![]() ![]() Until now no solution - this will be a future mix between hardware and software updates - BIOS updates (please always use the newest BIOS / UEFI firmware for your mainboard or laptop) and microcode installs. If you are running a 32bit version of rolling, you can update the kernel to 64bit without any problems, when your CPU is a 64bit CPU.Ī 32bit kernel update is in preparation - initial patches have been posted to the kernel mailing lists, but it will be probably just in kernel 4.14 only - so I think only available in future SliTaz next version. Only Intel CPUs are affected: Use the latest 64bit ISO - or update the kernel - "uname -r" tells you the kernel - and it should be 3.2.98 ![]() So, setting them all to default will do the trick, but it would obviously be better if you could just throw these out instead - so just use it, when you know, what you do.ġ) against Meltdown - at the moment most dangerous You cannot remove these anymore, but you can change the state of them. MOST IMPORTANT - use always the latest browser - I recommend Firefox with add-on uBlock Origin - also the add-on NoScript is helpful, but it ships now with a list of whitelisted (trusted) domains. This means, that your PC running any version of SliTaz is probably affected and in potential danger - a list of cpus, who are not affected you find here: If you don't know, what is Meltdown and Spectre, please read the following link carefully! If you want to be save and do not want to take care of all this desaster - use specially for small enterprises and privat use machines, who are not effected - EspressoBin and Pine Rock64 - the price of the Rock64 went down recently and Armbian has the perfect images for them. !!! UPDATE !!! - 8 New Intel CPU Vulnerabilities found - called spectre next generation
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |