• 1 Post
  • 166 Comments
Joined 1 year ago
cake
Cake day: June 12th, 2023

help-circle







  • w2tpmf@lemmy.worldtoMemes@lemmy.mlAmd fan
    link
    fedilink
    arrow-up
    1
    ·
    3 months ago

    I have a i7-13700k that’s been sitting in the box since I got a deal on it last month. I was pondering returning it and spending the extra couple hundred to get an AMD setup.

    I’ve been following all this then checked on the Asus site for my board and saw the BIOS updates…

    Updated with microcode 0x125 to ensure eTVB operates within Intel specificatIons…

    And this week there’s a beta release…

    The new BIOS includes Intel microcode 0x129…




  • Police officers are mentally ill? Interesting take.

    Also, we’re talking about pilots that you are already trusting with you’re life and the lives of hundreds of people with you. If they were mentally ill they could just crash the plane and kill you.

    These guys are genuinely invested in maintaining the safety of human lives.






  • I know exactly how it works. I use it every day. I never said it isnt easy. I said it’s more steps to set it up.

    Rufus: run exe, pick iso, run it

    Ventoy: run exe to install it, run it to configure the drive, copy ISOs over to the drive

    For setting up a drive that’s going to be used repeatedly and continually changing what’s on it, Ventoy is the superior tool.

    For a one time use to quickly get a ISO over to a USB… Rufus is quicker and gets the job done.

    …and again…OP already has Rufus in hand. There’s no reason to get another piece of software that doesn’t offer any advantage to OP’s task.





  • If this lets you monitor the patch status of the end clients in your org, then it’s actually cheaper than existing solutions used for managing regular Windows updates.

    The only questionable part is how reliable, trustworthy, and secure is 0patch themselves?

    Allowing a third party access to patch system level files opens the risk of a rootkit install. (In fact their agent being able to access system would function much like a rootkit itself).

    They could easily backdoor something into thousands, or even tens of thousands of PC very quickly. Make a huge botnet, steal data, etc, etc.

    Assuming they are trustworthy themselves, if their security is compromised, either from hackers or even a rogue employee, the same results could happen and could take a long time to discover.