Video Screencast Help

Malicious Code

Results for Malicious Code

Welcome to the Security 1:1 - Part 2 In Part 2 we take a closer look at Trojans - what is a Trojan? Why is it different from a virus? What are the types of Trojans based on their function and attack vectors. The introduced classification of ...
Article by SebastianZ | 26 Dec 2013 | 0 comments
Welcome to the Security 1:1 series of articles In Part 1 we start right off with Viruses and Worms - get to know the definitions and what differentiates them. Nowadays both terms are quite often used interchangeable but there are still ...
Article by SebastianZ | 25 Dec 2013 | 1 comment
I need a solution We installed one of the solution packs that included a policy called "Network Security".  There are predefined rules for hacker tools, keyloggers, and ...
This issue has been solved
Forum Discussion by RonCaplinger | 17 Dec 2013 | 3 comments
I do not need a solution (just sharing information) Just spreading the word about a webcast (broadcast earlier today) which provides a good overview of the current threat landscape: ...
Forum Discussion by Mick2009 | 03 Dec 2013 | 0 comments
  We all know that shared-folders are honeypots for viruses (specially worms). When such share is on SEP client exception-list it becomes a vector for the malwares. I suggest a flag when adding a folder-exception under centralized ...
Idea by FbacchinZF | 02 Dec 2013 | 0 comments
I need a solution We recently upgraded our development machines to SEP SBE 2013. Now, whenever we compile our source code, several of our DLLs are marked as containing the ...
Forum Discussion by DC Systems | 30 Nov 2013 | 3 comments
I do not need a solution (just sharing information) Security Response have recently blogged about a new threat called Java.Tomdep . This is a worm that targets Tomcat servers. ...
Forum Discussion by Mick2009 | 22 Nov 2013 | 3 comments
In Current Symantec endpoint protection product SEP12, The client schedule update is based on heartbeat intervals and not on specific time based. This is causing lots of issues in our networks, while updating definition on clients. We never ...
Idea by BANE | 20 Nov 2013 | 1 comment
Issue This document explains the process of configuring the Symantec Alerting Services for BCS customers, which includes editing and confirming your recipient information, alerts and notifications and resetting your password.  ...
Article by torsten_knorr | 20 Nov 2013 | 1 comment
Introduction This is the third of an informal series on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec Endpoint Protection (and the OS upon which it functions).  The first article, Using ...
Article by Mick2009 | 13 Nov 2013 | 12 comments