EP0850441: METHOD OF MONITORING A COMPUTER SYSTEM (DANIELSSON DANIEL (SE); BJOERCK BERTIL (SE)) http://swpat.ffii.org/patents/txt/ep/0850/441/ Claims: 1. Surveillance system of several computers (clients) in a network, monitored by a server 2. Monitoring of a network connection 3. Monitoring of components of the client (memory, HD, CDROM, ...) 4. Application in coaxial or twisted pair networks 5. Application in optical fibre networks 6. Application in IEEE 802.3/4/5 networks 7. Peripheral equipment monitoring itself, evaluation inside the server 8. Application of 7. with fax devices 9. Application of 7. with copiers 10. Application of 7. with surveillance equipment 11. Application with peripheral equipment with separate power source 12. Telephone call on alarm 13. Program execution on alarm Violation programm, UNIX shell script (CAUTION: PLEASE DO NOT EXECUTE!): #!/bin/sh while ping -c 1 $1; do sleep 1 done echo "Alarm." This program violates the first claim pinging the specified host (first command line parameter), until this client doesn't answer. In this case, an alarm will be triggerd (in the example the printout of "Alarm."). This also works for several clients with executing multiple instances of the program in parallel. Because of the usage of a network connection, also claim 2 is violated. Claims 4 to 6 are violated automatically when using appropriate (standard) hardware. Claim 11 would be violated when using separate power sources for the different devices, e.g. UPS. For claim 13, simply replace the last line in the specified program with an arbitrary UNIX or shell command. Especially a telephone call (claim 12) may be issued with "ant-phone -c " (see http://www.antcom.de/) or another telephony application of your choice. -> altogether: 8 claims violated Roland Stigge