To secure an access provider, communications to/from the access provider are monitored for a partially-completed connection transaction. Detected partially-completed connection transactions are terminated when they remain in existence for a period of time that exceeds a threshold period of time. The monitoring may include detecting partially-completed connection transactions initiated by an access requestor, measuring the period of time that a partially-completed connection transaction remains in existence, comparing the period of time with the threshold period of time, and resetting a communication port located on the access provider.

 
Web www.patentalert.com

< Enabling clean file cache persistence using dual-boot detection

< Systems and methods for determining anti-virus protection status

> Method and apparatus to customize layout and presentation

> Checkpoint service

~ 00618