摘要:
The present invention is embodied in a system and method for monitoring and alerting remote client users of digital intrusions of their computers by host servers. In general, the present invention monitors actions taken by host servers relating to information about the remote client and displays graphical alerts when a digital intrusion or a breach of security occurs during a network connection, such as a connection to the Internet, with the host server. Specifically, the present invention monitors certain aspects of the remote client user s interaction with host servers. Based on certain interaction, such as an attempt by the host server to retrieve non-related information about the remote client, the remote client user can be provided with a graphical alert. This allows the remote client user to make an informed decision whether or not to allow certain host server sites to retrieve the client user s personal information.
摘要:
For a presentation comprising a plurality of presentation segments, timing is established through the combination of assigning a portion of a total presentation time to each of the plurality of presentation segments, displaying the time assigned to each of said presentation segments, enabling a user to change the time assigned to the segment being presented, and in response to a change in said time, dynamically reapportioning the remaining total time among the subsequent sequential presentation segments. The reapportioned times for said subsequent sequential presentation segments can further be displayed. There may also be means, responsive to the change in the time, for dynamically eliminating one of said sequential segments. In slide presentations, there may be means for displaying the reapportioned times for said subsequent sequential individual slides together with miniaturizations of each of said subsequent sequential individual slides.
摘要:
A method of protecting a data processing system is provided. In a preferred embodiment the data processing system temporarily switches from a main system library mode to a safe system library mode. A user then may open and read a document, such as, for example, an e-mail message, and any virus or worm contained in the document will be prevented from executing and damaging the data processing system.
摘要:
Protecting open Web sites from known malicious users in a World Wide Web (Web) communication network with access to a plurality of open Web sites responsive to requests from users at IP addresses throughout the Web. There is provided in association with a protected open Web site, a stored list of the IP addresses of known malicious users combined with means for comparing the IP addresses of each user requesting access to the protected open Web site to said list of IP addresses of the known malicious users. There are also implementations responsive to the comparing means for diverting to an alias address for the protected Web site any request from the IP address of a malicious user. The alias address is provided by a function associated with the protected open Web site. The present invention is applicable in circumstances where the malicious users or “crackers” are already known.
摘要:
A web browser displays a set of search results from a web search, each search result indicating a link to a web page. Responsive to selection of a first of the set of search results for exclusion from display, a subset of one or more of the set of search results that indicate related links is identified. The related links comprise links have a same domain name as the link of the first search result. The first search result and the subset of the set of search results are excluded. The search results are displayed without the excluded ones of the set of search results.
摘要:
An approach for using a centralized conference call manager is provided for initiating conference calls. Users register with the centralized conference call manager to set up a conference call at a future date and time. When the designated time/date arrive, the centralized conference call manager contacts the various intended attendees using a variety of contact locations (e.g., office telephone, mobile telephone, home telephone, etc.). The system further allows an intended attendee to, when contacted by the centralized conference call manager, provide a different contact number that the conference call manager will use instead. An anticipated attendee can decline the call and provide a verbal reason for not being able to attend. The centralized conference call manager records the reason and, when requested, plays the reason back to the other attendees.
摘要:
Administration of search results including displaying by a browser a set of search results from a web search, each search result containing a link to a web page; selecting a search result for exclusion from display, thereby identifying a selected search result, including selecting for exclusion from display search results containing related links, wherein related links include links related to the link in the selected search result; and displaying the search results without the selected search result and without the search results containing related links.
摘要:
A mechanism for mutual authorization of a secondary resource in a grid of resource computers is provided. When a primary resource attempts to offload a grid computing job to a secondary resource, the primary resource sends a proxy certificate request to the user machine. Responsive to a proxy certificate request, the user machine performs authorization with the secondary resource. If authorization with the secondary resource is successful, the user machine generates and returns a valid proxy certificate. The primary resource then performs mutual authentication with the secondary resource. If the authorization with the secondary resource fails, the user machine generates and returns an invalid proxy certificate. Mutual authentication between the primary resource and the secondary resource will fail due to the invalid proxy certificate. The primary resource then selects another secondary resource and repeats the process until a resource is found that passes the mutual authorization with the user machine.
摘要:
Systems and methods for denying access to a data processing system by an intruder are provided. Input/output (I/O) on the intruder's connection may be taken over and responses mimicking a local terminal session passed back. On an attempted reconnect by the intruder, the user name and password used by the intruder to access the system may be captured. The password may then be changed on the edge system and the intruder's terminal session disconnected, or alternatively, continue to log the intruder's activity.
摘要:
Files, such as HTML files, are managed by performing a permitted command or action initiated on a current file on all its co-requisite files as identified in an extended attribute field stored within the current file. Thus, when an HTML file is emailed or transferred, all requisite files necessary to properly render the web page at the client are assured to be sent. The extended attribute field indicates the parent-child relationship of the co-requisite files and only performs the action on child files. The extended attribute field within the current file also indicates the actions that can be performed on each of its co-requisite files.