C9x299-Pgf C9x299-Rpgf
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Informatyka 1, Studia Niestacjonarne I Stopnia Dr Inż
Informatyka 1, studia niestacjonarne I stopnia dr inż. Jarosław Forenc Rok akademicki 2018/2019, Wykład nr 6 2/97 Plan wykładu nr 66 Informatyka 1 Język C § pętle while i do…while Budowa komputera § procesory, moduły pamięci, obudowa (AT, ATX) § interfejsy wewnętrzne i zewnętrzne Politechnika Białostocka --WydziałWydział Elektryczny Struktura i funkcjonowanie komputera Elektrotechnika, semestr II, studia niestacjonarne I stopnia § procesor, rozkazy, przerwania, magistrala Rok akademicki 2018/2019 § pamięć komputerowa, hierarchia pamięci § pamięć podręczna Wykład nr 6 (12.04.2019) dr inż. Jarosław Forenc Informatyka 1, studia niestacjonarne I stopnia dr inż. Jarosław Forenc Informatyka 1, studia niestacjonarne I stopnia dr inż. Jarosław Forenc Rok akademicki 2018/2019, Wykład nr 6 3/97 Rok akademicki 2018/2019, Wykład nr 6 4/97 Język C --pierwiastekpierwiastek kwadratowy Język C --pierwiastekpierwiastek kwadratowy (pętla whilewhile)) Podaj liczbe: -3 Podaj liczbe: -3 #include <stdio.h> #include <stdio.h> Blad! Liczba ujemna Blad! Liczba ujemna #include <math.h> #include <math.h> int main(void ) int main(void ) Podaj liczbe: -5 { Podaj liczbe: 3 { Blad! Liczba ujemna float x, y; Pierwiastek liczby: 1.732051 float x, y; Podaj liczbe : 3 printf("Podaj liczbe: " ); printf("Podaj liczbe: " ); Pierwiastek liczby: 1.732051 scanf("%f" ,&x); scanf("%f" ,&x); while (x<0) if (x>=0) { { printf("Blad! Liczba ujemna\n\n"); y = sqrt(x); printf("Podaj liczbe: " ); printf("Pierwiastek liczby: %f\n" ,y); scanf("%f" ,&x); } } else y = sqrt(x); printf("Blad! Liczba ujemna\n"); printf("Pierwiastek liczby: %f\n" ,y); return 0; return 0; } } Informatyka 1, studia niestacjonarne I stopnia dr inż. Jarosław Forenc Informatyka 1, studia niestacjonarne I stopnia dr inż. -
Trickbot Now Offers 'Trickboot': Persist, Brick
TRICKBOT NOW OFFERS ‘TRICKBOOT’: PERSIST, BRICK, PROFIT Researchers discover a new module in the TrickBot toolset aimed at detecting UEFI / BIOS firmware vulnerabilities EXECUTIVE SUMMARY TrickBot has proven to be one of the most adaptable pieces of malware today, regularly incorporating new functionality to escalate privilege, Collaborative research between Advanced Intelligence (AdvIntel) spread to new devices, and maintain persistence on a host. The addition and Eclypsium has discovered that the TrickBot malware now has of UEFI functionality marks an important advance in this ongoing functionality designed to inspect the UEFI/BIOS firmware of targeted evolution by extending its focus beyond the operating system of the systems. This new functionality, which we have dubbed “TrickBoot,” device to lower layers that are often not inspected by security products makes use of readily available tools to check devices for well-known and researchers. vulnerabilities that can allow attackers to read, write, or erase the UEFI/ BIOS firmware of a device. Given that the TrickBot group toolset has been used by some of the most dangerous criminal, Russian, and North Korean actors to target At the time of writing, our research uncovered TrickBot performing healthcare, finance, telecoms, education, and critical infrastructure, we reconnaissance for firmware vulnerabilities. This activity sets the stage view this development as critically important to both enterprise risk and for TrickBot operators to perform more active measures such as the national security. Adversaries leveraging TrickBot now have an automated installation of firmware implants and backdoors or the destruction means to know which of their latest victim hosts are vulnerable to UEFI (bricking) of a targeted device. -
Intel Core X-Series (HED Lines)
Intel Core X-series (HED lines) Dezső Sima Vers. 2.0 December 2018 Contents • 1. Introduction • 2. The Nehalem Extreme Edition Series • 3. The Westmere Extreme Edition Series • 4. The Sandy Bridge E-series • 5. The Ivy Bridge E-series • 6. The Haswell E-series • 7. The Broadwell E-series Contents • 8. The Skylake X-series • 9. The Caby Lake X-series • 10. The Skylake X Refresh series • 11. References Note In this Chapter we use the designations processor line and processor series as synonyms. We note that models of the X-Series carry different tags, like • (EE) Extreme Edition • X (Extreme) • K (Unlocked) Typically we intend to use the designations xxx E-Series and xxx-E processor models. 1. Introduction 1. Introduction (1) 1. Introduction The X-Series processor models (E-lines) aim at high performance desktops for hardcore gamers and graphics enthusiasts. They serve as HEDs (High End Desktops) termed also as HEDTs. 1. Introduction (2) Hardcore gamer scenario [37] 1. Introduction (3) 1. Introduction -2 Key features of Intel’s X-Series (E-lines/X-lines): • They provide vs. mainstream desktops typically • more cores to utilize more parallelism available in their workloads • more PCIe lanes (either on the PCH or on the die) to allow to attach up to 4 discrete graphics cards) • more memory channels (to appropriately service more processing resources) • they are unlocked, nevertheless • they do not provide integrated graphics, as it is assumed that the installation is intended to provide high quality graphics by attaching multiple discrete graphics cards and • they have a high power consumption of 130 to 165 W.