Feeds
90%
Asus_P5B_Deluxe_tn

Asus P5B Deluxe Wi-Fi AP motherboard

Core 2 Duo ready

Secure remote control for conventional and virtual desktops

The board layout should be familiar to most Asus devotees as it’s in line with several of their recent offerings. I’m not complaining they worked well and so does this. You’ll need a power supply with a 24-pin ATX power connector and either a four or eight-pin auxiliary power connector. The auxiliary power connector has a protective cap covering four of the eight connectors which must be removed when using an eight-pin plug. This is a clever idea that completely removes the guesswork when using a four-pin power connector.

Asus_P5B_Deluxe_io

In expansion terms you’ll find a regular x16 primary PCI Express slot and a secondary Universal x16 PCI Express slot which in reality only supports x4 data mode. ASUS have designed for today rather than tomorrow by supplying just a single x1 slot complimented by three traditional PCI slots. I think this is a sensible move with so few PCI Express cards around at present, but one you don’t quite expect from the company who were so keen to kill off the parallel port on their previous boards.

Six ICH8R South Bridge powered SATA connectors pander to your storage needs with a further two – one to the rear edge of the board and an external port – fed by a JMicron bolt-on controller. This same controller also allows the inclusion of a single dual-channel ATA133/100/66 IDE connector. In an embarrassment of riches both the Intel and the JMicron powered connectors support RAID in modes 0, 1, 5 and 10 with Intel Matrix Storage Technology in the case of the six chipset powered connectors and 0, 1, 0+1 and JBOD from the JMicron controller.

The hardwired external connectors include the customary PS/2 mouse and keyboard connectors alongside which you’ll find a serial port and both coaxial and optical S/PDIF audio outputs.

Asus_P5B_Deluxe_bundle

Next along are the external SATA connector and a FireWire port. A second FireWire port can be added by connecting a supplied bracket to a motherboard header. Four USB ports plus a further two available from a supplied bracket gives you a total of six, with a potential maximum of ten. Headers are supplied for USB ports seven to ten but the header for nine and ten is occupied by the wireless network card.

Beginner's guide to SSL certificates

More from The Register

next story
Xperia Z3: Crikey, Sony – ANOTHER flagship phondleslab?
The Fourth Amendment... and it IS better
Don't wait for that big iPad, order a NEXUS 9 instead, industry little bird says
Google said to debut next big slab, Android L ahead of Apple event
Microsoft to enter the STRUGGLE of the HUMAN WRIST
It's not just a thumb war, it's total digit war
Ex-US Navy fighter pilot MIT prof: Drones beat humans - I should know
'Missy' Cummings on UAVs, smartcars and dying from boredom
Netscape Navigator - the browser that started it all - turns 20
It was 20 years ago today, Marc Andreeesen taught the band to play
A drone of one's own: Reg buyers' guide for UAV fanciers
Hardware: Check. Software: Huh? Licence: Licence...?
The Apple launch AS IT HAPPENED: Totally SERIOUS coverage, not for haters
Fandroids, Windows Phone fringe-oids – you wouldn't understand
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.