POV-Ray : Newsgroups : povray.off-topic : Intel Security Flaw : Re: Intel Security Flaw Server Time
18 May 2024 13:29:38 EDT (-0400)
  Re: Intel Security Flaw  
From: Francois Labreque
Date: 16 Jan 2018 10:48:53
Message: <5a5e1ee5$1@news.povray.org>

> Am 13.01.2018 um 13:57 schrieb Bald Eagle:
>> "...another serious flaw in Intel hardware, which could enable hackers to access
>> corporate laptops. Standard password of Intels Management Engine BIOS Extension
>> are rarely changed and can invoke business laptops vulnerable to unauthorized
>> remote access, claims F-Secure. "
>>
>>
>> http://www.guru3d.com/news-story/new-security-flaw-hits-intellaptops-this-time.html
>
> Rather boring, this one. Too easy to fix.

Easy, but time and resource consuming.

1. Send an e-mail to all the company's users asking them to do something 
scary and complicated.  Which they will ignore.  So you move to the next 
step.

2. Force everyone to bring their laptop in the office so that the 
technician can do it for them and check them off the list.  Travelling 
sales staff and telecommuters will complain about lost productivity and 
ask for travel expenses.  And you still have to hunt people on vacation, 
maternity leave, and those who ignore e-mails from IT.

Meanwhile, someone will leave their laptop in their bedroom, while 
visiting the in-laws at the cottage, and their nephew will enable remote 
management for the lulz.  And boom!  Anonymous is IN UR BASE KILLIN UR 
DUDEZ!

-- 
/*Francois Labreque*/#local a=x+y;#local b=x+a;#local c=a+b;#macro P(F//
/*    flabreque    */L)polygon{5,F,F+z,L+z,L,F pigment{rgb 9}}#end union
/*        @        */{P(0,a)P(a,b)P(b,c)P(2*a,2*b)P(2*b,b+c)P(b+c,<2,3>)
/*   gmail.com     */}camera{orthographic location<6,1.25,-6>look_at a }

---
This email has been checked for viruses by AVG.
http://www.avg.com


Post a reply to this message

Copyright 2003-2023 Persistence of Vision Raytracer Pty. Ltd.