摘要:
An arrangement for dynamically identifying and intercepting potential software threats before they execute on a computer system is provided in which a file system filter driver (called a “mini-filter”) interfaces with an anti-malware service to selectively generate an alert event and allow the threat to run, in addition to generating an alert event and suspending the threat. The decision to suspend the threat or allow it to run is made through application of a cascading logic hierarchy that includes respective policy-defined actions, user-defined actions, and signature-defined actions. The mini-filter generates the alert event to the anti-malware service whenever a file is opened, or modified and closed. The service uses an engine to scan the file to identify potential threats which are handled though application of the logic hierarchy which provides for configurations defined in a lower tier of the hierarchy to be overridden by those contained in a higher tier.
摘要:
An arrangement for dynamically identifying and intercepting potential software threats before they execute on a computer system is provided in which a file system filter driver (called a “mini-filter”) interfaces with an anti-malware service to selectively generate an alert event and allow the threat to run, in addition to generating an alert event and suspending the threat. The decision to suspend the threat or allow it to run is made through application of a cascading logic hierarchy that includes respective policy-defined actions, user-defined actions, and signature-defined actions. The mini-filter generates the alert event to the anti-malware service whenever a file is opened, or modified and closed. The service uses an engine to scan the file to identify potential threats which are handled though application of the logic hierarchy which provides for configurations defined in a lower tier of the hierarchy to be overridden by those contained in a higher tier.
摘要:
A system and method for aggregating and extending parental controls auditing in an unmanaged computing network are provided. A parental control system, including a parental control database, logging interface, and audit process, resides on each host computing device in an unmanaged computing network that is capable of synchronizing data residing on one of the host computing devices with data residing on the other devices in the network. The parental control system facilitates the logging and reporting of parental control audit information in a manner that allows parents to aggregate the audit information to obtain a comprehensive audit report of their children's use of all computers in the home, and is extensible and customizable by the applications from which the parental control audit information originates.
摘要:
Embodiments of a feedback-driven malware detector are directed to protecting a computer from programs that perform actions that are malicious or not expected by a user. In one embodiment, the feedback-driven malware detector performs a method that initially determines whether the state of an application program scheduled to be added to an extensibility point on a computer is already known. If the state of the object is not already known, the user is informed that an application program is being installed on the computer and that the application program is being added to an extensibility point. Then, input is obtained from the user that assists in determining whether the application program is malware.
摘要:
In an implementation of user interface transition, a user interface logon page is displayed with selectable logon controls that each have a corresponding user-identifiable indicator. A transition from the user interface logon page to a user interface desktop page is initiated in response to a selectable logon control being selected. The transition displays the user-identifiable indicator corresponding to the selectable logon control uninterrupted throughout the transition, and the user-identifiable indicator corresponding to the selectable logon control is displayed on the user interface desktop page.
摘要:
A system and process for interacting with a system in an insecure state is described. Before logging into a secure state of a computer system, a user is able to access limited information including calendar information regarding meetings for that day and the like. In some aspects of the invention, a user may interact with a displayed note pad for receiving handwritten or typed notes. Aspects of the described system and method permit a user to quickly review or interact with a computer prior to logging into a secured state of the computer system.
摘要:
In response to a user instruction to initiate media playback, which instruction may come from a dedicated media playback hardware button or from a user interface on a display screen, a computer operating system activates a predesignated media playback user account. The account may be limited to access of media playback applications and files located within shared directories. The operating system also launches a media playback application in response to the user instruction to initiate media playback. Instead of activating an account in response to a media playback instruction, the operating system can execute a media player application within a login screen.
摘要:
In an implementation of initiate multiple applications, a user interface includes a user-selectable control to initiate that multiple applications start together at approximately a same time. The user interface includes user-selectable configurations to designate a multiple application start-up configuration.
摘要:
A system and method for generating aggregated content views in a computing network are provided. A host computing device obtains a request for an aggregated view of content corresponding to a set of criteria. The host computing device queries itself and each computing device in a defined network for locally stored content matching the set of criteria. The query results are merged and displayed to a user at the host computing device as an aggregated list view.
摘要:
A credential is translated with one of different credential provider modules each translating a corresponding different type of credential into a common protocol. The translated credential is communicated through an API to a logon UI module to an operating system (OS) of a local machine. An OS logon module is called by the logon UI module to authenticate the translated credential against a credential database. A user identified by the translated credential is logged on to access the local machine when the authentication is successful. The credential can also be used with a selection received from the logon UI module via a corresponding one of different pre-log access provider (PLAP) modules that each communicate with the API. The API establishes a network session with an access service specified by the selected PLAP module when the credential is authenticated with the credential database.