Jump to content
Compatible Support Forums

news

Members
  • Content count

    80899
  • Joined

  • Last visited

    Never
  • Days Won

    18

Everything posted by news

  1. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Package : kde4libs Version : 4:4.8.4-4+deb7u2 CVE ID : CVE-2016-6232 Debian Bug : 832620 It was possible to trick kde4libs's KArchiveDirectory::copyTo() function to extract files to arbitrary system locations from a specially prepared tar file outside of the extraction folder. For Debian 7 "Wheezy", these problems have been fixed in version 4:4.8.4-4+deb7u2. We recommend that you upgrade your kde4libs packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQIcBAEBCAAGBQJXm++mAAoJEPZk0la0aRp9QEIP/3hDZi/pjlxDpSrBN4PEvsjB eCjInlj0naRagCR3/AC/4IMVCtfwQZr5UrT5cm497FLZvvFvbgjFgOVa2GeUEYu1 WlGBVrzf6qvrjeM2TFMFhBGK1dtIpTedzI0MVC7n9nGhuCOCPWCKmTNLcjhrR1/I +nhYgTpLkYuTMnUPSd9yCeMXZDgeCTVtfMNLXQ+zl/Kn1XrLf9wN/2u8jQxQoTuX kg/kKYq8UwqNEVERWsmaePiFkeeEf2UdDZ5U2JDY+uGm34rcXuvsWFKnGV5O38Aj rT5HjUIgBEBzywjCxgj+GnkRyhtBX2YsR1h/Kc0lChi1xa+tY/rGH0kQKtUimYkC 1UQnVWZRQd+k7Fn2VyXHYh8W9pLoG6I+ocafDqWvJH71eFYxHcpjC601XLWP7LFd MEu9rkTd44FNaxSljW29E062eetbtJ1XlmKoKp3rn83RaJ8sVf123NVAzylxfLZ7 jR8zq6pAZYEkG/qJA38zLnDEXlfFnLec1J/6h8uQgq6gJZgd93Ca8mUwiNO1en7M Tnb8oY4DxgqDlI8Sp/ovc4EhXDTMQBbQuYSgMhXIL0zZ80kjXDLnKspBRo5GTfzB Vz7lBusQwb1CkJviV+9MgSJzhRutblUH1hy4v4bjPxl4zM3YBuhRU8reOm3RnJIv MpabyMBWLQWlXC2LwJG5 =tYnh -----END PGP SIGNATURE-----
  2. We have posted a new solid state report!! ------------------------------------------------------------ http://us7.campaign-archive2.com/?u=3d9b6193ffd32dd60e84fc74b&id=ba50b424f8&e=1230c2ab07 http://thessdreview.us7.list-manage.com/track/click?u=3d9b6193ffd32dd60e84fc74b&id=88a10d686c&e=1230c2ab07 TITLE: Corsair Neutron XTi SSD Review (480GB) LINK: http://thessdreview.us7.list-manage.com/track/click?u=3d9b6193ffd32dd60e84fc74b&id=7f761657ee&e=1230c2ab07 PHOTO: http://thessdreview.us7.list-manage.com/track/click?u=3d9b6193ffd32dd60e84fc74b&id=586c0e55ad&e=1230c2ab07 INFO: It has been nearly two years since we have reviewed the Corsair Neutron XT. At its release it was the first SSD we analyzed with the Phison S10 controller and after putting it through the paces (http://thessdreview.us7.list-manage1.com/track/click?u=3d9b6193ffd32dd60e84fc74b&id=6217c31f56&e=1230c2ab07) , we were quite impressed with its performance at first show. The combination of the S10 controller with all its features and Toshiba's 19nm MLC NAND had provided Corsair a killer SSD, one of the best performing SSDs at the time. However, now they have set out to improve the performance and consistency even more. With the release of the new Neutron XTi (http://thessdreview.us7.list-manage.com/track/click?u=3d9b6193ffd32dd60e84fc74b&id=43dfbc87ad&e=1230c2ab07) and in hopes of dethroning the very best SATA SSDs in the market, Corsair is doubling the DRAM and migrating to Toshiba's latest 15nm MLC flash. Doubling the DRAM may be the opposite of what a company would do to be cost effective, but the focus of this SSD is not on cost effectiveness. The Corsair Neutron XTi is an enthusiast grade SSD that was developed to deliver gamers, media, and design professionals the best performance. Utilizing a doubled DRAM to NAND ratio and Phison's great performing quad-core 8-channel controller, with the latest Corsair Neutron XTi have what it takes to take down the best of the best like the Samsung 850 Pro or SanDisk Extreme? Continue on as we put it to the test in today's review. _________________________________________________________________________________________
  3. Earlier this month Seagate announced their new ‘Guardian Series’ of Hard Disk Drives (HDDs) and that the BarraCuda name was being revived! Seagate brought back the BarraCuda name in grand fashion as there is a BarraCuda Pro 10TB drive and that makes it the world’s highest capacity consumer HDD. What a better way than to come back after being away for nearly three years and being the largest capacity drive in the World! Article Title: Seagate BarraCuda Pro 10TB HDD Review ( -at -) Legit Reviews Article URL: http://www.legitreviews.com/seagate-barracuda-pro-10tb-hdd-review_184738 Happy Friday! Unsubscribe: http://adserv.legitreviews.com/cgi-bin/dada/mail.cgi/u/legitpr/news// =
  4. be quiet!'s Silent Base 800 full tower case features extensive silencing features throughout for quiet operation. We tested this case to see whether be quiet!'s noise-killing efforts deliver. Read more: http://techreport.com/review/30180/be-quiet-silent-base-800-case-reviewed --- The Tech Report - PC Hardware Explored http://techreport.com -- To unsubscribe from: TR-News, just follow this link: http://node1.techreport.com/cgi-bin/dada/mail.cgi/u/trnews/reviewnews// Click this link, or copy and paste the address into your browser.
  5. -------- TURCOM ACOUSTOSHOCK HR-903 BLUETOOTH SPEAKER REVIEW ( -at -) APH NETWORKS -- Hello everyone! APH Networks has published a new review that your readers might enjoy. A post in your site's news section would be greatly appreciated! Don't forget to send your site news to us. As we promise to post your news articles on APH Networks periodically, we would certainly appreciate it if you do the same as well. Thank you for your support in advance! * Title: Turcom AcoustoShock HR-903 Bluetooth Speaker Review ( -at -) APH Networks * Description: The Turcom AcoustoShock HR-903's greatest strength of water resistance is also the source of its downfall, mired by functionality problems and lots of area for improvement in audio quality. * Link: http://aphnetworks.com/reviews/turcom-acoustoshock-hr-903 * Image: http://aphnetworks.com/review/turcom-acoustoshock-hr-903/004.jpg Best Regards, Jonathan Kwan Editor-in-Chief APH Networks Inc. http://aphnetworks.com -- Unsubscribe from this newsletter: http://aphnetworks.com/newsletter/confirm/remove/c77c84bd425t5
  6. Case Mod Friday: Project Alpha Omega ( -at -) ThinkComputers.org Review Link: http://www.thinkcomputers.org/case-mod-friday-project-alpha-omega/ Image URL: http://www.thinkcomputers.org/articles/casemodfriday/alpha-omega-email.jpg Alt Image URL: http://www.thinkcomputers.org/articles/casemodfriday/alpha-omega-small.jpg Quote: "Welcome to another Case Mod Friday showcase! This week we have Simple Modz "Project Alpha Omega" build. Here is what they had to say about it, "I'm back with another case mod, this time with Corsair! I'll be using their SPEC-ALPHA case to create a special case mod to showcase the new ASUS STRIX GTX 1080 graphics cards! This project will be inspired by an HRC (High Resolution Computers Shop) build in the same case. When I say inspired, I mean the open-frame design of the build, I'll be doing some things a bit different.""
  7. <div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_extra"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr">Bigbruin.com has published new content which might be of interest to your readers. A post on your site regarding this announcement would be greatly appreciated.</div><div dir="ltr"><br><b>Title:</b> Crucial MX300 750GB Solid State Drive</div><div dir="ltr"><br><strong>Link:  </strong><font color="#1155cc"><u><a href="http://bigbruin.com/content/crucial-750gb-mx300_1" target="_blank">http://bigbruin.com/content/<wbr>crucial-750gb-mx300_1</a></u></font></div><div dir="ltr"><strong></strong><br><strong>Image (250x250):  </strong><font color="#1155cc"><u><a href="http://bigbruin.com/images/articles/912/promo_3.jpg" target="_blank">http://bigbruin.com/images/<wbr>articles/912/promo_3.jpg</a></u></font></div><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><b> </b><div><strong>Quote:</strong></div><div><strong><br></strong></div><div>Crucial is a brand of Micron, one of the largest memory manufacturers in the world, and they have been in the business for over 35 years. Today we are looking at their MX300 750GB limited edition solid state drive, which builds on the previous performance of the MX series SSDs, and adds the latest 3D NAND which they claim will speed up boot times and allow you to fly through even the most demanding applications.<br></div><div><br>Best regards,<br><br>Jason<br><a href="http://www.bigbruin.com/" target="_blank"><font color="#0066cc">www.bigbruin.com</font></a><br><br><span style="color:rgb(102,102,102)">---</span><br style="color:rgb(102,102,102)"><br style="color:rgb(102,102,102)"><span style="color:rgb(102,102,102)">If you have tech news of your own, please
  8. SUSE Security Update: Security update for ntp ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:1912-1 Rating: important References: #782060 #784760 #905885 #910063 #916617 #920183 #920238 #920893 #920895 #920905 #924202 #926510 #936327 #943218 #943221 #944300 #951351 #951559 #951629 #952611 #957226 #962318 #962784 #962802 #962960 #962966 #962970 #962988 #962995 #963000 #963002 #975496 #977450 #977451 #977452 #977455 #977457 #977458 #977459 #977461 #977464 #979302 #981422 #982056 #982064 #982065 #982066 #982067 #982068 #988417 #988558 #988565 Cross-References: CVE-2015-1798 CVE-2015-1799 CVE-2015-5194 CVE-2015-5300 CVE-2015-7691 CVE-2015-7692 CVE-2015-7701 CVE-2015-7702 CVE-2015-7703 CVE-2015-7704 CVE-2015-7705 CVE-2015-7848 CVE-2015-7849 CVE-2015-7850 CVE-2015-7851 CVE-2015-7852 CVE-2015-7853 CVE-2015-7854 CVE-2015-7855 CVE-2015-7871 CVE-2015-7973 CVE-2015-7974 CVE-2015-7975 CVE-2015-7976 CVE-2015-7977 CVE-2015-7978 CVE-2015-7979 CVE-2015-8138 CVE-2015-8158 CVE-2016-1547 CVE-2016-1548 CVE-2016-1549 CVE-2016-1550 CVE-2016-1551 CVE-2016-2516 CVE-2016-2517 CVE-2016-2518 CVE-2016-2519 CVE-2016-4953 CVE-2016-4954 CVE-2016-4955 CVE-2016-4956 CVE-2016-4957 Affected Products: SUSE Linux Enterprise Server 10 SP4 LTSS ______________________________________________________________________________ An update that solves 43 vulnerabilities and has 9 fixes is now available. Description: NTP was updated to version 4.2.8p8 to fix several security issues and to ensure the continued maintainability of the package. These security issues were fixed: * CVE-2016-4953: Bad authentication demobilized ephemeral associations (bsc#982065). * CVE-2016-4954: Processing spoofed server packets (bsc#982066). * CVE-2016-4955: Autokey association reset (bsc#982067). * CVE-2016-4956: Broadcast interleave (bsc#982068). * CVE-2016-4957: CRYPTO_NAK crash (bsc#982064). * CVE-2016-1547: Validate crypto-NAKs to prevent ACRYPTO-NAK DoS (bsc#977459). * CVE-2016-1548: Prevent the change of time of an ntpd client or denying service to an ntpd client by forcing it to change from basic client/server mode to interleaved symmetric mode (bsc#977461). * CVE-2016-1549: Sybil vulnerability: ephemeral association attack (bsc#977451). * CVE-2016-1550: Improve security against buffer comparison timing attacks (bsc#977464). * CVE-2016-1551: Refclock impersonation vulnerability (bsc#977450)y * CVE-2016-2516: Duplicate IPs on unconfig directives could have caused an assertion botch in ntpd (bsc#977452). * CVE-2016-2517: Remote configuration trustedkey/ requestkey/controlkey values are not properly validated (bsc#977455). * CVE-2016-2518: Crafted addpeer with hmode > 7 causes array wraparound with MATCH_ASSOC (bsc#977457). * CVE-2016-2519: ctl_getitem() return value not always checked (bsc#977458). * CVE-2015-8158: Potential Infinite Loop in ntpq (bsc#962966). * CVE-2015-8138: Zero Origin Timestamp Bypass (bsc#963002). * CVE-2015-7979: Off-path Denial of Service (DoS) attack on authenticated broadcast mode (bsc#962784). * CVE-2015-7978: Stack exhaustion in recursive traversal of restriction list (bsc#963000). * CVE-2015-7977: reslist NULL pointer dereference (bsc#962970). * CVE-2015-7976: ntpq saveconfig command allowed dangerous characters in filenames (bsc#962802). * CVE-2015-7975: nextvar() missing length check (bsc#962988). * CVE-2015-7974: NTP did not verify peer associations of symmetric keys when authenticating packets, which might have allowed remote attackers to conduct impersonation attacks via an arbitrary trusted key, aka a "skeleton" key (bsc#962960). * CVE-2015-7973: Replay attack on authenticated broadcast mode (bsc#962995). * CVE-2015-5300: MITM attacker can force ntpd to make a step larger than the panic threshold (bsc#951629). * CVE-2015-5194: Crash with crafted logconfig configuration command (bsc#943218). * CVE-2015-7871: NAK to the Future: Symmetric association authentication bypass via crypto-NAK (bsc#952611). * CVE-2015-7855: decodenetnum() will ASSERT botch instead of returning FAIL on some bogus values (bsc#952611). * CVE-2015-7854: Password Length Memory Corruption Vulnerability (bsc#952611). * CVE-2015-7853: Invalid length data provided by a custom refclock driver could cause a buffer overflow (bsc#952611). * CVE-2015-7852: ntpq atoascii() Memory Corruption Vulnerability (bsc#952611). * CVE-2015-7851: saveconfig Directory Traversal Vulnerability (bsc#952611). * CVE-2015-7850: Clients that receive a KoD now validate the origin timestamp field (bsc#952611). * CVE-2015-7849: Prevent use-after-free trusted key (bsc#952611). * CVE-2015-7848: Prevent mode 7 loop counter underrun (bsc#952611). * CVE-2015-7701: Slow memory leak in CRYPTO_ASSOC (bsc#952611). * CVE-2015-7703: Configuration directives "pidfile" and "driftfile" should only be allowed locally (bsc#943221). * CVE-2015-7704: Clients that receive a KoD should validate the origin timestamp field (bsc#952611). * CVE-2015-7705: Clients that receive a KoD should validate the origin timestamp field (bsc#952611). * CVE-2015-7691: Incomplete autokey data packet length checks (bsc#952611). * CVE-2015-7692: Incomplete autokey data packet length checks (bsc#952611). * CVE-2015-7702: Incomplete autokey data packet length checks (bsc#952611). * CVE-2015-1798: The symmetric-key feature in the receive function in ntp_proto.c in ntpd in NTP required a correct MAC only if the MAC field has a nonzero length, which made it easier for man-in-the-middle attackers to spoof packets by omitting the MAC (bsc#924202). * CVE-2015-1799: The symmetric-key feature in the receive function in ntp_proto.c in ntpd in NTP performed state-variable updates upon receiving certain invalid packets, which made it easier for man-in-the-middle attackers to cause a denial of service (synchronization loss) by spoofing the source IP address of a peer (bsc#924202). These non-security issues were fixed: * Keep the parent process alive until the daemon has finished initialisation, to make sure that the PID file exists when the parent returns. * bsc#979302: Change the process name of the forking DNS worker process to avoid the impression that ntpd is started twice. * bsc#981422: Don't ignore SIGCHILD because it breaks wait(). * Separate the creation of ntp.keys and key #1 in it to avoid problems when upgrading installations that have the file, but no key #1, which is needed e.g. by "rcntp addserver". * bsc#957226: Restrict the parser in the startup script to the first occurrance of "keys" and "controlkey" in ntp.conf. * Enable compile-time support for MS-SNTP (--enable-ntp-signd) * bsc#975496: Fix ntp-sntp-dst.patch. * bsc#962318: Call /usr/sbin/sntp with full path to synchronize in start-ntpd. When run as cron job, /usr/sbin/ is not in the path, which caused the synchronization to fail. * bsc#782060: Speedup ntpq. * bsc#951559: Fix the TZ offset output of sntp during DST. * bsc#916617: Add /var/db/ntp-kod. * bsc#951351: Add ntp-ENOBUFS.patch to limit a warning that might happen quite a lot on loaded systems. * Add ntp-fork.patch and build with threads disabled to allow name resolution even when running chrooted. * bnc#784760: Remove local clock from default configuration. * Fix incomplete backporting of "rcntp ntptimemset". * bsc#936327: Use ntpq instead of deprecated ntpdc in start-ntpd. * Don't let "keysdir" lines in ntp.conf trigger the "keys" parser. * bsc#910063: Fix the comment regarding addserver in ntp.conf. * bsc#944300: Remove "kod" from the restrict line in ntp.conf. * bsc#905885: Use SHA1 instead of MD5 for symmetric keys. * bsc#926510: Re-add chroot support, but mark it as deprecated and disable it by default. * bsc#920895: Drop support for running chrooted, because it is an ongoing source of problems and not really needed anymore, given that ntp now drops privileges and runs under apparmor. * bsc#920183: Allow -4 and -6 address qualifiers in "server" directives. * Use upstream ntp-wait, because our version is incompatible with the new ntpq command line syntax. * bsc#920905: Adjust Util.pm to the Perl version on SLE11. * bsc#920238: Enable ntpdc for backwards compatibility. * bsc#920893: Don't use %exclude. * bsc#988417: Default to NTPD_FORCE_SYNC_ON_STARTUP="yes" * bsc#988565: Ignore errors when removing extra files during uninstallation * bsc#988558: Don't blindly guess the value to use for IP_TOS Security Issues: * CVE-2016-4953 * CVE-2016-4954 * CVE-2016-4955 * CVE-2016-4956 * CVE-2016-4957 * CVE-2016-1547 * CVE-2016-1548 * CVE-2016-1549 * CVE-2016-1550 * CVE-2016-1551 * CVE-2016-2516 * CVE-2016-2517 * CVE-2016-2518 * CVE-2016-2519 * CVE-2015-8158 * CVE-2015-8138 * CVE-2015-7979 * CVE-2015-7978 * CVE-2015-7977 * CVE-2015-7976 * CVE-2015-7975 * CVE-2015-7974 * CVE-2015-7973 * CVE-2015-5300 * CVE-2015-5194 * CVE-2015-7871 * CVE-2015-7855 * CVE-2015-7854 * CVE-2015-7853 * CVE-2015-7852 * CVE-2015-7851 * CVE-2015-7850 * CVE-2015-7849 * CVE-2015-7848 * CVE-2015-7701 * CVE-2015-7703 * CVE-2015-7704 * CVE-2015-7705 * CVE-2015-7691 * CVE-2015-7692 * CVE-2015-7702 * CVE-2015-1798 * CVE-2015-1799 Package List: - SUSE Linux Enterprise Server 10 SP4 LTSS (i586 s390x x86_64): ntp-4.2.8p8-0.7.1 ntp-doc-4.2.8p8-0.7.1 References: https://www.suse.com/security/cve/CVE-2015-1798.html https://www.suse.com/security/cve/CVE-2015-1799.html https://www.suse.com/security/cve/CVE-2015-5194.html https://www.suse.com/security/cve/CVE-2015-5300.html https://www.suse.com/security/cve/CVE-2015-7691.html https://www.suse.com/security/cve/CVE-2015-7692.html https://www.suse.com/security/cve/CVE-2015-7701.html https://www.suse.com/security/cve/CVE-2015-7702.html https://www.suse.com/security/cve/CVE-2015-7703.html https://www.suse.com/security/cve/CVE-2015-7704.html https://www.suse.com/security/cve/CVE-2015-7705.html https://www.suse.com/security/cve/CVE-2015-7848.html https://www.suse.com/security/cve/CVE-2015-7849.html https://www.suse.com/security/cve/CVE-2015-7850.html https://www.suse.com/security/cve/CVE-2015-7851.html https://www.suse.com/security/cve/CVE-2015-7852.html https://www.suse.com/security/cve/CVE-2015-7853.html https://www.suse.com/security/cve/CVE-2015-7854.html https://www.suse.com/security/cve/CVE-2015-7855.html https://www.suse.com/security/cve/CVE-2015-7871.html https://www.suse.com/security/cve/CVE-2015-7973.html https://www.suse.com/security/cve/CVE-2015-7974.html https://www.suse.com/security/cve/CVE-2015-7975.html https://www.suse.com/security/cve/CVE-2015-7976.html https://www.suse.com/security/cve/CVE-2015-7977.html https://www.suse.com/security/cve/CVE-2015-7978.html https://www.suse.com/security/cve/CVE-2015-7979.html https://www.suse.com/security/cve/CVE-2015-8138.html https://www.suse.com/security/cve/CVE-2015-8158.html https://www.suse.com/security/cve/CVE-2016-1547.html https://www.suse.com/security/cve/CVE-2016-1548.html https://www.suse.com/security/cve/CVE-2016-1549.html https://www.suse.com/security/cve/CVE-2016-1550.html https://www.suse.com/security/cve/CVE-2016-1551.html https://www.suse.com/security/cve/CVE-2016-2516.html https://www.suse.com/security/cve/CVE-2016-2517.html https://www.suse.com/security/cve/CVE-2016-2518.html https://www.suse.com/security/cve/CVE-2016-2519.html https://www.suse.com/security/cve/CVE-2016-4953.html https://www.suse.com/security/cve/CVE-2016-4954.html https://www.suse.com/security/cve/CVE-2016-4955.html https://www.suse.com/security/cve/CVE-2016-4956.html https://www.suse.com/security/cve/CVE-2016-4957.html https://bugzilla.suse.com/782060 https://bugzilla.suse.com/784760 https://bugzilla.suse.com/905885 https://bugzilla.suse.com/910063 https://bugzilla.suse.com/916617 https://bugzilla.suse.com/920183 https://bugzilla.suse.com/920238 https://bugzilla.suse.com/920893 https://bugzilla.suse.com/920895 https://bugzilla.suse.com/920905 https://bugzilla.suse.com/924202 https://bugzilla.suse.com/926510 https://bugzilla.suse.com/936327 https://bugzilla.suse.com/943218 https://bugzilla.suse.com/943221 https://bugzilla.suse.com/944300 https://bugzilla.suse.com/951351 https://bugzilla.suse.com/951559 https://bugzilla.suse.com/951629 https://bugzilla.suse.com/952611 https://bugzilla.suse.com/957226 https://bugzilla.suse.com/962318 https://bugzilla.suse.com/962784 https://bugzilla.suse.com/962802 https://bugzilla.suse.com/962960 https://bugzilla.suse.com/962966 https://bugzilla.suse.com/962970 https://bugzilla.suse.com/962988 https://bugzilla.suse.com/962995 https://bugzilla.suse.com/963000 https://bugzilla.suse.com/963002 https://bugzilla.suse.com/975496 https://bugzilla.suse.com/977450 https://bugzilla.suse.com/977451 https://bugzilla.suse.com/977452 https://bugzilla.suse.com/977455 https://bugzilla.suse.com/977457 https://bugzilla.suse.com/977458 https://bugzilla.suse.com/977459 https://bugzilla.suse.com/977461 https://bugzilla.suse.com/977464 https://bugzilla.suse.com/979302 https://bugzilla.suse.com/981422 https://bugzilla.suse.com/982056 https://bugzilla.suse.com/982064 https://bugzilla.suse.com/982065 https://bugzilla.suse.com/982066 https://bugzilla.suse.com/982067 https://bugzilla.suse.com/982068 https://bugzilla.suse.com/988417 https://bugzilla.suse.com/988558 https://bugzilla.suse.com/988565 https://download.suse.com/patch/finder/?keywords=e7685b9a0cc48dfc1cea383e011b438b -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
  9. Warcraft Doomhammer Charging Cord Review ( -at -) ThinkComputers.org Review Link: http://www.thinkcomputers.org/warcraft-doomhammer-charging-cord-review/ Image URL: http://thinkcomputers.org/reviews/swordfish_hammer/email.jpg Alt Image URL: http://thinkcomputers.org/reviews/swordfish_hammer/small.jpg Quote: "If you are reading this you more than likely have heard of Warcraft. Maybe you played one of the original Warcraft games, got hooked on World of Warcraft like I did, or just went out to see the Warcraft movie. Warcraft has a massive following and even if you haven’t played the games the Warcraft story and characters are quite cool. With the movie just being released Swordfish has created a line of collectible electronics. Today we will be checking out their Doomhammer Charging Cord."
  10. SUSE Security Update: Security update for libarchive ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:1909-1 Rating: important References: #984990 #985609 #985665 #985669 #985673 #985675 #985679 #985682 #985685 #985688 #985689 #985697 #985698 #985700 #985703 #985704 #985706 #985826 #985832 #985835 Cross-References: CVE-2015-8918 CVE-2015-8919 CVE-2015-8920 CVE-2015-8921 CVE-2015-8922 CVE-2015-8923 CVE-2015-8924 CVE-2015-8925 CVE-2015-8926 CVE-2015-8928 CVE-2015-8929 CVE-2015-8930 CVE-2015-8931 CVE-2015-8932 CVE-2015-8933 CVE-2015-8934 CVE-2016-4300 CVE-2016-4301 CVE-2016-4302 CVE-2016-4809 Affected Products: SUSE Linux Enterprise Software Development Kit 12-SP1 SUSE Linux Enterprise Server 12-SP1 SUSE Linux Enterprise Desktop 12-SP1 ______________________________________________________________________________ An update that fixes 20 vulnerabilities is now available. Description: libarchive was updated to fix 20 security issues. These security issues were fixed: - CVE-2015-8918: Overlapping memcpy in CAB parser (bsc#985698). - CVE-2015-8919: Heap out of bounds read in LHA/LZH parser (bsc#985697). - CVE-2015-8920: Stack out of bounds read in ar parser (bsc#985675). - CVE-2015-8921: Global out of bounds read in mtree parser (bsc#985682). - CVE-2015-8922: Null pointer access in 7z parser (bsc#985685). - CVE-2015-8923: Unclear crashes in ZIP parser (bsc#985703). - CVE-2015-8924: Heap buffer read overflow in tar (bsc#985609). - CVE-2015-8925: Unclear invalid memory read in mtree parser (bsc#985706). - CVE-2015-8926: NULL pointer access in RAR parser (bsc#985704). - CVE-2015-8928: Heap out of bounds read in mtree parser (bsc#985679). - CVE-2015-8929: Memory leak in tar parser (bsc#985669). - CVE-2015-8930: Endless loop in ISO parser (bsc#985700). - CVE-2015-8931: Undefined behavior / signed integer overflow in mtree parser (bsc#985689). - CVE-2015-8932: Compress handler left shifting larger than int size (bsc#985665). - CVE-2015-8933: Undefined behavior / signed integer overflow in TAR parser (bsc#985688). - CVE-2015-8934: Out of bounds read in RAR (bsc#985673). - CVE-2016-4300: Heap buffer overflow vulnerability in the 7zip read_SubStreamsInfo (bsc#985832). - CVE-2016-4301: Stack buffer overflow in the mtree parse_device (bsc#985826). - CVE-2016-4302: Heap buffer overflow in the Rar decompression functionality (bsc#985835). - CVE-2016-4809: Memory allocate error with symbolic links in cpio archives (bsc#984990). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 12-SP1: zypper in -t patch SUSE-SLE-SDK-12-SP1-2016-1123=1 - SUSE Linux Enterprise Server 12-SP1: zypper in -t patch SUSE-SLE-SERVER-12-SP1-2016-1123=1 - SUSE Linux Enterprise Desktop 12-SP1: zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2016-1123=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64): libarchive-debugsource-3.1.2-22.1 libarchive-devel-3.1.2-22.1 - SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64): libarchive-debugsource-3.1.2-22.1 libarchive13-3.1.2-22.1 libarchive13-debuginfo-3.1.2-22.1 - SUSE Linux Enterprise Desktop 12-SP1 (x86_64): libarchive-debugsource-3.1.2-22.1 libarchive13-3.1.2-22.1 libarchive13-debuginfo-3.1.2-22.1 References: https://www.suse.com/security/cve/CVE-2015-8918.html https://www.suse.com/security/cve/CVE-2015-8919.html https://www.suse.com/security/cve/CVE-2015-8920.html https://www.suse.com/security/cve/CVE-2015-8921.html https://www.suse.com/security/cve/CVE-2015-8922.html https://www.suse.com/security/cve/CVE-2015-8923.html https://www.suse.com/security/cve/CVE-2015-8924.html https://www.suse.com/security/cve/CVE-2015-8925.html https://www.suse.com/security/cve/CVE-2015-8926.html https://www.suse.com/security/cve/CVE-2015-8928.html https://www.suse.com/security/cve/CVE-2015-8929.html https://www.suse.com/security/cve/CVE-2015-8930.html https://www.suse.com/security/cve/CVE-2015-8931.html https://www.suse.com/security/cve/CVE-2015-8932.html https://www.suse.com/security/cve/CVE-2015-8933.html https://www.suse.com/security/cve/CVE-2015-8934.html https://www.suse.com/security/cve/CVE-2016-4300.html https://www.suse.com/security/cve/CVE-2016-4301.html https://www.suse.com/security/cve/CVE-2016-4302.html https://www.suse.com/security/cve/CVE-2016-4809.html https://bugzilla.suse.com/984990 https://bugzilla.suse.com/985609 https://bugzilla.suse.com/985665 https://bugzilla.suse.com/985669 https://bugzilla.suse.com/985673 https://bugzilla.suse.com/985675 https://bugzilla.suse.com/985679 https://bugzilla.suse.com/985682 https://bugzilla.suse.com/985685 https://bugzilla.suse.com/985688 https://bugzilla.suse.com/985689 https://bugzilla.suse.com/985697 https://bugzilla.suse.com/985698 https://bugzilla.suse.com/985700 https://bugzilla.suse.com/985703 https://bugzilla.suse.com/985704 https://bugzilla.suse.com/985706 https://bugzilla.suse.com/985826 https://bugzilla.suse.com/985832 https://bugzilla.suse.com/985835 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
  11. Corsair ML140 and ML120 fans Review ------------------------------------------------------------ http://us2.campaign-archive2.com/?u=bfb2b902b5fb045ad6f841f98&id=1ce3027ee2&e=872093acb5 http://www.kitguru.net Corsair ML140 and ML120 fans Review Corsair has employed some nifty technology in its new range of ML fans however we have to be careful with the name. The bearings that support the rotors on the motors use Magnetic Levitation but this is not shortened to Maglev (like the famous trains) as that is a trademarked term so we either have to say Magnetic Levitation or take the easy route and call them ML. Corsair is excited about ML as it allows the fans to spin much faster than normal. Where we typically expect a 120mm/140mm fan to max out at 1,400rpm-1,600rpm, in the case of ML120 the range is 400rpm-2,400rpm and for ML140 the figures are 400rpm-2,000rpm. Read the review here: http://www.kitguru.net/components/cooling/leo-waldock/corsair-ml140-and-ml120-fans/ ============================================================ ** follow on Twitter (http://twitter.com/#!/kitgurupress) | ** friend on Facebook (http://www.facebook.com/pages/KitGuru/162236020510911) | ** forward to a friend (http://us2.forward-to-friend.com/forward?u=bfb2b902b5fb045ad6f841f98&id=1ce3027ee2&e=872093acb5) Copyright © 2016 KitGuru, All rights reserved. You are receiving this because you are a news partner or have signed up to receive our news.
  12. Corsair ML140 and ML120 fans Review ------------------------------------------------------------ http://us2.campaign-archive2.com/?u=bfb2b902b5fb045ad6f841f98&id=1ce3027ee2&e=872093acb5 http://www.kitguru.net Corsair ML140 and ML120 fans Review Corsair has employed some nifty technology in its new range of ML fans however we have to be careful with the name. The bearings that support the rotors on the motors use Magnetic Levitation but this is not shortened to Maglev (like the famous trains) as that is a trademarked term so we either have to say Magnetic Levitation or take the easy route and call them ML. Corsair is excited about ML as it allows the fans to spin much faster than normal. Where we typically expect a 120mm/140mm fan to max out at 1,400rpm-1,600rpm, in the case of ML120 the range is 400rpm-2,400rpm and for ML140 the figures are 400rpm-2,000rpm. Read the review here: http://www.kitguru.net/components/cooling/leo-waldock/corsair-ml140-and-ml120-fans/ ============================================================ ** follow on Twitter (http://twitter.com/#!/kitgurupress) | ** friend on Facebook (http://www.facebook.com/pages/KitGuru/162236020510911) | ** forward to a friend (http://us2.forward-to-friend.com/forward?u=bfb2b902b5fb045ad6f841f98&id=1ce3027ee2&e=872093acb5) Copyright © 2016 KitGuru, All rights reserved. You are receiving this because you are a news partner or have signed up to receive our news.
  13. *PowerColor Radeon RX 480 RED DEVIL review* Join us as we review the PowerColor Radeon RX 480 RED DEVIL, we test the model fitted with 8GB graphics memory. This dark spawn from PowerColor is a mainstream graphics card series that will allow you to play your games in both the Full HD 1080P range as well as gaming in WQHD (2560x1440) range. And all that at a rather reasonable price of 269 USD. Read the article * right here <http://www.guru3d.com/articles-pages/powercolor-radeon-rx-480-red-devil-review,1.html>'>http://www.guru3d.com/articles-pages/powercolor-radeon-rx-480-red-devil-review,1.html> *. URL: http://www.guru3d.com/articles-pages/powercolor-radeon-rx-480-red-devil-review,1.html <http://www.guru3d.com/articles-pages/powercolor-radeon-rx-480-red-devil-review,1.html> --
  14. Hardware Canucks is pleased to present our review of the new MSI GTX 1080 GAMING Z 8GB graphics card. *Article URL:* http://www.hardwarecanucks.com/forum/hardware-canucks-reviews/73116-msi-gtx-1080-gaming-z-8gb-review.html *Quote:* *The MSI GTX 1080 Gaming Z 8GB is one of the best graphics cards we have ever tested. It is also among the most expensive GTX 1080's on the market but is that premium really worthwhile?* We would appreciate it if you would post this in your news section. Regards, -- Hardware Canucks News Team
  15. View this email in your browser (http://us3.campaign-archive1.com/?u=efc4c507c2cf964fc2462caca&id=838d94179c&e=0c004f9c13) Although we were made privy to some details on AMD’s upcoming Radeon RX 470 and Radeon RX 460 graphics cards earlier this month, the company today is officially announcing its newest, mainstream members of the Polaris family. AMD is touting the RX 470 as a perfect companion for 1080p resolution gaming, offering 60+ FPS performance (with anti-aliasing enabled) on popular game titles. The RX 460, on the other hand, is based on Polaris 11 architecture, which has more budget-minded performance profile. However, if all you’re looking for is a highly efficient, yet capable eSports gaming card, then the RX 460 still has you covered. AMD Extends Polaris Line-up With Mainstream Radeon RX 470 And Radeon RX 460 (http://hothardware.us3.list-manage1.com/track/click?u=efc4c507c2cf964fc2462caca&id=13baedd11e&e=0c004f9c13) http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=dd6fb3dbb0&e=0c004f9c13 Best Regards, HotHardware.com http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=fb1fcc68c3&e=0c004f9c13 http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=f1addbad08&e=0c004f9c13 http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=5d0c735bf4&e=0c004f9c13 ============================================================
  16. AMD's Radeon RX 460 and RX 470 are the next salvos in its battle to regain a foothold in the sub-$300 graphics market. We examine their full specs and take some educated guesses as to the price points these cards will occupy when they hit store shelves. Read more: http://techreport.com/review/30452/amd-reveals-the-full-specs-of-the-radeon-rx-460-and-rx-470 --- The Tech Report - PC Hardware Explored http://techreport.com -- To unsubscribe from: TR-News, just follow this link: http://node1.techreport.com/cgi-bin/dada/mail.cgi/u/trnews/reviewnews// Click this link, or copy and paste the address into your browser.
  17. This is a follow-up to the End of Life warning sent earlier this month to confirm that as of today (July 28, 2016), Ubuntu 15.10 is no longer supported. No more package updates will be accepted to 15.10, and it will be archived to old-releases.ubuntu.com in the coming weeks. The original End of Life warning follows, with upgrade instructions: Ubuntu announced its 15.10 (Wily Werewolf) release almost 9 months ago, on October 22, 2015. As a non-LTS release, 15.10 has a 9-month month support cycle and, as such, the support period is now nearing its end and Ubuntu 15.10 will reach end of life on Thursday, July 28th. At that time, Ubuntu Security Notices will no longer include information or updated packages for Ubuntu 15.10. The supported upgrade path from Ubuntu 15.10 is via Ubuntu 16.04. Instructions and caveats for the upgrade may be found at: https://help.ubuntu.com/community/XenialUpgrades Ubuntu 16.04 continues to be actively supported with security updates and select high-impact bug fixes. Announcements of security updates for Ubuntu releases are sent to the ubuntu-security-announce mailing list, information about which may be found at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce Since its launch in October 2004 Ubuntu has become one of the most highly regarded Linux distributions with millions of users in homes, schools, businesses and governments around the world. Ubuntu is Open Source software, costs nothing to download, and users are free to customise or alter their software in order to meet their needs. On behalf of the Ubuntu Release Team, Adam Conrad --
  18. The Sapphire Nitro+ Radeon RX 480 4GB video card is finally here! Forget the woes of the AMD Radeon RX 480 reference design as this custom card could possibly solve all the GPU cooler and power concerns may had. The Nitro Radeon RX 480 solves the high temperature and loud noise levels by featuring a large GPU cooler with three copper heatpipes and dual fans. The board designers then placed an 8-pin PCIe power connector instead of a 6-pin to ensure the Pascal GPU on the RX 480 is getting all the power it needs and then some. At $20 more than the reference design ($199) it looks like Sapphire’s Nitro Radeon RX 480 was a God send and could be the Radeon RX 480 to own... Article Title: Sapphire Nitro Radeon RX 480 4GB Video Card Review ( -at -) Legit Reviews Article URL: http://www.legitreviews.com/sapphire-nitro-radeon-rx-480-4gb-video-card-review_184553 Unsubscribe: http://adserv.legitreviews.com/cgi-bin/dada/mail.cgi/u/legitpr/reviewnews// =
  19. Gigabyte's GeForce GTX 1080 Xtreme Gaming is the first custom-cooled version of Nvidia's biggest, baddest graphics card we've tested. We find out whether it does justice to Pascal's world-beating performance. Read more: http://techreport.com/review/30362/gigabyte-geforce-gtx-1080-xtreme-gaming-graphics-card-reviewed --- The Tech Report - PC Hardware Explored http://techreport.com -- To unsubscribe from: TR-News, just follow this link: http://node1.techreport.com/cgi-bin/dada/mail.cgi/u/trnews/reviewnews// Click this link, or copy and paste the address into your browser.
  20. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Package : cakephp Version : 1.3.15-1+deb7u1 Debian Bug : 832283 CakePHP, an open-source web application framework for PHP, was vulnerable to SSRF (Server Side Request Forgery) attacks. Remote attacker can utilize it for at least DoS (Denial of Service) attacks, if the target application accepts XML as an input. It is caused by insecure design of Cake's Xml class. For Debian 7 "Wheezy", these problems have been fixed in version 1.3.15-1+deb7u1. We recommend that you upgrade your cakephp packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQIcBAEBCAAGBQJXmnJvAAoJEPZk0la0aRp9BVYP/AwaEyVZleQ71EYHsjPafuoF 1d3FGeZTNkFR+D8bf7+mgmHHtRDHuTCV8Xg0hJS8duXrmVEMQoeNhq7bxaIjLkw6 0kPgtgOEGdUhZFq34C5vOOH0mef3nJcnrlkk2uEGyvrj73jqR557UUGG547msU9F dosYhFcslE79RtXFPj7IMURhKIXzNveWy36I0MUPqqRK6nbiCjEEUGkU2JlzJn0X g+xOlpZB+fsqgLb33Qncn+/ghFx6jL0Rd25fLUvsd7FNf0zFbIlV2ZFzOsUYDDuq HqYB1mXeSr3LveENVPHT3QdYhSCO6A+WEuI0fikoHOuHxvFtL0UehyclaKYWYl6h rRQqgoS7Bb81g1Xw8+/7US8kreIH5oJQ+Ql8l1kGseRoGwriPr+rKPUyWx41/1xe 8XaLmoxfTYIwy76Kt2xy7SMgT8o1UGfk3WG53n6j/wpHnaFwd6CnyfJQmuFig4Z4 M9l3l71UR/NPWvNxf8Im7Bxi5NosrED+2viCaWVenckIDmEaXifindZwcTXwCwug uplbTYaurjGKdjIV+L9cglw+96j+CEiWDzUnOAKY53RT18aHHqhLmApTP/Af6k7j 11WiOW1Alv4qDALWhvHzAbnQDl6+jjXW8/2KtZy5v7DxTH2P0LiwqE/cevEvizVg uGAaQ1KjPW3CfYRn80re =7bDr -----END PGP SIGNATURE-----
  21. Hello editors, On our review bench today is Thermaltake Suppressor F31 mid tower case, designed to facilitate lower temperature and noise levels for any installed components during operation. The Suppressor F31 has a larger width than most (250mm), further encouraging a variety of cooler/case fan and drive set ups for optimized air flow as desired by the user. http://www.neoseeker.com/Articles/Hardware/Reviews/thermaltake-suppressor-f31/ "The Suppressor F31 case is low enough to fit into lower height desk > spaces, but is still wide and deep enough to hold larger cooling options > and longer video cards." Thanks as always for any linkage! Neoseeker Hardware http://www.neoseeker.com/ hardware ( -at -) neoseeker.com
  22. Hi News Poster HardwareOverclock has just posted another review. This week we have tested the Thermaltake European Gold: Paris 650 Watt psu. The Thermaltake European Gold Series is a premium 80 PLUS GOLD certified power supply that uses the highest quality components for stable performance, excellent features with unbeatable efficiency vital to the current high-end system in market even in demanding conditions. Title: Thermaltake European Gold: Paris 650 Watt ( -at -) HardwareOverclock Link: http://hardwareoverclock.com/Thermaltake-Paris-650-Watt.htm Image: http://hardwareoverclock.com/netzteil/Thermaltake-Paris-650W-003.jpg Thanks for posting kr Rene Ruf Chefredakteur HardwareOverclock.com <http://www.hardwareoverclock.com/> http://www.hardwareoverclock.com <mailto:admin ( -at -) hardwareoverclock.com> mailto:admin ( -at -) hardwareoverclock.com
  23. Title: REEVEN Steropes Low-Profile CPU Cooler Review ( -at -) NikKTech Description: It may not be the most silent low-profile CPU cooler in the market today but the just 60mm tall Steropes by REEVEN performs extremely well for its size and comes at a bargain price. Article Link: http://www.nikktech.com/main/articles/pc-hardware/cpu-cooling/cpu-air-cooler s/6780-reeven-steropes-low-profile-cpu-cooler-review Image Link: http://www.nikktech.com/main/images/pics/reviews/reeven/steropes/reeven_ster opesa.jpg A News Post Would Be Appreciated. Thanks In Advance. Sincerely Nik Kastrantas
  24. Gigabyte X99-Ultra Gaming Motherboard Review ( -at -) ThinkComputers.org Review Link: http://www.thinkcomputers.org/gigabyte-x99-ultra-gaming-motherboard-review/ Image URL: http://thinkcomputers.org/reviews/gigabyte_x99_ultragaming/email.jpg Alt Image URL: http://thinkcomputers.org/reviews/gigabyte_x99_ultragaming/small.jpg Quote: "Not that long ago Intel released their Broadwell-E high-end desktop (HEDT) processor family. Broadwell-E makes use of the same chipset and same socket as Haswell-E so can use the same X99 motherboards that were launched back in 2014. Of course since then we have seen improvements and features added to motherboards. So with that many companies have launched a second round of X99 motherboards that add these new features. One such company is Gigabyte and today we have their X99-Ultra Gaming motherboard. This motherboard is part of their G1 Gaming line and features ambient surround LEDs, RGB LED headers, quad-GPU SLI/CrossFire support, Killer E2400 gaming networking, NVMe PCIe Gen3 x4 U.2 and M.2 support, PCIe Gen2 x4 USB 3.1 support, and much more! Let’s take a look and see what this motherboard is all about!"
  25. Gigabyte X99-Ultra Gaming Motherboard Review ( -at -) ThinkComputers.org Review Link: http://www.thinkcomputers.org/gigabyte-x99-ultra-gaming-motherboard-review/ Image URL: http://thinkcomputers.org/reviews/gigabyte_x99_ultragaming/email.jpg Alt Image URL: http://thinkcomputers.org/reviews/gigabyte_x99_ultragaming/small.jpg Quote: "Not that long ago Intel released their Broadwell-E high-end desktop (HEDT) processor family. Broadwell-E makes use of the same chipset and same socket as Haswell-E so can use the same X99 motherboards that were launched back in 2014. Of course since then we have seen improvements and features added to motherboards. So with that many companies have launched a second round of X99 motherboards that add these new features. One such company is Gigabyte and today we have their X99-Ultra Gaming motherboard. This motherboard is part of their G1 Gaming line and features ambient surround LEDs, RGB LED headers, quad-GPU SLI/CrossFire support, Killer E2400 gaming networking, NVMe PCIe Gen3 x4 U.2 and M.2 support, PCIe Gen2 x4 USB 3.1 support, and much more! Let’s take a look and see what this motherboard is all about!"
×