August 2008 (PDF)

Total Page:16

File Type:pdf, Size:1020Kb

August 2008 (PDF) AUGUST 2008 VOLUME 33 NUMBER 4 OPINION Musings 2 Rik Farrow SECURITY Storm: When Researchers Collide 6 BRandon EnRight, Geoff VoElkER, StEFan SaVagE, ChRiS kaniCh, and kiRill LevchEnko THE USENIX MAGAZINE Building a More Secure Web Browser 14 ChRiS Grier, Shuo tang, and SamuEl t. king Withstanding Multimillion-node Botnets 22 Colin dixon, thom aS anderson, and Arvind KriShnamuRthy SYSADMin Ad Hoc Guesting: When Exceptions Are the Rule 34 diana SmEt ters, BRinda dal al , Les NelSon, nathaniEl good, and amE Elliott Designing High-Performance Enterprise Wi-Fi Networks 41 Rohan muRt y, JitEndR a PadhyE, R anveer ChandRa, alec wolman, and BRian Zill “Standard Deviations” of the Average System Administrator 53 alVa CouCh CoLUMns Practical Perl Tools: Hi-ho the Merry-o, Debugging We Will Go 59 daVid n. Blank-EdElman Pete’s All Things Sun: Solaris System Analysis 101 65 PEtER BaER galVin iVoyeur: Hold the Pixels 70 daVE Josephsen Media Resource Control Protocol 75 hEiSon Chak /dev/random 79 Robert g. Ferrell BooK REVIEWS Book Reviews 82 EliZabeth ZwiCky Et al. USEniX NOTES Flame and STUG Awards 86 USENIX Association Financial Report for 2007 87 ConFERENCEs NSDI ’08 Reports 90 LEET ’08 Reports 105 BSDCan Reports 111 BSDCan 2008 FreeBSD Developer Summit 115 The Advanced Computing Systems Association AugCovers.indd 1 7/14/08 4:37:45 PM Upcoming Events 22n d La r g e In s t a ll a t I o n sy s t e m ad m I n I s t r a t I o n thi r d wo r k s H o p o n ta C k li n g Co m p u t e r Co n f e r e n C e (LISA ’08) sy s t e m s pr o b L e m s w I t H ma chi n e Le a r n I n g Sponsored by USENIX and SAGE te ch n I q u e s (sy s mL08) November 9–14, 2008, SaN Diego, Ca, USa Co-located with OSDI ’08 http://www.usenix.org/lisa08 DeCember 11, 2008, SaN Diego, Ca, USa http://www.usenix.org/sysml08 sy m p o s I u m o n Co m p u t e r Hu m a n In t e r a C t I o n Submissions due: September 26, 2008 f o r ma n a g e m e n t o f In f o r m a t I o n te ch n o L o g y (CHImIt ’08) 7t H USENIX Co n f e r e n C e o n fil e a n d st o r a g e Sponsored by ACM in association with USENIX te ch n o L o g I e s (FAST ’09) November 14–15, 2008, SaN Diego, Ca, USa Sponsored by USENIX in cooperation with ACM SIGOPS, IEEE Mass Storage Systems Technical Committee (MSSTC), http://www.chimit08.org and IEEE TCOS FebrUary 24–27, 2009, SaN Francisco, Ca, USa t H n t e r n a t I o n a L aCm/IfIp/USENIX 9 I http://www.usenix.org/fast09 mI d d L e w a r e Co n f e r e n C e (mI d d L e w a r e 2008) Paper submissions due: September 12, 2008 DeCember 1–5, 2008, LeUveN, beLgiUm http://middleware2008.cs.kuleuven.be 2009 aCm sIGPLAN/sIGOPS In t e r n a t I o n a L Co n f e r e n C e o n VI r t u a L eX e C u t I o n en vi r o n m e n t s fo u r t H wo r k s H o p o n Ho t to p ic s In sy s t e m (VEE ’09) de p e n d a b ili t y (Ho t de p ’08) Sponsored by ACM SIGPLAN and SIGOPS in cooperation with Co-located with OSDI ’08 USENIX DeCember 7, 2008, SaN Diego, Ca, USa marCh 11–13, 2009, WaShiNgtoN, D.C., USa http://www.usenix.org/hotdep08 http://www.cs.purdue.edu/VEE09/ Abstracts due: August 29, 2008 fI r s t USENIX wo r k s H o p o n t H e an a L y s I s o f sy s t e m Lo g s (WASL ’08) fI r s t USENIX wo r k s H o p o n Ho t to p ic s In Co-located with OSDI ’08 pa r a ll e li s m (Ho t pa r ’09) DeCember 7, 2008, SaN Diego, Ca, USa marCh 30–31, 2009, berkeLey, Ca http://www.usenix.org/wasl08 http://www.usenix.org/hotpar09 Paper submissions due: September 2, 2008 Submissions due: October 17, 2008 wo r k s H o p o n po w e r aw a r e Co m p u t I n g a n d 6t H USENIX sy m p o s I u m o n ne t w o r k e d sy s t e m s sy s t e m s (Ho t po w e r ’08) de s I g n a n d Im p L e m e n t a t I o n (NSDI ’09) Co-located with OSDI ’08 Sponsored by USENIX in cooperation with ACM SIGCOMM and ACM SIGOPS DeCember 7, 2008, SaN Diego, Ca, USa apriL 22–24, 2009, boStoN, MA, USa http://www.usenix.org/hotpower08 Paper submissions due: September 11, 2008 http://www.usenix.org/nsdi09 Paper titles and abstracts due: October 3, 2008 8t H USENIX sy m p o s I u m o n op e r a t I n g sy s t e m s 12t H wo r k s H o p o n Ho t to p ic s In op e r a t I n g de s I g n a n d Im p L e m e n t a t I o n (OSDI ’08) sy s t e m s (Ho t OS XII) Sponsored by USENIX in cooperation with ACM SIGOPS Sponsored by USENIX in cooperation with the IEEE Technical DeCember 8–10, 2008, SaN Diego, Ca, USa Committee on Operating Systems (TCOS)S http://www.usenix.org/osdi08 may 18–20, 2009, moNte verità, SWitzerLand http://www.usenix.org/hotos09 For a complete list of all USENIX & USENIX co-sponsored events, see http://www.usenix.org/events. AugCovers.indd 2 7/14/08 4:37:46 PM OPINION Musings 2 RIk Farrow SECURITY Storm: When Researchers Collide 6 Brandon Enright, Geoff VoelkER, stefan Savage, Chris Kanich, and Kirill LevchenkO Building a More Secure Web Browser 14 Chris Grier, shuO Tang, and Samuel t. King Withstanding Multimillion-node Botnets 22 Colin Dixon, thOm As ANderson, and Arvind contents KrishnamuRthy SYSADMin Ad Hoc Guesting: When Exceptions Are the Rule 34 Diana smEt ters, BrindA dAL AL , LEs Nelson, NAthaniel Good, and AmE Elliott Designing High-Performance Enterprise Wi-Fi Networks 41 ROhan muRt y, JItendra PAdhyE, R anveer Chandra, Alec Wolman, and Brian Zill “Standard Deviations” of the Average System Administrator 53 Alva COuCh VOL. 33, #4, August 2008 CoLUMns Practical Perl Tools: Hi-ho the Merry-o, Editor ;login: is the official Debugging We Will Go 59 Rik Farrow magazine of the David N. Blank-Edelman [email protected] USENIX Association. Pete’s All Things Sun: Solaris System ;login: (ISSN 1044-6397) is Managing Editor Analysis 101 65 Jane-Ellen Long published bi-monthly by the [email protected] USENIX Association, 2560 PEtER Baer Galvin Ninth Street, Suite 215, Copy Editor Berkeley, CA 94710. iVoyeur: Hold the Pixels 70 David Couzens DavE JOsEPhsEN [email protected] $90 of each member’s annual dues is for an annual sub- Media Resource Control Protocol 75 produCtion scription to ;login:. Subscrip- Heison ChAk Casey Henderson tions for nonmembers are Jane-Ellen Long $120 per year. /dev/random 79 Michele Nelson Robert G. Ferrell Periodicals postage paid at typEsEttEr Berkeley, CA, and additional Star Type offices. [email protected] BooK REVIEWS Book Reviews 82 POSTMASTER: Send address Elizabeth Zwicky Et al. USEniX assoCiation changes to ;login:, 2560 Ninth Street, USENIX Association, Suite 215, Berkeley, 2560 Ninth Street, USEniX NOTES California 94710 Suite 215, Berkeley, Flame and STUG Awards 86 Phone: (510) 528-8649 CA 94710. FAX: (510) 548-5738 USENIX Association Financial Report ©2008 USENIX Association for 2007 87 http://www.usenix.org http://www.sage.org USENIX is a registered trade- mark of the USENIX Associa- ConFERENCEs NSDI ’08 Reports 90 tion. Many of the designations used by manufacturers and LEET ’08 Reports 105 sellers to distinguish their products are claimed as trade- BSDCan Reports 111 marks. USENIX acknowledges BSDCan 2008 FreeBSD Developer Summit 115 all trademarks herein. Where those designations appear in this publication and USENIX is aware of a trademark claim, the designations have been printed in caps or initial caps. ;LOGIN: AuGust 2008 ARtICLE tItLE 1 login_AUG08_final.indd 1 7/14/08 4:35:56 PM I feel lIke I’ve fInally entered the future. I now have a microwave dish on my Rik Farrow rooftop, watch television using a computer, listen to radio from online streams, and am even installing my own solar power plant.
Recommended publications
  • The Design and Implementation of Multiprocessor Support for an Industrial Operating System Kernel
    Blekinge Institute of Technology Research Report 2005:06 The Design and Implementation of Multiprocessor Support for an Industrial Operating System Kernel Simon Kågström Håkan Grahn Lars Lundberg Department of Systems and Software School of Engineering Blekinge Institute of Technology The Design and Implementation of Multiprocessor Support for an Industrial Operating System Kernel Simon Kågström, Håkan Grahn, and Lars Lundberg Department of Systems and Software Engineering School of Engineering Blekinge Institute of Technology P.O. Box 520, SE-372 25 Ronneby, Sweden {ska, hgr, llu}@bth.se Abstract The ongoing transition from uniprocessor to multiprocessor computers requires support from the op- erating system kernel. Although many general-purpose multiprocessor operating systems exist, there is a large number of specialized operating systems which require porting in order to work on multipro- cessors. In this paper we describe the multiprocessor port of a cluster operating system kernel from a producer of industrial systems. Our initial implementation uses a giant locking scheme that serializes kernel execution. We also employed a method in which CPU-local variables are placed in a special sec- tion mapped to per-CPU physical memory pages. The giant lock and CPU-local section allowed us to implement an initial working version with only minor changes to the original code, although the giant lock and kernel-bound applications limit the performance of our multiprocessor port. Finally, we also discuss experiences from the implementation. 1 Introduction A current trend in the computer industry is the transition from uniprocessors to various kinds of multipro- cessors, also for desktop and embeddedsystems. Apart from traditional SMP systems, many manufacturers are now presenting chip multiprocessors or simultaneous multithreaded CPUs [9, 15, 16] which allow more efficient use of chip area.
    [Show full text]
  • Filesystem Performance on Freebsd
    Filesystem Performance on FreeBSD Kris Kennaway [email protected] BSDCan 2006, Ottawa, May 12 Introduction ● Filesystem performance has many aspects ● No single metric for quantifying it ● I will focus on aspects that are relevant for my workloads (concurrent package building) ● The main relevant filesystem workloads seem to be – Concurrent tarball extraction – Recursive filesystem traversals ● Aim: determine relative performance of FreeBSD 4.x, 5.x and 6.x on these workloads – Overall performance and SMP scaling – Evaluate results of multi-year kernel locking strategy as it relates to these workloads Outline ● SMP architectural differences between 4/5/6.x ● Test methodology ● Hardware used ● Parallel tarball extraction test – Disk array and memory disk ● Scaling beyond 4 CPUs ● Recursive filesystem traversal test ● Conclusions & future work SMP Architectural Overview ● FreeBSD 4.x; rudimentary SMP support – Giant kernel lock restricts kernel access to one process at a time – SPL model; interrupts may still be processed in parallel ● FreeBSD 5.x; aim towards greater scalability – Giant-locked to begin with; then finer-grained locking pushdown ● FreeBSD 5.3; VM Giant-free ● FreeBSD 5.4; network stack Giant-free (mostly) ● Many other subsystems/drivers also locked – Interrupts as kernel threads; compete for common locks (if any) with everything else ● FreeBSD 6.x; – Consolidation; further pushdown; payoff! – VFS subsystem, UFS filesystem Giant-free FreeBSD versions ● FreeBSD 4.11-STABLE (11/2005) – Needed for amr driver fixes after 4.11-RELEASE ● FreeBSD 5.4-STABLE (11/05) – No patches needed ● FreeBSD 6.0-STABLE (11/05) – patches: ● Locking reworked in amr driver by Scott Long for better performance ● All relevant changes merged into FreeBSD 6.1 – A kernel panic was encountered at very high I/O loads ● Also fixed in 6.1 Test aims and Methodology ● Want to measure – overall performance difference between FreeBSD branches under varying (concurrent process I/O) loads – scaling to multiple CPUs ● Avoid saturating hardware resources (e.g.
    [Show full text]
  • USENIX October Proof 3
    FOR THE PAST COUPLE OF MONTHS, I have become absorbed in operating sys- RIK FARROW tems. My quest began with some consult- ing regarding security features of the cur- rent Linux kernel, including SELinux, then plunged even deeper during the HotOS workshop. I do not pretend to be a kernel hacker, but I am very interested in what musings goes on with the design and implementa- Rik Farrow provides UNIX and Internet security con- tion of operating system software. sulting and training. He is the author of UNIX System Security and System Administrator’s Guide to System V and editor of the SAGE Short Topics in System Like some others, I had wondered what had hap- Administration series. pened to FreeBSD 4’s stellar performance when Free- [email protected] BSD 5 appeared. Instead of getting faster, FreeBSD was slower. If I had bothered digging deeper, I would have learned that this was the result of far-reaching changes in the FreeBSD kernel. Michael W. Lucas ex- plains these changes in his article, which in turn is based on a talk given by Robert Watson about modify- ing the kernel to support SMP (symmetric multipro- cessing). And perhaps by the time you read this col- umn, FreeBSD 6 will have appeared, ready to utilize the new multiprocessor cores that are popping up. Lucas explains just why the transition from single- threaded to multi-threaded kernel takes so long and is so hard to do right. I first understood the importance of the Big Giant Lock when I was reviewing an early multiprocessing server that used SPARC processors.
    [Show full text]
  • Amiga NG Nr 0
    Amiga.org.pl komputer Amiga współcześnie Spis treści AMIGA legenda informatyki 2 Retro 4 Emulacja 6 Współczesna Amiga nowej generacji 11 MorphOS 17 AROS 24 Amiga dzisiaj Zainteresowanie komputerem Amiga jest nieprzemijające. Niezależnie od tych, którzy mają Amigę “od zawsze”, biegnie współcześnie jej nieprzerwany rozwój, i to wielotorowo. Oprócz tego możemy cieszyć się różnymi hobbystycznymi rozwinięciami, pozwalającymi w sposób bardziej wygodny korzystać z rozrywki w formie retro. Amiga dzisiaj to “amigowanie”, wielka różnorodność i wiele smaków 1 Amiga retro AMIGA legenda informatyki AMIGA - pierwszy na świecie komputer multimedialny. Premiera w 1985 r. Wcześniej były inne innowacyjne konstrukcje (np. firmy Xerox czy Lisa firmy Apple) ale to Amiga wnosiła fenomenalną na ówczesne czasy grafikę, animację i dźwięk. Architektura komputera to specjalizowane układy odciążające procesor. artyści Andy Warhole i Debby Harry przy pierwszej Amidze Rewelacją był też wielozadaniowy system operacyjny. Prasa branżowa potraktowała wtedy Amigę jako zabawkę, nie wiadomo było co z tym robić. Ten pierwszy model nazywał się po prostu Amiga, potem nazywano go Amiga 1000. Projekt wraz z zespołem który go stworzył, z genialnym Jayem Minerem na czele, trafił pod skrzydła CBM (Commodore Business Machines), giganta w tamtym okresie jeśli chodzi o produkcję komputerów na świecie. Kolejne modele pojawiły się 2 lata później – dopiero one odniosły sukces. Amiga 2000 i Amiga 500, oparte na podobnych podzespołach, okienkowy graficzny interfejs – Workbench jednocześnie rozdzieliły pierwotną koncepcję na dwie linie komputerów – “duże” i “małe” Amigi. 2 Amiga retro “Duże” Amigi przypominały PC, były to desktopy, umożliwiające rozbudowę za pomocą kart rozszerzeń. Za sprawą rozszerzenia Video Toaster stały się na jakiś czas standardem w edycji wideo.
    [Show full text]
  • New Concept of the Android Keystore Service with Regard to Security and Portability
    University of Bremen Department of Mathematics and Computer Science New concept of the Android keystore service with regard to security and portability. Master’s Thesis by Fritjof Bornebusch reviewed by Dr. Karsten Sohr Prof. Dr. Jan Peleska supervised by Dipl. Inf. Florian Junge 2016 Confirmation I hereby confirm that I wrote this master thesis on my own and that I have used only the indicated references, resources, and aids. In German: Hiermit bestätige ich, dass ich die vorliegende Masterthesis selbstständig verfasst, und keine anderen als die angegebenen Quellen und Hilfsmittel verwendet habe. Bremen, 1/13/2016 Fritjof Bornebusch “Any fool can write code that a computer can understand. Good programmers write code that humans can understand.” – Martin Fowler – Bornebusch, Fritjof New concept of the Android keystore service with regard to security and portability. Master’s thesis, Department 3 - Mathematics / Computer Science University of Bremen, 2015 This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License (CC BY-NC-SA 4.0). To view a copy of this license, send an email to [email protected], visit http://creativecommons.org/licenses/by-nc-sa/4.0/ or send a letter to Creative Commons, PO Box 1866, Mountain View, California, 94042, USA. Table of Contents Acknowledgements 7 List of Figures 9 List of Listings 10 Acronyms 13 Glossary 15 1 Introduction 19 2 Background 24 2.1 Android System Architecture . 24 2.1.1 Security-Enhanced Linux . 28 2.1.2 Capabilities . 31 2.2 Memory Vulnerabilities . 32 2.2.1 Buffer Overflow Protection . 33 2.2.2 Dead Store Elimination .
    [Show full text]
  • Z/OS Openssh User's Guide
    z/OS Version 2 Release 4 z/OS OpenSSH User's Guide IBM SC27-6806-40 Note Before using this information and the product it supports, read the information in “Notices” on page 503. This edition applies to Version 2 Release 4 of z/OS (5650-ZOS) and to all subsequent releases and modifications until otherwise indicated in new editions. Last updated: 2020-11-16 © Copyright International Business Machines Corporation 2015, 2019. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Figures................................................................................................................. ix Tables.................................................................................................................. xi About this document...........................................................................................xiii Who should use this document?............................................................................................................... xiii z/OS information........................................................................................................................................xiii Discussion list...................................................................................................................................... xiii How to send your comments to IBM......................................................................xv If you have a technical problem.................................................................................................................xv
    [Show full text]
  • How Freebsd Boots: a Soft-Core MIPS Perspective Brooks Davis, Robert Norton, Jonathan Woodruff, Robert N
    How FreeBSD Boots: a soft-core MIPS perspective Brooks Davis, Robert Norton, Jonathan Woodruff, Robert N. M. Watson Abstract We have implemented an FPGA soft-core, multithreaded, 64-bit MIPS R4000-style CPU called BERI to support research on the hardware/software interface. We have ported FreeBSD to this platform including support for mul- tithreaded and soon multicore CPUs. This paper describes the process by which a BERI system boots from CPU startup through the boot loaders, hand off to the kernel, and en- abling secondary CPU threads. Historically, the process of booting FreeBSD has been documented from a user perspec- tive or at a fairly high level. This paper aims to improve the documentation of the low level boot process for developers aiming to port FreeBSD to new targets. 1. Introduction Figure 1: BERIpad with application launcher From its modest origins as a fork of 386BSD targeting Intel i386 class CPUs, FreeBSD has been ported to a range of architectures including DEC Alpha1, AMD x86_64 (aka The rest of this paper narrates the boot process with a amd64), ARM, Intel IA64, MIPS, PC98, PowerPC, and special focus on the places customization was required for Sparc64. While the x86 and Alpha are fairly homogeneous BERI. We begin by describing the BERI platform (Section targets with mechanics for detecting and adapting to spe- 2), and then in detail documents the kernel architecture- cific board and peripheral configurations, embedded systems specific boot process for FreeBSD on BERI: boot loader platforms like ARM, MIPS, and PowerPC are much more (Section 3) and kernel boot process (Section 4).
    [Show full text]
  • Real-Time Audio Servers on BSD Unix Derivatives
    Juha Erkkilä Real-Time Audio Servers on BSD Unix Derivatives Master's Thesis in Information Technology June 17, 2005 University of Jyväskylä Department of Mathematical Information Technology Jyväskylä Author: Juha Erkkilä Contact information: [email protected].fi Title: Real-Time Audio Servers on BSD Unix Derivatives Työn nimi: Reaaliaikaiset äänipalvelinsovellukset BSD Unix -johdannaisjärjestelmissä Project: Master's Thesis in Information Technology Page count: 146 Abstract: This paper covers real-time and interprocess communication features of 4.4BSD Unix derived operating systems, and especially their applicability for real- time audio servers. The research ground of bringing real-time properties to tradi- tional Unix operating systems (such as 4.4BSD) is covered. Included are some design ideas used in BSD-variants, such as using multithreaded kernels, and schedulers that can provide real-time guarantees to processes. Factors affecting the design of real- time audio servers are considered, especially the suitability of various interprocess communication facilities as mechanisms to pass audio data between applications. To test these mechanisms on a real operating system, an audio server and a client utilizing these techniques is written and tested on an OpenBSD operating system. The performance of the audio server and OpenBSD is analyzed, with attempts to identify some bottlenecks of real-time operation in the OpenBSD system. Suomenkielinen tiivistelmä: Tämä tutkielma kattaa reaaliaikaisuus- ja prosessien väliset kommunikaatio-ominaisuudet, keskittyen 4.4BSD Unix -johdannaisiin käyt- töjärjestelmiin, ja erityisesti siihen kuinka hyvin nämä soveltuvat reaaliaikaisille äänipalvelinsovelluksille. Tutkimusalueeseen sisältyy reaaliaikaisuusominaisuuk- sien tuominen perinteisiin Unix-käyttöjärjestelmiin (kuten 4.4BSD:hen). Mukana on suunnitteluideoita, joita on käytetty joissakin BSD-varianteissa, kuten säikeis- tetyt kernelit, ja skedulerit, jotka voivat tarjota reaaliaikaisuustakeita prosesseille.
    [Show full text]
  • Computer Architectures an Overview
    Computer Architectures An Overview PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information. PDF generated at: Sat, 25 Feb 2012 22:35:32 UTC Contents Articles Microarchitecture 1 x86 7 PowerPC 23 IBM POWER 33 MIPS architecture 39 SPARC 57 ARM architecture 65 DEC Alpha 80 AlphaStation 92 AlphaServer 95 Very long instruction word 103 Instruction-level parallelism 107 Explicitly parallel instruction computing 108 References Article Sources and Contributors 111 Image Sources, Licenses and Contributors 113 Article Licenses License 114 Microarchitecture 1 Microarchitecture In computer engineering, microarchitecture (sometimes abbreviated to µarch or uarch), also called computer organization, is the way a given instruction set architecture (ISA) is implemented on a processor. A given ISA may be implemented with different microarchitectures.[1] Implementations might vary due to different goals of a given design or due to shifts in technology.[2] Computer architecture is the combination of microarchitecture and instruction set design. Relation to instruction set architecture The ISA is roughly the same as the programming model of a processor as seen by an assembly language programmer or compiler writer. The ISA includes the execution model, processor registers, address and data formats among other things. The Intel Core microarchitecture microarchitecture includes the constituent parts of the processor and how these interconnect and interoperate to implement the ISA. The microarchitecture of a machine is usually represented as (more or less detailed) diagrams that describe the interconnections of the various microarchitectural elements of the machine, which may be everything from single gates and registers, to complete arithmetic logic units (ALU)s and even larger elements.
    [Show full text]
  • Efika MX Smarttop Manual
    E N G L I S H E S P A Ñ O L F R A N Ç A I S D E U T S C H Congratulations on purchasing an Efika MX Cloud Computer. S U P P O R T For access to software updates, product news and our development blog, please visit www.efikamx.info For technical discussions, developer support and resources, please visit www.powerdeveloper.org Package Contents Before you set up your computer, please ensure that your product package includes the following items. • Efika MX Cloud Computer (Smarttop) • User Manual • AC Adapter & Power Cord First Use Instructions Before you use your Efika MX Cloud Computer for the first time, please read the safety chapter included in this user manual. Software Information The default username and password on the provided OS installation is as follows. Username: oem Password: oem For additional documentation about your operating system, please visit www.efikamx.info Product Overview Power Button 3G SIM Slot USB Ports SD / MMC Card Slot DC-IN HDMI RJ45 Audio Out Mic In (Display) (Ethernet) Product Specifications Processor Freescale i.MX515, 800MHz Memory DDR2 512MB, up to 200MHz Graphics & Video Embedded 2D / 3D AMD Core Module Hardware Video Codec Full HW accelerated HD720 playback Display Modes HDMI (version 1.2a) 720P Memory Card MMC, SD, push / push type, by esdhc Slot (Enhanced Multi-Media Card Secure Digital Host Controller) Storage Device SSD 8G Connectivity Ethernet support (default) WLAN 802.11 b/g/n support (optional) or 3G / UMTS support (optional) LED Status Booting (Blue) Indicator System on (Green) DISK IO (flickering) Interface 1x RJ 45 (10/100M) 1 x Audio jack : Audio out 1 x Mic - In 1x DC - In 2x USB 2.0 ports 1x HDMI port 1x SIM slot (optional with WWAN SKU) 20 pin connector for debugging (optional) Audio 1x Built-in speaker (1.5 W) Power Max power consumption: 15 watt Management Power off: Press 4 times AC adapter Output: 12V DC, 3A, 36W Input : 100~240V AC, 50 - 60Hz universal Dimensions / Size: 160*115mm Weight Height: 20mm Weight 250g Temperature Working: 0°C~+40°C Step-by-Step Setup 1.
    [Show full text]
  • Evaluating Locking Schemes in the Freebsd Kernel
    Evaluating Locking Schemes in the FreeBSD Kernel james francis toy iv Advisor: David Hemmendinger 20100321 Abstract This project is concerned with locking strategies in the FreeBSD unix kernel. Locks prevent race conditions in a multi-programming environ- ment. At present the FreeBSD kernel employs a GIANT_LOCK to pre- vent race conditions by locking access to the entire kernel. This method may inhibit concurrency; however, it is a simple and easy way to ensure correctness. The goal of this project is to see if fine-grained locking (FGL), an alternative to the GIANT_LOCK, promotes concurrency and through- put by locking only critical shared resources. FGL was implemented for two kernel subsystems, and we measured the time that a thread was wait- ing to acquire a lock; FGL showed zero wait time and the GIANT_LOCK showed non-zero wait time. 1 An Introduction to Locking Locking and synchronization were developed to prevent processes from interfer- ing with one another when having access to shared resources. This is important because in a multi-threaded environment these situations often arise since it is more efficient to execute programs in parallel. This contention for shared data is more commonly described as a “race condition” where multiple pro- cesses are racing to a shared resource. These race conditions can be resolved by mutual exclusion (ensures only one process is using a shared resource at a time) which is behavior provided by the locking mechanisms currently employed by the FreeBSD kernel. The purpose of this project is to analyze the current locking scheme in the FreeBSD kernel; attempt to implement a more efficient 1 locking method, and compare the initial method versus the proposed method in this project.
    [Show full text]
  • LIBRARIES Building a Global Information Assurance Program.Pdf
    Building a Global Information Assurance Program OTHER AUERBACH PUBLICATIONS The ABCs of IP Addressing Information Security Management Gilbert Held Handbook, 4th Edition, Volume 4 ISBN: 0-8493-1144-6 Harold F. Tipton and Micki Krause, Editors The ABCs of TCP/IP ISBN: 0-8493-1518-2 Gilbert Held Information Security Policies, ISBN: 0-8493-1463-1 Procedures, and Standards: Building an Information Security Guidelines for Effective Information Awareness Program Security Management Mark B. Desman Thomas R. Peltier ISBN: 0-8493-0116-5 ISBN: 0-8493-1137-3 Building a Wireless Office Information Security Risk Analysis Gilbert Held Thomas R. Peltier ISBN: 0-8493-1271-X ISBN: 0-8493-0880-1 The Complete Book of Middleware A Practical Guide to Security Engineering Judith Myerson and Information Assurance ISBN: 0-8493-1272-8 Debra Herrmann ISBN: 0-8493-1163-2 Computer Telephony Integration, 2nd Edition The Privacy Papers: William A. Yarberry, Jr. Managing Technology and Consumers, ISBN: 0-8493-1438-0 Employee, and Legislative Action Rebecca Herold Cyber Crime Investigator’s Field Guide ISBN: 0-8493-1248-5 Bruce Middleton ISBN: 0-8493-1192-6 Secure Internet Practices: Best Practices for Securing Systems in Cyber Forensics: A Field Manual for the Internet and e-Business Age Collecting, Examining, and Preserving Patrick McBride, Jody Patilla, Evidence of Computer Crimes Craig Robinson, Peter Thermos, Albert J. Marcella and Robert S. Greenfield, and Edward P. Moser Editors ISBN: 0-8493-1239-6 ISBN: 0-8493-0955-7 Securing and Controlling Cisco Routers Global Information Warfare: Peter T. Davis How Businesses, Governments, and ISBN: 0-8493-1290-6 Others Achieve Objectives and Attain Competitive Advantages Securing E-Business Applications and Andy Jones, Gerald L.
    [Show full text]