Video Screencast Help
Security Community Blog
Showing posts in English
uuallan | 11 Apr 2013 | 1 comment

In the famous Kenny Rogers song Lucille, a scorned husband confronts his cheating wife in a bar and publicly shames her by reminding her that she “…picked a fine time to leave me Lucille, with four hungry kids and a crop in the field.” (my apologies if that song is now stuck in your head).  While shaming did not work in that song, can it be an effective tool in enforcing security policy?  Surprisingly, the answer may be yes. 

Forbes Magazine just released a study of trends in cyber security and one of the surprising things they found is that people are more concerned about their Facebook or Twitter accounts being compromised than they are about someone getting a hold of their credit cards.  This concern stems in part from the public shame associated with your friends and...

darci_hunt | 10 Apr 2013 | 0 comments

The Critical Security Controls (CSC's) are being adopted by federal and state agencies in the U.S., Canada and elsewhere, to increase visibility into advanced threats, to shore up defenses, and ultimately for benchmarking and to improve risk posture.

To increase the limited information currently available about implementing the controls, the SANS Institute is conducting a 20-question survey for IT professionals, business unit managers and security/compliance experts. The survey was developed to find out what controls they're adopting, why, and how. The survey also explores how integrated the CSC's are in organizations that have adopted the controls, and whether any adopters have reached the stage where they can use the controls for benchmarking and to improve their risk postures.

"The Critical Security Controls are successful because of their open community approach - people and...

riva11 | 09 Apr 2013 | 0 comments

SMARegisTry Backup is a simple open source tool for backing up and restoring only selected Registry keys. The program has a basic interface that allows you to browse the registry and create, load, save lists of registry keys you'd like to backup.
Helpful when you have to export a specific key or keys all at once and restore later in a new installation or to repair keys in a existing computer infected by a virus.

OS supported : Windows XP, Windows XP x64, Windows Vista x86 / x64, Windows 7 x86 / x64, Windows Server 2003, and all versions of Windows Server 2008

Requirements : .NET Framework 2.0 or higher

License : Free

Reference : SMARegisTry Backup   
Author:  Eric Arnol-Martin


riva11 | 09 Apr 2013 | 0 comments

Anvi Browser Repair Tool is a free and portable tool for Windows created to repair browser settings and networking settings changed by rogueware or malwares.

This is not an antivirus but help you to restore some important configurations and settings ( for example , homepage, safe startup items, DNS settings, Title Bar, BHO plug-in, etc ) after an virus attack.
System Requirements

Operating Systems :

  • Microsoft Windows XP (32-bit and 64-bit) with SP2/SP3 or Home/Professional/Media Center
  • Microsoft Windows Vista (32-bit and 64-bit) Starter/Home Basic/Home Premium/Business /Ultimate
  • Microsoft Windows (32-bit and 64-bit) Starter/ Home Basic/Home Premium/Professional/Ultimate

Hardware Requirements :

  • 300 MHz processor or faster processor
  • 128 MB of RAM
  • 50 MB of free hard disk space

License : Free

Reference :...

Mithun Sanghavi | 09 Apr 2013 | 24 comments



Symantec Endpoint Protection 12.1. RU2 MP1 is Released Today as on 8th April 2013.

You may find the Latest Release of Symantec Endpoint Protection 12.1.RU2 from:

SEP 12.1.2_MP1.JPG


This build's version is: 12.1.2100.2093.

Migration paths

Symantec Endpoint Protection 12.1.2100.2093 (RU2 MP1) can migrate seamlessly over the following:

  • Symantec Endpoint Protection 12.1.2015.2015 (RU2)

This Symantec Release build contains:

  • 18 top impacting fixes.
  • 25 internal defect fixes
  • Security updates for JRE

KnowledgeBase Articles:

Release Notes and...

Krishnan Narayan | 08 Apr 2013 | 0 comments



OpenIOC establishes a standard for recording, defining and sharing information both internally and externally in a machine readable format [1].

OpenIOC allows a forensic investigator to describe IOC (Indicators of Compromise) in a format that is standardized and can be interpreted by other investigators of machines in a consistent manner. IOC are mainly artifacts of an intrusion that can be identified on a host or a network.

OpenIOC specifies a base format and is extensible to accommodate different types of IOC or ‘Indicators’. Mandiant currently supports over 500 types[5] of indicators that can be gathered in an enterprise. More indicators can be easily defined and added on the fly.


  • OpenIOC supports simple and advanced queries on IOCs like
  • Looking for a specific file hash
  • Specific entry in Memory or Windows Registry
  • Queries that...
W007 | 04 Apr 2013 | 1 comment

How to enable Windows firewall setting in Windows 7 machine.


SEP Client disabled Windows 7 firewall setting and showing error (This Setting are being managed by vendor application Symantec endpoint protection).



How to restore windows firewall setting without uninstall NTP feature and Withdraw FW policy.



1) Open SEPM console.


2) SEPM Clients Group->Policies->Tasks->Edit Policy.



3) Create Non-Shared...

thromada | 04 Apr 2013 | 2 comments

I found an old thread titled "The Java Virtual Machine has exited with a code of -1, the service is being stopped." but it was closed and locked.  So I'm posting this new info.

Using SEP 12.1.2015.2015 on XP x32 and 7 x64 clients; SEPM server is running 2008 R2 standard x64; and logging to an external SQL 2012 server.

This morning I found that my SEP clients and server had no green dot, and that I could not launch my local Java SEPM console.  The SEPM console would error with "The application failed to launch" or "Failed to connect to server".  Checked the server services and found the Symantec Endpoint Protection Manager service was stopped.  I started it, but about a minute later it would stop and the Application Event Log said "The Java Virtual Machine has exited with a code of -1, the service is being stopped" with a source of "semsrv", Event ID "4096".  Starting the service...

Duncan Mills | 04 Apr 2013 | 0 comments

The increased use in the workplace of user-owned devices such as smartphones and tablets, often referred to as bring your own device (BYOD), provides businesses with significant productivity and cost benefits. However, it also presents a number of complex challenges related to security.

Due to the rise of smart media devices like smartphones, tablets and ultrabooks, it is estimated that potentially, as many as 30-35%* of endpoints connected to a company’s network could be unmanaged. These are more at risk than managed endpoints which are typically subject to software patching and endpoint security policies.

Of course unmanaged endpoints are still protected by your perimeter security, such as secure web gateways. However, these have typically evolved from caching proxies and URL filters. What you need is an additional layer of security that provides the best possible levels of protection for unmanaged endpoints.

Symantec Web Gateway (SWG) will...

riva11 | 29 Mar 2013 | 1 comment

Here is a nice infographic where is shown why passwords are not secure and the ways to protect them from theft.


If you are interested , read also the blog : How Secure is Your Password?

Credits :