- Joined
- Oct 9, 2007
- Messages
- 47,218 (7.55/day)
- Location
- Hyderabad, India
System Name | RBMK-1000 |
---|---|
Processor | AMD Ryzen 7 5700G |
Motherboard | ASUS ROG Strix B450-E Gaming |
Cooling | DeepCool Gammax L240 V2 |
Memory | 2x 8GB G.Skill Sniper X |
Video Card(s) | Palit GeForce RTX 2080 SUPER GameRock |
Storage | Western Digital Black NVMe 512GB |
Display(s) | BenQ 1440p 60 Hz 27-inch |
Case | Corsair Carbide 100R |
Audio Device(s) | ASUS SupremeFX S1220A |
Power Supply | Cooler Master MWE Gold 650W |
Mouse | ASUS ROG Strix Impact |
Keyboard | Gamdias Hermes E2 |
Software | Windows 11 Pro |
While Thecus NAS do make use of OpenSSL, the specific branches adopted by Thecus's software development team are in fact entirely unaffected by Heartbleed (as it only affects versions 1.0.1 through 1.0.1f). So when the news about Heartbleed broke, Thecus developers quickly established that Thecus devices were never vulnerable to malformed heartbeat requests.
Given the importance of confirming system vulnerability, a number of media outlets have reached out to Thecus support staff. In France, Stéphane Guérithault spoke to Next Inpact and confirmed that ThecusOS5 and OS6 were unaffected but that additional apps were being revised and updated by their respective developers so that Heartbleed fixes would be swiftly implemented.
The Past Secured, the Future Ensured
With a number of other hardware manufacturers rushing to release new firmware, reports have started to emerge suggesting that, since the Heartbleed vulnerability was accidentally introduced in March 2012, a number of parties have grown aware of and exploited the loophole. What this means is that Thecus NAS have been some of the few devices fully immune to such intrusions over the past two years.
So as networks worldwide recover from potential intrusions, Thecus users can trust that the insight and expertise that protected their NAS from the Heartbleed bug are still hard at work designing the next generation of advanced hardware and software. Because with Thecus, come rain, shine, or missing bounds checks, your data will remain safe.
View at TechPowerUp Main Site
Given the importance of confirming system vulnerability, a number of media outlets have reached out to Thecus support staff. In France, Stéphane Guérithault spoke to Next Inpact and confirmed that ThecusOS5 and OS6 were unaffected but that additional apps were being revised and updated by their respective developers so that Heartbleed fixes would be swiftly implemented.
The Past Secured, the Future Ensured
With a number of other hardware manufacturers rushing to release new firmware, reports have started to emerge suggesting that, since the Heartbleed vulnerability was accidentally introduced in March 2012, a number of parties have grown aware of and exploited the loophole. What this means is that Thecus NAS have been some of the few devices fully immune to such intrusions over the past two years.
So as networks worldwide recover from potential intrusions, Thecus users can trust that the insight and expertise that protected their NAS from the Heartbleed bug are still hard at work designing the next generation of advanced hardware and software. Because with Thecus, come rain, shine, or missing bounds checks, your data will remain safe.
View at TechPowerUp Main Site