作者: Shivakumara Venkateshamurthy , Tejasvi Aswathanarayana , Sudarshan Palliyil
DOI:
关键词: Hacker 、 Resource (project management) 、 Vulnerability 、 Computer science 、 Upload 、 Hash function 、 Data processing 、 Service (systems architecture) 、 Computer security 、 Web browser
摘要: Provided are methods, apparatus and computer programs for identifying vulnerabilities to viruses of hacking. Hash values computed stored resources on systems within a network. If first resource or collection (such as files comprising an operating system, Web Browser mail server) is associated with vulnerability, hash the compared identify which have vulnerability. Messages may be sent people responsible vulnerable systems, vulnerability removed by automatic downloading patches service packs.