Sujet : Re: ISO of a linux animalware / antivirus scanner
De : not (at) *nospam* telling.you.invalid (Computer Nerd Kev)
Groupes : comp.os.linux.miscDate : 01. Sep 2024, 06:56:35
Autres entêtes
Organisation : Ausics - https://newsgroups.ausics.net
Message-ID : <66d3f402@news.ausics.net>
References : 1 2 3 4 5 6
User-Agent : tin/2.0.1-20111224 ("Achenvoir") (UNIX) (Linux/2.4.31 (i686))
Carlos E.R. <
robin_listas@es.invalid> wrote:
On 2024-09-01 00:15, Computer Nerd Kev wrote:
Carlos E.R. <robin_listas@es.invalid> wrote:
You simply need a non enterprise CPU that doesn't have the mini minix.
That feature costs money. And has to be enabled in the BIOS. The BIOS
may not have support for it, and then the feature is dead, useless.
It seems that you're talking about a specific documented exploit like
this one:
No, I am not talking about a exploit, but a computer department feature
that you can buy or not.
The thing that runs the Minix fork is the Intel Management Engine.
It's part of the boot process so never completely optional. It can
load optional modules listed here though:
https://en.wikipedia.org/wiki/Intel_Management_Engine#ModulesSome security vulerabilities are in the optional modules, but
others still exist even if they're disabled, and either route has
allowed code to be installed which snoops on the user.
See this:
"Difference from Intel AMT
The Management Engine is often confused with Intel AMT (Intel
Active Management Technology). AMT runs on the ME, but is only
available on processors with vPro. AMT gives device owners
remote administration of their computer,[5] such as powering
it on or off, and reinstalling the operating system.
However, the ME itself has been built into all Intel chipsets
since 2008, not only those with AMT. While AMT can be
unprovisioned by the owner, there is no official, documented
way to disable the ME."
https://en.wikipedia.org/wiki/Intel_Management_Engine#Difference_from_Intel_AMT-- __ __#_ < |\| |< _#