摘要:
A computer-implemented method for determining a file set. The method may include identifying a file set. The method may also include identifying a first file in the file set. The first file may comprise a first value in a first property field. The method may further comprise identifying a second file in the file set. The second file may comprise a second value in the first property field. The first value may be different than the second value. The method may include transmitting a first file identifier of the first file and a second file identifier of the second file from a first computing device to a second computing device. The second computing device may identify a set of known-good-file identifiers. The second computing device may transmit the set of known-good-file identifiers to the first computing device. Corresponding systems and computer-readable media are also disclosed.
摘要:
Method and apparatus for managing temporary e-mail addresses is described. All e-mail sent to a temporary e-mail address is initially forwarded to an actual e-mail address. In some examples, the temporary e-mail address is automatically deactivated in response to an event such that no e-mail sent to the temporary e-mail address is forwarded to the actual e-mail address. A notification e-mail is sent to the actual e-mail address, the notification e-mail indicating that the temporary e-mail address has been deactivated and including one or more uniform resource locators (URLs) configured to manage the deactivation of the temporary e-mail address.
摘要:
A computer-implemented method for identifying spam mailing lists may include identifying a plurality of clients that receive e-mail messages. The computer-implemented method may also include, for each client in the plurality of clients, receiving, from the client, information identifying at least one e-mail message received by the client. The computer-implemented method may further include, for each client in the plurality of clients, recording the identifying information in a database. The computer-implemented method may additionally include identifying at least one mailing list by identifying at least one group of clients within the plurality of clients with similar patterns of identifying information. Various other methods, systems, and computer-readable media are also disclosed.
摘要:
A method and apparatus for mitigating the performance impact of background or idle time processing during interactive computing sessions. One embodiment of the present invention is a method for mitigating performance impact of background or idle time processing on interactive applications comprising identifying executable and data pages in physical memory that are associated with an interactive application that is temporarily unused and preventing any of the identified executable and data pages from paging out.
摘要:
A method and apparatus for providing information associated with service providers using a social network is described. In one embodiment, a method of providing indicia of familiarity with the service providers comprises identifying one or more relationships between one or more service providers and a user using a social network associated with the user and generating information regarding the one or more relationships, wherein the information comprises a social distance between the user and each service provider of the one or more service providers where the social distance represents an indicia of familiarity between the user and each service provider of the one or more service providers.
摘要:
Electronic communication messages are routed according to a user's current physical location and the physical locations of communication devices. A plurality of communication devices such as telephones and computers are associated with the user. The physical locations of the plurality of communication devices are tracked. The current physical location of the user is also tracked in real-time. Incoming communication messages to the user and outgoing communication messages from the user are routed according to routing preferences based on at least the current physical location of the user and physical locations of at least one of the communication devices.
摘要:
In response to a user sending an electronic mail message to a recipient, a whitelist manager creates a temporary whitelist entry for the recipient on the user's whitelist. The temporary whitelist entry is set to expire after a set period of time. During the period of time that the temporary whitelist entry is in effect, electronic mail messages from the recipient are passed to the user without being subject to security screening. The whitelist manager keeps track of email traffic between the user and the recipient during this time period. If the nature of this email traffic is sufficient to establish that the recipient is legitimate, the whitelist manager converts the temporary entry to a permanent one. Otherwise, the whitelist manager disables the temporary entry, after which email from the recipient to the user is subject to normal security processing.
摘要:
Computer-implemented methods and systems for detecting and automatically installing missing software components are disclosed. In one example, an exemplary method for performing such a task may comprise: 1) detecting a failed attempt by a process to load a shared object, 2) identifying the shared object requested in the failed attempt, 3) automatically obtaining the shared object from a network-accessible storage device, 4) installing the shared object on the computing device, and then 5) successfully loading the shared object.
摘要:
Applications are instrumented to gather usability information. The gathered usability information is analyzed. This analysis can identify, for example, unused or infrequently used features, very frequently used features or features that users have trouble utilizing. Based on the analysis, determinations are made as to modifications to make to the applications. The modifications can be executed by the same instrumentation used to gather the usability data.
摘要:
Methods, apparati, and computer-readable media thwart a phishing attack on a recipient of an electronic message by intercepting the electronic message; extracting a sender domain name from the electronic message; identifying remote links associated with the electronic message; comparing the identified remote links against a pre-established set of acceptable domains, using the extracted sender domain name as an index; and when at least one extracted remote link is not found in the pre-established set of acceptable domains, preventing the message from being delivered to the recipient.