摘要:
A method is provided for detecting viruses. According to the method, data is stored in a journal area of memory before changes embodied in the data are written to virtual memory. At least a first portion of the data in the journal area of memory is scanned for viruses. In some embodiments, a second portion of data that immediately precedes and/or immediately follows data to which the first portion of the data pertains is scanned for viruses. Preferably, the virtual memory includes a persistent storage device. Also provided is a system that includes a processor, a memory that includes virtual memory and a journal storage area, and a virus scanner controlled by the processor. The virus scanner scans the journal storage area for viruses.
摘要:
An arrangement for supporting a flat panel display wherein an actuating arrangement responsively alters a physical disposition of the supporting arrangement in a manner to avert physical damage to said flat panel display. Preferably, a flat panel display cover on a laptop will “bow” or arch in a direction away from the flat panel display and the actuating arrangement can be embodied, e.g., by a lattice or grid of wiring, or by a bimetallic sheet. Electronic or mechanical actuation is conceivable and the actuating arrangement can be triggered by, e.g., the imposition of a potentially damaging object and/or by closure of the laptop. While a laptop embodiment is broadly contemplated, other applications are possible.
摘要:
The collaborative sharing of resources on demand based on proximity, within a group or network of computers. Broadly contemplated herein the “tiling” of a collection of logically adjacent individual graphical desktops in a virtual desktop. In such a setting, the action of dragging a window or icon off of one desktop and onto another would effectively transfer user interactability, and/or perceived ownership of the object, to the desktop where the window or icon graphically “lands”.
摘要:
An arrangement for employing a host of receivers that may already be present in a laptop, to enable the laptop to collect a significant amount of data about its location. Once the system then finds a readily available connection, it can then transmit information about its location as well as other information to help pinpoint the location of the laptop.
摘要:
A technique for preventing damage to a portable device includes detecting movement of a portable device and determining whether a port of the portable device is attached to an external device. When the external device is attached to the port, a notification is provided to a user of the portable device that the external device requires detachment from the portable device (e.g., assuming that the notification is not masked).
摘要:
Peripheral devices are connected to the receptacle of a central processing unit (CPU) or to a hub using an “A” type universal serial bus (USB) connector plug and receptacle that ensures a positive connection regardless of the relative orientation of the two components. This is achieved mechanically, electronically, or through a combination of both. In one embodiment, the receptacle includes a bidirectional backplane that permits electrical contacts within the receptacle to slide or move in a direction that is perpendicular to the linear direction of the connector and its connecting cables. Another option is to use an orientation sensor such as a pressure transducer which serves to detect the orientation of the plug with respect to the receptacle. Another feature is the use of a multi-layer printed circuit board to cross or reverse the pins in the plug, such as D+ to D− and Power to Ground.
摘要翻译:外围设备使用“A”型通用串行总线(USB)连接器插头和插座连接到中央处理单元(CPU)的插座或集线器,确保无论两个组件的相对方向如何,都能确保正向连接。 这是通过机械,电子或通过两者的组合实现的。 在一个实施例中,插座包括双向背板,其允许插座内的电触点沿垂直于连接器及其连接电缆的线性方向的方向滑动或移动。 另一种选择是使用诸如压力传感器的取向传感器,其用于检测插头相对于插座的取向。 另一个特征是使用多层印刷电路板来交叉或倒转插头中的引脚,例如D +至D-和Power to Ground。
摘要:
A technique for preventing damage to a portable device includes detecting movement of a portable device and determining whether a port of the portable device is attached to an external device. When the external device is attached to the port, a notification is provided to a user of the portable device that the external device requires detachment from the portable device (e.g., assuming that the notification is not masked).
摘要:
A method can include receiving memory configuration information that specifies a memory configuration; receiving memory usage information for the memory configuration; analyzing the received memory usage information for a period of time; and, responsive to the analyzing, controlling notification circuitry configured to display a graphical user interface that presents information for physically altering a specified memory configuration. Various other apparatuses, systems, methods, etc., are also disclosed.
摘要:
A method for protecting Security Accounts Manager (SAM) files within a Windows® operating system is disclosed. A SAM file encryption key is generated by encrypting a SAM file via a syskey utility provided within the Windows® operating system. The SAM file encryption key is then stored in a virtual floppy disk by selecting an option to store SAM file encryption key to a floppy disk under the syskey utility. A blob is generated by performing a Trusted Platform Module (TPM) Seal command against the SAM file encryption key along with a value stored in a Performance Control Register and a TPM Storage Root Key. The blob is stored in a non-volatile storage area of a computer.
摘要:
A method can include receiving memory configuration information that specifies a memory configuration; receiving memory usage information for the memory configuration; analyzing the received memory usage information for a period of time; and, responsive to the analyzing, controlling notification circuitry configured to display a graphical user interface that presents information for physically altering a specified memory configuration. Various other apparatuses, systems, methods, etc., are also disclosed.