{"id":6578,"date":"2006-10-23T21:01:05","date_gmt":"2006-10-23T19:01:05","guid":{"rendered":"https:\/\/destinationcyber.com\/?p=6578"},"modified":"2006-10-23T21:01:05","modified_gmt":"2006-10-23T19:01:05","slug":"les-services-rd-dintel-annoncent-la-fin-des-virus-spywares-codes-malicieux-et-autres-menaces-de-securite","status":"publish","type":"post","link":"https:\/\/destinationcyber.com\/?p=6578","title":{"rendered":"Les services R&#038;D d&rsquo;Intel annoncent la fin des virus, spywares, codes malicieux et autres menaces de s\u00e9curit\u00e9"},"content":{"rendered":"<p>La technologie TXT (Trusted Execution Technology) d&rsquo;Intel associe une cl\u00e9 mat\u00e9rielle \u00e0 des sous syst\u00e8mes afin de contr\u00f4ler quelle partie des ressources de l&rsquo;ordinateur est accessible sans danger et quelle autre repr\u00e9sente un danger.<\/p>\n<p>La protection d&rsquo;ex\u00e9cution (PE), qui prot\u00e8ge une application qui s&rsquo;ex\u00e9cute dans un environnement prot\u00e9g\u00e9 des autres applications qui tournent sur la m\u00eame plate-forme, en affectant \u00e0 chaque application ses propres ressources.<\/p>\n<p>La protection des graphiques, PE prot\u00e8ge en effet aussi par cryptage le cheminement des donn\u00e9es jusqu&rsquo;aux composants graphiques, ce qui en interdit l&rsquo;observation par du code non autoris\u00e9.<\/p>\n<p>Avec ces composants de TXT, les processeurs disposeront d&rsquo;espaces d&rsquo;ex\u00e9cution appel\u00e9s partitions, proches du concept de partition sur le disque dur, qui pourront \u00eatre labellis\u00e9s prot\u00e9g\u00e9 ou non prot\u00e9g\u00e9, et qui pourront coexister avec l&rsquo;actuelle legacy des partitions standard non prot\u00e9g\u00e9es.<\/p>\n<p>Fanch<\/p>\n","protected":false},"excerpt":{"rendered":"<p>La technologie TXT (Trusted Execution Technology) d&rsquo;Intel associe une cl\u00e9 mat\u00e9rielle \u00e0 des sous syst\u00e8mes afin de contr\u00f4ler quelle partie des ressources de l&rsquo;ordinateur est accessible sans danger et quelle autre repr\u00e9sente un danger. La protection d&rsquo;ex\u00e9cution (PE), qui prot\u00e8ge une application qui s&rsquo;ex\u00e9cute dans un environnement prot\u00e9g\u00e9 des autres applications qui tournent sur la [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_citadela_custom_class":"","footnotes":""},"categories":[15],"tags":[],"class_list":["post-6578","post","type-post","status-publish","format-standard","hentry","category-securite"],"_links":{"self":[{"href":"https:\/\/destinationcyber.com\/index.php?rest_route=\/wp\/v2\/posts\/6578","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/destinationcyber.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/destinationcyber.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/destinationcyber.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/destinationcyber.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=6578"}],"version-history":[{"count":0,"href":"https:\/\/destinationcyber.com\/index.php?rest_route=\/wp\/v2\/posts\/6578\/revisions"}],"wp:attachment":[{"href":"https:\/\/destinationcyber.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=6578"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/destinationcyber.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=6578"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/destinationcyber.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=6578"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}