Subscription for Veritas NetBackup Security Vulnerabilities
Hello All, I have found this linkhttps://www.veritas.com/content/support/en_US/security however is there another way to be notified of Veritas Netbackup critical/high security vulnerabilities along with patch and version releases? Thank you in advance.Solved1.1KViews0likes2CommentsPhisihing calls to Symantec Customers
This is an email I sent to a couple people listed under the Symantec Media contacts as there are is general Corporate contact information anywhere on the website (obivously by design). I putting this up both as a warning to other Symantec customers and also as I doubt it has reached the appropriate department in Symantec in email form. I’m receiving calls from a woman with a British accent, and a blocked phone number, claiming to be from Symantec. She knows I am a current customer, and proceeds to ask me questions regarding our current IT infrastructure. I’m going to assume this person does not work for Symantec, and the fact that they apparently have a list of your customers and are trying to get information on their current IT infrastructure should be of some concern as their intentions are unknown.1.1KViews1like8CommentsHow to block Babylon, 7Pic and Sweetimm
I am having a real struggle in stopping Babylon, 7Picuploader and some other crap called Trust (sweetimm) ending up on my XP based desktop. Sweetimm is interesting, it blows kisses at me! I have the latest version of Norton Interenet Security and am a little pissed off that it does not pick up these intrusions. Previous versions of the software allowed me to block this junk manually but this latest version doesn't. I can disable theNorton Firewall and use the Microsoft one which will work but it is not exactly a good solution. I have removed all files manually frommy PCthat relate to these programms, including all the hidden files but this rubbish still gets back and installs. There must be a way that Norton IS can be configured to stop these intrusions?397Views0likes1CommentCan't backup system state
Ok, next question... One of our servers, that happens to be a backup domain controller, we're using to run test backupswith thetrial version of 2010. The system logon account (which is same as system account right now)being used to backup this dc is a member of the domain admin group which in turn is a member of the administrators group. We have even tried with another domain admin account and get same results. Have followed the error link and tried solutions but no luck... ...andwe keep getting following errors on the test jobs: Error category : Security Errors Error : e000fe7d - Access is denied. To back up or restore System State, administrator privileges are required. For additional information regarding this error refer to link V-79-57344-65149 We have also turned on AOFO (thanks pkh). Thanks for helping, Klingonwork32Solved4.1KViews1like13CommentsPLA?
Hi, a while back I decided to play the old CoD4 (Modern Warfare 1) on my PS3. Please note that this is LONG. This is not meant to be a story, but an idea of what happened so it will be easier to sort out what was wrong. I noticed a clan tag: [PLA] that was used by multiple different people. Sometimes, right before the round would start, it would just say: 'DRAW' Host ended game. And if you looked at the little scrolling text area, it would be rapidly moving saying the exact same thing: "[PLA]<player id> Unknow Command..." You're probably wondering what this has to do with anything, but let me assure you, it all comes together. When I went to check my Facebook on my computer later that day, I noticed something odd. There was a shortcut to a program I don't remeber installing called "On-Lock" or something similar. In the task bar, a little notification bubble kept appearing saying (in an unusual windows text): "WARNING!!! YOUR COMPUTER HAS MULTIPLE VIRUSES!!! PLEASE CLICK THIS FOR MORE INFORMATION!!!" I'm not an expert, but I know a fake pop-up when I see one. So instead, I pushed the 'X'. A window instantly popped up, apparently scanning my computer, and then telling me that I needed to buy this product to continue safety. And, of course... They only took Credit cards. I struggled to get the pop-up to go away, but once I did, my ENTIRE BACKGROUND changed into what looked like the 'blue screen of death' however, all my icons were still up as well as the task bar. I tried to run Windows Defender, but another pop-up appeared claiming that the process has to be executed because some file was infected. Of course, I know a few things about computers. I hold the power button until it turns off, and then turn it back on, this time running safe mode. I decided to search around my files. In My Documents I found some folders named by a large sum of numbers. Opening the file, I find a .dll file and an empty folder. I continued to search, until I found the root. On my C:/WINDOWS there were so many folders named similar to the other ones, with the exact same contents (named differently). I also found some fake Windows programs, one of the many was called Windows Agent, and had a poor looking 8-bit image of what looked like a Drug Dealer/Spy. I right clicked it, and pressed Delete. "You do not have permission to perform this operation." Please note that I was the only user of this computer, meaning that an 'admin' could not have parental controls. However, I did manage to delete the oddly named folders. And then, I found a folder that almost made me want to die. It was in C:/WINDOWS. The folder was named 'PLA'. I opened it to find a LOT of .dll and .bat files, as well as even more fake windows apps. When I restarted my computer again, I went to the actual OS. I had no pop-ups. I went back to Windows Defender to double check that everything was okay, so I performed a scan. Every once and a while, the name of the folders that it would be currently scanning would change for a split second to an odd code, then go back to normal. I knew it was an over-ride. I ended up having to completely reset my computer, with all my documents and music going with it. Thank you if you made it this far! Can anybody help me out with this? I know I already fixed it, but is there any way to prevent it? Any info on this would be gladly appreciated: Past experiences, research, etc. I actually google'd PLA and found out that it was a group of foriegn hackers that were accused of hacking the Pentagon... This clearly isn't them, but they must've named themselves after.726Views0likes3CommentsPrivileges required on remote machine
Regarding BackupExec 12.5 running on Windows Server 2003 SP2: Please let me know if the following statement is always true. To successfully back up a remote machine, the service account that runs BackupExec must be a member of the remote machine's administrators group.Solved517Views0likes1CommentHigh Vulnerability Severity in scanning report - due to BackupExec
The following "High Vulnerability Severity" problem is identified after performing securityscanning on the server. << VERITAS Backup Exec is a backup and recovery software solution for Microsoft Windows and Unix-based operating systems. VERITAS Backup Exec Agent versions 10.0, 9.1, and 9.0 running on Microsoft Windows Servers could allow a remote attacker to gain unauthorized access. A remote attacker can access the Network Data Management Protocol (NDMP) agent using built-in authentication bypass account to gain access to arbitrary files, including system files. >>803Views0likes4Comments