摘要:
In a computerized method of identifying and displaying messages containing an identifier, where the messages are privately stored for restricted access by a user, the identifier of a document displayed in a navigation area result window is identified. In addition, the message store is scanned to identify messages containing the identifier and the messages identified as containing the identifier are displayed in a messaging area window.
摘要:
In a computerized method of identifying and displaying tags that represent respective identifiers in messages privately stored in a message store for restricted access by a user, at least one document identifier is discovered. The message store is scanned to identify messages containing the at least one document identifier and one or more identifiers in the messages identified as containing the at least one document identifier are identified. In addition, respective tags associated with the one or more identifiers are created and displayed in a tag area.
摘要:
In a computerized method of identifying and displaying messages containing an identifier, where the messages are privately stored for restricted access by a user, the identifier of a document displayed in a navigation area result window is identified. In addition, the message store is scanned to identify messages containing the identifier and the messages identified as containing the identifier are displayed in a messaging area window.
摘要:
A source computer is associated with multiple certificates. The source signs each certificate with a separate private key. From time to time, the source generates (a) new key pair(s) to replace (an) old one(s). The source uses the new private key(s) to sign the associated certificate(s). The source then requests a connection to a destination computer, the request being associated with the multiple certificates which identify the source. The source also transmits the new public key(s). The destination receives the request, and checks the certificates for validity. If less than all but at least a threshold number of the certificates are valid, the destination notes that one or more new public keys are being distributed. The destination accepts the connection, receives the new public key(s) associated with the invalid certificate(s), and replaces the corresponding old public key(s).
摘要:
A method of launching an application in a computer system, the method comprising launching the application in a restricted user account, intercepting at least one request for an operation on a file, the at least one request comes from launching the application, determining whether the at least one file operation request is acceptable, and responsive to the at least one file operation request determined to be acceptable, forwarding the file operation request for the operation on the file on behalf of the application launched in the restricted user account.