Checkmarx SQL injection high severity issue
Is this method sufficient for escaping strings for use in SQL to prevent SQL injection attacks?
SMG: Is there any idle or initial processing time?
Is there any known idle time for SMG?
I mean in the event of no email coming, we can see that the first email that being process would have larger delay than the subsequence email…
Is this normal and expected? If yes, how many seconds or miliseconds is fine standard?
SQL Injection Attack questions?
Custom Log Format String
I see an interesting problem: when I create a new Access Log Format using Custom format string, SGOS 188.8.131.52 starts logging that very string in the logs, instead of actual field data. So, in the log i see the custom string for every Access event over and over again.
The standard ELFF format strings work fine: logs look as they should.
All I’m trying to do is to add couple of additional fields to log, which are not included in ELFF format hence the need for Custom format string.
Anyone observed anything like this? Am I missing a tickbox somewhere?
Symantec does not detect EICAR on big partition
we have a Windows fileserver with SEP 14RU1MP2 installed on it. The fileserver has 6 partitions with different sizes. On 5 partitions SEP works great. But on the biggest partition it does not detect EICAR files which is really strange. The partition is 11 TB large.
I already repaired SEP together with the Symantec support and after that SEP works again good for a few days. The exeptions are also ok. But now we have that issue again.
Does anyone have an idea how to solve that issue?
Re: ASL to extract IP from Cisco BGP4 ObjectID
I was able to separate the oid and ip address with the below example code using the substring function:
./sm_adapter –file=fs_match.txt test.asl
Reference to the use of the substring function can be found in the 9.2 ASL Reference guide on page 85
Advisor, Enterprise Technical Services