Video Screencast Help

Search

Search results

You need to act NOW On July 14th, 2015, Microsoft will end support for all versions of Windows Server 2003. This means that Microsoft will no longer offer support, security patches and ...
Blog Entry by Digital_Kru | 05 Feb 2015 | 0 comments
Crypto-type malware is particularly nasty to deal with because it encrypts files.  While an infected file has had code added to it which antivirus can remove, an encrypted file isn’t ...
Blog Entry by Brandon Noble | 20 Jan 2015 | 38 comments
30(ish) Days Until Symantec Endpoint Protection 11 Reaches End of Support Life Do you still have Symantec Endpoint Protection 11 in your environment? On January 5th, 2015, Symantec ...
Blog Entry by Kari Ann | 01 Dec 2014 | 9 comments
The newest version of LiveUpdate Administrator (LUA) - 2.3.3 has been released. The version can be downloaded from here: http://www.symantec.com/docs/TECH134809 What's new in LiveUpdate Administrator 2.3.3 System ...
Blog Entry by SebastianZ | 14 Jul 2014 | 1 comment
Targeted attacks are some of the most troubling and difficult threats facing modern security infrastructure. Symantec found that the number of targeted campaigns jumped to 91% in 2013. Discover more about these ...
Blog Entry by Solange Deschatres | 15 Apr 2014 | 0 comments
Welcome to the Security 1:1 series of articles In Part 1 we start right off with Viruses and Worms - get to know the definitions and what differentiates them. Nowadays both terms are quite often used interchangeable but there are still ...
Article by SebastianZ | 25 Dec 2013 | 1 comment
can transmit information between computers using high-frequency sound waves inaudible to the human ear. The duo successfully sent passwords and more between non-networked Lenovo T400 laptops via the notebooks’ built-in microphones and speakers. ...
Blog Entry by captain jack sparrow | 03 Dec 2013 | 0 comments
Dear Symantec, Please add more criterias to the Monitors/Logs/Log Type: Network Threat Protection/Log content: Attacks Page. A very important field is missing --> the Signature ID. It would help a lot when inspecting IPS events. ...
Idea by FbacchinZF | 31 Oct 2013 | 0 comments
Welcome to the Part 3 out of 3 discussing the terms, technologies and concepts related to Symantec Endpoint Protection and Symantec Security Software. In the series you will find description and explanation of several SEP related technologies, tools and ...
Article by SebastianZ | 04 Sep 2013 | 8 comments
Welcome to the Part 2 out of 3 discussing the terms, technologies and concepts related to Symantec Endpoint Protection and Symantec Security Software. In the series you will find description and explanation of several SEP related technologies, tools and ...
Article by SebastianZ | 01 Sep 2013 | 10 comments