Pure Overclock – Computer Hardware News, Reviews and More


Sunday Sampler [20-01-08]

Comments Off on Sunday Sampler [20-01-08]
Posted January 20, 2008 by admin in Internet

The 7600 and 7300 series have reached end-of-life, and the final shipment will be on March 28th.“This is to make way for the upcoming GeForce 9600 GT (G94) and GeForce 8400 GS (G98) launching on February 14th.”

Intel’s Core 2 Extreme X6800 and Core 2 Duo E6300, E6320, E6420, E6600 and E6700 processors are also on their last legs, and will reach EOL at the end of this month. “In March Intel will also cut the lines of the Core 2 Duo E4400.”

Some screenshots have appeared that are claimed to be from Crysis 2. “Nobody knows how these have made their way out of the Crytek HQ, but Czech website InCrysis.cz reports them as Crysis 2 screens.”

VR-Zone has had a look at the Razer Lachesis mouse. “With the launch of Logitech’s G9’s seemingly impossible 3,200DPI, Razer has now answered with the Razer Lachesis. Armed with a 4,000DPI 3G Lazer sensor, the Lachesis is the Road Runner of computer mice.”

Nintendo has topped the console sales figures in the industry’s best year on record. “The good news is that 2007 was a huge year for gaming: sales are up 43 percent from 2006, with $17.94 billion in sales in 2007 compared to $12.53 billion in 2006.”

The seventh expansion to The Sims 2 franchise – “FreeTime” – will arrive on February 26th in North America and February 22nd in Europe. “FreeTime carries with it a host of new additions, this time centered upon edifying new hobbies and leisure activities.”

A researcher has claimed to have cracked the CAPTCHA image-recognition system used by Yahoo, Google and Microsoft. “Various implementations of automated CAPTCHA-cracking software have been developed, largely by spammers, but Yahoo’s CAPTCHA system so far has been ranked as one of the toughest to crack.”

Finally, a new flaw has been discovered in Excel that could allow a hacker to remotely control your PC. “Users would need to download and open a malicious file for it to have any effect. Once opened, though, the attacker has the ability to remotely access the victim’s PC, exposing personal data and other documents. “

Find us on Google+