摘要:
A computer file may be scanned for suspicious words 18 occurring within suspicious contexts 20. Thus, messages embedded by malware authors within their malware may be detected. The detection of such embedded messages may be used to identify otherwise unknown items of malware or as a pre-filtering technique for controlling the use of further scanning techniques.
摘要:
A computer file may be scanned for suspicious words 18 occurring within suspicious contexts 20. Thus, messages embedded by malware authors within their malware may be detected. The detection of such embedded messages may be used to identify otherwise unknown items of malware or as a pre-filtering technique for controlling the use of further scanning techniques.
摘要:
A malware detecting system is described in which a client computer 8 sends a file access clearance request to an assessment computer 24 to determine whether or not access is permitted to that file. In this way, the different client computers on a network 2 may share their scan results and centralized control may be provided over access permissions to individual files or groups of files.
摘要:
A naming system, method and computer program product are provided. In use, unwanted code including at least one attribute is identified. In addition, an encoded name is generated for the unwanted code, where at least a portion of the encoded name represents the at least one attribute of the unwanted code.
摘要:
A system, method and computer program product are provided for detecting unwanted data. A scan for unwanted data is performed to generate results of the scan. A context of the scan is then identified. Further, the presence of unwanted data is conditionally indicated based on both the results of the scan and the context of the scan.
摘要:
A system, method and computer program product are provided for detecting unwanted data. A scan for unwanted data is performed to generate results of the scan. A context of the scan is then identified. Further, the presence of unwanted data is conditionally indicated based on both the results of the scan and the context of the scan.
摘要:
A source computer 8 stores updated data that is to be distributed to a plurality of destination computers (12 to 30). The destination computers (12 to 30) are divided into groups sharing a common priority level (5, 4, 3, 2, 1). Each of these groups is then associated with a push update task to be executed by the source computer 8. These push update tasks are then sequentially executed. If a particular group of destination computers exceeds a threshold size, then it may be further divided in accordance with a hierarchy of splitting rules. The push update tasks use multicasting to transfer the update data to the destination computers within their groups in a manner that reduces network traffic.
摘要:
A system, method and computer program product are provided for detecting unwanted data. A scan for unwanted data is performed to generate results of the scan. A context of the scan is then identified. Further, the presence of unwanted data is conditionally indicated based on both the results of the scan and the context of the scan.
摘要:
A system, method and computer program product are provided for translating between Internet Protocols (IP's). Initially, data is received over the Internet utilizing a first IP. Such data is adapted for being processed by an application program. Next, it is determined whether the application program can process data received over the Internet utilizing the first IP. If it is determined that the application program can not process data received over the Internet utilizing the first IP, the data is converted from the first IP to a second IP that the application program is capable of processing.