Free Republic
Browse · Search
General/Chat
Topics · Post Article

More security concerns, this time from the hardware angle...
1 posted on 06/15/2016 7:43:52 PM PDT by Utilizer
[ Post Reply | Private Reply | View Replies ]


To: Utilizer

Starting from what generation x86 processor?


2 posted on 06/15/2016 7:45:43 PM PDT by Secret Agent Man (Gone Galt; Not averse to Going Bronson.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Utilizer; ShadowAce

Tech ping!.......


5 posted on 06/15/2016 7:56:36 PM PDT by Red Badger (Make America AMERICA again!.........................)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Utilizer

Is AMD any better?


6 posted on 06/15/2016 8:23:53 PM PDT by GraceG (Only a fool works hard in an environment where hard work is not appreciated...)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Utilizer

NSA back door and other foreign intel agencies and of course hackers.
“Once a system is compromised by a rootkit, attackers can gain administration access and undetectably attack the computer.”


8 posted on 06/15/2016 9:14:26 PM PDT by minnesota_bound
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Utilizer

This has been around for ages. Like core 2 duo and is featured on business class/enterprise class hardware. Is not commonly found on home/low end machines you buy at best buy or any box store.

This technology is also found in Servers as well, HP has iLo, integrated lights out and allows remote administration of machines, just like you were sitting at the machine. And Dell has iDrac, similar to HP’s iLo. These systems are computers that reside on the motherboard, have their own firmware and operating systems and you can use them even with the machine “powered off” you can even remotely reload the operating or secure erase the hard drive arrays.

Powerful stuff but nothing new and generally doesn’t affect home users.


9 posted on 06/15/2016 9:17:56 PM PDT by arl295
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Utilizer

I got a headache just reading a few sentences. So for the technologically challenged what does all this mean and what should we do? Get out the old typewriter? Can anyone provide a reader’s digest version to the article or should I just count myself as stupid.


11 posted on 06/15/2016 9:21:23 PM PDT by Maudeen (Sinner Saved by Grace)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Utilizer; dayglored

Shout out to dayglored for a possible Windows pinglist alert.

MS and Intel have always been in bed together and now creating new ways to spy on you & control you.

The machine is alive.

Welcome to SkyNet.


12 posted on 06/15/2016 9:23:37 PM PDT by RebelTex
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Utilizer

Great. Just great.


14 posted on 06/15/2016 9:30:51 PM PDT by Talisker (One who commands, must obey.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Utilizer

The article is just scaremongering. Intel AMT has been in processors for a very long time and it is disabled by default.

Unless you have an enterprise PC with a BIOS that has it, go into your BIOS, specifically and deliberately turn it on (and it will ask you twice if you want to), and register it to a management server you have nothing to worry about. Connections to AMT require encryption and that BOTH ends trust each other, if the AMT on your system isn’t registered then it trusts no one and nothing.

It’s intended for enterprise customers so that they can remotely manage their assets, not for home consumers.


25 posted on 06/16/2016 12:48:54 AM PDT by WarlordBK
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Utilizer

Oh and if you really want to make sure it can’t be used against you, reset your CMOS.


26 posted on 06/16/2016 12:48:54 AM PDT by WarlordBK
[ Post Reply | Private Reply | To 1 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson