JMH
Banned
Source -Earlier today, Core Security Technologies issued a security advisory for our Virtual PC (VPC) software. The advisory calls out a proof of concept where the virtual machine monitor allows memory pages above the 2GB level to be read from or written to by user-space programs running within a guest operating system. The advisory explicitly calls into question the effectiveness of many of the security hardening features of Windows, including DEP, SafeSEH, and ASLR. Folks are already starting to ask questions about this advisory, so I thought it would be best to answer them here.
Vulnerability in Virtual PC? - Windows Security Blog - The Windows Blog
My Computer
System One
-
- Manufacturer/Model
- LAPTOP. HP Pavilion dv7-1005TX .
- CPU
- IntelCore [email protected] x2
- Memory
- 4.00 GB installed, max capacity 8 GB.
- Graphics card(s)
- Nvidia GeForce 9600M GT & 512MB DDR2 dedicated graphics mem.
- Monitor(s) Displays
- 17.0" diagonal WXGA + High definition brightview widescreen infinity display.
- Screen Resolution
- 1440 x 900
- Hard Drives
- SPECS. Drive 1. 298.09 GB Fujitzu MHZ2320BH G2 ATA Device Drive 2. [ All as above.] CONFIG. C:\287.65 GB, D:\298.09 GB, E:\10.44 GB.
- Case
- Laptop / notebook.
- Cooling
- Stock.
- Mouse
- Synaptics PS/2 Port touch pad.
- Keyboard
- IBM enhanced
- Internet Speed
- ADSL [ Too slow.]
- Other Info
- Webcam.