摘要:
Graphic screen names are used instead of using text screen names in a Web chat room or an instant messaging system so that screen scrapers cannot generate an e-mail list for spam by extracting the screen names from the Web chat room or instant messaging system.
摘要:
Graphic screen names are used instead of using text screen names in a Web chat room or an instant messaging system so that screen scrapers cannot generate an e-mail list for spam by extracting the screen names from the Web chat room or instant messaging system.
摘要:
Graphic screen names are used instead of using text screen names in a Web chat room or an instant messaging system so that screen scrapers cannot generate an e-mail list for spam by extracting the screen names from the Web chat room or instant messaging system.
摘要:
Graphic screen names are used instead of using text screen names in a Web chat room or an instant messaging system so that screen scrapers cannot generate an e-mail list for spam by extracting the screen names from the Web chat room or instant messaging system.
摘要:
A method of estimating a location of a wireless device providing a wireless attack. The method includes disposing a number of sniffers in a geographic region and receiving a number of wireless signals at one or more of the number of sniffers. The method also includes processing the number of wireless signals to identify a subset of the number of wireless signals that are associated with the wireless device and determining a number of received signal strengths associated with the subset of the number of wireless signals. The method further includes providing an estimation of the location of the wireless device utilizing the determined received signal strengths associated with the subset of the number of wireless signals.
摘要:
A method for disrupting unauthorized communications between at least two communication devices is provided. The method comprises using an address resolution protocol (ARP) to redirect transfer of data that occurs using unauthorized wireless communication between a first wireless device and a second wireless device. In a preferred embodiment, the method maintains a layer two wireless link while the data are being redirected.
摘要:
A method for disrupting unauthorized communications between at least two communication devices is provided. The method comprises using an address resolution protocol (ARP) to redirect transfer of data that occurs using unauthorized wireless communication between a first wireless device and a second wireless device. In a preferred embodiment, the method maintains a layer two wireless link while the data are being redirected.
摘要:
Client side program code examines electronic documents such as web pages and automatically fills out fields of forms contained in the document with the appropriate data from a user profile, without requiring prior mapping or examination of the form. The application maps user data to the appropriate form field by examining label text on the form as the user sees it, i.e. text that is visually nearest the field. For fields lacking labels, the application examines the field context to determine the required data. To enter the information in the correct format, the application parses visual hints concerning, for example, the date format provided to the user and formats the data accordingly. In the absence of any usable visual cues or contextual information, the program code parses the form's underlying markup code.
摘要:
A method and system of automating capture of electronic data provide a user with an effective universal Internet identity and e-mail address, comprehensive e-mail filtering and forwarding services, and e-receipt identification and data extraction. Detailed user e-mail preferences data stored at a central server may be selectively altered such that incoming correspondence is redirected in accordance with the user's preferences. Computer program code at the central server parses incoming e-mail header information and data content, selectively extracts data from identified types of correspondence, and forwards extracted data in accordance with user preferences data. Additional computer program code may manipulate the extracted data in accordance with format requirements and display the manipulated data to a user in a desired format.
摘要:
A method and system of implementing recorded data for automating interactions which occur across the Internet includes storing data at a central Web server adapted for maintaining a database. Responsive to a program script requesting data, computer program code at the central Web server selectively extracts stored data from the database, manipulates the data in accordance with the request, and supplies the manipulated data in a desired format.