Firmware remote vulnerability in Intel business products
-------- Forwarded Message --------
Subject: Intel's Management Technology is indeed vulnerable
Date: Tue, 2 May 2017 19:49:54 +0200 (CEST)
From: I love OpenBSD <lampshade(a)poczta.fm>
To: misc(a)openbsd.org
INTEL-SA-00075
There is an escalation of privilege vulnerability in Intel® Active Management Technology (AMT), Intel® Standard Manageability (ISM), and Intel® Small Business Technology versions firmware versions 6.x, 7.x, 8.x 9.x, 10.x, 11.0, 11.5, and 11.6 that can allow an unprivileged attacker to gain control of the manageability features provided by these products.
Can I preview a bitlink before clicking on it?
https://support.bitly.com/hc/en-us/articles/230650447-Can-I-preview-a-bitli…
Arstechnica:
http://bit.ly/2qyHCQn
Semiaccurate:
http://bit.ly/2pB2MjO
Intel's PDF:
http://intel.ly/2qAK4G0
https://www.humblebundle.com/books/python-programming-no-starch-books
Humble Book Bundle: Python Programming by No Starch Press
-- Some of the books are targetted for learner/children.
4 days
USD1 (about AU$1.48) or greater
Automate the Boring Stuff with Python
Invent Your Own Computer Games with Python
Black Hat Python
Python for Kids
Code Craft
USD8 (about AU$11.86) or greater
Cracking Codes with Python
Doing Math with Python
Gray Hat Python
Python Playground
Teach Your Kids to Code
USD15 (about AU$22.24) or greater
Serious Python
Impractical Python Projects
Math Adventures with Python
Mission Python
The "Keep Books Weird" bundle (6 days) may interest some.
https://www.humblebundle.com/books/information-technology-security-book
Humble Book Bundle: IT Security by Taylor & Francis
18 days
USD1 (about AU$1.48) or greater
Understanding the New European Data Protection Rules
Intrusion Detection and Prevention for Mobile Ecosystems
Intrusion Detection Networks
Iris Biometric Model for Secured Network Access
Computer Security Literacy
The CISO Journey
USD8 (about AU$11.86) or greater
Collaborative Cyber Threat Intelligence
Defense Against the Black Arts
Ethical Hacking and Penetration Testing Guide
Unauthorized Access
Big Data Analytics with Applications in Insider Threat Detection
Data Analytics for Internal Auditors
Responsive Security
Supply Chain Risk Management
USD15 (about AU$22.24) or greater
Implementing Cybersecurity
Threat Level Red
Social Media Warfare
Web Security
Information Security Fundamentals
Security Strategy
Walling Out the Insiders
Security De-Engineering
Network and Data Security for Non-Engineers
Big Data Analytics in Cybersecurity
Hello everyone,
My colleagues in NZ have a serious issue with a DB2 (version 8.1). It
is stuck after a crash recovery.
If somebody is out here who could be of quick help, that would be very
appreciated.
I cannot speak for finance, but I think I get something out of it for
you too as well.
Regards
Peter
Humble Book Bundle: Data Analysis & Machine Learning by O'Reilly
https://www.humblebundle.com/books/data-analysis-machine-learning-books
TIME LEFT 06 days
USD1 (about AU$1.48) or greater
Graphing Data with R
Practical Statistics for Data Scientists
Deep Learning Cookbook
Practical Tableau
Learning TensorFlow
USD8 (about AU$11.82) or greater
Learning Apache Drill
Visualizing Streaming Data
Applied Text Analysis with Python
Getting Started with Kudu
Advanced Analytics with Spark 2nd ed.
USD15 (about AU$22.16) or greater
Architecting Modern Data Platforms
Foundations for Architecting Data Solutions
Kafka: The Definitive Guide
Natural Language Processing with PyTorch
Streaming Systems