Video Screencast Help

Search

Search results

This document describes the creation of a maintenance plan for system and SEP (Sem5) databases of SQL Server 2008. This plan is made of simple tasks that do not impact the operation of the databases. These activities aim at increase the performance of ...
Article by Leon_Homar | 18 Mar 2014 | 0 comments
Hello Everyone, It's a very common practice for System administrators to disconnect the active session and reconnect it using 'mstsc' command. By doing this, many sessions can get activated in the background. It happens especially when ...
Article by Chetan Savade | 19 Mar 2014 | 4 comments
Symantec Endpoint Protection はあらゆる規模の企業に対して最善のエンドポイントセキュリティを提供します。このホワイトペーパーでは、Symantec Endpoint Protection 環境を正しくサイジングして配備し、最適な保護と有用性を実現するためのベストプラクティスを説明します。   SizingSizabilityBestPractices_SEP12.1_ja.pdf (Security, 12.x, ...
Article by SEP サポート | 16 Feb 2014 | 0 comments
Introduction This is the fifth of an informal series on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec Endpoint Protection (and the OS upon which it functions).  The first article, Using ...
Article by Mick2009 | 14 Feb 2014 | 2 comments
This article is a continuation of my three previous articles: How to utilize SEP 12.1 for Incident Response - PART 1 How to utilize SEP 12.1 for Incident Response - PART 2 How to utilize SEP 12.1 for Incident Response - PART 3 ...
Article by _Brian | 14 Jan 2014 | 7 comments
Lately it has been noticed an increasing spread of threats which, entering a system by various means are encrypting several files on the attacked system like office documents, database files, e-mail archives, which represent a value for the attacked ...
Article by vik-svo | 03 Apr 2014 | 4 comments
Introduction This is the fourth of an informal series on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec Endpoint Protection (and the OS upon which it functions).  The first article, Using ...
Article by Mick2009 | 10 Jan 2014 | 6 comments
In order to install #SAVFL on your #Linux Machine you need to verify your OS details.  Commands to check the Linux Version, Release name & Kernel version. uname -a (Print all Information)   ...
Article by vickyj | 07 Mar 2014 | 1 comment
Online gaming - "En Taro Adun" to the Part 5 of the Security 1:1 Series Online gaming just like any other branch of internet community is being targeted for scam, fraud and hacks. Few years back the scope of the scams involving ...
Article by SebastianZ | 07 Jan 2014 | 0 comments
What is this about? In this article we will have a look at portfolio of both Symantec and Norton Security products. The introduced list will include both Enterprise products in case of Symantec family and Consumer products from Norton family. Some of ...
Article by SebastianZ | 07 Jan 2014 | 2 comments