Malware – Virus

Most people know the term malware, which is a generic term for any type of malicious software. But few people understand the different types of malware, so in the coming weeks we will provide a high- level description of the three main types of malware: virus, worm and trojan. We will start this week with virus. 

A computer virus infects a legitimate application (e.g., Microsoft Word) in order to spread and reproduce itself. The virus isn’t a standalone program, but rather a snippet of code that inserts itself into a program. When that program is launched, the virus code is loaded into CPU memory and is now prepared to perform some nefarious activity. Inline Deployment

The specific activity depends upon the intention of the person that created the virus. The virus might log keystrokes in order to capture passwords—this is a form of spyware. Or it could turn your computer into a zombie and use it to attack other computers (denial of service)—this is referred to as a bot attack. Or it could encrypt your data and demand payment to restore it—this is called ransomware. Or it might just destroy the host computer by infecting the operating system or erasing critical files. The type of destruction is almost limitless and left to the imagination of the bad actor that created the virus. 

One final point to note is that infection by a virus requires some human action. In other words, a human user must download the virus in some way, for example via an email attachment or file from a website. Anti-virus programs are therefore designed to scan such files before they are downloaded to make sure they don’t contain a virus.

Host CPU Offload Product Features Summary

wdt_ID Speed 1G 10G 10G 10G 10G/40G 10G/40G 100G 100G 100G
1 Model 4Ku 20ku 40ku 40kq 80ku ATLAS-1100 Service Node ANIC-200KFlex ANIC-100Kq ANIC-200Kq
2 Port/Type 4X1G SFP 2X10G SFP+ 4X10G SFP+ 1X40G QSFP+ 4X10G SFP+ 2X40G QSFP+ 8X10G SFP+ 4x10G SFP+ 1x40G QSFP+ 2x100G QSFP28 2x40G QSFP28 1X100G QSFP28 2X100G QSFP28
3 PCIe Interface Gen3 x8 Gen3 x8 Gen3 x8 Gen3 x8 Gen3 x8 Gen3 x8 Gen3 x16 Gen3 x16 Gen3 x16
4 Dimensions(H x L inches) 4.25 x 6.5   4.25 x 6.25 4.25 x 6.25 4.25 x 6.25 4.25 x 6.25 1.75 x12.28x14 4.25 x 6.5 4.25 x 10.5 4.25 x 10.5
5 Memory 32MB 4G 4G 4G 4G 16/32G 8G 12G 12G
6 Timestamp 5.7 nS 5.7 nS 5.7 nS 5.7 nS 5.7 nS 5.7 nS 4 nS 4 nS 4 nS
7 100% Packet
Capture
8 Gigamon, AristaTimestamp
9 Packet Merging
10 Packet Parsing


About Accolade

Accolade is the technology leader in FPGA-based Host CPU Offload and 100% Packet Capture PCIe NIC’s and Scalable 1U Platforms. Accolade’s line of 1-100GE products enable 100% packet capture, flow classification, flow shunting, deduplication, packet filtering and more. Our customers are global leaders in network monitoring & cybersecurity applications as well as in the network test and measurement, telecom and video stream monitoring markets.

FPGA Acceleration Features

100% Packet Capture | Flow Classification | Flow Shunting | Precise Time Stamping | Packet Merging | Packet Slicing | Packet Parsing | Packet Filtering | Deduplication | Host Packet Buffer | Packet Steering | Direct Memory Access (DMA) | Statistics (RMON1)

Free Product Evaluation

Resolve all your host CPU offload bottlenecks. Share Your Technical Requirements with our FPGA and software experts to tailor the optimal solution. Accolade offers a 60 day free product evaluation for qualified customers to fully test and evaluate our products.