Saturday, 13 January 2018

Meltdown and Spectre CPU Vulnerability Checker for Linux 2018 By SSTec Tutorials



Meltdown and Spectre CPU Vulnerability Checker for Linux 2018 By SSTec Tutorials.

Meltdown And Spectre Exploit Critical Vulnerabilities In Modern Processors. These Hardware Vulnerabilities Allow Programs To Steal Data Which Is Currently Processed On The Computer.

There Are Patches Against Meltdown For Linux: https://lwn.net/Articles/738975/

What is Meltdown and Spectre CPU Vulnerability?

Meltdown And Spectre Exploit Critical Vulnerabilities In Modern Processors. These Hardware Vulnerabilities Allow Programs To Steal Data Which Is Currently Processed On The Computer. While Programs Are Typically Not Permitted To Read Data From Other Programs, A Malicious Program Can Exploit Meltdown And Spectre To Get Hold Of Secrets Stored In The Memory Of Other Running Programs. This Might Include Your Passwords Stored In A Password Manager Or Browser, Your Personal Photos, Emails, Instant Messages And Even Business-Critical Documents.

Meltdown and Spectre Work on Personal Computers, Mobile Devices, And In the Cloud. Depending On The Cloud Provider's Infrastructure, It Might Be Possible To Steal Data From Other Customers.

Which Systems Are Affected By Meltdown?

Effectively Every Processor since 1995 (Except Intel Itanium and Intel Atom before 2013). Almost Every System Is Affected By Spectre: Desktops, Laptops, Cloud Servers, As Well As Smartphone’s. More Specifically, All Modern Processors Capable Of Keeping Many Instructions In Flight Are Potentially Vulnerable. In Particular, Verified Spectre On Intel, AMD, And ARM Processors.

For More Information Check That Link:  https://meltdownattack.com/

Spectre-Meltdown-Checker - Spectre & Meltdown Vulnerability/Mitigation Checker for Linux

GitHub Download Link: https://github.com/speed47/spectre-meltdown-checker


SHARE BY GK

Harry

Author & Editor

A technology enthusiast and addictive blogger who likes to hacking tricks and wish to be the best White Hacket Hacker of the World.

0 comments:

Post a Comment

Note: only a member of this blog may post a comment.