SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Technology Stocks : WAVX: Wave Systems Corp.

 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext  
From: TREND14/2/2007 8:00:13 AM
  Read Replies (1) of 604
 
Posted by: khillo
In reply to: None Date:4/2/2007 2:46:53 AM
Post #of 140719

Microsoft's Ben Fathi's comment on tpm from last post.

arnnet.com.au

What that means is that today, if a rootkit makes it onto your machine, it can do a hyperjacking. It can take over the OS or it can even get underneath the OS so that any software you're running, like Kernel Patch Protection, won't even know that it's being lied to by a piece of malware underneath. What we want to do is put the hypervisor there and use things like the TPM chip to make sure that the entire boot path is protected and secure and we can trust it and it hasn't been tampered with.

"Even trusted platform module [TPM] chips are useless against advanced rootkits, according to McGeorge. He said despite Microsoft's Ben Fathi's comments, TPMs are helpless to defend against hyperjacking, in which malware takes over an operating system negating software security applications like Kernel Patch Protection
Report TOU ViolationShare This Post
 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext