摘要:
In a first embodiment, an information handling system determines whether a resource is likely misrepresented as a trusted resource within a global computer network. In a second embodiment, the information handling system outputs an indication of whether a resource within a global computer network is recognized as a known trusted resource.
摘要:
A system and method for protecting a user against a cross-site scripting attack or other network attack that relies on scripting code embedded within a uniform resource locator (URL) are described. Validation software executing on a client computer system may intercept a URL in response to a user providing the URL to a web browser or other client application. The validation software may analyze the URL to determine whether the URL includes scripting code. If the URL includes scripting code then the validation software may block the client application from accessing the URL or may otherwise inhibit access to the URL.
摘要:
A method and system for remote control of a target computer by a controller computer through a network. The graphic commands issued by the graphic engine of the target computer are "hooked" and translated into a system independent format. The translated commands are then transmitted to the controller computer to be replayed on the display. The independency from the operating system is realized by defining a protocol which is used to translate a subset of the graphic commands in the target computer before the transmission to the controller computer where the commands are re-translated according to the same protocol.
摘要:
A method and system for remote control of a target computer by a controller computer through a network. The graphic commands issued by the graphic engine of the target computer are "hooked" and translated into a system independent format. The translated commands are then transmitted to the controller computer to be replayed on the display. The independency from the operating system is realized by defining a protocol which is used to translate a subset of the graphic commands in the target computer before the transmission to the controller computer where the commands are re-translated according to the same protocol.