Kiss your arse goodbye - you are history
REMLR 243
2007 Range Rover Sport TDV6
1977 FC 101
1976 Jaguar XJ12C
1973 Haflinger AP700
1971 Jaguar V12 E-Type Series 3 Roadster
1957 Series 1 88"
1957 Series 1 88" Station Wagon
1998 Discovery 300TDi Manual SE7
1996 Discovery 300TDi Auto
2012 SZ Territory TX 2.7TDCi
"Make the lie big, make it simple, keep saying it, and eventually they will believe it." -- a warning from Adolf Hitler
"If you don't have a sense of humour, you probably don't have any sense at all!" -- a wise observation by someone else
'If everyone colludes in believing that war is the norm, nobody will recognize the imperative of peace." -- Anne Deveson
“What you leave behind is not what is engraved in stone monuments, but what is woven into the lives of others.” - Pericles
"The happiness of your life depends upon the quality of your thoughts." Marcus Aurelius
ha, that would actualy work
https://support.microsoft.com/en-us/...-cve-2019-0708
Hmmmm. That may explain my work computer forcing an urgent update and reboot just now...
DiscoClax
'94 D1 3dr Aegean Blue - 300ci stroker RV8, 4HP24 & Compushift, usual bar-work, various APT gear, 235/85 M/Ts, 3deg arms, Detroit lockers, $$$$, etc.
'08 RRS TDV8 Rimini Red - 285/60R18 Falken AT3Ws, Rock slider-steps, APT full under-protection, Mitch Hitch, Tradesman rack, Traxide DBS, Gap IID
You are most likely vulnerable just by having your computer on and connected to the internet, you need to be doing nothing special to be caught up in this.
A remote code execution vulnerability exists in Remote Desktop Services – formerly known as Terminal Services – when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests. This vulnerability is pre-authentication and requires no user interaction. An attacker who successfully exploited this vulnerability could execute arbitrary code on the target system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
2011 D4 3.0 SDV6
1999 D2 V8, in heaven
1984 RRC, in hell
This is now talking about RDP and Windows Terminal Services. Quiet different to side channel attacks and speculative execution attacks. The original post was about an Intel vulnerability which applied to all operating systems. And hence why the second poster asked if it was about zombieload, being the latest exploit of that nature.
Our car: Fuji White MY13 D4 SDV6 SE 3.0 Litre, 8 spd auto.
My car: Series 2a Workshop, 109 inch WB, ex mil., 1971. To be restored.
Wife's car: Series 2a FFT, LWB, ex. mil., 1966. To be restored.
1998 Discovery 300TDi Manual SE7
1996 Discovery 300TDi Auto
2012 SZ Territory TX 2.7TDCi
"Make the lie big, make it simple, keep saying it, and eventually they will believe it." -- a warning from Adolf Hitler
"If you don't have a sense of humour, you probably don't have any sense at all!" -- a wise observation by someone else
'If everyone colludes in believing that war is the norm, nobody will recognize the imperative of peace." -- Anne Deveson
“What you leave behind is not what is engraved in stone monuments, but what is woven into the lives of others.” - Pericles
"The happiness of your life depends upon the quality of your thoughts." Marcus Aurelius
nice,,
update KB4494441 -Error 0x80070005
microsoft says to sfc /scannow
ok--
"Windows Resource Protection could not perform the requested operation."
sigh..
"How long since you've visited The Good Oil?"
'93 V8 Rossi
'97 to '07. sold.
'01 V8 D2
'06 to 10. written off.
'03 4.6 V8 HSE D2a with Tornado ECM
'10 to '21
'16.5 RRS SDV8
'21 to Infinity and Beyond!
1988 Isuzu Bus. V10 15L NA Diesel
Home is where you park it..
[IMG][/IMG]
Search AULRO.com ONLY! |
Search All the Web! |
---|
|
|
Bookmarks