Abstract:
The present disclosure provides compositions and methods for treating bacterial infections in a subject. The methods comprise administering a compound that binds a FAD-dependent flavoenzyme and a tetracycline, analog, derivative, or pharmaceutically acceptable salt thereof.
Abstract:
To evade heuristic detection, malware is often designed to trick users into installing the malware by being packaged in a standard installer known to the user's computer for typically installing legitimate software. To prevent removal of the malware, the malware modifies or removes its uninstaller. A security module manages this type of evasion technique by monitoring and detecting installations performed on a computer. The module detects attempts to remove or modify the uninstaller for the application to render the uninstaller incapable of uninstalling the application. The module can intercept and block such attempts, and then analyze the application for malicious code. Where the application is determined to be malware, the module prevents malicious activity. The module can also use the malware's own uninstaller to uninstall the malware from the computer.
Abstract:
The present disclosure provides compositions and methods for treating bacterial infections in a subject. The methods comprise administering a compound that binds a FAD-dependent flavoenzyme and a tetracycline, analog, derivative, or pharmaceutically acceptable salt thereof.
Abstract:
A control method of a vehicle having a motor according to an exemplary embodiment of the present invention can include confirming that a speed of the motor is not 0 and an output torque thereof is 0 in a condition that the vehicle is being operated, confirming that a voltage of the motor converges to a regular value, and accumulating control data for the motor and processing the control data to calculate an offset value of a resolver. Accordingly, the control method of a vehicle effectively determines whether the offset of the resolver is to be compensated without affecting the drivability of the vehicle.
Abstract:
A computer-implemented method for tracing attacks. The method may include identifying a first website and determining that the first website loads an attack remotely through a second website. The method may also include determining that the second website hosts the attack. The method may include performing a security action, such as blocking downloads from the second website, with respect to the second website. The attack may be a drive-by download. Corresponding systems and computer-readable media are also disclosed.
Abstract:
A control method of a vehicle having a motor according to an exemplary embodiment of the present invention can include confirming that a speed of the motor is not 0 and an output torque thereof is 0 in a condition that the vehicle is being operated, confirming that a voltage of the motor converges to a regular value, and accumulating control data for the motor and processing the control data to calculate an offset value of a resolver. Accordingly, the control method of a vehicle effectively determines whether the offset of the resolver is to be compensated without affecting the drivability of the vehicle.
Abstract:
Techniques for identifying misleading applications are disclosed. In one particular exemplary embodiment, the techniques may be realized as a method for identifying misleading applications comprising receiving a request for network data, parsing the request for network data, using a processor, to determine if one or more portions of the request match a suspicious indicator, identifying the suspicious indicator without using a known malware domain or a known malware signature, and performing a specified action in the event one or more portions of the request match a suspicious indicator.
Abstract:
A computer-implemented method for creating customized confidence bands for use in malware detection may include 1) identifying a portal for receiving executable content, 2) identifying metadata relating to the portal, 3) analyzing the metadata to determine what risk executable content received via the portal poses, and then 4) creating, based on the analysis, a confidence band to apply during at least one disposition of executable content received via the portal. Various other methods, systems, and computer-readable media are also disclosed.
Abstract:
The present disclosure relates to a preparation method of a hollow fiber membrane for water treatment that involves preparing a spinning composition including a cellulose-based resin, a poor solvent, a plasticizer, and an organic solvent and then spinning the spinning composition on a nonsolvent to form a hollow fiber membrane. Accordingly, the present disclosure overcomes the drawbacks of the conventional preparation method for hollow fiber membranes and thus provides a nano-filter (NF), reverse osmosis (RO) hollow fiber membrane for water treatment that easily enhances the properties of the separation membrane for water treatment and secures high reproducibility and high efficiency at low costs.
Abstract:
A computer-implemented method for creating customized confidence bands for use in malware detection may include 1) identifying a portal for receiving executable content, 2) identifying metadata relating to the portal, 3) analyzing the metadata to determine what risk executable content received via the portal poses, and then 4) creating, based on the analysis, a confidence band to apply during at least one disposition of executable content received via the portal. Various other methods, systems, and computer-readable media are also disclosed.