Plateforme Level Extreme
Abonnement
Profil corporatif
Produits & Services
Support
Légal
English
Malware Attack
Message
De
21/11/2015 16:21:09
Dragan Nedeljkovich (En ligne)
Now officially retired
Zrenjanin, Serbia
 
 
À
21/11/2015 10:05:13
Information générale
Forum:
Windows
Catégorie:
Autre
Titre:
Divers
Thread ID:
01627007
Message ID:
01627735
Vues:
40
>>>>>>
>>>>>>It's worth noting that some very advanced malware persists even across disk wipes, by embedding itself either in the system BIOS or in the firmware of disk devices.
>>>>>
>>>>>What would you do in that case, Al?
>>>>
>>>>Flash the firmware for the drive (or replace it) and re-flash the BIOS.
>>>
>>>How do you re-flash the BIOS, Al?
>>
>>Today's motherboards have lots of stuff in the BIOS. My latest has a graphical representation of itself and when you hover a mouse over things on it, it says what's plugged in that place - which processor, memory, USB device (not too smart there, mostly says "generic"), microphone etc. For flashing, it has the option to have a new BIOS on a flash drive (not sure if there's a pun in there, or whether it was intentional) and there's an option in the BIOS menu to load itself from a file on that drive (and to backup itself first). You'd be surprised how developed this has become.
>
>Graphic should be UEFI ? I thought that was supposed to be non-flashable? (no need to get into that for some time...)

Due to graphic nature of the your post, parental discretion should hire an advisor...

back to same old

the first online autobiography, unfinished by design
What, me reckless? I'm full of recks!
Balkans, eh? Count them.
Précédent
Répondre
Fil
Voir

Click here to load this message in the networking platform