Article

Intel® Trusted Execution Technology (Intel® TXT) Enabling Guide

Download as PDF

Автор: David Mulnix (Intel) Последнее обновление: 16.07.2019 - 08:18
Article

McAfee* Embedded Control 6.5.0: User Guide

The McAfee* Embedded Control user guide provides information about using Embedded Control 6.5.0 with Wind River* Linux* 5.0.1 to provide system integrity and change control and block unauthorized a

Автор: Последнее обновление: 10.07.2018 - 08:00
Article

The DRNG Library and Manual

An introduction to the DRNG Library. Includes download links for the static binary libraries, source code, and documentation and a guide to getting started.
Автор: John M. (Intel) Последнее обновление: 16.07.2019 - 08:35
Блоги

Using Whitelists to Improve Firmware Security

Firmware-based attacks typically attempt to add or modify system firmware modules stored in NVRAM. Tools provided by the open source CHIPSEC project can be used to generate and verify hashes of these modules, so users can detect unauthorized changes.
Автор: Brian Richardson (Intel) Последнее обновление: 30.05.2018 - 07:00