Vulnerability CVE Exploit name Public vulnerability name Firmware changes Spectre 2017-5753 Variant 1 Bounds Check Bypass (BCB) No Spectre 2017-5715 Variant 2 Branch Target Injection (BTI) Yes Meltdown 2017-5754 Variant 3 Rogue Data Cache Load (RDCL) No Spectre-NG 2018-3640 Variant 3a Rogue System Register Read (RSRE) Yes Spectre-NG 2018-3639 Variant 4 Speculative Store Bypass (SSB) […]

List of Speculative Execution Vulnerabilities

The Original Sin
Disclaimer: What you are about to read may contain inaccuracies. Feel free to discuss them somewhere else. This is also my opinion and as such it may change through time, maybe tomorrow, next month, next year, next decade or never. I do also make very few reviews (if any) of what I write here so […]

A few useful network commands
Troubleshooting network issues with simple commands is not a very difficult topic once there is a little toolbox to pull from. Needless to say networking topics can be very complicated and any specialist on the field will tell you how cumbersome it can really get. However with a few set of commands one can get […]

How to configure TLS 1.2 on UNIX or GNU/Linux
This is an article willing to help and point out a few useful resources for those using Apache HTTP or NGINX web servers that are still using the deprecated SSLv3, TLS 1.0 and/or TLS 1.1 verions. If you find the articles in Adminbyaccident.com useful to you, please consider making a donation. Use this link to […]

How to install Ansible on FreeBSD
Ansible is a very useful tool geared to system’s configuration and applications deployment. In this how to install Ansible on FreeBSD I will briefly explain what the tool is, what it does, what it does not and how to install it on FreeBSD. I will also demonstrate very basic use and on a later article […]

How to format an USB drive on FreeBSD
File system support on FreeBSD falls onto UFS (UNIX File System) or originally named the FFS (Fast File System and on ZFS (Zetabyte File System). If you are using your box as a desktop-workstation you will use USB drives to share files with other systems, to carry things on your pocket or safe the day […]

The CentOS party is over, isn’t it?
Disclaimer: What you are about to read may contain inaccuracies. Feel free to discuss them somewhere else. This is also my opinion and as such it may change through time, maybe tomorrow, next month, next year, next decade or never. I do also make very few reviews (if any) of what I write here, so […]

ARP spoofing attacks
ARP spoofing attacks are quite harming and they can easily constitute a man-in-the-middle (MITM) attack. They consist on the attacker sending ARP packets into the network the victim is located, typically redirecting traffic to the attacker’s machine. Once this is achieved the attacker can sniff all the traffic sent by the victim’s device and obtain […]

Abandon Linux. Rolling back the entire OS is possible.
When I was writing an article on updating FreeBSD from the 11.2 version to the new major release number 12, I was trying to add something extra for those who may read some of the information I publish. FreeBSD as a UNIX operating system has similar functionality to the old school UNIX ones such as […]

How to manage site visitors based on IP Geolocation
Whenever someone publishes a website on the internet, most of the times, their intention is that site to be seen around the globe. However, as a site administrator you may want to divert users from one country to visit some specific version of that site, maybe because of the visitor’s language. Other times, less often […]
