Фильтры

Блоги

How to Enable an Intel® Trusted Execution Technology Capable Server

Intel® Trusted Execution Technology (Intel® TXT) is a collection of hardware-based security technologies built into Intel’s silicon.  They address the security threats across physical and virtual i

Автор: Thai Le (Intel) Последнее обновление: 26.03.2019 - 12:20
Article

Digital Security and Surveillance on 4th generation Intel® Core™ processors Using Intel® System Studio 2015

This article presents the advantages of developing embedded digital video surveillance systems to run on 4th generation Intel® Core™ processor with Intel® HD Graphics, in combination with the Intel® System Studio 2015 software development suite. While Intel® HD Graphics is useful for developing many types of computer vision functionalities in video management software; Intel® System Studio...
Автор: Последнее обновление: 23.06.2019 - 18:50
Article

McAfee* Application Control 6.1.0: Command Line Interface Guide

The McAfee* Application Control 6.1.0 Guide is a reference for the commands available for the command line interface (CLI) and includes supported arguments and their descriptions, for use in standa

Автор: Последнее обновление: 10.07.2018 - 08:00
Article

McAfee* Application Control 6.1.0: Product Guide

The McAfee* Application Control 6.1.0 Product Guide covers workflow concepts, control modes, and dynamic whitelisting, using the CLI interpreter and deployment of Application Control to protect sys

Автор: Последнее обновление: 10.07.2018 - 08:00
Article

McAfee* Change Control 6.1.0: Product Guide

The McAfee* Change Control Product Guide is a comprehensive reference that covers initial set-up, configuration, and ongoing maintenance of change control and includes remote administration and tro

Автор: Последнее обновление: 10.07.2018 - 08:00
Article

McAfee* Embedded Control 6.5.0: User Guide

The McAfee* Embedded Control user guide provides information about using Embedded Control 6.5.0 with Wind River* Linux* 5.0.1 to provide system integrity and change control and block unauthorized a

Автор: Последнее обновление: 10.07.2018 - 08:00
Article

The Dark Side of the Internet of Things

Most of us are keenly aware of the potential and promise of the Internet of Things (IoT). It’s easy to visualize a bright future arising from the many advantages of linking cars, shipping containers, office buildings, factories, refrigerators, cooking devices, health monitors, thermostats, and other things to a vast repository in the cloud where intelligence extracted from Big Data can inform our...
Автор: Lee Purcell Последнее обновление: 10.07.2018 - 08:00
Article

Chain of Things Solar Case Study: Blockchain+IoT Security

With partners ElectriCChain, SolarCoin, Solcrypto, Bitseed, IOTA, and RWE, the first Chain of Things Case Study Event focused on the secure logging of solar energy production data to a distributed blockchain ledger. Through multiple case studies, Chain of Things will develop a clearer picture of what an optimal IoT+blockchain stack should include and will determine if blockchain technology...
Автор: Последнее обновление: 10.07.2018 - 08:00
Article

How to Protect Apps from Buffer Overflow Attacks

Learn how to enhance security for software on Windows® 10 using Intel® Memory Protection Extensions.
Автор: Fanjiang Pei (Intel) Последнее обновление: 30.05.2018 - 07:08
Блоги

The New Reality for IoT Security

Recent Distributed Denial of Service (DDoS) attacks are forcing a shift in Internet of Things (IoT) security thinking. The dangers are expanding as attackers are taking advantage of billions of IoT devices and conscripting them into their botnet armies for massive DDoS attacks.
Автор: Rosenquist, Matthew L (Intel) Последнее обновление: 10.07.2018 - 08:00