编辑: LinDa_学友 2017-10-07

2006 VT-x C introduced by Intel in 2005;

not available in all Intel processors3 I/O Virtualization C enables guest VMs to directly and securely use peripheral devices, such as Ethernet, accelerated graphics cards, and hard-drive controllers. IOMMU C available in certain AMD chipsets starting in

2009 IOMMU v2 supported in Trinity VT-d C available in certain Intel chipsets starting in

20084 AES Instructions C provides hardware acceleration to enable fast and secure data encryption and decryption using the Advanced Encryption Standard (AES). Called AES Instructions Supported in Bulldozer core ( Zambezi, Interlagos, Trinity ) Called AES-NI (AES New Instructions) Intel? Xeon?

5600 series Intel? Core? i5

600 series5 Securing the Platform / CPU and Chipset AMD Intel Trusted Platform Module (TPM) C TPM is a secure cryptoprocessor that can store cryptographic keys that protect information. Selected platforms Selected platforms Software-based Disk Encryption C prevents unauthorized access to data storage. Full disk encryption is used to signify that everything on a disk is encrypted, including the programs that can encrypt bootable OS partitions. Various software available (for example, Windows Bit Locker) Various software available (for example, Windows Bit Locker) Hardware-based Disk Encryption C prevents unauthorized access to data storage. Hardware- based full disk encryption systems that can encrypt the entire boot disk, including the master boot record (MBR). Selected platforms Selected platforms Anti-Theft (AT) Technology C if laptop is lost or stolen it can be rendered inoperable by blocking the boot. AT software technology available from ISVs and open source software Hardware-based AT technology is available in selected 2nd generation Intel Core and 2nd generation Intel Core vPro? processors. Must be activated with a service subscription from an Intel AT-enabled service.6 Intel AT adds incremental hardware-based enhancements to features already available through anti-theft SW vendors. Securing the Platform / Other SW/HW Components 1. http://www.intel.com/technology/xdbit/?wapkw=(XDbit) 2. http://www.intel.com/technology/malwarereduction/index.htm?wapkw=(TXT) 3. http://www.intel.com/technology/itj/2006/v10i3/1-hardware/1-abstract.htm 4. http://www.intel.com/support/processors/xeon5k/sb/CS-031637.h........

下载(注:源文件不在本站服务器,都将跳转到源网站下载)
备用下载
发帖评论
相关话题
发布一个新话题