摘要:
Private information is frequently made public or semi-public, often without foresight as to the consequences of such a divulgence. Additionally, intentionally divulged information that is intended to be maintained as private is routinely sold to advertisers and information brokers. Example embodiments of the present invention relate to a method, an apparatus and a computer-program product for encrypting privacy-related information in a data stream. The method includes receiving a data stream transmitted from a source. A contextual analysis is then performed on the content of privacy-related portions of the data stream. The privacy-related portions of the data stream are then encrypted according to the contextual analysis before being forwarded to the intended destination.
摘要:
Example embodiments of the present invention provide a method, an apparatus and a computer program product for cookie anonymization and rejection. The method includes receiving a cookie included in a data stream transmitted from a source intended for a destination. A lexical analysis of the cookie included in the data stream is then performed to determine state information associated with the cookie. The state information associated with the cookie then may be forwarded to the destination according to the lexical analysis. Example embodiments of the present invention specifically targets cookies and beacons that flow through a system, and historically track cookie and beacon traffic in order to perform drill-down inspection on the contents. This inspection allows for detection of sensitive information such as credit cards, location, and any other personal info, as well as the potential presence of malware which is performing unusual behavior within the private system.
摘要:
Detecting computer viruses includes providing a disk space having at least a portion that is partitioned into separate segments, each segment being accessed by at least one of a plurality of hosts. A first one of the segments is accessed using a different file system than a second one of the segments. An antivirus unit scans at least part of the disk space for viruses. The part of the disk space that is scanned by the antivirus unit includes at least some parts of the first and second segments. The first and second segments may correspond to different physical portions of the disk space. The first and second segments may or may not overlap. The first and second segments may correspond to logical entities. Part of the disk space that is scanned by the antivirus unit may correspond to particular types of files stored in the disk space. The disk space that is scanned by the antivirus unit may correspond to files that have been modified since a previous virus scan.
摘要:
There is disclosed a method for use in managing databases in data storage systems comprising a plurality of nodes. A request is received to provision storage for a specified application intending to use a database. Based on application-awareness, the storage system is provisioned for storing the database in response to receiving the request. Database tables are distributed across the nodes based on a forecasted first I/O profile between application and database. Information is captured in connection with the activity between the application and database. A second I/O profile is determined based on the captured information. The second I/O profile is an actual in-running I/O profile between application and database. The first I/O profile and second I/O profile are compared. The database tables are re-organized on the nodes based on the comparison identifying a discrepancy between first and second I/O profiles such that storage system is rebalanced.
摘要:
Example embodiments of the present invention relate to a method, an apparatus and a computer-program product for man-in-the-middle agent-assisted client filtering. An example method to be performed by the man-in-the-middle includes receiving portions of a data stream transmitted from a source and performing an analysis of the portions of the data stream. Based on the analysis, the man-in-the-middle then may interact with the source. An example method to be performed by an agent at the source includes providing portions of a transmitted data stream to the man-in-the-middle and interacting with the man-in-the-middle.
摘要:
A system, computer-implemented method, and a computer program product for configuring a requirements model for a cloud computing space includes defining a list of available system capabilities within the cloud computing space. A user is allowed to define one or more user requirements chosen from the list of available system capabilities. The one or more user requirements are associated with one or more hardware/software requirements. A cloud computing solution is configured based, at least in part, upon the one or more user requirements and the one or more hardware/software requirements.
摘要:
Example embodiments of the present invention relate to a method, an apparatus and a computer-program product for friendly man-in-the-middle data stream correlation. An example method includes receiving a data stream transmitted from a source intended for a destination. A contextual analysis of portions of the data stream then may be performed, with respective portions of the data stream being correlated according to the contextual analysis.
摘要:
Scanning a storage device for viruses includes determining physical portions of the storage device that have been modified since a previous virus scan and scanning at least parts of the physical portions for viruses. The physical portions may correspond to tracks of the storage device, sectors of the storage device, and/or to subportions of the storage device. Determining the physical portions of the storage device that have been modified may include creating a table that is indexed according to each of the portions and has entries indicating whether a corresponding one of the portions has been modified, the entries being cleared after a virus scan to indicate that no portions have been modified and setting a specific one of the entries in response to a corresponding one of the portions of the storage device being subject to a write operation. Creating the table may include copying an other table provided by the storage device and/or using an other table provided by the storage device.
摘要:
Example embodiments of the present invention relate to a method, an apparatus and a computer-program product for implementing digital disappearing ink. An example method includes receiving portions of a data stream transmitted from a source and analyzing the portions of the data stream. Based on the analysis, the method includes performing an action with respect to an object tag according to the analysis.
摘要:
Example embodiments of the present invention relate to a method, an apparatus and a computer-program product for implementing digital disappearing ink. An example method includes receiving portions of a data stream transmitted from a source and analyzing the portions of the data stream. Based on the analysis, the method includes performing an action with respect to an object tag according to the analysis.