Making Vintage Computing Easy, The Hard Way

If you want to not take for granted how easy and seamless computers have become, take up vintage computing as a hobby. If you venture down the retro path, you’ll quickly question how anyone ever got any useful work done with computers, and the farther back you go in computer history, the more difficult everything seems to become.

Case in point: how do you easily transfer files between a home-brew PC/XT and your modern desktop? Back in the day we did it with null modem cables or by sneaker-netting stacks of floppies, but [Scott M. Baker] found another way — …read more

Continue reading Making Vintage Computing Easy, The Hard Way

Verifying that the CRTM is read-only for the purpose of trusted computing

When using a TPM to provide integrity measurements for a system via SRTM, the trusted computing base is reduced to only the TPM and CRTM. The CRTM is a component of the BIOS (specifically the bootblock) which executes first and allows the … Continue reading Verifying that the CRTM is read-only for the purpose of trusted computing

Dick Wilkins, Phoenix Technologies – Paul’s Security Weekly #551

Dick Wilkins is an Associate Professor of Computer Science at Thomas College in central Maine and is Principal Technology Liaison for Phoenix Technologies, a USA based system boot firmware development company. He joins Paul and the team this week for a… Continue reading Dick Wilkins, Phoenix Technologies – Paul’s Security Weekly #551

Hyperbole Swirls Around AMD Processor Security Threat

Security community takes a critical look at CTS-Labs’ disclosure of vulnerabilities in AMD vulnerabilities found in EPYC servers, Ryzen workstationsm and Ryzen mobile offerings. Continue reading Hyperbole Swirls Around AMD Processor Security Threat