摘要:
Disclosed is a system and method for enhancing the security and reliability of virtual private network (VPN) connections by manually exchanging secondary configuration information. If a compromise is detected on a main VPN tunnel, a new VPN tunnel can be created by the system administrators using the secondary configuration, stymieing attempted security violations and providing nearly continuous service to the users. A compromise may be indicative of a security breach or other problem with the VPN. The main VPN tunnel may be abandoned or fed with false data to confuse would-be intruders if the compromise is a security compromise.
摘要:
A method and apparatus in a data processing system for managing receipt of data by a browser through a communications interface. Data is received at the browser through the communications interface using a portion of the bandwidth for the communications interface. Responsive to an input, a rate at which the data is received by the browser is reduced, wherein the portion of the bandwidth used to receive data is reduced.
摘要:
Protecting open Web sites from known malicious users in a World Wide Web (Web) communication network with access to a plurality of open Web sites responsive to requests from users at IP addresses throughout the Web. There is provided in association with a protected open Web site, a stored list of the IP addresses of known malicious users combined with means for comparing the IP addresses of each user requesting access to the protected open Web site to said list of IP addresses of the known malicious users. There are also implementations responsive to the comparing means for diverting to an alias address for the protected Web site any request from the IP address of a malicious user. The alias address is provided by a function associated with the protected open Web site. The present invention is applicable in circumstances where the malicious users or “crackers” are already known.
摘要:
In a search session through a browser for pages on the World Wide Web (Web), a system for precluding repetitive accessing of documents linked to hyperlinks in a plurality of hypertext documents. The system is directed to a Web communication network with user access via a plurality of data processor controlled interactive receiving display stations for displaying received hypertext documents of at least one display page containing text, images and a plurality of embedded hyperlinks, each hyperlink being user selectable to access and display a respective linked hypertext document. In addition to precluding hyperlinks which had been activated in previous pages and/or hyperlinks which have been discounted merely by having been present in previous pages, the Web browser may be setup to permit the user to specifically discount individual hyperlinks or groups of hyperlinks. Also, the Web browser may be setup to preclude repetitive hyperlinks in subsequent Web pages from searches from different search engines. The basic system comprises search means for locating and providing to receiving display stations hypertext documents, combined with a Web browsing system operatively associated with the receiving display station including means for querying said search means for hypertext documents, means for activating hyperlinks to linked documents and means responsive to said activating means for accessing the linked documents. The browser also has user interactive means for discounting hyperlinks in received Web documents, and means precluding the accessing of any document linked to previously discounted hyperlinks.
摘要:
An approach is provided in which a server receives a first request from a client over a command port connection. The server, in turn, sends a first phase authentication token to the client over the command port and receives a second request from the client over a management port connection. In response, the server sends a second phase authentication token to the client over the management port connection, which the server receives back from the client over the command port connection. In turn, the server authenticates the client to utilize the command port connection accordingly.
摘要:
An approach is provided in which a server receives a first request from a client over a command port connection. The server, in turn, sends a first phase authentication token to the client over the command port and receives a second request from the client over a management port connection. In response, the server sends a second phase authentication token to the client over the management port connection, which the server receives back from the client over the command port connection. In turn, the server authenticates the client to utilize the command port connection accordingly.
摘要:
An approach is provided to receive a request at a first computer system from a second system. The first system generates an encryption key, modifies retrieved source code by inserting the generated encryption key into the source code, and compiles the modified source code into an executable. A hash value of the executable program is calculated and is stored along with the encryption key in a memory area. The executable and the hash value are sent to the second system over a network. The executable is executed and it generates an encrypted result using the hash value and the embedded encryption key. The encrypted result is sent back to the first system where it is authenticated using the stored encryption key and hash value.
摘要:
A World Wide Web (Web) distribution site for accessing a plurality of Web documents from a database through a distribution system comprising a plurality of server computers of different computer powers wherein server computers are designated for documents based upon document weights calculated for the Web documents. The system has means for determining a document weight for each of said plurality of Web documents, which include means for counting the total number of bytes of 15 data representing the content of each of said documents, means for assigning a complexity weight to programs in each of said plurality of documents, and means for multiplying the byte total for each Web document by the complexity weight of the Web document. Based upon said 20 document weights, the system provides means for designating the server computers for said respective Web documents. The server system at Web distribution sites automatically periodically monitors the Web documents for 25 significant changes in content resulting in document weights, and adjust its applied server computer resources to effectively cover such changes in content for the Web documents managed through the distribution site.
摘要:
A method, system and apparatus for allowing a mirroring map to be used with more than one piece of data are provided. First, a mirroring map is created and given a name. Then, the name of the mirroring map and the mirroring map itself are stored into the computer system. When a piece of data is to be stored in accordance with the mirroring map any time thereafter, the name of the mirroring map is used to associate the mirroring map with the piece of data.
摘要:
The user receiving a World Wide Web (Web) page is provided with an implementation for predetermining subject matter, terms and words for which the user desires to have hyperlinks in a received web document. It further provides for displaying in the received web document multiple hyperlinks for each predetermined term of interest to thereby substantially reduce the user browsing through several levels of web documents in pursuit of topics of interest. Search engines for locating web documents related to the defined words are provided together with implementations for creating hyperlinks from the received web document to at least some of the located web documents. The system may be implemented by highlighting the defined words in the received web document, and responsive to a user interactive selection of a highlighted defined word in the received document, displaying a menu of a plurality of hyperlinks to the located web documents related to the selected highlighted defined word. The located predefined words may be highlighted in the form of word buttons. Also, the menu, of the plurality of hyperlinks, is to the most relevant of the located web documents related to the selected highlighted defined word.