Month of September 2006 - Page Number 7

Showing 61 - 70 of 415 from September 2006
Browse Prior Art Database
  1. 61.
    This article discusses a means for providing a one-time password for the SRK of the TPM
    IPCOM000140935D | Original Publication Date: 2006-Sep-26
  2. 62.
    The idea is to associate each input device as the main input device for a particular display and detect when a user switches focus to another monitor by sensing when the associated input device is used.
    IPCOM000140934D | Original Publication Date: 2006-Sep-26
  3. 63.
    Switching between different OSs in a dual boot situation is time consuming. This suggests a method of doing it quickly.
    IPCOM000140933D | Original Publication Date: 2006-Sep-26
  4. 64.
    Many hard drive recovery programs allow incremental backups to be taken in such a way that only changed files are backed up. If large files change between each incremental backup, the amount of storage space consumed can grow quite large. This invention allows files to be designated as 'single instance storage'...
    IPCOM000140932D | Original Publication Date: 2006-Sep-26
  5. 65.
    Current hard drive commands for security, manageability, and/or recovery have a potential negative effect as they can leave the system open to a virus attack. System BIOS can turn-off the commands during a power-on to prevent the virus attack. However this does not work on return from standby as there is not...
    IPCOM000140931D | Original Publication Date: 2006-Sep-26
  6. 66.
    The discussed invention is to reduce the wide varieties of environmental situations the thermal solution must be designed to incorporate by designing the system to search for environmental data and make changes in it's thermal solution automatically. Once the environmental data is obtained, the system will adjust...
    IPCOM000140930D | Original Publication Date: 2006-Sep-26
  7. 67.
    There has recently been found a "collision" for the MD5 hash algorithm.. In particular two numbers have been found, x and y, such that MD5(x)=MD5(y). Now initially that has not seemed to bad - after all it is not the case that given a that one could find b, such that Hash(a)=Hash(b). However there has been a...
    IPCOM000140929D | Original Publication Date: 2006-Sep-26
  8. 68.
    It is inevitable that a company that provides software for hardware will eventually have a security (or other) kind of problem with that software. It is not in general possible to prevent someone from grabbing a copy of the bad code and then later presenting it to a naive user as correct software (possibly even...
    IPCOM000140928D | Original Publication Date: 2006-Sep-26
  9. 69.
    As e-commerce, e-government and e-business grows with increasing threat of cybercrime there is a trade-off emerging in the use of security technologies for protecting data and authenticating identities and transactions. IT owners of processes involving these identities and transactions desire to use specific...
    IPCOM000140927D | Original Publication Date: 2006-Sep-26
  10. 70.
    A very common problem that comes again and again is that IT organizations distributes client computers which are incorrectly configured. Wrong passwords and/or lack of passwords, passwords rules, etc. Because of security concerns, many of the settings are purposely locked down to prevent an attack so it...
    IPCOM000140926D | Original Publication Date: 2006-Sep-26