Notice: Undefined index: article264 in /www/hardwaresecrets/article.php on line 5 Intel LaGrande Technology Explained | Hardware Secrets
Hardware Secrets

Home | Camera | Case | CE | Cooling | CPU | Input | Memory | Mobile | Motherboard | Networking | Power | Storage | Video | Other
Content
Articles
Editorial
First Look
Gabriel’s Blog
News
Reviews
Tutorials
Main Menu
About Us
Awarded Products
Datasheets
Dictionary
Download
Drivers
Facebook
Forums
Links
Manufacturer Finder
Newsletter
On The Web
RSS Feed
Test Your Skills
Twitter
Newsletter
Subscribe today!
Search



Recommended
Secrets and Lies: Digital Security in a Networked World
Secrets and Lies: Digital Security in a Networked World, by Bruce Schneier (Wiley), starting at $9.98
Home » CPU
Intel LaGrande Technology Explained
Author: Gabriel Torres
Type: Tutorials Last Updated: December 20, 2005
Page: 1 of 6
Introduction

LaGrande Technology (LT) is a new security technology that will be available on Intel’s next generation CPUs (Merom, Conroe and Woodcrest) to be released in 2006. In this tutorial we will explain its main features and how they work.

Nowadays all users are vulnerable to several treats that compromise security. We are not talking only about virus and spyware, but also about someone stealing your password or even your identity.

In Figure 1 you can find a summary why this happens.

LaGrande Technology
click to enlarge
Figure 1: Vulnerabilities of the PC.

The problem, as you can see in Figure 1, is that any software can have access to:

  • Video memory: any software can create ”fake“ screens or ”see“ what the user is seeing.
  • Input devices: any software can ”see“ or change what the user is typing.
  • Memory: Any software can see what is inside RAM memory, so malicious software can capture or change data inside the system’s RAM memory.
  • DMA: Software can access protected memory using the DMA controller.

So what LaGrande Technology does is basically address these issues, by creating a hardware-based protective layer for each one of these weak points present on your computer.

Page 1 of 6  | Next »
Print Version | Send to Friend | Bookmark Article | Comments (0)

Related Content
  • Testing Your Computer Security
  • Protecting Your Computer Against Invasions
  • Testing the Security of Your Website Part 1
  • Testing the Security of Your Website Part 2
  • Testing the Security of Your Website Part 3

  • RSSLatest News
    LUXA2 Releases New P1-PRO Battery Power Pack
    October 1, 2013 - 7:23 AM PST
    MSI unveils GP70 and GP60 Laptops
    September 30, 2013 - 7:23 AM PST
    AMD Unveils Next-Generation Radeon Graphics Cards
    September 27, 2013 - 5:33 AM PST
    Genius Introduces Energy Mouse in North America
    September 27, 2013 - 5:32 AM PST
    Apple Updates iMac
    September 25, 2013 - 5:27 AM PST
    .:: More News ::.




    2004-13, Hardware Secrets, LLC. All rights reserved.
    Advertising | Legal Information | Privacy Policy
    All times are Pacific Standard Time (PST, GMT -08:00)