Intel® Developer Zone:
Sicurezza e crittografia

AES New Instructions

Generatore digitale di numeri casuali

Estensioni dei set di istruzioni dell'architettura Intel

Developing secured embedded applications using Intel® System Studio
By sukruth-v (Intel)Posted 02/12/20130
Intended audience: - This article speaks about using the Static Analysis feature to avoid minor errors which may lead to security vulnerabilities. Purpose: - Embedded applications have a wide scope in various streams like Military, Aerospace and many more, where security is at most importance. S...
Intel® Trusted Execution Technology (Intel® TXT) BIOS Enabling On Dell Servers Using Automation
By David Mulnix (Intel)Posted 12/18/20120
When one wishes to deploy Intel TXT in a cloud environment across a broad volume of systems the first requirement is enabling the technology within the BIOS on those systems.  This article describes a methodology that will allow one to automate this process on Dell servers using Lifecycle Control...
Intel EAPF Curriculum Lightning Round - SIGCSE 2013
By Paul Steinberg (Intel)Posted 12/15/20121
  Contribute to the Intel® AcademicProgram & EAPF Curriculum Lightning Round at SIGCSE 2013. Now is the chance to let your voice be heard.  We are accepting applications to particapte in the next EAPF/Intel Curriculum Lightning Round.  This is a great way to swap ideas with your peers and...
Pointer Checker feature in Intel® Parallel Studio XE 2013: How is it different from Static Analysis, Intel® Inspector XE, Mudflap etc?
By Kittur Ganesh (Intel)Posted 09/04/20120
The Pointer Checker is a key "new" feature of the Intel® Parallel Studio XE 2013 product release compared to Static Security Analysis (SSA), Mudflap or the Intel® Inspector XE product. In a nutshell, the scope of Pointer Checker is in the detection of out-of-bounds pointer accesses including dang...


Iscriversi a
Nessun contenuto trovato
Iscriversi a Blog Intel® Developer Zone
Nessun contenuto trovato
Iscriversi a Forum
Nessun contenuto trovato
Iscriversi a Video

Tecnologia Intel® Virtualization

On-Demand Webcasts
By Posted 01/12/20120
Service Oriented Enterprise: An Architect's ViewThis presentation introduces some of the emergent technologies and architecture such as SOA, Grid, and Virtualization under the umbrella of Service Oriented Enterprise (SOE). Topics covered include the Service Oriented Enterprise Framework and its c...
How to Take Advantage of the Virtualization `Appliance' Model in the Digital Home
By Posted 09/15/20110
Challenge Benefit from the emerging ‘appliance’ model in Digital Home virtualization. An exciting usage model for Intel® Virtualization Technology on desktops and laptops is to create appliances. With Intel Virtualization Technology, one can take the functions of a stand-alone firewall applianc...
Expand Digital Home Functionality with VT
By Posted 09/15/20110
Challenge Use Intel® Virtualization Technology in conjunction with other technologies to improve the Digital Home experience. The advent of Intel Virtualization Technology corresponds to another, even more significant hardware transition: multi-core processing. These two technologies complement...
Digital Home Security with VT
By Posted 09/15/20110
Challenge Improve security in the Digital Home by means of virtualization. As powerful entertainment PCs take over more functionality in the Digital Home, it will become more important than ever to secure these platforms. This necessity is even more pronounced in those cases where the same PC b...


Iscriversi a
Nessun contenuto trovato
Iscriversi a Blog Intel® Developer Zone
Handling VMExit reason 3 (INIT signal received)
By Yogi D.1
Hi.  I am writing a small OS-agnostic hypervisor as a teaching tool for my students.  The hypervisor code is loaded by the code I embed in a custom MBR on the boot device when the system boots.  The hypervisor code switches to 32-bit proected mode and then IA32e (64-bit mode).  It then sets up the hypevisor, EPT to protect the hypervisor from the guests, and launches a 16-bit "unrestricted" big real-mode (or unreal mode) guest.  All this is working perfectly.  The guest can make BIOS calls.  The hypervisor writes directly to the video buffer in order to provide debugging/status info.  The hypervisor is setup to VMexit minimally (e.g., I/O, APIC, MSRs, etc. are not monitored -- yet).  When the real-mode guest causes EPT violations, issues CPUID, etc. these cause VMExits as expected and the hypervisor handles them and resumes the guests. When the 16-bit guest issues an INIT IPI to itself using the APIC, I run into an infinite VMExit situation that my hypervisor cannot seem to recover ...
Forever Body Transformation Reviews Released by Tyler Tsujimoto and Candice Sadler
By Tyler T.0
There is additionally an e-book which food the entirety Forever Body Transformation review, and with the aim of indicates you will certainly recognize I beg your pardon? To expect and exactly how to stipulate your very own goals. Using their Forever Body Transformation Plan, they will expound recently I beg your pardon? Dishes is really Pro-FBT and specifically I beg your pardon? Foods are normally Anti-FBT and the instrument to sustain your metabolic value operating in ideal degrees. And additionally the wonderful feature pertaining toForever Body Transformation is the actuality with the aim of it comes having a 60 days 100 % money back ensure assure, so you possibly will test it away instead of a few kind of complete sixty days and additionally return this in issue it is not in point of fact instead of you personally. Forever Body Transformation is a emphasis loss list with the aim of might aid folks who are having problems of being round. That imply with the aim of every time a a...
How to identify processors with EPT accessed/dirty bits
By Tracy Camp1
I'm aware that software can check the IA32_VMX_EPT_VPID_CAP MSR to determine if the EPT table supports access and dirty bits...  However I would like to know how to identify a processor before I've purchased it that has this support. This is a common frustration I have with Intel parts - minor features vary quite a bit and don't seem to necissarily 'stick' in a linear progression of CPUID values due to various market differentiations.  Most of the time it doesn't matter too much, since most features are just an optimization for something that doesn't need to be implemented in software, however in this particular case, I'm not sure how to 'emulate' the lack of an accessed and dirty bit in the EPT tables of earlier EPT implementations in software.
Unexpected EPT Violations
By Ralf H.1
Hi, we're currently working in a project that involves extending the KVM hypervisor. While running the VM, we sometimes get EPT violations that shouldn't be possible from our understanding of the Intel documents. The scenario is as follow (we use Intel VT with EPT enabled):All guest paging structures (i.e., the paging structures _inside_ the VM) are set to non-writable on the last EPT level. In other words, whenever the guest OS writes to a guest paging structure (e.g. to map/free a page), this triggers an EPT violation. Now, "occasionally" the following happens:The VM performs a normal read operation somewhere in memory (doesn't seem to matter where). This then yields an EPT violation and bit 0,  bit 1, and bit 7 are set in the exit qualification field, bit 8 is cleared. According to the Intel specification (Table 27-7), this means that the EPT violation was caused by the MMU setting the dirty or accessed bit in the guest paging structures. At first, this makes sense since these ar...
Technological migration and virtualization, are they complementary?
By kcav@snet.net2
Rather than force a user to abruptly break away from routines that have become easy to perform, I think it might be a good idea to run Windows 7 in a virtual environment on the new platform; provided it is possible to hotkey from the new work environment to the old, and back to the new in a New York minute.   My interest in this came about when after changing from an old fashion notebook to an Ultraboook with a Touch screen I discovered the Start menu has changed, of course.  Also, I realized that using a slow browser on a fast platform doesn’t make sense, so I left behind my beloved IE8 with iGoogle homepage and changed to speedy Google Chrome.  Then I found myself wondering how to save Favorites, block pop-ups, establish and maintain trust relations, all things I had become somewhat familiar with doing, and now have to consciously think about again.  I am looking forward to making greater use of audio and video processing capabilities in the new 64-bit environment.  Since A/V file...
vmx-preemption timer inaccuracy (across vmx transitions)
By Michael L.1
Hi, From what I understand, the VMX-preemption timer should only decrement when in VMX non-root operations. I have been trying to use it as a way to measure cycle time in a VM, with respect to the running time of that VM. Hence, I do not want to include in my measurement the time spent in the VMM or the time to perform VM entries/exits. VMX-preemption timer seems like it could serve that purpose (with the granularity of the TSC to VMX-preemption timer ratio). However, in my test, the VMX-preemption timer seems to also decrement while performing VM entry/exits. My test: a) from the VMM: read the VMX-preemption timer in the VMCS b) VM enter c) VM exit *immediately after VM enter* (eip set to the hlt instruction) d) from the VMM: read the VMX-preemption timer in the VMCS (processor setup to save the VMX-preemption timer to VMCS on VM exit) the difference between (d) and (a) should be zero or a very small value since the VMX-preemption timer should only be decrementing when executing i...
virtualisasi dekstop or virtualisasi server
By wahid1
no wonder it possible for professionals to adanay kalanagn desktop and server virtualization, but it is very confusing for the layman, because it is almost like it is just different in the context of network and local only. desktop virtualization is more focused on the dektop without touching the network between computers, such as, VMWare Player, Virtualbox, Qemu, etc.. very useful for testing the OS on the client. server virtualization is more directed to the network as it relates to the Internet or a network cable or wireless jaringn keuntunganya further test of seranagn hackers because networks are vulnerable from attacks hercker! no wonder it possible for professionals to adanay kalanagn desktop and server virtualization, but it is very confusing for the layman, because it is almost like it is just different in the context of network and local only.desktop virtualization is more focused on the dektop without touching the network between computers, such as, VMWare Player, Virtual...
Artificial intelligence Vs. Virtualization
By sylvesferg860322
in software developement is there a tradeoff between the two and how can it be viable economically and technologically.


Iscriversi a Forum
Nessun contenuto trovato
Iscriversi a Video