• 0 Posts
  • 14 Comments
Joined 1 year ago
cake
Cake day: June 12th, 2023

help-circle

  • w2tpmf@lemmy.worldtoMemes@lemmy.mlAmd fan
    link
    fedilink
    arrow-up
    1
    ·
    1 month ago

    I have a i7-13700k that’s been sitting in the box since I got a deal on it last month. I was pondering returning it and spending the extra couple hundred to get an AMD setup.

    I’ve been following all this then checked on the Asus site for my board and saw the BIOS updates…

    Updated with microcode 0x125 to ensure eTVB operates within Intel specificatIons…

    And this week there’s a beta release…

    The new BIOS includes Intel microcode 0x129…





  • If this lets you monitor the patch status of the end clients in your org, then it’s actually cheaper than existing solutions used for managing regular Windows updates.

    The only questionable part is how reliable, trustworthy, and secure is 0patch themselves?

    Allowing a third party access to patch system level files opens the risk of a rootkit install. (In fact their agent being able to access system would function much like a rootkit itself).

    They could easily backdoor something into thousands, or even tens of thousands of PC very quickly. Make a huge botnet, steal data, etc, etc.

    Assuming they are trustworthy themselves, if their security is compromised, either from hackers or even a rogue employee, the same results could happen and could take a long time to discover.


  • …it won’t let me edit my other comment but I wanted to add that YES using MFA is demonstratively far more safe than any password you can set.

    With a multi factor enabled you could literally give your password out and people could not access your account without being able to complete that second layer of security.