Claims
- 1. A method for operating a network server to discourage inappropriate use of server memory, wherein the server is connected to a plurality of public clients and is operable to transfer public files between a memory of the server and selected ones of the plurality of clients, wherein the public files comprise files of an appropriate type for which storage in the memory is to be encouraged, and files of an inappropriate type for which storage in the memory is to be discouraged, the method comprising the steps of:
selecting a file from the public files; selecting at least one bit of information in the file; and altering the at least one bit of information to create an altered file, wherein the altered file is corrupted if the file is an inappropriate type of file, and is not corrupted if the file is an appropriate type of file.
- 2. The method of claim 1, further comprising storing the altered file in the memory.
- 3. The method of claim 1, further comprising storing both the file and the altered file in the memory.
- 4. The method of claim 1, further comprising serving the altered file in response to a request from one of the plurality of clients.
- 5. The method of claim 1, further comprising marking the altered file with a flag indicating that the file has been altered.
- 6. The method of claim 1, further comprising inserting identifying information into the altered file.
- 7. The method of claim 1, wherein said first selecting step further comprises selecting the file without determining whether the file is an appropriate type of file or an inappropriate type of file.
- 8. The method of claim 1, wherein said first selecting step further comprises selecting the file from files having more than a specified number of bytes.
- 9. The method of claim 1, wherein said first selecting step further comprises selecting the file after reading at least a portion of the file and thereby determining that the file is likely to be of the inappropriate type.
- 10. The method of claim 1, wherein said first selecting step further comprises selecting the file after determining that the file is free of any flag indicating that the file has been altered.
- 11. The method of claim 1, wherein said first selecting step further comprises selecting the file comprised of a plurality of compressed files, and wherein said second selecting step further comprises selecting the at least one bit of information comprising a bit from each of the plurality of compressed files.
- 12. The method of claim 1, wherein said second selecting step further comprises selecting the at least one bit of information a specified number of bytes after a first byte of the file.
- 13. The method of claim 1, wherein said second selecting step further comprises selecting the at least one bit of information at least ten kilobytes after a first byte of the file.
- 14. The method of claim 1, wherein said second selecting step further comprises selecting the at least one bit of information by selecting a bit at random from the file.
- 15. The method of claim 1, wherein said second selecting step further comprises selecting the at least one bit of information within a byte for which there is at least one byte synonym in the codes of the appropriate type of file, and wherein said altering step further comprises altering the at least one bit of information so that the byte is transformed into the at least one byte synonym.
- 16. The method of claim 1, wherein said second selecting step further comprises selecting the at least one bit of information within at least one non-text byte of the file.
- 17. A system to discourage inappropriate use of memory controlled by a server, wherein the server is operable to store public files in the memory, wherein the public files comprise files of an appropriate type for which storage in the memory is to be encouraged, and files of an inappropriate type for which storage in the memory is to be discouraged, the system comprising:
a network server connected to a network; a memory controlled by said network server; and an application in the memory, the application operable to execute on the network server to provide the functions of:
selecting a file from the public files; selecting at least one bit of information in the file; and altering the at least one bit of information to create an altered file, wherein the altered file is corrupted only if the file is an inappropriate type of file.
- 18. The system of claim 17, wherein the application is further configured to perform the function of marking the altered file with a flag indicating that the file has been altered.
- 19. The system of claim 17, wherein the application is further configured to perform the function of inserting identifying information into the altered file.
- 20. The system of claim 17, wherein the second selecting function of said application further comprises selecting the at least one bit of information a specified number of bytes after a first byte of the file.
CROSS-REFERENCE TO RELATED APPLICATION
[0001] This application claims priority pursuant to 35 U.S.C. § 119(e) to U.S. Provisional Application No. 60/204,994, filed May 16, 2000, which application is specifically incorporated herein, in its entirety, by reference.
Provisional Applications (1)
|
Number |
Date |
Country |
|
60204994 |
May 2000 |
US |