Video Screencast Help

Search

Search results

I need a solution Hello all , I want to know about the following in SMG for SP SMG-SP Design architecture. High availability deployment.  Best practices   Your ...
Forum Discussion by Outrageous | 21 Aug 2014 | 0 comments
Phishers are known for capitalizing on current events and using them in their phishing campaigns. Celebrity scandals are popular and Symantec recently observed a phishing attack on the Facebook platform that claimed to have the sex tape of well-known ...
Blog Entry by Avdhoot Patil | 19 Aug 2014 | 0 comments
I need a solution Hello Forum Im trying to delist an IP range blocked by Symantec Brightmail. The range is 178.32.148.16-178.32.148.23 and i was notified that this range is ...
Forum Discussion by sabueso | 16 Aug 2014 | 0 comments
I need a solution Hello all , I hope everyone is doing good. I am going to design a solution for one of the ISPs and I need your help about the various components and questions ...
Forum Discussion by Outrageous | 13 Aug 2014 | 1 comment
Some customer faced with memory allocation error problem on SMG-SP 10.5(32bit) and provided tcmalloc solution. But they always wants to add plenty information into SMG-SP implementation guide. 1.How to implement tcmalloc library 2.How to ...
Idea by TSEKI | 07 Aug 2014 | 0 comments
Contributor: Virendra Phadtare Phishers are continuing to focus on social networks as a platform for their phishing activities. Fake social media applications in phishing sites are not uncommon. In the past, we have seen a bogus Asian chat app ...
Blog Entry by Avdhoot Patil | 01 Aug 2014 | 0 comments
Contributor: Mayur Deshpande Phishing emails masquerading as banking communications are observed in huge quantities every single day. Spammers will often exploit global news and major world events to carry out phishing attacks. Phishing emails ...
Blog Entry by Binny Kuriakose | 23 Jul 2014 | 0 comments
Contributor: Vijay Thawre It’s a time of freedom and joy for Americans as the United States prepares to celebrate its 238th Independence Day on July 4 with fireworks, parades, music, and public events. However, like every other year, spammers are ...
Blog Entry by Binny Kuriakose | 04 Jul 2014 | 0 comments
Image spam has been around for a longtime and peaked in January 2007 when Symantec estimated that image spam accounted for nearly 52 percent of all spam. Pump-and-dump image stock spam made up a significant portion of that 52 percent. Image spam has been ...
Blog Entry by Sammy Chu | 26 Jun 2014 | 0 comments
On June 19, we came across an interesting e-card spam campaign. E-card spam typically distributes malware; however this campaign simply redirects the user to a “get rich quick” website. This campaign’s emails are very basic. The messages are sent ...
Blog Entry by Sean Butler | 23 Jun 2014 | 0 comments