Get Started Today!  217-475-0226

Decatur Computers Inc. Blog

Decatur Computers Inc. has been serving the Decatur area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Surveying the Damage of Meltdown and Spectre

Surveying the Damage of Meltdown and Spectre

At the time of this writing, it has only been about a half a year since the Meltdown and Spectre exploits became public knowledge. Fortunately, patches were swiftly rolled out to mitigate the problems that these exploits could cause, but that doesn’t mean that these exploits are dead and buried. Let’s look back at Meltdown and Spectre to help us establish where we stand today.

What Do They Do?
Both Meltdown and Spectre affect the processor of the targeted system. The accurately-named Meltdown virtually melts away the barriers that a processor has between application processes and the system memory, which is not a good thing. Spectre works differently, in that it can ‘fool’ the processor into accessing parts of a system’s memory that it shouldn’t. Either of these results could quite easily allow a greater threat to access a user’s system.

The worst thing about Spectre and Meltdown is that they are so widespread, with the capability to influence almost every computer chip manufactured in the past 20 years. This could potentially put any data at risk, regardless of how well it was otherwise protected.

How They Were “Fixed”
Unfortunately, there is no singular, magic bullet fix for Meltdown and Spectre. However, patches were quickly released and have continued to roll out, as these exploits are repeatedly updated. When first discovered and mitigated, developers warned that patching against Meltdown and Spectre may cause a dip in performance as high as thirty percent.

While these patches do influence performance, the influence they have is currently much less significant than initially advertised. While the actual numbers vary based on a few circumstances that can be found below, the average use case showed much smaller affects, topping out at around five percent. This may change as later patches are released. However, it is also important to remember that in these kinds of situations, the initial patches usually have the greatest effects.

What Influences Performance
As mentioned above, there are other circumstances that will make the patches for Meltdown and Spectre more of a burden on your system, thereby causing a slight dip in your performance.

Depending on your intended usage of your system, Meltdown and Spectre could have greater or lesser effect. A good rule of thumb to keep in mind is that applications and uses that lean more heavily on processing power will be more affected than others. So, if you rely heavily on virtualization, or have made investments into cryptocurrency mining, you may be disappointed to find your performance suffer.

Patch Used
A variety of companies have put out patches, which means that different patches are going to have different effects on the systems that they are applied to.

Device Configuration
Both your system’s hardware and software are going to influence how you may find your technology to be impacted by these patches. For instance, a newer processor will most likely be more resilient against the adverse effects of the patches, and a more up-to-date operating system, like Windows 10, will be impacted less than 7 or 8.

Our Best Advice
In order to fend off Meltdown and Spectre, we recommend that you follow a few basic best practices, including regularly installing updates to your software and being generally more security-minded as you utilize your technology. Additionally, it is probably also in your best interest, if you were considering a hardware refresh/update, to wait a while. There are currently efforts being made to develop processors that are resistant to these threats, but there is still no indication of when this hardware will be made available.

In the meantime, keep checking back to our blog for IT best practices, tips, and more.

Your Backup Needs to Meet Some Prerequisites
Tip of the Week: What You’ll Need to Leverage BYOD


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, July 19 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Privacy Technology Network Security Tech Term Business Computing Hackers Android IT Support Google Software Cybersecurity Malware Internet Data Smartphone Business Management User Tips Data Recovery Ransomware Data Backup Backup Innovation Email Small Business Managed IT Services Windows 10 Artificial Intelligence Efficiency Cloud Productivity Phishing Communications Cost Management Business Technology Mobile Device Management Hardware BDR Cybercrime Computer IT Management Business Data Security Encryption Blockchain Hard Drive Antivirus Update Managed IT Services Saving Money App Collaboration Patch Management IT Services Network Gadgets Access Control Outsourced IT Applications VPN Microsoft Passwords Start Menu Server Law Enforcement Operating System Internet of Things Bitcoin Facebook Browser Maintenance Social Engineering Remote Monitoring Microsoft Office Gmail Data Management Spam Word Vulnerabilities Disaster Recovery Digital Document Management Bandwidth Data Protection Alert Scam Holiday Laptop Websites Automation Apps Smartphones Data loss Tech Terms Hacking Business Continuity Project Management Mobile Device SaaS Office 365 Money Data Breach Social Media Search Touchscreen Windows Save Money Regulations email scam VoIP Television Upgrades Settings Wireless Headphones VoIp Software License Mobile Security Upload Vulnerability Cryptocurrency Printer Accountants Audit Mobile Devices Mouse Administration Cleaning Mobility Two-factor Authentication Trends DDoS Running Cable Paperless Office Corporate Profile Training eWaste Solid State Drive Time Management WiFi Managed IT Telephone Systems Computers Information Technology Multi-factor Authentication Gamification Cabling Password IT Support Database Equifax Computer Care Robot Wireless Consultant Nanotechnology Google Calendar Mobile Technology Device security Excel Tactics Startup Uninterrupted Power Supply Unified Threat Management Outlook SharePoint Augmented Reality Website Content Disaster Tip of the week Worker Vendor Mangement Addiction Computing Infrastructure Distributed Denial of Service Access Screen Reader Google Docs Virtual Reality BYOD Cloud Computing Business Mangement Samsung Machine Learning Legislation Unified Communications Networking History Unified Threat Management Redundancy Freedom of Information Spyware Communication Budget Company Culture HTML Information Knowledge Cortana Tablet Virtualization Printing Business Cards IBM Software as a Service News Hosted Solutions Analytics Automobile Conferencing Identity Theft Network Management Travel Virtual Assistant Best Practice How to Apple Government Fake News Employer-Employee Relationship Chromebook Comparison Desktop Service Level Agreement Devices Username Google Drive Unsupported Software Emails Legal Downtime Virus Going Green Managed Service Provider Big Data Backup and Disaster Recovery Compliance Google Maps Hard Drive Disposal Telephony YouTube Bluetooth Downloads Piracy Specifications Download Emergency Microsoft Excel Windows 10 Marketing CrashOverride Managing Stress Multi-Factor Security Office Users Office Tips Twitter

Latest Blog

Every online account will inevitably ask you to create two different credentials: a username and a password, both of which need to be kept as secure as possible. But what exactly is a username used for, and why is it such an important part of computing? For this week’s tip, ...

Latest News

Decatur Computers Inc. is proud to announce the launch of our new website at The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.