摘要:
In an exemplary method, a resident agent receives multiple requests from one or more requesting processes for connections to services. The requested services are hosted by a fast service host. The resident agent establishes multiple connections to the one or more requesting processes for the requested services. The resident agent notifies a single instance of a fast service host of the multiple connections. The resident agent facilitates communication between the requested services on the fast service host and the one or more requesting processes. This may involve establishing one or more routing connections to the fast service host, and routing data between the one or more requesting processes and the requested services on the fast service host.
摘要:
A method for automatically resetting a password is described. A failed login attempt in a system is identified. A failed login condition is determined to be satisfied. A user is prompted about resetting a password if the failed login condition is satisfied. A new password is generated based on user input. The new password is sent to the user via voicemail or email.
摘要:
A method for discovering agents operative on devices configured in a network by broadcasting discovery messages having a common format and containing data to the network devices and receiving reply messages having the same common format and containing data from the agents, and permitting new types of data within the messages without changing the common format.
摘要:
A system for determining a spanning tree for a computer network is disclosed. The system includes a computing device and a computer-readable medium. The computer-readable medium is part of the computing device or is in electronic communication with the computing device. The computer-readable medium comprises executable instructions for implementing a method for determining the spanning tree for the computer network. Multicast alias domains from the computer network are discovered. The discovery of communication metrics by the multicast alias domains is coordinated. The communication metrics from the multicast alias domains are determined. A minimum spanning tree for the computer network is constructed by using the communication metrics. The minimum spanning tree is stored and used in computer system administration.
摘要:
A method for managing a computer over a network is disclosed. The method may be implemented by a resident agent on the network. A connection between the resident agent and a sending application may be opened. Application data may be received from the sending application by the resident agent. A header may be received from the sending application by the resident agent. Whether a data package should be sent directly to a receiving application or whether the data package should be sent through a gateway may be determined. If it is determined that the data package should be sent directly to a receiving application, the data package may be sent directly to the receiving application. If it is determined that the data package should be sent through the gateway, the data package may be sent through the gateway.
摘要:
A system for imaging a computer system is disclosed. An administrative computer system includes an image for use with a target computer system and an imaging server for managing imaging processes on other computers. A target computer system includes or is in communication with a computer-readable medium that includes instructions to implement a method for writing the image to a storage device. The target computer system has a hard drive having a file system. The image is received from the administrative computer system. The image is stored on the hard drive of the target computer system without using the file system. The image is written to the hard drive of the target computer system using an imaging tool. The imaging tool uses a temporary file system to access the image. The temporary file system is transparent to the imaging tool.
摘要:
An exemplary method involves receiving a request to process a file comprising computer instructions. The file may be a script, a source code file, a binary file, etc. The method also involves identifying a digital signature embedded in comments within the file. The method also involves attempting to validate the digital signature. If the digital signature is validated, the file is processed. If the digital signature is not validated, the file is not processed. The file may include multiple digital signatures. When this occurs, the file may be processed only if all of the multiple digital signatures are validated. Alternatively, the file may be processed if any of the multiple digital signatures are validated.
摘要:
An exemplary method involves a remote control agent establishing a remote control session with another computer system. In response to the remote control session being established, the remote control agent requests that a monitoring component provide information about activity on the computer system during the remote control session. The monitoring component may be a process monitoring component, a file monitoring component, and/or another type of monitoring component. A logging component creates a log. The monitoring component provides the requested information, and the logging component records the information from the monitoring component in the log.
摘要:
A system for determining a multicast domain for a node on a computer network is disclosed. The system includes a computing device and a computer-readable medium. The computer-readable medium is part of the computing device or is in electronic communication with the computing device. The computer-readable medium comprises executable instructions for implementing a method for determining the multicast domain for the computing device. A destination is obtained that comprises a computer on the computer network. A unique identification is determined for a first router encountered when sending data from the computing device to the destination. A multicast domain identification is prepared based on the unique identification determined. The multicast domain identification is sent to an administrative system on the computer network.
摘要:
A method for detecting unmanaged nodes within a system is described. A flow of data associated with a node is detected, wherein a managed node detects the flow of data. Information relating to the node is discovered. A determination is made whether the node has been previously discovered. The identification of the node is recorded to a list if it is determined the node has not been previously discovered. The identification of the node is transmitted to a management device.