Dual Screen Laptop?


The gScreen Spacebook series.

Spacebook planned Specs:
– 2 LED backlit display screens
– Windows VISTA/ WIN XP PRO (optional)
– Intel Core 2 Duo P8400 2.26-GHz
– 4 GB of RAM (2GB DDR2 SO-DIMM x 2)
– 320GB 7200-rpm HD
– NVIDIA® GeForce® 9800M GT with 512MB dedicated memory (or)
– NVIDIA® Quadro FX 1700M Graphics with 512MB dedicated memory
– 9-cell battery
– IEEE 1394 1 Graphics Card Output (15-pin, D-Sub) X 1, HDMI X 1 Mic-in X 1, Line-in x 1, Headphone X 1 PCI Express Card X 1 AC Power Adaptor Output: 19V DC, 90W Input: 100~240V AC, 50/60Hz universal Battery Pack Li-ion 9 cells

100% North American Sales and Tech support for all gScreen laptop computers.
The gScreen Spacebook is the first dual screen laptop with two 15.4-inch identical screens and a full-size keyboard, built into one laptop unit.

* Options, specs, appearance and availability can change without notice.
The gScreen Spacebook series is based on the gScreen G400 design.



DDR1, DDR2, DDR3: Navigating The RAM Maze

DDR1, DDR2, DDR3: Navigating The RAM Maze

DDR1, DDR2, DDR3: Navigating The RAM Maze

By Hal Licino

Choosing the proper DDR-variant for your PC is critical!

Which DDR Is Which? Here Is A Full Guide To RAM.

Many computer enthusiasts know exactly what they want when they go to configure their new system. They’ve researched and picked out a perfectly matching CPU, motherboard and videocard combination that will meet all their needs. However, when it comes to RAM many users become totally befuddled. They generally know how much RAM they need (1GB is the effective operating minimum these days, 2GB if running Vista or using hungry apps like Photoshop), but they don’t have a clue as to what DDR1, DDR2 or DDR3 means.

It turns out that selecting the proper DDR variant is a very important factor that determines how your overall system will perform, thus every enthusiast/prosumer/gamer should be well-advised to learn the basics.

Double Data Rate DIMM is known as DDR-DIMM, DDR DIMM, or most popularly just plain DDR. Double Data Rate interfaces provide two data transfers per differential clock. The data becomes registered when the CK goes high [the + side], and /CK goes low [the – side]. DDR1 utilizes the JEDEC standard for Double Data Rate [DDR I] SDRAM. Like all DDR RAM it is available as registered or unbuffered. Registered DIMMs are generally known as FB-DIMMs and have their address and control lines buffered in order to reduce signal loading. FB-DIMMs are considerably more expensive than unbuffered DIMMs and are generally reserved for server use. There are very few enthusiast/prosumer/gamers utilizing FB-DIMMs in their rigs. Unbuffered DIMMs don’t feature address lines and control line buffering, so they cost quite a bit less. However, they may be system-loading limited and are thus generally restricted in the number that can be fitted onto one system. You’ll find that most unbuffered DIMMs these days can only be installed on one motherboard to a maximum of 4 x 1GB. Buffered or registered DIMMs don’t have these limitations and server boards can accomodate 8 x 1GB, 16 x 1GB or more. An interesting and largely unknown aspect of unbuffered DDR DIMMs is that they are able to operate one clock cycle faster then FB-DIMMs.

DDR2 memory is the second generation in DDR memory. DDR2 begins with a speed level of 400MHz as the lowest available while the 400MHz speed is actually the highest speed for DDR1. Therefore, DDR2 picks up where DDR1 leaves off. It’s a bit strange but due to different latencies a 400MHz DDR1 will outperform a 400MHz DDR2, but the advantage returns to DDR2 as soon as the speed reaches the next step 532MHz, which DDR1 cannot reach.

It follows that DDR3 is the third generation in DDR memory. DDR3 begins with a speed level of 800Mbps (400MHz) as the lowest available. As of March, 2009 (22 months after the rest of this Hub was written) the highest popularly available DDR3 speed is represented by the PC3-16000 Corsair Dominator GT and OCZ Blade Series lines which run at an absolutely blistering 2 billion data transfers per second!!!

Adding to customer confusion is that RAM is often referred to as a DDR-number or a PC-number. (The Revenge of the Geekizoids continues.) Here is a Chart for the various currently common DDRs as of March 2009:

Current DDR2

* DDR2-400. Memory Clock: 100 MHz. Bus Clock: 200 MHz. Data Transfers/Sec.: 400,000,000. Module Name: PC2-3200.
* DDR2-533. Memory Clock: 133 MHz. Bus Clock: 266 MHz. Data Transfers/Sec.: 533,000,000. Module Name: PC2-4200.
* DDR2-667. Memory Clock: 166 MHz. Bus Clock: 333 MHz. Data Transfers/Sec.: 667,000,000. Module Name: PC2-5300.
* DDR2-800. Memory Clock: 200 MHz. Bus Clock: 400 MHz. Data Transfers/Sec.: 800,000,000. Module Name: PC2-6400.
* DDR2-1066. Memory Clock: 266 MHz. Bus Clock: 533 MHz. Data Transfers/Sec.: 1,066,000,000. Module Name: PC2-8500.

Current DDR3

* DDR3-800. Memory Clock: 100 MHz. Bus Clock: 400 MHz. Data Transfers/Sec.: 800,000,000. Module Name: PC3-6400.
* DDR3-1066. Memory Clock: 133 MHz. Bus Clock: 533 MHz. Data Transfers/Sec.: 1,066,000,000. Module Name: PC3-8500.
* DDR3-1333. Memory Clock: 166 MHz. Bus Clock: 667 MHz. Data Transfers/Sec.: 1,333,000,000. Module Name: PC3-10600.
* DDR3-1600. Memory Clock: 200 MHz. Bus Clock: 800 MHz. Data Transfers/Sec.: 1,600,000,000. Module Name: PC3-12800.
* DDR3-1800. Memory Clock: 225 MHz. Bus Clock: 900 MHz. Data Transfers/Sec.: 1,800,000,000. Module Name: PC3-14400.
* DDR3-1866. Memory Clock: 233 MHz. Bus Clock: 933 MHz. Data Transfers/Sec.: 1,866,000,000. Module Name: PC3-14900.
* DDR3-2000. Memory Clock: 250 MHz. Bus Clock: 1000 MHz. Data Transfers/Sec.: 2,000,000,000. Module Name: PC3-16000.

Now which CPU/chipset matches which RAM? It would take an encyclopaedia to list all the CPUs and all the chipsets and their “best-fit” DDRs. Before finalizing your system configuration you should research your CPU manufacturer’s RAM recommendations and fit that exact type of DDR to it. You would be just as foolish in using a PC3-12800 DDR3-1600 with an AMD Sempron 2800+ as you would be to burden down your Intel QX6800 with a PC1600 DDR-200. Every CPU/chipset combo has its proper DDR fit, and you should find out exactly what they are and stick to them. Fitting a slower than recommended DDR to your system will bottleneck critical RAM functions and could slow your otherwise very speedy system to a tortoise crawl.

There are many other factors involved in choosing the right RAM for your rig. Latencies are critical, but the details are too extensive to include here and will form the basis of a future blog. There are also a mind-boggling array of RAM brand names and pricepoints. Generally, you get what you pay for and as long as you are comparing various brands at the same retailer, the price will be a fairly good indicator of quality. Some of the leading manufacturers include:







A couple of more points to remember. First, RAM heat spreaders may or may not be worth the extra cost. I can see that they would be useful only in the tiniest minority of high-load, prolonged-heavy-use situations. Don’t ever touch your RAM (or other PC internal components) without being thoroughly grounded with a good static strap. Static can zap your circuitry before you know it.

If you follow these guidelines and thoroughly research the proper DDR for your system, you’ll be rewarded with years of speedy and trouble-free computing. A bit of prior study is a small price to pay!

Defcon – How to be a wifi ninja

Defcon – Johnny Long No-Tech Hacking

Defcon: Tactial Exploits

Jessica Biel: The Most Dangerous Search Term of 2009

Jessica Biel: The Most Dangerous Search Term of 2009 | Maximum PC

Posted 08/27/09 at 10:27:48 AM by Paul Lilly

And the award for the most dangerous A-list celebrity to search in cyberspace goes to (drum roll)…Jessica Biel! Or so says McAfee, the Internet Security company who has been tracking the most dangerous celeb searches for the past three years. In case you were wondering, Paris Hilton topped the chart in 2007 before being overtaken by Brad Pitt last year.

“Cybercriminals are star watchers too — they latch onto popular celebrities to encourage the download of malicious software in disguise,” McAfee’s Jeff Green said in a statement. “Consumers’ obsession with celebrity news and culture is harmless in theory, but one bad download can cause a lot of damage to a computer.”

McAfee warns that cyber crooks routinely use celebrity names and images to entice surfers into their web of dirty (as in laced with spyware) screensavers, ringtones, and other popular downloads.

Other celebrities making the top 10 list include Beyonce (second), Jennifer Aniston (third, with more than 40 percent of the Google search results for “Jennifer Aniston screensavers” containing malware), Tom Brady (fourth), and Jessica Simpson (fifth).

Malware Evolving Too Fast for Antivirus Apps

Malware Evolving Too Fast for Antivirus Apps – PC World

Malware Evolving Too Fast for Antivirus Apps
Bad guys use sophisticated testing to create malware that can evade even the best security programs.
Erik Larkin, PC World
Monday, December 31, 2007 08:00 AM PST

If you think that the latest security suites afford complete protection against malware attacks, think again. Today’s for-profit malware pushers use dedicated test labs and other increasingly professional techniques to improve their chances of infecting your computer. And the techniques they employ to outpace security software makers appear to be working.

Make no mistake–a good security program can go a long way toward keeping you in control of your system. But PC World’s recent tests of security suites found that new malware easily evaded the applications. In our tests of how well security software blocks unknown malicious programs, the best performer detected only one in four new malware samples. In contrast, February 2007 results from similar heuristics testing showed that the best utilities caught about half of new samples.
Window of Opportunity Open

“In this industry, unlike others, we have an antagonist we have to deal with, someone we’re constantly battling back and forth with,” says Hiep Dang, director of antimalware research with McAfee’s Avert Labs. “The bad guys have the element of surprise.”

Even just a 12-hour head start can translate into thousands of infected PCs, and malware authors have long tested their programs against antivirus applications to make sure they get that critical jump on the opposition. VirusTotal.com and similar Web sites, which allow security researchers and consumers to submit a questionable file and have it scanned by more than 30 different antivirus engines, have unfortunately made the testing easier for malware writers: Crooks can continue to tweak their new malware projects until VirusTotal or one of the other new multilanguage sites shows that the rogue application can slip past the majority of antivirus programs.
Good vs. Evil?

Bad guys’ use of sites such as VirusTotal can have a hidden benefit. After online thugs submit a sample, VirusTotal can sometimes share it with security companies, which can then update their programs to block the new malware. But the site permits users to opt out of having their samples submitted to antivirus vendors. VirusTotal says it offers the option so that people can scan sensitive files at the site without having them broadcast to companies.

Some well-organized criminal groups go a step farther and “maintain their own antivirus setups, almost like their own VirusTotal,” according to Don Jackson, senior security researcher with the security services firm SecureWorks.
Keep Your Guard Up

Jackson says the opportunities for prerelease testing make for harder-to-catch malware–and underscore why smart PC users should never assume that their machines are immune to attack. For example, almost every day, SecureWorks sees new variants of the PRG Trojan horse made with a particular kit. And when the new versions first appear, usually only 25 percent of antivirus scanners detect them, he says.

As bad as all of that might seem, don’t throw in the towel and resign yourself to the inevitability of infection. For one thing, antivirus programs can do very well once their creators learn about a new sample. When fully updated and pitted against PC World partner AV-Test’s “zoo” of 675,000 Trojan horses, keyloggers, and other malware, the best-performing security suites detected 98 percent of them.

And security companies are aware of the challenge they face in keeping pace with nimble online thieves. McAfee and Symantec are focusing on additional layers of security, including firewalls and behavioral scanners, which detect malicious software based on its behavior rather than on a signature match.
Join the Good Fight

Click to view full-size image.
Malware authors can exploit sites like VirusTotal to get a jump on antivirus vendors.

Multilayered security is important, but you are the most important component by far. AV-Test’s results (and other security analyses) show that no program can provide complete protection. Some malicious and creative entrepreneur will always discover a way around any particular security program.

Getting around you can be much harder for malware creators, however, if you follow basic precautions. Crooks are quick to pounce on fresh program vulnerabilities, so be sure to keep all of your applications–not just your Web browser and Windows–up-to-date to seal off entire avenues of attack. Also, the best social-engineering tactics often accompany the newest and hardest-to-detect malware. If you assume that every unexpected e-mail attachment is an attack, and ask for confirmation from the sender before opening any attachment, you’ll block another huge chunk of potential infections.

Malware authors may obtain a temporary lead over antivirus programs, but if you take sensible precautions in addition to running security tools, they won’t get a leg up on you.

  • Calendar

  • Search