Video Screencast Help

Evolution of Security

Results for Evolution of Security

Online gaming - "En Taro Adun" to the Part 5 of the Security 1:1 Series Online gaming just like any other branch of internet community is being targeted for scam, fraud and hacks. Few years back the scope of the scams involving ...
Article by SebastianZ | 07 Jan 2014 | 0 comments
Welcome to the Security 1:1 - Part 3 In part 3 of the series we will discuss various types of network attacks. On this occassion I will introduce as well some types of attacks directed more at end-user than at network or host computers - we ...
Article by SebastianZ | 27 Dec 2013 | 1 comment
Welcome to the Security 1:1 - Part 2 In Part 2 we take a closer look at Trojans - what is a Trojan? Why is it different from a virus? What are the types of Trojans based on their function and attack vectors. The introduced classification of ...
Article by SebastianZ | 27 Dec 2013 | 0 comments
Welcome to the Security 1:1 series of articles In Part 1 we start right off with Viruses and Worms - get to know the definitions and what differentiates them. Nowadays both terms are quite often used interchangeable but there are still ...
Article by SebastianZ | 27 Dec 2013 | 0 comments
Hi there I am a network administrator. I face a problem with SEP firewall that seems to be a bug. The scenario is as follows: I have windows clients with managed SEP antivirus installed. Also I have windows 2008 domain and Microsoft ISA serer ...
Idea by adc29s | 22 Dec 2013 | 1 comment
Disclaimer: this may not be an exaustive description of the solution and is intended to be used as a guideline. All information is available in the product documentation, including the Administrator's guide.   There are usually three ...
Article by dcats | 11 Feb 2014 | 1 comment
I need a solution Is it possible to encrypt the iPad, any model? 1 ...
This issue has been solved
Forum Discussion by ferrob00 | 11 Dec 2013 | 5 comments
I do not need a solution (just sharing information) Just spreading the word about a webcast (broadcast earlier today) which provides a good overview of the current threat landscape: ...
Forum Discussion by Mick2009 | 03 Dec 2013 | 0 comments
Introduction This is the third of an informal series on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec Endpoint Protection (and the OS upon which it functions).  The first article, Using ...
Article by Mick2009 | 25 Nov 2013 | 12 comments
This is a feature enhancement request. At the moment creating a process set for an application/service is a manual process. What would be ideal would be either something built-in to the agent or a tool that you could give a set of processes or ...
Idea by sunny_yu | 30 Oct 2013 | 0 comments