Forum RSS Feed Follow @ Twitter Follow On Facebook

Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
[-]
Welcome
You have to register before you can post on our site.

Username:


Password:





[-]
Latest Threads
[REQUEST] Lenovo IdeaPad 3 15ALC6 (GLCNx...
Last Post: pomagaj
Today 12:30 PM
» Replies: 12
» Views: 15434
Badcaps forum bios file download not pos...
Last Post: spithink
05-05-2026 04:52 PM
» Replies: 0
» Views: 237
[REQUEST] Lenovo B590 (H9ETxxWW) Whiteli...
Last Post: Illia
05-05-2026 03:45 AM
» Replies: 684
» Views: 383166
BIOS for the Fujitsu Celsius R930 with t...
Last Post: Golfmate
05-04-2026 02:28 PM
» Replies: 2
» Views: 1392
[REQUEST] Acer Aspire A715-75G BIOS Unlo...
Last Post: itzzkobra
05-04-2026 12:15 PM
» Replies: 9
» Views: 7053
Lenovo M800 type 10FX Xeon support.
Last Post: Monoploxy
05-03-2026 09:38 AM
» Replies: 2
» Views: 2463
Ms-6309 v2.0 bios tualatin
Last Post: evasive
05-02-2026 12:11 PM
» Replies: 10
» Views: 1813
Asus k52Jr Unlocked Bios Options
Last Post: SplatPie
05-02-2026 12:19 AM
» Replies: 4
» Views: 18177
Acer Veriton M261 R01-B1 With Unlocked O...
Last Post: Žilina
05-01-2026 05:40 AM
» Replies: 4
» Views: 10176
[REQUEST] BIOS Unlock for Gigabyte G5-KD...
Last Post: summationx
05-01-2026 05:34 AM
» Replies: 12
» Views: 9310
[REQUEST] Gigabyte AORUS 15X ASF Bios Un...
Last Post: Tomek98543
05-01-2026 02:21 AM
» Replies: 1
» Views: 907
Came across some dells
Last Post: jodyjolee
04-29-2026 08:39 PM
» Replies: 2
» Views: 719
Lenovo T430 clean Bios needed
Last Post: Goxy junior
04-29-2026 12:18 PM
» Replies: 2
» Views: 3537
LENOVO G770 "I forgot my BIOS password."
Last Post: murat_alb
04-28-2026 12:40 PM
» Replies: 0
» Views: 754
Dell N7010
Last Post: iRome0
04-28-2026 08:28 AM
» Replies: 48
» Views: 61660
[REQUEST] Asus ROG Strix G615JMR BIOS Un...
Last Post: filipemerotto
04-28-2026 07:58 AM
» Replies: 0
» Views: 902
AMI BIOS modding nvme-boot
Last Post: averes
04-28-2026 05:03 AM
» Replies: 0
» Views: 921
Dell Optiplex 3050 upgrade to 9th gen
Last Post: DeathBringer
04-28-2026 03:32 AM
» Replies: 1
» Views: 533
HP Pro 3330 (H-POPEYE-H61-uATX): Ivy Bri...
Last Post: Hooper
04-28-2026 02:14 AM
» Replies: 39
» Views: 10703
Dell Vostro 3450 Advanced Options unlock...
Last Post: ĐINH CHÍ MINH
04-27-2026 07:37 PM
» Replies: 184
» Views: 182473

CPU latest microcode for intel celeron n2820
#11
Where's dump for 1.30 version?
find
quote
#12
(07-24-2019, 03:07 PM)DeathBringer Wrote: Where's dump for 1.30 version?

this is full dump of bios 1.30 version: 
https://www.sendspace.com/file/x5mw5i
find
quote
#13
Try to flash this mod.
find
quote
#14
(07-26-2019, 01:36 PM)DeathBringer Wrote: Try to flash this mod.
ok,  Smile see you later with reply Wink !
find
quote
#15
(07-26-2019, 01:36 PM)DeathBringer Wrote: Try to flash this mod.

Your mod works but inspectre say that computer îs still vulnerable, microcode before mod îs 320h now is 326h!
find
quote
#16
(07-27-2019, 04:08 AM)Laurentiu Wrote: inspectre say that computer îs still vulnerable
Show a screenshot.
find
quote
#17
here are the screenshots        
i found this: https://www.intel.com/content/dam/www/pu...132019.pdf
find
quote
#18
OK. I see.
Show results of Get-SpeculationControlSettings - https://support.microsoft.com/en-gb/help...powershell
find
quote
#19
(07-27-2019, 06:00 AM)DeathBringer Wrote: OK. I see.
Show results of Get-SpeculationControlSettings - https://support.microsoft.com/en-gb/help...powershell

here is:
PS C:\Users\Gabriel> Get-SpeculationControlSettings
For more information about the output below, please refer to https://support.microsoft.com/help/4074629

Speculation control settings for CVE-2017-5715 [branch target injection]

Hardware support for branch target injection mitigation is present: False
Windows OS support for branch target injection mitigation is present: False
Windows OS support for branch target injection mitigation is enabled: False

Speculation control settings for CVE-2017-5754 [rogue data cache load]

Hardware requires kernel VA shadowing: True
Windows OS support for kernel VA shadow is present: False
Windows OS support for kernel VA shadow is enabled: False

Speculation control settings for CVE-2018-3639 [speculative store bypass]

Windows OS support for speculative store bypass disable is present: False

Speculation control settings for CVE-2018-3620 [L1 terminal fault]

Hardware is vulnerable to L1 terminal fault: True
Windows OS support for L1 terminal fault mitigation is present: False
Windows OS support for L1 terminal fault mitigation is enabled: False

Speculation control settings for MDS [microarchitectural data sampling]

Windows OS support for MDS mitigation is present: False

Suggested actions

 * Install BIOS/firmware update provided by your device OEM that enables hardware support for the branch target injectio
n mitigation.
 * Install the latest available updates for Windows with support for speculation control mitigations.
 * Follow the guidance for enabling Windows Client support for speculation control mitigations described in https://supp
ort.microsoft.com/help/4073119


BTIHardwarePresent                  : False
BTIWindowsSupportPresent            : False
BTIWindowsSupportEnabled            : False
BTIDisabledBySystemPolicy           : False
BTIDisabledByNoHardwareSupport      : False
BTIKernelRetpolineEnabled           :
BTIKernelImportOptimizationEnabled  :
KVAShadowRequired                   : True
KVAShadowWindowsSupportPresent      : False
KVAShadowWindowsSupportEnabled      : False
KVAShadowPcidEnabled                : False
SSBDWindowsSupportPresent           : False
SSBDHardwareVulnerable              :
SSBDHardwarePresent                 : False
SSBDWindowsSupportEnabledSystemWide : False
L1TFHardwareVulnerable              : True
L1TFWindowsSupportPresent           : False
L1TFWindowsSupportEnabled           : False
L1TFInvalidPteBit                   :
L1DFlushSupported                   : False
MDSWindowsSupportPresent            : False
find
quote
#20
Wait for new release of suitable microcode by Intel...
find
quote


Forum Jump:


Users browsing this thread: 2 Guest(s)