• chevron_right

      Long gone, DEC is still powering the world of computing

      news.movim.eu / ArsTechnica · Friday, 6 October - 11:30

    A DEC VAX 8350 with cover removed.

    Enlarge / A DEC VAX 8350 with cover removed. (credit: Adamantios )

    Even though very few of the early players in technology still exist, we use their creations to this day. Bell Labs created the transistor, and Fairchild Semiconductor created the integrated circuit, but neither company is still around. So is the case with Digital Equipment Corporation (DEC). It no longer exists, but unless you're using a handheld device to read this article, you're using a descendant of DEC technology.

    DEC was founded in 1957 by Ken Olsen, Harlan Anderson, and H. Edward Roberts to build small digital modules, but the team soon discovered that they could use those modules to build minicomputers—computers that were smaller and less powerful (but cheaper) than mainframes, which were the business standard at the time.

    In 1977, DEC introduced the VAX, a new line of minicomputers that featured a 32-bit instruction set architecture and virtual memory. Its operating system, VMS, was a multi-user, multitasking OS that provided features we now take for granted, including virtual memory, file sharing, and networking. It amassed a wide variety of third-party software packages that made it the most popular system in its class.

    Read 43 remaining paragraphs | Comments

    • chevron_right

      Mystery hackers are “hyperjacking” targets for insidious spying

      news.movim.eu / ArsTechnica · Friday, 30 September, 2022 - 15:22 · 1 minute

    Mystery hackers are “hyperjacking” targets for insidious spying

    Enlarge (credit: Marco Rosario Venturini Autieri/Getty Images)

    For decades, virtualization software has offered a way to vastly multiply computers’ efficiency, hosting entire collections of computers as “virtual machines” on just one physical machine. And for almost as long, security researchers have warned about the potential dark side of that technology: theoretical “hyperjacking” and “Blue Pill” attacks, where hackers hijack virtualization to spy on and manipulate virtual machines, with potentially no way for a targeted computer to detect the intrusion. That insidious spying has finally jumped from research papers to reality with warnings that one mysterious team of hackers has carried out a spree of “hyperjacking” attacks in the wild.

    Today, Google-owned security firm Mandiant and virtualization firm VMware jointly published warnings that a sophisticated hacker group has been installing backdoors in VMware’s virtualization software on multiple targets’ networks as part of an apparent espionage campaign. By planting their own code in victims’ so-called hypervisors—VMware software that runs on a physical computer to manage all the virtual machines it hosts—the hackers were able to invisibly watch and run commands on the computers those hypervisors oversee. And because the malicious code targets the hypervisor on the physical machine rather than the victim’s virtual machines, the hackers’ trick multiplies their access and evades nearly all traditional security measures designed to monitor those target machines for signs of foul play.

    Read 10 remaining paragraphs | Comments