* Posts by MrBoring

21 posts • joined 3 Nov 2017

Disk drives suck less than they did a couple of years ago. Which is nice

MrBoring

These looks like all SATA drives. I'd rarey buy those for the enterprise, pay the extra for NLSAS.

Here are another 45,000 reasons to patch Windows systems against old NSA exploits

MrBoring

Re: Is anyone using UPnP anyway?

The risks of users setting up their own port forwarding far outweighs the risks of having UPnP enabled,

Disk firmware can kill a whole cluster how exactly? Cisco explains

MrBoring

Re: I love how a disk firmware problem requires a UCS manager update!

Its all bollocks huh, people complained of too many different fw to track and monitor, so they create one big pack. A tiny update requires patching the whole system. It's the same as the Microsoft monthly rollups, i think its over a 1TB now for Win10/Server2016.

You know that silly fear about Alexa recording everything and leaking it online? It just happened

MrBoring

Alexa is welcome to listen in on my house. 90% of the conversation i filter out and it would be good to double check what my wife asked me a few hours ago.

Alexa "Dave, have you put the dish washer on yet like your wife asked you to do 2 hours ago?"

US, UK cyber cops warn Russians are rooting around in your routers

MrBoring

The US and UK cyber spooks found these Russian hackers by also hacking said routers.

It's March 2018, and your Windows PC can be pwned by a web article (well, none of OURS)

MrBoring

Reports on reddit of WIn2008R2 and Win7 clients losing their network adapter settings with yesterdays patch. Anyone here seeing the same thing?

123 Reg suffers deja vu: Websites restored from August 2017 backups amid storage meltdown

MrBoring

Re: This is what you get...

So do you backup your business critical Office365 email/sharepoint etc, drag it all back on-prem ?

Intel gives Broadwells and Haswells their Meltdown medicine

MrBoring

Re: Still no patches for...

I'm glad there's no patches for esxi. Vmware's QA has been terrible the last couple of years, there's going to be a ton of bugs going forward. I bet they don't have a massive team of engineers that deal with cpu functionality anymore as that core functionality hasn't changed for many years.

Hate to ruin your day, but... Boffins cook up fresh Meltdown, Spectre CPU design flaw exploits

MrBoring

Re: Don't panic, "No exploit code has been released."

I agree with this guy. One shouldn't worry (give a shit) about things that are totally out of ones control to fix, and for 99.99% of IT professionals this issue is something none of us can fix.

Saying that, i give a shit because it means more patching, more bugs, more crashes, worse performance - more wasting time on infrastructure when we could be doing stuff that actually adds value.

Microsoft works weekends to kill Intel's shoddy Spectre patch

MrBoring

Re: As you were

I guess this patch was for people who applied Intels crappy BIOS update and couldn't roll back.

MrBoring

Patch, patch and patch, that's about all anyone can recommend.

So has everyone patched all their clients and servers this Jan, or are people skipping a month and waiting to see what comes along in the Microsoft Feb'18 security rollup?

MrBoring

Don't these people own any trousers?

STOP! It's dangerous to upgrade to VMware 6.5 alone. Read this

MrBoring

5.5 to 6.0 was painless with the vcsa with built in PSC. Don't see the point of going from 6.0 to 6.5, that's just lots of pain without any gain. It must suck for sysadmins who have to just do as their told by managers who have no clue and just want to be on the latest version of everything.

NHS OKs offshoring patient data to cloud providers stateside

MrBoring

If this saves millions and allows us to pay nurses more, buy more MRI scanners and get 7 day a week GPs, then i'm all for it. But all the cloud migration business cases I've seen have turned out to be more costly than doing whatever you're doing on-prem.

Biggest vuln bombshell in forever and storage industry still umms and errs over patches

MrBoring

Most Security folks just blindly follow what their little Nessus buddy tells them.

CPU bug patch saga: Antivirus tools caught with their hands in the Windows cookie jar

MrBoring

A reg key question.

Is the detection built into the patch executable (KBxxxx.exe) so does it fail to run, or is it just WIndows Update that detects it?

So if you approved the patch in WSUS or roll it out via SCCM do the clients install it anyway even if the reg flag isn't set?

Intel, Microsoft confess: Meltdown, Spectre may slow your servers

MrBoring

Microsoft have said no more security updates unless you install this, so the choice of having performance or security isn't really an option (for Windows Servers)

Microsoft patches Windows to cool off Intel's Meltdown – wait, antivirus? Slow your roll

MrBoring

Not just AV

It's not only AV that it breaks. Applying this update will break other applications.

We've had reports already, Numecent’s CloudPaging solution https://www.numecent.com/cloudpaging/ stops working.

With such a fundamental change to how Windows works, there will no doubt be many applications that fail and will need updating. This is why this patch needs the reg edit before it installs, as MS know this could potentially break loads of stuff.

Someone has fixed the ESX 'VM stun' problem

MrBoring

I thought this issue was fixed with esxi 6.0 anyway?

To fix Intel's firmware fiasco, wait for Christmas Eve or 2018

MrBoring

Isn't this exactly the same thing that happened in May?

OK, we admit it. Under the hood, the iPhone X is a feat of engineering

MrBoring

But can it run Crysis?

Biting the hand that feeds IT © 1998–2019