Jami | 02 Sep 2015 | 2 comments
Symantec Endpoint Protection should log the MD5 hash of all detected threats prior to quarantine/clean/deletion. This is an included feature of the McAfree enterprise AV solution. For example: 1/5/2015 3:55:02 PM Deleted (Clean failed because the ...
Idea by Shryke | 06 Aug 2015 | 0 comments
The importance of orchestrated “cloud” security In today’s digital world, the area of security and safety has become paramount. Cybercrimes are on the rise and are becoming more sophisticated. We could be experiencing “a new era in cybercrime”. ...
Article by dion_alken | 20 Feb 2015 | 0 comments
Cleveland, Ohio (LaCentre in Westlake, Ohio) Thu, 30 October, 2014 - 7:30 EDT - Fri, 31 October, 2014 - 16:00 EDT ...
Event by Brad G. | 06 Oct 2014 | 0 comments
Prezados, boa tarde.  Gostaria de salientar a necessidade de varredura em códigos de arquivo .bat  Todos nós sabemos que .bat não é vírus, é basicamente um arquivo de automação. Existem comandos reconhecidos pelo computador e que são executados ...
Idea by Fabiano.Pessoa | 30 Jul 2012 | 0 comments
On 8'th June 2011, we had a World IPv6 Day where it was a 24-hour test that focused on websites.  Cathal Mullaney  posted a blog for the same.  --  https://www-secure.symantec.com/connect/blogs/brave-new-world-ipv6-day   To ...
Article by Aniket Amdekar | 06 Jun 2012 | 2 comments