News, tips, advice, support for Windows, Office, PCs & more
Home icon Home icon Home icon Email icon RSS icon

We're community supported and proud of it!

Newsletter Archives

  • Opal: How I planned my new build

    Posted on August 30th, 2021 at 02:40 Comment on the AskWoody Lounge


    Will Fastie

    By Will Fastie

    I’ll say it again — it’s not the building, it’s the planning.

    A favorite saying about war plans is that they do not survive first contact with the enemy. A slight paraphrase is that a plan does not survive first contact with reality.

    Reality caused me to make a change in my build plan, which is the first thing I want to tell you about. Onyx may be dying.

    Read the full story in the AskWoody Plus Newsletter 18.33.0 (2021-08-30).

  • Opal: I’m building a new PC

    Posted on August 2nd, 2021 at 02:41 Comment on the AskWoody Lounge


    Will Fastie

    By Will Fastie

    Hardware for the future. Windows made me do it.

    I wasn’t expecting to need a new computer just yet. My current PC is a bit long in the tooth, but I chose well when I built it and it has lasted six years, still providing the performance and capability I need on a daily basis. I have no urgent need for Windows 11.

    Except that I work for this newsletter.

    Read the full story in the AskWoody Plus Newsletter 18.29.0 (2021-08-02).

  • Update: Where does TPM live?

    Posted on July 26th, 2021 at 02:44 Comment on the AskWoody Lounge

    WINDOWS 11

    Will Fastie

    By Will Fastie

    Trying to find out where Trusted Platform Module is implemented in Intel-based systems was harder than I thought. Intel finally, and helpfully, gave me some pointers.

    The problem is one of terminology.

    Read the full story in the AskWoody Plus Newsletter 18.28.0 (2021-07-26).

  • Nvidia is now worth more than Intel

    Posted on July 10th, 2020 at 06:25 Comment on the AskWoody Lounge

    I saw that headline and couldn’t believe it.

    As of this writing, very early Friday morning, Nvidia lists at $420.36, for a total market capitalization (number of outstanding shares * share price) of $258.52 billion.

    Intel lists at $58.42, for a market cap of $247.35 billion.

    Absolutely phenomenal result of Nvidia’s branching into more-than-graphics.

  • Microsoft Patch Alert: August is much, much better than July

    Posted on August 23rd, 2018 at 14:17 Comment on the AskWoody Lounge

    There are still some well-known (even acknowledged) bugs, and the inanities performed in the name of Meltdown and Spectre continue to boggle my mind.

    And, of course, you can’t post any before-and-after performance statistics about the Intel microcode patches.

    Computerworld Woody on Windows.

    UPDATE: Intel has backed off its ridiculous (and likely unenforceable) gag order. See Paul Alcorn’s article on Tom’s Hardware.

  • Rumors of a new, updated Coffee Lake chipset for Win7

    Posted on August 10th, 2018 at 09:25 Comment on the AskWoody Lounge

    It isn’t like you’ll be able to install and update Win7 on a fancy new power-mad PC. But it’s looking more and more like Intel and Microsoft may come to a cease-fire long enough to slip in a new, more powerful version of the old Coffee Lake processor.

    Interesting, if it comes to pass – specifically for those who would like to run new-ish hardware with a stable operating system.

    Computerworld Woody on Windows.

  • Intel releases more Meltdown/Spectre firmware fixes, while Microsoft unveils a new Surface Pro 3 firmware fix that doesn’t exist

    Posted on February 21st, 2018 at 09:01 Comment on the AskWoody Lounge

    You’d have to be incredibly trusting — of both Microsoft and Intel — to manually install any Surface firmware patch at this point. Particularly when you realize that not one single Meltdown or Spectre-related exploit is in the wild. Not one.

    Computerworld Woody on Windows.

  • Intel says its new Spectre-busting Skylake firmware patch is ready

    Posted on February 8th, 2018 at 07:08 Comment on the AskWoody Lounge

    Oh boy. I love the smell of fresh bricked PCs in the morning.

    Yesterday, Intel said it has released new firmware that — this time, really, for sure, honest — plugs the Meltdown/Spectre security hole. Says honcho Navin Shenoy:

    Earlier this week, we released production microcode updates for several Skylake-based platforms to our OEM customers and industry partners, and we expect to do the same for more platforms in the coming days.

    What he’s actually saying is something like, “Hey, we spent six months coming up with new firmware to fix Spectre, released it, and bricked a bunch of machines. We went back to the drawing board and, two weeks later, came up with new firmware that won’t brick your machines. Have at it.”

    According to the freshly updated Microcode Revision Guidance, Intel has released updates for Skylake U-, Y-, U23e-, H-, and S- chips.

    Shenoy goes on to say:

    Ultimately, these updates will be made available in most cases through OEM firmware updates. I can’t emphasize enough how critical it is for everyone to always keep their systems up-to-date. Research tells us there is frequently a substantial lag between when people receive updates and when they actually implement them. In today’s environment, that must change.

    To which I say:

    Fool me once, shame on me. Fool me twice… well, you know.

    Folks, you’d have to be absolutely batbox crazy to install these new BIOS/UEFI patches as they’re being rolled out. Give them time to break other peoples’ machines — or to prove their worth in open combat. I’m sure the folks who made the new firmware are quite competent and tested the living daylights out of everything. But they did that the last time, too.

    Again, I repeat, for emphasis, there is exactly NO known Meltdown or Spectre-based malware out in the wild.

  • Intel says STOP installing firmware updates

    Posted on January 22nd, 2018 at 13:35 Comment on the AskWoody Lounge

    In another stunning announcement, Intel now says that you should NOT install firmware updates. No specific word on Surface devices yet, but I bet the Jan. 10 updates are suspect, as well. Of course, if you have Automatic Update turned on, your Surface device is probably already updated.

    Computerworld Woody on Windows

    UPDATE: In response to an anonymous post here, I re-read the Intel announcement, and it isn’t clear (to me) if the halt has been called just for Broadwell and Haswell chips, or for all of Intel’s product line. Here’s what the official announcement says:

    Updated Jan. 22

    We have now identified the root cause of the reboot issue impacting Broadwell and Haswell platforms, and made good progress in developing a solution to address it. Based on this, we are updating our guidance for customers and partners:

    • We recommend that OEMs, Cloud service providers, system manufacturers, software vendors and end users stop deployment of current versions on the below platforms, as they may introduce higher than expected reboots and other unpredictable system behavior.
    • We also ask that our industry partners focus efforts on testing early versions of the updated solution for Broadwell and Haswell we started rolling out this weekend, so we can accelerate its release. We expect to share more details on timing later this week.
    • For those concerned about system stability while we finalize the updated solutions, we are also working with our OEM partners on the option to utilize a previous version of microcode that does not display these issues, but removes the Variant 2 (Spectre) mitigations. This would be delivered via a BIOS update, and would not impact mitigations for Variant 1 (Spectre) and Variant 3 (Meltdown).

    We believe it is important for OEMs and our customers to follow this guidance for all of the specified platforms listed below, as they may demonstrate higher than expected  reboots and unpredictable system behavior.  The progress we have made in identifying a root cause for Haswell and Broadwell will help us address issues on other platforms. Please be assured we are working quickly to address these issues.

    Then there’s a link to this list of Intel products, which includes Coffee Lake, Kaby Lake, Skylake, Broadwell, Haswell, Ivy Bridge and Sandy Bridge processors.

    Clear as mud.

    The spontaneous rebooting problem extends beyond Haswell and Broadwell. As Intel said on Jan. 17:

    we have determined that similar behavior occurs on other products in some configurations, including Ivy Bridge-, Sandy Bridge-, Skylake-, and Kaby Lake-based platforms.

    So it isn’t clear if the “Belay that order” order applies just to Haswell and Broadwell, or to Haswell, Broadwell, Ivy Bridge, Sandy Bridge, Skylake and Kaby Lake as well.

  • Intel admits that its Meltdown/Spectre firmware patches trigger reboots on Haswell and Broadwell computers

    Posted on January 12th, 2018 at 06:57 Comment on the AskWoody Lounge

    If you own a PC with a Haswell or Broadwell processor (roughly 2014 to 2016 vintage), I strongly recommend that you refrain from installing the Meltdown/Spectre firmware updates, when they arrive.

    Intel’s detected a teensy-tiny problem.

    Computerworld Woody on Windows.

  • Intel “Kernel Memory Vulnerability” is going to hit all of us

    Posted on January 3rd, 2018 at 07:39 Comment on the AskWoody Lounge

    I first read about the problem in an article in The Reg yesterday from John Leyden and Chris Williams:

    A fundamental design flaw in Intel’s processor chips has forced a significant redesign of the Linux and Windows kernels to defang the chip-level security bug… Microsoft is expected to publicly introduce the necessary changes to its Windows operating system in an upcoming Patch Tuesday: these changes were seeded to beta testers running fast-ring Windows Insider builds in November and December…

    [The security hole] would allow ring-3-level user code to read ring-0-level kernel data. And that is not good.

    That was news to me, but we had a topic here on AskWoody started by @BillC just a few hours later. (I just discovered that I can’t put those comments under this post, so I’ve sealed off the original Code Red thread, and urge you to comment on this topic by clicking Comment on the AskWoody Lounge above.)

    It’s all vaguely reminiscent of the Intel Management Engine bug from 2016-2017.

    Lots of reason to be concerned, but there’s no immediate problem — and no known exploit. Suffice it to say that everyone running an Intel 64-bit chip will likely get hit. Apparently the Linux fix goes after AMD chips, too, although I don’t see any information about whether that’s due to a problem with AMD, or an overly zealous implementation in various Linux distros.

    Intel has the story under embargo, but I would expect we’ll get official notices shortly.

    Worth noting: Intel’s CEO Brian Krzanich sold $39 million worth of INTC stock on November 29. Just a coincidence, I’m sure. (Catalin Cimpanu has since withdrawn his tweet, saying “It’s not that bad. It was a legal sale in the eyes of the SEC.”)

    UPDATE: Alex Ionescu – “Windows 17035 Kernel ASLR/VA Isolation In Practice (like Linux KAISER). First screenshot shows how NtCreateFile is not mapped in the kernel region of the user CR3. Second screenshot shows how a ‘shadow’ kernel trap handler, is (has to be).” (Win10 17035 is the Nov 8 IoT beta build.) Thx @teroalhonen

    UPDATE: Hal Berenson: “Putting 2+2 together, my guess is you can see the fix in action here” pointing to this Amazon Web Services page

    Immediately following the reboot my server running on this instance started to suffer from cpu stress.

    We’re entering uncharted territory….

    UPDATE: Kevin Beaumont:

    UPDATE: Worthwhile details emerging, especially about the AMD fallout, on Reddit.

    UPDATE: There’s a report of Proof of Concept code from @brainsmoke.

    UPDATE: Ryan Shrout

    UPDATE: Intel (with stock down about 4% today, as of this moment), says that the security hole extends to other processors. Jordan Novet at CNBC has more from Intel’s point of view.

  • Intel Firmware Security Bulletin issued

    Posted on November 21st, 2017 at 01:46 Comment on the AskWoody Lounge

    Six months on from the initial vulnerability disclosure on Intel Management Engine, Intel have issued a follow-up disclosure today, on a firmware vulnerability.

    Intel has identified several security vulnerabilities that could potentially place impacted platforms at risk. Systems using ME Firmware versions 11.0/11.5/11.6/11.7/11.10/11.20, SPS Firmware version 4.0, and TXE version 3.0 are impacted

    The details have been posted in the Code Red forum, but as we are missing the right panel widgets, you might not find that by navigating! Here’s the link