Jump to content
  • Latest Reviews

    All Reviews
  • Articles

    Manage articles

    Latest news

  • H Zalman μπαινει και αυτη στην αγορα των SSD με την σειρα N SandForce 128GB

    Ιt is no secret that solid state drives are very profitable and every company is looking to take a slice of the green pie. The latest addition to the growing number of companies offering SSDs is Zalman. Zalman, a company best known for their high [PRBREAK][/PRBREAK]performance CPU heat sink coolers and high quality PC cases, might seem to be late for the party, but their entry comes at a time when the winners have been established and little chance of faultier was possible.
    Zalman's highest performing SSD, the N Series, is controlled by a SandForce SF-1200 controller, the highest performance SATA 3G controller on the market and our pick for any SSD with less than 256GB capacity. The SF-1200 is a beast of a controller and it is aging very gracefully. New firmware from SandForce and their partners has given the highest rated even better performance; something we will look at today since the new N Series uses the latest firmware offering.
    There are several companies offering SandForce consumer drives and with competition comes very low prices or extravagant accessory packages. Zalman has chosen to compete with the low cost offerings on the market and eliminated the accessory package. Today we will look at the performance of the new Zalman N Series SandForce controlled SSD and see how it compares in performance and price to the competition.
    Διαβαστε το review εδω: http://www.tweaktown.com/reviews/3799/zalman_n_series_sandforce_128gb_solid_state_drive/index.html

  • Τα δεκα πιο ασχημα κουτια που βγηκαν στην αγορα.

    In many ways, computer cases are much like people. They come in a variety of sizes, shapes, and colors... Some are practical, while others are just about useless... And just like people, some cases are just plain ugly. One key difference is that when you pick [PRBREAK][/PRBREAK]a case your commitment isn't "until death do us part", so don't worry if a case you like wound up on this list; your relationship isn't forever
    Αναλυτικοτε

  • Intel Chipset to Finally Embed a USB 3.0 Controller

    Nothing in the PC platform really becomes an industry standard before Intel embraces it. Same is the case with USB 3.0, which, over an year after its entry into the industry, has seen limited market adoption and motherboard integration, driven mostly by 2-port PCI-E controllers. Internal presentation slides [PRBREAK][/PRBREAK]sourced by Heise show that the Panther Point chipset, which drives Intel's Ivy Bridge processors, embeds a 4-port XHCI compatible USB 3.0 SuperSpeed controller. The controller sits aside two EHCI USB 2.0 controllers, and shares 4 ports over a USB hub. So, out of the 14 USB ports from the chipset, 4 will be SuperSpeed capable.
    Panther Point is the codename of Intel's 7-series platform controller hub (PCH) chipset, which could carry the common market model names P77 and H77. The chipsets will drive Intel's Ivy Bridge processors. Ivy Bridge is a die-shrunk Sandy Bridge, which will be fabricated using the 22 nm lithography. It will form the back bone of Intel's 3rd generation Core processors slated for release at CES 2012.
    Source: techpowerup.com

  • Researchers turn USB cable into attack tool

    Two researchers have figured out a way to attack laptops and smartphones through an innocent-looking USB cable. Angelos Stavrou, an assistant professor of computer science at George Mason University, and student[PRBREAK][/PRBREAK] Zhaohui Wang wrote software that changes the functionality of the USB driver so that they could launch a surreptitious attack while someone is charging a smartphone or syncing data between a smartphone and a computer.
    Basically, the exploit works by adding keyboard or mouse functionality to the connection so an attacker can then start typing commands or click the mouse in order to steal files, download additional malware, or do other things to take control of the computer, Stavrou told CNET in an interview. The exploit is enabled because the USB protocol can be used to connect any device to a computing platform without authentication, he said.
    He and his partner were scheduled to demonstrate an attack at the Black Hat DC conference today.
    The exploit software they wrote identifies what operating sysetm is running on the device the USB cable is connected to. On Macintosh and Windows machines, a message pops up saying the system has detected a new human interface device, but there is no easily recognizable way to halt the process, Stavrou said. The Mac pop-up can be quickly removed by an attacker with a command sent via the smartphone so the laptop owner may not even see it, while the Windows pop-up lasts only one or two seconds in the lower left corner, making that an ineffective warning too, he said.
    Linux machines offer no warning, so users will have no idea that something out of the ordinary is happening, particularly since the regular keyboard and mouse continue to function normally during an attack, Stavrou said.
    "The operating system should present a pop-up and ask if the user really wants to connect the device" and specify what type of device is being identified to the system, he said.
    The researchers wrote the exploit for Android devices only at this point. "It can be done for iPhone, but we didn't do it yet," Stavrou said. "It can work on any computing device that uses USB," and it can work between two smartphones by connecting a USB cable between then, he said.
    "Say your computer at home is compromised and you compromise your Android phone by connecting them," he said. "Then, whenever you connect the smartphone to another laptop or computing device I can take over that computer also, and then compromise other computers off that Android. It's a viral type of compromise using the USB cable."
    The original compromise can happen by downloading the exploit from the Web or running an app that is compromised. The researchers have created exploit software to run on a computer, and an exploit to run on Android that is a modification of the Android operating system kernel. Scripts can then be written for the actual attack.
    Antivirus software wouldn't necessarily stop this because it can't tell that the activities of the exploit are not controlled or sanctioned by the user, Stavrou said. "It's hard to separate good behavior from bad behavior when it comes from the keyboard," he said.
    There's not much a person can do to protect against this at this time, according to Stavrou. The operating systems should have the capability for devices to inspect USB traffic and alert users about what exactly is happening over the connection and give them the option of refusing an action, he said.
    Source: cnet.com

  • CoolIT Systems ECO A.L.C. 240 CPU Cooler Review

    In the last year self contained water cooling kits have gotten more popular. This is mainly due to some users that want the benefit of water cooling but do not want to[PRBREAK][/PRBREAK] either custom build a cooling loop or have the money to throw at a custom loop. Enter companies like Corsair with their H series coolers and CoolIT with their A.L.C. series. Today we are looking at the ECO A.L.C. 240 from CoolIT Systems.
    What is different from the self contained kits we have looked at so far is that the ECO ALC 240 has a 240mm radiator, not a 120mm radiator. The radiator comes with two 120mm 1900 RPM 63 CFM fans, but can support up to four 120mm fans for a push/pull configuration. With more cooling capacity, a bigger radiator and more fan capacity, the ECO ALC 240 could be a very good performer for its $125 price tag.
    Now the new ECO ALC 240 is just like the ECO ALC 120 in regards to the types of fans and pump/block unit. The only difference is the larger radiator. The ECO ALC 240 is a self-contained, sealed loop CPU water cooler. With the unit being sealed there is no need for the system coolant to be filled or topped off like a custom water cooling loop would require due to water evaporating from the coolant reservoir. This maintenance free operation is also one of the attractions for some users to use self-contained units.
    CoolIT Systems ECO ALC 240 Specifications
    * CoolIT 240mm Radiator (Default Configuration)
    o Description: 240mm Class Liquid Cooling Radiator
    o Construction/materials: Louvered aluminum fins, tubes and body
    o Performance/Design: Optimized for high performance as low fan speed for low noise operations
    o Fittings style: CoolIT 6mm FEP barb system compatible fittings
    o Dimensions: 275 mm tall x 122mm wide x 27mm deep
    * CoolIT Fan
    o Description: 2x CoolIT 120mm 1900 RPM Fans
    o Fan Rated Airflow: 63 CFM
    o Rated dBA: 29 dBA
    o Construction Materials: High Performance UL94-V0 PBT Plastics
    o Performance/Design: High Flow, Low Noise Design
    o Features: Sleeve Bearing, 100.000 Hrs. MTTF, 4 Pin PWM Speed Controlled, Tach Output
    o Dimensions: 120 * 120 * 25mm
    * CoolIT Pump
    o Motor: Electronically commutated, brushless
    o DC Nominal Voltage: 12 VDC
    o Nominal current: 0.1 A (consumes ~1.5W)
    o MTBF: >50,000 Hours
    o Maximum Head: 110 cm H2O
    o Maximum Flow Rate: 1.5 L/minute
    o Maximum Operating Temp.: 70° Celsius
    o Fittings Style: CoolIT 6mm FEP barb system fittings
    o Dimensions: 60 mm x 48 mm x 30 mm
    o Weight: 57g
    * CoolIT ECO CPU Assembly
    o FHE Base Type: Microchannel FHE
    o Base Material: Copper
    o Dimensions: 55mm(w) x 91.5mm(l) x 51.4mm(h)
    o Weight: 255g (including pump)
    o Tubing Description/Features: Flexible corrugated FEP, 6 mm ID, 8 mm OD
    o Water Vapour Transmission: <=1.5 g/year @ 60 °C (7 year life)
    * Coolant Description/Features: Low toxicity Propylene Glycol/Water mix-ture with anticorrosion/antifungal pack-age
    * Thermal Interface Material CPU Thermal Grease: CoolIT Pro ATC





    Αναλυτικοτε


×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.