摘要:
A computer-implemented method for storing information that identifies the state of health of a computing system at the time a backup of the computing system is created may comprise: 1) identifying a backup of the computing system, 2) performing an evaluation of the computing system's health, and then 3) storing health information that identifies the state of health of the computing system when the backup was created as metadata to the backup. Similarly, a method for determining whether to restore a backup of a computing system based on health information may comprise: 1) identifying a backup of the computing system, 2) identifying health information stored as metadata to the backup that identifies the state of health of the computing system when the backup was created, and 3) determining, based on the health information, whether to restore the backup. Corresponding systems and computer-readable media are also disclosed.
摘要:
A computer-implemented method for determining the impact of a software change on the health of a computing system or an application installed on the computing system may comprise identifying the software change, performing a first health evaluation, allowing the software change to occur, performing a second health evaluation, and then determining the impact of the new application by comparing the results of the second health evaluation with the results of the first health evaluation. Exemplary methods for providing guidance on the potential impact of a software change and for determining the health impact of a software change based on information obtained from a plurality of computing systems are also disclosed. Corresponding systems and computer-readable media are also disclosed.
摘要:
Application profiles for applications stored on the endpoint are defined. An application profile identifies components on the endpoint associated with an application with which the application profile is associated. Applications on the endpoint accessed by a user to perform a task are monitored. A task profile associated with the task is created and stored, the task profile associated with the application profiles for the applications accessed by the user to perform the task.
摘要:
An exemplary method for preventing exploitation of byte sequences that violate compiler-generated instruction alignment may comprise: 1) identifying instantiation of a process, 2) identifying an address space associated with the process, 3) identifying, within the address space associated with the process, at least one control-transfer instruction, 4) determining that at least one byte preceding the control-transfer instruction is capable of resulting in an out-of-alignment instruction, and then 5) preventing the control-transfer instruction from being executed. In one example, the system may prevent the control-transfer instruction from being executed by inserting a hook in place of the intended instruction that executes the intended instruction and then returns control flow back to the instantiated process. Corresponding systems and computer-readable media are also disclosed.
摘要:
A plurality of fingerprints are created for a file. Each fingerprint is created in response to an instance of activity involving the file. A malware signature associated with the mutating malware is compared to one or more of the plurality of fingerprints. In response to the malware signature matching one of the plurality of fingerprints, determining that the file is infected with mutating malware. Further, in response to determining that the file is infected with mutating malware, transmitting to a server multiple fingerprints of the plurality of fingerprints. The server analyzes the multiple fingerprints to determine a pattern of mutation by the mutating malware. The determined pattern of mutation is used by the server to create a signature for detecting mutations of the mutating malware.
摘要:
A computer-implemented method for determining the impact of a software change on the health of a computing system or an application installed on the computing system may comprise identifying the software change, performing a first health evaluation, allowing the software change to occur, performing a second health evaluation, and then determining the impact of the new application by comparing the results of the second health evaluation with the results of the first health evaluation. Exemplary methods for providing guidance on the potential impact of a software change and for determining the health impact of a software change based on information obtained from a plurality of computing systems are also disclosed. Corresponding systems and computer-readable media are also disclosed.
摘要:
A method for preventing subversion of address space layout randomization (ASLR) in a computing device is described. An unverified module attempting to load into an address space of memory of the computing device is intercepted. Attributes associated with the unverified module are analyzed. A determination is made, based on the analyzed attributes, whether a probability exists that the unverified module will be loaded into a number of address spaces that exceeds a threshold. The unverified module is prevented from loading into the address space if the probability exists that the unverified module will be loaded into a number of address spaces that exceeds the threshold.
摘要:
The disclosure is directed to systems, apparatus, and methods for geolocation-based application streaming. In one example, a system may include a geolocation service that determines the location of a client, and an application server that streams one or more applications to the client on request. The application server may use the location provided by the geolocation service to select an application streaming profile indicating application modules to be initially streamed to clients for that geolocation. After the initial program modules have been streamed to the client, the application server services requests from the client for additional application modules. The application server may log application module requests to create or modify application streaming profiles that specify the application modules to be initially streamed to clients at a particular geolocation. The client or a web server may also specify the application streaming profile to be used by the application server.
摘要:
Embodiments of the instant disclosure may provide users with access to information that details, by application category, the potential impact an application may have on the health of a user's computing device. A method for determining the impact of a new application on the health of a computing system by category is also disclosed. Corresponding systems and computer-readable media are also disclosed.
摘要:
A system and method for compiling part of the bytecode for a software application into native code at install time when the software application is installed on a particular computer are described. According to one embodiment of the method, usage information for the software application may be received. The usage information may indicate how frequently or commonly each of a plurality of features of the software application is used. The usage information may be analyzed to determine a rank ordering of the features. The method may further comprise installing the software application on the particular computer. Installing the software application may comprise compiling one or more bytecode modules of the software application into native code, where the one or more bytecode modules are selected from a plurality of bytecode modules depending upon the rank ordering of the features.