Quantcast
Channel: Symantec Connect - Articles
Browsing all 1863 articles
Browse latest View live

¿What is Windows Server? Most common functions, problems and threats and how...

    I hope you had an excellent valentines day community I hope you are having an excellent time and that it has also been a very successful week since there is a lot to do and to contribute to the...

View Article


Differences between Virus, Ransomware and Malware and their ways of attacking...

    Happy weekend community as always I hope that everything is going excellently, in this article I want to emphasize a common and simple but important issue to clarify since many times due to lack of...

View Article


¿What is a Proxy? risks of using a proxy to navigate

    Good evening, community, I send a big greeting to all of you and I hope that you have achieved your personal goals of the week as I always say the continuous duty and there is no rest to improve...

View Article

security flaw of windows10 day zero and how to avoid it

We echo a new vulnerability that affects Windows. Specifically, an error in the contact application that could allow an attacker to execute arbitrary code remotely. It is a vulnerability of Zero-Day...

View Article

The new era in endpoint protection: the last line of defense or, the first?

The number of devices that have become part of the ecosystem of companies has been increasing. Either because to improve its functioning, organizations have decided to invest in new technology; or...

View Article


how to avoid viruses on our Android devices

Has your Smartphone been infected by a virus? Do not worry, in a COMO we have the solution for you. Android is a system that has advantages and disadvantages. While it gives you total freedom to...

View Article

Android does not escape from ransomware: the most serious threats and how to...

Android does not escape from ransomware: the most serious threats and how to avoid them.Normally, when we talk about ransomware, we usually think of computers. The most notorious attack was that of...

View Article

Image may be NSFW.
Clik here to view.

SQL Query Showing Server Settings and Values – Enforce Console

 The ContextContinuing the journey of mapping out DLP and its relationship to the Oracle database it sits on, we today look at how the server settings can be viewed and updated (if needed) in the...

View Article


SQL Server definition, Functions, disadvantages and disadvantages, common...

    Happy community week is time to start with new goals and meet the challenges of day to day, in the previous article that I had written I was talking about what is a Proxy and its risks to have an...

View Article


What is a virtual machine, uses and advantages that provides us PART 1

What is a virtual machine, uses and advantages that provides us PART 1WHAT IS A VIRTUAL MACHINE?A virtual machine is software that we install on our computer.This software allows us to install and use...

View Article

Differences, characteristics and disadvantages of SQL Server and Oracle

    Good evening community in the most recent article I made a focused emphasis of what is SQL Server, its functions, advantages, disadvantages, common mistakes and how to correct some problems that...

View Article

What is a virtual machine, uses and advantages that provides us PART 2

as I had mentioned in my previous post.in this we will talk about what is needed to have a virtual machine, the types of virtual machines and the disadvantages of emulating an operating system.why not...

View Article

Oracle Definition, Functions, Advantages and Disadvantages

    Happy evening community is approaching another day full of challenges and I want to take this article to talk a little about what Oracle is in the previous article talk about the comparison between...

View Article


Image may be NSFW.
Clik here to view.

Powershell Script to Automate Server JRE and Detection Server Installation –...

The ContextWhen performing a DLP installation, there is a point in which two (or more, depending on installation tiers) .msi files must be executed to install the server JRE and Detection Server. This...

View Article

Image may be NSFW.
Clik here to view.

15 tips to optimize SQL queries!!!!

hello happy tuesday in this article I will talk about how we can optimize our searches under the optimization of SQL.ok many have already said it for articles through this beautiful page but it is...

View Article


Image may be NSFW.
Clik here to view.

Data Loss Prevention (DLP) - Migrator.exe Automation Script

Hello,In this article I have created an automation script allowing users to automate either the EnforceMigrator.exe or the SingleTierMigrator.exe process following an upgrade from 14.6 to 15.1.As part...

View Article

Image may be NSFW.
Clik here to view.

Data Loss Prevention (DLP) - Migration Rollback Automation Script

Hello,In this guide I've written a basic script which will allow a basic rollback of DLP following issues migrating from 14.6 to 15.1, it should be noted that this article is only relevant if the...

View Article


Microsoft Access definition, functions, advantages and disadvantages

    Greetings Community Happy Tuesday to all of you today has been a very productive day and with much to do I hope you are in the same and fulfilling the daily goals, in my last 3 articles I talked...

View Article

The 5 most destructive viruses of 2018 and are still in force today

2018 has been a very busy year at the level of viruses and malware. Do you want to know some of the most destructive of this year? Do not stop reading. I will reveal five.As is well known, computer...

View Article

Spam mail, type of email Spam, Virus, Ransomware and Malware in email Spam

    Good night community today concludes another day full of success and high productivity in each activity designated by the areas of our work, I recently talked about an article related to Microsoft...

View Article
Browsing all 1863 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>