Kiss your arse goodbye - you are history![]()
REMLR 243
2007 Range Rover Sport TDV6
1977 FC 101
1976 Jaguar XJ12C
1973 Haflinger AP700
1971 Jaguar V12 E-Type Series 3 Roadster
1957 Series 1 88"
1957 Series 1 88" Station Wagon
2007 Discovery 3 SE7 TDV6 2.7
2012 SZ Territory TX 2.7 TDCi
"Make the lie big, make it simple, keep saying it, and eventually they will believe it." -- a warning from Adolf Hitler
"If you don't have a sense of humour, you probably don't have any sense at all!" -- a wise observation by someone else
'If everyone colludes in believing that war is the norm, nobody will recognize the imperative of peace." -- Anne Deveson
“What you leave behind is not what is engraved in stone monuments, but what is woven into the lives of others.” - Pericles
"We can ignore reality, but we cannot ignore the consequences of ignoring reality.” – Ayn Rand
"The happiness of your life depends upon the quality of your thoughts." Marcus Aurelius
ha, that would actualy work
https://support.microsoft.com/en-us/...-cve-2019-0708
Current Cars:
2013 E3 Maloo, 350kw
2008 RRS, TDV8
1995 VS Clubsport
Previous Cars:
2008 ML63, V8
2002 VY SS Ute, 300kw
2002 Disco 2, LS1 conversion
Hmmmm. That may explain my work computer forcing an urgent update and reboot just now...
DiscoClax
'94 D1 3dr Aegean Blue - 300ci stroker RV8, 4HP24 & Compushift, usual bar-work, various APT gear, 235/85 M/Ts, 3deg arms, Detroit lockers, $$$$, etc.
'08 RRS TDV8 Rimini Red - 285/60R18 Falken AT3Ws, Rock slider-steps, APT full under-protection, Mitch Hitch, Tradesman rack, Traxide DBS, Gap IID
You are most likely vulnerable just by having your computer on and connected to the internet, you need to be doing nothing special to be caught up in this.
A remote code execution vulnerability exists in Remote Desktop Services – formerly known as Terminal Services – when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests. This vulnerability is pre-authentication and requires no user interaction. An attacker who successfully exploited this vulnerability could execute arbitrary code on the target system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
2024 RRS on the road
2011 D4 3.0 in the drive way
1999 D2 V8, in heaven
1984 RRC, in hell
This is now talking about RDP and Windows Terminal Services. Quiet different to side channel attacks and speculative execution attacks. The original post was about an Intel vulnerability which applied to all operating systems. And hence why the second poster asked if it was about zombieload, being the latest exploit of that nature.
2007 Discovery 3 SE7 TDV6 2.7
2012 SZ Territory TX 2.7 TDCi
"Make the lie big, make it simple, keep saying it, and eventually they will believe it." -- a warning from Adolf Hitler
"If you don't have a sense of humour, you probably don't have any sense at all!" -- a wise observation by someone else
'If everyone colludes in believing that war is the norm, nobody will recognize the imperative of peace." -- Anne Deveson
“What you leave behind is not what is engraved in stone monuments, but what is woven into the lives of others.” - Pericles
"We can ignore reality, but we cannot ignore the consequences of ignoring reality.” – Ayn Rand
"The happiness of your life depends upon the quality of your thoughts." Marcus Aurelius
nice,,
update KB4494441 -Error 0x80070005
microsoft says to sfc /scannow
ok--
"Windows Resource Protection could not perform the requested operation."
sigh..
"How long since you've visited The Good Oil?"
'93 V8 Rossi
'97 to '07. sold.![]()
'01 V8 D2
'06 to 10. written off.
'03 4.6 V8 HSE D2a with Tornado ECM
'10 to '21
'16.5 RRS SDV8
'21 to Infinity and Beyond!
1988 Isuzu Bus. V10 15L NA Diesel
Home is where you park it..
[IMG][/IMG]
| Search AULRO.com ONLY! | 
    Search All the Web! | 
  
|---|
| 
 | 
 | 
Bookmarks