1460711026-056d4f7b-379d-4846-bfeb-067186fb768a

1. A tube straightening process using a roll straightening machine in which drum type straightening roll pairs are disposed, the rolls of each pair being vertically opposed to each other, in a manner such that directions of rotating axes of rolls in each pair are horizontally oppositely diverted so as to horizontally cross, wherein:
in at least three pairs of straightening rolls on an outlet-side of the roll straightening machine, at least an outer layer portion of a roll main body is made of elastic material having spring type hardness Hs (JIS K 6301 A type) of 50 to 100, and
an offset amount is imparted to a tube engaged in the three pairs, at least, of straightening opposing rolls on the outlet side such that \u03b7 defined by the following equation (1) ranges from 1.0\xd710\u22123 to 1.5\xd710\u22123, the offset amount being set at three positions tube axis where the upper and lower rolls of each pair horizontally cross
Formula
\u2062
\u2062
1
\u03b7
=
1
R

\xd7

(

d
2

)
(
1
)
where a relationship of R=(\u03b42+L2)2\u03b4 holds, given that d (mm) is a tube outside diameter, L (mm) is a roll stand span of the roll straightening machine, and \u03b4 (mm) is an offset amount.
The claims below are in addition to those above.
All refrences to claim(s) which appear below refer to the numbering after this setence.

1. A method comprising:
stalling a request on a host computer system prior to sending the request to a target computer system;
determining whether the request is suspicious;
wherein upon a determination that the request is not suspicious, releasing the request; and
wherein upon a determination that the request is suspicious, adding a request entry to a request database, the request entry identifying the request,
generating a counter value associated with the request entry,
determining whether the counter value meets a counter value threshold, and
wherein upon a determination that the counter value meets the counter value threshold, determining that malicious code activity is detected.
2. The method of claim 1, further comprising:
wherein upon a determination that malicious code activity is detected, generating a notification that malicious code activity is detected; and
implementing one or more protective actions.
3. A method comprising:
intercepting a request on a host computer system;
stalling the request;
determining whether the request is suspicious,
wherein upon a determination that the request is suspicious, adding a request entry representative of the request to a request database, and
determining whether malicious code activity is detected on the host computer system based upon the request entry; and
wherein upon a determination that malicious code activity is detected on the host computer system, generating a notification that malicious code activity is detected on the host computer system, and
implementing one or more protective actions.
4. The method of claim 3, further comprising:
wherein upon a determination that the request is not suspicious, releasing the request.
5. The method of claim 3, further comprising:
wherein upon a determination that malicious code activity is not detected on the host computer system, releasing the request.
6. The method of claim 3, wherein the implementing one or more protective actions comprises:
terminating the request.
7. The method of claim 3, wherein the request is an HTTP GET request.
8. The method of claim 3, wherein the intercepting a request on a host computer system utilizes a local proxy mechanism.
9. The method of claim 3, wherein the intercepting a request on a host computer system occurs at the application level.
10. A method comprising:
intercepting a request on a host computer system;
stalling the request; and
determining whether the request is suspicious,
wherein upon a determination that the request is suspicious, adding a request entry representative of the request to a request database, and
determining whether malicious code activity is detected on the host computer system based upon the request entry,
wherein the determining whether malicious code activity is detected on the host computer system based upon the request entry further comprises:
generating a counter value associated with the request entry; and
determining whether the counter value meets a counter value threshold,
wherein upon a determination that the counter value does not meet the counter value threshold, determining that malicious code activity is not detected on the host computer system, and
wherein upon a determination that the counter value meets the counter value threshold, determining that malicious code activity is detected on the host computer system.
11. A malicious code detection device comprising:
an intercept module, the intercept module for intercepting a request issuing on a host computer system prior to the sending of the request from the host computer system to a target computer system;
an analyzer module coupled to the intercept module, the analyzer module for determining whether the request is suspicious utilizing at least a standards list, the analyzer module further for adding a request entry corresponding to the request to a request database when the request is determined as suspicious, the analyzer module further for determining whether malicious activity is detected on the host computer system based on whether a counter value associated with a request entry meets a counter value threshold;
a request database coupled to the analyzer module, the request database including one or more request entries, each of the one or more request entries identifying a request determined to be suspicious; and
a standards list coupled to the analyzer module, the standards list including selected standards for use in determining whether the request is suspicious.
12. The malicious code detection device of claim 11, further comprising:
an inclusion profile list coupled to the analyzer module.
13. The malicious code detection device of claim 11, further comprising:
an exclusion profile list coupled to the analyzer module.
14. The malicious code detection device of claim 11, further comprising a memory area coupled to the intercept module and the analyzer module.
15. The malicious code detection device of claim 11, wherein the intercept module includes an interception mechanism for intercepting a request.
16. A computer program product comprising a computer-readable medium storing computer program code for a method comprising:
stalling a request on a host computer system prior to sending the request to a target computer system;
determining whether the request is suspicious;
wherein upon a determination that the request is not suspicious, releasing the request; and
wherein upon a de termination that the request is suspicious, adding a request entry to a request database, the request entry identifying the request,
generating a counter value associated with the request entry,
determining whether the counter value meets a counter value threshold, and
wherein upon a determination that the counter value meets the counter value threshold, determining that malicious code activity is detected.
17. The computer program product of claim 16, the method further comprising:
wherein upon a determination that malicious code activity is detected, generating a notification that malicious code activity is detected; and
implementing one or more protective actions.
18. A computer program product comprising a computer-readable medium storing computer program code for a method comprising:
intercepting a request on a host computer system;
stalling the request;
determining whether the request is suspicious,
wherein upon a determination that the request is suspicious, adding a request entry representative of the request to a request database, and
determining whether malicious code activity is detected on the host computer system based upon the request entry; and
wherein upon a determination that malicious code activity is detected on the host computer system, generating a notification that malicious code activity is detected on the host computer system, and
implementing one or more protective actions.