Featured Stories
Download: AMD Software Adrenalin 23.5.1 WHQL drivers
AMD has recently launched the latest version of its Adrenalin graphics drivers. While the change-log does not include support for the newly released Radeon RX 7600, it does introduce optimizations for the game "The Lord of the Rings: Gollum."
Read moreReview: AMD Radeon RX 7600 8GB
AMD unleashed its mainstream proposition, which we review, the Radeon RX 7600 is aimed at gamers with a Full HD monitor. An 8GB product that is aimed at a low-resolution usage, but is priced $269, will it be worth it?
Read the review here.
Download: NVIDIA GeForce drivers version 532.03 WHQL
The latest Game Ready Driver has been optimized for new games utilizing DLSS 3 technology, one of which is The Lord of the Rings: Gollum.
Read moreReview: NVIDIA GeForce RTX 4060 Ti 8GB (Founders edition)
Our review of the GeForce RTX 4060 Ti Founders Edition showcases its performance, making it a contender within the mainstream 1080P range. However, the price of this graphics card is high, coming in at $399 USD for the most simple 8GB version.
Read the review here.
Version 4.6.5 of MSI Afterburner now available for download
We released version 4.6.5 of MSI Afterburner, the popular overclocking and hardware monitoring software. The new version includes support for several new graphics cards, CPUs, and monitoring features.
Read moreCurrent Stories 
Transcend launches High-Speed 64GB 2.5 SSD
Transcend today released its all-new high speed 64GB 2.5-inch Solid State Disk (SSD) for consumer electronics as well as industrial systems and military applications. Transcend
NVIDIA Medusa technology demo download
With each launch of a major new GPU, NVIDIA will release a technology demo which is designed to showcase the power of its new graphics chips. It creates some early excitement for their upcoming product.
Check this one out, one of the best tech demo's ever made.
Download - Click here
Quantum crypto targeted in attack of the clones
Japanese researchers have put another dent in Quantum cryptograpy's reputation as the final word in secure communications.
Transmissions sent using the technique are protected from
eavesdroppers by the fundamental rules of quantum physics, at least in
theory.n practice, implementation weaknesses can leave a narrow door for
attackers, and Japanese boffins have developed an idea for a quantum
eavesdropping device that can exploit one such weakness.
Quantum cryptography is designed to allow users to exchange secret
keys. The polarisation of individual light photons determines one bit
of a key. The rules of quantum mechanics mean that any attempt to
intercept this data irreversibly alters it.
Because of this effect, any attempt to eavesdrop a key would be detected as a unacceptably noisy communications path.
The loophole exploited by Japanese boffins is that it might be
possible to make a partial copy of a quantum key without tripping an
alert that a communications path has been compromised. This partial
copy might be used in subsequent cryptoanalysis. The technique relies
on constructing an optical cloning circuit and a measuring device, as
explained in a paper by the researchers here (pdf).
Boffins led by Yuta Okubo at the University of Tskuba in Japan have
not yet built a device that implements the approach. Nonetheless the
research is a concern for banks and government agencies that bought
quantum cryptography systems in the belief they were inherently secure.
The Japanese research follows an earlier study by boffins in Sweden
examining another practical shortcoming with quantum cryptography
systems. As previously reported,
the weakness identified by the Swedish team involved shortcomings in
how systems verify that the content of a message has not been altered
in transit.
Stunned commuter finds more secret papers on train
Are governments trying to instigate fear for more control or what is going here? (imo)
Whitehall was left combing its season ticket loan records this
weekend as another set of top secret papers did the rounds of the
5.45pm from Waterloo.
Just days after a Cabinet Office worker left a stack of top secret
anti-terrorist papers
NVIDIA GeForce GTX 280 review
NVIDIA GeForce GTX 280 review
Today Guru3D brings you a review and test on the GeForce GTX 280. NVIDIA launches this new flagship along with the GeForce GTX 260. In this review you can read all you need to know about them. And yes, the rumor was right; 1.4 Billion transistors slapped onto a piece of silicon. Crazy, but oh so much fun. We finally found a product that can play Crysis at a decent resolution with high-image quality settings.
Be sure to check out the review, which you can find right here:
NVIDIA nForce Driver 15.17

The included binaries are:
- Ethernet Driver (v67.80) WHQL
- SATAIDE Driver (v10.3.0.21) WHQL
- SATARAID Driver (v10.3.0.21) WHQL
- RAIDTOOL Application (v10.3.0.21)
- SMU Driver (v1.45) WHQL
- SMBus Driver (v4.64) WHQL
- Installer (v5.93)
Download :
nForce Driver 15.17 - XP 32-bit
nForce Driver 15.17 - XP 64-bit
nForce Driver 15.17 - Vista 64-bit
nForce Driver 15.17 - Vista 32-bit
Thanks go out to forum visitor Applejack who reported the new updates. We have a discussion thread open on these drivers right here.
AMD FireStream 9250 breaks one teraflop barrier
AMD today introduced its next-generation stream processor, the AMD FireStream 9250 at the International Supercomputing Conference. AMD FireStream 9250 is specifically designed to accelerate critical algorithms in high-performance computing (HPC), mainstream and consumer applications. AMD FireStream 9250 breaks the one teraflop barrier for single precision performance. It occupies a single PCI slot, for unmatched density and with power consumption of less than 150 watts; the AMD FireStream 9250 delivers an unprecedented rate of performance per watt efficiency with up to eight gigaflops per watt. The AMD FireStream 9250 stream processor includes a second-generation double-precision floating point hardware implementation delivering more than 200 gigaflops, building on the capabilities of the earlier AMD FireStream 9170, the industry
Rise of the Argonauts - Full Motion Video
Auzentech HDMI 1.3 PCI Express Audio Card
Auzentech reveals today its non-downsampling, HDMI 1.3-native, PCI express audio combo card: Auzen X-Fi HomeTheater 7.1. The Auzen X-Fi HomeTheater 7.1 accepts video from either an internal or external connection, mixes it with digital audio, and outputs the combined video and lossless multichannel audio via a single HDMI
Guru3D Driver Sweeper 1.5.5 download released
Guru3D - Driver Sweeper is a fast tool to remove driver leftovers from your system. Driver Sweeper is very easy to use. You only have to select the drivers you want to clean.
The best way to clean drivers is to first uninstall the drivers using the official uninstallers, reboot in Safe Mode and run Guru3D - Driver Sweeper. However, rebooting and not going into Safe Mode also works, but can cause some files not to be cleaned.
What can it be used for ?
The current supported drivers are NVIDIA (Display and Chipset), ATI (Display), Creative (Sound), Ageia (PhysX), MMouse and Realtek (Sound).
All the settings are saved in an ini file. Nothing is created in the registry, so it's possible to use it as a portable program. Log files can be saved to the harddisk and viewed as well. You can find the logs under the Tools menu.
System requirements:
The Guru3D - Driver Sweeper is fully tested on Windows 2000, XP and Vista. Both 32-bit and 64-bit versions are supported.
More info and revision history can be found here:
- Official Guru3D - Driver Sweeper homepage click here.
- Official Guru3D - Driver Sweeper forums click here.
Download:
Today is that time ... article 1 out of 3

Soon ...
Network Status Sunday 15th - A little Downtime
Earlier this morning we had we've been offline for a little while. This was not related to our server farm yet due to a problem at our host. Once the problem was detected support staff went to the datacenter and discovered that one of the optical glassfibers was not passing thru data.
The passive backupline was activated and everything popped back on-line. The issue has thus been resloved.
My apologies for the downtime folks !
OCZ Diesel USB drives released
OCZ
Core 2 Quad Q8200 Information Revealed
Intel is planning to launch a Core 2 Quad Q8000 CPU series, offering entry-level prices to counter AMD's triple-core CPUs in the mainstream market, according to sources at motherboard makers.
Intel will launch the Core 2 Quad Q8200 in the third quarter this year, supporting FSB up to 1333MHz, L2 cache of 4MB and a core frequency of 2.33GHz. Pricing will be set around US$203 in thousand-unit quantities
In order to separate the Q8000 series from Intel's Q9000 CPU family, the Q8000 CPU series will not support Intel's VT and TXT technology.
Disgruntled admin gets 63 months for massive data deletion
An IT manager who sought revenge for an unfavorable job evaluation
was sentenced to more than five years in federal prison after being
convicted of intentionally triggering a massive data collapse on his
former employer's computer network.
Jon Paul Oson, 38, of Chula Vista, California, was sentenced to 63
months behind bars and ordered to pay more than $409,000 in
restitution, according to federal prosecutors in San Diego. He was
immediately taken into custody after the sentence was handed down on
Monday. It is one of the stiffest penalties ever for a computer hacking
offense.
Oson was hired in May 2004 as a network engineer at the Council of
Community Clinics in San Diego, a nonprofit that provides various
services to 17 regional health clinics in Southern California. He
performed well in that role and five months later was promoted to
technical services manager. He ended up bitterly resigning a year later
after a performance evaluation cited interpersonal difficulties,
according to court documents.
On December 23, Oson logged onto servers belonging to his former
employer and disabled the program that automatically backed up medical
records for thousands of low-income patients. Six days later, he logged
on again, and in the span of 43 minutes, methodically deleted the files
containing patients' appointment data, medical charts and other
information.
The dollar cost of Oson's rampage was pegged at $409,337.83 and
accounted for expenses for technical investigations and moving to a
paper-based system in the weeks following the attack. But the real toll
came when doctors at North County Health Services no longer had medical
records for thousands of low-income patients who sought medical care.
North County Health Services contracted with Oson's employer to store
the records.
Health threat
By destroying the records, Oson threatened the health of patients
who visited the clinic immediately after the attack, prosecutors
argued. They cited two examples, including a nine-year-old who had been
diagnosed with an ear infection several days before Oson's rampage.
When he returned a few weeks later, doctors had no record of the
previous diagnosis, and they also had no idea he was due for a routine
physical exam.
"Patients who visited the clinic in the weeks following the network
disruption were kept waiting hours and sometimes futilely while their
charts were located and delivered to the appropriate clinic and
doctor," prosecutors said in court documents. "With the shutdown of its
Practice Management system, NCHS had to shift to a paper-based system."
After ransacking his former employer's network, Oson took pains to
cover his tracks. When FBI agents raided his home in May 2006, they
found all but one of his PCs had been wiped clean, irretrievably
destroying data that might have shown he was behind the attacks.
But Oson slipped up and left other clues. One was an HP 2100
LaserJet printer he kept at his home and another was an HP LaserJet 4M
printer physically located near the workstation Oson used at his new
job.
It just so happened that in the weeks leading up to the data
meltdown, an intruder had cased the network by logging in from at least
three different machines. One was a computer named "TEMP3" that was
equipped to work with an HP 2100 LaserJet printer. A second PC happened
to contain drivers for the HP 2100 and a LaserJet 4M.
Even more incriminating, the nickname of this second PC was "kuku"
and one of the printers it was configured to work with was named
"mike2003 HP Laserjet 4M". That just happened to match the name of
Oson's son and the network name of the printer sitting by his
workstation.
"At the sentencing hearing, the court talked about the impact of
Oson's actions and his arrogance," Assistant US Attorney Mitchell
Dembin, who prosecuted the case, wrote in an email to The Reg.
"The court said that Oson seemed to think that he was the smartest guy
around but, as often happens, he ran into someone smarter (the FBI)."
Win an exclusive Alone in the Dark Shuttle XPC system
[QUOTE]To mark the release of the new title, Shuttle, in co-operation with ATARI, is running a great competition. Up for grabs is a Shuttle XPC in exclusive Alone in the Dark design, which more than caters for the game
Always read the small print...
"Licensee also agrees that Licensee will not use the Apple Software for any purposes prohibited by United States law, including, without limitation, the development, design, manufacture or production of nuclear, missiles, or chemical or biological weapons."
It must take a creative terrorist to convert iTunes into a weapon, although perhaps the American military has set a precedent. It allegedly found that prisoners quickly spilled their terrorist secrets when made to listen to Neil Diamond records.
The iTunes EULA demonstrates that there are interesting things to be found buried deep within all of that legalese. Just ask Doug Heckman, a man who decided to read a PC Pitstop program EULA before he installed the software. That agreement included a clause offering 'financial compensation' to licensees who read the license agreement. Heckman emailed PC Pitstop and was promptly rewarded with a cheque for $1000.
Soldier thought hitman site was online joke
An Irish soldier has told the Ennis conspiracy to murder trial that
he filled out an application form on a website called Hitman for Hire
because he thought it was an internet joke.
23-year-old Brian Buckley from Finglas is giving evidence in the trial of Sharon Collins and Essam Eid.
Ms Collins denies hiring Mr Eid through the internet to kill her partner PJ Howard and his two sons.
Mr Buckley described to the Central Criminal Court that he had been
on his mother's computer in 2006 looking for cheats for a computer game
called Hitman when he came across a website called Hitman for Hire.
He clicked on the website and was shown an animation of a cartoon
hitman - a man wearing sunglasses and holding a pistol. He said he
never once considered it was real - he thought it was an internet joke.
He filled out a recruitment application form on the site 'out of
curiosity and stupidity', he said. He gave a fictional list 'the length
of his arm' of his weapons skills on the site and gave a false name.
He wrote on the form that he could use a handgun, rifle submachine
gun, grenades, and had experience of basic booby traps and limited
poison making experience. He later got a number of emails and phone
calls from someone calling himself Tony Luciano, whom the prosecution
allege is Essam Eid.
'Tony Luciano' said he had a job for Mr Buckley: 'Two males in
Ireland, one in Spain, as soon as possible. Let us know. We will try to
phone you.' Another email asked for Mr Buckley's help in getting some
strong poison - it said one of them would be at Shannon and could not
import it into the country. And he promised to pay.
Mr Buckley said initially he thought it was a joke and was curious
to see what it was. But he became uneasy about the whole situation. He
got a few phone calls from 'Tony' and fobbed him off telling him he had
the wrong number.
He said he wanted to stay as far away as possible from the whole
thing. He felt it was getting serious and did not want to have anything
to do with it. He said in the end he did not see it as a joke but did
not see it as serious either - it just seemed odd.