From 5702452227c1e2f759c8921a6d229f7502fe1e16 Mon Sep 17 00:00:00 2001 From: Mikaela Suomalainen Date: Sat, 31 Aug 2019 11:13:15 +0300 Subject: [PATCH] operating-systems: add a dot --- _includes/sections/operating-systems.html | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/_includes/sections/operating-systems.html b/_includes/sections/operating-systems.html index 7729b0d0..04dd5ac0 100644 --- a/_includes/sections/operating-systems.html +++ b/_includes/sections/operating-systems.html @@ -43,7 +43,7 @@ tor="http://sejnfjrq6szgca7v.onion"

Remember to check CPU vulnerability mitigations

-

This also affects Windows 10, but it doesn't expose this information or mitigation instructions as easily. MacOS users check How to enable full mitigation for Microarchitectural Data Sampling (MDS) vulnerabilities on Apple Support

+

This also affects Windows 10, but it doesn't expose this information or mitigation instructions as easily. MacOS users check How to enable full mitigation for Microarchitectural Data Sampling (MDS) vulnerabilities on Apple Support.

When running a enough recent kernel, you can check the CPU vulnerabilities it detects by tail -n +1 /sys/devices/system/cpu/vulnerabilities/*. By using tail -n +1 instead of cat, the file names are also visible.