Bootable computer system circumventing compromised instructions

作者: Kevin Garry , Colin Osburn

DOI:

关键词: BootingEmbedded systemClientEngineeringFile system

摘要: The inventive application includes a secondary OS for scanning which installs on one or many client computers and boots prior to client's primary counter security threats. In configuration, bootloader responds flagged condition boot the in accordance with condition. another aspect, scans file system of determine if remediation is required.

参考文章(2)
Howard Jeffrey Locker, Richard W. Cheston, Daryl Carvis Cromer, Paul Douglas Plaskonos, Philip Lee Childs, Mark Charles Davis, Polled automatic virus fix ,(2004)
Yoshinori Wakai, Satoshi Oshima, Masayoshi Takasugi, Shinji Kimura, Method and programs for coping with operating system failures ,(2004)