ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login
    1. Topics
    2. Tags
    3. intel
    Log in to post
    • All categories
    • scottalanmillerS

      Is Intel VROC FakeRAID?

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion raid fakeraid software raid hardware raid intel intel vroc raid on cpu storage
      3
      3 Votes
      3 Posts
      833 Views
      scottalanmillerS

      @DustinB3403 said in Is Intel VROC FakeRAID?:

      @scottalanmiller

      I'm not shocked.

      Par for the course for Intel storage.

    • OksanaO

      See What Cutting-Edge NVMe-oF Tech Is All About: Part 2

      Watching Ignoring Scheduled Pinned Locked Moved Starwind starwind nvme nvme-of rdma tcp intel optane ssd linux
      1
      0 Votes
      1 Posts
      577 Views
      No one has replied
    • gjacobseG

      New secret-spilling hole in Intel CPUs sends company patching (again)

      Watching Ignoring Scheduled Pinned Locked Moved News intel pentium celeron atom vulnerability apollo lake gemini lake gemini lake refresh fuse encryption key
      4
      3 Votes
      4 Posts
      815 Views
      ObsolesceO

      @scottalanmiller said in New secret-spilling hole in Intel CPUs sends company patching (again):

      If you build in a back door, people will use it.

      So tired of Intel's messes.

    • OksanaO

      StarWind and Intel Making Ultimate Performance Accessible

      Watching Ignoring Scheduled Pinned Locked Moved News intel intel optane hyperconverged appliance hyperconverged starwind iops
      1
      1 Votes
      1 Posts
      571 Views
      No one has replied
    • OksanaO

      Ultimate Hardware Utilization or Why 26.8M IOPS Is Not a Limit

      Watching Ignoring Scheduled Pinned Locked Moved Starwind intel optane intel starwind vsan supermicro mellanox hci iops xeon
      2
      1 Votes
      2 Posts
      675 Views
      scottalanmillerS

      Our own @Stuka in the picture 😉

    • Emad RE

      Greg Kroah-Hartman: Intel's security problems are not going away - from Fudzilla

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion fudzilla greg intel kroah-hartman
      1
      0 Votes
      1 Posts
      338 Views
      No one has replied
    • scottalanmillerS

      Introducing MeshCentral on SAMIT as a Remote Access and Support Tool for the SMB IT Department

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion meshcentral meshcentral 2 software open source remote access remote desktop remote support intel samit youtube scott alan miller
      46
      0 Votes
      46 Posts
      4k Views
      J

      @scottalanmiller That's one hell of a run on sentence! Do you actually speak without pausing or breathing? 🙂

    • OksanaO

      “Wow, that’s a new HCI industry high score”

      Watching Ignoring Scheduled Pinned Locked Moved News hci hyperconvergence starwind mellanox intel supermicro iops performance hyperconverged infrastructure
      1
      2 Votes
      1 Posts
      559 Views
      No one has replied
    • scottalanmillerS

      SAMIT on Huawei vs US & Google Day Two Recap

      Watching Ignoring Scheduled Pinned Locked Moved News google huawei intel micron qualcomm
      3
      3 Votes
      3 Posts
      652 Views
      scottalanmillerS

      @Emad-R said in SAMIT on Huawei vs US & Google Day Two Recap:

      huawei owns middle east the global market

      FTFY

    • WrCombsW

      When Anti-Virus Companies Get Hacked: Symantec, Trend Micro, and Intel McAfee

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion antivirus hacked breach symantec av trend micro mcafee intel
      10
      0 Votes
      10 Posts
      1k Views
      scottalanmillerS

      @Dashrender said in When Anti-Virus Companies Get Hacked: Symantec, Trend Micro, and Intel McAfee:

      I can't recall if the bad ccleaner was signed or not?

      Even if it was, that would be a Microsoft compromise. This is about the AV vendors getting hacked.

    • WLS-ITGuyW

      Getting ready to spec new desktops

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion amd rizen intel
      5
      0 Votes
      5 Posts
      464 Views
      scottalanmillerS

      @Pete-S said in Getting ready to spec new desktops:

      The A chips are probably AMD's A-series desktop chips.
      https://www.amd.com/en/processors/athlon-and-a-series

      Those are what we use when we say that we use AMD chips. AMD A9 and A10. They are perfect for business desktops that aren't like CAD stations or whatever. I use the A10 myself. I'd really like to move up to the new A12. Ryzen is more for video game or high performance workstation usage, not standard office work. The A series are, IMHO, ideal for the average office worker (which includes IT people.)

    • scottalanmillerS

      Researchers use Intel SGX to put malware beyond the reach of antivirus software

      Watching Ignoring Scheduled Pinned Locked Moved News ars technica intel processor intel sgx malware ransomware security
      3
      1 Votes
      3 Posts
      759 Views
      scottalanmillerS

      @stacksofplates said in Researchers use Intel SGX to put malware beyond the reach of antivirus software:

      Did you see what Intel said regarding this:

      Intel is aware of this research which is based upon assumptions that are outside the threat model for Intel SGX. The value of Intel SGX is to execute code in a protected enclave; however, Intel SGX does not guarantee that the code executed in the enclave is from a trusted source. In all cases, we recommend utilizing programs, files, apps, and plugins from trusted sources. Protecting customers continues to be a critical priority for us and we would like to thank Michael Schwarz, Samuel Weiser, and Daniel Grus for their ongoing research and for working with Intel on coordinated vulnerability disclosure.

      Outside of the threat model?.........

      Haha, whatever that means.

    • mlnewsM

      Spectre, Meltdown researchers unveil 7 more speculative execution attacks

      Watching Ignoring Scheduled Pinned Locked Moved News intel cpu security ars technica meltdown spectre
      1
      1 Votes
      1 Posts
      549 Views
      No one has replied
    • mlnewsM

      Intel Announces Cascade Lake Processors

      Watching Ignoring Scheduled Pinned Locked Moved News intel cascade lake xeon processor cpu ars technica
      1
      2 Votes
      1 Posts
      555 Views
      No one has replied
    • mlnewsM

      New Hyperthreading Exploit Affects Intel CPUs, Maybe AMD

      Watching Ignoring Scheduled Pinned Locked Moved News intel security exploit hyperthreading cpu ars technica
      2
      2 Votes
      2 Posts
      713 Views
      Emad RE

      @mlnews

      There goes Ed25519

      Might as well stick to RSA 4096

    • IRJI

      Eight new Spectre Variant Vulnerabilities for Intel Discovered - four of them critical

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion spectre meltdown intel amd
      7
      3 Votes
      7 Posts
      1k Views
      scottalanmillerS

      @kelly said in Eight new Spectre Variant Vulnerabilities for Intel Discovered - four of them critical:

      @tim_g said in Eight new Spectre Variant Vulnerabilities for Intel Discovered - four of them critical:

      Wow....

      But how practical is it to not only first exploit the Spectre vulnerability, but then to get any useful data from most likely other unknown shared VMs on the same box? (really, only on a shared hosting provider host is where 99.9% of the threat is)

      This stuff is discarded speculative cached data... maybe a thumbnail you won't be viewing (if it goes that big), or maybe a few bits leading in that direction... maybe credentials (that are encrypted anyways)...

      It seems like all you can do is "fish" for unknown discarded speculative data... it doesn't really sound like a huge practical threat, however, I do see the severity and horrible potential of it, just not the practicality.

      Here is how I see it playing out in the larger world. Bad actors will be spinning up VMs on hosting providers' hardware, and then trolling for data of cohosted VMs. It isn't a large problem in a secure environment where the list of people who can spin up VMs also have the credentials necessary to make a Spectre-ng attack a waste of time and energy.

      Also worth noting, in a cloud environment the data that can be caught this way is essentially random and ephemeral. What works today won't work tomorrow, and whose data you are getting is normally unknown. The scale and anonymity of cloud computing makes these attacks more possible, but less effective, almost to the point of useless.

    • OksanaO

      Configure your system right to let your NVMe disks ace!

      Watching Ignoring Scheduled Pinned Locked Moved Starwind nvme ssd ssd raid5 nvm performance intel
      1
      1 Votes
      1 Posts
      733 Views
      No one has replied
    • mlnewsM

      Intel Releases Core+ Processors, with Bundled Optane Drives

      Watching Ignoring Scheduled Pinned Locked Moved News intel core+ optane ssd processor toms hardware
      1
      1 Votes
      1 Posts
      711 Views
      No one has replied
    • CCWTechC

      Patch Tuesday - Intel Network Drivers

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion network intel patch tuesday
      12
      3 Votes
      12 Posts
      2k Views
      CCWTechC

      @dbeato said in Patch Tuesday - Intel Network Drivers:

      @ccwtech said in Patch Tuesday - Intel Network Drivers:

      Apparently Ninja doesn't control that, so it must have been Windows update defaults.

      Wow, check it and see if you can apply a GPO to not allow for that.

      As soon as the fire is out... I'll have to take a look.

    • jepoytengcoJ

      TPM vs PTT

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion ptt tpm intel security bitlocker encryption
      2
      2 Votes
      2 Posts
      6k Views
      scottalanmillerS

      PTT is a way of provider TPM, they are not two separate things. PTT is a non-dedicated hardware approach to TPM 2.0. PTT is designed for low power devices, often used in industrial computing.

      Traditionally TPM requires a TPM module, a dedicated hardware processor and firmware for security. With TPM 2.0 dedicated hardware is no longer required. PTT is Intel's implementation of TPM 2.0 for low power systems.

    • 1
    • 2
    • 3
    • 1 / 3