Techniques for generating an access control list to block traffic from a network device infected by malware.
Web www.patentalert.com
< Detection of SYSENTER/SYSCALL hijacking
> Inspected secure communication protocol
> Method and apparatuses for transferring data for multiple applications through a single communication link in response to authentication information
HOME | NEW USER | LOGIN | SUBSCRIPTIONS | SEARCH | GUESTBOOK | CONTACT