Plateforme Level Extreme
Abonnement
Profil corporatif
Produits & Services
Support
Légal
English
Malware Attack
Message
De
21/11/2015 10:05:13
 
 
À
21/11/2015 07:23:09
Dragan Nedeljkovich (En ligne)
Now officially retired
Zrenjanin, Serbia
Information générale
Forum:
Windows
Catégorie:
Autre
Titre:
Divers
Thread ID:
01627007
Message ID:
01627729
Vues:
41
>>>>>
>>>>>It's worth noting that some very advanced malware persists even across disk wipes, by embedding itself either in the system BIOS or in the firmware of disk devices.
>>>>
>>>>What would you do in that case, Al?
>>>
>>>Flash the firmware for the drive (or replace it) and re-flash the BIOS.
>>
>>How do you re-flash the BIOS, Al?
>
>Today's motherboards have lots of stuff in the BIOS. My latest has a graphical representation of itself and when you hover a mouse over things on it, it says what's plugged in that place - which processor, memory, USB device (not too smart there, mostly says "generic"), microphone etc. For flashing, it has the option to have a new BIOS on a flash drive (not sure if there's a pun in there, or whether it was intentional) and there's an option in the BIOS menu to load itself from a file on that drive (and to backup itself first). You'd be surprised how developed this has become.

Graphic should be UEFI ? I thought that was supposed to be non-flashable? (no need to get into that for some time...)
Précédent
Suivant
Répondre
Fil
Voir

Click here to load this message in the networking platform