Capital Apple Apr 2004

Total Page:16

File Type:pdf, Size:1020Kb

Capital Apple Apr 2004 Volume 21.04 April 2004 The Official Journal of the 1 Meeting Details WELLINGTON MACINTOSH SOCIETY INC. Special General Meeting 2004 A Special General Meeting of the Wellington Macintosh Society Inc. will be held on Monday 26 April, 2004, at (e)-vision,2 Blair Street, Wellington, commencing at 7:15 P.M. BUSINESS To recieve and accept the 2003 Financial Report Graeme Moffatt, SECRETARY Following the SGM, Ian Telfar, the manager of MagnumMac Wellington, will demonstrate some of the latest software and hardware offerings from Apple Computer Inc. Basics/OSX 7–9pm, Monday 3rd May 2004 (separate groups for basics and OSX) Digital Media Users Group (web and publishing) 7–9pm, Monday 10th May 2004 Digital Video Users Group 7–9pm,Monday 17th May 2004 Cover Photo: The front cover of the first issue 1.1 in May 1984 of what was later to become Capital Apple. 2 3 President’s Report Hi folks. choose the “Download Link to Disk” Electronic option from the pop-up menu. After the magazine has been downloaded, Magazine the PDF can be opened using Acrobat/ We’re into our Adobe Reader or the Mac OS X Preview second month of application, depending on how your the electronic dis- system is configured. tribution of Capital For those running Mac OS X and us- Apple, and it seems ing the Safari web browser, this appears to be going well so to be the normal behaviour, so no special far. I’m pleased to report that we are action is required. getting a high proportion of “electronic only” membership renewals, which will Macintosh Workshops reduce the workload of the committee at A workshop was held at (e)-vision the magazine labelling session. on Saturday 3rd April, and those who I’m aware of one member who was attended were able to get lots of help not able to access the electronic maga- from the experts on hand. zine last month due to a web browser We intend to run a workshop every configuration problem which prevented two months for the rest of year, with the accessing any PDF documents. next one being held in June. More details This also raised the issue that for will be provided next month once we’ve anyone using the “PDFViewer” web set a date. browser plug-in, the default behaviour The workshops are reasonably flex- of older web browsers is to view a PDF ible in content, covering any topics on document as if it is a web page (inside the which the attendee needs help, assuming web browser), and it is difficult to save we can find a suitable helper. Registra- a copy of the document for future refer- tion is essential - we need to know what ence (without downloading it again). you want to cover so we can plan ahead. In order to avoid similar problems in Please use the form on the web site or future, we are doing things slightly dif- contact a committee member if you want ferently this month: instead of providing to attend a workshop. a direct link to the magazine, we will give The workshops run from 10 am to 2:30 you a link to a web page which contains pm including a lunch break (a light lunch a link to the PDF. is provided). We are charging a fee of $75 If you want to download and save a per person. Non-members must also join copy of the magazine, you can go to the WelMac in order to attend, which raises web page, then click-and-hold or Ctrl- the cost to $105 or $115 depending on click on the link to the magazine, and whether you want a magazine. 2 3 Macintosh Basics Meeting collected by automated software used For those who need help on basic by spammers to build lists of targets. Macintosh operation, or on some spe- My address was also published on web cific area, don’t forget about the “ba- sites, from which it was also collected. sics” meeting which is held on the first In recent years, we’ve had several ad- Monday of each month (a week after the dresses in the welmac.org.nz domain main meeting). We can usually break up published on our web site, many of into small groups and deal with specific which go to me. areas of interest, so this meeting can be The current state of play is that I regarded as a shorter version of the consistently receive over 200 items of workshop, and attendance is free for junk E-Mail every day. A quick scan any WelMac members. through my “Junk” mailbox reveals The Junk E-Mail Problem 686 messages sent between Monday and Wednesday, including the usual mix of It is interesting to note that April 12 adult web sites, male potency enhance- marked the tenth anniversary of the first ments, Russian and Korean messages widely distributed “spam” message which I can’t even read, etc. There are (unsolicited commercial advertising), about 30 copies of various worms, and the now infamous advertisement from at least 10 “bounced mail” reports from the legal firm of Canter & Siegel. misguided anti-virus software which The problem of spam and other thinks I tried to send a worm to some- forms of junk E-Mail has now reached one else (actually a third computer sent such a scale that it may only be a mat- it, with the headers changed to make it ter of time before changes are forced look like it came from me). on way that the Internet E-mail system This completely swamps the real E- operates. Mail messages I’m receiving (typically In addition to spam (unsolicited com- 10 or fewer), so I’m very reliant on soft- mercial messages) there is also the prob- ware which can filter out the junk and lem of E-Mail worms, which at times can leave me with the real messages. send out large volumes of messages. At The main lines of defence at the mo- one point I was getting over 100 copies ment are ISPs and/or E-mail software of one particular worm per day, and the which offer filtering techniques, with total volume was sufficient to overflow “Bayesian Filtering” being quite com- my ISP’s limit on the total amount of E- mon. Unfortunately, the spam authors Mail I could receive, possibly preventing have figured out ways of poisoning this real messages from arriving. system. My E-Mail software is now in a I have had my personal E-Mail ad- state where almost every message I re- dress ([email protected]) since ceive is regarded as junk mail, unless it I got my first Internet account around comes from an address which is already 1992. For many years, I posted mes- in my address book. sages to Usenet news groups, which means that my address was able to be continued at bottom of next page 4 5 WelMac Web Watch www.welmac.org.nz This months WelMac Web Watch is are being posted to the website regularly shorter due to the length of the two articles so keep checking back. contained in this issue. New Articles added to Web Site Ar- A note to new members and a reminder chives to those members who have not recently One additional article detailing the re- accessed the group’s web site. The site can lease of the latest version and changes to the be found at <http://www.welmac.org.nz> database application, Filemaker, has been All sections of the web site can now be added to the article archives section of our viewed by the public including the Article website, since last month’s magazine was Archives. This page can be reached from published. <http://www.welmac.org.nz/ the WelMac Article Archives link on the article_archives.htm>. Each new article is links page. Details of all current articles listed and linked from the home page for a appears later in this update. New articles short time after they have been posted. continued from previous page This means that I have to browse address (which will be a major under- through my junk mail folder every day taking) and don’t publish the new one to check for “false positives”. It is a major electronically. waste of time, and it is likely that a few Signing off real messages slip by unnoticed, so my If you wish to contact me for any apologies if I’ve lost a message anyone reason, you can do so at (04)475-9755 has tried to send me. (home), E-Mail to <president@welmac. At this point, my only options are org.nz>, or write to me at P O Box 6642, to grit my teeth, or change my E-Mail Wellington. 4 5 Mac OS X Trojan Technique: Beware Geeks by Adam C. Engst <[email protected]> merely popped up a dialog box, but it obvi- ously could execute any sort of code. It’s By now, assuming you pay any atten- a clever hack that takes advantage of both tion to the Macintosh media in between the way Carbon applications work and the your weekly doses of TidBITS, you’ve un- ID3 tag portion of the MP3 file format to doubtedly heard of the hubbub brewing run executable code from within a legiti- around the announcement last Thursday mate MP3 file. It’s worth noting that all of of the first Trojan horse to target Mac OS the programming techniques used by Bo’s X.
Recommended publications
  • Norton 360™ Version 3.0, Norton Internet Security™ 2009, and Norton Antivirus™ 2009 Feature Comparison Chart
    Norton 360™ Version 3.0, Norton Internet Security™ 2009, and Norton AntiVirus™ 2009 Feature Comparison Chart Feature Norton 360 Norton Internet Norton Explanation Version 3.0 Security 2009 AntiVirus 2009 Core Protection Antivirus ✔ ✔ ✔ Detects and removes viruses, Internet worms, and Trojan horses Antispyware ✔ ✔ ✔ Prevents spyware from infecting the PC Email and instant messaging protection ✔ ✔ ✔ Monitors email and instant messaging so users can exchange files without exchanging threats Antispam ✔ ✔ Automatically filters out annoying and fraudulent or phishing email from the user’s email inbox Advanced Protection Botnet detection ✔ ✔ ✔ Detects and prevents others from taking control of the PC, accessing private information, or using the computer to host an attack Rootkit detection ✔ ✔ ✔ Finds and removes threats that are hidden deep in the operating system Norton™ Insight ✔ ✔ ✔ Includes innovative, intelligence-driven technology for faster, fewer, shorter scans Norton™ Pulse Updates ✔ ✔ ✔ Delivers rapid pulse updates every 5 to 15 minutes for protection against new threats Smart, two-way firewall ✔ ✔ Makes intelligent incoming and outgoing security decisions without interrupting users to ask them each time Enhanced browser protection ✔ ✔ ✔ Secures against Web-based attacks that use browser vulnerabilities to infect PCs with malware Real-time behavioral protection ✔ ✔ ✔ Provides enhanced, real-time protection (SONAR™) Wireless network security protection ✔ ✔ Checks the status of wireless network security and provides expert advice on managing
    [Show full text]
  • A Glance Into the Eye Pyramid Technical Article V2
    A glance into the Eye Pyramid RĂZVAN OLTEANU Security Reasercher We keep you safe and we keep it simple. 01 Introduction On January 11, 2017 Italian news agency AGI, published a court order regarding cyber-attacks against high ranking Italian government members and Italian institutions. The attacks were conducted by two Italian brothers to get financial information that would help them gain an advantage when trading on financial markets. Overview The campaign was carried out over several years starting in 2008 and continuing into 2010, 2011, 2012 and 2014. The mechanism the brothers used to distribute their malware was simple; targeted spear-phishing emails aimed at victims who had already been selected. The emails con- tained a malware attachment, which once opened harvested information from the victims’ computers. This information consisted of pictures, documents, archives, presenta- tions, email contacts, email bodies, usernames, passwords, keystrokes, web pages content and databases. Technical details The malware was written in VisualBasic.net and was obfuscated twice using common obfuscators: Dotfuscator and Skater .NET which can be easily reversed. The malware stored its sensitive data – license keys, URLs and paths – by encrypting with the Triple DES algorithm using the MD5 of a provided password as key and SHA256 of the pass- word as initialization vector. A glance into the Eye Pyramid 01 02 Figure 1 Security applications To remain unnoticed, it tried to disable any security application installed on the victim’s computer. Targeted
    [Show full text]
  • Aluria Security Center Avira Antivir Personaledition Classic 7
    Aluria Security Center Avira AntiVir PersonalEdition Classic 7 - 8 Avira AntiVir Personal Free Antivirus ArcaVir Antivir/Internet Security 09.03.3201.9 x64 Ashampoo FireWall Ashampoo FireWall PRO 1.14 ALWIL Software Avast 4.0 Grisoft AVG 7.x Grisoft AVG 6.x Grisoft AVG 8.x Grisoft AVG 8.x x64 Avira Premium Security Suite 2006 Avira WebProtector 2.02 Avira AntiVir Personal - Free Antivirus 8.02 Avira AntiVir PersonalEdition Premium 7.06 AntiVir Windows Workstation 7.06.00.507 Kaspersky AntiViral Toolkit Pro BitDefender Free Edition BitDefender Internet Security BullGuard BullGuard AntiVirus BullGuard AntiVirus x64 CA eTrust AntiVirus 7 CA eTrust AntiVirus 7.1.0192 eTrust AntiVirus 7.1.194 CA eTrust AntiVirus 7.1 CA eTrust Suite Personal 2008 CA Licensing 1.57.1 CA Personal Firewall 9.1.0.26 CA Personal Firewall 2008 CA eTrust InoculateIT 6.0 ClamWin Antivirus ClamWin Antivirus x64 Comodo AntiSpam 2.6 Comodo AntiSpam 2.6 x64 COMODO AntiVirus 1.1 Comodo BOClean 4.25 COMODO Firewall Pro 1.0 - 3.x Comodo Internet Security 3.8.64739.471 Comodo Internet Security 3.8.64739.471 x64 Comodo Safe Surf 1.0.0.7 Comodo Safe Surf 1.0.0.7 x64 DrVirus 3.0 DrWeb for Windows 4.30 DrWeb Antivirus for Windows 4.30 Dr.Web AntiVirus 5 Dr.Web AntiVirus 5.0.0 EarthLink Protection Center PeoplePC Internet Security 1.5 PeoplePC Internet Security Pack / EarthLink Protection Center ESET NOD32 file on-access scanner ESET Smart Security 3.0 eTrust EZ Firewall 6.1.7.0 eTrust Personal Firewall 5.5.114 CA eTrust PestPatrol Anti-Spyware Corporate Edition CA eTrust PestPatrol
    [Show full text]
  • Norton Antivirus Product Manual
    NortonTM AntiVirus Product Manual Care for our Environment; ‘It's the right thing to do.’ Symantec has removed the cover from this manual to reduce the Environmental Footprint of our products. This manual is made from recycled materials. Norton AntiVirus™ Product Manual The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation version 21.4 Copyright © 2014 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, LiveUpdate, Norton 360, and Norton are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Portions of this product Copyright 1996-2011 Glyph & Cog, LLC. Other names may be trademarks of their respective owners. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THE DOCUMENTATION IS PROVIDED “AS IS” AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, et seq.
    [Show full text]
  • Symantec 9.0, Symantec 10.0 Norton 2005, Norton 2006 and Mcafee 8.0I
    SecurView 2-0-X Anti-virus Installation Symantec 9.0, Symantec 10.0 Norton 2005, Norton 2006 and McAfee 8.0i anti-virus installation Purpose: To install anti-virus software on the existing SecurView and Selenia Softcopy Workstation 2-0-X (SCW) products. Scope: This document applies to all SecurView and Selenia SCW products with version 2-0-1 or higher. This document does not apply to 3-X or any future releases. Estimated Time: Installation of anti-virus products will take the network technician approximately 30 minutes to complete. This includes running live-update and verifying auto-protect is enabled. Reference List Table 1: Reference List Name Comments Option 1: Symantec Anti-virus Customer provided. Only the client of the Corporate Edition 9.0 Corporate edition is loaded on our products Option 2: Symantec Anti-virus Customer provided. Only the client of the Corporate Edition 10.0 Corporate edition is loaded on our products Option 3: Norton Anti-virus 2005 Customer provided (Home edition) Option 4: Norton Anti-virus 2006 Customer provided (Home edition) Option 5: McAfee 8.0i Customer provided. Only the client of the Corporate edition is loaded on our products Definitions Liveupdate – This feature allows Symantec Anti-virus servers or clients to retrieve updates through the LiveUpdate feature of Symantec Anti-virus and receive new definition files from an internal server, or the official Symantec LiveUpdate server. Managed – The client system is configured to send virus alerts, as well as retrieve virus updates from an internal parent Symantec server. Real-time– Real time scanning of each file that is loaded in RAM.
    [Show full text]
  • Release Notes
    ESAP 1.6.1 Support has been added for the following products in ESAP1.6.1: Antivirus Products [Antiy Labs] Antiy Ghostbusters 6.x [Comodo Group] COMODO Internet Security 4.x [Kingsoft Corp.] Internet Security 2010.x [SOFTWIN] BitDefender Free Edition 2009 12.x [Sunbelt Software] VIPRE Enterprise 4.x [Sunbelt Software] VIPRE Enterprise Premium 4.x [Symantec Corp.] Norton AntiVirus 18.x [Symantec Corp.] Symantec Endpoint Protection Agent 5.x Antispyware Products [Symantec Corp.] Norton AntiVirus [AntiSpyware] 18.x Firewall Products [Check Point, Inc] ZoneAlarm Firewall 9.x [Comodo Group] COMODO Internet Security 4.x [Sunbelt Software] VIPRE Enterprise Premium 4.x [Symantec Corp.] Norton Internet Security 18.x [Symantec Corp.] Symantec Protection Agent 5.1 5.x Issues Fixed in ESAP1.6.1: OPSWAT : 1. Custom install of Symantec Endpoint Protection 11.x not getting detected (499991) Shavlik: No Shavlik fixes are included. Issues on Upgrading to ESAP1.6.1: OPSWAT: 1. Upgrade from ESAP1.5.2 or older fails if a firewall policy is configured where “Require Specific Products” is checked and McAfee Desktop Firewall (8.0) is selected. The upgrade doesn’t fail if McAfee Desktop Firewall (8.0.x) is selected. To successfully upgrade to ESAP 1.5.3 or greater, unselect McAfee Desktop Firewall (8.0) and select McAfee Desktop Firewall (8.0.x). This doesn’t result in any loss of functionality. Shavlik: 1. The following note applies only to the patch assessment functionality. When upgrading ESAP from a 1.5.1 or older release to the current release, the services on the SA or IC device needs to be restarted for the binaries on the endpoint to be automatically upgraded.
    [Show full text]
  • System Requirements General Disclaimers & Disclosures
    General Disclaimers & Disclosures Noonecanpreventallcybercrimeoridentitytheft. ²RequiresyourdevicetohaveanInternet/dataplanandbeturnedon. 1PAYMENT METHOD REQUIRED FOR 1 YEAR PRE-PAID SUBSCRIPTION:Youare ³Defaultstomonitoryouremailaddressonly.LogintoyourNortonaccounttoenter purchasingarecurringsubscriptionwhichwillautomaticallyrenewafterthefirst moreinfoformonitoring.IfyouareacurrentLifeLockmember,youmustreview year.Toactivate,youmustenrollonlineandprovideyourbillinginformation.The andmanagethosesettingsinyourLifeLockportal. pricepaidtodayisvalidforthefirstyearofyoursubscription,andwillautomatically renewandchargeyourstoredpaymentmethodtheapplicablerenewalpricefound *VirusProtectionPromise:Restrictionsapply.Mustsubscribewithautomatic atwww.us.norton.com/pricing.Thepriceissubjecttochange,butwewillalways renewal.SeeNorton.com/guaranteefordetails. sendyouanotificationemailinadvance.Youmaycanceltheautomaticrenewalby ‡NortonFamilyParentalControlfeaturesarenotsupportedonMac. loggingintoyouraccount,orcontactingusat:844-488-4540. Yourcoveragemayincludeproduct,serviceand/orprotectionupdatesand featuresthatmaybeadded,modifiedorremoved,subjecttotheapplicableTerms &ConditionsfoundonNortonLifeLock.com.Datacollection,storageandusefor subscriptionmanagementandrenewalpurposessubjecttoourGlobalPrivacy Statementfoundatwww.nortonlifelock.com/privacy. System Requirements • Notallfeaturesareavailableonallplatforms. ™ • Norton™360isavailablefor1,3,5,10and20Devices(PC,Mac®,iOS Norton AntiVirus Plus Available for 1 Windows™ PC or Mac® andAndroid) • NortonAntiVirus™Plusisavailablefor1PCorMac®
    [Show full text]
  • Norton-360.Pdf
    Norton™ 360 Product Manual Norton™ 360 Product Manual The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation version 22.21.3 Copyright © 2021 NortonLifeLock Inc. All rights reserved. NortonLifeLock, the NortonLifeLock Logo, the Checkmark Logo, Norton, Norton Secured Logo, LifeLock, and the LockMan Logo are trademarks or registered trademarks of NortonLifeLock Inc. or its affiliates in the U. S. and other countries. Other names may be trademarks of their respective owners. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of NortonLifeLock Inc. and its licensors, if any. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. NORTONLIFELOCK INC. SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, et seq. "Commercial Computer Software and Commercial Computer Software Documentation," as applicable, and any successor regulations, whether delivered by NortonLifeLock as on premises or hosted services.
    [Show full text]
  • Computercorner
    By Merle Windler, Thoroughbred Systems, Inc. CCoommppuutteerr CCoo rrnneerr computer is running slowly, it's because it has picked up one of the thousands of annoying, mischievous programs on the Internet. One doesn't have to do something wrong to get into trouble; sometimes just being in the wrong place at the wrong time allows trouble to come in. veryone would E likely agree that it would be foolish to have Being popular has a downside any computer on the Internet without Sometimes the problem is NOT these mischievous antivirus protection software installed. Hundreds of new programs we refer to as a virus, but rather the very viruses and malicious software programs are produced software installed on a computer to protect from them. everyday and are truly a threat to everyone who uses a The most popular and widely used antivirus programs computer, especially everyone tend to be a priority target for the using a computer on the Internet. many bad guys writing software But, sometimes the medicine is The most popular and intended to harm computer systems. worse than the ailment, when Symantec's Norton Antivirus is one of taking the wrong prescription for widely used antivirus these. In their case, to protect against one's needs. What does one do programs tend to be a this, their engineers have designed when the problem IS the antivirus their product to embed their software software or other protective priority target for the during the windows installation. The measures? many bad guys writing very complexity of this can make the Antivirus programs designed to software intended to Norton antivirus installation more help protect us from those who susceptible to corruption.
    [Show full text]
  • Gateway to Visteon G2V Supported Anti-Virus Guide
    . Siemens Enterprise Communications, Inc. ........Gateway to Visteon G2V Supported Anti-Virus Guide Version: 1.6.5 – November 2010 Siemens and Visteon Confidential and Proprietary This document may not be duplicated or distributed without prior authorization from Siemens Enterprise Communications, Inc. or Visteon . Supported Anti-Virus Software The following Anti-Virus applications are fully supported. It is highly recommended that one of the following applications be used for accessing G2V. Please note that this list will change as new versions are released by their vendors. Normally, the current and previous release of these applications will remain on the supported list. Newer versions released may not be immediately supported or compatible, please consult this list before updating to a newer version. Vendor Product Version Windows XP Windows Vista Windows 7 McAfee, Inc. VirusScan Enterprise 8.7.x ✔ ✔ ✔ VirusScan 2009 13.x ✔ ✔ ‐‐ VirusScan 2010 14.x ✔ ✔ ✔ Symantec Corp. Norton Anti-Virus 2010 17.x ✔ ✔ ‐‐ Norton Anti-Virus 2011 18.x ✔ ✔ ✔ Symantec Endpoint Protection 11.x ✔ ✔ ✔ Symantec Endpoint Protection 12.x ✔ ✔ ✔ Trend Micro, Inc. Anti‐Virus 17.x ✔ ✔ ‐‐ Anti‐Virus 17.5 ✔ ✔ ✔ OfficeScan 8.x ✔ ✔ ‐‐ OfficeScan 10.x ✔ ✔ ✔ Notes: Please see the notes at the end of this guide for special instructions for Vista users with Norton Anti-Virus 2009. The products highlighted in yellow will be removed from the supported list in the next update. If you are using one of these products, you should consider upgrading to a newer version. Compatible Anti-Virus Software The applications below have been specified as compatible by the Anti-Virus Host Check vendor. Support for these applications may be removed at any time, especially in the case of older versions that may be at or near end-of-life status.
    [Show full text]
  • Cisco Identity Services Engine Release 1.2 Supported Windows
    Cisco Identity Services Engine Supported Windows AV/AS Products Compliance Module Version 3.5.6317.2 This document provides Windows 8/7/Vista/XP AV/AS support information on the Cisco NAC Agent version 4.9.0.x and later. For other support information and complete release updates, refer to the Release Notes for Cisco Identity Services Engine corresponding to your Cisco Identity Services Engine release version. Supported Windows AV/AS Product Summary Added New AV Definition Support: COMODO Antivirus 5.x COMODO Internet Security 3.5.x COMODO Internet Security 3.x COMODO Internet Security 4.x Kingsoft Internet Security 2013.x Added New AV Products Support: V3 Click 1.x avast! Internet Security 8.x avast! Premier 8.x avast! Pro Antivirus 8.x Gen-X Total Security 1.x K7UltimateSecurity 13.x Kaspersky Endpoint Security 10.x Kaspersky PURE 13.x Norman Security Suite 10.x Supported Windows AntiVirus Products Product Name Product Version Installation Virus Definition Live Update 360Safe.com 360 Antivirus 1.x 4.9.0.28 / 3.4.21.1 4.9.0.28 / 3.4.21.1 yes 360 Antivirus 3.x 4.9.0.29 / 3.5.5767.2 4.9.0.29 / 3.5.5767.2 - 360杀毒 1.x 4.9.0.28 / 3.4.21.1 4.9.0.28 / 3.4.21.1 - 360杀毒 2.x 4.9.0.29 / 3.4.25.1 4.9.0.29 / 3.4.25.1 - 360杀毒 3.x 4.9.0.29 / 3.5.2101.2 - Other 360Safe.com Antivirus x 4.9.0.29 / 3.5.2101.2 - AEC, spol.
    [Show full text]
  • Norton Antivirus Subscription Renewal Code
    Norton Antivirus Subscription Renewal Code almostAthetoid artlessly, Nichols thoughfatting orJuergen triplicate gloats some his collusions backstairs richly, ruralizes. however Is Aubrey utmost coxal Pace or hemorrhages soul-stirring aftereclectically fluidic Ulisesor dabbed. gudgeon Unuttered so acrogenously? and dimply Neville pin Norton antivirus subscription now, the links are tested norton support service team brings the system cleanup tool helps to provide you normally would recommend to subscription renewal norton code subtract dollars from Norton surpasses other antivirus companies by also including vault auditing tools in its password manager. Challenged the price via online chat. If you want to keep the fire of desire burning well past. Now, there does Norton! This site where do not exceed the instructions only few competitions or codes for secure anonymizing proxy using a google contacts before you can easily into its good. Issue and when renewing Norton antivirus after the expiry date. Type knowing your product key, and wife Next. Mike concerning a renewal on view account. The antivirus subscriptions, as per account. VPN disconnected the conversation I opened my torrent client. How many of antivirus subscription ensures that. Norton and pond add site to recycle cart. Show the submenu submenu. Symantec norton renewal. Apply the coupon codes on Norton 360 Antivirus Plus and statutory privacy. Ran live update again. Norton discount codes 40 OFF in February. Indique solo letras y números. Up for automatic renewal Norton reciprocates with a Virus Protection Promise. Are displayed by renewing subscription renewal confirmation email message rule to renew with relevant for antivirus subscriptions to your protection for all norton? My shop just locates the best deal available.
    [Show full text]