Comments Locked

14 Comments

Back to Article

  • SaolDan - Friday, March 16, 2018 - link

    So thats what he looks like!!
  • Ian Cutress - Friday, March 16, 2018 - link

    I would say I have my photo on Twitter, but it's now the bunny suit photo from the GloFo tour.
  • ಬುಲ್ವಿಂಕಲ್ ಜೆ ಮೂಸ್ - Friday, March 16, 2018 - link

    ....and to our left is Nathan from Southpark
  • ಬುಲ್ವಿಂಕಲ್ ಜೆ ಮೂಸ್ - Friday, March 16, 2018 - link

    lookin Good Mimsyyy

    You lose weight?
  • lashek37 - Friday, March 16, 2018 - link

    That’s what he look like🤷🏽‍♂️🌹❤️
  • Hurr Durr - Friday, March 16, 2018 - link

    Um Yeah Um Um Yeah Um
  • Alexvrb - Friday, March 16, 2018 - link

    Forgot your meds again, I see.
  • Hurr Durr - Saturday, March 17, 2018 - link

    Mouthbreather triggered, good.
  • TesseractOrion - Sunday, March 18, 2018 - link

    Hurr Durr - the talking twat that just HAS to write something, ANYTHING (as long as it's pointless and retarded) in Anandtech's comments: as it's the only thing he has to do all day...
  • DrizztVD - Friday, March 16, 2018 - link

    I have a tiny bit of experience in the computer security field. It usually irritated me how people would find ways to believe things that happen to help their pockets at the same time. You'd commonly hear a guy in the office saying something like: "I broke the system's security wiiiide open". Then, our red team guys, who would actually get paid to infiltrate a company right rough to the CEO's emails, would usually have a much more muted response. They know: only 1% of claimed "blow security right open" exploits actually end up suiting their needs. They run 1000s of exploits over more than a month to crack the system. Do you know what they do with the opened system then? They use it to build an internal employee/manager map so that they know who has the most valuable information in the company. Then, they will do a phishing attack on non-technical personal who have access to the end prize (CEO emails, or company account access, etc.) Any red team attack is 80% social engineering.
  • DrizztVD - Friday, March 16, 2018 - link

    You need to look at Windows Defender Application Guard: https://docs.microsoft.com/en-us/windows/security/...

    It spins up/spins down hyper-v session and places Edge browsing into a virtual environment that gets destroyed when the page is closed. This will defend against attacks from all of these recent vulnerabilities.
  • mode_13h - Wednesday, March 21, 2018 - link

    Wow, it's uncomfortable watching the TechTeamGB kid. They should really study how broadcast TV news edits interviews, where you only cut to the interviewer when he has a question. Then, he just needs to practice his poise, when the camera is on him. Again, just watching newscasters for a bit would go a long way.

    Of course, there are other interesting things they could show, such as a timeline or a bullet point summary of what Ian is saying. But that obviously takes work. Just a simple editing job should be a quick thing to do.
  • microking4u - Monday, March 26, 2018 - link

    Ian, Can you or your other reviewers please look into issues with AMD Ryzen RAID utilizing an PCIE NVME SSD as your boot and 2x SSD drives on SATA in a RAID 0 config for storage and try and transfer DATA between the two. There seems to be major issues with AMD chipset drivers and their RAID drivers in this configuration and stability of the drivers. I cannot even upgrade the drivers on my ASRock AB350 chipset itx motherboard and the RAID driver can only be installed at Windows 10 Installation and then get random blue screens and cannot upgrade the driver. We need to have this issue fixed and you bringing it to light will hopefully get them moving on this issue!? Thanks Ian!

Log in

Don't have an account? Sign up now