Results 1 to 10 of 693

Threaded View

  1. #37
    ROG Guru: Orange Belt Array R5Eandme PC Specs
    R5Eandme PC Specs
    MotherboardRampage V Extreme/U3.1
    Memory (part number)Corsair Vengeance LPX CMK64GX4M8A2400C14
    Graphics Card #1MSI Geforce GTX 980Ti
    Sound CardAsus Essence STX II
    MonitorAcer B286HK 4K UHD
    Storage #1Samsung 960 Pro 1TB NVMe
    Storage #2Samsung 850 Pro 1TB SSD
    CPU CoolerNoctua NH-D15S
    CaseCooler Master HAF 932
    Power SupplyThermaltake TPG-1200M-F 1200W
    Keyboard Corsair K70 Cherry MX Brown
    Mouse Asus Sica
    Mouse Pad "And God said ... <Maxwell's equations> ... and there was light."
    OS Win 10 x64 Pro
    Accessory #1 Asus USB 3.1 A, StarTech USB 3.1 C PCIe adapters
    Accessory #2 Syba 1394A/B Firewire PCIe adapter PEX30009
    Accessory #3 Asus OC Panel I
    R5Eandme's Avatar
    Join Date
    Jun 2017

    Quote Originally Posted by geneo View Post
    Microcode is loaded into the processor by the BIOS. If an installed Microsoft update has a newer version of the Microcode than what was loaded by the BIOS, then Windows loads that updated Microcode into the processor early in the boot. If someone has the level of access to your system to alter the microcode, they already have enough access to do your system harm anyway.

    You often do not get these microcode updates from Microsoft automatically through Windows Update - you need to fetch the update and install it manually. As mentioned, if you uninstall the microcode update, it won't be loaded and may leave you open to someone exploiting the vulnerability it protected against.
    Thanks guys,

    So then according to your comments re-flashing BIOS with an old, Spectre mitigated BIOS (vers 3902 for R5E), will not be detrimental to the more recent mitigations that are available from Windows update. That's what I needed to know.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts