SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Technology Stocks : Intel Corporation (INTC) -- Ignore unavailable to you. Want to Upgrade?


To: Ali Chen who wrote (39667)11/9/1997 2:33:00 AM
From: Mang Cheng  Read Replies (1) | Respond to of 186894
 
"Suspected Pentium Bug May Harm ISPs"

""This bug looks far worse that FPIV [Pentium's notorious floating point bug of some years ago]" said Sam Trenholme, a developer on the BugTraq list. "Intel will probably be forced to undergo an expensive recall." "

wired.com

Mang



To: Ali Chen who wrote (39667)11/9/1997 11:41:00 AM
From: Elmer  Respond to of 186894
 
Ali,
According to the reports, the Pentium Pro and Pentium 2 processors
are not affected by this bug, if that is even the correct term.
Therefore your alarmist claims are not really justified. First
the multi-processor servers out there are not older Pentiums, so
no need for alarm. Second, as Paul pointed out, a simple
virus checker could screen new apps when they are loaded on the
system. Third, if a user is intent on bringing his/her system down
out of malice, why not just pull the plug or as another wise poster
pointed out, use the sledgehammer?

Ali, I remember a couple of months ago AMD announced they were
fixing K6 bugs in the FPU that were every bit as bad as Intel's
infamous FPU bug. Did you scream, jump up and down and pull your
hair out about these ones too? Here is a quote

Advanced Micro Devices Inc. has disclosed on its Web site (www.amd.com/K6/k6docs/revgd.html) a number of bugs in its K6 processor that could cause unpredictable system behavior or math errors under rare conditions. Several of the bugs have no immediate software fixes available and will be corrected in future manufacturing revisions. In one case involving the floating-point unit, the company has identified six source and destination operand patterns that erroneously result in a zero when performing multiply operations.

Are you as vocal when your ox is the one getting gored? How about
demanding an AMD recall? Show us you are a fair man Ali and not just
a mindless raving Intel basher.

EP



To: Ali Chen who wrote (39667)11/9/1997 12:01:00 PM
From: greenspirit  Read Replies (2) | Respond to of 186894
 
Ali, now let me try to visualize this....I'm at work plugging away some numbers in Excel, then suddenly it hits me, I need to shift into DOS and place a bunch of codes in there so I can dump my program??

Now I'm supposed to be pissed that it worked??

Your barking up a hollow tree Ali, give it a rest.

Worst case scenerio, Intel will provide a patch for download on their web site.

Boy, the pains people will go to try and bring down the competition.
Has the P2 got you that worried Ali?

Michael



To: Ali Chen who wrote (39667)11/9/1997 1:10:00 PM
From: Gary Ng  Read Replies (1) | Respond to of 186894
 
Ali, Re: but you cannot prevent the bad code execution if it will be generated on fly as a result of code modification

This is smart. Why don't you try the same trick(not the
F0 stuff, but say delete files on C:\) and see if it can
bypass those Virus scan program ? Or you don't know
how to write it ?

Gary



To: Ali Chen who wrote (39667)11/9/1997 9:08:00 PM
From: steve h  Respond to of 186894
 
Ali,

thanks for your detailed response. I do agree that CPUs should be able to "ignore" illegal commands.

steve h