Вот цитата с http://threatpost.com/blogs/researchers-unveil-persistent-bios-attack-methods
>The work by the Core team follows on to research done on >persistent rootkits by John Heasman of NGSS, who was able to >devise a method for placing rootkits on PCs using the memory >space on PCI cards. In a presentation at Black Hat DC in >2007, Heasman showed a completely working method for loading >the malware on to a PCI card by using the flashable ROM on >the device. He also had a way to bypass the Windows NT kernel >and create fake stack pointers.
Re: Вирусы теперь могут проникать в BIOS
Вот цитата с http://threatpost.com/blogs/researchers-unveil-persistent-bios-attack-methods
>The work by the Core team follows on to research done on >persistent rootkits by John Heasman of NGSS, who was able to >devise a method for placing rootkits on PCs using the memory >space on PCI cards. In a presentation at Black Hat DC in >2007, Heasman showed a completely working method for loading >the malware on to a PCI card by using the flashable ROM on >the device. He also had a way to bypass the Windows NT kernel >and create fake stack pointers.
Mozilla/5.0 (X11; U; Linux x86_64; en-US; rv:1.7.12) Gecko/20060131