Speculative Store Bypass explained: what it is, how it works [telecom]

Speculative Store Bypass explained: what it is, how it works

In January, the world became aware of a new class of security threat that allows attackers to exploit common industry-wide performance optimizations of modern microprocessors (aka chips). Almost every kind of computing device was affected - from servers, workstations, and laptops, to tablets, smartphones, and other gadgets. As such, "Meltdown" and "Spectre" had a significant impact across the industry.

formatting link

***** Moderator's Note *****

Redhat is one of the companies which distributes Linux - albeit with a heavy handed tendency to try to make gullible purchasing managers think that "Redhat" is a spearate, proprietary operating system.

I prefer Ubuntu, but YMMV.

Bill Horne Moderator

Reply to
Monty Solomon
Loading thread data ...

Cabling-Design.com Forums website is not affiliated with any of the manufacturers or service providers discussed here. All logos and trade names are the property of their respective owners.