A Windows XP help forum. PCbanter

If this is your first visit, be sure to check out the FAQ by clicking the link above. You may have to register before you can post: click the register link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below.

Go Back   Home » PCbanter forum » Microsoft Windows XP » General XP issues or comments
Site Map Home Register Authors List Search Today's Posts Mark Forums Read Web Partners

O.T. Avast pop-up



 
 
Thread Tools Display Modes
  #46  
Old June 26th 19, 04:05 PM posted to microsoft.public.windowsxp.general
Robert in CA
external usenet poster
 
Posts: 785
Default O.T. Avast pop-up


[]
I did loose some information but I would rather have that
and fix this problem and I can retrieve most of the information.
I updated my VLC player, Macrium and Avast and have run all
the scans and checked for Windows update of which there were
2 important updates and 2 optional updates and installed all of
them after checking what they were.

I'm still monitoring the computer to make sure everything is OK
so far things seem normal.

Thanks again,
Robert


It's worth keeping a log (just a text file, a diary/journal) of things
like the above - as well as any actual downloads, if you do them outside
the prog.s (I know VLC does the update inside itself, and Avast probably
does too) - somewhere that _isn't_ overwritten if you do a
restore-from-image, so if you have to do another one, you know what
updates you have to do again. That's one of the reasons I have most of
my drive as a D: (data) partition, with C: as just holding Windows and
installed software. (Another reason is it makes C: smaller so imaging is
quicker so I might do it more often. Though of course D: needs backing
up too, which I do - but just by copying, not imaging.)

Of course, as soon as you're reasonably sure all is well, make another
image: then if you subsequently have to do another restore-from-image,
you won't have as much updating to do.
--
J. P. Gilliver. UMRA: 1960/1985 MB++G()AL-IS-Ch++(p)Ar@T+H+Sh0!:`)DNAf

If you want to make people angry, lie to them. If you want to make them
absolutely livid, then tell 'em the truth.



I don't know if I would create a separate partition
just for downloads/data after all the programs and
X programsx86 should hold all of that and seems too
advanced for my purposes but I see your point and its
not a bad idea.

I have tried to do so with my files and folders and
with my backups but point taken.

Thanks,
Robert
Ads
  #47  
Old June 26th 19, 04:07 PM posted to microsoft.public.windowsxp.general
Robert in CA
external usenet poster
 
Posts: 785
Default O.T. Avast pop-up

On Tuesday, June 25, 2019 at 11:47:39 PM UTC-7, Robert in CA wrote:
On Tuesday, June 25, 2019 at 11:57:14 AM UTC-7, Paul wrote:
Robert in CA wrote:
I finally found the Mrimgs they were on the C: partition,.
that's what threw me. I started the process but don't know
if I should proceed since I didn't resize the partition as
in your example and then got the pop-up of over writing.
Should I continue?

http://i68.tinypic.com/294kry0.jpg # Collection of MRIMG 6/2/2019

http://i67.tinypic.com/2aiigzs.jpg # Dell svc, Recovery 14GB, 119/907GB C:

http://i63.tinypic.com/eg3bev.jpg # Backup is 119GB, curr disk is 142GB !!!

http://i65.tinypic.com/qpjc3o.jpg # Ready to run...

http://i66.tinypic.com/154btb4.jpg # Restore started...

Thanks,
Robert


As long as you know that the June25 contents on the disk
today are not being lost by writing a June2 image over
top, you're ready to go.

I see a difference of 119GB on June2 in your pictures,
versus 142GB on June25.

If you're confident nothing is being lost, then click continue.

*******

Your Device Manager entries are weird, in that it
seems a USB controller and Network controller have
a yellow mark. You'd need to get the Code value
from those, by doing properties.

At this point though, since you're restoring, and
you're pretty confident of your lineup (putting
correct restore over current system), you'll need
to re-check Device Manager (devmgmt.msc) later
after the restore is finished. As the situation
will have changed at that point. With a yellow
mark on the main network controller, you wouldn't
really be able to use the machine for surfing
and such...

*******

You seem to be following the restore recipe OK.

Paul




I went back to check the device manager
and it still shows the same yellow triangle
with exclamation marks. I went into the
Administrator Account to try and automatically
update the drivers but it couldn't find anything
then tried it manually with the same result.

Apparently the drivers are from Realtek at least
that was what was highlighted when I tried to do it
manually but had no idea what to search for?

http://i64.tinypic.com/oab22e.jpg

http://i68.tinypic.com/1178w9t.jpg

So should I proceed with this?

Thanks,
Robert


I of course meant how should I proceed with this?
  #48  
Old June 26th 19, 07:24 PM posted to microsoft.public.windowsxp.general
Paul[_32_]
external usenet poster
 
Posts: 11,873
Default O.T. Avast pop-up

Robert in CA wrote:
On Tuesday, June 25, 2019 at 11:47:39 PM UTC-7, Robert in CA wrote:
On Tuesday, June 25, 2019 at 11:57:14 AM UTC-7, Paul wrote:
Robert in CA wrote:
I finally found the Mrimgs they were on the C: partition,.
that's what threw me. I started the process but don't know
if I should proceed since I didn't resize the partition as
in your example and then got the pop-up of over writing.
Should I continue?

http://i68.tinypic.com/294kry0.jpg # Collection of MRIMG 6/2/2019

http://i67.tinypic.com/2aiigzs.jpg # Dell svc, Recovery 14GB, 119/907GB C:

http://i63.tinypic.com/eg3bev.jpg # Backup is 119GB, curr disk is 142GB !!!

http://i65.tinypic.com/qpjc3o.jpg # Ready to run...

http://i66.tinypic.com/154btb4.jpg # Restore started...

Thanks,
Robert
As long as you know that the June25 contents on the disk
today are not being lost by writing a June2 image over
top, you're ready to go.

I see a difference of 119GB on June2 in your pictures,
versus 142GB on June25.

If you're confident nothing is being lost, then click continue.

*******

Your Device Manager entries are weird, in that it
seems a USB controller and Network controller have
a yellow mark. You'd need to get the Code value
from those, by doing properties.

At this point though, since you're restoring, and
you're pretty confident of your lineup (putting
correct restore over current system), you'll need
to re-check Device Manager (devmgmt.msc) later
after the restore is finished. As the situation
will have changed at that point. With a yellow
mark on the main network controller, you wouldn't
really be able to use the machine for surfing
and such...

*******

You seem to be following the restore recipe OK.

Paul



I went back to check the device manager
and it still shows the same yellow triangle
with exclamation marks. I went into the
Administrator Account to try and automatically
update the drivers but it couldn't find anything
then tried it manually with the same result.

Apparently the drivers are from Realtek at least
that was what was highlighted when I tried to do it
manually but had no idea what to search for?

http://i64.tinypic.com/oab22e.jpg Code 28 No driver
Code 28 No driver

http://i68.tinypic.com/1178w9t.jpg Attempted driver update

So should I proceed with this?

Thanks,
Robert


I of course meant how should I proceed with this?


Well, I don't know the details of your RealTek NIC.

For an "unknown" item, I do Properties and check the Hardware-ID.

https://i.postimg.cc/C1QKbzpy/hardware-id.gif

Then I look that one up in pci.ids.

http://pciids.sourceforge.net/pci.ids

8086 1503

8086 Intel Corporation
...
1503 82579V Gigabit Network Connection === the info I want
1043 849c P8P67 Deluxe Motherboard

So that's an example, using my NIC.

My USB example I'll select, is this one. For
USB peripherals, you would use the usb.ids file,
But this is likely a host controller, so again, we
can use the pci.ids.

https://i.postimg.cc/wBJvD6T3/usb-id.gif

1B21 1142

1b21 ASMedia Technology Inc.
...
1142 ASM1042A USB 3.0 Host Controller

On Windows 7, that tells us it is a USB3 controller and
Microsoft doesn't have USB3 drivers in the OS. They must
be added by the user.

If the answer came back that the host controller was
USB2, the Intel chipset driver might be a fit for that.

*******

Drop over to the Dell site, once you've satisfied yourself
as to the identity of the errant items, and get your drivers
there.

https://www.dell.com/support/home/ca...s-8500/drivers

Intel Chipset Driver Could cover USB2 driver.
Not likely necessary in this case,
subject to hardware-id verification

Intel USB 3.0 eXtensible ... Driver More likely you need this...

Realtek 8111E Network Driver Could cover your missing NIC

Running those might be easier than doing the
Update Driver dance from Device Manager :-)

Paul












  #49  
Old June 26th 19, 08:43 PM posted to microsoft.public.windowsxp.general
Robert in CA
external usenet poster
 
Posts: 785
Default O.T. Avast pop-up

On Wednesday, June 26, 2019 at 11:24:47 AM UTC-7, Paul wrote:
Robert in CA wrote:
On Tuesday, June 25, 2019 at 11:47:39 PM UTC-7, Robert in CA wrote:
On Tuesday, June 25, 2019 at 11:57:14 AM UTC-7, Paul wrote:
Robert in CA wrote:
I finally found the Mrimgs they were on the C: partition,.
that's what threw me. I started the process but don't know
if I should proceed since I didn't resize the partition as
in your example and then got the pop-up of over writing.
Should I continue?

http://i68.tinypic.com/294kry0.jpg # Collection of MRIMG 6/2/2019

http://i67.tinypic.com/2aiigzs.jpg # Dell svc, Recovery 14GB, 119/907GB C:

http://i63.tinypic.com/eg3bev.jpg # Backup is 119GB, curr disk is 142GB !!!

http://i65.tinypic.com/qpjc3o.jpg # Ready to run...

http://i66.tinypic.com/154btb4.jpg # Restore started...

Thanks,
Robert
As long as you know that the June25 contents on the disk
today are not being lost by writing a June2 image over
top, you're ready to go.

I see a difference of 119GB on June2 in your pictures,
versus 142GB on June25.

If you're confident nothing is being lost, then click continue.

*******

Your Device Manager entries are weird, in that it
seems a USB controller and Network controller have
a yellow mark. You'd need to get the Code value
from those, by doing properties.

At this point though, since you're restoring, and
you're pretty confident of your lineup (putting
correct restore over current system), you'll need
to re-check Device Manager (devmgmt.msc) later
after the restore is finished. As the situation
will have changed at that point. With a yellow
mark on the main network controller, you wouldn't
really be able to use the machine for surfing
and such...

*******

You seem to be following the restore recipe OK.

Paul


I went back to check the device manager
and it still shows the same yellow triangle
with exclamation marks. I went into the
Administrator Account to try and automatically
update the drivers but it couldn't find anything
then tried it manually with the same result.

Apparently the drivers are from Realtek at least
that was what was highlighted when I tried to do it
manually but had no idea what to search for?

http://i64.tinypic.com/oab22e.jpg Code 28 No driver
Code 28 No driver

http://i68.tinypic.com/1178w9t.jpg Attempted driver update

So should I proceed with this?

Thanks,
Robert


I of course meant how should I proceed with this?


Well, I don't know the details of your RealTek NIC.

For an "unknown" item, I do Properties and check the Hardware-ID.

https://i.postimg.cc/C1QKbzpy/hardware-id.gif

Then I look that one up in pci.ids.

http://pciids.sourceforge.net/pci.ids

8086 1503

8086 Intel Corporation
...
1503 82579V Gigabit Network Connection === the info I want
1043 849c P8P67 Deluxe Motherboard

So that's an example, using my NIC.

My USB example I'll select, is this one. For
USB peripherals, you would use the usb.ids file,
But this is likely a host controller, so again, we
can use the pci.ids.

https://i.postimg.cc/wBJvD6T3/usb-id.gif

1B21 1142

1b21 ASMedia Technology Inc.
...
1142 ASM1042A USB 3.0 Host Controller

On Windows 7, that tells us it is a USB3 controller and
Microsoft doesn't have USB3 drivers in the OS. They must
be added by the user.

If the answer came back that the host controller was
USB2, the Intel chipset driver might be a fit for that.

*******

Drop over to the Dell site, once you've satisfied yourself
as to the identity of the errant items, and get your drivers
there.

https://www.dell.com/support/home/ca...s-8500/drivers

Intel Chipset Driver Could cover USB2 driver.
Not likely necessary in this case,
subject to hardware-id verification

Intel USB 3.0 eXtensible ... Driver More likely you need this...

Realtek 8111E Network Driver Could cover your missing NIC

Running those might be easier than doing the
Update Driver dance from Device Manager :-)

Paul





If I'm following you for the USB this is what I
have on my 8500 and I select the top driver where
it says urgent?


http://i68.tinypic.com/2wd8ugi.jpg

http://i64.tinypic.com/vhfbcl.jpg

Robert
  #50  
Old June 26th 19, 10:27 PM posted to microsoft.public.windowsxp.general
Paul[_32_]
external usenet poster
 
Posts: 11,873
Default O.T. Avast pop-up

Robert in CA wrote:

If I'm following you for the USB this is what I
have on my 8500 and I select the top driver where
it says urgent?


http://i68.tinypic.com/2wd8ugi.jpg

http://i64.tinypic.com/vhfbcl.jpg Dell Driver Updater

Robert


This post only answers the part about the Urgent.
Not the rest of your driver needs.

*******

The one that says Urgent, is a BIOS update. That
could affect the ability to boot the XPS 8500, if
something goes wrong during the update.

Category: BIOS

Last Updated: 11 Jul 2018

Version: A14 ,A14 Older versions

File Name: A14.EXE

File size: 7.53 MB

Description: This package provides the BIOS Update on Dell XPS 8500

Fixes & Enhancements

Fixes:
- Updated CPU microcode to address security advisory
Intel Security Advisory INTEL-SA-00115 (CVE-2018-3639 & CVE-2018-3640)

https://cve.mitre.org/cgi-bin/cvenam...=CVE-2018-3639

CVE-2018-3639
Systems with microprocessors utilizing speculative execution and
speculative execution of memory reads before the addresses of all
prior memory writes are known may allow unauthorized disclosure of
information to an attacker with local user access === baloney sandwich!!!
via a side-channel analysis, aka
Speculative Store Bypass (SSB), Variant 4.

https://cve.mitre.org/cgi-bin/cvenam...=CVE-2018-3640

CVE-2018-3640
Systems with microprocessors utilizing speculative execution and
that perform speculative reads of system registers may allow
unauthorized disclosure of system parameters to an attacker
with local user access === More baloney sandwich!!!
via a side-channel analysis,
aka Rogue System Register Read (RSRE), Variant 3a.

There might be other reasons to install that BIOS, but those
two reasons aren't the ones. There is Spectre and Meltdown,
which might have been covered in a previous version of this
BIOS sequence.

Installing a Spectre/Meltdown BIOS, would slow the machine by
a few percent in average usage. When the OS detects the presence
of the correct BIOS, it may enable OS patches that align with
the information presented. And the above BIOS version 14 would
contain such Spectre/Meltdown CPU microcode patches.

Using the Intel Processor Identification Utility, the "version number"
of the processor, reflects the actual microcode patch installed.
You then check the available Intel information, to see what version
your CPU is running. If it's a "younger" version, you might consider
a BIOS update. If you already have a good version showing,
(because the OS microcode loader put it there),
then maybe you don't need to do anything.

Spectre/Meltdown can be patched by a BIOS microcode patch or
via an OS microcode patch. These give the same protection
against Spectre/Meltdown (at least as long as Microsoft is
using the latest microcode).

Before you do anything, run the Intel PIU. This is the
Intel PIU for my Test Machine.

Note - when you install or run it, you're likely to need
your Administrator account.

https://downloadcenter.intel.com/dow...indows-Version

Mine is currently 0x42D when measured under Windows 10.

https://i.postimg.cc/Pqnb7gQc/intel-PIU-example.gif

Using the model number i7-4930K, gives me this in ark.intel.com
I look up my processor, to get the product name I need for later.

https://ark.intel.com/content/www/us...-3-90-ghz.html

"Ivy Bridge E" (Ivy Bridge is IVB, Ivy Bridge E is IVT...)

The sequence I noted was, 0x428 was the BIOS level patch.
Mar.12,2018 (under Linux OS microcode loaded), got
bumped to 0x42A. And the latest info I can find from
Intel, says I should be at 0x42C, while the Microsoft
Windows 10 OS microcode loader has loaded 0x42D. This
means Microsoft is "committed" to syncing with the
Intel Spectre/Meltdown microcode, and under Windows 10
I don't have to worry. I'm patched. Windows 7 is in Extended Support,
but one of the updates should have updated your CPU as well.

This is an example of what an Intel release note looks like.
The tricky part, is mapping CPU part number to "Model",
which you could get from ark.intel.com using the info
in the PIU screen.

"RELEASENOTE from microcode-20180312.tgz"
== Updates upon 20171117 release ==
MODEL STEP f-mm-sf version
-- New Platforms --
BDX-DE EGW A0 6-56-5:10 e000009
SKX B1 6-55-3:97 1000140
-- Updates --
IVT C0 6-3e-4:ed 428-42c === my processor

Once we have a picture of your Intel PIU screen with
the version information, that will indicate whether
the patched and fully updated Windows 7 SP1 you're running
is protected by Microsoft (instead of protected by Dell).

The above CVE still exists. The Dell file might help.
But, it's flashing the BIOS... and is not without risks.
You are likely out of warranty on both XPS 8500 and 780,
so if the BIOS bricked the ability to boot, you wouldn't
be getting any "free repairs" for such. Just a guess.

Paul
  #51  
Old June 26th 19, 10:31 PM posted to microsoft.public.windowsxp.general
Paul[_32_]
external usenet poster
 
Posts: 11,873
Default O.T. Avast pop-up

Robert in CA wrote:

If I'm following you for the USB this is what I
have on my 8500 and I select the top driver where
it says urgent?


http://i68.tinypic.com/2wd8ugi.jpg

http://i64.tinypic.com/vhfbcl.jpg

Robert


If you get me the hardware-ids, using Device Manager
(devmgmt.msc), I might be able to tell you which
exact driver you need. Rather than you downloading
a 100 drivers and finding the right 2 for the job.

My best guess, is the two necessary are in this set.

Intel Chipset Driver Could cover USB2 driver.
Not likely necessary in this case,
subject to hardware-id verification

Intel USB 3.0 eXtensible ... Driver More likely you need this...

Realtek 8111E Network Driver Could cover your missing NIC

But with the hardware-id info, that would make the
determination a little easier.

Paul
  #52  
Old June 27th 19, 12:06 AM posted to microsoft.public.windowsxp.general
Robert in CA
external usenet poster
 
Posts: 785
Default O.T. Avast pop-up

On Wednesday, June 26, 2019 at 2:31:28 PM UTC-7, Paul wrote:
Robert in CA wrote:

If I'm following you for the USB this is what I
have on my 8500 and I select the top driver where
it says urgent?


http://i68.tinypic.com/2wd8ugi.jpg

http://i64.tinypic.com/vhfbcl.jpg

Robert


If you get me the hardware-ids, using Device Manager
(devmgmt.msc), I might be able to tell you which
exact driver you need. Rather than you downloading
a 100 drivers and finding the right 2 for the job.

My best guess, is the two necessary are in this set.

Intel Chipset Driver Could cover USB2 driver.
Not likely necessary in this case,
subject to hardware-id verification

Intel USB 3.0 eXtensible ... Driver More likely you need this...

Realtek 8111E Network Driver Could cover your missing NIC

But with the hardware-id info, that would make the
determination a little easier.

Paul





Here they a

http://i67.tinypic.com/2hi76v9.jpg

Robert
  #53  
Old June 27th 19, 12:22 AM posted to microsoft.public.windowsxp.general
Robert in CA
external usenet poster
 
Posts: 785
Default O.T. Avast pop-up

On Wednesday, June 26, 2019 at 2:27:43 PM UTC-7, Paul wrote:
Robert in CA wrote:

If I'm following you for the USB this is what I
have on my 8500 and I select the top driver where
it says urgent?


http://i68.tinypic.com/2wd8ugi.jpg

http://i64.tinypic.com/vhfbcl.jpg Dell Driver Updater

Robert


This post only answers the part about the Urgent.
Not the rest of your driver needs.

*******

The one that says Urgent, is a BIOS update. That
could affect the ability to boot the XPS 8500, if
something goes wrong during the update.

Category: BIOS

Last Updated: 11 Jul 2018

Version: A14 ,A14 Older versions

File Name: A14.EXE

File size: 7.53 MB

Description: This package provides the BIOS Update on Dell XPS 8500

Fixes & Enhancements

Fixes:
- Updated CPU microcode to address security advisory
Intel Security Advisory INTEL-SA-00115 (CVE-2018-3639 & CVE-2018-3640)

https://cve.mitre.org/cgi-bin/cvenam...=CVE-2018-3639

CVE-2018-3639
Systems with microprocessors utilizing speculative execution and
speculative execution of memory reads before the addresses of all
prior memory writes are known may allow unauthorized disclosure of
information to an attacker with local user access === baloney sandwich!!!
via a side-channel analysis, aka
Speculative Store Bypass (SSB), Variant 4.

https://cve.mitre.org/cgi-bin/cvenam...=CVE-2018-3640

CVE-2018-3640
Systems with microprocessors utilizing speculative execution and
that perform speculative reads of system registers may allow
unauthorized disclosure of system parameters to an attacker
with local user access === More baloney sandwich!!!
via a side-channel analysis,
aka Rogue System Register Read (RSRE), Variant 3a.

There might be other reasons to install that BIOS, but those
two reasons aren't the ones. There is Spectre and Meltdown,
which might have been covered in a previous version of this
BIOS sequence.

Installing a Spectre/Meltdown BIOS, would slow the machine by
a few percent in average usage. When the OS detects the presence
of the correct BIOS, it may enable OS patches that align with
the information presented. And the above BIOS version 14 would
contain such Spectre/Meltdown CPU microcode patches.

Using the Intel Processor Identification Utility, the "version number"
of the processor, reflects the actual microcode patch installed.
You then check the available Intel information, to see what version
your CPU is running. If it's a "younger" version, you might consider
a BIOS update. If you already have a good version showing,
(because the OS microcode loader put it there),
then maybe you don't need to do anything.

Spectre/Meltdown can be patched by a BIOS microcode patch or
via an OS microcode patch. These give the same protection
against Spectre/Meltdown (at least as long as Microsoft is
using the latest microcode).

Before you do anything, run the Intel PIU. This is the
Intel PIU for my Test Machine.

Note - when you install or run it, you're likely to need
your Administrator account.

https://downloadcenter.intel.com/dow...indows-Version

Mine is currently 0x42D when measured under Windows 10.

https://i.postimg.cc/Pqnb7gQc/intel-PIU-example.gif

Using the model number i7-4930K, gives me this in ark.intel.com
I look up my processor, to get the product name I need for later.

https://ark.intel.com/content/www/us...-3-90-ghz.html

"Ivy Bridge E" (Ivy Bridge is IVB, Ivy Bridge E is IVT...)

The sequence I noted was, 0x428 was the BIOS level patch.
Mar.12,2018 (under Linux OS microcode loaded), got
bumped to 0x42A. And the latest info I can find from
Intel, says I should be at 0x42C, while the Microsoft
Windows 10 OS microcode loader has loaded 0x42D. This
means Microsoft is "committed" to syncing with the
Intel Spectre/Meltdown microcode, and under Windows 10
I don't have to worry. I'm patched. Windows 7 is in Extended Support,
but one of the updates should have updated your CPU as well.

This is an example of what an Intel release note looks like.
The tricky part, is mapping CPU part number to "Model",
which you could get from ark.intel.com using the info
in the PIU screen.

"RELEASENOTE from microcode-20180312.tgz"
== Updates upon 20171117 release ==
MODEL STEP f-mm-sf version
-- New Platforms --
BDX-DE EGW A0 6-56-5:10 e000009
SKX B1 6-55-3:97 1000140
-- Updates --
IVT C0 6-3e-4:ed 428-42c === my processor

Once we have a picture of your Intel PIU screen with
the version information, that will indicate whether
the patched and fully updated Windows 7 SP1 you're running
is protected by Microsoft (instead of protected by Dell).

The above CVE still exists. The Dell file might help.
But, it's flashing the BIOS... and is not without risks.
You are likely out of warranty on both XPS 8500 and 780,
so if the BIOS bricked the ability to boot, you wouldn't
be getting any "free repairs" for such. Just a guess.

Paul




Here's the results from the Intel PIU:

http://i63.tinypic.com/6pb313.png

http://i65.tinypic.com/2h3bqsk.png

http://i67.tinypic.com/jaigb9.png

Robert
  #54  
Old June 27th 19, 12:25 AM posted to microsoft.public.windowsxp.general
J. P. Gilliver (John)[_4_]
external usenet poster
 
Posts: 2,679
Default O.T. Avast pop-up

In message ,
Robert in CA writes:
[]
I don't know if I would create a separate partition
just for downloads/data after all the programs and
X programsx86 should hold all of that and seems too
advanced for my purposes but I see your point and its
not a bad idea.

I have tried to do so with my files and folders and
with my backups but point taken.

Thanks,
Robert


I think of it this way:

My D: partition is entirely under MY control. All files, folders, on it
are things I have put there - either downloaded (including updates or
installers which I can then run manually - not ones that software
[including the OS] download on their own), or created using programmes
(documents, genealogy data, images, ...). I can back it up by copying,
and do (using SyncToy to speed the process); if I need to access a file
in the copy, I can, without needing anything special.

My C: partition has Windows and all software on it, and is something of
a law unto itself - I couldn't make a copy of it with Windows Explorer
that would actually be of any use. (In fact I couldn't at all, as there
are parts of it that I wouldn't be able to even access with Explorer.)
So I image C: (and the hidden partition). I back it up by imaging (I use
Macrium). My C: at the moment (Windows 7 Home Premium, SP1, 32 bit, plus
all installed software, and a _few_ bits of data) has 36.8 GB used (out
of 99.9 allocated, but that's only because I have a 1T drive and have
been generous with it; I'd have left it at 50 GB allocated if the drive
was much smaller).

That's my view. Others have different views.
--
J. P. Gilliver. UMRA: 1960/1985 MB++G()AL-IS-Ch++(p)Ar@T+H+Sh0!:`)DNAf

Colorless green ideas sleep furiously.
  #55  
Old June 27th 19, 02:48 AM posted to microsoft.public.windowsxp.general
Robert in CA
external usenet poster
 
Posts: 785
Default O.T. Avast pop-up

On Wednesday, June 26, 2019 at 4:06:41 PM UTC-7, Robert in CA wrote:
On Wednesday, June 26, 2019 at 2:31:28 PM UTC-7, Paul wrote:
Robert in CA wrote:

If I'm following you for the USB this is what I
have on my 8500 and I select the top driver where
it says urgent?


http://i68.tinypic.com/2wd8ugi.jpg

http://i64.tinypic.com/vhfbcl.jpg

Robert


If you get me the hardware-ids, using Device Manager
(devmgmt.msc), I might be able to tell you which
exact driver you need. Rather than you downloading
a 100 drivers and finding the right 2 for the job.

My best guess, is the two necessary are in this set.

Intel Chipset Driver Could cover USB2 driver.
Not likely necessary in this case,
subject to hardware-id verification

Intel USB 3.0 eXtensible ... Driver More likely you need this...

Realtek 8111E Network Driver Could cover your missing NIC

But with the hardware-id info, that would make the
determination a little easier.

Paul





Here they a

http://i67.tinypic.com/2hi76v9.jpg

Robert




Can you tell from the hardware-ids and
Intel PIU which drivers I need?

Robert
  #56  
Old June 27th 19, 05:28 AM posted to microsoft.public.windowsxp.general
Paul[_32_]
external usenet poster
 
Posts: 11,873
Default O.T. Avast pop-up

Robert in CA wrote:
On Wednesday, June 26, 2019 at 4:06:41 PM UTC-7, Robert in CA wrote:
On Wednesday, June 26, 2019 at 2:31:28 PM UTC-7, Paul wrote:
Robert in CA wrote:

If I'm following you for the USB this is what I
have on my 8500 and I select the top driver where
it says urgent?


http://i68.tinypic.com/2wd8ugi.jpg

http://i64.tinypic.com/vhfbcl.jpg

Robert
If you get me the hardware-ids, using Device Manager
(devmgmt.msc), I might be able to tell you which
exact driver you need. Rather than you downloading
a 100 drivers and finding the right 2 for the job.

My best guess, is the two necessary are in this set.

Intel Chipset Driver Could cover USB2 driver.
Not likely necessary in this case,
subject to hardware-id verification

Intel USB 3.0 eXtensible ... Driver More likely you need this...

Realtek 8111E Network Driver Could cover your missing NIC

But with the hardware-id info, that would make the
determination a little easier.

Paul




Here they a

http://i67.tinypic.com/2hi76v9.jpg

Robert




Can you tell from the hardware-ids and
Intel PIU which drivers I need?

Robert


http://pciids.sourceforge.net/pci.ids

168c Qualcomm Atheros
...
0032 AR9485 Wireless Network Adapter
1028 0208 Wireless 1506 WLAN Half Mini-Card
103c 1838 AR9485/HB125 802.11bgn 1×1 Wi-Fi Adapter
105b e044 Unex DHXA-225
144d 410e AR9485WB-EG 802.11b/g/n mini-PCIe card on a series 3 laptop
1a3b 1186 AW-NE186H

So the one in that picture, is actually a Wifi adapter ?

Dell Wireless 1506 bgn

Hardware IDs:
PCI\VEN_168C&DEV_0032
PCI\VEN_168C&DEV_0032&SUBSYS_02081028
Vendor: Atheros AR9485

https://www.dell.com/support/home/ca...driverid=9wgyp

https://downloads.dell.com/FOLDER030....0.315_A03.EXE

Network_Driver_9WGYP_WN32_10.0.0.315_A03.EXE 104MB

That's not on the XPS 8500 page, and that's the best
match I could find.

*******

Get back to me with a picture of the USB3 one...

Paul
  #57  
Old June 27th 19, 06:14 PM posted to microsoft.public.windowsxp.general
Paul[_32_]
external usenet poster
 
Posts: 11,873
Default O.T. Avast pop-up

Robert in CA wrote:
On Wednesday, June 26, 2019 at 2:27:43 PM UTC-7, Paul wrote:
Robert in CA wrote:

If I'm following you for the USB this is what I
have on my 8500 and I select the top driver where
it says urgent?


http://i68.tinypic.com/2wd8ugi.jpg

http://i64.tinypic.com/vhfbcl.jpg Dell Driver Updater

Robert

This post only answers the part about the Urgent.
Not the rest of your driver needs.

*******

The one that says Urgent, is a BIOS update. That
could affect the ability to boot the XPS 8500, if
something goes wrong during the update.

Category: BIOS

Last Updated: 11 Jul 2018

Version: A14 ,A14 Older versions

File Name: A14.EXE

File size: 7.53 MB

Description: This package provides the BIOS Update on Dell XPS 8500

Fixes & Enhancements

Fixes:
- Updated CPU microcode to address security advisory
Intel Security Advisory INTEL-SA-00115 (CVE-2018-3639 & CVE-2018-3640)

https://cve.mitre.org/cgi-bin/cvenam...=CVE-2018-3639

CVE-2018-3639
Systems with microprocessors utilizing speculative execution and
speculative execution of memory reads before the addresses of all
prior memory writes are known may allow unauthorized disclosure of
information to an attacker with local user access === baloney sandwich!!!
via a side-channel analysis, aka
Speculative Store Bypass (SSB), Variant 4.

https://cve.mitre.org/cgi-bin/cvenam...=CVE-2018-3640

CVE-2018-3640
Systems with microprocessors utilizing speculative execution and
that perform speculative reads of system registers may allow
unauthorized disclosure of system parameters to an attacker
with local user access === More baloney sandwich!!!
via a side-channel analysis,
aka Rogue System Register Read (RSRE), Variant 3a.

There might be other reasons to install that BIOS, but those
two reasons aren't the ones. There is Spectre and Meltdown,
which might have been covered in a previous version of this
BIOS sequence.

Installing a Spectre/Meltdown BIOS, would slow the machine by
a few percent in average usage. When the OS detects the presence
of the correct BIOS, it may enable OS patches that align with
the information presented. And the above BIOS version 14 would
contain such Spectre/Meltdown CPU microcode patches.

Using the Intel Processor Identification Utility, the "version number"
of the processor, reflects the actual microcode patch installed.
You then check the available Intel information, to see what version
your CPU is running. If it's a "younger" version, you might consider
a BIOS update. If you already have a good version showing,
(because the OS microcode loader put it there),
then maybe you don't need to do anything.

Spectre/Meltdown can be patched by a BIOS microcode patch or
via an OS microcode patch. These give the same protection
against Spectre/Meltdown (at least as long as Microsoft is
using the latest microcode).

Before you do anything, run the Intel PIU. This is the
Intel PIU for my Test Machine.

Note - when you install or run it, you're likely to need
your Administrator account.

https://downloadcenter.intel.com/dow...indows-Version

Mine is currently 0x42D when measured under Windows 10.

https://i.postimg.cc/Pqnb7gQc/intel-PIU-example.gif

Using the model number i7-4930K, gives me this in ark.intel.com
I look up my processor, to get the product name I need for later.

https://ark.intel.com/content/www/us...-3-90-ghz.html

"Ivy Bridge E" (Ivy Bridge is IVB, Ivy Bridge E is IVT...)

The sequence I noted was, 0x428 was the BIOS level patch.
Mar.12,2018 (under Linux OS microcode loaded), got
bumped to 0x42A. And the latest info I can find from
Intel, says I should be at 0x42C, while the Microsoft
Windows 10 OS microcode loader has loaded 0x42D. This
means Microsoft is "committed" to syncing with the
Intel Spectre/Meltdown microcode, and under Windows 10
I don't have to worry. I'm patched. Windows 7 is in Extended Support,
but one of the updates should have updated your CPU as well.

This is an example of what an Intel release note looks like.
The tricky part, is mapping CPU part number to "Model",
which you could get from ark.intel.com using the info
in the PIU screen.

"RELEASENOTE from microcode-20180312.tgz"
== Updates upon 20171117 release ==
MODEL STEP f-mm-sf version
-- New Platforms --
BDX-DE EGW A0 6-56-5:10 e000009
SKX B1 6-55-3:97 1000140
-- Updates --
IVT C0 6-3e-4:ed 428-42c === my processor

Once we have a picture of your Intel PIU screen with
the version information, that will indicate whether
the patched and fully updated Windows 7 SP1 you're running
is protected by Microsoft (instead of protected by Dell).

The above CVE still exists. The Dell file might help.
But, it's flashing the BIOS... and is not without risks.
You are likely out of warranty on both XPS 8500 and 780,
so if the BIOS bricked the ability to boot, you wouldn't
be getting any "free repairs" for such. Just a guess.

Paul




Here's the results from the Intel PIU:

http://i63.tinypic.com/6pb313.png i7-3770 63a-9-15 4C 8T

http://i65.tinypic.com/2h3bqsk.png

http://i67.tinypic.com/jaigb9.png Revision 15

Robert


This is harder than I thought...

Not the hardware identification. But coming up with
advice as to what to do.

It's Ivy Bridge (IVB)

https://ark.intel.com/content/www/us...-3-90-ghz.html

You're at 0x15 and Windows 10 is at 0x1F or 0x20 or so.
(When Windows 10 loads microcode at boot time.)

The information is spread around and I'm not sure I've
got all the release notes.

On the Intel site, the 3770 is on "7/14" page.

https://www.intel.com/content/dam/ww...e_05132019.pdf

Ivy Bridge ... i7-3770 306A7 0x20 -- 0x21 # way past your 0x15

Using InSpectre, your situation would look like mine on the
next entry in that table.

This article mentions your processor (which means the microcode
update has an update for yours, and this would do part of the job
of a BIOS update). AFAIK, you can also uninstall this later,
so check there is an entry in Programs and Features.

What's the problem with this ? Is it for Windows 7 or not ?
If your machine is supposed to be patched by Windows Update,
why are you still at 0x15 ?

https://support.microsoft.com/en-ca/...rocode-updates

The download for the article is here. This really should be
in Windows Update, but you can get it here. Again, *not*
listed for Windows 7 SP1. Which means, if you *were* to install
this, double click the .msu, it would say "not for this machine".

https://www.catalog.update.microsoft...aspx?q=4494175

This one isn't up to date (not up to June at least)

https://www.grc.com/inspectre.htm

And the Microsoft guidance articles, obviously aren't meant
for us. Some other kinda customer must be reading these.
Apparently a survey of IT staff, indicates they are "unhappy"
with this approach to random carpet bombing.

https://support.microsoft.com/en-ca/...erabilities-in

And with the Dell BIOS, is it up to 0x21 or not ?
(Like, you could install that BIOS, but it might
already be one version behind. They would have to
spin a new BIOS for each version of microcode pushed
out by Intel.

*******

Summary: I hope someone else can help you.

I can't figure out what the disposition is for
a Windows 7 SP1 user.

I think this is a fair simulation of what others
will see on their machines. Using your vendor BIOS
update *might* change the Spectre flag, but my test
methods were unable to confirm (VirtualBox would not
pass the up-to-date Linux Microcode through to the
virtual machine, which I thought wasn't possible).

https://i.postimg.cc/MTPT7Dfp/Win7-e...th-no-BIOS.gif

On the one hand, it looks like Microsoft doesn't really
want to expose the controls too much, on client machines,
because many of us don't have an IT department to read
4073119 above. They can't have us editing the registry
and so on.

Conclusion: You can do the BIOS if you want
but I really can't promise your machine will be "armored".

The status of protection at this point is "unknown".
I don't know if the Powershell status checker that Microsoft
offers, would be a complete review at this time.

Paul
  #58  
Old June 27th 19, 06:45 PM posted to microsoft.public.windowsxp.general
Robert in CA
external usenet poster
 
Posts: 785
Default O.T. Avast pop-up

I tried going through the pici.ids ,.. it's hard to go through
especially with my eyes. It's like reading music again.

I'm trying to keep up but don't understand what you mean by
0x15?

Regarding who else might be reading these from GRC InSpectre ,.
just a guess but Google, Sprint and the like ? It's widely known
they've become political or possibly from China?

These are the results, I see that one of the yellow triangles has
been eliminated.


http://i65.tinypic.com/2m4dhc2.jpg

http://i63.tinypic.com/nmj1xj.jpg

http://i63.tinypic.com/nf07xy.jpg

http://i67.tinypic.com/2qkjczr.jpg

http://i63.tinypic.com/1so9om.jpg


Thoughts/Suggestions?

Thanks,
Robert




  #59  
Old June 27th 19, 08:12 PM posted to microsoft.public.windowsxp.general
Paul[_32_]
external usenet poster
 
Posts: 11,873
Default O.T. Avast pop-up

Robert in CA wrote:
I tried going through the pici.ids ,.. it's hard to go through
especially with my eyes. It's like reading music again.

I'm trying to keep up but don't understand what you mean by
0x15?

Regarding who else might be reading these from GRC InSpectre ,.
just a guess but Google, Sprint and the like ? It's widely known
they've become political or possibly from China?

These are the results, I see that one of the yellow triangles has
been eliminated.


http://i65.tinypic.com/2m4dhc2.jpg

http://i63.tinypic.com/nmj1xj.jpg

http://i63.tinypic.com/nf07xy.jpg Ven_8086 Dev 1E31

http://i67.tinypic.com/2qkjczr.jpg

http://i63.tinypic.com/1so9om.jpg InSpectre 406C4 ???


Thoughts/Suggestions?

Thanks,
Robert


Your USB device is Intel.

We need an Intel chipset driver for Windows 7,
as Microsoft doesn't do USB3 in Windows 7. Win8
and Win10 would have solved this on their own.

https://www.dell.com/support/home/ca...s-8500/drivers

Intel Chipset Driver

Chipset_Driver_H95F7_WN_9.3.0.1021_A00.EXE

Last Updated: 13 Jun 2014

File size: 9.08 MB

The file inside that that does the USB3 installing is "PantUSB3.inf",
not that this matters. The filename is changed by the OS
to the form of "OEM23.inf", which is used to prevent collision
of filenames.

*******

; ** Filename: PantUSB3.INF
; ** Abstract: Null driver for Intel(R) USB 3.0 devices
; ** Last Update: December 06, 2011 (Version 9.3.0 Build 1018)

Include=machine.inf

PCI\VEN_8086&DEV_1E31.DeviceDesc="Intel(R) 7 Series/C216 Chipset Family Universal Serial Bus (USB) Controller - 1E31"

*******

Even though it's in the Win7 folder of the Dell driver file,
it appears to be a null driver, and will just move the
unlabeled item into the labeled USB section. You still
have to do it though, to clean up Device Manager.

Chipset_Driver_H95F7_WN_9.3.0.1021_A00.EXE

HTH,
Paul
  #60  
Old June 27th 19, 08:32 PM posted to microsoft.public.windowsxp.general
Paul[_32_]
external usenet poster
 
Posts: 11,873
Default O.T. Avast pop-up

Robert in CA wrote:
I tried going through the pici.ids ,.. it's hard to go through
especially with my eyes. It's like reading music again.

I'm trying to keep up but don't understand what you mean by
0x15?

Regarding who else might be reading these from GRC InSpectre ,.
just a guess but Google, Sprint and the like ? It's widely known
they've become political or possibly from China?

These are the results, I see that one of the yellow triangles has
been eliminated.


http://i65.tinypic.com/2m4dhc2.jpg

http://i63.tinypic.com/nmj1xj.jpg

http://i63.tinypic.com/nf07xy.jpg

http://i67.tinypic.com/2qkjczr.jpg

http://i63.tinypic.com/1so9om.jpg


Thoughts/Suggestions?

Thanks,
Robert


The CPU has a basic part number.

The "microcode" is a patching system. Even when a CPU is
brand new, it has on average "100 bugs" in it. The microcode
subsystem was invented to allow "correcting" the behavior
of the CPU, after you've sold some (and you're still testing
the CPU in the lab!).

In a project at work, a test procedure was still being run
18 months after a product ships. These include "obscure" test
cases that customers will never run, but nevertheless,
must be corrected by software updates. That's the basic idea
of the invention of patching systems like this.

*******

When your CPU and computer left the factory, the BIOS had
version 0x15 of microcode stored in it. It has microcode
for about eight different processor models on average.
A microcode patch varies from 2KB to 16KB or so.

The microcode store is part of the multicycle instruction
interpreter. By changing what a CISC instruction does during
interpretation, you hope to prevent hackers (using web pages)
from doing stuff to the machine. Such as, stealing a credit
card number you just typed into one https web page.

When Spectre/Meltdown came out, this was the first time
that Intel suffered "architecture bugs", instead of
"instruction bugs" such as the FDIV fiasco. The patching
system had never been meant for architecture bugs. The
thing is, life was easy when "instruction bugs" existed,
as you *always* patch those. With confidence, Microsoft
could put new microcode in Windows Update, deliver it
via the microcode loader in the OS, and this would
fix everybody up. There were no "conditionals" involved.
If Intel issued microcode, you delivered it.

This changed with Spectre/Meltdown. Initially Intel delivered
microcode, but some platforms experienced performance problems
(boot problems perhaps). The microcode was withdrawn. If
you made the mistake of taking the Dell BIOS update on that
date, you might have to install an older BIOS to "re-fix"
your damn computer.

Here we are today, about nine exploits later, still patching
these damn things.

1) Yes, you can install that Dell BIOS. Dell has tested it.

There is the usual risk, with any BIOS update, of bricking
the machine.

My Test Machine motherboard is different. If that one is
bricked, there is a USB port and a white colored push button,
and I can "flash in" a new BIOS, even with no CPU in the socket.
There aren't a lot of machines with such a feature. The
alternative "unbricking" solution is a USB to 7 pin connector
device, which would be a similar thing to what the pushbutton
is doing on my computer.

If you've updated the BIOS on the XPS 8500 before and there
were no issues, then you could likely do it again with little
worry.

BIOS flashers fail when:

a) Power goes off during flashing.
Flashing might take five minute (don't know current number).

b) For the dumbest schemes, an Internet connection failure
in the middle of a flash, can cause brickage of the computer.
The file should always be fully on the machine when you flash!

c) Dumb ass developers mix versions of boot loaders and
flash main body, and "something bad happens" when mixing
certain versions. Asus used to have extensive "do this do that"
things on their web page, hinting at the complexity of mixing
and matching "from--to" BIOS combinations.

That's about it for risks.

2) All that this BIOS update will do for you, is take
the 0x15 number to 0x20 or so. It might change the Spectre
protection to "Yes". It may or may not affect the latest
exploit methods, which aren't even documented properly yet.

Windows 10 offers slightly better options.
Or so Microsoft would have us think.

Without extensive test tools, it's rather hard to tell how
exposed any machine is. The Gibson Research InSpectre is
about as useful as the Microsoft Powershell script, except
it's a bit more user friendly.

Actual exploit testers aren't to be seen. The thing is,
if a White Hat writes a tester that probes a machine locally,
Black Hats will analyze the code and "weaponize it". To prevent
aiding and assisting Black Hats, exploit testers are out
of the question (at the moment). If all these things
were "curable instantly", then exploit testers would have
been made available. And with these architectural class
bugs in CPUs, we're not in a position right now to be
"giving free weapons to bad guys".

Your AV cannot stop all these. Your credit card number being
stolen, is not something that an AV excels at.

As a result of these architecture bugs, the three platforms
(ARM, Intel, AMD) have different degrees of resistance
to attacks of this sort. I don't know the current status
of each, to be recommending "only use your credit card on X".

One of the recent problems discovered, would require you
to turn off Hyperthreading at BIOS level on the 8500.
Cutting the number of virtual cores in half. For many people,
this is "going too far" in terms of covering off bugs.

Paul
 




Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

vB code is On
Smilies are On
[IMG] code is Off
HTML code is Off






All times are GMT +1. The time now is 01:47 PM.


Powered by vBulletin® Version 3.6.4
Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.
Copyright ©2004-2024 PCbanter.
The comments are property of their posters.