Feeds

HWRoundup Big up to the MSI MS-6153 mobo

Plus a five-way video card shoot out

  • alert
  • submit to reddit

I'm back from Crete and back into the way of the chip.

First off - a five-way video card shoot-out is underway at Planet Hardware. Since all the companies involved are big on the whole six month cycle, the reviewers need to be too! Who will be left standing this time? Go here to find out.



The MSI MS-6153 motherboard gets checked out at 3D Hardware. And whaddaya know, it didn't do too badly. This one was a winner from the time the box was opened, which just goes to show that the power of a shiny and colourful manual should not be under estimated. For the full story, as always, you need to point and

click.


And there is a September 2000 industry update from Real World, where they dissect the the OEM Roadmap from Intel. Click

here

if this is the kind of thing you wanna know about.




Hard OCP reviews the VD133 Pro from IWill, under the guise of tracing the history of computer.

Reading this

, one senses the very special place these guys hold in their hearts for a particular computer game. No prize for guessing which one. Not even a T-shirt. ®



And, you know where to go if this has left you wanting more. What's that? You want a link? OK: to the archives!

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.