Quote
"A division of Startech, Mutant Mods has launched with some well made and simple modifications for your otherwise dull premodified PC Case."
Quote
For years the only way to buy a notebook computer was to buy a bundled notebook from a major company. This means that you are likely to get all the features you do not want and none that ones that you are are in need of. The days of having limited choices in the notebook market are near extinction...
Quote
Although RAID is supported by nVidias chipset that allows a combination or Parallel and Serial-ATA drives to work together, Epox also adds a Silicon Image 3114 controller which provides four additional Serial-ATA ports. The best part about this controller is that it can create RAID 5 which the chipsets RAID controller lacks.
Quote
The VIA EPIA TC-10000 is a uniquely practical little board. Ideal for custom PC mods that are tight on space or use it as a car mp3/divx player since all cars are based on 12V electrical system. The TC-10000 looses little functionality over standard ATX powered EPIA boards, and it does away for the need of a DC-DC adapter if you wished to use those boards. >From the results we can see that power requirements are quite low, and power consumption increases linearly with CPU utilisation.
Quote
ipKonfig.com is giving away a total of 4GB of memory! Four winners will receive Corsair's famous TwinX 1024MB 4000 Pro Dual DDR Memory Modules. These are the Real-Time LED series, folks! This week we will announce two more winners!
Quote
If you though Pop-ups were annoying, just wait until your web browser is hijacked! In this guide, PCstats shows you how to regain control and kick out the hijackers, kung-fu style. Browser hijacking is one of the web's constant dangers. Whether it arrives in the form of a flood of obscene pop-up windows assaulting you after a mistyped URL, or malicious code taking over your browser completely, chances are good that every Internet user will be subjected to this practice in some form. Fortunately, avoiding a browser hijacking is not impossible if you stay aware, and take a few simple precautions. To sum it up, this PCstats Beginners Guide will show you how to avoid and defeat these annoying and potentially embarrassing attacks on your computer, starting with seven preventative measures.
Quote
The new worm, Sasser.B, like its predecessor Sasser.A, takes advantage of a vulnerability in unpatched versions of Windows XP and Windows 2000 systems. The worms infect vulnerable systems by establishing a remote connection to the targeted computer, installing a File Transfer Protocol (FTP) server and then downloading themselves to the new host.
Quote
Officials at the Federal Trade Commission, who planned to announce the arrests in Washington on Thursday, told U.S. postal investigators they had received more than 10,000 complaints about unwanted e-mails sent by the company. The U.S. attorney in Detroit, Jeffrey Collins, was expected at Thursday's announcement.
Investigators said they consulted Dr. Michael D. Jensen, a medical professor at the Mayo Medical School, who confirmed that ingredients in the weight-loss product sold in the disputed e-mails wouldn't work.
Quote
The two flaws threaten different pieces of the computing infrastructure. The PCT vulnerability puts Web servers that use Secure Sockets Layer encryption features at risk. Such servers are common in e-commerce applications, allowing intruders to target high-value computers with the vulnerability. The LSASS flaw affects almost every Windows computer that has not yet been patched, leaving the door open to a worm attack.
Quote
On Thursday, chipmaker Advanced Micro Devices announced plans to set up an engineering center in Bangalore to boost its microprocessor-design program. The new facility is likely to open in July, with about 40 employees, and the company plans to have about 120 chip designers and development engineers working there by the end of the next year, AMD said. The company plans to pump about $5 million into the facility over the next three years.
Quote
The terms of use have sparked controversy among consumer advocacy groups and some Internet users, largely because Google said its computers would scan e-mails for keywords to use in sending Gmail users targeted advertisements. It would also keep copies of e-mails even after consumers have deleted them.
Quote
Ten years after Web surfers began using the spam label to describe intrusive online marketing, junk e-mail has ballooned into an epidemic of massive proportions. But righteous anger over the problem has increasingly been replaced by resignation. With no effective solution in sight, many people now ruefully wonder whether the "Internet era" might more accurately be dubbed the "age of spam."
Quote
Microsoft has been reluctant to pin down a date for the launch of the Windows update, though Chief Software Architect Bill Gates said recently that 2006 was a likely target. Even now, there is no public target for Longhorn's release, Sullivan said, but acknowledged the company's internal goal of shipping it by the middle of 2006.