Disabling it and then re-enabling it is pretty easy to do actually.
The Spectre patch is at hardware level so I doubt that that can be toggled. It's a bit like if you could toggle between BIOS\UEFI versions which you can't.
Cheers,
Yes, that does seem odd. However, if you run it, and scroll down you find it says:
The system's registry is configured to enable both of the Spectre and Meltdown protections. Within the bounds of any limitations described above, Windows will work with the system's processor to prevent the exploitation of these vulnerabilities.
So I suppose all it will do in either case is edit the Registry to either allow or disallow the protection, PROVIDED that either the MS updates OR the BIOS update is installed as appropriate.
UPDATE: @johngalt was the first to post about this utility and I just re-read his posts (#307, 308) in which he has copied from the GRC website and that is pretty much what he said in the first place!
Computer Type: PC/Desktop System Manufacturer/Model Number: Home Made OS: Win 10 Pro CPU: Intel i5 Motherboard: Asus 787 Memory: 16GB Graphics Card: NVIDIA GTX 650 Monitor(s) Displays: Asus & ViewSonic Hard Drives: Samsung SSD 840; various storage devices total of 6TB on board Browser: Chrome, IE & Edge Antivirus: Norton Security
Computer Type: Laptop System Manufacturer/Model Number: Toshiba Satellite Pro OS: Win 10 Home CPU: Intel i5 Memory: 6GB Browser: Chrome, IE, Edge
Yes, that does seem odd. However, if you run it, and scroll down you find it says:
The system's registry is configured to enable both of the Spectre and Meltdown protections. Within the bounds of any limitations described above, Windows will work with the system's processor to prevent the exploitation of these vulnerabilities.
So I suppose all it will do in either case is edit the Registry to either allow or disallow the protection, PROVIDED that either the MS updates OR the BIOS update is installed as appropriate.
UPDATE: @johngalt was the first to post about this utility and I just re-read his posts (#307, 308) in which he has copied from the GRC website and that is pretty much what he said in the first place!
Thanks - yeah, it is a lot of reading at his site, but here is the gist:
If the buttons are disabled - nothing you can do until your OEM either provides you with the necessary files (usually the BIOS), or else your OS provides you with the necessary files (kernel, etc), *OR* (in the case of Meltdown) you're on an AMD processor-based machine.
If the buttons are enabled then that means you have the files / firmware necessary to implement protection. That leads to 2 cases:
The buttons show Enable, which means the protection is available but not actually enabled - so click it!
The button shows Disable, which means the protection is available and enabled, which means you don't need to do anything.
The reason for having this is an easy way for folks with the fixes in place to easily enable and disable the protection - for example, a gamer notices that his FPS has dropped 15%, may then choose to disable protection while in game, and then re-enable it after his gaming session is done. Or, a videographer haws noticed a 10% increase in time it takes to encode his videos for publishing to his stream, so he temporarily disables the protection while encoding.
The site has more info, and a lot of what is at the site is in the app itself as well.
Also, be aware that he has revised the app a few times already since the initial release, so it is a good idea to keep checking his site to see if a newer version is available that may have more enhancements.
(Also, Post#308 was actually all directly from the app itself.)
I think that tool is a bit misleading. Even with a microcode update, I'm pretty sure that any processor that does speculative execution is still vulnerable to Spectre to some degree.
And what exactly happens when you click on "Disable Meltdown Protection" or "Disable Spectre Protection"? Do you get a UAC prompt?
I think that tool is a bit misleading. Even with a microcode update, I'm pretty sure that any processor that does speculative execution is still vulnerable to Spectre to some degree.
And what exactly happens when you click on "Disable Meltdown Protection" or "Disable Spectre Protection"? Do you get a UAC prompt?
Your opinion. I'd trust Gibson over any of the hoopla being spouted by the Media - he didn't start doing this yesterday.
As for what happens when you press the button - well, considering the buttons are disabled on my machine considering that I'm most likely not receiving a BIOS update and am currently running FCU, well, I can't exactly press the buttons and find out, can I?
If you read what Gibson wrote at his site and in the software, there is nothing that is misleading. But, at the same time, we're all entitled to our own opinions.
Same here..... my laptop, a Satellite L755-13K Part Number : PSK1WE is amongst the many listed against "TBD"
Being a 2011 model, somehow I don't think it will get an update...
Computer Type: PC/Desktop System Manufacturer/Model Number: Home Made OS: Win 10 Pro CPU: Intel i5 Motherboard: Asus 787 Memory: 16GB Graphics Card: NVIDIA GTX 650 Monitor(s) Displays: Asus & ViewSonic Hard Drives: Samsung SSD 840; various storage devices total of 6TB on board Browser: Chrome, IE & Edge Antivirus: Norton Security
Computer Type: Laptop System Manufacturer/Model Number: Toshiba Satellite Pro OS: Win 10 Home CPU: Intel i5 Memory: 6GB Browser: Chrome, IE, Edge
Computer Type: PC/Desktop System Manufacturer/Model Number: Self Built OS: W10 Pro + W10 Preview CPU: i7 Hard Drives: Dual swop 2.5" SSD Hard Drive Rack. Internet Speed: 385mbs Other Info: Surface Pro 4 i7. +
MSI GE 70 i7 super raid 0 (3 drives)
Computer Type: Laptop System Manufacturer/Model Number: Surface Pro 4 i7 OS: W10 Pro
Read more:
Windows client guidance for IT Pros to protect against speculative execution side-channel vulnerabilities
Protect your Windows devices against speculative execution side-channel attacks
ADV190013 | Microsoft Guidance to mitigate...
Source: Mitigating speculative execution side channel hardware vulnerabilities Defense
See also: Microsoft Announcing Speculative Execution Bounty Program Launch - Windows 10 Forums