Syber Group
Toll Free : 855-568-TSTG(8784)
Subscribe To : Envelop Twitter Facebook Feed linkedin

nVidia Goes Quad-Core With Tegra

February 16, 2011 by  
Filed under Computing

Comments Off on nVidia Goes Quad-Core With Tegra

Nvidia finally debuted its first quad-core Tegra processor, codenamed Kal-El, and the new chip will probably lead to much more powerful tablets and high-end smartphones.
 
 Nvidia’s Senior VP Phil Carmak of Mobile Business announced that the new processor will deliver a five-fold graphics performance increase over the current Tegra 2 dual-core. The chip is supposedly capable of driving 2560×1600 displays.  It is thought that the new chip could power much more serious products than current tablets.

“You’ll have full photo editing, video editing, writing of documents, browsing the Web, all sorts of stuff,” Phil Carmak announced. Read more….

Intel Core i7-960/970 Processor Discounted

February 15, 2011 by  
Filed under Computing

Comments Off on Intel Core i7-960/970 Processor Discounted

We have learned that Intel has finally launched its six-core Core i7-990X Extreme Edition Gulftown-based processor. Therfore, Intel went ahead and cut the price of its Core i7-970 and Core i7-960 models.

It is said that the six-core Core i7-990X runs at 3.46GHz and up to 3.73GHz on TurboBoost. It has six cores and twelve processing threads with Intel Hyper-Threading Technology. It packs 6×256kB of L2 cache, 12MB of L3 cache, features support for triple-channel DDR3-1066 memory, comes with an unlocked multiplier and has a 130W TDP.  Read more….

Intel’s B3 Sandy Bridge To Ship Today

February 14, 2011 by  
Filed under Computing

Comments Off on Intel’s B3 Sandy Bridge To Ship Today

Intel has stated that they intend to start shipping their B3 stepping 6-Series chipset chips by February 14th (today). If you missed the headlines on this fiasco, I am speaking in reference to Intel’s chipset that is plagued by the now quite famous SATA 3Gbps bug.

Intel is still sticking to its original announcement that it will ship these products by the end of February. The new stepping has several updates including the change of revision ID from 04h to 05h, BIOS update to 1.1.4 and minor metal layer change improving lifetime wear and tear with no changes to functionality or design specifications (the one that fixes SATA 3.0Gbps issue).  Read more…

Intel Core i5 2400 Appears To Be A Beast in Test

February 13, 2011 by  
Filed under Computing

Comments Off on Intel Core i5 2400 Appears To Be A Beast in Test

Intel released some benchmarks results of its Core i5 2400, one of the new Sandy Bridge processors with 6MB of cache 3.1GHz core clock and four cores and four threads. The Core i5 2400 also comes with a Turbo feature and can run at much higher clock-speed than the 3.1GHz that is advertised.  Keep in mind this depends on Turbo 2 conditions and current thermal environment.

In the benchmark observation Intel decided to compare current Core i5 650 3.2GHz core with 4MB of cache and two cores and four threads including Turbo to a new Sandy Bridge part. Read more….

‘Ransomware’ Malware Threats Increasing

February 13, 2011 by  
Filed under Computing

Comments Off on ‘Ransomware’ Malware Threats Increasing

A particularly nasty type of attack named”ransomware” is on the rise, with antivirus vendor Symantec seeing at least three new variants appearing in recent months. Such attacks often use viruses to not only steal a person’s sensitive or financial information, but also to disable hard drives and demand money to restore them.

“Threats that use extortion can be some of the most aggressive and, in some cases, offensive viruses encountered,” said Symantec security researcher Gavin O Gorman in a blog post.

Unfortunately for computer owners, attackers continue increase the sophistication levels of their ransomware. For example, GPCoder.G, which first appeared in November 2010, is a small (only 11 kilobytes ) piece of malware which, if executed, searches a hard drive for files with specific extensions, relating to everything from videos and Microsoft Office files to images and music. It then encrypts the first half of all files found, using a symmetric RSA encryption algorithm and a random key. The random, private key is then encrypted using a public key. “Without the private key from this key pair, it is not possible to obtain the symmetric key in order to decrypt the files,” said O Gorman.

To get the private key, the ransomware victim must forward the encrypted symmetric key to attackers, who decrypt and return it. Unfortunately, aside from restoring the encrypted files from a backup, “there is no way to bypass this technique,” he said.   Read More….

Conflicker Worm Still Wreaking Havoc

February 13, 2011 by  
Filed under Computing

Comments Off on Conflicker Worm Still Wreaking Havoc

Security firm fighting the dreadful Conflicker worm claim that they have it on the ropes. The team of computer-security researchers said they managed to neutralize the worm’s impact by blocking its ability to communicate with its developer, who is still anonymous.

Unfortunately after years of trying fighting the Conflicker, security experts estimate the worm infects between five million to fifteen million computers.  The Conficker worm, showed up in 2008. The worms intent is to disable a computer’s security measures, including Windows software updates and antivirus protection, leaving machines vulnerable to more malicious software.  Read more….

« Previous Page