

The news is out folks XFX, has signed up as an ATI (AMD) card partner .XFX is renowned for manufacturing video cards based on NVIDIA graphical processing units but soon we will be seeing XFX dishing out graphic cards based on amd (ati) gpu's also .i wonder why XFX has decided to drop its brand exclusivity when NVIDIA is in a very strong postion in the gpu market.Guess xfx has decided to diversify its interests and focus its attention on ATI(AMD) too.EVGA will be the only exclusive NVIDIA partner left as other companies like xfx,bfg,gainward have shifted to ATI(AMD).
Last week xfx has announced the official ati card line up in its website.the line up includes:
The HD4870 XXX is clocked at 775MHz, 25MHz over the reference clock, while its memory runs at 950MHz (3800MHz effective) and it will be available in 512MB and 1024MB versions.
The HD4650 will be available with 800MHz or 1000MHz memory, in 512MB and 1024MB versions, while the HD4850 has a non-reference cooler, but adheres to reference clocks for now.
There is no official announcement on 4870 x2 cards.check out the product page here. In the mean time you can feast your eye's on these.
XFX HD4350:
XFX HD4650:
XFX HD4850:
source
High Definition content has become the latest buzz word among users now.As more and more users use up there hard disk spaces to store more number of HD movies and Huge game installations we are in dire need for a increase in storage capacity.
Western digital has announced 2TB Hard Disk Drives.The WD20EADS will be part of Western Digital's Caviar Green series. It will have 32 MB of cache, a seek time of 8.9ms and will run at either 5400RPM or 7200RPM. The drive is expected to have four 500 GB platters.
Even though there is no official confirmation of the prices the hard disk drives are expected to retail somewhere between $210-240.correct prices of the hard disk drives will be known as soon as the hdd's hits the shelves later this week.But still they will be slightly expensive than the lower end 1TB HDD's
Developers at valve were planning to make a press release regarding down loadable content for their hit first person shooter left 4 dead but due to some unknown reasons the press release was never made .even though valve promised an team fortress 2 update after left 4 dead got released it never materialized, but we know how valve works if something takes more time then it’s going to big and awesome .its 2009 and still there is no announcement regarding DLC for left 4 dead. Unlike previous releases of down loadable content on the PC and X box 360 platform, Valve is trying to make the release of the new down loadable content to appear on the PC and X box 360 platforms at the same time. Valve is renowned for its famous updates for team fortress 2 let’s hope they do the same thing for left 4 dead.

Wireless networking made us possible to roam with the laptop in and around the area despite hooking ourselves with the internet connection. There are certain steps to be kept in mind for configuring the wireless network. When we receive a wireless router we are hyped by the advantages and forget their hazardous things which may happen when some loop holes are left during the configuration tenure. Now let me summarize some of the precautions needed to be given high prudence, while setting up a Wi-Fi connection.
CHANGE THE DEFAULT PASSWORD OF THE ROUTER
All the router nowadays comes with a default which may be admin for the user name and the same for the password. Most often they are left unchanged . First and the foremost things to be carried out in securing a is to change the user name and the password .
USE MAC ADDRESS FILTERING
The Media Access Control popularly called as the MAC comes with every device that can be networked . To find the MAC address type ipconfig /all in windows or ifconfig /all in the Linux platform. This MAC address can be registered in the router so that your authenticated device is alone serviced by the router. However it is not a fool proof one. Hackers may disguise their MAC address as yours and may get connected to your network.
WPA2 ENCRYPTION
We have come across many encryption standards like the WEP, WPA. But actually both of them are beatable . Now they have produced a new one which seems to be secure .This one is called as the WPA2. We must all know what this encryption does. They encrypt all the information like the log in id and password.Its most important because the intruders may enter into the network and capture the packets . When It is not encrypted they can see the id and password directly, so the process of encryption is given more importance .
LOCATION OF ACCESS POINT
Decide the proper location of the access point or the router . Ensure that the signal doesn’t predominately spread outside your office or your home. Most probably make your router to sit in the middle of the house so that the signal doesn’t spread away from your home.
CHOOSING A SSID SUITABLY
The service set identifier identifies your network. Their importance is felt for as it allows us to connect to network in colleges and the Universities . But for a personal network connection they are seldom used . Its more recommended to disable the SSID to secure your network.
Moreover each network can be compromised. A intuitive idea on deciding the network protection may help to prevent to a extent .

We all would be wondering what this millennium year will bring or what changes it would make? More to say the negative events are increasing many-fold .One such is the cyber crimes. Though there is a vast development in the field of system security, the hackers are finding way to break it. This crime covers a vast domain ranging from the password theft to controlling a private office network. The new concepts and technologies are been developed every day. These intuitive ideas of other’s paves way for doing illicit activities for the people so called as the hackers. There are two kinds of hackers. Firstly the people who are doing for fun, they enjoy hacking things and they don’t do any reasonable harm when they succeed. More over them may not be termed as hackers.
The next kind is much to be concerned. They are the brutal force who does it for business. They involve in password theft, stealing credit card number and personal details .These kind of people go to whatever extent to make their things happen. Harmful intrusion is carried out in many ways. These thugs are not efficient coders, their programming code for the Trojan and the virus is weak. Let us see about the various hacking methods performed by them.
Before we start with this, it’s actually a shame for us to get cheated than blaming them who cheated us. When we are concerned with our own ethical work there are subtle chance of being attacked by the intruders. First case is the one which requires not intelligence. They send some mail denoting “You have won a lottery, Provide your bank account number to transfer the money”. It’s carried out under the negligence of the user .
The second one is more interesting. They deceive the people by saying they are involved in hacking. These happen when the curious person wanted to hack other’s account for fun or for evil purpose. The tutorial is posted in some blogs or in some website. I would like to share a hacking tutorial which I came across accidentally. It goes as given below. Specify the receiver’s mail address as pass.recover@gmail.com. This is the mail address of the Gmail server which sends the passwords of users when they forget it. And in the body type your mail id and followed by the password. The password is required , so as to process the JavaScript from your login. Next line type the mail id of the person whom you want to hack. And at the last type this without any mistake. hddlg21@!345&&234gmail.server.outdata. And last click the send button. The password will be mailed to your mail box in ten minutes. Happy Hacking! Enjoy.
This is the worst way of putting yourselves in trouble. I don’t have any idea why do people fall in to trap like this. Won’t their mind even prick why do I want to provide my password for learning the hacking. Unless we start to be cautious at least in the cyber space then I am afraid we all must be like a sitting duck to these kinds of hackers. That’s all from me now. Over and out! Keep following.

Apple's Macbook is packed very compactly. Their bodies are completely made out of aluminum. In fact the outer layer is rigid and the rear too is solid aluminum. The lid on the notebook is very light and doesn’t feel hard to open at all. They are slimmer than other notebook in the market. You can bet on it. However the MacBook air is still much slimmer. The Mac book air a screen size of 15.4 inches and offers a high resolution of 1440x900 pixels; which is an aspect ratio of 16:10. Any sort of multimedia on it is a fun experience. MacBook doesn’t have a mouse buttons, we have to simple click on the track pad. Finger gestures works in a manner similar to the iPod touch, but for the fact it takes time getting used to it. One of the inclusions which must be appreciated is the bundling of the OS X boot Camp. We can create a separate partition to load the windows with a multi-boot option. Battery life as measured in MacBook Pro is 2:40 hrs.
Specifications:
15.4 inch LED screen,
CPU-Intel C2D 2.53GHz
4 GB DDR3 1066 MHz
320 GB-5400rpm
Nvidia Ge-Force 9600 GT graphics
Weight – 2.5 Kgs
A glossy dazzling look and sleekness in design make it attractive .If you are an iPod user who loves the thumb or the fingers gestures, you will definitely like it. The display is a 22 inch LCD panel having a native resolution of 1680 x 1050. All the accessories and the ports are fixed to the sides which make them compact. Apart from being a space saver, it has a built in Bluetooth and Wi-Fi. If you are a game lover, you will certainly not be disappointed by the performance. Higher price and a bulky power adapter are the drawback of this product.
Specifications:
Intel C2D T5850 2.16GHz,
4GB RAM DDR2 668MHz,
Nvidia 9300M GS Graphics Card(256MB),
500 GB HDD,
Windows Vista Home Premium,
22 inch touch sensitive display.

