Windows Client Guidance against speculative execution vulnerabilities

Page 3 of 75 FirstFirst 123451353 ... LastLast

  1. Posts : 3,453
       #20

    Cliff S said:
    I would guess: because this is something that Intel, their board partners(the OEMs), and the myriad operating system developers, HAVE to get right the first time around.
    Yup huge rep damage if this is not handled properly... and we know how cosy Intel and MS are... right?

    BTW check the share drop in Intel vs the rise in AMD on Jan 3rd. It's correcting now tho'
      My Computer


  2. Posts : 3,453
       #21

    tracit99 said:
    In Windows 17046 I start Powershell as Administrator. I check policyexecution status. Then I run Install-Module SpeculationControl. I get this:

    Attachment 171030

    What am I doing wrong?

    EDIT: Works okay in 16299.192.
    Glad it worked for you bud... still can't figure the prob .. really weird!
      My Computer


  3. Posts : 27,181
    Win11 Pro, Win10 Pro N, Win10 Home, Windows 8.1 Pro, Ubuntu
       #22

    tracit99 said:
    In Windows 17046 I start Powershell as Administrator. I check policyexecution status. Then I run Install-Module SpeculationControl. I get this:

    Attachment 171030

    What am I doing wrong?

    EDIT: Works okay in 16299.192.
    I'm running admin as PS C:\Users\cliff> where as you are running as system32
    Windows Client Guidance against speculative execution vulnerabilities-image.png
      My Computers


  4. Posts : 575
    Windows 11 Pro
       #23

    Cliff S said:
    I'm running admin as PS C:\Users\cliff> where as you are running as system32
    Windows Client Guidance against speculative execution vulnerabilities-image.png
    Switched to PS C:\Users\rmt. I still get the same results.
      My Computer


  5. Posts : 27,181
    Win11 Pro, Win10 Pro N, Win10 Home, Windows 8.1 Pro, Ubuntu
       #24

    tracit99 said:
    Switched to PS C:\Users\rmt. I still get the same results.

    Have you already perchance installed it, and need only to run the information command?

    Windows Client Guidance against speculative execution vulnerabilities-image.png
      My Computers


  6. Posts : 3,453
       #25

    system32 is where Admin resides... seems PS does not recocognise the module to install?
      My Computer


  7. Posts : 27,181
    Win11 Pro, Win10 Pro N, Win10 Home, Windows 8.1 Pro, Ubuntu
       #26

    Superfly said:
    system32 is where Admin resides... seems PS does not recocognise the module to install?
    But I am running it as admin, but then again with powershell I never know what I'm doing, just copy & paste a command
    No! Really!
      My Computers


  8. Posts : 2,832
    Windows 10 Pro X64
       #27

    Hi,

    But I am running it as admin
    Not when you were taking that screenshot, @Cliff S

    But it should work either way unless you have scripting disabled.

    Cheers,
      My Computers


  9. Posts : 2,667
    Windows 11 21H2 (22000.593)
       #28

    Cliff S said:
    That board(and CPU are definitely EOL
    Ya think? And yet it is breezing through IP builds like no tomorrow.

    Of course, that EOL hardware is also backed by 12 GB of triple channel DDR3, dual SSDs for \System and \Users, and an nVidia GTX 970 for main graphics and GTX 560 Ti 448 Core dedicated to PhysX. So it is doesn't feel nearly as ancient as it actually is....

    Josey Wales said:
    If this is so serious and Microsoft and Intel were informed in June or July..Why so long to even attempt to fix this?
    Ummm, didn't they have a 'product launch right after that? which , for all intents and purposes, still contains the bug....

    Cliff S said:
    I would guess: because this is something that Intel, their board partners(the OEMs), and the myriad operating system developers, HAVE to get right the first time around.
    Which is my argument as to why they pushed back on 10nm builds yet again.

    Superfly said:
    Yup huge rep damage if this is not handled properly... and we know how cosy Intel and MS are... right?

    BTW check the share drop in Intel vs the rise in AMD on Jan 3rd. It's correcting now tho'
    Oh Intel has already badly damaged its public face with its naysaying posts about how there is nothing really wrong - they followed up their initial blog on 3 Jan about how nothing is bad a day later with actual specifics, but in other posts are basically saying "OK, if we're going down we're taking everyone else, including AMD and ARM, with us!"

    Cliff S said:
    I'm running admin as PS C:\Users\cliff> where as you are running as system32
    Windows Client Guidance against speculative execution vulnerabilities-image.png
    Superfly said:
    system32 is where Admin resides... seems PS does not recocognise the module to install?
    fdegrove said:
    Hi,



    Not when you were taking that screenshot, @Cliff S

    But it should work either way unless you have scripting disabled.

    Cheers,
    Yeah, I ran mine directly as admin, and my screenshot shows the entirety of steps performed from start to finish.
      My Computers


  10. Posts : 27,181
    Win11 Pro, Win10 Pro N, Win10 Home, Windows 8.1 Pro, Ubuntu
       #29

    fdegrove said:
    Hi,



    Not when you were taking that screenshot, @Cliff S

    But it should work either way unless you have scripting disabled.

    Cheers,
    Make a bet?
    right click run as:
    Windows Client Guidance against speculative execution vulnerabilities-image-003.png

    Windows Client Guidance against speculative execution vulnerabilities-image.png
      My Computers


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 10 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 10" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 04:13.
Find Us




Windows 10 Forums