A method, apparatus, and computer instructions for identifying unauthorized users. User actions are monitored in an audit for an indication an unauthorized user logged into the data processing system with a valid user identifier and a valid password. An action is initiated in response to an indication of an unauthorized user.

 
Web www.patentalert.com

< Method, system, and storage medium for preventing recurrence of a system outage in a computer network

< Using packet filters and network virtualization to restrict network communications

> Method and system for executing tools in a service control manager module

> Technique for associating execution characteristics with instructions or operations of program code

~ 00282