site
Friday, 29 June 2012
Thursday, 28 June 2012
NTFS and FAT
What is NTFS and FAT?
NTFS
NTFS (New Technology File System). It was Introduced
in July 1993 (Windows NT 3.1)
An advanced file system that provides performance,
security, reliability, and advanced features that are not found in any
version of FAT. For example, NTFS guarantees volume consistency by using
standard transaction logging and recovery techniques. If a system
fails, NTFS uses its log file and checkpoint information to restore the
consistency of the file system. In Windows 2000 and Windows XP, NTFS
also provides advanced features such as file and folder permissions,
encryption, reliability, disk space utilization, plus additional extensions, compression. such as security access control lists (ACL) and file system journaling.
File Allocation Table (FAT)
A file system used by MS-DOS and other Windows-based operating systems to organize and manage files. The file allocation table (FAT) is a data structure that Windows creates when you format a volume by using the FAT or FAT32 file systems.
A derivative of the file allocation table (FAT) file system. FAT32 supports smaller cluster sizes and larger volumes than FAT, which results in more efficient space allocation on FAT32 volumes.
A file system used by MS-DOS and other Windows-based operating systems to organize and manage files. The file allocation table (FAT) is a data structure that Windows creates when you format a volume by using the FAT or FAT32 file systems.
The FAT file system is a legacy filesystem which is very simple, but
cannot offer the same performance, reliability and scalability that
modern filesystems such as NTFS, ext4 and btrfs can offer. It is however supported for compatibility reasons by virtually all existing operating systems for personal computers,
and thus is a well-suited format for data exchange between computers
and devices of almost any type and age from the early 1980s up to the
present.
Today, FAT file systems are still commonly found on floppy disks, solid-state memory cards, flash memory cards, and on many portable and embedded devices.
FAT32
A derivative of the file allocation table (FAT) file system. FAT32 supports smaller cluster sizes and larger volumes than FAT, which results in more efficient space allocation on FAT32 volumes.
NTFS vs FAT
* NTFS Removal of the limitations of the FAT and HPFS file systems
* NTFS is much faster than FAT32, it fragments less, and has a 4k cluster size which matches the rocessors paging size.
* NTFS is safer than FAT32, because it allows the use of per file permissions. Real file ownership limits access to files to their ownersup to 4GB in size.
* Allows you to have files in any size, that is, if you have 200GB of free space, then you can have a 200GB file, compared to a maximum of 4GB on fat32.
* NTFS is safer than FAT32, because it allows the use of per file permissions. Real file ownership limits access to files to their ownersup to 4GB in size.
* Allows you to have files in any size, that is, if you have 200GB of free space, then you can have a 200GB file, compared to a maximum of 4GB on fat32.
Converting FAT volumes to NTFS
To convert a volume to NTFS from the command prompt
-
Open Command Prompt. Click Start, point to All Programs, point to Accessories, and then click Command Prompt.
-
In the command prompt window, type: convert drive_letter: /fs:ntfs
C:\>CONVERT C: /fs:ntfs
For example, typing convert C: /fs:ntfs would format drive D: with the ntfs format. You can convert FAT or FAT32 volumes to NTFS with this command.
Now you are recommended to restart the system. After Restart the System you will get message NTFS converted Succesfully.
Warning Converting file system can be cause of losing the data.
Important Once you convert a drive or partition to
NTFS, you cannot simply convert it back to FAT or FAT32. You will need
to reformat the drive or partition which will erase all data, including
programs and personal files, on the partition.
Wednesday, 27 June 2012
64 bit Microarchitecture
Index
64 bit Micro architecture Based
-Core 2 Solo
-Core 2 Duo
-Core 2 Quad
-Core 2 Extreme
Core 2 Solo
The Core 2 Solo, introduced in September 2007, is the successor to the Core Solo and is available only as an ultra-low-power mobile processor with 5.5 Watt thermal design power. The original U2xxx series "Merom-L" used a special version of the Merom chip with CPUID number 10661 (model 22, stepping A1) that only had a single core and was also used in some Celeron processors. The later SU3xxx are part of Intel's CULV range of processors in a smaller µFC-BGA 956 package but contain the same Penryn chip as the dual-core variants, with one of the cores disabled during manufacturing.
Core 2 Duo
The majority of the desktop and mobile Core 2 processor variants are Core 2 Duo[8][9] with two processor cores on a single Merom, Conroe, Allendale, Penryn, or Wolfdale chip. These come in a wide range of performance and power consumption, starting with the relatively slow ultra-low-power Uxxxx (10 W) and low-power Lxxxx (17 W) versions, to the more performance oriented Pxxxx (25 W) and Txxxx (35 W) mobile versions and the Exxxx (65 W) desktop models. The mobile Core 2 Duo processors with an 'S' prefix in the name are produced in a smaller µFC-BGA 956 package, which allows building more compact laptops.
Within each line, a higher number usually refers to a better performance, which depends largely on core and front-side bus clock frequency and amount of second level cache, which are model-specific. Core 2 Duo processors typically use the full L2 cache of 2, 3, 4, or 6 MB available in the specific stepping of the chip, while versions with the amount of cache reduced during manufacturing are sold for the low-end consumer market as Celeron or Pentium Dual-Core processors. Like those processors, some low-end Core 2 Duo models disable features such as Intel Virtualization Technology. Details can be found at the list of Intel Core 2 microprocessors.
Core 2 Quad
Core 2 Quad processors are multi-chip modules consisting of two dies similar to those used in Core 2 Duo, forming a quad-core processor. This allows twice the performance of a dual-core processors at the same clock frequency in ideal conditions.
Initially, all Core 2 Quad models were versions of Core 2 Duo desktop processors, Kentsfield derived from Conroe and Yorkfield from Wolfdale, but later Penryn-QC was added as a high-end version of the mobile dual-core Penryn.
The Xeon 32xx and 33xx processors are mostly identical versions of the desktop Core 2 Quad processors and can be used interchangeably.
Core 2 Extreme
Core 2 Extreme processors[12][13] are enthusiast versions of Core 2 Duo and Core 2 Quad processors, usually with a higher clock frequency and an unlocked clock multiplier, which makes them especially attractive for overclocking. This is similar to earlier Pentium processors labeled as Extreme Edition. Core 2 Extreme processors were released at a much higher price than their regular version, often $999 or more.
Where Brand Name Core 2 extreme X6800 available with highest frequency 2.93 MHz, L2 Cache 4 MB,Socket LGA 775, Released on july 2006 with Price $999.
and
odel Brand Name Mobile Core 2 Extreme X9xxx, L2 Cache 6 MB, Socket P
X86 & X86-64
x86 Designer Intel, AMD
Bits 16-bit, 32-bit, and/or 64-bit
Introduced 1978
Design CISC
Type Register-memory
Encoding Variable (1 to 15 bytes)
Branching Status register
Endianness Little
Page size 8086–i286: None i386, i486: 4 kB pages P5 Pentium: added 4 MB pages (Legacy PAE: 4 kB?2 MB) x86-64: added 1 GB pages.
Extensions x87, IA-32, P6, MMX, SSE, SSE2, x86-64, SSE3, SSSE3, SSE4, SSE5, AVX
see Itanium.
x86-64 is an extension of the x86 instruction set. It supports vastly larger virtual and physical address spaces than are possible on x86, thereby allowing programmers to conveniently work with much larger data sets. x86-64 also provides 64-bit general purpose registers and numerous other enhancements. The original specification was created by AMD, and has been implemented by AMD, Intel, VIA, and others. It is fully backwards compatible with Intel x86 16-bit and 32-bit code.[1](p13-14) Because the full x86 16-bit and 32-bit instruction sets remains implemented in hardware without any intervening emulation, existing x86 executables run with no compatibility or performance penalties,[2] although existing applications that are recoded to take advantage of new features of the processor design may see performance increases.
AMD's method of extending Intel's x86 32-bit instruction set to be a subset of its x86-64 instruction set is the same technique Intel employed to extend its 16-bit x86 instruction set to 32-bits.
Prior to launch, "x86-64" and "x86_64" were used to refer to the instruction set. Upon release, AMD named it AMD64[3] Intel initially used the names IA-32e and EM64T before finally settling on Intel 64 for their implementation. x86-64 is still used by many in the industry, while others, notably Sun Microsystems[4] (now Oracle Corporation) and Microsoft,[5] use x64 while the BSD family of OS's use AMD64.
64-bit Core microarchitecture based
The successor to Core is the mobile version of the Intel Core 2 line of processors using cores based upon the Intel Core microarchitecture,[6] released on July 27, 2006. The release of the mobile version of Intel Core 2 marks the reunification of Intel's desktop and mobile product lines as Core 2 processors were released for desktops and notebooks, unlike the first Intel Core CPUs that were targeted only for notebooks (although some small form factor and all-in-one desktops, like the iMac and the Mac Mini, also used Core processors).
Unlike the Intel Core, Intel Core 2 is a 64-bit processor, supporting Intel 64. Another difference between the original Core Duo and the new Core 2 Duo is an increase in the amount of Level 2 cache. The new Core 2 Duo has tripled the amount of on-board cache to 6 MB. Core 2 also introduced a quad-core performance variant to the single- and dual-core chips, branded Core 2 Quad, as well as an enthusiast variant, Core 2 Extreme. All three chips are manufactured at a 65 nm lithography, and in 2008, a 45 nm lithography and support Front Side Bus speeds ranging from 533 MHz to 1600 MHz. In addition, the 45 nm die shrink of the Core microarchitecture adds SSE4.1 support to all Core 2 microprocessors manufactured at a 45 nm lithography, therefore increasing the calculation rate of the processors.
Hacking Tools
vulnerability
In computer security, a vulnerability is a weakness which allows an attacker to reduce a system's information assurance.
Vulnerability is the intersection of three elements: a system susceptibility or flaw, attacker access to the flaw, and attacker capability to exploit the flaw. To exploit a vulnerability, an attacker must have at least one applicable tool or technique that can connect to a system weakness. In this frame, vulnerability is also known as the attack surface.
Vulnerability is the intersection of three elements: a system susceptibility or flaw, attacker access to the flaw, and attacker capability to exploit the flaw. To exploit a vulnerability, an attacker must have at least one applicable tool or technique that can connect to a system weakness. In this frame, vulnerability is also known as the attack surface.
Vulnerability management is the cyclical practice of identifying, classifying, remediating, and mitigating vulnerabilities" This practice generally refers to software vulnerabilities in computing systems.
A security risk may be classified as a vulnerability. The usage of
vulnerability with the same meaning of risk can lead to confusion. The
risk is tied to the potential of a significant loss. Then there are
vulnerabilities without risk: for example when the affected asset
has no value. A vulnerability with one or more known instances of
working and fully implemented attacks is classified as an exploitable
vulnerability — a vulnerability for which an exploit exists. The window of vulnerability
is the time from when the security hole was introduced or manifested in
deployed software, to when access was removed, a security fix was
available/deployed, or the attacker was disabled.
Security bug
is a narrower concept: there are vulnerabilities that are not related
to software: hardware, site, personnel vulnerabilities are examples of
vulnerabilities that are not software security bugs.
Constructs in programming languages that are difficult to use properly can be a large source of vulnerabilities.
exploit
An exploit (from the verb to exploit, in the meaning of using something to one’s own advantage) is a piece of software, a chunk of data, or sequence of commands that takes advantage of a bug, glitch or vulnerability
in order to cause unintended or unanticipated behaviour to occur on
computer software, hardware, or something electronic (usually
computerised). This frequently includes such things as gaining control
of a computer system or allowing privilege escalation or a denial-of-service attack.
Bug
A software bug is the common term used to describe an error, flaw, mistake, failure, or fault in a computer program or system that produces an incorrect or unexpected result, or causes it to behave in unintended ways.
Glitch
A glitch is a short-lived fault
in a system. It is often used to describe a transient fault that
corrects itself, and is therefore difficult to troubleshoot. The term is
particularly common in the computing and electronics industries, and in circuit bending, as well as among players of video games, although it is applied to all types of systems including human organizations and nature.
Payload
Payload in computing (sometimes referred to as the actual or body data) is the cargo of a data transmission. It is the part of the transmitted data which is the fundamental purpose of the transmission, to the exclusion of information sent with it (such as headers or metadata, sometimes referred to as overhead data) solely to facilitate delivery.[1][2]In the analysis of malicious software such as worms, viruses and Trojans, it refers to the software's harmful results. Examples of payloads include data destruction, messages with insulting text or spurious e-mail messages sent to a large number of people.
In computer security, payload refers to the part of a computer virus which performs a malicious action
Computer Crime
Computer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. Netcrime refers to criminal exploitation of the Internet.
Cybercrimes are defined as: "Offences that are committed against
individuals or groups of individuals with a criminal motive to
intentionally harm the reputation of the victim or cause physical or
mental harm to the victim directly or indirectly, using modern
telecommunication networks such as Internet (Chat rooms, emails, notice
boards and groups) and mobile phones (SMS/MMS)". Such crimes may threaten a nation’s security and financial health. Issues surrounding this type of crime have become high-profile, particularly those surrounding cracking, copyright infringement, child pornography, and child grooming. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise.
Internationally, both governmental and non-state actors engage in cybercrimes, including espionage, financial theft,
and other cross-border crimes. Activity crossing international borders
and involving the interests of at least one nationstate is sometimes
referred to as cyber warfare. The international legal system is attempting to hold actors accountable for their actions through the International Criminal Court.
Crimeware
Crimeware is a class of malware designed specifically to automate cybercrime.[1] The term was coined by Peter Cassidy, Secretary General of the Anti-Phishing Working Group to distinguish it from other kinds of malevolent programs.[citation needed]
Crimeware (as distinct from spyware, adware, and malware) is designed (through social engineering or technical stealth) to perpetrate identity theft in order to access a computer user's online accounts at financial services companies and online retailers for the purpose of taking funds from those accounts or completing unauthorized transactions that enrich the thief controlling the crimeware. Crimeware also often has the intent to export confidential or sensitive information from a network for financial exploitation. Crimeware represents a growing problem in network security as many malicious code threats seek to pilfer confidential information.
Crimeware (as distinct from spyware, adware, and malware) is designed (through social engineering or technical stealth) to perpetrate identity theft in order to access a computer user's online accounts at financial services companies and online retailers for the purpose of taking funds from those accounts or completing unauthorized transactions that enrich the thief controlling the crimeware. Crimeware also often has the intent to export confidential or sensitive information from a network for financial exploitation. Crimeware represents a growing problem in network security as many malicious code threats seek to pilfer confidential information.
Tuesday, 26 June 2012
Browser Exploitation Framework
The Browser Exploitation Framework (BeEF) is a powerful professional security tool. BeEF is pioneering techniques that provide the experienced
penetration tester with practical client side attack vectors.
Unlike other security
frameworks, BeEF focuses on leveraging browser vulnerabilities to assess the
security posture of a target. This project is developed solely for lawful
research and penetration testing.
BeEF hooks one or more
web browsers as beachheads for the launching of directed command modules. Each
browser is likely to be within a different security context, and each context
may provide a set of unique attack vectors.
Notable Features
BeEF provides an easily
integratable framework that demonstrates the impact of browser and Cross-site
Scripting issues in real-time.
Development has focused on creating a modular framework. This has made module
development a very quick and simple process.
§ Browser exploitation modules
§ Browser proxying
§ Integration with Metasploit via XML-RPC
§ Plugin detection
§ Intranet service exploitation
§ Tor detection
§ Browser functionality detection modules
BeEF
|
|
Wade Alcorn and others
|
|
0.4.2.7 / July 10,
2011
|
|
Development status
|
Active
|
AGPL
|
|
Website
|
What is
BeEF?
BeEF
is short for The Browser Exploitation Framework. It is a penetration testing
tool that focuses on the web browser.
Amid growing concerns about web-borne attacks against clients, including mobile clients, BeEF allows the professional penetration tester to assess the actual security posture of a target environment by using client-side attack vectors. Unlike other security frameworks, BeEF looks past the hardened network perimeter and client system, and examines exploitability within the context of the one open door: the web browser. BeEF will hook one or more web browsers and use them as beachheads for launching directed command modules and further attacks against the system from within the browser context.
Intel i7 Processor in detail
1.1 Nehalem micro architecture
1.1.1 "Lynnfield" (45 nm)
1.1.2 "Bloomfield" (45 nm)
1.1.3 "Gulftown" (32 nm)
1.2 Sandy Bridge microarchitecture
1.2.1 "Sandy Bridge" (32 nm)
1.2.2 "Sandy Bridge-E" (32 nm)
1.2.3 "Ivy Bridge" (22 nm)
2 Mobile processors
2.1 Nehalem microarchitecture
2.1.1 "Clarksfield" (45 nm)
2.1.2 "Arrandale" (32 nm)
2.2 Sandy Bridge microarchitecture
2.2.1 "Sandy Bridge (Dual-Core)" (32 nm)
2.2.2 "Sandy Bridge (Quad-Core)" (32 nm)
2.2.3 "Ivy Bridge (Dual-Core)" (22 nm)
2.2.4 "Ivy Bridge (Quad-Core)" (22 nm)
Desktop
processors
"Lynnfield" (45 nm)
Lynnfield is the code name for a quad-core
processor from Intel
released in September 2009.[1]
It is sold in varying configurations as Core i5-7xx,
Core
i7-8xx or Xeon
X34xx. Lynnfield uses the Nehalem microarchitecture and replaces
the earlier Penryn based Yorkfield processor, using the same 45 nm process
technology, but a new memory and bus interface. The product code for Lynnfield
is 80605, its CPUID value identifies it as family 6, model 30 (0106Ex).
Lynnfield is
related to the earlier Bloomfield and Gainestown microprocessors, which are
used in server and high-end desktop systems. The main difference between the
two is Lynnfield's use of the LGA 1156 processor socket as opposed to the LGA 1366 used
in the others. LGA 1156 processors include Direct Media Interface and PCI Express
links, which Intel has previously connected to the processor with a dedicated northbridge chip, called the memory
controller hub or I/O hub.
The mobile
version of Lynnfield is Clarksfield.
Produced in 2009
Designed by Intel
Max. CPU clock rate 2.40 GHz
to 3.06 GHz
Min. feature size 45 nm
CPUID code 106Ex
Product code 80605
Cores 4
L2 cache 4x256kb
L3 cache 8 MB
Application Desktop
Socket(s) LGA 1156
- All models support: MMX, SSE, SSE2, SSE3, SSSE3, SSE4.1, SSE4.2, Enhanced Intel SpeedStep Technology (EIST), Intel 64, XD bit (an NX bit implementation), TXT, Intel VT-x, Intel VT-d, Hyper-threading, Turbo Boost, Smart Cache.
- Core i7-875K features an unlocked multiplier and does not support Intel TXT and Intel VT-d.[1].
- FSB has been replaced with DMI.
- Transistors: 774 million
- Die size: 296 mm²
- Stepping: B1
"Bloomfield" (45 nm)
Bloomfield is the code name for Intel high-end
desktop processors sold as Core i7-9xx and single-processor servers sold as Xeon
35xx.,[1][2][3]
in almost identical configurations, replacing the earlier Yorkfield processors. The Bloomfield
core is closely related to the dual-processor Gainestown, which has the same CPUID
value of 0106Ax (family 6, model 26) and which uses the same socket. Bloomfield
uses a different socket than the later Lynnfield and Clarksfield processors based on the
same 45 nm Nehalem microarchitecture, even though
some of these share the same Intel
Core i7 brand.
Produced From 2008 to present
Designed by
Intel
Max. CPU clock rate
2.66 GHz to 3.33 GHz
CPUID code 106Ax
Product code 80601
Cores 4
L2 cache 4× 256 kB
L3 cache 8 MB
Application Desktop
Socket(s) LGA 1366
- All models support: MMX, SSE, SSE2, SSE3, SSSE3, SSE4.1, SSE4.2, Enhanced Intel SpeedStep Technology (EIST), Intel 64, XD bit (an NX bit implementation), Intel VT-x, Hyper-threading, Turbo Boost, Smart Cache.
- FSB has been replaced with QPI.
- Transistors: 731 million
- Die size: 263 mm²
- Steppings: C0, D0
"Gulftown" (32 nm)
processor able to
run up to 12 threads in parallel. It is based on Westmere microarchitecture, the 32 nm
shrink of Nehalem.[3]
Originally rumored to be called the Intel Core i9, it is sold as an Intel
Core i7.[4]
The first release was the Core i7 980X in the first quarter of 2010,[5][6][7]
along with its server counterpart, the Xeon 3600 and the dual-socket Xeon 5600
(Westmere-EP) series using identical chips.
First figures
indicate that at equivalent clock rates, depending on the software, it has up
to 50% higher performance than the identically clocked quad core Bloomfield Core i7 975. However,
consumer software that utilizes six real cores is still quite rare as of 2011,
and not every multithreaded program is able to take advantage of this many
cores. Despite having 50% more transistors, the CPU strongly benefits from the
32-nm process, drawing the same or even less power (depending on the operating
system) than its Bloomfield predecessors with merely four cores. The thermal design power (TDP) of all planned
models is stated to be 130 watts.
Produced 1H 2010
Designed by Intel
Corporation
Max. CPU clock rate
3.2 GHz to 4.4 GHz
Min. feature size 32 nanometer
Instruction
set x86, x86-64, MMX, SSE, SSE2, SSE3, SSSE3, SSE4.1, SSE4.2, AES-NI Microarchitecture
Westmere
CPUID code 0206Cx
Product code 80613, 80614
Cores
6 (physical), 12 (logical)
L2 cache 6 × 256 KB
L3 cache 12 MB
Application UP/DP Server, Workstation
Package(s) LGA-1366
Brand name(s) Core i7-970, 980, 980X,
990X, Xeon 3600s, 5600s
- All models support: MMX, SSE, SSE2, SSE3, SSSE3, SSE4.1, SSE4.2, Enhanced Intel SpeedStep Technology (EIST), Intel 64, XD bit (an NX bit implementation), Intel VT-x, Hyper-threading, Turbo Boost, AES-NI, Smart Cache.
- Core i7-980X and -990X features an unlocked multiplier.
- FSB has been replaced with QPI.
- Transistors: 1170 million
- Die size: 239 mm²
- Steppings: B1
"Sandy
Bridge" (32 nm)
- All models support: MMX, SSE, SSE2, SSE3, SSSE3, SSE4.1, SSE4.2, AVX, Enhanced Intel SpeedStep Technology (EIST), Intel 64, XD bit (an NX bit implementation), TXT, Intel VT-x, Intel VT-d, Hyper-threading, Turbo Boost, AES-NI, Smart Cache, Intel Insider (Digital rights management), vPro
- Support for up to 4 DIMMS of DDR3-1333 memory.
- S processors feature lower-than-normal TDP (65 W on 4-core models).
- K processors have unlocked turbo multiplier but does not support Intel TXT, Intel VT-d [2] and vPro.[3][4]
- Non-K processors will have limited turbo overclocking.
- Transistors: 1.16 billion[5]
- Die size: 216 mm²
"Sandy
Bridge-E" (32 nm)
- All models support: MMX, SSE, SSE2, SSE3, SSSE3, SSE4.1, SSE4.2, AVX, Enhanced Intel SpeedStep Technology (EIST), Intel 64, XD bit (an NX bit implementation), Intel VT-x, Hyper-threading, Turbo Boost, AES-NI, Smart Cache.
- Support for up to 8 DIMMS of DDR3-1600 memory.
- Transistors: 1.27 (M1 stepping) or 2.27 (C1 stepping) billion
- Die size: 294 (M1 stepping) or 435 (C1 stepping) mm²
"Ivy Bridge" (22 nm)
- All models support: MMX, SSE, SSE2, SSE3, SSSE3, SSE4.1, SSE4.2, AVX, Enhanced Intel SpeedStep Technology (EIST), Intel 64, XD bit (an NX bit implementation), TXT, Intel VT-x, Intel VT-d, Hyper-threading, Turbo Boost, AES-NI, Smart Cache, vPro
- Support for up to 4 DIMMS of DDR3-1600 memory.
- S processors feature lower-than-normal TDP (65 W on 4-core models).
- T processors feature an even lower TDP (45 W on 4-core models).
- K processors have unlocked turbo multiplier but does not support Intel TXT, Intel VT-d and vPro.
- Non-K processors will have limited turbo overclocking.
- Transistors: 1.4 billion
- Die size: 160 mm²
Mobile
processors
Clarksfield is the code name for an Intel
processor, initially sold as mobile Intel Core i7.[1] It is closely related to the desktop Lynnfield processor, both use quad-core dies
based on the 45 nm Nehalem
microarchitecture and
have integrated PCI Express and DMI links.
The predecessor
of Clarksfield, Penryn-QC was a multi-chip module with two dual-core Penryn dies based on
Penryn
microarchitecture, a
shrink of Core
microarchitecture. The
name of the direct successor of Clarksfield has not been announced. Arrandale is a later mobile processor but opens a
new line of mid-range dual-core processors with integrated graphics.
At the time of
its release at the Intel
Developer Forum on
September 23, 2009, Clarksfield processors were significantly faster than any
other laptop processor,[2]
including the Core 2 Extreme QX9300. The initial laptop manufacturers shipping
products based on Clarksfield processors include MSI, Dell/Alienware,
Hewlett-Packard, Toshiba and Asustek.[3]
Produced From
2009 to present
Min. feature size 45 nm
CPUID code 106Ex
Product code 80607
Cores 4
L2 cache
4x256kb
L3 cache 6
to 8 MB
Application Mobile
Socket(s) µPGA-988
- All models support: MMX, SSE, SSE2, SSE3, SSSE3, SSE4.1, SSE4.2, Enhanced Intel SpeedStep Technology (EIST), Intel 64, XD bit (an NX bit implementation), TXT, Intel VT-x, Intel VT-d, Hyper-threading, Turbo Boost, Smart Cache.
- FSB has been replaced with DMI.
- Transistors: 774 million
- Die size: 296 mm²
- Steppings: B1
Subscribe to:
Posts (Atom)