* Posts by MrBoring

21 posts • joined 3 Nov 2017

Disk drives suck less than they did a couple of years ago. Which is nice


These looks like all SATA drives. I'd rarey buy those for the enterprise, pay the extra for NLSAS.

Here are another 45,000 reasons to patch Windows systems against old NSA exploits


Re: Is anyone using UPnP anyway?

The risks of users setting up their own port forwarding far outweighs the risks of having UPnP enabled,

Disk firmware can kill a whole cluster how exactly? Cisco explains


Re: I love how a disk firmware problem requires a UCS manager update!

Its all bollocks huh, people complained of too many different fw to track and monitor, so they create one big pack. A tiny update requires patching the whole system. It's the same as the Microsoft monthly rollups, i think its over a 1TB now for Win10/Server2016.

You know that silly fear about Alexa recording everything and leaking it online? It just happened


Alexa is welcome to listen in on my house. 90% of the conversation i filter out and it would be good to double check what my wife asked me a few hours ago.

Alexa "Dave, have you put the dish washer on yet like your wife asked you to do 2 hours ago?"

US, UK cyber cops warn Russians are rooting around in your routers


The US and UK cyber spooks found these Russian hackers by also hacking said routers.

It's March 2018, and your Windows PC can be pwned by a web article (well, none of OURS)


Reports on reddit of WIn2008R2 and Win7 clients losing their network adapter settings with yesterdays patch. Anyone here seeing the same thing?

123 Reg suffers deja vu: Websites restored from August 2017 backups amid storage meltdown


Re: This is what you get...

So do you backup your business critical Office365 email/sharepoint etc, drag it all back on-prem ?

Intel gives Broadwells and Haswells their Meltdown medicine


Re: Still no patches for...

I'm glad there's no patches for esxi. Vmware's QA has been terrible the last couple of years, there's going to be a ton of bugs going forward. I bet they don't have a massive team of engineers that deal with cpu functionality anymore as that core functionality hasn't changed for many years.

Hate to ruin your day, but... Boffins cook up fresh Meltdown, Spectre CPU design flaw exploits


Re: Don't panic, "No exploit code has been released."

I agree with this guy. One shouldn't worry (give a shit) about things that are totally out of ones control to fix, and for 99.99% of IT professionals this issue is something none of us can fix.

Saying that, i give a shit because it means more patching, more bugs, more crashes, worse performance - more wasting time on infrastructure when we could be doing stuff that actually adds value.

Microsoft works weekends to kill Intel's shoddy Spectre patch


Re: As you were

I guess this patch was for people who applied Intels crappy BIOS update and couldn't roll back.


Patch, patch and patch, that's about all anyone can recommend.

So has everyone patched all their clients and servers this Jan, or are people skipping a month and waiting to see what comes along in the Microsoft Feb'18 security rollup?


Don't these people own any trousers?

STOP! It's dangerous to upgrade to VMware 6.5 alone. Read this


5.5 to 6.0 was painless with the vcsa with built in PSC. Don't see the point of going from 6.0 to 6.5, that's just lots of pain without any gain. It must suck for sysadmins who have to just do as their told by managers who have no clue and just want to be on the latest version of everything.

NHS OKs offshoring patient data to cloud providers stateside


If this saves millions and allows us to pay nurses more, buy more MRI scanners and get 7 day a week GPs, then i'm all for it. But all the cloud migration business cases I've seen have turned out to be more costly than doing whatever you're doing on-prem.

Biggest vuln bombshell in forever and storage industry still umms and errs over patches


Most Security folks just blindly follow what their little Nessus buddy tells them.

CPU bug patch saga: Antivirus tools caught with their hands in the Windows cookie jar


A reg key question.

Is the detection built into the patch executable (KBxxxx.exe) so does it fail to run, or is it just WIndows Update that detects it?

So if you approved the patch in WSUS or roll it out via SCCM do the clients install it anyway even if the reg flag isn't set?

Intel, Microsoft confess: Meltdown, Spectre may slow your servers


Microsoft have said no more security updates unless you install this, so the choice of having performance or security isn't really an option (for Windows Servers)

Microsoft patches Windows to cool off Intel's Meltdown – wait, antivirus? Slow your roll


Not just AV

It's not only AV that it breaks. Applying this update will break other applications.

We've had reports already, Numecent’s CloudPaging solution https://www.numecent.com/cloudpaging/ stops working.

With such a fundamental change to how Windows works, there will no doubt be many applications that fail and will need updating. This is why this patch needs the reg edit before it installs, as MS know this could potentially break loads of stuff.

Someone has fixed the ESX 'VM stun' problem


I thought this issue was fixed with esxi 6.0 anyway?

To fix Intel's firmware fiasco, wait for Christmas Eve or 2018


Isn't this exactly the same thing that happened in May?

OK, we admit it. Under the hood, the iPhone X is a feat of engineering


But can it run Crysis?

Biting the hand that feeds IT © 1998–2019