Video Screencast Help

Search

Search results

The importance of orchestrated “cloud” security In today’s digital world, the area of security and safety has become paramount. Cybercrimes are on the rise and are becoming more sophisticated. We could be experiencing “a new era in cybercrime”. ...
Article by dion_alken | 20 Feb 2015 | 0 comments
Cleveland, Ohio (LaCentre in Westlake, Ohio) Thu, 30 October, 2014 - 7:30 EDT - Fri, 31 October, 2014 - 16:00 EDT ...
Event by Brad G. | 06 Oct 2014 | 0 comments
Prezados, boa tarde.  Gostaria de salientar a necessidade de varredura em códigos de arquivo .bat  Todos nós sabemos que .bat não é vírus, é basicamente um arquivo de automação. Existem comandos reconhecidos pelo computador e que são executados ...
Idea by Fabiano.Pessoa | 30 Jul 2012 | 0 comments
On 8'th June 2011, we had a World IPv6 Day where it was a 24-hour test that focused on websites.  Cathal Mullaney  posted a blog for the same.  --  https://www-secure.symantec.com/connect/blogs/brave-new-world-ipv6-day   To ...
Article by Aniket Amdekar | 06 Jun 2012 | 2 comments
Webinar (link to registration below) Fri, 13 January, 2012 - 11:00 - 17:00 EST Please join the ...
Event by James Cromer | 09 Jan 2012 | 0 comments
Hi folks! I just want to share my idea, to have a better security using our touchscreen mobile/computer/ipad or whatever it is as long as it is touchscreen, I come up with an idea of the fingerprinting security, if the developer can do such application ...
Idea by reginald.penaverde | 03 Dec 2011 | 1 comment
I've heard my new U.S. passport will be embedded with an ID chip. What is this? Many countries, including the United States, are now including an RFID (Radio-Frequency Identification) chip in newly issued “e-passports.” Government ...
Idea by Geoff NH | 11 Jul 2011 | 0 comments
Hi All You may know that Symantec have Altiris which is a powerfull tool but what i have in mind Altiris is able to deploy OS Updates & SEPM is not It's not Symantec Problem but all AV vendors does not have this Feature The ...
Idea by Ahmed Atef Khal... | 31 May 2011 | 0 comments
I need a solution Hi, Can someone explain me the difference between CCS and ESM. Please list out what CCS will do and ESM will do. I’m not able to understand the ...
This issue has been solved
Forum Discussion by Shivaji RS | 21 Apr 2011 | 3 comments
Introduction Trojans and Backdoors are sorts of Bad-wares which their main purpose is to send and receive data and especially commands through a port to another system. This port can be even a well-known port such as 80 or an out of regular ports ...
Article by Farzad | 20 Sep 2010 | 1 comment