Bios Mods -The Best BIOS Update and Modification Source

Full Version: CPU latest microcode for intel celeron n2820
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Pages: 1 2 3
Where's dump for 1.30 version?
(07-24-2019, 03:07 PM)DeathBringer Wrote: [ -> ]Where's dump for 1.30 version?

this is full dump of bios 1.30 version: 
https://www.sendspace.com/file/x5mw5i
Try to flash this mod.
(07-26-2019, 01:36 PM)DeathBringer Wrote: [ -> ]Try to flash this mod.
ok,  Smile see you later with reply Wink !
(07-26-2019, 01:36 PM)DeathBringer Wrote: [ -> ]Try to flash this mod.

Your mod works but inspectre say that computer îs still vulnerable, microcode before mod îs 320h now is 326h!
(07-27-2019, 04:08 AM)Laurentiu Wrote: [ -> ]inspectre say that computer îs still vulnerable
Show a screenshot.
OK. I see.
Show results of Get-SpeculationControlSettings - https://support.microsoft.com/en-gb/help...powershell
(07-27-2019, 06:00 AM)DeathBringer Wrote: [ -> ]OK. I see.
Show results of Get-SpeculationControlSettings - https://support.microsoft.com/en-gb/help...powershell

here is:
PS C:\Users\Gabriel> Get-SpeculationControlSettings
For more information about the output below, please refer to https://support.microsoft.com/help/4074629

Speculation control settings for CVE-2017-5715 [branch target injection]

Hardware support for branch target injection mitigation is present: False
Windows OS support for branch target injection mitigation is present: False
Windows OS support for branch target injection mitigation is enabled: False

Speculation control settings for CVE-2017-5754 [rogue data cache load]

Hardware requires kernel VA shadowing: True
Windows OS support for kernel VA shadow is present: False
Windows OS support for kernel VA shadow is enabled: False

Speculation control settings for CVE-2018-3639 [speculative store bypass]

Windows OS support for speculative store bypass disable is present: False

Speculation control settings for CVE-2018-3620 [L1 terminal fault]

Hardware is vulnerable to L1 terminal fault: True
Windows OS support for L1 terminal fault mitigation is present: False
Windows OS support for L1 terminal fault mitigation is enabled: False

Speculation control settings for MDS [microarchitectural data sampling]

Windows OS support for MDS mitigation is present: False

Suggested actions

 * Install BIOS/firmware update provided by your device OEM that enables hardware support for the branch target injectio
n mitigation.
 * Install the latest available updates for Windows with support for speculation control mitigations.
 * Follow the guidance for enabling Windows Client support for speculation control mitigations described in https://supp
ort.microsoft.com/help/4073119


BTIHardwarePresent                  : False
BTIWindowsSupportPresent            : False
BTIWindowsSupportEnabled            : False
BTIDisabledBySystemPolicy           : False
BTIDisabledByNoHardwareSupport      : False
BTIKernelRetpolineEnabled           :
BTIKernelImportOptimizationEnabled  :
KVAShadowRequired                   : True
KVAShadowWindowsSupportPresent      : False
KVAShadowWindowsSupportEnabled      : False
KVAShadowPcidEnabled                : False
SSBDWindowsSupportPresent           : False
SSBDHardwareVulnerable              :
SSBDHardwarePresent                 : False
SSBDWindowsSupportEnabledSystemWide : False
L1TFHardwareVulnerable              : True
L1TFWindowsSupportPresent           : False
L1TFWindowsSupportEnabled           : False
L1TFInvalidPteBit                   :
L1DFlushSupported                   : False
MDSWindowsSupportPresent            : False
Wait for new release of suitable microcode by Intel...
Pages: 1 2 3