While Intel Core and Xeon are affected by L1TF, Atom CPUs (c3000) are clear of
it. Applying the patch to Cores and Xeons basically turns those CPUs into
Atoms. It is a shame that the self-appointed "most secure OS" does not run on
such processors.
Your faithful troll.
You may want to check out the more recent guides I wrote for the updated
version of these scripts:
www.geoghegan.ca/unbound-adblock.html
www.geoghegan.ca/pfbadhost.html
On 08/24/18 06:32, jin&hitman&Barracuda wrote:
Hello
Thanks for sharing all those informations. I've been looking a way to
Thanks Jordan, i will look at those links.
On Sat, 25 Aug 2018, 10:31 Jordan Geoghegan, wrote:
> You may want to check out the more recent guides I wrote for the updated
> version of these scripts:
>
> www.geoghegan.ca/unbound-adblock.html
>
> www.geoghegan.ca/pfbadhost.html
>
>
> On 08/24/18 06
wrote:
> This vendor addresses hardware & firmware faults like the other enterprise
> vendors, they DON'T past year two. BIOS and BMC firmwares are not updated
> after this even with the long term lifetime products, you are on your own!
On bios and ipmi updates, you can download and apply them
On Sat, 25 Aug 2018 07:10:14 +
Rupert Gallagher wrote:
> While Intel Core and Xeon are affected by L1TF, Atom CPUs (c3000) are clear
> of it. Applying the patch to Cores and Xeons basically turns those CPUs into
> Atoms. It is a shame that the self-appointed "most secure OS" does not run on
Hi,
Seems like APU2 board is vulnerable to Spectre:
$ uname -r
6.3
$ dmesg | grep cpu0 | grep AMD
cpu0: AMD GX-412TC SOC, 998.27 MHz
$ git clone https://github.com/crozone/SpectrePoC
$ cd SpectrePoC
$ gmake
$ ./spectre.out 85
Figuring there are a good amount of members on this list that are also on
Lobste.rs.
Anyway I was hoping to get an invite to create an account there if someone
could.
Thank you,
Ken
Thank you
Ken
> OpenBSD is not ready for enterprise.
Fantastic intuition here [1].
[1] https://marc.info/?l=openbsd-misc&m=153385998722067&w=2
9 matches
Mail list logo