Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Security Community Blog
Showing posts tagged with Tip/How to
Showing posts in English
sebastiaan | 17 Apr 2009 | 15 comments

A few weeks ago, a couple of my co-workers visited a workshop about a new course: ethical hacking. In short, it teaches system administrators how to try and hack your own system, to check it's vulnerabilities and find out whether your security needs working on. The course is also available for pretty much everyone else, but that on a side note.

When i heard about it, the only thing that sprung to my mind was "WTF??". Are we really going to TEACH people to hack, how to do it and what to do with it? Why not just build a program for it then? That would make things a lot easier: Microsoft Hacking 2007 or something, ofcourse licensed, but that would not be a problem, since - well it is a hacking tool, right?

As i remember in the good ol' days, hacking was staring at black screens, learning, adapting to what you found and working with that information. It was almost completely auto-didacted by people that wanted to know. That made hackers good system admins,...

riva11 | 08 Apr 2009 | 6 comments

Another tool to add in your USB memory key to use in case of emergency. The KillProcess tool is a perfect killer for your applications.

A short description from the author :
It can terminate almost any process on a Windows machine, including any service and process running in the system. Even protected Microsoft system processes can be terminated.

This tool can be helpful to terminate certain unknown processes that can be impossible shut down in other normal ways.

Also it has a great feature , the ability to create “kill lists” where you create a list of processes you want to kill.
As other tools already posted here the KillProcess is released with freeware licence and is available in a portable version.

For further details refers to the...

riva11 | 07 Apr 2009 | 4 comments

There are many risks on internet, but if you have a good antivirus updated , you have reduced the risk of attack. But sometime is better to test if your antivirus program detecs viruses.

I found an interesting site that you can use to test run your antivirus / Antispyware program and check if you are really protected against these risks.
Antivirus researchers has created some test files that antivirus products "detect" as if it were a virus.  On THE ANTI-VIRUS OR ANTI-MALWARE TEST FILE page , you have only to download one of the different test files and see what will happen.
If you antivirus program works in the right way, the antivirus will show a message about a virus found with EICAR as virus description.

Please note the Eicar disclaimer :
Important note: EICAR cannot be held responsible when these files or your AV scanner in combination with these...

riva11 | 06 Apr 2009 | 2 comments

On H Security Conficker information site  ( thanks to Pbuogu for his post "Easy test for Conficker") , there is a list of useful links to Info pages , removal tools , network scanners and Test pages from different antivirus vendors.

In case you need an easy and quick tool to detect the Conficker virus in your computer check there sites :

Interesting to see how this virus is documented from different...

carubin | 02 Apr 2009 | 2 comments

Thank goodness this has turned out to be a dud so far.  It did prove to us, once again, how valuable and forward looking our investment in Altiris products has turned out to be  For our part we prepared for this is several ways:

1.  With patch management we ensured that the relevant Microsoft patch was pushed out to all clients and moniroed the compliance throughout.

2.  We put a host integrity check on our Sygate clients to put users who did not have the patch in a locked down mode.

3.  We prepared jobs in NS to disable autorun features on USB devices.

4.  Monitored and remediated virus signature levels.

I'm not foolish enough to believe that we aren't immune to attack but at least, perhaps, we made it a little harder for the bad guys.

Of course, our workstation services team insisted that I put all this stuff on CDs, just in case machines needed to be yanked off the network.

 

 ...

HimalayanITGuy | 30 Mar 2009 | 2 comments

 

"Many have been worrying that the Conficker worm will somehow rise up and devastate the Internet on April 1. These fears are misplaced, security experts say. April 1 is what Conficker researchers are calling a trigger date, when the worm will switch the way it looks for software updates. But the worm has already had several such trigger dates, including Jan. 1, none of which had any direct impact on IT operations, according to Phil Porras, a program director with SRI International who has studied the worm. 'Technically, we will see a new capability, but it...

Kevin Rowney | 10 Dec 2008 | 0 comments

Myth  #6 -- Access Control will protect you

 

Origin

Clearly, enforcement of need-to-know on key assets is a necessary component of managing the risks of confidentiality breaches.  Without access control, you have no hope of protecting the data.  The myth here is that this kind of protection is sufficient.  Given the huge amount of money, time, and attention paid to this aspect of security, you would hope that locking down your information this way would be enough!

 

What we see

The rates of data loss we see at customer sites indicate that access control privileges, even in the best run shops, are at least a step or two behind the needed state of provisioning to adequately protect data.  Part of that is driven by the complexity of keeping up to speed with the changing roles of employees, but there are additional factors that have an even bigger role in...

Mithun Sanghavi | 06 Aug 2007 | 2 comments

Hello All,

I am Mithun Sanghavi from Symantec. I am working with Symantec as Enterprise Security Product Support Analyst since Last 2 years.

We provide Enterprise Security Support.

Today after my Two Years, I am proud to say that I have taken the Best Decision on the World to Join Symantec.

I joined the Symantec Antivirus Department... during that time Symantec Antivirus 10 used to be there. Then Came the EP (Endpoint Protection 11) and now we have EP 12... 

I am Proud of Symantec as Power Of Symantec makes me work all time ....

When you choose Symantec you ensure that your information is secure and well managed. Symantec is a global leader in providing security, storage and systems management solutions to help businesses and consumers secure and manage their information. As the fourth largest independent software company in the world, Symantec has operations in more than 40 countries with 475 out of the Global 500...