Video Screencast Help

Search

Search results

Crypto-type malware is particularly nasty to deal with because it encrypts files.  While an infected file has had code added to it which antivirus can remove, an encrypted file isn’t ...
Blog Entry by Brandon Noble | 20 Jan 2015 | 38 comments
This reuirement from customer we want to schedule the backup of Message Audit Logs from SMG to diffrent Location such FTP, HTTP or UNC. Schedule should be daily,weekly and monthly basis. Agreed. At least put an Agreed. At least put an ...
Idea by prime007 | 12 Nov 2014 | 1 comment
Novacoast Webinar September 30th @ 12pm EST Tue, 30 September, 2014 - 12:00 - 13:00 EDT ...
Event by ryanschoenherr | 29 Sep 2014 | 4 comments
The Underground Economy, Pt. 8 Most people assume zombies are only fiction reserved for B movies and popular ...
Blog Entry by Tim G. | 08 Aug 2014 | 0 comments
Following Security Bulletins have been released in July 2014: Microsoft Microsoft Security Bulletin Summary for July 2014 https://technet.microsoft.com/library/security/ms14-jul Symantec product detections for Microsoft ...
Blog Entry by SebastianZ | 17 Jul 2014 | 0 comments
The newest version of LiveUpdate Administrator (LUA) - 2.3.3 has been released. The version can be downloaded from here: http://www.symantec.com/docs/TECH134809 What's new in LiveUpdate Administrator 2.3.3 System ...
Blog Entry by SebastianZ | 14 Jul 2014 | 1 comment
Todos sabemos que el software malicioso de esta época no es solo un problema de los equipos PC. Dado el incremento de las organizaciones que permiten que sus empleados usen sus propios dispositivos móviles con ...
Blog Entry by Solange Deschatres | 30 Jun 2014 | 0 comments
We all know that nowadays malware isn't just a PC problem. With increasing numbers of organizations letting employees use their own mobile devices for business purposes, they have a lot on the line. Here ...
Blog Entry by Solange Deschatres | 30 Jun 2014 | 0 comments
We all know that nowadays malware isn't just a PC problem. With increasing numbers of organizations letting employees use their own mobile devices for business purposes, they have a lot on the line. Here ...
Blog Entry by Solange Deschatres | 30 Jun 2014 | 0 comments
The Surprising Scope of Mobile Malware Growth Around The World Mobile workforces and BYOD have brought smartphone ...
Blog Entry by Solange Deschatres | 12 Jun 2014 | 0 comments