Message Area
Casually read the BBS message area using an easy to use interface. Messages are categorized exactly like they are on the BBS. You may post new messages or reply to existing messages! You are not logged in. Login here for full access privileges. |
Previous Message | Next Message | Back to [GNG] Gated, Filtered alt.comp.a... <-- <--- | Return to Home Page |
|
||||||
From | To | Subject | Date/Time | |||
dwhodgins | All | Re: Questions about Spectre / Meltdown CPU vulnerabilities |
January 4, 2018 7:43 AM * |
|||
From: "David W. Hodgins" <dwhodgins@nomail.afraid.org> On Thu, 04 Jan 2018 13:43:38 -0500, David W. Hodgins <dwhodgins@nomail.afraid.org> wrote: >>> It provides read access to tiny amounts of data at a time. Given the >>> multi-processor/multi-threading of processors, the volume of data the >>> exploit would have to sift through to find any thing of use, is massive. https://www.reuters.com/article/us-cyber-inte... ed-his-own-computer-and-found-worst-chip-flaw-idUSKBN1ET1ZR Given this description of seeing full urls, etc, I take it back. It is a critical problem, that will have be be mitigated asap. Regards, Dave Hodgins -- Change dwhodgins@nomail.afraid.org to davidwhodgins@teksavvy.com for email replies. --- NewsGate v1.0 gamma 2 * Origin: News Gate @ Net396 -Huntsville, AL - USA (1:396/4) |
||||||
|
Previous Message | Next Message | Back to [GNG] Gated, Filtered alt.comp.a... <-- <--- | Return to Home Page |
Execution Time: 0.1375 seconds If you experience any problems with this website or need help, contact the webmaster. VADV-PHP Copyright © 2002-2024 Steve Winn, Aspect Technologies. All Rights Reserved. Virtual Advanced Copyright © 1995-1997 Roland De Graaf. |