A vulnerability checking tool for a host computer designed to examine security logs of attempted logins and revocations, to detect systematic attacks of a wide variety, and to generate a report file that can be examined for information concerning these types of events. Host computer files which contain data regarding attempted accesses and logins are used to create an event list based upon event criteria. The list is evaluated using a "floating period" time frame which advances by single event steps while no violation is detected within a particular floating period, and which advances by "jumps" when violations are detected in a time period so as to reduce the possibility of "over reporting" violations related to the same set of events.

 
Web www.patentalert.com

< System and method for introducing enhanced features into a java swing application program interface

< Identifying a distributed denial of service (DDoS) attack within a network and defending against such an attack

> Displaying information to indicate both the importance and the urgency of the information

> Method and apparatus for capturing and rendering text annotations for non-modifiable electronic content

~ 00234