Virus that blocks google


















It will also be appreciated that the file system driver [] 12 typically receives all file access traffic, and not only that relating to hard disk access. It will also be appreciated that the file system driver [] 12 and file system 9 along with applications 8 and GUI 4 can be those related to hand held, cell phone, PDA, digital camera, digital storage, or other devices containing a method to process electronic data as described above.

It is also appreciated that keyboard 3 can be any input device such as a cell phone keypad, microphone, or other electronic interface to a computer system or electronic device via wired or wireless connection. In the case of data files in transit or when a complete file is not present or only pieces of a file are available. The file [] 1 is broken into several smaller blocks 8 , 9 , 10 , and 11 , for example, that are computed with unique hash signatures based on their size and location in the file as determined by the file comparator 2.

The database 4 also contains hash signatures of these partial blocks wherein, for instance, the first block of data 8 may be a known and preset percentage or piece of the file 1 under interrogation by start, end, and size of the partial file. The database 4 contains a complete hash for the file 1 as well as hash signatures for partial blocks 8 , 9 , 10 , and 11 , etc. The file comparator 2 interrogates the database to set starting and ending locations of known blocks of data to determine if itheata atis located the begging of a file 1 such as or the end such as Thus the comparator 2 can compute a hash and compare the hash for the partial file or block of data 8 , 9 , 10 , or 11 f d match it with the appropriate signature location inside the database 4.

A method of screening a software file for viral infection, the method comprising: defining a database of known infected file signatures;. A method according to claim 1 , wherein a match of signatures between the screened file and said database results in an action affecting the said screened file. A method according to claim 1 , wherein the result of a non matching signature between the screened file and said database results in an action affecting the said screened file.

A method according to claim 1 , wherein the result of a non matching signature between the screened file and said database results in an action affecting the said database. A method according to claim 1 , wherein a match of signatures between the screened file and said database results in an action affecting the database.

A method according to claim 1 , wherein a match of signatures between the screened file and said database results in an alert or notification to a user of a local computer system. A method according to claim 6 , wherein the said computer system is connected via an electronic link to a remote central computer. A method according to claim 2 , wherein a said action is an electronic quarantine of said matched file.

A method according to claim 1 , wherein said database is updated via an electronic link between a computer hosting the database, where the scanning of the file is performed, and a remote central computer. A method according to claim 1 , wherein said database contains a flag set in memory to quarantine said screened files. A method according to claim 1 , wherein said database contains a flag set in memory to release quarantined files.

A method according to claim 1 , wherein said database contains a flag set in memory to erase said files. A method according to claim 10 , wherein said flag can be updated by remote software via an electronic link to end user computers. A method according to claim 11 , wherein said flag can be updated by remote software via an electronic link to end user computers.

A method according to claim 12 , wherein said flag can be updated by remote software via an electronic link to end user computers. A method according to claim 10 , wherein said flag can be updated by a network manager and flag updates made by the network manager are communicated to network end user computers where infected file virus screening is performed.

A method according to claim 11 , wherein said flag can be updated by a network manager and flag updates made by the network manager are communicated to network end user computers where infected file virus screening is performed.

A method according to claim 12 , wherein said flag can be updated by a network manager and flag updates made by the network manager are communicated to network end user computers where infected file virus screening is performed. A method according to claim 10 , wherein the quarantined file is placed in a non-executable electronic container. A method according to claim 1 , wherein the user is a network manager and database updates made by the network manager are communicated to network end user computers where infected file virus screening is performed.

A method according to claim 1 , wherein said step of determining a signature for the file and screening that signature comprises deriving a signature of the file and comparing the derived signature with signatures in the database.

Apparatus for screening a software file for viral infection, the apparatus comprising: a memory storing a database of known infected file signatures; and. The apparatus according to claim 22 , wherein, in order to determine whether or not the file has a signature corresponding to one of the signatures contained in said database, said data processor is arranged to derive a signature of the file and to compare the derived signature with signatures in the databases.

A computer memory encoded with executable instructions representing a computer program for causing computer system to: maintain a database of known infected file signatures; and. A computer memory according to claim 24 , wherein the computer program causes the files to be scanned to determine whether or not they contain a signature corresponding to one of signatures contained in the database.

The computer memory according to claim 24 , wherein in order to determine whether or not the file has a signature corresponding to one of the signatures contained in said infected file database, said computer program causes the computer system to derive a signature of the file and to compare the derived signature with signatures in the database.

A method according to claim 1 , wherein a match condition causes an alert or notification to be sent electronically to the user of the local computer system hosting said database. A method according to claim 1 , wherein a match condition causes an alert or notification to be sent electronically to a network administrator of a remote server. The apparatus according to claim 22 , wherein, is a part of a network firewall device. The apparatus according to claim 22 , wherein, is a part of a network packet sniffer software.

The apparatus according to claim 22 , wherein, is a part of a digital camera. The apparatus according to claim 22 , wherein, is a part of a cellular phone. The apparatus according to claim 22 , wherein, is a part of a wireless device.

The apparatus according to claim 22 , wherein, is a part of a computer system comprising one or more CPUs Central Processing Unit and one or more memories. A method according to claim 1 , wherein the said database is a part of a bidirectional system for sending and receiving partial hash signatures. A method according to claim 38 , wherein partial hash signatures are sent and received through a bidirectional request protocol set to determine a percentage of said file used in hash computation.

A method according to claim 39 , wherein the requested percentage is set by a dynamic request protocol based on communication speed. This thread is locked. You can follow the question or vote as helpful, but you cannot reply to this thread. I have the same question Report abuse. Details required :. Cancel Submit. Hi, Thank you for posting on Microsoft Community. Before assisting further, I would like to ask you a few questions: Are you not able to download the updates available on your PC?

Did you check if Google is blocked by Windows Firewall? Query 1: Google web blocked. Click on View b y located to the top right of the window and select Large option. Report abuse. Details required :. Cancel Submit. Srimadhwa B. Hi, 1. What happens when you try to open Google in Internet Explorer?

Do you get any error message or error code, while accessing other websites? Is the issue confined only to google website? How satisfied are you with this reply?



0コメント

  • 1000 / 1000