Abstract:
Three spinning ring rotors, functioning as concentric ring gyro motors, are angled at ninety degrees with respect to one another and are arranged in an orthogonal association inside a substantially spherical housing that includes a central hub with a plurality of spokes attached to the spherical housing with holes for the spokes and coils used for steering. The mass distribution for the rings is such that the rotating ring masses are maximized and the containing mass is minimized. There is minimum friction for the primary rotation of the spinning ring rotors with all other angular forces translated across the containment structures uniformly. These spinning masses remain equal, unless the influence of precisely controlled and oriented destabilizing steering coils are used to disrupt the stability of one or more rotors by placing a controllable and varying magnetic field, from weak to strong, parallel to the axis of the spinning rotors.
Abstract:
A web application is more efficiently analyzed by intelligently generating attack sequences to be used in the assessment. Rather than simply sending a canned list of static strings at a web application, the operation of the web application is analyzed to determine the filtering and acceptance characteristics of the web site. As this information is ascertained, a vocabulary of allowed symbols is created. This vocabulary is used in the building of attack strings and as such, the number of attack strings fired at the web application is greatly reduced, as well as the number of false positives.
Abstract:
A web application is more efficiently analyzed by intelligently generating attack sequences to be used in the assessment. Rather than simply sending a canned list of static strings at a web application, the operation of the web application is analyzed to determine the filtering and acceptance characteristics of the web site. As this information is ascertained, a vocabulary of allowed symbols is created. This vocabulary is used in the building of attack strings and as such, the number of attack strings fired at the web application is greatly reduced, as well as the number of false positives.
Abstract:
A crawler that is either based on an interactive mode of operation or includes an interactive mode along with one or more other modes, such as automatic or manual. Similar to an automatic mode crawler, the crawler traverses web sites, web content and links. However, if the crawler encounters a structure that requires human interaction, such as a form, a radio button selector, a drop down selector, a human verification test, etc., the crawler pauses and prompts a user to take action.
Abstract:
Three spinning ring rotors, functioning as concentric ring gyro motors, are angled at ninety degrees with respect to one another and are arranged in an orthogonal association inside a substantially spherical housing that includes a central hub with a plurality of spokes attached to the spherical housing with holes for the spokes and coils used for steering. The mass distribution for the rings is such that the rotating ring masses are maximized and the containing mass is minimized. There is minimum friction for the primary rotation of the spinning ring rotors with all other angular forces translated across the containment structures uniformly. These spinning masses remain equal, unless the influence of precisely controlled and oriented destabilizing steering coils are used to disrupt the stability of one or more rotors by placing a controllable and varying magnetic field, from weak to strong, parallel to the axis of the spinning rotors.
Abstract:
A vulnerability assessment tool that is operative to analyze web sites by simultaneously operating a crawling process and an audit process. Once the crawling process is invoked, the results are provided to the audit process. The audit process, rather than waiting until the crawl process is completed, simultaneously audits the web site based on the already provided crawl results. The results of the audit are also fed back to the crawl process to further enhance the crawl.
Abstract:
The inputs of a web application are detected through a technique such as crawling, and then the characteristics of the inputs are determined. The characteristics are determined by identifying how the inputs react to various probes containing varying characters and varying numbers of characters. As such, the characters allowed by the input are identified, the maximum and minimum number of characters that are accepted and the manner in which the characters are treated by the web application. Further characteristics of the inputs are determined by examining the context of the inputs, the markup language associated with the input, the size of the input, etc. The knowledge regarding the input characterizations can be applied in a variety of settings.
Abstract:
A vulnerability assessment tool that is operative to analyze web sites by simultaneously operating a crawling process and an audit process. Once the crawling process is invoked, the results are provided to the audit process. The audit process, rather than waiting until the crawl process is completed, simultaneously audits the web site based on the already provided crawl results. The results of the audit are also fed back to the crawl process to further enhance the crawl.
Abstract:
The present invention is a combination of three interconnected gyroscopic ring-like rotating masses, with each of the three ring-like masses rotating in a separate plane. Each of the three interconnected rotating masses will share substantially the same center of gravity and generate a separate yet interactive kinetic energy and angular momentum in each of the three planes, thereby providing resistance to rotational forces from external sources.