摘要:
A method of reducing the window of malicious exploitation between vulnerability publication and the installation of a software patch. One or more probe points are inserted into a code path in an application (or operating system if applicable) that contains one or more vulnerabilities (or coding errors). The probe points mark locations of the security vulnerabilities utilizing software interrupts to enable the original code base of the code path to remain unmodified. A probe handler utility subsequently monitors the execution of the code path and generates an alert if the execution reaches a probe point in the code path, thus indicating whether the application exhibits a particular vulnerability. The probe handler selectively performs one of multiple customizable corrective actions, thereby securing the application until an applicable software patch can be installed.
摘要:
A method of reducing the window of malicious exploitation between vulnerability publication and the installation of a software patch. One or more probe points are inserted into a code path in an application (or operating system if applicable) that contains one or more vulnerabilities (or coding errors). The probe points mark locations of the security vulnerabilities utilizing software interrupts to enable the original code base of the code path to remain unmodified. A probe handler utility subsequently monitors the execution of the code path and generates an alert if the execution reaches a probe point in the code path, thus indicating whether the application exhibits a particular vulnerability. The probe handler selectively performs one of multiple customizable corrective actions, thereby securing the application until an applicable software patch can be installed.
摘要:
A method, system, and program provide for voice mail management. A voice mail filtering controller calculates a separate Bayesian score for each voice mail message from among multiple voice mail message entries received into a voice mailbox for a user, wherein each separate Bayesian score indicates a probability that the associated voice mail message is unwanted by said user. During playback, the voice mail filtering controller automatically deletes a selection of the voice mail messages each with a separate Bayesian score greater than a particular Bayesian score of the last played voice mail message from the voice mailbox.
摘要:
A system and method for efficiently reinstalling computer software, which tracks frequency of utilization for each software application loaded onto the computer and reinstalls applications based on frequency of utilization, with the option to reinstall a computer operating system first or to reinstall computer applications along with libraries, so that computer users can resume working as soon as possible instead of waiting many hours for the entire reinstallation image to complete before a computer system reboot allows for continuation of computer usage.
摘要:
A method, system and apparatus provide for automatic blogging of media viewing using an enhanced remote controller having networking capabilities that support social networking and blogging. The enhanced remote controller, suitable for use while viewing media programming and content, allows a viewer to autoblog about currently experienced media programming in real-time without having to resort to direct interaction with a computer to perform the autoblogging. The enhanced remote controller allows the viewer to both communicate with a blogging server, and thus to a blogging service, as well as to display responses to and from other bloggers with whom the viewer is communicating. These blog communications may be accomplished without the viewer having to leave the broadcast receiver of the television.
摘要:
A method of avoiding virtual world fatigue by generating an active avatar in an avatar wallet. The method includes creating and storing an active avatar in the avatar wallet, selecting target worlds for the active avatar to visit, modifying the initial appearance, the user information, the contact map and the characteristic sharing information of the active avatar in accordance with user preferences with respect to each of the target worlds so as to generate a version of the active avatar for each of the target worlds, and initiating a submission of a version of the active avatar to the corresponding target world such that the version is automatically tailored to allowable avatar properties of the corresponding target world.
摘要:
In an E-commerce method for selling digital content over the Internet an FTP-like protocol is provided to carry out the delivery (download) of a purchased digital content item from a server computer to a client computer operated by the purchaser. The FTP-like communication protocol provides for error recovery during the download that does not require restarting the download from the beginning. After the download is completed the integrity of the downloaded file is checked. And the result of the check is communicated to the server which records that the digital content item has been successfully delivered to the purchaser.
摘要:
A method and system are provided to classify and convey data to satisfy a client request. The classification system is a two dimensional data classification system, including a first dimension pertaining to subject matter and a second dimension pertaining to data security. A partition is dynamically created, and data that satisfies the request populates the created partition to convey parsed data based satisfying both dimensions of the request.
摘要:
A system, method and computer program product for providing notification of nefarious remote control of a data processing system are disclosed. The method includes, in response to determining that a received email message contains an item of spam content, noting a source of the received email message to a harm database to increment a harm counter and, in response to determining that the harm counter has exceeded a harm threshold, notifying a designated administrator for said source.
摘要:
E-commerce web page forms contain an encrypted and encoded string, which contains basic information about a product for sale on the web page. Optional product data (e.g. size, color) is selected by an online shopper and transmitted with the basic information when the form is submitted to a cash register server. The form may also contain store ID information which is used to the look up the secret string needed to decrypt the product information. A method for generating the encrypted encoded string for use in the web page is described. Confidentiality is provided with regard to purchases over the Internet.