Video Screencast Help

Search

Search results

The script below is intended to detect data leakage in helthcare environments. Files detecting by this script is widely used in a variety of medical diagnostic systems and may include personal information. ...
Download by xand | 17 Jul 2015 | 0 comments
Trends in Trust on the internet of Things We are all happy with how technology is making our lives easier and fulfilling. Most of the internet population is however not aware that the moment you turn on a device connected to internet or ...
Article by dion_alken | 22 Apr 2015 | 0 comments
In the Symantec Endpoint Protection Manager (SEPM), the Risk Logs report has a hyperlink that can be clicked, opening a write-up page and letting the admin read about the threats which are being detected by endpoints on the network. (Ways they spread, ...
Idea by Mick2009 | 06 Mar 2013 | 0 comments
At present Symantec Endpoint Protection 12.1 RU2 (and above) can support Windows 8 Standard and Windows 8 Professional.  Symantec Mobile Security 7.2 can support Windows Mobile 5 through Windows Mobile 6.5.  There is, however, no Enterprise release of ...
Idea by Mick2009 | 21 Nov 2012 | 2 comments
I need a solution Hi, We uses SEP and SEPM 12.1 RU1 MP1. Our problem is that the SEPM sends multiple notifications through e-mail. It is very annoying. Please help us to get rid of ...
Forum Discussion by Ishmael | 04 Oct 2012 | 2 comments
I need a solution hi all Every monday our SEPM server reports a Poor health status. I check the free disc space and it is still 14.5 GB, The memory is 3 GB. Do anyone here had the ...
Forum Discussion by Ishmael | 16 Sep 2012 | 8 comments
I do not need a solution (just sharing information) Good morning,  It would not be important in similar forensic software security solution to point some strange movement in net for ...
Forum Discussion by Fabiano.Pessoa | 09 Sep 2012 | 2 comments
I do not need a solution (just sharing information) Dear, good morning.   I would like to propose a database for codes port scan, or create a code base with NMAP scans ...
Forum Discussion by Fabiano.Pessoa | 05 Sep 2012 | 5 comments
Good morning gentlemen  It would be great to create a failure analysis after disinfection in the operating system  It would be very good this fix in the system caused by malicious file example of an attack that metasploit using java and concept by ...
Idea by Fabiano.Pessoa | 31 Aug 2012 | 0 comments
I do not need a solution (just sharing information) STEP 1: Once you start GRUB press the E (edit). STEP 2: Select the line below and press the E (edit). kernel ...
Forum Discussion by Fabiano.Pessoa | 27 Aug 2012 | 0 comments