Message Area
Casually read the BBS message area using an easy to use interface. Messages are categorized exactly like they are on the BBS. You may post new messages or reply to existing messages! You are not logged in. Login here for full access privileges. |
Previous Message | Next Message | Back to [GNG] Gated, Filtered alt.comp.a... <-- <--- | Return to Home Page |
|
||||||
From | To | Subject | Date/Time | |||
Sh | All | Re: Questions about Spectre / Meltdown CPU vulnerabilities |
January 4, 2018 5:42 AM * |
|||
From: Shadow <Sh@dow.br> On Thu, 04 Jan 2018 09:58:16 -0500, Virus <Virus@Guy.C0M> wrote: >These exploits don't seem to be able to take control of systems, alter >protected or system memory or proccesses (or even user-space memory or >files?), plant or install back doors or other forms of persistent >access. Yes? Meltdown gives user programs access to kernel memory. And anything there (passwords, etc). If you get the root password, the computer's yours. It affects almost all OS's. All INTEL processors produced in the last 10 years or so have the backdoor. AMD processors do not. Spectre affects ALL processors, but there are no known working exploits known yet. Not to the public, anyway. If any appear, Cloud Services will be the hardest hit. Nobody cares about the pR0n on your desktop. Happy nightmares. []'s -- Don't be evil - Google 2004 We have a new policy - Google 2012 --- NewsGate v1.0 gamma 2 * Origin: News Gate @ Net396 -Huntsville, AL - USA (1:396/4) |
||||||
|
Previous Message | Next Message | Back to [GNG] Gated, Filtered alt.comp.a... <-- <--- | Return to Home Page |
Execution Time: 0.0888 seconds If you experience any problems with this website or need help, contact the webmaster. VADV-PHP Copyright © 2002-2024 Steve Winn, Aspect Technologies. All Rights Reserved. Virtual Advanced Copyright © 1995-1997 Roland De Graaf. |