| 9733929 |
Systems and methods for restoring applications |
Adam Glick, Spencer Smith |
2017-08-15 |
| 9661004 |
Systems and methods for using reputation information to evaluate the trustworthiness of files obtained via torrent transactions |
Adam Glick, Spencer Smith |
2017-05-23 |
| 9350755 |
Method and apparatus for detecting malicious software transmission through a web portal |
Adam Glick, Spencer Smith |
2016-05-24 |
| 9152790 |
Systems and methods for detecting fraudulent software applications that generate misleading notifications |
Adam Glick, Spencer Smith |
2015-10-06 |
| 8904538 |
Systems and methods for user-directed malware remediation |
Adam Glick, Spencer Smith |
2014-12-02 |
| 8844024 |
Systems and methods for using tiered signing certificates to manage the behavior of executables |
Spencer Smith, Adam Glick |
2014-09-23 |
| 8782790 |
Signature creation for malicious network traffic |
Spencer Smith, Adam Glick, Uriel Mann |
2014-07-15 |
| 8776196 |
Systems and methods for automatically detecting and preventing phishing attacks |
Ian Oliver, Adam Glick, Spencer Smith |
2014-07-08 |
| 8776227 |
User interface based malware detection |
Adam Glick, Spencer Smith |
2014-07-08 |
| 8701192 |
Behavior based signatures |
Adam Glick, Spencer Smith |
2014-04-15 |
| 8627463 |
Systems and methods for using reputation information to evaluate the trustworthiness of files obtained via torrent transactions |
Adam Glick, Spencer Smith |
2014-01-07 |
| 8621632 |
Systems and methods for locating malware |
Spencer Smith, Adam Glick |
2013-12-31 |
| 8566950 |
Method and apparatus for detecting potentially misleading visual representation objects to secure a computer |
Spencer Smith, Adam Lyle Glice |
2013-10-22 |
| 8549626 |
Method and apparatus for securing a computer from malicious threats through generic remediation |
Adam Glick, Spencer Smith |
2013-10-01 |
| 8418223 |
Systems and methods for updating parental-control settings |
Spencer Smith, Adam Glick |
2013-04-09 |
| 8352409 |
Systems and methods for improving the effectiveness of decision trees |
Sourabh Satish, Lachlan Orr, Shane Pereira, Scott Charles Sullivan |
2013-01-08 |
| 8336100 |
Systems and methods for using reputation data to detect packed malware |
Adam Glick, Spencer Smith |
2012-12-18 |
| 8132186 |
Automatic detection of hardware and device drivers during restore operations |
Okan Okcu, Mitchell Mikula, Jason Anthony Miller |
2012-03-06 |
| 7941814 |
Device driver processing for automated system restores |
Okan Okcu |
2011-05-10 |
| 7769990 |
Using a monitoring process to update system configuration settings during restore operations |
Okan Okcu |
2010-08-03 |
| 7680957 |
Computer system configuration representation and transfer |
Thomas R. Ketterhagen, Bruce Bramhall, Okan Okcu |
2010-03-16 |
| 7496783 |
Merging cluster nodes during a restore |
Thomas R. Ketterhagen |
2009-02-24 |
| 7334157 |
Restore of data to a computer system having different hardware |
Okan Okcu |
2008-02-19 |
| 7328325 |
System and method for hierarchical storage mapping |
Eduardo A. Solis |
2008-02-05 |
| 7293272 |
Device driver processing for automated system restores |
Okan Okcu |
2007-11-06 |