Skip to main content

Norton AntiVirus C.E 7.6

Since the Introduction of Norton Antivirus 7.x, Symantec have managed to created a truly remarkable product with full single point manageability, centralized quarantine, single engine (NavX), remote rollout (Push Based from Console), Web based installer (Pull) , single definition set for all flavors of Nav (Using MicroDefs), customizable Liveupdate technology (Centralized Microdefs) and something new called the Digital immune system (c). Just to mention a few of the new features. In this document I will cover most of the new fetchers of NavCE, I have also included some URL's at the end of the paper that you can feather research this product.

781 (PDF, 3.90MB)

10 Oct 2001
ByAndre Botelho
Share
All papers are copyrighted

No re-posting of papers is permitted

Related Content

Cloud Security Monitoring on AWS

Research Paper

Cloud services adoption is growing massively year over year. In most cases, moving to the cloud...

  • 8 Feb 2021

Firebase: Google Cloud's Evil Twin

Research Paper

Firebase allows a frontend application to connect directly to a backend database. Security wonks...

  • 8 Oct 2020
  • Brandon Evans

Compliance Benchmarks using Cloud Custodian

Research Paper

With the increased cloud adaption rate, many companies are looking for ready to use product...

  • 25 Sep 2020

Top 5 Considerations for Multicloud Security

Research Paper

The move to leveraging multiple public cloud providers introduces new challenges and opportunities...

  • 15 Apr 2020
  • Brandon Evans

Cybersecurity in the Age of the Cloud

Research Paper

The hand-selected resources in this eBook provide a well-rounded look at cybersecurity...

  • 21 Feb 2020
  • Frank Kim

Secure Internet Gateways: Backing Down from a Fight

Research Paper

When does a security agent become a double agent? On-premise corporate devices are protected by a...

  • 2 Nov 2018

Intrusion detection through traffic analysis from the endpoint using Splunk Stream

Research Paper

With technologies such as software-defined wide area networking (SD-WAN) and cloud operations, the...

  • 24 May 2017

Cyber Security Trends: Aiming Ahead of the Target to Increase Security in 2017

Research Paper

Attackers are always changing their methods, but some cybersecurity trends are clear--and...

  • 20 Mar 2017

Moving Legacy Software and FOSS to the Cloud, Securely

Research Paper

As more organizations consider the benefits of cloud adoption and use of legacy or freeand open...

  • 28 Dec 2015

An Introduction To Securing a Cloud Environment

Research Paper

While Cloud services offer flexibility, scalability and economies of scale, there have...

  • 27 Nov 2012

Cloud Computing - Maze in the Haze

Research Paper

When Amazon announced its EC2 environment in August 2006, one might not have imagined the change in...

  • 18 Oct 2011

Following Incidents into the Cloud

Research Paper

The increased level of complexity which cloud computing has introduced to incident handling is not...

  • 1 Mar 2011

Step by Step Installation of a Secure Linux Web, DNS and Mail Server

Research Paper

This paper will show how the author configured a Linux based web and e-mail server for a small...

  • 8 Apr 2004

The Art of Web Filtering

Research Paper

Web Filters are designed to improve the security and productivity of a network, but as with anything...

  • 8 Apr 2004

Secure OS Environments for Linux

Research Paper

In this paper I make a review of the main set of tools and resources available for Linux system...

  • 3 Jun 2003

The Consumer Desktop - The Weak Link in Internet Security and Why ISP's Are Uniquely Positio

Research Paper

The Internet community today is seeing a rapidly growing number of distributed denial-of-service...

  • 11 Mar 2003

Security Strengths and Weaknesses of Two Popular Web Servers

Research Paper

As the mediator between your business and the world the Web Server that you choose must be...

  • 19 Aug 2001

Using Snort v1.8 with SnortSnarf on a RedHat Linux System

Research Paper

To effectively implement system and network security, a multi pronged approach should be used....

  • 25 Jul 2001

Subscribe to GIAC’s Monthly Newsletter

Receive expert insights, priority access to certifications, essential updates on regulatory changes and industry developments.