>implying 80 IQ >implying subhuman lulz, nice strawman :^)))) I bet you strawman a gf in your head when you jack off like a delusional pathetic estrogen filled numale. Also don't point out the irony by me calling you that, I already got you covered.
unironically kill yourself you waste of human potential
Didn't I tell you to keep away from the iron? Fucking omnivore, eating animal products is fucking cancer for your body. Go Vegan. I recommend watching dr. Greggor for health advice. >inb4 dr. (((Greggor))) Dr Greggor is le based jew
Thats it? doesn't it need a new bios to go along with it?
This isnt part of the autoupdates? Because if it is then I already have and the tool says im unprotected from spectre only
I don't think I ever got a fix for spectre and I'll take speed over protection, I use 2FA for everything important and change passwords regularily, also have a smartphone I use for 2FA and since it's ARM who cares, everyone in these threads is AMD shills
i am also interested in using the smm or me to start developing cheats, where could i learn more about them being used in a malicious way?
it wont run since I am on windows 10 1803, the update is for the older W10, and it would undo itself anyways when W10 is updated.
So have to wait for W10 to roll it out for the new 1803 that just came out. Maybe they removed it so the PC would run faster and people wouldnt attribute the slowdown to the big spring update to W10?
>tfw Presshot Am I safe g-guys?
>I'll take speed over protection THE STATE OF INTEL KIKES
so are there any other insights on the nu-err... ng-spectre stuff?
What features does a processor need to have to be vulnerable to Spectre? From what I've read it sounds like a processor needs branch prediction and out of order execution to potentially be vulnerable, but the ARM Cortex A8 is listed as being vulnerable despite not having out of order execution (all other ARM processors that are listed as lacking out of order execution are listed as not vulnerable).
No, I use a PPC IMac G3. I am pretty much safe.
It's in-order but still does some kind of speculative execution, which is where Spectre lies.
Wait, I just noticed that the ARM Cortex A7 which isn't considered vulnerable isn't fully superscalar (one of the areas it's lacking in is load/store) while the ARM Cortex A8 which is vulnerable is superscalar. It would seem to me that the issue is that any processor with branch prediction that is superscalar (at least in all the areas needed) could have the offending memory read instruction as the predicted next instruction after a potential branch and therefore potentially execute it at the same time as the branch instruction.
help win 7 laptop with ivy bridge i5-3320m here not quite sure which are the proper updates
$ grep . /sys/devices/system/cpu/vulnerabilities/* grep: /sys/devices/system/cpu/vulnerabilities/*: No such file or directory I'm invulnerable
$ grep . /sys/devices/system/cpu/vulnerabilities/* grep: /sys/devices/system/cpu/vulnerabilities/*: No such file or directory
>presshot >branch prediction WAT
inb4 performance crippled even more by the new patches (that don't even exist yet)
that's why they'll delay it until people start throwing shit at them
The original P5 Pentium had branch prediction, and the Pentium Pro had speculative execution and out of order execution so of course anything after that will be vulnerable. Also, quit flooding the thread with your deleted posts.
why are you so entitled to security? srs question. people should just accept that security is a ridiculous concept, antithetical to the nature of the universe and just cope with it. build a transparent society where we don't need passwords because we're all under surveillance.
>Intel microcode updates (Windows) >Windows 10 only I didn't want it anyway.
I use a bootlegged version of windows, what does this mean for me?