Abstract:
A high-speed tire repair tool includes a locating unit having an outer tube and a locating bar; a buffer element having a head and an inner tube connected to the head and received in the outer tube with the locating bar fixed to the inner tube at a predetermined position; a hollow pipe mounted in the outer tube, the inner tube, and the head; and a hole plugging assembly mounted to the head and connected to the hollow pipe, and having an abrasive element and a plugging strip. When the hollow pipe is driven to rotate and the outer tube is moved forward by a driving unit, the hole plugging assembly connected to a front end of the hollow pipe is quickly driven into a hole on a high-speed tire for the abrasive element to trim the hole and the plugging strip to air-tightly plug the hole.
Abstract:
A scan client in a subnet of an intranet may be designated as a root agent to provide subnet information to a scan server in the intranet. The subnet information may include addresses of computers belonging to the subnet. The scan server may use subnet information collected from various root agents to build a map of the intranet. The intranet map may be forwarded from the scan server to the root agents, which in turn provide the intranet map to scan clients in their respective subnets. The root agents may also receive antivirus modules from the scan server for distribution to scan clients. A scan client may look for computers indicated in the intranet map to determine whether or not it is connected to the intranet.
Abstract:
Client computers may be configured to communicate with a security server computer to receive access point information for computer network wireless access points in a particular geographic location. A client computer may provide its current geographic location to the security server computer to request access point information. The server computer may retrieve from an access point database access point information for computer network wireless access points in the geographic location. The server computer may provide the access point information to the client computer, which may display the access point information over a geographic map. The access point information may indicate whether any computer network wireless access point in the geographic location poses a computer security threat.
Abstract:
A virtualization platform includes a number of virtual machines, one of which is configured as a driver domain and includes the network service control for routing network traffic between the other virtual machines. The privileged domain does not include the network service control. The network service control includes network backend interfaces and a virtual switch or bridge. The driver domain includes a PCI driver for direct communication with a network interface card. The driver domain includes hooking software and an inspection agent. Packets passing between the other virtual machines pass through the driver domain, are hooked, and are inspected by inspection agent to determine if they are malicious or not. Malicious packets are blocked. The driver domain may also utilize a PCI driver of the privileged domain for access to the network interface card. Platforms with or without pass-through mode may be used.
Abstract:
To protect a user computer from eavesdroppers, a secure communication connection is created through a computer network. The secure communication connection may be created even when the user computer communicates with a web server computer that does not support secure communication connections. The secure communication connection may be to a protection server computer. Another communication connection may be formed between the protection server computer and the web server computer to allow the user computer to transfer data to the web server computer by way of the protection server computer. The creation of the secure communication connection may be by user request or automatic upon detection of protected address or data.