"Dr.Ralph" <dr.ralph@removesol.dk> wrote in
news:1x29i1o63k5an.1k094ksiibve1$.dlg@40tude.net:
> Hvad er "Execute Disable Bit technology" og hvad skal jeg bruge denne nye
> kerne til i praksis ?
Sakset fra Intels egne sider:
(
http://www.intel.com/business/bss/infrastructure/security/xdbit.htm)
Malicious buffer overflow attacks pose a significant security threat to
businesses, increasing IT resource demands, and in some cases destroying
digital assets. In a typical attack, a malicious worm creates a flood of
code that overwhelms the processor, allowing the worm to propagate itself
to the network, and other computers.
Intel's Execute Disable Bit functionality, first released for the Intel®
Itanium® processor family in 2001, can prevent certain classes of malicious
"buffer overflow" attacks when combined with a supporting operating system.
Execute Disable Bit allows the processor to classify areas in memory by
where application code can execute and where it cannot. When a malicious
worm attempts to insert code in the buffer, the processor disables code
execution, preventing damage or worm propagation. To provide end-to-end no
execute (NX) coverage, Intel will offer Execute Disable Bit for
workstations, and other server products beginning in late Q3 2004. Desktop
and workstation products are now shipping, with system availability in Q4
2004. Mobile products begin shipping in late Q4 2004, with system
availability in Q1 2005.
----------------------------------------------------------------
Og de nuværende operativsystemer der understøtter det er:
Microsoft Windows* Server 2003 with Service Pack 1
Microsoft Windows* XP* with Service Pack 2
SUSE Linux* 9.2
Red Hat Enterprise Linux 3 Update 3
Mvh.
Flemming