PC Supporter: We are writing reviews & overviews about latest Technology, Gadgets, Social-networks, HP Printers, Operating Sys, PC Games & Wallpapers

Showing posts with label Laptops. Show all posts
Showing posts with label Laptops. Show all posts

Sunday, 2 April 2023

AMD 8-CORE Processor for Laptops | PC Supporter



PC Advisor | December


AMD 8-Core CPUs to Boost Laptop Speed | an Overview



Bulldozer processors to rival Intel�s powerful Core i7-990X Extreme Edition.





AMD is promising faster performance for laptop and desktop PCs with eight-core processors that feature its Bulldozer architecture.


The FX-8150 and FX-8120 are the first Bulldozer processors to hit the market, and offer a speed boost of more than 50 percent compared to previous AMD chips.


Both belong to the re-launched FX chip family, which is aimed at gaming and high-end systems.


The FX-8150 has a base speed of 3.6GHz, which rockets to 4.2GHz in turbo mode. The FX-8120, meanwhile, runs at 3.1GHz as standard and 4GHz under load. Built using the 32-nanometer manufacturing process, AMD said the chips are unlocked and customizable.




�AMD has historically been about total performance and not thought to be competitive in terms of power efficiency.� said Rob Enderle, as analyst with the Enderie Group. �Bulldozer is a redesign from the ground up. It aims to put AMD back in the race for power efficiency, specifically with laptop computers.�




AMDs chips will rival Intel�s high-end Core i7-990X Extreme Edition processor, which is based on the firm�s Westmere architecture. However, Intel will soon launch an even faster Extreme Edition chip that�s based on its Sandy Bridge architecture.


Dan Olds, an analyst with The Gabriel Consulting Group, said the power boost and extra cores have a lot to offer  high-end computer users. With a retail price of 199 pounds, these eight-core chips can also offer consumers more cores per pound than anything on the market today.


But while AMD�s new processors stand to put the company back in the game, Olds said they aren�t �Sandy Bridge killers�, AMD still has a lot of catching up to do, he noted.




Tuesday, 5 May 2015

15-inch Acer Chromebook Review

Acer Launches 15-inch Chromebook At CES 2015, Intel Broadwell Chip Onboard http://flip.it/SJwHN

Acer is getting the Chromebook ball rolling at CES 2015 with the first 15-inch model.

The Acer Chromebook boasts a 15.6-inch display, an industry first. Historically, Chromebooks have been small laptops, typically having screens ranging between 11- and 12-inches.  This year, however, Hewlett-Packard began marketing the first 14-inch Chromebooks, taking the Google Chrome operating system-based portables into traditional laptop territory.

It’s also joins a new crop of laptops featuring Intel's 5th Generation Core “Broadwell” processor, which is targeted at ultrathin laptops, hybrid laptop-tablets, and tablets.

Another trend in Chromebooks is higher-resolution displays. In keeping with this, the Acer Chromebook 15 will have an option for a 1,920×1,080 pixel display.

It weighs in at 4.85 pounds and is 0.95-inches thick

Thursday, 6 December 2012

How to Set Up a Homegroup in Windows 7



Sharing Files, Media and Folders on any Network now a days isn't a big deal for many of Windows 7 users, but some users still find it hard to connect to Home Network to Share files with other Computers.



Definitely you can get you Answer on Google or else where very easily within a few minutes to how to get create and connect to Home Network, but while you searching and you are not a regular or pro user you will   find some articles which are written for Pro users, and you will find this hard to follow and get connected.


Here we are going to share Mr. Mike Halsey (www.thelongclimb.com) article, who is describing the connectivity to HomeGroup Network really simply, and hope after reading this you will be able to connect your Computer to other computers situated at your Home or Office.


Before going to the process lets read a quick tip.






Manage advanced network sharing Settings
Start and type Manage advanced sharing Settings press Enter

If you want to share documents, photos, videos and music within your home use the Network Sharing Center to check your security settings are set right. The security options are clear and easy to understand with plain English throughout. To checkout your Network Sharing options click Start and type Manage advanced sharing Settings then press Enter, and make sure your settings are same like the image below.




You can share your internet connection, Printer(s) and files. The settings here allow you to set what's shared and who can see it.




You can also share folders by Right Clicking on one or more in Windows Explorer and selecting Share with in the context menu that appears.


You can choose from users on your PC and network who the folder is shared with,   or you can share a folder with your Homegroup.






Setting up a Homegroup.







Homegroups are new to Windows 7 and they're an excellent way to share Music, Pictures, Media files and also Printers with other PCs running Windows 7 on your home network. To create a Homegroup open Network and Internet from the Control Panel and then click on Create a Homegroup.




Alternately you can type Homegroup in Search box in Start Menu. The picture showing what kind of files and stuff you want to share with other computers, after choosing one or all, click Next.




Your Homegroup is now automatically created and  you will be given a password to type in computers you want to connect with this Homegroup network.


After creating a Homegroup network, remember this is your Host PC, and you can change any setting anytime by typing Homegroup in Search bar inside Start Menu.


How to Connect to Homegroup





Now its time to connect other computers to this Homegroup network, same way, open Homegroup by the way described above, The system will show all available Homegroups (remember the host PC must be switched ON). You will be asked for the password and then what files and documents you want to share from the new PC.


In Windows 7 Homegroup an additional and useful feature is the ability to stream media to other PCs and devices. This means music and video content can start playing on the other devices without being copied across to that device. It plays on the PC it's sat on and can be seen and heard on the other.


If you are using Wi-Fi - This is how you can make better your Streaming Video or Music:


If you use a Wi-Fi network in your home and want to stream and share video consider upgrading your Wi-Fi routher from the 802.11b or 802.11g to 802.11n standard. These codes are clearly labelled on products either at online stores on in the shops. Wireless N offers much greater bandwidth than previous standards. This means that video can be sent to other PCs on your network without any worries about it stuttering during playback.


Tuesday, 30 October 2012

5 Top Features Your Ultrabook Must Have



5 Top Features Your Ultrabook Must Have if you prefer to buy one rather than MacBook Air.



According to your use and profession If you consider that Ultrabook suits you more than MacBook Air or you are interested to buy an Ultrabook rather than MacBook Air, so there are some actual features your Ultrabook must have.


According to style, features and something that called Trend, Apple's MacBook Air is a top Notebook but on other side Intel's super fast chipped Ultrabooks is more liked because of its compatibility and user friendly environment operating system (Windows).


So you have decided you want to buy an Ultrabook rather than a MacBook Air? Here are 5 top features to consider before making your purchase.


Quality Construction





Quality Construction - Ultrabook


Many of the unique or unusual characteristics about Ultrabooks come about because they're so thin, a height of three quarters of an inch, and even less in some cases. One of the most important of these is the systems' tendency to feel flimsy. Because most laptops don't sit at home on your desk all the time, you want the sturdiest on you can find, whether it's open or closed.



Keyboard





Keyboard - Ultrabook


Key travel on Ultrabooks is frequently shallow, after all, there's not a lot of room to house big, strong keys! This won't be a problem for everyone, but if you're a hard core typist or if you are going to need your laptop for work, you'll want to pay special attention to the keyboard. If you can, try typing on an Ultrabook you're interested in before you take it home to get an idea of how it feels beneath your fingers. You don't want to buy a notebook you won't enjoy typing on.






Port Selection





Port Selection - Ultrabook


The reduced height of ultrabooks causes problems with ports as well. Many systems simply don't have room for Ethernet ports, some have far fewer USB ports than you may be used to (may be only one or two), and still others may come with dongles that give you the ports but add inconvenience to the package. Knowing what you need, so you know what you'll need to put up with, is an especially good way to go here.


Touch Screen





Touch-Screen - Ultrabook


Although not a part of the standard ultrabook specs, and previously impossible to find on many systems, touch screens should now be considered a necessity. The new tile based Windows 8 interface was designed for touch, and the operating system just doesn't deliver the same experience without it. A laptop with a traditional touchpad will work, but it won't be anywhere near as intuitive. To get the most out of your Windows 8 Ultrabook, make sure it comes with a touch screen.


Wireless Display





Intel's Wireless Display technology (usually shortened to WiDi) lets you stream HD content over the air to your HDTV, rather than forcing you to connect your set to your laptop with an HDMI cable. You'll need a separate adapter, like Netgear's $100 Push2TV (pictured here), to make it work, but if you're really into entertainment you'll easily find WiDi capability worth the extra investment.








Saturday, 11 August 2012

Will Windows 8 be More Secure?




Martin Cooper takes a step back from all the Windows 8 fanfare and examines whether the cyber criminals will love or loathe Microsoft's new OS.






Window 8, Win8 phone and Surface tablets - it seems it's all happening over at Redmond. As Microsoft's readies its new operating system roll out, we've every right to get excited, but with all eyes distracted by the new system's sheen, it's easy to overlook the mundane but essential business of security.


Over last 12 to 18 months, security - of the lack thereof has cast a growing shadow over Windows and the antivirus firms we trust to keep us safe online. Indeed, some have suggested that the bad guys might be winning in the never-ending game of high stakes chess. So the question is, will Windows 8 let us sleep sounder in our beds?



Security as Standard




To help protect Windows machines Microsoft has for a long time offered its Security Essentials antivirus program as a free download. Despite this, it's reckoned that almost a quarter of all Windows 7 PCs have no anti-malware software installed.


To address this problem, Microsoft has opted to install Windows 8 Defender by default.


 Windows 8 Defender is a combined system. it's comparable with Security Essentials, with basic protective features thrown into combat common threats.



We certainly applaud the move, as it makes the initial hurdle that much tougher for virus writers. However, when PC Format asked Collin Davis, senior director of engineering at Symantec, about Defender, his response was unequivocal. "It's not enough".




Davis says circumventing Defender will become the virus writer's first mission. "It's just not worth their effort releasing malware that can't beat it," he warned. Speaking from California. Davis explained how the bad guys had breached Windows 7's security features and Security Essentials.


As Windows 7 and 8 have so much in common under the hood, Windows 8's default security isn't - in his view - likely to overly challenge malware writers.



Boot Level Protection




Dig a little deep into Windows 8 and the story doesn't seem so bleak. During the PC boot phase, Microsoft has made strides to see off future malware.


Booting through the BIOS has remained largely unchanged for nearly 30 years. At its heart is a chain of module that tare executed in order. The process begins with the BIOS waking up, taking in ROM-based operations and calling on the master boot record.


The chain culminates in the Windows kernal and drivers being loaded and run. If malware can penetrate this initial process, the next program to run can be corrupted. In short, no process after the point of exploitation can be trusted.


 Malware such as Mebroot, TidServ and StuxNet insert themselves into this critical chain of events, compromising Windows at a very low and fundamental level. From such a privileged position it makes itself hard to detect and difficult to remove.


To combat this problem, Windows 8 includes a trio of technologies which are known collectively as Secure Boot Architecture. The first component is the Unified Extensible Firmware Interface, or UEFI. Assuming that your hardware is current and supports it, UEFI should make the lives of the virus writers' considerably harder.


Liek the BIOS, a UEFI system executes a sequence of baton-passing modules that lead to the OS . In a UEFI system, however, modules are security-signed and each module must check the subsequent operation's signature before it allows the next process to execute. The UEFI chain can be updated with a white list of trusted certificates.



Features and Flaws




The UEFI system isn't without a couple of flaws. Though all contemporary Windows systems will come with it as standard, older PCs still use the BIOS loading process and therefore remain vulnerable. The UEFI certification system has also enraged Linux users, as it makes it difficult to install the open source OS.


The next technology of note in Windows 8 is Early Load Anti-Malware. According to Microsoft, "|ELAM| starts before other boot-start drivers, enables the evaluation of those drivers and helps the Windows kernal decide whether they should be initialized." It is, in essence, a way of detecting malware during the boot process and blocking it.



Most Malware that Runs on Windows 7 will work on Windows 8




Windows 8 is designed to boot very quickly through, which places limits on what ELAM can achieve.


The Windows 8 specification also limits the amount of memory it can consume. Because it runs so early in the boot sequence and under such limitations, Symantec has already stated that "ELAM does little to improve security".


Remote Attestation is an optional feature. Implementing it inevitably slows down the boot process, which may not prove very popular with PC builders. If you upgrade or tinker with your PC, the timing check system will also need to be recalibrate. Remote Attestation, therefore, looks like a feature that we think will be best suited to corporate environments where systems remain unchanged by design.



The Metro Question




Windows 8 is all about the Metro interface - a collection of tiles linked to programs. Simply sweep though the wall of information and images, then tap the program you want to run. If you don't have a table or other touch enabled devices, you can use the interface with a mouse and keyboard instead.


There are two versions of Windows 8 - one designed to run on x86 chips and another complied for low-power ARM processors. The PC firms we spoke to had little to say about the latter version, and it's unlikely that malware authors have been able to research it much either. If Windows RT (as the ARM version is called) becomes a success, it will probably become the focus of malware writers, but at the moment it's impossible to say.


Looking at the x86 incarnation, Collin Davis explained that Windows 7 and Windows 8 classic are very close cousins. Therefore, most malware that runs on Windows 7 will work on Windows 8. Metro is however a different beast to a degree.



The Janus OS




From a security perspective it's easy to think of Windows 8 as two operating systems; Metro and Classic. Neither will run programs designed for the other. Metro is the more restrictive of the two, as you'll only be able to get programs from Microsoft's App Store, but the separation between Metro and classic Windows isn't clear cut.


Each Metro app works in a sealed environment or sandbox, which means it can't interact with other programs. In other words, Metro works in much the same way as Apple's sandboxed iOS - an OS that has so far avoided any major security silver bullet though. it is, in the words of Davis, "One of many tools that works well if it's done well."


Asked if Microsoft has implemented its sandboxing well, Davis replied, "It's too soon to tell."


There is one major chink in Metro's sandbox Armour. Metro is much like Windows Media Center-an environment that effectively sits on top of Windows Classic. Davis says this means that "a Metro app can't attack a Classic app, but a Classic app can attach a Metro one."


He adds that developing malware for Metro would be no harder or more expensive for virus writers.


It seems then Windows 8 makes the business of securing your PC subtly different, yet largely the same. The same rules, requirements and risks apply, so users should install a well-rated security suite and keep it updated.


Source: PC Magazine [UK]






Friday, 10 August 2012

The LaptopLock - Free Tracking and Data Protection Solutions


The LaptopLock is a tracking software,  A free package offering a solid basis for your own security solution.



LaptopLock is a free offering that eschews a fancy interface for a simple, no-frills look. Signing up for the service is quick, you simply need to enter your email address and a password, and you're taken straight to the online control panel. From here you can add a computer, giving it a name for easy reference. From this page you can download software. 







During installation you can choose whether or not show a splash screen when the laptop starts up - it's nice that you're given the choice.


There are no tracking features with this program, so ideally it should be installed alongside a free service that does, such as Prey. What LaptopLock concentrates on is protecting your data if your laptop is lost or stolen; and is broken into three parts. The first security - here you can select the data you want LaptopLock to delete if you flag up your laptop as stolen via the web interface.


Choosing the files and folders is very easy, and you can select to securely delete the data, so that data recovery tools can't access it. If you're not too keen on the scorched earth policy, you can choose to encrypt the files instead.


The second part is notifications. You can select to show a message or play a sound when the missing laptop is in use. The final part is that you can select a program to launch when the laptop is reported stolen - a good chance to run a tracking program, or activate your webcam and upload the photos it takes. The laptop can also be marked as stolen, notifying a recovery team that will begin collecting evidence to hand over to the police. LaptopLock might appear simple, but with it you can make your own laptop security solution.


PC Format Magazine UK

Kingston HyperX 3K 120GB SSD


Best Price, Top-End Performance | Best Solid State Drive



Where once the SSD was the preserve of enthusiasts with deep pockets, these days there are so many drives to choose from that the struggle to get them out to the market at a competitive price has become especially cut throat.





Kingston HyperX 3K 120GB SSD


 



As price continue their slow downward fall, the 120/128GB capacity has become the sweet spot, so much so that at these capacities the magic �1 per gigabyte barrier has at last been broken for SSDs. And that's been a long time coming.


To try and leverage a better price point of the HyperX 3K series, Kingston has used 3K NAND memory (hence the 3K tag) instead of the 5K NAND of the original HyperX drives.


The 3K label means the NAND should last up to 3,000 full writes of the new drive's maximum capacity versus the 5,000 full writes of the original HyperX. Because of this the NAND is less expensive helping to drive the price down while retaining the pace you expect of a drive carrying the HyperX branding.


Kingston quote sequential read/write figures of 555MB/s and 510MB/s respectively for the drive, confirmed by a quick bas through the ATTO benchmark. Our drive produced figures of 551MB/s and 512MB/s for read/write speeds respectively.


As with all SandForce controlled drives its handling of incompressible data isn't anywhere near as impressive as it is with compressible files; something that is quite nicely illustrated in the AS SSD benchmark. When tested in the default incompressible mode the drive gives up a sequential write score of 171MB/s. Switching to testing compressible data with CrystalMark this jumps to an impressive 466MB/s.


Hyped Drive



For incompressible performance, then, it drops behind the likes of the Marvel-based Corsair Performance Pro, but eh HyperX 3K still manages to hold its own against the other SandForce drives.


When it comes to the drive's internals, Kingston has turned to Intel for the NAND chips. With eight chips housed on either side of the PCB, and with the SancForce 2281VB1 controlled joining group on the board.


Although the new drive uses NAND with reduced program/erase cycles than the original HyperX drives, in practice most people will come nowhere near the drive's write limits. What it does do, however, is put a drive with enthusiast performance at a price point in reach of a lot more people.


Our review drive was standalone product that comes with just a 3.5in bracket and mounting screws. If you're looking for more extras, then the drive is available in a full upgrade bundle, which adds a 2.5in USB external enclosure, cloning software, a fancy screwdriver and SATA data cable to the mix for �130.


At the standard price tag there is simply nothing not to like. It's great performing drive for a fantastic price. The SandForce controller may not be the fastest any more, but will still make a difference to your PC.


By: Simon Crisp


at PC Format Magazine UK

Wednesday, 7 March 2012

Why to Choose Ultrabook | Guide for New Comers



They are the lightest and thinnest laptops yet and the biggest & very popular computing category of the years. Here is what you need to know when joining the Ultrabook generation. [By Eric Grevstad]



ultrabook-2012 Tablets and Netbooks are Toys? Nope. The Holy Grail of Portable productivity is a no compromise laptop with a full-sized, comfortable keyboard; easy on the eyes display; all the performance and ports of a desktop replacement; the convenience of near instant on startup; and all day battery life all in a package so think and light you will forget it�s in your briefcase.


It�s not a new vision, but it has a big new backer or cheerleader in Intel, which at the Computex trade show in May 2011 sketched the outline of what it calls Ultrabooks. In August, the chip giant announced a $300 million marketing and R&D campaign for the new category. And by January 2012�s CES, Intel was boasting of 15-odd Ultrabooks on the market with another 60 designs in the pipeline.


If you would like to board this bandwagon, the first thing to know is that while Intel as a trademark on the capitalized word Ultrabook, it doesn�t have a monopoly on the idea. The 2.9-pound Apple MacBook Air 13-inch dates back to 2008, and its magazine-like-profile, tapering from 0.7 inches thick in back to just 0.1 inch in front, has inspired numerous Ultrabook designers (some Apple fans would say copycats). There�s also a MacBook Air 11 inches.


Samsung-Ultrabooks On the Windows side, Samsung Series 9 also predates Intel�s Ultrabook push, and Samsung doesn�t use the term in describing it; the company�s super thin flagship is available in 13 and 15 inches size. The Series 9 is also, like the MacBook Air, a premium or status symbol machine that lands north of Intel�s pricing guidelines for Ultrabooks theoretically, under $1,000 for 13 inch models, a goal not all manufacturers have met (prices at this writing range from around $800 to more than $1,400 for fully loaded systems).


[PC Magazine March 2012]


Tuesday, 7 February 2012

10 �WOW� Gadgets of the Year



This year�s CES had some �WOW� gadgets inside, & top ten of which are reviewed below for your info. But Ultrabooks and clever cameras were will represented. Complete guide about these gadgets described here.



Nikon D4 | Digital SLR Camera



Nikon-D4-back Photo Nikon has announced the D4 (Digital SLR Camera), a full frame 16 Mega Pixel camera with a �4,799 only camera price tagged. This pro-camera improves on the speed and accuracy of its predecessors, with better image quality and low-light capability. Full HD recording and a multitude of new features have been added to the gadget. Accordingly, it�s clad in magnesium alloy to keep the gadget at bay. The camera has slots for both CompactFlash and the ultra-fast XQD memory format, and can back up between the two. Wireless modules, and extended ISO range, plus a 51-point autofocus all features.


�4,799 inc VAT (body only) | www.nikon.co.uk




Canon PowerShot G1 X | Digital Camera



Canon G1 X Camera Model Canon introduced G1 X, a 14.3 Mega Pixel Digital Compact Camera with a 288mm wide-angle lens. The aperture ranges from f2.8 to f16, while a huge 18.8x14mm CMOS sensor dwarfs that of APS-C and Micro Four Third models. It also allows for faster continuous shooting and full HD video capture. The ability to continuously autofocus while shooting video, plus 14bit RAW image support, distinguish the PowerShot from its rivals.


�699 inc VAT | www.canon.co.uk


Kodak EasyShare M215 | Digital Camera



Kodak-M215 EasyShare-wireless-capability Kodak launched a 14 Mega Pixel (as small as a Credit Size) camera weighs just 105g, but it packs in a lot of technology inside. It sports 26mm wide angle lens with a 5x optical zoom, and comes with Kodak EasyShare software onboard. A self portrait mode is included, and there�s a tiny mirror on the camera�s front so you can fix your hair. Smart capture and face-recognition technology are included. The Kodak M215 supports 720p full HD video recording, and can convert into still images. A 2.5in LCD aids composition and playback.



Toshiba Camileo Z100 | Digital camcorders



Toshiba-Camileo-Z100-Full-HD-3D-Camcorder The latest Digital camcorder introduced in this year CES, Toshiba�s latest Camileo video camera offers full HD video capture at 30fps. A pair of 5Mp CMOS sensors enable it to shoot 3D footage, where an 8x zoom is available. the 2.8in touchscreen offers glasses free previews. The Z100 has a 120x digital zoom in 2d mode, with which it can capture 16 Mega pixel still images. Electronic image stabilization is built in. The user interface has been rethought for this latest model, and a Pause button added for use during recording. Toshiba Camileo Upload software is onboard.


Price to be come| www.toshiba.co.uk


Canon Legria HF-R series | Digital camcorders



canon-legria-hf-r36 Canon blasts with this cool Photography gadget during the CES event, as their Digital camcorder Canon Legria HF-R series having a wireless connectivity to send and share photos to a storage drive or iOS device over Wi-Fi. They extend the Wi-Fi connectivity to the HF-R series only. Key features of the camcorder Legria HF-R36 include Mpeg4 support, optical image stabilization, a 51x digital zoom, cinematic filters and face detection. the camcorder offers 38 scene modes and comes with Story Creator software for easy storyboarding of your resulting footage.


Price to be come| www.canon.co.uk


HP Spectre | Ultrabook



hp-envy-14-spectre-ces-0 Ultrabooks were popular at CES, but HP was the only manufacturer to launch a see-through model. This glass-clad ultraportable has a 14in display, besting the 13in screens of most other Ultrabooks we�ve seen. It also sports near-filed communications. HP has managed to squeeze this screen into a chassis that would normally accommodate only a 13.3in display. There�s also a multitouch trackpad, a choice of 4GB or 8GB of RAM, a 128GB or 256GB SSD and Intel Core i5 or i7 ultra-low-voltage processors. A mini DisplayPort and a USB 3.0 port feature, as do 802.11n Wi-Fi and Bluetooth 2.1. HP says users can expect a battery life of nine hours between charges.


$1,399 | www.hp.com/uk


 DELL XPS 13 | Ultrabook



Ultrabook DELL XPS 13 Dell has introduced their first Ultrabook with 13.3in screen XPS 13, that pays more than a passing resemblance to Apple�s MacBook Air. Aimed at business users, the laptop is 6mm thick, offers an eight hour battery life and weighs 1.35kg. Dell says the 13in laptop is effectively the same overall size as a 11in laptop, and offers as much processing power as a standard laptop, despite its slim dimensions. Smart Connect technology built into the motherboard allows software updates to proceed in standby mode. Intel Core i3, i5 and i7 CPUs, 4GB of DDR3 RAM and SSD configurations of up to 256GB are cited by Dell.



Quaduro QuadPad 3G Plus | Tablet



Quaduro QuadPad 3G Plus For business persons, Quaduro�s 12in screen Quadro should provide the convenience of a familiar Windows interface and the ability to access all their Windows programs and documents on a highly portable device. Specifications include a 1280x800 pixel capacitive touchscreen, a 1.6GHz Inter Mobile D510 CPU, 250GB of storage, two USB 2.0 ports and 802.11b/g/n Wi-Fi. Bluetooth is an option extra, but Quaduro provides for 3G and WLAN Networks.


From �500 inc VAT | www.quaduro.com/en


Orange Tahiti | Tablet



Orange Tahiti Tablet Mobile operator Orange is introducing a 3G Android tablet. Its 7in screen Tahiti will cost you �25 a month for two years, following an initial payment of �69. The contract includes 1GB of peak and 1GB of off-peak 3G web access per month. a �41 a month contract that bundles an Orange San Francisco Android smartphone is also posited. The Tahiti tablet runs Android Honeycomb from a 1.2GHz dual core Qualcomm 8260 processor and 512MB of RAM. It has 8GB of onboard storage, a 5 Mega pixel camera, a capacitive touchscreen and a GPS compass.


From �69 on a �25/month contract | www.orange.co.uk


Sony Xperia Ion | Smartphone



Sony Xperia Ion Sony used CES to unveil the first smarpthone to escape its Sony Ericsson branding. The Xperia Ion is a 12 Mega pixel smart cameraphone that can shoot 1080i full HD video. the Android 2.3 phone has a 4.6in touchscreen and sports a 720p secondary camera. Designed as an entertainment gadget, the phone has a 1.5GHz dual-core processor, and HDMI port, and offers Bluetooth, Wi-Fi and 3G connectivity.


Price to be come | www.sony.co.uk

Tuesday, 24 January 2012

Toshiba Portege Z835-P330 | Lightest Ultrabook



Toshiba_Portege_Z835-P330



A lightest ultrabook yet, having full feature set, with extras like USB 3.0, WiDi 2.0 and full sized HDMI. Longest battery life in the Ultrabooks� category.



The Toshiba Portege Z835-P330 is the newest member of the Portege line, and it�s Toshiba�s first ultrabook. Available exclusively through Best Buy, the Portege Z835-P330 is currently the cheapest of the news slim laptop category of ultrabooks, selling for just under $800. It also has a featherweight chassis, an unusually full feature set, and a long-lasting battery that will take you through an entire workday. Whether or not those highlights are enough to make you overlook its middling performance and mediocre graphics capability is up to you.




The Z835-P330�s solid feel is especially surprising given its size (0.6 by 14.4 by 8.9 inches, HWD) and weight just 2.4 pounds.


The Z835-P330 sports a 13.3 inch wide screen display, with 1,336 by 768 resolution. The screen is backlit (400 nits) for visibility in environments with lots of ambient light. It also offers fairly wide viewing angles, providing clear visibility for yourself and anyone else you want to share the screen with.


There�s very little room for air flow i this slim chassis, and during testing, the Toshiba got very hot up to 102-degree Fahrenheit on the keyboard and 110-degrees on the underside. Granted, our testing process may push the components a bit harder than the average user would, but you still might want to watch out for a possible case of toasted leg syndrome.


The Z835-P330 has a 128GB solid state drive (SSD), which is large enough to accommodate the operating system, a healthy number of programs, and a modest selection of media.


The Z835-P330 is equipped with a low voltage dual-core Intel Core i3-2367M processor paired with 4GB of RAM. It�s a significant step up from the AMD and Intel Atom CPUs found in traditional netbooks, but it�s not as powerful as the Core i5s that have appeared in the MacBook Air 13-inch, the Asus UX31, or the Acer S3.


The battery lasted 7 hours 35 minutes in testing period (PC MAG testing), a full hour longer than the 6:32 offered by the Asus UX31 (with a 50Wh battery), and an additional 2 hours longer than either the MacBook Air or Acer S3.


The Toshiba Portege Z835-P330 may not be the best ultrabook on the market, but it does stand out due to its light weight, exceptional feature set, and category leading battery life.


At last if you favor portability over performance, the Z835-P330 is a solid choice. [Brian Westover]




Friday, 16 December 2011

The Future of Malware | News





The future of Malware | News from �PCadvisor.com�





Future of MalwareSecurity breaches look set to bet worse as hacker groups target smartphones and social media and release more information online. Jeff Vance reports.



Personal information leaked online is becoming an all too common occurrence. For example, Sony suffered a massive breach of its PlayStation Network earlier this year that led to the theft of names, addresses and possibly credit-card data belonging to 77 million users.


If you think the situation is bad now, just wait. Things will get worse as more information is dumped online by mischievous hacker groups such as Anonymous, and cybercriminals begin to target smartphones and social media.




In August, AntiSec (a collaboration between Anonymous and the disbanded LulzSec group) released more than 10GB of information from 70 US law-enforcement agencies. According to Todd Feinman, CEO of DLP vendor Identity Finder, AntiSec wasn�t motivated by money.


�AntiSec doesn�t like how various law-enforcement agencies operate and it�s trying to embarrass and discredit them,� he said.


But, he added, what it doesn�t realize is that when it publishers sensitive persona information, it�s helping low-skilled cybercriminals commit identity theft. Every week, another government department or business has its records breached � some 250,000 to 500,000 each year, estimated Feinman. Few details from those breaches are published online for all to see, however.


While certain high-profile attacks, such as the one on Sony, are intended to embarrass and spark change, the US law-enforcement breach could represent a shift in hacker thinking. AntiSec�s motivations appear to have a key difference, with the attackers consciously considering collateral damage as a strategic weapon. According to Feinman, AntiSec wrote online; �We don�t care about collateral damage. It will happen, and so be it.�




Social Networking




Facebook Malware

Experts say the future of malware is more about how potential victims will be targeted than how it will be engineered. Collateral damage won�t be limited to innocents compromised through no fault of their own.


Have you ever accepted a friend request on Facebook or connected to someone on Linkedin you don�t know? Perhaps you thought it was someone from school you�d forgotten about, or a former colleague whose name had slipped your mind. Not wanting to seem rude, you accepted them as a friend and quickly forgot about it. �When people make trust decisions with social networks, they don�t always understand the ramifications. Today, you are far more knowable by someone who doesn�t know you than ever,� said Kr Hugh Thompson, program chair of RSA Conferences.


We all know people who discuss everything they do on a social network or blog, from eating their breakfast to clipping their toenails. While most of us consider these people a nuisance and may hide their status updates, cybercriminals love them.


�Password-reset questions are easy to guess, and tolls such as Ancystry.com, while not created for this purpose, provided hackers with useful information,� said Thompson.


There are a few areas he believes the IT security industry needs to concentrate on: security for social media, ways to manage the information shared about you, and better methods for measuring evolving risks.




Enterprise Targets



mobile malware and your businessFake security software is the most common type of social-engineering attack that researchers at Blue Coat Systems come across. Chirs Larsen, head of the lab, explained that social network�s aren�t being used only to target individuals.


Larsen outlined a recent attack attempt where hackers targeted executives of a major corporation through their spouses.


The chances were at least one of the businessmen would have a poorly secured home PC that he shared with his non-tech-savvy wife. This would provide the backdoor needed to gain access to the company.


�Whaling is definitely on the rise,� said Paul Wood, senior intelligence analyst for Symantec.cloud. �Just a couple years ago, we saw one or two of these sorts of attacks per day. Today, we catch as many as 80.�


According to Wood, social engineering is by far the most potent weapon in the cybercriminal�s toolbox (automated, widely available malware and hacking toolkits are number two). Combine that with the fact that many senior executives circumvent IT security because they want the latest and trendiest devices, and cybercriminals have many valuable, easy-to-hit targets in their sights.


�Attacks on small businesses are increasingly dramatic because they are usually the weakest link in a larger supply chain,� said Wood.


There�s no sure way to defend against this. Until companies start scrutinizing the cyber-security of their partners and suppliers, they can�t say with any certainty whether or not they themselves are secure. While it�s common for large firms to keep a close eye on their suppliers, with factory visits that result in the implementation of an array of �best practices�, companies aren�t doing this when it comes to cyber-security.




Smartphone Threats



AndroidMalwareSmartphone threats are on the rise, but we�ve yet to see a major incident. This is partly due to platform fragmentation. Malware creators still get better results by targeting PCs or websites.


Larsen believes that platform-agnostic, web-based worms represent the new frontier of malware. Platform-agnostic malware lets legitimate developers do same of the heavy lifting for malware writers. As developers re-engineer sites and apps to work on a variety of devices, hackers can then target the HTML, XML, Jpegs and so on that render on any device anywhere.


Mobile phones are serving as a second identity factor for all sorts of corporate authentication schemes. Businesses that used to rely on hard tokens, such as RSA SSecureID, are moving to soft tokens, which can reside on mobile phones roaming beyond the corporation as easily as on PCs ensconced within corporate walls.


Two-factor authentication originally emerged because people couldn�t trust computers. Using mobile phones as an identity factor defeats two-factor authentication,� said Marc Maiffret, CTO of eEye Digital Security.


Today, Android is the big smartphone target, but don�t be surprised if attackers soon turn their attention to the iPhone � especially if third-party antivirus programs become more or less standard on Android devices. iPhone demographics are appealing to attackers, and security experts will tell you that Apple products are notoriously insecure.


Apple is reluctant to provide third-party security entities with the kind of platform access they need to improve the security of iPhones, iPads, MacBook Airs and so on. �Apple is very much on its own with security,� said Maiffret. �It almost mirrors late-90s Microsoft, and it�ll probably take a major incident or two to incite change.�


If we�ve learned anything about security in the past 20 years, it�s that another major incident is always looming just over the horizon. With the number of IP-connected devices climbing to anywhere from 50 billion to a Trillian in the next five to 10 years, tomorrow�s hackers could target anything from home alarms and air traffic-control systems to flood control in dams.




Friday, 18 November 2011

Tablet PC: The Essential Consumer's Guide



TabletPC


Tablet PC: The Essential Consumer's Guide | PC Supporter



If you are currently on the market for a slate PC or tablet PC but overwhelmed by the sheer number of tablets currently available on the market, you are in luck because this essential buyer's guide will help you find the right tablet PC for you. This guide will break down the things you should consider when considering to purchase any tablet currently available on the market. The factors that you should consider that will be discussed in this buyers guide are needs, budget, platform, specification and style.



Needs Needs


When considering buying a tablet PC, you should think about your needs and whether if you really need a tablet. The great Steve Jobs once described the Apple iPad as a tablet that fits somewhere between laptops and smartphones as tablets can provide a better email and web browsing experience than smartphones. This definition can be applied to all tablets and you should think whether your needs can solely be satisfied from a tablet if you already own a desktop PC, laptop or Smartphone. Some may argue that tablets don't quite beat laptops yet in terms of business productivity but nevertheless, tablet PCs remain on everyone wish lists.


Reasons Reasons


There many reasons why people buy tablet computers but some examples include tablets are lighter and more portable than laptops, the web and email experience is better than on Smartphone or on a laptop, provides better battery life and has a fast boot times. If any of these reasons apply to you than having tablet might be appeal to you.

Budget Budget


Tablet PC's come priced in many different price ranges and depending on your budget, your choices can be either be limited or unlimited. Whether you are on a tight budget or have lots of money to spend, there are many models available that cater to all budgets. At the low-end tablet market, you can happily pick up a tablet from $80 to $900 for a high-end model. In most cases, your budget will determine your tablet choices.

Platform Platform


At present, the major tablet platforms available are Apple's iOS, Google's Android operating system and RIM's BlackBerry Tablet OS. Which platform to go for will entirely depend on what users are familiar with using, For example, BlackBerry users might be more comfortable to use RIM's BlackBerry Tablet OS because it supports and integrates with the BlackBerry service while other users might opt for the Android operating system because it offers full combination with Google services where as other users might opt for Apple's iOS because it's very intuitive to use. In any case, it would be best advised to go to your local retailer to try out the platforms to ensure you can comfortable use it day-to-day.

Specification Specification


Without going into technical jargon about the specifications, it is best advised to purchase the best or highest specification tablet that your budget allows to ensure your new tablet can last for many years to come. Technology develops at a fast pace and today's' best specifications can quickly become out of date within six months so it's advisable to ensure the tablet you do end up buying is the best you can afford.


The basic specifications that all tablet PC buyers should consider is screen size, speed of the CPU, amount of RAM, hard drive space and battery life. The general rule is the higher the number, the better equipped the tablet PC is. For example, the popular Apple iPad 2 has a 9.7-inch screen, 1 GHz dual-core CPU, 512MB of RAM, 10 hour battery life and storage is available in 16GB, 32GB, and 64GB models.

Style Style


Finally, you should consider how the tablet looks. Style and look of a tablet is objective as what might look cool and great to one person might look awful to another.


I hope you have found this tablet PC guide useful in finding the right tablet PC for you and understanding what to consider when purchasing any tablet. You can learn more about current tablets, future tablets, tablet PC reviews by visiting PC Supporter.






Wednesday, 2 November 2011

Intel Ultrabooks challenge MacBook Air



Intel Ultrabooks challenge MacBook Air | PC Supporter



Ultrabooks � Intel�s new slim line form factor for portable laptops could help laptop manufacturers strike back at the dominance of Apple�s MacBook Air. We managed to get our hands on some of the first models to go on show at the IFA Technology Show in Berlin.


First up was the Acer Aspire S3. It�s not the thinnest Ultrabook available, but it�s still incredibly small, measuring 17mm at its thickest point and tapering to a slender 13mm. It weights just 1.3kg, thanks to its aluminum-magnesium alloy construction, and you�ll barely notice it in a satchel or laptop bag.



 MacBook Air






The thin, 13.3in glossy screen has been made using a new construction process that recesses the LCD directly into its chassis. We noticed a fair amount of flex, but considering its thickness that wasn�t a surprise. The 1,366x768 resolution is fairly standard for this screen size, but there was no mention of a possible upgrade to 1080p or 1,600x900. On the incredibly bright show floor, the display�s brightness looked a little low, but we�ll withhold judgment until we�ve seen one in our labs.


Acer Aspire S3 UltraBook Pictures


The Aspire S3 doesn�t deviate too far from Intel�s original design document. Each model in the Ultrabook range will use an ultra-low voltage version of Intel�s second-generation Core i3, i5 or i7 processors, with various memory and storage configurations, However, storage is a different matter; the S3 is currently the only Ultrabook available with the choice of an SD or traditional hard disk. As well as faster read and write speeds, SSD models will benefit from enhanced battery life � typically up to seven hours, compared with six from a unit equipped with a hard disk.







Acer Aspire S3 Video running Windows 8



Next was Toshiba�s Protege Z830, the thinnest Ultrabook announced at just 15.9mm, This is about as slim as you�d care to go, as the Z830 is only thick enough to provide full sized USB ports � there are three, one of which is the faster USB3 standard � along its edges. There�s also Ethernet, HDMI, VGA and a card reader. Any thinner design would have to resort to compromises such as hinged ports behind flaps.


Toshiba�s Protege Z830 Pictures - PC Review


The Z830�s chassis is made of a magnesium allow, much like Panasonic�s Toughbook line. And it�s been designed to be extremely portable, especially given its 13.3in display size. It weighs just 1.12kg, making it the lightest Ultrabook to date, and one of lightest laptops we can think of. Full dimensions weren�t supplied, and unfortunately we didn�t have a tape measure, but we�d estimate that it sits between Apple�s 13in MacBook Air and Pro designs.


Again, the screen lid has a lot of flex, but there�s no surprise given the thickness. The backlit keyboard was nice to type on, with positive feedback despite its minimal travel.




Toshiba was very circumspect on the actual specification and would only say that it will have an Intel processor and either a 128GB or 256GB SSD. Battery capacity and life was unavailable. What�s certain is that we�re due to get a series of incredibly small, light and attractive laptops coming soon.

Source: Computer Shopper � December 2011





Thursday, 20 October 2011

Avoiding | Filtering | and Blocking Spam

PC Supporter

Avoiding, Filtering, and Blocking Spam

Security_WarningSpam is unsolicited, unwanted e-mail�junk mail. When you first get an e-mail account, you receive very little spam. The spam starts to f low when you post your e-mail address on the web or sign up for free offers with companies that pass your e-mail address to others. Once your e-mail address lands on a spam list as a legitimate address, the spam is almost impossible to stop. When it comes to spam, an ounce of prevention is worth a kilo of cure. Here are a few tips for preventing spam:

 

  • Don�t use your primary e-mail address to register for anything on or off the web. Get a free e-mail account from Gmail, Yahoo!, or Hotmail and use this disposable e-mail address to register for stuff. If you start receiving too much junk e-mail, you can dump the address and use a different one.
  • If you receive a spam message, don�t reply to it. Replying verifies your e-mail address to the spammer and encourages more spam.
  • Don�t put your primary e-mail address on the web�for example on your website or blog. Spammers scan the web for e-mail addresses.

PC Supporter Tips

TipsIf you�re receiving an overwhelming amount of spam, try the following solutions to slow the flow:

 

  • Log in to your Internet service provider�s website to find out whether it uses a spam blocker and whether you can configure it to make it more aggressive in identifying spam.
  • If you have the e-mail account through a hosting provider (a business that hosts your website), log in to your account to find out about available options.
  • Purchase and install a spam blocker of your own. You can find plenty of good spam filters/blockers out there, including SPA Mfighter (www.spamfighter.com), ChoiceMail (www.digiportal.com), and Spameater Pro

E-MailMost newer e-mail programs offer some sort of spam protection (perhaps in the form of a Junk Mail folder) and enable you to enter settings to make the program more or less aggressive in identifying spam. In addition, you can usually create lists of safe senders and blocked senders and block e-mail from certain domains or countries. Search your e-mail program�s help system for �spam� to determine what, if any, spam protection features are available.

(www.spameaterpro. com), to name a few.