Patent Application Publication (10) Pub. No.: US 2013/0091418 A1 Gonzalez (43) Pub

Total Page:16

File Type:pdf, Size:1020Kb

Patent Application Publication (10) Pub. No.: US 2013/0091418 A1 Gonzalez (43) Pub US 2013 009 1418A1 (19) United States (12) Patent Application Publication (10) Pub. No.: US 2013/0091418 A1 Gonzalez (43) Pub. Date: Apr. 11, 2013 (54) CROSS-BROWSER TOOLBAR AND METHOD Publication Classification THEREOF (51) Int. Cl. (71) Applicant: Visicom Media Inc., Brossard (CA) G06F 7/2 (2006.01) (52) U.S. Cl. (72) Inventor: Miguel Enrique Cepero Gonzalez, CPC .................................... G06F 17/218 (2013.01) Brossard (CA) USPC .......................................................... 71.5/234 (57) ABSTRACT (73) Assignee: VISICOMMEDIA INC., Brossard A tool configured to build a cross-browser toolbar is pro (CA) vided. The tool comprises a processor; and a memory coupled to the processor and configured to store at least instructions for execution of a wizard program by the processor, wherein (21) Appl. No.: 13/690,236 the wizard program causes to: receive an input identifying at least user interface elements and event handlers respective of the user interface elements, wherein the input further identi (22) Filed: Nov.30, 2012 fies at least two different types of a web browser on which the toolbar can be executed; generate respective of the received O O input a toolbar render object, a script file, and at least one Related U.S. Application Data toolbar library for each type of web browser; and compile the (63) Continuation of application No. 12/270,421, filed on toolbar render object, the script file, and the least one toolbar Nov. 13, 2008, now Pat. No. 8,341,608. library into an installer file. 120-1 Installer Web File BrOWSer TOOlbar Builder installer File TOOlbar BrOWSer Libraries Patent Application Publication Apr. 11, 2013 Sheet 1 of 3 US 2013/009 1418 A1 Installer File Toolbar Builder Installer A File Web TOOlbar BrOWSer Libraries FIG. 1 Hard drive Web BrOWSer Instance Toolbar Libraries FIG. 2 Patent Application Publication Apr. 11, 2013 Sheet 2 of 3 US 2013/009 1418 A1 / 300 TranSform TDO elements to DOM Specific elements Map events from TDO to DOM Specific elements DiscOnnect event handlers FIG. 3 Patent Application Publication Apr. 11, 2013 Sheet 3 of 3 US 2013/009 1418 A1 HardDrive IE Instance Web BrOWSer Control TOOlbar Libraries A rendered TOOlbar Mytoolbar.dll FIG. 4 US 2013/009 1418 A1 Apr. 11, 2013 CROSS-BROWSER TOOL BAR AND METHOD 0009 Certain embodiments also include a method forgen THEREOF erating a cross-browser toolbar. The method comprises gen erating a toolbar render object defining at least user interface CROSS REFERENCE TO RELATED elements of the cross-browser toolbar; generating a scriptfile APPLICATIONS defining at least event handlers associated with the user inter face elements; generating toolbar libraries including at least 0001. This patent application is a continuation of patent application programming interfaces (APIs) and Script files application No. 12/270.421, now allowed, filed on Nov. 13, Supporting a specific web browser type; assigning a unique 2008, which is hereby incorporated by reference for all that it dynamic-link library (DLL) file with the toolbar libraries and contains. the script file; and compiling the toolbar render object, the script file, the toolbar libraries, and the DLL file into an TECHNICAL FIELD installer file adapted to enable the installation of the cross 0002 This invention generally relates to browser exten browser toolbar in the specific web browser type. sions. 0010 Certain embodiments further include a cross-plat form toolbar. The cross-platform toolbar comprises a toolbar BACKGROUND render object defining at least user interface elements of the cross-browser toolbar; a script file defining at least event 0003 Web browsers are software applications that enable handlers associated with the user interface elements; toolbar the viewing of information accessible on the WorldWideWeb libraries including at least application programming inter (or Web). At its most basic, the Web is a collection of docu ments written using programming languages that web brows faces (APIs) and Script files Supporting a specific web ers can interpret. Such languages include, for example, a browser type; and a unique dynamic-link library (DLL) file hypertext markup language (HTML), an eXtensible markup assigned with the toolbar libraries and the script file. language (XML), and the like. Microsoft Internet Explorer(R), BRIEF DESCRIPTION OF THE DRAWINGS Mozilla Firefox R, Safari(R), and Opera R are just to name a few examples of web browsers. 0011. The subject matter that is regarded as the invention 0004 Browser extensions are applications such as plug is particularly pointed out and distinctly claimed in the claims ins or add-ons that are downloaded and installed on an indi at the conclusion of the specification. The foregoing and other vidual computing device on which a web browser is operat objects, features and advantages of the invention will be ing. The browser extensions are compiled separately for each apparent from the following detailed description taken in type of web browser. A prime example for a browser exten conjunction with the accompanying drawings. sion is a downloadable toolbar. When installed, a toolbar 0012 FIG. 1 is a diagram illustrating the process of creat allows users to customize their browsing experience. ing a cross-browser toolbar utilized in accordance with the 0005. The process of creating a downloadable toolbar principles of the invention. includes developing a Software application compatible with a 0013 FIG. 2 illustrates the files used for executing a cross specific browser type and storing an executable application in browser toolbar over a web browser instance. a web server. The software application embodying the toolbar 0014 FIG.3 is a flowchart describing the process of trans typically includes functional buttons, search windows, and lating a TDO to a browser-specific DOM at runtime as imple application programming interfaces (APIs) for other plug-ins mented in accordance with an embodiment of the invention. and interfaces. A user may download the executable applica 0015 FIG. 4 is a diagram useful for describing the process tion from a web server to a local computing device and run the of executing a toolbar over an Internet Explorer R. (IE) application thereon, causing the toolbar to be integrated in the browser as implemented in accordance with an embodiment web browser. of the invention. 0006. There are some disadvantages with the current pro cess of developing toolbars. Sucha process requires program DETAILED DESCRIPTION ming and compiling Software code for each type of web browser. Thus, a new version of the same toolbar should be 0016. It is important to note that the embodiments dis developed for each web browser's type. This is typically closed by the invention are only examples of the many advan performed by software developers who specialized in devel tageous uses of the innovative teachings herein. In general, oping toolbars. Thus, existing toolbars are proprietary and in statements made in the specification of the present applica most cases not extensible. tion do not necessarily limit any of the various claimed inven tions. Moreover, some statements may apply to some inven 0007. Therefore, it would be advantageous to provide an tive features but not to others. In general, unless otherwise automated solution for generating toolbars. It would be fur indicated, singular elements may be in plural and Vice versa ther advantageous to provide a solution for generating cross with no loss of generality. In the drawings, like numerals refer browser toolbars. to like parts through several views. 0017 FIG. 1 shows an exemplary diagram illustrating the SUMMARY process of creating a cross-browser toolbar implemented 0008 Certain embodiments include a method for render according to the principles of the invention. The process ing a cross-platform toolbar. The method comprises provid includes generating a toolbar which can be executed on any of ing a toolbar document object (TDO), wherein the TDO web browsers 120-1 through 120-N. The toolbar functional includes elements enabling cross-browser interoperability; ity and appearance are defined by one or more source files and translating, at runtime, the TDO to a specific-browser 110. In one embodiment, the source files 110 include one or document object model (DOM) of a web browser type on more XML files that characterize user interface elements which the toolbar is being rendered. (e.g., buttons, menus, etc.) Script files that set the functionality US 2013/009 1418 A1 Apr. 11, 2013 of the user interface elements using event handlers. The web Generally, most types of browsers supporta DOM which is an browsers 120 are of different types and include, but are not API for HTML and XML documents. The DOM provides a limited to, Microsoft Internet Explorer R, Mozilla Firefox R, structural representation of the document, enabling modifi OperaR), Safari(R), and the like. cation its content and visual presentation. That is, a DOM 0018. Other files required for generating the cross connects web pages to Scripts or applications. browser toolbarare stored in toolbar libraries 130. The librar ies 130 contain at least files that provide low level APIs as well 0022. In an embodiment of the invention, the TDO has a as XML and script files to support the different types of tree representation where each node in the tree is a user browsers 120. A toolbar builder 140 generates toolbar interface element. These elements Support standard tags (e.g., installer files 150-1 though 150-N, each of which is targeted XUL tags) and special tags. The special tags are a set of tags to a different type of a web browser 120. For example, an designed to provide enhanced toolbar functions, referred to as installer file 150-1 may be installed and executed over an special functions. Examples for Such tags include, but are not Internet Explorer R browser while an installer file 150-N may limited to, a search-bar for providing a search engine input perform the same over a Firefox(R) browser.
Recommended publications
  • Clearing Commonly Used Browser's Internet Cache Desktops
    Clearing Commonly Used Browser’s Internet Cache Clearing Commonly Used Browser’s Internet Cache For information on how to clear the cache of commonly used internet browsers, please see below. NOTE: If your browser is not listed, please refer to the documentation that came with your device or the browser software on how to clear its cache. REMINDER: To protect your privacy and prevent unauthorized use of your System ID, 1) sign out of the Self-Service application, 2) clear the browser’s cache, and 3) close all web browser windows. Desktops Internet Explorer 7 1. From the Tools menu, select Internet Options. 2. Under "Browsing history", click Delete. 3. To delete your cache, click Delete files. 4. Click Close, and then click OK to exit. 5. After the cache is cleared, click the X to close the browser window and confirm ALL browser windows are closed. Internet Explorer 9, 10, and 11 1. Select Tools (via the Gear icon) 2. Select Safety 3. Select Delete Browsing History… NOTE: You can also access this menu by holding Ctrl + Shift + Delete 4. Make sure to uncheck Preserve Favorites websites data and check both Temporary Internet Files and Cookies then click Delete. Microsoft Edge 1. Click the Hub icon. 2. Click the History icon. 3. Click the link labeled Clear all History. 4. Check the boxes for each item you want to clear. 5. Click the Clear button. The message “All Clear!” will appear. Android To clear cache: 1. Start your browser. 2. Tap Menu, and then tap More. 3. Select Settings.
    [Show full text]
  • Taskstream Technical & System Faqs
    Taskstream Technical & System FAQs 71 WEST 23RD STREET, NEW YORK, NY 10010 · T 1.800.311.5656 · e [email protected] Taskstream FAQs Taskstream FAQs Click the links in each question or description to navigate to the answer: System Requirements FAQs . What Internet browsers can I use to access Taskstream? . Can I use Taskstream on a Mac or a PC? on a desktop or laptop computer? . Does Taskstream work on iPad, iPhone or Android-based devices? . Do I need additional plugins or add-ons to use Taskstream? . Can I access Taskstream offline? . Does Taskstream require JavaScript to be enabled? . Does Taskstream require cookies to be enabled? . Does Taskstream use pop-ups? . How can I import and export data within Taskstream? Technical FAQs . Can I have Taskstream open in more than one window at a time? . Is Taskstream's site accessible to users with disabilities? . What is a Comma Separated Value (CSV) file? . How do I print my work? . How do I format my text? . How do I add special characters, such as math symbols or special punctuation, to my text? . What is WebMarker File Markup? . What is Turnitin® Originality Reporting? . Can I change the size of the Taskstream text/fonts? Troubleshooting . When I click on a button nothing occurs. Some of the features within the Taskstream site are missing. When I try to download/view a file attachment, nothing happens. I am not receiving emails from Taskstream. I uploaded a file on my Mac, but the attached file does not open. My file is too large to upload. Taskstream is reporting that I have entered unsafe text.
    [Show full text]
  • Manage Pop-Up Blockers
    Manage Pop-Up Blockers As pop-up blockers may interfere with the installation of plug-ins and players used in your course including opening and viewing activities, depending on your preference, you can either allow pop-ups from specific sites or disable browser pop-up blockers for all web sites. Disable Pop-up Blockers for All Sites Browser Instructions Internet From the browser Tools menu, select Pop-up Blocker, then Turn off Explorer Pop-up Blocker. From the Safari menu, clear the checkmark for Block pop-up Safari windows. Firefox From the Tools menu, select Options Chrome 1. Click the Chrome menu on the browser toolbar. 2. Select Settings. 3. Click Show advanced settings. 4. in the "Privacy" section, click the Content settings button. 5. In the "Pop-ups" section, select "Allow all sites to show pop-ups." Allow Pop-ups from Specific Sites (Exceptions) Browser Instructions When you see the yellow “Information Bar” at the top of the web page Internet about a pop-up being blocked, click the bar and select Always allow Explorer pop-ups from this site, and click Yes to confirm. –or– 1. From the browser Tools menu, select Pop-up Blocker, then Pop-up Blocker Settings. 2. Add the following as allowed sites: • *.pearsoned.com, • *.pearsoncmg.com • *.mylanguagelabs.com , • *mylabs.px.pearsoned.com, • *pearsonvt.wimba.com 3. Click Close. Safari In Safari you can either enable or disable the pop-up blocker. There is no per-site control. See next section for details on how to disable pop-up blocker. Firefox 1.From the Tools menu, select Options 2.
    [Show full text]
  • How to Disable Your Browser's Popup Blockers How to Disable
    Why I cannot open E-document? If nothing pops out after clicking “view”: Please disable your browser's Pop-up Blocker in order to open E-Documents. Use a different browser, such as Internet Explorer, Firefox, Safari or Google Chrome. If a blank screen pops out after clicking “view”: Please update Java or Adobe reader. BOTH must be activated and updated to view E- documents. How to disable your browser's popup blockers The following includes steps for disabling pop-up window blockers. Internet Explorer 7, 8 9 or 10 (Windows PC) Internet Explorer 6 (Windows PC) Firefox (Windows PC) Firefox (Mac OSX) Safari (Mac OSX) Chrome (Windows PC) Chrome (Mac OSX) The following includes steps for disabling browser toolbars. Yahoo toolbar popup blocker Google toolbar popup blocker AOL toolbar popup blocker MSN toolbar popup blocker Norton Internet Security/Personal Firewall popup blocker How to disable Internet Explorer 7, 8, 9 or 10 popup blocker 1. From the Tools menu, select Internet Options. 2. From the Privacy tab, uncheck Turn on Pop-up Blocker and click "OK". For more information on Internet Explorer popup blocker please go to http://windows.microsoft.com/is-IS/windows7/Internet-Explorer-Pop-up-Blocker- frequently-asked-questions Back to top How to disable Internet Explorer 6 popup blocker (Windows PC) 1. From the Tools menu, select Internet Options. 2. From the Privacy tab, uncheck Block pop-ups. Back to top How to disable the Firefox popup blocker (Windows PC) 1. From the Tools menu, select Options. 2. From the Content tab, uncheck Block Popup Windows and click "OK".
    [Show full text]
  • Behavior-Based Spyware Detection
    Behavior-based Spyware Detection Engin Kirda and Christopher Kruegel Secure Systems Lab Technical University Vienna {ek,chris}@seclab.tuwien.ac.at Greg Banks, Giovanni Vigna, and Richard A. Kemmerer Department of Computer Science University of California, Santa Barbara {nomed,vigna,kemm}@cs.ucsb.edu TECHNICAL REPORT Abstract Spyware is rapidly becoming a major security issue. Spyware programs are surreptitiously installed on a user’s workstation to monitor his/her actions and gather private information about a user’s behavior. Current anti-spyware tools operate in a way similar to traditional anti-virus tools, where signatures associated with known spyware programs are checked against newly-installed applications. Unfortunately, these techniques are very easy to evade by using simple obfuscation transformations. This paper presents a novel technique for spyware detection that is based on the characterization of spyware-like behavior. The technique is tailored to a popular class of spyware applications that use Internet Ex- plorer’s Browser Helper Object (BHO) and toolbar interfaces to monitor a user’s browsing behavior. Our technique uses a composition of static and dynamic analysis to determine whether the behavior of BHOs and toolbars in response to simulated browser events is to be considered mali- cious. The evaluation of our technique on a representative set of spyware samples shows that it is possible to reliably identify malicious components using an abstract behavioral characterization. Keywords: spyware, malware detection, static analysis, dynamic analy- sis. 1 Introduction Spyware is rapidly becoming one of the major threats to the security of Inter- net users [16, 19]. A comprehensive analysis performed by Webroot (an anti- spyware software producer) and Earthlink (a major Internet Service Provider) 1 showed that a large portion of Internet-connected computers are infected with spyware [1], and that, on average, each scanned host has 25 different spyware programs installed [6].
    [Show full text]
  • Emerging Technologies: New Developments in Web Browsing and Authoring
    Language Learning & Technology February 2010, Volume 14, Number 1 http://llt.msu.edu/vol14num1/emerging.pdf pp. 9–15 EMERGING TECHNOLOGIES: NEW DEVELOPMENTS IN WEB BROWSING AND AUTHORING Robert Godwin-Jones Virginia Commonwealth University In this new decade of the 21st century, the Web is undergoing a significant transformation. Supplementing its traditional role of retrieving and displaying data, it is now becoming a vehicle for delivering Web-based applications, server-stored programs that feature sophisticated user interfaces and a full range of interactivity. Of course, it has long been possible to create interactive Web pages, but the interactivity has been more limited in scope and slower in execution than what is possible with locally- installed programs. The limitations in terms of page layout, interactive capabilities (like drag and drop), animations, media integration, and local data storage, may have had developers of Web-based language learning courseware yearning for the days of HyperCard and Toolbook. But now, with major new functionality being added to Web browsers, these limitations are, one by one, going away. Desktop applications are increasingly being made available in Web versions, even such substantial programs as Adobe PhotoShop and Microsoft Office. Included in this development are also commercial language learning applications, like Tell me More and Rosetta Stone. This movement has been accelerated by the growing popularity of smart phones, which feature full functionality Web browsers, able in many cases to run the same rich internet applications (RIA) as desktop Web browsers. A new Web-based operating system (OS) is even emerging, created by Google specifically to run Web applications.
    [Show full text]
  • Content Publisher Tutorial 10G Release 3 (10.1.3.3.0)
    Cover Page Content Publisher Tutorial 10g Release 3 (10.1.3.3.0) March 2007 Content Publisher Tutorial, 10g Release 3 (10.1.3.3.0) Copyright © 2007, Oracle. All rights reserved. Contributing Authors: Heidi Waterhouse The Programs (which include both the software and documentation) contain proprietary information; they are provided under a license agreement containing restrictions on use and disclosure and are also protected by copyright, patent, and other intellectual and industrial property laws. Reverse engineering, disassembly, or decompilation of the Programs, except to the extent required to obtain interoperability with other independently created software or as specified by law, is prohibited. The information contained in this document is subject to change without notice. If you find any problems in the documentation, please report them to us in writing. This document is not warranted to be error-free. Except as may be expressly permitted in your license agreement for these Programs, no part of these Programs may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose. If the Programs are delivered to the United States Government or anyone licensing or using the Programs on behalf of the United States Government, the following notice is applicable: U.S. GOVERNMENT RIGHTS Programs, software, databases, and related documentation and technical data delivered to U.S. Government customers are "commercial computer software" or "commercial technical data" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the Programs, including documentation and technical data, shall be subject to the licensing restrictions set forth in the applicable Oracle license agreement, and, to the extent applicable, the additional rights set forth in FAR 52.227-19, Commercial Computer Software--Restricted Rights (June 1987).
    [Show full text]
  • Configuring Your Pop up Blocker
    Configuring your Pop Up Blocker Google Toolbar If the Google Toolbar is blocking Sycle.net, there are three ways to disable it: 1. To let a pop-up through on a one-time basis, press and hold the "Ctrl-" (or ) key as you click on a link to navigate to a new page. 2. The pop-up blocker can also remember certain sites (like Sycle.net) and allow them to launch pop-up windows. To add Sycle.net to your list of permitted sites, click on the pop-up blocker button while viewing the Sycle.net home page (http://www.sycle.net ). The pop-up blocker button will appear as . 3. To completely disable the pop-up blocker, click the "Options" button in the Google toolbar and clear the checkbox next to "Popup Blocker" in the Accessories section. Yahoo Toolbar If Pop-Up Blocker is blocking Sycle.net, there are three ways to override it: 1. Turn off Pop-Up Blocker by clicking the Pop-Up Blocker menu and un-checking "Enable Pop-Up Blocker". 2. Press and hold the "Ctrl" (or ) key while clicking a link to override Pop-Up Blocker and allow any pop-up windows resulting from the click. 3. Add the source of the pop-up window to your "Allowed List" by clicking the Pop-Up Blocker menu and selecting "Always Allow Pop-Ups From...". Then select "Sycle.net" from the "Sources of Recently Blocked Pop-Ups" list and click "Allow". AOL Toolbar 1. Click "Settings" on the AOL toolbar. 2. Click "Pop-Ups" in the "Essentials" tab.
    [Show full text]
  • Hardware and Software Specifications for Blackboard
    Hardware and Software Specifications for Blackboard Hardware and Software Specifications for Blackboard • You need a computer with multimedia capabilities (i.e., sound with speakers), a monitor capable of at least 800 x 600 resolution, a broadband internet connection and an Internet Browser (Chrome, Firefox) in order to access Blackboard. • Your browser must accommodate both Java and JavaScript for some functions of the course. These are functions you can turn on in your browser. • Your browser must be set to accept cookies (use minimum browser security settings). • Firewalls will affect your ability to access and use Blackboard (this may be an issue if you are accessing Blackboard from your place of employment). • Popup Blockers will affect your ability to use the Collaboration Tools and other features. Windows Users Only – Downloading Java Java is required to use Collaboration Tools in Blackboard. This plug-in may be downloaded from a page that appears when you join a Collaboration Session, or, visit http://java.sun.com/products/plugin/index.jsp and download Java. MAC OS X has Java installed by default from Apple. Enabling Cookies in Your Internet Browser In order to use Blackboard on your computer, you must have cookies enabled. To do so: Internet Explorer Open Internet Explorer and select Tools Internet Options. Select the Privacy Tab. 1. Using the sliding bar, slide the bar down so that the cookie settings are Medium or lower. 2. Click Apply. Then click OK. Safari 1. Open Safari and select Safari Preferences. 2. Click Privacy. 3. Under Block Cookies select the option “From third parties and advertisers.” 4.
    [Show full text]
  • Web Browsing
    4Lesson 4: Web Browsing Objectives By the end of this lesson, you will be able to: 1.5.1: Describe a URL/URI, its functions and components, and the different types of URLs (relative and absolute); and identify ways that a URL/URI can specify the type of server/service, including protocol, address, authentication information. 1.5.2: Navigate between and within Web sites. 1.5.3: Use multiple browser windows and tabs. 1.5.4: Identify ways to stop unwanted pop-up and pop-under windows in a browser, ways to avoid activating them, and unintended effects of automatically blocking them. 1.5.6: Install and use common Web browsers (e.g., Firefox, Chrome, Internet Explorer, Opera, Safari, Lynx). 1.5.13: Identify benefits and drawbacks of using alternative browsers. 1.5.15: Explain the purpose and process of anonymous browsing. 1.5.16: Describe elements found in each browser, including rendering engine, interpreter, sandbox, thread/multi-threading, window, frame, privacy mode, encryption settings, download controls. 1.9.1: Configure common browser preferences, including fonts, home pages, Bookmarks/Favorites, history, browser cache, image loading, security settings (settings should be common to Mozilla Firefox, Windows Internet Explorer and Google Chrome). 1.9.3: Describe the concept of caching and its implications, including client caching, cleaning out client-side cache, Web page update settings in browsers. 1.9.4: Identify issues to consider when configuring the Desktop, including configuring browser (proxy configuration, client-side caching). 1.9.5: Troubleshoot connectivity issues (e.g., no connection, poor rendering, slow connections) using TCP/IP utilities.
    [Show full text]
  • Netspy: Automatic Generation of Spyware Signatures for NIDS ∗
    Published in Proceedings of the 22nd Annual Computer Security Applications Conference, Miami Beach, Florida, December 2006 NetSpy: Automatic Generation of Spyware Signatures for NIDS ∗ Hao Wang, Somesh Jha and Vinod Ganapathy Computer Sciences Department, University of Wisconsin-Madison {hbwang, jha, vg}@cs.wisc.edu Abstract complementary categories: host-based and network-based. Host-based detectors work much like virus scanners, i.e., We present NetSpy, a tool to automatically generate they scan binary executables for the presence of patterns network-level signatures for spyware. NetSpy determines contained in a database of known spyware patterns. Most whether an untrusted program is spyware by correlating commercial tools use simple techniques—such as matching user input with network traffic generated by the untrusted MD5 signatures of executables—which fail to detect vari- program. If classified as spyware, NetSpy also generates a ants of spyware. To address this shortcoming, recent work signature characterizing the malicious substrate of the spy- has extended the basic matching approach to a behavior- ware’s network behavior. Such a signature can be used by based approach [17]. In contrast, network-based detectors network intrusion detection systems to detect spyware in- monitor network traffic for malicious activity suggesting stallations in large networks. spying behavior. For example, Snort [6] can match outgoing In our experiments, NetSpy precisely identified each of network traffic against signatures of known spyware. These the 7 spyware programs that we considered and generated signatures are typically developed manually (e.g., Bleeding network-level signatures for them. Of the 9 supposedly- Edge Snort [2]). benign programs that we considered, NetSpy correctly char- Both these techniques suffer from two important short- acterized 6 of them as benign.
    [Show full text]
  • Live Web Search Experiments for the Rest of Us
    WWW 2010 • Demo April 26-30 • Raleigh • NC • USA Live Web Search Experiments for the Rest of Us Timothy Jones David Hawking Ramesh Computer Science Dept. Funnelback Pty Ltd Sankaranarayana The Australian National Canberra, Australia Computer Science Dept. University [email protected] The Australian National Canberra, Australia University [email protected] Canberra, Australia [email protected] ABSTRACT their normal search engine with an experimental one for a There are significant barriers to academic research into user period of time [4]. However, for these experiments to be Web search preferences. Academic researchers are unable successful it is important that users use the experimental to manipulate the results shown by a major search engine search engine for a significant period of time. to users and would have no access to the interaction data It would be unfortunate if academic researchers were un- collected by the engine. Our initial approach to overcoming able to study whole-of-Web search, since many people's search- this was to ask participants to submit queries to an exper- ing is predominantly across the whole Web. Furthermore imental search engine rather than their usual search tool. there are areas of research, such as the effect of spam on Over several different experiments we found that initial user search quality, which make little sense outside the Web con- buy-in was high but that people quickly drifted back to their text. When studying real Web search it is important that old habits and stopped contributing data. Here, we report the search engine used by experimental subjects gives similar our investigation of possible reasons why this occurs.
    [Show full text]