Feeds
70%
Icecrypt T2400

Icecrypt T2400 Freeview HD DVR

Media savvy?

  • alert
  • submit to reddit

High performance access to file storage

Review Icecrypt is a little known name in the UK. Their T2200 Freeview HD box was made by Topfield and the T2400 is in fact a UK version of a product from Korean PVR maker HomeCast. It’s a twin tuner unit for FreeviewHD, available with hard drives of 500GB, 1TB or 2TB.

Icecrypt T2400

Icecrypt's T2400: the click wheel can be used to change volume and channel when the remote goes AWOL

The unit itself is slim with a front panel VFD readout – which is not so bright as to be annoying – showing a selection of icons to let you know the disk is in use, the channel or recording name, and other info. To the right is a flap concealing a USB port, and to the left is a click wheel with two small buttons below it. You can change the volume, or channel, and even access all the menus without the remote, although navigating the menus is a little fiddly at first.

The rear panel offers a power switch, HDMI out, twin Scarts, analogue stereo, composite video, optical SPDIF, Ethernet, USB and a serial port. There’s no fan and the unit is very quiet in operation. The remote is fairly large, the buttons have a positive click feel when pressed and aren’t as rubbery as some. It can also be used to control the TV.

Setup of the Icecrypt T2400 is straightforward, and once tuned the picture quality for both SD and HD channels is excellent, and you can opt to have 4:3 material pillarboxed properly, too. Although the HD picture is great, unfortunately there’s no Dolby Digital transcoding, so you won’t get a surround sound signal from the SPDIF connection, and it’s not yet apparent if that will come later in an update.

Icecrypt T2400

The remote can be programmed to control your TV as well

Most of the user interface is fairly clear and straightforward to use, with some nice touches – switch to BBC1, for example, when a programme’s on that’s flagged as being in HD, and you’ll be prompted to choose the HD version of the channel instead – the same is true of setting recordings. The EPG supports searching by genre or keyword, as well.

High performance access to file storage

Next page: Guide numbers

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
Dell Wyse Cloud Connect: Pocket Android desktop
Ultrathin client with a lot of baggage. The upside? It's a rogue sysadmin's delight
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.