Video Screencast Help

Search

Search results

Online Thu, 24 April, 2014 - 11:00 - 12:00 EDT Thursday, April 24th at 11:00 am (EST) ...
Event by Chad Dupin | 17 Apr 2014 | 0 comments
Give an attacker a phish and he will steal some data. Teach an attacker to spear phish and he will steal data bases.   Among the wide diversity of threats facing the modern enterprise, targeted attacks are often the most troubling and difficult ...
Blog Entry by Sdesc | 15 Apr 2014 | 0 comments
Hi, I would like to see some more integrated default protection policies in the Symantec Endpoint Protection 12.1 EE. For example a firewall policy or a rule to block Facebook/Twitter etc. Or Intrusion Prevention policy to block certian applications ...
Idea by paja | 09 Apr 2014 | 2 comments
I guess we need to face it. Sality is here to stay. We have been dealing with new Sality variants for more than 8 years and the Sality.AE family for a little over 5…the variants keep coming. It has become one of the most common file infectors ...
Blog Entry by Brandon Noble | 30 Dec 2013 | 2 comments
can transmit information between computers using high-frequency sound waves inaudible to the human ear. The duo successfully sent passwords and more between non-networked Lenovo T400 laptops via the notebooks’ built-in microphones and speakers. ...
Blog Entry by captain jack sparrow | 03 Dec 2013 | 0 comments
In Current Symantec endpoint protection product SEP12, The client schedule update is based on heartbeat intervals and not on specific time based. This is causing lots of issues in our networks, while updating definition on clients. We never ...
Idea by BANE | 20 Nov 2013 | 1 comment
I created this scrpt to address systems that have run our of disk space for various reasons and are no longer updating AV definitions. The only external utility you need is Psexec to remotely execute one of the scripts. To clean a single system you ...
Download by ScottM 2 | 09 Jul 2013 | 0 comments
I. BACKGROUND: We have been receiving a few scattered cases of outbreaks from a file labeled snkb00ptz.exe or snkb0ptz.exe, but it seems to be on the rise. It's normally considered poor troubleshooting to use the file name for any type of ...
Blog Entry by Brandon Noble | 25 Apr 2013 | 2 comments
https://www.sans.org/webcasts/stop-64-percent-malware-today-96427 Tue, 30 April, 2013 - 10:00 - 11:00 PDT ...
Event by Kari Ann | 15 Apr 2013 | 0 comments
The increased use in the workplace of user-owned devices such as smartphones and tablets, often referred to as bring your own device (BYOD), provides businesses with significant productivity and cost benefits. However, it also presents a number of ...
Blog Entry by Duncan Mills | 04 Apr 2013 | 0 comments