Various embodiments are provided relating to security of a computer, namely, a security software product, a computer-readable medium, a computerized method, and a computer security system. Illustrative is one embodiment of a security software product for use on a host computer to monitor for, and respond to, activity corresponding to a rootkit exploitation which renders the host computer's operating system insecure. The security software product comprises computer readable media having a suite of interfaced software components, such as loadable kernel modules. An exploitation detection component detects the activity corresponding to the rootkit exploitation. A forensics data collection component collects forensics data characteristic of the rootkit exploitation so that it may be transferred to a removable storage device. An OS restoration component restores the operating system to a secure condition in response to detection of the exploit.

 
Web www.patentalert.com

< Method of optimizing the presentation on a display screen of objects of a user interface which can be freely positioned and scaled by means of control elements

< Model-based two-dimensional interpretation filtering

> Automated Computer Vulnerability Resolution System

> Compound screens relating to insulin deficiency or insulin resistance

~ 00213