System, method, and computer program product for conveying a status of a plurality of security applications

ABSTRACT

A system, method and computer program product are provided for displaying a status of a security application. A status of at least one security application is initially identified. An index is calculated that is representative of a degree of risk associated with the status of the at least one security application. The index is then displayed.

RELATED APPLICATION(S)

The present application is a continuation of a patent application filedApr. 16, 2007 now U.S. Pat. No. 7,624,450 under Ser. No. 11/735,877 nowU.S. Pat. No. 7,305,709 which is, in turn, a continuation of anapplication filed Dec. 19, 2002 under Ser. No. 10/325,170 which is, inturn, a continuation-in-part of an application filed Dec. 13, 2002 underSer. No. 10/319,288, all of which are incorporated herein by reference.

FIELD OF THE INVENTION

The present invention relates to application management, and moreparticularly to application status reporting.

BACKGROUND OF THE INVENTION

In the space of just a few years, the Internet—because it providesaccess to information, and the ability to publish information, inrevolutionary ways—has emerged from relative obscurity to internationalprominence. Whereas in general an Internet is a network of networks, theInternet is a global collection of interconnected local, mid-level, andwide-area networks that use the Internet Protocol (IP) as the networklayer protocol. Whereas the Internet embraces many local- and wide-areanetworks, a given local- or wide-area network may or may not form partof the Internet.

As the Internet and its underlying technologies have become increasinglyfamiliar, attention has become focused on Internet security and computernetwork security in general. With unprecedented access to informationhas also come unprecedented opportunities to gain unauthorized access todata, change data, destroy data, make unauthorized use of computerresources, interfere with the intended use of computer resources, etc.As experience has shown, the frontier of cyberspace has its share ofscofflaws, resulting in increased efforts to protect the data,resources, and reputations of those embracing intranets and theInternet.

Security threats have evolved significantly with the increasedpopularity of the Internet. Advanced hybrid threats have been designedto attack systems on multiple fronts, sometimes searching forvulnerabilities until one is found. New threats also attempt to attacksecurity technology itself.

Traditional consumer security software suites often include a pluralityof various applications such as an anti-virus application, a firewallapplication, etc. In use, each application works to protect against atleast one of the aforementioned threats. Together, the applicationsprovide the comprehensive protection required in modern computing andnetworking environments.

As the security threats become more and more complex, however, thenumber of applications required to combat the threats becomes greater.With each application carrying its own functionality and reportingschemes, an administrator or user can easily become overwhelmed withsecurity management.

DISCLOSURE OF THE INVENTION

A system, method and computer program product are provided fordisplaying a status of a security application. A status of at least onesecurity application is initially identified. An index is calculatedthat is representative of a degree of risk associated with the status ofthe security application. The index is then displayed.

In one embodiment, the index may include a number between one (1) andten (10). Moreover, a plurality of indices may be each calculated forone of a plurality of security applications.

In another embodiment, the security application may include ananti-virus security application, a firewall security application, aprivacy service security application, and/or an anti-spam securityapplication.

In one aspect of the present embodiment, the index may be associatedwith the status of an anti-virus security application. In such aspect,the index may reflect a signature file of the anti-virus securityapplication. Moreover, the index may reflect a version of the anti-virussecurity application. Optionally, the index may be calculated using aweighted average of a plurality of aspects of the anti-virus securityapplication.

In another aspect of the present embodiment, the index may be associatedwith the status of a firewall security application. In the presentaspect, the index may reflect a version of the firewall securityapplication.

In still another aspect of the present embodiment, the index may beassociated with the status of a privacy service security application. Asan option, the index may reflect a version of the privacy servicesecurity application.

In another embodiment, the index may include an overall index reflectinga plurality of security applications. Such overall index may becalculated using a weighted average of a plurality of separate indicesassociated with each of the security applications.

In still another embodiment, the index may be displayed numerically,graphically, utilizing a bar-graph, utilizing a color coding, etc. As anoption, the color coding may correlate with the degree of riskassociated with the status (i.e. green, amber, red).

Optionally, additional information relating to the status may bedisplayed upon the selection of the displayed index. Such additionalinformation may include a link capable of being selected by a user.Action may then be taken to decrease the degree of risk associated withthe status, in response to the selection of the link by the user.

Another system, method and computer program product are provided fordisplaying a status of a security application. A status of a securityapplication is first identified. The status of the security applicationis then represented in the form of a bar graph which is displayed to auser.

Still another system, method and computer program product are providedfor displaying a status of a plurality of security applications via asingle interface. First determined is a degree of risk associated with aplurality of security aspects associated with a computing environment ofa computer. The degree of risk associated with the security aspects maythen be visually displayed utilizing a plurality of visual indicators.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates a network architecture, in accordance with oneembodiment.

FIG. 2 shows a representative hardware environment that may beassociated with the data server computers and/or end user computers ofFIG. 1, in accordance with one embodiment.

FIG. 3 illustrates a system adapted for interfacing a plurality ofapplications, in accordance with one embodiment.

FIG. 4 illustrates a method for managing a plurality of applications viaa single interface, in accordance with one embodiment.

FIG. 5 illustrates an exemplary single graphical user interface formanaging a plurality of applications, in accordance with one embodiment.

FIG. 6 illustrates an exemplary anti-virus application window associatedwith an anti-virus application, in accordance with one embodiment.

FIG. 7 illustrates an exemplary firewall application window associatedwith a firewall application, in accordance with one embodiment.

FIG. 8 illustrates an exemplary privacy service application windowassociated with a privacy service application, in accordance with oneembodiment.

FIG. 9 illustrates an exemplary anti-spam application window associatedwith an anti-spam application, in accordance with one embodiment.

FIG. 10 illustrates a method for displaying a status of a securityapplication, in accordance with one embodiment.

FIG. 11 illustrates an exemplary graphical user interface for displayinga status of at least one security application, in accordance with oneembodiment.

FIG. 12 illustrates a method for alerting users of a plurality ofcomputers of a security event via a network, in accordance with oneembodiment.

FIG. 13 illustrates an exemplary graphical user interface for alertingusers of a plurality of computers of a security event via a network, inaccordance with one embodiment.

FIG. 14 illustrates an exemplary security alert for alerting users of aplurality of computers of a security event via a network, in accordancewith one embodiment.

FIG. 15 illustrates an exemplary graphical user interface for sellingapplication-related services, in accordance with one embodiment.

FIG. 16 illustrates an exemplary graphical user interface tailored tomanage a plurality of related applications of a specific entity (i.e.company, organization, etc.), in accordance with one embodiment.

DESCRIPTION OF THE PREFERRED EMBODIMENTS

FIG. 1 illustrates a network architecture 100, in accordance with oneembodiment. As shown, a plurality of networks 102 is provided. In thecontext of the present network architecture 100, the networks 102 mayeach take any form including, but not limited to a local area network(LAN), a wide area network (WAN) such as the Internet, etc.

Coupled to the networks 102 are data server computers 104 which arecapable of communicating over the networks 102. Also coupled to thenetworks 102 and the data server computers 104 is a plurality of enduser computers 106. In order to facilitate communication among thenetworks 102, at least one gateway or router 108 is optionally coupledtherebetween. It should be noted that each of the foregoing networkdevices as well as any other unillustrated devices may be interconnectedby way of a plurality of network segments.

FIG. 2 shows a representative hardware environment that may beassociated with the data server computers 104 and/or end user computers106 of FIG. 1, in accordance with one embodiment. Such figureillustrates a typical hardware configuration of a workstation inaccordance with a preferred embodiment having a central processing unit210, such as a microprocessor, and a number of other unitsinterconnected via a system bus 212.

The workstation shown in FIG. 2 includes a Random Access Memory (RAM)214, Read Only Memory (ROM) 216, an I/O adapter 218 for connectingperipheral devices such as disk storage units 220 to the bus 212, a userinterface adapter 222 for connecting a keyboard 224, a mouse 226, aspeaker 228, a microphone 232, and/or other user interface devices suchas a touch screen (not shown) to the bus 212, communication adapter 234for connecting the workstation to a communication network 235 (e.g., adata processing network) and a display adapter 236 for connecting thebus 212 to a display device 238.

The workstation may have resident thereon any desired operating system.It will be appreciated that a preferred embodiment may also beimplemented on platforms and operating systems other than thosementioned. A preferred embodiment may be written using JAVA, C, and/orC++ language, or other programming languages, along with an objectoriented programming methodology. Object oriented programming (OOP) hasbecome increasingly used to develop complex applications.

Our course, the various embodiments set forth herein may be implementedutilizing hardware, software, or any desired combination thereof. Forthat matter, any type of logic may be utilized which is capable ofimplementing the various functionality set forth herein.

FIG. 3 illustrates a system 300 adapted for interfacing a plurality ofapplications, in accordance with one embodiment. As an option, thepresent system 300 may be implemented in the context of the architectureof FIGS. 1 and 2. Of course, the system 300 may be implemented in anydesired context.

As shown, included is a plurality of applications 301. In the context ofthe present description, such applications 301 may include any type ofapplication program or computer code. For example, the applications 301may optionally be security related. Of course, the applications 301 maybe related to any other aspects such as business, maintenance,entertainment, etc. In any case, the applications may be related by thevirtue of being associated with a similar aspect, purpose, etc.

In the security context, the applications 301 may include an anti-virusapplication 302, a firewall application 304, a privacy serviceapplication 308, an anti-spam application 306, and any other relatedapplication 310 (i.e. a utilities application, etc.).

In use, the anti-virus application 302 may be capable of scanning forviruses or other malicious code by comparing virus signature files withdata located in memory or being transmitted via a network; and takingany appropriate response (i.e. quarantine data, delete data, clean data,alert user, etc.). Moreover, the firewall application 304 may be capableof blocking or alerting a user of accesses to a computer based on apredetermined set of rules or policies.

Still yet, the privacy service application 308 may be capable ofprotecting personal information on a computer and preventing the samefrom being shared. Still yet, the privacy service application 308 may becapable of preventing certain users from accessing predetermined contenton a network such as the Internet. Moreover, the anti-spam application306 may be capable of filtering electronic mail messages based on apredetermined rule set to prevent the receipt (or delivery) of unwantede-mail.

As mentioned earlier, any other related application 310 may be includedin the group of applications 301. For example, a utilities applicationmay be included for executing various maintenance tasks associated witha computer (i.e. cleaning files, optimizing memory, etc.).

Further provided in combination with the applications 301 of the system300 is an interface 312. In use, such interface 312 may include anyspecific method, technique or protocol by which an application programcan communicate with an operating system or another application. In oneembodiment, such interface 312 may include an application programinterface.

The interface 312 may further include a graphical user interface forallowing access to the various applications 301. Such graphical userinterface may further be used for indicating a status of theapplications 301. More information relating to such graphical userinterface will be set forth hereinafter in greater detail.

FIG. 4 illustrates a method 400 for managing a plurality of applicationsvia a single interface, in accordance with one embodiment. As an option,the present method 400 may be implemented in the context of the system300 of FIG. 3. Of course, however, the method 400 may be carried out inany desired environment.

In operation 402, it is determined which of a plurality of applicationsare installed on a computer. The identification of the installedapplications may be carried out in any desired manner. For example, asimple scan of the computer may be initiated. Moreover, suchidentification may involve the registration of the applications upon theinstallation thereof. It may then be determined that one of theapplications is installed or not based on whether such application isregistered. Optionally, such registration may involve an applicationprogram interface such as that mentioned during reference to FIG. 3. Ofcourse, operation 402 may be carried out in any desired manner capableof identifying which applications are currently installed. Moreover, ina situation where the applications are simultaneously installed in theform of a suite, such identification may be simplified.

Next, in operation 404, a status of each of the applications ispresented via a single graphical user interface. Such single graphicaluser interface may take any desired form capable of simultaneouslyconveying a status of each of the applications. As an option, suchstatus may be displayed via a home page of the single graphical userinterface. Such home page may include a “main” page or interfaceassociated with the graphical user interface. More information regardingan exemplary single graphical user interface that may be used in thecontext of the present method 400 will be set forth during reference tosubsequent figures.

In operation 406, a plurality of selection icons may be displayed, wherethe selection icons are associated with a plurality of windows. Suchwindows may each correspond with one of the applications, for reasonsthat will soon become apparent. In the present description, suchselection icons may include any visual entity that is displayed and iscapable of being selected by a user. Moreover, such windows may includeany frame, portion, subset, or page associated with the graphical userinterface and corresponding with one of the applications.

It is then determined in decision 408 whether one of the selection iconshas been selected by a user. Upon the selection of the correspondingselection icon, a user is allowed to access one of the windows. Each ofthe windows may include access to functionality associated with thecorresponding application. Thus, a user is provided access to suchfunctionality conveniently from the graphical user interface. Noteoperation 410.

FIG. 5 illustrates an exemplary single graphical user interface 500 formanaging a plurality of applications, in accordance with one embodiment.Optionally, such graphical user interface 500 may be used in the contextof the system 300 and method 400 of FIGS. 3 and 4, respectively. Ofcourse, the various features of the graphical user interface 500 may beused in any desired manner.

To allow access to each of the applications via the single graphicaluser interface 500, the graphical user interface may include a home page512 and a plurality of selection icons 514 for allowing access to aplurality of windows (not shown) associated with each of theapplications. Optionally, such windows may each include access tofunctionality associated with the corresponding one of the relatedapplications. More information relating to such application-specificwindows will be set forth in greater detail during reference tosubsequent figures.

In use, the home page 512 may be adapted for displaying a visualindication as to the status of each of the applications, along withvarious other information. For example, a security index 516 may beprovided for indicating a level of risk associated with various aspects(i.e. security aspects) of a computer or networking environment. Moreinformation relating to such security index 516 will be set forth ingreater detail during reference to FIGS. 10 and 11. Further included isgeneral information and alerts displayed in separate frames 518. As willsoon become apparent, both the general information and alerts may bepushed from a server and further provide various options to a user.Thus, similar to the alerts to be described, the general information mayinvolve dynamic functionality that changes over time, and pushed from aserver to a plurality of clients. Still yet, the home page 512 mayinclude a general update icon 520, a general additional information icon522, a general support icon 524, and a general help icon 526.

To convey the status of each of the applications, the home page 512 ofthe single graphical user interface 500 may include a list 502 of aplurality of applications 504. Still yet, the single graphical userinterface 500 may include a plurality of status indicators 506 adjacentto each of the applications 504 in the list 502.

Each status indicator 506 may indicate whether the correspondingapplication is installed. Moreover, each status indicator 506 mayindicate whether the corresponding application is enabled. Still yet,each status indicator 506 may indicate whether a subscription associatedwith the corresponding application is expired. While this is shown to beaccomplished using text, it should be noted that such status may beconveyed in any desired manner. As an option, each status indicator 506may be color coded. For example, an icon may be included as a statusindicator 506, as shown. In use, such icon may exhibit a red color toreflect the fact that an application is not installed, disabled orexpired (i.e. security vulnerability present); and a green color mayindicate that the application is installed and/or running (i.e.protection present). Still yet, an amber color may be used to reflectcaution or some intermediate degree of vulnerability.

Of course, the status indicator 506 may include any combination oftextual, graphic, numeric visuals that indicates a status of theapplications 504. Moreover, such status may include installed, notinstalled, expired, enabled, disabled, version number or any otherconceivable state of the applications.

FIG. 6 illustrates an exemplary anti-virus application window 600associated with an anti-virus application, in accordance with oneembodiment. As an option, the present window 600 may be displayed in thecontext of the interface 500 of FIG. 5 and, specifically, in response tothe selection of one of the selection icons 514 in accordance withoperations 408-410 of the method 400 FIG. 4. Of course, however, thewindow 600 may be used out in any desired environment.

As shown, the anti-virus application window 600 may include a controlframe 602 including an enable/disable icon 604 for selectivelyenabling/disabling the anti-virus application by a simple mouse-click orthe like. Further provided in such control frame 602 are anapplication-specific help icon 606 and an application-specificinformation icon 608. Similar to the home page of FIG. 5, the anti-virusapplication window 600 may include a general update icon 620, a generaladditional information icon 622, a general support icon 624, and ageneral help icon 626.

In addition to the previous features, the anti-virus application window600 may include a scan icon 630 for scanning data on the computer. Arescue disk icon 632 is provided for creating a rescue disk capable ofrebooting a computer after being infected by a virus. Still yet, aquarantine icon 634 is provided for situating an allegedly or known tobe infected file in a quarantine area. Further provided is a configureicon 636 for modifying various options associated with the anti-virusapplication. A virus map icon 638 may be used to view concentrations ofinfected data and sources of viruses on a world map. A virus informationicon 640 may be used to locate general information regarding variousviruses.

FIG. 7 illustrates an exemplary firewall application window 700associated with a firewall application, in accordance with oneembodiment. As an option, the present window 700 may be displayed in thecontext of the interface 500 of FIG. 5 and, specifically, in response tothe selection of one of the selection icons 514 in accordance withoperations 408-410 of the method 400 FIG. 4. Of course, however, thewindow 700 may be used out in any desired environment.

As shown, the firewall application window 700 may include a controlframe 702 including an enable/disable icon 704 for selectivelyenabling/disabling the firewall application by a simple mouse-click orthe like. Further provided in such control frame 702 are anapplication-specific help icon 706 and an application-specificinformation icon 708. Similar to the home page of FIG. 5, the firewallapplication window 700 may include a general update icon 720, a generaladditional information icon 722, a general support icon 724, and ageneral help icon 726.

In addition to the previous features, the firewall application window700 may include a firewall summary icon 730 for viewing a non-technicalreport of firewall activity. Moreover, an event log icon 732 may beprovided for viewing a technical highly-detailed report of the firewallactivity. An attack may be traced on a map utilizing a track icon 734.Still yet, the firewall application may be configured and testedutilizing a firewall configure icon 736 and firewall test icon 738,respectively.

FIG. 8 illustrates an exemplary privacy service application window 800associated with a privacy service application, in accordance with oneembodiment. As an option, the present window 800 may be displayed in thecontext of the interface 500 of FIG. 5 and, specifically, in response tothe selection of one of the selection icons 514 in accordance withoperations 408-410 of the method 400 FIG. 4. Of course, however, thewindow 800 may be used out in any desired environment.

As shown, the privacy service application window 800 may include acontrol frame 802 including an enable/disable icon 804 for selectivelyenabling/disabling the privacy service application by a simplemouse-click or the like. Further provided in such control frame 802 arean application-specific help icon 806 and an application-specificinformation icon 808. Similar to the home page of FIG. 5, the privacyservice application window 800 may include a general update icon 820, ageneral additional information icon 822, a general support icon 824, anda general help icon 826.

The privacy service application window 800 may further include a signout icon 830 for signing out a current user so that a next user can usea computer. This is important since the privacy service application mayselectively block content based on a user profile. Moreover, a reporticon 832 may be included to report Internet-related crimes via anetwork. Still yet, the privacy service application may be configuredutilizing a configure icon 834. A privacy information icon 836 may beused to obtain additional information relating to variousprivacy-related subjects (i.e. On-line chatting, etc.).

FIG. 9 illustrates an exemplary anti-spam application window 900associated with an anti-spam application, in accordance with oneembodiment. As an option, the present window 900 may be displayed in thecontext of the interface 500 of FIG. 5 and, specifically, in response tothe selection of one of the selection icons 514 in accordance withoperations 408-410 of the method 400 FIG. 4. Of course, however, thewindow 900 may be used out in any desired environment.

As shown, the anti-spam application window 900 may include a controlframe 902 including an enable/disable icon 804 for selectivelyenabling/disabling the anti-spam application by a simple mouse-click orthe like. Further provided in such control frame 902 are anapplication-specific help icon 906 and an application-specificinformation icon 908. Similar to the home page of FIG. 5, the anti-spamapplication window 900 may include a general update icon 920, a generaladditional information icon 922, a general support icon 924, and ageneral help icon 926.

Moreover, the anti-spam application window 900 may further include ablocked e-mail icon 930 adapted for allowing a user to view e-mail thathas been blocked by the anti-spam application. As an option, theanti-spam application may be configured utilizing a configure icon 932.

FIG. 10 illustrates a method 1000 for displaying a status of a securityapplication, in accordance with one embodiment. As an option, thepresent method 1000 may be implemented in the context of the system 300of FIG. 3. Of course, however, the method 1000 may be carried out in anydesired environment.

In operation 1001, a status of at least one security application isidentified. In one embodiment, the status of a plurality of applicationsmay be identified. As set forth before, the status may includeinstalled, not installed, expired, enabled, disabled, version number,update status or any other conceivable state of each application.

Next, in operation 1002, an individual index representative of a degreeof risk associated with the status of each security application iscalculated. Again, one individual index may be calculated for eachsecurity application or, in other words, a plurality of indices may becalculated for multiple security applications.

In one embodiment, each individual index may be calculated using aplurality of aspects of the status of the associated securityapplication. Just by way of example, a signature file of the securityapplication and/or a version of the security application may be used tocalculate the individual index. More information regarding exemplarytechniques of calculating the indices will be set forth in greaterdetail during reference to FIG. 11 and Appendix A.

As an option, each index may include a number between one (1) and ten(10). Of course, each index may include any alphanumeric range or merelyinclude symbols, etc.

Instead of or in addition to calculating the individual index inoperation 1002, an overall index may be calculated which isrepresentative of a degree of risk associated with the collective statusof the security applications. Note operation 1004. In one embodiment,such calculation may include a weighted average of the individualindices associated with each of the security applications.

In operation 1006, each individual index and/or the overall index aredisplayed. Of course, such display may be accomplished in any desiredmanner. Just by way of example, the indices may be displayedalphanumerically, graphically, utilizing a bar-graph, utilizing a colorcoding, etc. As an option, the color coding may correlate with thedegree of risk associated with the status, as will soon become apparentduring the description of the exemplary interface of the followingfigure.

FIG. 11 illustrates an exemplary graphical user interface 1100 fordisplaying a status of at least one security application, in accordancewith one embodiment. Optionally, such graphical user interface 1100 maybe used in the context of the system 300 and method 1000 of FIGS. 3 and10, respectively. Of course, the various features of the graphical userinterface 1100 may be used in any desired manner.

As shown, two versions 1102, 1104 of the graphical user interface 1100are shown to reflect different statuses of the various applicationsassociated therewith. Included with the graphical user interface 1100 isa plurality of bar graphs 1106 each associated with a correspondingapplication. The size of each bar graph 1106 is commensurate with anumerical index 1108 associated therewith, and optionally positionedadjacent thereto.

Moreover, the bar graphs 1106 may be color-coded. Specifically, thecolor of each bar graph 1106 may be based on the associated numericalindex 1108. Just by way of example, each bar graph 1106 may include ared color upon the numerical index 1108 falling below a predeterminednumerical index threshold, thus representing a high degree of riskassociated with the current status of the associated application.Conversely, each bar graph 1106 may include a green color upon thenumerical index 1108 rising above a predetermined numerical indexthreshold, thus representing a low degree of risk associated with thecurrent status of the associated application.

As shown in FIG. 11, both an overall index and individual indices areprovided with the graphical user interface 1100. As mentioned earlier,the various indices may be calculated in a variety of ways.

In one embodiment, an index associated with the status of an anti-virussecurity application may reflect a signature file of the anti-virussecurity application and/or a version of the anti-virus securityapplication. Optionally, such index may be calculated using a weightedaverage of a plurality of aspects of the anti-virus security applicationincluding the signature file of the anti-virus security application andthe version of the anti-virus security application.

In another embodiment where the index is associated with the status of afirewall security application, the index may reflect a version of thefirewall security application. Similarly, in still another embodimentwhere the index is associated with the status of a privacy servicesecurity application, the index may reflect a version of the privacyservice security application.

In yet another embodiment where the index includes an overall indexreflecting a plurality of security applications, such overall index maybe calculated using a weighted average of a plurality of separateindices associated with each of the security applications.

With continuing reference to FIG. 11, the various indices 1106 shownwith the two versions 1102, 1104 of the graphical user interface 1100are clearly different due to the dependence of the status of the relatedapplications. See such application statuses listed below the indices1106.

Appendix A sets forth a detailed exemplary technical specification forcalculating and presenting the security indices set forth in FIG. 11. Itshould be noted that such specification is set forth for illustrativepurposes only, and should not be construed as limiting in any manner.

Optionally, additional information relating to the status may bedisplayed upon the selection of the appropriate displayed index 1106.For example, a window associated with the appropriate application (see,for example, FIGS. 6-9) may be displayed. Such additional informationmay include a link capable of being selected by a user. Action may thenbe taken to decrease the degree of risk associated with the status, inresponse to the selection of the link by the user. For instance, a morerecent version or update of the application may be downloaded.

FIG. 12 illustrates a method 1200 for alerting users of a plurality ofcomputers of a security event via a network, in accordance with oneembodiment. As an option, the present method 1200 may be implemented inthe context of the system 300 of FIG. 3. Of course, however, the method1200 may be carried out in any desired environment.

initially, in operation 1202, a security alert is generated includinginformation relating to a security event utilizing a server. Thesecurity alert may take any desired format (i.e. HTML, XML, etc.)capable of being transmitted via a network and eventually displayed on auser computer. Moreover, the information may include any data relevantto the security event. Table 1 illustrates some exemplary informationthat may be included with the security alert. Of course, suchinformation is set forth for illustrative purposes only, and should notbe construed as limiting in any manner.

TABLE 1 Alert status (i.e. high, medium, low, etc.) Possible ResponseActions (i.e. get security application or an update thereof, get moreinformation, etc.) Content (i.e. description of security event, etc.)

It should be noted that the foregoing alert status may be generated inany desired manner. For example, it may be gleaned from an organizationsuch as the Anti-Virus Emergency Response Team (AVERT) administered byNETWORK ASSOCIATES, INC®.

Thus, the information may include a level of the security alert. Suchlevel of the security alert may, in turn, reflect a level of riskassociated with the security event. Moreover, the information mayinclude at least one proposed user action relating to the securityevent. For example, such proposed user action may involve obtaining moreinformation relating to the security event and/or obtaining protectionfrom the security event. Further, the information may include a responseautomatically carried out in reaction to the security event. Forexample, such response may include scanning a computer, scanning a file,cleaning a file, and/or blocking access to a computer. Still yet, theinformation may simply include a description of the security event.

Next, in operation 1204, the security alert is pushed from the server toa plurality of user computers via a network such as the Internet. In thecontext of the present description, such pushing may include anytechnique where the server initiates the delivery of the security alertto the user computers.

It should be noted that the foregoing pushing may be accomplished in avariety of foreseeable ways. Just by way of example, the security alertpushed from the server to the user computers may actually come as theresult of a programmed request from the user computers. That is, aclient program may be used to facilitate such pushed security alerts.This program may further capture a user profile for reasons that willsoon become apparent.

Still yet, the pushing may include a simple broadcasting of the securityalert. In this case, the security alert may be pushed to the usercomputers that have access to a particular channel or frequency.Broadcast may (but not always) involve a continuous flow of information.

As mentioned earlier, a user profile may be obtained during the courseof the present method 1200. In particular, in operation 1206, a statusof security applications on the computer may be identified. Such userprofile may include data relating to a security application installed ona computer. For example, the status may indicate whether the securityapplication is installed, enabled, etc. Also, the status may indicatewhether a subscription associated with the security application isexpired.

The specific profile identified in operation 1206 may, in turn, be usedto conditionally display the information of the security alert based onthe status of the security application(s) on the computer. Noteoperation 1208.

For example, the security alert may include a plethora of user optionssuch as updating a particular security application, etc. However, ifupon delivery of the security alert, it may be determined that theparticular security application is not installed, expired, etc. In suchcase, an option to obtain the security application may be displayed, asopposed to an option to obtain an update.

Thus, in one embodiment, a large amount of information associated withthe security alert may be downloaded to accommodate the numerousstatuses associated with different computers. This may be feasible, forexample, since large amounts of HTML information may be efficientlytransmitted over a network such as the Internet. Logic (i.e. anapplication program interface, plug-in, etc.) may then be used to parsethe large amount of information into a subset which is to be displayedbased on the status of the security applications. Of course, some ofsuch logic may conceivably be carried out on the server such that thealerts are tailored prior to being pushed.

In any case, the security alert may be displayed in a front most windowof a user interface of the computers. In the present description, such awindow may include any frame, portion, etc. of the user interface. Byvirtue of the aforementioned pushing, such display may be carried out inan automatic fashion, thus alerting users as soon as possible. Oneexemplary security alert will be set forth in greater detail duringreference to FIGS. 13 and 14.

FIG. 13 illustrates an exemplary graphical user interface 1300 foralerting users of a plurality of computers of a security event via anetwork, in accordance with one embodiment. Optionally, such graphicaluser interface 1300 may be used in the context of the method 1200 ofFIG. 12. Of course, the various features of the graphical user interface1300 may be used in any desired manner.

As shown, the graphical user interface 1300 includes a front most window1304 which is automatically displayed over a background window 1302 thatwas running at the time the pushed security alert was received.Optionally, the front most window 1304 may be moved about the backgroundwindow 1302 while a user decides how to react to the security alert.

Still yet, the user may continue work in the background window 1302while the front most window 1304 is maintained in the foreground.Moreover, this foreground status of the front most window 1304 may bemaintained despite the background window 1302 being changed as a resultof the user changing applications, etc. As an option, the front mostwindow 1304 may stay in the foreground until the user selects one of theoptions set forth in the security alert. More information regarding thedesign of a specific security alert will be set forth during referenceto FIG. 14.

FIG. 14 illustrates an exemplary security alert 1400 for alerting usersof a plurality of computers of a security event via a network, inaccordance with one embodiment. Optionally, such security alert 1400 maybe used in the context of the method 1200 of FIG. 12 and the interface1300 of FIG. 13. Of course, the various features of the security alert1400 may be used in any desired manner.

As shown, the security alert 1400 may include a square or rectangularwindow with a first portion 1402 including a description 1404 of thesecurity event. As shown, such description includes an alert levelassociated with the security event. Again, such description and alertlevel may be pushed as part of the information corresponding with thesecurity alert 1400.

Further provided is a second portion 1406 including a number of proposedresponse options displayed to the user based on the profile of the user(i.e. status of the applications on the computer, etc.). Such responseoptions may be carried out by the selection thereof by a user utilizinga mouse-click or the like. While this may be accomplished in any desiredmanner, one exemplary method may include the technique set forth in U.S.Pat. No. 6,266,774 entitled “Method and system for securing, managing oroptimizing a personal computer,” which is incorporated herein byreference in its entirety.

It should be noted that the security alert shown in FIG. 14 may alsoserve as a marketing agent in addition to its inherent securityfunction. For example, a status of a subscription of a subscriber of anapplication-related service may be first identified utilizing a server.An alert may then be conditionally pushed to the subscriber of theapplication-related service via a network based on the status. Apurchase link may then be displayed with the alert which is capable ofbeing used by the subscriber of the application-related service to renewthe subscription for the application-related service via the network.

Moreover, a status of security applications on the computer may beidentified upon the receipt of a security alert like that shown in FIG.14. A purchase link may then be conditionally displayed with thesecurity alert based on the status of the security applications on thecomputer. Such purchase link is capable of being utilized by a user ofthe computer to purchase a service related to the security applicationsin response to the security event associated with the security alert.

As an option, the security alert 1400 may be color-coded to reflect alevel of severity associated with the alert. For example, red mayreflect a high severity (i.e. including security alerts), blue mayreflect a medium severity (i.e. including application tasks), and greenmay reflect a low severity (i.e. including application responses,marketing or general information).

FIG. 15 illustrates an exemplary graphical user interface 1500 forselling application-related services, in accordance with one embodiment.Optionally, such graphical user interface 1500 may be used in thecontext of the method 400 of FIG. 4. For example, the graphical userinterface 1500 may be displayed upon the selection of one of theselection icons 514 of FIG. 5, when the related application is notinstalled, expired, etc. Of course, the various features of thegraphical user interface 1500 may be used in any desired manner.

As shown, a plurality of purchase links 1502 is conditionally displayedbased on the status of the related applications on the computer. Suchpurchase link may be capable of being utilized by a user of the computerto purchase a service associated with the related applications via thenetwork.

FIG. 16 illustrates an exemplary graphical user interface 1600 tailoredto manage a plurality of related applications of a specific entity (i.e.company, organization, etc.), in accordance with one embodiment.Optionally, such graphical user interface 1600 may be used in thecontext of the method 400 of FIG. 4. Of course, the various features ofthe graphical user interface 1600 may be used in any desired manner.

As shown, the graphical user interface 1600 includes a field for aspecific entity logo 1602 using the present system. Moreover, varioustailored user options 1604 are provided to accommodate the specificneeds of the entity. Also, the various selection icons 1606 may beselectively displayed based on whether the applications are being usedby the entity.

To accomplish this, a plurality of fields associated with such aspectsof the multi-application managing interface may be made available to adesirer or administrator. In one embodiment, such fields may be providedvia a management/designer/programmer interface or the like. Such fieldsare subsequently filled with content tailored to an entity (i.e. aspecific company) including a multiplicity of computers each equippedthe multi-application managing interface. Thus, the multi-applicationmanaging interface may be displayed on the computers with the content.

Optionally, a data structure may be provided for tailoring amulti-application managing interface. Included with the data structureis a map object for mapping a plurality of fields with content tailoredto an entity including a multiplicity of computers each including amulti-application managing interface. Such fields are associated with aplurality of aspects of the multi-application managing interface.

While various embodiments have been described above, it should beunderstood that they have been presented by way of example only, and notlimitation. For example, any of the network elements may employ any ofthe desired functionality set forth hereinabove. Thus, the breadth andscope of a preferred embodiment should not be limited by any of theabove-described exemplary embodiments, but should be defined only inaccordance with the following claims and their equivalents.

APPENDIX A

Security Index

The “Security Index” is based on the results of the “Anti-Virus”,“Anti-Hacker”, and the “Anti-Abuse” indices. Here is the formula:uSecurityIndex=(55% of uAntiVirusIndex)+(35% of uAntiHackerIndex)+(10%of uAntiAbuseIndex)I would recommend that you have a routine called something like:BOOL SIGetAllIndexes (out UINT uSecurityIndex,

-   -   out UINT uAntiVirusIndex,    -   out UINT uAntiHackerIndex,    -   out UINT uAntiAbuseIndex);        You can have them return a number between 0 and 100. Or you can        have them just return the strings, “3.4”. That way, you can just        display it as you receive it without having to convert it to a        number between 0-100 and then convert from a number to a string.        Anti-Virus Index        Here is the formula for the anti-virus index:        uAntiVirusIndex=(60% of DAT Factor)+(40% of AntiVirus Product        Factor)        Anti-Hacker Index        Here is the formula for the anti-hacker index:        uAntiHackerIndex=(100% of AntiHacker Product Factor)        Anti-Abuse Index        Here is the formula for the anti-abuse index:        uAntiAbuseIndex=(100% of AntiAbuse Product Factor)        BOOL SIGetAllIndexes (UINT *puSecurityIndex,    -   UINT *puAntiVirusIndex,    -   UINT *puAntiHackerIndex,    -   UINT *puAntiAbuseIndex)        {    -   UINT uAVProductFactor, uDATFactor;    -   GetProductVersionFactor (bMessageTable[AV_PRODUCT_BASE],        &uAVProductFactor);    -   GetDATFactor (&uDATFactor);    -   *puAntiVirusIndex=(60%*uAVProductFactor)+(40% *uDATFactor);    -   GetProductVersionFactor (bMessageTable (FW_PRODUCT_BASE),        puAntiHackerIndex);    -   GetProductVersionFactor (bMessageTable[PS_PRODUCT_BASE],        puAntiAbuseIndex);    -   *puSecurityIndex=(55% of *puAntiVirusIndex)+(35% of    -   *puAntiHackerIndex)+(10% of *puAntiAbuseIndex)        Product Factor        The product factor is dependent on 2 things: 1) The product's        version; and 2) The product's modification date.        Get the product's version information using the following:    -   Use VerQueryValue (x, “\”, y, z) to get the VS_FIXEDFILEINFO        structure. Once you have this structure, get the values as        follows:        wMajor=HIWORD (dwFileVersionMS);        wMinor=LOWORD (dwFileVersionMS);        wRevision=HIWORD (dwFileVersionLS);        wBuild=LOWORD (dwFileVersionLS);        The product factor is a value from 0-100. Here is the breakdown        of how it is computed:    -   Value Description    -   100 Product up-to-date    -   90 The revision version is old    -   70 The minor version is old    -   40 The major version is old    -   0 Product doesn't exist    -   (−20) Subtract this, if product is >2 years old        #define PRODUCT_UP_TO_DATE 100        #define PRODUCT_OLD_REVISION 90        #define PRODUCT_OLD_MINOR 70        #define PRODUCT_OLD_MAJOR 40        #define PRODUCT_DOESNT_EXIST_FACTOR 0        #define PRODUCT_OLD_FACTOR 20        BOOL GetProductVersionFactor (BOOL *pbProductMessageTable,    -   UINT *puFactor)        {        UINT uFactor=PRODUCT_UP_TO_DATE;        if (Product Installed)        {    -   if (majorVersion<latestMajorVersion)    -   {        -   uFactor=OLD_MAJOR_VERSION_FACTOR;        -   *(pbProductMessageTable+OLD_MAJOR_OFFSET)=TRUE;    -   }    -   else if (majorVersion==latestMajorVersion)        -   if (minorVersion<latestMinorVersion)        -   {        -   uFactor=OLD_MINOR_VERSION_FACTOR;        -   *(pbProductMessageTable+OLD_MINOR_OFFSET)=TRUE;        -   }        -   else if (minorVersion==latestMinorVersion)        -   {            -   if (revisionVersion<latestRevisionVersion)            -   {            -   uFactor=OLD_REVISION_VERSION_FACTOR;            -   *(pbProductMessageTable+OLD_REVISION_OFFSET)=TRUE;            -   }        -   }    -   }    -   // No matter what version is, if the product is older than 2        years old, then    -   // penalize it.    -   if (product>=2 years old)    -   {        -   uFactor-=PRODUCT_OLD_FACTOR;        -   *(pbProductMessageTable+TWO_YEARS_OLD_OFFSET)=TRUE;    -   // See if any messages generated. If not, then generate the        UP-TO-DATE    -   // message. We always want to generate some message, so user        knows why his    -   // score is so low or high.    -   if (uFactor==PRODUCT_UP_TO_DATE)    -   {        -   *(pbProductMessageTable+UP_TO_DATE_OFFSET)=TRUE;    -   }    -   else if (product is one of our products: VSO, MPS, or MPF)        -   // See if any error messages generated. If so, turn them off            and just set        -   // our product specific message, since the other messages            are sales        -   // pitches for our products.        -   BOOL bErrorFound=FALSE;        -   For (int i=PRODUCT_ERROR_START; i<=PRODUCT_ERROR_END; i++)        -   {            -   if (TRUE==*(pbProductMessageTable+i))        -    {            -   bErrorFound=TRUE;            -   // Don't display this message.            -   *(pbProductMessageTable+i)=FALSE;        -    }        -   }        -   // We found an error with our product. Just display            product-specific        -   // message, which doesn't have sales pitch.        -   if (bErrorFound)            -   *(pbProductMessageTable+OUT_OF_DATE_OFFSET)=TRUE;                }                else // Product doesn't exist                {    -   uFactor=PRODUCT_DOESNT_EXIST_FACTOR;    -   *(pbProductMessageTable+NONE OFFSET)=TRUE;        }        *puFactor=uFactor;        }        DAT Factor        The DAT factor is solely based on the modification date of the        DAT file.

The DAT factor is a value from 0-100. Here is the breakdown of how it iscomputed:

-   -   Value Description    -   100 DAT less than 2 weeks old    -   50 DAT less than 3 months old    -   30 DAT less than 1 year old    -   10 DAT less than 2 years old    -   5 DAT exists, but older than 2 years old    -   0 DAT doesn't exist        #define DAT_UP_TO_DATE 100        #define DAT_TWO_WEEKS_OLD 50        #define DAT_THREE_MONTHS_OLD 30        #define DAT_ONE_YEAR_OLD 10        #define DAT_TWO_YEARS_OLD 5        #define DAT_DOESNT_EXIST_FACTOR 0        GetDATFactor (out UINT *puDATFactor)        UINT uFactor=DAT_UP_TO_DATE;        if (DAT Exists)        {    -   if (DAT>2 weeks old)        -   {            -   if (DAT<=3 months old)            -   {                -   uFactor=DAT_TWO_WEEKS_OLD;                -   bMessageTable[AV_DAT_TWO_WEEKS_OLD]=TRUE;            -   }            -   else if (DAT<=1 year old)            -   {                -   uFactor=DAT_THREE_MONTHS_OLD;                -   bMessageTable (AV_DAT_THREE_MONTHS_OLD]=TRUE;            -   }            -   else if (DAT<=2 years old)            -   {                -   uFactor=DAT_ONE_YEAR_OLD;                -   bMessageTable (AV_DAT_ONE_YEAR_OLD]=TRUE;            -   }        -   }            }            else // DAT>2 years old            {    -   uFactor=DAT_TWO_YEARS_OLD;    -   bMessageTable (AV_DAT_TWO_YEARS_OLD]=TRUE;        }        else // DAT doesn't exist        {    -   uFactor=DAT_DOESNT_EXIST_FACTOR;    -   bMessageTable (AV_DAT_NONE]=TRUE;        }        // If this is VSO, we don't want to display “sales pitch”        messages. Instead,        // just VSO message.        if (product is VSO)        {    -   // See if any error messages generated. If so, turn them off and        just set    -   // our product specific message, since the other messages are        sales    -   // pitches for our products.    -   BOOL bErrorFound=FALSE;    -   For (int i=AV_DAT_ERROR_START; i<=AV_DAT_ERROR_END; i++)    -   {        -   if (TRUE==bMessageTable[i])        -   {            -   bErrorFound=TRUE;            -   // Don't display this message.            -   bMessageTable[i]=FALSE;        -   }    -   }    -   // We found an error with our product. Just display        product-specific    -   // message, which doesn't have sales pitch.    -   if (bErrorFound)    -   {        -   bMessageTable (AV_PRODUCT_VSO_OUT_OF_DATE]=TRUE;        -   // Also, make sure the VSO's UP_TO_DATE message is not set!        -   bMessageTable (AV_PRODUCT_UP_TO_DATE)=FALSE;    -   }        }        *puDATFactor=uFactor;

Security Index Descriptions

The descriptions below specify what is displayed to the user, based uponthe results of the factors. The following parameters is needed todisplay every message here:

Product Name (ex. “Norton AntiVirus”)

Product Version (need both “major.minor” and “major.minor.revision”)

Latest Version (need both “major.minor” and “major.minor.revision”)

Product Date (is displayed as “# of years”)

DAT Date (is displayed as “# of years”)

AV_PRODUCT_VSO_OUT_OF_DATE

Category: Anti-Virus

Display this in place of any AV_* strings (except

AV_PRODUCT_UP_TO_DATE)

We display this for VSO, since all the other AV_* strings push VSO forits “always up-to-date” aspect. Instead, if VSO is not up-to-date, wedisplay this “nicer” message.

Description:

Old version of anti-virus software detected.

Details:

The anti-virus software you have, McAfee.com VirusScan Online, is notup-to-date. If you are a subscriber to McAfee.com VirusScan Online, youare entitled to the latest version. There are now over 50,000 computerviruses and 500 new viruses are created every month. It is extremelyimportant that you get the latest version to protect you from the latestvirus threats.Recommendation:Click on the ‘Updates’ button at the top of the McAfee.comSecurityCenter to update VirusScan Online to the latest version. If youdon't have a subscription to VirusScan Online, connect to the Internetand then click on Tell Me More About Anti-Virus Solutions.AV_PRODUCT_UP_TO_DATECategory: Anti-Virus

-   -   % s1—Name of anti-virus product (ex. “Norton AntiVirus”)        Display this message if there are no AV_* messages to display.        Description:        Your anti-virus software is up-to-date.        Details:        You have the latest version of your anti-virus software, % s1.        You also have the latest version of the Virus Signature files        for this anti-virus software. Your computer is well-protected        against the latest virus threats.        Recommendation:        New viruses are being created at the rate of 500 new viruses per        month. That's the reason why it is extremely important for you        to always have the latest version of your anti-virus software        and also the latest Virus Signature files. Make sure you        continue to keep your anti-virus software up-to-date.        AV_PRODUCT_NONE        Category: Anti-Virus        No variables        Description:        No anti-virus software is installed on your computer.        Details:        Your computer is not protected from viruses. There are now over        50,000 computer viruses and 500 new viruses are created every        month. You are extremely vulnerable of having your computer        infected by a virus.        Recommendation:        It is highly recommended that you get an anti-virus solution.        The best type of anti-virus solution is one which is “always        up-to-date”. McAfee.com VirusScan Online, the #1 anti-virus        solution of this type, ensures that you are always up-to-date,        protecting you from the latest virus threats. For more        information, make sure you are connected to the Internet and        then click Tell Me More About Anti-Virus Solutions.        AV_PRODUCT_TWO_YEARS_OLD        Category: Anti-Virus        % s1—name of anti-virus product (ex. “Norton AntiVirus”)        % d2—Number of years old this product is ((current date−product        date)/365). This will always be 2 or more years.        Description:        Old obsolete anti-virus software detected.        Details:        The anti-virus software you have, % s1, is over % d2 years old.        Since then, there have been 500 new viruses per month, plus many        new types of viruses. Your anti-virus software will not protect        you from the viruses that have been created in the last % d2        years. You are extremely vulnerable of having your computer        infected by a virus.        Recommendation:        It is highly recommended that you either purchase a new version        of your anti-virus software or you get an “always up-to-date”        anti-virus solution, like McAfee.com VirusScan Online, the #1        anti-virus product of this type. If you have McAfee.com        VirusScan Online, your anti-virus software will always be        up-to-date, thus protecting you from the latest virus threats.        For more information, make sure you are connected to the        Internet and then click Tell Me More About Anti-Virus Solutions.        AV_PRODUCT_OLD_MAJOR        Category: Anti-Virus        % s1—name of anti-virus product (ex. “Norton AntiVirus”)        % s2—Version number. Only display major/minor (“6.3”, “7.0”)        % s3—Latest version number. Only display major/minor (“6.3”,        “7.0”)        Description:        Old version of anti-virus software detected.        Details:        The anti-virus software you have, % s1, is version % s2. The        latest version of this product is version % s3. The version you        have is obsolete and is not protecting you from the latest virus        threats. You are extremely vulnerable of having your computer        infected by a virus.        Recommendation:        It is highly recommended that you either purchase a new version        of your anti-virus software or you get an “always up-to-date”        anti-virus solution, like McAfee.com VirusScan Online, the #1        anti-virus product of this type. If you have McAfee.com        VirusScan Online, your anti-virus software will always be        up-to-date, thus protecting you from the latest virus threats.        For more information, make sure you are connected to the        Internet and then click Tell Me More About Anti-Virus Solutions.        AV_PRODUCT_OLD_MINOR        Category: Anti-Virus        % s1—name of anti-virus product (ex. “Norton AntiVirus”)        % s2—Version number. Only display major/minor (“6.3”, “6.5”)        % s3—Latest version number. Only display major/minor (“6.3”,        “6.5”)        Description:        Old version of anti-virus software detected.        Details:        The anti-virus software you have, % s1, is version % s2. The        latest version of this product is version % s3. The version you        have does not address a number of bug fixes and other problems        that were addressed in version % s3. Because you don't have this        latest version, your computer may be exposed to the latest        computer viruses.        Recommendation:        It is highly recommended that you either contact your anti-virus        software vendor and ask to have the latest version or get an        anti-virus solution where you will always have the latest        version. By having the latest version, you will always be        protected from the latest virus threats. McAfee.com VirusScan        Online, the #1 “always up-to-date” anti-virus solution, ensures        that you are protected from the latest virus threats. For more        information, make sure you are connected to the Internet and        then click Tell Me More About Anti-Virus Solutions.        AV_PRODUCT_OLD_REVISION        Category: Anti-Virus        % s1—name of anti-virus product (ex. “Norton AntiVirus”)        % s2—Version number. Only display major/minor/revision (“6.3.2”,        “6.3.12”)        % s3—Latest version number. Only display major/minor/revision        (“6.3.2”, “6.3.12”)        Description:        Old version of anti-virus software detected.        Details:        The anti-virus software you have, % s1, is version % s2. The        latest version of this product is version % s3. The version you        have does not address a number of bug fixes and other problems        that were addressed in version % s3. Because you don't have this        latest version, your computer may be exposed to the latest        computer viruses.        Recommendation:        It is highly recommended that you either contact your anti-virus        software vendor and ask to have the latest version or get an        anti-virus solution where you will always have the latest        version. By having the latest version, you will always be        protected from the latest virus threats. McAfee.com VirusScan        Online, the #1 “always up-to-date” anti-virus solution, ensures        that you are protected from the latest virus threats. For more        information, make sure you are connected to the Internet and        then click Tell Me More About Anti-Virus Solutions.        AV_DAT_NONE        Category: Anti-Virus        % s1—name of anti-virus product (ex. “Norton AntiVirus”)        Description:        Unable to find the Virus Signature files for your anti-virus        software.        Details:        Your anti-virus software, % s1, has modified the way it stores        its Virus Signature files. Because of this change, the integrity        and reliability of the Virus Signature files cannot be        determined.        Recommendation:        It is highly recommended that you either contact your anti-virus        software vendor and make sure you have the latest version of the        Virus Signature file or you get an “always up-to-date”        anti-virus solution, like McAfee.com VirusScan Online, the #1        product of this type. If you have McAfee.com VirusScan Online,        your anti-virus software will always be up-to-date, thus        protecting you from the latest virus threats. For more        information, make sure you are connected to the Internet and        then click Tell Me More About Anti-Virus Solutions.        AV_DAT_TWO_YEARS_OLD        Category: Anti-Virus        % s1—name of anti-virus product (ex. “Norton AntiVirus”)        % d2—Number of years old this DAT file is ((current date−DAT        date)/365). This will always be 2 or more years.        Description:        Old obsolete Virus Signature file detected.        Details:        The anti-virus software you have, % s1, has a Virus Signature        file which is over % d2 years old. Since then, there have been        500 new viruses per month, plus many new types of viruses. Your        anti-virus software will not protect you from the viruses that        have been created in the last % d2 years. You are extremely        vulnerable of having your computer infected by a virus.        Recommendation:        It is highly recommended that you either purchase a new version        of your anti-virus software or you get an “always up-to-date”        anti-virus solution, like McAfee.com VirusScan Online, the #1        anti-virus product of this type. If you have McAfee.com        VirusScan Online, your anti-virus software will always be        up-to-date, thus protecting you from the latest virus threats.        For more information, make sure you are connected to the        Internet and then click Tell Me More About Anti-Virus Solutions.        AV_DAT_ONE_YEAR_OLD        Category: Anti-Virus        % s1—name of anti-virus product (ex. “Norton AntiVirus”)        Description:        Old obsolete Virus Signature file detected.        Details:

The anti-virus software you have, % s1, has a Virus Signature file whichis over a year old. Since then, there have been 500 new viruses permonth, plus many new types of viruses. Your anti-virus software will notprotect you from the viruses that have been created in the last year.You are extremely vulnerable of having your computer infected by avirus.

Recommendation:

It is highly recommended that you either purchase a new version of youranti-virus software or you get an “always up-to-date” anti-virussolution, like McAfee.com VirusScan Online, the #1 anti-virus product ofthis type. If you have McAfee.com VirusScan Online, your anti-virussoftware will always be up-to-date, thus protecting you from the latestvirus threats. For more information, make sure you are connected to theInternet and then click Tell Me More About Anti-Virus Solutions.AV_DAT_THREE_MONTHS_OLDCategory: Anti-Virus% s1—name of anti-virus product (ex. “Norton AntiVirus”)Description:Old obsolete Virus Signature file detected.Details:The anti-virus software you have, % s1, has a Virus Signature file whichis over 3 months old. Since then, there have been 500 new viruses permonth, plus many new types of viruses. Your anti-virus software will notprotect you from the viruses that have been created in the last 3months. You are extremely vulnerable of having your computer infected bya virus.Recommendation:It is highly recommended that you either contact your anti-virussoftware vendor and ask for the latest Virus Signature files or you getan “always up-to-date” anti-virus solution, like McAfee.com VirusScanOnline, the #1 anti-virus product of this type. If you have McAfee.comVirusScan Online, your anti-virus software will always be up-to-date,thus protecting you from the latest virus threats. For more information,make sure you are connected to the Internet and then click Tell Me MoreAbout Anti-Virus Solutions.AV_DAT_TWO_WEEKS_OLDCategory: Anti-Virus% s1—name of anti-virus product (ex. “Norton AntiVirus”)Description:Old Virus Signature file detected.Details:The anti-virus software you have, % s1, has a Virus Signature file whichis over 2 weeks old. Your anti-virus software will not protect you fromthe most recent virus threats.Recommendation:It is highly recommended that you either contact your anti-virussoftware vendor and ask for the latest Virus Signature files or you getan “always up-to-date” anti-virus solution, like McAfee.com VirusScanOnline, the #1 anti-virus product of this type. If you have McAfee.comVirusScan Online, your anti-virus software will always be up-to-date,thus protecting you from the latest virus threats. For more information,make sure you are connected to the Internet and then click Tell Me MoreAbout Anti-Virus Solutions.FW_PRODUCT_MPF_OUT_OF_DATECategory: Display this in place of any FW_* strings (exceptFW_PRODUCT_UP_TO_DATE)We display this for MPF, since all the other FW_* strings push MPF forits “always up-to-date” aspect. Instead, if MPF is not up-to-date, wedisplay this “nicer” message.Description:Old version of anti-hacker software detected.Details:The anti-hacker software you have, McAfee.com Personal Firewall, is notup-to-date. If you are a subscriber to McAfee.com Personal Firewall, youare entitled to the latest version. Hackers are continuously devisingnew ways of “hacking” into your computer. It is extremely important thatyou get the latest version to protect you from the latest hackerattacks.Recommendation:Click on the ‘Updates’ button at the top of the McAfee.comSecurityCenter to update McAfee.com Personal Firewall to the latestversion. If you don't have a subscription to McAfee.com PersonalFirewall, connect to the Internet and then click on Tell Me More AboutAnti-Hacker Solutions.FW_PRODUCT_UP_TO_DATECategory: Anti-Hacker% s1—Name of anti-hacker product (ex. “ZoneLabs ZoneAlarm”)Display this message if there are no FW_* messages to display.Description:Your anti-hacker software is up-to-date.Details:You have the latest version of your anti-hacker software, % s1. Yourcomputer is protected against the latest hacker attacks.Recommendation:New hacker attacks are occurring monthly. That's the reason why it isextremely important for you to always have the latest version of youranti-hacker software. Make sure you continue to keep your anti-hackersoftware up-to-date.FW_PRODUCT_NONECategory: Anti-HackerNo variablesDescription:No anti-hacker software is installed on your computer.Details:Your computer is not protected from hackers. Hackers are continuouslytrying to take control of as many computers as they can. Since you don'thave a firewall, a hacker can easily take control of your computer andview personal information you have stored on it. You are extremelyvulnerable of having your computer “hacked” by a hacker.Recommendation:It is highly recommended that you get an anti-hacker solution. The besttype of anti-hacker solution is one which is “always up-to-date”.McAfee.com Personal Firewall, the #1 anti-hacker solution of this type,ensures that you are always up-to-date, protecting you from the latesthacker threats. For more information, make sure you are connected to theInternet and then click Tell Me More About Anti-Hacker Solutions.FW_PRODUCT_TWO_YEARS_OLDCategory: Anti-Hacker% s1—name of anti-hacker product (ex. “ZoneLabs ZoneAlarm”)% d2—Number of years old this product is ((current date−productdate)/365). This will always be 2 or more years.Description:Old obsolete anti-hacker software detected.Details:The anti-hacker software you have, % s1, is over % d2 years old. Sincethen, there have been many new hacker attacks. Your anti-hacker softwarewill not protect you from the hacker attacks that have been created inthe last % d2 years. You are extremely vulnerable of having yourcomputer “hacked” by a hacker.Recommendation:It is highly recommended that you either purchase a new version of youranti-hacker software or you get an “always up-to-date” anti-hackersolution, like McAfee.com Personal Firewall, the #1 anti-hacker productof this type. If you have McAfee.com Personal Firewall, your anti-hackersoftware will always be up-to-date, thus protecting you from the latesthacker attacks. For more information, make sure you are connected to theInternet and then click Tell Me More About Anti-Hacker Solutions.FW_PRODUCT_OLD_MAJORCategory: Anti-Hacker% s1—name of anti-hacker product (ex. “ZoneLabs ZoneAlarm”)% s2—Version number. Only display major/minor (“6.3”, “7.0”)% s3—Latest version number. Only display major/minor (“6.3”, “7.0”)Description:Old version of anti-hacker software detected.Details:The anti-hacker software you have, % s1, is version % s2. The latestversion of this product is version % s3. The version you have isobsolete and is not protecting you from the latest hacker attacks. Youare extremely vulnerable of having your computer “hacked” by a hacker.Recommendation:It is highly recommended that you either purchase a new version of youranti-hacker software or you get an “always up-to-date” anti-hackersolution, like McAfee.com Personal Firewall, the #1 anti-hacker productof this type. If you have McAfee.com Personal Firewall, your anti-hackersoftware will always be up-to-date, thus protecting you from the latesthacker attacks. For more information, make sure you are connected to theInternet and then click Tell Me More About Anti-Hacker Solutions.FW_PRODUCT_OLD_MINORCategory: Anti-Hacker% s1—name of anti-hacker product (ex. “ZoneLabs ZoneAlarm”)% s2—Version number. Only display major/minor (“6.3”, “6.5”)% s3—Latest version number. Only display major/minor (“6.3”, “6.5”)Description:Old version of anti-hacker software detected.Details:The anti-hacker software you have, % s1, is version % s2. The latestversion of this product is version % s3. The version you have does notaddress a number of bug fixes and other problems that were addressed inversion % s3. Because you don't have this latest version, your computermay be exposed to the latest hacker attacks.Recommendation:It is highly recommended that you either contact your anti-hackersoftware vendor and ask to have the latest version or get an anti-hackersolution where you will always have the latest version. By having thelatest version, you will always be protected from the latest hackerattacks. McAfee.com Personal Firewall, the #1 “always up-to-date”anti-hacker solution, ensures that you are protected from the latesthacker attacks. For more information, make sure you are connected to theInternet and then click Tell Me More About Anti-Hacker Solutions.FW_PRODUCT_OLD_REVISIONCategory: Anti-Hacker% s1—name of anti-hacker product (ex. “ZoneLabs ZoneAlarm”)% s2—Version number. Only display major/minor/revision (“6.3.2”,“6.3.12”)% s3—Latest version number. Only display major/minor/revision (“6.3.2”,“6.3.12”)Description:Old version of anti-hacker software detected.Details:The anti-hacker software you have, % s1, is version % s2. The latestversion of this product is version % s3. The version you have does notaddress a number of bug fixes and other problems that were addressed inversion % s3. Because you don't have this latest version, your computermay be exposed to the latest hacker attacks.Recommendation:It is highly recommended that you either contact your anti-hackersoftware vendor and ask to have the latest version or get an anti-hackersolution where you will always have the latest version. By having thelatest version, you will always be protected from the latest hackerattacks. McAfee.com Personal Firewall, the #1 “always up-to-date”anti-hacker solution, ensures that you are protected from the latesthacker attacks. For more information, make sure you are connected to theInternet and then click Tell Me More About Anti-Hacker Solutions.PS_PRODUCT_MPS_OUT_OF_DATECategory: Anti-AbuseDisplay this in place of any PS_* strings (exceptPS_PRODUCT_UP_TO_DATE)We display this for MPS, since all the other PS_* strings push MPS forits “always up-to-date” aspect. Instead, if MPS is not up-to-date, wedisplay this “nicer” message.Description:Old version of anti-abuse software detected.Details:The anti-abuse software you have, McAfee.com Privacy Service, is notup-to-date. If you are a subscriber to McAfee.com Privacy Service, youare entitled to the latest version. Dishonest Web sites are continuouslydevising new ways of obtaining your confidential information from yourcomputer. It is extremely important that you get the latest version toprotect you from the latest privacy abuses.Recommendation:Click on the ‘Updates’ button at the top of the McAfee.comSecurityCenter to update McAfee.com Privacy Service to the latestversion. If you don't have a subscription to McAfee.com Privacy Service,connect to the Internet and then click on Tell Me More About Anti-AbuseSolutions.PS_PRODUCT_UP_TO_DATECategory: Anti-Abuse% s1—Name of anti-abuse product (ex. “Norton Internet Security Suite”)Display this message if there are no PS_* messages to display.Description:Your anti-abuse software is up-to-date.Details:You have the latest version of your anti-abuse software, % s1. Yourcomputer is well-protected against the latest privacy abuses.Recommendation:New privacy abuses are occurring often. That's the reason why it isextremely important for you to always have the latest version of youranti-abuse software. Make sure you continue to keep your anti-abusesoftware up-to-date.PS_PRODUCT_NONECategory: Anti-AbuseNo variablesDescription:No anti-abuse software is installed on your computer.Details:Your confidential information is not protected from dishonest Web sites.When you visit a Web site, it is possible for that Web site to obtainyour personal information from your computer. You are extremelyvulnerable of having your confidential information obtained by adishonest Web site.Recommendation:It is highly recommended that you get an anti-abuse solution. The besttype of anti-abuse solution is one which is “always up-to-date”.McAfee.com Privacy Service, the #1 anti-abuse solution of this type,ensures that you are always up-to-date, protecting you from the latestprivacy abuses. For more information, make sure you are connected to theInternet and then click Tell Me More About Anti-Abuse Solutions.PS_PRODUCT_TWO_YEARS_OLDCategory: Anti-Abuse% s1—name of anti-abuse product (ex. “Norton Internet Security Suite”)% d2—Number of years old this product is ((current date−productdate)/365). This will always be 2 or more years.Description:Old obsolete anti-abuse software detected.Details:The anti-abuse software you have, % s1, is over % d2 years old. Sincethen, there have been many new privacy abuses. Your anti-abuse softwarewill not protect you from the privacy abuses that have been created inthe last % d2 years. You are extremely vulnerable of having yourconfidential information obtained by a dishonest Web site.Recommendation:It is highly recommended that you either purchase a new version of youranti-abuse software or you get an “always up-to-date” anti-abusesolution, like McAfee.com Privacy Service, the #1 anti-abuse product ofthis type. If you have McAfee.com Privacy Service, your anti-abusesoftware will always be up-to-date, thus protecting you from the latestprivacy abuses. For more information, make sure you are connected to theInternet and then click Tell Me More About Anti-Abuse Solutions.PS_PRODUCT_OLD_MAJORCategory: Anti-Abuse% s1—name of anti-abuse product (ex. “Norton Internet Security Suite”)% s2—Version number. Only display major/minor (“6.3”, “7.0”)% s3—Latest version number. Only display major/minor (“6.3”, “7.0”)Description:Old version of anti-abuse software detected.Details:The anti-abuse software you have, % s1, is version % s2. The latestversion of this product is version % s3. The version you have isobsolete and is not protecting you from the latest privacy abuses. Youare extremely vulnerable of having your confidential informationobtained by a dishonest Web site.Recommendation:It is highly recommended that you either purchase a new version of youranti-abuse software or you get an “always up-to-date” anti-abusesolution, like McAfee.com Privacy Service, the #1 anti-abuse product ofthis type. If you have McAfee.com Privacy Service, your anti-abusesoftware will always be up-to-date, thus protecting you from the latestprivacy abuses. For more information, make sure you are connected to theInternet and then click Tell Me More About Anti-Abuse Solutions.PS_PRODUCT_OLD_MINORCategory: Anti-Abuse% s1—name of anti-abuse product (ex. “Norton Internet Security Suite”)% s2—Version number. Only display major/minor (“6.3”, “6.5”)% s3—Latest version number. Only display major/minor (“6.3”, “6.5”)Description:Old version of anti-abuse software detected.Details:The anti-abuse software you have, % s1, is version % s2. The latestversion of this product is version % s3. The version you have does notaddress a number of bug fixes and other problems that were addressed inversion % s3. Because you don't have this latest version, your computermay be exposed to the latest privacy abuses.Recommendation:It is highly recommended that you either contact your anti-abusesoftware vendor and ask to have the latest version or get an anti-abusesolution where you will always have the latest version. By having thelatest version, you will always be protected from the latest privacyabuses. McAfee.com Privacy Service, the #1 “always up-to-date”anti-abuse solution, ensures that you are protected from the latestprivacy abuses. For more information, make sure you are connected to theInternet and then click Tell Me More About Anti-Abuse Solutions.PS_PRODUCT_OLD_REVISIONCategory: Anti-Abuse% s1—name of anti-abuse product (ex. “Norton Internet Security Suite”)% s2—Version number. Only display major/minor/revision (“6.3.2”,“6.3.12”)% s3—Latest version number. Only display major/minor/revision (“6.3.2”,“6.3.12”)Description:Old version of anti-abuse software detected.Details:The anti-abuse software you have, % s1, is version % s2. The latestversion of this product is version % s3. The version you have does notaddress a number of bug fixes and other problems that were addressed inversion % s3. Because you don't have this latest version, your computermay be exposed to the latest privacy abuses.Recommendation:It is highly recommended that you either contact your anti-abusesoftware vendor and ask to have the latest version or get an anti-abusesolution where you will always have the latest version. By having thelatest version, you will always be protected from the latest privacyabuses. McAfee.com Privacy Service, the #1 “always up-to-date”anti-abuse solution, ensures that you are protected from the latestprivacy abuses. For more information, make sure you are connected to theInternet and then click Tell Me More About Anti-Abuse Solutions.

What is claimed is:
 1. A method for displaying a status of a securityapplication, comprising: identifying, utilizing a processor, a status ofat least one security application; calculating an index representativeof a degree of risk associated with the status of the at least onesecurity application; and displaying the index wherein the indexreflects a version of the at least one security application.
 2. Themethod as recited in claim 1, wherein the index includes a numberbetween one (1) and ten (10).
 3. The method as recited in claim 1,wherein a plurality of indices are each calculated for one of aplurality of security applications.
 4. The method as recited in claim 3,wherein the security applications include security applications selectedfrom the group consisting of an anti-virus security application, afirewall security application, a privacy service security application,and an anti-spam security application.
 5. The method as recited in claim1, wherein the at least one or more security applications comprises ananti-virus security application.
 6. The method as recited in claim 5,wherein the index reflects a signature file of the anti-virus securityapplication.
 7. The method as recited in claim 5, wherein the index iscalculated using a weighted average of a plurality of aspects of theanti-virus security application selected from the group consisting of asignature file of the anti-virus security application and a version ofthe anti-virus security application.
 8. The method as recited in claim1, wherein the at least one or more security applications comprises afirewall security application.
 9. The method as recited in claim 1,wherein the at least one or more security applications comprises aprivacy service security application.
 10. The method as recited in claim1, further comprising: calculating an overall index representative of adegree of risk associated with the status of a plurality of securityapplications; and displaying the overall index.
 11. The method asrecited in claim 10, wherein the overall index is calculated using aweighted average of a plurality of separate indices associated with eachof the security applications.
 12. The method as recited in claim 10,wherein the index is displayed numerically.
 13. The method as recited inclaim 10, wherein the index is displayed graphically.
 14. The method asrecited in claim 13, wherein the index is displayed utilizing abar-graph.
 15. The method as recited in claim 10, wherein the index isdisplayed utilizing a color coding.
 16. The method as recited in claim15, wherein the color coding correlates with the degree of riskassociated with the status.
 17. The method as recited in claim 1,wherein the index is displayed numerically.
 18. The method as recited inclaim 1, wherein the index is displayed graphically.
 19. The method asrecited in claim 18, wherein the index is displayed utilizing abar-graph.
 20. The method as recited in claim 1, wherein the index isdisplayed utilizing a color coding.
 21. The method as recited in claim20, wherein the color coding correlates with the degree of riskassociated with the status.
 22. The method as recited in claim 1, andfurther comprising displaying additional information relating to thestatus upon the selection of the displayed index.
 23. The method asrecited in claim 22, wherein the additional information includes a linkcapable of being selected by a user.
 24. The method as recited in claim23, and further comprising taking an action to decrease the degree ofrisk associated with the status, in response to the selection of thelink by the user.
 25. The method of claim 24, wherein the action todecrease the degree of risk associated with the status includesdownloading a more recent version or an update of the at least onesecurity application.
 26. The method of claim 1, wherein the index isdisplayed with a plurality of selection icons for allowing access to aplurality of windows associated with each of the at least one securityapplication.
 27. A computer program product embodied on a non-transitorycomputer readable medium for displaying a status of a securityapplication, comprising: computer code for identifying a status of atleast one security application; computer code for calculating an indexrepresentative of a degree of risk associated with the status of the atleast one security application; and computer code for displaying theindex wherein the index reflects a version of the at least one securityapplication.
 28. A system for displaying a status of a securityapplication, comprising: a means for identifying a status of at leastone security application, a means for calculating an indexrepresentative of a degree of risk associated with the status of the atleast one security application, and a means for displaying the indexwherein the index reflects a version of the at least one securityapplication.
 29. A system for displaying a status of a securityapplication, comprising: computer code for identifying a status of atleast one security application and calculating an index representativeof a degree of risk associated with the status of the at least onesecurity application; and a graphical user interface in communicationwith the computer code for displaying the index wherein the indexreflects a version of the at least one security application.
 30. Amethod, comprising: determining, utilizing a processor, a degree of riskassociated with a plurality of security aspects associated with acomputing environment of a computer; visually displaying the degree ofrisk associated with the security aspects utilizing a plurality ofvisual indicators wherein the degree of risk reflects a version of atleast one security application providing at least a portion of theplurality of security aspects; and displaying additional informationrelating to the degree of risk associated with the security aspects upona selection of the visual indicators.
 31. A method, comprising:identifying, utilizing a processor, a status of a plurality of securityapplications; calculating an individual index representative of a degreeof risk associated with the status of each of the security applications,wherein each individual index is calculated using a plurality of aspectsof the status of the security applications wherein the degree of riskreflects a version of at least one of the plurality of securityapplications; calculating an overall index representative of a degree ofrisk associated with a collective status of the security applications,the calculating of the overall index including a weighted average of theindividual indices associated with each of the security applications;and displaying each individual index and the overall index.
 32. A methodfor displaying a status of a security application, comprising:identifying, utilizing a processor, a status of a security application;representing the status of the security application in the form of acolored indicator; and displaying the colored indicator, wherein a colorof the colored indicator includes red to indicate that the securityapplication is at least one of not installed, disabled, and expired. 33.A method for displaying a status of a security application, comprising:identifying, utilizing a processor, a status of a security application;representing the status of the security application in the form of acolored indicator; and displaying the colored indicator, wherein a colorof the colored indicator includes green to indicate that the securityapplication is at least one of installed and running.