Archive for January, 2010

System requiremnet for cloud hosting.


No Hardware Virtualization

This processor does not offer advanced hardware support for hardware virtualization.

There is some suggestion that future operating systems of all sorts (Linux, Mac, Windows, etc.) may be able to use hardware virtualization to indirectly enforce greater security upon the operating system’s “kernel” by preventing it from being modified as a means for thwarting dangerous “root kit” style exploits.

The idea is that our future operating systems would always be running inside a virtual machine under the watchful eye of an OS “hypervisor.” This has not been practical before now, without hardware support for virtualization, because virtualization required too much real-time involvement of software which introduced an unacceptable amount of overhead and slowed everything down. Hardware virtualization means that virtual machines – and even the entire operating system running inside a virtual machine container – would be able to run at 100% full speed, thus making a persistent security-oriented OS “hypervisor” practical for the first time.

But don’t hope for this to ever help with the security of 32-bit Windows platforms. Due to the amount of kernel modification already being done by benign kernel drivers in 32-bit versions of Windows, “hypervisory kernel locking” could only ever be implemented under 64-bit versions of Windows where kernel modification has always been actively prohibited. And due to serious compatibility problems inherent in 64-bit systems, it’s also not at all clear (at the start of 2007) how quickly, or even whether, 64-bit Windows will become practical on the desktop.

However, the other current and real security-related application for hardware virtualization is for running your own virtual machines – at 100% full speed – on top of your host operating system. This is possible today with commercial and completely free software from Microsoft, VMware and Parallels. This has an indirect, though strongly positive, impact upon security since possibly unsafe activities such as Internet surfing or peer-to-peer file sharing can be 100% contained within the virtual environment to make online activities much safer.

This can still be done, of course, without hardware virtualization support, but the virtual machine environment as well as the hosting operating system will be running at substantially less than full speed.

Hardware DEP Available

This processor does support hardware-based data execution prevention (DEP).

When hardware DEP support is teamed up with a properly configured operating system (and that part is crucial), computer security mistakes involving the deliberate overrunning of communications buffers can be automatically detected and prevented throughout the entire computer system. This makes data execution prevention, when available and active, the single most promising improvement for PC security ever. Really.

It is very important to note, however, that hardware support for DEP is only one of several enabling requirements that must be met before any benefit can be obtained. GRC will be following up the release of SecurAble with another powerful tool, DEPuty, that will help to properly configure, test and verify the operation of your system’s critical DEP subsystem.

64-Bit Processing Available

This processor does offer 64-bit modes of operation. This means that this system is able to run the significantly more secure 64-bit versions of Microsoft’s Windows XP and Vista operating systems.

The biggest challenge for 64-bit Windows systems is the fact that existing 32-bit device drivers cannot be used by the 64-bit operating system kernel. So if you do plan to try switching to 64-bit Windows, you should be sure to have a means for reverting to 32-bit operation if your system’s hardware turns out to be incompatible with 64-bit operation. Many people have reverted to 32-bit operation after bravely giving 64-bits a try for a short time.

Bellwort Technologies Blog


Tools ‹ Bellwort’s Blog — WordPress.

www.pioneerchamps.blogspot.com


http://www.pioneerchamps.blogspot.com

DO THE COMMON TASK IN AN UNCOMMON WAY.


“DO THE COMMON TASK IN AN UNCOMMON WAY”

JAGGI

TOP 100 SITES OF INDIA


You can click here for any site to entertain yourself of top most 100 sites of INDIA
Google

Yahoo

Orkut India

YouTube

Rediff

Facebook

Wikipedia

Windows Live

MSN

Indiatimes

Rapidshare

Cricinfo

WordPress

Microsoft

IN

Naukri.com

IRCTC

Double Click

Bharat Student

Orkut

Sify

MetaCafe

Komli

Debonairblog

IMDB

ICICI Bank

Tribalfusion

Flickr

HDFC Bank

MoneyControl

Bp.blogspot.com

Indian Railways

Ask.com

Monster India

Exbii.com

About

Clicksor

Miniova

Sulekha

OneIndia.in

Admagnet.net

Amazon.com

CNET.com

Google UK

Scribd.com

LinkedIn

Torrentz

NDTV

Fastclick

EBay India

Paypopup.com

Hi5

BBC Newsline Ticker

Adobe

Shaadi

Ibibo.com

Justdial.com

Travian.in

Savitabhabhi.com

Photobucket

EzineArticles.com

Tagged

CNET Download.com

Answers.com

Conduit.com

Adult Friendfinder

Masala Talk

Santabanta.com

Way2SMS

Songs.pk

Guruji.com

The Pirate Bay

Myspace

Pornhub.com

Jeevansathi.com

AOL

Rediffmail.com

Times Jobs & Careers

Dailymotion

Clickindia.com

BharatMatrimony.com

A World of Music – Raaga.com

Bharat Sanchar Nigam Ltd.

Bharat Sanchar Nigam Limited

Onlinesbi.com

Easy Share

EBay

Mixx.com

ImageVenue hosting

Airtel.in

Hindu.com

Clicksor.net

Eenadu

MediaFire

Zapak.com

Ziddu.com

Humsurfer.com

Fsiblog.com

This list is based on Alexa traffic ranking. If you observe carefully this list, you will find most of the high traffic websites in India are related to Social Networking, Videos and Songs, Bollywood, porn sites, Job sites, Banking, SMS, News websites, mobile phone companies, online file sharing, torrents etc.

HI……. WHAT IS SIX SIGMA.


HI…….
WHAT IS SIX SIGMA.

WELCOME TECHS…..


ALL INFORMATION UNDER ONE ROOF. BY USING THIS TREND WE ARE TRYING HERE TO PROVIDE INFORMATION ON VARIOUS TOPICS. SPECIALLY TO THE TECH’S PEOPLE, WHERE THEY GET LATEST UPDATE FROM THE INDUSTRY, SECURITY,MARKET ANALYSIS AND MUCH MORE.

SO WE ARE HERE AT BELLWORT READY TO PROVIDE THIS.

%d bloggers like this: