Showing posts with label computers. Show all posts
Showing posts with label computers. Show all posts

Wednesday, September 11, 2013

Windows 8.1 Tip: Move the Location of the SkyDrive Folder

 

Relax, this one's easy

Sep. 10, 2013 Paul Thurrott

del.icio.us Tags: ,,,
While most agree that the further integration of SkyDrive into Windows 8.1 is a good thing, some have been griping that there's no way to change the location of the SkyDrive folder. But it turns out you can very easily change where your SkyDrive files sync. You just need to know the secret.

As a recap, Microsoft has integrated SkyDrive more deeply than ever in Windows 8.1. As I wrote previously in Hands-On with Windows 8.1: SkyDrive Integration, SkyDrive file sync is on by default and can be managed from a new PC Settings-based interface. No separately installable app is required.

But there is a downside to this integration. With the previous solution, the SkyDrive desktop app, you could configure where SkyDrive synced its files. On modern PC devices with relatively small amounts of solid state storage, the inability to do so in Windows 8.1 can be an issue. Before, you could tell SkyDrive to sync to micro-SD storage or some other location.

But it turns out you can do this in Windows 8.1, too. You just can't do it from that shiny new PC Settings interface.

Instead, you can configure this from the good old Windows desktop. In the default This PC view, right-click on SkyDrive in the navigation pane and select Properties. Then, navigate to the Location tab. Yep, this is the place.

To change the location where SkyDrive syncs its files, simply click the Move button and choose a new location. It's that simple.

Sunday, August 18, 2013

Windows 8.1 + ModernMix

Stardock helps make our transition to the mobile future a lot easier

Thurrott_Paul_0909

Paul Thurrott

Aug. 18, 2013

Ever since Microsoft released the Windows 8.1 Preview back in June, readers have asked me whether Stardock’s useful utilities like ModernMix and Start8 will work with the new OS version. With the recent leak of a near final Windows 8.1 build, I decided to test ModernMix on my daily-use PC. And I think this is going to be a very useful transition tool indeed.

I think it’s fair to say that Windows 8 has presented a certain challenge to many if not most of the 1.5 billion Windows users worldwide. The cause is obvious: Windows 8 is a “touch-first” version of Windows that ships with its first-ever mobile environment, originally called Metro. And this new Metro environment was unceremoniously and awkwardly tacked onto the classic Windows desktop. The result is a disjointed experience that is optimized for neither touch nor mouse and keyboard.

Enter Windows 8.1. This very major update to Windows 8 (and RT) provides users with the OS that Microsoft should have shipped originally. Windows 8.1 includes major improvements to both the Metro and desktop environments, making this system a far better fit for those users that prefer either. It also eases the transition between the two, which is important because Windows will be moving further down that mobile path in future releases as the desktop is deemphasized and then made optional or removed.

Depending on your mindset, that future is either dystopian or utopian, but let’s not get bogged down in things we can’t change today. For now, we have Windows 8, imperfect as it is, and Windows 8.1, which finally offers some apps—like the improved Mail, Calendar and Xbox Music, among others—that are good enough that even desktop users should start paying attention. But doing so on traditional (non-touch) PCs is still a bit awkward, despite the useful advances in Windows 8.1

Enter Stardock. This Michigan-based firm has been around for over 20 years and been developing useful Windows-based utilities for years. With the advent of Windows 8, Stardock has stepped up to the plate and released a series of very useful products that help ease the transition to Windows 8 and make this less-than-optimal system work the way Windows users expect.

I’ve written about a few Stardock utilities in the recent past, including ModernMix (Windows 8 Tip: Run Metro Apps in Windows on the Desktop) and Start8 (Windows 8 Tip: Boot Directly to the Desktop with Start8) and recommend both highly. But now that I am using a near-final version of Windows 8.1, I find myself curious about using some of those new app versions at home, on my desktop set up (which is currently a jury-rigged Surface Pro docked to a large desktop display, keyboard, mouse and other peripherals, but is normally a tower PC). The thing is, these full-screen apps, good as they are, still don’t work well on such a PC configuration.

So I’ve been using ModernMix to see whether this utility can help cross that final divide between the future (mobile apps) and the present (my desktop PC with keyboard and mouse). And though there are a few bugs that I attribute to the pre-release nature of Windows 8.1, the answer is … yes. Most definitely.

New Windows 8.1 apps running in windows on the desktop

ModernMix provides what I think is a better “mix” (hence the name, presumably) of mobile apps and desktop. It lets you run Windows mobile apps (Mail, Calendar, Xbox Music, etc.) in windows on the Windows desktop, just like real desktop applications. This means they can float, be resized, be pinned to the taskbar, and so on.

What’s interesting is that ModernMix is so mature that it’s smart about how these apps work. I’ve pinned Xbox Music to the desktop, for example, and when I launch it from there it runs in a window as I want. But if I launch the app from the Start screen—which I might do when out and about in the world with the Surface, now used as a tablet—it will run normally, in full-screen mode. Which is also what I want.

This dual-mode use is why ModernMix is so useful as a transition tool. Yes, if you’re just going to use Metro apps on a desktop PC, you may simply want them to run in a window. But if you’re transitioning to this mobile future, not just through software but with a hybrid mobile device like a Surface, Lenovo Yoga, or whatever, you can have it both ways.

Choice is good. And while I applaud the changes Microsoft has made in Windows 8.1, some people will always believe that they’ll never go far enough. For those, and for any user that simply wants an easier transition from the desktop systems they’ve spent over 15 years using, ModernMix is a great (and, at $4.99, inexpensive) option.

You can download Modernmix from the Stardock web site.

Monday, August 12, 2013

Ten Immutable Laws Of Security

keypadlock

The 10 Immutable Laws

Law #1: If a bad guy can persuade you to run his program on your computer, it's not solely your computer anymore.
Law #2: If a bad guy can alter the operating system on your computer, it's not your computer anymore.
Law #3: If a bad guy has unrestricted physical access to your computer, it's not your computer anymore.
Law #4: If you allow a bad guy to run active content in your website, it's not your website any more.
Law #5: Weak passwords trump strong security.
Law #6: A computer is only as secure as the administrator is trustworthy.
Law #7: Encrypted data is only as secure as its decryption key.
Law #8: An out-of-date antimalware scanner is only marginally better than no scanner at all.
Law #9: Absolute anonymity isn't practically achievable, online or offline.
Law #10: Technology is not a panacea.

Law #1:If a bad guy can persuade you to run his program on your computer, it's not solely your computer anymore

It's an unfortunate fact of computer science: when a computer program runs, it will do what it's programmed to do, even if it's programmed to be harmful. When you choose to run a program, you are making a decision to turn over a certain level of control of your computer to it -- often  anything up to the limits of what you yourself can do on the computer (and sometimes beyond). It could monitor your keystrokes and send them to criminals eager for the information. It could open every document on the computer, and change the word "will" to "won't" in all of them. It could send rude emails to all your friends. It could install a virus. It could create a "back door" that lets someone remotely control your computer. It could relay a bad guy’s attack on someone else’s computers. Or it could just reformat your hard drive.

That's why it's important never to run a program from an untrusted source, and to limit the ability of others to make that decision for you on your computer. There's a nice analogy between running a program and eating a sandwich. If a stranger walked up to you and handed you a sandwich, would you eat it? Probably not. How about if your best friend gave you a sandwich? Maybe you would, maybe you wouldn't—it depends on whether she made it or found it lying in the street. Apply the same critical thought to a program that you would to a sandwich, and you'll usually be safe.

Law #2: If a bad guy can alter the operating system on your computer, it's not your computer anymore

In the end, an operating system is just a series of ones and zeroes that, when interpreted by the processor, cause the computer to do certain things. Change the ones and zeroes, and it will do something different. Where are the ones and zeroes stored? On the computer, right along with everything else! They're just files, and if other people who use the computer are permitted to change those files, it's "game over.”

To understand why, consider that operating system files are among the most trusted ones on the computer, and they generally run with system-level privileges. That is, they can do absolutely anything. Among other things, they're trusted to manage user accounts, handle password changes, and enforce the rules governing who can do what on the computer. If a bad guy can change them, the now-untrustworthy files will do his bidding, and there's no limit to what he can do. He can steal passwords, make himself an administrator on the computer, or add entirely new functions to the operating system. To prevent this type of attack, make sure that the system files (and the registry, for that matter) are well protected. In modern operating systems, default settings largely prevent anyone but administrators from making such bedrock changes. Preventing rogue programs from gaining administrative-level access is the best way of protecting the operating system. That’s best accomplished by not operating your computer from an account with administrative privileges except when specific tasks make it absolutely necessary – and logging out of that high-privilege mode as quickly as possible once your task is complete.   Home users should consider creating an “everyday” account set to operate with standard-level user permissions. On those relatively rare occasions when you really do need to make big changes, you can log into the administrative account, do whatever needs to be done, and switch back to the safer account when you’re finished.

Law #3: If a bad guy has unrestricted physical access to your computer, it's not your computer anymore

Oh, the things a bad guy can do if he can lay his hands on your computer! Here's a sampling, going from Stone Age to Space Age:

  • He could mount the ultimate low-tech denial of service attack, and smash your computer with a sledgehammer.
  • He could unplug the computer, haul it out of your building, and hold it for ransom.
  • He could boot the computer from removable media, and reformat your hard drive. But wait, you say, I've configured the BIOS on my computer to prompt for a password when I turn the power on. No problem – if he can open the case and get his hands on the system hardware, he could just replace the BIOS chip. (Actually, there are even easier ways).
  • He could remove the hard drive from your computer, install it into his computer, and read any unencrypted data.
  • He could duplicate your hard drive and take it back to his lair. Once there, he'd have all the time in the world to conduct brute-force attacks, such as trying every possible logon or decryption password. Programs are available to automate this and, given enough time, it's almost certain that he would succeed. Once that happens, Laws #1 and #2 above apply.
  • He could add a recording device or transmitter to your keyboard, then monitor everything you type including your passwords.

Always make sure that a computer is physically protected in a way that's consistent with its value—and remember that the value of a computer includes not just the value of the hardware itself, but the value of the data on it, and the value of the access to your network that a bad guy could gain. At a minimum, business-critical computers such as domain controllers, database servers, and print/file servers should always be in a locked room that only people charged with administration and maintenance can access. But you may want to consider protecting other computers as well, and potentially using additional measures to guard their physical integrity.

If you travel with a laptop or other portable computer, it's absolutely critical that you protect it. The same features that make them great to travel with – small size, light weight, and so forth – also make them easy to steal. There are a variety of locks and alarms available for laptops, some models let you remove the hard drive and carry it with you, and almost all can be used with extremely small, extremely portable storage – e.g. USB thumb drives – for storing your data while you travel. You also can use features such as drive encryption available in most modern operating systems to mitigate the damage if someone succeeded in stealing the computer, or to retain some confidence in its protection if it’s taken from you in an unexpected bag check or unfriendly border crossing. If the computer walks off or is lost, you’ll still need to address the loss of the hardware, but it’ll be harder for your data to be disclosed without your knowledge. But the only way you can know with 100% certainty that your data is safe and the hardware hasn't been tampered with, is to keep them on your person at all times while traveling.

Law #4: If you allow a bad guy to run active content on your website or online application, it's not your website any more

In Law #1, a bad guy tricks you into downloading a harmful program and running it, giving him control over your computer and its data – at least as much control as you had. But what about the reverse: if he can upload active content – programs, scripts, or even documents and pictures designed to crash peoples’ computers in specific ways – and have them served from your website or online application?  Your site becomes his platform for reaching out to capture data from site visitors or harm their computers, or reaching inward towards other systems that support your site. 

If you run a website or hosted applications, you need to limit what visitors can do. Some sites provide an open forum for people to upload and distribute software, code or configurations – and that’s fine as long as visitors understand Law #1 and the risks that come along with their downloads. But if the bad guy’s uploaded programs actually run on your server or in the browser of visitors, he effectively own your site and can impersonate you.  Worse, the bad guy could gain your rights to the underlying systems, and might find a way to extend his control to the servers, data storage or network itself.  If your site is on shared infrastructure or a cloud-based service, this can put other sites and data at risk, and potentially create interesting liabilities for yourself and other people.

A properly administered site host or cloud service will have taken many of these risks into account and will disallow scripts or programs uploaded to the service from affecting other accounts that happen to share the same resources. Just the same, you should only allow a program to run on your site or as part of your application if you wrote it yourself or if you trust the developer who wrote it, and make sure your operations and maintenance processes don’t run afoul of the host administrator’s security policies.

Law #5: Weak passwords trump strong security

The purpose of having a logon process is to establish who you are. Once the operating system knows who you are, it can grant or deny requests for system resources appropriately. If a bad guy learns your password, he can log on as you. In fact, as far as the operating system is concerned, he is you. Whatever you can do on the system, he can do as well, because he is you. Maybe he wants to read sensitive information you've stored on your computer, like your e-mail. Maybe you have more privileges on the network than he does, and being you will let him do things he normally couldn't. Or maybe he just wants to do something malicious and blame it on you. In any case, it's worth protecting your credentials.

Always use a password on your computer—it's amazing how many accounts have blank passwords. And develop a complex one. Don't use your dog's name, your anniversary date, the name of the local football team, or QWERTY / 12345 / other basic keyboard patterns – and avoid using single “dictionary words” (that is, words that can be looked up in the dictionary). And don't use the word "password!" Build a password that has a mix of upper- and lower-case letters, numbers, punctuation marks, and so forth. Make it as long as possible; consider using two words in combination. (If you speak multiple languages, you might choose to mix tongues in your password for extra complexity.) And change it often.

Once you've picked a strong password, handle it appropriately. Don't write it down. If you absolutely must write it down, at the very least keep it in a safe, a locked drawer, or perhaps deep in your wallet—the first thing a bad guy who's hunting for passwords will do is check for a yellow sticky note on the side of your screen, or in the top desk drawer. Don't tell anyone what your password is, and don’t ask for theirs. Managers, kids, and even IT helpdesk staff should rarely if ever ask for your password. Modern operating systems and programs allow you to give other people permission to see and use your files, without giving out your password so they can impersonate you.  Remember what Ben Franklin said: two people can keep a secret, but only if one of them is dead.

If you have accounts for multiple computers and online services, you’ll need to balance requirements for unique and strong passwords, yet limit how many passwords you have to remember. For accounts that give access to your most critical information – financial accounts, regulated personal data, sensitive work access, and primary email accounts to name a few – use a unique password for each one, and follow their access management policies.  If you’re awash in multiple accounts that gather little personal information and have low value if lost, such as news sites that require free registration, consider developing one reasonably strong password and reusing it for most or all of them.

Finally, consider using something stronger than – and in addition to – passwords to identify yourself to the system. Windows, for instance, supports the use of smart cards, which significantly strengthens the account checking the system can perform. You may also want to consider biometric products such as fingerprint and retina scanners. “Two-factor authentication” of this sort incorporates not only something you know (your password) but something you own (a card) or even something you are (a person with your unique fingerprint or retina) – dramatically increasing authentication strength.

Law #6: A computer is only as secure as the administrator is trustworthy

Every computer must have an administrator: someone who can install software, configure the operating system, add and manage user accounts, establish security policies, and handle all the other management tasks associated with keeping a computer up and running. By definition, these tasks require that the individual have control over the computer. This puts the administrator in a position of unequalled power. An untrustworthy administrator can negate every other security measure you've taken. He can change the permissions on the computer, modify the system security policies, install malicious software, add bogus users, or do any of a million other things. He can subvert virtually any protective measure in the operating system, because he controls it. Worst of all, he can cover his tracks. If you have an untrustworthy administrator, you have absolutely no security.

When hiring a system administrator, recognize the position of trust that administrators occupy, and only hire people who warrant that trust. Call his references, and ask them about his previous work record, especially with regard to any security incidents at previous employers. If appropriate for your organization, you may also consider taking a step that banks and other security-conscious companies do, and require that your administrators pass a complete background check at hiring time, and at periodic intervals afterward. Whatever criteria you select, apply them across the board. Don't give anyone administrative privileges on your network unless they've been vetted – and this includes temporary employees and contractors.

Next, take steps to help keep honest people honest. Use sign-in/sign-out sheets or log access badge swipes to track who's been in the server room. (You do have a server room with a locked door, right? If not, re-read Law #3). Implement a "two person" rule when installing or upgrading software. Diversify management tasks as much as possible, as a way of minimizing how much power any one administrator has. Also, don't use the Administrator account—instead, give each administrator a separate account with administrative privileges, so you can tell who's doing what. Many industries require audit logs documenting all activities on covered business systems; audit trails can’t stop rogue admins from running amok, but they can record who did what if a problem is discovered later, and enforce a sense of individual accountability.  Finally, consider taking steps to make it more difficult for a rogue administrator to cover his tracks. For instance, store audit data on write-only media, or house System A's audit data on System B, and make sure that the two systems have different administrators. The more accountable your administrators are, the less likely you are to have problems.

Law #7: Encrypted data is only as secure as its decryption key

Suppose you installed the biggest, strongest, most secure lock in the world on your front door, but you put the key under the front door mat. It wouldn't really matter how strong the lock is, would it? The critical factor would be the weak way the key was protected, because if a burglar could find it, he'd have everything he needed to open the lock. Encrypted data works the same way—no matter how strong the crypto algorithm is, the data is only as safe as the key that can decrypt it.

Many operating systems and cryptographic software products give you an option to store cryptographic keys on the computer. The advantage is convenience – you don't have to handle the key – but it comes at the cost of security.  Simply put, no matter how well the keys are hidden on the system, the software has to be able to find them – and if it can, so can a sufficiently motivated bad guy.

A better solution is to store them in a protected repository.  For instance, the Trusted Platform Module (TPM) chip that’s present on most computers is designed to strongly protect cryptographic keys, and release them only when a PIN is entered.  Smart cards provide similar protection, and their portability means that you can also physically separate them from the computer.  But the best “protected repository” is your brain – if the key is a word or phrase, memorize it.   

Law #8: An out-of-date malware scanner is only marginally better than no malware scanner at all

Antimalware scanners work by comparing the data on your computer against a collection of malware "signatures." Each signature is characteristic of a particular malware family, and when the scanner finds data in a file, email or elsewhere that matches the signature, it concludes that it's found trouble. It's vital that you keep your malware scanner's signature file up-to-date, as new malware is created every day.

The problem actually goes a bit deeper than this, though. Typically, malware will do the greatest amount of damage during the early stages of its life, precisely because antimalware programs will not be able to detect it, let alone remove it. Once word gets around that new malware is on the loose and people update their signatures, the propagation of the problem falls off as protections spread through the ecosystem. The key is to get ahead of the curve, and have updated signature files on your computer before the malware reaches your machine.

Virtually every maker of antimalware software provides a way to get free updated signature files from their website or from a dedicated update service. In fact, many have "push" services, in which they'll send notification every time a new signature file is released – several times a day, if necessary. Use these services. Also, keep the malware scanner itself—that is, the scanning software that uses the signature files—updated as well. Malware writers regularly develop new techniques and variations that require that scanners change how they do their work.

Law #9: Absolute anonymity isn't practically achievable, online or offline

All human interaction involves exchanging data of some kind. If someone weaves enough of that data together, they can identify you. Think about all the information that a person can glean in just a short conversation with you: In one glance, they can gauge your height, weight, and approximate age. Your accent will probably tell them what country you're from, and may even tell them what region of the country. If you talk about anything other than the weather, you'll probably tell them something about your family, your interests, where you live, and what you do for a living. It doesn't take long for someone to collect enough information to figure out who you are. If you use any payment system other than cash or any transportation other than your own two feet, you leave a trail of data breadcrumbs that can be used to reconstruct a personally identifiable “portrait” of you with remarkable accuracy. If you crave absolute anonymity, your best bet is to live in a cave and shun all human contact.

The same thing is true of the Internet. If you visit a website, the owner can, if he's sufficiently motivated, find out who you are. After all, the ones and zeroes that make up the Web session have to be able to find their way to the right place, and that place is your computer. There are a lot of measures you can take to disguise the bits, and the more of them you use, the more thoroughly the bits will be disguised. For instance, you could use network address translation to mask your actual IP address, subscribe to an anonymizing service that launders bits by relaying them from one end of the ether to the other, use a different ISP account for different purposes, surf certain sites only from public kiosks, and so on. All of these make it more difficult to determine who you are, but none of them make it impossible. Do you know for certain who operates the anonymizing service? Maybe it's the same person who owns the website you just visited! Or what about that innocuous website you visited yesterday, that offered to mail you a free $10 off coupon? Maybe the owner is willing to share information with other website owners. If so, the second website owner may be able to correlate the information from the two sites and determine who you are. And anonymity is even less achievable when you factor in location data, which is gathered perpetually by mobile phones and often enough by Web sites, mapping your machine’s IP address to a real-world location with pretty decent accuracy.

Does this mean that privacy is a lost cause? Not at all. Governments along with public and private entities continue to wrestle with how best to balance the need for personal data privacy with other concerns. What it means is that the best way for you to protect your privacy on the Internet is the same as the way you protect your privacy in normal life—through your behavior. Read the privacy statements on the websites you visit, and only do business with those whose data-sharing practices you understand and agree with. If sites you visit allow you to determine how and with whom information about you will be shared, learn how to adjust those settings and check yours regularly. If you're worried about cookies, disable them. Most importantly, remember that information shared by or about you online is only as safe as the least protective, least enforced privacy policies and settings with which it comes into contact. But if it's complete and total anonymity you want, better start looking for that cave.

Law #10: Technology is not a panacea

Technology can do some amazing things. Recent years have seen the development of ever-cheaper and more powerful hardware, software that harnesses that hardware to open new vistas for computer users, and services that change our expectations for both, as well as advancements in cryptography and other sciences. It's tempting to believe that technology can deliver a risk-free world if we just work hard enough. However, this is simply not realistic.

Perfect security requires a level of perfection that simply doesn't exist, and in fact isn't likely to ever exist. This is true for software as well as virtually all fields of human interest. Software development is an imperfect science, and all software has bugs. Some of them can be exploited to cause security breaches. That's just a fact of life. But even if software could be made perfect, it wouldn't solve the problem entirely. Most attacks involve, to one degree or another, some manipulation of human nature, a process usually referred to as social engineering. Raise the cost and difficulty of attacking security technology, and bad guys respond by shifting their focus away from the technology and toward the human being at the console. It's vital that you understand your role in maintaining solid security, or you could become the chink in your own systems' armor.

The solution is to recognize two essential points. First, security consists of both technology and policy—that is, it's the combination of the technology and how it's used that ultimately determines how secure your systems are. Second, security is a journey, not a destination—it isn't a problem that can be "solved" once and for all, but a constant series of moves and countermoves between the good guys and the bad guys. The key is to ensure that you have good security awareness and exercise sound judgment. There are resources available to help you do this. The Technet website, for instance, has hundreds of white papers, best practices guides, checklists and tools, and we're developing more all the time. Combine great technology with sound judgment, and you'll have more effective security.

Saturday, June 15, 2013

The new Mac Pro desktop – A powerful beast, but a fully loaded model, can easily set you back $11,000+

del.icio.us Tags: ,,
CNET -  June 10, 2013 11:07 AM PDT

Apple has introduced a new version of the high-end Mac Pro desktop at WWDC 2013. The updated model skips Intel's fourth generation of Core i-series processors, previously codenamed Haswell, instead sticking with pro-level Xeon processors. But it's the design of this new Mac Pro that became a conversation topic: instead of a big square box, the new Pro is a shiny black cylinder that looks like it fell off the engine of a starship.

Apple unveiled the all-new, radically designed Mac Pro computer today at the World Wide Developer's Conference today in San Francisco.

(Credit: James Martin/CNET)

Steve Jobs had a similar dream years ago in the G4 Cube, a famously minimal gleaming box that was meant to represent the future of desktop computers. The Cube was a cult favorite more than a commercial success, but the new Mac Pro feels like the clear revival of that black-box dream. Instead of cube, think cylinder.

New design, new features
In addition, the Mac Pro at long last has a new look and feel. The current tower design is one of the oldest in the Apple catalog, changing little from when it was called the Power Mac G5. Up until now, the Mac Pro has been missing USB 3.0, Thunderbolt, and other features many MacBook users take for granted.

The new model has a striking new look. The first view we saw was from the top, where the circular design reminded me of Apple's planned new UFO-like headquarters. It's actually a tall black cylinder, but much smaller than the tower it replaces, fitting into one-eighth the volume of the previous Mac Pro.

Components are built around a "central thermal core," and the specs include an Intel Xeon CPU, faster 1,866GHz RAM, and new SSD storage that's 2.5 times faster than current SSD drives. Dual AMD FirePro GPUs are supported (even though current MacBook Pros use Nvidia graphics), and the system can output to as many as three 4K resolution displays.

Why the major overhaul now? One of the reasons Apple previously felt little need to update the Mac Pro was because it appealed largely to a small but steady professional audience and didn't require a flashy iMac-style overhaul to bring in new audiences. But, in the several years since the last major Mac Pro overhaul, the computer industry has shifted dramatically away from the traditional tower-based desktop toward laptops, all-in-one desktops, tablets, and now even touch screen "tabletop PCs" such as the Lenovo Horizon 27.

Does a bold design that's decidedly hardcore fit what pros need? That remains to be seen, but the Darth Vader-ish look of the Mac Pro certainly made a lot of WWDC attendees sit up and take notice. If iMacs are Jedi, the Mac Pro is decidedly Sith.

There's no price information yet, but the new Mac Pro is expected later in 2013.

AMD Announces 5GHz FX Processor; Richland Gets Benchmarked

Jun 13, 2013 1:46 PM EST

By Michael J. Miller

AMD may be a distant second when it comes to making x86 processors for desktops and notebooks but the company has been making some exciting moves lately. This week it announced what it describes as "the world's first commercially available 5GHz CPU processor." Meanwhile, a number of sites are now reporting benchmarks on the high-end of AMD's more mainstream processors, known as Richland, that I have found quite interesting.

AMD Client Roadmap 2013

The "5GHz" chip is a new version of the company's FX processor introduced at E3 earlier this week. This model, known as AMD's FX-9590, and a 4.7GHz FX-9370 both are 8-core processors, featuring the "Piledriver" architecture in which a pair of integer CPU cores share floating point and other features. They are traditional CPUs, meaning they do not have integrated graphics, unlike the company's "accelerated processing units" (APUs), which is AMD's term for a chip with both CPU and graphics features on a single die. The reason I put "5GHz" in quotes is that this apparently the top turbo speed. Until now, the x86 processor companies typically referred mainly to the base speed of the processor, and then listed a "turbo mode." For instance, the previous high-end AMD CPU, the FX-8350 was listed at 4.0GHz, with a turbo speed of 4.2GHz. The 9590 and 9370 should be faster at least in their "Max Turbo" modes, but AMD hasn't yet announced what the base speed of these new processors will be.    

(Update: a number of sites are reporting this afternoon that AMD has confirmed the 9590 and the FX-9370 will have base speeds of 4.7 GHz and 4.4 GHz, respectively; and also that this will require 220 watts of power, a huge increase from the 125 watt TDP of the previous top-end chips. As a result, it will likely require special cooling and will probably be available mainly from specialty PC makers.)

Note that some specialized high-end processors such as the IBM Power series have already reached that 5GHz and beyond and we've seen previous PC processors overclocked to this speed and beyond, including from AMD. But this should be the first relatively mainstream processor to ship with official support for this clock speed. Clock speed is far from the only determinant of actual performance though; in general, Intel's higher-end Core chips have been outperforming AMD's but we'll have to wait to get real systems in to know for sure if that still holds.

Desktop Richland Benchmarked

At Computex last week, AMD announced new versions of its Richland APUs. Richland is meant to be a successor to the Trinity APUs and will mostly compete with the lower-priced version of Intel's fourth-generation Core processors, known as Haswell, also introduced last week. 

In my stories last week, I said I was looking forward to seeing how Haswell and Richland would compare. Since then, a number of sites have published reviews of the desktop version of Richland, usually the 4.1GHz A10-6800K and/or the 3.8GHz A10-6700. These include Anandtech, Legit Reviews, and Tom's Hardware.

The results really don't tell much of a changed story from the comparisons of the previous generations, where AMD's Trinity went up against Intel's Ivy Bridge. In most of the tests, Richland shows a small improvement over Trinity, but nothing really special. While Haswell does come in versions with twice as many graphics units, known as HD Graphics 5000 or GT3 and even some with embedded DRAM solutions known as Iris Pro graphics, these are mostly aimed at notebook designs (with the exception of one version aimed at all-in-ones).  So from Intel, the basic desktop parts still have mostly the same level of graphics as the previous generation, and the results show that as well.

Overall, Intel retains a big lead in CPU performance, even with the lower-end Core i3 and especially with the Core i7, but AMD's Richland still shows a massive lead in graphics performance, even compared with the much-more expensive Core-i7. Since on the desktop side it's pretty easy to add a discrete graphics card and a low-end discrete card seems to outperform either in graphics, this leaves Richland mostly to compete on price against a low-end Intel chip.   

The more interesting comparison will be in notebooks where Intel's CPU performance lead isn't as big as it is on desktops, but it offers chips with higher-end graphics. In the previous generation, AMD had much better graphics than notebook Ivy Bridge chips, so Intel-based notebooks aimed at gamers and graphics professionals had to have discrete chips. Clearly some of that market will continue, but Intel has gotten stronger and AMD seems to have somewhat better power management in this generation. So we'll have to see real systems going head-to-head in this market.

In the end, it's hard to see Richland making a big change to the market this year. AMD's big chance should come when it releases a new architecture, known as Kaveri, planned to start manufacturing late this year, with the first systems in early 2014. This introduces an updated CPU core architecture known as "Steamroller," which should offer an improvement in raw CPU horsepower, and what AMD is calling heterogeneous Uniform Memory Access (hUMA), which should allow the CPU and GPU units to work together more closely. 

Sunday, June 2, 2013

ASUS Launches PQ321 Monitor with 3840 x 2160 IGZO Display

31.5-inch 4K Ultra HD Monitor features four-times the resolution of a Full HD display for incredibly detailed and lifelike images

2013/05/30

ASUS today announced the PQ321 True 4K UHD Monitor, a desktop display with a stunning Ultra HD 3840 x 2160 resolution that’s equivalent to four Full HD displays stacked side-by-side. The PQ321 has a 31.5-inch LED-backlit 4K Ultra HD display (140 pixels-per-inch) with 16:9 aspect ratio, and supports 10-bit RGB ‘deep color’ for vibrant images with more natural transitions between hues.

Cutting-edge IGZO panel technology

The ASUS PQ321 True 4K UHD Monitor uses cutting-edge Indium Gallium Zinc Oxide (IGZO) rather than traditional amorphous silicon for the active layer of its LCD panel. IGZO panels support much smaller transistors than amorphous silicon, which in turn gives much smaller pixels and the 3840 x 2160 resolution of the PQ321 is four times that of a 1920 x 1080 Full HD display.
176-degree wide viewing angles on both vertical and horizontal planes minimize onscreen color shift, while the 350cd/m² brightness rating and 8ms gray-to-gray response time ensure smooth, bright, and vibrant moving visuals. IGZO technology also gives reduced energy consumption compared to amorphous silicon and reduces bulk — at 35mm at its thickest point, the PQ321 is the thinnest 4K UHD monitor available today.

Comprehensive video inputs for UHD content

The ASUS PQ321 True 4K UHD Monitor features Display Port and US models offer dual-HDMI ports inputs with Picture-by-Picture support. Built-in 2W stereo speakers remove the need for additional desktop clutter and, in addition to being wall-mountable, the monitor stand offers full height, swivel, and tilt adjustment.

Sunday, April 21, 2013

Micron 960 GB 2.5" Internal Solid State Drive

Micron 960 GB 2.5" Internal Solid State Drive - Specifications

$555.99 - $987.95 (4 stores)

Specifications

Transform your system's performance. New interfaces and multitasking demands require more from your system than perhaps ever before. From connecting instantly with friends and accessing apps, websites, and playlists online, to simultaneously streaming videos and downloading files, your computer is faced with an entirely new set of performance expectations that a hard drive struggles to meet. That's where the Crucial M500 SSD comes in. With data transfer speeds that are radically faster than a hard drive, the Crucial M500 SSD isn't just a storage upgrade - it's a complete system transformation. From its nearly instantaneous boot times, powerful data transfer speeds, increased multitasking capability, and rock solid reliability, the Crucial M500 delivers dramatic performance gains - all at an affordable price.

Wednesday, April 17, 2013

Windows Blue may bring back boot-to-desktop, Start button

del.icio.us Tags: ,,

 

Jared Newman@onejarednewman

Follow me on facebook Follow me on Google+

Jared writes for PCWorld and TechHive from his remote outpost in Cincinnati.
More by Jared Newman

With Windows Blue, Microsoft may concede that not everyone wants or needs the new modern-style Start screen.

Citing unnamed sources, both ZDNet and The Verge say that Microsoft is considering a boot-to-desktop option in Windows Blue, an update to Windows 8 that’s expected to arrive this summer. This option, disabled by default, would allow users to bypass Windows 8’s modern-style Start screen when turning the computer on.

Signs of a boot-to-desktop option were also spotted earlier this week in one of the operating system files in a leaked version of Windows Blue. Presumably this option would be simpler than the existing workaround, which involves using Task Schedule to open Explorer on startup.

However, reports conflict on whether Microsoft will bring back the Start button. ZDNet says that Microsoft has considered it, while The Verge says Microsoft will retain the “hot corners” that bring up the modern-style Start menu and the Charms bar.

It’s also unclear whether Microsoft would bring back a pop-up Start menu for desktop users, allowing them to avoid the modern-style interface entirely. That would make sense, as the main point of a boot-to-desktop option is to let business users adopt Windows 8 without making major changes in workflow. However, Microsoft may be skittish about letting those users abandon the modern-style interface and Windows Store so easily. The company insists that most users are quick to adopt the new features of Windows 8.

Without a classic Start menu, users would still have to go through the Start screen to launch any apps that aren’t pinned to the taskbar or placed as shortcuts on the desktop. Alternatively, users could continue to rely on third-party options, such as Start8 and Classic Shell.

In any case, Microsoft reportedly hasn’t made up its mind. “Until it ships, anything can change,” ZDNet’s anonymous source said.

Monday, April 8, 2013

Fusion-io bumps its ioFX super-SSD to 1.6TB, announces HP Workstation Z integration

del.icio.us Tags: ,
By
Joe Pollicino posted Apr 7th, 2013 at 12:30 PM 1
del.icio.us Tags: ,


Fusionio bumps its ioFX superSSD to 16TB, announces HP Workstation Z integration

We have a feeling graphics artists are going to be begging their studios for Fusion-io's latest ioFX super-SSD. After receiving critical acclaim for its 460GB version, the company has today introduced a massively-speced 1.6TB variant at NAB. Despite the space increase, the new unit is not bigger than its older sibling. In related news, HP has also signed on to integrate ioFX into its HP Z 420, 620 and 820 all-in-ones, and it'll also give current workstation owners the option to simply add the card to their existing machines. Fusion won't be releasing any details about pricing for the 1.6TB ioFX just yet -- that'll remain under wraps until its released this summer. For now, movie makers can net the 460GB one for $2K (about $500 less that its release price).

Tuesday, February 12, 2013

ALERT! UPnP vulnerability leaves millions of devices exposed to attack

Security-Alert

del.icio.us Tags: ,,

WARNING! This is not a joke, or a scam, people. Please inform your friends, and family.

Here's how to check and see if you are safe:

Step 1) Go to www.grc.com

Step 2) click on Services in the menu, and select ShieldsUP!

Step 3) on the next page click the "Proceed" button

Step 4) Click on the "GRC's Instant UPnP Exposure Test" button

Step 5) Depending on the result, you will be instructed if any further steps need to be taken. (I was safe) All of you should do this A.S.A.P.

ALERT!     hot

http://www.klocwork.com/blog/embedded-software/universal-plug-and-play-vulnerabilities-leave-millions-of-devices-exposed/

https://protect.iu.edu/blog/2013/02/08/upnp-vulnerabilities-network-devices

http://www.symantec.com/connect/articles/microsoft-upnp-universal-plug-and-play-vulnerability

Tuesday, February 5, 2013

Intel shrinks its SSDs, aims for tablets, smartphones

del.icio.us Tags:

Intel's new Solid-State Drive 525 packs performance identical to a standard 2.5-inch SSD into a device one eighth of the size, according to the company.

The SSD 525 Series comes in 30GB, 60GB, 90GB, 120GB, 180GB, and 240GB sizes, and uses the same 25nm memory architecture as Intel's larger solid-state options. The drives use mini-SATA connectors, which allow them to be plugged into smaller PCIe slots common to notebooks while still providing a full SATA 6GB/s data rate.

The 120GB and 180GB models are already shipping, and Intel has promised that the rest of the drive sizes will be available within the quarter.

Entree into the tablet/smartphone market?

The diminutive new line could help raise Intel's profile in the mobile marketplace—despite its desktop and laptop dominance, the company has not seen its processors widely used in smartphones and tablets, and could benefit from an improved reputation among mobile OEMs.

Intel also hopes that the SSD 525 line will appeal to embedded device makers, for applications like digital signage and in-flight entertainment.

Intel says that the SSD 525 series offers 50,000 I/O operations per second of random read speed and 550MB/s of sequential read, as well as 80,000 IOPS random write and 520MB/s sequential write—the same numbers as the larger SSD 520 series.

Independent testing by noted review site AnandTech found that the SSD 525 line was "almost equal" to the best of the full-size solid-state drives currently on the market.

Thursday, January 17, 2013

Turn your flash drive into a portable PC survival kit

del.icio.us Tags: ,

If you're using your flash drive as a vehicle for simple file transfers, you’re missing out on one of the single-best roles one of these wee data buckets can fulfill. Indeed, hardcore enthusiasts know that simple flash drives are perfect portable repositories for all the software that can breathe life into an otherwise ailing PC.

All the web apps in the world won’t help you when your PC breaks down or falls prey to a particularly nasty piece of malware and refuses connect to the Internet. A properly loaded USB drive, on the other hand, can be a machine saver. And when your grandma calls with a dire PC emergency, you'll be glad to have an always-ready "ninja drive" to slip into your pocket as you run out the door.

In this article we’ll show you how to load out a USB drive with everything you need in case of a PC emergency. So next time your computer breaks down, don’t panic. Instead, take a deep breath, plug in your ninja drive, and start making things right.

PortableApps

The Portable apps UI.

The first thing you’ll want to install on your drive is PortableApps—a free, open source platform for installing desktop applications on removable media, like a USB drive. PortableApps manages the installation of new portable software on your USB drive, and also acts as a frontend when you’re actually using the USB drive, letting you easily browse and launch applications.

PortableApps maintains a list of hundreds “portable” versions of popular free programs, designed to work without installation. You can find the full list here.

Each of the following apps with the word “Portable” in their title is available for the PortableApps platform. You can download them at the links provided, or just start PortableApps and click on Apps > Get More Apps. You’ll see a large list of applications appear. Just check the ones you want and click Next to download and install them all automatically.

Chrome Portable

Even though it’s not a maintenance application, strictly speaking, a mobile browser is a great inclusion on your emergency thumb drive. Why? A lot of malware targets your web browser, so it’s one of the most likely components of your system to be out of commission, or otherwise compromised. Chrome's sandboxing security feature and Safe Browsing functionality—which guards against malicious websites and downloads—make it one of the better options for mucking around on a potentially infected system.

Spybot Search and Destroy Portable

Spybot ain't fancy, but it works well.

If your computer is running slow because of malware, Spybot S&D should be the first (and often last) weapon in your arsenal. It’s one of the oldest and best spyware removal suites around, and should be able to weed out most malware on even the slowest of machines.

ClamWin Portable

ClamWin is a Windows graphical interface for the Clam open source antivirus engine. It doesn’t provide real-time scanning like you’d get in an installed antivirus application, but the portable versions provides powerful on-demand virus scanning for any suspicious files.

Malwarebytes

Many unofficial tech support geeks consider Malwarebytes to be a go-to malware scanning solution, but it doesn't offer a portable version. You can, however, save the Malwarebytes installation file to your emergency drive and unpack the app directly onto the maligned PC after you've taken a first pass at badware using ClamWin and Spybot portable. A second opinion never hurts when you're dealing with viruses.

Kaspersky TDSSKiller

When you need to root out stubborn malware, a rootkit detector does the trick.

If you’ve tried running malware removal programs like Spybot Search and Destroy but your computer is still exhibiting malware symptoms like bogus error messages and browser hijacking, you might be dealing with a rootkit. Rootkits are designed to conceal malware running on your system, and can be very hard to detect themselves. If you suspect your computer might be infected with one, try running TDSSKiller, a rootkit scanner from Kaspersky. Just leave the .exe file on your thumb drive, and run it on the infected computer—it will find and remove most rootkit malware.

FileAssassin

Even if you’re not trying to uninstall whole programs, deleting files can prove to be a challenge—especially when you're dealing with an infected system. Windows might tell you that access is denied to a file, or that another program or user is currently using it, or otherwise tell you that the file you want gone isn’t going anywhere at all.

FileAssassin lets you get around those roadblocks, and delete any file you want. Make sure you really want it gone, though, because it’s going to be.

When you snag the program, make sure to grab the portable version, at the bottom of the download list.

Eraser Portable

Sometimes the problem isn’t that you can’t delete a file, it’s that you want to make sure that it’s really, really gone. If you need to securely delete sensitive documents or files, use Eraser—an application for securely erasing and overwriting files and directories stored on standard mechanical hard drives. You can also user Eraser to overwrite all the empty space on a disk, making sure anything you’ve deleted in the past is truly gone.

Revo Uninstaller Portable

Revo Uninstaller makes uninstalling lots of programs a breeze.

One of the simplest ways to get a gridlocked computer running faster is to remove programs that you don’t need. This has two benefits: you clear up hard disk space, which can speed up your computer, and you reduce the number of apps running at startup, which can make your boot time shorter. You can uninstall programs by hand, but that’s slow going and the programs aren’t always completely removed. Instead, keep a portable copy of Revo Uninstaller handy to quickly and completely uninstall as many programs as you want.

Autoruns Portable

One of the main reasons that older systems gradually slow down is the accumulation of programs and services set to automatically run at startup. Autoruns is a powerful app from Sysinternals that shows you every single process that will start with your computer, along with other common sources of trouble, including browser toolbars and shell extensions. Telling a process to not run at startup is as simple as unchecking a box.

KeePass Portable

If you use KeePass to store your passwords (and if you don’t, you should think about it), it’s not a bad idea to keep your KeePass install and password database on a thumb drive. That way, you’ll always be able to access your online accounts, no matter what computer you’re on. Even better, you don’t have to worry about identity theft if you lose the USB drive, because the Keepass database is encrypted and requires a master password. Be careful about logging in to potentially infected computers with KeePass, though.

The other USB drive: SystemRescueCD

SystemRescueCD: Perfect for that oh-so-bonked PC.

If you want to be really, truly prepared for a PC disaster, you can go one step further than just creating an emergency app thumb drive. By loading up a second drive with a Live install of the SystemRescueCD operating system, you’ll be prepared even if your computer’s OS is so FUBARed that you can’t even log in.

SystemRescueCD is a free live operating system, meaning you don’t have to install it on a hard drive. Just insert the SystemRescueCD USB drive into the computer, restart, and boot from the thumb drive. The Linux-based operating comes equipped with software that you can use to access the data on your hard drives and back it up across the network, along with various other handy-dandy utilities—basically, everything you need to fix (or at least recover) as much of your broken OS as possible. The makers of the distribution were even kind enough to provide step-by-step instructions on how to get a SystemRescueCD live drive up and running.

Saturday, December 29, 2012

Velocity Solo X2 review: Teach an old PC new SATA 6-gbps tricks

del.icio.us Tags: ,

Jon L. Jacobi

del.icio.us Tags: ,,

If your PC lacks a SATA 6-gigabits-per-second interface, you can't get top performance out of any of the latest consumer-grade solid-state drives. Such drives bump up against the 6-gbps limit of that bus, while the older second-generation SATA interface maxes out at just 3 gbps. Apricorn's Velocity x2 should remove that roadblock for you.

My main system sports a circa-2009 Intel D58SO motherboard. It has a great feature set, but it predates third-generation, 6-gbps SATA. The only way to upgrade such a beast is via a PCIe adapter card with a SATA 6-gbps interface, of which the market has plenty to choose from. I tried installing one of those a couple of years ago, but it gave me blue screens. SSDs at that time weren’t nearly as fast as they are today, so I saw no real reason to upgrade. But with SSD performance now topping 600 MBps, it’s time.

Lo and behold, Apricorn contacted me about its Velocity Solo PCIe cards. These will not only add SATA 6-gbps capability to any system with an available PCIe slot, but they’ll also serve as a caddy for a single SSD. Apricorn sent two cards for me to evaluate: the $50 Velocity x1 and the $99 Velocity x2. I tried both, and recommend one.

Apricorn's Velocity Solo x2 will endow your older computer with two SATA 6-gbps interfaces. You can bolt one 2.5- or 3.5-inch SSD right to the card.

A 6 gbps Kingston HyperX 3K drive attached to my motherboard’s second-generation SATA interface read data at 227 MBps and wrote data at 236 MBps while running the synthetic benchmark CrystalDiskMark 3. Surprisingly enough, a much faster OCZ Vertex 4 SSD mounted on the Velocity x1 delivered slower performance: It read at only 203.3 MBps and wrote at 196.5 MBps.

When I paired the Vertex 4 with Apricorn’s Velocity Solo x2 card, however, the SSD's numbers jumped to 348.1 MBps reading and 323.2 MBps writing—a substantial improvement beyond what is possible with the second-generation SATA interface. Attaching the Kingston HyperX 3K to the Velocity Solo x2, meanwhile, improved its numbers to 322.1 MBps reading and 239.6 MBps writing. That considerably faster read performance made my system feel much more responsive.

The reason for the two cards’ performance disparity is that the x1 uses only a single PCIe 2.0 lane, while the x2 employs two lanes (and must be installed in at least a PCIe 2.0 x2 slot as a result). Since each PCIe 2.0 lane is capable of transferring data at 500 megabytes per second (or 3.9 gigabits per second) in each direction, two PCIe lanes are necessary to satisfy the requirements of the SATA 6-gbps interface. Both Velocity Solo cards are outfitted with a standard female SATA connector for attaching a second drive, and both cards are bundled with Apricorn’s EZ Gig software for cloning your existing hard drive to your new SSD.

I can't recommend the Velocity Solo x1, as the SSDs I mounted to it performed more slowly than they did when connected to my motherboard’s second-generation SATA interface. The Velocity Solo x2, on the other hand, delivered a dramatic improvement, both during testing and subjectively. My only real qualm is the x2's $99 price tag, which is steep compared with the cost of some SATA 6-gbps interface cards (such as the Syba HyperDuo) that don’t have the handy mounting caddy. The lowest street price we could find as of December 18, 2012, was $95.

Note: Don't miss our SSD roundup, where you'll find a detailed explanation of how SSDs work, plus links to reviews of seven new models as of December 18, 2012.

Apricorn Velocity Solo X2 SATA 6Gbps SSD Upgrade Kit

3/5

$95*

COMPARE

View full product specs »

BOTTOM LINE

If your PC doesn't have a SATA 6-gbps interface, this device adds it, caddies one drive, and let's you attach another via a cable.

*Price when rated

$95

PROS

  • Adds SATA 6-gbps capability to older desktop motherboards
  • Caddies a single SSD
  • Includes a second 6-gbps interface to host another drive

CONS

  • Expensive
  • Requires at least a x2 PCIe slot

Thursday, December 27, 2012

How to activate Windows Defender in Windows 8

 

del.icio.us Tags: ,
Brad Chacos@BradChacos

Like every new Windows release, Windows 8 is more secure than the operating systems that came before it. That's due in large part to three major enhancements: An increased emphasis on UEFI Secure Boot optimizations, the extension of the SmartScreen Filter across the operating system, and the default inclusion of a more robust version of Windows Defender, which now protects against all kinds of malware—not just spyware.

Windows Defender's increased scope doesn't sit well with computer manufacturers, however. OEMs make beaucoup bucks by installing those trial versions of McAfee, Norton and other security suites you'll find bundled on boxed PCs. Windows Defender's default installation threatens that gravy train.

Microsoft tossed its partners a bone by allowing OEMs to deactivate Windows Defender in order to ship boxed PCs with alternative security solutions installed. That's all well and good from a "variety is the spice of life" perspective, but one side-effect that isn't so hot is what happens when you fail to register that third-party security software: Windows 8 doesn't automatically reactivate Windows Defender by default. In other words, your pretty new prepackaged PC is wide open and vulnerable to all the nasties of the 'Net.

Fortunately, activating Windows Defender is a snap. Here's how to do it.

Activate Windows Defender in Windows 8

Windows Defender isn't subtle about being deactivated.

First, head to the modern-style Start screen and type "Windows Defender" to have Windows search for the program, then click on the Windows Defender icon when it appears in the results. A Windows Defender window will appear on the classic desktop. If Microsoft's security software is disabled, you'll seen a lot of scary red tones alongside an "At risk" warning and an image of a computer screen with a big X on it. Subtle, eh?

Next, click on the Settings tab at the top of the window. Make sure "Real-time protection" is selected in the left pane, then check the box next to "Turn on real-time protection (recommended)." Finally, click Save Changes at the bottom of the Window.

How you want your Settings tab to look!

You'll know it worked when the terrifying red "At risk" bar at the top of the Windows turns a much more soothing shade of green and switches to "PC Status: Protected."

Check for leaks

You're not quite done yet. Now it's time to make sure your PC is actually malware-free! Click the Update tab, then click on the big Update button in the middle of the Window to download the latest malware definitions Microsoft has on file.

Next, open the Home tab and select the "Full" radio button in the Scan Options list. All you have to do now is click Scan Now, then sit back and wait while Windows Defender checks the nooks and crannies of your PC for any hidden baddies. Grab a cup of coffee; it may take some time. While you're waiting, we recommend checking out your Windows 8 antivirus options.

Monday, July 23, 2012

Asus ET2701 INKI Review: A Multipurpose Media Machine

Asus ET2701 INKI  

del.icio.us Tags: ,,,
Asus ET2701 INKI Review, by Alex Cocilova July 9, 2012

We get lots of functional, pretty all-in-one desktops through the PCWorld Labs, and the ET2701 INKI is Asus's latest entry. This high-definition, 27-inch system, priced at $1299 (as of 7/9/2012), is equipped with one of Intel's newest and fastest processors plus a discrete Nvidia graphics chip.

The Core i7-3770S CPU runs at a 3.1GHz base clock frequency, with Intel Turbo Technology kicking it all the way up to 3.9GHz when needed. That’s plenty fast for any desktop, let alone an all-in-one machine. Asus coupled that with an abundant 8GB of DDR3-SDRAM, making applications open quickly. I love seeing all-in-one desktops with a discrete graphics chip, even if it's a midrange mobile one. The ET2701 INKI uses the Nvidia GeForce GT 640M GPU with a gigabyte of video memory on board. It ran through our Dirt 3 and Crysis 2 benchmarks on high settings at a maximum resolution of 1920 by 1080 pixels and scored an average of 41.3 frames per second in Dirt 3 and 19.1 fps in Crysis 2. While Dirt 3 is playable at that rate, the more-demanding Crysis 2 appears choppy and constantly skipped frames.

The holy grail for gamers is the coveted 60 frames per second (or more), and the Asus ET2701 INKI manages to achieve that rate in both games by sacrificing resolution and graphics levels. The frame rate for Dirt 3 jumps to 77.5 fps when lowering the resolution to 1024 by 768 pixels. When we changed the settings to low and kept the resolution at 1920 by 1080, it managed 76.2 fps. For Crysis 2, we had to sacrifice everything, setting the graphics to low and the resolution to 1024 by 768 pixels to achieve 62.4 fps. While the Asus ET2701 INKI may not be designed with gamers in mind--hard-core gamers, at any rate--it still manages to get the job done.

The Asus ET2701 INKI scored 111 on our strenuous WorldBench 7 benchmark suite. This means that it’s 11 percent faster than the baseline test-bed system. It’s impressive anytime a large, thin all-in-one can outperform our full-size desktop test bed. Fitting all those powerful components into a sleek, single package that fits in a chassis the size of an LCD screen is no easy feat.

No Touching

Though the screen is large and crisp with its 1920-by-1080-pixel resolution (making it suited, by definition, to 1080p video), it lacks any touch support, even though the release of Windows 8 is on the horizon. Given that Win 8's Metro interface emphasizes touchscreen features, it’s imperative that new systems take advantage of touch going forward. With touchscreen tablets so popular in the device market and Microsoft's own Surface tablet set to run Windows 8's Metro, desktops must have touchscreens to stay on a par with such competition. Also, a few gimmicky touchscreen games can really pique some consumers' interest.

On the plus side, not being a touchscreen means less cleaning. The black border of the ET2701's screen is a fingerprint magnet and will get smudged as you tilt or move it. The menu and mode-select buttons are touch sensitive, so you don't even need to push them for activation. A slight graze will send your computer searching for HDMI input or will open the menu. The screen itself looks good from most angles (Asus claims 178 degrees of vertical and horizontal viewable angles), but it is very reflective when under direct light.

The system comes with a single 7200-rpm, 2TB hard drive split into two partitions: a small one for the Windows 7 Home Premium operating system and a few programs, and a second partition labeled as a data drive. Such a split feels unnecessary, especially since everything is already on a single drive. Since programs naturally install to the C partition, which quickly fills up and causes low disc space warnings, I anticipate some confusion and frustration for casual PC users.

The ET2701 is well connected all around. It has the typical gigabit ethernet adapter and wireless 802.11n connection. The addition of Bluetooth is nice for connecting applicable devices without having to use up the scarce USB ports.

The system has a total of five USB ports: two USB 3.0 ports and an eSATA/USB 2.0 one on the side, plus two USB 2.0 ports on the back. This is far too few, especially since the dongle for the wireless mouse automatically takes up a slot. Other ports are an SD card reader, VGA (input only), an antenna, and an HDMI-in for hooking up a game console or media device. Including an antenna and an HDMI port is becoming common for many all-in-ones, as it supports the notion that they are not only PCs, but desktop televisions as well. It's great to kill two birds with one stone and get a completely functional television, but the lack of any kind of video output means no support for dual displays. On the other hand, Asus has included a Blu-ray optical drive, a great amenity on these high-definition, media-centric machines. An included wireless mouse and keyboard keeps the desk mess to a minimum. Finally, the all-in-one standard webcam and integrated microphone are included for online calls.

Boosting Bass

Asus throws in its SonicMaster Subwoofer to provide better sound at higher volumes. It has its own special port on the side that is designed especially for the subwoofer, and a removable sticker protects it to make sure you know it’s proprietary. The subwoofer resembles a UFO and is large enough to be a prominent object on any desk. It indeed boosts volume, making even the halfway mark seem loud, and it helps the ET2701 INKI transcend other similar desktops when people are choosing a media-centric PC, because good sound is certainly considered part of the high-definition experience.The 'UFO' at lower left is Asus's SonicMaster Subwoofer.

The HP Omni 27 101-T seems nearly identical to the Asus E2701 INKI in its components. They have the same screen size and same hard-drive capacity, and the graphics card and processor are near-equivalent. The Asus runs a bit stronger with its Core i7 instead of the Core i5 that the HP has; however, the Asus is over $200 cheaper (the HP is priced at $1549). The HP does have an extra USB port and a minimally better Worldbench 7 score at 115 (versus the Asus's above-mentioned 111), due to slightly faster hard-drive processing. But you would miss out on the Blu-ray drive, the extra powerful processor, and the slightly smoother gameplay of the Asus, not to mention a couple of Benjamin Franklins from your wallet. These advantages make the Asus is a home run in comparison.

The Asus's configuration is also similar to that of the Dell XPS One 27, though the Asus is priced lower. The Dell fares a bit better on WorldBench 7, and it ships with 2GB of video memory. What really differentiates the two is the Dell’s higher resolution: 2560 by 1440 pixels, compared with the more-standard 1920 by 1080 pixels of the INKI.

The Asus E2701 INKI is an excellent media machine, especially for such a low list price. You will no doubt get your money’s worth in terms of a computer, a good if less-intensive gaming machine, and a high-definition television. If you are a media maven to whom a touchscreen seems to be an unnecessary gimmick, this Asus may be a great fit.