摘要:
A system and method for conditioned distribution of e-mail is provided. Delivery of an e-mail message to selected second recipients (equivalently addressees) may be conditioned on a set of preselected conditions, in particular to a set of conditions associated with the delivery of the e-mail to a set of first recipients. In response to message delivery notifications corresponding to the set of first recipients, a determination is made if the delivery conditions are satisfied, and delivery to the set of second recipients made accordingly. Delivery to a set of third recipients may be likewise conditioned on another set of conditions.
摘要:
Systems and methods for denying access to a data processing system by an intruder are provided. Input/output (I/O) on the intruder's connection may be taken over and responses mimicking a local terminal session passed back. On an attempted reconnect by the intruder, the user name and password used by the intruder to access the system may be captured. The password may then be changed on the edge system and the intruder's terminal session disconnected, or alternatively, continue to log the intruder's activity.
摘要:
A computer implemented method, apparatus, and computer usable program code for managing e-mail messages. A local copy of the e-mail message is stored on the data processing system for a selected period of time in response to sending an e-mail message to a recipient from a data processing system. A determination is made as to whether the local copy of the e-mail message is present in response to receiving a notification that the recipient is unable to respond. The local copy of the e-mail message is retrieved if the local copy of the e-mail message is present to form a retrieved e-mail message. The retrieved e-mail message is presented.
摘要:
Systems and methods for denying access to a data processing system by an intruder are provided. Input/output (I/O) on the intruder's connection may be taken over and responses mimicking a local terminal session passed back. On an attempted reconnect by the intruder, the user name and password used by the intruder to access the system may be captured. The password may then be changed on the edge system and the intruder's terminal session disconnected, or alternatively, continue to log the intruder's activity.
摘要:
Controlling electronic withdrawals by a transaction processor including receiving in the transaction processor from a withdrawal device a withdrawal request, where the withdrawal request includes a withdrawal device identifier, a drawer identifier, a drawee identifier, and a withdrawal amount; transmitting from the transaction processor to a drawee a request for limitations on electronic withdrawals for the drawer, where the limitations include a limitation on drawer location; receiving in the transaction processor from storage in computer memory of the drawee data representing the limitations on electronic withdrawals for the drawer, including the limitation on drawer location; and authorizing, by the transaction processor, an electronic withdrawal in dependence upon the limitations, including the limitation on drawer location.
摘要:
A method, system, and program for automated selection of a backup recipient and distribution of an instant messaging request to the backup recipient are provided. A communication support system detects a messaging request initiated by a requester for an intended recipient. The communication support system determines whether the intended recipient is available to respond to the messaging request from the requester. If the intended recipient is unavailable to respond to the messaging request from the requester, the communication support system searches at least one of a directory entry, a backup directory entry, and a schedule entry for the intended recipient to identify a designated backup for the messaging request. In particular, the designated backup recipient is selected from among multiple available backups where at least one characteristic of the messaging request matches at least one from among a current time period, a requester identity, and an intended subject matter specified in association with the designated backup recipient. Once the communication system selects a backup recipient, then the messaging request is distributed to the selected backup recipient, wherein the selected backup recipient is enabled then to respond to the messaging request.
摘要:
A system and method for performing a point in time backup is presented. A backup application initiates a point in time backup whereupon a backup tracker monitors write requests during the point in time backup. The backup tracker logs data block locations that have already been backed up whose content changes in response to a write request. After a first pass of backing up data blocks, the backup application backs up the changed data blocks. During the changed data block backup procedure, the backup application invokes a copy on write command for particular changed data blocks that receive write requests prior to their content being backed up. The copy on write command stores the particular changed data block's content in a temporary storage area in which the backup application retrieves when the backup application is ready to backup the particular changed data blocks.
摘要:
A security protocol that dynamically implements enhanced mount security of a filesystem when access to sensitive files on a networked filesystem is requested. When the user of a client system attempts to access a specially-tagged sensitive file, the server hosting the filesystem executes a software code that terminates the current mount and re-configures the server ports to accept a re-mount from the client via a more secure port. The server re-configured server port is provided the IP address of the client and matches the IP address during the re-mount operation. The switch to a secure mount is completed in a seamless manner so that authorized users are allowed to access sensitive files without bogging down the server with costly encryption and other resource-intensive security features. No significant delay is experienced by the user, while the sensitive file is shielded from un-authorized capture during transmission to the client system.
摘要:
A method, system and telephone answering device for processing control scripts attached to voice messages provides a mechanism by which a caller can leave an interactive list of contact information. The scripts provide for control of a display and input responses from a keypad or other input device so that an entry on the contact information list can be activated in response to user input, thus returning the call. The list information displayed may be arbitrary textual associations with the underlying contact number. The contact information may also include e-mail addresses, so that activation of an e-mail list element will activate a text messaging service, if available. For wireless telephone devices, the method implementing the present invention may be operable at the service provider only, so that standard wireless telephones may be programmed to provide the interactive list from a provider-side interpretation of the scripts.
摘要:
A computer implemented method, data processing system and computer program product are disclosed for password expiration based on vulnerability detection. A request for a password is received during re-activation of a first account that belongs to a particular user. A test password is compared to a previously created password that belongs to the particular user to determine if a match occurred. Responsive to determining that there is a match, a second account that belongs to the particular user with respect to the match is expired.