Why not do a CMOS (BIOS). Get a new CR2032 coin cell battery. With the PC powered off and AC power cable disconnected, open the case and remove the CR2032 battery located on the motherboard. Wait at least 10 minutes then install the new battery.
This clears the BIOS and resets it to the factory default.
There is no such thing as modern bios that has malware.
The 9010 is VERY old CLASS 1 bios that works with XP.
It would not be supported being from 2011 AKA 9 years old.
There will never be any spectre or meltdown updates for this model because intel decided that they would not be fixing these.
This is why modern class 1 2 3 uefi bios has signatures.
msdos and mbr booting are not part of modern chipsets.
root kits can reside in partitions that the user cannot removwithout using diskpart to CLEAN the drive then shut down.
usb flash drives can also have malware as can network drives.
This is why homegroup and peer to peer networking was removed from windows.
As early as 2011 26 percent of all malware infections of Windows come from USB flash drives exploiting the AutoRun feature.
The majority of malware is quiet now and tries to hide itself in a preferably unobtrusive place like the System Volume Information directory or the trash bin folder.
Most MODERN dells can use bios recovery if there are any issues.
Meltdown and Spectre exploit vulnerabilities in processors. These hardware vulnerabilities allow programs to steal data which is currently processed on the computer. While programs are typically not permitted to read data from other programs, a malicious program can exploit Meltdown and Spectre to get hold of secrets stored in the memory of other running programs. This might include your passwords stored in a password manager or browser, your personal photos, emails, instant messages and even business-critical documents.
The processors which Intel won’t be patching include four lines from 2007, Penryn, Yorkfield, and Wolfdale, along with Bloomfield (2009), Clarksfield (2009), Jasper Forest (2010) and the Intel Atom SoFIA processors from 2015.
CVE-2017-5754 is the official reference to Meltdown.
Because of the nature of the Spectre exploit, patches for it need to be delivered as an operating system or BIOS update, and if Microsoft and motherboard OEMs aren’t going to distribute the patches, developing them isn’t going to happen.
can you prove one PC in earth that was infected 1 time in the wild (FIRMWARE?) love to hear it, sure would
modern BIOS (heck long ago the EEPROM write enable pin set to false was 100% effective but some drep ended that.(who are those dweebs, find them and lock them up?) saving 1cent on a jumper is crazy.
modern BIOS has these protections from hackers. etc. (due to above missing)
self check sum tests =CS, and CRC checks, the latter super super hard to fool !
then has secret DELL signature in the code that is checked and also if wrong makes above fail too.
newer bios has this new features call FIRMWARE signature tests, turn it on.
and last the dells O9010-xyz.exe file is encrypted so others can just hack it easy (this is very effective)
This EXE also has code to fail if hacked, I have not tested that but will soon.
and the inside above dell ROMburn.exe has all the old features removed, like export BIN and backup ROM etc. gone,. (so type the romburn.exe /? see what is missing, answer most,its wings are CUT)
more I am sure and way over my pay grade, $0/per year.
fireberd
9 Legend
•
33.4K Posts
0
February 29th, 2020 03:00
Why not do a CMOS (BIOS). Get a new CR2032 coin cell battery. With the PC powered off and AC power cable disconnected, open the case and remove the CR2032 battery located on the motherboard. Wait at least 10 minutes then install the new battery.
This clears the BIOS and resets it to the factory default.
speedstep
9 Legend
•
47K Posts
0
February 29th, 2020 05:00
There is no such thing as modern bios that has malware.
The 9010 is VERY old CLASS 1 bios that works with XP.
It would not be supported being from 2011 AKA 9 years old.
There will never be any spectre or meltdown updates for this model because intel decided that they would not be fixing these.
This is why modern class 1 2 3 uefi bios has signatures.
msdos and mbr booting are not part of modern chipsets.
root kits can reside in partitions that the user cannot removwithout using diskpart to CLEAN the drive then shut down.
usb flash drives can also have malware as can network drives.
This is why homegroup and peer to peer networking was removed from windows.
As early as 2011 26 percent of all malware infections of Windows come from USB flash drives exploiting the AutoRun feature.
The majority of malware is quiet now and tries to hide itself in a preferably unobtrusive place like the System Volume Information directory or the trash bin folder.
Most MODERN dells can use bios recovery if there are any issues.
https://www.dell.com/support/article/en-us/sln300716/bios-recovery-options-on-a-dell-pc-or-tablet?lang=en
donm4599x
2 Intern
•
478 Posts
0
February 29th, 2020 15:00
WARNING !!!!!!!!!
Spectre.
WARNING !!!!!!!!!!!!!!
MELTDOWN
fireberd
9 Legend
•
33.4K Posts
0
February 29th, 2020 15:00
I haven't seen any posts on here or other computer forums I visit of this actually infecting someone's PC. The potential is there, that's all.
speedstep
9 Legend
•
47K Posts
0
March 1st, 2020 06:00
https://www.grc.com/inspectre.htm
Meltdown and Spectre exploit vulnerabilities in processors. These hardware vulnerabilities allow programs to steal data which is currently processed on the computer. While programs are typically not permitted to read data from other programs, a malicious program can exploit Meltdown and Spectre to get hold of secrets stored in the memory of other running programs. This might include your passwords stored in a password manager or browser, your personal photos, emails, instant messages and even business-critical documents.
The processors which Intel won’t be patching include four lines from 2007, Penryn, Yorkfield, and Wolfdale, along with Bloomfield (2009), Clarksfield (2009), Jasper Forest (2010) and the Intel Atom SoFIA processors from 2015.
CVE-2017-5754 is the official reference to Meltdown.
https://nvd.nist.gov/vuln/detail/CVE-2017-5754
Because of the nature of the Spectre exploit, patches for it need to be delivered as an operating system or BIOS update, and if Microsoft and motherboard OEMs aren’t going to distribute the patches, developing them isn’t going to happen.
Attack Category Attack Scenario CVE-2017-5753 CVE-2017-5715 CVE-2017-5754
CVE Public Vulnerability Name Other Names Processors Affected
savvy2
3 Apprentice
•
2.5K Posts
0
March 1st, 2020 08:00
can you prove one PC in earth that was infected 1 time in the wild (FIRMWARE?) love to hear it, sure would
modern BIOS (heck long ago the EEPROM write enable pin set to false was 100% effective but some drep ended that.(who are those dweebs, find them and lock them up?) saving 1cent on a jumper is crazy.
modern BIOS has these protections from hackers. etc. (due to above missing)
end FUD and fear NOW !
savvy2
3 Apprentice
•
2.5K Posts
0
March 1st, 2020 08:00
donm nails this