摘要:
Systems, methods and products are described that provide homepage re-assignment. One aspect includes displaying a default homepage desktop view from among a plurality of scrollable desktop views; receiving user input via a user input device; opening a homepage re-assignment utility responsive to receiving said user input, said homepage re-assignment utility including a display indicating one or more desktop views selectable as a new homepage; and responsive to receiving a user input indicating a selection of a desktop view as a new homepage, changing a default homepage setting to a desktop view selected as a new homepage. Other embodiments are described.
摘要:
The invention broadly contemplates a computing system that offers high-speed recovery. The system is configured to offer such a high-speed solution via an instant roll back scheme. The system utilizes a virtualization to handle the system state and provide a rescue and recovery like solution without requiring a full system reboot. The system is configured to utilize virtualization, e.g. through the use of a hypervisor to track the fundamental system components. This enables the system to very quickly back the system up on a rolling basis via tracking atomic changes and offering the instant rollback at essentially any point following an atomic change, should common system difficulties be encountered.
摘要:
A method for preventing malicious software from execution within a computer system is disclosed. A permutation is performed on a subset of instructions within an application program to yield a permuted sequence of instructions before any actual execution of the application program on the computer system. A permutation sequence number of the permuted sequence of instructions is stored in a permuted instruction pointer table. The permuted sequence of instructions is executed in an execution module that is capable of translating the permuted sequence of instructions to an actual machine code of a processor within the computer system according to the permutation sequence number of the permuted sequence of instructions stored in the permuted instruction pointer table.
摘要:
Embodiments generally provide a utility for migrating an existing user operating system to a remote storage device. A utility for migrating user operating systems according to embodiments automatically detects and fixes inconsistent partition interdependencies resulting from the migration process.
摘要:
An exemplary apparatus includes one or more processors, volatile memory, a storage drive and circuitry configured to establish a network connection and to attempt to send credentials via an established network connection. Such an apparatus further includes circuitry configured, responsive to authentication failure after an attempt to send credentials, to release an implemented security policy and load an operating system stored on the storage drive, and, responsive to an attempt to send credentials, to maintain an implemented security policy and to use an operating system exposed via an established network connection and associated with the sent credentials Such an apparatus optionally includes circuitry configured to implement a security policy that isolates at least a portion of a local storage drive. Various other apparatuses, systems, methods, etc., are also disclosed.
摘要:
An apparatus, system, and method are disclosed for remotely booting a client from a storage area network (“SAN”). A connection module enables a client, such as a diskless client, to connect to two or more storage area networks (“SANs”), the SANs belonging to a group of redundant SANs, each SAN in the group redundantly storing at least a portion of substantially identical operating system data for the client. The boot module enables the client to remotely boot an operating system from the two or more redundant SANs. The boot module makes at least one read request to each of the two or more connected SANs, each read request configured to retrieve a disparate portion of the operating system data for loading the operating system onto the client. The boot module loads the operating system onto the client using a combination of data retrieved from the two or more connected SANs.
摘要:
A method for providing centralized user authorization to allow secure sign-on to a computer system is disclosed. In response to a user attempting to boot up a computer system, a message is sent to a trusted server by a hypervisor within the computer to request a new hard drive password for the computer system. If the user is not authorized to access the computer system, a packet is sent by the trusted server to instruct the hypervisor to stop any boot process on the computer system. If the user is authorized to access the computer system, a packet containing a partial hard drive password is sent by the trusted server to the computer system. The packet is then encrypted with a system public key by the computer system to yield the partial hard drive password. The computer system subsequently combines the partial hard drive password with a user password to generate a new complete hard drive password to continue with the boot process.
摘要:
A technique for booting a stateless client includes booting a virtual machine (VM) monitor on the client. The VM monitor is stored in a non-volatile memory area of a memory subsystem (of the client) and a first portion of an operating system (which does not include any state information for the operating system) is stored in the non-volatile memory area of the client. Booting of the operating system for the client is initiated and a remote storage (that stores a second portion of the operating system that includes state information for the operating system) is accessed via a communication link. Booting of the operating system for the client is completed using the second portion of the operating system.
摘要:
An apparatus, system, and method are disclosed for managing network bandwidth. A monitor module monitors traffic of a plurality of peer computers over a Transmission Control Protocol/Internet Protocol (TCP/IP) network. A detection module detects traffic exceeding a traffic threshold for the network. A delay module delays issuing each TCP/IP acknowledge signal for a specified delay interval in response to detecting the traffic exceeding the traffic threshold.
摘要:
A system, method, and program product is provided that receives and processes a firmware update at a computer system. The computer system is executing a hypervisor and one or more guest operating systems, and the firmware update corresponds to a hardware device accessible by the computer system. The hardware device is a type that is programmed using an updateable firmware. The hypervisor operating in the computer system processes the received firmware update by first inhibiting use of the device by each of the guest operating systems. After the guest operating systems have been inhibited from using the device, the firmware in the device is upgraded by the hypervisor using the received firmware update. After the firmware has been upgraded, each of the guest operating systems is allowed use of the device.