mastodon.xyz is one of the many independent Mastodon servers you can use to participate in the fediverse.
A Mastodon instance, open to everyone, but mainly English and French speaking.

Administered by:

Server stats:

812
active users

#hypervisor

0 posts0 participants0 posts today

To date, I have published 15 articles (1045 pages) with the strict goal of helping the cybersecurity community.

ERS (439 pages, so far):

[+] ERS 05: exploitreversing.com/2025/03/1
[+] ERS 04: exploitreversing.com/2025/02/0
[+] ERS 03: exploitreversing.com/2025/01/2
[+] ERS 02: exploitreversing.com/2024/01/0
[+] ERS 01: exploitreversing.com/2023/04/1

MAS (606 pages -- finished):

[+] MAS 10: exploitreversing.com/2025/01/1
[+] MAS 09: exploitreversing.com/2025/01/0
[+] MAS 09: exploitreversing.com/2024/08/0
[+] MAS 07: exploitreversing.com/2023/01/0
[+] MAS 06: exploitreversing.com/2022/11/2
[+] MAS 05: exploitreversing.com/2022/09/1
[+] MAS 04: exploitreversing.com/2022/05/1
[+] MAS 03: exploitreversing.com/2022/05/0
[+] MAS 02: exploitreversing.com/2022/02/0
[+] MAS 01: exploitreversing.com/2021/12/0

The blog home page is: exploitreversing.com/

I will be back in a few months with the next articles in the Exploiting Reversing series, which will focus on vulnerability and exploitation, once I have laid all the necessary groundwork. I'm currently taking a break from writing to focus on research.

Enjoy reading and have an excellent day.

#windows#iOS#macOS

primary issue that hinders #virtualization on #ARM is the way sensitive instructions of its ISA are executed. Sensitive instructions
are a class of instructions in the ISA that can change the mode of operation of the processor
or access specific information regarding the state of various hardware resources in the system.
Such instructions thus have the capability of superseding the #hypervisor
KVM/ARM manages the shadow page tables in the host
kernel. These tables map the guest virtual addresses to actual physical addresses to speed up
the translation. Figure 4.4 also illustrates the concept of shadow tables. KVM/ARM establishes
this mapping on demand. Changes in the guest virtual page table must be accurately mapped
onto the shadow page table. This is taken care of by KVM/ARM because whenever the guest
changes the page table, it has to invalidate the TLB entry associated with that page. As this
is a privileged operation, it traps to the KVM/ARM module where appropriate changes to the
shadow page table are made. Every time a new mapping is created in the shadow page table
After this, we were able to use the
Android operating system on the ARM PB11MPCORE board. The keyboard was used to send
the control inputs and we tested various activities like launching the browser, launching other
pre-installed applications like the clock and the calendar. We also tested installing applications
using Android application installation files (.apk), which was successful.
arcb.csc.ncsu.edu/~mueller/ftp

Linux Foundation Energy hat die erste Version ihres neuen Hypervisors namens SEAPATH vorgestellt. Er ist allerdings nicht für jedermann gedacht, sondern soll vor allem bei der Digitalisierung von Umspannwerken helfen.#Hypervisor #LinuxFoundation #SEAPATH
Linux Foundation Energy stellt neuen Hypervisor SEAPATH vor - LinuxCommunity
LinuxCommunity · Linux Foundation Energy stellt neuen Hypervisor SEAPATH vor - LinuxCommunityLinux Foundation Energy hat die erste Version ihres neuen Hypervisors namens SEAPATH vorgestellt. Er ist allerdings nicht für jedermann gedacht, sondern soll vor allem bei der Digitalisierung von Umspannwerken helfen. SEAPATH richtet sich an Betreiber von elektrischen Schaltanlagen für Hochspannungsleitungen (Digital Substation Automation Systems), die sich über das Protokoll IEC 61850 steuern lassen. Der Hypervisor jongliert auf solchen Systemen sogenannte vPAC-Anwendungen (Virtualized Protection, Automation And Control) der Stromnetzindustrie. Laut Ankündigung soll SEAPATH „komplexe, dynamische und adaptive Automatisierungsfunktionen an Grid-Knoten und am Edge“ ermöglichen und zudem die Steuerung durch zentrale Systeme erleichtern. Da es sich bei den Schaltanalgen um essenziell wichtige Systeme für die Stromversorgung handelt, ist der Hypervisor gegen Angriffe speziell gehärtet und arbeitet in Echtzeit. Die Version 1.0 gilt laut Linux Foundation als produktionsreif und kann folglich in kritischen Umgebungen zum Einsatz kommen. SEAPATH selbst basiert auf in der Pressemeldung nicht näher genannten „ausgereiften existierenden Open-Source-Komponenten“. Ein Blick in das Repository auf GitHub verrät den Einsatz von Ansible und der Administrationsoberfläche Cockpit. Der Hypervisor unterstützt zahlreiche Betriebssysteme, darunter die Linux-Distributionen Debian und Yocto. Hinter SEAPATH steht die zur Linux Foundation gehörende Organisation LF Energy, die dem Klimawandel mit passenden offenen Frameworks und Technologien begegnen möchte. An der Entwicklung des Hypervisors beteiligten sich zudem mehrere bekannte Größen aus der Linux-Welt und dem Energiesektor, im Einzelnen RTE, Alliander, GE Vernova, Savoir-faire Linux, Welotec und Red Hat. Bei RTE kommt SEAPATH bereits zum Einsatz, unter anderem GE Vernova, Alliander und ABB betreiben die Software noch in Testumgebungen. Das Akronym SEAPATH steht übrigens für Software Enabled Automation Platform and Artifacts THerein.

My partner keeps saying we need to deep clean for new year. Might not be what's meant by that, but just did the biggest deep cleaning possible. I deleted my #Google account, my last Big Tech account.

It wasn't used for much, but some last #smarthome stuff was on it. Well, I got a little PC for Xmas which now runs #Linux with a #pihole and a #hypervisor with #homeassistant .

3 days of hobbying to set it up + finally done with Google? Yes please! Thank you @homeassistant for making it possible!

A concept is tolerated inside the microkernel only if moving it outside the kernel, i.e., permitting competing implementations, would prevent the implementation of the system's required functionality
OKL4 μKernel 3.0, released in October 2008, was the last open-source version of OKL4 μKernel. More recent versions are closed source and based on a rewrite to support a native #hypervisor variant named the OKL4 Microvisor. OK Labs also distributed a paravirtualized #Linux named OK:Linux, a descendant of Wombat, and paravirtualized versions of #SymbianOS and #Android
Osker, an OS written in Haskell, targeted the L4 specification; although this project focused mainly on the use of a functional programming language for OS development, not on microkernel research.[

RedoxOS is a Rust based operating system, that is also inspired by seL4, and uses a micro kernel design.
#virtualization