STC/Annual Cvr/FA

Total Page:16

File Type:pdf, Size:1020Kb

STC/Annual Cvr/FA ™ Corporate Profile Symantec Corporation helps make users productive and keep their computers safe and reliable, anywhere and anytime. As the world leader in utility software for business and personal computing, Symantec is acclaimed for both its customer satisfaction and product brand recognition. The Company offers a broad range of solutions focused on addressing customer needs in three main areas: the Norton product line of anti-virus and PC- assistance products; products that cater to remote user productivity; and the Visual Café product lines in Internet development tools. Founded in 1982, Symantec Corporation employs more than 2,300 people worldwide, ™ with headquarters in Cupertino, California. The stock is traded on NASDAQ under the symbol SYMC. Information on the Company and its products can be obtained by calling (800) 441-7234 toll free or (541) 334-6054, or accessed on the World Wide Web at www.symantec.com. The following letter and report contain forward-looking statements that are subject to significant risks and uncertainties. Several important factors could cause actual results to differ materially from historical results and percentages and results anticipated by the forward-looking statements contained in this report. Readers should pay particular attention to the risk factors described in the section entitled “Management’s Discussion and Analysis of Financial Condition and Results of Operations.” Readers should carefully review the risk factors described in the other documents the Company files from time to time with the Securities and Exchange Commission, including the Annual Report on Form 10-K as filed by Symantec Corporation June 5, 1998. © 1998 Symantec Corporation. All rights reserved. Printed in the U.S.A. 7/98 35353 09-71-00293 Financial Highlights Corporate Directory NET INCOME* Symantec and its shareholders experienced a strong Board of Directors Corporate Officers Corporate Headquarters Rest of World fiscal 1998 with successful financial performance and achievements. We have built Mar. 31, 1998 $ 24,138 Tania Amochaev and Key Employees Symantec Corporation 13% shareholder value by implementing a long-time vision, bringing solutions to customers North America Chairman of the Executive Committee, Gordon E. Eubanks, Jr. 10201 Torre Avenue Dec. 31, 1997 $ 21,836 QRS Corporation President & Chief Executive Officer Cupertino, California 95014-2132 that meet their needs and executing our business strategy well. Europe, RESS (408) 253-9600 P Sep. 30, 1997 $ 20,580 Middle East Charles M. Boesenberg and Africa 22% Howard A. Bain, III President & CEO, Magellan Corporation Vice President, Worldwide Operations Transfer Agent 65% Jun. 30, 1997 $ 18,535 & Chief Financial Officer Walter W. Bregman Bank of Boston ATERMARK W Chairman & Co-Chief Executive Officer, P.O. Box 644 $ 8,269 Christopher Calisi Mar. 31, 1997 Boston, Massachusetts 02102 S&B Enterprises Vice President, Remote Productivity Solutions Business Unit Dec. 31, 1996 $ 13,852 Carl D. Carman Investor Relations NET INCOME PER SHARE – DILUTED Printing: Chairman, Symantec Corporation Thomas Darnall A copy of the Company’s Form 10-K General Partner, Hill, Carman Ventures (in thousands) Vice President, Corporate Services for the fiscal year ended April 3, 1998 REVENUE BY REGION Mar. 31, 1998 $ 0.40 AM as filed with the Securities and * Quarterly operating results for the period ended March 31, 1997 includes K Robert R. B. Dykes revenue and charges related to the sale of Symantec’s networking business (for March 1998 Quarter) Dieter Giesbrecht Exchange Commission is available Senior Vice President, unit (see Note 12 of Notes to Consolidated Financial Statements). Vice President, Europe, Middle East & Africa upon request without charge. Dec. 31, 1997 $ 0.37 Finance & Administration, ENRIK Please contact the Investor Relations H Flextronics International LTD Akihiko Narita Hotline at (800) 883-4497. Sep. 30, 1997 $ 0.35 Managing Director & President, Japan Additional investment-oriented Gordon E. Eubanks, Jr. questions may be directed to: President & Chief Executive Officer $ 0.32 Mansour Safai Jun. 30, 1997 Shelley Wilson Symantec Corporation Vice President, Internet Tools Investor Relations Photography: Business Unit Mar. 31, 1997 $ 0.15 Robert S. Miller Symantec Corporation 10201 Torre Avenue CLOSING STOCK PRICES Chairman of the Board, Enrique T. Salem Dec. 31, 1996 $ 0.25 Cupertino, California 95014-2132 Waste Management, Inc. Vice President, Security & Assistance (408) 446-8990 Business Unit Mar. 1998 $ 20.88 $ 29.00 Internet Tools, OLDSTEIN G Outside Counsel Royalties and Other Garry Sexton Dec. 1997 $ 19.19 $ 27.00 10% Vice President, Asia Pacific Fenwick & West Security and TEVEN Two Palo Alto Square S Sep. 1997 $ 19.44 $ 25.50 Assistance Rebecca Ranninger Palo Alto, California 94306 Vice President, Human Resources 50% Independent Auditors NET REVENUES Jun. 1997 $ 12.50 $ 20.38 40% Writing: Dana E. Siebert LLP Vice President, Americas Ernst & Young Mar. 1997 $ 12.63 $ 18.38 Remote 55 Almaden Boulevard $ 156,092 Productivity Mar. 31, 1998 San Jose, California 95113 Solutions Derek P. Witte Dec. 1996 $ 9.88 $ 16.38 Vice President, General Counsel & Secretary Dec. 31, 1997 $ 148,240 Annual Meeting RANCISCO ....... ........................................................ ................. ........ .................................... ..................................... ........ ................ ....... ........ .............................................. ........................... .................................... ..................................... ........ ................ F The annual meeting of Stockholders Sep. 30, 1997 $ 139,013 $0 $5 $10 $15 $20 $25 $30 AN will be held September 17, 1998, at , S REVENUE BY BUSINESS UNIT F OOTNOTES TO P AGE 3-7: Symantec Corporate Worldwide Jun. 30, 1997 $ 135,016 (prices by Quarter) (for Fiscal Year 1998) 1 Symantec Internal Reporting Headquarters, Cupertino, California. 11 International Data Corporation, 1998 HERMAN Mar. 31, 1997 $ 129,706 S 111 Symantec Survey, June 1997 1v PC Data Retail Report —The market share is based on the Remote Control/Remote Access category OOK as defined by Symantec. The following products are included: Symantec pcANYWHERE, Network Dec. 31, 1996 $ 124,081 C Associates Remote Desktop, Travelling Software Laplink, Stac Reachout, Netopia Timbuktu, Compaq Carbon Copy, Triton/Artisoft CoSession, Norton Lambert Close-Up, and Funk Proxy. v Soft Letter, April 1998 (in thousands) Design: Symantec and the Symantec logo are U.S. registered trademarks of Symantec Corporation. Microsoft, Windows, Windows NT, and the Windows logo are registered trademarks of Microsoft Corporation. = Fiscal 1998 Other brands and products are trademarks of their respective holder/s. = Fiscal 1997 ™ 1998 Annual Report Corporate Profile Symantec Corporation helps make users productive and keep their computers safe and reliable, anywhere and anytime. As the world leader in utility software for business and personal computing, Symantec is acclaimed for both its customer satisfaction and product brand recognition. The Company offers a broad range of solutions focused on addressing customer needs in three main areas: the Norton product line of anti-virus and PC- assistance products; products that cater to remote user productivity; and the Visual Café product lines in Internet development tools. Founded in 1982, Symantec Corporation The desktop. employs more than 2,300 people worldwide, A one-to-one customer relationship with headquarters in Cupertino, California. we build everyday. The stock is traded on NASDAQ under the symbol SYMC. Information on the Company and its products can be obtained by calling (800) 441-7234 toll free or (541) 334-6054, or accessed on the World Wide Web at www.symantec.com. Table of Contents Letter to Shareholders 2 Product Portfolio 9 Financial Reports 11 Corporate Directory 59 The following letter and report contain forward-looking statements that are subject to significant risks and uncertainties. Several important factors could cause actual results to differ materially from historical results and percentages and results anticipated by the forward-looking statements contained in this report. Readers should pay particular attention to the risk factors described in the section entitled “Management’s Discussion and Analysis of Financial Condition and Results of Operations.” Readers should carefully review the risk factors described in the other documents the Company files from time to time with the Securities and Exchange Commission, including the Annual Report on Form 10-K as filed by Symantec Corporation June 5, 1998. Letter to Shareholders 1 11 Symantec Corporation 10201 Torre Avenue Cupertino, CA 95014 Gordon E. Eubanks, Jr. President and Chief Executive Officer To our shareholders, I’m pleased to report to you that fiscal 1998 was the most successful year in Symantec’s history, with record revenue and profit achieved in each quarter. Through the hard work of our dedicated employees and partners, we met and surpassed the goals we set for ourselves, and consolidated our position as the world leader in providing utility software for business and personal computing. We closed fiscal 1998 with our sixth consecutive quarter of record revenue. Revenues in fiscal 1998 grew 22% over revenues in fiscal 1997. We increased gross margins to 85% while reducing operating expenses from 75% to 68% as a percentage of revenue. This resulted in an improvement in profit-before-tax from 7% to 19%.
Recommended publications
  • Optimizing and Protecting Hard Drives ‐ Chapter # 9
    Optimizing and Protecting Hard Drives ‐ Chapter # 9 Amy Hissom Key Terms antivirus (AV) software — Utility programs that prevent infection or scan a system to detect and remove viruses. McAfee Associates’ VirusScan and Norton AntiVirus are two popular AV packages. backup — An extra copy of a file, used in the event that the original becomes damaged or destroyed. boot sector virus — An infectious program that can replace the boot program with a modified, infected version of the boot command utilities, often causing boot and data retrieval problems. buffer — A temporary memory area where data is kept before being written to a hard drive or sent to a printer, thus reducing the number of writes to the devices. chain — A group of clusters used to hold a single file. child, parent, grandparent backup method — A plan for backing up and reusing tapes or removable disks by rotating them each day (child), week (parent), and month (grandparent). cross-linked clusters — Errors caused when more than one file points to a cluster, and the files appear to share the same disk space, according to the file allocation table. defragment — To “optimize” or rewrite a file to a disk in one contiguous chain of clusters, thus speeding up data retrieval. differential backup — Backup method that backs up only files that have changed or have been created since the last full backup. When recovering data, only two backups are needed: the full backup and the last differential backup. disk cache — A method whereby recently retrieved data and adjacent data are read into memory in advance, anticipating the next CPU request.
    [Show full text]
  • Norton™ Utilities Premium: User Manual
    Norton™ Utilities Premium User Manual Norton Utilities Premium User Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Copyright © 2018 Symantec Corporation. All rights reserved. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, et seq. "Commercial Computer Software and Commercial Computer Software Documentation," as applicable, and any successor regulations, whether delivered by Symantec as on premises or hosted services. Any use, modification, reproduction release, performance, display or disclosure of the Licensed Software and Documentation by the U.S. Government shall be solely in accordance with the terms of this Agreement.
    [Show full text]
  • Virus Bulletin, January 1993
    January 1993 ISSN 0956-9979 THE AUTHORITATIVE INTERNATIONAL PUBLICATION ON COMPUTER VIRUS PREVENTION, RECOGNITION AND REMOVAL Editor: Richard Ford Technical Editor: Fridrik Skulason Consulting Editor: Edward Wilding Advisory Board: Jim Bates, Bates Associates, UK, Andrew Busey, Datawatch Corporation, USA, David M. Chess, IBM Research, Phil Crewe, Fingerprint, UK, David Ferbrache, Defence Research Agency, UK, Ray Glath, RG Software Inc., USA, Hans Gliss, Datenschutz Berater, West Germany, Ross M. Greenberg, Software Concepts Design, USA, Dr. Harold Joseph Highland, Compulit Microcomputer Security Evaluation Laboratory, USA, Dr. Jan Hruska, Sophos, UK, Dr. Keith Jackson, Walsham Contracts, UK, Owen Keane, Barrister, UK, John Laws, Defence Research Agency, UK, Tony Pitts, Digital Equipment Corporation, UK, Yisrael Radai, Hebrew University of Jerusalem, Israel, Martin Samociuk, Network Security Management, UK, John Sherwood, Sherwood Associates, UK, Prof. Eugene Spafford, Purdue University, USA, Dr. Peter Tippett, Certus Corporation, USA, Steve R. White, IBM Research, Dr. Ken Wong, PA Consulting Group, UK, Ken van Wyk, CERT, USA. CONTENTS SCANNER UPDATE 1993 Scanner Shoot-Out 8 EDITORIAL Imageline v. McAfee 2 VIRUS ANALYSES NEWS 1. The CMOS1 Virus 13 2. DOSHUNTER - Search S&S Caught Out 3 And Destroy 15 Chinese Whispers 3 3. Penza - Variations on a Familiar Theme 16 A Rose By Any Other Name 3 PRODUCT REVIEWS IBM PC VIRUSES (UPDATE) 4 1. IBM AntiVirus 18 INSIGHT 2. PC Tools 8 21 Scotland Yard’s Virus Hunters 6 END NOTES & NEWS 24 VIRUS BULLETIN ©1993 Virus Bulletin Ltd, 21 The Quadrant, Abingdon Science Park, Oxon, OX14 3YS, England. Tel (+44) 235 555139. /90/$0.00+2.50 This bulletin is available only to qualified subscribers.
    [Show full text]
  • Virus Bulletin, March 1992
    March 1992 ISSN 0956-9979 THE AUTHORITATIVE INTERNATIONAL PUBLICATION ON COMPUTER VIRUSE PREVENTION, RECOGNITION AND REMOVAL Editor: Edward Wilding Technical Editor: Fridrik Skulason Editorial Advisors: Jim Bates, Bates Associates, UK, David Ferbrache, Defence Research Agency, UK, Christoph Fischer, University of Karlsruhe, Germany, Ray Glath, RG Software Inc., USA, Hans Gliss, Datenschutz Berater, West Germany, Ross M. Greenberg, Software Concepts Design, USA, Dr. Harold Joseph Highland, Compulit Microcomputer Security Evaluation Laboratory, USA, Dr. Jan Hruska, Sophos, UK, Dr. Keith Jackson, Walsham Contracts, UK, Owen Keane, Barrister, UK, John Laws, Defence Research Agency, UK, David T. Lindsay, Digital Equipment Corporation, UK, Yisrael Radai, Hebrew University of Jerusalem, Israel, Martin Samociuk, Network Security Management, UK, John Sherwood, Sherwood Associates, UK, Prof. Eugene Spafford, Purdue University, USA, Dr. Peter Tippett, Certus International Corporation, USA, Dr. Ken Wong, PA Consulting Group, UK, Ken van Wyk, CERT, USA. CONTENTS SUPPORT SURVEY Out-of-Hours Technical Support 14 EDITOR’S DIARY Our Man in Havana 2 BOOK REVIEWS HEADLINES 1. The Little Black Book of The Onward March of Computer Viruses 17 Michelangelo 3 2. A Pathology of Computer LETTERS 5 Viruses 18 IBM PC VIRUSES (UPDATE) 7 PRODUCT REVIEW VIRUS PREVALENCE TABLE 10 PC Armour 19 FIELD REPORT PUBLIC DOMAIN Maltese Software Under Siege 11 Stealth Bomber 22 VIRUS ANALYSIS 777 - Revenge Attacker 12 END-NOTES & NEWS 24 VIRUS BULLETIN ©1992 Virus Bulletin Ltd, 21 The Quadrant, Abingdon Science Park, Oxon, OX14 3YS, England. Tel (+44) 235 555139. /92/$0.00+2.50 This bulletin is available only to qualified subscribers. No part of this publication may be reproduced, stored in a retrieval system, or transmitted by any form or by any means, electronic, magnetic, optical or photocopying, without the prior written permission of the publishers.
    [Show full text]
  • Essential Trends and Dynamics of the Endpoint Security Industry
    Essential Trends and Dynamics of the Endpoint Security Industry Lenny Zeltser wrote this paper together with a co-author who chose to remain anonymous. May 2005 This paper examines trends and dynamics of the endpoint security industry, and shows how business strategies of market leaders such as Symantec exemplify these factors. When exploring current developments in the information security marketplace, we stipulate that this sector is beginning to converge with the general IT software industry in response to factors such as the evolution of the industry structure, competitive dynamics, regulatory compliance efforts, and the maturing state of security products. Lenny Zeltser & Co-Author Page 1 Table of Contents Introduction ......................................................................................................................... 2 Characteristics of the Endpoint Security Industry........................................................... 2 Scope of the Industry ............................................................................................................ 2 Industry Size Estimates.........................................................................................................3 Structural Characteristics of the Industry............................................................................... 3 Competitive Dynamics........................................................................................................... 4 Industry Evolution: From 1990 to 2005 ............................................................................
    [Show full text]
  • Newsletter of Stanford Palo Alto Users Group for PC
    ' mmm ~ I.__ __v_o_i_. _x_•_11_______ J_u_L_v_•_9_9s _________ N_o_ ._1_ __. Q Newsletter of Stanford Palo Alto Users Group for PC Q TABLE OF CONTENTS President's Piece Brain Christopher, SPAUG President 2 ~ New BBS Kendric Smith 2 Banks, Microsoft, and Online Banking Larry Weinberg J Norton DeskTop for Windows Lee Ammons 4 Internet Access in Public Libraries s Renewals 6 Anti-Virus for OS/2 David Varney 7 Why I Like OS/2 Jack Cook 8 Internet SIG 9 Membership Application 10 Resource Center SP AUG 11 ..... Ji GENERAL MEETING McAFEE ASSOCIATES - Latest Anti-Virus Software INCAT SYSTEMS - YAMAHA Recordable CD-ROM WATERGATE SOFTWARE - PC Doctor for IRQ Conflicts WEDNESDAY. JULY 26, 7:3 PM SPAUG NOW HAS A Conference ON A LOCAL First Class BBS. Nick Chinn. the Sysop (system operator) of Dead Winners Dog Party.has kindly provided space on his BBS for A new adventure is a click away for prize an interactive Conference for SPAUG. All you need winners at the June General Meeting. Del Philpott is a computer with a modem. Just dial (415) 968- and Clark Moore both won Pixar's Typestry. Frank 7919. You will see a few introductory screens of Kimbel and Bill McElhrney won Ares software information and be prompted to enter a User ID and Font Minder and Font Chameleon . Larry Turpen a password. New users will be prompted lo fill out won the Better Homes & Garden's Healthily a registration form. Cooking. After logging on, go to Conferences and select BBS Closed SPAUG. You can read what has been posted by other, and you can post your own material that you On July 5th, the Board of Directors feel will be of interest to others in the PC unanimously voted lo close the SPAUG BBS.
    [Show full text]
  • Testing the National Software Reference Library
    Testing the National Software Reference Library Neil C. Rowe U.S. Naval Postgraduate School Monterey, California, USA [email protected] Forensics of directory metadata p We need tools to quickly find key information on a drive without searching file contents. p File and directory metadata is a big help to characterize drives (or partitions on a cloud). p We are developing a tool “Dirim”. p Our testbed the “Real Drive Corpus” is purchased from 22 countries, mostly China, Mexico, Israel, Palestine, and India – now 2420 drives and 44 million files. p It also includes wireless and storage devices. p For analysis, we exclude files with hashes found in the National Software Reference Library Reference Data Set (NSRL RDS) – it removes 30% of the files – and 5% of the hashes. p Research question: Just how good is the NSRL? The Dirim file-metadata analysis system Disk or flash drive File-directory metadata (in XML/DFXML) Common Simplified and standardized metadata hash codes File classification (from NSRL, mapping etc.) Data with deleted-file corrections Data excluding common files File classifications Statistical summaries Data clusters Special-feature analysis Suspiciousness analysis Graphical display of analysis results File metadata we extract from a disk image Ordinal features Nominal features Boolean features File size Drive name Allocated? Access minus creation File name Compressed? time Access minus File extension Encrypted? modification time Modification minus Top-level directory Empty? creation time Depth in file hierarchy Immediate directory
    [Show full text]
  • Netware 5.1 Upgrade
    NOVELL PARTNER CONSULTING SERVICE OFFERINGS NOVELL PARTNERNET CONFIDENTIAL CONSULTANT GUIDE NetWare 5.1 Upgrade ® Table of Contents NetWare 5.1 Upgrade Consulting Guide .................................................................................... 4 Target Audience...........................................................................Error! Bookmark not defined. Terminology......................................................................................................................... 4 Skill Set............................................................................................................................... 4 Purpose ............................................................................................................................... 5 Acknowledgements.......................................................................Error! Bookmark not defined. NetWare 5.1 Training Curriculum ............................................................................................ 6 Curriculum for NetWare 5.1 .................................................................................................... 6 Curriculum for NetWare 5 CNE ............................................................................................... 6 Reference Material ...............................................................................................................10 Books .............................................................................................................................10 AppNotes
    [Show full text]
  • Windows 7 Build 7000 Activation Cd Keys and Remove Watermark F Crack
    Windows 7 Build 7000 Activation, Cd Keys And Remove Watermark, F Crack 1 / 5 Windows 7 Build 7000 Activation, Cd Keys And Remove Watermark, F Crack 2 / 5 3 / 5 ... .wixsite.com/gietemumpo/blog/hack-crack-internet-download-manager-6-26-build-3 ... %2f2018%2f10%2flicense-keys-for- windows-7-professional-activation.html ... .ru%2f97527362-Humax-hd-7000i-proshivka.html Humax_hd_7000i_proshivka, ... https://www.houzz.com/projects/5365543/skachaty-live-cd-windows-7-iso .... Windows 7 Activation with Original key (New Method) | NO Crack | No KMSAuto ! ! ! Hi! Welcome to Our .... ... 5 dollars a day 2008 dvdrip xvid qcf subtitle · activation crack xp sp3 7/2014 ... hp scanner for windows 7 driver officejet 7000 · transformers fall of cybertron .... 1 License Generator Windows 7 cadsoft eagle 5 7 0 linux license key-adds ... also include a crack, serial number, unlock code, cd key or keygen (key generator). ... KRPano pr10 latest activation key (crack) the sharing of KRPano pr10 latest ... but you may need a license to publish or remove watermark from your project.. 1 piano tutorial roland colorcamm pc 12 manual microsoft office object library 12.0 ... 2 plantsim hair mvp baseball 2005 crack only x-plore 1.34 unlock key perlovka ... microsoft office 2010 professional plus product activation crack skins original ... windows server 2012 r2 datacenter oder standard acdsee 7.0 build 102 serial .... Cd key crashday pc game · Parallels 7 keygen torrent ... Activation key for kaspersky 2012 free download crack ... Acronis disk director home v.11.0.2343 f ... Http cekc far ru cracks swiftshader 3 0 watermark removed ... Remove pdf security 4 0 serial ..
    [Show full text]
  • Norton Utilities TM
    Norton TM Norton Utilities Proof Utilities of Purchase Benutzerhandbuch Wir schützen weltweit mehr Benutzer vor Bedrohungen aus dem Internet als jedes andere Unternehmen. Umweltschutz ist wichtig. Symantec hat dieses Handbuch ohne Umschlag gestaltet, um die Einwirkung auf die Umwelt durch unsere Produkte zu reduzieren. TM Norton Utilities Benutzerhandbuch Die in diesem Handbuch beschriebene Software wird unter Lizenz vertrieben und darf nur entsprechend den Vertragsbedingungen verwendet werden. Dokumentationsversion 14.0 Copyright © 2009 Symantec Corporation. Alle Rechte vorbehalten. Symantec, das Symantec-Logo, Norton, Ghost, GoBack, LiveUpdate, Norton AntiSpam, Norton AntiVirus, Norton Internet Security, Norton 360 und Norton SystemWorks sind Marken oder eingetragene Marken der Symantec Corporation oder ihrer Tochtergesellschaften in den USA und anderen Ländern. Windows ist eine Marke der Microsoft Corporation. Andere Produktnamen können Marken der jeweiligen Rechteinhaber sein. Die in diesem Handbuch beschriebene Software wird Ihnen im Rahmen einer Lizenzvereinbarung zur Verfügung gestellt und darf nur unter den darin beschriebenen Bedingungen eingesetzt, kopiert, verteilt, dekompiliert und zurückentwickelt werden. Kein Teil dieser Veröffentlichung darf ohne ausdrückliche schriftliche Genehmigung der Symantec Corporation und ihrer Lizenzgeber vervielfältigt werden. DIE DOKUMENTATION WIRD "OHNE MÄNGELGEWÄHR" GELIEFERT. ALLE AUSDRÜCKLICHEN ODER STILLSCHWEIGENDEN BEDINGUNGEN, DARSTELLUNGEN UND GEWÄHRLEISTUNGEN EINSCHLIESSLICH DER STILLSCHWEIGENDEN
    [Show full text]
  • Resolution No. 7570 City of South Gate Los Angeles
    RESOLUTION NO. 7570 CITY OF SOUTH GATE LOS ANGELES COUNTY, CALIFORNIA A RESOLUTION OF THE CITY COUNCIL OF THE CITY OF SOUTH GATE AUTHORIZING THE DESTRUCTION OF OBSOLETE RECORDS FROM THE CITY CLERK'S OFFICE, FINANCE DEPARTMENT, POLICE DEPARTMENT FILES PURSUANT TO GOVERNMENT CODE 34090 OF THE LAWS OF THE STATE OF CALIFORNIA WHEREAS, it has been determined that certain City records under the charge of certain City Clerk's Office are no longer required for public or private purposes; and WHEREAS, it has been determined that destruction of the above-mentioned records is necessary to conserve storage space and to reduce staff time and expense in handling records and informing the public; WHEREAS, Section 34090 of the Government Code of the State of California authorizes the head of a City department to destroy any City records and documents which are over two years old under his or her charge, without making a copy thereof, after the same are no longer required, with the written consent of the City Attorney and the approval of the City Council by resolution; and WHEREAS, it is therefore desirable to destroy those records which are over two years old as listed in the documents entitled "Records Inventory," dated October 22, 2013, attached hereto as Exhibit "A," and made a part hereof, without making a copy thereof; and WHEREAS, the said destruction of said records is with the written consent of the City Attorney; NOW, THEREFORE, THE CITY COUNCIL OF THE CITY OF SOUTH GATE DOES HEREBY RESOLVE AS FOLLOWS: SECTION 1. The City Council hereby authorizes the destruction of the documents identified in Exhibit "A" attached hereto and incorporated herein by this reference.
    [Show full text]
  • Virus Bulletin, October 1994
    ISSN 0956-9979 OCTOBER 1994 THE INTERNATIONAL PUBLICATION ON COMPUTER VIRUS PREVENTION, RECOGNITION AND REMOVAL Editor: Richard Ford CONTENTS Technical Editor: Fridrik Skulason Consulting Editor: Edward Wilding, EDITORIAL Network Security Management, UK Live and Let Die 2 VIRUS PREVALENCE TABLE 3 NEWS Virus Total Reaches 5000 3 CPAV to Continue 3 Total Anonymity 3 IN THIS ISSUE: IBM PC VIRUSES (UPDATE) 4 To be the best. This months edition brings the biggest CONFERENCE REPORT Virus Bulletin comparative review yet of NLM anti-virus VB 94: The Return to Jersey 6 software (see pp.13-20). Ten products were tested, and the results may cause something of a surprise VIRUS ANALYSES 1. One_Half: The Lieutenant Commander? 9 Conference spotlight. VB 94 recently took place in 2. AntiEXE.A - Missing the Target? 11 Jersey - turn to page 6 for an in-depth report on what happened when. COMPARATIVE REVIEW Half way there? One_Half is a multi-partite virus NLMs in Depth 13 which uses some of the techniques developed by the PRODUCT REVIEW Dark Avenger in Commander_Bomber. As if this were Virex for the PC 21 not enough, it can also encrypt vital parts of the fixed disk. A detailed analysis is given on page 9. END NOTES & NEWS 24 VIRUS BULLETIN ©1994 Virus Bulletin Ltd, 21 The Quadrant, Abingdon, Oxfordshire, OX14 3YS, England. Tel. +44 (0)1235 555139. /94/$0.00+2.50 No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form without the prior written permission of the publishers. 2 • VIRUS BULLETIN OCTOBER 1994 EDITORIAL Live and Let Die The Internet seems to have become the symbol of the computing revolution which we are told is going to change our lives forever.
    [Show full text]