Issue #63, July 2000 Starting Our SIXTH Year in Publishing!
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
How to Hack a Turned-Off Computer Or Running Unsigned
HOW TO HACK A TURNED-OFF COMPUTER, OR RUNNING UNSIGNED CODE IN INTEL ME Contents Contents ................................................................................................................................ 2 1. Introduction ...................................................................................................................... 3 1.1. Intel Management Engine 11 overview ............................................................................. 4 1.2. Published vulnerabilities in Intel ME .................................................................................. 5 1.2.1. Ring-3 rootkits.......................................................................................................... 5 1.2.2. Zero-Touch Provisioning ........................................................................................... 5 1.2.3. Silent Bob is Silent .................................................................................................... 5 2. Potential attack vectors ...................................................................................................... 6 2.1. HECI ............................................................................................................................... 6 2.2. Network (vPro only)......................................................................................................... 6 2.3. Hardware attack on SPI interface ..................................................................................... 6 2.4. Internal file system ......................................................................................................... -
Intel Management Engine Deep Dive
Intel Management Engine Deep Dive Peter Bosch About me Peter Bosch ● CS / Astronomy student at Leiden University ● Email : [email protected] ● Twitter: @peterbjornx ● GitHub: peterbjornx ● https://pbx.sh/ About me Previous work: ● CVE-2019-11098: Intel Boot Guard bypass through TOCTOU attack on the SPI bus (Co-discovered by @qrs) Outline 1. Introduction to the Management Engine Operating System 2. The Management Engine as part of the boot process 3. Possibilities for opening up development and security research on the ME Additional materials will be uploaded to https://pbx.sh/ in the days following the talk. About the ME About ME ● Full-featured embedded system within the PCH ○ 80486-derived core ○ 1.5MB SRAM ○ 128K mask ROM ○ Hardware cryptographic engine ○ Multiple sets of fuses. ○ Bus bridges to PCH global fabric ○ Access to host DRAM ○ Access to Ethernet, WLAN ● Responsible for ○ System bringup ○ Manageability ■ KVM ○ Security / DRM ■ Boot Guard ■ fTPM ■ Secure enclave About ME ● Only runs Intel signed firmware ● Sophisticated , custom OS ○ Stored mostly in SPI flash ○ Microkernel ○ Higher level code largely from MINIX ○ Custom filesystems ○ Custom binary format ● Configurable ○ Factory programmed fuses ○ Field programmable fuses ○ SPI Flash ● Extensible ○ Native modules ○ JVM (DAL) Scope of this talk Intel ME version 11 , specifically looking at version 11.0.0.1205 Platforms: ● Sunrise Point (Core 6th, 7th generation SoC, Intel 100, 200 series chipset) ● Lewisburg ( Intel C62x chipsets ) Disclaimer ● I am in no way affiliated with Intel Corporation. ● All information presented here was obtained from public documentation or by reverse engineering firmware extracted from hardware found “in the wild”. ● Because this presentation covers a very broad and scarcely documented subject I can not guarantee accuracy of the contents. -
Shareware Solutions II
SharewareShareware SolutionsSolutions IIII An Exciting Apple II Journey Into The Future Volume 3, Issue 1 Spring, 1996 Heard It Through The Grapevine Hard Drive Give Away following e-mail message: The There was also quite a bit of dis- winner of the HD is Keith Saga- cussion about Brutal Deluxes Everyone whose subscription low. We threw all of the papers System 6.0.2 update, and Oliv- was current at the end of Febru- into the air, then we threw a ier admitted that his program- ary, 1996 was automatically en- dart at one. There were three ming partner suffered from a tered into the Hard Drive Give names hit by the dart, but only hard drive crash and that much Away Contest, and the winner one was legible, so Keith was of the work had been lost. of that contest is Keith Saga- the winner. low, a IIGS owner from Central The freewheeling online chat Valley, New York. Keith is now Thanks to Tony Diaz for do- session was attended by more the proud owner of a 120 Mega- nating the drive. Thanks to Auri than 30 people, and a good time byte Focus Hard Drive. for acting as an intermediary to seemed to be had by all. Steve Wozniak. Thanks to Woz From the time the contest was for choosing the winner. But Upon his return to France, Oliv- announced in the last issue un- most of all, thanks to all of you ier started work on the next Bru- til the time that Keith received for supporting Shareware Solu- tal Deluxe release, a IIGS game his hard drive, several unexpect- tions II. -
The Strangeness Magnetic Moment of the Proton in the Chiral Quark Model
The Strangeness Magnetic Moment of the Proton in the Chiral Quark Model L. Hannelius, D.O. Riska Department of Physics, University of Helsinki, 00014 Finland and L. Ya. Glozman Institute for Theoretical Physics, University of Graz, A-8019 Graz, Austria Abstract The strangeness magnetic moment of the proton is shown to be small in the chiral quark model. The dominant loop contribution is due to kaons. The K∗ loop contributions are proportional to the difference between the strange and light constituent quark masses or −2 mK∗ and therefore small. The loop fluctuations that involve radiative transitions between K∗ mesons and kaons are small, when the cut-off scale in the loops is taken to be close to the chiral symmetry restoration scale. The net loop amplitude contribution to the strangeness magnetic moment of the proton is about −0.05, which falls within the uncertainty range of arXiv:hep-ph/9908393v2 24 Aug 1999 the experimental value. 0 1. Introduction The recent finding by the SAMPLE collaboration that the strangeness magnetic moment s 2 2 of the proton is small, and possibly even positive [1] (GM (Q = 0.1 GeV )=0.23 ± 0.37) was unexpected in view of the fact that the bulk of the many theoretical predictions for this quantity are negative, and outside of the experimental uncertainty range (summaries are given e.g. in refs. [2, 3, 4]). A recent lattice calculation gives −0.36 ± 0.20 for this quantity [5], thus reaffirming the typical theoretical expectation, while remaining outside of the uncertainty range of the empirical value. -
Introduction
Introduction WHO THIS BOOK IS FOR There’s no question that you’ll get some good out of this WHY WE WROTE THIS BOOK book no matter how much of a Mac expert you are. DP: Everybody who’s ever worked Heck, even if you throw away the book, the accompany- with a Mac already knows that you ing 600 MB of spectacular software will make you discard a file by moving its icon to mighty glad you picked it up. the Trash can, that you select text by dragging across it, and that you end But we may as well admit that this book completely the day by choosing Shut Down skips over the basics of using a Macintosh. If you don’t from the Special menu.The world already know how to point and click, open windows, doesn’t need another book to define insert a disk, use a menu, and open a control panel, you scroll bar. should take a moment to play with the animated pro- JS: So when we started writing gram called either Mouse Practice or Macintosh Basics this book, we worked from one that came with your Mac. Read a manual. Read Macs For simple, overarching concept: Under Dummies, a really good beginner’s book from IDG no circumstances would we define Books (written by one of your present authors). Do scroll bar. whatever you have to do. DP: Instead, we decided to tell As a matter of fact, here are the terms we’re going to secrets: secrets about how a Mac really be tossing around without any definition: works, secrets that software program- Ô-key, Ú menu, backup copy, click, control panel, mers buried in programs but forgot to cursor, Delete key, desktop, double-click, File menu, tell the manual writer, secrets that floppy disk, folder, font, hard drive, icon, K (kilobyte), answer some of the most frequently keyboard, launch a program, MB (megabyte), menu, asked (and seldom answered) quest- ions about Macintosh computing, menu command, monitor, mouse, numeric keypad, secrets such as how to recover a file Option key, point, quit a program, Return key, spacebar, after you’ve dragged it to the Trash — scroll bar, System 7, title bar (of a window), Trash. -
An Introduction to Morphos
An Introduction to MorphOS Updated to include features to version 1.4.5 May 14, 2005 MorphOS 1.4 This presentation gives an overview of MorphOS and the features that are present in the MorphOS 1.4 shipping product. For a fully comprehensive list please see the "Full Features list" which can be found at: www.PegasosPPC.com Why MorphOS? Modern Operating Systems are powerful, flexible and stable tools. For the most part, if you know how to look after them, they do their job reasonably well. But, they are just tools to do a job. They've lost their spark, they're boring. A long time ago computers were fun, it is this background that MorphOS came from and this is what MorphOS is for, making computers fun again. What is MorphOS? MorphOS is a fully featured desktop Operating System for PowerPC CPUs. It is small, highly responsive and has very low hardware requirements. The overall structure of MorphOS is based on a new modern kernel called Quark and a structure divided into a series of "boxes". This system allows different OS APIs to be used along side one another but isolates them so one cannot compromise the other. To make sure there is plenty of software to begin with the majority of development to date has been based on the A- BOX. In the future the more advanced Q-Box shall be added. Compatibility The A-Box is an entire PowerPC native OS layer which includes source and binary compatibility with software for the Commodore A500 / A1200 etc. -
Basics of Qcd Perturbation Theory
BASICS OF QCD PERTURBATION THEORY Davison E. Soper* Institute of Theoretical Science University of Oregon, Eugene, OR 97403 ABSTRACT (•• i This is an introduction to the use of QCD perturbation theory, em- I phasizing generic features of the theory that enable one to separate short-time and long-time effects. I also cover some important classes of applications: electron-positron annihilation to hadrons, deeply in- elastic scattering, and hard processes in hadron-hadron collisions. •Supported by DOE Contract DE-FG03-96ER40969. © 1996 by Davison E. Soper. -15- 1 Introduction 2 Electron-Positron Annihilation and Jets A prediction for experiment based on perturbative QCD combines a particular In this section, I explore the structure of the final state in QCD. I begin with the calculation of Feynman diagrams with the use of general features of the theory. kinematics of e+e~ —> 3 partons, then examine the behavior of the cross section The particular calculation is easy at leading order, not so easy at next-to-leading for e+e~ —i- 3 partons when two of the parton momenta become collinear or one order, and extremely difficult beyond the next-to-leading order. This calculation parton momentum becomes soft. In order to illustrate better what is going on, of Feynman diagrams would be a purely academic exercise if we did not use certain I introduce a theoretical tool, null-plane coordinates. Using this tool, I sketch general features of the theory that allow the Feynman diagrams to be related to a space-time picture of the singularities that we find in momentum space. -
Introduction to Storage and Software Systems for Data Analysis
INTRODUCTION TO STORAGE AND SOFTWARE SYSTEMS FOR DATA ANALYSIS Bob Jacobsen University of California, Berkeley, USA Abstract The Storage and Software Systems for Data Analysis track discusses how HEP physics data is taken, processed and analyzed, with emphasis on the problems that data size and CPU needs pose for people trying to do experimental physics. The role of software engineering is discussed in the context of building large, robust systems that must at the same time be accessible to physicists. We include some examples of existing systems for physics analysis, and raise some issues to consider when evaluating them. This lecture is the introduction to those topics. 1. INTRODUCTION Many modern high-energy physics (HEP) experiments are done by collaborations of hundreds of people. Together, these groups construct and operate complex detectors, recording billions of events and terabytes of data, all toward the goal of “doing physics”. In this note, we provide an introduction to how we currently do this, and raise a number of issues to be considered when thinking about the new systems that are now being built. 2. SCALE OF THE EXPERIMENTS BaBar, CDF and D0 are examples of the large experiments now taking or about to take data in a collider environment. The collaborations that have built these experiments contain 300 to 600 members with varying levels of activity. Almost everybody is considered “familiar” with using computing to do their work, but only a small fraction of the collaboration can be considered as computing professionals. Some of these can even be considered world-class experts in large scale computing. -
Quarkxpress 8.0 Readme Ii
QuarkXPress 8.0 ReadMe ii Contents QuarkXPress 8.0 ReadMe....................................................................................................3 System requirements.............................................................................................................4 Mac OS.....................................................................................................................................................4 Windows...................................................................................................................................................4 Installing: Mac OS................................................................................................................5 Performing a silent installation.................................................................................................................5 Preparing for silent installation....................................................................................................5 Installing.......................................................................................................................................5 Performing a drag installation..................................................................................................................5 Adding files after installation...................................................................................................................6 Installing: Windows..............................................................................................................7 -
ED369393.Pdf
DOCUMENT RESUME ED 369 393 IR 054 782 TITLE EPIEgram: The Newsletterof Systemic Change, 1992-1993. INSTITUTION Educational Products InformationExchange Inst., Hampton Bays, NY. PUB DATE 93 NOTE 146p.; For the 1991-1992 issue,see ED 353 959. AVAILABLE FROMSterling Harbor Press, P.O. Box28, Greenport, NY 11944 ($65.00/year). PUB TYPE Collected Works Serials(022) Book/Product Reviews (072) JOURNAL GIT EPIEgram: The Newsletterof Systemic Change; v19n1-9 1992-93 EDRS PRICE MF01/PC06 Plus Postage. DESCRIPTORS Computer Networks; Computer Software Evaluation; *Courseware; Educational Change; Educational Innovation; Educational Resources; '*Educational Technology; Elementary Secondary Education; Ethics; Hypermedia; Information Networks; Multimedia Instruction; Research and Development IDENTIFIERS Information Age; Information Infrastructure ABSTRACT The EPIEgram newsletter contains information about educational materials and technology for elementary secondary education. In addition to the continuing feature, "The Educational Software Selector" (TESS), the nine issues contain articles on evaluating educational technology; school reform; publishing; multimedia; hypermedia; the information superhighway; the national information infrastructure; educational ethics; and computer networks. (JLB) Reproductions supplied by EDRS are the best that can be made * from the original document. * ******************;.********************************************** U.S. DEPARTMENT OF EDUCATION Office of Educationar Researcn and Improvement EDUCATIONAL RESOURCES INFORMATION CENTER IERICI C TOM document has been reproduced as received I rom tne person or organization originating it C Minor changes nave peen made to improve reCor0OUCLOO Qualify Points of view or opirnons stated in thi5d0Co men) CO not necessarity represent official OEM position or O0r.cy EPIEgram: The Newsletter of Systemic Change, 1992-1993 (Nc "PERMISSION TO REPRODUCE THIS r.11; P.Pr1"1 MT1 MATERIAL HAS BEEN GRANTED BY J. -
Lepton Probes in Nuclear Physics
L C f' - l ■) aboratoire ATIONAI FR9601644 ATURNE 91191 Gif-sur-Yvette Cedex France LEPTON PROBES IN NUCLEAR PHYSICS J. ARVIEUX Laboratoire National Saturne IN2P3-CNRS A DSM-CEA, CESaclay F-9I191 Gif-sur-Yvette Cedex, France EPS Conference : Large Facilities in Physics, Lausanne (Switzerland) Sept. 12-14, 1994 ££)\-LNS/Ph/94-18 Centre National de la Recherche Scientifique CBD Commissariat a I’Energie Atomique VOL LEPTON PROBES IN NUCLEAR PHYSICS J. ARVTEUX Laboratoire National Saturne IN2P3-CNRS &. DSM-CEA, CESaclay F-91191 Gif-sur-Yvette Cedex, France ABSTRACT 1. Introduction This review concerns the facilities which use the lepton probe to learn about nuclear physics. Since this Conference is attended by a large audience coming from diverse horizons, a few definitions may help to explain what I am going to talk about. 1.1. Leptons versus hadrons The particle physics world is divided in leptons and hadrons. Leptons are truly fundamental particles which are point-like (their dimension cannot be measured) and which interact with matter through two well-known forces : the electromagnetic interaction and the weak interaction which have been regrouped in the 70's in the single electroweak interaction following the theoretical insight of S. Weinberg (Nobel prize in 1979) and the experimental discoveries of the Z° and W±- bosons at CERN by C. Rubbia and Collaborators (Nobel prize in 1984). The leptons comprise 3 families : electrons (e), muons (jt) and tau (r) and their corresponding neutrinos : ve, and vr . Nuclear physics can make use of electrons and muons but since muons are produced at large energy accelerators, they more or less belong to the particle world although they can also be used to study solid state physics. -
Phenomenological Review on Quark–Gluon Plasma: Concepts Vs
Review Phenomenological Review on Quark–Gluon Plasma: Concepts vs. Observations Roman Pasechnik 1,* and Michal Šumbera 2 1 Department of Astronomy and Theoretical Physics, Lund University, SE-223 62 Lund, Sweden 2 Nuclear Physics Institute ASCR 250 68 Rez/Prague,ˇ Czech Republic; [email protected] * Correspondence: [email protected] Abstract: In this review, we present an up-to-date phenomenological summary of research developments in the physics of the Quark–Gluon Plasma (QGP). A short historical perspective and theoretical motivation for this rapidly developing field of contemporary particle physics is provided. In addition, we introduce and discuss the role of the quantum chromodynamics (QCD) ground state, non-perturbative and lattice QCD results on the QGP properties, as well as the transport models used to make a connection between theory and experiment. The experimental part presents the selected results on bulk observables, hard and penetrating probes obtained in the ultra-relativistic heavy-ion experiments carried out at the Brookhaven National Laboratory Relativistic Heavy Ion Collider (BNL RHIC) and CERN Super Proton Synchrotron (SPS) and Large Hadron Collider (LHC) accelerators. We also give a brief overview of new developments related to the ongoing searches of the QCD critical point and to the collectivity in small (p + p and p + A) systems. Keywords: extreme states of matter; heavy ion collisions; QCD critical point; quark–gluon plasma; saturation phenomena; QCD vacuum PACS: 25.75.-q, 12.38.Mh, 25.75.Nq, 21.65.Qr 1. Introduction Quark–gluon plasma (QGP) is a new state of nuclear matter existing at extremely high temperatures and densities when composite states called hadrons (protons, neutrons, pions, etc.) lose their identity and dissolve into a soup of their constituents—quarks and gluons.