Age | Commit message (Collapse) | Author |
|
|
|
As this utility requires access to /dev/mem, the default protections of
Linux and OpenBSD must be relaxed to allow this. Make a note of this in
the instructions.
|
|
The old Open Security Training site had a course called Advanced x86:
BIOS and SMM Internals, which had a set of slides outlining the method
to supress SMIs by changing the GBL_SMI_EN bit. Add a reference to it as
this is where I originally learned of this method.
|
|
This more accurately describes the scope of the utility.
Signed-off-by: Nicholas Chin <nic.c3.14@gmail.com>
|