Protection of computer resources
Protection of sensitive data from malicious e-mail
Protocol identification by heuristic content analysis
Protocol-generic eavesdropping network device
Protocol-parsing state machine and method of using same
Push alert system, method, and computer program product