摘要:
Successful logins are distinguished from unsuccessful logins, and only when a login is successful are the user's login credentials stored and associated with the appropriate login page. Attempts by a user to login to a login page with a set of login credentials are identified. It is determined whether an attempt to login to a given login page with a set of login credentials is successful. If the attempt by the user to login to the login page with the set of login credentials is successful, the set of login credentials can be stored and associated with the login page. If the attempt fails, the credentials are not saved.
摘要:
Methods, apparatuses, and computer-readable media for automatically generating disposable e-mail addresses. A method embodiment for generating disposable e-mail addresses comprises: monitoring (310) network traffic; detecting (320) the submission of a un-aliased e-mail address to a network destination; seeking (460) authorization to create a disposable e-mail address; creating (375) a disposable e-mail address; associating (380) the newly created disposable e-mail address with the corresponding network destination; and replacing (385) the un-aliased e-mail address with the disposable e-mail address.
摘要:
A parent defines friend rules for on-line association with their child. Upon a request of an on-line stranger to be a new friend of the child, stranger information about the on-line stranger is retrieved and compared to the friend rules to determine whether the stranger is allowed, blocked or restricted from being a friend with the child. Accordingly, the parent only has to use a minimal amount of time in establishing the friend rules to protect the parent's child from on-line strangers.
摘要:
A computer-implemented method for automatically synchronizing online communities may comprise identifying login information for a first user account associated with the first online community, accessing the first user account using the login information for the first user account, obtaining information from the first user account, and modifying, based on the information obtained from the first user account, a second user account associated with a second online community. Corresponding systems and computer-readable media are also disclosed.
摘要:
A computer-implemented method for automatically configuring virtual private networks may include 1) broadcasting by a client on a network to discover a virtual private network server configured to manage virtual private networks, 2) discovering, by the client in response to the broadcast, the virtual private network server, 3) establishing a secure connection between the client and the virtual private network server in response to the discovery, and 4) receiving, by the client from the virtual private network server through the secure connection, configuration settings that enable the client to automatically connect to a virtual private network. Various other methods, systems, and computer-readable media are also disclosed.
摘要:
The number of redundant content items provided to a user by a multi-source feed reader is automatically reduced. Each content item obtained by the multi-source feed reader from each feed to which the users subscribes is analyzed prior to being made available to the user. More specifically, the content items are analyzed to determine whether they are based on source content from different feeds. Each content item is searched for attributes indicating a source on which it is based. Where it is determined that a content item from a first feed is based on source content from a second feed, it is further determined whether the user subscribes to the second feed which the source content is from. If so, the specific received content item from the first feed is not provided to the user.
摘要:
A computer correlates web and email attributes to detect spam. A security module on a client collects attributes of a web site to which an email address was submitted and attributes of an email message sent to the email address that was previously submitted. The security module analyzes the attributes of the web site and the email message to determine whether the email message was sent to the email address responsive to the submission of the email address to the web site. Based on the analysis, the security module determines whether the email message is spam. A machine learning module on a security server establishes training data describing the attributes of the web site to which email addresses were submitted and attributes of legitimate emails received in response to the address submissions. The machine learning module generates an attributes classifier for the security module for spam detection.
摘要:
Computer-implemented methods and systems for simultaneously installing user-input-dependent software packages on multiple devices are disclosed. In one example, an exemplary method for performing such a task may comprise: 1) initiating installation of a software package on each of a plurality of client devices, 2) receiving, from each client device, a visual image generated during installation of the software package that depicts an installation step that requires user input, 3) consolidating the visual images into a consolidated view, 4) displaying, via an installation-management interface, the consolidated view to a user of the computing device, 5) receiving, via the installation-management interface, user input from the user for completing the installation step, and then 6) completing the installation step by sending the user input to each client device.
摘要:
A storage farm is maintained, on which user generated publishable content is stored. Users can copy generated content to the storage farm for automatic publishing to associated target sites. User login information for the plurality of publication sites is maintained, such that the system can use the login information to login to the various publication sites as a given user. The publishable content stored in the storage farm is compared to publishable content published on the associated publication sites. Responsive to finding publishable content on at least one publication site that is not present on the storage farm, that publishable content can be aggregated to the storage farm for future access by the associated user. Responsive to finding publishable content on the storage farm not published on an associated publication site, that publishable content can be automatically published.
摘要:
Method and apparatus managing calls for call-related calendar entries stored on a device is described. In some examples, calendar entries stored in the device are parsed to detect call-related calendar entries. A telephone number associated with each of the call-related calendar entries is extracted. An invocator is provided in the device that is configured to cause the device to dial the telephone number associated with a first call-related calendar entry of the call-related calendar entries that is within a temporal threshold of a current time maintained by the device.