Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
protect yourself from Meltdown and Spectre CPU flaws
#1
please i would like to know any thoughts on this? Winaero link

#2
This is a hardware bug and affects Intel CPU so AMD are safe. Microsoft have released patch to try and fix the issue. Hardware bugs are very hard to fix.

Here are some articles you can read 

Meltdown, Spectre: The password theft bugs at the heart of Intel CPUs

How to protect yourself from Meltdown and Spectre CPU flaws


Serious Intel CPU design flaw require's a Windows patch
<left><form action="https://www.paypal.com/cgi-bin/webscr" method="post">If you are satisfied with my help, consider a donation. Thank you so much for your continued support! 
<input type="hidden" name="cmd" value="_s-xclick">
<input type="hidden" name="hosted_button_id" value="Y4ZDLXGFS4F8Q">
<input type="image" src="https://www.paypalobjects.com/en_US/GB/i/btn/btn_donateCC_LG.gif" border="0" name="submit" alt="PayPal — The safer, easier way to pay online.">
<img alt="" border="0" src="https://www.paypalobjects.com/en_GB/i/scr/pixel.gif" width="0" height="0">
</form>

   </div></left> 

#3
it seems not easy to fix, can i click on kb4056897 to download anyway?

i'm using windows 7 sp1

#4
i have downloaded on: https://www.catalog.update.microsoft.com/Search.aspx?q=KB4056897

and see if it's fix or not

https://forum.avast.com/index.php?topic=212648.msg1439270#msg1439270

https://speccy.piriform.com/results/yYexxJ4N8I7jbWqwDxUa3mb

.txt   msinfo32.txt (Size: 422.12 KB / Downloads: 732)

i have clean reinstall windows 7 on december 25 due to 3rd party themes

#5
Code:
if (c->x86_vendor != X86_VENDOR_AMD)
setup_force_cpu_bug(X86_BUG_CPU_INSECURE);
Big Grin Tongue

#6
do i need to type in command prompt guiltyspark?

#7
(01-05-2018, 03:48 PM)f23948 Wrote:  do i need to type in command prompt guiltyspark?

No it's just 'tongue n cheek' from AMD.

#8
oh lol

#9
when i type in windows powershell as administrator, it gives me error
https://www.bleepingcomputer.com/news/microsoft/how-to-check-and-update-windows-systems-for-the-meltdown-and-spectre-cpu-flaws/
   

#10
Hi f23948,

First, type in the following code into PowerShell and press Enter (This will change the policy, disabling restricted mode, allowing us access to install this module)

Code:
Set-ExecutionPolicy Bypass


When prompted for any action, type "Y" and press Enter. For this command, you will get prompted at least twice.


Once that has finished, type in the next command and press enter to install the module:

Code:
Install-Module SpeculationControl


You should be prompted once, again, type "Y" and press Enter


Once that has finished, you can enter this command to check if you have been affected by this bug:


Code:
Get-SpeculationControlSettings


If the command has worked, you should get something like this, displaying information:
   
[b Image ]Source:[/b]
https://www.bleepstatic.com/images/news/u/986406/Microsoft/Windows10/Meltdown+Spectre-Powershell.png

Remember after you have finished sorting this out, type the following command to re-enable the restricted mode, in order to keep your system safe:
Code:
Set-ExecutionPolicy Restricted


Hope this helps Smile



Forum Jump:


Users browsing this thread:
1 Guest(s)

Powered By MyBB, © 2002-2024 Melroy van den Berg.