At 00:28 2018-01-05, Alan Bourke wrote:
These exploits are nasty but if they've been in Intel chips ever
since they started implementing out-of-order execution in 1995 then
surely if there was a serious real-world threat we would have seen it long ago?
No.
My thoughts exactly. I usually read what the media says ("A! REPLACE
ALL COMPUTERS TODAY!") and know that the reality is more like "Keep Calm And
Patch On!"
Paul H. Tarver
Tarver Program Consultants, Inc.
-Original Message-
From: ProfoxTech [mailto:profoxtech-boun...@leafe.com]
On Fri, Jan 5, 2018 at 3:20 PM, Ed Leafe wrote:
> And, of course, the required xkcd take on things:
>
> https://xkcd.com/1938/
>
And that's pretty much all you need to know!
Happy Friday, folks!
--
Ted Roche
Ted Roche & Associates, LLC
http://www.tedroche.com
On Jan 5, 2018, at 9:00 AM, Ed Leafe wrote:
> Here’s an excellent explanation of the problem, and how the exploits work:
>
> https://twitter.com/gsuberland/status/948907452786933762
>
> It’s a long thread, but then again, it’s a complex issue.
And, of course, the required xkcd
A very interesting and realistic report on this subject
https://researchcenter.paloaltonetworks.com/2018/01/threat-brief-meltdown-sp
ectre-vulnerabilities/?utm_source=Adobe+Campaign+-+ACS_medium=email_
campaign=20180105.NL.unit42.PANW_subs.threat.global.xx.xx=DM170
8
Jose Enrique Llopis
On Thu, Jan 4, 2018 at 3:10 AM, Ted Roche wrote:
> > Installing any software such as CutePDF or other to help drive this isn't
> > an option at this time.
> >
>
> Don't you hate it when you're backed into a corner, but you can't use
> the tool that would solve the problem?
>
Andy,
Memories from the past indeed!
We had similar when I moved from Singer to ICL on their 7502 Front End
Processor (FEP).
I got involved in some coding in the dreaded PLAN programming language (Uuugh!)
on their 1904s range of machines before the 2900 Microcode range was launched.
Dave
On 05-Jan-2018 7:27 PM, Alan Bourke wrote:
I think it's more of a side effect of the principle of out of order execution,
not everything is a conspiracy.
That's been going on for a very long time - IBM were doing instruction
pre-fetch in the 70's or early 80's
--- StripMime Report --
On Jan 5, 2018, at 2:28 AM, Alan Bourke wrote:
> These exploits are nasty but if they've been in Intel chips ever since they
> started implementing out-of-order execution in 1995 then surely if there was
> a serious real-world threat we would have seen it long ago?
If you are a HIPAA shop then I'm sure your IT team is paying proper
attention to this.
Hah! I AM the IT team. (I have a couple of part-time assistants who
do help desk and maintenance, but I'm the CIO/SysAdmin/DBA/Systems
Analyst/Code Monkey/chief cook and bottle washer.
We have an
I think it's more of a side effect of the principle of out of order execution,
not everything is a conspiracy.
--
Alan Bourke
alanpbourke (at) fastmail (dot) fm
On Fri, 5 Jan 2018, at 9:28 AM, AndyHC wrote:
> On 05-Jan-2018 1:58 PM, Alan Bourke wrote:
> > These exploits are nasty but if
On 05-Jan-2018 1:58 PM, Alan Bourke wrote:
These exploits are nasty but if they've been in Intel chips ever since they
started implementing out-of-order execution in 1995 then surely if there was a
serious real-world threat we would have seen it long ago?
Unless it's been very carefully
On 04-Jan-2018 11:47 PM, Ted Roche wrote:
Also, kudos to Microsoft for shipping their patches a week early, and
spontaneously rebooting idle Windows workstations while people were
freaking out over the new exploits. Good job!
... it's almost as if they're saying "here's one I prepared
These exploits are nasty but if they've been in Intel chips ever since they
started implementing out-of-order execution in 1995 then surely if there was a
serious real-world threat we would have seen it long ago?
--
Alan Bourke
alanpbourke (at) fastmail (dot) fm
On Thu, 4 Jan 2018, at
14 matches
Mail list logo