Windows 10 News and info | Forum
October 23, 2018, Loading... *
Welcome, Guest. Please login or register.

Login with username, password and session length
News: This is a clean Ad-free Forum and protected by StopForumSpam, Project Honeypot, Botscout and AbuseIPDB | This forum does not use audio ads, popups, or other annoyances.
  Website   Home   Windows 8 Website GDPR Help Login Register  
By continuing to use the site or Forum, you agree to the use of cookies, find out more by reading our GDPR policy.
Pages: [1]
Share this topic on Del.icio.usShare this topic on DiggShare this topic on FacebookShare this topic on GoogleShare this topic on MySpaceShare this topic on RedditShare this topic on StumbleUponShare this topic on TechnoratiShare this topic on TwitterShare this topic on YahooShare this topic on Google buzz
Author Topic: Find out if your Windows is affected by Meltdown and Spectre CPU Vulnerabilities  (Read 75 times)
Hero Member
Offline Offline

Gender: Male
United States United States

Posts: 29077

I Do Windows

WWW Email
« on: January 06, 2018, 06:00:56 PM »

Most of you must have read about the Spectre and Meltdown CPU vulnerabilities and wondering if there is anything you need to do to protect yourself against these CPU vulnerabilities. Microsoft has released a PowerShell cmdlet that lets you find out if your Windows computer is affected by Meltdown and Spectre CPU Vulnerabilities and suggested ways on how to protect your system from it.

Find out if your Windows is affected by Meltdown & Spectre

Run PowerShell as administrator and execute the following commands one after the other without the PS>:

PS> # Save the current execution policy so it can be reset

PS> $SaveExecutionPolicy = Get-ExecutionPolicy

PS> Set-ExecutionPolicy RemoteSigned -Scope Currentuser

PS> CD C:\ADV180002\SpeculationControl

PS> Import-Module .\SpeculationControl.psd1

PS> Get-SpeculationControlSettings

PS> # Reset the execution policy to the original state

PS> Set-ExecutionPolicy $SaveExecutionPolicy -Scope Currentuser

This will install, activate an additional module and enable protection.

Check the output and see if all the elements show a value of True. That shows that your Windows is protected. If it shows False, it means that your system is vulnerable and you need to fix those issues.

You can, later on, restore the default ExecutionPolicy setting by running executing this Set-ExecutionPolicy Default command.

For more information, you may visit Microsoft.

Protect Windows against Meltdown & Spectre

US-CERT has said – “Replace CPU hardware. The underlying vulnerability is primarily caused by CPU architecture design choices. Fully removing the vulnerability requires replacing vulnerable CPU hardware.”

However, there are some basic precautions you can take to protect your Windows against Meltdown and Spectre CPU Vulnerabilities:

♦ Ensure that your device firmware and the operating system is fully patched with the latest available updates.

♦ Ensure that all your installed software, especially web browsers, are updated to their latest versions.

♦ Enable Site Isolation in Chrome and prevent JavaScript loading in your browser.

Stay safe!

Pages: [1]
Jump to:  

Powered by SMF 1.1.21 | SMF © 2017, Simple Machines

Google visited last this page September 07, 2018, 02:04:11 AM