Mumbai Security and Compliance User Group

 View Only
46 Entries
 
 
12 years ago
3 people recommend this.

Hi All,

Here i would like to introduced a very small but usefull tool for monitoring the filesystem activities in LINUX.


   fspy is an easy to use linux filesystem activity
   ...

Attachments
12 years ago
2 people recommend this.

SSIM Backup & Restore Procedures:
 

These files should be backed up from Symantec Security Information Manager.

And after Backup these files should be moved to backup Tape ...

12 years ago
2 people recommend this.

Squid Proxy SSIM Agent Installation Procedure

 

Pre-requiste:

Squid Proxy SSIM Collector (symevtagent_4.5.0.12.tar)
Squid Proxy SSIM Agent (squid_4.3.3.zip)
Steps:

Download ...

12 years ago
2 people recommend this.

SSIM Client Installation                                            
 

Open a Web browser, and in the address bar, type the IP address of the appliance. By default, this address ...

12 years ago
3 people recommend this.

Hi All,

 

Most of us are used to windows technology. hence it is quite difficult when we try to use LINUX.

 

This is most usefull for all SSIM users.

It always required ...

Attachments
12 years ago
Be the first person to recommend this.

I am writing this article into 2 parts. In First part I will show you how to exploit fully patched Machine but unpatched Abobe Reader installed on it and In 2nd Part i will show you ...

12 years ago
1 person recommends this.

What is GIN?

The Symantec Global Intelligence Network (GIN) is comprehensive collection of vendor-neutral security data sources. This service is an authoritative source of Information ...

Attachments
12 years ago
3 people recommend this.

SSIM Windows Integration Strategies
 

Installation Types

OnBox Installation
OFFBox Installation
 

OnBox Installation : The SSIM Agent and Collector will be installed ...

12 years ago
2 people recommend this.

SSIM Installation Procedure

To install and configure Symantec Security Information Manager, you must complete the following steps in the order that is shown:

 


Connecting ...

12 years ago
2 people recommend this.

As the Microsoft continues to level up their products with the new features & technology, security too grew up.

Due considering the high user pool of windows OS, Microsoft continues ...