摘要:
Systems and arrangements for remotely selecting a bootable image via a WOL packet for a wake-on-LAN (WOL) capable computer are contemplated. Server-side embodiments include hardware and/or software for determining a client to be managed, determining whether the client is active on the network, and transmitting a WOL packet having a vector, or operating system partition identification (OSPID), to describe a bootable image accessible by the WOL capable computer. Some embodiments may include an OSPID that points to a secure bootable image such as a bootable image on a hard drive, a compact disk (CD) connected to the computer, or other local resource. Client-side embodiments may receive the WOL packet at, for instance, a network interface card (NIC), recognize that the WOL packet includes an OSPID that describes the bootable image to boot, and implement an alternative boot sequence to boot from that bootable image.
摘要:
Systems and arrangements for remotely selecting a bootable image via a WOL packet for a wake-on-LAN (WOL) capable computer are contemplated. Server-side embodiments include hardware and/or software for determining a client to be managed, determining whether the client is active on the network, and transmitting a WOL packet having a vector, or operating system partition identification (OSPID), to describe a bootable image accessible by the WOL capable computer. Some embodiments may include an OSPID that points to a secure bootable image such as a bootable image on a hard drive, a compact disk (CD) connected to the computer, or other local resource. Client-side embodiments may receive the WOL packet at, for instance, a network interface card (NIC), recognize that the WOL packet includes an OSPID that describes the bootable image to boot, and implement an alternative boot sequence to boot from that bootable image.
摘要:
Systems and arrangements for remotely selecting a bootable image via a WOL packet for a wake-on-LAN (WOL) capable computer are contemplated. Server-side embodiments include hardware and/or software for determining a client to be managed, determining whether the client is active on the network, and transmitting a WOL packet having a vector, or operating system partition identification (OSPID), to describe a bootable image accessible by the WOL capable computer. Some embodiments may include an OSPID that points to a secure bootable image such as a bootable image on a hard drive, a compact disk (CD) connected to the computer, or other local resource. Client-side embodiments may receive the WOL packet at, for instance, a network interface card (NIC), recognize that the WOL packet includes an OSPID that describes the bootable image to boot, and implement an alternative boot sequence to boot from that bootable image.
摘要:
A method and system are disclosed for substituting an anonymous media access controller (MAC) address for a client computer system's real MAC address in order to disguise an identity of the client computer system when the client computer system is utilizing a network. The client computer system is coupled to a server computer system via the network. A primary storage device is established for storing a MAC address. A MAC address which is stored in the primary storage device is utilized as a network address for the client computer system when the client computer system is utilizing the network. An anonymous MAC address is generated. The anonymous MAC address is not associated with any particular client computer system. The anonymous MAC address is then stored in the primary storage device. The client computer system utilizes the anonymous MAC address as the network address for the client computer system when the client computer system is utilizing the network.
摘要:
A method and system are disclosed for substituting an anonymous Universal Unique Identifier (UUID) for a computer system's real UUID in order to disguise an identity of the computer system to an application which is requesting a UUID for the client computer system. A storage device is established in the computer system. The storage device includes a primary and a second location. A UUID stored in the primary location is used as a UUID for the computer system. An anonymous UUID is generated. The anonymous UUID does not identify any particular computer system. The anonymous UUID is stored in the primary location within the storage device, and the real UUID is backed up by moving it into the secondary location. Thereafter, the anonymous UUID is provided in response to requests for the computer system's UUID.
摘要:
A data processing system and method are described for permitting a server computer system to remotely provide a client computer system's settings password to the client computer system. The client and server computer systems are coupled together utilizing a network. A network settings password is established within the client. The network settings password is required prior to permitting access to system settings included within the client. The client receives the network settings password from the server computer system utilizing the network. Access to the system settings is permitted in response to the receipt of the network settings password. In this manner, the server computer system remotely provides a network settings password to the client computer system.
摘要:
A data processing system and method are described for permitting a server computer system to remotely disable an input device included within a client computer system coupled to the server utilizing a network. The server computer system transmits a message to the client computer system to disable the input device. In response to a receipt of the message, a network adapter included within the client computer system disables the input device by prohibiting a data stream output from the input device from being received by an input/output controller included within the client computer system.
摘要:
A data processing system and method are described for permitting a server computer system to function as a remote keyboard input device for a client computer system prior to the client computer system completing its boot process. The client computer system is coupled to the server computer system utilizing a network. Each keystroke entered into the server computer system is captured by the server. A scan code associated with each captured keystroke is transmitted to the client computer system utilizing the server computer system via the network. The scan code associated with each keystroke is executed utilizing the client computer system. The server computer system functions as a remote keyboard input device for the client computer system.
摘要:
A data processing system and method are described for permitting a server computer system to remotely control modifications of initialization settings included within a client computer system. The client computer system is coupled to a server computer system to form a network. During a set-up process executing within the client computer system, the client computer system receives an attempted modification of one of a plurality of initialization settings utilized during booting. In response to the attempted modification, the server computer system determines whether the modification is prohibited. In response to the modification being prohibited, the server computer system prohibits the modification of the one of said plurality of initialization settings, wherein the client computer system is prohibited from booting utilizing the modified one of said plurality of initialization settings.
摘要:
A method and system for booting up multiple PCI peripheral devices, such that the number of bootable PCI peripheral devices is not limited by the amount of computer system memory that is dedicated to storing executable boot code for the peripheral devices. The executable boot code is stored on a Read Only Memory (ROM) on each peripheral device. When a new PCI peripheral device begins to boot up, a check for available memory space in a ROM scan memory address space is performed. If there is not enough available room in the ROM scan memory address space for the new device's executable boot code, then a ROM scan detection logic pages an image of another peripheral device's executable boot code out of the ROM scan memory address space before storing the new device's executable boot code into the ROM scan memory address space.