摘要:
An exemplary method for bi-directional detection and removal of network traffic malware may comprise receiving a request for website content, removing any server-directed malware from the content request, transmitting the scrubbed content request to the website's hosting server, receiving the responsive website content, removing and client-directed malware from the content, and transmitting the scrubbed content to the requesting client.
摘要:
An exemplary bi-directional network traffic malware detection and removal system may comprise a scrubbing center running one or more server computer communicatively coupled to a network configured to receive a request for website content, remove any server-directed malware from the content request, transmit the scrubbed content request to the website's hosting server, receive the responsive website content, remove and client-directed malware from the content, and transmit the scrubbed content to the requesting client.
摘要:
An exemplary system for detecting and preventing voice data leakage may comprise one or more servers running a packet payload converter module, a transcript generator module, and a detection logic module. The packet payload converter module may receive VoIP packets, convert them to a digital audio file, and write the digital audio file to a media database. The transcript generator module may read the digital audio file from the media database, convert it to a text file, and write the text file to a transcript database. The detection logic module may read the text file from the transcript database, parse it into a plurality of keywords, determine whether the plurality of keywords contain one or more target keyword, and, if so, transmit a report to an events database.
摘要:
Methods of the present inventions allow for suggesting access permission changes to lock a website. An exemplary method may comprise the steps of scanning a website's root file directory, determining whether folders, files, databases, or database tables in the root directory are static, and transmitting a recommendation to change permissions to “read-only” for each folder, file, database, or database table determined to be static.
摘要:
An exemplary system for providing a network resource address reputation service may comprise a server computer configured to determine whether an event associated with a network resource address matches event signature(s) in network security device(s). If the event matches a signature, a reputation score for the network resource address may be generated. If the network resource address is not present in a first malicious network resource address database, the network resource address in association with the reputation score may be stored in a second malicious network resource address database. If the network resource address is present in the first malicious network resource address database, the reputation score may be modified to indicate a more negative reputation for the network resource address. The network resource address may then be stored in association with the modified reputation score in a second malicious network resource address database.
摘要:
Methods of the present inventions allow for locking a website. An exemplary method may comprise the steps of hosting a website on at least one server communicatively coupled to a network, receiving a request to lock the website, and, responsive to the request, changing access permissions to “read-only” for a directory, folder, file, database, or database table rendering the website functional.
摘要:
The present inventions may be implemented by tools for locking a website. An exemplary system may comprise a server communicatively coupled to a network, wherein the server hosts a website and stores the website's files in one or more folders or directories. An exemplary system also may comprise a website management server (also communicatively coupled to the network) hosting a control panel website configured to receive a request to lock the website and, responsive to the request, change access permissions for the website's files to “read-only.”