Search:

Type: Posts; User: pqwoerituytrueiwoq; Keyword(s):

Search: Search took 0.01 seconds.

  1. Sticky: [ubuntu] Re: Meltdown and Spectre Discussion Sticky

    Intel has released some new microcode for my CPU:
    https://downloadcenter.intel.com/download/28039/Linux-Processor-Microcode-Data-File?product=80811
    Should I update it myself or will there be a...
  2. Sticky: [ubuntu] Re: Meltdown and Spectre Discussion Sticky

    ARM you say lets just test my new RPI 3B+
    correct me if i am wrong, but that part just means the hardware is vulnerable, meaning you should be using a software level patch right?
    ...
  3. Sticky: [ubuntu] Re: Meltdown and Spectre Discussion Sticky

    You patched against meltdown, but not Spectre
  4. Sticky: [ubuntu] Re: Meltdown and Spectre Discussion Sticky

    the patch can be turned on/off via a boot parameter (not sure what it is yet)
    also you can check /proc/cpuinfo for the cpu_insecure flag (i think this only appears for affected CPUs)
  5. Sticky: [ubuntu] Re: new memory problem on Intel chips and Linux

    aside from the normal things like do not run untrusted software on your system i have read this can the exploited via javascript, so i would suggest using noscript to minimize the threat until the...
Results 1 to 5 of 5