Symantec 1997 Annual Report and Form 10-K FINAL
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Optimizing and Protecting Hard Drives ‐ Chapter # 9
Optimizing and Protecting Hard Drives ‐ Chapter # 9 Amy Hissom Key Terms antivirus (AV) software — Utility programs that prevent infection or scan a system to detect and remove viruses. McAfee Associates’ VirusScan and Norton AntiVirus are two popular AV packages. backup — An extra copy of a file, used in the event that the original becomes damaged or destroyed. boot sector virus — An infectious program that can replace the boot program with a modified, infected version of the boot command utilities, often causing boot and data retrieval problems. buffer — A temporary memory area where data is kept before being written to a hard drive or sent to a printer, thus reducing the number of writes to the devices. chain — A group of clusters used to hold a single file. child, parent, grandparent backup method — A plan for backing up and reusing tapes or removable disks by rotating them each day (child), week (parent), and month (grandparent). cross-linked clusters — Errors caused when more than one file points to a cluster, and the files appear to share the same disk space, according to the file allocation table. defragment — To “optimize” or rewrite a file to a disk in one contiguous chain of clusters, thus speeding up data retrieval. differential backup — Backup method that backs up only files that have changed or have been created since the last full backup. When recovering data, only two backups are needed: the full backup and the last differential backup. disk cache — A method whereby recently retrieved data and adjacent data are read into memory in advance, anticipating the next CPU request. -
Norton™ Utilities Premium: User Manual
Norton™ Utilities Premium User Manual Norton Utilities Premium User Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Copyright © 2018 Symantec Corporation. All rights reserved. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, et seq. "Commercial Computer Software and Commercial Computer Software Documentation," as applicable, and any successor regulations, whether delivered by Symantec as on premises or hosted services. Any use, modification, reproduction release, performance, display or disclosure of the Licensed Software and Documentation by the U.S. Government shall be solely in accordance with the terms of this Agreement. -
Desktop Messaging for Internet Clients
CallPilotTM Release 2.5 Desktop Messaging User Guide for Internet Clients Updates to the Desktop Messaging User Guides Internet Clients Page 7 Call the sender of a message Call the sender of a message is not supported. Page 7 Access web-based My CallPilot to view user information and change your feature settings My CallPilot is not supported. Page 8 About this guide The Internet mail clients that are supported are: • Microsoft Outlook 2000 (Internet mail mode) • Microsoft Outlook 2002 (XP) (Internet mail mode) • Microsoft Outlook 2003 (Internet mail mode) • Microsoft Outlook Express - 5.x and 6.x • Netscape Messenger (Netscape Communicator) - 6.2x • Netscape Mail - 7.0x • Qualcomm Eudora Pro - 6.1.2 Citrix (Terminal server) functionality is supported. Page 11 CallPilot Player The Call the sender button is not available. Page 11 To select your telephone or computer to play voice messages If your telephone is call forwarded to voicemail, cancel this feature before you access your messages from CallPilot Player. Page 29 Linking to My CallPilot Linking to My CallPilot is not supported. About forwarding Desktop Messaging messages Do not use the right-click menu to forward a Desktop Messaging message. To forward a message, either: • open the message and forward it from the CallPilot window or • for Outlook, select the message in the Outlook Inbox and forward it from the Outlook toolbar. Business Communications Manager & CallPilot 100/150 Outlook, Lotus Notes, GroupWise Page 7 Call the sender of a message Call the sender of a message is not supported. Page 7 Access web-based My CallPilot to view user information and change your feature settings My CallPilot is not supported. -
Symantec Software Datasheet
Data Sheet: Endpoint Management Altiris™ Client Management Suite 7.0 Deploy, manage, secure, and troubleshoot Overview The suite delivers tools that are based on the IT The cost of a PC is only a small part of its total cost. Infrastructure Library (ITIL) to help align processes with Nearly 80 percent of the total cost of owning a client industry best practices so you can more efficiently system goes toward the support and maintenance of manage your client systems. the PC. Altiris™ Client Management Suite from Symantec automates time-consuming and redundant tasks to reduce the effort and costs associated with deploying, managing, securing, and troubleshooting client systems so organizations can gain control of their IT environments. Client Management Suite Delivers Client Management Suite ushers in a new generation of systems management by bringing end users, administrators, and key business decision makers Altiris Client Management Suite deploys, manages, secures, and together. The suite helps you align with organizational troubleshoots systems through the entire IT lifecycle. You can manage more technologies, with greater efficiency, on more objectives by providing easy-to-use self-service tools to platforms. users, powerful management tools to IT administrators, and custom dashboards to decision makers. Client Management Suite provides complete visibility into your organization's client systems so you can see Finding extra time is challenging, yet that's what Client what you have, where it's located, and what state it's in. Management Suite is designed to do. Now you can focus The suite's flexible and actionable reporting tools not on key initiatives that can help your business grow. -
Virus Bulletin, January 1993
January 1993 ISSN 0956-9979 THE AUTHORITATIVE INTERNATIONAL PUBLICATION ON COMPUTER VIRUS PREVENTION, RECOGNITION AND REMOVAL Editor: Richard Ford Technical Editor: Fridrik Skulason Consulting Editor: Edward Wilding Advisory Board: Jim Bates, Bates Associates, UK, Andrew Busey, Datawatch Corporation, USA, David M. Chess, IBM Research, Phil Crewe, Fingerprint, UK, David Ferbrache, Defence Research Agency, UK, Ray Glath, RG Software Inc., USA, Hans Gliss, Datenschutz Berater, West Germany, Ross M. Greenberg, Software Concepts Design, USA, Dr. Harold Joseph Highland, Compulit Microcomputer Security Evaluation Laboratory, USA, Dr. Jan Hruska, Sophos, UK, Dr. Keith Jackson, Walsham Contracts, UK, Owen Keane, Barrister, UK, John Laws, Defence Research Agency, UK, Tony Pitts, Digital Equipment Corporation, UK, Yisrael Radai, Hebrew University of Jerusalem, Israel, Martin Samociuk, Network Security Management, UK, John Sherwood, Sherwood Associates, UK, Prof. Eugene Spafford, Purdue University, USA, Dr. Peter Tippett, Certus Corporation, USA, Steve R. White, IBM Research, Dr. Ken Wong, PA Consulting Group, UK, Ken van Wyk, CERT, USA. CONTENTS SCANNER UPDATE 1993 Scanner Shoot-Out 8 EDITORIAL Imageline v. McAfee 2 VIRUS ANALYSES NEWS 1. The CMOS1 Virus 13 2. DOSHUNTER - Search S&S Caught Out 3 And Destroy 15 Chinese Whispers 3 3. Penza - Variations on a Familiar Theme 16 A Rose By Any Other Name 3 PRODUCT REVIEWS IBM PC VIRUSES (UPDATE) 4 1. IBM AntiVirus 18 INSIGHT 2. PC Tools 8 21 Scotland Yard’s Virus Hunters 6 END NOTES & NEWS 24 VIRUS BULLETIN ©1993 Virus Bulletin Ltd, 21 The Quadrant, Abingdon Science Park, Oxon, OX14 3YS, England. Tel (+44) 235 555139. /90/$0.00+2.50 This bulletin is available only to qualified subscribers. -
Virus Bulletin, March 1992
March 1992 ISSN 0956-9979 THE AUTHORITATIVE INTERNATIONAL PUBLICATION ON COMPUTER VIRUSE PREVENTION, RECOGNITION AND REMOVAL Editor: Edward Wilding Technical Editor: Fridrik Skulason Editorial Advisors: Jim Bates, Bates Associates, UK, David Ferbrache, Defence Research Agency, UK, Christoph Fischer, University of Karlsruhe, Germany, Ray Glath, RG Software Inc., USA, Hans Gliss, Datenschutz Berater, West Germany, Ross M. Greenberg, Software Concepts Design, USA, Dr. Harold Joseph Highland, Compulit Microcomputer Security Evaluation Laboratory, USA, Dr. Jan Hruska, Sophos, UK, Dr. Keith Jackson, Walsham Contracts, UK, Owen Keane, Barrister, UK, John Laws, Defence Research Agency, UK, David T. Lindsay, Digital Equipment Corporation, UK, Yisrael Radai, Hebrew University of Jerusalem, Israel, Martin Samociuk, Network Security Management, UK, John Sherwood, Sherwood Associates, UK, Prof. Eugene Spafford, Purdue University, USA, Dr. Peter Tippett, Certus International Corporation, USA, Dr. Ken Wong, PA Consulting Group, UK, Ken van Wyk, CERT, USA. CONTENTS SUPPORT SURVEY Out-of-Hours Technical Support 14 EDITOR’S DIARY Our Man in Havana 2 BOOK REVIEWS HEADLINES 1. The Little Black Book of The Onward March of Computer Viruses 17 Michelangelo 3 2. A Pathology of Computer LETTERS 5 Viruses 18 IBM PC VIRUSES (UPDATE) 7 PRODUCT REVIEW VIRUS PREVALENCE TABLE 10 PC Armour 19 FIELD REPORT PUBLIC DOMAIN Maltese Software Under Siege 11 Stealth Bomber 22 VIRUS ANALYSIS 777 - Revenge Attacker 12 END-NOTES & NEWS 24 VIRUS BULLETIN ©1992 Virus Bulletin Ltd, 21 The Quadrant, Abingdon Science Park, Oxon, OX14 3YS, England. Tel (+44) 235 555139. /92/$0.00+2.50 This bulletin is available only to qualified subscribers. No part of this publication may be reproduced, stored in a retrieval system, or transmitted by any form or by any means, electronic, magnetic, optical or photocopying, without the prior written permission of the publishers. -
Essential Trends and Dynamics of the Endpoint Security Industry
Essential Trends and Dynamics of the Endpoint Security Industry Lenny Zeltser wrote this paper together with a co-author who chose to remain anonymous. May 2005 This paper examines trends and dynamics of the endpoint security industry, and shows how business strategies of market leaders such as Symantec exemplify these factors. When exploring current developments in the information security marketplace, we stipulate that this sector is beginning to converge with the general IT software industry in response to factors such as the evolution of the industry structure, competitive dynamics, regulatory compliance efforts, and the maturing state of security products. Lenny Zeltser & Co-Author Page 1 Table of Contents Introduction ......................................................................................................................... 2 Characteristics of the Endpoint Security Industry........................................................... 2 Scope of the Industry ............................................................................................................ 2 Industry Size Estimates.........................................................................................................3 Structural Characteristics of the Industry............................................................................... 3 Competitive Dynamics........................................................................................................... 4 Industry Evolution: From 1990 to 2005 ............................................................................ -
Graphicconverter 6.6
User’s Manual GraphicConverter 6.6 Programmed by Thorsten Lemke Manual by Hagen Henke Sales: Lemke Software GmbH PF 6034 D-31215 Peine Tel: +49-5171-72200 Fax:+49-5171-72201 E-mail: [email protected] In the PDF version of this manual, you can click the page numbers in the contents and index to jump to that particular page. © 2001-2009 Elbsand Publishers, Hagen Henke. All rights reserved. www.elbsand.de Sales: Lemke Software GmbH, PF 6034, D-31215 Peine www.lemkesoft.com This book including all parts is protected by copyright. It may not be reproduced in any form outside of copyright laws without permission from the author. This applies in parti- cular to photocopying, translation, copying onto microfilm and storage and processing on electronic systems. All due care was taken during the compilation of this book. However, errors cannot be completely ruled out. The author and distributors therefore accept no responsibility for any program or documentation errors or their consequences. This manual was written on a Mac using Adobe FrameMaker 6. Almost all software, hardware and other products or company names mentioned in this manual are registered trademarks and should be respected as such. The following list is not necessarily complete. Apple, the Apple logo, and Macintosh are trademarks of Apple Computer, Inc., registered in the United States and other countries. Mac and the Mac OS logo are trademarks of Apple Computer, Inc. Photo CD mark licensed from Kodak. Mercutio MDEF copyright Ramon M. Felciano 1992- 1998 Copyright for all pictures in manual and on cover: Hagen Henke except for page 95 exa- mple picture Tayfun Bayram and others from www.photocase.de; page 404 PCD example picture © AMUG Arizona Mac Users Group Inc. -
Newsletter of Stanford Palo Alto Users Group for PC
' mmm ~ I.__ __v_o_i_. _x_•_11_______ J_u_L_v_•_9_9s _________ N_o_ ._1_ __. Q Newsletter of Stanford Palo Alto Users Group for PC Q TABLE OF CONTENTS President's Piece Brain Christopher, SPAUG President 2 ~ New BBS Kendric Smith 2 Banks, Microsoft, and Online Banking Larry Weinberg J Norton DeskTop for Windows Lee Ammons 4 Internet Access in Public Libraries s Renewals 6 Anti-Virus for OS/2 David Varney 7 Why I Like OS/2 Jack Cook 8 Internet SIG 9 Membership Application 10 Resource Center SP AUG 11 ..... Ji GENERAL MEETING McAFEE ASSOCIATES - Latest Anti-Virus Software INCAT SYSTEMS - YAMAHA Recordable CD-ROM WATERGATE SOFTWARE - PC Doctor for IRQ Conflicts WEDNESDAY. JULY 26, 7:3 PM SPAUG NOW HAS A Conference ON A LOCAL First Class BBS. Nick Chinn. the Sysop (system operator) of Dead Winners Dog Party.has kindly provided space on his BBS for A new adventure is a click away for prize an interactive Conference for SPAUG. All you need winners at the June General Meeting. Del Philpott is a computer with a modem. Just dial (415) 968- and Clark Moore both won Pixar's Typestry. Frank 7919. You will see a few introductory screens of Kimbel and Bill McElhrney won Ares software information and be prompted to enter a User ID and Font Minder and Font Chameleon . Larry Turpen a password. New users will be prompted lo fill out won the Better Homes & Garden's Healthily a registration form. Cooking. After logging on, go to Conferences and select BBS Closed SPAUG. You can read what has been posted by other, and you can post your own material that you On July 5th, the Board of Directors feel will be of interest to others in the PC unanimously voted lo close the SPAUG BBS. -
Verizon Wireless Mobile Office User Guides for Windowstm 95/98
Verizon Wireless Mobile Office User Guides For WindowsTM 95/98 To use Mobile Office for basic Internet access, do the following: Setting the Phone Up As a Modem 2 – 5 Setting Up a Mobile Office Quick 2 Netsm Connection 6 – 9 Using The Mobile Office Service 10 - 16 Related Support Documents: Setting Up Your Existing Dial Up Connections 17- 24 Setting Up AOL 4.0 / 5.0 (If you currently use AOL.) 25 - 32 Faxing With Your Digital Data Capable Phone 33 - 53 1 man.doc Setting the Phone Up as a Modem Step 1:(Optional) If you have a driver that was provided with your phone skip this step. If you do not have a driver you can use a standard driver included in Windows or we recommend using our driver. Download the Mobile Office Driver. Step 2: Go into control panel by clicking on Start, Settings, Control Panel Step 3: Select Modems Step 4: Click Add... 2 man.doc Step 5: Select "Other" then click Next. (If your PC does not support PC-Cards you will not get this screen.) Step 6: Check "Don't run the Hardware Installation wizard" if you get this dialog box. Then click on the Next button. Step 7: Check the box labeled "Don't detect my modem; I will select it from a list." Then click Next. 3 man.doc Step 8: If you have a driver provided by your phone manufacturer, click on the "Have Disk..." button. Insert your disk, click "OK" and then choose the model of phone that you have. -
Zerohack Zer0pwn Youranonnews Yevgeniy Anikin Yes Men
Zerohack Zer0Pwn YourAnonNews Yevgeniy Anikin Yes Men YamaTough Xtreme x-Leader xenu xen0nymous www.oem.com.mx www.nytimes.com/pages/world/asia/index.html www.informador.com.mx www.futuregov.asia www.cronica.com.mx www.asiapacificsecuritymagazine.com Worm Wolfy Withdrawal* WillyFoReal Wikileaks IRC 88.80.16.13/9999 IRC Channel WikiLeaks WiiSpellWhy whitekidney Wells Fargo weed WallRoad w0rmware Vulnerability Vladislav Khorokhorin Visa Inc. Virus Virgin Islands "Viewpointe Archive Services, LLC" Versability Verizon Venezuela Vegas Vatican City USB US Trust US Bankcorp Uruguay Uran0n unusedcrayon United Kingdom UnicormCr3w unfittoprint unelected.org UndisclosedAnon Ukraine UGNazi ua_musti_1905 U.S. Bankcorp TYLER Turkey trosec113 Trojan Horse Trojan Trivette TriCk Tribalzer0 Transnistria transaction Traitor traffic court Tradecraft Trade Secrets "Total System Services, Inc." Topiary Top Secret Tom Stracener TibitXimer Thumb Drive Thomson Reuters TheWikiBoat thepeoplescause the_infecti0n The Unknowns The UnderTaker The Syrian electronic army The Jokerhack Thailand ThaCosmo th3j35t3r testeux1 TEST Telecomix TehWongZ Teddy Bigglesworth TeaMp0isoN TeamHav0k Team Ghost Shell Team Digi7al tdl4 taxes TARP tango down Tampa Tammy Shapiro Taiwan Tabu T0x1c t0wN T.A.R.P. Syrian Electronic Army syndiv Symantec Corporation Switzerland Swingers Club SWIFT Sweden Swan SwaggSec Swagg Security "SunGard Data Systems, Inc." Stuxnet Stringer Streamroller Stole* Sterlok SteelAnne st0rm SQLi Spyware Spying Spydevilz Spy Camera Sposed Spook Spoofing Splendide -
Testing the National Software Reference Library
Testing the National Software Reference Library Neil C. Rowe U.S. Naval Postgraduate School Monterey, California, USA [email protected] Forensics of directory metadata p We need tools to quickly find key information on a drive without searching file contents. p File and directory metadata is a big help to characterize drives (or partitions on a cloud). p We are developing a tool “Dirim”. p Our testbed the “Real Drive Corpus” is purchased from 22 countries, mostly China, Mexico, Israel, Palestine, and India – now 2420 drives and 44 million files. p It also includes wireless and storage devices. p For analysis, we exclude files with hashes found in the National Software Reference Library Reference Data Set (NSRL RDS) – it removes 30% of the files – and 5% of the hashes. p Research question: Just how good is the NSRL? The Dirim file-metadata analysis system Disk or flash drive File-directory metadata (in XML/DFXML) Common Simplified and standardized metadata hash codes File classification (from NSRL, mapping etc.) Data with deleted-file corrections Data excluding common files File classifications Statistical summaries Data clusters Special-feature analysis Suspiciousness analysis Graphical display of analysis results File metadata we extract from a disk image Ordinal features Nominal features Boolean features File size Drive name Allocated? Access minus creation File name Compressed? time Access minus File extension Encrypted? modification time Modification minus Top-level directory Empty? creation time Depth in file hierarchy Immediate directory