01-10-2018
Non Intel-x86 processors are quite safe.
1. The more reduced the instruction set (RISC) the shorter is the decoding pipeline, and it makes less (or no) sense to prefetch many instructions. That makes attacks much harder if not impossible.
2. An attack will likely aim at x86 CPUs, then comes ARM. And the most feared way is: via a Web browser. You certainly do not run a Web browser on AIX.
No panic.
"old = unsafe" is a myth of the computer industry (guess why).
While "cheap and old = unsafe" is sometimes true (Linux, Windows).
I would not even upgrade AIX, just install the latest patches for the current AIX.
7 More Discussions You Might Find Interesting
1. Filesystems, Disks and Memory
I had an issue with a second hard disk in my machine. I have a sparc station running solaris 7. It was working fine but now it wont mount on boot up and when you try to mount it manually it gives an I/O error. I tried a different disk as a control which was fine. What I want to know is if my... (3 Replies)
Discussion started by: Henrik
3 Replies
2. AIX
Hi all,
I have a AIX 5.3 Installation on the Power5 processor. I am using the knlist API for getting the details of the CPU details like user cpu, kernel cpu, idle cpu and wait cpu. My code is working fine on other Installations of AIX like PowerPC_POWER4 but it is giving wrong values on Power5... (0 Replies)
Discussion started by: rajesht
0 Replies
3. AIX
I have a power5 that I would like to update and bring everything forward.
I am wondering about trouble-free upgrades. Is it better to go 5.3 -> 7 or 5.3 ->6 ->7?
The power5 box is behind and hopefully can learn from experiences here.
Thanks. (6 Replies)
Discussion started by: redi
6 Replies
4. AIX
Hello,
What is wattage of POWER5+ 2.1Gz CPU ?
It's dual-core 90nm chip.
At least approximately ?
thanks,
Vilius (1 Reply)
Discussion started by: vilius
1 Replies
5. AIX
Hello all, I am hoping someone can point me in the right direction here.
We had a machine running AIX 6.1 that someone completely corrupted, so we decided to re-load it from media. I was able to boot into DVD media, select options for complete (destructive) install, AIX standard, etc. The... (0 Replies)
Discussion started by: JamesNJ
0 Replies
6. War Stories
Apologies if this is the wrong forum but...
...This is hard hitting stuff.
LKML: Linus Torvalds: Re: x86/enter: Create macros to restrict/unrestrict Indirect Branch Speculation (5 Replies)
Discussion started by: wisecracker
5 Replies
7. What is on Your Mind?
This seems a bit serious:
Meltdown, Spectre: The password theft bugs at the heart of Intel CPUs • The Register
Vulnerability Note VU#584653 - CPU hardware vulnerable to side-channel attacks
Project Zero: Reading privileged memory with a side-channel (8 Replies)
Discussion started by: Scrutinizer
8 Replies
LEARN ABOUT HPUX
sgmgrweb
sgmgrweb(1M) sgmgrweb(1M)
NAME
sgmgrweb - start HP Serviceguard Manager tool, part of the System Management Homepage Web interface.
SYNOPSIS
Path:
DESCRIPTION
HP Serviceguard Manager tool (sgmgrweb) can be used to monitor, configure and administer Serviceguard or Serviceguard Extension for RAC
cluster. HP Serviceguard Manager is also integrated with Distributed System Administration Utilities (DSAU) to view consolidated cluster
log (syslog) and consolidated package logs.
The command starts SMH and goes directly to the Serviceguard Manager page. Once started the online help facility of is available and can
be used to learn more about
HP Serviceguard Manager tool user interface uses a Web browser. Executing the command without any options performs the following tasks:
o start the System Management Homepage Web server and
o start a Web client (browser)
An attempt will be made to connect to the browser specified with the BROWSER environment variable, or Mozilla, or Netscape. The Web
browser will be displayed on the X server defined by the DISPLAY environment variable. If a running browser is found, it will be used,
otherwise a new session will be initiated. This will only happen if the browser process is running on the same system used to execute the
sgmgrweb command (defined by the DISPLAY variable), unless the option is used.
Options
The recognizes the following options:
Forces a client browser to be used in less secure ways.
Two security features are overridden by the option.
The option forces the client browser to be used or started, even if the X-traffic between the X-server and the Mozilla
browser is not secure.
When is invoked by the option is used.
Only a priviledged user (root) can execute When used with the option, a temporary login bypass key will be generated. The
bypass key allows the user to access the Web interface without having to provide login information again.
Only use this option if you are sure the network traffic is secure between the host where Mozilla is running, and the host
in the DISPLAY variable.
The browser uses URL https://hostname:2381/ and you may paste this into any browser if a browser does open with the sgmgrweb
command.
Online Help
Once HP Serviceguard Manager tool is started, the online help provides details on how to use the tool.
RETURN VALUES
Upon completion, returns one of the following values:
Successful.
An error occurred.
AUTHORS
sgmgrweb was developed by Hewlett-Packard
SEE ALSO
hpsmh(1M), smhstartconfig(1M), cmviewcl(1M)
sgmgrweb(1M)