Feeds

Intel P55-based motherboards

The best boards for 'Lynnfield' Core i5s and i7s

Business security measures using SSL

Despite the limited space on a Micro-ATX board it feels as though Gigabyte has managed to pack in all the features of a full sized motherboard although this isn’t exactly true. If you install two graphics cards in CrossFireX mode, the Firewire and USB headers at the foot of the board are likely to be blocked.

Gigabyte P55M-UD4

The Micro-ATX form-factor makes accomodating big graphics cards tricky

If you install two really big cards such as Radeon HD 5850s or 5870s, you can kiss goodbye to the front panel headers.

We strongly advise that you think of the second PCIe slot as something to be used for a sound card or TV tuner and forget about CrossFireX.

The MIT (Motherboard Intelligent Tweaker) section of the Bios is arranged differently from previous Gigabytes and is especially easy to navigate. The MIT Current Status, Advanced Frequency, Memory and Voltage settings make the business of overclocking as easy as pie. We were able to get our Core i7 870 up to 3.96GHz without much effort and it stormed through Cinebench at a furious pace.

Gigabyte P55M-UD4

The low price of the Gigabyte makes it a tempting proposition but we consider Core i7 to be an enthusiast product and the P55M-UD4 is a little too basic to make us reach for our credit card.

Reg Rating 80
Price £120 Click here for the best online price
More Info Gigabyte's website

Secure remote control for conventional and virtual desktops

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.