Category: 

What Is a Host Protected Area?

Article Details
  • Written By: Alex Newth
  • Edited By: Angela B.
  • Last Modified Date: 27 August 2016
  • Copyright Protected:
    2003-2016
    Conjecture Corporation
  • Print this Article
Free Widgets for your Site/Blog
The U.S. Coast Guard led the evacuation of more than 500,000 people from Lower Manhattan on 11 September 2001.  more...

September 27 ,  1940 :  The World War II Axis powers formed with the signing of the Tripartite Pact.  more...

A host protected area (HPA), also referred to as a hidden protected area, is a small, hidden space of memory on the hard drive. Except through special commands or programs, the operating system (OS) will be unable to see, interact with or manipulate the host protected area. The HPA serves various purposes, some that help the user, some that help security agencies, and some that help hackers. Programs known as being HPA-aware are able to utilize the HPA during booting but, if the user’s computer does not include aware programs, then the HPA helps everyone except the user.

On all modern computers as of 2011, the major storage area is the hard drive component. Most of the memory on this hardware is free and open, allowing users to store a number of files. There is one section that is reserved, called the host protected area, that stores a small version of everything that passes through it. This is like an advanced cache, except the information stays in the HPA much longer.

For the user, the host protected area helps during booting and recovery operations. If the user has an HPA-aware basic input/output system (BIOS), then the BIOS can use the HPA to assist in booting the computer and for diagnostic purposes. Some computer manufacturers also may store a pre-loaded OS on the HPA. When the computer is taken to a repair shop because it was hacked, the repairperson will typically access the HPA to correct the computer.

Ad

Government and law enforcement security teams also may access the host protected area to see what the user was doing with the computer if he or she is suspected of wrongdoings. The HPA holds a version of everything that has come in and out of the computer, so it will show whether the user has had or used any illegal files or programs. This computer forensics information can be incriminating and helps security teams know if the person is really doing something illegal with his or her computer.

Hackers also can manipulate the host protected area to make rootkit viruses permanent on the computer. Normally, if an antivirus program finds a rootkit — a virus that allows access to the victim’s computer — it is eliminated. If the rootkit hides in the HPA, then antivirus and even anti-rootkit programs may be unable to find it.

The host protected area contains sensitive information, such as boot information, so it is made to be hidden so users do not accidentally erase the HPA. There are some command lines and special programs that are able to read and manipulate the HPA, usually to erase the information or decrease the size of the HPA. Doing this may have wide-reaching effects, such as keeping the computer from effectively booting and turning on, so the HPA is best left alone.

Ad

You might also Like

Recommended

Discuss this Article

anon234396
Post 1

I was beginning to suspect that there was a ban on revealing what it is/does.

Your description that was the best, most complete and simplest explanation I have found.

Thanks for sharing.

I can see that deleting it would be a no no.

Are there programs that can erase some areas without rendering the drive useless?

Post your comments

Post Anonymously

Login

username
password
forgot password?

Register

username
password
confirm
email