摘要:
A method for receiving verification that a source is authorized to provide mobile-computing-device policies for a first physical location. The method may include receiving a first mobile-computing-device policy and identifying the first physical location. The method may also include associating the first mobile-computing-device policy with the first physical location and implementing, based on the verification, the first mobile-computing-device policy at the first physical location. Systems and computer-readable media for verifying that a source is authorized to provide mobile-computing-device policies for a first physical location are also disclosed.
摘要:
Methods, apparati, and computer-readable media for regulating a user's access to a Web page. A method embodiment of the present invention comprises the steps of hashing (31) a URL associated with a Web page requested by the user; comparing (32) the hashed URL with a list (24) of pre-stored URL hashes; and granting (34) or denying (37) access to the requested Web page based upon results of the comparing step (32).
摘要:
Computer-implemented methods and systems for circumventing malicious attempts to block the installation of security-software programs are disclosed. An exemplary method for performing such a task may comprise: 1) detecting, during installation of a security-software program, an error that is indicative of an attack on the security-software program, 2) identifying at least one executable file targeted by the attack on the security-software program, 3) circumventing the attack by dynamically obfuscating the executable file targeted by the attack, and then 4) completing installation of the security-software program.
摘要:
Nonsense words are removed from incoming emails and visually similar (look-alike) characters are replaced with the actual, corresponding characters, so that the emails can be more accurately analyzed to see if they are spam. More specifically, an incoming email stream is filtered, and the emails are normalized to enable more accurate spam detection. In some embodiments, the normalization comprises the removal of nonsense words and/or the replacement of look-alike characters according to a set of rules. In other embodiments, more and/or different normalization techniques are utilized. In some embodiments, the language in which an email is written is identified in order to aid in the normalization. Once incoming emails are normalized, they are then analyzed to detect spam or other forms of undesirable email, such as phishing emails.
摘要:
Files to be installed on a computer system are streamed from an archive as the archive is being extracted directly to one or more final destination locations on the computer system.
摘要:
A system for generating customized badges. The system includes a computer, a printer coupled to the computer, a display coupled to the computer, and a computer readable medium. The computer readable medium includes instructions for opening a badge profile, providing a data entry screen based on the profile, receiving data in the data entry screen, and printing customized badges on the printer based on the received data. The badge profile defines a size, type, and location of data to be printed on the customized badges.
摘要:
A relatively small diameter, relatively deep hole is made in the ground and a sampler tube is inserted therein. An acetate sleeve is detachably inserted into a chamber on the upper end of the sampling tube and the sampler is left for at least sixteen hours and preferably longer in order to permit radon gas to migrate up the tube. Daughter products of radon deposit on the acetate film which is then placed in a scintillation cell attached to the counting chamber of a scintillation counter, which counts the alpha emissions of the daughter products thereby permitting the amount of radon gas to be calculated. This method reduces considerably any contamination of the scintillation counting chamber so that cleansing is not necessary thus permitting a much higher level of productivity. The system is also totally insensitive to thoron so that no correction for thoron signals is required. The same method can be used to collect airborne samples by hanging the acetate strip in a desired location for at least four hours and counting alpha emissions from said strip as above.
摘要:
A system for generating customized badges. The system includes a computer, a printer coupled to the computer, a display coupled to the computer, and a computer readable medium. The computer readable medium includes instructions for opening a badge profile, providing a data entry screen based on the profile, receiving data in the data entry screen, and printing customized badges on the printer based on the received data. The badge profile defines a size, type, and location of data to be printed on the customized badges.
摘要:
A method may include receiving a request to install a second version of a software product over a first version of the software product, installing the second version of the software product in a dormant state while the first version of the software product is running, and swapping the first and second versions of the software product by activating the second version of the software product and deactivating the first version of the software product. Various other methods, systems, and computer-readable media are also disclosed.
摘要:
A sensor head for a dry powder agent according to an exemplary aspect of the present disclosure includes a housing defined along an axis along which light is communicated, the housing defines a multiple of apertures transverse to the axis, the multiple of apertures in communication with a measurement volume along the axis. A mirror is within the housing to reflect the light through the measurement volume.