John H McDonald
Radiology at Longchamp Dr, Jacksonville, FL

License number
Florida 11096
Effective Date
Jun 19, 1992
Expiration Date
Dec 31, 1982
Category
Health Care
Type
Radiologic Technology
Address
Address
6211 Longchamp Dr #D, Jacksonville, FL 32244

Personal information

See more information about John H McDonald at radaris.com
Name
Address
Phone
John Mcdonald
502 E Kaley St, Orlando, FL 32806
John Mcdonald, age 43
5010 Fleetwood Pl, Cocoa, FL 32926
John Mcdonald
5018 Alamanda Dr, Melbourne, FL 32940
John Mcdonald
501 N Miramar Ave, Indialantic, FL 32903
(321) 288-5296
John Mcdonald, age 62
501 S Bridge Creek Dr, Saint Johns, FL 32259

Professional information

See more information about John H McDonald at trustoria.com
John Mcdonald Photo 1
Director At Azimuth Security

Director At Azimuth Security

Position:
Director at Azimuth Security
Location:
Jacksonville, Florida Area
Industry:
Computer & Network Security
Work:
Azimuth Security - Jacksonville Beach, FL since May 2010 - Director IBM 2007 - Jun 2011 - Senior Security Researcher Neohapsis 2002 - 2007 - Senior Security Consultant McAfee 2000 - 2002 - Vulnerability Research Engineer data protect GmbH 1999 - 2000 - Security Consultant Citibank 1998 - 2000 - Security Architect
Education:
University of North Florida 1996 - 2002
B.Sc., Computer Science
Skills:
Information Security, Penetration Testing, Reverse Engineering, Vulnerability Research, Exploit Development, Code Review, Application Security, Computer Security, Network Security, Vulnerability Assessment, Malware Analysis, Security Research, Security


John Douglas Mcdonald Photo 2
John Douglas McDonald, Jacksonville FL

John Douglas McDonald, Jacksonville FL

Specialties:
Internist
Address:
4500 San Pablo Rd S, Jacksonville, FL 32224
Education:
University of Colorado, School of Medicine (Denver) - Doctor of Medicine
Board certifications:
American Board of Family Medicine Certification in Family Medicine, American Board of Family Medicine Sub-certificate in Sports Medicine (Family Medicine)


John D Mcdonald Photo 3
Dr. John D Mcdonald, Jacksonville FL - MD (Doctor of Medicine)

Dr. John D Mcdonald, Jacksonville FL - MD (Doctor of Medicine)

Specialties:
Anesthesiology
Address:
4500 San Pablo Rd S, Jacksonville 32224
(904) 953-2000 (Phone), (904) 953-0885 (Fax)
Languages:
English
Hospitals:
4500 San Pablo Rd S, Jacksonville 32224
Mayo Clinic
4500 San Pablo Rd, Jacksonville 32224
Education:
Medical School
University of South Carolina At Columbia
Graduated: 2011


John Mcdonald Photo 4
Secure Gateway For Analyzing Textual Content To Identify A Harmful Impact On Computer Systems With Known Vulnerabilities

Secure Gateway For Analyzing Textual Content To Identify A Harmful Impact On Computer Systems With Known Vulnerabilities

US Patent:
6513122, Jan 28, 2003
Filed:
Jun 29, 2001
Appl. No.:
09/895500
Inventors:
James S. Magdych - Chino CA
Tarik Rahmanovic - Germantown MD
John R. McDonald - Jacksonville FL
Brock E. Tellier - Stamford CT
Anthony C. Osborne - Sydney, AU
Nishad P. Herath - Sydney, AU
Assignee:
Networks Associates Technology, Inc. - Santa Clara CA
International Classification:
H04L 900
US Classification:
713201, 713200, 713188
Abstract:
A system, method and computer program product are provided for detecting attacks on a network. Initially, data is received from a remote source which is destined for a target. A portion of such data is then discarded based on a predetermined set of rules utilizing a firewall which is coupled to the remote source. Remaining data is subsequently passed to an intrusion detection system coupled between the firewall and the target. Such data is parsed to identify data representing text (i. e. ASCII or UNICODE text) therein utilizing the intrusion detection system. Thereafter, the data representing text- is compared to a predetermined list of data representing text-associated with attacks utilizing the intrusion detection system. Based on the comparison, some of the data representing text are marked as hostile. The data representing text-that are marked as hostile are then acted upon in order to prevent an attack.


John Mcdonald Photo 5
System, Method And Computer Program Product For Improved Efficiency In Network Assessment Utilizing Variable Timeout Values

System, Method And Computer Program Product For Improved Efficiency In Network Assessment Utilizing Variable Timeout Values

US Patent:
7124181, Oct 17, 2006
Filed:
Jun 29, 2001
Appl. No.:
09/895536
Inventors:
James S. Magdych - Chino CA, US
Tarik Rahmanovic - Germantown MD, US
John R. McDonald - Jacksonville FL, US
Brock E. Tellier - Stamford CT, US
Anthony C. Osborne - Sydney, AU
Nishad P. Herath - Sydney, AU
Assignee:
McAfee, Inc. - Santa Clara CA
International Classification:
G06F 15/16
US Classification:
709224, 726 25
Abstract:
A system, method and computer program product are provided for executing a risk-assessment scan with a variable timeout duration which is set based on network conditions. Initially, network conditions are measured in a network coupled between a source and a target. Subsequently, a risk-assessment scan is executed on the target from the source. A timeout is performed prior to making a determination that the target is failing to respond to the risk-assessment scan. Such timeout includes a variable duration which is set as a function of the measured network conditions.


John Mcdonald Photo 6
System, Method And Computer Program Product For Improved Efficiency In Network Assessment Utilizing A Port Status Pre-Qualification Procedure

System, Method And Computer Program Product For Improved Efficiency In Network Assessment Utilizing A Port Status Pre-Qualification Procedure

US Patent:
7003561, Feb 21, 2006
Filed:
Jun 29, 2001
Appl. No.:
09/895535
Inventors:
James S. Magdych - Chino CA, US
Tarik Rahmanovic - Germantown MD, US
John R. McDonald - Jacksonville FL, US
Brock E. Tellier - Stamford CT, US
Anthony C. Osborne - Sydney, AU
Nishad P. Herath - Sydney, AU
Assignee:
McAfee, Inc. - Santa Clara CA
International Classification:
G06F 15/16
US Classification:
709223, 726 22, 726 25
Abstract:
A system, method and computer program product are provided for minimizing the duration of a risk-assessment scan. Initially, a plurality of risk-assessment modules are selected each including vulnerability checks associated with a risk-assessment scan. Thereafter, a first set of ports is determined. Such first set of ports is required for communicating with network components subject to the risk-assessment modules associated with the risk-assessment scan. A port scan is subsequently executed on the first set of ports. Based on such port scan, a second set of ports is determined which includes ports unavailable for communicating with the network components subject to the risk-assessment modules associated with the risk-assessment scan. The risk-assessment modules associated with the second set of ports may then be disabled to minimize the duration of the risk-assessment scan.


John Mcdonald Photo 7
System, Method And Computer Program Product For Improving Computer Network Intrusion Detection By Risk Prioritization

System, Method And Computer Program Product For Improving Computer Network Intrusion Detection By Risk Prioritization

US Patent:
8266703, Sep 11, 2012
Filed:
Sep 12, 2007
Appl. No.:
11/854412
Inventors:
James S. Magdych - Chino CA, US
Tarik Rahmanovic - Germantown MD, US
John R. McDonald - Jacksonville FL, US
Brock E. Tellier - Stamford CT, US
Assignee:
McAfee, Inc. - Santa Clara CA
International Classification:
G06F 12/14
US Classification:
726 25
Abstract:
A system, method and computer program product are provided for prioritized network security. Initially, a risk assessment scan is conducted for identifying vulnerabilities on a network device. Next, network communications are identified that exploit the vulnerabilities identified by the risk assessment scan before identifying network communications that exploit other vulnerabilities. In other words, network communications are monitored for identifying any exploitation of the vulnerabilities identified by the risk assessment scan before identifying any exploitation of other vulnerabilities.


John Mcdonald Photo 8
Network-Based Risk-Assessment Tool For Remotely Detecting Local Computer Vulnerabilities

Network-Based Risk-Assessment Tool For Remotely Detecting Local Computer Vulnerabilities

US Patent:
7096503, Aug 22, 2006
Filed:
Jun 29, 2001
Appl. No.:
09/895508
Inventors:
James S. Magdych - Chino CA, US
Tarik Rahmanovic - Germantown MD, US
John R. McDonald - Jacksonville FL, US
Brock E. Tellier - Stamford CT, US
Anthony C. Osborne - Sydney, AU
Nishad P. Herath - Sydney, AU
Assignee:
McAfee, Inc. - Santa Clara CA
International Classification:
G06F 11/36
US Classification:
726 25, 726 22, 713189, 713194
Abstract:
A system, method and computer program product are provided for remotely detecting vulnerabilities on a local computer. Initially, an agent is installed on a local computer for receiving encrypted commands from a remote computer utilizing a network. Next, the commands are decrypted and processed on the local computer utilizing the agent. A risk-assessment scan is then performed on the local computer utilizing the agent in accordance with the processed commands for the purpose of remotely detecting local vulnerabilities on the local computer.


John Mcdonald Photo 9
Network-Based Risk-Assessment Tool For Remotely Detecting Local Computer Vulnerabilities

Network-Based Risk-Assessment Tool For Remotely Detecting Local Computer Vulnerabilities

US Patent:
7549168, Jun 16, 2009
Filed:
Jun 29, 2006
Appl. No.:
11/477888
Inventors:
James S. Magdych - Chino CA, US
Tarik Rahmanovic - Germantown MD, US
John R. McDonald - Jacksonville FL, US
Brock E. Tellier - Stamford CT, US
Anthony C. Osborne - Sydney, AU
Nishad P. Herath - Syndey, AU
Assignee:
McAfee, Inc. - Santa Clara CA
International Classification:
G06F 11/00
US Classification:
726 25, 726 22
Abstract:
A system, method and computer program product are provided. Commands are received for executing a risk-assessment scan from a remote computer utilizing a network. The commands are processed on a local computer utilizing an agent. Further, the risk-assessment scan is performed on the local computer in accordance with the processed commands to remotely detect local vulnerabilities on the local computer. Such agent includes a plurality of risk-assessment modules. Further, the commands execute the risk-assessment modules in a specific manner that is configured at the remote computer.


John Mcdonald Photo 10
Intrusion Detection And Vulnerability Assessment System, Method And Computer Program Product

Intrusion Detection And Vulnerability Assessment System, Method And Computer Program Product

US Patent:
7779468, Aug 17, 2010
Filed:
Sep 14, 2007
Appl. No.:
11/855949
Inventors:
James S. Magdych - Chino CA, US
Tarik Rahmanovic - Germantown MD, US
John R. McDonald - Jacksonville FL, US
Brock E. Tellier - Stamford CT, US
Assignee:
McAfee, Inc. - Santa Clara CA
International Classification:
G06F 11/00, G08B 23/00, G06F 15/173
US Classification:
726 22, 726 23, 726 24, 726 25, 713 1, 709223, 709224
Abstract:
A system and associated method/computer program product are provided including an intrusion detection tool for determining whether network communications violate at least one of a plurality of policies. Such policies are defined to detect potential attacks in the network communications. Further included is a vulnerability assessment scanning tool coupled to the intrusion detection tool. The vulnerability assessment scanning tool is adapted for performing a vulnerability assessment scan for identifying vulnerabilities.