摘要:
A data processing system for efficiently attaching files to electronic mail message. In a multi-level hierarchical file storage system within the data processing system wherein one or more files may be active, only those files, which are active, are initially proffered as candidates for attachment in response to a user's indicated desire to attach a file to an electronic mail message. If the user fails to select an active file for attachment, the user is prompted to select a file from the multi-level hierarchical file storage system for attachment. After attachment, the electronic mail message and attachment are transmitted.
摘要:
A method, system and computer program product for enabling user-customization of an ATM display/receipt for a transaction carried out at an automated teller machine (ATM). The customer/user of the ATM creates/selects specific alerts to be outputted during subsequent ATM transactions. The alerts/notices are linked to the customer account. During subsequent access to the user's account via an ATM, the pre-selected alert/notice is displayed to the user or printed on the transaction receipt.
摘要:
A computer implemented method, apparatus, and computer program product for authenticating a user to a network. In response to receiving a request from a user to access a protected resource, the process sends a unique bit sequence into a network connection utilized by the user. Next, the process authenticates the user to access the protected resource in response to receiving a verification that the unique bit sequence was received by an access point that authenticated the user when the user logged on to the network.
摘要:
A method, apparatus, and computer instructions for responding to a denial of service attack. The method comprising from a remote data processing system detects an occurrence of the denial of service attack in which invalid credentials are presented to the data processing system. Connections from the remote data processing system to the data processing system are blocked in response to detecting the occurrence of the denial of service attack. A command is selectively sent to a server data processing system to block connections from the remote data processing system, in response to detecting the occurrence the denial of service attack.
摘要:
A method, system, and program for selective mirrored site access from a communication are provided. When composing a communication, multiple mirrored site addresses are embedded with a target site address. The sender may request to enter the mirrored site addresses or a browser supplies the mirrored site addresses. At each client system receiving the communication, selections of site addresses accessible for each intended recipient are detected. Thus, each client system, when outputting the communication, displays the selection of mirrored site address accessible to the intended recipient accessing that client system.
摘要:
Controlling electronic withdrawals by a drawee including receiving in the drawee from a withdrawal device a withdrawal request, where the withdrawal request includes a withdrawal device identifier, a drawer identifier, and a withdrawal amount; retrieving from storage in computer memory of the drawee data representing limitations on electronic withdrawals for the drawer, wherein the limitations include a limitation on drawer location; and authorizing, by the drawee, an electronic withdrawal in dependence upon the limitations, including the limitation on drawer location. In typical embodiments, the limitations on electronic withdrawals may include limitations on withdrawal type account, withdrawal period, and maximum withdrawal amount. In typical embodiments, the limitation on drawer location may include a geographic area that includes one or more locations of withdrawal devices.
摘要:
A method and system for allowing for the secure transmission and reception of data in a processing system is disclosed. The method and system includes providing at least one crypto algorithm in a region of a system memory in the processing system; and assigning a cryptographic function of the at least one crypto algorithm to the region. A system and method in accordance with the present invention ties the encryption/decryption algorithm to specific DMA regions and the encryption key to the particular DMA transfer. This allows the system processors to offload the encryption and enable all network (and non-network) adapters to take advantage of this offload without hardware changes to the adapters.
摘要:
A system, method, and program product is provided that selects an instant messaging message that includes one or more words in a text area. The instant message is a communication with an instant messaging participant that corresponds to an instant messaging participant identifier. A count is kept of the words that match keywords that are associated with a selected instant messaging group data store that is stored in a nonvolatile data area. If the count exceeds a particular threshold, the instant messaging participant identifier is added to the selected instant messaging group.
摘要:
A system and method for conditioned distribution of e-mail is provided. Delivery of an e-mail message to selected second recipients (equivalently addressees) may be conditioned on a set of preselected conditions, in particular to a set of conditions associated with the delivery of the e-mail to a set of first recipients. In response to message delivery notifications corresponding to the set of first recipients, a determination is made if the delivery conditions are satisfied, and delivery to the set of second recipients made accordingly. Delivery to a set of third recipients may be likewise conditioned on another set of conditions.
摘要:
A method is presented for using a hard disk drive which contains a non-volatile random access memory (NVRAM) and a computer-usable disk medium. A usage value is maintained for the number of accesses to the computer-usable disk medium, and the usage value is stored within the NVRAM. In a system that is connected to multiple hard disk drives, the usage values for the hard disk drives can be compared to determine a youngest disk drive or a lowest amount of usage amongst the multiple hard disk drives. When data needs to be mirrored or backed-up to one of the hard disk drives, it can be copied to the youngest or least-used hard disk drive. If an operating system installation needs to be performed, the operating system files can be stored on the youngest or least-used hard disk drive.