Showing results for 
Search instead for 
Did you mean: 
Showing results for 
Search instead for 
Did you mean: 

Knowledge Base Articles

How effective incident management retains market share

This paper discusses the need for business continuity practitioners to make incident management a focal element of their programme.  Particularly during the first few minutes and hours of a business disruption, an established incident management meth...

How to Add an Image to a Connect Post

If you've ever tried to add an image to a post on Connect you know it can be frustrating if you are forced to muddle through on your own. This article is meant to guide you through the process and, hopefully, make it a little easier. If you've ever i...

How to use Symantec Scan Engine 5.2 content scanning technologies for direct integration with your applications or devices

One of the "best hidden secrets" in Symantes's portfolio is likely the Symantec Scan Engine. This product emerged many years ago from our integration work with large Internet carriers to provide a high-scalable, high-performance antivirus scan engine...

G_Sanchidrian by Level 3
Employee Accredited
  • 11 kudos

Utility to Assist in Identifying Plug and Play Drivers

Have you ever tried to get a build created with all the required device drivers, and have found that there are one or two yellow question marks that you cannot find the correct drivers for? Yes, we've all been there at sometime. To help me with this ...

EdT by Level 6
  • 17 kudos

How to remove Hacktool.Rootkit Antivirus from a system

Hello Friends, I am very new to these type of forums and this is my first article on any issue. I am working as software engineer with an estemmed organization . I am currently in US on client side and I faced the  Hacktool.Rootkit  last week , I h...

True Data Loss Prevention

To all reading, not all data loss prevention solutions are equal.  This company had implemented the Vericept product before my time and the intent was to monitor for malicious and fraud activities by our Corporate Security arm.  Information Security ...