Hardware Secrets
Home | Camera | Case | CE | Cooling | CPU | Input | Memory | Mobile | Motherboard | Networking | Power | Storage | Video | Other
Content
Articles
Editorial
First Look
Gabriel’s Blog
News
Reviews
Tutorials
Main Menu
About Us
Awarded Products
Datasheets
Dictionary
Download
Drivers
Facebook
Links
Manufacturer Finder
Newsletter
RSS Feed
Test Your Skills
Twitter
Newsletter
Subscribe today!
Recommended
Secrets and Lies: Digital Security in a Networked World
Secrets and Lies: Digital Security in a Networked World, by Bruce Schneier (Wiley), starting at $10.88


Home » CPU
Intel LaGrande Technology Explained
Author: Gabriel Torres 44,387 views
Type: Tutorials Last Updated: December 20, 2005
Page: 1 of 6
Introduction

LaGrande Technology (LT) is a new security technology that will be available on Intel’s next generation CPUs (Merom, Conroe and Woodcrest) to be released in 2006. In this tutorial we will explain its main features and how they work.

Nowadays all users are vulnerable to several treats that compromise security. We are not talking only about virus and spyware, but also about someone stealing your password or even your identity.

In Figure 1 you can find a summary why this happens.

LaGrande Technology
click to enlarge
Figure 1: Vulnerabilities of the PC.

The problem, as you can see in Figure 1, is that any software can have access to:

  • Video memory: any software can create ”fake“ screens or ”see“ what the user is seeing.
  • Input devices: any software can ”see“ or change what the user is typing.
  • Memory: Any software can see what is inside RAM memory, so malicious software can capture or change data inside the system’s RAM memory.
  • DMA: Software can access protected memory using the DMA controller.

So what LaGrande Technology does is basically address these issues, by creating a hardware-based protective layer for each one of these weak points present on your computer.

Print Version | Send to Friend | Bookmark Article Page 1 of 6  | Next »

Related Content
  • Testing Your Computer Security
  • Protecting Your Computer Against Invasions
  • Testing the Security of Your Website Part 1
  • Testing the Security of Your Website Part 2
  • Testing the Security of Your Website Part 3

  • RSSLatest Content
    Gigabyte X99-UD3 Motherboard
    October 30, 2014 - 8:30 AM
    ASUS X99-A Motherboard
    October 29, 2014 - 3:00 AM
    ASUS ZenFone 5 Smartphone Review
    October 15, 2014 - 7:00 PM
    ASUS AM1M-A Motherboard
    October 15, 2014 - 4:30 AM
    ASRock X99 Extreme4 Motherboard
    October 14, 2014 - 4:10 AM
    Cooler Master Elite 130 Case Review
    October 9, 2014 - 2:46 AM
    ASUS RAMPAGE V EXTREME Motherboard
    October 7, 2014 - 2:50 AM
    ASRock Fatal1ty X99M Killer Motherboard
    October 6, 2014 - 5:40 AM







    2004-14, Hardware Secrets, LLC. All rights reserved.
    Advertising | Legal Information | Privacy Policy
    All times are Pacific Standard Time (PST, GMT -08:00)