Transmeta pledges 'no execute' security support

Efficeon to handle WinXP SP2 security system


Transmeta today claimed that its Efficeon chip will be the first "energy-efficient" processor to support the oft-touted 'no execute' NX instruction required by Windows XP Service Pack 2's anti-virus sub-system.

So it either missed AMD's low-power Athlon 64 launch t'other week, or it doesn't believe that the mobile 64-bit CPUs are energy-efficient.

AMD's 64-bit processors have supported NX since launch. Intel's Itanium chips support the feature, too, as will future 64-bit Pentium and Xeon processors, the chip giant revealed last week - though Intel is calling it 'XD' rather than NX.

Transmeta's support for NX will come mid-2004 when it launches "new Efficeon processors scheduled to ship in mid-year 2004". The current version, the 130nm TM8600, was launched last October. A 90nm version of the part - the TM8800 - is due during the second half of the year. It's not clear whether Transmeta's statement that it will support NX with a revised 130nm part or today's statement marks a narrowing of the TM8800's launch window.

Either way, adding NX will allow Windows XP SP2 to prevent viruses and worms from executing code stored in areas memory marked for data rather than executables.

Of course, doing so is relatively easy for Transmeta, which simply needs to tweak its Code Morphing software to add NX support. Code Morphing translates inbound x86 instructions into the Efficeon's native Very Long Instruction Word (VLIW) instructions at run-time.

Transmeta is this month providing Microsoft with advance versions of Efficeon-based systems with NX support for internal evaluation and use, the chip maker said. ®

Related stories

Transmeta sales rise as Efficeon interest grows
Transmeta's 90nm Efficeon to sample January '04
Transmeta plots Efficeon roadmap to 2GHz
AMD delivers on low-power Athlon 64 pledge
Microsoft irks ISVs with XP SP2 delay


Other stories you might like

  • AsmREPL: Wing your way through x86-64 assembly language

    Assemblers unite

    Ruby developer and internet japester Aaron Patterson has published a REPL for 64-bit x86 assembly language, enabling interactive coding in the lowest-level language of all.

    REPL stands for "read-evaluate-print loop", and REPLs were first seen in Lisp development environments such as Lisp Machines. They allow incremental development: programmers can write code on the fly, entering expressions or blocks of code, having them evaluated – executed – immediately, and the results printed out. This was viable because of the way Lisp blurred the lines between interpreted and compiled languages; these days, they're a standard feature of most scripting languages.

    Patterson has previously offered ground-breaking developer productivity enhancements such as an analogue terminal bell and performance-enhancing firmware for the Stack Overflow keyboard. This only has Ctrl, C, and V keys for extra-easy copy-pasting, but Patterson's firmware removes the tedious need to hold control.

    Continue reading
  • Microsoft adds Buy Now, Pay Later financing option to Edge – and everyone hates it

    There's always Use Another Browser

    As the festive season approaches, Microsoft has decided to add "Buy Now, Pay Later" financing options to its Edge browser in the US.

    The feature turned up in recent weeks, first in beta and canary before it was made available "by default" to all users of Microsoft Edge version 96.

    The Buy Now Pay Later (BNPL) option pops up at the browser level (rather than on checkout at an ecommerce site) and permits users to split any purchase between $35 and $1,000 made via Edge into four instalments spread over six weeks.

    Continue reading
  • Visiting a booby-trapped webpage could give attackers code execution privileges on HP network printers

    Patches available for 150 affected products

    Tricking users into visiting a malicious webpage could allow malicious people to compromise 150 models of HP multi-function printers, according to F-Secure researchers.

    The Finland-headquartered infosec firm said it had found "exploitable" flaws in the HP printers that allowed attackers to "seize control of vulnerable devices, steal information, and further infiltrate networks in pursuit of other objectives such as stealing or changing other data" – and, inevitably, "spreading ransomware."

    "In all likelihood, a lot of companies are using these vulnerable devices," said F-Secure researchers Alexander Bolshev and Timo Hirvonen.

    Continue reading

Biting the hand that feeds IT © 1998–2021