摘要:
Embodiments of a feedback-driven malware detector are directed to protecting a computer from programs that perform actions that are malicious or not expected by a user. In one embodiment, the feedback-driven malware detector performs a method that initially determines whether the state of an application program scheduled to be added to an extensibility point on a computer is already known. If the state of the object is not already known, the user is informed that an application program is being installed on the computer and that the application program is being added to an extensibility point. Then, input is obtained from the user that assists in determining whether the application program is malware.
摘要:
Generally described, a method, software system, and computer-readable medium are provided for efficiently collecting data this useful in developing software systems to identify and protect against malware. In accordance with one embodiment, a method for collecting data to determine whether a malware is propagating in a networking environment is provided. More specifically, the method includes receiving preliminary data sets at a server computer from a plurality of client computers that describes attributes of a potential malware. Then a determination is made regarding whether secondary data is needed to implement systems for protecting against the potential malware. If secondary data is needed, the method causes the secondary data to be collected when an additional preliminary data set is received from a client computer.
摘要:
A system and method for identifying and removing potentially unwanted software. A mechanism is provided that identifies suspect programs to a user and allows the user to prevent the suspect programs from running without actually deleting them. In one embodiment, scanner data identifying potentially unwanted software is displayed in a GUI that allows the user to inhibit its continued execution. For example, any software not on a list of known, benign applications/processes may be identified as potentially unwanted. Similarly, software that displays one or more suspect behaviors may be so identified, allowing the user to distinguish between normal and suspect software without irreversibly altering the user's system.
摘要:
Systems and methods are described relating to detecting an indication of at least one attribute of an individual; accepting sensor data about the individual; and presenting a set of health care options at least partially based on the detecting an indication of at least one attribute of the individual and the accepting sensor data about the individual.
摘要:
Systems and methods are described relating to accepting an indication of at least one attribute of an individual; accepting sensor data about the individual; and presenting a set of health care options at least partially based on the accepting an indication of at least one attribute of the individual and the accepting sensor data about the individual.
摘要:
A computationally implemented method includes, but is not limited to: selecting at least one hypothesis from a plurality of hypotheses relevant to a user, the selection of the at least one hypothesis being based, at least in part, on at least one reported event associated with the user; and presenting one or more advisories related to the hypothesis. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure.
摘要:
A computationally implemented method includes, but is not limited to: acquiring one or more relevant reported aspects associated with one or more source users that are relevant to achieving one or more target outcomes, the acquisition of the one or more relevant reported aspects being based, at least in part, on relevancy of the one or more relevant reported aspects with respect to the achievement of the one or more target outcomes; and developing one or more personalized plans designed to facilitate an end user to achieve the one or more target outcomes when one or more emulatable aspects indicated by the one or more personalized plans are emulated, the development of the one or more personalized plans being based, at least in part, on the acquiring In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure.
摘要:
A computationally implemented method includes, but is not limited to: acquiring a first data indicating at least one reported event as originally reported by a user and a second data indicating at least a second reported event as originally reported by one or more sensing devices; and developing a hypothesis based, at least in part, on the first data and the second data. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure.
摘要:
A computationally implemented method includes, but is not limited to: selecting at least one hypothesis from a plurality of hypotheses relevant to a user, the selection of the at least one hypothesis being based, at least in part, on at least one reported event associated with the user; and presenting one or more advisories related to the hypothesis. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure.
摘要:
A computationally implemented method includes, but is not limited to: acquiring subjective user state data including data indicating at least one subjective user state associated with a user; soliciting, in response to the acquisition of the subjective user state data, objective occurrence data including data indicating occurrence of at least one objective occurrence; acquiring the objective occurrence data; and correlating the subjective user state data with the objective occurrence data. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure.