Intel has stated that they intend to start shipping their B3 stepping 6-Series chipset chips by February 14th (today). If you missed the headlines on this fiasco, I am speaking in reference to Intel’s chipset that is plagued by the now quite famous SATA 3Gbps bug.
Intel is still sticking to its original announcement that it will ship these products by the end of February. The new stepping has several updates including the change of revision ID from 04h to 05h, BIOS update to 1.1.4 and minor metal layer change improving lifetime wear and tear with no changes to functionality or design specifications (the one that fixes SATA 3.0Gbps issue). Read more…
Tags: 1080p, 28nm, 3D Steroscopic, 3G, 40-bit virtualization, 60606, 64-bit processor, 720p, Accelerated Parallel Processing, advanced technology, advantages of using a consultant, AMD, AMD 6800, AMD 6950 Unlockable via Bios, AMD Bio Hack, AMD HD3D, AMD releases a 1GB Version of the HD 6950, App, ARM, ATI, best Internet Phone Service, Blu Ray, Cheap, Chicago Computer Help Desk, Chicago Computer Services, Chicago Data Center, Chicago Internet Providers, chicago PC Technician, Chicago Telcom Audits, Chicago VoIP, Chip, Cinebench 10.0, cloud computing, Cloud Computing Chicago, components, computer, Computer Consultants, Computer Help Desk, Computer Install, computer programmers, computer Serurity, Computer Services, Computer Technician in Chicago, Computer Technician Outsourcing, Computers, Computing, Core i5, Core i7, Cortex-A15, cpu, data, data centers, devices, Direct X, Direct3D, Dollars, double patterning, Drivers, electronics, email services, Gaming, Gb, GPU, GPU's, graphics, Graphics cards, GTX, GTX 460, HD 5000, Help Desk Services, Intel, Intel B3 6 Series, Intel B3 Sandy Bridge to Ship today, Intel Core i5 2400, Intel Core i5 2400 3.1GHz, Intel Core i5 2400 Benchmark Results, Intel Sandy Bridge, internet, IT Audits, IT Outsourcing, linksys routers, manufacture, Microprocessor, Microprocessors, Microsoft, Mobile, money, Motherboards, MSRP, nanometers, Network routers, networks, Nvidia, Nvidia’s GTX 560 Ti, Oak Trail, Open GL, OS, PC, PC repairs, PC's, Pricing, processors, Radeon HD 2000, Radeon Hd 6000, Raseon Graphic Card, Routers, Sandy Bridge B3, Sandy Bridge Processors, Security, semiconductor, SOC, Software, Stero 3D, Stream TV, Sysmark, System on a Chip, technology, Telcom Audits, telephone auditing review, The Syber Group, transistors, TSMC, video, Virtual Computers, Virtualization, VoIP in Illinois, VoIP MPLS, voip office phone systems chicago, WiFi, Windows, Windows 7, Windows Phone 7, Windows Technician, Wireless Internet, WMV HD
Intel released some benchmarks results of its Core i5 2400, one of the new Sandy Bridge processors with 6MB of cache 3.1GHz core clock and four cores and four threads. The Core i5 2400 also comes with a Turbo feature and can run at much higher clock-speed than the 3.1GHz that is advertised. Keep in mind this depends on Turbo 2 conditions and current thermal environment.
In the benchmark observation Intel decided to compare current Core i5 650 3.2GHz core with 4MB of cache and two cores and four threads including Turbo to a new Sandy Bridge part. Read more….
Tags: 1080p, 28nm, 3G, 40-bit virtualization, 60606, 64-bit processor, 720p, advanced technology, advantages of using a consultant, ARM, best Internet Phone Service, Chicago Computer Help Desk, Chicago Computer Services, Chicago Data Center, Chicago Internet Providers, chicago PC Technician, Chicago Telcom Audits, Chicago VoIP, Chip, Cinebench 10.0, cloud computing, Cloud Computing Chicago, components, computer, Computer Consultants, Computer Help Desk, Computer Install, computer programmers, computer Serurity, Computer Services, Computer Technician in Chicago, Computer Technician Outsourcing, Computing, Cortex-A15, data, data centers, devices, double patterning, email services, GPU, graphics, Help Desk Services, Intel, Intel Core i5 2400, Intel Core i5 2400 3.1GHz, Intel Core i5 2400 Benchmark Results, Intel Sandy Bridge, internet, IT Audits, IT Outsourcing, linksys routers, manufacture, Microprocessor, Microprocessors, Microsoft, Mobile, nanometers, Network routers, networks, Oak Trail, OS, PC, PC repairs, PC's, processors, Routers, Sandy Bridge Processors, Security, semiconductor, SOC, Software, Stream TV, Sysmark, System on a Chip, technology, Telcom Audits, telephone auditing review, The Syber Group, transistors, TSMC, video, Virtual Computers, Virtualization, VoIP in Illinois, VoIP MPLS, voip office phone systems chicago, WiFi, Windows 7, Windows Technician, Wireless Internet
A particularly nasty type of attack named”ransomware” is on the rise, with antivirus vendor Symantec seeing at least three new variants appearing in recent months. Such attacks often use viruses to not only steal a person’s sensitive or financial information, but also to disable hard drives and demand money to restore them.
“Threats that use extortion can be some of the most aggressive and, in some cases, offensive viruses encountered,” said Symantec security researcher Gavin O Gorman in a blog post.
Unfortunately for computer owners, attackers continue increase the sophistication levels of their ransomware. For example, GPCoder.G, which first appeared in November 2010, is a small (only 11 kilobytes ) piece of malware which, if executed, searches a hard drive for files with specific extensions, relating to everything from videos and Microsoft Office files to images and music. It then encrypts the first half of all files found, using a symmetric RSA encryption algorithm and a random key. The random, private key is then encrypted using a public key. “Without the private key from this key pair, it is not possible to obtain the symmetric key in order to decrypt the files,” said O Gorman.
To get the private key, the ransomware victim must forward the encrypted symmetric key to attackers, who decrypt and return it. Unfortunately, aside from restoring the encrypted files from a backup, “there is no way to bypass this technique,” he said. Read More….
Tags: 60606, alogorithm, antivirus software, applications, attackers, attacks, AV, backgrounds, best Internet Phone Service, blogging, Bootlock Trojan, bypass technique, Chicago Computer Help Desk, Chicago Computer Services, Chicago Data Center, Chicago Internet Providers, chicago PC Technician, Chicago Telcom Audits, Chicago VoIP, cloud computing, Cloud Computing Chicago, Computer Consultants, Computer Help Desk, Computer Install, computer Serurity, Computer Services, Computer Technician in Chicago, Computer Technician Outsourcing, Computers, data centers, decrypt, demand money, desktop access, desktops, disable hard drives, documents, email services, file extensions, GPCoder.G, hard drives, Help Desk Services, images, infectiions, innovative technology, internet, IT Audits, IT Outsourcing, malware, master boot, Microsoft, Mobile, Music, offensive viruses, Online, PC repairs, pornographic images, premium-rate mobile phone number, private key, public key, random key, ransomware, recovery tools, restore desktop, restoring, RSA encryption, sensitive information, Stuxnet, Symantec, symmetric keys, technical help, Telcom Audits, video files, Virtual Computers, Virtualization, viruses, VoIP MPLS, Windows Technician, Wireless Internet
Security firm fighting the dreadful Conflicker worm claim that they have it on the ropes. The team of computer-security researchers said they managed to neutralize the worm’s impact by blocking its ability to communicate with its developer, who is still anonymous.
Unfortunately after years of trying fighting the Conflicker, security experts estimate the worm infects between five million to fifteen million computers. The Conficker worm, showed up in 2008. The worms intent is to disable a computer’s security measures, including Windows software updates and antivirus protection, leaving machines vulnerable to more malicious software. Read more….
Tags: 60606, antivirus, antivirus software, applications, attacker, attackers, backdoor, bandwidth, best Internet Phone Service, Chicago Computer Help Desk, Chicago Computer Services, Chicago Data Center, Chicago Internet Providers, chicago PC Technician, Chicago Telcom Audits, Chicago VoIP, cloud computing, Cloud Computing Chicago, code, component, Computer Consultants, Computer Help Desk, Computer Install, computer Serurity, Computer Services, Computer Technician in Chicago, Computer Technician Outsourcing, Computers, Conflicker Worm, Conflicker Worm still infecting computers, control center, critical data, data centers, databases, detection, developed, dll, email services, emails, encryption, espionage, Explorer, explorer.exe, extensions, files, FTP, GET, Google, Hackers, Help Desk Services, information, internet, IT Audits, IT Outsourcing, malware, monitor phone calls, netconf32.dll, Network, networks, number recognition, Operating System, operating systems, OS, overlay, PC repairs, PC's, PDF, phones, private, processes, remote server, researchers, screenshots, Security, sensitive data, server, settings, spying, stolen data, system32, Telcom Audits, threats, transmit data, Trojan horse, Trojan.Spy.Yek, upload data, users, Virtual Computers, Virtualization, VoIP MPLS, Windows, Windows 7, Windows 95, Windows Technician, Wireless Internet
Nokia will adopt Microsoft’s Windows Phone as its main smartphone strategy, the company stated today, after days of speculation on what it would do to compete with Apple’s iPhone and Google’s Android.
The companies will also partner on mobile ads- Nokia will use Microsoft adCenter in mobile devices and on mapping- where Nokia Maps will become part of Microsoft’s Bing search engine. Nokia’s application and content store will be integrated into Microsoft’s Marketplace.
Before today’s announcement, Nokia CEO Stephen Elop had stated that Nokia needed to “decide how we either build, catalyze or join an ecosystem” to change its fortunes. In the end it decided to partner with Microsoft and join the Windows Phone 7 ecosystem.
Nokia will contribute its hardware design and language support to the partnership, and help bring Windows Phone to a larger range of price points, market segments and geographies, the companies said in an open letter from Elop and Microsoft CEO Steve Ballmer. R ead More……..
Tags: adCenter, android, apple, applications, apps, audio, Audits, Bing, CCS Insight, cellphones, companies, content store, development, DSL Chicago, ecosystem, geographies, Google, hardware design, Help Desk Services, High Speed Internet, High Speed Internet Chicago, internet, iPhone, IT Audit, IT Security, IT Support Chicago, language support, management strategy, mapping, market segments, MeeGo, Microsoft, Microsoft Marketplace, mobile ads, mobile devices, MPLS, Network Security, Nokia, Nokia Maps, operating systems, OS, phones, price points, search engine, smartphone strategy, smartphones, social media, Software, Stephen Elop, Steve Ballmer, strong platform, Symbian, Symbian devices, versions, video, VoIP Chicago, VoIP Providers Chicago, Windows, Windows 7 Migration, Windows Phone 7, Wireless Internet, Wireless Internet Chicago, WP7
« Previous Page