Intel developed an anti-rootkit technique.
Prior to the incident of computer attacks via Sony's CDs, Intel has just announced it is working on a new project that helps computer users to automatically identify pre-installed dangerous software.
Prior to the incident of computer attacks via Sony's CDs, Intel has just announced it is working on a new project that helps computer users to automatically identify pre-installed dangerous software.
According to Travis Schluessler, an Intel researcher, this solution involves integrating a small chip on each motherboard (BMC) to closely monitor programs that have the right to modify the system configuration. risk of attack.
The idea in Intel's research project is to protect the system against potentially malicious "malicious" programs and to connect to the system, attack software running in the system memory - aka "rootkit" (*).
The same malicious software called "rootkits" took advantage of a flaw in the integrated anti-piracy technology for Sony's CDs to "pave the way" for hackers to hack into the computer. Security experts warned that a vulnerability created by Sony might help hackers perform undetectable attacks on the system.
Many dangerous worms and viruses, such as Slammer, Blaster, are capable of disabling programs running in permanent memory, or changing these programs to run the attacker's code, and then play Spread them over the Internet.
Schluessler said Intel did not expect the new project to take the place of antivirus or antispyware, but it would be a very good support tool for these security solutions.
However, Schluessler said that it was not until the end of 2008 or 2009 that the security project could be completed and applied on computers.
(*) Rootkit
A type of Trojan that can hide itself in files, lock the registry and connect to the network that is hard to detect. Rootkits only require very few resources to operate, and often interfere with common API (application programming interfaces). For example, it might interfere with queries to file managers like Explorer to hide themselves.
In summary, rootkits are designed for intrusion purposes and make changes that are not detected by the operating system and antivirus software.
You should read it
- Intel withdrew from the project of 'one laptop per child'
- Revealing secrets hidden by the CIA for decades
- Some effective work, task, and project management software
- Does your team need project management software
- Toshiba will be the main supplier for Project Ara
- Configuration of Project A, the first FPS game of Riot Games
- How to Open an MPP File on PC or Mac
- Intel's chip has eight new serious vulnerabilities
- How to check whether Android 8.0 phone is updated with Project Treble software
- Intel still maintains a plan to provide 5G modems for partner devices in 2020
- Top 5 best Intel CPUs 2022
- Intel left, Microsoft shook hands with the OLPC project
Maybe you are interested
The doctor controls the robot to operate on the patient at a distance of 2,000km How to play Wifi (Hotspot) on Windows 10 computers How to find other versions of the image on Google How to change DNS on Windows and Mac computers How to find unlicensed images on the internet Useful tips for people with osteoarthritis