File:Твой процессор ДЫРЯВЫЙ ВСЁ об уязвимостях-00.10.17.200 (Мой Компьютер).png

From Wikimedia Commons, the free media repository
Jump to navigation Jump to search

Original file(1,920 × 1,080 pixels, file size: 1.45 MB, MIME type: image/png)

Captions

Captions

Video about security vulnerabilities in CPUs over time.

Summary

[edit]
Description
Русский: Практически в каждом процессоре в мире уже нашли уязвимость. Даже ARM-чипы и те дырявые, можете спросить у любого владельца Nintendo Switch. Почему на этапе проектирования допускаются ошибки? Что такое аппаратные закладки и что делать, если ваш процессор в зоне риска? Как находят уязвимости и из-за чего они появляются? На связи МК – сегодня говорим о проблемах безопасности в современных чипах.

inSpectre - https://www.comss.ru/page.php?id=4777

00:00 – Вступление МК 02:02 – История уязвимостей 08:18 – Полезные уязвимости 12:10 – Слежка и аппаратные закладки 16:45 – Как быть с дырами

  1. мойкомпьютер #чип #процессор
Deutsch: Bei praktisch jedem Prozessor der Welt wurde bereits eine Sicherheitslücke gefunden. Sogar ARM-Chips haben Löcher, das können Sie jeden Nintendo Switch-Besitzer fragen. Warum werden Bugs in der Entwicklungsphase gemacht? Was sind Hardware-Lesezeichen und was sollten Sie tun, wenn Ihr Prozessor gefährdet ist? Wie werden Schwachstellen gefunden und was verursacht sie? Hier ist MC - heute geht es um Sicherheitsfragen in modernen Chips.

inSpectre - https://www.comss.ru/page.php?id=4777

00:00 - Einführung von MK 02:02 - Geschichte der Sicherheitslücken 08:18 - Nützliche Sicherheitslücken 12:10 - Überwachung und Hardware-Lesezeichen 16:45 - Wie man mit Löchern umgeht

  1. MeinComputer #Chip #Prozessor
English: Virtually every processor in the world has already been found to have a vulnerability. Even ARM chips have holes, you can ask any Nintendo Switch owner. Why are bugs made at the design stage? What are hardware bookmarks and what should you do if your processor is at risk? How are vulnerabilities found and what causes them? Here's MK - today we're talking about security issues in today's chips.

inSpectre - https://www.comss.ru/page.php?id=4777

00:00 - Introduction by MC 02:02 - Vulnerability History 08:18 - Useful vulnerabilities 12:10 - Surveillance and hardware bookmarks 16:45 - How to deal with holes

  1. mycomputer #chip #processor
Date
Source
Author Мой Компьютер

Licensing

[edit]
This video, screenshot or audio excerpt was originally uploaded on YouTube under a CC license.
Their website states: "YouTube allows users to mark their videos with a Creative Commons CC BY license."
To the uploader: You must provide a link (URL) to the original file and the authorship information if available.
w:en:Creative Commons
attribution
This file is licensed under the Creative Commons Attribution 3.0 Unported license.
Attribution: Мой Компьютер
You are free:
  • to share – to copy, distribute and transmit the work
  • to remix – to adapt the work
Under the following conditions:
  • attribution – You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
This file, which was originally posted to an external website, has not yet been reviewed by an administrator or reviewer to confirm that the above license is valid. See Category:License review needed for further instructions.

File history

Click on a date/time to view the file as it appeared at that time.

Date/TimeThumbnailDimensionsUserComment
current16:38, 1 August 2024Thumbnail for version as of 16:38, 1 August 20241,920 × 1,080 (1.45 MB)PantheraLeo1359531 (talk | contribs)Uploaded a work by [https://www.youtube.com/@mka Мой Компьютер] from * {{From YouTube|1=f6KcGG5B4BQ|2=Твой процессор ДЫРЯВЫЙ | ВСЁ об уязвимостях}} * https://web.archive.org/web/20240801163051/https://www.youtube.com/watch?v=f6KcGG5B4BQ with UploadWizard

There are no pages that use this file.