@peteorrall

The actual message is not, strictly speaking, an error. It just means that you're bootstrapping the non-EFI way, and your machine's firmware does not adhere to a convention (I believe from DOS+Windows 95 and the 1990s) for marking "not an MBR virus and safe" firmware add-on disc device I/O handlers.

It's unlikely that F000:F0BF is actually unsafe, as that's in (notional) ROM.

This message is very likely a red herring.

#RealMode #IA32 #BootLoaders #FreeBSD

@peteorrall

The odd thing is that the linear address does not match the segmented address.

It's likely not the true cause of your problems, though; but the mis-match might be symptomatic.

#RealMode #80386 #IA32 #BootLoaders

Two text modes supported: 80x25 and 40x25. Toggled live.

Kernel: 2505 bytes

p.s. new icons :)

#ASM #HomeBrew #OS #16bit #RealMode

this is so #true #microsoft and their #msdos are a stain on the #IBMcompatible ecosystem we all need to #switch to #gnu #hurd i also think we need to go back to #realmode instead of this so called #protectedmode because we need to #KeepItReal with our #computers whos with me

#foss #floss #security #computer
Citrix SD-WAN Bugs Allow Remote Code Execution - The bugs tracked as CVE-2020–8271, CVE-2020–8272 and CVE-2020–8273 exist in the Citrix SD-WAN Cent... https://threatpost.com/citrix-sd-wan-bugs-remote-code-execution/161274/ #remotecodeexecution #vulnerabilities #cloudsecurity #cve-2020–8271 #cve-2020–8272 #cve-2020–8273 #securitybugs #websecurity #realmode #citrix #sd-wan
Citrix SD-WAN Bugs Allow Remote Code Execution

The bugs tracked as CVE-2020–8271, CVE-2020–8272 and CVE-2020–8273 exist in the Citrix SD-WAN Center.

Threatpost - English - Global - threatpost.com