Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.

Search

Search results

Hi, It would be nice for the AV, when the heuristic engine detect suspicious file or behavior to upload the file itself, and not just the log and MD5/SHA-1/2/3 to your file analysis system. Multiple vendor offer now this features and it it ...
Idea by MHinse | 20 Oct 2014 | 0 comments
Following Security Bulletins have been released in July 2014: Microsoft Microsoft Security Bulletin Summary for July 2014 https://technet.microsoft.com/library/security/ms14-jul Symantec product detections for Microsoft ...
Blog Entry by SebastianZ | 17 Jul 2014 | 0 comments
The newest version of LiveUpdate Administrator (LUA) - 2.3.3 has been released. The version can be downloaded from here: http://www.symantec.com/docs/TECH134809 What's new in LiveUpdate Administrator 2.3.3 System ...
Blog Entry by SebastianZ | 14 Jul 2014 | 1 comment
Microsoft Security Bulletin On Tuesday the 11th of February Microsoft released the monthly Security Bulletin Summary for February 2014. The summary includes 7 Security Bulletins - 4 are classified as critical; 3 as important: ...
Blog Entry by SebastianZ | 11 Feb 2014 | 0 comments
What is this about? In this article we will have a look at portfolio of both Symantec and Norton Security products. The introduced list will include both Enterprise products in case of Symantec family and Consumer products from Norton family. Some of ...
Article by SebastianZ | 30 Dec 2013 | 2 comments
Welcome to the Security 1:1 - Part 3 In part 3 of the series we will discuss various types of network attacks. On this occassion I will introduce as well some types of attacks directed more at end-user than at network or host computers - we ...
Article by SebastianZ | 27 Dec 2013 | 1 comment
Welcome to the Security 1:1 series of articles In Part 1 we start right off with Viruses and Worms - get to know the definitions and what differentiates them. Nowadays both terms are quite often used interchangeable but there are still ...
Article by SebastianZ | 25 Dec 2013 | 1 comment
can transmit information between computers using high-frequency sound waves inaudible to the human ear. The duo successfully sent passwords and more between non-networked Lenovo T400 laptops via the notebooks’ built-in microphones and speakers. ...
Blog Entry by captain jack sparrow | 03 Dec 2013 | 0 comments
In Current Symantec endpoint protection product SEP12, The client schedule update is based on heartbeat intervals and not on specific time based. This is causing lots of issues in our networks, while updating definition on clients. We never ...
Idea by BANE | 20 Nov 2013 | 1 comment
Webcast Tue, 15 October, 2013 - 10:00 - 11:00 PDT Join our upcoming webcast to learn about a new ...
Event by Elspeth Magoria | 26 Sep 2013 | 0 comments