N°SERIE
N°SERIE
N°SERIE
No Hardware Virtualization
This processor does not offer advanced hardware support for hardware virtualization. There is some suggestion that future operating systems of all sorts (Linux, Mac, Windows, etc.) may be able to use hardware virtualization to indirectly enforce greater security upon the operating system's "kernel" by preventing it from being modified as a means for thwarting dangerous "root kit" style exploits. The idea is that our future operating systems would always be running inside a virtual machine under the watchful eye of an OS "hypervisor." This has not been practical before now, without hardware support for virtualization, because virtualization required too much real-time involvement of software which introduced an unacceptable amount of overhead and slowed everything down. Hardware virtualization means that virtual machines - and even the entire operating system running inside a virtual machine container - would be able to run at 100% full speed, thus making a persistent security-oriented OS "hypervisor" practical for the first time. But don't hope for this to ever help with the security of 32-bit Windows platforms. Due to the amount of kernel modification already being done by benign kernel drivers in 32-bit versions of Windows, "hypervisory kernel locking" could only ever be implemented under 64-bit versions of Windows where kernel modification has always been actively prohibited. And due to serious compatibility problems inherent in 64-bit systems, it's also not at all clear (at the start of 2007) how quickly, or even whether, 64-bit Windows will become practical on the desktop. However, the other current and real security-related application for hardware virtualization is for running your own virtual machines - at 100% full speed - on top of your host operating system. This is possible today with commercial and completely free software from Microsoft, VMware and Parallels. This has an indirect, though strongly positive, impact upon security since possibly unsafe activities such as Internet surfing or peer-to-peer file sharing can be 100% contained within the virtual environment to make online activities much safer. This can still be done, of course, without hardware virtualization support, but the virtual machine environment as well as the hosting operating system will be running at substantially less than full speed.
About SecurAble
This "SecurAble" GRC freeware was an outgrowth from several "Security Now!" podcasts with Leo Laporte. These MP3 audio files are freely available for download from GRC's web site in both smaller-sized 16 kbps and higher-quality 64 kbps versions, and textual transcripts of the programs are also available: http://www.GRC.com/SecurityNow The following episodes will be of particular interest: # 66 - Windows Vista Security # 67 - Kernel Patch Protection # 71 - SecurAble What is "SecurAble" ? Future PC security will increasingly rely upon specific hardware capabilities offered by modern processors: As Windows makes the painful move from a 32-bit kernel to a new kernel running in 64-bit mode, Microsoft is working to avoid repeating mistakes made during the 32-bit era. Consequently, 64-bit versions of Windows will offer significantly stronger security than was ever available to Windows 32-bit operating systems. Most modern computer vulnerabilities arise from communications buffers that can be overrun with malicious data. This allows remote attackers to inject their own code into vulnerable computers across the Internet. Modern processors incorporate explicit hardware controls to prevent the mistaken execution of remotely supplied data. This "data execution prevention" (DEP), when available and active, enables the most promising improvement in PC security ever seen. To improve the performance of systems running "virtual machines" (VMs), modern processors added hardware support to allow securely encapsulated VMs to run at the same speed as nonVM systems. This benefits security by increasing the robustness of, and removing all performance penalties from, the continuous use of virtual machine technology. Since virtual machines allow "supervision" by their hosting environment, this supervision can be used to dramatically increase the system's overall security. For the reasons described above, these three modern processor characteristics will play an important role in enhancing personal computing security in the future. But it's not readily clear from "outside the box" which features individual systems may contain. So I created this little "SecurAble" utility to allow anyone to quickly and easily determine which of these useful capabilities their system's processor supports. Note: When running SecurAble, be sure to click on each of the three displayed items to receive additional details about the meaning of the display and the security-related implications of each processor feature. North north east oust suds solin
Soling