Subject: General Tech | January 3, 2018 - 01:12 PM | Jeremy Hellstrom
Tagged: security, patch, kernel, Intel
Intel is having a lousy day after revealing a fundamental flaw in their architecture design; one not shared by AMD chips. It turns out that many common programs are able to read the protected memory sections of the chips kernel, something commonly known as a very bad thing. The flaw exists in both Linux and Windows and is serious enough that a patch has been released, which you should install.
However initial reports show the patch has a negative effect on performance, with a worst case scenario showing quite a performance delta. The thing to keep in mind is that we do not have many data points yet, more testing needs to be done to determine exactly how much performance degradation will be experienced. We will conduct our own testing here, with a focus on storage which could see the most degradation, especially the newly released Intel Optane. You can also expect that Amazon, Azure and other hosting companies will be releasing information on the effect this has on their systems, which will give us a good overall view of what this patch will do.
The easiest way to ensure you are not going to experience this issue is to pick up a Ryzen or Threadripper, of course. The Inquirer offers more insight here.
"A fundamental design flaw in Intel's processor chips has forced a significant redesign of the Linux and Windows kernels to defang the chip-level security bug."
Here is some more Tech News from around the web:
- Windows 10 growth remains slow as Windows 7 dominates @ The Inquirer
- 7 Tech Predictions for 2018 @ TechSpot
- Windows 10's Edge vs Chrome: We're Faster and Win in Battery Face-off, Says Microsoft @ Slashdot
- iMac Pro teardown shows off Cupertino's engineering chops @ The Inquirer
- Kinect Is Really Dead Now, Basically @ Slashdot
Subject: General Tech | January 11, 2017 - 12:42 PM | Jeremy Hellstrom
Tagged: patch, oops, microsoft
If you game on multiple monitors and have noticed problems recently, with screens rendering with off clipping or not a timely manner you may want to look to Microsoft. It seems that KB3213986 which was released yesterday, may well be to blame. As there are no serious security updates contained in this particular patch you can feel safe uninstalling it, unless you really need two keyboards and a fingerprint touchscreen attached to your system. Cheers to The Guru of 3D for posting this first.
"Users may experience delayed or clipped screens while running 3D rendering apps (such as games) on systems with more than one monitor."
Here is some more Tech News from around the web:
- Windows 10 Creator's Build comes with 'better' privacy and 'no' targeted ads @ The Inquirer
- Citrix buys Unidesk for massive Microsoft Windows rollouts @ The Register
- Tiny Patch Tuesday after heavy Christmas for Microsoft security team @ The Inquirer
- The 3D printers of CES @ Hack a Day
- Juniper warns: Borked upgrade opens root on firewalls @ The Register
- Mint 18.1 review: Forget about Wayland and get comfy with the command line @ Ars Technica
Subject: General Tech | December 22, 2014 - 04:10 PM | Sebastian Peak
Tagged: patch, gpu performance, assassin's creed, assasins creed unity
The latest patch (version 1.4.0) for Assassin's Creed Unity was released on Friday, and the folks at HardOCP have posted a review with their perfomance findings today.
Spoiler alert: the performance numbers are better, but not by a lot. To quote the article's conclusion:
"Thanks to the recent patch 1.4.0 it is a little "less terrible," but it is still not very good. This game is poorly optimized, if at all, and performs worse than it should on the latest generation of video cards. Even with SLI you cannot maximize the graphics settings at 1440p with TXAA, one of the added NVIDIA features in the game. This is sad."
The post for Patch 4 on Steam lists these improvements:
- Performance & Stability: Frame rate drops, game crashes, lost progression
- Gameplay: Navigation, lock picking chests
- Online: Connectivity, matchmaking, companion app
The tested patch (which weighs in at 5.4GB) is the fourth one released in December, as Ubisoft attempts to mitigate some of the issues with a game that has only disappointed since launch. While overall improvements seen by the team at [H] were slight, the review does concede that patch "helped performance and image quality" and that "using the latest NVIDIA beta drivers...also helped performance in this game". However to fully enjoy the Assassin's Creed Unity experience they do recommend "a cold beer, or two".
Subject: General Tech | December 9, 2014 - 09:40 PM | Scott Michaud
Tagged: windows, windows 10, patch, patch tuesday
These are the sorts of things that will happen in prerelease software. Gabriel Aul, leader of the Data and Fundamentals Team at Microsoft and blogger for the Windows Insider Program, announced on Twitter that today's Windows Update for Internet Explorer may not install if Office is also install. The workaround is, if the update fails, to uninstall Office, apply the update, and then reinstall Office. Unfortunately, I am not able to give my personal experience because I use LibreOffice (I did not want to purchase a commercial license of Office).
I was not expecting to use this fail-bandaid image again, so soon.
If it wasn't an important security update, another option would be to wait for the next build. I know that, when I first installed Windows 10, I had a similar problem with a Defender update that continually failed. The install failure was fixed when I upgraded to Build 9860. The next version of Windows 10 is probably not too far away... … but this is a security update.
Hopefully this is one less thing to break when it hits full release next year.
Subject: General Tech | December 6, 2014 - 04:30 AM | Scott Michaud
Tagged: windows 10, windows, patch, microsoft
A few days ago, I attempted to install my Windows updates, but one failed. After complaining about the update not being accepted, it would ask you to restart your computer, where it would proudly proclaim that you have an update pending... ad infinitum. It apparently did the same for many others, including Paul Thurrott (who voiced his concerns on Twitter).
Some day (of silence) later, and a workaround has been voiced. As far as I can tell, it was originally discovered by a member of the community, but an Engineering General Manager at Microsoft suggested that Paul Thurrott try it, even though the GM's official workaround was slightly different.
Long story short, here are the steps:
- Go to Add or Remove Programs.
- Go to View installed updates.
- Search for KB3019269 and uninstall it. Do not restart.
- Search for KB3018943 and uninstall it. Do not restart.
- Search for KB3016725 and uninstall it. Do not restart.
- Search for KB3016656 and uninstall it. Restart your computer.
- Run Windows Update and install whatever it tells you to.
- I needed to do Step 7 twice.
- Reboot a second time.
When I did this procedure, Windows Update complained about a failed update. Retrying it, without rebooting, was successful however. If you experienced this problem, be prepared for a potential false error – the fix might have still been successful.
This was actually the second update to fail in the exact same way, the first being a Windows Defender patch from the initial Technical Preview release. That time, the problem went away when Microsoft released a new build and I updated to it. The same probably would be true when Microsoft replaces Build 9879 with whatever they have upcoming, albeit that is at least a month away. As far as I can tell, not a whole lot has changed.
Again, this is pre-release software. I will not knock Microsoft for it, especially since the update procedure is one of the key points of focus for the entire Technical Preview. The occasional failure is to be somewhat expected.
Subject: General Tech | March 11, 2013 - 02:27 PM | Jeremy Hellstrom
Tagged: Kaspersky Labs, patch
It would seem that a single specially malformed IPv6 packet is enough to completely lock up a PC protected by several versions of Kaspersky Internet Security. There is currently a private patch available for machines suffering from this issue and there will be an official patch pushed out in the very near future. According to The Register this flaw was originally reported to Kaspersky in January but as they had not released a patch the original discoverer of the flaw has gone public, which was obviously what it took to get them to fix the issue. If you run into problematic PCs over the next few days you might want to check for Kaspersky Labs software before you really get into troubleshooting.
"After receiving feedback from the researcher, Kaspersky Lab quickly fixed the error. A private patch is currently available on demand and an autopatch will soon be released to fix the problem automatically on every computer protected by Kaspersky Internet Security 2013."
Here is some more Tech News from around the web:
- Engineers Build "Self-Healing" Chips Capable of Repairing Themselves @ Slashdot
- Here's the $4.99 utility that might just have saved Windows 8 @ The Register
- Intro to Embedded Linux Part 1: Defining Android vs. Embedded Linux @ Linux.com
- DIY Lighting Solutions @ Hack a Day
- ROFIS JR30 Rotating Head CREE R5 1xAA LED Flashlight Review @ ModSynergy
Subject: General Tech | March 5, 2013 - 06:26 AM | Tim Verry
Tagged: security, patch, mcrat trojan, Java, exploit
Java developer Oracle recently released a patch to its Java Platform Standard Edition client to address two exploits used by attackers to install the McRAT trojan onto users machines. Specifically, Oracle is issuing the patch for vulnerabilities CVE-2013-1493 and CVE-2013-0809.
The vulnerabilities were related to Java running in a web browser. When users visit a malicious web site with vulnerable versions of Java installed, attackers are able to remote execute the McRAT trojan. That trojan was subsequently used to download additional malware to further compromise the machines in question. According to Oracle, the vulnerability was first discovered on February 1st, 2013 but did not make it in time to be rolled into that month’s scheduled update. As a result, Oracle slated it for inclusion in the Java platform update on April 16, 2013, but reconsidered after seeing exploits using these vulnerabilities in the wild. While servers and standalone Java installations are not affected, consumers will need to apply the patch via Java SE’s automatic updater or by manually installing the patch from this page. Currently, all Java SE versions prior to this patch are affected, including JDK and JRE 7 Update 15, 6 Update 41, and 5.0 Update 40 (or earlier).
Oracle states that the patch is a critically important update, and users should update as soon as possible. If you have not already applied the update (or given up on Java and uninstalled it completely--heh), start up Java and check for updates to grab the patch.
Subject: General Tech | June 22, 2011 - 10:31 PM | Scott Michaud
Tagged: patch, dx11, crysis2
Crysis 2 has shed the resource hog reputation of its predecessor while simultaneously shedding its reputation as a game to show off your computer with. There was also a lot of ranting in the forums during it and its demo's releases about how good of PC game it was altogether. Coming on Monday, Crytek is setting to release their anticipated DirectX 11 patch along with a higher resolution texture pack for those with computers that scoff at Crysis 2 in its current state.
Can you run me now? Good.
(Image from Crytek, modified)
The change list for patch 1.9 includes a set of notable additions:
- DX11: Tessellation + Displacement Mapping
- DX11: High Quality HDR Motion Blur
- DX11: Realistic Shadows with Variable Penumbra
- DX11: Sprite Based Bokeh Depth of Field
- DX11: Parallax Occlusion Mapping
- DX11: Particle Motion Blur, Shadows, and Art Updates
- DX11: Water Rendering improvement using Tessellation and Displacement Mapping
- Realtime Local Reflections
- Added support for Higher Resolution Textures Package
- Improved advanced video settings menu
- Improved Tone Mapping
- (And the usual bug fixes and such)