Video Screencast Help

Search

Search results

How to be ahead of Outbreaks! There are two common checkpoints that security administrators or managers inspect a computer or a host for evaluating the security well being. The first stage is the periodic report analysis, which is performed on ...
Article by Farzad | 17 Sep 2015 | 0 comments
Trends in Trust on the internet of Things We are all happy with how technology is making our lives easier and fulfilling. Most of the internet population is however not aware that the moment you turn on a device connected to internet or ...
Article by dion_alken | 22 Apr 2015 | 0 comments
If you want to have pre installtion check,Health checkup, recommendations and collect logs for support. Then please go through the document so that you can learn how to run a Sym help tool Sym Help tool.docx Its a great start!  ...
Article by Samir-Ahmed | 12 Aug 2013 | 6 comments
De-Militarized Zone or the DMZ is the portion of the network which has two main specifications: 1-      Contains servers and services which are accessible from outside of the network. 2-      Any access to these servers and transaction with them ...
Article by Farzad | 19 Mar 2013 | 7 comments
This paper discusses the need for business continuity practitioners to make incident management a focal element of their programme.   Particularly during the first few minutes and hours of a business disruption, an established incident ...
Article by Courtenay Enrig... | 29 Jan 2013 | 0 comments
Hi Everybody,                       You may be facing lot of problems with a virus infected systems in your  IT environment. Here is a tool which will help your endpoints to recover after a massive virus outbreak. If the endpoints are  heavily ...
Article by Samir-Ahmed | 13 Jan 2013 | 1 comment
When Erik Hughes, the Principal Product Manager on SWV asked me to write an article on our PolicyPak utility for SWV, I wasn’t exactly sure how to start. As a Group Policy MVP I often think about the big picture problems around desktop management. ...
Article by Jeremy Moskowitz MVP | 08 Nov 2012 | 0 comments
Every time I’m on a SEP project, the database size always is a big subject for discussion, especially for a large environment. The SEP DB sizing tool as we know is not supported tool, we use it as a guide to estimate the required disk space for the ...
Article by Mohammad Bamya | 08 Mar 2012 | 4 comments
Integration of Windows 2008 with SSIM using domain account is always like a milestone to achieve. Because, Microsoft has interoduced extra layer of security for Windows 2008 Os. So  to read the Event logs which is most important for security ...
Article by Avkash K | 04 Jan 2012 | 4 comments
This is the std. procedure which needs to be followed if you are having IBM_AIX Event collector for AIX Event collection, which is log file based Event collector. You can upgrde it to UNIX OS Event collector, which is Syslog based event ...
Article by Avkash K | 04 Jan 2012 | 3 comments