摘要:
The present invention includes a dolly assembly having a dolly for holding a container and a lever attached to the dolly, the lever having a first end, a second end and an elbow joining the first and second ends, wherein the second end is adapted to contact a bottom surface of the container and to tilt the container when pressure is applied to the first end.
摘要:
Security software on a client observes a request for a resource from an application on the client and then determines the application's reputation. The application's reputation may be measured by a reputation score obtained from a remote reputation server. The security software determines an access policy from a graduated set of possible access policies for the application based on the application's reputation. The security software applies the access policy to the application's request for the resource. In this way, the reputation-based system uses a graduated trust scale and a policy enforcement mechanism that restricts or grants application functionality for resource interactivity along a graduated scale.
摘要:
A multifunction drum lifter includes a saddle and a plurality of lift arms pivotally connected to the saddle. Each arm includes a working end having at least one lift finger for engaging the chime of a drum to lift the drum. Preferably the lift arms are three in number and each includes a second lift finger for lifting different sized drums. Each lift arm also includes a plug wrench head and an open end wrench head at its working end so that the lift arms can be used as drum wrenches when removed from the saddle. Preferably each arm has a different plug wrench head and open end wrench head from the other lift arms providing an assortment of drum working tools for the user.
摘要:
An enterprise network can have sanctioned and unsanctioned servers on it. Sanctioned servers are approved by an administrator and perform tasks such as web page serving and mail routing. Unsanctioned servers are not approved by the administrator and represent possible security risks. A service monitor accesses one or more metadata sources having information describing the enterprise network, such as domain name system (DNS) records on the Internet. The service monitor analyzes the metadata and creates a security profile for the enterprise network. The security profile identifies the sanctioned servers. The service monitor monitors network traffic for compliance with the security profile, and detects unsanctioned servers on the network. The service monitor reports violations of the profile and informs the administrator of the unsanctioned servers.
摘要:
A “Complete Body Fitness Machine” that provides for a muscle building workout as well as a cardiovascular workout for the total body consists generally of an adjustable seat and two arms on either side, which are adjustable in height and have an infinitely and independently variable resistance possible in either clockwise or counterclockwise rotation. The arms are designed to have several types of mechanisms attached, so as to be able to work with a variety of body parts including, but not limited to, hands, arms, legs, feet, torso, neck and shoulders. When the proper attachment is used, the resistance for each direction of rotation of the arm is set, and the exercise is conducted. Depending on the workout desired, the seat and arms could be adjusted to different positions as well as the seat can be free-moving. This, combined with the fact that the arms can rotate 360-degrees, allows the user to simulate rotational cardiovascular exercises such as cycling, rowing, rotation of the arms in a circular motion (similarly to how the legs rotate in the cycling motion), and even running. The two independent arms are infinitely and separately adjusted for resistance in either rotational direction. This means that the body's natural design of using opposing muscle groups such as the bicep and triceps to bend and straighten the arm can be not only be utilized, but also maximized for efficiency of operation and workout.
摘要:
Security software on a client observes a request for a resource from an application on the client and then determines the application's reputation. The application's reputation may be measured by a reputation score obtained from a remote reputation server. The security software determines an access policy from a graduated set of possible access policies for the application based on the application's reputation. The security software applies the access policy to the application's request for the resource. In this way, the reputation-based system uses a graduated trust scale and a policy enforcement mechanism that restricts or grants application functionality for resource interactivity along a graduated scale.
摘要:
A distributed testing platform tests network traffic filtering rules. A control point receives a network traffic filtering rule and test parameters describing how to test the rule. The control point distributes the rule and parameters to a plurality of testing nodes. The testing nodes are located on a network at locations where they receive a variety of different network traffic. The testing nodes test the rule against traffic received by the nodes according to the test parameters. The traffic can include real-time traffic and corpora of traffic designed to test different types of rules. The testing nodes return test results describing the testing to the control point. The control point analyzes the test results to determine the accuracy and performance of the rule.
摘要:
A drum plug and faucet wrench includes an elongated body having first and second opposite ends, with each end having at least one drum plug drive element. Preferably at least three drive elements are included. Each plug drive element is configured differently from the other drive elements so that the tool can be used on a variety of plug types. The body has at least one flange projecting therefrom with at least two open end wrench heads formed in the flange. Each open end wrench head is of a different size from the other. One open end wrench head can be sized for use with drum faucets while the other can be sized for use with drum ring bolts.