摘要:
In accordance with the present disclosure, a system and method are herein disclosed for providing secure SMI memory services, including the protection of SMM memory from surreptitious attacks by, for example, rootkits. Information handling systems are susceptible to attacks, especially attacks on SMM memory. In one example, an SMI handler corresponding to the SMI Driver associated with an SMI interrupt performs validation of a password. An SSMS driver allocates memory for the SMI handler to use with the validation process and also performs a secure erase of allocated memory blocks upon completion of all secure SMI Memory Services. By controlling the validation and secure erase process through the use of the SMI handler and SSMS driver, information leakage can be prevented resulting in system data integrity.
摘要:
A method of using a counter stored in flash memory includes providing a base value field, a selector field, and a plurality of increment fields. The base value field represents a base value for the counter, and the selector field indicates a first one of the increment fields. The method further includes changing a bit of the first increment field from an erased value to a written value to indicate a change in a value stored in the counter.
摘要:
A method of using a counter stored in flash memory includes providing a base value field, a selector field, and a plurality of increment fields. The base value field represents a base value for the counter, and the selector field indicating a first increment field of the plurality of increment fields. The method further includes changing a bit of the first increment field from an erased value to a written value to indicate a change in a value stored in the counter.
摘要:
An information handling system is disclosed and can include at least one memory and at least two processor cores coupled thereto. Further, the information handling system can include a controller coupled to the at least two processor cores and the at least one memory. The controller can monitor the temperature within each processor core. Based on the temperature the controller can selectively steer one or more program threads away from an overheating processor core.
摘要:
An information handling system is disclosed and can include at least one memory and at least two processor cores coupled thereto. Further, the information handling system can include a controller coupled to the at least two processor cores and the at least one memory. The controller can monitor the temperature within each processor core. Based on the temperature the controller can selectively steer one or more program threads away from an overheating processor core.
摘要:
A method for removing residual data from a computer program stack prior to returning control to a calling or controlling process with system and method for automatic inclusion thereof into software application programs at the time of production of executable code. Two methods, one for removing residual data from a relatively small stack frame and another for removing residual data from a large stack frame, are automatically inserted into application program code during an enhanced compiling method. Two compiler controls allow a software designer to globally include the stack cleaning feature in all code being produced, or to selectively include the stack cleaning feature into certain indicated modules, code areas, or procedures.
摘要:
A virtual joystick GUI control with self-centering capability which provides a computer system user the ability to scroll at an angle using an n-dimensional graphical control interface. The virtual joystick may be displayed in simple two-dimensional view for control of one dimension of scrolling, such as left/right or up/down. Alternatively, the virtual joystick may be displayed in a simulated three-dimensional (perspective) view which allows scrolling in two dimensions, such as up/down/left/right and combinations thereof. The new virtual joystick can be used to scroll displays, or control other system functions and program parameters, such as volume up/down and tone bass/treble. In general, the virtual joystick can allow control of one or two variables over a range of values.
摘要:
A method of using a counter stored in flash memory includes providing a base value field, a selector field, and a plurality of increment fields. The base value field represents a base value for the counter, and the selector field indicating a first increment field of the plurality of increment fields. The method further includes changing a bit of the first increment field from an erased value to a written value to indicate a change in a value stored in the counter.
摘要:
The present invention provides a method of booting an operating system for use with an information handling system. The method comprises identifying an operating system dependent configuration, and determining an operating system type of the operating system. Further, the method includes changing the operating system dependent configuration in response to the operating system type.
摘要:
An enhanced web browser includes a visual history browser which allows recording of browsing sessions and visual replay or review of browsing sessions. As web sites are visited during a normal browsing session, images of the pages viewed are rendered and stored in the system's memory, and are keyed to entries in the web browser's history log. When the web browser user selects the visual history review control such as a graduated slider control, he or she may move the control forward or backward “in time” as the rendered images are displayed in a viewing window, along with optional information such as the originating web site for each address. The user may stop the control at a position in history, and select to re-point the browser to the web address selected from the history file. Thus, the user may visually browse back and forth through the history of web browser until he or she finds the page desired, and then jump to that page on the web.