-
January 20th, 2010, 04:17 PM
#19
I honestly felt disgusted when our second meeting with Symantec took place. In the first meeting it was decided that we declare it as an incident and initiate our place (which anyway don't exist), anyway second meeting one guy walks up with a print out of how their scan technology works. This has not been documented. They created this post the case I opened.
I asked them if the first set of engineers who responded would not know this feature and their simple answer was, "maybe, not". That’s why I didn't write anything in the post here.
I spend hours trying to see if I can detect anything (which wasn't there). Sigh. The reason I kept on trying was because their first set of engineers didn't know of the feature and also asked us to submit few files they found in their load point analysis log.
Thanks to everyone who helped.
Life is at a low right now.
Parth Maniar,
CISSP, CISM, CISA, SSCP
*Thank you GOD*
Greater the Difficulty, SWEETER the Victory.
Believe in yourself.
Similar Threads
-
By cheyenne1212 in forum Miscellaneous Security Discussions
Replies: 7
Last Post: February 1st, 2012, 02:51 PM
-
By Tiger Shark in forum The Security Tutorials Forum
Replies: 5
Last Post: March 4th, 2004, 05:00 PM
-
By NullDevice in forum The Security Tutorials Forum
Replies: 21
Last Post: December 17th, 2003, 10:03 PM
-
By -DaRK-RaiDeR- in forum Newbie Security Questions
Replies: 9
Last Post: December 14th, 2002, 08:38 PM
-
By Dome in forum Other Tutorials Forum
Replies: 11
Last Post: August 21st, 2002, 03:38 PM
Posting Permissions
- You may not post new threads
- You may not post replies
- You may not post attachments
- You may not edit your posts
-
Forum Rules
|
|