Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.

Search

Search results

Welcome to the Security 1:1 - Part 3 In part 3 of the series we will discuss various types of network attacks. On this occassion I will introduce as well some types of attacks directed more at end-user than at network or host computers - we ...
Article by SebastianZ | 27 Dec 2013 | 1 comment
Welcome to the Security 1:1 - Part 2 In Part 2 we take a closer look at Trojans - what is a Trojan? Why is it different from a virus? What are the types of Trojans based on their function and attack vectors. The introduced classification of ...
Article by SebastianZ | 26 Dec 2013 | 0 comments
Welcome to the Security 1:1 series of articles In Part 1 we start right off with Viruses and Worms - get to know the definitions and what differentiates them. Nowadays both terms are quite often used interchangeable but there are still ...
Article by SebastianZ | 25 Dec 2013 | 1 comment
Hi today i am going to explain the thing that you have to know about SQL Injection. What is SQL injection  How it work   What is SQL injection: -SQL injection is attack vector in which attacker directly execute SQL query ...
Article by Vin32hack | 30 Sep 2012 | 0 comments
On 8'th June 2011, we had a World IPv6 Day where it was a 24-hour test that focused on websites.  Cathal Mullaney posted a blog for the same.  --  https://www-secure.symantec.com/connect/blogs/brave-new-world-ipv6-day   To ensure ...
Article by Aniket Amdekar | 06 Jun 2012 | 2 comments
Common Vulnerability Scoring System Introduction: The Common Vulnerability Scoring System is a rating system is designed to provide open and universally standard severity ratings of software vulnerabilities. It has been created for creating ...
Article by Aniket Amdekar | 24 May 2012 | 2 comments
Problem SEP SBE 12 RU1 clients are deployed in Console-managed mode with all components included. After deployment, all of components are active and on; definitions are implemented correctly. However, when launching ping of death attack ...
Article by Maciej_Jedrzejczyk | 11 Aug 2011 | 0 comments
This month Microsoft released an update for Windows to address three vulnerabilities in the SMB Server component. Two of the vulnerabilities are remote denial-of-service (DoS) attacks, while one (CVE-2010-2550) has the potential for remote code ...
Article by Aniket Amdekar | 10 Aug 2010 | 0 comments
Microsoft has released a security advisory (2286198) . The vulnerability exists because Windows incorrectly parses shortcuts in such a way that malicious code may be executed when the user clicks the displayed icon of a specially crafted shortcut. ...
Article by Aniket Amdekar | 22 Jul 2010 | 1 comment
The embedded Sybase database included with Symantec Endpoint Protection Manager is not supported by the Symantec Endpoint Protection Integration Component. Only SQL Server 2000 or SQL Server 2005 databases are supported. To use Symantec Endpoint ...
Article by johnvg | 14 Jul 2009 | 1 comment