Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror

Comment The actual claim at issue (Score 1) 56

Here is the actual text of claim 1 from the US patent. The other claims are dependent (i.e., are narrower in scope). The patent examiner found that the claim here is for something novel and non-obvious, which may be true. It may also be true however, that what is claimed is not what CSP actually does, in which case CSP would not be infringing this claim.

A method of preventing unwanted code execution in a client/server computing environment executing a client-side script by an internet browser, said internet browser comprising functions, objects and properties, and their instances, wherein the client/server computing environment comprises at least one server-side resource in network communications with the internet browser, wherein the internet browser receives the script from at least one script source and executes the script, wherein the at least one script source includes any one or combination of: messages received from the at least one server-side resource in response to requests made by the internet browser; the script entered by a user of the internet browser through a debug console; the script entered by a user through the internet browser address bar; the script contained in third party browser add-ons attached to the browser; and the script retrieved from a local storage device, the method comprising:
        determining safe and at risk or restricted portions of the internet browser, wherein at least one of the portions of the internet browser comprises instances of the functions, objects and properties;
        determining at least one of the at least one server-side resource to be a trusted resource;
        determining trusted and untrusted portions of the script wherein trusted script includes script contained in messages received from the trusted resource using the network communications, and untrusted script refers to script received from untrusted script sources;
        receiving, by the internet browser, from the trusted resource at least one message using the network communications containing one or more passwords; and
        in response to the receiving, preventing, by the internet browser, unwanted code execution by:
                re-writing said at risk portions of the internet browser to require presentation of the one or more passwords to the internet browser in order for the internet browser or any script to execute said at risk portions, wherein re-writing is executed during runtime of the internet browser and includes altering the internet browser by a rewriter program executing in the internet browser,
        wherein the trusted resource includes the one or more passwords within each messages containing trusted script sent to the internet browser using the network communications subsequent to the at least one message, in order that the trusted script contained in the each messages is permitted to execute said at risk portions of the internet browser.

Comment Re:It should have been phased out... (Score 1) 460

For the motherboard controllers, they keep the same controller chip. Removing the support from the chip would require designing, verifying, validating, debugging new silicon which has no value. To save cost, they'll remove the connectors and change the BIOS so that the devices don't show up.

Higher end motherboards and workstation class PC's seem to support more legacy hardware interfaces than mainstream ones. My Dell Precision Workstation (2 dual core xeon's) has 2 serial ports, a parallel port, PS/2 mouse and keyboard, something like 8 USB 2.0's and Firewire 800.

For software, there are better alternatives:

Real-mode DOS or Full-screen DOS: FreeDOS or MS-DOS in a VirtualPC. Or DOSBox is great for a lot of stuff.
Qbasic: Visual Studio Express Edition

Comment MUDs are text-based MMOG's (Score 1) 149

Most MUDs are also CRPG's with levels, equipment, quests/missions, et cetera. Little to no puzzle solving necessary. Thus they share more in common with World of Warcraft than they do with adventure games.

Survival horror games (e.g., Resident Evil, Silent Hill, et cetera) even though they have a lot of first person or third person shooter characteristics actually have more in common with adventure games because of the perpetual "find key to open door and advance storyline" situation.

Slashdot Top Deals

When it is incorrect, it is, at least *authoritatively* incorrect. -- Hitchiker's Guide To The Galaxy

Working...