Trending Sources

Plans are nothing, but planning is indispensable

Chris Dixon

At the core of the product will be a database that classifies URLs, IP addresses, program downloads, ActiveX objects, and other “web entities” according to their degree of trustworthiness. IP intelligence services, phishing blacklist feeds, website and program popularity data).