www.grc.com Open in urlscan Pro
4.79.142.202  Public Scan

URL: https://www.grc.com/inspectre.htm
Submission: On September 12 via manual from GB — Scanned from GB

Form analysis 1 forms found in the DOM

<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
  <table cellspacing="0" cellpadding="0" role="presentation" class="gsc-search-box">
    <tbody>
      <tr>
        <td class="gsc-input">
          <div class="gsc-input-box" id="gsc-iw-id1">
            <table cellspacing="0" cellpadding="0" role="presentation" id="gs_id50" class="gstl_50 gsc-input" style="width: 100%; padding: 0px;">
              <tbody>
                <tr>
                  <td id="gs_tti50" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="search" aria-label="search" id="gsc-i-id1" dir="ltr" spellcheck="false"
                      style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; background: url(&quot;https://www.google.com/cse/static/images/1x/en/branding.png&quot;) left center no-repeat rgb(255, 255, 255); outline: none;"></td>
                  <td class="gsib_b">
                    <div class="gsst_b" id="gs_st50" dir="ltr"><a class="gsst_a" href="javascript:void(0)" title="Clear search box" role="button" style="display: none;"><span class="gscb_a" id="gs_cb50" aria-hidden="true">×</span></a></div>
                  </td>
                </tr>
              </tbody>
            </table>
          </div>
        </td>
        <td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
              <title>search</title>
              <path
                d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
              </path>
            </svg></button></td>
        <td class="gsc-clear-button">
          <div class="gsc-clear-button" title="clear results">&nbsp;</div>
        </td>
      </tr>
    </tbody>
  </table>
</form>

Text Content

×

search
 

Custom Search






 * *  Purchasing
   *  Sales Support
   *  Technical Support
   *  Email Subscriptions
   *  Contact Us
   *  GRC Web Forums
   *  Privacy Policy
     
   *  Steve's Projects Page
   *  Steve's Old Resume

 * *  = Upgrade to v6.1 =
   *  What is SpinRite?
   *  What SpinRite Does
   *  User Manual
   *  User testimonials
   *  S.M.A.R.T. Monitor
   *  FAQ
   *  A Demo Video
   *  Purchase SpinRite
   *  The Future

 * *  ShieldsUP!
   *  Certificate Revocation
   *  Password Haystacks
   *  HTTPS Fingerprints
   *  Security Now!
   *  DNS Spoofability Test
   *  Perfect Passwords
   *  PPP Passwords
   *  Tech TV video clips
   *  Newsgroup Discussions

 * * SQRL
   * Security»
     *  InSpectre
     *  Securable
     *  IsBootSecure
     *  Leaktest
     *  Shoot the messenger
     *  Unplug n' Pray
     *  DCOMbobulator
     *  MouseTrap
     *  MouseTrapCmd
   * Utilities»
     *  BootAble
     *  ValiDrive
     *  InControl
     *  ReadSpeed
     *  DNS Benchmark
     *  InitDisk
     *  Never 10  (no upgrade)
     *  Wizmo
     *  ID Serve
     *  ClicKey
     *  Free & Clear
     *  IDentity (ASPI)
   * Obsolete»
     *  FIX-CIH
     *  TIP (trouble in paradise)
     *  OptOut
     *  XPdite
     *  NoShare
     *  LetShare
     *  Patchwork

 * * General»
     *  Malware Repository
     *  SQRL Login Technology
     *  EV SSL/TLS Certificates
     *  Ultra-high entropy PRNG
     *  Pure CSS web menus
     *  NAT router security
     *  PDA max battery life
   * Pending»
     *  GRC NetFilter
     *  TrustPuppy
   * Historical»
     *  Worm wars of 2001
     *  File downloader spying
     *  Sub-pixel font rendering
     *  Earthlink browser tag
     *  ZIP & JAZ click of death
   * Dormant»
     *  OpenVPN
     *  The Assimilator
     *  ASPI ME
   * Health»
     *  Health Homepage
     *  The Low Carb Choice
     *  Vitamin D
     *  Healthy Sleep Formula
     *  Zeo Sleep Manager Pro

 * * SQRL
   *  PDP-8 Computers
   *  TrueCrypt Repository
   *  Big Number Calculator
   *  The Quiet Canine

NOW SpinRite 6.1 – Fast and useful for spinning and solid state mass storage!



Easily examine and understand any Windows
system's hardware and software capability to
prevent Meltdown and Spectre attacks.
Now determines and displays whether Intel has produced
a microcode update patch for the Spectre vulnerability.
(See the Release #8 comments below.)


(This 126k app is compatible with ALL versions of Windows and WINE.)

File stats for: InSpectre  



Last Updated:
Size: 135k Feb 27, 2024 at 21:41
(197.23 days ago) Downloads/day: 406
Total downloads: 3,010,846 Current Rank: 3
Historical Rank: 7

“InSpectre” is an easy to use & understand utility designed to clarify
the many overlapping and confusing aspects of any Windows
system's ability to prevent the Meltdown and Spectre attacks.

As the application's textual display says...

In early 2018 the PC industry was rocked by the revelation that common processor
design features, widely used to increase the performance of modern PCs, could be
abused to create critical security vulnerabilities. The industry quickly
responded, and is responding, to these Meltdown and Spectre threats by updating
operating systems, motherboard BIOSes and CPU firmware.

Protection from these two significant vulnerabilities requires updates to every
system's hardware–its BIOS which reloads updated processor firmware–and its
operating system–to use the new processor features. To further complicate
matters, newer processors contain features to minimize the performance impact of
these important security improvements. But older processors, lacking these newer
features, will be significantly burdened and system performance will suffer
under some workloads.

This InSpectre utility was designed to clarify every system's current situation
so that appropriate measures can be taken to update the system's hardware and
software for maximum security and performance.

Frequently Asked Question
Q:
On some of the computers, one or the other or both of the Enable/Disable
Protection buttons are grayed out and disabled so that they cannot be used.
What's going on?
A:
Either of the Protection Enable/Disable buttons will be disabled when the
button's respective vulnerability cannot be enabled or disabled by its user. For
example, Since AMD processors have never been subject to the Meltdown
vulnerability, the Meltdown button will be disabled because there's no way for
its protection to be disabled. This would also be true (in the other direction)
when a system has an Intel processor and any version of Windows that has not
been updated for the Meltdown vulnerability. In that case the system is
vulnerable and there's no way for the button to make it invulnerable.

Similarly, any computer whose firmware has not been updated will be vulnerable
to Spectre attacks and, again, the button cannot make it invulnerable.

So, InSpectre will enable those buttons when the system's conditions allow the
operating system to protect against the respective vulnerability, but the user
may wish to disable that protection, where possible.
Release History
 * Release #1 — Initial release:
   The first release was triggering false-positive warnings from 3rd-party
   anti-virus scanners. This was probably due to a registry key the application
   uses to enable/disable the Meltdown and Spectre protections. Also, the
   language used in one of the text-explainers was confusing and
   self-contradictory.
 * Release #2 — Second try:
   This second release hides its use of the registry key that was upsetting so
   many anti-virus scanners. A pass through Virus Total shows that made a huge
   difference. And that confusing paragraph was rewritten into two, which are
   now presented more correctly. Let's see how this second try fares.
 * Release #3 — Raw Technical Data Display:
   InSpectre's more technically inclined users have asked for more information
   about how InSpectre makes its decisions. Non-Windows users have also asked
   for that information so that InSpectre could be run on Linux and MacOS
   machines (under WINE) to check the non-Windows machine's CPU support. As
   shown to the right, InSpectre release #3 adds a “Show Technical Details” item
   in the system control menu at the upper-left corner of the app. Click on the
   little “Spectre” icon and select the “Show Tech Details” item to display the
   raw data obtained by InSpectre's analysis of its operating environment.
 * Release #4 — Silent System Probe Option:
   When InSpectre is launched with the string “probe” in its command line, its
   Windows user interface will be suppressed and InSpectre will act like a
   command-line utility. It will assess its hosting system's status, then
   immediately terminate itself returning a decimal exitcode which encodes the
   eight “trouble bits” shown below, which itemizes any trouble. Therefore, for
   example, an exitcode of zero (0) is returned only by a fully secure system.
   
   
   
   Decimal
   ValueTrouble Itemization 1OS is not aware of the Meltdown vulnerability 2OS
   is not aware of the Spectre vulnerability 4The system is vulnerable to
   Meltdown 8The system is vulnerable to Spectre 16CPU does not support Spectre
   (microcode not updated) 32CPU does not support low-overhead Meltdown
   protection 64Meltdown protection disabled by registry setting 128Spectre
   protection disabled by registry setting
   
   Since InSpectre's exitcode is the sum of the values shown above which are
   true for any specific system, the table above can be used to decompose
   InSpectre's probe-mode exitcode to determine the system's trouble.
   
   This zip archive: “InSpectre-Probe-Samples.zip” contains sample batch file
   and powershell script files for capturing InSpectre's exitcode. Note that an
   exitcode is not a “printed” output from the program—it won't be printed onto
   a command console. It is a value that can be obtained by another script or
   program which executes the program after it terminates.
 * Release #5 — Copy results to system clipboard:
   Earlier releases of InSpectre did not encourage copying the program's
   displays out of the application. Any region of the results can now be marked
   with the mouse and copied to the system's shared clipboard by using the
   standard Ctrl-C key combination. The application's system menu (under the
   small Spectre icon at the upper-left corner of the application window) also
   now contains a “Copy to Clipboard” option which will either copy a marked
   region or the entire textual content if no region is marked for copying.
 * Release #6 — Worked around a Microsoft bug and more . . .
   Users of an earlier version of Windows 10 (version 1703 ‑ the non-Fall
   Creator's Update) reported that InSpectre did not believe that their system
   had been patched for the Spectre vulnerability. Upon analysis, a bug was
   discovered in that version of Windows which affected the way 32-bit
   applications, such as InSpectre, viewed the system. This was apparently fixed
   in the later “Fall Creator's Update” (version 1709) but not in the earlier
   version. A 64-bit “probe” was added to the 6th release of InSpectre to work
   around this bug in version 1703 so that InSpectre would accurately reflect
   any system's true protection.
   
   And, while we were at it, the language presented in the summary was changed
   from “vulnerable” to “protected” so that “YES” was the good answer and “NO!”
   was the bad answer. :)
 * Release #7 — Added the display of the system's CPUID . . .
   Microsoft will be making Intel (and perhaps AMD?) processor microcode patches
   available for the most persistent Spectre Variant 2 vulnerability. These will
   become available over time as they become available from Intel and they will
   apparently need to be manually installed by interested Windows users. It is
   not yet clear whether Microsoft will be willing or interested in making these
   patches available for earlier versions of its Windows operating systems, but
   we can hope.
   
   The patches are applicable to specific CPU models only, which are identified
   by each chip's “CPUID.” For this reason, InSpectre now prominently displays
   the system's processor CPUID at the top of its system summary.
   
   Please check this page on Microsoft's website to see whether a microcode
   patch for your CPU, determined by its CPUID, is available at any time:
   
   KB4090007: Intel microcode updates
   
   You can also use your favorite Internet search engine to search for the
   string “KB4090007” which should always take to that page and to its related
   Microsoft Update Catalog page to obtain the specific Windows update.
 * Release #8 — Now shows whether an Intel microcode patch is (ever) available
   for Spectre.
   Intel has finished designing microcode update patches for its processors. On
   April 2nd, 2018, they announced that processors that have not yet been
   patched will never be patched. Their full statement is available in this PDF
   document. In that document, Intel specifies which of their many processors do
   have patches and which of their more recent processors will never receive
   updated firmware. Now that the industry has this information, this 8th
   release of InSpectre incorporates that list of CPUIDs and displays whether
   microcode firmware updates exist for the system's Intel CPU.

InSpectre in the News
 * “Gibson releases InSpectre vulnerability and performance checker”
   Martin Brinkmann, writing for GHacks.net, was the first out of the gate with
   an announcement of InSpectre.
 * “InSpectre: See whether your PC's protected from Meltdown and Spectre”
   Woody Leonard wrote a very nice piece on InSpectre for his column in
   ComputerWorld.
 * “Is your PC vulnerable to Meltdown and Spectre CPU exploits? InSpectre tells
   you”
   PC World's terrific coverage by Senior Editor, Brad Chacos.
 * “InSpectre will quickly check if your PC is vulnerable to Meltdown and
   Spectre”
   Nice coverage of InSpectre by Windows Central.
 * “Tip: Make Sure Your PC is Safe from Meltdown and Spectre”
   Paul Thurrott weighs in with a nice summary write up of InSpectre.
 * “Meltdown and Spectre: Is your PC vulnerable?”
   Adrian Kingsley-Hughes writing for ZDNet: A new app gives you a simple
   overview of your system's vulnerability status, as well as what kind of
   performance hit the patches might be having.
 * “Use InSpectre to see if you're protected from Meltdown and Spectre”
   A great short write up about InSpectre by The Tech Report.
 * “Download InSpectre to check for CPU performance issues”
   Another nice notice of InSpectre.
 * “InSpectre Meltdown and Spectre Check tool released by GRC”
   Nice summary coverage by Mark Tyson of HEXUS.
 * “InSpectre Makes It Easy To See If Your PC Is Vulnerable To Spectre And
   Meltdown”
   Another nice summary of InSpectre by Shane McGlaun of HotHardware.
 * “InSpectre is a Free Lightweight Meltdown and Spectre Vulnerability and
   Performance Checker”
   Jon Sutton for Game Debate wrote a very nice summary of InSpectre's operation
   and pointed people to GRC for the download.
 * “InSpectre checks for Meltdown and Spectre breaches”
   Another nice notice of InSpectre.

3rd-Party download sites.  WARNING!!  We CANNOT vouch for these!!
 * Major Geeks: “InSpectre Release 2”  
 * Softpedia: “Find out whether your system is currently vulnerable to Spectre
   and Meltdown attacks in just one click using this straightforward app.”
 * Guru3D: “Download: inSpectre Meltdown and Spectre Check tool for Windows”
 * FindMySoft: “InSpectre - Protect yourself against Meltdown and Spectre”
   A very nice review by Frederick Barton of FindmySoft... but 3rd-party
   download sites are worrisome due to the potential for abuse.
 * TechSpot: “Easily examine and understand any Windows system's hardware and
   software capability to prevent Meltdown and Spectre attacks.”



Gibson Research Corporation is owned and operated by Steve Gibson.  The contents
of this page are Copyright (c) 2024 Gibson Research Corporation. SpinRite,
ShieldsUP,
NanoProbe, and any other indicated trademarks are registered trademarks of
Gibson
Research Corporation, Laguna Hills, CA, USA. GRC's web and customer privacy
policy.



Last Edit: May 03, 2018 at 18:27 (2,323.37 days ago)Viewed 611 times per day