COMPUTER SECURITY

Brand Owner (click to sort) Address Description
ALCATRAZ COMPUTER SECURITY Alcatraz Computer Security 460 4701 Old Soper Road Camp Springs MD 20746 COMPUTER SECURITY;IT security consulting services in the nature of providing computer and network security auditing to residential and commercial clients. The company's services include assessing the strength of client's existing computer and network defenses and providing advice on making their systems more secure against viruses and hackers;
ARMOR COMPUTER SECURITY ARMOR COMPUTER SECURITY, INC. 1502 6th Avenue Moline IL 61265 COMPUTER SECURITY;computer consultation services, namely, evaluations of computer security controls, computer access, data backup, disaster planning and recovery, computer facility, protection and prevention of viruses and local area networks;
ARMOR COMPUTER SECURITY Wildermuth, Daniel L. 1502 6th Avenue Moline IL 61265 COMPUTER SECURITY;computer consultation services, namely, evaluations of computer security controls, computer access, data backup, disaster planning and recovery, computer facility, protection and prevention of viruses and local area networks;
ASYNCHRONOUS ROOT TRANSLATION Koonook 708 Hillside Blv. New Hyde Park NY 11040 Computer Security;
REVOLUTIONIZING COMPUTER SECURITY Bluepoint Security, Inc. 4460 Atlanta Highway, Suite A Loganville GA 300526734 COMPUTER SECURITY;Computer services, namely, on-line scanning, detecting, quarantining and eliminating viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices;
SPYVILLE SPYVILLE 101 E. COMMERCIAL P.O. BOX 355 MONTEREY TN 38574 Computer Security, namely consultation services for on-line and off-line computer systems;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A computer system enables a user to define the system's security profile while automatically detecting whether the security profile being defined creates data hazards for the computer system. To achieve the foregoing, the computer system utilizes memory and a security application. The security application displays a list of security rules to a user and selectively enables the security rules based on user inputs. The security application causes the computer system to enforce the enabled security rules by modifying security settings of the computer system. For each enabled rule, the security application analyzes data that indicates which of the security rules, when enforced by the computer system, create a data hazard for a particular computer application. The security application then detects a data hazard, if the data indicates that the enabled rule creates a data hazard for the particular application and if the particular application is installed on the computer system. The security application, in response to detection of the data hazard, may disable the foregoing rule or notify the user of the detected data hazard.