one of the bugs requires a bios/microcode update. 1. why the update should be made by the hw maker and it isn't made my microsoft? 2. if the microcode update isn't available, how was Apple able to fix this vulnerability?
Thomas Roberts
You're welcome.
1. proprietary technology 2. software workarounds..? just a guess.
Xavier Sullivan
How do I check to see if it's enabled?
Sebastian Bennett
this is for windows server only, it's enabled for consumer windows
Matthew Reyes
>1. proprietary technology a microcode update is a binary file provided by intel (amd?) which can be updated both by bios when the system starts or by OS anytime. the problem is that only a limited part of the hardware will receive a bios update: the systems newer than a year or corporate (thinkpad/elitebook/latitude) . if the update is made my microsoft, every system would receive the update.
Kayden Clark
Read the article. There's a PS command. Although I guess it requires you to have installed some PS script first..? Idk how PS works, never been interested into it.
>server only Is it?
Jayden Ward
did you even read the article you linked?
Cooper Hill
>Is it? >Use these registry keys to enable the mitigations on server: >on server: >Enabling protections on server
Jordan Sullivan
That particular article is about WinServer. That does not mean it won't work on client.
Jaxson Robinson
I can confirm it does nothing extra on Win8.1. I ran get-spec with and without the reg keys. Same result.
Camden Wilson
Sucks then :( I was getting excited that I might be able to disable it. I guess I'll probably just block that particular update then.
Caleb Morgan
you need "Hardware support for branch target injection mitigation" aka a bios update aka a microcode update to fix the vulnerability. When/IF this hw support will be available, you maybe will be able to disable it by registry...
Daniel Edwards
it doesn't do anything because it's already enabled in consumer, only server has the option with the registry codes.
Henry Long
you're vulnerable you cant disable what you don't have
Christopher Brooks
Everyone's vulnerable to atleast 1 variant until a hardware patch is released.
John Turner
>until a hardware patch is released good luck receiving a patch for 5yo laptops
Joshua Gutierrez
It's not that big a deal. Meltdown can be patched with software. The more dangerous Spectre is the one that requires the hardware shit. Even then, it's just a temp fix.
It doesn't matter though because it's difficult to pull off that exploit anyway.
Gabriel Smith
>common sense >leaving your computer vulnerable to an attack where javascript in your browser can read keystrokes and passwords from any other process
Dominic Allen
when will femanons nudes be released already
Hunter Lewis
Apple is the hardware manufacturer.
Blake Diaz
>updates security >disables the mitigiation I'm no brainlet but this seems broken
The Bogs gave mention the propper work Round here . Jim is an extensive analyst and dataminer who was at bogmoses when Shadowbog occurred
Jim Jarmusch, real name Jean Jemois Bogdanoff, or simply Jim, was the leader of BOGHOUND during the Shadow Bog Incident. He was cloned from a hybrid of Igor and Grichka's DNA when the original twins were 4 years old (in this timeline, of which there are many, keep in mind the original twins actually transcend the time-space continuum and are therefore ageless) as part of the Les Bogfant Terribles project. Jim was led to believe that he had been created in order to express Igor and Grichkas recessive genetic traits, and as such, was "inferior" to the other two who have received dominant genes from a common ancestor. Jim therefore held a strong resentment towards Igor and Grichka but proved nonetheless useful in many black op side projects and has since been unwittingly manipulated by the original twins into doing their bidding.
Possessing an IQ of 180, Jim spoke seven languages fluently, including English, Spanish, French, Malay, Arabic, and Kikongo.