TILE-Gx Processors Family
The TILE-Gx™ processor family processor brings 64-bit multicore computing to the next level, enabling a wide range of applications to achieve the highest performance in the market. This latest generation processor family features devices with 16 to 100 identical processor cores (tiles) interconnected with Tilera's iMesh™ on-chip network. Each tile consists of a complete, full featured processor as well as L1 & L2 cache and a non-blocking switch that connect the tiles into the mesh. As with all Tilera processors, each tile can independently run a full operating system, or, multiple tiles taken together can run a multiprocessing OS like SMP Linux.
The TILE-Gx family processor slashes board real estate requirements and system costs by integrating a complete set of memory and I/O controllers, therefore eliminating the need for an external north bridge or south bridge. TileDirect™ technology provides coherent I/O directly into the tile caches to deliver ultimate low-latency packet processing performance. Tilera's DDC™ (Dynamic Distributed Cache) system for fully coherent cache across the tile array enables scalable performance for threaded and shared memory applications.
The TILE-Gx processors are programmed in ANSI standard C and C++, enabling developers to leverage their existing software investment. Tiles can be grouped in clusters to apply the appropriate amount of horsepower to each application. Since multiple virtualized operating system instances can be run on the TILE-Gx simultaneously, it can replace multiple CPU and DSP subsystems for both the data plane and control plane.
Applications
Applications
Advanced Networking:
* Firewall & VPN
* Intrusion Detection & Prevention (IDS/IPS)
* Unified Threat Management (UTM)
* L4-7 deep packet inspection
* Network Monitoring & Forensics
Digital Video:
* Video transcoding/Transrating
* Videoconferencing MCU and endpoints
* Streaming IPTV and Video-on-Demand
* Video Post-Production processing
Wireless Infrastructure:
* Base Transceiver Station (BTS)
* Base Station Controllers (BSC)
* Wireless backbone gateways (GGSN, MGW )
Cloud Computing
* Web Applications (LAMP)
* Data caching (Memcached)
* Database Applications
Feature Enables
Massively Scalable Performance
• Array of 16 to 100 general-purpose processor cores (tiles)
• 64-bit VLIW processors with 64-bit instruction bundle
• 3-deep pipeline with up to 3 instructions per cycle
• 32K L1i cache, 32K L1d cache, 256K L2 cache per tile
• Up to 750 billion operations per second (BOPS)
• Up to 200 Tbps of on-chip mesh interconnect
• Over 500 Gbps memory bandwidth with four 64-bit DDR3 controllers
• 40 - 80 Gbps Snort® processing
• 40 - 80 Gbps nProbe
• H.264 HD video encode: dozens of streams of 1080p (baseline profile)
• 64+ channels of OFDM baseband receiver processing (wireless)
Power Efficiency
• 1.0 to 1.5GHz operating frequency
• 10 to 55W for typical applications
• Idle Tiles can be put into low-power sleep mode
• Power efficient inter tile communications
• Highest performance per watt
• Simple thermal management & power supply design
• Small System form factor
• Lowest operating cost
Integrated Solution
• Four DDR3 memory controllers with optional ECC
• Up to eight 10GbE XAUI interfaces; 2 Interlaken interfaces
• Three Gen2 PCIe interfaces, each selectable as endpoint or root complex
• Up to 32 GbE MAC interfaces
• Wire-speed mPIPE™ packet processing engine
• On-chip hardware encryption and compression(MiCA™)
• Reduces BOM cost - standard interfaces on-chip
• Dramatically reduced board real estate
• Up to 80 Gbps PCIe bandwidth
• Over 80 Gbps of packet I/O bandwidth
• Up to 40 Gbps VPN performance
Ease of Programming
• ANSI standard C / C++ compiler
• Advanced profiling and debugging designed for multicore programming
• Supports SMP Linux and virtualization
• TMC libraries for efficient inter-tile communication
• Run off-the-shelf C and C++ programs
• Leverage investment in existing code
• Standard multicore communication mechanisms
• Reduce debug and optimization time
• Faster time to production code
TILE-Gx100 TILE-Gx64 TILE-Gx36 TILE-Gx16
Number of Cores 100 64 36 16
Core Frequency 1.25, 1.5GHz 1.25, 1.5GHz 1.25, 1.5GHz 1, 1.25GHz
Network Interface 2x 40G Interlaken
8 XAUI, 32 SGMII 2x 40G Interlaken
6 XAUI, 24 SGMII --
4 XAUI, 16 SGMII --
1 XAUI, 12 SGMII
PCIe Two 8-lane
One 4-lane Two 8-lane
One 4-lane One 8-lane
Two 4-lane --
Three 4-lane
DDR3 Controllers 4 4 2 2
DDR3 Frequency 2133 MHz 1600 MHz 1600 MHz 1333 MHz
Package 45 x 45mm BGA 45 x 45mm BGA 35 x 35mm BGA 35 x 35mm BGA
AMAZON
Wednesday, October 28, 2009
Wednesday, October 14, 2009
Remove Worm Vbs Cryf A Shemale by Cry
VBS/Cryf.A was created using visual basic scripting (not visual basic), first case happen on my cyber cafe on date 18 July 2009 it spreading from user flash disk and try to infected all PC in my network.
I’m not sure why so much Indonesian virus maker using lot of this VBS technique (maybe they know without msvbvm.dll VBS can executed on a lot target), Since I write about VBS article long long time ago (I forget maybe around year 2003-2005) in jasakom website with title “VBS sederhana yang berbahaya” many people has try to manipulate that simple code to become advanced code. Now I’m fell really stupid by share that Article to public…
How to know if you’re infected by this worm VBS/Cryf.A:
1.First time your computer turned on it will open web browser and show this pictures.
2. VBS/Cryf.A will change your web browser start page become:
3. There is folder “album bokep” (in Indonesian language this mean porn) in all folder.
4. VBS/Cryf.A will change your system properties become like this:
5. Change file type .lnk become “movie clip”
6. It will control your DVD/CD-rom by make it open and close to make you panic.
VBS/Cryf.A Master file:
VBS/Cryf.A has a master file called “drconfig.drv” with file size 218 KB, it already encrypted and little hard to read the code inside it.
On first time active it will called “svchost.vbs” then this vbs will executed this “drconfig.drv”. Then it will started created file list:
* %Drive%\Recycled\S-1-5-21-343818398-18970151121-842a92511246-500\Thumbs.db
o svchost.vbs
o desktop.ini
o drvconfg.drv
o SHELL32.dll
* %Systemroot%\windows
o appsys.exe
o Winupdt.scx
o appopen.scx
o Windowsopen.mht
o Windows.html
o Regedit.exe.lnk
o Help.htm
* %Systemroot%\Windows\system\svchost.exe
* %Systemroot%\WINDOWS\system32
o Svchost.dls
o Corelsetup.scx
o Appsys.dls
o Kernel32.dls
o Taskmgr.exe.lnk
* %Systemroot%\WINDOWS\system32\
o Winupdtsys.exe
o ssmarque.scr
* %Systemroot%\Program Files\FarStone\qbtask.exe
* %Systemroot%\Program Files\ACDsee\Launcher.exe
* %Systemroot%\Program Files\Common Files\NeroChkup.exe
* %Systemroot%\Program Files\ExeLauncher
* %ProgramFiles%\drivers\VGA\VGAdrv.lnk
* %Systemroot%\Documents and Settings\%user%\Desktop\Local Disk (C).dls
This virus will make some action to keep him stay in computers target:
* Disable Task Manager
* Disable Regedit
* Disable CMD (Command Prompt)
* Disable MSConfig
* Can’t change wallpapers
It will change your screensaver like this:
Spreading Technique and Social Technique:
VBS/Cryf.A spreading using 2 technique, One of them as like in my first Article using autorun.inf files, beside that this virus maker know how to using social technique to tricky mostly people out there using porn movie that actually virus.
This virus maker try to manipulate people with his another social technique, he will try to tell people their computers infected and give the removal tools, actually don’t open that website (www.dinamikasolusi.co.nr) this virus maker maybe using some technique as I write a long time ago by insert some virus into computer target using html code.
Enough, let’s started to remove this stupid Worm VBS/Cryf.A
HOW TO REMOVE WORM VBS/Cryf.A:
1. Kill active virus process in your background memory using currprocess, then kill all process with product name “Microsoft (r) Windows Script Host“
2. Block virus so it can not run for a while when we are in cleaning progress by:
Start -> Run -> Type “SECPOL.MSC” -> Click “software restriction policies” -> Click “additional rules” -> Right click on “additional rules” and choose “New Hash Rules”
In “File Hash” Click on Browse and choose which file you want to block (WSScript.exe) on “Security level” choose Disalllowed then click OK.
3. Fix registry by using this 3rd tools, download it from HERE…
* Shell Windows = explorer.exe
* UserInit Windows
o Windows NT/2000 = C:\WinNT\System32\userinit.exe,
o Windows XP/2003/Vista = C:\Windows\System32\userinit.exe,
4. Deleted Virus Master files and all files he’s created. To help you deleted it in easy way I recommended to use this tools ExplorerXP, Then deleted all files list bellow:
* %Drive%\Recycled\S-1-5-21-343818398-18970151121-842a92511246-500\Thumbs.db
o svchost.vbs
o desktop.ini
o drvconfg.drv
o SHELL32.dll
* %Drive%\Album BOKEP\Naughty America
* %systemroot%\windows
o appsys.exe
o Winupdt.scx
o appopen.scx
o Windowsopen.mht
o Windows.html
o Regedit.exe.lnk
o Help.htm
* %systemroot%\Windows\system\svchost.exe
* %systemroot%\WINDOWS\system32
o Taskmgr.exe.lnk
o CMD.exe.lnk
o Svchost.dls
o Corelsetup.scx
o Appsys.dls
o Kernel32.dls
o Winupdtsys.exe
o ssmarque.scr
* %systemroot%\Program Files\FarStone\qbtask.exe
* %systemroot%\Program Files\ACDsee\Launcher.exe
* %systemroot%\Program Files\Common Files\NeroChkup.exe
* %systemroot%\Program Files\ExeLauncher
* %ProgramFiles%\drivers\VGA\VGAdrv.lnk
* %systemroot%\Documents and Settings\%user%\Desktop\Local Disk (C).dls
* %Flash Disk%\Dataku Penting Jangan Dihapus.lnk
5. Showing back your files TaskMgr.exe, Regedt32.exe, Regedit.exe, CMD.exe, and Logoff.exe that hidden by virus:
*repeated on all files you want to shown back.
6. For maximum cleaning I recommended to scan using your best antivirus programs, in my case Norman antivirus can deleted all of this virus part.
7. When all step done and no virus found, deleted blocking rules we made:
Start -> Run -> Type SECPOL.MSC -> Click “Software Restriction Policies” -> Click “Additional Rules” -> Then Deleted Rules we have made.
8. Restart your computer then re-scanned again to make sure there is no left part of worm VBS/Cryf.A, then use updated antivirus to prevent it coming back again.
Have a nice day, GBU :D
I’m not sure why so much Indonesian virus maker using lot of this VBS technique (maybe they know without msvbvm.dll VBS can executed on a lot target), Since I write about VBS article long long time ago (I forget maybe around year 2003-2005) in jasakom website with title “VBS sederhana yang berbahaya” many people has try to manipulate that simple code to become advanced code. Now I’m fell really stupid by share that Article to public…
How to know if you’re infected by this worm VBS/Cryf.A:
1.First time your computer turned on it will open web browser and show this pictures.
2. VBS/Cryf.A will change your web browser start page become:
3. There is folder “album bokep” (in Indonesian language this mean porn) in all folder.
4. VBS/Cryf.A will change your system properties become like this:
5. Change file type .lnk become “movie clip”
6. It will control your DVD/CD-rom by make it open and close to make you panic.
VBS/Cryf.A Master file:
VBS/Cryf.A has a master file called “drconfig.drv” with file size 218 KB, it already encrypted and little hard to read the code inside it.
On first time active it will called “svchost.vbs” then this vbs will executed this “drconfig.drv”. Then it will started created file list:
* %Drive%\Recycled\S-1-5-21-343818398-18970151121-842a92511246-500\Thumbs.db
o svchost.vbs
o desktop.ini
o drvconfg.drv
o SHELL32.dll
* %Systemroot%\windows
o appsys.exe
o Winupdt.scx
o appopen.scx
o Windowsopen.mht
o Windows.html
o Regedit.exe.lnk
o Help.htm
* %Systemroot%\Windows\system\svchost.exe
* %Systemroot%\WINDOWS\system32
o Svchost.dls
o Corelsetup.scx
o Appsys.dls
o Kernel32.dls
o Taskmgr.exe.lnk
* %Systemroot%\WINDOWS\system32\
o Winupdtsys.exe
o ssmarque.scr
* %Systemroot%\Program Files\FarStone\qbtask.exe
* %Systemroot%\Program Files\ACDsee\Launcher.exe
* %Systemroot%\Program Files\Common Files\NeroChkup.exe
* %Systemroot%\Program Files\ExeLauncher
* %ProgramFiles%\drivers\VGA\VGAdrv.lnk
* %Systemroot%\Documents and Settings\%user%\Desktop\Local Disk (C).dls
This virus will make some action to keep him stay in computers target:
* Disable Task Manager
* Disable Regedit
* Disable CMD (Command Prompt)
* Disable MSConfig
* Can’t change wallpapers
It will change your screensaver like this:
Spreading Technique and Social Technique:
VBS/Cryf.A spreading using 2 technique, One of them as like in my first Article using autorun.inf files, beside that this virus maker know how to using social technique to tricky mostly people out there using porn movie that actually virus.
This virus maker try to manipulate people with his another social technique, he will try to tell people their computers infected and give the removal tools, actually don’t open that website (www.dinamikasolusi.co.nr) this virus maker maybe using some technique as I write a long time ago by insert some virus into computer target using html code.
Enough, let’s started to remove this stupid Worm VBS/Cryf.A
HOW TO REMOVE WORM VBS/Cryf.A:
1. Kill active virus process in your background memory using currprocess, then kill all process with product name “Microsoft (r) Windows Script Host“
2. Block virus so it can not run for a while when we are in cleaning progress by:
Start -> Run -> Type “SECPOL.MSC” -> Click “software restriction policies” -> Click “additional rules” -> Right click on “additional rules” and choose “New Hash Rules”
In “File Hash” Click on Browse and choose which file you want to block (WSScript.exe) on “Security level” choose Disalllowed then click OK.
3. Fix registry by using this 3rd tools, download it from HERE…
* Shell Windows = explorer.exe
* UserInit Windows
o Windows NT/2000 = C:\WinNT\System32\userinit.exe,
o Windows XP/2003/Vista = C:\Windows\System32\userinit.exe,
4. Deleted Virus Master files and all files he’s created. To help you deleted it in easy way I recommended to use this tools ExplorerXP, Then deleted all files list bellow:
* %Drive%\Recycled\S-1-5-21-343818398-18970151121-842a92511246-500\Thumbs.db
o svchost.vbs
o desktop.ini
o drvconfg.drv
o SHELL32.dll
* %Drive%\Album BOKEP\Naughty America
* %systemroot%\windows
o appsys.exe
o Winupdt.scx
o appopen.scx
o Windowsopen.mht
o Windows.html
o Regedit.exe.lnk
o Help.htm
* %systemroot%\Windows\system\svchost.exe
* %systemroot%\WINDOWS\system32
o Taskmgr.exe.lnk
o CMD.exe.lnk
o Svchost.dls
o Corelsetup.scx
o Appsys.dls
o Kernel32.dls
o Winupdtsys.exe
o ssmarque.scr
* %systemroot%\Program Files\FarStone\qbtask.exe
* %systemroot%\Program Files\ACDsee\Launcher.exe
* %systemroot%\Program Files\Common Files\NeroChkup.exe
* %systemroot%\Program Files\ExeLauncher
* %ProgramFiles%\drivers\VGA\VGAdrv.lnk
* %systemroot%\Documents and Settings\%user%\Desktop\Local Disk (C).dls
* %Flash Disk%\Dataku Penting Jangan Dihapus.lnk
5. Showing back your files TaskMgr.exe, Regedt32.exe, Regedit.exe, CMD.exe, and Logoff.exe that hidden by virus:
*repeated on all files you want to shown back.
6. For maximum cleaning I recommended to scan using your best antivirus programs, in my case Norman antivirus can deleted all of this virus part.
7. When all step done and no virus found, deleted blocking rules we made:
Start -> Run -> Type SECPOL.MSC -> Click “Software Restriction Policies” -> Click “Additional Rules” -> Then Deleted Rules we have made.
8. Restart your computer then re-scanned again to make sure there is no left part of worm VBS/Cryf.A, then use updated antivirus to prevent it coming back again.
Have a nice day, GBU :D
Subscribe to:
Posts (Atom)