9 Computer software to detect and eliminate software based attacks from any network external to the protected network and to manage, scan, report and alert users of those events in real-time. Software may be downloaded from a global computer network.