Modification of the hosts file is detected, implementation of the modified hosts file is stalled, the modification to the hosts file is analyzed to determine if the modification is malicious, and if the modification is malicious, the hosts file is restored. In this manner, malicious modification of the hosts file is detected and prevented before the malicious modification is ever implemented.

 
Web www.patentalert.com

< Cross domain authentication and security services using proxies for HTTP access

> Information processing apparatus, information processing method, recording medium, and program

~ 00495