U.S. patent application number 14/581481 was filed with the patent office on 2015-04-23 for system, method, and computer program product for managing a plurality of applications via a single interface.
The applicant listed for this patent is McAfee, Inc.. Invention is credited to Atri Chatterjee, Brent J. Lymer.
Application Number | 20150113654 14/581481 |
Document ID | / |
Family ID | 38775546 |
Filed Date | 2015-04-23 |
United States Patent
Application |
20150113654 |
Kind Code |
A1 |
Lymer; Brent J. ; et
al. |
April 23, 2015 |
SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR MANAGING A
PLURALITY OF APPLICATIONS VIA A SINGLE INTERFACE
Abstract
A system, method and computer program product are provided for
managing a plurality of applications via a single interface. It is
initially identified as to which of a plurality of applications are
installed on a computer. A status of each of the applications is
then presented via a single graphical user interface.
Inventors: |
Lymer; Brent J.; (Sunnyvale,
CA) ; Chatterjee; Atri; (San Francisco, CA) |
|
Applicant: |
Name |
City |
State |
Country |
Type |
McAfee, Inc. |
Santa Clara |
CA |
US |
|
|
Family ID: |
38775546 |
Appl. No.: |
14/581481 |
Filed: |
December 23, 2014 |
Related U.S. Patent Documents
|
|
|
|
|
|
Application
Number |
Filing Date |
Patent Number |
|
|
11855941 |
Sep 14, 2007 |
|
|
|
14581481 |
|
|
|
|
10319288 |
Dec 13, 2002 |
|
|
|
11855941 |
|
|
|
|
Current U.S.
Class: |
726/24 ;
726/25 |
Current CPC
Class: |
H04L 63/20 20130101;
G06F 21/51 20130101; H04L 63/1433 20130101; G06F 3/04817 20130101;
G06F 21/50 20130101; G06F 2221/034 20130101; G06F 21/56 20130101;
G06F 21/577 20130101; G06F 21/566 20130101; G06F 2221/033 20130101;
G06F 3/0482 20130101; H04L 67/10 20130101 |
Class at
Publication: |
726/24 ;
726/25 |
International
Class: |
G06F 21/57 20060101
G06F021/57; G06F 21/56 20060101 G06F021/56; G06F 3/0481 20060101
G06F003/0481 |
Claims
1. At least one machine accessible storage medium having code
stored thereon, comprising code that when executed on a machine,
causes the machine to: identify, utilizing a processor, a status of
a security application; represent the status of the security
application in the form of a colored indicator; display the colored
indicator within a window associated with the security application;
wherein a color of the colored indicator includes green to indicate
that the security application is at least one of installed or
running; and display additional information relating to the status
of the security application within the same or a different window
of the security application.
2. The medium of claim 1, wherein a color of the colored indicator
includes red to indicate that the security application is at least
one of not installed, disabled, or expired.
3. The medium of claim 1, wherein a color of the colored indicator
includes amber to indicate an intermediate level of vulnerability
for the security application.
4. At least one machine accessible storage medium having code
stored thereon, comprising code that when executed on a machine
causes the machine to: identify, utilizing a processor, a status of
a security application; represent the status of the security
application in the form of a colored indicator; display the colored
indicator within a window associated with the security application;
wherein a color of the colored indicator includes red to indicate
that the security application is at least one of not installed,
disabled, or expired; and display additional information relating
to the status of the security application within the same or a
different window of the security application.
5. The medium of claim 4, wherein the additional information
comprises an item that may be selected by a user to decrease a
degree of risk associated with the status.
6. The medium of claim 5, wherein the item is a link.
7. The medium of claim 5, wherein the item is a selection icon.
8. The medium of claim 5, wherein the code further comprises code
that when executed on the machine causes the machine to: download,
responsive to selection of the item, an update of the security
application.
9. The medium of claim 5, wherein the code further comprises code
that when executed on the machine causes the machine to: download,
responsive to selection of the item, a more recent version of the
security application.
10. The medium of claim 4, wherein a color of the colored indicator
includes green to indicate that the security application is at
least one of installed or running.
11. The medium of claim 4, wherein a color of the colored indicator
includes amber to indicate an intermediate level of vulnerability
for the security application.
12. At least one machine accessible storage medium having code
stored thereon, comprising code that when executed on a machine
causes the machine to: identify, utilizing a processor, a status of
a security application; represent the status of the security
application in the form of a colored indicator; and display the
colored indicator, wherein a color of the colored indicator
includes green to indicate that the security application is at
least one of installed or running.
13. The medium of claim 12, wherein the code further comprises code
that when executed on the machine causes the machine to: display
the colored indicator within a window associated with the security
application.
14. The medium of claim 13, wherein the code further comprises code
that when executed on the machine causes the machine to: display
additional information relating to the status of the security
application within the same or a different window of the security
application.
15. The medium of claim 12, wherein the code further comprises code
that when executed on the machine causes the machine to: display
the colored indicator within an area of a graphical user
interface.
16. The medium of claim 15, wherein the code further comprises code
that when executed on the machine causes the machine to: display
additional information relating to the status of the security
application within the same or a different area of the graphical
user interface.
17. The medium of claim 15, wherein the area of the graphical user
interface is a window.
18. The medium of claim 17, wherein the window is associated with
the security application.
19. The medium of claim 15, wherein the code further comprises code
that when executed on the machine causes the machine to: display
information relating to the status of a second security application
within the same or a different area of the graphical user
interface.
20. The medium of claim 12, wherein the security application is an
anti-virus application.
21. The medium of claim 12, wherein the security application is a
firewall application.
22. The medium of claim 12, wherein the security application is an
anti-spam application.
23. The medium of claim 12, wherein the security application is an
anti-virus and firewall application.
24. The medium of claim 12, wherein the code further comprises code
that when executed on the machine causes the machine to: further
represent the status by a version number in addition to the colored
indicator.
25. The medium of claim 12, wherein the status is represented by a
plurality of visual indicators, the plurality of visual indicators
including the colored indicator.
26. The medium of claim 25, wherein the plurality of visual
indicators further includes a version number.
27. The medium of claim 12, wherein the security application is
operable to scan malicious code.
28. The medium of claim 27, wherein the malicious code is a
virus.
29. The medium of claim 28, wherein the security application is
further operable to scan for malicious code by comparing virus
signature files with data located in memory.
30. The medium of claim 28, wherein the security application is
further to scan for malicious code by comparing virus signature
files with data transmitted via a network.
31. The medium of claim 27, wherein the security application is
further operable to take an appropriate action in response to
detecting malicious code.
32. The medium of claim 31, wherein the appropriate action is to
quarantine data.
33. The medium of claim 31, wherein the appropriate action is to
delete data.
34. The medium of claim 31, wherein the appropriate action is to
clean data.
35. The medium of claim 31, wherein the appropriate action is to
display an alert.
36. The medium of claim 12, wherein the security application is a
firewall application.
37. The medium of claim 36, wherein the firewall application is
operable to take an appropriate action based on a set of rules.
38. The medium of claim 36, wherein the firewall application is
operable to take an appropriate action based on one or more
policies.
39. The medium of claim 36, wherein the firewall application is
operable to block one or more accesses to the processor based on a
set of rules or based on one or more policies.
40. The medium of claim 36, wherein the firewall application is
operable to provide an alert of access to the processor, based on a
set of rules or based on one or more policies.
41. The medium of claim 12, wherein the security application is a
privacy application operable to prevent personal information from
being shared.
42. The medium of claim 12, wherein the security application is a
privacy application operable to protect personal information.
43. The medium of claim 12, wherein the security application is a
privacy application operable to prevent access to predetermined
content on a network.
44. The medium of claim 43, wherein the network is the
Internet.
45. At least one machine accessible storage medium having code
stored thereon, comprising code that when executed on a machine
causes the machine to: identify, utilizing a processor, a status of
a security application; represent the status of the security
application in the form of a colored indicator; and display the
colored indicator, wherein a color of the colored indicator
includes red to indicate that the security application is at least
one of not installed, disabled, or expired.
46. The medium of claim 45, wherein the code further comprises code
that when executed on the machine causes the machine to: display
the colored indicator within a window associated with the security
application.
47. The medium of claim 46, wherein the code further comprises code
that when executed on the machine causes the machine to: display
additional information relating to the status of the security
application within the same or a different window of the security
application.
48. The medium of claim 47, wherein the additional information
includes an item that may be selected by a user to decrease a
degree of risk associated with the status.
49. The medium of claim 48, wherein the item is a link.
50. The medium of claim 45, wherein a color of the colored
indicator includes green to indicate that the security application
is at least one of installed or running.
51. The medium of claim 45, wherein a color of the colored
indicator includes amber to indicate an intermediate level of
vulnerability for the security application.
52. The medium of claim 45, wherein a color of the colored
indicator includes red to indicate that the security application is
at least one of not installed, disabled, or expired.
53. The medium of claim 45, wherein a color of the colored
indicator includes amber to indicate an intermediate level of
vulnerability for the security application.
54. At least one machine accessible storage medium having code
stored thereon, comprising code that when executed causes the
machine to: identify, utilizing a processor, a status of an
anti-virus security application that is operable to scan for
malicious code by comparing virus signature files with data located
in memory and is operable to take an appropriate response to
detecting a virus, where the appropriate response includes at least
one of quarantining data, deleting data, cleaning data, or
providing an alert; represent the status of the security
application in the form of a colored indicator; display the colored
indicator and a version number of the security application within a
window associated with the security application; wherein a color of
the colored indicator includes red to indicate that the security
application is at least one of not installed, disabled, or expired;
and display additional information relating to the status of the
security application within the same or a different window of the
security application, wherein the additional information includes a
link or selection icon that may be selected to perform an action to
decrease a degree of risk associated with the status, and wherein
the action includes at least one of: loading an update to the
anti-virus security application; and loading a newer version of the
anti-virus security application.
55. A computing device, comprising: a processor; a touch screen,
coupled to the processor; a communication adaptor, operable for
communication with a wireless network; a display, coupled to the
processor; and a storage unit, coupled to the processor, on which
is stored code, comprising code that when executed on the processor
causes the computing device to: identify a status of a security
application; represent the status of the security application in
the form of a colored indicator; display the colored indicator
within a window on the display associated with the security
application; wherein a first color of the colored indicator
indicates that the security application is at least one of
installed or running and a second color of the colored indicator
indicates that the security application is at least one of not
installed, disabled, or expired; and display additional information
relating to the status of the security application within the same
or a different window of the security application.
56. The computing device of claim 55, further comprising a
keyboard, coupled to the processor.
57. The computing device of claim 55, wherein the first color
comprises green and the second color comprises red.
58. The computing device of claim 55, wherein a third color of the
colored indicator indicates an intermediate level of vulnerability
for the security application.
59. The computing device of claim 58, wherein the third color
comprises amber.
60. The computing device of claim 55, wherein the additional
information comprises an item that may be selected using the touch
screen to decrease a degree of risk associated with the status.
61. The computing device of claim 60, wherein the code further
comprises code that when executed on the processor causes the
computing device to: download, responsive to selection of the item
using the touch screen, an update of the security application.
62. The computing device of claim 55, wherein the code further
comprises code that when executed on the processor causes the
computing device to: display information relating to the status of
a second security application within the same or a different window
on the display.
63. The computing device of claim 55, wherein the security
application is an anti-virus application.
64. The computing device of claim 55, wherein the security
application is a firewall application.
65. The computing device of claim 55, wherein the security
application is an anti-spam application.
66. The computing device of claim 55, wherein the security
application is an anti-virus and firewall application.
67. The computing device of claim 55, wherein the code further
comprises code that when executed on the processor causes the
computing device to: further represent the status by a version
number in addition to the colored indicator.
68. The computing device of claim 55, wherein the status is
represented by a plurality of visual indicators, the plurality of
visual indicators including the colored indicator.
69. The computing device of claim 68, wherein the plurality of
visual indicators further includes a version number.
70. The computing device of claim 55, wherein the security
application is operable to scan malicious code.
71. The computing device of claim 70, wherein the malicious code is
a virus.
72. The computing device of claim 71, wherein the security
application is further operable to scan for malicious code by
comparing virus signature files with data located in memory.
73. The computing device of claim 71, wherein the security
application is further to scan for malicious code by comparing
virus signature files with data transmitted via the wireless
network.
74. The computing device of claim 70, wherein the security
application is further operable to take an appropriate action in
response to detecting malicious code.
75. The computing device of claim 74, wherein the appropriate
action is to quarantine data.
76. The computing device of claim 74, wherein the appropriate
action is to delete data.
77. The computing device of claim 74, wherein the appropriate
action is to clean data.
78. The computing device of claim 74, wherein the appropriate
action is to display an alert.
79. The computing device of claim 55, wherein the security
application is a firewall application.
80. The computing device of claim 79, wherein the firewall
application is operable to take an appropriate action based on a
set of rules.
81. The computing device of claim 79, wherein the firewall
application is operable to take an appropriate action based on one
or more policies.
82. The computing device of claim 79, wherein the firewall
application is operable to block one or more accesses to the
processor based on a set of rules or based on one or more
policies.
83. The computing device of claim 79, wherein the firewall
application is operable to provide an alert of access to the
processor, based on a set of rules or based on one or more
policies.
84. The computing device of claim 55, wherein the security
application is a privacy application operable to prevent personal
information from being shared.
85. The computing device of claim 55, wherein the security
application is a privacy application operable to protect personal
information.
86. The computing device of claim 55, wherein the security
application is a privacy application operable to prevent access to
predetermined content on a network.
87. The computing device of claim 86, wherein the network is the
Internet.
Description
CROSS REFERENCE TO RELATED APPLICATIONS
[0001] The present application is a continuation of U.S. patent
application Ser. No. 11/855,941, filed Sep. 14, 2007, which is a
continuation of U.S. patent application Ser. No. 10/319,288 filed
on Dec. 13, 2002, both of which are incorporated herein by
reference.
TECHNICAL FIELD
[0002] The present invention relates to application management, and
more particularly to interfacing a plurality of applications.
BACKGROUND ART
[0003] In the space of just a few years, the Internet--because it
provides access to information, and the ability to publish
information, in revolutionary ways--has emerged from relative
obscurity to international prominence. Whereas in general an
internet is a network of networks, the Internet is a global
collection of interconnected local, mid-level, and wide-area
networks that use the Internet Protocol (IP) as the network layer
protocol. Whereas the Internet embraces many local- and wide-area
networks, a given local- or wide-area network may or may not form
part of the Internet.
[0004] As the Internet and its underlying technologies have become
increasingly familiar, attention has become focused on Internet
security and computer network security in general. With
unprecedented access to information has also come unprecedented
opportunities to gain unauthorized access to data, change data,
destroy data, make unauthorized use of computer resources,
interfere with the intended use of computer resources, etc. As
experience has shown, the frontier of cyberspace has its share of
scofflaws, resulting in increased efforts to protect the data,
resources, and reputations of those embracing intranets and the
Internet.
[0005] Security threats have evolved significantly with the
increased popularity of the Internet. Advanced hybrid threats have
been designed to attack systems on multiple fronts, sometimes
searching for vulnerabilities until one is found. New threats also
attempt to attack security technology itself.
[0006] Traditional consumer security software suites often include
a plurality of various applications such as an anti-virus
application, a firewall application, etc. In use, each application
works to protect against at least one of the aforementioned
threats. Together, the applications provide the comprehensive
protection required in modern computing and networking
environments.
[0007] As the security threats become more and more complex,
however, the number of applications required to combat the threats
becomes greater. With each application carrying out its own
functionality and reporting schemes, an administrator or user can
easily become overwhelmed with security management.
SUMMARY
[0008] A system, method and computer program product are provided
for managing a plurality of applications via a single interface. It
is initially identified as to which of a plurality of applications
are installed on a computer. A status of each of the applications
is then presented via a single graphical user interface.
[0009] In one embodiment, the identifying may include registering
the applications upon the installation thereof. It may then be
determined that one of the applications is not installed when such
application is not registered.
[0010] In another embodiment, the applications may include an
anti-virus application, a firewall application, a privacy service
application, an anti-spam application, and/or a utilities
application.
[0011] In still another embodiment, the single graphical user
interface may include a list of the applications. Still yet, the
single graphical user interface may include a plurality of status
indicators adjacent to each of the applications in the list. Each
status indicator may indicate whether the corresponding application
is installed. Moreover, each status indicator may indicate whether
the corresponding application is enabled. Still yet, each status
indicator may indicate whether a subscription associated with the
corresponding application is expired. As an option, each status
indicator may be color coded.
[0012] Another system, method and computer program product are
provided for managing a plurality of applications via a single
interface. A status of a plurality of applications installed on a
computer may initially be identified. Moreover, a visual indication
as to the status of each of the applications may be displayed via a
single graphical user interface.
[0013] In one aspect of the present embodiment, the status may
include installed, not installed, expired, enabled, disabled, etc.
Still yet, the visual indication may include a textual description
of the status, a color coded representation of the status, and/or
an icon representing the status.
[0014] Still another system, method and computer program product
are provided for managing a plurality of applications. It is
initially identified as to which of a plurality of applications are
installed on a computer. A user is then allowed access to each of
the applications via a single graphical user interface.
[0015] In one aspect of the present embodiment, the graphical user
interface may include a home page for displaying a visual
indication as to the status of each of the applications. Still yet,
the graphical user interface may include a plurality of selection
icons for allowing access to a plurality of windows associated with
each of the applications. Optionally, such windows may each include
access to functionality associated with the corresponding one of
the applications.
[0016] Still another system, method and computer program product
are provided for tailoring a multi-application managing interface.
To accomplish this, provided is a plurality of fields associated
with a plurality of aspects of a multi-application managing
interface. Such fields are subsequently filled with content
tailored to an entity including a multiplicity of computers each
equipped with the multi-application managing interface. Thus, the
multi-application managing interface may be displayed on the
computers with the content.
[0017] Still another system, method and computer program product
are provided for selling application-services via a single
interface. Initially, a status of a plurality of applications
installed on a computer is identified. The status of each of the
applications is then presented via a single graphical user
interface. A purchase link is conditionally displayed with the
status based on the status of the applications on the computer.
Such purchase link may be capable of being utilized by a user of
the computer to purchase a service associated with the applications
via the network.
BRIEF DESCRIPTION OF DRAWINGS
[0018] FIG. 1 illustrates a network architecture, in accordance
with one embodiment.
[0019] FIG. 2 shows a representative hardware environment that may
be associated with the data server computers and/or end user
computers of FIG. 1, in accordance with one embodiment.
[0020] FIG. 3 illustrates a system adapted for interfacing a
plurality of applications, in accordance with one embodiment.
[0021] FIG. 4 illustrates a method for managing a plurality of
applications via a single interface, in accordance with one
embodiment.
[0022] FIG. 5 illustrates an exemplary single graphical user
interface for managing a plurality of applications, in accordance
with one embodiment.
[0023] FIG. 6 illustrates an exemplary anti-virus application
window associated with an anti-virus application, in accordance
with one embodiment.
[0024] FIG. 7 illustrates an exemplary firewall application window
associated with a firewall application, in accordance with one
embodiment.
[0025] FIG. 8 illustrates an exemplary privacy service application
window associated with a privacy service application, in accordance
with one embodiment.
[0026] FIG. 9 illustrates an exemplary anti-spam application window
associated with an anti-spam application, in accordance with one
embodiment.
[0027] FIG. 10 illustrates a method for displaying a status of a
security application, in accordance with one embodiment.
[0028] FIG. 11 illustrates an exemplary graphical user interface
for displaying a status of at least one security application, in
accordance with one embodiment.
[0029] FIG. 12 illustrates a method for alerting users of a
plurality of computers of a security event via a network, in
accordance with one embodiment.
[0030] FIG. 13 illustrates an exemplary graphical user interface
for alerting users of a plurality of computers of a security event
via a network, in accordance with one embodiment.
[0031] FIG. 14 illustrates an exemplary security alert for alerting
users of a plurality of computers of a security event via a
network, in accordance with one embodiment.
[0032] FIG. 15 illustrates an exemplary graphical user interface
for selling application-related services, in accordance with one
embodiment.
[0033] FIG. 16 illustrates an exemplary graphical user interface
tailored to manage a plurality of related applications of a
specific entity (i.e. company, organization, etc.), in accordance
with one embodiment.
DESCRIPTION OF EMBODIMENTS
[0034] FIG. 1 illustrates a network architecture 100, in accordance
with one embodiment. As shown, a plurality of networks 102 is
provided. In the context of the present network architecture 100,
the networks 102 may each take any form including, but not limited
to a local area network (LAN), a wide area network (WAN) such as
the Internet, etc.
[0035] Coupled to the networks 102 are data server computers 104
which are capable of communicating over the networks 102. Also
coupled to the networks 102 and the data server computers 104 is a
plurality of end user computers 106. In order to facilitate
communication among the networks 102, at least one gateway or
router 108 is optionally coupled therebetween. It should be noted
that each of the foregoing network devices as well as any other
unillustrated devices may be interconnected by way of a plurality
of network segments.
[0036] FIG. 2 shows a representative hardware environment that may
be associated with the data server computers 104 and/or end user
computers 106 of FIG. 1, in accordance with one embodiment. Such
figure illustrates a typical hardware configuration of a
workstation in accordance with a preferred embodiment having a
central processing unit 210, such as a microprocessor, and a number
of other units interconnected via a system bus 212.
[0037] The workstation shown in FIG. 2 includes a Random Access
Memory (RAM) 214, Read Only Memory (ROM) 216, an I/O adapter 218
for connecting peripheral devices such as disk storage units 220 to
the bus 212, a user interface adapter 222 for connecting a keyboard
224, a mouse 226, a speaker 228, a microphone 232, and/or other
user interface devices such as a touch screen (not shown) to the
bus 212, communication adapter 234 for connecting the workstation
to a communication network 235 (e.g., a data processing network)
and a display adapter 236 for connecting the bus 212 to a display
device 238.
[0038] The workstation may have resident thereon any desired
operating system. It will be appreciated that a preferred
embodiment may also be implemented on platforms and operating
systems other than those mentioned. A preferred embodiment may be
written using JAVA, C, and/or C++ language, or other programming
languages, along with an object oriented programming methodology.
Object oriented programming (OOP) has become increasingly used to
develop complex applications.
[0039] Our course, the various embodiments set forth herein may be
implemented utilizing hardware, software, or any desired
combination thereof. For that matter, any type of logic may be
utilized which is capable of implementing the various functionality
set forth herein.
[0040] FIG. 3 illustrates a system 300 adapted for interfacing a
plurality of applications, in accordance with one embodiment. As an
option, the present system 300 may be implemented in the context of
the architecture of FIGS. 1 and 2. Of course, the system 300 may be
implemented in any desired context.
[0041] As shown, included is a plurality of applications 301. In
the context of the present description, such applications 301 may
include any type of application program or computer code. For
example, the applications 301 may optionally be security related.
Of course, the applications 301 may be related to any other aspects
such as business, maintenance, entertainment, etc. In any case, the
applications may be related by the virtue of being associated with
a similar aspect, purpose, etc.
[0042] In the security context, the applications 301 may include an
anti-virus application 302, a firewall application 304, a privacy
service application 308, an anti-spam application 306, and any
other related application 310 (i.e. a utilities application,
etc.).
[0043] In use, the anti-virus application 302 may be capable of
scanning for viruses or other malicious code by comparing virus
signature files with data located in memory or being transmitted
via a network; and taking any appropriate response (i.e. quarantine
data, delete data, clean data, alert user, etc.). Moreover, the
firewall application 304 may be capable of blocking or alerting a
user of accesses to a computer based on a predetermined set of
rules or policies.
[0044] Still yet, the privacy service application 308 may be
capable of protecting personal information on a computer and
preventing the same from being shared. Still yet, the privacy
service application 308 may be capable of preventing certain users
from accessing predetermined content on a network such as the
Internet. Moreover, the anti-spam application 306 may be capable of
filtering electronic mail messages based on a predetermined rule
set to prevent the receipt (or delivery) of unwanted e-mail.
[0045] As mentioned earlier, any other related application 310 may
be included in the group of applications 301. For example, a
utilities application may be included for executing various
maintenance tasks associated with a computer (i.e. cleaning files,
optimizing memory, etc.).
[0046] Further provided in combination with the applications 301 of
the system 300 is an interface 312. In use, such interface 312 may
include any specific method, technique or protocol by which an
application program can communicate with an operating system or
another application. In one embodiment, such interface 312 may
include an application program interface.
[0047] The interface 312 may further include a graphical user
interface for allowing access to the various applications 301. Such
graphical user interface may further be used for indicating a
status of the applications 301. More information relating to such
graphical user interface will be set forth hereinafter in greater
detail.
[0048] FIG. 4 illustrates a method 400 for managing a plurality of
applications via a single interface, in accordance with one
embodiment. As an option, the present method 400 may be implemented
in the context of the system 300 of FIG. 3. Of course, however, the
method 400 may be carried out in any desired environment.
[0049] In operation 402, it is determined which of a plurality of
applications are installed on a computer. The identification of the
installed applications may be carried out in any desired manner.
For example, a simple scan of the computer may be initiated.
Moreover, such identification may involve the registration of the
applications upon the installation thereof. It may then be
determined that one of the applications is installed or not based
on whether such application is registered. Optionally, such
registration may involve an application program interface such as
that mentioned during reference to FIG. 3. Of course, operation 402
may be carried out in any desired manner capable of identifying
which applications are currently installed. Moreover, in a
situation where the applications are simultaneously installed in
the form of a suite, such identification may be simplified.
[0050] Next, in operation 404, a status of each of the applications
is presented via a single graphical user interface. Such single
graphical user interface may take any desired form capable of
simultaneously conveying a status of each of the applications. As
an option, such status may be displayed via a home page of the
single graphical user interface. Such home page may include a
"main" page or interface associated with the graphical user
interface. More information regarding an exemplary single graphical
user interface that may be used in the context of the present
method 400 will be set forth during reference to subsequent
figures.
[0051] In operation 406, a plurality of selection icons may be
displayed, where the selection icons are associated with a
plurality of windows. Such windows may each correspond with one of
the applications, for reasons that will soon become apparent. In
the present description, such selection icons may include any
visual entity that is displayed and is capable of being selected by
a user. Moreover, such windows may include any frame, portion,
subset, or page associated with the graphical user interface and
corresponding with one of the applications.
[0052] It is then determined in decision 408 whether one of the
selection icons has been selected by a user. Upon the selection of
the corresponding selection icon, a user is allowed to access one
of the windows. Each of the windows may include access to
functionality associated with the corresponding application. Thus,
a user is provided access to such functionality conveniently from
the graphical user interface. Note operation 410.
[0053] FIG. 5 illustrates an exemplary single graphical user
interface 500 for managing a plurality of applications, in
accordance with one embodiment. Optionally, such graphical user
interface 500 may be used in the context of the system 300 and
method 400 of FIGS. 3 and 4, respectively. Of course, the various
features of the graphical user interface 500 may be used in any
desired manner.
[0054] To allow access to each of the applications via the single
graphical user interface 500, the graphical user interface may
include a home page 512 and a plurality of selection icons 514 for
allowing access to a plurality of windows (not shown) associated
with each of the applications. Optionally, such windows may each
include access to functionality associated with the corresponding
one of the related applications. More information relating to such
application-specific windows will be set forth in greater detail
during reference to subsequent figures.
[0055] In use, the home page 512 may be adapted for displaying a
visual indication as to the status of each of the applications,
along with various other information. For example, a security index
516 may be provided for indicating a level of risk associated with
various aspects (i.e. security aspects) of a computer or networking
environment. More information relating to such security index 516
will be set forth in greater detail during reference to FIGS. 10
and 11. Further included is general information and alerts
displayed in separate frames 518. As will soon become apparent,
both the general information and alerts may be pushed from a server
and further provide various options to a user. Thus, similar to the
alerts to be described, the general information may involve dynamic
functionality that changes over time, and pushed from a server to a
plurality of clients. Still yet, the home page 512 may include a
general update icon 520, a general additional information icon 522,
a general support icon 524, and a general help icon 526.
[0056] To convey the status of each of the applications, the home
page 512 of the single graphical user interface 500 may include a
list 502 of a plurality of applications 504. Still yet, the single
graphical user interface 500 may include a plurality of status
indicators 506 adjacent to each of the applications 504 in the list
502.
[0057] Each status indicator 506 may indicate whether the
corresponding application is installed. Moreover, each status
indicator 506 may indicate whether the corresponding application is
enabled. Still yet, each status indicator 506 may indicate whether
a subscription associated with the corresponding application is
expired. While this is shown to be accomplished using text, it
should be noted that such status may be conveyed in any desired
manner. As an option, each status indicator 506 may be color coded.
For example, an icon may be included as a status indicator 506, as
shown. In use, such icon may exhibit a red color to reflect the
fact that an application is not installed, disabled or expired
(i.e. security vulnerability present); and a green color may
indicate that the application is installed and/or running (i.e.
protection present). Still yet, an amber color may be used to
reflect caution or some intermediate degree of vulnerability.
[0058] Of course, the status indicator 506 may include any
combination of textual, graphic, numeric visuals that indicates a
status of the applications 504. Moreover, such status may include
installed, not installed, expired, enabled, disabled, version
number or any other conceivable state of the applications.
[0059] FIG. 6 illustrates an exemplary anti-virus application
window 600 associated with an anti-virus application, in accordance
with one embodiment. As an option, the present window 600 may be
displayed in the context of the interface 500 of FIG. 5 and,
specifically, in response to the selection of one of the selection
icons 514 in accordance with operations 408-410 of the method 400
FIG. 4. Of course, however, the window 600 may be used out in any
desired environment.
[0060] As shown, the anti-virus application window 600 may include
a control frame 602 including an enable/disable icon 604 for
selectively enabling/disabling the anti-virus application by a
simple mouse-click or the like. Further provided in such control
frame 602 are an application-specific help icon 606 and an
application-specific information icon 608. Similar to the home page
of FIG. 5, the anti-virus application window 600 may include a
general update icon 620, a general additional information icon 622,
a general support icon 624, and a general help icon 626.
[0061] In addition to the previous features, the anti-virus
application window 600 may include a scan icon 630 for scanning
data on the computer. A rescue disk icon 632 is provided for
creating a rescue disk capable of rebooting a computer after being
infected by a virus. Still yet, a quarantine icon 634 is provided
for situating an allegedly or known to be infected file in a
quarantine area. Further provided is a configure icon 636 for
modifying various options associated with the anti-virus
application. A virus map icon 638 may be used to view
concentrations of infected data and sources of viruses on a world
map. A virus information icon 640 may be used to locate general
information regarding various viruses.
[0062] FIG. 7 illustrates an exemplary firewall application window
700 associated with a firewall application, in accordance with one
embodiment. As an option, the present window 700 may be displayed
in the context of the interface 500 of FIG. 5 and, specifically, in
response to the selection of one of the selection icons 514 in
accordance with operations 408-410 of the method 400 FIG. 4. Of
course, however, the window 700 may be used out in any desired
environment.
[0063] As shown, the firewall application window 700 may include a
control frame 702 including an enable/disable icon 704 for
selectively enabling/disabling the firewall application by a simple
mouse-click or the like. Further provided in such control frame 702
are an application-specific help icon 706 and an
application-specific information icon 708. Similar to the home page
of FIG. 5, the firewall application window 700 may include a
general update icon 720, a general additional information icon 722,
a general support icon 724, and a general help icon 726.
[0064] In addition to the previous features, the firewall
application window 700 may include a firewall summary icon 730 for
viewing a non-technical report of firewall activity. Moreover, an
event log icon 732 may be provided for viewing a technical
highly-detailed report of the firewall activity. An attack may be
traced on a map utilizing a track icon 734. Still yet, the firewall
application may be configured and tested utilizing a firewall
configure icon 736 and firewall test icon 738, respectively.
[0065] FIG. 8 illustrates an exemplary privacy service application
window 800 associated with a privacy service application, in
accordance with one embodiment. As an option, the present window
800 may be displayed in the context of the interface 500 of FIG. 5
and, specifically, in response to the selection of one of the
selection icons 514 in accordance with operations 408-410 of the
method 400 FIG. 4. Of course, however, the window 800 may be used
out in any desired environment.
[0066] As shown, the privacy service application window 800 may
include a control frame 802 including an enable/disable icon 804
for selectively enabling/disabling the privacy service application
by a simple mouse-click or the like. Further provided in such
control frame 802 are an application-specific help icon 806 and an
application-specific information icon 808. Similar to the home page
of FIG. 5, the privacy service application window 800 may include a
general update icon 820, a general additional information icon 822,
a general support icon 824, and a general help icon 826.
[0067] The privacy service application window 800 may further
include a sign out icon 830 for signing out a current user so that
a next user can use a computer. This is important since the privacy
service application may selectively block content based on a user
profile. Moreover, a report icon 832 may be included to report
Internet-related crimes via a network. Still yet, the privacy
service application may be configured utilizing a configure icon
834. A privacy information icon 836 may be used to obtain
additional information relating to various privacy-related subjects
(i.e. On-line chatting, etc.).
[0068] FIG. 9 illustrates an exemplary anti-spam application window
900 associated with an anti-spam application, in accordance with
one embodiment. As an option, the present window 900 may be
displayed in the context of the interface 500 of FIG. 5 and,
specifically, in response to the selection of one of the selection
icons 514 in accordance with operations 408-410 of the method 400
FIG. 4. Of course, however, the window 900 may be used out in any
desired environment.
[0069] As shown, the anti-spam application window 900 may include a
control frame 902 including an enable/disable icon 804 for
selectively enabling/disabling the anti-spam application by a
simple mouse-click or the like. Further provided in such control
frame 902 are an application-specific help icon 906 and an
application-specific information icon 908. Similar to the home page
of FIG. 5, the anti-spam application window 900 may include a
general update icon 920, a general additional information icon 922,
a general support icon 924, and a general help icon 926.
[0070] Moreover, the anti-spam application window 900 may further
include a blocked e-mail icon 930 adapted for allowing a user to
view e-mail that has been blocked by the anti-spam application. As
an option, the anti-spam application may be configured utilizing a
configure icon 932.
[0071] FIG. 10 illustrates a method 1000 for displaying a status of
a security application, in accordance with one embodiment. As an
option, the present method 1000 may be implemented in the context
of the system 300 of FIG. 3. Of course, however, the method 1000
may be carried out in any desired environment.
[0072] In operation 1001, a status of at least one security
application is identified. In one embodiment, the status of a
plurality of applications may be identified. As set forth before,
the status may include installed, not installed, expired, enabled,
disabled, version number, update status or any other conceivable
state of each application.
[0073] Next, in operation 1002, an individual index representative
of a degree of risk associated with the status of each security
application is calculated. Again, one individual index may be
calculated for each security application or, in other words, a
plurality of indices may be calculated for multiple security
applications.
[0074] In one embodiment, each individual index may be calculated
using a plurality of aspects of the status of the associated
security application. Just by way of example, a signature file of
the security application and/or a version of the security
application may be used to calculate the individual index. More
information regarding exemplary techniques of calculating the
indices will be set forth in greater detail during reference to
FIG. 11 and Appendix A.
[0075] As an option, each index may include a number between one
(1) and ten (10). Of course, each index may include any
alphanumeric range or merely include symbols, etc.
[0076] Instead of or in addition to calculating the individual
index in operation 1002, an overall index may be calculated which
is representative of a degree of risk associated with the
collective status of the security applications. Note operation
1004. In one embodiment, such calculation may include a weighted
average of the individual indices associated with each of the
security applications.
[0077] In operation 1006, each individual index and/or the overall
index are displayed. Of course, such display may be accomplished in
any desired manner. Just by way of example, the indices may be
displayed alphanumerically, graphically, utilizing a bar-graph,
utilizing a color coding, etc. As an option, the color coding may
correlate with the degree of risk associated with the status, as
will soon become apparent during the description of the exemplary
interface of the following figure.
[0078] FIG. 11 illustrates an exemplary graphical user interface
1100 for displaying a status of at least one security application,
in accordance with one embodiment. Optionally, such graphical user
interface 1100 may be used in the context of the system 300 and
method 1000 of FIGS. 3 and 10, respectively. Of course, the various
features of the graphical user interface 1100 may be used in any
desired manner.
[0079] As shown, two versions 1102, 1104 of the graphical user
interface 1100 are shown to reflect different statuses of the
various applications associated therewith. Included with the
graphical user interface 1100 is a plurality of bar graphs 1106
each associated with a corresponding application. The size of each
bar graph 1106 is commensurate with a numerical index 1108
associated therewith, and optionally positioned adjacent
thereto.
[0080] Moreover, the bar graphs 1106 may be color-coded.
Specifically, the color of each bar graph 1106 may be based on the
associated numerical index 1108. Just by way of example, each bar
graph 1106 may include a red color upon the numerical index 1108
falling below a predetermined numerical index threshold, thus
representing a high degree of risk associated with the current
status of the associated application. Conversely, each bar graph
1106 may include a green color upon the numerical index 1108 rising
above a predetermined numerical index threshold, thus representing
a low degree of risk associated with the current status of the
associated application.
[0081] As shown in FIG. 11, both an overall index and individual
indices are provided with the graphical user interface 1100. As
mentioned earlier, the various indices may be calculated in a
variety of ways.
[0082] In one embodiment, an index associated with the status of an
anti-virus security application may reflect a signature file of the
anti-virus security application and/or a version of the anti-virus
security application. Optionally, such index may be calculated
using a weighted average of a plurality of aspects of the
anti-virus security application including the signature file of the
anti-virus security application and the version of the anti-virus
security application.
[0083] In another embodiment where the index is associated with the
status of a firewall security application, the index may reflect a
version of the firewall security application. Similarly, in still
another embodiment where the index is associated with the status of
a privacy service security application, the index may reflect a
version of the privacy service security application.
[0084] In yet another embodiment where the index includes an
overall index reflecting a plurality of security applications, such
overall index may be calculated using a weighted average of a
plurality of separate indices associated with each of the security
applications.
[0085] With continuing reference to FIG. 11, the various indices
1106 shown with the two versions 1102, 1104 of the graphical user
interface 1100 are clearly different due to the dependence of the
status of the related applications. See such application statuses
listed below the indices 1106.
[0086] Appendix A sets forth a detailed exemplary technical
specification for calculating and presenting the security indices
set forth in FIG. 11. It should be noted that such specification is
set forth for illustrative purposes only, and should not be
construed as limiting in any manner.
[0087] Optionally, additional information relating to the status
may be displayed upon the selection of the appropriate displayed
index 1106. For example, a window associated with the appropriate
application (see, for example, FIGS. 6-9) may be displayed. Such
additional information may include a link capable of being selected
by a user. Action may then be taken to decrease the degree of risk
associated with the status, in response to the selection of the
link by the user. For instance, a more recent version or update of
the application may be downloaded.
[0088] FIG. 12 illustrates a method 1200 for alerting users of a
plurality of computers of a security event via a network, in
accordance with one embodiment. As an option, the present method
1200 may be implemented in the context of the system 300 of FIG. 3.
Of course, however, the method 1200 may be carried out in any
desired environment.
[0089] Initially, in operation 1202, a security alert is generated
including information relating to a security event utilizing a
server. The security alert may take any desired format (i.e. HTML,
XML, etc.) capable of being transmitted via a network and
eventually displayed on a user computer. Moreover, the information
may include any data relevant to the security event. Table 1
illustrates some exemplary information that may be included with
the security alert. Of course, such information is set forth for
illustrative purposes only, and should not be construed as limiting
in any manner.
TABLE-US-00001 TABLE 1 Alert status (i.e. high, medium, low, etc.)
Possible Response Actions (i.e. get security application or an
update thereof, get more information, etc.) Content (i.e.
description of security event, etc.)
[0090] It should be noted that the foregoing alert status may be
generated in any desired manner. For example, it may be gleaned
from an organization such as the Anti-Virus Emergency Response Team
(AVERT) administered by NETWORK ASSOCIATES, INC.RTM..
[0091] Thus, the information may include a level of the security
alert. Such level of the security alert may, in turn, reflect a
level of risk associated with the security event. Moreover, the
information may include at least one proposed user action relating
to the security event. For example, such proposed user action may
involve obtaining more information relating to the security event
and/or obtaining protection from the security event. Further, the
information may include a response automatically carried out in
reaction to the security event. For example, such response may
include scanning a computer, scanning a file, cleaning a file,
and/or blocking access to a computer. Still yet, the information
may simply include a description of the security event.
[0092] Next, in operation 1204, the security alert is pushed from
the server to a plurality of user computers via a network such as
the Internet. In the context of the present description, such
pushing may include any technique where the server initiates the
delivery of the security alert to the user computers.
[0093] It should be noted that the foregoing pushing may be
accomplished in a variety of foreseeable ways. Just by way of
example, the security alert pushed from the server to the user
computers may actually come as the result of a programmed request
from the user computers. That is, a client program may be used to
facilitate such pushed security alerts. This program may further
capture a user profile for reasons that will soon become
apparent.
[0094] Still yet, the pushing may include a simple broadcasting of
the security alert. In this case, the security alert may be pushed
to the user computers that have access to a particular channel or
frequency. Broadcast may (but not always) involve a continuous flow
of information.
[0095] As mentioned earlier, a user profile may be obtained during
the course of the present method 1200. In particular, in operation
1206, a status of security applications on the computer may be
identified. Such user profile may include data relating to a
security application installed on a computer. For example, the
status may indicate whether the security application is installed,
enabled, etc. Also, the status may indicate whether a subscription
associated with the security application is expired.
[0096] The specific profile identified in operation 1206 may, in
turn, be used to conditionally display the information of the
security alert based on the status of the security application(s)
on the computer. Note operation 1208.
[0097] For example, the security alert may include a plethora of
user options such as updating a particular security application,
etc. However, if upon delivery of the security alert, it may be
determined that the particular security application is not
installed, expired, etc. In such case, an option to obtain the
security application may be displayed, as opposed to an option to
obtain an update.
[0098] Thus, in one embodiment, a large amount of information
associated with the security alert may be downloaded to accommodate
the numerous statuses associated with different computers. This may
be feasible, for example, since large amounts of HTML information
may be efficiently transmitted over a network such as the Internet.
Logic (i.e. an application program interface, plug-in, etc.) may
then be used to parse the large amount of information into a subset
which is to be displayed based on the status of the security
applications. Of course, some of such logic may conceivably be
carried out on the server such that the alerts are tailored prior
to being pushed.
[0099] In any case, the security alert may be displayed in a front
most window of a user interface of the computers. In the present
description, such a window may include any frame, portion, etc. of
the user interface. By virtue of the aforementioned pushing, such
display may be carried out in an automatic fashion, thus alerting
users as soon as possible. One exemplary security alert will be set
forth in greater detail during reference to FIGS. 13 and 14.
[0100] FIG. 13 illustrates an exemplary graphical user interface
1300 for alerting users of a plurality of computers of a security
event via a network, in accordance with one embodiment. Optionally,
such graphical user interface 1300 may be used in the context of
the method 1200 of FIG. 12. Of course, the various features of the
graphical user interface 1300 may be used in any desired
manner.
[0101] As shown, the graphical user interface 1300 includes a front
most window 1304 which is automatically displayed over a background
window 1302 that was running at the time the pushed security alert
was received. Optionally, the front most window 1304 may be moved
about the background window 1302 while a user decides how to react
to the security alert.
[0102] Still yet, the user may continue work in the background
window 1302 while the front most window 1304 is maintained in the
foreground. Moreover, this foreground status of the front most
window 1304 may be maintained despite the background window 1302
being changed as a result of the user changing applications, etc.
As an option, the front most window 1304 may stay in the foreground
until the user selects one of the options set forth in the security
alert. More information regarding the design of a specific security
alert will be set forth during reference to FIG. 14.
[0103] FIG. 14 illustrates an exemplary security alert 1400 for
alerting users of a plurality of computers of a security event via
a network, in accordance with one embodiment. Optionally, such
security alert 1400 may be used in the context of the method 1200
of FIG. 12 and the interface 1300 of FIG. 13. Of course, the
various features of the security alert 1400 may be used in any
desired manner.
[0104] As shown, the security alert 1400 may include a square or
rectangular window with a first portion 1402 including a
description 1404 of the security event. As shown, such description
includes an alert level associated with the security event. Again,
such description and alert level may be pushed as part of the
information corresponding with the security alert 1400.
[0105] Further provided is a second portion 1406 including a number
of proposed response options displayed to the user based on the
profile of the user (i.e. status of the applications on the
computer, etc.). Such response options may be carried out by the
selection thereof by a user utilizing a mouse-click or the like.
While this may be accomplished in any desired manner, one exemplary
method may include the technique set forth in U.S. Pat. No.
6,266,774 entitled "Method and system for securing, managing or
optimizing a personal computer," which is incorporated herein by
reference in its entirety.
[0106] It should be noted that the security alert shown in FIG. 14
may also serve as a marketing agent in addition to its inherent
security function. For example, a status of a subscription of a
subscriber of an application-related service may be first
identified utilizing a server. An alert may then be conditionally
pushed to the subscriber of the application-related service via a
network based on the status. A purchase link may then be displayed
with the alert which is capable of being used by the subscriber of
the application-related service to renew the subscription for the
application-related service via the network.
[0107] Moreover, a status of security applications on the computer
may be identified upon the receipt of a security alert like that
shown in FIG. 14. A purchase link may then be conditionally
displayed with the security alert based on the status of the
security applications on the computer. Such purchase link is
capable of being utilized by a user of the computer to purchase a
service related to the security applications in response to the
security event associated with the security alert.
[0108] As an option, the security alert 1400 may be color-coded to
reflect a level of severity associated with the alert. For example,
red may reflect a high severity (i.e. including security alerts),
blue may reflect a medium severity (i.e. including application
tasks), and green may reflect a low severity (i.e. including
application responses, marketing or general information).
[0109] FIG. 15 illustrates an exemplary graphical user interface
1500 for selling application-related services, in accordance with
one embodiment. Optionally, such graphical user interface 1500 may
be used in the context of the method 400 of FIG. 4. For example,
the graphical user interface 1500 may be displayed upon the
selection of one of the selection icons 514 of FIG. 5, when the
related application is not installed, expired, etc. Of course, the
various features of the graphical user interface 1500 may be used
in any desired manner.
[0110] As shown, a plurality of purchase links 1502 is
conditionally displayed based on the status of the related
applications on the computer. Such purchase link may be capable of
being utilized by a user of the computer to purchase a service
associated with the related applications via the network.
[0111] FIG. 16 illustrates an exemplary graphical user interface
1600 tailored to manage a plurality of related applications of a
specific entity (i.e. company, organization, etc.), in accordance
with one embodiment. Optionally, such graphical user interface 1600
may be used in the context of the method 400 of FIG. 4. Of course,
the various features of the graphical user interface 1600 may be
used in any desired manner.
[0112] As shown, the graphical user interface 1600 includes a field
for a specific entity logo 1602 using the present system. Moreover,
various tailored user options 1604 are provided to accommodate the
specific needs of the entity. Also, the various selection icons
1606 may be selectively displayed based on whether the applications
are being used by the entity.
[0113] To accomplish this, a plurality of fields associated with
such aspects of the multi-application managing interface may be
made available to a desirer or administrator. In one embodiment,
such fields may be provided via a management/designer/programmer
interface or the like. Such fields are subsequently filled with
content tailored to an entity (i.e. a specific company) including a
multiplicity of computers each equipped the multi-application
managing interface. Thus, the multi-application managing interface
may be displayed on the computers with the content.
[0114] Optionally, a data structure may be provided for tailoring a
multi-application managing interface. Included with the data
structure is a map object for mapping a plurality of fields with
content tailored to an entity including a multiplicity of computers
each including a multi-application managing interface. Such fields
are associated with a plurality of aspects of the multi-application
managing interface.
[0115] While various embodiments have been described above, it
should be understood that they have been presented by way of
example only, and not limitation. For example, any of the network
elements may employ any of the desired functionality set forth
hereinabove. Thus, the breadth and scope of a preferred embodiment
should not be limited by any of the above-described exemplary
embodiments, but should be defined only in accordance with the
following claims and their equivalents.
APPENDIX A
Security Index
[0116] The "Security Index" is based on the results of the
"Anti-Virus", "Anti-Hacker", and the "Anti-Abuse" indices. Here is
the formula:
uSecurityIndex=(55% of uAntiVirusIndex)+(35% of
uAntiHackerindex)+(10% of uAntiAbuseIndex)
[0117] I would recommend that you have a routine called something
like:
BOOL SIGetAllIndexes(out UINT uSecurityIndex, [0118] out UINT
uAntiVirusIndex, [0119] out UINT uAntiHackerindex, [0120] out UINT
uAntiAbuseIndex);
[0121] You can have them return a number between 0 and 100. Or you
can have them just return the strings, "3.4". That way, you can
just display it as you receive it without having to convert it to a
number between 0-100 and then convert from a number to a
string.
Anti-Virus Index
[0122] Here is the formula for the anti-virus index:
uAntiVirusIndex=(60% of DAT Factor)+(40% of AntiVirus Product
Factor)
Anti-Hacker Index
[0123] Here is the formula for the anti-hacker index:
uAntiHackerindex=(100% of AntiHacker Product Factor)
Anti-Abuse Index
[0124] Here is the formula for the anti-abuse index:
TABLE-US-00002 uAntiAbuseIndex = (100% of AntiAbuse Product Factor)
BOOL SIGetAllIndexes (UINT *puSecurityIndex, UINT
*puAntiVirusIndex, UINT *puAntiHackerIndex, UINT *puAntiAbuseIndex)
{ UINT uAVProductFactor, uDATFactor;
GetProductVersionFactor(bMessageTable[AV_PRODUCT_BASE],
&uAVProductFactor); GetDATFactor(&uDATFactor);
*puAntiVirusIndex = (60% * uAVProductFactor) + (40% * uDATFactor);
GetProductVersionFactor(bMessageTable[FW_PRODUCT_BASE],
puAntiHackerIndex);
GetProductVersionFactor(bMessageTable[PS_PRODUCT_BASE],
puAntiAbuseIndex); *puSecurityIndex = (55% of *puAntiVirusIndex) +
(35% of *puAntiHackerIndex) + (10% of *puAntiAbuseIndex) }
Product Factor
[0125] The product factor is dependent on 2 things: 1) The
product's version; and 2) The product's modification date.
[0126] Get the product's version information using the
following:
Use VerQueryValue(x, "\", y, z) to get the VS FIXEDFILEINFO
structure. Once you have this structure, get the values as follows:
wMajor=HIWORD(dwFileVersionMS); wMinor=LOWORD(dwFileVersionMS);
wRevision=HIWORD(dwFileVersionLS);
wBuild=LOWORD(dwFileVersionLS);
[0127] The product factor is a value from 0-100. Here is the
breakdown of how it is computed:
TABLE-US-00003 Value Description 100 Product up-to-date 90 The
revision version is old 70 The minor version is old 40 The major
version is old 0 Product doesn't exist (-20) Subtract this, if
product is >2 years old #define PRODUCT_UP_TO_DATE 100 #define
PRODUCT_OLD_REVISION 90 #define PRODUCT_OLD_MINOR 70 #define
PRODUCT_OLD_MAJOR 40 #define PRODUCT_DOESNT_EXIST_FACTOR 0 #define
PRODUCT_OLD_FACTOR 20
TABLE-US-00004 BOOL GetProductVersionFactor(BOOL
*pbProductMessageTable, UINT *puFactor) { UINT uFactor =
PRODUCT_UP_TO_DATE; if (Product Installed) { if (majorVersion <
latestMajorVersion) { uFactor = OLD_MAJOR_VERSION_FACTOR;
*(pbProductMessageTable + OLD_MAJOR_OFFSET) = TRUE; } else if
(majorVersion == latestMajorVersion) { if (minorVersion <
latestMinorVersion) { uFactor = OLD_MINOR_VERSION_FACTOR;
*(pbProductMessageTable + OLD_MINOR_OFFSET) = TRUE; } else if
(minorVersion == latestMinorVersion) { if (revisionVersion <
latestRevisionVersion) { uFactor = OLD_REVISION_VERSION_FACTOR;
*(pbProductMessageTable + OLD_REVISION_OFFSET) = TRUE; } } } // No
matter what version is, if the product is older than 2 years old,
then // penalize it. if (product >= 2 years old) { uFactor -=
PRODUCT_OLD_FACTOR; *(pbProductMessageTable + TWO_YEARS_OLD_OFFSET)
= TRUE; } // See if any messages generated. If not, then generate
the UP-TO-DATE // message. We always want to generate some message,
so user knows why his // score is so low or high. if (uFactor ==
PRODUCT_UP_TO_DATE) { *(pbProductMessageTable + UP_TO_DATE_OFFSET)
= TRUE; } else if (product is one of our products: VSO, MPS, or
MPF) { // See if any error messages generated. If so, turn them off
and just set // our product specific message, since the other
messages are sales // pitches for our products. BOOL bErrorFound =
FALSE; For (int i = PRODUCT_ERROR_START; i <= PRODUCT_ERROR_END;
i++) { if (TRUE == *(pbProductMessageTable + i)) { bErrorFound =
TRUE; // Don't display this message. *(pbProductMessageTable + i) =
FALSE; } } // We found an error with our product. Just display
product- specific // message, which doesn't have sales pitch. if
(bErrorFound) *(pbProductMessageTable + OUT_OF_DATE_OFFSET) = TRUE;
} else // Product doesn't exist { uFactor =
PRODUCT_DOESNT_EXIST_FACTOR; *(pbProductMessageTable + NONE_OFFSET)
= TRUE; } *puFactor = uFactor; }
DAT Factor
[0128] The DAT factor is solely based on the modification date of
the DAT file.
[0129] The DAT factor is a value from 0-100. Here is the breakdown
of how it is computed:
TABLE-US-00005 Value Description 100 DAT less than 2 weeks old 50
DAT less than 3 months old 30 DAT less than 1 year old 10 DAT less
than 2 years old 5 DAT exists, but older than 2 years old 0 DAT
doesn't exist #define DAT_UP_TO_DATE 100 #define DAT_TWO_WEEKS_OLD
50 #define DAT_THREE_MONTHS_OLD 30 #define DAT_ONE_YEAR_OLD 10
#define DAT_TWO_YEARS_OLD 5 #define DAT_DOESNT_EXIST_FACTOR 0
TABLE-US-00006 GetDATFactor(out UINT *puDATFactor) UINT uFactor =
DAT_UP_TO_DATE; if (DAT Exists) { if (DAT > 2 weeks old) { if
(DAT <= 3 months old) { uFactor = DAT_TWO_WEEKS_OLD;
bMessageTable[AV_DAT_TWO_WEEKS_OLD] = TRUE; } else if (DAT <= 1
year old) { uFactor = DAT_THREE_MONTHS_OLD;
bMessageTable[AV_DAT_THREE_MONTHS_OLD] = TRUE; } else if (DAT <=
2 years old) { uFactor = DAT_ONE_YEAR_OLD;
bMessageTable[AV_DAT_ONE_YEAR_OLD] = TRUE; } else // DAT > 2
years old { uFactor = DAT_TWO_YEARS_OLD;
bMessageTable[AV_DAT_TWO_YEARS_OLD] = TRUE; } } } else // DAT
doesn't exist { uFactor = DAT_DOESNT_EXIST_FACTOR;
bMessageTable[AV_DAT_NONE] = TRUE; } // If this is VSO, we don't
want to display "sales pitch" messages. Instead, // just VSO
message. if (product is VSO) { // See if any error messages
generated. If so, turn them off and just set // our product
specific message, since the other messages are sales // pitches for
our products. BOOL bErrorFound = FALSE; For (int i =
AV_DAT_ERROR_START; i <= AV_DAT_ERROR_END; i++) { if (TRUE ==
bMessageTable[i]) { bErrorFound = TRUE; // Don't display this
message. bMessageTable[i] = FALSE; } } // We found an error with
our product. Just display product-specific // message, which
doesn't have sales pitch. if (bErrorFound) {
bMessageTable[AV_PRODUCT_VSO_OUT_OF_DATE] = TRUE; // Also, make
sure the VSO's UP_TO_DATE message is not set!
bMessageTable[AV_PRODUCT_UP_TO_DATE] = FALSE; } } *puDATFactor =
uFactor;
Security Index Descriptions
[0130] The descriptions below specify what is displayed to the
user, based upon the results of the factors. The following
parameters is needed to display every message here:
Product Name (ex. "Norton AntiVirus") Product Version (need both
"major.minor" and "major.minor.revision") Latest Version (need both
"major.minor" and "major.minor.revision") Product Date (is
displayed as "# of years") DAT Date (is displayed as "# of
years")
AV_PRODUCT_VSO_OUT_OF_DATE
Category: Anti-Virus
[0131] Display this in place of any AV_* strings (except
AV_PRODUCT_UP_TO_DATE) We display this for VSO, since all the other
AV_* strings push VSO for its "always up-to-date" aspect. Instead,
if VSO is not up-to-date, we display this "nicer" message.
Description
[0132] Old version of anti-virus software detected.
Details:
[0133] The anti-virus software you have, McAfee.com VirusScan
Online, is not up-to-date. If you are a subscriber to McAfee.com
VirusScan Online, you are entitled to the latest version. There are
now over 50,000 computer viruses and 500 new viruses are created
every month. It is extremely important that you get the latest
version to protect you from the latest virus threats.
Recommendation:
[0134] Click on the `Updates` button at the top of the McAfee.com
SecurityCenter to update VirusScan Online to the latest version. If
you don't have a subscription to VirusScan Online, connect to the
Internet and then click on Tell Me More About Anti-Virus
Solutions.
AV_PRODUCT_UP_TO_DATE
Category: Anti-Virus
[0135] % s1--Name of anti-virus product (ex. "Norton AntiVirus")
Display this message if there are no AV_* messages to display.
Description
[0136] Your anti-virus software is up-to-date.
Details:
[0137] You have the latest version of your anti-virus software, %
s1. You also have the latest version of the Virus Signature files
for this anti-virus software. Your computer is well-protected
against the latest virus threats.
Recommendation:
[0138] New viruses are being created at the rate of 500 new viruses
per month. That's the reason why it is extremely important for you
to always have the latest version of your anti-virus software and
also the latest Virus Signature files. Make sure you continue to
keep your anti-virus software up-to-date.
AV_PRODUCT_NONE
Category: Anti-Virus
[0139] No variables
Description
[0140] No anti-virus software is installed on your computer.
Details:
[0141] Your computer is not protected from viruses. There are now
over 50,000 computer viruses and 500 new viruses are created every
month. You are extremely vulnerable of having your computer
infected by a virus.
Recommendation:
[0142] It is highly recommended that you get an anti-virus
solution. The best type of anti-virus solution is one which is
"always up-to-date". McAfee.com VirusScan Online, the #1 anti-virus
solution of this type, ensures that you are always up-to-date,
protecting you from the latest virus threats. For more information,
make sure you are connected to the Internet and then click Tell Me
More About Anti-Virus Solutions.
AV_PRODUCT_TWO_YEARS_OLD
Category: Anti-Virus
[0143] % s1--name of anti-virus product (ex. "Norton AntiVirus") %
d2--Number of years old this product is ((current date-product
date)/365). This will always be 2 or more years.
Description
[0144] Old obsolete anti-virus software detected.
Details:
[0145] The anti-virus software you have, % s1, is over % d2 years
old. Since then, there have been 500 new viruses per month, plus
many new types of viruses. Your anti-virus software will not
protect you from the viruses that have been created in the last %
d2 years. You are extremely vulnerable of having your computer
infected by a virus.
Recommendation:
[0146] It is highly recommended that you either purchase a new
version of your anti-virus software or you get an "always
up-to-date" anti-virus solution, like McAfee.com VirusScan Online,
the #1 anti-virus product of this type. If you have McAfee.com
VirusScan Online, your anti-virus software will always be
up-to-date, thus protecting you from the latest virus threats. For
more information, make sure you are connected to the Internet and
then click Tell Me More About Anti-Virus Solutions.
AV_PRODUCT_OLD_MAJOR
Category: Anti-Virus
[0147] % s1--name of anti-virus product (ex. "Norton AntiVirus") %
s2--Version number. Only display major/minor ("6.3", "7.0") %
s3--Latest version number. Only display major/minor ("6.3",
"7.0")
Description
[0148] Old version of anti-virus software detected.
Details:
[0149] The anti-virus software you have, % s1, is version % s2. The
latest version of this product is version % s3. The version you
have is obsolete and is not protecting you from the latest virus
threats. You are extremely vulnerable of having your computer
infected by a virus.
Recommendation:
[0150] It is highly recommended that you either purchase a new
version of your anti-virus software or you get an "always
up-to-date" anti-virus solution, like McAfee.com VirusScan Online,
the #1 anti-virus product of this type. If you have McAfee.com
VirusScan Online, your anti-virus software will always be
up-to-date, thus protecting you from the latest virus threats. For
more information, make sure you are connected to the Internet and
then click Tell Me More About Anti-Virus Solutions.
AV_PRODUCT_OLD_MINOR
Category: Anti-Virus
[0151] s1--name of anti-virus product (ex. "Norton AntiVirus") %
s2--Version number. Only display major/minor ("6.3", "6.5") %
s3--Latest version number. Only display major/minor ("6.3",
"6.5")
Description
[0152] Old version of anti-virus software detected.
Details:
[0153] The anti-virus software you have, % s1, is version % s2. The
latest version of this product is version % s3. The version you
have does not address a number of bug fixes and other problems that
were addressed in version % s3. Because you don't have this latest
version, your computer may be exposed to the latest computer
viruses.
Recommendation:
[0154] It is highly recommended that you either contact your
anti-virus software vendor and ask to have the latest version or
get an anti-virus solution where you will always have the latest
version. By having the latest version, you will always be protected
from the latest virus threats. McAfee.com VirusScan Online, the #1
"always up-to-date" anti-virus solution, ensures that you are
protected from the latest virus threats. For more information, make
sure you are connected to the Internet and then click Tell Me More
About Anti-Virus Solutions.
AV_PRODUCT_OLD_REVISION
Category: Anti-Virus
[0155] % s1--name of anti-virus product (ex. "Norton AntiVirus") %
s2--Version number. Only display major/minor/revision ("6.3.2",
"6.3.12") % s3--Latest version number. Only display
major/minor/revision ("6.3.2", "6.3.12")
Description
[0156] Old version of anti-virus software detected.
Details:
[0157] The anti-virus software you have, % s1, is version % s2. The
latest version of this product is version % s3. The version you
have does not address a number of bug fixes and other problems that
were addressed in version % s3. Because you don't have this latest
version, your computer may be exposed to the latest computer
viruses.
Recommendation:
[0158] It is highly recommended that you either contact your
anti-virus software vendor and ask to have the latest version or
get an anti-virus solution where you will always have the latest
version. By having the latest version, you will always be protected
from the latest virus threats. McAfee.com VirusScan Online, the #1
"always up-to-date" anti-virus solution, ensures that you are
protected from the latest virus threats. For more information, make
sure you are connected to the Internet and then click Tell Me More
About Anti-Virus Solutions.
AV_DAT_NONE
Category: Anti-Virus
[0159] % s1--name of anti-virus product (ex. "Norton
AntiVirus")
Description
[0160] Unable to find the Virus Signature files for your anti-virus
software.
Details:
[0161] Your anti-virus software, % s1, has modified the way it
stores its Virus Signature files. Because of this change, the
integrity and reliability of the Virus Signature files cannot be
determined.
Recommendation:
[0162] It is highly recommended that you either contact your
anti-virus software vendor and make sure you have the latest
version of the Virus Signature file or you get an "always
up-to-date" anti-virus solution, like McAfee.com VirusScan Online,
the #1 product of this type. If you have McAfee.com VirusScan
Online, your anti-virus software will always be up-to-date, thus
protecting you from the latest virus threats. For more information,
make sure you are connected to the Internet and then click Tell Me
More About Anti-Virus Solutions.
AV_DAT_TWO_YEARS_OLD
Category: Anti-Virus
[0163] % s1--name of anti-virus product (ex. "Norton AntiVirus") %
d2--Number of years old this DAT file is ((current date-DAT
date)/365). This will always be 2 or more years.
Description
[0164] Old obsolete Virus Signature file detected.
Details:
[0165] The anti-virus software you have, % s1, has a Virus
Signature file which is over % d2 years old. Since then, there have
been 500 new viruses per month, plus many new types of viruses.
Your anti-virus software will not protect you from the viruses that
have been created in the last % d2 years. You are extremely
vulnerable of having your computer infected by a virus.
Recommendation:
[0166] It is highly recommended that you either purchase a new
version of your anti-virus software or you get an "always
up-to-date" anti-virus solution, like McAfee.com VirusScan Online,
the #1 anti-virus product of this type. If you have McAfee.com
VirusScan Online, your anti-virus software will always be
up-to-date, thus protecting you from the latest virus threats. For
more information, make sure you are connected to the Internet and
then click Tell Me More About Anti-Virus Solutions.
AV_DAT_ONE_YEAR_OLD
Category: Anti-Virus
[0167] % s1--name of anti-virus product (ex. "Norton
AntiVirus")
Description
[0168] Old obsolete Virus Signature file detected.
Details:
[0169] The anti-virus software you have, % s1, has a Virus
Signature file which is over a year old. Since then, there have
been 500 new viruses per month, plus many new types of viruses.
Your anti-virus software will not protect you from the viruses that
have been created in the last year. You are extremely vulnerable of
having your computer infected by a virus.
Recommendation:
[0170] It is highly recommended that you either purchase a new
version of your anti-virus software or you get an "always
up-to-date" anti-virus solution, like McAfee.com VirusScan Online,
the #1 anti-virus product of this type. If you have McAfee.com
VirusScan Online, your anti-virus software will always be
up-to-date, thus protecting you from the latest virus threats. For
more information, make sure you are connected to the Internet and
then click Tell Me More About Anti-Virus Solutions.
AV_DAT_THREE_MONTHS_OLD
Category: Anti-Virus
[0171] % s1--name of anti-virus product (ex. "Norton
AntiVirus")
Description
[0172] Old obsolete Virus Signature file detected.
Details:
[0173] The anti-virus software you have, % s1, has a Virus
Signature file which is over 3 months old. Since then, there have
been 500 new viruses per month, plus many new types of viruses.
Your anti-virus software will not protect you from the viruses that
have been created in the last 3 months. You are extremely
vulnerable of having your computer infected by a virus.
Recommendation:
[0174] It is highly recommended that you either contact your
anti-virus software vendor and ask for the latest Virus Signature
files or you get an "always up-to-date" anti-virus solution, like
McAfee.com VirusScan Online, the #1 anti-virus product of this
type. If you have McAfee.com VirusScan Online, your anti-virus
software will always be up-to-date, thus protecting you from the
latest virus threats. For more information, make sure you are
connected to the Internet and then click Tell Me More About
Anti-Virus Solutions.
AV_DAT_TWO_WEEKS_OLD
Category: Anti-Virus
[0175] % s1--name of anti-virus product (ex. "Norton
AntiVirus")
Description
[0176] Old Virus Signature file detected.
Details:
[0177] The anti-virus software you have, % s1, has a Virus
Signature file which is over 2 weeks old. Your anti-virus software
will not protect you from the most recent virus threats.
Recommendation:
[0178] It is highly recommended that you either contact your
anti-virus software vendor and ask for the latest Virus Signature
files or you get an "always up-to-date" anti-virus solution, like
McAfee.com VirusScan Online, the #1 anti-virus product of this
type. If you have McAfee.com VirusScan Online, your anti-virus
software will always be up-to-date, thus protecting you from the
latest virus threats. For more information, make sure you are
connected to the Internet and then click Tell Me More About
Anti-Virus Solutions.
FW_PRODUCT_MPF_OUT_OF_DATE
Category: Anti-Hacker
[0179] Display this in place of any FW_* strings (except FW
PRODUCT_UP_TO_DATE) We display this for MPF, since all the other
FW_* strings push MPF for its "always up-to-date" aspect. Instead,
if MPF is not up-to-date, we display this "nicer" message.
Description
[0180] Old version of anti-hacker software detected.
Details:
[0181] The anti-hacker software you have, McAfee.com Personal
Firewall, is not up-to-date. If you are a subscriber to McAfee.com
Personal Firewall, you are entitled to the latest version. Hackers
are continuously devising new ways of "hacking" into your computer.
It is extremely important that you get the latest version to
protect you from the latest hacker attacks.
Recommendation:
[0182] Click on the `Updates` button at the top of the McAfee.com
SecurityCenter to update McAfee.com Personal Firewall to the latest
version. If you don't have a subscription to McAfee.com Personal
Firewall, connect to the Internet and then click on Tell Me More
About Anti-Hacker Solutions.
FW PRODUCT_UP_TO_DATE
Category: Anti-Hacker
[0183] % s1--Name of anti-hacker product (ex. "ZoneLabs ZoneAlarm")
Display this message if there are no FW_* messages to display.
Description
[0184] Your anti-hacker software is up-to-date.
Details:
[0185] You have the latest version of your anti-hacker software, %
s1. Your computer is protected against the latest hacker
attacks.
Recommendation:
[0186] New hacker attacks are occurring monthly. That's the reason
why it is extremely important for you to always have the latest
version of your anti-hacker software. Make sure you continue to
keep your anti-hacker software up-to-date.
FW_PRODUCT_NONE
Category: Anti-Hacker
[0187] No variables
Description
[0188] No anti-hacker software is installed on your computer.
Details:
[0189] Your computer is not protected from hackers. Hackers are
continuously trying to take control of as many computers as they
can. Since you don't have a firewall, a hacker can easily take
control of your computer and view personal information you have
stored on it. You are extremely vulnerable of having your computer
"hacked" by a hacker.
Recommendation:
[0190] It is highly recommended that you get an anti-hacker
solution. The best type of anti-hacker solution is one which is
"always up-to-date". McAfee.com Personal Firewall, the #1
anti-hacker solution of this type, ensures that you are always
up-to-date, protecting you from the latest hacker threats. For more
information, make sure you are connected to the Internet and then
click Tell Me More About Anti-Hacker Solutions.
FW_PRODUCT_TWO_YEARS_OLD
Category: Anti-Hacker
[0191] % s1--name of anti-hacker product (ex. "ZoneLabs ZoneAlarm")
% d2--Number of years old this product is ((current date-product
date)/365). This will always be 2 or more years.
Description
[0192] Old obsolete anti-hacker software detected.
Details:
[0193] The anti-hacker software you have, % s1, is over % d2 years
old. Since then, there have been many new hacker attacks. Your
anti-hacker software will not protect you from the hacker attacks
that have been created in the last % d2 years. You are extremely
vulnerable of having your computer "hacked" by a hacker.
Recommendation:
[0194] It is highly recommended that you either purchase a new
version of your anti-hacker software or you get an "always
up-to-date" anti-hacker solution, like McAfee.com Personal
Firewall, the #1 anti-hacker product of this type. If you have
McAfee.com Personal Firewall, your anti-hacker software will always
be up-to-date, thus protecting you from the latest hacker attacks.
For more information, make sure you are connected to the Internet
and then click Tell Me More About Anti-Hacker Solutions.
FW_PRODUCT_OLD_MAJOR
Category: Anti-Hacker
[0195] % s1--name of anti-hacker product (ex. "ZoneLabs ZoneAlarm")
% s2--Version number. Only display major/minor ("6.3", "7.0") %
s3--Latest version number. Only display major/minor ("6.3",
"7.0")
Description
[0196] Old version of anti-hacker software detected.
Details:
[0197] The anti-hacker software you have, % s1, is version % s2.
The latest version of this product is version % s3. The version you
have is obsolete and is not protecting you from the latest hacker
attacks. You are extremely vulnerable of having your computer
"hacked" by a hacker.
Recommendation:
[0198] It is highly recommended that you either purchase a new
version of your anti-hacker software or you get an "always
up-to-date" anti-hacker solution, like McAfee.com Personal
Firewall, the #1 anti-hacker product of this type. If you have
McAfee.com Personal Firewall, your anti-hacker software will always
be up-to-date, thus protecting you from the latest hacker attacks.
For more information, make sure you are connected to the Internet
and then click Tell Me More About Anti-Hacker Solutions.
FW_PRODUCT_OLD_MINOR
Category: Anti-Hacker
[0199] % s1--name of anti-hacker product (ex. "ZoneLabs ZoneAlarm")
% s2--Version number. Only display major/minor ("6.3", "6.5")
s3--Latest version number. Only display major/minor ("6.3",
"6.5")
Description
[0200] Old version of anti-hacker software detected.
Details:
[0201] The anti-hacker software you have, % s1, is version % s2.
The latest version of this product is version % s3. The version you
have does not address a number of bug fixes and other problems that
were addressed in version % s3. Because you don't have this latest
version, your computer may be exposed to the latest hacker
attacks.
Recommendation:
[0202] It is highly recommended that you either contact your
anti-hacker software vendor and ask to have the latest version or
get an anti-hacker solution where you will always have the latest
version. By having the latest version, you will always be protected
from the latest hacker attacks. McAfee.com Personal Firewall, the
#1 "always up-to-date" anti-hacker solution, ensures that you are
protected from the latest hacker attacks. For more information,
make sure you are connected to the Internet and then click Tell Me
More About Anti-Hacker Solutions.
FW_PRODUCT_OLD_REVISION
Category: Anti-Hacker
[0203] % s1--name of anti-hacker product (ex. "ZoneLabs ZoneAlarm")
% s2--Version number. Only display major/minor/revision ("6.3.2",
"6.3.12") % s3--Latest version number. Only display
major/minor/revision ("6.3.2", "6.3.12")
Description
[0204] Old version of anti-hacker software detected.
Details:
[0205] The anti-hacker software you have, % s1, is version % s2.
The latest version of this product is version % s3. The version you
have does not address a number of bug fixes and other problems that
were addressed in version % s3. Because you don't have this latest
version, your computer may be exposed to the latest hacker
attacks.
Recommendation:
[0206] It is highly recommended that you either contact your
anti-hacker software vendor and ask to have the latest version or
get an anti-hacker solution where you will always have the latest
version. By having the latest version, you will always be protected
from the latest hacker attacks. McAfee.com Personal Firewall, the
#1 "always up-to-date" anti-hacker solution, ensures that you are
protected from the latest hacker attacks. For more information,
make sure you are connected to the Internet and then click Tell Me
More About Anti-Hacker Solutions.
PS_PRODUCT_MPS_OUT_OF_DATE
Category: Anti-Abuse
[0207] Display this in place of any PS_* strings (except
PS_PRODUCT_UP_TO_DATE) We display this for MPS, since all the other
PS_* strings push MPS for its "always up-to-date" aspect. Instead,
if MPS is not up-to-date, we display this "nicer" message.
Description
[0208] Old version of anti-abuse software detected.
Details:
[0209] The anti-abuse software you have, McAfee.com Privacy
Service, is not up-to-date. If you are a subscriber to McAfee.com
Privacy Service, you are entitled to the latest version. Dishonest
Web sites are continuously devising new ways of obtaining your
confidential information from your computer. It is extremely
important that you get the latest version to protect you from the
latest privacy abuses.
Recommendation:
[0210] Click on the `Updates` button at the top of the McAfee.com
SecurityCenter to update McAfee.com Privacy Service to the latest
version. If you don't have a subscription to McAfee.com Privacy
Service, connect to the Internet and then click on Tell Me More
About Anti-Abuse Solutions.
PS_PRODUCT_UP_TO_DATE
Category: Anti-Abuse
[0211] % s1--Name of anti-abuse product (ex. "Norton Internet
Security Suite") Display this message if there are no PS_* messages
to display.
Description
[0212] Your anti-abuse software is up-to-date.
Details:
[0213] You have the latest version of your anti-abuse software, %
s1. Your computer is well-protected against the latest privacy
abuses.
Recommendation:
[0214] New privacy abuses are occurring often. That's the reason
why it is extremely important for you to always have the latest
version of your anti-abuse software. Make sure you continue to keep
your anti-abuse software up-to-date.
PS_PRODUCT_NONE
Category: Anti-Abuse
[0215] No variables
Description
[0216] No anti-abuse software is installed on your computer.
Details:
[0217] Your confidential information is not protected from
dishonest Web sites. When you visit a Web site, it is possible for
that Web site to obtain your personal information from your
computer. You are extremely vulnerable of having your confidential
information obtained by a dishonest Web site.
Recommendation:
[0218] It is highly recommended that you get an anti-abuse
solution. The best type of anti-abuse solution is one which is
"always up-to-date". McAfee.com Privacy Service, the #1 anti-abuse
solution of this type, ensures that you are always up-to-date,
protecting you from the latest privacy abuses. For more
information, make sure you are connected to the Internet and then
click Tell Me More About Anti-Abuse Solutions.
PS_PRODUCT_TWO_YEARS_OLD
Category: Anti-Abuse
[0219] % s1--name of anti-abuse product (ex. "Norton Internet
Security Suite") % d2--Number of years old this product is
((current date-product date)/365). This will always be 2 or more
years.
Description
[0220] Old obsolete anti-abuse software detected.
Details:
[0221] The anti-abuse software you have, % s1, is over % d2 years
old. Since then, there have been many new privacy abuses. Your
anti-abuse software will not protect you from the privacy abuses
that have been created in the last % d2 years. You are extremely
vulnerable of having your confidential information obtained by a
dishonest Web site.
Recommendation:
[0222] It is highly recommended that you either purchase a new
version of your anti-abuse software or you get an "always
up-to-date" anti-abuse solution, like McAfee.com Privacy Service,
the #1 anti-abuse product of this type. If you have McAfee.com
Privacy Service, your anti-abuse software will always be
up-to-date, thus protecting you from the latest privacy abuses. For
more information, make sure you are connected to the Internet and
then click Tell Me More About Anti-Abuse Solutions.
PS_PRODUCT_OLD_MAJOR
Category: Anti-Abuse
[0223] % s1--name of anti-abuse product (ex. "Norton Internet
Security Suite") % s2--Version number. Only display major/minor
("6.3", "7.0") % s3--Latest version number. Only display
major/minor ("6.3", "7.0")
Description
[0224] Old version of anti-abuse software detected.
Details:
[0225] The anti-abuse software you have, % s1, is version % s2. The
latest version of this product is version % s3. The version you
have is obsolete and is not protecting you from the latest privacy
abuses. You are extremely vulnerable of having your confidential
information obtained by a dishonest Web site.
Recommendation:
[0226] It is highly recommended that you either purchase a new
version of your anti-abuse software or you get an "always
up-to-date" anti-abuse solution, like McAfee.com Privacy Service,
the #1 anti-abuse product of this type. If you have McAfee.com
Privacy Service, your anti-abuse software will always be
up-to-date, thus protecting you from the latest privacy abuses. For
more information, make sure you are connected to the Internet and
then click Tell Me More About Anti-Abuse Solutions.
PS_PRODUCT_OLD_MINOR
Category: Anti-Abuse
[0227] % s1--name of anti-abuse product (ex. "Norton Internet
Security Suite") % s2--Version number. Only display major/minor
("6.3", "6.5") % s3--Latest version number. Only display
major/minor ("6.3", "6.5")
Description
[0228] Old version of anti-abuse software detected.
Details:
[0229] The anti-abuse software you have, % s1, is version % s2. The
latest version of this product is version % s3. The version you
have does not address a number of bug fixes and other problems that
were addressed in version % s3. Because you don't have this latest
version, your computer may be exposed to the latest privacy
abuses.
Recommendation:
[0230] It is highly recommended that you either contact your
anti-abuse software vendor and ask to have the latest version or
get an anti-abuse solution where you will always have the latest
version. By having the latest version, you will always be protected
from the latest privacy abuses. McAfee.com Privacy Service, the #1
"always up-to-date" anti-abuse solution, ensures that you are
protected from the latest privacy abuses. For more information,
make sure you are connected to the Internet and then click Tell Me
More About Anti-Abuse Solutions.
PS_PRODUCT_OLD_REVISION
Category: Anti-Abuse
[0231] % s1--name of anti-abuse product (ex. "Norton Internet
Security Suite") % s2--Version number. Only display
major/minor/revision ("6.3.2", "6.3.12") % s3--Latest version
number. Only display major/minor/revision ("6.3.2", "6.3.12")
Description
[0232] Old version of anti-abuse software detected.
Details:
[0233] The anti-abuse software you have, % s1, is version % s2. The
latest version of this product is version % s3. The version you
have does not address a number of bug fixes and other problems that
were addressed in version % s3. Because you don't have this latest
version, your computer may be exposed to the latest privacy
abuses.
Recommendation:
[0234] It is highly recommended that you either contact your
anti-abuse software vendor and ask to have the latest version or
get an anti-abuse solution where you will always have the latest
version. By having the latest version, you will always be protected
from the latest privacy abuses. McAfee.com Privacy Service, the #1
"always up-to-date" anti-abuse solution, ensures that you are
protected from the latest privacy abuses. For more information,
make sure you are connected to the Internet and then click Tell Me
More About Anti-Abuse Solutions.
* * * * *