Computer-implemented methods, apparati, and computer-readable media for
thwarting computer attacks. A method embodiment of the present invention
comprises the steps of examining (52) a digital certificate (20)
presented by a server computer (2); compiling (53) a set of suspicion
indications (31) gleaned from said examining step (52); and feeding (54)
said suspicion indications (31) to a consequence engine (30).