Abstract: A method/system of determining if one or more entities in a data storage medium of a processing system are malicious, wherein the method comprises recording entity properties of the one or more entities when at least part of the processing system is in a range of operating usage; and determining, using the entity properties, if the one or more entities are malicious.
Abstract: A method of (and associated system and computer program product for) providing a rating for an event. A user submits feedback data using an interface provided on a user terminal, the feedback data related to the event. A user submitting feedback data may have a member user weighting, preferably obtained from one or more other member users, or may be initially allocated as a default weighting. The rating for the event is determined at least partially based on the feedback data, and may also be based on the member user weighting of the member user who submitted the feedback data. The rating may be determined or adjusted by feedback data and respective member user weightings received from other member users. An event may be a broadcast, concert, exhibition, tour, show, movie, competition, party, and/or function.
Abstract: A method/system for determining a group of related entities of interest in one or more processing systems. The method comprises identifying a starting entity from one or more entities in the one or more processing systems, then obtaining, based on an entity type of the starting entity, a first set of rules for determining at least one other related entity, and then determining, using the first set of rules, the at least one related entity.
Abstract: Scanning engine (i.e. program(s) or application(s)) 310 sends request 315 to direct file system access engine (i.e. program(s) or application(s)) 360. Direct file system access engine 360 receives request 315 and passes request 315 to file system(s) 350 as request 325. No filter program(s) 340 receive program control as request 325 bypasses any filter program(s) 340. The direct file system access engine 360 receives unaltered information from file system(s) 350. Utilising Direct File Access (DFA) allows bypass of user mode hooking-type malwares, kernel, and file system filter programs to obtain access to or communicate with the real underlying file system(s). This provides a ‘clean’ view of the file system(s) in situations where user/kernel components are compromised or rootkit file system filter programs are installed.