On Wed 11 Jun 2014 11:13:21 AM CDT, Lew Wolfgang wrote:
On 06/11/2014 10:58 AM, Anton Aylward wrote:
On 06/11/2014 01:49 PM, Lew Wolfgang wrote:
There are known rootkits that will flash the BIOS to insert themselves into the boot process, so the concern was if code can be flashed, could other data be living in there somewhere? Either accidentally or on purpose?
I know I'm being overly paranoid, it's just CYA on my part. Maybe not.
You said 'sensitive data'. If the mobo is rooted than there are risks in it use, but its not that there is sensitive data still there :-)
If the boards are to be decommissioned aka ground up then the rootkit isn't an issue.
Are are they going to be deployed in a setting of lower security rating and you are worried about information leak?
Hi Anton,
The concern would be of information leaks. Of course, the safest course is to grind up the motherboards, but the residual value of the remaining carcasses goes way down...
Regards, Lew
Regards, Lew
Hi If you run through a BIOS update, it should give you the option to backup the existing BIOS, then do an md5sum against an original BIOS of the same version versus the backed up BIOS. -- Cheers Malcolm °¿° SUSE Knowledge Partner (Linux Counter #276890) openSUSE 13.1 (Bottle) (x86_64) 3.10.1 Kernel 3.11.10-11-desktop up 2 days 12:59, 3 users, load average: 0.00, 0.01, 0.05 CPU Intel® B840@1.9GHz | GPU Intel® Sandybridge Mobile -- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org To contact the owner, e-mail: opensuse+owner@opensuse.org