Historical Product Releases Sep-02 Enterprise Security Manager For

Total Page:16

File Type:pdf, Size:1020Kb

Historical Product Releases Sep-02 Enterprise Security Manager For Historical Product Releases Sep-02 Enterprise Security Manager for Databases 3.0 Enterprise Security Manager for Firewall 2.0 Enterprise Security Manager for HIPAA 1.0 Symantec AntiVirus for SMTP Gateways 3.0 Symantec AntiVirus Gateway Solution 3.0 Symantec AntiVirus Enterprise Edition 8.5 Symantec Client Security Norton AntiVirus 2003 Norton AntiVirus Professional 2003 Norton Ghost 2003 Norton Internet Security 2003 Norton Personal Firewall 2003 Norton SystemWorks 2003 Norton SystemWorks Professional 2003 Jun-02 Symantec Web Security 2.5 Syamantec Gateway Security (models 5100, 5200, 5300) VelociRaptor 1.5 (models 1100, 1200, 1300) Net Prowler 3.5.1 Symantec AntiVirus Gateway Solution Symantec AntiVirus Scan Engine 3.0 Symantec AntiVirus for Inktomi Traffic Edge 3.0 Symantec AntiVirus for Network Appliances filer/NetCache 3.0 Norton AntiVirus for Lotus Notes/Domino on Linux Mar-02 Symantec Gateway Security RK4 ESM - Best Practice Policies Firewall 1.0 ESM - Best Practice Policies Oracle Database 2.0 ESM - Best Practice Policies WebServer 2.0 Symantec ESM Unix Console for Solaris Symantec Enterprise Firewall/VPN 7.0 for Win/Solaris Symantec AntiVirus/Filtering for Domino W2N 3.0 Norton AntiVirus Corporate Edition 7.6 + Microsoft Exchange 3.0 pcAnywhere Personal Edition Norton AntiVirus Mac 8.0 Norton Internet Security Mac 2.0 Norton Personal Firewall Mac 2.0 Norton Systems Work Mac 2.0 Norton Utilities Mac 7.0 Dec-01 Enterprise Security Manager 5.5 Symantec AV/Filtering for MSE 3.0 Symantec AntiVirus Command Line Scanner 1.0 Symantec Firewall VPN Appliance Symantec Ghost 7.5 Norton AntiVirus Lotus Notes Dom S/390 R5 2.5 Norton AntiVirus Lotus Notes Dom Solaris 2.5 Norton AntiVirus Lotus Notes Dom AIX 2.5 Norton AntiVirus Notes AS400 R5 2.5 Norton AntiVirus Corporate 7.6 pcAnywhere 10.5 Norton AntiVirus Pro 2002 Nortin Internet Security Pro 2002 Sep-01 Intruder Alert 3.6 VelociRaptor 1.1 Symantec Web Security NT/2000 2.0 ESM - Best Practice Policies for Norton AntiVirus Corporate Edition Servers ESM - Best Practice Policies for Web Servers Norton AntiVirus Corporate 7.6 Norton AntiVirus Gateway Solaris 2.5 Norton AntiVirus Gateway NT/2000 2.5 Norton AntiVirus for MS Exchange 2.5 Norton AntiVirus 2002 8.0 Norton Internet Security 2002 Norton Personal Firewall 2002 Norton SystemWorks 2002 Norton SystemWorks Professional Edition 2002 Norton Utilities 2002 6.0 Norton Clean Sweep 2002 Norton Ghost 2002 3.0 Winfax 2002 10.0.
Recommended publications
  • Manual Del Usuario De Norton Systemworks™
    Manual del usuario de Norton SystemWorks™ 20% Minimum 07-30-00471-SL Manual del usuario de Norton SystemWorks™ El software que se describe en este manual se suministra con acuerdo de licencia y sólo puede utilizarse según los términos de dicho acuerdo. Información de copyright Copyright 1995-2001, Symantec Corporation. Todos los derechos reservados. Documentación, versión 5.0 Número de producto: 07-30-00471-SL SIN GARANTÍA. La presente documentación se proporciona tal cual es. Symantec Corporation no garantiza la precisión de la información en ella contenida ni se responsabiliza por el uso que de ella pueda hacerse. Cualquier utilización de la documentación técnica o de la información en ella contenida es responsabilidad del usuario. La documentación podría incluir inexactitudes técnicas o de otro tipo o errores tipográficos. Symantec se reserva el derecho de realizar cambios sin previo aviso. Queda prohibida la copia de esta publicación sin la autorización expresa por escrito de Symantec Corporation, Peter Norton Group, 20330 Stevens Creek Boulevard, Cupertino, CA 95014, EE.UU. Marcas comerciales Symantec, el logotipo de Symantec, Norton, Norton SystemWorks, Emergency Disk, LiveUpdate, Norton AntiVirus, Norton Utilities, Norton CleanSweep y Rescue Disk son marcas comerciales de Symantec Corporation. Process Viewer desarrollado en 1995-2001 por Igor Nys. GoBack y el logotipo de GoBack son marcas comerciales de Roxio, Inc. Windows es una marca comercial registrada de Microsoft Corporation. Pentium es marca comercial registrada de Intel Corporation. Otros nombres de productos mencionados en este manual pueden ser marcas comerciales de sus respectivos propietarios y se reconocen como tales. Impreso en los Estados Unidos de América.
    [Show full text]
  • Optimizing and Protecting Hard Drives ‐ Chapter # 9
    Optimizing and Protecting Hard Drives ‐ Chapter # 9 Amy Hissom Key Terms antivirus (AV) software — Utility programs that prevent infection or scan a system to detect and remove viruses. McAfee Associates’ VirusScan and Norton AntiVirus are two popular AV packages. backup — An extra copy of a file, used in the event that the original becomes damaged or destroyed. boot sector virus — An infectious program that can replace the boot program with a modified, infected version of the boot command utilities, often causing boot and data retrieval problems. buffer — A temporary memory area where data is kept before being written to a hard drive or sent to a printer, thus reducing the number of writes to the devices. chain — A group of clusters used to hold a single file. child, parent, grandparent backup method — A plan for backing up and reusing tapes or removable disks by rotating them each day (child), week (parent), and month (grandparent). cross-linked clusters — Errors caused when more than one file points to a cluster, and the files appear to share the same disk space, according to the file allocation table. defragment — To “optimize” or rewrite a file to a disk in one contiguous chain of clusters, thus speeding up data retrieval. differential backup — Backup method that backs up only files that have changed or have been created since the last full backup. When recovering data, only two backups are needed: the full backup and the last differential backup. disk cache — A method whereby recently retrieved data and adjacent data are read into memory in advance, anticipating the next CPU request.
    [Show full text]
  • Norton™ Utilities Premium: User Manual
    Norton™ Utilities Premium User Manual Norton Utilities Premium User Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Copyright © 2018 Symantec Corporation. All rights reserved. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, et seq. "Commercial Computer Software and Commercial Computer Software Documentation," as applicable, and any successor regulations, whether delivered by Symantec as on premises or hosted services. Any use, modification, reproduction release, performance, display or disclosure of the Licensed Software and Documentation by the U.S. Government shall be solely in accordance with the terms of this Agreement.
    [Show full text]
  • Strike First
    GET UP TO $ BACK30 THE RISE OF COBRA Via Mail-In Rebate* ONly IN Theaters STRWITH ITKHEE SPEED FIR OFS NOTRTON * Receive $30 via mail-in rebate with the purchase of Norton™ Internet Security 2009 or $20 with the purchase of Norton™ AntiVirus 2009. Offer good for purchases made between 6/21/09 and 10/19/09 at participating retailers. Rebate submissions must be postmarked within 30 days of purchase. Limit one rebate per product per customer. Read below or visit www.norton.com/gijoe for complete Terms and Conditions. To receive your rebate from Symantec, please follow these steps: Terms and Conditions 1. Purchase Norton™ Internet Security 2009 or Norton™ AntiVirus 2009 between 6/21/09 and 10/19/09 • The G.I. Joe rebate offer is valid only for stand-alone, retail (boxed or downloaded) purchases of Norton at a participating retailer (Norton Internet Security 2009 customers receive a $30 Visa® Prepaid Card. Internet Security 2009 and Norton AntiVirus 2009. Purchases must be made between 6/21/09 and Norton AntiVirus 2009 customers receive a $20 Visa Prepaid Card. Purchases made from Office Depot 10/19/09 at a participating retailer. Offer not available with site licenses, trialware, NFRs, products will receive their rebate in the form of a check.). pre-installed or supplied by a manufacturer (OEM), multi-user packs (other than Norton Internet Security 2. Read and complete this rebate request form. Or you can pre-submit your rebate at for 3-users), academic offers, auction purchases, or with any other offer except the upgrade/competitive www.symantecrebates.com.
    [Show full text]
  • Graphicconverter 6.6
    User’s Manual GraphicConverter 6.6 Programmed by Thorsten Lemke Manual by Hagen Henke Sales: Lemke Software GmbH PF 6034 D-31215 Peine Tel: +49-5171-72200 Fax:+49-5171-72201 E-mail: [email protected] In the PDF version of this manual, you can click the page numbers in the contents and index to jump to that particular page. © 2001-2009 Elbsand Publishers, Hagen Henke. All rights reserved. www.elbsand.de Sales: Lemke Software GmbH, PF 6034, D-31215 Peine www.lemkesoft.com This book including all parts is protected by copyright. It may not be reproduced in any form outside of copyright laws without permission from the author. This applies in parti- cular to photocopying, translation, copying onto microfilm and storage and processing on electronic systems. All due care was taken during the compilation of this book. However, errors cannot be completely ruled out. The author and distributors therefore accept no responsibility for any program or documentation errors or their consequences. This manual was written on a Mac using Adobe FrameMaker 6. Almost all software, hardware and other products or company names mentioned in this manual are registered trademarks and should be respected as such. The following list is not necessarily complete. Apple, the Apple logo, and Macintosh are trademarks of Apple Computer, Inc., registered in the United States and other countries. Mac and the Mac OS logo are trademarks of Apple Computer, Inc. Photo CD mark licensed from Kodak. Mercutio MDEF copyright Ramon M. Felciano 1992- 1998 Copyright for all pictures in manual and on cover: Hagen Henke except for page 95 exa- mple picture Tayfun Bayram and others from www.photocase.de; page 404 PCD example picture © AMUG Arizona Mac Users Group Inc.
    [Show full text]
  • Verizon Wireless Mobile Office User Guides for Windowstm 95/98
    Verizon Wireless Mobile Office User Guides For WindowsTM 95/98 To use Mobile Office for basic Internet access, do the following: Setting the Phone Up As a Modem 2 – 5 Setting Up a Mobile Office Quick 2 Netsm Connection 6 – 9 Using The Mobile Office Service 10 - 16 Related Support Documents: Setting Up Your Existing Dial Up Connections 17- 24 Setting Up AOL 4.0 / 5.0 (If you currently use AOL.) 25 - 32 Faxing With Your Digital Data Capable Phone 33 - 53 1 man.doc Setting the Phone Up as a Modem Step 1:(Optional) If you have a driver that was provided with your phone skip this step. If you do not have a driver you can use a standard driver included in Windows or we recommend using our driver. Download the Mobile Office Driver. Step 2: Go into control panel by clicking on Start, Settings, Control Panel Step 3: Select Modems Step 4: Click Add... 2 man.doc Step 5: Select "Other" then click Next. (If your PC does not support PC-Cards you will not get this screen.) Step 6: Check "Don't run the Hardware Installation wizard" if you get this dialog box. Then click on the Next button. Step 7: Check the box labeled "Don't detect my modem; I will select it from a list." Then click Next. 3 man.doc Step 8: If you have a driver provided by your phone manufacturer, click on the "Have Disk..." button. Insert your disk, click "OK" and then choose the model of phone that you have.
    [Show full text]
  • Testing the National Software Reference Library
    Testing the National Software Reference Library Neil C. Rowe U.S. Naval Postgraduate School Monterey, California, USA [email protected] Forensics of directory metadata p We need tools to quickly find key information on a drive without searching file contents. p File and directory metadata is a big help to characterize drives (or partitions on a cloud). p We are developing a tool “Dirim”. p Our testbed the “Real Drive Corpus” is purchased from 22 countries, mostly China, Mexico, Israel, Palestine, and India – now 2420 drives and 44 million files. p It also includes wireless and storage devices. p For analysis, we exclude files with hashes found in the National Software Reference Library Reference Data Set (NSRL RDS) – it removes 30% of the files – and 5% of the hashes. p Research question: Just how good is the NSRL? The Dirim file-metadata analysis system Disk or flash drive File-directory metadata (in XML/DFXML) Common Simplified and standardized metadata hash codes File classification (from NSRL, mapping etc.) Data with deleted-file corrections Data excluding common files File classifications Statistical summaries Data clusters Special-feature analysis Suspiciousness analysis Graphical display of analysis results File metadata we extract from a disk image Ordinal features Nominal features Boolean features File size Drive name Allocated? Access minus creation File name Compressed? time Access minus File extension Encrypted? modification time Modification minus Top-level directory Empty? creation time Depth in file hierarchy Immediate directory
    [Show full text]
  • Norton 360 User Guide on the CD Or the USB Drive in PDF Format
    User Guide See back cover for Quick Installation. We protect more people from more online threats than anyone in the world. Care for our Environment, ‘It's the right thing to do’. Symantec has removed the cover from this manual to reduce the Environmental Footprint of our products. Norton 360™ User Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation version 5.0 Copyright © 2010 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, Norton, SONAR, LiveUpdate, Norton AntiSpam, Norton AntiVirus, Norton Internet Security, Norton 360, and Norton SystemWorks are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Windows is a trademark of Microsoft Corporation. Portions of this product Copyright [1996-2008] Glyph & Cog, LLC. Other names may be trademarks of their respective owners. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION.
    [Show full text]
  • Norton Utilities TM
    Norton TM Norton Utilities Proof Utilities of Purchase Benutzerhandbuch Wir schützen weltweit mehr Benutzer vor Bedrohungen aus dem Internet als jedes andere Unternehmen. Umweltschutz ist wichtig. Symantec hat dieses Handbuch ohne Umschlag gestaltet, um die Einwirkung auf die Umwelt durch unsere Produkte zu reduzieren. TM Norton Utilities Benutzerhandbuch Die in diesem Handbuch beschriebene Software wird unter Lizenz vertrieben und darf nur entsprechend den Vertragsbedingungen verwendet werden. Dokumentationsversion 14.0 Copyright © 2009 Symantec Corporation. Alle Rechte vorbehalten. Symantec, das Symantec-Logo, Norton, Ghost, GoBack, LiveUpdate, Norton AntiSpam, Norton AntiVirus, Norton Internet Security, Norton 360 und Norton SystemWorks sind Marken oder eingetragene Marken der Symantec Corporation oder ihrer Tochtergesellschaften in den USA und anderen Ländern. Windows ist eine Marke der Microsoft Corporation. Andere Produktnamen können Marken der jeweiligen Rechteinhaber sein. Die in diesem Handbuch beschriebene Software wird Ihnen im Rahmen einer Lizenzvereinbarung zur Verfügung gestellt und darf nur unter den darin beschriebenen Bedingungen eingesetzt, kopiert, verteilt, dekompiliert und zurückentwickelt werden. Kein Teil dieser Veröffentlichung darf ohne ausdrückliche schriftliche Genehmigung der Symantec Corporation und ihrer Lizenzgeber vervielfältigt werden. DIE DOKUMENTATION WIRD "OHNE MÄNGELGEWÄHR" GELIEFERT. ALLE AUSDRÜCKLICHEN ODER STILLSCHWEIGENDEN BEDINGUNGEN, DARSTELLUNGEN UND GEWÄHRLEISTUNGEN EINSCHLIESSLICH DER STILLSCHWEIGENDEN
    [Show full text]
  • Wsn, COURT STAFF) (Filed on 8/23/2013
    Haskins v. Symantec Corporation Doc. 32 1 2 3 4 UNITED STATES DISTRICT COURT 5 NORTHERN DISTRICT OF CALIFORNIA 6 KATHLEEN HASKINS, 7 Case No. 13-cv-01834-JST Plaintiff, 8 v. ORDER GRANTING MOTION TO 9 DISMISS SYMANTEC CORPORATION, 10 ECF No. 22 Defendant. 11 12 13 Before the Court is Defendant Symantec Corporation’s (“Symantec”) Motion to Dismiss 14 Plaintiff’s First Amended Complaint (“Motion”). ECF No. 22. The Court has carefully 15 considered the papers filed in support of the motion and finds the matter appropriate for resolution 16 without oral argument. See Civil L.R. 7-1(b). The hearing scheduled for August 29, 2013 is 17 therefore VACATED. United States District United Court District States Northern District of California Northern California of District 18 I. BACKGROUND 19 A. Factual Background 20 The Court accepts the following allegations as true for the purpose of resolving 21 Defendant’s motion to dismiss. Cahill v. Liberty Mutual Ins. Co., 80 F.3d 336, 337–38 (9th Cir. 22 1996). 23 Symantec provides security, storage, and systems management to consumers, small 24 businesses, and large global organizations through its antivirus, data management utility and 25 enterprise software products. First Amended Complaint (“FAC”), ECF No. 17, ¶ 3. In 2006, 26 hackers infiltrated Symantec’s network and stole the source code for the 2006 versions of 27 pcAnywhere, Norton SystemWorks, Norton Antivirus Corporate Edition and Norton Internet 28 Dockets.Justia.com 1 Security (which Plaintiff identifies in the FAC the “Compromised Symantec Products”1). Id. ¶ 18. 2 The stolen Symantec source code includes instructions written in various computer programming 3 languages, and comments made by engineers to explain the design of the software.
    [Show full text]
  • Yes, Virginia, There Really Is a Norton
    05_579932 bk01ch01.qxd 2/24/05 10:44 PM Page 9 Chapter 1: Getting to Know Norton Products In This Chapter ߜ Appreciating Norton’s long history in the PC help biz ߜ Figuring out exactly who Norton is ߜ Getting to know Norton products by type ven if you’re brand-spankin’-new to computers, and before you pur- Echased your Norton software, you probably heard or read the name Norton many times. In fact, Norton is one of the relatively few PC-industry names that has been with us since early on in the history of personal com- puters. If you only knew how many companies have gone bust or been bought up by bigger firms over the last two-plus decades, you would be astounded! This chapter introduces you to the various tools that are available under the Norton name (plenty!). Here, I focus in on the type of software, because you have so many different ones to choose from. Just as finding and using the right tool in your household tool chest is important when you’re want- ing to do a specific repair, choosing the right Norton product for the PC protection, repair, or maintenance job you face is important — and in this chapter, I help you do just that. Norton: A Name Long Associated with PC Care IBM’s name is still associated with the original PC-class computer that rolled out in 1981. This is true even though so many other manufacturers have joined theCOPYRIGHTED PC design and rollout industry. MATERIAL Not very long after the debut of the IBM PC, the name IBM was joined by the name Norton for some of the first utilities created to help consumers work with those PCs.
    [Show full text]
  • (In) Security in Security Products 2013
    iViZ Security Inc (In) Security in Security Products 2013 ©iViZ Security Inc 2013 Introduction We use security products to secure our systems and our businesses. However, the very security products we use, can themselves have vulnerabilities which can leave us susceptible to attacks. In this annual report iViZ studies the vulnerability trends in security products. In our last year’s report, we published trends in major security products and security vendors. We concluded with the fact that security products and vendors are as vulnerable and insecure as are any other products and vendors respectively. We took some time to find out what were the major security breaches over the last couple of years and the results are quite interesting. In 2012 alone, some major security vendors like Symantec Corporation, GlobalCerts and Panda Security among others got targeted and breached by attackers. Here is a summary of some recent major events of Security companies that got hacked. Symantec Corporation -Security software giant attacked by anonymous hacker in Jan 2012 The company had source code stolenfor software titles like Norton Antivirus corporate edition, Norton Internet security, Norton Utilities, Norton GoBack and pcAnywhere. They were hacked again in November with the complete database from the Symantec online portal leaked. Their employee’s database containing email addresses and passwords was breachedwith the loss of around 3,195 records. Panda Security, a cloud security company was hacked by LulzSec and the hacking group Anonymous in Mar 2012 Multiple usernames and passwords of employees were breached. Atleast 35 of their public facing websites hacked. GlobalCerts, a firm which provides Email Security Solutions hacked by an anonymous hacker in Aug 2012 Database hacked with over 1000 client details leaked.
    [Show full text]