Sign up
Matches 1 - 50 out of 98 1 2 >

AcclaimIP-ad

Match Document Document Title
US20120290848 Emulating Mixed-Code Programs Using a Virtual Machine Instance  
The subject disclosure is directed towards a technology for efficiently emulating program code that is protected by one or more various code virtualization techniques to detect the presence of...
US20110219238 Method and System for Detecting Malware Using a Remote Server  
The present disclosure is directed to a method and system for detecting malware using a remote server. In accordance with a particular embodiment of the present disclosure a hash value for a file...
US20060112281 Anti virus device  
Anti virus device is an electric mechanical circuitry to protect the hard disks of computers from virus, hooked up to the hard disk, with electric mechanical selection for the hard disk protected...
US20060015942 Systems and methods for classification of messaging entities  
Methods and systems for operation upon one or more data processors for assigning a reputation to a messaging entity. A method can include receiving data that identifies one or more characteristics...
US20050050334 Network traffic management by a virus/worm monitor in a distributed network  
A network level virus monitoring system capable of monitoring a flow of network traffic in any of a number of inspection modes depending upon the particular needs of a system administrator. The...
US20120159181 Virus Localization Using Cryptographic Hashing  
Methods for using integrity checking techniques to identify and locate computer viruses are provided. A method for virus localization for each of three types of virus infections is provided,...
US20100313035 Anti-virus trusted files database  
A method and apparatus for populating a trusted files database for an anti-virus application. A determination is made from several files stored in a file system of a set of files likely to be...
US20070079377 Virus scanning in a computer system  
The present invention provides a method, data processing system and program product in which scanning for a virus is improved by prioritizing the scan of executable files, such as applications,...
US20070044154 Mail reception system  
There is provided a mail reception system in which a mail relay device is communicatably connected to a virus check device. In the system, the mail relay device comprises a data reception unit to...
US20060230288 Source code classification method for malicious code detection  
A classification mechanism within the source code management system for customizing malicious code searches. This classification mechanism is used to limit the number of searches that are performed...
US20110004770 ENCRYPTION SYSTEM THAT PREVENTS ACTIVATION OF COMPUTER VIRUSES  
System for preventing activation of computer viruses operates in such a way that all executable files must be kept separated from other files and encrypted when written to Hard Disk Drive or Solid...
US20060095966 Method of detecting, comparing, blocking, and eliminating spam emails  
A method of detecting, comparing, blocking, and eliminating spam emails sent through email servers of Internet service providers (ISPs) or to email users' email-boxes. The method includes the steps...
US20070016955 Practical threat analysis  
The following subject matter provides a computer-implemented method and system for calculation of cost-effectiveness of countermeasures in mitigating the threats on a system through calculating...
US20070118759 Undesirable email determination  
Included is a method for preventing spam dissemination. The method can include monitoring an Internet communication by a user, determining whether the monitored Internet communication includes a...
US20050251862 Security arrangement, method and apparatus for repelling computer viruses and isolating data  
A security system, method and apparatus for repelling computer viruses and isolating data. The security system includes sub-systems 1-3, which sub-system 1 includes an addition to anti-virus...
US20060005043 Method of scanning computer virus within internet packet  
Disclosed is a method of scanning computer virus within internet packets, where a TSR anti-virus program that is stay-resident in the internet equipment at user's site, which anti-virus program is...
US20060277605 Displaying a security element to help detect spoofing  
A security element is displayed that provides information to a user to help ensure that they are not confused or misled into believing that content originates from a trusted source when in fact it...
US20070094735 METHOD TO CONSOLIDATE AND PRIORITIZE WEB APPLICATION VULNERABILITIES  
This invention relates to a method for consolidating and prioritizing web application vulnerabilities. Specifically, this invention relates to a method for consolidating the root causes for...
US20060294590 Automated immune response for a computer  
Systems, methodologies, media, and other embodiments associated with making an automated immune response on a computer that may be infected with a malicious software like a virus are described. One...
US20050240781 Prioritizing intrusion detection logs  
A method for displaying an alert log including one or more alerts, the method including prioritizing the one or more alerts according to an importance of each of the one or more alerts and...
US20060236398 Selective virus scanning system and method  
A virus scanning system and method. A system is provide that includes: a full scanning system for performing a full scan of each file in a file system; a file inventory system for inventorying each...
US20110167275 MALWARE DETECTION METHOD AND APPARATUS  
According to a first aspect of the present invention there is provided a malware detection method implemented within a computer. The method includes, for a given electronic file, determining if the...
US20070289018 RESOURCE INDICATOR TRAP DOORS FOR DETECTING AND STOPPING MALWARE PROPAGATION  
A method and system for detecting and stopping malware propagation using false resource entries is provided. A detection system uses trap door entries that are intentionally inserted into resource...
US20070143841 Defense device, defense method, defense program, and network-attack defense system  
A repeater selecting unit selects at least one repeater that becomes a notification destination of route information for routing a malicious packet through a defense device, from among a plurality...
US20050120230 System for preventing a computer virus accessing email addresses  
A system for preventing a computer virus from accessing message addresses is described. The system comprises an interception component or client plug-in that communicates with a messaging client...
US20060212942 Semantically-aware network intrusion signature generator  
An automatic technique for generating signatures for malicious network traffic performs a cluster analysis of known malicious traffic to create a signature in the form of a state machine. The...
US20050050337 Anti-virus security policy enforcement  
In a first embodiment, in a distributed network having a number of server computers and associated client devices, method of enforcing an anti-virus security policy is described. The method is...
US20060161987 Detecting and remedying unauthorized computer programs  
Spyware may be detected by using a detection agent in a communications network to monitor one or more communication streams from one or more clients. An indication of spyware residing on a suspect...
US20050015606 Malware scanning using a boot with a non-installed operating system and download of malware detection files  
A computer 2 is booted with a removable physical media 10 which bears a clean non-installed operating system. Network support code is also loaded from the removable physical media 10 and used to...
US20060265598 Access to a computing environment by computing devices  
A method for managing access to a computing environment by a computing device includes providing at least one credential that identifies both the computing device and a user of the computing...
US20050262559 Method and systems for computer security  
A method for computer security, includes intercepting an incoming communication, placing the communication into a quarantine queue; selecting a communication from the quarantine queue, determining...
US20060156397 A New Anti-spy method without using scan  
Various known ways to make a Spyware are analyzed and countered. Spy-ware works by replacing the function address/value/body of certain Windows APIs with its own spying code. The Anti-spy invention...
US20100005291 APPLICATION REPUTATION SERVICE  
The claimed subject matter is directed to the use of an application reputation service to assist users with minimizing their computerized machines' exposure to and infection from malware....
US20050268112 Managing spyware and unwanted software through auto-start extensibility points  
A monitoring service is provided that detects spyware or other unwanted software at the time it is installed and/or allows for the spyware's removal. The service monitors “Auto-Start E...
US20110231669 Computer Virus Protection  
A network is protected from e-mail viruses through the use of a sacrificial server. Any executable programs or other suspicious parts of incoming e-mail messages are forwarded to a sacrificial...
US20050193429 Integrated data traffic monitoring system  
The present invention includes an integrated data traffic monitoring system monitoring data traffic received from a communication network and destined for a protected network. The monitoring system...
US20070039053 Security server in the cloud  
Apparatus and methods for providing proxy and security services to one or more users via a publicly accessible network (e.g. the Internet) are disclosed Upon receiving a user request for content...
US20070226803 System and method for detecting internet worm traffics through classification of traffic characteristics by types  
A system and method for detecting Internet worm traffics through classification of traffic characteristics by types is disclosed. The system and method defines Internet worm as a characteristic...
US20060117387 Propagation protection of email within a network  
Described are methods and apparatus, including computer program products, for propagation protection within a network. A network appliance repeatedly stores received portions of data associated...
US20070136814 Critical function monitoring and compliance auditing system  
A system and method for monitoring, auditing and flagging compliance issues or other user defined exceptions with user defined systems for internal monitoring of adherence to critical functions and...
US20060230289 Source code management method for malicious code detection  
A system and method for enhancing source code management by using existing virus detection methods in a library management system to detect potentially malicious code. With the mechanism of the...
US20070192859 Architecture for identifying electronic threat patterns  
The invention is a comprehensive conceptual and computational architecture that enables monitoring accumulated time-oriented data using knowledge related to the operation of elements of a computer...
US20050172140 Encryption device, encryption system including the encryption device, decryption device and a semiconductor system including the decryption device  
A data/code conversion device receives confidential information, converts the confidential information into instruction codes for making a CPU provided in a semiconductor device perform its...
US20050091538 Method, a network protection means, a network node, a network, and a computer software product for disinfection  
The invention relates to a method for screening and disinfecting a communication network for viral infection, the communication network comprising interconnected network nodes and a designated...
US20060136722 Secure communication system and communication route selecting device  
A communication system for realizing a secure communication comprises a selecting device for making a selection between a communication route for a direct communication with a communication partner...
US20070101424 Apparatus and Method for Improving Security of a Bus Based System Through Communication Architecture Enhancements  
A security policy associated with a system is evaluated. The system includes a communication bus having a data bus and a plurality of components interconnected via the communication bus. The system...
US20070214503 Correlation engine for detecting network attacks and detection method  
A method for detecting network attacks is provided. In one implementation, the method receives a plurality of attack indications based on data transmitted on the network and applies rules to the...
US20050210272 Method and apparatus for regulating unsolicited electronic mail  
A method and apparatus for preventing unsolicited electronic mail from unwanted or illegitimate commercial entities while allowing legitimate commercial entities, subject to compliance with a...
US20070094734 MALWARE MUTATION DETECTOR  
A method for classifying polymorphic computer software by extracting features from a suspect file and comparing the extracted features to features of known classes of software.
US20060130143 Method and system for utilizing informaiton worms to generate information channels  
Provided are methods and systems that facilitate automated networked distribution of information. In particular, a plurality of information worms are evaluated, one or more of the information worms...
Matches 1 - 50 out of 98 1 2 >