Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.

Search

Search results

I guess we need to face it. Sality is here to stay. We have been dealing with new Sality variants for more than 8 years and the Sality.AE family for a little over 5…the variants keep coming. It has become one of the most common file infectors ...
Blog Entry by Brandon Noble | 30 Dec 2013 | 2 comments
can transmit information between computers using high-frequency sound waves inaudible to the human ear. The duo successfully sent passwords and more between non-networked Lenovo T400 laptops via the notebooks’ built-in microphones and speakers. ...
Blog Entry by captain jack sparrow | 03 Dec 2013 | 0 comments
Welcome to the Part 3 out of 3 discussing the terms, technologies and concepts related to Symantec Endpoint Protection and Symantec Security Software. In the series you will find description and explanation of several SEP related technologies, tools and ...
Article by SebastianZ | 04 Sep 2013 | 8 comments
This article presents an introduction to publicly available solutions and knowledge-base for Symantec Liveupdate Administrator (LUA) product - latest  available LUA version is 2.3.3.20 . KB listing has been split in several categories to allow ...
Article by SebastianZ | 17 Aug 2013 | 11 comments
1 Introduction Smartphones have been widely adopted by organisations for day to day business and operational use, and employees can often access their work related data by connecting to corporate networks using their Smartphones. Many ...
Article by Vikas Rajole | 21 Mar 2013 | 12 comments
On Tuesday, November 20th, routers, switches and servers across the Internet reset themselves (or attempted to reset themselves) back to the year 2000.  This sudden change was caused by a reboot of the time server at the US Naval Observatory.  Timing is ...
Blog Entry by uuallan | 26 Nov 2012 | 1 comment
Hello We got a discovered vulnerability in IE 9 on 17/09/2012 which can be exploited as following command in Backtrack 5 R2 Metasploit: - msfupdate - Use exploit / windows / browser / ie_execcommand_uaf - Set SRVHOST 192,168 ... - Set ...
Blog Entry by Fabiano.Pessoa | 27 Sep 2012 | 0 comments
I’ve been hearing and reading about a lot of interesting comments made by various info sec professionals regarding whether or not DLP or anti-virus has outlived its usefulness.  Believe it or not, both of these important technologies are still viable ...
Blog Entry by phlphrrs | 14 Sep 2012 | 0 comments
In the news….. The FBI will be losing their court granted hold over the DNS servers in March and they are planning to make them “go dark”. Rather than changing their green lights sabers to red, this will cause any machine still looking to ...
Article by Brandon Noble | 27 Feb 2012 | 1 comment
Hi All,   In security industry, any security analyst will always require to scan the network for available network shares. Though there are many such tools available for the same, i am going to share this very simple tool which i found really ...
Download by Avkash K | 23 Feb 2012 | 1 comment