Video Screencast Help

Search

Search results

What is this about? In this article we will have a look at portfolio of both Symantec and Norton Security products. The introduced list will include both Enterprise products in case of Symantec family and Consumer products from Norton family. Some of ...
Article by SebastianZ | 07 Jan 2014 | 2 comments
Every time you close out of the SymHelp tool, you get the following pop up box:   A couple suggestions: Remove this message and allow users to add feedback from within the tool only Allow the tool to remember your last ...
Idea by _Brian | 16 Dec 2013 | 1 comment
can transmit information between computers using high-frequency sound waves inaudible to the human ear. The duo successfully sent passwords and more between non-networked Lenovo T400 laptops via the notebooks’ built-in microphones and speakers. ...
Blog Entry by captain jack sparrow | 03 Dec 2013 | 0 comments
Webcast Tue, 15 October, 2013 - 10:00 - 11:00 PDT Join our upcoming webcast to learn about a new ...
Event by Elspeth Magoria | 26 Sep 2013 | 0 comments
Thousands of years ago, news traveled at the pace of man or animal. I mean to say you would only learn what someone else was doing or what was happening either in the next town, village, kingdom, etc. only as fast as it could physically get to you. It ...
Blog Entry by rshaker2 | 29 Jul 2013 | 3 comments
FileConnect latest changes do no longer include the HTTP download option but only the Java one, which most likely will redirect you to Oracle.com if your browser blocks the plugin. The idea is to restore the HTTP download option on FileConnect. ...
Idea by Shulk | 16 May 2013 | 7 comments
iGoat v2.0 ( https://www.owasp.org/index.php/OWASP_iGoat_Project ) is a program that demonstrates common iOS mobile application security weaknesses and their remediation.  There are other resources that show the use of this tool. One example, ...
Blog Entry by Michael D Smith | 22 May 2013 | 1 comment
Let’s face it users cannot be trusted to know their entire password, I am not talking about the user that writes down their passwords on sticky notes the bad guys would need physical access to actually access those. What I am really speaking to how ...
Blog Entry by Joseph.Rogalski | 29 Apr 2013 | 9 comments
WordPress is the most commonly used blogging platform. It is easy to install and has a great ecosystem of plugins and enhancements that extend its capabilities beyond simply posting pictures of your cats. Unfortunately, millions of inexperienced users ...
Blog Entry by uuallan | 23 Apr 2013 | 0 comments
I’m optimistic on the current trends in security. The concepts of “intelligence” and “big data” have to potential to shift focus to counter the current threat landscape of intentional attacks to steal or destroy valuable information. Additional focus on ...
Blog Entry by PaulTobia | 18 Apr 2013 | 0 comments