Video Screencast Help

Search

Search results

This is a feature enhancement request. At the moment creating a process set for an application/service is a manual process. What would be ideal would be either something built-in to the agent or a tool that you could give a set of processes or ...
Idea by sunny_yu | 30 Oct 2013 | 0 comments
Prezados, bom dia. Muito estamos preocupados com grandes ataques a nossos computadores e redes, no qual o que menos queremos no momento, seria um roubo de informação ou algo do tipo. Porém vale lembrar a todos, que os ataques estão sendo modificados, ...
Idea by Fabiano.Pessoa | 01 Aug 2012 | 0 comments
Independence, OH Thu, 23 August, 2012 - 9:00 EDT Join us for our next Cleveland Security & Compliance User ...
Event by collinj5 | 01 Aug 2012 | 1 comment
Prezados, boa tarde.  Gostaria de salientar a necessidade de varredura em códigos de arquivo .bat  Todos nós sabemos que .bat não é vírus, é basicamente um arquivo de automação. Existem comandos reconhecidos pelo computador e que são executados ...
Idea by Fabiano.Pessoa | 30 Jul 2012 | 0 comments
On 8'th June 2011, we had a World IPv6 Day where it was a 24-hour test that focused on websites.  Cathal Mullaney posted a blog for the same.  --  https://www-secure.symantec.com/connect/blogs/brave-new-world-ipv6-day   To ensure ...
Article by Aniket Amdekar | 06 Jun 2012 | 2 comments
  Hi folks! I just want to share my idea, to have a better security using our touchscreen mobile/computer/ipad or whatever it is as long as it is touchscreen, I come up with an idea of the fingerprinting security, if the developer can do such ...
Idea by reginald.penaverde | 03 Dec 2011 | 1 comment
  I've heard my new U.S. passport will be embedded with an ID chip. What is this? Many countries, including the United States, are now including an RFID (Radio-Frequency Identification) chip in newly issued “e-passports.” ...
Idea by Geoff NH | 16 Nov 2011 | 0 comments
Introduction Trojans and Backdoors are sorts of Bad-wares which their main purpose is to send and receive data and especially commands through a port to another system. This port can be even a well-known port such as 80 or an out of regular ports ...
Article by Farzad | 13 Oct 2010 | 1 comment
Hilton Baltimore Sun, 06 June, 2010 - 2:00 PDT - Mon, 14 June, 2010 - 9:30 PDT Dear Colleague, ...
Event by gambrose@sans.org | 11 May 2010 | 0 comments
A common perception of malware is that it spreads at an exponential rate. This theory has been supported by the erroneous calculation based on trending between two points, one being an arbitrary point in the past and the other a more recent. This ...
Article by Terry_Freeman | 30 Mar 2010 | 2 comments