COMPUTER SOFTWARE DETECT

Brand Owner (click to sort) Address Description
BACKHACK Sharp Technology, Inc. 5120 Woodway, Suite 9029 Houston TX 77056 Computer software to detect and identify security intrusions;
COUNTERSPY THREATTRACK SECURITY, INC. 33 North Garden Avenue, Suite 1200 Clearwater FL 33755 Computer software to detect and eliminate unwanted or unauthorized programs and content on personal and networked computer systems;COUNTER SPY;
COUNTERSPY THREATTRACK SECURITY, INC. 33 North Garden Avenue, Suite 1200 Clearwater FL 33755 Computer software to detect and eliminate unwanted or unauthorized programs and content on personal and networked computer systems;COUNTER SPY;
HACKBACK Sharp Technology, Inc. 5120 Woodway, Suite 9029 Houston TX 77056 Computer software to detect and identify security intrusions;
IPANGEL Lucid Security Corporation 124 S. Maple Ave. Ambler PA 19002 Computer software to detect and eliminate software based attacks from any network external to the protected network and to manage, scan, report and alert users of those events in real-time. Software may be downloaded from a global computer network.;IP ANGEL;
IT'S LIKE CALLER ID FOR THE INTERNET Sharp Technology, Inc. 5120 Woodway, Suite 9029 Houston TX 77056 Computer software to detect and identify security intrusions;IT IS LIKE CALLER ID FOR THE INTERNET;INTERNET;
PESTPATROL SaferSite.com, Inc. 453 Lincoln Street Carlisle PA 17013 Computer Software to detect and eliminate computer pests such as hacker tools, trojans and spyware.;PEST PATROL;
REDHANDED Red 5 Studios, Inc. 440 Exchange, Suite 100 Irvine CA 92602 computer software to detect and prevent cheating in computer games; computer software to detect and block unauthorized use of other computer software and online services; computer software to detect and block scripts and bots;providing temporary use of online, non-downloadable computer software to detect and prevent cheating in computer games; providing temporary use of online, non-downloadable computer software to detect and block unauthorized use of other computer software and online services; providing temporary use of online, non-downloadable computer software to detect and block scripts and bots;
SAM Plethora Solutions Limited Hampden House United Kingdom Computer software to detect, calculate and record erection and ejaculation times for use in the field of the diagnosis of sexual dysfunction;Medical diagnostic apparatus, namely, apparatus for measuring and monitoring the frequency of vibrations, apparatus for measuring time, apparatus for measuring the duration of vibrations and for measuring pulses, all for use in the field of the diagnosis and treatment of sexual dysfunction including premature ejaculation; medical diagnostic sensors for measuring pulse; medical apparatus and instruments for the diagnosis and treatment of sexual dysfunction including premature ejaculation; medical apparatus and instruments for assessing and monitoring sexual dysfunction including premature ejaculation; medical apparatus and instruments for measuring the severity of sexual dysfunction including premature ejaculation; adult sexual aids, namely, vibrators; vibromassage apparatus, massage apparatus; medical apparatus and instruments for applying electrical currents to the skin for treating sexual dysfunction including premature ejaculation; devices for aiding masturbation, namely, pumps, rings, clamps, stimulators, vibrators, sleeves on vibrators sold together with massaging devices, masturbators; adult sex aids, namely, electrical appliances for massaging the body; condoms; parts and fittings for all of the aforesaid goods;
SPYSECURE Sunbelt Software Distribution, Inc. Suite 120 101 North Garden Ave. Clearwater FL 33755 Computer software to detect and eliminate unwanted or unauthorized programs and content on personal and networked computer systems;SPY SECURE;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A system and method for obtaining software is disclosed. An operating environment of a first computer system is analyzed. A profile based on the operating environment is created. The profile is sent to a second computer system and the second computer system selects software based on the profile. The second computer forwards an indication of where the software is located and a software retrieval process is engaged. Software compatible with the profile is received.