Video Screencast Help

Defense & Intelligence

Results for Defense & Intelligence

I need a solution This paper presents the thoughtful side of some teams after serious mistakes made by those who, after hiring some solutions in order to relax a little more concerned ...
This issue has been solved
Forum Discussion by Fabiano.Pessoa | 18 Aug 2012 | 4 comments
I need a solution TENHO UMA CONTA NORTON E ESTOU COM PROBLEMA PARA AUTENTICAÇÃO, EU TENHO O NUMERO DO PEDIDO DA CONTA, MAIS NAO TENHO O NUMERO DO CLIENTE, PARA QUE EU VALIDE A RENOVAÇÃO ...
Forum Discussion by RUBENS | 11 Aug 2012 | 3 comments
I do not need a solution (just sharing information) Dear, good morning. I would like to make clear in this discussion, the importance that we give the integrity of our data, in ...
This issue has been solved
Forum Discussion by Fabiano.Pessoa | 11 Aug 2012 | 12 comments
PROBLEM: Document control concerns regarding native productions. As we know, Clearwell analytics are outstanding for native files. In our litigation cases, this works well for our own clients' documents, as we can always collect in native ...
Idea by Elton Johnson | 10 Aug 2012 | 0 comments
I need a solution For security reason, we want block read access to USB-flashdrive/pendrive/portable-disk. We only want to allow write access. When I define a "Device ...
This issue has been solved
Forum Discussion by hermwind | 05 Aug 2012 | 5 comments
Dear, good morning. Who ever heard of sites cloned? The idea that I come to propose, it is a defense against social engineering attack. Network, we could do many things or outside, because the Internet is the "big network". The case ...
Idea by Fabiano.Pessoa | 03 Aug 2012 | 0 comments
I need a solution Dear, good afternoon. There is not any solution for data capture in an attack internal network? Looking forward Sincerely, Fabian ...
This issue has been solved
Forum Discussion by Fabiano.Pessoa | 03 Aug 2012 | 5 comments
Dear, good morning. I would like to propose a database for codes port scan, or create a code base with NMAP scans principalemnte which is the most widely used, not responding or not responding to them. SEP blocks this type of action, but she is ...
Idea by Fabiano.Pessoa | 03 Aug 2012 | 0 comments
Dear, good morning.   It would help create a line of defense based on commands ROUTER, given that we could make a coordinated attack by both the equipment that support the operation such as: router, hubs, switches. With this type of attack, the ...
Idea by Fabiano.Pessoa | 02 Aug 2012 | 0 comments
Prezados, bom dia. Muito estamos preocupados com grandes ataques a nossos computadores e redes, no qual o que menos queremos no momento, seria um roubo de informação ou algo do tipo. Porém vale lembrar a todos, que os ataques estão sendo modificados, ...
Idea by Fabiano.Pessoa | 01 Aug 2012 | 0 comments