. . . . "In a variation of this method, the system monitors and eliminates certain types of computer files and information, such as for example known computer ???viruses???, from being communicated to or from the client computer." .