I suspect a Windows OS with an Intel MB
have malware embedded in them.
Are there are Linux ISOs I can use to test my theory?
On Mon, 26 Aug 2024 23:50:34 -0000 (UTC), doctor@doctor.nl2k.ab.ca (The >Doctor) wrote in <vaj4ca$157e$1@gallifrey.nk.ca>:
I suspect a Windows OS with an Intel MB
have malware embedded in them.
Are there are Linux ISOs I can use to test my theory?
If only there were a worldwide database where one could ask
about this... /s
Seriously though, are you cool with clamav? Boot an ubuntu
live distro, sudo apt install clamtk, then run clamtk.
You might have to pull up the file manager to get your windows
partition mounted, then scan the mount directory recursively.
But if you suspect the virus is in the SMI for the processor, not
sure if there's anything you can do about that.
--
-v System76 Thelio Mega v1.1 x86_64 NVIDIA RTX 3090 Ti
OS: Linux 6.11.0-rc5 Release: Mint 21.3 Mem: 258G
"Never eat anything bigger than your head."
In article <lj4ldaFasmaU8@mid.individual.net>,
vallor <vallor@cultnix.org> wrote:
On Mon, 26 Aug 2024 23:50:34 -0000 (UTC), doctor@doctor.nl2k.ab.ca (The
Doctor) wrote in <vaj4ca$157e$1@gallifrey.nk.ca>:
I suspect a Windows OS with an Intel MB
have malware embedded in them.
Are there are Linux ISOs I can use to test my theory?
If only there were a worldwide database where one could ask
about this... /s
Seriously though, are you cool with clamav? Boot an ubuntu
live distro, sudo apt install clamtk, then run clamtk.
You might have to pull up the file manager to get your windows
partition mounted, then scan the mount directory recursively.
But if you suspect the virus is in the SMI for the processor, not
sure if there's anything you can do about that.
What about a debian or kali live distro?
I suspect a Windows OS with an Intel MB
have malware embedded in them.
Are there are Linux ISOs I can use to test my theory?
I suspect a Windows OS with an Intel MB
have malware embedded in them.
Are there are Linux ISOs I can use to test my theory?
--
Member - Liberal International This is doctor@nk.ca Ici doctor@nk.ca
Yahweh, King & country!Never Satan President Republic!Beware AntiChrist rising!
Look at Psalms 14 and 53 on Atheism ;
I suspect a Windows OS with an Intel MB
have malware embedded in them.
Are there are Linux ISOs I can use to test my theory?
doctor@doctor.nl2k.ab.ca (The Doctor) writes:
I suspect a Windows OS with an Intel MB
have malware embedded in them.
Are there are Linux ISOs I can use to test my theory?
Could you clarify what problem you are facing? You have a machine
that you suspect being infected by malware. And you are uncomfortable
with using it. Do I understand it correctly? Why are you feeling >uncomfortable using an infected machine? Or is the problem
another one: You are trying check your machine for malware
to have the assurance to use a machine that is not infected
by any malware. This problem has an easy solution:
Don't use your own machine. Use your employer's machine.
Your employer's IT department will take care that your
machine is being checked for malware regularly and will
do so by following best practice in IT. And you don't have to worry.
--
Member - Liberal International This is doctor@nk.ca Ici doctor@nk.ca >>Yahweh, King & country!Never Satan President Republic!Beware AntiChrist rising!
Look at Psalms 14 and 53 on Atheism ;
On Mon, 26 Aug 2024 23:50:34 -0000 (UTC), doctor@doctor.nl2k.ab.ca
(The Doctor) wrote:
I suspect a Windows OS with an Intel MB
have malware embedded in them.
Are there are Linux ISOs I can use to test my theory?
Kaspersky Rescue Disk. Unplug your network card before booting
with it, it connects to "search for updates".
Scans Windows and Linux.
I don't think it does hardware-embedded malware though.
[]'s
PS a full scan will take all night....
--
Don't be evil - Google 2004
We have a new policy - Google 2012
Google Fuchsia - 2021
I suspect a Windows OS with an Intel MB
have malware embedded in them.
Are there are Linux ISOs I can use to test my theory?
In article <40qrcjll8ifi3souqnukq23j939u869lvq@4ax.com>,
Shadow <Sh@dow.br> wrote:
On Mon, 26 Aug 2024 23:50:34 -0000 (UTC), doctor@doctor.nl2k.ab.ca
(The Doctor) wrote:
I suspect a Windows OS with an Intel MB
have malware embedded in them.
Are there are Linux ISOs I can use to test my theory?
Kaspersky Rescue Disk. Unplug your network card before booting
with it, it connects to "search for updates".
Scans Windows and Linux.
I don't think it does hardware-embedded malware though.
[]'s
PS a full scan will take all night....
Kaspersky banned in NA!
Well it is known that the Intels have a Minix fork
embedded to send data back to the factory. I think that
the data with which they are concerned relates to CPU
functions not with your Personal data.
Only thing I can suggest to excape these matters
is to go to an AMD Ryzen motherboard.
Bobbie Sellers <blissInSanFrancisco@mouse-potato.com> wrote:
Well it is known that the Intels have a Minix fork
embedded to send data back to the factory. I think that
the data with which they are concerned relates to CPU
functions not with your Personal data.
Yes, the general functions of these processors in modern CPUs are
described in detail here:
https://www.devever.net/~hl/backstage-cast
The privacy issue is that they can have the capacity to access data
in RAM, then since their firmware is closed-source one can't be
sure it doesn't collect personal data and send it back somehow. Or
it's been shown they can be hacked to do that and then snoop out
passwords etc. from RAM, which perhaps is what the OP's concerned
about.
Only thing I can suggest to excape these matters
is to go to an AMD Ryzen motherboard.
No, AMD Ryzen has it's own equivalent commonly called PSP, and it's
had documented security vulnerabilities too:
https://en.wikipedia.org/wiki/AMD_Secure_Technology#Reported_vulnerabilities
Your only real escape would be to run a CPU that's so old or
low-spec that you wouldn't have the performance to run a modern
web browser with Javascript support. Of course those web browsers
are where people generally enter information worth snooping on now,
so there's no real escape anymore.
On 2024-08-29 00:49, Computer Nerd Kev wrote:
No, AMD Ryzen has it's own equivalent commonly called PSP, and it's
had documented security vulnerabilities too:
https://en.wikipedia.org/wiki/AMD_Secure_Technology#Reported_vulnerabilities >>
Your only real escape would be to run a CPU that's so old or
low-spec that you wouldn't have the performance to run a modern
web browser with Javascript support. Of course those web browsers
are where people generally enter information worth snooping on now,
so there's no real escape anymore.
You simply need a non enterprise CPU that doesn't have the mini minix.
That feature costs money. And has to be enabled in the BIOS. The BIOS
may not have support for it, and then the feature is dead, useless.
Its purpose is not to send data back to factory. Its purpose is to be
used by the IT department for remote maintenance. And using this feature
is expensive.
On 2024-08-27 01:50, The Doctor wrote:
I suspect a Windows OS with an Intel MB
have malware embedded in them.
Are there are Linux ISOs I can use to test my theory?
You need to ask in a Windows group.
If you want to use clamav, you can do that with any linux
distro of your liking in which you install clamav.
Carlos E.R. <robin_listas@es.invalid> wrote:
On 2024-08-29 00:49, Computer Nerd Kev wrote:
No, AMD Ryzen has it's own equivalent commonly called PSP, and it's
had documented security vulnerabilities too:
https://en.wikipedia.org/wiki/AMD_Secure_Technology#Reported_vulnerabilities
Your only real escape would be to run a CPU that's so old or
low-spec that you wouldn't have the performance to run a modern
web browser with Javascript support. Of course those web browsers
are where people generally enter information worth snooping on now,
so there's no real escape anymore.
You simply need a non enterprise CPU that doesn't have the mini minix.
That feature costs money. And has to be enabled in the BIOS. The BIOS
may not have support for it, and then the feature is dead, useless.
It seems that you're talking about a specific documented exploit like
this one:
On 2024-09-01 00:15, Computer Nerd Kev wrote:
Carlos E.R. <robin_listas@es.invalid> wrote:
You simply need a non enterprise CPU that doesn't have the mini minix.
That feature costs money. And has to be enabled in the BIOS. The BIOS
may not have support for it, and then the feature is dead, useless.
It seems that you're talking about a specific documented exploit like
this one:
No, I am not talking about a exploit, but a computer department feature
that you can buy or not.
Carlos E.R. <robin_listas@es.invalid> wrote:
On 2024-09-01 00:15, Computer Nerd Kev wrote:
Carlos E.R. <robin_listas@es.invalid> wrote:
You simply need a non enterprise CPU that doesn't have the mini minix. >>>> That feature costs money. And has to be enabled in the BIOS. The BIOS
may not have support for it, and then the feature is dead, useless.
It seems that you're talking about a specific documented exploit like
this one:
No, I am not talking about a exploit, but a computer department feature
that you can buy or not.
The thing that runs the Minix fork is the Intel Management Engine.
It's part of the boot process so never completely optional.
On 2024-09-01 06:56, Computer Nerd Kev wrote:
Carlos E.R. <robin_listas@es.invalid> wrote:
No, I am not talking about a exploit, but a computer department feature
that you can buy or not.
The thing that runs the Minix fork is the Intel Management Engine.
It's part of the boot process so never completely optional.
It is optional to choose a processor that doesn't have it, or a
motherboard that doesn't support it.
Carlos E.R. <robin_listas@es.invalid> wrote:
On 2024-09-01 06:56, Computer Nerd Kev wrote:
Carlos E.R. <robin_listas@es.invalid> wrote:
No, I am not talking about a exploit, but a computer department feature >>>> that you can buy or not.
The thing that runs the Minix fork is the Intel Management Engine.
It's part of the boot process so never completely optional.
It is optional to choose a processor that doesn't have it, or a
motherboard that doesn't support it.
Certainly. I'm posting this from a laptop with a Pentium III CPU
and it doesn't have an Intel Management Engine. However I gave up
running Firefox on this years ago. Instead for that I use a PC with
a faster newer processor and that does have an Intel Management
Engine, and there's no updated BIOS available to fix some of the
known IME vulerabilities found since it was made either.
But the Talos workstations might be one solution if money and x86 compatability isn't a concern, since they use the open IBM POWER9
processor and firmware. So it is a choice, but hardly a trivial
one.
On 2024-09-01 15:10, Computer Nerd Kev wrote:
Carlos E.R. <robin_listas@es.invalid> wrote:
On 2024-09-01 06:56, Computer Nerd Kev wrote:
Carlos E.R. <robin_listas@es.invalid> wrote:
No, I am not talking about a exploit, but a computer department feature >>>>> that you can buy or not.
The thing that runs the Minix fork is the Intel Management Engine.
It's part of the boot process so never completely optional.
It is optional to choose a processor that doesn't have it, or a
motherboard that doesn't support it.
Certainly. I'm posting this from a laptop with a Pentium III CPU
and it doesn't have an Intel Management Engine. However I gave up
running Firefox on this years ago. Instead for that I use a PC with
a faster newer processor and that does have an Intel Management
Engine, and there's no updated BIOS available to fix some of the
known IME vulerabilities found since it was made either.
Does the motherboard support the feature?
It will not work without MB support. And they need access to your
LAN.
On 27/08/24 12:11, Carlos E.R. wrote:
On 2024-08-27 01:50, The Doctor wrote:
I suspect a Windows OS with an Intel MB
have malware embedded in them.
Are there are Linux ISOs I can use to test my theory?
You need to ask in a Windows group.
If you want to use clamav, you can do that with any linux distro of
your liking in which you install clamav.
I have it (and possibly, I have forgot !, running it), but I ignore how valuable this antivirus is, since it is since 2017 that I have give up following benchmarks of AVs, detections ratings and so.
So I ask : how good is it this clamav ?
Sysop: | Keyop |
---|---|
Location: | Huddersfield, West Yorkshire, UK |
Users: | 491 |
Nodes: | 16 (2 / 14) |
Uptime: | 108:36:34 |
Calls: | 9,684 |
Files: | 13,725 |
Messages: | 6,175,604 |