Вы находитесь на странице: 1из 112

0 6>

0 74470 81182 4
®
June 2006 • Vol 6 Issue 06

Frontside
6 What’s Happening
12 Digital Economy
14 The Saint
Going . . . Going . . . Gone . . . .

The Experts

Alex St. John


The Saint
page 14

Spotlight Anand Lal Shimpi


Anand’s Corner
Alex “Sharky” Ross
The Shark Tank
page 27

46 The State Of PC Security


page 26

What’s All The FUD About, Anyway?

48 Attack Of Surreptitious Software


Understanding The Plague That Is Spyware

56 Rootkit Madness
Rob “CmdrTaco”
Why & How These “Silent” Apps Are Used
Malda

60 Viruses, Worms, Trojans


Mike Magee
Shavings From
The Department
Of Stuff
page 85
Maybe Forgotten But Certainly Not Gone The Rumour Mill
page 101

66 Phishing Scams Grow Teeth & You’re The Prey


This Is Personal

70 Security Hardware Roundup


Three Devices To Secure Your Data

Copyright 2006 by Sandhills Publishing Company. Computer Power User is a trademark of Sandhills Publishing
Company. All rights reserved. Reproduction of material appearing in Computer Power User is strictly prohibited
without written permission. Printed in the U.S.A. GST # 123482788RT0001 (ISSN 1536-7568) CPU Computer
Pete Loshin
Power User USPS 020-801 is published monthly for $29 per year by Sandhills Publishing Company, 131 West Chris Pirillo Open Sauce
Grand Drive, P.O. Box 82667, Lincoln, NE 68501. Subscriber Services: (800) 424-7900. Periodicals postage paid at Dialogue Box page 81
Lincoln, NE. POSTMASTER: Send address changes to Computer Power User, P.O. Box 82667, Lincoln, NE 68501. page 80

Did you find the hidden CPU logo on our cover? Turn the page for the answer.
Elder Scrols IV Oblivion
Page 89

Hard Hat Area


PC Modder
29 Tips & Tutorials
30 Adventures In Overclocking
Page 23 Above & Beyond With The Pentium D 805
34 Mad Reader Mod
Crunching Data & Looking Good Doing It

36 Advanced Q&A Corner


Heavy Gear 40 X-Ray Vision: Quad SLI
Four GPUs For HD Gaming
15 Dream Hardware 42 White Paper: HDCP
Protecting High-Def Content At A Price
16 The Power To Protect
Eight UPS Units Tested & Reviewed Loading Zone
20 Seagate Momentus 5400.3 160GB 72 The Bleeding Edge Of Software
Inside The World Of Betas
Tips & Tricks
Matrox TripleHead2Go
73 Up To Speed 96 Software Tips & Projects
Upgrades That’ll Keep You Windows XP Restoration Kit
22 Corsair XMS2 TWIN2X1024-8500
Humming Along 98 Warm Up To Penguins
Nvidia DualTV MCE
74 Jukebox Shootout Explore With Konqueror
23 Voodoo PC AMD FX Gaming Six Music Managers For Your
CrossFire OMEN Listening Pleasure
78 CyberLink PowerDirector 5
What’s Cooking
Techsmith SnagIt 8 101 Shavings From The Rumour Mill
24 Maingear Prelude All Roads Lead To Merom
79 Celedy Software CeledyDraw 2
HumanConcepts OrgPlus 6 102 Hot Seat
26 Anand’s Corner Power Management: From The Edge
AMD’s Getting Serious 80 Dialogue Box
Googlefasting Of Mobility To The Center Of
81 Open Sauce The Enterprise
27 The Shark Tank 104 Technically Speaking
Pentium Extreme Edition 965: Eight Stories About Open-Source Software
An Interview With Katherine Albrecht,
NetBurst’s Swan Song Author & RFID Watchdog
Caught In The Web 106 Under Development
82 Web 2.0 A Peek At What’s Brewing
What’s Behind It, Anyway? In The Laboratory
85 The Department Of Stuff
tvfuture.txt
Back Door
108 Q&A With Robert & Richard Garriott
Digital Living The Garriotts Talk Ultima Online,
86 Road Warrior WoW & NCSoft’s Role In
New Microsoft Mice, The Future Of MMOGs
PayPal’s Text To Buy Service,
New Intel NOR Flash Memory & More
88 At Your Leisure
Infinite Loops
Games, Gear, Movies & Music Strange stats and other oddball
94 The Cutting Edge items from computing's periphery
Page 24 The First Personal Computer
84, 97, 99
Customer Service
(For questions about your subscription or to place an
order or change an address.)
customer-service@cpumag.com
(800) 733-3809
FAX: (402) 479-2193
Computer Power User
P.O. Box 82667
Lincoln, NE 68501-2667
E D I T O R ’ S N O T E
Hours
Mon. - Fri.: 7 a.m. to 8 p.m. (CST)
Sat.: 8 a.m. to 4 p.m. (CST)

P
Online Customer Service & Subscription Center
ersonal computer security was so much easier back in the day; seemed http://www.cpumag.com
like all you had to do was make sure you didn’t load any strange floppies
Web Services
from the wrong side of the tracks, and you were pretty much guaranteed (For questions about our Web site.)
to avoid any sort of malware infestation. webhelp@cpumag.com
(800) 733-3809
Now, of course, things are different. Achieving any level of computer security
requires the proactive installation, configuration, and upkeep of multiple security Authorization For Reprints
Reprint Management Services
apps, a hardware firewall, encryption for your WLAN, and so on. That’s before Toll Free: 800-290-5460
you even consider encryption for your VoIP calls, physical security to prevent 717-399-1900 ext. 100
unauthorized onsite access, antitheft devices for notebooks, and yada, yada, yada. Fax: 717-399-8900
ComputerPowerUser@reprintbuyer.com
And after all is said and done, if someone who really knows what he’s doing www.reprintbuyer.com
decides he wants into your system, all that stuff might not make the slightest dif- Editorial Staff
ference. Much like the physical security of our homes, PC security ultimately editor@cpumag.com
comes down to the common-sense application of a reasonable array of tools and FAX: (402) 479-2104
131 W. Grand Drive
methods that give us better-than-average odds against the garden-variety intruder. Lincoln, NE 68521
Unlike home security, though, the threats to our PCs and networks are constant- Subscription Renewals
ly changing in order to beat our countermeasures, so it’s not safe to assume that (800) 382-4552
because you had your system locked up tight as a drum last year, it’s still that secure. FAX: (402) 479-2193
http://www.cpumag.com
Thus we present this month’s Spotlight section on PC security. Head to page 46 for
in-depth discussions of the latest virus, Trojan, and worm threats, a look at the Advertising Staff
(800) 848-1478
growing spyware menace, a piece on rootkits, and info on the most sophisticated 120 W. Harvest Dr.
social engineering threats. We’ll discuss hands-on steps Lincoln, NE 68521
FAX: (402) 479-2193
you can take to beat this stuff that go beyond
clicking your antivirus software’s Scan button, The Gang
and we’ll even look at some hardware that can Editorial Staff: Ronald D. Kobler / Christopher Trumble / Blaine
Flamig / Trista Kunce / Corey Russman / Rod Scher / Calvin
boost your overall state of secureness. Clinchard / Katie Sommer / Kimberly Fitzke / Katie Dolan /
Elsewhere this month you’ll find our takes on Raejean Brooks / Sally Curran / Michael Sweet / Nate Hoppe /
some of your options where uninterruptible power Sheila Allen / Linne Ourada / Joy Martin / Ashley Finter / Marty
Sems / Chad Denton / Nathan Chandler / Kylee Dickey / Josh
supplies are concerned (page 16), interviews with Gulick / Andrew Leibman / Vince Cogley / Sam Evans / Jennifer
the Garriott brothers (page 108) and RFID Johnson / Brian Weed / Holly Zach Web Staff: Dorene
watchdog Katherine Albrecht (page 104), Krausnick / Laura Curry / Kristen Miller Customer Service:
Lindsay Albers Subscription Renewals: Connie Beatty / Matt
and an excellent mod that turns a mild-man- Bolling / Patrick Kean / Charmaine Vondra / Miden Ebert /
nered Pentium D 805 into a blazing power- Kathy DeCoito / Stephanie Contreras / Nicole Buckendahl
house that rivals the Extreme Edition 965 in Art & Design: Lesa Call / Aaron D. Clark / Fred Schneider /
Aaron Weston / Carrie Benes / Ginger Falldorf / Sonja Warner /
several metrics. This issue also marks the sec- Lori Garris / Jason Codr / Andria Schultz / Erin Rodriguez /
ond installment of Barry Brenesal’s “Cutting Lindsay Anker Newsstand: Garth Lienemann / Jeff Schnittker
Edge” column, so check that out on page 94. Advertising Sales: Grant Ossenkop / Liz Kohout / Cindy Pieper /
Brooke Wolzen / Eric Cobb / Ryan Donohue Marketing: Mark
We'll see you again in about 30, and thanks Peery / Marcy Gunn / Kelly Richardson / Travis Brock / Jen
for reading. Clausen / Scot Banks / Ashley Hannant / Luke Vavricek / Becky
Rezabek / Lana Matic / Jeff Ashelford

Chris Trumble, Publication Editor, CPU

Gotcha.
Here it is.
W h a t ’s H a p p e n i n g • H a rd w a re
Compiled by Steve Smith

Seeing Double: Dell & Toshiba Get Game


Nvidia Twin Tuners Loosen that tie and grab a controller, Mister VP. Two main-
stream business computing giants got serious about the hot
“Dual” everything has become the official gaming PC market this month. In its largest acquisition to
theme of the PC world. Once you date, Dell purchased high-end specialty PC maker Alien-
have your dual-core CPU and ware. Dell already offers its own XPS line of enthusiast rigs
two-card video array in place, but will let the Miami company remain a standalone brand
it’s time to consider two and profit from the higher margins these cutting-edge com-
TV tuners. The $169 puters represent. Meanwhile, the otherwise buttoned-down
Nvidia DualTV MCE Toshiba became the first laptop maker to incorporate
part gives Media Center Nvidia’s latest portable 3D accelerator, the GeForce Go
Edition PCs the power to 7900 GS. Although Toshiba still hasn’t embraced the sexy
record two different chan- nomenclature of gaming PCs, its P105-S921 got the tech-
nels simultaneously, watch one nology right: 160GB storage, Intel Core Duo CPU, and 17-
show while recording another, or just send inch widescreen. Now about that name. . . . ▲
two separate channels to different TVs in your home. The PCI card
has an internal splitter to divide an incoming analog video connec-
tion into two signals, and it includes an FM receiver for recording
and playing radio. The DualTV MCE records in MPEG-2 format at
720 x 480 resolution, and Nvidia’s MediaSqueeze technology will fit
all the “Different Strokes” episodes you can stand on your hard
drive. (Check out our hardware review on the card on page 22.) ▲

Your Cursor
Comes To Life
With Mus2
PC peripheral design goes all postmodern
on us with the Mus2 wireless mouse.
Using the same shape as the Windows
cursor it controls on-screen, the Mus2
plants the two action buttons at the tip
with a power indicator in the handle to
warn that your batteries are low. The opti-
cal sensor works at 800dpi, and it accepts
standard or rechargeable cells. Art
Lebedev, who also gave us OLED key-
boards and emoticon cushions, brings us
this curious “innovation.” The Mus2 will
be available this month and cost about
$60 (as of this writing). The site says that
this mutant mouse actually fits the hand Art Lebedev’s Web site says that his
quite nicely. Sure, if you like wielding a cursor-shaped wireless mouse
saber to control your PC. ▲ “doesn’t cause any discomfort.”

6 June 2006 / www.computerpoweruser.com


What’s Happening • Hardware

Upholstered Laptops On the Way


Your next laptop or digicam may be upholstered. Hoping to
make the Centrino both functional and sexy, Intel and Toray
Ultrasuede have created concept computers with ultrasuede
coverings. These “touchable laptops” have microfiber inte-
grated directly into the casing in blocks of color that resemble
a Mondrian painting. According to the “Intel/Ultrasuede
Laptop Style Study” (there are actually such studies?), 73% of
us want technology that reflects our personal style. And along
with shoes and apparel, 76% of us look at one another’s tech-
nology style choices. The ultrasuede stylings are not mere
appliqués; they need to be baked into a design, so we will
have to wait for an OEM to offer these upholstered models
directly. And we’re guessing they won’t be machine washable.
One more thing to dry clean! ▲ Microfiber isn’t just for sofas and vests anymore.

H a r d w a r e M o l e
LG Straddles The Next-Gen DVD Fence
Can’t decide whether to go BD (Blu-ray Disc) or HD DVD? If other manufacturers follow LG
Electronics’ lead, you may not have to commit to one side in this frustrating war over next-gen
formats. Even though LG has supported the Sony-led BD camp in the past, the hardware
maker told dealers to expect a dual-mode device that will play back both BD and HD DVD Can next-gen DVD
discs later this year. Analysts say that the hardware manufacturers finally realize that everyone players bring peace to
will lose in a protracted battle over formats, so expect to see more consumer-friendly devices the hi-def format wars?
that play on both sides of the fence. ▲

Will A PS3 Cost As Much As A Laptop?


A Sony executive in France ignited wild speculation about PS3 pricing when he
suggested that the upcoming console could cost as much as 500 to 600 euros (or
$600 to $730). The Sony corporate suits quickly corrected the press accounts,
claiming that no price had been set. In the kind of backpedaling usually reserved
for “misspeaking” politicians, the Sony handlers claim that its executive was sim-
ply indicating how its BD-powered, HD-capable unit would still be a bargain at
such a price. Uh, huh! ▲ It’s coming, and it’s going to be sleek,
stylish, and ‘spensive.
Finally, Power Goes Wireless
All of our devices have gone wireless, except for the power that runs them.
Until now. Tech provider ThinkGeek.com is offering the novel WEC
(Wireless Extension Cord; $34.99) that sends power between a
plugged-in base unit and a satellite receiver up to 300 feet away.
And don’t worry about the 7.2GHz microwave frequencies
it uses to invoke this wizardry. The company says its
WEC units put off no more harmful effects than the
normal “leakage” from a typical microwave oven. OK, Using microwaves the WECs (Wireless
we’ll try it, but if the coffee beside our laptop starts to Extension Cords) can send power to
boil, we’re pulling the plug. ▲ devices up to 300 feet away.

CPU / June 2006 7


W h a t ’s H a p p e n i n g • C h i p Wa t c h
Compiled by DeanTakahashi

IBM Launches SecureBlue Encryption For Microprocessors


IBM says it has a new technology that will vastly increase the security of ordinary consumer
gadgets and a host of electronic gear. The SecureBlue technology is a hardware-based
encryption accelerator that the company’s engineers can integrate onto any CPU. By
putting hardware encryption on the CPU die itself, SecureBlue can speed up encryption
and decryption tasks. Moreover, it could be much more secure than off-chip encryption
technologies, says Charles Palmer, senior manager of security and privacy at IBM Research.
Often, hackers can crack encrypted traffic by intercepting it as it moves from an encryption
processor over a data pathway into memory or the CPU. With SecureBlue, however, data
can move in encrypted form from memory into the CPU where it will be decrypted as it
moves into the CPU itself. “This helps us do away with the weak links in the system,”
Palmer says. He didn’t say which devices use the SecureBlue technology, but he did say that
devices have been shipping for a couple of years. ▲

Rapport Discloses Plans


To Create Chip With 1,025 Processors
Rapport hopes to shake up the handheld computer world with a new microprocessor that has
1,025 processing cores on a single chip. Andrew Singer, CEO of the Redwood City, Calif.,
startup, says the chip will be ideal for delivering smooth, high-definition video faster on a cell
phone or handheld computer. Rapport is teaming up with IBM to launch its Kilocore 1025
chip in 2007. The Kilcore 1025 will use an IBM PowerPC core to control the smaller cores on
the chip. It takes advantage of the ability to reconfigure itself on the fly to accomplish a great
deal of processing without consuming a lot of power, Singer says. Rapport is already shipping Luminary Micro’s
an earlier version of its chip (the KC256) with 256 processors on one chip. ▲ Stellaris Chips
Incorporate Low-
Watching The Chips Fall *Retail price
** Manufacturer's price per 1,000 units
Other current prices, if indicated, are lowest OEM prices Power ARM Core
Here is pricing information for AMD and Intel CPUs. available through Pricegrabber.com

CPU Released Original Last month’s Current Luminary Micro has a memorable
price price price price for its 32-bit microcon-
AMD Athlon 64 FX-57 6/27/2005 $1,031** $898 $898 troller: $1. The Austin, Texas,-
AMD Athlon 64 FX-60 1/10/2006 $999** $1,011 $1,011
based startup uses an ARM
AMD Athlon 64 X2 Dual-Core 3800+ 8/1/2005 $354** $292 $287
AMD Athlon 64 X2 Dual-Core 4200+ 5/31/2005 $537** $350 $347
Cortex-M3 32-bit core in its chip,
AMD Athlon 64 X2 Dual-Core 4400+ 5/31/2005 $581** $447 $447 running at 20MHz. A wide range
AMD Athlon 64 X2 Dual-Core 4600+ 5/31/2005 $803** $556* $543 of applications that are currently
AMD Athlon 64 X2 Dual-Core 4800+ 5/31/2005 $1,001** $625 $619 dominated by slower 8-bit and
Intel Pentium Processor Extreme Edition 955 3.46GHz dual-core 12/27/2005 $999** $1,011 $1,018 16-bit microcontrollers can use
Intel Pentium 4 631 3Ghz 2MB cache 800MHz FSB 65nm 12/27/2005 $178** $145* $174*
the 32-bit processor, says Wendell
Intel Pentium 4 640 3.2GHz 2MB cache 800MHz FSB 90nm 2/21/2005 $273** $212* $208*
Intel Pentium 4 641 3.2GHz 2MB cache 800MHz FSB 65nm 12/27/2005 $218** $215* $216*
Smith, director of marketing at
Intel Pentium 4 650 3.4GHz 2MB cache 800MHz FSB 90nm 2/21/2005 $401** $249* $270* Luminary Micro. At the April
Intel Pentium 4 651 3.4GHz 2MB cache 800MHz FSB 65nm 12/27/2005 $273** $278* $272* 2006 Embedded Systems Confer-
Intel Pentium 4 660 3.6GHz 2MB cache 800MHz FSB 90nm 2/21/2005 $605** $329* $329* ence, the company showed off the
Intel Pentium 4 661 3.6GHz 2MB cache 800MHz FSB 65nm 12/27/2005 $401** $408* $400* microcontroller in a robotic toy
Intel Pentium 4 670 3.8GHz 2MB cache 800MHz FSB 90nm 5/26/2005 $849** $610* $603* car that could sense obstacles and
Intel Pentium D 820 2.8GHz dual-core 2MB cache 800MHz FSB 90nm 5/26/2005 $241** $212* $197*
move around them. The micro-
Intel Pentium D 830 3GHz dual-core 2MB cache 800MHz FSB 90nm 5/26/2005 $316** $235* $254*
Intel Pentium D 840 3.2GHz dual-core 2MB cache 800MHz FSB 90nm 5/26/2005 $530** $352* $341*
controller has onboard memory
Intel Pentium D 920 2.8GHz dual-core 2MB 800MHz FSB 65nm 12/27/2005 $241** $251* $229* and is targeted at access control,
Intel Pentium D 930 3GHz dual-core 2MB 800MHz FSB 65nm 12/27/2005 $316** $324* $317* motor control, and other embed-
Intel Pentium D 940 3.2GHz dual-core 2MB 800MHz FSB 65nm 12/27/2005 $423** $437* $421* ded applications. ▲
Intel Pentium D 950 3.2GHz dual-core 2MB 800MHz FSB 65nm 12/27/2005 $637** $651* $625*

8 June 2006 / www.computerpoweruser.com


W h a t ’s H a p p e n i n g • I n t e r n e t
Compiled by Trista Kunce

S i t e
Wikipedia vs. Britannica S e e i n g
Wikipedia has had its share of inaccuracies, and because of the nature of this online You’ve Got Game: Online
beast that anyone can edit, these errors have all been made public. (You might
remember the “biography” written about John Seigenthaler and his association If you want to find game online for
with the Kennedy assassinations, which the man himself proved false.) But what free—get your head outta the basement;
about errors in other online encyclopedias such as Britannica? Nature recently pub- we’re talking sports here—check out
lished a study (www.nature.com/nature/journal/v438/n7070/full/438900a.html) Sportsvite.com. Maybe you’re looking to
comparing Wikipedia and hook up with someone to show off your
Britannica revealing “numerous mad one-on-one
errors in both encyclopedias.” hoops skills or
Britannica, however, says the assemble a group
study was “sloppy and careless” of competitive
and seemed to take a “pro- spirits to play poker; on Sportsvite.com
Wikipedia” position. If and you could find the perfect match (or
when this debate gains force, it’s matches) for you. ▲
important for users to acknowl- P2P Internet TV Sharing
edge that we all make mistakes,
and we should all double-check Veoh.com is not just another Web site
our resources before blindly where you can watch amateurs’ bad video
believing or even criticizing clips; it’s an “unregulated Internet TV
information we find online. ▲ network” that uses PeerCasting (similar to
traditional P2P file sharing but for TV-
www.keepyouronlinestufforganized.tel quality video sharing). OK, so there are
some unpleasant video clips on Veoh.com,
June seems to be the month for online organization. (See the “Keep Track Of Your but there are some pretty good ones, too.
Life With Google Calendar” article.) ICANN is contemplating the introduction of a And why not check it out when you can
new domain to help you organize all your online (and some offline) stuff. A .TEL upload your newest home-grown sitcom
domain Web site would help you sort your email and instant messaging accounts, (any length, any size file) free? ▲
Web sites, and phone numbers and easily provide all of this information to others
on one .TEL Web site. Whether this new domain will be useful or just another
thing for us to remember remains to be seen; ICANN reviewed the plans for .TEL
in April, but we might not see a decision for months. ▲

Keep Track Of Your Life With


Google Calendar
Google recently released a beta ver-
sion of an online calendar called— Unplug Your Web Search
you guessed it—Google Calendar.
The Calendar helps you simplify Imagine that you can’t get an Internet con-
and synch major and minor events nection on one of your wireless devices (we
in your day-to-day schedule. Similar know, as if that would ever happen, but
to Microsoft’s and Yahoo!’s calen- let’s pretend), and you need desperately to
dars, you can follow the events you Organize your life with Google’s new Calendar. check the online auction you’re bidding on.
enter, but you can also share your What will you do? Check your hard drive,
calendar with friends (or the world) and even create and send invitations to them of course, because you have a new, free ser-
to attend the next LAN party you’re hosting. The Google Calendar is free with a vice called Webaroo that lets you search
Google account and syncs easily with Gmail, other calendar programs, and devices Web sites while you’re offline. As the Web
that use iCal or XML files. ▲ site says, it’s “search . . . unplugged.” ▲

CPU / June 2006 9


W h a t ’s H a p p e n i n g • S o f t w a re
Compiled by Steve Smith

AJAX Does It All


The great shift is on as programmers exploit the powerful AJAX technique
for bringing interactive applications right into a Web page. This month
the startup ajax13 offers a glimpse of a future where sophisticated applica-
tions work anywhere, anytime from the browser. The marvelous ajax-
Write offers a Word-like interface (menus, toolbars, pop-up dialogue
Windows) straight from the ajaxWrite.com site. You can load up DOC
files from your hard drive and edit and save them back to your PC with-
out having to buy MS Word. More amazing is ajaxSketch (www.ajax
sketch.com), which pops up a window that is indistinguishable from a ajaxWrite is taking the next leap forward in turning
traditional drawing program. ▲ full-featured applications into Web services.

MediaCoder Brings
Super-Translation Open Source
Here’s one open-source program that will leave you openmouthed with its
power to transcode huge batches of every imaginable audio and video file
across formats. Author Yi-Chun Huang has gathered into the nicely pol-
ished MediaCoder (mediacoder.sourceforge.net) all of the codecs and
translation tools from the worldwide open-source community into what
seems like a universal translator. You can convert entire folders of MP3,
FLAC, Ogg Vorbis, H.264, MOV, and loads of others without having to
install their native media players or confusing piles of clashing codecs.
MediaCoder isn’t for the fainthearted novice, to be sure, because there are
more obscurely labeled codec options here than we’ve ever seen. For mul- Just name a codec, and MediaCoder probably
timedia swine like us, however, this is hog heaven. ▲ can transcode it.

Apple’s Reading Your PSP


Window Of Opportunity
We can’t say that we’ll be
When Apple Macs turned from reading Leo Tolstoy on our
Power PC processors to Intel silicon Sony PlayStation Portable,
earlier this year, the first question but it’s nice to know that we
was, will they run Windows? Apple could. A British PSP news
finally answered “yes, kinda” with its and info site (www.para
Boot Camp beta. Owners of Intel- blax.co.uk) has released the
based Macs with the latest Mac OS X PSP ebook Creator. This lit-
version and a firmware update can tle tool converts plain text
install their own version of Windows files, which you can find for
XP and opt into one OS or the other at start up. Boot Camp most world classics at Gut- The PSP ebook Creator turns raw
prepares your Mac by burning necessary drivers onto a CD, so enberg.org, into sequential text into PSP pages.
WinXP can recognize and use the Apple hardware. Despite image files formatted for
this new détente between traditional nemeses, Apple still can’t easy viewing and paging on the PSP. The program lets you set
help getting a dig into its rival, warning users that in a WinXP background images, text fonts and colors, and even adds in
state their Macs are susceptible to all “the same attacks that page numbers. Alas, it can’t make “War and Peace” any short-
plague the Windows world.” Ouch! ▲ er to read. ▲

10 June 2006 / www.computerpoweruser.com


What’s Happening • Software

S o f t w a r e
S h o r t s
Apple joins the PC
BAPCo Gets Apple To Bite benchmarking
Are the historically divided worlds of Apple and club; there goes
PC finally converging after all of these years? the neighborhood.
Not only is Apple allowing Windows onto its
systems (see “Apple’s Window Of Opportu-
nity”), but the company also joined the BAPCo
(SYSmark, MobileMark) consortium of PC and peripheral manufacturers that create
benchmarks for the Windows platform. Speculation has been running wild as to why Apple
would join this group, but the motive may be to create, at long last, fair performance com-
parisons between the two platforms. Apples to apples, so to speak. ▲ The UpShot
Is Making
Microsoft’s Monaco Bites Back Shutterbugs
It turns out that the Apple and Windows worlds aren’t really living happily ever after despite all
Happier
of this month’s cross-platform friendliness. Microsoft wants to steal one of Apple’s core con- Bellamax says its new UpShot
stituencies, amateur musicians, with a Vista-based app code-named Monaco. The music syn- image editor was designed to
thesizer/editor competes directly with the Mac-based GarageBand app, but some of Microsoft’s satisfy the 75% of digital pho-
development partners say Monaco will show off Vista’s capabilities and may include unique tographers who say they aren’t
search features for finding and integrating music clips. Will aspiring Bon Jovis spurn Apple and completely satisfied with cur-
fly to Monaco? Who would you rather rock with? Steve Jobs or Bill Gates? ▲ rent editors. UpShot promises
Apple’s music synthesizer has Microsoft on its tail. more efficient photo-correction
functions, clearer embedded
tutorials, and a simplified
menu structure. Its FastFix tool
performs color correction, red-
eye removal, brightness adjust-
ment, and segment correction
with one button push. Now, if
it could digitally remove for-
mer boyfriends/girlfriends
from pictures—that would be a
standout selling point. ▲

Compiled by Steve Smith


BIOS Upgrades Available Online
Before you send another motherboard to the landfill, consider upgrading the BIOS and giving your PC a new lease on life.
Here are a few recently released upgrades. Readers can check out www.cpumag.com/cpujun06/bios to see our entire upgrade list.
Motherboard Date Available URL
ASRock 775Dual-880Pro 3/29/2006 download.asrock.com/bios/775/775Dual-880Pro(1.40)Win.zip
Asus A8N5X 3/24/2006 dlsvr03.asus.com/pub/ASUS/mb/socket939/A8N5X/A8N5X902.zip
Epox EP-8GF6100-M 2/21/2006 www.epox-europe.com/downloads/download.php?download_id=775&mode=zip
Gigabyte GA-8I945PLGE-RH 3/20/2006 america.giga-byte.com/MotherBoard/FileList/BIOS/bios_ga-8i945plgerh_f3.exe

Intel D975XBX 4/4/2006 downloadfinder.intel.com/scripts-df-external/confirm.aspx?ftpDown=ftp://aiedownload.intel.com/df-support/


10321/eng/BX0908P.BIO&agr=N&ProductID=2205&DwnldId=10321&strOSs=38&OS
FullName=OS%20Independent&lang=eng
Tyan K8SRE 3/17/2006 ftp://ftp.tyan.com/bios/2891_202.zip

CPU / June 2006 11


Compiled by Steve Smith

Who’s Buying Those Banners, Anyway?


Online marketing has enjoyed double-digit growth as traditional TV and print advertis-
ers rush to promote their wares on the Web. But who’s buying up all of that banner
and rich media space? Primarily it’s still the dot coms, according to TNS Media
Intelligence, which found that most of the top ad buyers in January were themselves
Web-based businesses such as Netflix and Classmates.com. The notable excep-
tion is the Internet’s top advertiser by a long shot, Vonage. The company’s marketing
philosophy is that its customers are people who have and are comfortable with
broadband, so that’s why it spends more than 50% of its advertising budget online.

12 June 2006 / www.computerpoweruser.com


The Saint

Going . . . Going . . . Gone . . . .


F oraboutthe thelast “coming”
few years, I’ve been writing
demise of PC gaming
Intel shows no signs of learning anything
from its mistakes and continues to ship low-
due to chronic shortsightedness on the part of performance 3D processors as the default
Microsoft and Intel. Given the most recent graphic chips on the 50 to 60% of the con-
data from the NPD Research group, PC sumer PC market that is below a $600 price
games sales have declined to a $953 million point, as though anybody buys a new consumer
annual business down from their peak of $2.3 PC not expecting to be able to run new PC
billion in the 1990s. The PC game business games on it. Here’s a link to the Intel Web site
has collapsed 36% since the launch of the titled “Extreme Gaming On The Go” that
Xbox in 2001. Nice job, guys; way to saw off clearly illustrates how confused Intel is on this
the limb you’re standing on. subject: www.intel.com/personal/gaming
Microsoft meanwhile shifted the entire /mobile_laptop.htm. The very first bullet point
game industry’s focus away from Windows, its in the paper supporting Intel’s great gaming
wildly profitable OS business, to the bottom- capabilities reads, “Maximized mobile perfor-
less Xbox money pit, a game console that is mance and multitasking capabilities such as Alex St. John was one of the
widely popular with significant market share as watching a high-definition movie while convert- founding creators of Microsoft’s
long as Microsoft massively subsidizes it. ing your audio CDs to MP3s with Intel’s first DirectX technology. He is the
Microsoft has been unusually efficient at mobile optimized dual-core processor” subject of the book “Renegades
screwing itself on multiple levels here; first it Sounds fun. . . . You just can’t make this Of The Empire” about the
took the only applications that drove consumer stuff up. creation of DirectX and
demand for new PCs—and hence new OSes— I’ve never seen anything like it; it’s like Chromeffects, an early effort
and diverted them to the Xbox 360. The com- Microsoft and Intel wrapped themselves with by Microsoft to create a
pany ingeniously failed to deliver enough Xbox dynamite, climbed on a bus with all their cus- multimedia browser. Today
360s to satisfy consumer demand on launch, tomers, and hit the trigger. Alex is president and CEO of
thereby destroying the holiday sales of all the Don’t get me wrong; I think the Xbox WildTangent, Inc., a technology
former PC game developers who had followed and Xbox 360 are great consoles, and I think company devoted to delivering
Microsoft to Xbox development. The coup-de- it’s extremely cool to have a console power- CD-ROM quality entertain-
grace, however, is Vista, a new consumer OS house based here in the U.S. It’s just a ment content over the Web.
that Microsoft plans to release after Xmas shame that Microsoft and Intel lost perspec-
that’s even worse at running games than tive along the way. If they were going to lose
Windows XP. Vista will need a minimum of billions of dollars launching a new console
512MB of RAM just to boot sluggishly and do in the United States, it would have served all
nothing; you’ll need a gig of RAM to actually their interests better if the Xbox had
run another application in it. remained a PC-based architecture and if
To be fair, there are a few PC game genres Microsoft had made absolutely certain that
that will always have a market. First-person the developer and publishing environment
shooters, real-time strategy games, and spanned smoothly to the PC, thus multiply-
MMOGs will always have a big home on the ing the potential market for PC/Xbox game Nice job,
PC, but a lack of broad demand for leading- developers instead of splintering it. Intel des-
edge PC games will lead to a lack of broad perately needs to realize that consumers
support for leading-edge PC graphics by ATI don’t want hand-me-down enterprise CPU guys; way to
and Nvidia. architectures. A modern Intel Processor has
Twenty-some years after consoles swept enough fast RAM and transistors to be a
through America and dominated interactive next-generation console all by itself if only saw off the
entertainment in the living room, Intel is some of those transistors were configured to
busy trying to drive sales of new PCs for the be a GPU.
living room with a marketing program called Intel and Microsoft have gone the same limb you’re
Viiv that promotes old PC titles, old arcade strange route together, making their products
games, and 2D content you can play with a bigger and more complex for no apparent
remote control. productive purpose. ▲ standing on.
Send your feedback to TheSaint@cpumag.com

14 June 2006 / www.computerpoweruser.com


o one would believe us without the photos, so
N there we were, snapping 4,080 x 4,080 print after
print. It looked like a headless horse, man, only it was
clearly an automaton. We don’t know how it learned to
run that weird, white machine, but it clearly thought no
These Gizmos one was watching. And when a glistening, titanium horse-

Don’t Sing It, skull emerged from the machine, well . . . you’ll have to
buy the story rights to hear the rest.
They Bring It by Marty Sems
Boston Dynamics BigDog
It’s as if Dr. Doolittle has been marooned on a technologi-
cal Island of Dr. Moreau. The BigDog prototype from
Boston Dynamics (www.bdi.com) looks like a mash-up of a
pushmi-pullyu and Herbie Hancock’s “Rockit” video. In
the big, 27MB WMV video on the Web site, you’ll see this
quadruped robot negotiate harsh terrain and even recover
from a few kicks and shoves with amazing, computer-
controlled balance. The military and rescue potential here
is huge, although Boston Dynamics, a MIT spin-off,
declined to estimate BigDog’s eventual price, nor when/if it
might canter onto the world stage. If you ignore the racket
of its gas engine, BigDog seems like id Software combined
the lower halves of two distance runners in black tights for
a Doom 3 expansion pack. Bring on the nightmares.

Hasselblad 503CWD Anniversary Kit


It’s not long after the Oscars at this writing, and we imag-
ine there was a photograph or two taken that night.
Paparazzi pros would’ve loved to have had the latest
Hasselblad central-shutter camera, a limited edition
503CW (www.hasselbladusa.com). It’s paired with a 16MP
CFV digital camera back to form the $12,995 503CWD
Anniversary Kit, which commemorates the 100th anniver-
sary of Victor Hasselblad’s birth. Even some actresses got in
on the shutterbug act, thanks to the Kwiat diamond-mono-
grammed Kodak digicams given to the nominees for Best
Actress. Not to spoil the party, but we’d think that Reese,
Keira, and the rest could net more than the $20,000 origi-
nal prices for their cameras at an auction for charity.

Arcam EBM S400


Design it in CAD in the morning, come back after lunch
and marvel at your creation, magically realized in titanium.
The EBM S400 prototyper (about $600,000) uses an elec-
tron beam to melt layers of powdered alloy into a solid part
ready for heat treatment. The fast process avoids the forma-
tion of pinholes or bubbles, so parts fall between wrought
and cast titanium in strength. The rendering also takes
place in a vacuum, so the metal can’t oxidize. Stratasys
(www.stratasys.com) distributes the EBM S400 (known as
the EBM S12 to the rest of the world) in North America
for the Swedish manufacturer Arcam AB. Arcam says auto-
motive, aviation, medical—we say hood ornaments, wild-
cat revolver cylinders, orthodontia. . . . ▲

CPU / June 2006 15


reviews | hardware

The Power To Protect


Eight UPS Units Tested & Reviewed

here are few other things in UPSes aren’t just a battery and power frequency variation. All of this must

T computing more annoying than


having hours of work trashed
instantly because your computer has
strip hashed together, though. Your
computer and your wall socket work
with AC, or alternating current, while
work almost instantaneously.
Ideally, UPSes must also communi-
cate with the computers they’re protect-
experienced a momentary power failure. the battery stores electricity as DC, or ing. Windows, Mac OS X, and Linux
Sometimes, that’s the least of your wor- direct current. Thus, a complex combi- have built-in abilities to detect if they’re
ries. Repeated power drops and surges nation of rectifiers, inverters, and switch- on battery power, sense how much time
can easily damage your computer com- es automatically converts AC into DC remains before the battery discharges,
ponents, meaning a simple reboot after for charging the batteries, and DC back and automatically shut down cleanly. All
a power failure won’t always get you into AC to power your equipment dur- the UPSes I tested here include software
back in business. Fortunately, UPSes ing a power failure (a total power loss) or that also does this, in addition to cleanly
can take care of this problem, letting a brownout (a partial power loss). UPSes save open files and in many cases, more.
you rely on a powerful battery to supply must also absorb power spikes (a tempo-
electricity to your computer when your rary excess of power, such as a local How We Tested
wall socket can’t any longer. lightning strike) and filter line noise and Obviously, creating lightning strikes
was beyond my testing abilities, so I
relied on other options. To test auto-
saving and auto-shutdown functionality,
What Buying UPS Protection Gets You I used a sacrificial 1.4GHz Pentium 3
system with two hard drives, two optical
W e looked at eight UPSes from four leading manufacturers for this roundup with prices
running between about $85 and $165 (street). Feature-sets and bundled extras, of course,
will vary depending on price points, but here’s how the units match up based on various criteria.
drives, four fans, several PCI cards, and

APC Back-UPS APC Back-UPS Belkin Battery Belkin Battery CyberPower CyberPower
ES 750 RS 900 Backup 1000VA Backup 1100VA 800AVR 1285AVR
Price $99.95 $149.99 $159 $153 $99 $149.99
Backup Outlets 5 4 8 4 4 4
Transformer-Friendly 1 1 0 4 2 1

Surge-Protected Outlets 5 3 0 2 8 8
Transformer-Friendly 1 1 0 2 2 0

Circuit Breaker Reset Y Y Y Y Y Y


Phone Filter N Y Y Y N N
Ethernet Filter Y Y Y Y Y Y
Coax Filter Y N N N Y Y
Advertised VA 750 900 1,000 1,100 800 1,285
Runtime (minutes) 19 27 16 17 12 29
Serial Port N N Y Y Y Y
USB Port Y Y Y Y Y Y
Network Port N N Optional N N N
Serial Cable N N Y Y N N
USB Cable Y Y Y Y Y Y
Network Cable Y Y N N N N
Phone Cable Y Y Y Y Y Y
Coax Cable N N N N Y Y
Equipment Protection Policy $50,000 $150,000 $200,000 $100,000 $200,000 $375,000

CPU RANKING ● 0 = ABSOLUTELY WORTHLESS | ● ● ● 2.5 = ABSOLUTELY AVERAGE | ● ● ● ● ● 5 = ABSOLUTELY PERFECT

16 June 2006 / www.computerpoweruser.com


reviews | hardware

a floppy drive all running on Windows


XP. The test rig consumed 0.195 kilo- Back-UPS ES 750
watts of power. Essentially, I pulled the $99.95
plug to see what would happen. I mea- APC
sured the UPSes’ runtime using the www.apcc.com
same machine (to simulate a heavy load) ●●●●
with shutdown options disconnected to
prevent a premature automatic shut-
down before the power ran out. I also Back-UPS RS 900
connected a 17-inch Sony Trinitron $149.99
monitor and left it on throughout test- APC
ing, as you can’t really work on a com- shows in its products, as the run- www.apcc.com
puter without one. times of the APC units I tested were ●●●●●
For this roundup I looked to the much higher than the advertised VA
major players in the UPS field for units (volt amp) ratings would suggest.
in the $150 range, letting their feature- Additionally, the bundled PowerChute slits, which would indicate they’re posi-
sets and power levels fall where they software is first-rate. There aren’t many tioned correctly. The monitor did make a
may. I also looked at slightly less-expen- outward bells and whistles, however, buzzing noise and displayed slightly jittery
sive units where possible to get an idea and both units share some typical images when running from the battery.
of what features you give up as prices minor APC quirks. APC’s PowerChute Personal Edition
go down. The various units are grouped The Back-UPS ES 750 looks like a 1.5 software comes with both units, al-
according to manufacturer. wide, fat, tall power strip and only has one though version 2.0 is available for down-
button and status light. As with all APC load at APC’s site. Functionality seems
APC Back-UPS ES 750 & Back-UPS RS 900 units, you have to connect the internal identical between the two versions,
APC (American Power Conversion) battery yourself, which requires good hand although 2.0 looks much more modern.
is practically synonymous with UPSes, strength, nimble fingers, and possibly a Basic stats appear along the bottom of
so much so that a lot of people actually pair of needle-nosed pliers. Also common the PowerChute window (including cur-
call UPSes “APCs,” similarly to how of all APC UPSes is a nonstandard con- rent power source and estimated battery
people call tissues “Kleenex” or photo- nectivity cable, which is USB on one end runtime, which seemed low), hypertext
copies “Xeroxes.” APC’s experience and what looks like a fat LAN cable con- links to commands run along the top (or
nector on the other. Keep the cable safe, as the left side in 2.0), and content appears
my local Radio Shack didn’t carry spares. in the middle.
Tripp Lite Tripp Lite The unit’s 10 sockets (five backed up, five There are several interesting settings
AVR 750U Smart 1200 LCD surge-protected) encourage heavy use, and available in the software, such as turning
$89 $165 street the unit managed to power my test off the alarm buzzer if there’s a power
6 8 machine for 19 minutes. Built-in coax failure at night, adjusting the sensitivity
2 2 connectors can filter your cable modem’s to power fluctuations, and setting the
cable, which is rare for this price point. maximum or minimum line voltages
6 0 The Back-UPS RS 900 is an upscale before the battery kicks in. You can also
2 0 unit for home and office use. It looks like set automatic shutdown to maximize
a small, beige computer tower but is about runtime or battery life. The RS 900’s
Y Y
half as wide as a SFF-style chassis. There’s PowerChute version also lets you run a
Y N
N Y
a push-button switch and four clearly self-test of the UPS itself and display the
N N labeled indicator lights on the unit’s front, current power load (which seems slight-
750 1,200 with all the other connections located on ly high). Both units run a self-test every
13 33 the back making for a tidy presentation. time you turn them on with the switch,
N Y The RS 900 has jacks for both phone- and so ES 750 users shouldn’t feel too left
Y Y network-surge protection, along with a out. APC doesn’t offer Mac or Linux
N N grounded screw for various audio and net- versions of the software.
N Y work hardware. There are just seven
Y Y power sockets, however. Belkin Battery Backup 1000VA Tower
N N
The RS 900 kept my test system going & Backup 1100VA
Y N
for an impressive 27 minutes. I noticed Belkin is widely known for its line of
N N
$100,000 $250,000
there was a lot of heat escaping the venting quality computer peripherals, and its

CPU RANKING ● 0 = ABSOLUTELY WORTHLESS | ● ● ● 2.5 = ABSOLUTELY AVERAGE | ● ● ● ● ● 5 = ABSOLUTELY PERFECT

CPU / June 2006 17


reviews | hardware

even for files you haven’t named, and


Battery Backup 1000VA Bulldog tells you where those files are
$159 located upon the next boot. The soft-
Belkin ware can also schedule shutdowns and
www.belkin.com reboots regardless of power status. The
●●●● software is available for Windows, Mac
OS X, and Linux, although I only test-
Battery Backup ed the Windows version.
1100VA
CyberPower Systems 800AVR & 1285 AVR
$153
Belkin CyberPower Systems is a relative new-
www.belkin.com comer to the UPS market (almost 10
●●●● years in), but its products are in most
major U.S. electronics and office-supply
stores. The company has UPSes available
UPS units don’t disappoint, either. name also mentions this), implying at almost any price point, and its bun-
Although the power-off runtime of these that you can plug two computers into dled software is simple and effective.
units is lower than their advertised VA the UPS at the same time, hook a serial The 800AVR looks like a large, wide
ratings would suggest, the units’ bun- cable into one, a USB cable into the power strip with four backed-up outlets
dled software, simple controls, and data- other, and when the power fails, both on one side and four more with surge
recovery warranties may compensate. computers will safely shut down auto- suppression on the other. Although the
The 1000VA Tower is arguably the matically. The user guide, however, unit is far too heavy to actually mount
more attractive of the two UPSes, as it states that you should only use the on a wall (wall mount slots are molded
looks rather like a blade server (although serial or USB port. In practice, when into the unit’s bottom), you could
no rack-mounting hardware is provid- the serial cable is connected, the USB probably take the unit to a LAN party
ed). The 1000VA comes with a stand to connection is dropped. In other words, or gaming convention without too
set it up in a stable tower configuration, the UPS can’t communicate via both much trouble. Coax and Ethernet jacks
but due to its low center of gravity, the ports at the same time, so only one suppress harmful power surges with
stand seems unnecessary. In a horizontal computer would shut itself down. their respective cables, and dual USB
configuration, the 1000VA looks good Belkin’s Bulldog Plus Monitor 3.2.19 and serial ports keep your connectivity
in an audio-visual tower configuration, software ships with both units and is options open, although the bundled
protecting your Media PC or TiVo excellent overall. Although the software software only works with USB. Each
while looking like a cable TV box. All is apparently unable to accurately esti- power socket is well-marked. The unit
eight of its sockets are backed up, so you mate remaining time on the battery, its powered my test system for 12 minutes.
can’t plug laser printers (or perhaps a default settings shut a computer down The 1285AVR is an attractive tower
plasma TV) into a surge-protected sock- five minutes after power loss. You can with a high “cool factor,” thanks to its
et. All cable connections are at the unit’s manually override the shutdown; turn ice-blue LCD. The LCD always dis-
back, and there’s a push button switch off its shrill alarm; and monitor battery plays battery load and capacity, but
and indicator light set at the front. The voltage, battery level, input/output volt- clicking the display’s button will also
1000VA kept my test computer running age or frequency, and the output load. cycle through input or output voltage,
for 16 minutes. As was the case with the Full diagnostic tests are available,
APC ES 750, the Sony monitor buzzed along with a complete history of all
1285 AVR
when running off the battery. power-related issues. If your Tower
$149.99
The 1100VA is substantially smaller, unit has the optional SNMP module,
CyberPower
but all its sockets are on top, making you can even monitor UPSes over a
Systems
it quite a bit messier and looking like network. Saving files in running pro-
www.cyber
Medusa’s head when it’s fully utilized. grams during shutdown works well,
power.com
The unit is rated for slightly more
●●●●●
power, however, and it kept my test rig
running for 17 minutes, although it 800AVR
got much warmer than its taller broth- $99
er. The 1100VA’s specs state that it CyberPower Systems
has USB and serial ports for multicom- www.cyberpower.com
puter management (the product’s full ●●●●

CPU RANKING ● 0 = ABSOLUTELY WORTHLESS | ● ● ● 2.5 = ABSOLUTELY AVERAGE | ● ● ● ● ● 5 = ABSOLUTELY PERFECT

18 June 2006 / www.computerpoweruser.com


reviews | hardware

output frequency, output wattage, bat- popular with IT department heads. This eight power sockets. Unique among all
tery capacity (again), and remaining may explain the units’ outstanding run- the UPSes here is the 1200 LCD’s
runtime in minutes. It would be cooler time, utilitarian designs, and somewhat onboard Mute switch, although there’s
if the display always remained lit, such clunky, but powerful, software suite. no way to unmute the alarm once its
as Tripp Lite’s LCD, instead of going The AVR 750U follows the classic activated without having to reset the
out after 30 seconds—a configuration big-fat-power-strip model that’s popu- UPS. Runtime was a spectacular 33 min-
setting would be ideal here. Four lar at the low-end. The unit has an eye- utes, and the LCD’s “fuel gauge” was the
backed-up power sockets and four popping 12 power sockets (six backed most accurate of all the UPSes. You can
surge-protected sockets take up the up, six surge protected), along with a use both serial and USB ports for status
unit’s rear, along with serial and USB single USB connector and a set of RJ11 monitoring, and two different computers
ports for connectivity, and filtered coax jacks for filtering phone lines. But that’s can work at the same time with each of
and Ethernet jacks. Unique among the it. The markings engraved on the black the ports. Most UPSes sell fairly close to
units here is the 1285AVR’s internal plastic are a little hard to see and are all MSRP, but this unit’s street price is sub-
cooling fan, although it never spun up but impossible to determine in low stantially lower, so look around.
other than during its power-up test. light, meaning you need to take care Both units come with PowerAlert
The 1285AVR kept my test computer when you want some items on the bat- Console 12.3 software, but 12.4 is avail-
running 29 minutes; 11 more minutes tery but others just protected from able for download. Both versions appear
than the LCD estimated. surges. The AVR 750U identical, but 12.4 lacks a help file, so
Both the UPSes come with kept my test computer install from the CD and then upgrade to
PowerPanel Personal Edition running for 13 minutes. the current version, which adds every-
software. The CD probably had thing. PowerAlert is a combination of a
the current version (I couldn’t small Windows service that actually
find version numbers listed Smart 1200 LCD monitors the UPSes and performs the
anywhere), but you can down- $165 (street) clean shutdowns and the Console, which
load the current version on Tripp Lite is a clunky Java app that changes settings
CyberPower’s site. PowerPanel www.tripplite.com and performs tests. PowerAlert works for
only works with the USB port; ●●●● various Unix and Linux distros, but
the serial port is intended for
built-in OS functionality only
and a serial cable isn’t included. VR 750U
If you supply one yourself, two $89
computers can work off one Tripp Lite
UPS and shut down cleanly. www.tripplite.com
PowerPanel is friendly and ●●●●
easy to use and seems similar to
APC’s PowerChute 1.5 soft-
ware, including using almost there is no mention if it working with
the same icons, menu structure, Mac OS X.
and feature set. This certainly isn’t bad, The Smart 1200 LCD is a tall tower Console has two modes: Home Device
as both software packages are excellent. that’s also suitable for rack mounting, Management Scheme (simpler but lacks
The software shows you the current load but it looks very utilitarian. The included certain commands) and Business Device
and charge status, maximize runtime vs. hardware brackets make adding it to a Management Scheme (has all the com-
battery life, and history logs. The soft- rack easy, but they can also act as a floor mands but can be confusing). Getting a
ware also lets you disable the alarm stand, which is a good thing because as a current status of the UPS requires click-
buzzer depending on the time of day tower, the UPS is tipsy and top-heavy. ing several poorly labeled buttons and
and run self-tests. PowerPanel does lack The 1200 LCD’s bling factor comes in lots of scrolling. Changing settings also
APC’s voltage-sensitivity settings. the form of an onboard LCD, which dis- requires clicking tabs within tabs. Still,
Mac and Linux versions of Power- plays input voltage, current battery level, the software can perform tasks that the
Panel aren’t available, but the OSes do and various other conditions via icons. others here can’t, such as emailing you
support these UPSes directly. You can rotate the LCD to work both in when power is dropped or easily moni-
tower and horizontal orientations, and it toring multiple devices, including those
Tripp Lite Smart 1200 LCD & AVR 750U remains on as long as the UPS is on. All from other vendors with plug-ins. ▲
Tripp Lite has been in the UPS game cabling connects at the rear for a neat
for more than a decade and is very installation, and the battery backs up all by Warren Ernst

CPU RANKING ● 0 = ABSOLUTELY WORTHLESS | ● ● ● 2.5 = ABSOLUTELY AVERAGE | ● ● ● ● ● 5 = ABSOLUTELY PERFECT

CPU / June 2006 19


reviews | hardware

Seagate Momentus 5400.3 160GB


eagate’s first perpen- burping) range. An offload ramp lets 84.19IOps Web Server scores in IOmeter
S dicularly recording
hard drive is the
the heads park when the drive is
off, letting the 5400.3 with-
2004.07.30. I don’t have many 2.5-inch
drives with which to compare the 5400.3
Momentus 5400.3 for stand a shock of up to 900G yet (not counting Seagate’s USB 2.0 ver-
notebooks and low-end (1ms) when not operat- sion) on my current benchmarks, but it
servers. (We previewed it in ing. Even while run- appears that this Momentus would make a
the March issue of CPU on ning, the drive is as fine, high-capacity addition to a notebook
page 31.) tough (350G, 2ms) as the or special purpose PC.
The current perpendicular drives, best desktop drives are when Despite its new recording layer technolo-
such as Toshiba’s groundbreaking powered off. This Momentus draws gy, the Momentus 5400.3 gets Seagate’s
MK4007GAL and MK8007GAH, only no more than 2 watts, idles at 0.8W, and full backing with a five-year warranty. It’s
hint at the technology’s potential. The stands by at 0.2W, Seagate says. It takes 1 not the first perpendicular drive, but it’s
real implications will be felt later. PR will amp from the 5V rail to spin up. certainly a momentous achievement for the
make possible vastly higher capacities The 5400.3 averaged 36.4MBps reads world’s largest hard drive manufacturer. ▲
down the road: at least several times and 34.5MBps writes in my tests. It peaked
more areal density than today’s hard at 45MBps reads and 43MBps maximum by Marty Sems
disks have and possibly up to 10 times writes, with a 16.2ms random access time
more, according to some experts. in HD Tach RW 3.0.1.0. Other highlights
Momentus 5400.3 160GB
Fluid dynamic bearings and head seek are 6.6MBps Windows XP Startup and
$293 (online)
management keep the 5400.3 in the 40.2MBps ratings in PCMark05 1.1.0,
Seagate
23dB (Marcel Marceau) to 29dB (angels along with 78.95IOps File Server and
(831) 438-6550
www.seagate.com
Specs: Perpendicular recording, 5,400rpm, 8MB cache, FDB, ATA/100, 12.5ms
advertised seek ●●●●●

Quake 4 and F.E.A.R. took wasn’t surpris-


Matrox TripleHead2Go ing. I dropped from 104fps to 38.2fps in
Quake 4 when I adjusted my resolution
hether the scenario is wanting a remains ATI owners should steer clear from 1,280 x 1,024 to 3,840 x 1,024 on
W broader perspective in a Molten
Core raid or simply craving more desk-
until there’s better support.
Because of bandwidth limitations, the
Ultra quality with 4XAA. In F.E.A.R., my
frame rate dropped from 86fps to 44fps
top real estate, I think at one point or TripleHead2Go uses analog outputs to after I shifted from 1,024 x 768 to
another, we’ve all wanted a way to break a 3,840 x 1,024 output into three 3,072 x 768 with 4X AA and 8X AF.
increase our workspace without buying a 1,280 x 1,024 signals for each display. A Matrox does have an expansive list of
30-inch display. Matrox must think DVI-to-analog switch didn’t bother me as games the TripleHead2Go supports, and I
there are an exorbitant number of us much as some skewing in Quake 4. can’t deny surround graphics is great for a
running around with extra 19-inch dis- F.E.A.R. thankfully didn’t have this prob- 180-degree field of view for MMORPGs or
plays: Its TripleHead2Go lets you link lem, but proper scaling might be hit-and- FPSes. But until it can evolve better sup-
up to three monitors together for a max- miss with other games. port for ATI hardware, the TripleHead2Go
imum resolution of 3,840 x 1,024. My GeForce 7900 GTX 512MB had to is an accessory for Nvidia owners only. ▲
I’m tempted to rename the Triple- pump out three times as many horizontal
Head2Go the “TripleHead4GeForce” pixels, so the sizeable performance hit by Vince Cogley
because of its quirky support for ATI
GPUs. Not only does it currently lack
support for CrossFire, but any Radeon TripleHead2Go
graphics cards will also run below the $299
TripleHead2Go’s maximum resolution Matrox
in 3D applications. Matrox addressed (514) 822-6000
the issue, saying it’s lobbying ATI for a www.matrox.com
driver release with support, but the fact ●●●

Specs: DVI-I to VGA cable, 4 HD-15 (1 input, 3 output) ports, Matrox


Surround Gaming Utility

CPU RANKING ● 0 = ABSOLUTELY WORTHLESS | ● ● ● 2.5 = ABSOLUTELY AVERAGE | ● ● ● ● ● 5 = ABSOLUTELY PERFECT

20 June 2006 / www.computerpoweruser.com


reviews | hardware

Corsair XMS2 TWIN2X1024-8500


n preparation for the launch of new plat- motherboard, and found it performed
Ireleased
forms from Intel and AMD, Corsair has
a new high-end DDR2 memory
very well. With the TWIN2X1024-8500
kit installed, my test system put up
kit that promises increases in bandwidth 196.6fps in Quake 4 at the game’s low-
and effective clock speeds faster than quality setting, and it managed more than
1GHz. The XMS2 TWIN2X1024-8500 is 6.7GBps in Sandra’s buffered memory
a 1GB DDR2 memory kit comprised of benchmark, compared to 184fps and
two matched 512MB CM2X512-8500 about 6.5GBps using DDR2-800 RAM.
sticks rated for operation at 1,066MHz launch. It is also useful for Intel overclock- It may take a next-generation platform
with 5-5-5-15 timings. At lower clock ers and owners of Intel processors that fea- to fully exploit the performance capabili-
speeds, however, this memory should have ture a 1,066MHz front side bus. The ties of Corsair’s TWIN2X1024-8500
no trouble running with tighter timings. TWIN2X1024-8500 kit now gives users memory kit, but for now this stuff offers
My kit, for example, was able to run reli- the ability to run their RAM synchronous- excellent performance and a ton of over-
ably at 3-3-3-9 at DDR2-767. ly with their processor’s FSB on supporting clocking headroom. ▲
The actual memory chips these mod- motherboards; think 975X Express, which
ules are built with are selectively binned usually results in better performance. by Marco Chiappetta
Micron Rev: D RAM. The high-frequen- I took this memory for a spin using a
cy operation the TWIN2X1024-8500 dual-core Pentium Extreme Edition 965
XMS2 TWIN2X1024-8500
kit offers, though, will be useful when processor, a GeForce 7800 GTX, and an
$229
Intel’s Conroe and AMD’s AM2 platform Asus P5WDG2-WS 975X Express-based
Corsair
www.corsairmicro.com
Specs: capacity: 1,024MB (512MB x 2), 64M x 8 DDR2 SDRAMs; latencies: 5 (CAS),
●●●●
5 (RAS Precharge), 5 (RAS to CAS), 15 (RAS Activate to Precharge), 2T (Command
Rate); voltage: 2.2V; lifetime warranty

DualTV MCE
Nvidia DualTV MCE $169
Nvidia
vidia recently released a new add-in
N card, but unlike the majority of its
products, a GeForce GPU doesn’t pow-
www.nvidia.com
●●●●

ered this one. In the GeForce GPU’s


place, the Nvidia DualTV MCE has a Due to the fact that a pair of TV tuners
pair of Philips TV tuners and a ViXS equip the DualTV MCE, users can record
XCode II multistream encoder and two TV programs simultaneously from dif-
transcoder chip at its heart. ferent channels or watch one channel while
As its name implies, the DualTV MCE MediaSqueeze works by compressing re- recording another. With the DualTV users
is a TV-tuner expansion card for con- corded video so that it consumes less can watch, pause, and rewind live or
sumer-level PCs that features two inde- space on a user’s hard drive. recorded TV programming, as well. The
pendent TV tuners on a single PCI I found that installing the DualTV was DualTV MCE can capture uncompressed
expansion card, not to mention an FM very simple. After inserting it into an video at resolutions of up to 720 x 480
tuner and a pair of S-Video inputs and available PCI slot, I installed the included (standard definition), and it can record
analog audio inputs. drivers and software and was up and run- audio in PCM format with 16 to 24 bits
The DualTV MCE offers a compre- ning in only a few minutes. Also, I should per sample at up to 48KHz.
hensive list of personal video-recording note that the card requires Windows Me- The Nvidia DualTV MCE includes a
features, along with a technology dubbed dia Center Edition 2005 (including the compatible, useful remote control; a
MediaSqueeze that helps save disk space. Update Rollup 2 upgrade). handful of video cables; and an FM
antenna cable. Installation was a snap,
Specs: NTSC version: NTSC M/N; PAL/SECAM version: PAL I, B/G, D/K, SECAM and image quality was comparable to
D/K, L/L; connectors: TV (antenna or cable) F-connector (NTSC) or IEC-connector competing offerings from ATI. ▲
(PAL); FM radio (antenna) F-connector (NTSC) or IEC-connector (PAL); direct A/V
inputs: S-Video input 4-pin DIN (composite video via included adapter), line-level
by Marco Chiappetta
stereo audio stereo minijack x 2

CPU RANKING ● 0 = ABSOLUTELY WORTHLESS | ● ● ● 2.5 = ABSOLUTELY AVERAGE | ● ● ● ● ● 5 = ABSOLUTELY PERFECT

22 June 2006 / www.computerpoweruser.com


reviews | hardware

Voodoo PC AMD FX Gaming


CrossFire OMEN AMD FX Gaming CrossFire OMEN
$5,600
Voodoo PC
www.voodoopc.com
●●●●

An AMD Athlon 64 FX-60 chip overclocked at 2.95GHz drives dual ATI Radeon X1900 XTs.

ack in January (page 26), CPU took warranty. To ice this scrumptious tech-
B a look at Voodoo’s gold-plated
OMEN Elemental, which sports an
nological cake offering, Voodoo in-
stalled a Matrix Orbital MX333 drive
Athlon 64 4800+, Asus A8N32 SLI bay, read-out display, which is pro-
Deluxe nForce 4 SLI x16 motherboard, grammable and provides the user critical
a pair of RAID 0 arrays, and a pair of health-monitoring data and cooling Speaking of which, perhaps one
GeForce 7800 GTXs in SLI. This time pump status alerts. Finally, cold-cathode of the most impressive aspects of
around we’re looking at Voodoo’s AMD lighting and a mirror-paneled interior the Voodoo CrossFire OMEN is its
FX Gaming CrossFire OMEN. With help dress it all up. To say this is a sys- unbelievably well-designed interior.
this ATI CrossFire Xpress 3200-based tem for extreme performance enthusiasts With bright, stainless steal plating on
OMEN, there’s a bit less glitz (literally is an understatement. many of its internal surfaces, along with
sans the gold leaf) and a bit more sub- Along with the CrossFire OMEN’s a system layout and ultra-clean cable
stance under the hood. crazy, high-end configuration and im- management that is to die for, it seems
The CrossFire OMEN I tested was maculate “you could eat off of it” build as if the folks at Voodoo are as fanatical
based on an AMD Athlon 64 FX-60, quality, however, comes a hefty price tag about product quality and design as
Asus A8R32-MVP motherboard, ATI starting at around $5,600. For that rate their customers that step up to these
Radeon X1900 XTX and Radeon you do get a lot of performance in one high-end machines. As long as you can
X1900 XT CrossFire master cards, a killer-looking, cool-running, and relative- handle the initial sticker shock, you will
pair of 400GB 7,200rpm Hitachi drives ly quiet rig. But how quiet is it? The be styling with the new Voodoo Cross-
in RAID 0, and 2GB of Corsair XMS- CrossFire OMEN isn’t as quiet as some Fire Omen. This system really has its
3500LL Pro memory. The CrossFire watercooled setups I’ve tested, but its mojo workin’. ▲
OMEN was also decked out with the acoustical signature is fairly low-key and
same Voodoo OMEN Supercharged more than acceptable considering all of by Dave Altavilla
Intercooler along with Purple Voodoo the horsepower you get in the package.
super coolant that cools all three CPUs There’s no need for fan cooling on the
Benchmark Stats
and dual GPUs combined. The inter- system’s dual Radeon X1900 cards or the
Office XP SP2 520*
cooler also lets the OMEN’s Athlon 64 CPU because they’re watercooled, but WME 9 and Mozilla multitasking 319*
FX-60, which has a stock speed of there are three 300mm fans: two for the 3ds Max 213*
2.6GHz, ship factory overclocked at radiator and one in the back of the chassis Adobe Photoshop 269*
2.95GHz, and it’s still backed by for ventilation. These fans do a good job Ahead Nero Express 6 209*
Voodoo’s one-year Desktop system of keeping thermals in check internally. 3DMark06 Default Test 9484
Splinter Cell CT (1,600 x 1,200 4X AA) 117.10
Specs: AMD Athlon 64 FX-60 dual-core at 2.95GHz; Asus A8R32-MVP; ATI Radeon Far Cry (1,600 x 1,200 4X AA) 125.36
X1900 XTX and X1900 XT CrossFire master; Creative Sound Blaster X-Fi Xtreme Music; Quake 4 (1,600 x 1,200 4X AA) 83.8
2GB Corsair XMS-3500LL Pro (TWINX2048-3500LL); Hitachi HGST 7,200rpm, 400GB, F.E.A.R. (1,600 x 1,200 4X AA) 69
RAID 0 (x 2); Pioneer DVD 110D dual-layer 16XDVD±RW * Time in seconds (lower scores are faster)

CPU RANKING ● 0 = ABSOLUTELY WORTHLESS | ● ● ● 2.5 = ABSOLUTELY AVERAGE | ● ● ● ● ● 5 = ABSOLUTELY PERFECT

CPU / June 2006 23


reviews | hardware

Maingear Prelude
lthough Maingear offers some truly Two 80mm intake and one 80mm
A high-end systems and features (includ-
ing paint jobs and overclocking), it also
exhaust fan (along with that side panel fan)
provide quiet airflow. Maingear further
offers a desktop line that strikes a balance reduced noise by placing sound absorption
between performance and price. The Pre- foam on the inside of the panel and ceil-
lude’s $1,024.21 base price tag makes it an ing. The system isn’t silent, but the fan
option for casual players and gamers on a noise is low, and the Prelude doesn’t pro-
budget, and Maingear’s online system con- duce any audible high-pitched sound.
figurator lets users upgrade some or all of This Prelude pushes the limits of the
the system before it’s built. It doesn’t in- budget price range, but it certainly deliv-
clude a monitor or speakers, but you can ered the performance I expected. The rig
add extras (such as the tri-monitor Matrox scored 5720 in PCMark05 and posted a Prelude
TripleHead2Go) to your online order. SYSmark score of 226. It also crunched $2,197.43
A decent (but not fancy) 2GHz AMD our 500MB test folder with WinRAR in a Maingear
Athlon 64 X2 3800+ sets the tone for this respectable 4:24 (minutes:seconds) and (908) 624-9050
rig’s component setup. Maingear beefed encoded our test video in 10:05. That www.maingear.com
up the CPU a little by overclocking it to said, it really shines when you fire up the ●●●●
2.2GHz. The Asus A8N-SLI Premium games and 3D benchmarks.
provides SLI upgradeability, two LAN The 3DMark06 5979 overall score is
ports (one of them Gigabit), and 8-chan- nothing to sneeze at, and neither are its Benchmark Numbers
nel sound. The lone 250GB Western game demo frame rates. The Prelude 3DMark06 5979
Digital Caviar SE 16 WD2500KS shoul- powered through the Far Cry demo and SM2.0 2453
ders responsibility for both the OS and offered a reasonable 66fps in F.E.A.R. HDR/SM3.0 2716
your loads of game files, but the 16MB When I took the games for a spin, I CPU 1681
cache doesn’t hurt. found that it’s not afraid of high set-
PCMark05 5720
These modest components clear enough tings. Not surprisingly, it stuttered some CPU 4488
budget room for a single 512MB XFX in Quake 4’s Ultra mode, but the rig Memory 3799
Nvidia GeForce 7900 GTX. I like this played well in High mode. Graphics 8094
choice: You can handle demanding games, The PC’s default warranty is pretty ba- HDD 6035
and you can explode the Prelude’s graphics sic: one year of toll-free tech support. But
Dr. DivX (minutes:seconds) 10:05
power by adding another 7900 GTX when Maingear stresses that it takes tech support
the card’s price drops down the road. seriously from the moment the order ar- WinRAR (min:sec) 4:24
You can order Maingear’s $299 paint rives. The techs even contact the user via
job, but I’m betting most budget users email. “The email gives the customer some Far Cry
won’t want anything more than the stan- insight as to who the technician is and what 1,280 x 1,024 151.22
1,280 x 1,024 (4XAA, 8XAF) 149.6
dard system’s sleek, silver case. Maingear he does for the company and his gaming
spiced it up a little by adding faux car- likes and dislikes, giving the customer an Quake 4
bon fiber logos to the side panel and idea that his machine is being hand-built 1,280 x 1,024 109.3
front door. The only bling (and it’s just by a real live human being,” says Giovanni 1,280 x 1,024 (4XAA, 8XAF) 109.4
enough) is the 120mm, blue LED fan. Solari, a Maingear technician. “It details the
F.E.A.R.
However, the fan plugs into the mobo. options the customer has such as partition 1,280 x 968 66
You can plug it in easily enough, but I requests for the hard drives, game installa- 1,280 x 968
prefer to touch the motherboard as rarely tions, and overclocking options among (4XAA, 8XAF) 45
as possible, to avoid frying it. Overdrive other things.” That sort of personal touch is
PC solved the side panel fan problem by hard to come by, so I’m glad to see a bou- SYSmark 2004 SE 226
Internet Content Creation 283
building a custom plug into the case. tique builder reach out. ▲ 3D Creation 256
Something similar in the Prelude would 2D Creation 337
make for a really nice touch. by Joshua Gulick Web Publication 262
Office Productivity 180
Specs: AMD Athlon 64 X2 3800+, Asus A8N-SLI Premium, Nvidia nForce4 SLI, 1GB Communication 163
Mushkin DDR400 (512MB x2), 250GB Western Digital Caviar SE 16 WD2500KS Document Creation 204
7,200rpm, 512MB XFX Nvidia GeForce 7900 GTX, Realtek ALC850 Data Analysis 175

CPU RANKING ● 0 = ABSOLUTELY WORTHLESS | ● ● ● 2.5 = ABSOLUTELY AVERAGE | ● ● ● ● ● 5 = ABSOLUTELY PERFECT

24 June 2006 / www.computerpoweruser.com


Anand’s Corner

AMD’s Getting Serious


T hree years ago AMD was stuck in a posi-
tion it had been all too familiar with in
there was always one lingering limitation that
held AMD back: manufacturing capacity.
the past. Its first K8-based CPUs, code-named The fact of the matter is that AMD’s Fab 30
Hammer, were running a year behind sched- in Dresden, Germany, was the only AMD fab
ule and Intel had quickly capitalized on producing Athlon 64, Sempron, Turion, and
AMD’s failure to deliver with its 130nm Opteron processors. Then add dual-core
Pentium 4. Had Hammer launched when it Athlon 64 X2 and Opteron processors to the
was supposed to and at the clock speeds it was mix, and all of the sudden Intel can offer
supposed to, chances are Intel’s hands would entry-level dual-core processors at almost half
have been forced away from the P4 and its the price of AMD’s. Even today, you can pur-
NetBurst architecture long ago. But things chase a dual-core Pentium D 805 for a mere
didn’t work out as planned, and in September $132—you can barely get a decent single-core
2003 AMD finally released its Athlon 64 and Athlon 64 for that price. Looking forward,
Athlon 64 FX processors. thanks to Intel being on a 65nm manufactur-
A lot has changed since then; the race for ing process, its new Core microprocessor will Anand Lal Shimpi has turned a
clock speed turned into the race for dual-core debut as low as $209 for a dual-core chip. That fledgling personal page on
and eventually a movement for better perfor- will continue to be cheaper than AMD’s 90nm GeoCities.com into one of the
mance per watt. With the Athlon 64, Opter- CPUs because of manufacturing capacity. world’s most visited and trusted
on, and Athlon 64 X2, AMD not only stole Intel can make more 65nm chips than AMD PC hardware sites. Anand
the performance crown away from Intel, it can make 90nm chips, which bluntly means started his site in 1997 at just 14
walked away with the technological leadership that Intel can make smaller, faster, and cheaper years old and has since been fea-
crown, as well. The AMD that everyone (higher-profit) CPUs than AMD. While AMD tured in USA Today, CBS’ 48
always criticized of being a follower and not a could rest on its architectural and technological Hours and Fortune. His site—
leader gently extended one finger to the nay- superiority for the majority of the Pentium 4’s www.anandtech.com—receives
sayers and proved them all wrong with one lifespan, that free ride is quickly coming to an more than 55 million page views
very well-designed microprocessor. end, something that AMD is very well aware and is read by more than 2
AMD was right about the architectural of. So what is AMD doing? million readers per month.
decisions it made with the Athlon 64; the On the architecture side, AMD is being
CPU’s simpler 12-stage pipeline was eventu- extremely quiet. I’ve been told not to expect
ally favored by Intel’s Israel Design Center anything serious until 2007, so we’ll get
responsible for the Pentium M, Core Duo, DDR2 and some clock bumps this year, but
and new Core architectures. AMD also had that’s all. On the manufacturing side, howev-
the foresight to focus on a solid multiproces- er, AMD is moving in the right direction. By
sor architecture, which later came to be quite 2008, the combination of Fab 30, Fab 36,
valuable as the industry quickly switched
focus from high clock speeds to multicore
and AMD’s partnership with Chartered
Semiconductor will allow AMD to double its
. . . we’ll get
processors. AMD was the first to enable 64- current annual microprocessor output to 100
bit on x86 and was right about the necessity
of an on-die memory controller. You couldn’t
million parts.
AMD has finally begun shipments from
DDR2 and
say that AMD was just a follower anymore, Fab 36, which is the company’s first and only
not with a straight face, at least. 300mm fab. (Fab 30 was only set up for some clock
Though AMD maintained clear technologi- 200mm wafers, which obviously yield fewer
cal and performance advantages over Intel and CPUs thanks to their smaller surface area.)
later maintained a significant power advan- Fab 36 will also begin its transition to 65nm bumps this
tage, the market continued to favor Intel toward the end of this year, but it’s looking
CPUs. When Intel was shipping its most more and more like 2007 will be AMD’s real
undesirable processors, AMD couldn’t make a transition to 65nm. Despite lagging behind year, but
significant dent in Intel’s market share. AMD Intel in manufacturing technology, as always,
chalks it up to Intel’s anticompetitive prac- it looks like AMD may at least be catching up
tices, and there may be some truth to that, but in terms of manufacturing capacity. ▲ that’s all.
Talk back to Anand@cpumag.com.

26 June 2006 / www.computerpoweruser.com


Shark Tank

Pentium Extreme Edition 965:


NetBurst’s Swan Song
A tForum)
this spring’s IDF (Intel Developer
the major excitement stemmed
The unlocked multiplier certainly didn’t go
unnoticed in these waters either. Now why
from demos shown on Intel’s next-generation would a company like Intel do such a thing?
processors code-named Conroe and Merom. Clearly for us to go overclocking—only this
From the show a few highly impressive bench- time without it being a finicky experience by
marks were touted—and that’s not even tak- balancing bus speed and other frequency
ing into account the markedly low associated adjustments. So that’s just what a good few of
power consumption in comparison to the cur- us journos did. Seeing a massive 4.53GHz
rent Pentium 4 with without any extrater-
NetBurst architecture. restrial fancy cooling
Are we there yet? certainly put a smile Disrupting Reuters’ newswire with
Nope. So when Intel on my face (and yes a cheery Christmas greeting at age
announced the release the voltage had to be six, Alex “Sharky” Ross became an
of its Pentium Extreme upped). With Intel avid computer user/abuser, eventu-
Edition 965, the excite- likely releasing Con- ally founding popular hardware
ment was rather easy to roe at much lower testing/review Web site
contain. Let’s face it; clock speeds due to its SharkyExtreme.com. Exposing
the Pentium Extreme improved efficiency, shoddy manufacturing practices and
Edition 955 with its it’s going to be a long rubbish-spouting marketing weasels
Presler core only came out a few months ago, time yet before we see speeds like that again. while championing innovative
and despite the fact that it was Intel’s first Think of this as Intel’s way of signing off products, illuminating new technol-
run at the 65nm manufacturing process, on a high note with its whole NetBurst archi- ogy, and pioneering real-world test-
sported two cores running at 3.46GHz, and tecture. It’s unlikely that gamers will be shed- ing methods was just a front for
came fully loaded with 4MB of L2 cache, ding a tear even if they did appreciate the playing with the best toys. The site
yours truly was still gaming on AMD’s FX- technology’s dominate performance when it acquired, he left in 2001. A
60. It’s a bit hard to do cartwheels when came to video encoding. It took a long, long London native and London School
you’re used to getting slight speed bumps. time, but finally Intel does have a gaming of Economics graduate, Alex cur-
So what’s the big deal with the 965, then? CPU that’s within reach of AMD’s top dog. rently overclocks/tunes Porsche 996
Actually, it’s not half bad and had a few The performance in Call Of Duty 2 was only Turbos with www.sharkwerks.com
surprises to boot. a few frames per second in favor of AMD’s when he’s not tweaking PCs.
Intel clocks the 965’s two identical P4 Athlon 64 FX-60, and F.E.A.R and Quake 4
Cedar Mill cores at 3.73GHz this go around. weren’t that far behind either. On the business
Each core has 2MB of cache, but both are side of the fence, the 965 is still a solid per- It took a long,
now able to swap data via a faster 1,066MHz former, so no changes there then.
front side bus. One of the major issues with The 965 will be out by the time you read long time, but
the previous 955 was the apparent lack of this, and despite the rather positive experi-
C1E halt state support, which dynamically ence thus far, it’s hard to recommend any finally Intel does
throttles down the CPU’s clock speed reduc- CPU based on current technology that retails
ing much needed power consumption on an for more than $1,000; you just can’t turn a
already hot potato. Previous generation Intel blind eye to what’s around the corner. If you have a gaming
CPUs already had this feature, but it got absolutely must have the highest clocked
lost somewhere during the 65nm shrinkage. CPU on the block, then by all means go for CPU that’s within
Don’t worry, though, it’s back now. It actual- it, but I’d rather you avoid kicking yourself
ly works pretty well, too, and drops the clock where it hurts in a few months once AMD’s reach of AMD’s
back down to 3.2GHz when the CPU is idle AM2 and Intel’s Conroe hit the market at a
and when it sees fit to do so. much lower price. ▲
top dog.
Email me at sharky@cpumag.com

CPU / June 2006 27


hard hat area | pc modder

Sunbeam’s Silent Storm

PC Modder chassis uses the company’s


new Core-Fan design to
help systems run cool
and quiet.
Tips & Tutorials
may the right fit. Be-
sides a side window,
the Silent Storm features Sunbeam’s new
Core-Fan design, which lets you install two
Modding does the body good. A PC’s body anyway, inside and out. Here you’ll find 120mm fans inside the chassis to redirect
hardware, firmware, tools, tips, and tutorials for modding your rig’s performance and airflow toward hotter-running components,
appearance. Send us your own mod-related tips and ideas at modding@cpumag.com. such as the CPU or video card.
Instead of sticking to the traditional
lower-front and upper-rear locations for the
odding enthusiasts have a The 500 features a textured, black, plas- fans, Sunbeam’s Core-Fan design lets you

M penchant for the latest toys.


Fast processors, powerful
video cards, silent SFF enclosures, and rad-
tic external enclosure that houses the kit’s
radiator, reservoir, pump, and cooling fan.
On the front of the unit is a small slot off
place additional fans near the center of the
case to keep air circulating at full speed
through the system. One near-silent
ically lit motherboards are all fair game to the left that visually shows you the 120mm Core-Fan (10,000rpm, 16dB), one
when it comes to a modder’s creative amount of liquid left in the reservoir. If you blue-lit 120mm side fan, one 120mm
mind. Recognizing the appeal of uncon- need to add water, there’s a metal reservoir exhaust fan, and an optional front-intake
ventional customization, an entire industry cap just above the liquid-level slot. Just fan handle all the cooling. Additionally, the
has emerged to support the community. remove the metal cap using a flat-head case features a tool-less drive and expansion
screwdriver or coin and pour water right in. card installation design that makes setup
Mods & Ends At the back of the Nautilus 500, you’ll find and upgrading easy. The Silent Storm,
a switch, four-pronged power connector, which comes in black and silver and black,
Corsair Nautilus 500 External and a pair of quick connections for the tub- also has built-in, front-mounted USB 2.0,
Liquid Cooling System ing, which is preinstalled on the unit’s audio, and microphone ports.
If you’re looking for an easy method COOL water block. The switch essentially
for liquid cooling your system’s CPU, amounts to being a fan controller, with Fashionably Fresh Firmware
take a look at Corsair’s new Nautilus 500 High and Low speeds available for high-
liquid-cooling kit. For AMD Socket performance or silent operation. Plextor PX-760A DVD Recorder (v1.01)
754/939/940 and Intel Socket 478/ An included power cable runs from the Plextor recently updated the firmware
LGA775 processors, the Nautilus 500 four-pronged connector to a notched slot for its PX-760A IDE DVD recorder to
($159) is a self-contained unit that cover plate, which connects to any avail- remedy a problem that causes incomplete
includes everything you need to cool your able 4-pin accessory connector coming burns in Autostrategy Full mode.
CPU. Additionally, the kit is compatible from your system’s power supply. To www.plextor.com
with other chipset and GPU water blocks make using the Nautilus 500 even easier,
should you want to upgrade later. there’s no power switch on the unit. M-audio Black Box USB (5.10.00.5076v2)
Instead, the Nautilus 500 draws power The latest firmware update for M-
directly from the system power supply audio’s Black Box USB device improves
and turns on automatically when you ASIO support and incorporates a more
power up your rig. Installing the Nautilus user-friendly control panel.
500 is also a snap thanks to an innovative www.m-audio.com
quick-mounting mechanism. Corsair
claims an installation time of 8:14 (min- NEC ND-4550A DVD Recorder (v1.08)
utes:seconds) on its Web site. A new firmware update for NEC’s
ND-4550A internal DVD recorder
Sunbeam Silent Storm ATX Case enhances the drive’s compatibility with
In the market for an affordable new case different types of media.
Corsair takes liquid cooling mainstream with that has plenty of expansion room, good support.necsam.com
the relatively inexpensive and easy-to-install cooling capabilities, and near-silent opera-
Nautilus 500 liquid-cooling kit. tion? Sunbeam’s new Silent Storm ($64.99) by Marco Chiappetta

CPU / June 2006 29


hard hat area | pc modder

Adventures In Overclocking
Above & Beyond With The Pentium D 805

ack in the early days of over- kit (about $150) to keep the core temper- For this we used a wadding cloth metal pol-

B clocking, Intel’s Celeron 300A


processor was the darling of the
enthusiast community. The CPU was eas-
atures lower than a standard aircooler
could. We installed the processor, in addi-
tion to 1GB of Corsair DDR2 RAM, on
ish called NEVR-DULL (about $5). This
process involved tearing a piece of the
wadding off, rubbing it on the metal, and
ily one of the most overclockable proces- an Asus P5WDG2-WS motherboard, a using a clean cloth to remove the residue.
sors of its time, comfortably moving from first-class 975X Express-based board. Polishing the surface smoothed the many
its stock 300MHz to hit 450MHz when We chose our respective parts for a few tiny peaks and valleys in the metal, but it
accompanied by adequate cooling. Today, reasons, including stability, tweakability, also allowed for better contact between the
though, there really isn’t a processor that and performance. For hard-core processor integrated heatspreader and the heatsink (or
grabs the attention of overclockers quite overclocking, it’s always best to use top- a water block, as in our case). Better contact
the way the good ole’ Celeron 300A did. notch supporting components. You can’t means superior thermal transfer and lower
Recently, however, Intel quietly released a expect to reach super-high clock speeds temperatures. As for our water block,
budget-priced processor that has the using a budget motherboard and sub-par Corsair shipped the Nautilus 500 kit with a
potential to become a modern day 300A. RAM. If you’re planning an overclock but water block that was already polished to a
The Pentium D 805 (about $130) is a you’re saving money by using a lower- smooth, mirror-like finish, so we didn’t
dual-core LGA775 processor based on the priced processor, invest some extra money have to mess with ours.
Smithfield core, the same core the ultra- for better cooling and pick up a high-end
expensive 3.2GHz Pentium 840 Extreme motherboard and good RAM. A high- Put It All Together
Edition uses. Unlike the PE 840XE, how- quality power supply is also a good idea. With our processor’s heatspreader
ever, the Pentium D 805 clocks in at a lapped and polished, we were ready to
paltry 2.66GHz and rides along on a Mod The Hardware install it into our motherboard and also
slower 533MHz bus compared to the PE Luckily, our Pentium D 805’s integrat- mount the water block. After inserting
840XE’s 800MHz FSB. But 2.66GHz is ed heatspreader was fairly flat and didn’t the chip into its socket and locking it into
a walk in the park for the Smithfield core. need much lapping. We spent some time place, the next step was to apply a
We know from experience that Smith- sanding down the high spots at smooth, thin layer of thermal paste to the
field-based processors can hit much higher the corners of the heatspread- CPU’s surface. Because we lapped
clock speeds than 3.2GHz, as some 840 er, but that was about all the the heatspreader
Extreme Edition and Pentium D 840 lapping we needed to do. and our water
processors have had little trouble hitting (For more on lapping,
4GHz. So what’s been holding the see the September 2004
Pentium D 805 back? Nothing, probably. CPU, page 50.)
That’s why we decided to take one of the With the lap-
affordable dual-core processors and tweak ping finished, we
the hell out of it to see if we could get it to then polished the
perform like a much more expensive part. heatspreader’s
surface so that
The Participants it had a mir-
To enhance our Pentium D 805’s per- ror finish.
formance, we hoped to overclock it well
beyond its rated specifications. To give us
the best chance for success, we planned to Is the
slightly modify the processor by lapping dual-core Pentium
and polishing the surface of the CPU’s D 805 this generation’s
integrated heatspreader. We also invested Celeron 300A where overclocking
in a Corsair Nautilus 500 liquid-cooling is concerned? Very well could be.

30 June 2006 / www.computerpoweruser.com


hard hat area | pc modder

to do was actually overclock the processor.


We chose to use the tried-and-true system
BIOS to do all our overclocking. Some
motherboards offer the ability to use soft-
ware to overclock from within Windows,
but color us old-school because we still like
to get our virtual hands dirty and tweak via
the BIOS’ text menus.
In the Advanced section of our Asus
motherboard’s system BIOS, there is
LGA775-based mother- a submenu dubbed CPU JumperFree that
boards, there are four plastic houses all the overclocking-related options
standoffs you need to insert we needed to alter. In this BIOS section,
into the four stock mounting we changed five options: CPU Frequency,
Corsair’s holes surrounding the mother- DRAM Frequency, PCI Express Frequen-
Nautilus 500 is board’s sockets. You then must cy, PCI Clock Synchronization Mode,
an easy-to-install, slide an H-shaped piece of foam and CPU VCore Voltage.
self-contained liquid-cooling over the water block, which you’ll fol- By default, our processor’s front side
kit. The unit is also quiet and a better low up by sliding an X-shaped bracket bus frequency was 133MHz. By raising
cooling option than a traditional over the foam and water block. You’ll then the frequency, we were able to increase
heatsink-fan combination. press the entire assembly down onto the the processor’s clock speed. Raising the
four standoffs until the assembly locks in FSB, however, will cause the other com-
block already had a smooth base, we only place. The Nautilus 500 is definitely one of ponents on the motherboard to also run
needed a minuscule amount of thermal the easiest liquid-cooling kits around to out of spec, which could lead to instabili-
paste. Thermal paste is designed to fill the install. Completely uninstalling the water ty. To prevent this from happening,
tiny gaps where the heatspreader and block, however, requires removing the we locked the PCI Express Frequency
heatsink (or water block) mate, but motherboard from the system case and to 100MHz and the PCI Frequency
because we lapped and polished our heat- using a pair of needle-nosed pliers to disen- to 33.3MHz. Then we set the DRAM
spreader’s surface, we minimized the gage the plastic clips. Frequency to DDR2-667MHz to keep
number of gaps present. our memory running within its limits.
Next, we mounted and secured the Crank Up The Clock Speed With these items properly set, we then
water block to the CPU. In order to After installing the processor and assem- bumped up our processor’s core voltage.
install the Nautilus 500’s water block on bling the rest of our system, all that was left The Pentium D 805 requires 1.25 to

To ensure good contact


between our processor and
water block, we lapped and
polished the CPU’s
integrated heatspreader.
Corsair shipped the Nautilus
500’s water block with a
mirror finish.

CPU / June 2006 31


hard hat area | pc modder

Performance: Before & After The Mod


Pentium Extreme Pentium D Pentium D
Edition 965 805 Stock 805 Modded
(3.73GHz) (2.66GHz) (4.05GHz)
SiSoft Sandra 2005 CPU Arithmetic Benchmark
Drystone ALU 21928 14388 22014
Whetstone FPU 9131 3821 5818
Whetstone iSEE2 15519 6584 10018
PCMark05 CPU Benchmark Module
CPU Score 6541 4406 6524
Cinebench 2003 (in seconds; low scores are better)
Single thread 79.7 111.1 74.1
Multithread 36.9 59.6 40.2
LAME MT MP3 Encoding (in minutes:seconds; low scores are better)
Single thread 1:08 1:35 1:02
A thin, smooth application of high-quality thermal
grease is a necessity for optimal thermal transfer. Multithread 0:40 0:56 0:37
Half-Life 2 (800 x 600 low quality)
FPS 140.45 101.78 142.36

When we began this project, the goal was to take Intel’s relatively affordable
Pentium D 805 processor and make it perform like a much more expensive CPU. To
determine if we succeeded, we benchmarked our processor at both its stock and
overclocked speeds and compared the results to those of a Pentium 965 Extreme
Edition, Intel’s current flagship desktop CPU. Our testing setup included the
Pentium 965 EE and Pentium D 805 CPUs, an Asus P5WDG2-WS (975X Express)
motherboard, 1GB (512MB x2) of Corsair DDR2-675 RAM, a GeForce 7800 GTX
video card, and 36GB Western Digital Raptor hard drive.
As you can see, our modded Pentium D 805 had a lot of ground to make up to
catch the Pentium 965 EE, which is based on the newer 65nm Presler core that fea-
tures double the L2 cache as Smithfield (4MB vs. 2MB). The 965XE also features a
faster 1,066MHz bus and is enabled for Hyper-Threading, so an operating system
recognizes the CPU as four virtual processors. These features give the 965XE a
decided advantage in the multithreaded benchmarks. Our modded processor’s
increased core clock speed, however, gave it enough of an edge to beat the 965XE
We made sure that our water block was fully installed in a majority of benchmarks we ran. Not bad for a $130 processor. ▲
and seated properly before overclocking the CPU.

1.4V for normal operation. Because we an increase of 1,390MHz. At more than rated speed—52% higher, in fact. While
planned to push the CPU well beyond 4GHz, our processor ran at about 110 to overclocked to 4.05GHz, our Pentium
its rated speed, however, we cranked the 116 degrees Fahrenheit while idle. Under D 805 offered all the performance of
voltage up to 1.55V. A slightly higher a full load, temperatures hovered between much more expensive counterparts, and
core voltage will typically allow for 138 and 143 F. The Nautilus 500 seem- even when we factor in the additional
higher clocks. ingly had no trouble keeping tempera- cost of the Corsair Nautilus 500 liquid-
Next, we slowly raised the processor’s tures in check. cooling kit, our setup is still roughly
FSB frequency until the system was no 70% cheaper than a Pentium 965
longer running stably. After a few hours Feel The Power Extreme Edition. Our Pentium D 805 is
of experimenting and testing for stability, By choosing the right components fast and relatively cheap—just like the
we settled on a maximum FSB of and tweaking our hardware, we made a venerable Celeron 300A. ▲
202MHz. This resulted in a final core- Pentium D 805 processor run at a much
clock speed of 4.05GHz (20 x 202MHz), higher frequency than at its 2.66GHz by Marco Chiappetta

32 June 2006 / www.computerpoweruser.com


hard hat area | pc modder

Crunching Data &


Looking Good Doing It

he last time we saw a vertical PC, it was in a garbage can

T (Sept. 2005 CPU, page 34). The Tower PC is just as


unusual, but you won’t mistake it for trash. This 3.5-foot
tall, multitiered piece brings to life Ivan “Navig” Liang’s vision of
a skyscraper-like computer case. As with many modders, Liang
doesn’t need much of an excuse to dig into a modding project.
“My primary motivation for building this system was fairly sim-
ple: I thought it would look cool,” says Liang.
Despite this beast’s size and extra features (such as a remote
that controls the system from afar), building it didn’t cost much
more than a decent prebuilt rig. Liang estimates he spent about
$200 on materials, which include Aerocool’s Lubic compo-
nents, the remote, plenty of acrylic, and six 120mm fans. Liang
took advantage of the system’s design to create an impressive
airflow system; external air cools the components on almost
every tier. The system’s lowest shelf, which houses the mother-
board and a massive Scythe Ninja CPU heatsink, benefits from
its floor intake fan and side intake and exhaust fans.
Liang chose an Abit IC7 Max 3 motherboard and loaded it
with 1GB of OCZ Platinum memory. The 256MB ATI X850
XT video card sports a custom-cooling setup, thanks to some
modified squirrel cage blowers and a special shroud. The system
also has a 3.2GHz Intel 478 running at 3.76GHz and a 500W
Fortron-Source Blue Storm PSU. The Tower PC also shows off
its components at night with four white cold-cathode LEDs.
Liang, an emergency department physician, spent about
three weeks creating the Tower PC, but he says he could proba-
bly build another in a week. He encourages would-be modders
to throw convention out the window. “There are so many
imaginative ways to put together components and still retain, or
better yet enhance, functionality and performance,” he says. ▲

by Joshua Gulick

34 June 2006 / www.computerpoweruser.com


hard hat area | pc modder

Forget cutesy iMac colors; this rig cooks. “I had


This motherboard voltage mod offers stable
help with the paint job,” Flores says. “The flames
are airbrushed on the housing and the acrylic
memory voltage to 3.2V and boosts the
windows and then sprayed with a light dusting of northbridge voltage, as well.
metal flake. A final coat of clear acrylic helps to
seal and protect the paint job.”

The super-tall case presented an unexpected


challenge: Liang had to hunt for an IDE cable
that could span the distance between the
optical drive and the motherboard.

Liang bought this six-fan controller for


$5 and used its PCI slot mount to secure
it to the Tower PC’s chassis.

Liang covered the DVD drive in dark paper and then built a
spring-loaded door. You can’t reach the drive’s Eject button,
This is the car remote control box. The remote but you won’t need to with the system’s remote control.
lets users power on/off the PC’s lighting and
open the Lite-On SOHW-1693S’ tray.
Have a computer mod that will bring tears to our eyes? Email photos
Give Us and a description to madreadermod@cpumag.com. If we include your

system in our “Mad Reader Mod” section, we’ll send you a $1,500
Your Mod Newegg.com gift certificate and a one-year subscription to CPU.

CPU / June 2006 35


Get informed answers to your advanced technical Each month we dig deep into the mailbag here at CPU in an effort
to answer your most pressing technical questions. Want some advice
questions from CPU. Send your questions along with a on your next purchase or upgrade? Have a ghost in your machine?
Are BSODs making your life miserable? CPU’s “Advanced Q&A
phone and/or fax number, so we can call you if Corner” is here for you.
necessary, to q&a@cpumag.com. Please include all
Matt H. asked: I’ve been reading your magazine now for a while
pertinent system information. and really appreciate the in-depth articles, how-tos, and Q&A section.
A while ago I got the opportunity to create my dream gaming machine,
but it still seems like I’m missing performance. I feel like three possible
items might be holding me back. First, I run RAID 5 with three 160GB
Seagate SATA drives non-NCQ. I’ve recently heard that RAID 5 is very
slow with small writes and that you shouldn’t use it in a gaming rig. Is
that true? Second, I use a dual-monitor setup on my ATI Radeon X800


XL PCI Express card. Is using the extended Desktop robbing gaming
performance from my PC? Third, I feel that perhaps my memory could
. . .it’s not just be a bottleneck. I am using two 512 DDR2-533 sticks of Kingston
HyperX on my Asus P5WD2 Premium SB. Will using the max speed
memory the board will take make a big difference?

My system specs:
about the number Intel Extreme Edition 840 processor
Asus P5WD2 Premium motherboard
Kingston HyperX DDR2-533 512 (x2)
Seagate 160GB SATA drives (x3) in RAID 5
ATI Radeon X800 XL PCI-E graphics card
Dual DVD burners
of pixel pipelines Antec Neo Power 480W power supply
Thermaltake Bigwater liquid cooling in Thermaltake Armor Chassis
Dual VGA monitors

and memory “ A: Wow, lots of questions here, eh Matt? And good ones, too,
we might add. It’s safe to say you have a good rig here and a bit
more potential you could wring out of it. With respect to RAID
5 performance, you’re pretty much on track. Our friend Kyle
rambled on about RAID 5 in his column in the February 2006
issue of CPU (page 32), and he was spot on. RAID 5 was initial-
clock speed. ly deployed in server architectures for its excellent redundancy
characteristics with block-level striping and distributed parity. It
has good read performance at the expense of write performance
due to the fact that it takes four disk I/O operations to write to
the array (three reads of the parity bits and one write) along with
a parity calculation. Sounds pretty intense, doesn’t it? It is.
RAID 5 CPU overhead for the software-level RAID controllers
that are out in the desktop market is fairly steep. RAID 5 per-
forms well in multiprocessing environments, which is why Intel,

36 June 2006 / www.computerpoweruser.com


Nvidia, HighPoint, and others in the chipset and controller haven’t done anything to the drivers since I first installed them in 2003.
market have been waving the flag in this dual-core processor age. How do I get the burner to recognize DVDs again?
RAID 5, however, is really best suited for environments that
have a much higher percentage of reads vs. writes, such as a Web A: This is an odd one for sure, Kevin. Usually an optical drive
server where disk reads are critical to performance. The average just dies altogether rather than stops handling one specific type
desktop system has a much more balanced demand of reads and of media. It sounds like either you have a firmware corruption
writes, though. We say go RAID 1 if you need redundancy or issue in the drive or perhaps even some sort of odd WinXP cor-
RAID 0 if you want capacity and a bit more performance, but ruption. Before you reformat, though, try a couple of things to
back up that RAID 0 array. You’re better off spending those see if they will clear up your issue: Upgrade the drive’s firmware
CPU cycles elsewhere until RAID 5 for the desktop matures a to the latest version. A good resource, if Sony doesn’t have it on
bit more—that’s if it does. its site, is The Firmware Page (forum.rpc1.org/dl_all.php). Just
browse to Sony and the model of your drive. Also, have you
tried different types of DVD media with the drive? Because this
drive is a few years old, it might be a bit finicky on the new disc
types out on the market these days. This is something that you
could also fix with a firmware update. (You seem to suggest it’s
also not reading standard retail production DVDs, however, so
this may not be your problem.) Lastly, try blowing some
canned air inside the drive to make sure it’s free of dust and
other foreign matter. If all else fails, reformat. If that fails, it’s
probably time for a new drive. Good luck!

James T. asked: I just finished reading your review of the


GeForce 7900 GTX, and I have some questions. I noticed that, for the
most part, the GeForce 7900 GTX and ATI Radeon X1900 XTX perform
at about the same level depending on what game you’re playing. I’m
wondering how Nvidia’s able to pull this off considering the GeForce
Asus’ P5WD2 Premium motherboard has several BIOS options 7900 GTX has half the number of pixel pipelines of the ATI card, but
and excellent stability for overclocking CPU and memory timings. both cards run at similar clock speeds. If the Radeon X1900 XTX has
48 pixel pipelines, the GeForce 7900 GTX has 24, both cards have
For your graphics, spanning two displays is only a 2D Desktop GPUs clocked at 650MHz, and both have 512MB of RAM clocked at
function for the Radeon X800 you have, so that won’t affect 3D, about the same level (1.6GHz vs. 1.55GHz), how on earth can the GTX
full-screen gaming performance. However, that RAM you have win in some benchmarks? It doesn’t make sense to me.
could definitely do better on that Asus P5WD2 Premium moth-
erboard. You might be able to run it at DDR667 with slightly
relaxed timings. Try bumping the memory voltage up to 2.85V
and try different clock ratios in the BIOS. Otherwise, get some
good DDR2-667-rated memory. You’ll most likely gain a few fps
with a good memory tweak.

Kevin P. asked: My PC is about three years old. The specs


are as follows:
P4 2.4GHz DFI mobo with 1GB DDR400 RAM and 800MHz FSB
Two SATA 80GB HDDs striped with RAID 0 and a PCI RAID controller How can a
Radeon ATI 9200 Vivo GeForce 7900
Onboard audio GTX outperform a
Windows XP SP2 Radeon X1900 XTX
Sony DVD-RW DW-U10A when it has only half
the number of pixel shader
I don’t overclock, and my system is very stable. Until recently the DVD units? Check out our answer
burner worked fine. I have authored many home videos from my digital on the next page.
camcorder. However, in the past couple of weeks, the DVD drive no
longer recognizes DVDs. It won’t play them with PowerDVD or burn
them with a movie maker. It does play and burn CDs. In the Properties
tab under Device Manager, it says the burner is working properly, and I

CPU / June 2006 37


A: There are a number of factors that determine the performance A: You probably didn’t get scammed, Kathleen; your system just
of today’s high-end video cards, James; it’s not just about the isn’t configured to take advantage of your new RAM’s ability to
number of pixel pipelines and memory clock speed. The overall run at a higher clock speed. Even though you’ve replaced your
efficiency of the architecture, shader ALU performance, number ailing PC3200 RAM (DDR400) with PC4400 (DDR550), it’s
of vertex units, memory controller, Z-Cull efficiency, and myriad likely that your new RAM is still running at 400MHz DDR.
other things all play a part in performance. In addition to that, Simply plugging in PC4400 RAM doesn’t guarantee better per-
we think you’re confusing pixel pipelines with the number of formance; you’ll also have to set up your motherboard’s BIOS to
pixel shader units in each GPU. take advantage of the new memory’s capabilities.
With the release of the GeForce 6 and the Radeon X1K
series of products, Nvidia and ATI decoupled the functional
units within the GPU, letting each company alter the number
of individual units during the design phase of the chip. This is
Simply plugging in
how both companies can offer a top-to-bottom lineup of prod-
ucts that all have essentially the same features. For example,
the GeForce 7900 GTX has 24 pixel shader units with 16
ROPs (Raster Operators or render back ends, depending on PC4400 RAM does
whom you talk to). The Radeon X1900 XTX has 48 pixel
shader units, but it, too, has 16 ROPs. With both Nvidia’s and
ATI’s older graphics processors, the different stages in the 3D
pipeline were linked, and there were an equal number of these
parts in the GPU. If you still want to use the older terminolo-
not guarantee better
gy, technically both the GeForce 7900 GTX and Radeon
X1900 XTX have 16 pipes, but feeding the pipes are an
increased number of pixel shader units.
One of the reasons Nvidia’s GPU can outperform ATI’s,
performance . . .
even though it has fewer shader units, is that in many games
pixel shader performance isn’t the limiting factor in the frame There are two ways you could go about remedying your sit-
rate. If the game isn’t using the additional shader units in the uation depending on the type of motherboard installed in the
Radeon X1900 XTX, they don’t even factor into the equation. system. Because you’ve got what is essentially a cutting-edge
This is a vast oversimplification, but hopefully we’ve given you Asus A8N32-SLI motherboard based on the nForce 4 SLI
an idea of what’s happening. You should also consider that you X16 chipset, you could do either. Assuming you don’t want to
can’t directly compare the individual units within ATI’s and overclock your processor, the first way to take advantage of
Nvidia’s GPUs. Both companies design their parts differently, your faster memory would be to drop your Athlon’s multiplier
and even if they both created a GPU with the exact same num- and raise the HT clock speed via the system BIOS. By default,
ber of pixel shader units, vertex units, and ROPs and both your processor’s multiplier is set to 10X with a 200MHz HT
products were clocked at the exact same speeds, the GPUs clock (10 x 200MHz = 2GHz). But your new memory is capa-
would still differ in performance because of the dissimilarity of ble of running at 275MHz (DDR550). By dropping your
their respective architectures. processor’s multiplier to 7.5X, you could then raise the HT
clock speed to 267MHz, which would result in about the same
Kathleen I. asked: I’m fairly new to the do-it-yourself computer 2GHz CPU clock speed. Your memory, however, would then
scene, and I think I got scammed by my local computer store. I be running 33% faster, resulting in more bandwidth and ulti-
bought the parts to put together my first system recently: Athlon mately higher performance in some situations. Just make sure
64 X2 3800+, Asus A8N32-SLI, GeForce 7800 GT, 1GB RAM, 160GB to lock the PCI-E and PCI clocks to keep other components
hard drive, etc. Everything seemed to work properly for about a running within specifications.
month and then I started getting random blue screens in WinXP. I The other way you could increase your memory’s clock speed
took the computer in for repair because I couldn’t figure out what is to change the memory divider option on your motherboard.
was going on, and the people at the store told me my memory had Because you have one of AMD’s latest CPUs and an enthusiast-
gone bad. At the time though, they didn’t have the same PC3200 RAM class motherboard, you can change the memory divider option
that I originally bought, so they talked me into some PC4400 RAM by and run your memory asynchronously from the HT clock. You’ll
telling me it was faster and with it installed my computer would per- find all of the options necessary to tweak your memory clock
form better. I ended up paying an extra $100. Although they did seem speed in your motherboard’s BIOS under the Advanced, Config
to fix the errors, my system isn’t any faster. I ran a couple of quick System Frequency, Voltage section. ▲
tests with SiSoft Sandra and PCMark05, and my system gets almost
the same scores that it did before. Did I make a mistake paying the by Dave Altavilla and Marco Chiappetta,
extra money for this memory? the experts over at HotHardware.com

38 June 2006 / www.computerpoweruser.com


together to improve graphics perfor-
mance. It greatly accelerates 3D render-

Quad SLI ing, for example.


Ultimately, Quad SLI technology
should provide high-definition gaming
Four GPUs For HD Gaming with impressive resolutions (2,560 x
1,600) on extremely large monitors.

Quad SLI Nuts & Bolts


During its introduction of Quad SLI at
f you’re the kind of PC gamer who Early in 2006 Nvidia began showcas- recent conferences, Nvidia and its part-

I looks at his 21-inch monitor with its


1,600 x 1,200 resolution and says, “I
need more,” Nvidia is way ahead of you.
ing its latest high-end graphics technolo-
gy: Quad SLI. Quad SLI lets four Nvidia
GPUs within a single system work
ners showcased a configuration that
included two separate GX2 boards, each
of which featured two PCBs. All four

Quad SLI technology and mother-


boards initially are appearing only
Quad SLI Configuration
in complete PC systems. As of the In this diagram, the four GPUs communicate
first quarter of this year, a variety of SLI connection with each other through a 1GBps SLI link (an 8-
North American vendors were tak- GPU 1GBps GPU bit link running at 1GHz). Each individual GPU
ing orders for systems featuring PCI Express isn’t connected directly to each of the other
Memory Memory
Quad SLI. Vendors listed here are switch
three; rather, the connection is more like a
expected to offer Quad SLI systems

GX2 boards
SLI connection

SLI connection
loop among the four chips. For example,
during 2006. (NOTE: Some vendors
1GBps

1GBps
PCBs data communications between two of the
hadn’t named their Quad SLI sys-
tems at the time of this writing.) GPUs sometimes must pass through a
third GPU to reach the intended GPU.
Memory Memory
SLI connection
1GBps
GPU PCI Express GPU
switch
ABS
Alienware
Aurora ALX
Biohazard
Armageddon
Cyberpower
Gamer Ultra SLI Quad
Dell
XPS 600 Renegade
Falcon Northwest
Hypersonic
iBuypower
Gamer Titanium
Maingear
Beast
Overdrive PC
Polywell Computers
Velocity Micro
Velocity Raptor
Signature Edition
Vicious PC
Commando Quad SLI
Voodoo PC

Source: Nvidia
Source: Nvidia, Hexus.net

40 June 2006 / www.computerpoweruser.com


PCBs include an individual power con- unprecedented power and capabilities. • 2GB of onboard graphics memory
nector, an Nvidia GPU, and 512MB of The first set of Quad SLI configurations
memory (giving the overall system 2GB makes use of four GeForce 7900 GPUs. Whether gamers are willing to spend
of memory). Even though the Quad SLI The capabilities of Quad SLI include: several thousand dollars for a system featur-
system looks like four boards, it’s actually • Resolution of 2,560 x 1,600 on a ing Quad SLI remains to be determined.
two GX2 boards (each of which consists 30-inch monitor Those who do purchase these systems,
of two PCBs) that fit into two x16 PCI • 32X AA though, will experience a new level of PC
Express graphics slots. • 16X AF gaming. It might not be a “quad”-ruple
• 48GPps (gigapixels per second) of raw improvement over what you have now, but
Quad SLI By The Numbers graphics performance it likely will be close. ▲
By putting four GPUs in an SLI sys- • 6TFLOPS of processing power
tem, Nvidia has given gaming systems • 96 pixel pipes by Kyle Schurman

Quad SLI Rendering


Driver
Frame number: 1 2 3 4 5 Etc. Quad SLI can make use of three different rendering processes,
depending on the situation.
Primary

GPU GPU
2 Working alone (AFR). In AFR mode each GPU renders
Memory 1 Memory
one frame on its own, meaning each GPU would render
5
every fourth frame. The driver manages the frame data,
Output Display
ensuring that each GPU has the data it needs to complete
buffer device
Memory Memory its frame. Upon completion, each GPU passes its frame
3 to the output buffer. Then the GPU that’s designated as
the display chip (the primary GPU) manages the data
4
GPU GPU passing from the output buffer to the display device.

Driver
One frame
Working together (SFR). In SFR mode all four GPUs work together
Primary to render a single frame. The driver determines which GPU will per-
GPU GPU form which tasks and passes on the required data. Each GPU also will
Memory Memory receive enough secondary data concerning the other GPUs’ work to let
it properly finish its portion of the frame, so all four portions mesh
Output Display together smoothly. (Each GPU might not receive the same amount of
buffer device
Memory Memory data to process, depending on how the frame will be constructed.) As
in the AFR mode, the primary GPU then manages the passing of the
data from the output buffer to the display device.
GPU GPU

Driver

Frame number: 1 2 Etc.


Blending both (AFR and SFR). In this mode Quad SLI uses both AFR
and SFR. Each pair of GPUs within each GX2 board works together to
Primary render every other frame. The driver handles both the splitting of data
GPU GPU between the GPUs in the pair and the sending of the data for every other
Memory Memory frame to each pair. After each pair sends its data to the output buffer, the
primary GPU controls the sending of the data to the display device.
Output Display
buffer device
Memory Memory With many games the combination of AFR and SFR will be best: SFR
works well for accelerating applications, while AFR provides good per-
formance scaling, and this mode often can provide gaming applications
GPU GPU with the best of both worlds. Each game is different, however, and the
Quad SLI technology determines the best rendering method to use.

CPU / June 2006 41


hard hat area | white paper

HDCP
Protecting High-Def Content At A Price

hen shoplifters steal from a to find a way to protect the content. The problem? Most computer moni-

W store, the rest of us suffer


from higher prices. When a
thief commits insurance fraud, every-
Unfortunately, such solutions for pro-
viding protection usually end up costing
the average user more money, which
tors and graphics cards sold during the
first part of 2006 don’t contain support
for HDCP, which means they won’t be
one’s insurance rates rise. And when appears to be the case here, too, as the able to play HD movies in the highest
people who create digital video content media and technology industries pre- resolution or play HD video at all. To
feel like video piracy is cutting into their pare to roll out a protection system achieve HD content that’s compatible
profits and damaging and discourag- called HDCP (High-bandwidth Digital with HDCP, most users will need to pur-
ing the creative process, they’re going Content Protection). chase new display and playback devices.

HDCP System
In its basic form, HDCP (High-bandwidth Digital Content directly between the transmitter and receiver to a mix of video
Protection) uses encryption to prevent unauthorized devices repeaters and multiple receivers. An HDCP setup can support
from tapping into the video as it travels from the transmitter to up to seven levels of video repeaters and 128 total devices.
the receiver. HDCP consists of three basic components: An Under some configurations the setup is connected to an
HDCP transmitter, such as a DVD player; a digital interface to Upstream Content Control Function, which helps determine
carry the signal, such as DVI (Digital Visual Interface) or HDMI whether the HDCP setup is authorized to receive content. The
(High-Definition Multimedia Interface); and an HDCP receiver, Upstream Content Control Function isn’t a part of the HDCP
such as a TV or monitor. However, HDCP can handle multiple setup; in a PC setup, for example, the control function can be a
connection configurations, ranging from a simple connection piece of software. ▲

42 June 2006 / www.computerpoweruser.com


hard hat area | white paper

An Introduction To HDCP use HDCP in conjunction with the DVI specification, manufacturers must
Because HD media is digital, hackers and HDMI interfaces, it creates a protected obtain a license for a fee.
can make perfect copies of the content link between the output device and the As part of the licensing process,
using DVI (Digital Visual Interface) or display device. HDCP is considered a form licensees pledge that they will follow the
HDMI (High-Definition Multimedia of DRM. HDCP rules regarding playing of the
Interface) alone. DVI and HDMI provide The first version of the HDCP speci- protected content on non-HDCP de-
high-quality playback for HD video. (See fication appeared in early 2000, well vices, meaning that they must play the
the “DVI, HDMI & UDI” sidebar for before most users gave high-definition content at no better than DVD quality
more information.) content a first glance. The FCC adopted when running it on nonapproved de-
HDCP, however, uses encryption to HDCP as a digital output protection vices. Products that are compliant with
protect digital video content as it’s trans- technology in mid-2004. Intel initial- HDCP will contain an HDCP Ready or
ferred from the player to the receiver. ly developed the HDCP protocol, and an HD Ready logo.
Devices that aren’t equipped with HDCP the Digital Content Protection, LLC
won’t be able to play or display the HDCP- (an Intel spin-off company) now con- Play Content With HDCP
protected video or will only display it at a trols licensing and oversees development If a user has HDCP-certified hard-
lower resolution. When manufacturers of it. To use the proprietary HDCP ware, playing HDCP-protected video

HDCP uses three elements to protect data. value is the same for both devices, the HDCP transmitter
Authentication protocol. The HDCP transmitter communi- authorizes the HDCP receiver to receive the video data.
cates with the HDCP receiver (as shown above) ensuring that it’s Data transmission/Encryption. During the authentication
authorized to receive the protected DVI content. process, the two devices share encryption details, letting the
As part of its manufacturing process, each HDCP authorized transmitter send the DVI content as an encrypted stream that
device receives a 40-bit binary KSV (Key Selection Vector), only the authorized receiver can decode.
which serves as the identifier in the authentication process. Each The transmitting device handles all of the encryption prior to
device also contains 40 private device keys that are 56 bits each. sending the video stream. Every few seconds the transmitter
The HDCP transmitter sends an initiation message to the changes the values the encryption process uses adding protec-
receiver, which contains the transmitter’s KSV and a 64-bit tion against potential hacking.
random value that the HDCP protocol generates. The receiver Locking out hacked devices/Renewability. As part of the
then sends a responding message containing the receiver’s KSV. protocol, the video transmitter can detect whether any devices
If the receiver is a video repeater, it must identify itself at this inside the HDCP setup have been hacked. The transmitter then
point. The transmitter then must ensure that the receiver’s KSV can lock those devices out, preventing them from receiving the
isn’t included on a revoked list. encrypted video.
Each device then calculates a 56-bit shared value making use If the transmitter knows that device keys have been compro-
of its private device keys and the other device’s KSV. This value mised, new HDCP devices can ship with that information as well,
is shared and verified by the HDCP transmitter. If the shared locking out the hacked keys. ▲

Sources: Digital Content Protection LLC, Octava Inc.

CPU / June 2006 43


hard hat area | white paper

content at the maximum resolution HDCP standard could simply lock a user won’t be able to add a chip to his
shouldn’t be a problem. For a user run- Vista out; meaning users would not existing cards to make them HDCP cer-
ning non-HDCP hardware, however, have the ability to play HD video on tified. The manufacturers will have to
problems are almost guaranteed. The Vista computers, even with the correct create entirely new graphics cards with
severity of the problems when attempt- HDCP hardware. the correct components to make them
ing to run HDCP video on a computer Furthermore, users hoping to work HDCP certified.
depend on the piece of hardware or soft- around Vista’s HDCP safeguards by Monitor. Very few monitors being
ware in use and on the rules the content refusing to upgrade from Windows XP sold today are HDCP-certified devices.
provider chooses. will be disappointed; WinXP can’t (However, HDCP-certified TVs
Windows Vista. Because the newest play HDCP-protected video at the high- available for sale today are much more
version of Windows won’t be released est resolution, regardless of the hardware common.) If a user’s output device is
until November 2006 (availability to in use. only compatible with one or more of the
business users) and January 2007 (avail- Graphics cards. Understanding the video interfaces most commonly in use
ability to all users), Vista’s release will HDCP compliancy of graphics cards is a right now (DVI, HDMI, or VGA), he’ll
coincide with the early stages of HDCP little tricky. Most graphics cards sold in almost certainly experience problems
product releases. Microsoft has already the past few years list HDCP compliancy playing HD video, depending on the
announced that Vista will fully support in their specifications. However, this rules a content provider includes with
HDCP, and Vista will not play HD doesn’t mean the graphics cards are the HD video. With DVI, HDMI, or
video at the highest resolution on non- HDCP certified; instead, it means the VGA, the provider could choose to
HDCP devices. cards are ready to become HDCP completely blacken the screen, prevent-
Although Microsoft’s decision to fully certified as soon as the manufacturers ing the user from playing a video at
support HDCP in Vista has received add the proper chips to the cards. any resolution, or the content pro-
criticism from some members of the Unfortunately, the manufacturers vider could choose to play the video at a
media and on some Internet message must add the chips during the manu- lower resolution.
boards and blogs, in reality Micro- facturing process, and very few card To address the concerns of users,
soft had little choice but to follow the manufacturers have chosen to include though, it appears many of the com-
industry rules and directions concerning the added expense of the chips on their panies involved in development of
HD video. If Microsoft chose to not cards yet. Because of the way an HDCP HDCP are expecting to lower the video
support HDCP, the developers of the Ready video card must be manufactured, resolution instead of blackening the
screen when playing HD video on
non-HDCP hardware.
HD vs. Other Formats
Avoid Frustration
The HD video format joins several other video formats currently in use around the
One major question concerning
world. Here are some of the more popular ones. ▲
HDCP is whether it’s immune to hack-
ing. This question is particularly relevant
Video mode* Format Max resolution Max pixels when considering the lack of success of
at 16:9 displayed content protection systems vs. hackers
simultaneously
in the past. Unlike many other content
480p NTSC 720 x 480 346,000
protection systems, HDCP includes an
576i PAL/SECAM 720 x 576 415,000 additional layer of protection through
576p PAL/SECAM 720 x 576 415,000 which the software can revoke a device’s
720i HD 1,280 x 720 922,000 keys if that device is hacked. Or if an
720p HD 1,280 x 720 922,000 HDCP hack hits the market, content
1080i HD 1,920 x 1,080 2,000,000 providers can revoke the keys used in the
1080p HD 1,920 x 1,080 2,000,000 hack, making it useless.
However it’s still doubtful HDCP will
be completely immune to hackers. Several
*With interlaced (i) video each scan pattern refreshes half of the horizontal lines (usually every
other line); the next scan pattern refreshes the other half of the lines. As long as the refresh rate is
years ago researchers at Carnegie Mellon
fast enough, the human eye doesn’t notice this process. If the refresh rate is too slow, though, the University found numerous problems
image appears to flicker. with HDCP that hackers could exploit,
for instance.
With progressive (p) video each pass refreshes all horizontal lines, requiring a more powerful dis- Because HDCP video is only begin-
play. Progressive video doesn’t suffer from flicker. ning to appear, there still seems to be
Source: Wikipedia

44 June 2006 / www.computerpoweruser.com


hard hat area | white paper

time for those in the media and before HDCP video begins appearing high-end hardware that is fully HDCP
technology industries to alleviate some with regularity sometime in 2007, certified if you want to view high-
of the potential problems. Whether remains to be seen. definition video content. ▲
they’re able—or willing—to give users a Otherwise be prepared to break your
break and make some changes to HDCP bank account by buying some new, by Kyle Schurman

DVI, HDMI & UDI


HDCP will work via digital interfaces, DVI and HDMI, to deliver of having a common connector to HDMI, which will allow for
HD video. Because DVI and HDMI can deliver high-speed, HD strong compatibility between the two interfaces. Components
video streams at high-end quality, the potential exists for video and devices that support both UDI and HDMI will be able to run
piracy; a user looking to make illegal copies of the HD video can in either mode. If, however, a user plugs a UDI computer into an
use the interfaces to make near-perfect copies. While preventing HDMI TV, the audio that’s available through HDMI will not be
the drawback of illegal copies, HDCP will continue to use the available through the UDI computer.
benefits of DVI and HDMI. The UDI SIG is running design tests to make sure that
UDI (Unified Display Interface) is the newest display DVI-compatible electronics will work with UDI in the future. ▲
interface, and it will attempt to upgrade VGA. Like DVI and
HDMI, UDI will run at high-end speeds and quality, and it also
will support HDCP.
DVI. DVI is an older video standard that
allows a high-speed connection
between DVI-enabled CE HDMI
devices, such as TVs and
computers monitors. The
video stream, even HD video, VGA DVI
doesn’t need any compression
when using DVI.
The DDWG (Digital Display Working Group;
led by Compaq, Fujitsu, HP, IBM, Intel, NEC, and
Silicon Image) developed the DVI specification.
HDMI. HDMI is a newer technology than DVI and
fully compatible with DVI products, but it provides
many of the same benefits: high-speed and uncom-
pressed transfer of HD video. HDMI’s advantage
UDI
over DVI is its ability to transfer both an audio and
video signal; DVI only works with a video signal.
HDMI Licensing oversees the promotion of the HDMI stan-
dard and the licensing of the HDMI specification. Hitachi,
Matsushita Electric/Panasonic, Royal Philips Electronics, Silicon
Image, Sony, Thomson, and Toshiba founded HDMI Licensing.
HDMI uses a 19-pin connector that’s smaller than a DVI con-
nector. The DVI connector is bulkier than HDMI, making use of
24 pins and sometimes a ground blade with four additional pins.
UDI. UDI is a new display interface technology, and the UDI
Special Interest Group oversees development of the UDI. Version
1.0 of the UDI specification should be available in mid-2006. The
The DVI connector is bulkier than the connectors
promoter companies in the UDI SIG are Apple, LG, Intel, Sam-
HDMI and UDI (Unified Display Interface) use. UDI
sung, National Semiconductor, ATI, Silicon Image, and others.
will use connectors that are similar in size in HDMI
The UDI SIG says it’s developing the UDI specification as a
connectors, and they will be compatible in many
replacement for VGA, helping companies and manufacturers that
instances. UDI is designed to be a replacement for
are making the switch from VGA to digital standards.
VGA, providing a much more streamlined connector.
UDI should work with varying levels of success with HDMI
and DVI products. It’s expected that UDI will provide the option

Sources: HDMI.org, DDWG.org, UDISIG.org, Silicon Image

CPU / June 2006 45


46 June 2006 / www.computerpoweruser.com
spotlight

UD. Is there a better acronym little common sense, and a line of defense consisting of
to describe the state of PC up-to-date weapons with which to battle the enemy.
security today? Ask 10 differ- Unfortunately for even power users, the crackers and
ent users ranging from new- hackers who are the enemy are also power users who are
bies to enthusiasts just how typically just as smart, just as knowledgeable, and just as
dangerous tooling around the able to draw upon their own computing wisdom. The one
Web is with Internet Explorer overriding characteristic these power users possess that the
or how safe it is to open an majority of power users don’t, however, is a streak of
email attachment from an maliciousness they’re willing to act upon.
unknown sender or how likely To that end, we present a series of articles this month that
it is your system will become bring power users up-to-date about what’s occurring in the
a zombie without a firewall in PC security segment. Our coverage, of course, includes infor-
place, and you’re likely to get mation on viruses, Trojans, spyware, phishing, and other
10 different levels of comput- obvious threats but also a security hardware roundup (page
er knowledge, ranging from 70); a comprehensive look at rootkits, the hacker’s current fla-
incredibly unaware to incredibly educated. vor of the day (page 56); and a look at a theory that some
For many novices there are seemingly more worms, virus- antispyware makers are actually spyware perpetrators looking
es, Trojans, and identity thieves lurking around every PC to turn a profit (page 48). Additionally, we have detailed the
corner than there are stars shining in the sky. Case in point: actual process a malicious user might use to spread a Trojan
Smart Computing magazine, CPU’s older, big brother, offers (page 60), information that is scarily only a Web search away,
a free technical support program to both subscribers and as well as data on hackers’ increased reliance on social engi-
nonsubscribers [www.smartcomputing.com/techsupport; neering techniques in the face of users installing better protec-
(800) 368-8304]. To the credit of Smart Computing’s writ- tion, as Ronald O’Brien, a senior security analyst at Sophos
ers and editors and the job they continually do educating told us: “(Hackers have) had to become quite sophisticated
readers about PC security-related issues, the majority of about how they get into a system . . . because so many people
those who call the tech support lines (most callers not being now have protection at the endpoint, there is a much greater
power users) for assistance express at least a general knowl- dependence on social engineering techniques in order for
edge of the dangers of spyware, viruses, and other nasties. these attacks to be successful.”
Many of those callers indicate they already have protec- No matter where you fall in terms of computing experi-
tion in place in the form of firewalls and antivirus and ence, PC-security threats are something we’ll likely have to
antispyware protection, whether that hardware/software deal with from here out. Several studies would bear this out,
was preinstalled on their systems or they added it them- including a “Corporate Anti-Spyware Market, 2006-2010”
selves. Many also know of and religiously use Ad-Aware, analysis from The Radicati Group, which forecasts that
SpyBot S&D, ZoneAlarm, and other free tools. But there worldwide revenue from gateway- and desktop-level segments
is also a sizeable segment of users who are quick to blame of the antispyware market will grow from $214 million in
any shortcoming their computer is suffering from on spy- 2006 to a whopping $1.4 trillion in 2010. More recently,
ware, malware, Trojans, or more—whether the actual McAfee researchers reported that the use of stealth technology
problem is something as security-unrelated as out-of-date (think rootkits) in malware/adware apps increased 600% in
graphics card drivers or insufficient installed RAM. And the last three years and nearly 700% in Q1 2006 from 2005.
you have to believe those users represent an even larger Perhaps the saddest fact of all is that whether you are a
segment of the overall computing population who are novice, power user, or fall somewhere in between, you
somewhat informed but also uninformed as to what real are part of the PC-security war, whether you want to be
security dangers and symptoms really consist of. or not—that is, if you want to keep your system opera-
That’s where the FUD comes in. tional, your identity your own, and your information
Power users, of course, know that rela- away from prying eyes. ▲
tively safe computing is the result of a
proactive blend of preparation, a by Blaine A. Flamig

CPU / June 2006 47


magine that your computer is no longer you targeted ads. Because only you should be privy to what
your own. Someone has commandeered it you’re browsing, this is obviously highly invasive.
to make himself rich at your expense. 4. They’re self-obscuring. Spyware hides itself, and in this sense,
Eventually, your system may stop working it’s a great deal like a virus. Removing it often requires
or become so erratic and sluggish that detailed knowledge of the spyware in question, as the actual
you’re forced to wipe it clean and reload spyware rarely provides you with an Add/Remove Programs
it—only to have someone else hijack it later entry. When it does, it often only removes the most obvious
on. If you’re really unlucky, it won’t just be signs of its presence; it’s usually still there, waiting to reacti-
your computer that gets mulcted, but your vate whenever it can.
passwords, bank account, phone bill, and
possibly your credit rating. And all this Consider any program that meets three of these four criteria
happened because you clicked a pop-up ad. (or No. 2 and No. 3 alone, really) spyware. The one thing that
Chances are you don’t have to imagine such a scenario; it’s distinguishes spyware from almost every other computer prob-
probably happened to you or someone you know. It’s a scene lem is that its purpose is to make money for its creators at all
playing out thousands of times a day around the world, thanks costs and at the expense of your privacy and your computer’s
in great part to the profit-at-any-cost software scourge known as stability and security.
spyware or malware.
Symptoms Of The Disease
Defining Spyware Because spyware conceals itself from you, what we usually see
What exactly is spyware anyway? In short, it’s a catchall term isn’t the spyware but symptoms of its presence. Most symptoms
for programs that load into someone’s computer, usually either first show up in your browser via the following:
against his will or without warning in an attempt to turn the 1. Pop-up windows that won’t disappear. This is the most com-
rig into a money-making tool for a third party. This attempt mon symptom. If you’re seeing pop-ups you didn’t summon,
usually consists of subjecting the user to unwanted advertising, check for spyware immediately.
but it takes many other forms, which we’ll discuss later. Four 2. Changed/redirected browser Start or Search pages. Many
key criteria describe the vast majority of spyware apps: spyware apps try to force your browser to go to some kind of
1. They’re unsolicited. Spyware generally loads without the
user’s explicit consent, usually through an unsecured Web
browser (typically a pre-Service Pack 2 edition of Internet This is the sign of spyware
attempting to install itself
Explorer 6). In some cases, spyware asks for consent to load
through a Web browser
one item but then loads many others. In the vast majority of
via an ActiveX control.
cases, you don’t know something was loaded until it’s too late. Note the “scare warning”
2. They’re after your money. Spyware is designed to turn rev- that attempts to trick you
enue for its creators. The exact form varies, but it usually to click Yes, even though
involves annoying and difficult-to-ignore advertising. the component installed
3. They violate your privacy. Many spyware apps silently record will do nothing to address
your Web browsing habits, turning that into money by sending the problem described.

48 June 2006 / www.computerpoweruser.com


spotlight

changes in behavior due to spy-


ware. Unfortunately, tech sup-
port technicians often can’t offer
much more detailed advice than
wiping the system clean. If that
takes the computer back to a
pre-SP2 state, the system is vul-
nerable all over again.
ActiveXHelper provides detailed
The newest versions of Internet Explorer
information about all the ActiveX controls Sources Of The Scourge
have far better defenses against installing
that are installed in your computer and
components loaded from a Web page and How does spyware infect most sys-
lets you disable any suspicious ones.
slightly more detailed information about tems? There are three common ways:
what’s to be installed and why. 1. Ad banners. Many sites that use
unscrupulous ad vendors play host to
spyware-delivery systems. An IFRAME,
monetizing search engine that is 1. Bad system performance. The system the part of a Web page that loads inde-
designed to lead you nowhere except slows down horribly, especially the pendently of everything lese, usually
to those who want your money. Spy- Web browser, typically the main vec- hosts ads, so the ad can contain any sur-
ware can also hijack IE’s search func- tor for spyware. Plus, constantly hav- reptitious data the ad vendors want. All
tion this way. ing to close stupid pop-ups slows a user has to do is use an insecure
3. Spontaneous redirects. If you’re brows- down your performance. browser to visit a page with a spyware-
ing one page but suddenly find yourself 2. Instability. System crashes or inex- loading ad on it and he’s hit.
at another, such as a bogus search en- plicable lock-ups due to improper 2. Trick downloads. Spyware is often
gine, spyware is probably at work. interactions between spyware and the bundled with another, apparently
4. Ad links on Web pages. Some spy- rest of the system. Spyware apps are innocuous free download or packaged
ware apps don’t throw hordes of pop- written to make money, not to play in the form of a program that does
up windows at you but instead do nice with your computer, so their cre- good things for your computer, such as
things like insert ad links into Web ators have no incentive to write sane, a spyware scanner or system-cleaner
pages that weren’t there before. If stable apps. tool. (See the “Fighting The Fire,
you’re trying to author a Web site, for 3. Vectors for other problems. Spyware Feeding The Flames?” sidebar for
instance, and if you or other people are can bring in more spyware to your more.) Many P2P file-exchange pro-
seeing ads you didn’t put there, spy- system and create security holes that grams bundle downloads like this and
ware may be present. bring in actual viruses. justify including it through provisions
5. Browser add-ons. Spyware may show in the EULA. Such EULAs are usually
up as new program toolbars in IE that The majority of tech support calls that designed to be difficult to read, com-
you may or may not have installed. PC vendors log involve instabilities or pelling people to just click through
6. System Tray apps or Desktop icons
you’ve never seen before. This is
becoming less common as spyware
does more to remain invisible, but it
happens and should set off alarm bells.
7. Other unexpected behaviors. Spyware
makers are getting more devious and
nasty, so this is by no means an ex-
haustive list of all the symptoms you
might experience.

Aside from annoying behavior changes


and personal information that could be
exposed to third parties when spyware
hits, there’s a whole host of other nega-
tive effects that spyware has on your ShellExView, a brother to ActiveXHelper, gives you a list of all
computer. Most are instantly familiar to BHOs and shell extensions currently installed and also places
anyone who’s suffered from them: where adware loves to nest and breed.

CPU / June 2006 49


spotlight

them without understanding what


they’re getting into.
3. Ad-supported shareware. Some share-
ware uses ad components that often
show up as spyware. Some of these ad
systems are perfectly legitimate, but it
can be prohibitively difficult to tell
which ones are and aren’t.

Cashing In
Ad banners aren’t the only way spy-
ware applications try to make money.
Other tactics include:
1. Affiliate fraud. If a Web site uses an
affiliate program, such as Amazon
.com’s referral system, some spyware
The free SiteAdvisor plug-in warns you about potentially dangerous programs hijack the referral informa-
content or behaviors on sites you’re visiting or about to visit. tion on the fly and resubmit it so that
the referral goes to the spyware’s
authors, not to the actual referrer.
This isn’t something most end users
notice, and it’s almost invisible to
most affiliates who get their clicks
stolen in this fashion.
2. Identity theft and phishing. Spyware
doesn’t shy away from using some of
the dirtiest tricks of the Internet age.
The infamous CoolWebSearch spyware
family of apps harvested everything
from bank account information to site
passwords; after their malfeasance was
made public, the FBI stepped in.
Ad-Aware, probably the first professionally produced 3. Wire fraud. Modem users get hit with
antispyware program, still does a very good job of scanning
this one a lot: A spyware app silently
your system for problems in its free incarnation.
dials out to a long-distance or overseas
phone number and runs up massive
charges on the victim’s phone bill.
Fortunately, this variety of scam is on
the way out, as fewer people are using
dial-up connections.

If spyware is lucrative, just how lucra-


tive is it? Exact estimates of how much
money spyware generates is difficult to
come by, but best guesses put it in the bil-
lions annually. Before major crackdowns
on spam got underway, spam was equally
big business, although its slice of the pie
has been mercifully dwindling. As many
people are still terribly vulnerable to spy-
ware, the bulk of the money may have
Spybot Search & Destroy not only scans for existing spyware shifted from spamming people en masse
but also proactively blocks components known to be bad from to deploying spyware. It’s much harder to
ever getting installed in IE in the first place. guard against spyware than it is to delete

50 June 2006 / www.computerpoweruser.com


spotlight

unwanted Viagra ads, and it probably created and operate, it’s tempting to the wild to make a name for them-
generates more money, too. lump the two into the same category. selves. Spyware is created primarily to
However, they are as different as they make money, either through gray-
The Virus Connection are similar: area advertising or through illegal
The spyware phenomenon shares so 1. Fortune over fame. Most virus writ- keylogging and information-harvest-
much in common with how viruses are ers create a virus and release it into ing techniques.

Antispyware Roundup
The good news is that you can get excellent protection against Suites & For-Pay Programs
spyware without having to pay a dime. At least three of the best If there are so many good, free spyware programs, why pay
antispyware apps have free versions for personal use and are for one? Because for-pay programs come in suites that pro-
updated religiously. Many people run more than one antispyware vide protection against other threats. We detailed numerous
program to acquire a larger range of coverage. For example, such programs in April’s 2006 CPU (page 72), but here’s a
Ad-Aware catches some things that Spybot doesn’t, and vice quick rundown:
versa. However, keeping more than one antispyware solution on • Aluria Security Center 4.0 ($59.95; www.aluriasoftware
your computer may not be a good idea in the long run as anti- .com). The best thing about Aluria is how it scans for virus-
spyware programs grow more complex and intricate. es and spyware as a single, unified threat. Given how per-
sistent some spyware is, it’s not surprising that Aluria
Free Applications takes this approach, and many vendors are following suit.
Here’s a look at some of the best free apps available: • McAfee Internet Security Suite 2006 ($49.99; www.mcafee
• Ad-Aware (w www.lavasoft.de). Ad-Aware was probably the first .com). Another suite that merges spyware and virus scanning,
antispyware program of note and remains one of the best along with protection against worms, Trojans, and scripts.
thanks to its sophisticated scanning engine. It can scan an McAfee refers to these collectively as PUPs, or potentially
entire system (slow but thorough) or look at crucial system unwanted programs.
locations where most spyware infections would show up • Norton Internet Security 2006 ($69.99; www.symantec.com).
(fast). A commercial version has more features, such as Norton’s AntiSpyware product is, not surprisingly, part of
proactive ad blocking, but the basic version is fully functional. Norton AntiVirus’ general regime of system protection.
Google was fond enough of Ad-Aware that it gave it a place of Symantec also lets you buy and add additional suites (such
honor in its Google Pack suite (pack.google.com). as SystemWorks) that elegantly snap into the product.
• Spybot Search & Destroy (w www.safer-networking.org). SpyBot • Trend Micro PC-Cillin ($49.95; www.trendmicro.com).
is free forever thanks to its author’s diligence, and the app is One of the best antivirus suites around now also sports
updated regularly with new patterns and scanning functions. antispyware and a slew of antifraud browsing-security
SpyBot can proactively and unobtrusively block known bad features (antiphishing, sensitive-data control, etc).
components before they infect your computer. It also provides • ZoneAlarm Internet Security Suite ($49.95; www.zone
skilled users with a plethora of tools for protecting against and labs.com). Of course, ZoneAlarm is of one of the best and
undoing spyware damage. Less technical users can simply most widely used personal firewalls around, but ZoneLabs
push a button and scan. recently added antispyware to the mix, so existing users of
• Microsoft Windows Defender (w www.microsoft.com/athome the ZA freeware can upgrade to the full product and add that
/security/spyware/software/default.mspx). Still in Beta 2 at in seamlessly.
this writing, Defender is remarkably robust and powerful. It
integrates tightly with Windows—for example, Automatic Bonus Tool: CoolWebSearch Shredder (w www.trendmicro.com
Updates deliver the program’s pattern files—and sets up /cwshredder). Bad news: The infamous (and dangerous)
various real-time protections against new infections. CoolWebSearch is like the chest cold of spyware apps, bother-
Defender doesn’t scan for browser cookies, unlike many some, persistent, and next to impossible to get rid of. Good
competitors, because you can manage those manually. news: Trend Micro has a standalone utility that does nothing
Defender concentrates on more stubborn problems. The but root out and destroy all variants of CWS. Best news: It’s
app also reports sanitized data about its findings (for exam- free and small enough to store on a USB flash drive for quick
ple, no personal data is logged) on an opt-in basis. Micro- system repair. Keep it handy if this monster attacks you or
soft provides Defender free to licensed Windows users and someone you know. ▲
will do so after it’s finalized.

CPU / June 2006 51


spotlight

Microsoft’s antispyware program is simple, unobtrusive,


and tightly integrated with the rest of Windows. Aluria scans for both spyware and viruses as one threat.

2. Spyware authors learn from virus anything to get it, such as steal personal spyware phenomenon, reported that
authors. The technology that viruses data and use it to run up a tab somewhere. Yahoo!’s Overture advertising service
use has grown incrementally more For those reasons spyware is consid- had tenuous links to a spyware-driven
sophisticated in the last few years and ered as grave a threat as viruses by most scam that generated money via ad-click
still relies on exploiting many of the security-conscious users. This goes dou- fraud. Yahoo! was being tricked into
same basic techniques: user gullibili- bly for the newest breeds that use root- charging advertisers click fees for fake
ty, buffer overflow conditions, and kits, another technique the virus/Trojan traffic, no thanks to a spyware program
more. Spyware, however, is using world has adopted freely. Rootkits take that was written to take advantage of
more explicitly virus-like tricks to enormous steps to hide not only from Yahoo!’s ad networks. (You can see
gain an upper hand, including poly- the end user but from the operating sys- Edelman’s full report at www.benedel
morphism (such as disguising a tem, making them virtually impossible man.org/news/040406-1.html.)
program’s code to keep it from being to detect conventionally. Originally, they In a similar case, Google is working
recognized), stealth behaviors (mak- were used to provide a stealth backdoor to settle a class-action lawsuit against it
ing the app hard to detect in the first to a computer without the user’s consent that alleges its ad rates were artificially
place), etc. or knowledge, but the cloaking technol- inflated due to unscreened click fraud.
ogy that rootkits use are now being used The Center for Democracy and Tech-
Many of the same techniques used to in many other places, including spyware. nology has published its own report,
catch viruses, such as signatures and pat- Most antispyware programs can’t yet “Following the Money” (www.cdt.org
tern files, can be used against spyware. detect or block rootkits, either. (See the /privacy/20060320adware.pdf) that
Originally, most spyware scanners next article in this section for more examines how many legitimate compa-
depended explicitly on pattern files, or on rootkits.) nies are inadvertently (and sometimes
looking for specific files or Registry not so inadvertently) fueling the spy-
entries, to confirm the existence of (In)Direct Connections ware problem with their ad dollars. The
pieces of spyware. Now that spyware is One of the dirtier secrets of spyware is biggest problem is the sheer complexity
getting sneakier, spyware scanners must how many legitimate companies have of the network of advertisers, brokers,
use more advanced techniques, such as their products or sites pitched to people and ad-affiliate systems, which obscures
the heuristic technologies that virus through a spyware app’s ads, which, in the real guilty parties.
scanning uses. turn, makes those companies look bad. Although many states are contemplating
It’s hard to say if spyware or viruses are People who book such advertising space or have passed legislation criminalizing spy-
worse. They are both bad, but they pre- usually do so through third-party bro- ware, there are two problems with such
sent two distinctly different kinds of kers, so some aren’t always aware spyware bills/laws. First, some provisions may be
bad. Many viruses destroy data, and if you is advertising their products or services. very difficult to enforce effectively or may
don’t have the data backed up, there’s Sometimes, these connections ensnare be unfairly broad. Second, most laws ignore
no getting it back. People who design people who should know better. Ben or downplay the connections between spy-
spyware, however, are aggressively inter- Edelman, an antispyware activist who ware companies and their funding, possibly
ested in money and who will do almost conducts research and reports into the thanks to influence by lobbyists in the

52 June 2006 / www.computerpoweruser.com


spotlight

online ad space. California’s SB1436 bill


was widely criticized for being defanged in
this manner. Most tech experts aren’t con-
vinced legal measures will do more than
provide token protection anyway.
It’s becoming clear that spyware isn’t
just fleecing those whose computers it
gets installed on; it’s hurting everyone.

Swab The Deck


Spyware is often difficult to remove
due to the ingenious ways it hides or
tries to cover its tracks. Usually, people Norton’s antispyware and antivirus programs are now
can remove common spyware varieties essentially the same product.
by scanning with an antispyware app
and following its recommendations. But
as spyware gets sneakier and nastier,
users must use more technical means,
such as booting and scanning in Safe
Mode, erasing the System Restore repos-
itory, and performing manual edits on
system files.
In a presentation at the InfoSec World
Conference in April 2006, Mike Danseglio,
Microsoft security solutions program man-
ager, claimed that business should set up
system-imaging solutions—in other words,
automated ways to wipe and reload a sys-
tem—as the only practical way to deal with
malware. For businesses where data gener-
ally isn’t stored on individual machines, PC-Cillin is another long-standing antivirus suite that’s gained
this is actually fairly sound advice. But for good antispyware control, as well.
end users, it’s a ghastly hassle to wipe and
reload on demand.
As one response to the growing com-
plexity of the cleanup problem, many
makers of antispyware and antivirus pro-
grams are merging their approaches.
Aluria, makers of an antivirus and anti-
spyware defense product, have a One-
Scan feature where both types of threats
are scanned for in one pass. This isn’t
just a time-saving measure; the antivirus’
heuristics engine can also help detect
spyware if it tries to disguise itself
or appear in forms not detectable with
pattern files.

Lines Of Defense
The best way to clean up from spyware
is to never get infected in the first place.
That means tightening your system’s ZoneAlarm, one of the original personal firewalls for the
defenses against spyware and reducing the PC, now has antispyware protection.
risk of getting exposed to it. The first step

CPU / June 2006 53


spotlight

is technical, and many strides have been If you install SiteAdvisor’s free brows-
made in the last year or so to reduce the er plug-in (available for Internet Ex-
total “attack surface” for spyware in
Windows. The second is behavioral, and
plorer and Firefox), it checks any sites
you visit against its database. Sites
Fighting The
therefore harder to change. known to host spyware pop up a warn- Fire, Feeding
Any WinXP user should not be run- ing, and search results from Google or
ning anything less than SP2 with its secu- Yahoo! can optionally have “good site” The Flames?
rity upgrades and changes to IE, which and “bad site” icons automatically ap-
Are antispyware creators actually
makes it that much harder for spyware to pended to them. The IE version is a lit-
responsible for creating and releas-
get a toehold. Much has also been made tle more aggressive with warnings; it
ing spyware just to give their pro-
about switching to another browser, such pops up a pointer balloon over the page
grams something to do? Even people
as Firefox, but there are still many third- to show that the warning is coming
who don’t normally entertain far-out
party programs and system components from the browser and not from a pop-
conspiracy theories seem to be giv-
that render Internet content through the up on the page itself. In keeping with
ing this idea credence. It’s a little like
IE engine. AOL Instant Messenger is one wanting to maintain a good netizen
one of those movies about a drug
such application. Changing the browser image, no personally identifiable infor-
company releasing a disease so it
you use won’t necessarily change the mation is ever transmitted. If you want
can sell the cure.
browser those programs use, so make sure to comment on a site, you can submit
But is there any truth to it? To get
you toughen up IE, as well. information to SiteAdvisor. If you run
a straight answer, we turned to Mark
Antispyware programs also have their into a site listed in its database, you can
Russinovich of Sysinternals.com, a
own lines of protection. Spybot Search comment on it, as well.
respected and knowledgeable Win-
and Destroy, for example, has an Im- The idea is solid, and the plug-in
dows maven who understands the
munize function for IE that proactively doesn’t seem to create more problems
guts of Windows. Russinovich is the
blocks known bad products against being than it solves; it is stable and relatively
man who broke the word about Sony
loaded or executed by using a technique unobtrusive. Whether users actually
surreptitiously placing DRM-enforc-
native to IE. This is done mostly by pre- widely adopt it is another story: It’s a lot
ing rootkits on audio CDs, and he
venting IE from running any known bad harder to change users’ browsing habits
helped force Sony to take the discs
objects in a class of ActiveX BHOs. than it is to get them to install a service
off the market.
Aside from the BHO analyzer that’s in pack. If the description intrigues you,
In an article titled “The Antispy-
Spybot, a couple good third-party apps give it a try. If it works for you, recom-
ware Conspiracy” (www.sysinternals
were written specifically with BHOs in mend it to others. A little pressure can
.com/blog/2006/01/antispyware-
mind. NirSoft’s ActiveXHelper (www. change a lot.
conspiracy.html), Russinovich
nirsoft.net/utils/axhelper.html) can help
The End Of The Road? researched the subject in detail,
quickly decipher which BHOs are legit
coming to two conclusions: No,
and which aren’t. To get an overview of Spyware started in part because of
major antispyware makers aren’t
all the shell extensions (including BHOs) easily exploited deficiencies in the way
responsible for releasing spyware,
installed in Windows (including any that Web browsing and software programs
but numerous smaller, dodgier pub-
might be malware), check out NirSoft’s work. Changes in IE and Windows are
lishers are. Russinovich identified
ShellExView (www.nirsoft.net/utils/shex in progress to help fill those holes. With
three antispyware applications—
view.html). The program can debug some better OS and application security, it’s
Spyware Cleaner, SpywareStormer,
IE crashes caused by malware. possible to see a future where spyware as
and SpySheriff—as being suspect.
we know it simply won’t work anymore.
Break Bad Habits All were sold through pop-up ads,
That doesn’t mean, however, that
and in each case it was very difficult
If the biggest vector for spyware is bad computer crime or exploits will stop. It
to tell who actually wrote the app.
Web sites, part of the solution to the spy- also doesn’t mean that unsavory connec-
They all also operated selectively,
ware problem is giving people a sense as tions between shady online ad firms and
deliberately ignoring spyware that
to how unsafe a given Web site may be their clients will vanish overnight. But it
the same people providing the
before you go there. SiteAdvisor.com, a could mean the end of drive-by infec-
cleanup applications wrote.
site-research community, has been using tions where you’re punished with a spy-
Your best defense against such
automatic Web crawling and controlled ware infection for merely visiting a Web
nonsense is a top-shelf antispyware
user browsing and feedback to build a site or installing an application. That’s
program and good browsing and
massive database of known good sites that well worth looking forward to. ▲
PC-security habits. ▲
don’t host spyware or other problems,
such as phishing scams. by Serdar Yegulalp

54 June 2006 / www.computerpoweruser.com


f you thought Internet viruses, spyware, 3. Unauthorized. Once rootkits install themselves, they proceed
spoofing, and hack attacks were as bad as it to do things you most likely would never want happening.
could get, think again. There exists another This can consist of anything from logging keystrokes and for-
variety of computer threat that operates in warding them to a third party to hijacking data (the contents
such silence and secrecy that most people of a browser’s cache or email, for instance) to interfering with
never know they’ve been hit until long after the normal operation of the computer.
it’s too late. This threat is the rootkit, which
thankfully is beginning to get wider notice Some people are willing to define a rootkit as nothing more
now that it has crossed over into Windows than a tool that’s designed to conceal itself and other processes or
from the Unix world. data on a system, but the majority of rootkits in the wild aren’t
simply proof-of-concept lab toys. They’re malicious and trouble-
The Root Of The Problem some beasts, and if you encounter one, you need to know what
Let’s start by defining some terms. A rootkit is any program you’re up against.
that works in the following ways: The “root” in rootkit comes from the Unix world, where
1. Invasively. A rootkit enters your computer under false pre- the system administrator account is called root. If a Unix serv-
tenses, perhaps masquerading as another program or through a er is hacked or compromised from the outside so that an arbi-
“silent install.” trary user can run commands as root, this is referred to as
2. Invisibly. Rootkits take extraordinary measures to cloak them- “having the server rooted.” The original root kit was probably
selves, not only from the user, but from the operating system a set of common Unix utilities that were hacked so as not to
as a whole. The file system can’t see the files that comprise the leave traces on the system they were run on. Among these were
rootkit, and even if the files are exposed, they may be encrypt- tools for changing account passwords; if the password list was
ed or polymorphic. (They scramble themselves to avoid detec- compromised invisibly, anyone could have access to the com-
tion, for example.) puter in question.
Rootkits and viruses share a lot of common ground, espe-
cially in terms of how they work, but they differ in their
deployment. Rootkits are usually deployed to silently take over
a particular system, such as a computer containing sensitive
data that someone else wants (logins, files, keystrokes, data,
etc.). Viruses, conversely, spread freely and promiscuously and
try to do as much damage on multiple systems as possible.
Rootkits are generally deployed on one system at a time and
don’t propagate very much. However, viruses are now starting
to use rootkit-style concealment, and there’s at least one spy-
ware application (a variant of the infamous CoolWebSearch
program) that cloaks itself from the user and the OS with
This screen shot shows sample output taken from rootkit-style evasion.
RootkitRevealer, which finds all files and Registry entries
concealed from the OS. The hidden files listed here are Digging Its Fingers In
actually legitimate Windows system files, but malicious Rootkits generally work in one of three ways. A kernel root-
code might also turn up in such an inspection. kit plugs directly into the core of the OS—the kernel—and

56 June 2006 / www.computerpoweruser.com


spotlight

adds code that prevents the kernel common system functions that might Virtually Undetectable?
from finding out about it. One of the reveal their presence. Application rootkits Like virus technology, rootkit technol-
most common ways it does this is by swap out whole programs with versions ogy is constantly moving forward, and
attaching to the part of the kernel that that have been specially compromised, those who investigate how rootkits work
handles file I/O; if the rootkit can screen often as a way to deliver the rootkit into are trying to stay one step ahead of the
all file operations going on in the system, the system to begin with. If you run a competition. One example of a rootkit
it can ensure that the rootkit’s own com- program that seems like the real thing but concept that hasn’t yet come to light, but
ponents never show up. This is a bit like is in fact a rootkit-compromised phony, which has been implemented at least pro-
a gang of thieves running a tollbooth: If you’ve just infected your system with no visionally in the lab, is what’s been called
they see a fellow gang member driving way of knowing it. a VMBR (virtual machine-based rootkit).
up, they let him through without paying, Because rootkits take so many steps Virtual computing, of course, involves
but everyone else still has to pony up. to hide their tracks, just knowing you running a PC inside a PC, with its own
Thieves can pass through the gate unde- have one at all is half the struggle of OS and virtualized hardware. Programs
tected because they’re secretly running dealing with it. If you are technically such as VMware and Microsoft Virtual
the whole show. inclined, a good book on how Windows PC use this technology. Experts love
Library rootkits work a little higher up rootkits work is Greg Hoglund and using virtual machines as test-beds and to
in the OS but use something of the same James Butler’s “Rootkits: Subverting the run software in controlled environments.
methodology. They intercept calls to Windows Kernel.” The PC within the PC is referred to as

Rootkit.com is full of examples, documentation, and discussions concerning


rootkits, including many points of view from users as to why
they believe rootkits don’t have to always be a negative thing.

CPU / June 2006 57


spotlight

the guest system; the PC running the vir- But where had the components come from the rooted-OS list were probably
tual machine is the host. from? When Russinovich inserted a Sony suspicious, and you could analyze them.
A VMBR would use this technology BMG CD marked with the “Content Doing this manually is a ghastly chore,
in an incredibly sneaky way. When /Copy Protected” logo into the PC, it start- though. Thus, numerous folks have pro-
installed it would take control of the ed a standalone music player that played duced their own tools to automate the
boot sequence in the PC and force the copy-protected versions of the music on the process and look for other things in a sim-
VMBR to boot first. Then the VMBR disc. (Another Japanese entertainment ilar fashion. The most widely known is
would run as a host and load your regu- giant, Avex, tried a similar copy-protection RootkitRevealer (www.sysinternals.com
lar OS as a guest, inside it. This way the mechanism on a number of its CDs but /utilities/rootkitrevealer.html), authored
VMBR could completely control every eventually abandoned the idea.) by Russinovich and Bryce Cogswell, both
aspect of how the OS runs from the out- However, Russinovich’s protected disc who have much expertise with how
side. A malicious user could then capture also silently installed the XCP system to Windows works from the inside out. RKR
and report every piece of information on the computer without telling the user. works by scanning the disk twice, once
that machine, from keystrokes to net- This prevented the CD in question from through the file system and a second time
work data, without the user ever know- being ripped or copied, but it also con- by accessing the disk data natively. The
ing a thing is wrong. The system could tributed to system instability and created a results are then compared, and if a file is
also be easily tricked into never seeing whole host of other problems. Things got trying to hide, it’ll show as a discrepancy
the presence of the VMBR itself. worse: Not only was Sony BMG surrepti- between the two file lists. RKR also scans
Thankfully, VMBRs don’t exist out- tiously loading software (potentially unsta- the Registry for similar discrepancies.
side of proof-of-concept designs, but if ble software) into people’s computers, it Microsoft’s growing concerns about
you’re curious, a detailed paper by several came with no way to remove it. None of product security led it to develop a very
University of Michigan and Microsoft these inconvenient facts were disclosed in powerful rootkit tool of its own, Strider
Research engineers on the mechanics of the product’s licensing agreement, either. GhostBuster (research.microsoft.com
a VMBR (www.eecs.umich.edu/virtual Russinovich’s article touched off a /rootkit). GhostBuster works in roughly
/papers/king06.pdf) is interesting reading. firestorm of controversy that ended with the same way as RKR, but one of the ways
Other researchers, however, such as Sony BMG eventually abandoning the use it differs is that it compares an “in-the-box”
Hoglund, are skeptical as to how practical of XCP and setting up a settlement for scan of the file system with a scan a sepa-
this is in the real world, as it does require those who it had aggrieved (cp.sonybmg rately booted CD with its own miniature
a lot of work to implement. .com/xcp). One of the ironies of the copy of Windows derives. This is a much
rootkit is that despite it being difficult to more powerful way to scan for rootkits,
Sony’s Sedition trace and remove, it was extremely easy to although much slower because it requires a
Amazingly, neither a lone-wolf hacker prevent from being loaded in the first reboot. However, as of this writing,
nor the criminal underworld was respon- place. Holding down the SHIFT key GhostBuster isn’t available for public use.
sible for distributing the single most infa- while inserting the CD prevented Autorun One good thing about the rootkit phe-
mous rootkit infestation to date. Instead, from triggering on a CD and thus stopped nomenon is that many processes and proce-
it was entertainment conglomerate Sony the rootkit from installing. dures that rootkit authors use are fairly
BMG that was responsible for distribut- This is far from the only way a rootkit widely documented. Rootkit.com has many
ing a rootkit as part of its purported war can sneak into a computer, but it’s one of examples and links to further documenta-
against music piracy. the most widely documented. tion and also includes an occasional pithy
Mark Russinovich, author of the discussion of why rootkit strategies aren’t
RootkitRevealer tool (more on this app Weapons For The War always a bad thing. For example, allowing
later), initially unmasked the whole mess The good news is that rootkits aren’t an antivirus product to conceal itself from
while testing the tool on one of his own entirely undetectable. To paraphrase Sun direct attacks by viruses (provided the user
systems. In a report that he wrote about Tzu, the very thing that makes them knows what’s going on) is one example.
the incident (www.sysinternals.com/blog strong also makes them weak. The fact It’s not uncommon for legitimate prod-
/2005/10/sony-rootkits-and-digital- that rootkits hide files from the OS can ucts to use rootkit-style concealment
rights.html), Russinovich found many be used against them. strategies, but the strategy shouldn’t create
things that were cloaking themselves One of the first methods for rooting more problems than it solves. Not long
from the OS and didn’t seem part of any out rootkits was booting to a clean OS ago, Symantec faced criticism for using
known software product. After some from a CD, getting a directory listing of rootkit-style concealment for its Norton
more digging, he found several hidden all the files on the system, and then com- Protected Recycle Bin, mainly because the
components digitally signed by a compa- paring it with a similar list generated from way it was implemented could have
ny called First4Internet, makers of a inside the rooted operating system. If the allowed a system-sanctioned hiding place
copy-protection system known as XCP. two lists were different, the files missing for malware. This has since been fixed.

58 June 2006 / www.computerpoweruser.com


spotlight

Getting Un-Rooted a factory-pressed OS CD, not a custom (www.f-secure.com), Joanna’s Klister


If you find a rootkit on your computer, copy with a slipstreamed service pack (if (www.rootkit.com/project.php?id=14), and
your first reaction may be, “How do I get you use such a thing), and be equally cau- VICE (www.rootkit.com/project.php
rid of this thing?” The short answer? Don’t tious about any software you reinstall. It ?id=20). If the infected machine is impor-
try. Because rootkits are that much harder may be difficult to figure out where the tant, such as a server with critical data on
to get rid of by design, it’s generally not rootkit came from if you haven’t had tight it, don’t clean it; unplug it and call the
worth the effort to try and yank them control over the source of the software. authorities. At least one rootkit has been
manually. Even most experts aren’t confi- A program called RKDetector (www linked to a terrorist-linked hacker group
dent enough they can do this without .rootkitdetector.com) will let you delete that hijacked tens of thousands of com-
damaging the OS in the process and would the files a rootkit uses, even when the sys- puters by exploiting security holes
recommend wiping the computer anyway. tem is online. If you’re a pro and want to in AOL Instant Messenger. Chances are,
Therefore, treat a rootkit-infected com- experiment with it in a controlled setting, though, you probably won’t encounter
puter like scorched earth. Get what data it can be educational. But for production anything that ghastly, but that’s the prob-
you can off the system (hopefully you’ve systems, the best strategy is just to begin lem with rootkits; you never can tell. ▲
made regular backups), wipe the hard anew and not to tempt fate. Other tools
drive clean, and reinstall from scratch. Use to consider include F-Secure’s Blacklight by Serdar Yegulalp

According to Rootkit.com, Hacker Defender is “more of a ‘blackhat tool’ than a training example.” Rootkit.com also
says it is the most popular and widespread rootkit today. According to a passage at Hxdef.org, the online home of the
Hacker Defender project, the continuing development of Hacker Defender should be seen as a positive.

CPU / June 2006 59


uch of the attention Users therefore must remain vigilant about maintaining their
paid to malware in re- systems to avoid infections in the first place and then taking
cent years has shifted whatever steps necessary to eliminate infections if they occur.
from a focus on tradi- Toward that end, we have examined five prominent malware
tional malware threats threats from the first half of 2006 and outlined the steps users
to a concentration on can take to remove each one manually.
spyware and adware. Threat Name: Netsky-P. Also known as Netsky.AD@mm,
And no wonder: The Netsky.P@mm, Netsky.Q, and Netsky.Q@mm.
growing prevalence of How It Spreads: Although it can propagate through P2P net-
quality security software has, like an effective vaccine, decreased the works, this worm generally spreads via email attachments. It also
likelihood of a widespread virus or worm outbreak by minimizing exploits the MS01-020 (also known as the Incorrect MIME Head-
the number of systems that are susceptible to them. er) vulnerability to infect a PC when the user views the infected
Indeed, the threat from nonspyware malware is quite low at this message through Outlook’s preview pane. Once installed on a sys-
point in time. The last significant worm outbreak was Zotob in tem, Netsky-P harvests email addresses from files with specific
September 2005, and the threats registered since then have a low extensions, including .ASP, .CGI, .DOC, .EML, .HTM, .HTML,
rate of prevalence. .MSG, .RTF, .SHTM, .TXT, .VBS, .WAB, and .XML, among
That doesn’t mean hackers have given up on viruses, worms, and others. It then forwards itself to most of the email addresses it finds.
Trojan horses, however. They’ve simply refined their methods, says (It won’t forward itself to security-related addresses.)
Ronald O’Brien, senior security analyst at Sophos. Hackers have What It Does: Netsky-P is the latest nuisance variant of a worm
“had to become quite sophisticated about how they get into a sys- family that traces its lineage back to Sasser author, Sven Jaschan.
tem,” he says. “Because so many people now have protection at the Its main purpose is to delete Registry settings associated with
endpoint, there is a much greater dependence on social engineering MyDoom and Bagle. It then forwards itself to most of the email
techniques in order for these attacks to be successful.” addresses it finds on the infected system. The mass emailings can
The fact is today’s cyber criminals think less like common van- have an adverse effect on the performance of the infected PC.
dals—crashing systems for the sake of crashing systems—and more How To Remove Netsky-P: As is the case when removing
like cunning thieves: strategically attacking and manipulating sys- any malware infection, you should make sure your antivirus soft-
tems to achieve a particular purpose. They tend to operate under ware is up-to-date and that you have a full system backup in
the radar, using a subtle mix of viruses, worms, and Trojans to hand before proceeding.
insinuate themselves into the machines of unsuspecting users.
As a result, says Craig Schmugar, virus research manager at Sven Jaschan, the German teen
McAfee Avert Labs, many of their best weapons are proven responsible for unleashing the Sasser
threats, or variants thereof, that have been around for years. and Netsky worms, claims to have
“What we see for 2006 is a continuation of this kind of written the Netsky virus as a way of
background noise,” Schmugar explains. “These are threats helping computer users eliminate the
like Mydoom, Netsky, and Lovgate that have been around MyDoom and Bagle worms from their
for one or two years and yet continue to linger at the top of PCs. He received a 21-month suspended
the detection list.” sentence for his cyber crimes.

60 June 2006 / www.computerpoweruser.com


spotlight

MICROSOFT\WINDOWS\CUR- when the scan is complete. Enable System


RENTVERSION\RUN key and delete Restore when you’re done.
any values that refer to FVProtect.exe. Threat Name: Mytob-EX. Also known
Finally, close the Registry Editor, reboot as Mytob.DC, Mytob.DC-net, Mytob
into Normal Mode, enable System Restore, .GF@mm, Mytob.IT-2, Mytob.KP@mm,
and run the antivirus utility one more time. Mytob.LL, and Mytob.MY@mm.
Threat Name: Zafi-B. Also known as How It Spreads: Similar to Mydoom,
Erkez.B@mm and Zafi.B@mm. Mytob-EX propagates itself by culling
How It Spreads: Zafi-B can spread email addresses from files with particular
through P2P networks by loading itself into extensions, including .ASP, .CGI, .HTM,
shared folders under either Winamp 7.0 .HTML, .TXT, .WAB, and .XML. It
full_install.exe or Total Commander 7.0 then forwards itself as an email attach-
full_install.exe. It also travels as an email ment to most of these addresses.
attachment. The worm will search for email What It Does: Mytob-EX is one of the
addresses in various files extensions, includ- latest variants in an especially prolific family
One of the most effective means of avoiding ing .ASP, .DBX, .EML, .HTM, .TXT, and of worms. It loads automatically each time
malware infections is to enable Automatic .WAB. It then forwards itself to most of the a user starts the computer and then exe-
Updates. Make sure you configure the feature addresses it finds. cutes three actions: It tries to shut down
to run at a time when your PC is on and your What It Does: Zafi-B destabilizes a security-related processes; attempts to pre-
Internet connection is active. system by performing the usual mis- vent access to security-related Web sites;
chief, such as modifying the Registry, and establishes a backdoor server, so remote
The first step is to disable System Re- inserting randomly named files on the users can turn the computer into a zombie.
store. You can do so by right-clicking My hard drive, depositing itself into shared How To Remove Mytob-EX: Start by
Computer, selecting Properties from the P2P network folders, and forwarding updating your AV software, backing up
pop-up menu, and selecting the System itself to most of the email addresses it data, and disabling System Restore.
Restore (in Windows XP) tab. To complete finds on the system. It also initiates DoS Next, employ the Windows search
the process, select the Turn Off System attacks to certain Web sites and over- utility to locate the Hosts file. (It has no
Restore option and click OK. writes security-related EXE files on the file extension.) You’ll most likely find it
Next restart in Safe Mode by rebooting infected hard drive. in the WINDOWS or WINDOWS\
and pressing F8 as the computer starts. How To Remove Zafi-B: Normally, SYSTEM32\DRIVERS\ETC folder.
Select Safe Mode when the Windows the first thing you should do when an Wherever it’s located, right-click it, select
Startup Menu appears. When Windows is infection occurs is run a full system virus
loaded in Safe Mode, launch the antivirus scan using updated antivirus software.
utility and perform a full system scan. But it may be impossible in this case
Follow the on-screen instructions to because Zafi-B often replaces key security-
remove all contaminated files and folders. related EXE files. The solution is to man-
Now it’s time to delete the remaining ually undo the unwarranted changes and
residue. That means opening My Com- reload the antivirus software.
puter, accessing the affected drive, After disabling System Restore and
and deleting the PROGRAM FILES\ rebooting to Safe Mode, access the Reg-
NETSKY.P folder. While you’re at it, istry Editor. Locate and delete the HKEY
pull up the WINDOWS\SYSTEM and _LOCAL_MACHINE\SOFTWARE\
WINDOWS\SYSTEM32 folders and MICROSOFT\_HAZAFIBB key. Locate
delete the following files: Base64.tmp, the HKEY_LOCAL_MACHINE\SOFT-
Userconfig9x.dll, Zip1.tmp, Zip2.tmp, WARE\MICROSOFT\WINDOWS\
Zip3.tmp, and Zipped.tmp. CURRENTVERSION\RUN key and
Next, to access the Registry Editor, open delete any value that refers to Hazafibb.
the Start menu, select Run, type regedit Close the Registry Editor and reboot into
in the Open field, and click OK. When Normal Mode. Disabling System Restore is an important first
the Registry Editor appears on-screen, At this point you should reinstall your step in removing malware. Doing so ensures
locate and delete the HKEY_LOCAL_ AV utility. When installation is complete, that your AV utility can access and clean all
MACHINE\SOFTWARE\NETSKY-P reboot into Safe Mode once again, scan infected files. Note that by disabling System
key. You also should locate the HKEY_ the system for malware, and delete all Restore, you’ll lose all previously created
CURRENT_USER\SOFTWARE\ infected files. Reboot into Normal Mode restore points.

CPU / June 2006 61


spotlight

Beyond Windows:
AV Software
For Linux
Because of its popularity and many vul-
nerabilities, Windows has become the
biggest target for hackers intent on
causing harm or stealing data. But it
isn’t the only target. Cyber criminals
occasionally turn their attention to
Malware often installs itself into the HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\
other operating systems, including
WINDOWS\CURRENTVERSION\RUN and HKEY_CURRENT_USER\SOFTWARE\
Linux. That’s why it’s crucial for all
MICROSOFT\WINDOWS\CURRENTVERSION\RUN keys in the Registry. Why? Because
computer users, even those who don’t
programs referenced by these keys are loaded automatically each time Windows boots up.
do Windows, to invest in reputable
antivirus software. Several non-
Windows AV utilities are available,
Open from the pop-up menu, select box, set Startup Type to Automatic and
including those listed below.
Notepad in the resulting Open With dia- click the Start button under the Service
avast! Linux Home Edition. ALWIL
log box, and click OK. The contents of Status heading. Click OK when it’s clear
Software developed the Linux edition
the Hosts file will appear on-screen. the firewall has restarted.
of avast! around the same ICSA-certi-
Review the contents of the Hosts file and To reactive the Windows Firewall in
fied kernel it employs in its various
delete any line that references any of the WinXP SP2, access the Control Panel,
Windows AV programs. As a result,
following Web sites: Amazon, AVP, CA, open the Security Center, and click the
users get advanced features, such as
Etrust, eBay, F-Secure, Grisoft, Kasper- Windows Firewall icon. When the
quarantining and automatic updates,
sky, McAfee, Microsoft, Moneybookers, Windows Firewall window appears on-
that Windows users take for granted.
NAI, Network Associates, Panda Soft- screen, turn the firewall on and click
The utility also boasts a user-friendly
ware, PayPal, Sophos, Symantec, Trend OK to activate it.
interface to complement its command
Micro, Viruslist, and VirusTotal. Save Finally, Internet Explorer’s Web set-
line console, online and email tech
the changes and repeat the process for tings must be reset. From within the
support, and a price that can’t be beat:
each Hosts file on the computer. Security Center, click Internet Options.
free (for personal use).
After editing the Hosts file(s), reboot to Click the Programs tab in the Internet
F-Prot Antivirus For Linux
Safe Mode and scan the system for mal- Properties window, select the Reset Web
Workstations. The latest edition of F-
ware. Delete all contaminated files and Settings option, and click OK. Enable
Prot Antivirus For Linux Workstations
reboot into Normal Mode. Next, open the System Restore when you’re done.
can detect and destroy all malware
Registry Editor and locate the HKEY_ Threat Name: Sober-Z. Also known as
threats, not only those targeting Linux.
LOCAL_MACHINE\SOFTWARE\ CME-681, Sober@mm!M681, Sober.AA,
It offers a command line interface, sup-
MICROSOFT\WINDOWS\CUR- Sober.AG, Sober.W, Sober.X, Sober
ports an option for scheduled scan-
RENTVERSION\RUN and HKEY_ .X@mm, Sober.Y, and Sober.Z@mm.
ning, and can identify boot sector
LOCAL_MACHINE\SOFTWARE\ How It Spreads: Sober-Z travels as a
viruses and macro viruses. Like avast!
MICROSOFT\WINDOWS\CUR- .ZIP email attachment. The worm scours
Linux Home Edition, F-Prot Antivirus is
RENTVERSION\RUNSERVICES keys. the hard drive of an infected PC, pulling
free for personal use only. Frisk
Delete all corresponding values that refer to email addresses from files with specific
Software also offers comparable AV
Pic System or Picx.exe. extensions, including .BAK, .CFG, .CGI,
utilities for users of BSD and DOS, too.
Next, WinXP users need to reactivate .DOC, .EML, .INI, .LOG, .MSG, .PPT,
Panda Antivirus For Linux. Panda
the Windows Firewall. To do so, open the .PST, .RTF, .TXT, .VBS, .WAM, .XLS,
Antivirus For Linux is a no-nonsense,
Start menu, select Run, type services.msc and .XML. It then sends itself to most of
command line AV utility that costs
in the Open field, and click OK. The the email addresses it finds.
nothing and runs on servers and work-
Services window will appear on-screen. What It Does: When Sober-Z first
stations alike. How-to instructions are
Locate and double-click the Internet struck in December 2005, it reportedly
minimal, and support is nonexistent.
Connection Firewall (ICF)/Internet accounted for one out of every 13 email
For these reasons we recommend it to
Connection Sharing (ICS) entry in the list messages in circulation and represented
existing Panda AV customers only. ▲
of local services. In the resulting dialog one of the biggest outbreaks on record.

62 June 2006 / www.computerpoweruser.com


spotlight

Many malware agents, EXPLORER\MAIN\Enable Browser


including Mytob-EX, are Extensions
programmed to disable HKEY_LOCAL_MACHINE\SOFT-
system security utilities. WARE\MICROSOFT\WINDOWS\
After an infection, you CURRENTVERSION\CONTROL
should reactivate these PANEL\LOAD\Compid
utilities, including the HKEY_LOCAL_MACHINE\SOFT-
Windows Firewall. WARE\MICROSOFT\WINDOWS\
CURRENTVERSION\CONTROL
PANEL\LOAD\Next_Install key
HKEY_LOCAL_MACHINE\SOFT-
WARE\MICROSOFT\WINDOWS\
CURRENTVERSION\CONTROL
PANEL\LOAD\HTTPREPORT
HKEY_LOCAL_MACHINE\SOFT-
WARE\MICROSOFT\WINDOWS\
CURRENTVERSION\CONTROL
The message terminates previous ver- HKEY_LOCAL_MACHINE\SOFT- PANEL\LOAD\WASPOPUP
sions of Sober, disables Symantec’s WARE\MICROSOFT\WINDOWS\ HKEY_LOCAL_MACHINE\SOFT-
LiveUpdate function, manipulates the CURRENTVERSION\RUN\ Wincheck WARE\MICROSOFT\WINDOWS\
Registry, and copies several files to the HKEY_CLASSES_ROOT\EXEFILE\ CURRENTVERSION\CONTROL
system. It also presents a WinZip Self SHELL\OPEN\Command PANEL\LOAD\FORMWAS
Extractor error message indicating an Finally, close Registry Editor and run HKEY_LOCAL_MACHINE\SOFT-
error with a packed header. It may show one more malware scan. Enable System WARE\MICROSOFT\WINDOWS\
an additional message indicating no Restore when you’re done. CURRENTVERSION\EXPLORER\
viruses, Trojans, or spyware were found Threat Name: MetaFisher Trojan. BROWSER HELPER OBJECTS\
on the system. Sober-Z can download Also known as Agent.EO, Agent.EY, {78364D99-A640-4DDF-B91A-
file updates from the Internet and for- Agent.FG, Agent.FL, PWS-EC, PWS 67EFF8373045}
wards itself to most of the email address- -EJ, PWSteal.Metafisher, Spy-Agent HKEY_LOCAL_MACHINE\
es it finds on the system. The mass .AK, TSPY_AGENT.AMD, and TSPY_ SYSTEM\CURRENTCONTROL-
emailings can have an adverse effect on AGENT.BGN. SET\SERVICES\SHAREDACCESS\
the performance of the infected PC. How It Spreads: MetaFisher is distrib- PARAMETERS\FIREWALLPOLICY\
How To Remove It: First back up uted as spam. Each message contains a STANDARDPROFILE\AUTHORIZED-
your data and disable System Restore. If link pointing to a site designed to exploit APPLICATIONS\LIST\(Default)
you own Symantec security software, the MS06-001 (also known as the Micro- HKEY_LOCAL_MACHINE\
reinstall the LiveUpdate component at soft Windows Graphics Rendering En- SYSTEM\CURRENTCONTROLSET\
this time. You can download the insta- gine WMF Format Unspecified Code
llation file from ftp://ftp.symantec.com Execution) vulnerability.
/public/english_us_canada/liveupdate What It Does: A particularly devious
/lusetup.exe. When the installation is and criminal Trojan, MetaFisher exploits
complete, update virus definitions and the MS06-001 vulnerability to establish
run a complete scan of the system. itself on a system and create a backdoor
With that out of the way, open the that lets remote operators monitor system
Registry Editor. Locate and delete the fol- activity, gather confidential banking
lowing values: information, even steal funds from an
HKEY_CURRENT_USER\SOFT- affected user’s financial accounts.
WARE\MICROSOFT\WINDOWS\ How To Remove It: After updating
CURRENTVERSION\RUN\_Windows your AV software, running a full system
HKEY_CURRENT_USER\SOFT- scan, backing up your data, and disabling
WARE\MICROSOFT\WINDOWS\ System Restore, the next step is to pull up
Symantec customers who find their PCs
CURRENTVERSION\RUN\_Wincheck the Registry Editor. Use it to locate and
afflicted with Sober-Z should download,
HKEY_LOCAL_MACHINE\SOFT- delete the following keys and values:
install, and run LiveUpdate as part of a
WARE\MICROSOFT\WINDOWS\ HKEY_CURRENT_USER\SOFT-
comprehensive solution.
CURRENTVERSION\RUN\ Windows WARE\MICROSOFT\INTERNET

CPU / June 2006 63


spotlight

SERVICES\SHAREDACCESS\ antispyware utility. These three programs


PARAMETERS\FIREWALLPOLICY\ create a formidable barrier that can repel
STANDARDPROFILE\AUTHO- the vast majority of unsolicited attacks.
RIZEDAPPLICATIONS\LIST\%Progra Other preventative measures exist, of
mFiles%\Internet Explorer\Iexplore.exe course. Upgrading to WinXP SP2 is a
Exit the Registry Editor, reboot the step in the right direction. It’s also a
computer, and run another malware scan good idea to disable BHOs (Browser
to complete the removal. Enable System Helper Objects), delete all unexpected
Restore when you’re done. email attachments, and ignore all
unusual email messages. Users should
Keep It Safe log on to a Windows user account that
Logging on to a PC as a user rather than as an
As is quite apparent, users can’t rest on doesn’t have administration privileges.
administrator prevents malware from making
their laurels when it comes to protecting This step restricts what malware can do
administrator-level changes to a system. Use
their data. They need a comprehensive if it gets into your system. ▲
the administrator account only when installing
se-curity system that combines up-to-
software and modifying system settings.
date antivirus software with a firewall and by Jeff Dodd

Malware’s Most Wanted


The stew of contagious computer viruses is constantly churning. vulnerabilities, but over time patterns emerge, and the most signifi-
Threats rise to the top, wreak a little havoc, and then sink away into cant threats become apparent.
the dredges of bad code often to reappear unexpectedly several Based on information provided by Sophos, we have identified
months—or years, in some cases—later. Most antivirus software 10 significant malware threats that emerged and stayed near the
developers track this kind of malware activity, posting the latest top during the first three months of 2006. How long they will stay
threats on their Web sites. The information changes from day to there is hard to tell. When it comes to malware, predicting future
day as hackers look for new and innovative ways to exploit system results on past performance is nearly impossible. ▲

Netsky-P See page 60.


Zafi-B See page 61.
Mytob-BE Email worm that disables AV software, blocks access to security-related Web sites, and enables
remote users to take control of infected systems. It also forwards itself to most of the email
addresses it finds. Also known as Mytob.CM, Mytob.BQ@mm, and Mytob.DW.
Netsky-D Email worm that makes changes to system files and forwards itself to most of the email
addresses it finds. It carries a dated payload that caused a computer to beep randomly on
March 2, 2004. Also known as Netsky.C@mm, Netsky.D@mm, and Netsky.gen@mm.
Mytob-FO Email worm that disables AV software, blocks access to security-related Web sites, and enables
remote users to take control of infected systems. Also known as Mytob.FO@mm.
Mytob-EX See page 61.
Nyxem-D Email worm that disables AV software, deletes files from the PC, makes changes to files with
certain extensions (including .DOC, .PDF, and .XLS), and forwards itself to most of the email
addresses it finds. It also travels through shared network folders. Also known as Blackmal.E@mm,
Blackmal.F@mm, CME-24, MyWife.D, MyWife.D@mm, MyWife.D@mm!M24, MyWife.E,
MyWife.E@mm, Nyxem.E, Small.KI@mm, Tearec.A, Worm_Grew.A, and Worm_Grew.B.
Sober-Z See page 62.
Bagle-CH Email worm that disables AV software, blocks access to security-related Web sites, downloads
and runs unsolicited software, and propagates through both file-sharing networks and messages
sent to most of the email addresses it finds. Also known as Bagle.CL, Bagle.DI-BK, Bagle.DP!M328,
Bagle.FJ, Beagle.DL@mm, Bloodhound.Beagle, and CME-328.
MyDoom-AJ Email worm that exploits the MS04-011 (also known as the LSASS or Local Security Authority
Subsystem Service) vulnerability in Windows to enable remote users to control the infected
system. The worm also blocks access to security-related Web sites and forwards itself to
most of the email addresses it finds. Also known as Mytob.AC, Mytob.AE, Mytob.AG@mm,
Mytob.AQ, Mytob.U, and Mytob.U@mm.

64 June 2006 / www.computerpoweruser.com


ou know the drill. An email comes years, however, experts have noticed an interesting paradigm
in that looks like it’s from eBay, shift in the construction of these networks: They’re shrinking.
PayPal, or one of the many other “Botnets are now about 20,000 machines in size as an average,”
services scammers commonly co- says Mark Sunner, CTO of email security company Mes-
opt. It tells you there’s a problem sageLabs, which scans and filters more than 165 million emails
with your account, and the only per day for its clients.
way to fix it is to click the link in There are several reasons for the rise of small botnets, but
the email and “confirm” a bunch everything boils down to the fact that big infections make big
of personal information. You
delete it because it’s obviously just
another lame phishing scam. A Trip To The Pharm
But what about that next mes-
sage? The one from your boss Spearphishing attacks are bad, but at least individuals can help stop
telling you to log in to a new internal Web site to set up an them. Pharming is a much more sinister type of attack because the
account to collaborate with other people on your team? The scammers commandeer DNS servers at a client, corporate, or even
sender line proves it came directly from her, right? And when the ISP level to redirect Web traffic to Web sites they control. All
you click the link it takes you to a site that looks exactly like the scammers have to do is change the translation tables so that
an internal page at your corporate Web site. The Address bar typed domains resolve to IP addresses assigned to equipment they
displays the correct URL and the padlock is even locked indi- control, and they gain access to everything you sent and received
cating it’s a secure connection. Or is it? through that “poisoned” DNS server.
Thanks to spearphishing it may not be. This sophisticated The experts we interviewed don’t view pharming as a huge
form of phishing takes social engineering to an entirely new level, threat because companies can patch DNS servers to prevent this
focusing on specific groups or individuals instead of casting a sort of hijacking, but pharming is still something everyone should
broader, cruder net designed to catch a very small percentage of take very seriously. Perhaps the scariest trend is pharming at the
users unaware. These emails contain personal or otherwise confi- individual PC level that works by poisoning the computer’s Hosts
dential email, seem to come from someone who is trusted or in a file. This file serves as a sort of shortcut that translates domain
position of authority, and often lead to Web sites that are indis- names into IP addresses locally, completely bypassing DNS
tinguishable from the real thing. They all are designed to steal servers connected to the Internet.
your personal information so scammers can steal money, intellec- Even initiatives such as DNSSEC (DNS Security Extensions)
tual property, or anything else of value. that are designed to fortify the current DNS system are far from
perfect. “You can configure your DNS server to use DNSSEC,”
Smaller Is Better says Johannes Ullrich, chief research officer for the SANS
Like spam and phishing attacks of the past, spearphishing Institute, “but the overall infrastructure is not there yet to sup-
attacks rely on botnets. port it on the .com or .net level, and that would really be the
When most people think of botnets they picture an enor- solution to make DNS itself more secure.” Ullrich pointed out
mous network of interconnected machines spewing out a never- that the .mil and .gov top-level domains will soon support
ending stream of phishing and spam email. That accurately DNSSEC and that Sweden’s .se top-level domain already does,
describes botnets of the past, which were created by explosive so if those tests scale well and prove the technology will work,
viruses and worms such as SoBig, Bagle, and Netsky, and tended other top-level domains such as .com should eventually incor-
to incorporate more than 100,000 machines. In the past few porate the technology. ▲

66 June 2006 / www.computerpoweruser.com


spotlight

splashes in the security community— “the purpose of a botnet isn’t just to pro- system. “We’re seeing them being used
along with big headlines in the end-user vide the ability to amplify how much you for distributing spyware and adware in
community—and are therefore detected can send,” says Sunner. “Its primary pur- particular because they can generate rev-
and cleaned up relatively quickly. This is pose is to obfuscate where it’s coming enue by installing these sorts of applica-
bad news for the scammers, who lose from. Stealth is probably one of the pri- tions,” says Paul Wood, a senior analyst
control over an enormous number of mary innovations going on at the mo- at MessageLabs.
machines without having a lot of time to ment.” These smaller botnets and the
exploit them, so they’ve now shifted gears need to stay under the radar make it dif- Seeing Isn’t Believing
and are purposely limiting the effective- ficult to send large volumes of standard Now that they have a stealthier deliv-
ness of viruses so a much smaller group phishing email, so to get a more efficient ery method in place, the next step for
of computers is infected. Now instead of return out fewer emails scammers have scammers is creating emails that are con-
controlling one enormous botnet that turned to spearphishing. vincing enough to make people click an
contains 100,000 computers, scammers Worse still, the viruses used to create embedded link. Company Web sites
can control five smaller botnets that each botnets give scammers complete con- usually give scammers all the informa-
contain 20,000 computers, providing a trol over a computer, letting them in- tion they need to impersonate someone
lot more flexibility. Unlike in the past, stall whatever they like on the infected from the IT department or some other

Phishing For Phishermen


When you receive a phishing email, particularly one that is so poorly it’s the only one your email server presumably creates. Information in
crafted that it insults your intelligence, the temptation to track down the second Received line (and any other Received lines that follow
the scammer is strong. Good luck because even a senseless phisher the first one since scammers tend to forge several of these lines)
can easily hide his or her tracks. As is the case with most digital refers to servers that the message hopped between on its way to you,
data, tracking down the source of an email isn’t so much about find- and scammers can also forge this information.
ing the information you need as trusting the information you find. An That first Received line has the potential to tell you the domain
email header is a gold mine if the sender didn’t take any precautions, name and IP address where the email originated, but it’s most
but in most cases what you find is just fool’s gold. likely a dead end. Phishers can use anonymizers to effectively
Pretend you receive a phishing email in Outlook, right-click the launder emails, making them all appear to originate from the
message’s entry, and click Properties to check out the Internet anonymizer service instead of from the scammer’s PC. They also
Headers box. You might see something like this, which we extracted can spoof the IP address in that line, although it’s very difficult
from a real phishing email: and often not worth the effort. The most likely scenario, however,
Return-Path: <secure@anbtx.com> is that message came from an infected computer sitting on a bot-
Received: from eastrmimpi01.cox.net ([68.1.16.117]) net and the computer’s owner has no idea scammers are using
by eastrmmtai02.cox.net his machine for phishing. The best botnets have so many layers
(InterMail vM.6.01.05.02 201-2131-123- that they are practically impenetrable even if you use more
102-20050715) with ESMT sophisticated snooping methods. “If you try to track a botnet by
id <20060404051557.VOES5488. deliberately infecting a mechanism to then see where it is report-
eastrmmtai02.cox.net@eastrmimpi01.cox.net>; ing back to invariably what you find is another botnet,” says Mark
Tue, 4 Apr 2006 01:15:57 -0400 Sunner, CTO of MessageLabs.
Received: from exchange ([216.163.60.34]) Even if you somehow manage to pin down a computer name and
by eastrmimpi01.cox.net with IMP IP address that irrefutably associates a phisher with a physical loca-
id GtDF1U00x0kKFQ80000000 tion, they’re often someplace where you can’t do anything. Your best
for tcbc@cox.net; Tue, 04 Apr 2006 01:14:08 -0400 and safest bet, therefore, is to report phishing emails to the proper
Reply-To: secure@anbtx.com authorities and forget about them. Because scammers can easily
From: Chase Personal Banking<secure@anbtx.com> forge IP addresses, it rarely helps to send phishing emails to a spe-
cific ISP. Save yourself a lot of trouble and submit them to the Anti-
There’s more than that, but this is the only stuff that potentially Phishing Working Group at reportphishing@anti-phishing.org. Don’t
matters. Here we have the name of the computer that sent the email forward the email to the organization unless you absolutely have to
(exchange) and the time zone from which it was sent (-0400, which because that strips away vital header information. Instead, send
is Atlantic time). Not much to go on so far, but what about those phishing emails as attachments. If the group looks into it and deter-
domain names and IP addresses? You can forget about the From, mines it’s a new scam, it will add the email to the site’s Phishing
Return-Path, and Reply-To lines as they are very easy to forge. There Archive so other potential victims can learn about it; as G.I. Joe
are two Received lines, but you can only trust the first one because taught us, knowing is half the battle. ▲

CPU / June 2006 67


spotlight

One-to-many “standard” attack

Attacker • The first impacted businesses act as the indicators leading to


Standard attack the release of protective signatures.
• Signature-based methodologies rereduce the risk but do not
provide protection until the threat is known. A few are
impacted while the rest benefit; you take your chances.

One-to-many “targeted” attack • In a targeted attack there is no shared risk and no


trigger for signature creation.
Attacker • Signature-based methodologies are therefore ineffec-
Targeted attack
tive against unknown threats.
• In addition, these attacks can be specifically tailored
because the attacker has greater knowledge of the target.

Source: MessageLabs

authority figure. They then can craft an that “Bob” corresponds to Bob’s real an organization but actually originates
email that looks like it’s coming from email address. from an outside IP address; however, any-
within the network, but actually comes Ullrich also recommends being ex- thing beyond that involves special soft-
from a botnet. Scammers forge the tremely consistent in the way you write ware or services from companies such as
sender’s address and use programming your emails so that imposter emails MessageLabs. Although the latest spear-
tricks to make the embedded link look will stand out. Using a standard greeting phishing techniques “are quite brilliant
like it goes to a legitimate Web site. and signature can go a long way toward from a social engineering standpoint, they
Once the victim clicks the link, the Web personalizing your emails, as does stick- stick out like a big red flag from a scan-
page that appears looks just as he would ing with one email account for all of ning perspective if you’re actually looking
expect, thanks to more tricks such as your correspondence (or at least never at the scripts and the mechanisms behind
using browser overlays to cover up the emailing a particular person from multi- them,” says Sunner.
actual domain name with a picture con- ple accounts).
taining the domain name the user Digitally signed email is another good Sharpen The Spear
expects to see. The scammers can also option, but Ullrich says very few organi- Spearphishing is poised to become
cover up other graphics; for example, zations implement it because everyone much more effective in the future
they can make the security padlock icon must use it constantly for it to be effec- thanks to a recent attack vector called
appear to be closed when it is really tive. “If I only sign important email, targeted Trojans. Standard Trojan virus-
open. The end result is visually identical then the problem is if I receive an es are self-replicating and designed
to that of the original Web site. unsigned email, I just think that you to spread to as many computers as possi-
didn’t consider it important enough to ble, regardless of where those comput-
Put Up Your Shield sign it,” he says. “So you have to sign all ers are located. Targeted Trojans are
Although spearphishing emails are your email in order for it to work, and much more selective, focusing in on a
very difficult to detect just by looking at people have to become familiar with it so single organization or even an individual
them, there are still a few things end they actually look for it.” user, and they are much better at re-
users can do to starve off these types of maining undetected.
attacks. “The biggest mistake is always Fight Back With Filters “They’ve added rootkit functionality
to trust the ‘from’ line in an email ad- Because the social engineering behind a so that they can better hide the software
dress,” says Johannes Ullrich, chief re- spearphishing attack has become so on the end computer,” says David
search officer for the SANS Institute. advanced that the latest attacks can even Mackey, IBM’s Global Security In-
Whenever possible check the header to fool expert computer users, all of the telligence Lead. Rootkits are the source
make sure what you’re seeing in your experts we interviewed recommended of much controversy in the PC gaming
email reader matches up with what’s aggressive email and network traffic filter- and entertainment software realms,
really there. If the address is some sort ing as the best preventatives. Most com- where they’re used as copy-protection
of proxy such as “Bob,” hover the mouse panies can configure email servers to filter schemes that lurk in places Windows,
over it or check the header to make sure email that appears to come from within antivirus, and antispyware applications

68 June 2006 / www.computerpoweruser.com


spotlight

Over time the botnet efficacy degrades


as zombies are blocked, IRC servers are
disrupted, and/or the botnet is stolen.

Criminal Botnet A Botnet B Botnet C


enterprise
Initial infection Secondary infections

New zombies

Criminal enterprises use existing Over time the criminal enterprises


botnets to recruit new zombies and continue and increase attacks/spam
create completely new botnets. even as individual botnets fail.

y
IRC used to control botnet Criminal enterprise efficac
and command attacks/spam.

botnet
Botnet B Botnet C Botnet D
efficacy Botnet A

Source: MessageLabs

can’t see, and the technology is a perfect creation tools on the Internet and a very “There needs to be more emphasis at the
match for a virus that wants to stay on a active virus creation community. Only cloud level to stop this stuff,” says
system as long as possible. (See the instead of doing it for bragging rights like Sunner. “The further you get away from
“Rootkit Madness” article on page 56 scammers did in the past, now most of the source of the problem the harder and
in this issue of CPU for more informa- them are doing it for money. the more expensive it becomes to deal
tion on rootkits.) Ultimately it will take a joint effort with it.” Until then, the price of Internet
Beyond that, launching a targeted from the ISPs and the security communi- freedom is eternal vigilance. ▲
Trojan attack requires almost no technical ty to really put the squeeze on scammers
expertise thanks to readily available virus who use social engineering attacks. by Tracy Baker

Targeted Trojans From The Bad Guy’s Perspective


In the past, creating a targeted virus was a tricky, time-consuming Step 3: Prepare The Package
proposition that required a lot of technical expertise. Now everyone The scammer now crafts a spearphishing email using the informa-
is a simple Web search away from all the tools they need to turn tion he gathered, embedding the self-executing Trojan in an attach-
nearly any computer into a zombie. Here’s how it works: ment the victim will be expecting.

Step 1: Make A Virus Step 4: Special Delivery


A scammer downloads existing Trojans and then repackages The email, appearing to be from the boss, someone in IT, or another
them using a PE compression program, essentially creating an trusted source, is sent to several employees. When an employee
all-new Trojan. opens the attachment the Trojan executes in the background, using
rootkit technology to bypass and hide from antivirus and other scan-
Step 2: Do The Research ning software.
Once the virus is made, the scammer accesses the target compa-
ny’s Web site to get the names and email addresses of authority Step 5: Command & Control
figures and potential victims. He also can find out what antivirus Once the scammer installs the Trojan, anything is possible. The
products the company uses, download the latest version of that scammer can completely disable antivirus software, inject new and
software to his computer and test his new Trojan against it to improved Trojans onto the computer, or simply wait for the user to
make sure it will get through. log in to a secure account and then hijack the session. ▲

CPU / June 2006 69


ecurity is a major concern for most and user authentication/identity management software. The
power users. We keep our operating OmniPass application that’s bundled with the device encrypts
systems patched and up-to-date, use and stores passwords, and a user can then log in to whatever Web
alternate Web browsers and complex site or application that requires his password using his finger-
passwords, and never connect to the print. The device itself technically doesn’t make a PC “more
Web without using antivirus software secure,” but it does give the user the ability to more easily use
and a firewall (preferably two: one complex passwords, and because he can log in with the touch of
hardware- and one software-based). a finger, shoulder surfers will no longer be able to glance at the
But taking these steps, while necessary, keyboard and try to learn his passwords as he enters them. The
only protects the host PC from outside APC Biometric Pod Password Manager may also prevent a less
intruders and some types of malware. savvy user from having to write down password lists, which, of
What’s to stop someone in your home or small office from simply course, is a major no-no.
walking up to your PC while you step away for a coffee break and The device is very easy to install and configure. After installing
accessing or destroying important data? Unless you’re a stickler the bundled software, a user must register his fingerprints, and
about logging out or enabling your screen saver password every then the OmniPass software goes to work monitoring and storing
time you’re away from the keyboard, the answer is not much. passwords at his discretion. The user can register a single print for
Fortunately there are myriad of useful tools available that can up to 20 user accounts, or he can store up to 20 prints should
limit physical access to a PC and pre- more than one person need to log
vent unwanted interlopers from in to a system with the same user
meddling with private data. Biomet- account. We also should note that
ric devices make it much easier to we tried to defeat the APC Biometric
use long, near impenetrable pass- Pod using some of the more com-
words that’ll take forever to brute mon methods (such as not cleaning
force and log in just by typing, and our fingerprints off the Pod, putting
hardware-based encryption technolo- a warm bag of water on the sensor,
gies make accessing data without the and creating a fingerprint in Silly
right key nearly impossible for all but Putty and placing that on the sensor)
the most adept gurus. and were unsuccessful.

APC Touch Biometric Touch Biometric Pod A-Data My Flash Fingerprint


Pod Password Manager Password Manager Disk FP1 2GB
APC’s Biometric Pod Password $49 Obviously, one of the best ways
Manager is a simple way to secure APC to secure private data is to ensure
and archive numerous passwords. www.apc.com it’s inaccessible to unwanted visi-
The package contains a small USB ●●● tors. And one of the easiest ways
fingerprint scanner that uses Authen- to do this is to take it with you
Tec TruePrint Sensor technology when you’re away from your PC. A

CPU RANKING ● 0 = ABSOLUTELY WORTHLESS | ● ● ● 2.5 = ABSOLUTELY AVERAGE | ● ● ● ● ● 5 = ABSOLUTELY PERFECT

70 June 2006 / www.computerpoweruser.com


spotlight

product such as A-Data’s My Flash data on the fly in real time, it can’t read
Fingerprint Disk FP1 can store up to previously stored data.
2GB of encrypted data, yet it’s small For the most part, the PHR-250CE
enough to fit on a key chain. functions just like any other external hard
The first time the FP1 connects to a drive enclosure, but you can’t access any
Windows-based PC, a simple application of the data on the drive without first plug-
launches to run the user through the ging in one of the two included secure
process of registering his fingerprint(s). keys the device uses for authentication and
Configuration takes a few minutes and access control. The secure keys look much
entails nothing more than slowly drag- like a thumb drive, but they store the
ging a finger across the sweep-type sensor unique information the unit needs to en-
embedded into the FP1’s surface. No crypt/decrypt the data stored on its hard
additional software installation is neces- drive. In fact, without the secure keys
sary on Windows XP, although A-Data installed, an operating system won’t even
includes a disk with drivers for older ver- My Flash Fingerprint recognize the PHR-250CE when it’s
sions of Windows. Once the user has Disk FP1 2GB plugged into a suitable USB or FireWire
configured FP1, he can’t access the data $65 port. The secure keys also close the circuit
on the drive without the correct finger- A-Data necessary for the drive to function.
print; other users can’t use the disk, www.adata.com.tw The Macally PHR-250CE supports
●●●
either, unless they’ve registered their fin- both Macintosh OS- and Windows-based
gerprints or know the backup password. systems (no software installation neces-
In addition, My Flash encrypts stored sary), and you can use it with standard
data on the fly. 2.5-inch IDE hard drives (up to 9.5mm
A-Data’s My Flash Fingerprint Disk height). The unit is compact for easy
FP1 is available in capacities ranging portability, and similar to most external
from 256MB all the way up to 2GB, and enclosures, it’s hot-swappable, as well. It
it features USB 2.0 high-speed data includes two secure keys and features an
transmission. The bundled software is active LED to indicate power and data
preinstalled on the disk and includes access. The enclosure itself is made from a
data encryption/decryption capabilities, stiff metal alloy that doubles as a heatsink
Web auto login, Web favorites, file man- to keep the drive inside running coolly.
agement, and a flash-based mail client. In an attempt to access the data we
An LED on the drive flashes to show stored on the drive after configuring the
activity and the FP1 is completely hot PHR-250CE, we pulled the hard drive out
swappable. We did find that the sweep- and tried to connect it directly to one of
type sensor was somewhat finicky, but our systems. We are pleased to report that
these types of sensors are inherently PHR-250CE our system didn’t even recognize the parti-
more secure than touch sensors. $79 tion on the drive. This was a rudimentary
Macally attempt to “defeat” the PHR-250CE, but
Macally PHR-250CE rest assured that even if the device is stolen
www.macally.com
Portable flash-based drives such as the ●●●● with all of your data on the drive, without
A-Data’s My Flash Fingerprint Disk FP1 the secure keys, the average thief isn’t
are handy for securing and storing rela- going to be able to access your files.
tively small amounts of data. For users DES 40-bit encryption engine. The There are a number of other devices
who need larger capacities, though, a device automatically encrypts data on the available for encrypting and/or securing
product similar to Macally’s PHR-250CE hard drive, bit by bit, including the boot data on a PC, such as PCI-based hard
may fill the bill. The PHR-250CE is part sector. Note that the enclosure doesn’t drive controllers that encrypt data on the
of an entire family of products that can come with a drive, however, so you will fly and hardware login keys. For most
accommodate a host of drive types and have to purchase that separately. Should users though, a combination of strong
usage scenarios. The PHR-250CE is basi- you already own a suitable 2.5-inch for passwords, encrypted data, and common
cally an external 2.5-inch IEEE1394a use with the PCE-250CE, you’ll also need sense are all that are necessary to keep mis-
FireWire/USB 2.0 enclosure that features to be aware that you’ll need to repartition sion-critical or sensitive data secure. ▲
real-time, hardware-based encryption, and format it once you install the device.
powered by a NIST- and CSE-certified Because the enclosure encrypts the drive’s by Marco Chiappetta

CPU RANKING ● 0 = ABSOLUTELY WORTHLESS | ● ● ● 2.5 = ABSOLUTELY AVERAGE | ● ● ● ● ● 5 = ABSOLUTELY PERFECT

CPU / June 2006 71


loading zone
by Warren Ernst

The Bleeding
Edge Of Software
Inside The World Of Betas
SQLyog 5.01 Beta 4
f you run a Web site using a content man- SQLyog almost makes working with a data-
I agement system, you’ve likely run into
MySQL for databases and its de facto
base as fast as using a spreadsheet, which
encourages browsing in a way phpMy-
graphical management tool, phpMyAdmin. Admin never could. SQLyog is also a stand-
There’s nothing wrong with phpMyAdmin, alone app, so you won’t lose work if you
but there are times when an alternative, accidentally close your browser window.
Official product name: SQLyog such as SQLyog, may be a better choice. SQLyog does everything phpMyAdmin
Version # previewed: 5.01 Beta 4 SQLyog is a Windows-based MySQL does and more. Importing/exporting data is
Publisher: Webyog Softworks GUI that works seamlessly if you’re running easy, and wizards and a great Help file fill in
Developer and URL: Webyog Softworks; it and MySQL’s Windows version on the the gaps. The Enterprise version ($47) gives
www.webyog.com/sqlyog/index same rig. Almost as good is running SQLyog you access to timed backups and automatic
_sqlyogfree.php on the same LAN so you only need to open transfers/synchronizations between two or
ETA: Q2 2006 a (somewhat-insecure) remote MySQL port more MySQL databases (even over the
Why you should care: Perhaps the fastest to local IP addresses. You can also install a Internet). The Pro ($9) and Free versions
Windows GUI for managing PHP stub file on your Web server and use are identical, except the Free version has
MySQL databases. SQLyog remotely without network risks. pop-ups ads for the Enterprise version.
The main benefit of running SQLyog The beta was extremely solid and reflect-
locally is speed. Running SQL commands ed a mature product going through regular
has never been faster, as the running History development. If you run databases locally,
pane proves—we’re talking milliseconds. check SQLyog out. ▲

NewsLeecher 3.5 Beta 7


ultimedia files just keep getting larger, maximize your bandwidth by overlapping
M so downloading a batch of such files
via Usenet naturally requires some sort of
file negotiations, and real-time bandwidth
throttling helps let you use the Internet for
automation. Scads of apps will do the job, other tasks while you’re downloading.
but with varying degrees of reliability, ease NL’s real-time filters can do such things
of use, and price. NewsLeecher is a relative as whittle down a listing with thousands
newcomer, but the binary leecher is general- of files to just the relevant ones. A Super Official product name: NewsLeecher
ly regarded as the best in its class. This beta Search function lets you find and seamlessly Version # previewed: 3.5 Beta 7
betters an already good thing. download files stored in newsgroups you Publisher: The NewsLeecher Group
NL mixes a slick UI with a complete fea- don’t subscribe to. Super Search requires a Developer and URL: The NewsLeecher
ture-set, speed, and reliability—a combo $2.95-a-month fee, but that’s cheaper than Group; www.newsleecher.com
sorely lacking in this segment. The app lets most online newsgroup’s search sites, and ETA: Q2 2006
you download files from multiple Usenet there’s no need to manually download link Why you should care: The best binary Usenet
servers based on server rankings you set at files, import them into your newsreader, downloader, bar none.
config time. This lets you maximize band- and acquire the files yourself.
width limitations on paid servers. Multiple NL is pricey at $30, but there’s a 30-day beta was slightly buggy in my testing, but
download threads from the same server satisfaction guarantee for paid users. The rapid updates are shrinking that bug list. ▲

72 June 2006 / www.computerpoweruser.com


software | upgrades

Driver Bay
Creative Sound Blaster Audigy 2 ZS
Video Editor 1.00.0050
This update of the installation disc
drivers repairs DVD-Audio playback on
AMD 64-bit dual-core systems and audio
disturbances on all dual-core systems.
Most updates this month are iterative rather than substantial, but Get it at: www.creative.com
Firefoxers finally get their new Google Toolbar. On the driver side, the
DirectX 9.0 Update
cool LCD on the Logitech G15 game keyboard learns new tricks, and
DirectX claims improvements in graphics,
GeForce 6/7 owners get better hi-def decoding.
performance, and security with this update.
Get it at: www.microsoft.com
Upgrades locating and logons and resolved issues
with some third-party apps, including Logitech G15 Gaming Keyboard 1.02.218
AOL AIM Triton 1.2.37.2 Beta World of Warcraft. New drivers for the keyboard with its
The enhanced, tab-driven IM client now Get it at: www.apple.com own LCD let you modify the LCD, move
has drag-and-drop photo sharing, alerts across applets faster, and more.
when a Buddy updates her profile, and Opera for Mac OS X\Linux\FreeBSD 9.0 Beta Get it at: www.logitech.com
one-click access to her profile from within This preview for Opera’s next-gen brows-
the IM interface. er gets similar changes across three non- Netgear WPN824v2 Firmware 1.0.19
Get it at: www.aim.com Windows platforms, including fixes for This upgrade turns on DoS protection,
memory leaks, widget problems, Gmail provides CHAP support for PPTP, fixes a
Avant Browser 10.2 Build 39 attachments, and the content blocker. DDNS issue, and lets Unicast and multi-
This build of the customized version of The Mac OS X update is Build 3312; the cast traffic work more efficiently together.
IE, which features tabbed browsing and Linux\FreeBSD versions are Build 206. Get it at: www.netgear.com
good privacy features, includes improved Get it at: www.opera.com
tab navigation and pop-up blocking, mul- Nvidia ForceWare 84.21
timonitor support, and improved speed Portable Firefox These WHQL drivers add support for
and page scrolling. This Firefox version, which updates the recent Nvidia cards and Nvidia SLI support
Get it at: www.avantbrowser.com browser to the 1.5.01 build, is optimized for mixed vendors. PureVideo gets support
for portable devices or a CD, so you can for H.254 decompression on GeForce 6/7
Google Firefox Toolbar Version 2.0 launch your personalized browser with cards, HD MPEG-2 inverse telecine, and
The Firefox version of Google’s Toolbar bookmarks and extensions from any PC. spatial temporal deinterlacing.
gets some of the same additions that Get it at: www.portableapps.com Get it at: www.nvidia.com
Google recently added for IE users,
including an enhanced search box, The Bat! Professional 3.72.08 Beta Realtek AC’97 ALC650 A3.85
antiphishing routines, and the ability to Recent updates for the alternative email This update for mobos with onboard
subscribe to RSS feeds from the toolbar. client include fixes for problems with Realtek audio updates the Realtek 3D
Get it at: www.google.com scheduled actions and Watch And Send engine and some customized settings, plus
commands. Attachment sizes are also now fixes a Fujitsu power-management issue.
iTunes 6.0.4 exact rather than estimated. Get it at: www.realtek.com.tw
iTunes gets stability and performance Get it at: www.ritlabs.com
tweaks in this incremental refresh. Saitek Game Peripherals
Get it at: www.apple.com WinRAR 3.60 Beta 1 Saitek game controller models for stan-
WinRAR gets significant improvements, dard Windows and 64-bit WinXP systems
Mac OS X 10.4.6 including enhanced performance for dual- get driver updates. Cyborg devices, the
Versions of this update are available for core processors and HyperThreading Pro Gamer Command Unit, gamepads,
PowerPCs and newer Intel-based Macs. CPUs, more flexibility for the tree naviga- X45/52 flight controllers, and the gaming
Included is support for a broader range tion interface, the ability to now rename keyboard get respective driver updates.
of devices for iSync 2.2 for synchroniz- Zip files, and more extraction options for Get it at: www.saitekusa.com
ing PDAs and cell phones to the OS. faster post-decompression clean-up.
There’s also improved wireless network Get it at: www.rarlab.com by Steve Smith

CPU / June 2006 73


reviews | software

XP, you can even play music on a sys-

Jukebox Shootout tem with another OS.)


The iTunes Music Store is a nicely
integrated part of the application, let-
Six Music Managers For Your Listening Pleasure ting you choose from myriad individ-
ual tracks for 99 cents each or entire
albums usually for $9.99. I like the
Music Store, but I love that you can
here music is concerned, many hate to use. In fact, there are plenty of turn it off—a gracious feature lacking in

W of us take for granted a combi-


nation of technologies that
have only been around a relatively short
reasons to use it as your PC media man-
ager, even if you don’t own an iPod. The
interface is sleek and fast, and you can
many other applications with music stores.
The Mini-store, which offers up new
music selections that match what you’re
time. We now have personal archives of find the song or playlist that you want on currently listening to, is disabled by
digital music with thousands of ultra- a moment’s notice, even with a huge default. You can eliminate access to the
high-quality songs and the ability to music library. store entirely via the Preferences window.
download almost any song imaginable for As a music manager, iTunes excels. If Naturally, iTunes and an iPod go hand-
under a $1 and make that music collection you want to find a particular song or all in-hand, and iTunes delivers utilitarian
available throughout the home or take it the songs by a particular artist in your col- features for iPod users. iTunes does work
with us when we’re away. lection, type a few letters in the Search with a handful of other portable players,
Many pieces work together to make all field, and your collection is filtered instant- including Nomad and Rio, but not nearly
of this possible, including a big hard drive, ly. Smart Playlists will automatically play as many as WMP and RealPlayer do.
home network, and portable music player, your favorite songs, the ones most recently (DRM-protected songs from the iTunes
but music manager software is the glue added, tunes from a certain era, songs you Music Store won’t work with those third-
that holds it all together. Think of it as a haven’t heard lately, or songs based on party players.) If you’re married to another
jukebox that lets you organize and expand whatever other criteria you can dream up. portable player, chances aren’t great that
your music collection. These apps can also iTunes includes great support for free iTunes will work with it.
introduce you to new music and let you online content. The app can check RSS
buy music online. Many apps incorporate feeds for podcasts and download them Microsoft Windows
video, too, letting you watch television automatically. Additionally, it can play Media Player 10
programs, news, and other content. some types of streaming radio stations, WinXP users who
I looked at six popular media players. and it comes preloaded with a fair-sized are in need of a new
The one that’s right for you will depend list of stations organized by genre.
on the features you want, its compatibility You can rip CDs using MP3, AAC,
with your portable music player, and the Apple’s Lossless Encoder, and other
price you’re willing to pay. Unfortunately, codecs. You can also add support for Ogg
another important factor is your tolerance Vorbis via a plug-in. If you have iTunes
level for advertising, as some jukebox pro- installed on more than one computer on
grams use their screen real estate as an your network, you can play songs stored
unbridled opportunity to bombard you on other computers, creating a centralized
with ads for everything from software music server, or just spy on your co-work-
upgrades to medication. ers’ musical tastes. (Because iTunes is
available for Mac OS X and Windows
Apple iTunes 6
iTunes ships with the iPod,
but it isn’t one of those barely
functional bundled utilities you

iTunes 6
Free
Apple
www.apple.com/itunes
●●●●●

CPU RANKING ● 0 = ABSOLUTELY WORTHLESS | ● ● ● 2.5 = ABSOLUTELY AVERAGE | ● ● ● ● ● 5 = ABSOLUTELY PERFECT

74 June 2006 / www.computerpoweruser.com


reviews | software

music manager might be tempted to reach Microsoft is all about DRM, so WMP
for Windows Media Player 10. After all, it’s is wrapped up in layers of DRM that fre-
free and familiar; you already have an older quently get in the way. The default for-
version preinstalled with WinXP. mat for ripping CDs is Windows Media
The features are certainly here. You can Audio, and the only alternative is MP3,
listen to music in most file formats, rip songs and you get the feeling Microsoft pro-
from CD, and burn songs to CD. You can vides that only grudgingly. MP3 is listed
browse your music library by genre, year, in the Rip Settings menu in lowercase
artist, and rating and enjoy various visualiza- below three flavors of WMA, and there’s
tions while you listen. You can even watch no ability to encode MP3s at 160Kbps.
music videos and tune into Internet radio Encoding for Ogg Vorbis and other file
stations. WMP10 can synch your music formats are conspicuously missing from
with about 70 models of portable music the ripping options, but you can acquire
players, smartphones, and Windows-based some with plug-ins.
PDAs, but it doesn’t support the iPod. If you don’t have a towering stack of
WMP10 does it all, but it isn’t particu- CDs to rip, WMP10 offers many choices Windows Media Player 10
larly satisfying to use. The interface is overly to keep you entertained. There’s a built-in Free
cluttered with layers of tabs and several music store where you can buy single Microsoft
browsing environments. Advertisements, tracks, usually for 99 cents each, or entire www.microsoft.com/windows
upsell attempts, and pop-up warnings about albums for about $9 and up. You can also /windowsmedia/mp10
digital rights management often interject choose the Radio Plus service, which ●●●
themselves. Additionally, the UI is overdone offers unlimited ad-free music for $30 a
with several Web-like browsing environ- year. You’re not even limited to those two
ments. There’s one under the Guide tab, a options. WMP can play a bevy of differ- With the click of a button, you can
music shopping site under the Music tab, ent protected file formats, including from easily convert audio files between MP3,
and another for music videos under Napster, MusicMatch, and others (pro- WMA, Ogg Vorbis, and WAV formats.
the Video tab. The clutter is vided you have the proper licenses, of You can convert DVD audio to any of
confusing and unnecessary, course). The program also provides access those formats, as well as rip CDs. You can
with offers to buy stuff to free streaming radio stations and a use the DVD sound ripping to extract a
seemingly everywhere. selection of music videos. My enjoyment favorite song or audio track from a movie
of both was often preceded by annoying disc, although the process happens in real
video advertisements, however. time, so it can take a while. The program
WMP10 continually treats you like a also does video conversion between AVI,
consumer (and not a particularly trust- MPEG, and MPEG formats. With batch
worthy one, at that), making it difficult to processing, you can do multiple conver-
just sit back and enjoy the music. sions in one fell swoop.
Blaze also includes a waveform audio
Mystik Media Blaze Media Pro 6.1 editor, which is handy for removing a
Blaze Media Pro tackles a different
angle than the other programs here. It
doesn’t do as much in terms of managing
your music collection, but what it brings
to the party are plenty of tools for con-
verting, editing, and playing audio/video
files. The program is $50 after a free
two-week trial.
Blaze plays a multitude of A/V formats.
Audio coverage includes any format you’d
care to use, and the video formats include
AVI, several MPEG flavors, and WMV. Blaze Media Pro 6.1
As a media player, Blaze does a great job $50
with its sleek interface and intuitive con- Mystik Media
trols. Blaze’s real power, however, is in its www.blazemp.com
format-conversion and editing features. ●●●●

CPU RANKING ● 0 = ABSOLUTELY WORTHLESS | ● ● ● 2.5 = ABSOLUTELY AVERAGE | ● ● ● ● ● 5 = ABSOLUTELY PERFECT

CPU / June 2006 75


reviews | software

microphone, phonograph, or streaming to MP3 (although it can rip to AAC,


audio source. A timer lets you record aacPlus, and WMA), and it burns CDs at a
online radio programs when you’re away. maximum speed of 2X. A $19.95 Pro ver-
Blaze Media is probably best for users sion solves both issues. There’s also a
who already have stacks of audio CDs to stripped-down Lite version that serves as a
convert or a directory full of music files. basic MP3/AAC player with virtually no
Aside from tools for capturing audio, it other features. It’s free and only a 1MB
doesn’t provide much in the way of getting download, but the Full version does much
new music; there’s no integrated music store more, and at 5.5MB it’s far from bloatware.
or built-in support for streaming radio. The default interface is svelte and
Winamp 5.21 Although the media manager lets you create unobtrusive, and its clean look is a wel-
Free; $19.95, Pro version and save playlists, it’s rather sparse com- come departure from the full-screen envi-
Nullsoft pared to programs such as iTunes and ronments other music software delivers.
www.winamp.com WMP. Blaze Media can’t quickly sift On the downside, Winamp’s basic UI can
●●●●● through your music collection to show be difficult to decipher with its tiny, poor-
music by a particular artist, for example. ly labeled buttons. You can download free
Blaze Media Pro works with Windows skins to change the interface, however.
98 SE/Me/2000/XP, and according to the The media library is the core of the pro-
company, version 7 should be available as gram. Here you can browse your music col-
you read this. That version will include an lection in various ways, including seeking
updated video DVD burner feature, out the newest, most-played, or favorite
improved capture of long audio recordings tunes, for example. Many features here are
with automatic track splitting, and the similar to those in iTunes, such as Smart
ability to convert video formats to Flash. Views, which let you build custom playlists
based on any combination of criteria.
Nullsoft Winamp 5.21 Even if you don’t have any music files
RealPlayer 10.5 Winamp is a long-time favorite or own a single CD, you can groove right
Free; $19.99, Plus version among enthusiasts; it’s small, stable, and away thanks to oodles of free streaming
Real Networks reliable. Despite AOL having purchased content. ShoutCast Radio delivers thou-
www.real.com Winamp, the player manages not to be sands of online radio stations in every con-
●● offensively commercial. ceivable genre, and AOL Radio provides
Winamp is available in three versions. content from XM Satellite Radio. There’s
lengthy song intro or amplifying a quiet The free Full version is quite adequate as a video streaming, too, as the ShoutCast TV
segment, for instance. The editor is about music player and media manager, provid- feature provides instant access to all man-
on par with the open-source Audacity, ing CD burning, synching with portable ner of television shows, while AOL Videos
but it’s convenient to have all the audio devices (including the iPod), and access to lets you watch content from CNN, come-
tools under one umbrella. You can also free streaming online radio. There are two dy videos, and more. Winamp also has
use the editor to capture audio from a major limitations, though; it can’t rip CDs excellent support for podcasts; you can
browse through hundreds of podcasts,
subscribe to your favorite feeds to listen
Let The Music Do The Talking online, or download them.
Like every other software category, there’s the cream of the crop and the also-rans in the With easy access to streaming content,
media-manager segment. All but one of these apps offers a free version, so check them out. podcasts, and free MP3s at Winamp.com,
Here’s a brief look at how these six jukeboxes match up.

OSes Supported iPod Support Access To Free Content Advertising


Blaze Media Pro 6.1 Windows 98/Me/2000/XP No None None
iTunes 6 WinXP, Mac OS X Yes Podcasts, streaming radio directory Low (can be disabled)
MusicMatch Jukebox 10 WinXP No None Moderate
RealPlayer 10.5 Win98/Me/2000/XP;
Mac OS X; Linux Yes None Very high
Winamp 5.21 Win98/Me/2000/XP Yes Podcasts, streaming audio
and video directories Low
Windows Media Player 10 WinXP Yes Streaming audio directory High

CPU RANKING ● 0 = ABSOLUTELY WORTHLESS | ● ● ● 2.5 = ABSOLUTELY AVERAGE | ● ● ● ● ● 5 = ABSOLUTELY PERFECT

76 June 2006 / www.computerpoweruser.com


reviews | software

Winamp delivers a satisfying combination


of apps and free content. The Best Music Player For Linux?
eed an audio player for your Linux box? Chances are you already have XMMS. It
Real Networks RealPlayer 10.5
RealPlayer’s over-the-top advertising was
N comes preinstalled with many distributions and is a perfectly serviceable media
player. But for a complete, integrated
so offensive it would have worn out its wel-
music-management tool, nothing can beat
come on my PC in three minutes had I not
amaroK (amarok.kde.org). amaroK, which
been writing this review. The quantity and
requires the KDE desktop environment,
type of ads make WMP seem serene by
provides a 10-band equalizer, automatic
comparison. RealPlayer bombs you with
download of cover art and lyrics, and other
pop-up ads, audio/video ads that appear
cool features for music lovers. There’s also
unbidden, and more. I counted a dozen ads
support for the iPod (as well as many other
on the main Real Guide page alone.
portable players) and podcasts. Oh, and
The program handles most audio and
the “super eye-candy interface” is fun, too.
video formats, as well as video. The soft-
ware is available in a free basic version and
$19.99 RealPlayer Plus version. The free primary purpose seemingly being to deliver for, and the app will populate the rest of
version is so crippled it’s almost unusable, an onslaught of video ads. I’d rather listen the playlist with related artists.
which is maddening because you know to tunes on an old 8-track than deal with Like RealPlayer and WMP, there are
the missing features are in there if you pay this offensive software another minute. several ways to add to your music library.
for the Plus version or SuperPass. A music store offers most tracks for 99
The Plus version adds higher-quality Yahoo! MusicMatch Jukebox 10 cents and albums for $8.49. Another level
audio and video, 90 ad-free radio stations, MusicMatch Jukebox 10 is a well- of service, MusicMatch On Demand,
a 10-band graphic equalizer, additional rounded program that can organize your provides access to 900,000 songs for
CD burning features, and other gizmos. music, rip and burn CDs, and synch with $59.88 a year or $4.99 per month. (The
You can also opt for the SuperPass, which many portable music players. Like many songs are only available while you remain
costs an additional $12.99 per month of the other players, Jukebox is available in a subscriber.) Unlike RealPlayer and
(after a 14-day trail). If you’re willing to free and paid versions. The $19.99 Plus WMP, MusicMatch is tolerable if you
pay that monthly dosh, RealPlayer’s con- version lets you rip and burn CDs more don’t want to upgrade the service. There
tent shines. You’ll get access to videos quickly than the free version, print CD are occasional exhortations to upgrade,
from iFilm, music downloads, news and labels and inserts, and record MP3s from but they don’t reach the level of frantic
sports from BBC and Sporting News, and your LPs or other outside audio sources. desperation of those other programs.
more. SuperPass also enables RealPlayer Either way, one of MusicMatch’s coolest A few features are missing in Music-
with all the features RealPlayer Plus adds. features is AutoDJ, which puts other play- Match 10, notably because they were in
There’s also the optional RealArcade, ers’ shuffle functions to shame. AutoDJ can version 9. Access to free streaming radio
which provides access to 300 download- mix up your music based on genre, tempo, stations seems to have disappeared in favor
able games. You don’t own that content, and other criteria, so the mood won’t jump of the On Demand service. Handy access
though. Let your subscription lapse, and from Paul Anka to Metallica. You can also to any artist’s discography, bio, and other
your access to most of the songs, games, drag in a couple songs you’re in the mood information has similarly vanished.
and videos will vanish. Yahoo! owns MusicMatch, in addition
Did I mention the ads? The program is to offering Yahoo! Music Unlimited
relentless. When you boot up your com- (music.yahoo.com/unlimited). A Yahoo!
puter, even before you’ve launched any spokesperson called the overlap between
programs, RealPlayer accosts you with Unlimited and MusicMatch “confusing”
pop-ups about new content it thinks you and says the two will be rolled into a sin-
might want to see. gle product later this year. It’s not
Like WMP and iTunes, there’s a music known, however, what the new music
store (songs start at 49 cents) and the ability product will be called. While we don’t
to rip and burn CDs and sync music with a know what the future holds, Music-
wide variety of portable players (including MusicMatch Jukebox 10 Match Jukebox is for now a strong choice
the iPod). But I wouldn’t bother. There’s Free; $19.99, Plus version for users who want access to a variety of
nothing wrong with a company charging Yahoo! online content. ▲
for content, but there is something wrong www.musicmatch.com
with giving away “free” software with the ●●● by Kevin Savetz

CPU RANKING ● 0 = ABSOLUTELY WORTHLESS | ● ● ● 2.5 = ABSOLUTELY AVERAGE | ● ● ● ● ● 5 = ABSOLUTELY PERFECT

CPU / June 2006 77


reviews | software

by Warren Ernst

CyberLink PowerDirector 5
etting a right mix of power, and nearly instantaneous. Video captures from a
G ease, speed, and price in a
video-authoring app can be tough, but
DV camera seemed to go directly to MPEGs
without a second transcoding pass. Editing
PowerDirector 5 manages well. The videos, adding special effects and filters, and
app quickly captures video from ana- recording a voice-over in real time was lag-free.
log and digital sources, converts video Even DVD burning seemed to occur without
and audio files for nearly all formats, extra transcoding passes.
makes editing and applying filters The app’s GUI and speed encourages you to
quick, and exports DVDs or video experiment. For example, I tested an anti-jitter
files with full menus with amazing filter on a scene with considerable motion and a
speed. With a speedy rig, PD5 almost wind-noise eliminator on a scene of a couple’s
PowerDirector 5 makes working on a video project a pleasure. wedding vows spoken on a wind-swept beach.
$89.95 PD5 can perform all the tasks needed to create This worked in seconds, and the results were
CyberLink a polished video or DVD from various sources. A usually spectacular. PD5’s various Magic tools
www.cyberlink.com slick GUI makes each step fairly intuitive, as the add perfectly timed background music, clean up
tools and buttons are laid out in such a way that red-eye, cut long clips to short ones, and more.
●●●●●
you’re guided to click each in the proper order. This version adds Magic Style, which adds one of
Perhaps PD5’s only flaw is that some buttons 12 preset styles to a project, and Magic Fix,
aren’t visible when the app isn’t maximized. which automatically touches up videos/photos.
PD5 seemed well-optimized and blazingly fast If you’re used to video projects taking forever
on a 3GHz P4 rig with lots of memory and drive and not being fun, you owe it to yourself and
space. Applying effects was drag-and-drop easy your videos to give PowerDirector 5 a try. ▲

Techsmith SnagIt 8
ver wonder why you see In addition to standard Full Screen and Active
E so many reviews of screen-
capturing software? It’s because
Window captures, SnagIt has some unusual and
unique capture routines. The program can auto-
such software is a standard tool in matically scroll a window and capture all the
a software reviewer’s arsenal, and it window’s content in one long file—no cutting
gets used almost every day. For and pasting required. SnagIt can also save screen
more typical users, spending signif- shots of Web pages while maintaining the page’s
icant money on a tool you use only hypertext links (provided you save the capture as
occasionally to take a screen shot a PDF, Flash/SWF, or MHTML file; SnagIt lets
may not make much sense. But you save captures in as many as 29 file formats).
then there’s SnagIt 8, which makes SnagIt can also capture screen shots of printouts
getting jaw-dropping screen cap- via a customized printer driver, capture all graph-
SnagIt 8 tures so easy, including captures of animated ics from a Web page, and capture editable text
$39.95 movies or captures with active hypertext links. from virtually any screen.
Techsmith After using SnagIt you’ll likely never look at Once the program captures content, there’s a
www.techsmith.com screen-capturing software the same way. wealth of editing and markup tools available,
SnagIt 8 features a totally revamped graphi- including arrows, callouts, watermarks, perspec-
●●●●●
cal interface, which should make the app more tive shifts, standard cropping, and color manip-
accessible to casual users. The program’s various ulation. All edits are nondestructive, so you can
types of captures are now listed as icons in the reuse screens to point out different items.
main program window, with various cartoon SnagIt is as close to perfect as screen-capture
speech bubbles appearing over the buttons, software can be, and its unique feature set may
icons, and windows when you click to complete generate new users who otherwise may have
a task; it’s tough to get lost with SnagIt 8. thought such software a luxury. ▲

CPU RANKING ● 0 = ABSOLUTELY WORTHLESS | ● ● ● 2.5 = ABSOLUTELY AVERAGE | ● ● ● ● ● 5 = ABSOLUTELY PERFECT

78 June 2006 / www.computerpoweruser.com


reviews | software

by Wallace Wang

Celedy Software CeledyDraw 2


he best way to describe Celedy- resize graphic images, but CeledyDraw lets you
T Draw 2 may be to say that it com-
bines features of desktop publishing
draw your own using the Freeform, Bezier Curves,
and Polygon drawing tools. If you add a graphic
and drawing programs into one app. image from the app’s library or draw your own
Take features from Microsoft Publisher image using the drawing tools, you can reshape
and Adobe Illustrator’s basic drawing the image later.
features, and you have CeledyDraw 2. Cramming desktop publishing and drawing
As a desktop publisher, CeledyDraw tools into the same window doesn’t exactly make
2 organizes text and graphics on a page CeledyDraw 2 intuitive. Most programs have an
and offers such basic features as wrap- Insert menu to add a new object, but Celedy-
ping text around graphics, linking text Draw forces you to use the View menu. For
CeledyDraw 2 between separate text boxes, and adjusting text example, to add a new page, you must click View,
$64.99 spacing through leading and kerning. The app is Page, and Add Page. To insert a graphic you click
Celedy Software limited, though, in its ability to handle text from Edit and then Insert Graphic Symbol.
www.celedy.com other programs. For example, you can’t import a The app is geared primarily at home and
Word doc directly; you can only import text files, small-business users, but it can export EPS files
●●●
meaning you’ll lose your current formatting. You (plus JPEG, BMP, PNG, PDF, and more), so
also can’t copy text from another program and you can import CeledyDraw files into such pro-
paste it into a CeledyDraw 2 text box. grams as Adobe InDesign. CeledyDraw is a solid
On the graphics side, the app shines with its app for personal and small-business uses, and its
huge library of graphics and multiple drawing low cost and combination of desktop publishing
tools. Most similar apps only let you arrange and and drawing tools make it appealing. ▲

HumanConcepts OrgPlus 6
rgPlus 6 is sure to intrigue OrgPlus lets you apply various colors and
O any company head looking
to visually display the employee
designs to charts, plus there’s a search function
(with included data mining abilities) and
hierarchy of her corporation. Sure Freeform tool and the ability to combine charts
you can create such charts using from different departments into one master
pencil and paper or any drawing chart. You can also create legends and Hotspots
app, but OrgPlus makes creating, within boxes to dynamically display employee
editing, and working with such profiles (including displaying photos) when a
charts much faster and simpler. mouse cursor passes over the Hotspot. You can
OrgPlus’ charts start with a sin- also rearrange chart items, so if you can move
gle box in which you type a name a box to a different location, OrgPlus can
and job title. You can then add automatically move all subordinate boxes in the
OrgPlus 6 boxes for more jobs, which will appear as being chart with it. This lets you see how a company’s
$189.95 (Standard); $295 (Pro) linked from the top, bottom, or sides to existing balance of power might shift if the vice president
HumanConcepts boxes. Creating boxes and typing names/titles of marketing is promoted or demoted. Addi-
www.orgplus.com multiple times gets tedious for even small charts, tionally, you can share charts by printing them
though. To that end, you can enter names and as Word, PDF, or PowerPoint files, and a free
●●●●
titles in a text or Excel file, identifying each browser plug-in will let others view charts via a
person with a number and the number of people Web browser.
he reports to. OrgPlus can then automatically OrgPlus 6 makes creating and updating even
create an organizational chart. For example, John fairly complex organizational charts easy and
Smith will appear at top with Joe Smith shown actually fun. With such a specialized focus and
reporting to him, followed by Jim Smith report- hefty price tag, however, the app is definitely
ing to Joe Smith and John Smith, and so on. geared more to corporations. ▲

CPU RANKING ● 0 = ABSOLUTELY WORTHLESS | ● ● ● 2.5 = ABSOLUTELY AVERAGE | ● ● ● ● ● 5 = ABSOLUTELY PERFECT

CPU / June 2006 79


Dialogue Box

Googlefasting
C ould you live without Google for an
hour? Could you make it a day? Could
being more emotional than empirical with my
reporting. It didn’t take but a day for people
you survive a week? I did. In fact, I pulled to ask for more complete thoughts, detailed
myself through two weeks without using the explanations as to my methodology (not nec-
search juggernaut just to prove I could. Some essarily my madness).
called me insane; some called me Maurice; but I immediately fell back to Yahoo!, as it was
I did it like the Space Cowboy I am. I braved the closest thing to Google I could find. After
the challenge for the sake of delivering you the a few days, I realized I was treating Yahoo! like
cold, hard facts. Plus, it made for some hellish a Google surrogate—like comparing a new
blog entries. girlfriend to an ex (a mistake you should only
Quitting Google was almost as bad as quit- make once in your life). I found Yahoo! quite
ting coffee. Google seems to release a new comfortable, but I couldn’t help but feel like I
service or piece of software every couple of was cheating on Google. It was time to pull
weeks. It owns nearly half the search engine away from the Google mindset entirely, to
market, and it’s well on its way to owning your push myself into using “other” search engines. Chris Pirillo has his own
Desktop, too. Don’t believe me? The Google Yes, other search engines besides Google do metasearch service, which is fully
faithful use Google Talk alongside Google still exist! accessible from Web browsers on
Desktop while browsing with the Google Repeatedly, I would get frustrated with not the Desktop or your favorite
Toolbar in IE or Firefox. They send messages being able to find what I was searching for. I mobile device. Gada.be is where
via Gmail while watching their Google Page- attributed this to being in tune to how Google you can start. And if you want to
Rank grow and shrink, check their Google indexes content and how I had learned to opti- find Chris on the Web, you don’t
AdSense stats every other minute while blog- mize my searching strategies for how Google have to look very far, just enter
ging on Blogger.com, upload Web sites on works. Most annoying was when I was seeking “Chris” into a Google search box
Google Pages while testing the latest beta of for Web pages I knew were at the top of and press the I’m Feeling Lucky
Google Web Accelerator, and load their Google Google’s results but were no where to be found button. Chris doesn’t believe in
Analytics charts while using Picasa to organize in the top 50 of other search engines. Bah! polygamy, which makes sense
photos in the background. Not to mention I regularly flipped between Yahoo!, when you understand that his
searching on Google.com every other minute! Gada.be, Technorati, Feedster, Ask, MSN, impending faux marriage
What happens if (and when) Google and IceRocket. None filled the void Google proposal to Google would be
gets bigger? left. Still, as the first week wore on, I realized I trumped by his existing plans to
I dared myself to go “googlefasting.” I was could live without Google. I upped my per- marry his soul mate, Latthanapon
not trying to make a political statement or sonal challenge to another week, and it really Indharasophang. They met
force Google’s stock price to plummet. When wasn’t that difficult to do. I think it was online, but not through Google.
I started, “googlefasting” didn’t show up in around day 10 that I made the mental switch:
any search engine, Google included. When I Living without Google is quite possible.
reached the end of the first seven days, Google I have an emotional attachment to Google,
reportedly had more than 50,000 references of but it’s no longer blind faith (like yours, most
“googlefasting.” In fact, if you want to experi- likely). There’s a reason Google is on top; it I dared myself to go
ence my whole experiment from top to bot- works and works quite well. Google didn’t pay
tom, search for it yourself. By now, most me to do this, nor did the other search engines. “googlefasting.” I
search engines should have the entire chroni- I don’t recommend you try this at home—or
cle well indexed. at work, for that matter. If you’re someone wasn’t trying to
Since I don’t use Google’s software (largely who searches with Google constantly, I bet you
because it’s designed quite poorly), I decided couldn’t last a single day without it. make a political
to focus my fast on what most people use After sending two dozen roses and a box
Google for: searching. The first few hours of chocolates to its offices, Google and I are statement or force
were truly the toughest. I was biting my teeth once again dating. It’s too early to talk about
and ruing the moment I believed I could do it, wedding bells yet; let’s just say I’ll know Google’s stock
and for no good reason other than to prove I where and how to find a ring online when
could. I lashed out at everything around me, the time comes. ▲ price to plummet.
You can dialogue with Chris at chris@cpumag.com.

80 June 2006 / www.computerpoweruser.com


Open Sauce

Eight Stories About


Open-Source Software
T hisopenmonth, eight random quickies about
source. 4 Ifestyouusers,thinkthinkDRM has no impact on hon-
again. CNET’s James Kim
reported in “The truth about battery life”
I love lists of links to free books on the Web. (reviews.cnet.com/4520-6450_7-6462771-1
1 This one, akaimbatman.intelligentblogger .html) that users foot the bill for increased pro-
.com/wordpress/archives/17, is from Intelligent- cessing in the form of shortened battery life.
Blogger.com on the low quality and high price Kim wrote, “Heavy DRM not only slows down
of today’s tech books. What’s cool here are the an MP3 player but also sucks the very life out of
quickie reviews offered on the free books listed, them.” WMA tracks can drain batteries as much
so you can build your own free library of pro- as 25% faster than non-DRMed MP3 tracks.
gramming titles. There are links to Baen’s free
sci-fi collections and the obligatory Project
Gutenberg link at gutenberg.org. Also take a 5What makes the “Recovery is Possible!” res-
cue distro (www.tux.org/pub/people/kent-
Pete Loshin, former technical
editor of software reviews for
squint at IntelligentBlogger.com’s blog for useful robotti/looplinux/rip) special is that it can boot Byte Magazine (print ver-
tech commentaries and overviews. crashed Windows or *nix systems from CD/ sion), consults and writes
DVD or from a memory stick. You can resize about computing and the

2 Will I finally be able to get the Function


keys on my Microsoft keyboard to do
or recover Windows and *nix disk partitions,
change passwords on WinNT/XP systems (for
Internet. He also runs
www.linuxcookbook.com. He
something in Linux? Could be. I found and when you forget the password, of course), and owns shares of both Microsoft
installed KeyTouch (keytouch.sourceforge.net). even boot from DOS or Win95/98. Another and Red Hat and believes
After a few months of use, my MS wireless key- handy open-source tool for all sysadmins. that Windows isn't for every-
board was ready for the junk pile, replaced by one, but neither is Linux.
the latest USB-wired Microsoft Natural Ergo-
nomic 4000. KeyTouch doesn’t come with a 6 CodeCoffee.com is another random Linux
link I stumbled across recently, filled with
config file for that model, but what it had was helpful tutorial goodness covering basic *nix
close enough to get at least some of the “special” command-line stuff, as well as PHP, SQL,
buttons to work. There’s even a graphical con- JavaScript, Bash programming, and much more. What’s cool here
figuration editor that, sadly, doesn’t do USB
keyboards. With some spare time, I could map are the quickie
the signals manually and build my own configu- 7 The Internet FAQ Archives (www.faqs.org
/faqs) has been around forever, but it’s
ration file. Until then, I’ll manage OK. worth mentioning again for the newbs. And if
you’re interested in *nix, check out Eric Ray-
reviews offered

3 Issue Dealer (issuedealer.com), another


Web app for managing data, is based on
mond’s “The Art of Unix Programming” (www
.faqs.org/docs/artu). Chapter 1, “Philosophy,” is on the free
Zope (www.zope.org) and is kind of neat. Nor- particularly useful.
wegian project sponsor Nidelven IT (www books listed, so
.nidelven-it.no) takes a refreshingly minimalist Brand-name Linux systems may be scarcer
and straightforward approach to its Web site, 8 than hen’s teeth at retail, but HP not only you can build
demo, and documentation. Nidelven hopes to sells servers with Linux but also offers the free
profit from Issue Dealer by offering hosting ser- TestDrive app (www.testdrive.hp.com). Regi-
vices. A demo server is available at demos.issue- strants get free shell accounts of their choice of a
your own free
dealer.net; you’ll want to spend some time fig- variety-pack of HP hardware running various
uring out how to use it before you invest even flavors of Linux and BSD, as well as HP’s own library of pro-
more time installing it on your own server. If HP-UX, Tru64 Unix, and OpenVMS. Not
you like it but don’t want the hassle of installing really for end users, but developers can use gramming titles.
and administering it, go ahead and have Nidel- TestDrive to audition HP servers for Oracle,
ven host it for you. C/C++, Fortran, or Java apps. ▲

You can get saucy with Pete at pete@cpumag.com.

CPU / June 2006 81


caught in the web

Web 2.0
What’s Behind It, Anyway?

mong the thousands of buzz- Warner’s Pathfinder.com)

A words that, well, buzz around the


digital cosmos, one has emerged
in recent months as a genuine touchstone
in the same noninteractive
ways of offline publishing.
First and foremost, Web
for where the Internet may be headed. 2.0 conceives of the Web
“Web 2.0” is now the official tag, if you not as just another ex-
will, for a host of technical innovations tension of print, TV, and
and new business models that many ana- radio, but as a series of
lysts say are driving the booming Internet “services” or tools that get
economy after that fateful bubble burst in things done. “The Web has
2001. Shortly after the great digital become a platform,” author
downturn, book publisher Tim O’Reilly and Web 2.0 theorist John
joined with Dale Dougherty of Media- Battelle recently told a
Live International to brainstorm the state meeting of advertising executives.
of the supposedly fallen Web project. The increasing use of Ajax lets stand-
They realized that “far from having alone applications such as email, word pro- data are now migrating to the Web itself,
crashed,” says O’Reilly, “the Web was cessing, contact management, and storage where you can access it anywhere, anytime,
more important than ever, with exciting become in-browser Web services. Google and also share it with others.
new applications and sites.” Google intro- Maps started the trend by letting users More than a set of applications, Web 2.0
duced new algorithms for searching the reposition maps and pop up data without is a pool of data that users can manipulate,
Web and an interface for the Internet that page reloads, but a gusher of investment pull down, and reuse at will, says Kelly
users embraced. Yahoo! suddenly cata- and betas are bringing the techniques to Abbott, director of information strategy at
pulted to massive profitability as advertis- every imaginable application. The upcom- Red Door Interactive. RSS feeds were just
ers started moving money online. And ing major revision of Yahoo! Mail lets you the beginning of a trend where Web sites
many old concepts, such as Web-based drag and drop messages into folders on a such as Google Maps and news providers
TV and community pages, re-emerged in Web page the same way you would in open up their applications and databases
more compelling forms as on-demand Outlook. ThinkFree.com is an example of for reuse to provide fully customized and
streaming media and blogging. The Web a full-featured office suite
was back, and audiences were ready and that’s hosted entirely on-
wired for it. But in this second stage of line. It puts a complete ap-
quieter, more frugal development, the plication menu structure in
Internet was being reimagined as a much a browser window for mak-
more interactive, user-driven medium. ing spreadsheets, docs, or
Web 2.0. Say what? presentations. Late to the
game, Microsoft is play-
A Platform Not A Medium ing catch up to the Web
The Web 1.0 of the late ’90s was fueled 2.0 services revolution by
by hype, laden with old media presump- rolling out Windows Live
tions about what the Web should be, and (www.live.com), which
discredited by half-baked ideas about Web promises to transform
use that were way ahead of an audience Microsoft Office, email,
still struggling with dial-up connections. bookmarking, and security
In that world enormous capital went into from desktop tasks to
selling dog food (Pets.com) that no one online resources. Rather In the emerging world of Web 2.0, the Internet becomes an
wanted to buy online and trying to push than being tied to a physi- operating system, and companies such as ThinkFree offer
all the same mega-media brands (Time cal location, your PC and full-featured software applications as a browser-based “service.”

82 June 2006 / www.computerpoweruser.com


caught in the web

on-demand content. Just as Google Maps Flock promises to weave into a single
lets users lay their own data onto the map- browser interface some of the
ping interface to create wholly new con- hallmarks of Web 2.0 developments:
tent, sources such as The New York Times content sharing and remixing,
will offer APIs into its archives, so users and blogging, and integrating other Web
developers can pull any slice of data they services such as Flickr directly
like into their own new applications (an into another application.
encyclopedia, real estate listings for your
own neighborhood, etc.).
At O’Reilly’s tech publishing company, user declares how and where infor-
O’Reilly Media, thousands of textbooks mation is important to him and
are fully digitized, so users actually sub- takes it on demand. In Web 2.0-
scribe to the entire library and can piece speak, “users add value,” says O’Reilly. one another’s flow of material and tag the
together chapters and even paragraphs of entries with terms that are important to
books into their own texts. In a deal with The Web Of Us them. Often called “folksonomy,” this col-
Microsoft, help systems in some of its In fact, a central difference among the laborative tagging doesn’t restrict an image
software development kits link directly earlier concepts of the Internet as linked or any piece of content to a particular use
into O’Reilly’s text libraries to pull down content and Web 2.0 revolves around the that’s defined by some professional editor
advice and even programming examples as increased role of the user, not publishers, somewhere. Folksonomy surrounds the
needed. In traditional media, and even determining what is valuable online. At many pieces of content with countless
most Web 1.0 sites, the publisher defined destinations such as the photo-sharing site overlapping tags so that users can find it in
the look and feel of content and how and Flickr, for instance, users not only create many more ways. In yet another buzzword
where it could be used. In Web 2.0 the the repository of images but also tap into of the new Web economy, parsing content

CPU: What does Web 2.0 mean to you and the Flock project?

Arone: We actually have a tip jar in front of the office and penalize you a dol-
lar for using the term. We’re trying to break away from using any buzz mar-
keting words. We try to talk about specifics of what we are trying to achieve
for users. To me and to most at Flock it means the new ways that people par-
ticipate online, the technologies that cater to certain types of participation.

CPU: How does Flock layer onto the Firefox engine these participatory
functions?

Arone: We looked at the ways that people are interacting online. Firefox rein-
vigorated the browser space, but browsing is the same. It doesn’t address the
Q&A greater participation by folks in easier publishing, sharing content, social net-
works, all of these higher amorphous concepts. We are looking into what
Flock’s Geoffrey Arone: product can make interacting through a browser better. We looked at exam-
ples of blog editors and photo browsing and uploading. What makes us special
Don’t Say Web 2.0 Around Here is the interplay of the different features. If I read an article at NYTimes.com
The bleeding-edge digerati and much of on the running of the bulls, I can Star it to my favorites or just highlight text
Silicon Valley have eyes on the upcoming and keep it in a Shelf. I can blog the photo and then drag text from my Shelf,
“social browser” Flock because in many ways then open Flickr in the Topbar and search for my friend’s photos of his expe-
it embodies so much Web 2.0 spirit. By mak- rience with the bulls. It involves several things and the end-to-end user experi-
ing the browser into a multifunction applica- ence is different.
tion, Flock promises to integrate browsing with
publishing, blogging, photo sharing, and public CPU: When will we see usable versions of Flock?
bookmarking, among many other very Web
2.0 functions. But as co-founder Geoffrey Arone: Today it’s pretty stable. Expect to see something that’s a significant
Arone tells us, saying “Web 2.0” around the improvement in mid-May. The second public beta will come two months later
Mountain View, Calif., office will cost you. and then if all goes well, a 1.0 two months after that. ▲

CPU / June 2006 83


caught in the web

In Search Of Web 2.0


heck out these sites to find some
C examples of this amorphous Web 2.0
concept at work.
Yahoo!’s Flickr is a
standard-bearer of
Rollyo.com. This “roll your own search
Web 2.0 trends: content
engine” site lets you create and share
generated by users,
search boxes that peruse only the sites you
collaborative tagging,
most value. This is a mashup of Yahoo!
and content sharing.
search technology and social networking.
Flickr.com. The photo-sharing site brings
user-generated content to a new level, as
into smaller pieces and tagging it densely You’ll be able to review photos, even drag- members tag and swap images to make
activates “The Long Tail” of the new ging and dropping images from your Desk- one of the largest repositories of densely
Internet. Just as the Amazon.com recom- top directly into the Topbar and thus into indexed images ever seen.
mendation engine can make buyers aware your Flickr account. Another repository,
ThinkFree.com. Using the Web as an
of a much larger catalog of less popular your Shelf is where you can store text clips,
operating system, ThinkFree puts basic
books than any major retailer could copied images, and links from other sites.
Office apps such as word processing and
carry on physical shelves, a Web of dense- All of these tools become super-charged
presentations in the Web browser, so you
ly linked content brings to the surface when you invoke Flock’s integrated blog
can make and edit your docs from any
obscure or forgotten texts and images for editor. Yes, in Flock you make blog entries
machine, operating system, and anywhere
use in unimagined new ways. By tagging, in the browser window, which also lets you
there’s a Web connection.
searching, sharing, and reconfiguring con- drag and drop into your entries the links
tent, users add value. and text you stored in the Shelf or photos Wayfaring.com. Wikipedia meets Rand
Wikipedia is the ultimate expression of from the Flickr Topbar. McNally. Users create, tag, and share
user-generated value, a radical turn away Call it next-gen Web or Web 2.0, theo- personal maps that chart their personal
from the classic encyclopedia where for- rists of the evolving Internet believe our adventures, annotate hot spots in an area,
mal “experts” defined what was important use of the technology is redefining content or collaborate on group-made maps.
for people to know and reviewed what itself. In the world of Web services, soft-
was accurate and “true.” In the Wikipedia ware such as Flickr and Google don’t have
model, a broad community declares what anything as quaint as “version releases.”
is important and accurate. Leading the Their developers update them weekly
charge into this new era was the Google and add and test new features as live betas USB Vacuum Cleaner
search engine itself, says O’Reilly, which that evolve in response to user feedback.
started indexing and ranking content on
the Web in part according to how many
O’Reilly Media now has a Rough Cuts
series where buyers access unfinished books
F or those of us who spend a lot of time at
the computer, USB-powered devices go
a long way toward making our lives easier.
times others linked to it. Likewise, com- as the authors write them, allowing for cus- If you subsist entirely on powdered donuts
panies such as Amazon leverage the wis- tomer feedback and bug fixes. Blogging, and Cheetos while sitting at your computer,
dom of its customers to drive user reviews content sharing and remixing, Wiki media, then Genica’s USB Vacuum Cleaner was
and recommended titles. and the new Web services that enable them designed with you in mind. Just plug it into
are forcing us to rethink traditional notions an available USB port, select the appropri-
Flock Together of publishing that depended on earlier ate attachment, and then start cleaning.
If Web 2.0 is about Web services, inte- technologies, says O’Reilly. Content may There’s even an LED for vacuuming the
darker recesses of your computing area.
grating diverse applications and data start as a collaborative Wiki then course
Now all we need is a USB-powered wet/dry
across the Internet, and the power of col- across blogs, search engines, into devices vacuum to suck up all the
Source: www.geeks.com/details.asp?invtid=GN-060

laboration, then the trend’s perfect ex- and syndication, and all along the way gain coffee we’re spilling into
pression may be the highly anticipated user comments and tags that refine and our keyboards.
Flock browser. Based on the Mozilla redefine it. “Content becomes more like a
Firefox engine but founded on Web 2.0 wave. It’s a momentum,” says O’Reilly.
principles, Flock is being designed to let Wave? From the popularity of next-gen
people interact with the Web and each flagships such as Google, Yahoo!, and
other within the browser paradigm. now MySpace and Flickr, Web 2.0 is
Flock sports a Topbar that links directly looking more like a tsunami.
into Flickr and eventually will be able to
pull in other content sharing communities. by Steve Smith

84 June 2006 / www.computerpoweruser.com


The Department Of Stuff

tvfuture.txt
T hey say it is all about the content. But
“they” say a lot of things. Today down-
Comedy Central is trying it with “The Daily
Show,” and ABC has been trying it with
loadable content is just starting to wage war “Lost” and “Desperate Housewives.”
against the broadcast media that has dominat- The problem is simple economics: Broad-
ed distribution for decades. The problem is cast is inexpensive to the audience because
that the pricing models are all wrong. Dis- commercials fund it. DVD has no commer-
tributors are pricing their downloads like cials, so the industry passes along the entire
DVDs and not like broadcasts. And strange costs. And because downloads don’t have
DRM systems inconvenience their users, often commercials, the industry is trying to charge
driving them to piracy. the consumer DVD prices.
Once upon a time, “getting” content meant This is a serious problem toward adoption of
sitting in front of your TV at a specified time, downloadable content. My TiVo has around 40
tuning in to a channel, and watching the show season passes. It records dozens of shows every
for the allotted amount of time. VCRs and week. Were I to pay $2 for each episode, my
TiVos have incrementally added control, let- fixed monthly satellite bill would easily triple. Rob "CmdrTaco" Malda is the
ting the user time-shift his programming. The distinction here is that the masses con- creator and director of the pop-
In addition to time shifting, we have what sume broadcasts, but, really, the fans only pur- ular News for Nerds Web site
I will call “location shifting.” This is for chase DVDs. A serious fan willing to foot a Slashdot.org. He spends his
offline media: DVDs, CDs, and so forth. By higher bill will repeatedly watch a DVD. The time fiddling with electronic
merely taking a physical object from place to broadcast is ethereal—watched, enjoyed, and gizmos, wandering the ’Net,
place, you can partake in your glorious then deleted to make way for something new. watching anime, and trying to
media in any (compatible) location. You The industry is pricing think of clever lies to put in his
pay extra for this, and typically as part of these downloadable bio so that he seems cooler than
it, the manufacturer removes commer- programs as if they are he actually is.
cials from the product. DVDs, and when I think
What downloadable content the inevitable future is that
does is conveniently blend the these downloadable programs
concept of time shifting and will replace broadcast media, I
location shifting into one glo- think the industry should price
rious file playable on your them accordingly. As long as
computer, your iPod, and The industry needs to take a step
your TV. back and understand that download- complicated
Now we are used to not able content gives users an element of
paying directly for broad-
casts. Sure, we pay for
time shifting and location shifting. It is
something old and something new. And as
DRM systems
cable or satellite, but we don’t directly pay to long as complicated DRM systems and ill-
watch “The Daily Show.” So, conceptually, conceived pricing structures stand in the way,
and ill-con-
we think of the functionality the TiVo gives the audience will route around them, turning
us as “free.” instead to piracy, or better yet, a new genera- ceived pricing
On the other end, we’re used to paying tion of independently created content.
for our DVDs. A crazy market has arisen for We have seen some of this independently structures
buying old TV shows. You end up paying created content in the film industry already as
a couple bucks per episode and there they independent films crept up on the major stu- stand in the
are for you: uncut, commercial free, and dios. But now a few thousand bucks worth of
digitally perfect. digital camcorders and a beefy Mac can let way, audiences
The problem is that currently all attempts individuals create and distribute their own
to market downloadable content have charged
the prices associated with location shifting: a
productions online. If the industry doesn’t
hurry up and start being reasonable with its
will route
buck a song, a couple bucks for an episode of own content, the rest of the world is going to
a TV show, and far more for a movie. start creating its own. ▲
around them.
Speak loudly into the megaphone of foo@baz.com; I’m slightly deaf in that ear.

CPU / June 2006 85


D I G I T A L L I V I N G

by Jen Edwards

Microsoft’s New Wireless Mouse Options


mong three new peripherals that Microsoft recently announced is the Wireless Notebook Optical Mouse 3000 ($29), made for both
A left- and right-handed users. The 3000’s design includes a wireless snap-in receiver in the mouse’s bottom that automatically turns
the mouse off when not in use to conserve battery life (estimated at six months). The
mouse requires one AA battery for an estimated six-month lifespan. The 3000
also uses Microsoft’s latest High Definition Optical Technology
(1,000dpi; 6,000fps), which MS claims will provide
increased precision and smoother tracking. We’ll let you
decide if the technology really puts the mouse two gen-
erations ahead of other
optical mice, as
Microsoft claims.
The company has
also announced the
new five-button
Wireless Laser Mouse
5000 ($49), a new
desktop mouse with HD
laser tracking. The 5000 has a dedicated Magnifier button that lets you enlarge a portion of the computer
screen for editing objects with finer details, such as digital photos. A more affordable three-button Wireless
Optical Mouse 2000 ($29) has also been announced. ▲

Free MSNBC News & Entertainment PayPal Introduces


—With A Catch Text to Buy System
SNBC is testing a new ad-based beta service that delivers news and ayPal has introduced a new way for its users to
M video clips of such programs as “The Today Show” free to mobile
users, as long they’re willing to view short ads to acquire the requested con-
P pay for merchandise. Instead of logging on to
the PayPal service via a computer, PayPal account
tent. The three-month MSNBC.com Mobile testing model is similar to what holders can now use their mobile phones to send
many Web sites now use, instead of the traditional wireless model of charging product codes via text messages to purchase items
a monthly subscription fee for premium content. Many wireless providers, for advertised in magazines, at events, on billboards, etc.
example, charge $15 or more a month for similar premium services. Several retailers have already joined the program,
The aim is to change the underlying business model from a fee-based one to including 20th Century Fox Home Entertainment,
one in which content providers Bravo, MTV, and the NBA Store.
and the wireless carriers share ad A subscriber’s phone must be activated at
revenues. The new service is cur- PayPal’s Web site to get a special mobile PIN
rently available only on Windows- before using the Text to Buy service. Users can
powered mobile phones, but also call 1-800-472-9725 (800-4PAYPAL) to use
MSNBC hopes to expand the the service. PayPal guarantees all transactions and
service to a wider audience once accounts are safe, even if your mobile phone is lost
testing is completed. ▲ or stolen, as accounts are PIN-activated. Users can
also use Text to Buy to send money to other peo-
ple by sending a text message to 729725 (PAY-
MSNBC.com’s Mobile beta is using a PAL) with the amount to send and the recipient’s
new ad-based method of providing phone number. For more information or to sign
content to mobile users. up for a free account, visit PayPal’s Web site. ▲

86 June 2006 / www.computerpoweruser.com


D I G I T A L L I V I N G

Gateway Returns To Ultraportable Notebooks


ateway has unveiled two new ultraportable notebooks, the E-100M and NX100X, both of
G which are just 3.2 pounds and feature a 12.1-inch widescreen display (1,200 x 800), Intel’s
U1300 Ultra Low Voltage Core Solo processor, 802.11a/b/g, optional Bluetooth, up to a
100GB hard drive, up to 1GB of RAM, and an alloy-magnesium chassis. The NX100X
includes an optional external DVD/DVD-RW drive ($199). Both computers start at $1,399
and are available for order at Gateway’s Web site. The releases mark the first time in four
years that Gateway has offered ultraportable machines. Industry analysts speculate the
move is due to increasing demand for small notebook computers in both the business
and home user segments. ▲

The Gateway NX100X (along with the company’s


E-100M) marks the company’s return to the
ultraportable market after a four-year absence.

Intel Doubles Flash Samsung’s T509: The


Memory Capacity Thinnest U.S.-Available Phone
With New Chip ove over Motorola, there’s a new tiny mobile

I ntel has finished the design phase of


a new 65nm NOR flash memory
M phone in town. As you’re reading this, Sam-
sung’s SGH-T509 mobile phone should be the thin-
chip (codenamed Capulet) that’s capa- nest mobile phone available in the United States.
ble of storing 1Gb of data. Production Introduced at April’s CTIA trade show, the bar-style
is expected to start this quarter, and SGH-T509 handset measures only 0.38 inches thick
mobile phone makers could start using (compared to the Motorola SLVR’s 0.43 inches) and
the chip in phones by year’s end. The weighs just 2.7 ounces with a standard battery. The
1Gb amount doubles the previous phone is expected to still offer an impressive feature-
maximum capacity of 512Mb of phys- set, including a 65K color TFT display, EDGE high-
ically larger 90nm flash chips. speed data access, Bluetooth capabilities, and a VGA
The new chip will likely see usage camera that can also capture video. The T509 report-
in PDA, cell phones, and other CE edly will also have a speakerphone; MP3 ringtones; and
devices that have high-memory connection abilities via SMS, MMS, ICQ, and AOL
requirements but small physical speci- and Yahoo! instant messaging apps. Few other details
fications. Flash memory also has the were available at press time, but T-Mobile has been
advantage of not requiring constant announced as the exclusive retailer for the phone.
power to keep memory intact as In other Samsung news, the company’s YM-P1,
standard RAM does. Flash memory one of the most eagerly anticipated personal media
also isn’t overly power-hungry and player/recorders by users, is now available for order at
it doesn’t contain moving parts, as Datavision. The YM-P1 has a 4-inch widescreen TFT
miniature hard drives do. display and 20GB internal hard drive and can record
Reportedly, Intel is already able to directly from a TV. Battery life is expected to be 15
create 2Gb chips by stacking two hours or six hours for video. Additionally, the player
1Gb chips on top of one another, but supports a wide array of audio and video formats,
a company spokesperson says Intel including AC3, AVI, BMP, DivX, JPG, MP3, MPEG-
expects to be able to make single 4, Ogg Vorbis, WMA, and WMV. An SD card slot is
2Gb flash memory chips when Intel included, as well as FM radio. Samsung hasn’t an- At 0.38 inches, the Samsung T509
eventually transitions to new 45nm nounced an official release date for the YM-P1, but is the thinnest phone currently
production technology. ▲ early adopters can preorder it for $370. ▲ available in the United States.

CPU / June 2006 87


Games
Digital Living
Gear
Movies
At Your Music

Leisure
Audio Video Corner
The entertainment world, at least where it pertains to technology, morphs,
twists, turns, and fires so fast it’s hard to keep up. But that’s exactly why we
love it. For the lowdown on the latest and most interesting releases in PC
entertainment, consoles, DVDs, CDs, and just leisure and lifestyle stuff we (for
most part) love and recommend, read on.

DVDs by Chris Trumble,


CDs by Blaine A. Flamig DVD
Capote Byte
Is there any actor in Hollywood as versatile as Philip Seymour Hoffman? He was
Brandt in “The Big Lebowski,” a screenplay writer in “State and Main,” a convinc-
ingly desperate problem gambler and embezzler in “Owning Mahowny,” and a flaky May 9
sidekick in “Along Came Polly.” In “Capote,” he plays one of the most famous and Dr. Katz,
idiosyncratic writers in American letters, Truman Capote. He nails the role, of Professional
course, and the film is a fascinating look at how writing “In Cold Blood,” the story of Therapist: Season
$22.99 a horrific murder in 1959 Kansas, changed the author’s life forever. It One
Sony Pictures Home Entertainment should be interesting to see how he fares as the bad-guy counterpart to The New World
www.sonyclassics.com/capote superspy Ethan Hunt in “Mission: Impossible III.”
Ronin (Collector’s
Edition)
Robot Chicken: Season One
If you have a sense of humor and you haven’t yet discovered Cartoon Network’s late- May 16
night Adult Swim lineup, you’re missing the best original programming on TV. One of
Napoleon
more recent additions to the Adult Swim lineup is a stop-animation show called “Robot
Dynamite (Like,
Chicken,” created by Seth Green and Matt Senreich. Each episode is a montage of short
The Best Special
bits involving the antics of action figures ranging from Superman and Optimus Prime to
Edition Ever!)
George Bush and Michael Moore. “Chicken” is an ingenious blend of current and retro
$29.98 pop culture with a dash of political satire, and a hint or two of social commentary The Producers
Turner Home Entertainment thrown in for good measure. The two-disc DVD set includes the entire first season Crimson Tide
www.adultswim.com of episodes plus a generous helping of bonus content. You will laugh. (Unrated Extended
Edition)
Built To Spill—“You In Reverse”
Imagine if Neil Young and Crazy Horse were in midcareer today, locking into an May 23
album’s worth of improvisational, glorious grooves. That’s the kind of soulful, in- The Boondock
the-pocket sound that Built To Spill has captured on “You In Reverse,” the band’s Saints (Unrated
first album in roughly five years. The wait was certainly worth it. From the eight- Special Edition)
minute “Goin’ Against Your Mind” to the sprawling “Wherever You Go” to the The Fifth Element
$14 beautiful closer “The Wait,” Doug Martsch and company’s latest work is one of (Blu-ray Disc)
Warners Brothers Records the most enjoyable albums we’ve heard in an awfully long time.
House Of Flying
www.builttospill.com
Daggers (Blu-ray
Disc)
Eagles Of Death Metal—“Death By Sexy”
Fans of self-important, beat-you-over-the-head-with-a-message rock need not apply May 30
for entry into the Eagles Of Death Metal camp. “Death By Sexy” isn’t for you. If, The Venture Bros.:
however, you like your rock to feel live, raw, loose, riff-heavy, and just a little nasty, Season One
dig in; there’s plenty here to sink your teeth into. From the minds of Josh Homme
Freedomland
$13 (of Queens Of The Stone Age) and pal Jesse Hughes, “Death By Sexy” isn’t likely to
Downtown change your world, but it will make it a hell of a lot more fun place to bang Numb3rs: The
www.eaglesofdeathmetal.net your head in. Complete First
Season
See the full reviews from A/V Corner at www.cpumag.com/cpujun06/AYL

88 June 2006 / www.computerpoweruser.com


CPU Game
Of The Month

Bethesda’s Got A Secret Sauce -by Dr. Maleprop

W e played Bethesda Softworks’ Arena upon its release in


1994 and all the subsequent Elder Scrolls titles, including
Daggerfall (1996) and Morrowind (2002). These three role-playing games
are the predecessors of one of the most immersive and addictive games
we’ve played in the past several months, Oblivion, which is now available
on PC and Xbox 360.
Let’s get the bad out of the way. The 360 version suffers from some
frame rate issues and has more scenery pop-ups than a struggling adult
Web site. Both versions have cheat exploitations and over-
ly frequent load instances. Those flaws may be regarded
as serious in some games, but Oblivion’s assets will still
provide you with many, many hours of enjoyable game-
play. The last Elder Scrolls game, Morrowind, had some
pacing issues with both the plot and movement, but
we’re happy to see that Bethesda’s newest creation suffers
from none of the shortfalls of its ambitious predecessors.
Spend the necessary seconds or hours creating your character before
starting off. As the game begins, you find yourself locked away in a dungeon
without any idea why you’re there. As you ponder your naval, Emperor Uriel
Septim (appropriately voiced by Patrick “Captain Jean-Luc Picard” Stewart) notice is the combat system. Yes, this is an RPG,
and his guards sweep through your cell and make off through a secret pas- but there’s a much heavier focus on action in the physical
sage. Having no love from the prison life, you quietly set off after him. (Your sense. You’ll be doing battle with lots of enemies, and being able to jug-
style of gameplay in this initial stage will prompt Oblivion to recommend a gle your attack and defense will play a key part to your success. The action
character class, which you may choose to ignore.) Later, just prior to his sequences feel real: You make contact and need to use your weapon/shield
assassination, the Emperor bestows a quest upon you to find and protect to fend off enemy attacks. It feels like it should: spot on.
his heir (voiced by Sean “Boromir” Bean) with the ultimate goal being to Oblivion is already the best game we’ve seen this year. With all the noise
prevent the gates to Oblivion from opening and destroying the world of we’ve been hearing about MMO games, it’s a pleasure to see a single-player
Tamriel. Soon thereafter you’ll step out of the dungeon into the stunning game of this magnitude. Both the Xbox 360 and PC versions achieve great-
world of Cyrodiil (the capital province of Tamriel). ness, and you, as the player, have everything to gain in entertainment value
The game’s scope in both the world and gameplay depth redefines for your hard-earned gaming dollar. The PC version requires top-notch
“open-ended.” Cyrodiil is a gigantic, living, breathing world that will rip you hardware to impress visually, and if those upgrades go substantially past
out of your own with ease. You can follow the main quest or not. You can $400, then consider buying the 360 version, which plays as well as or better
play with a stealth basis, create your own potions, fight head-on as a warrior, than most midrange PCs. Either version is fine, but if you’ve read this far,
or become a vampire. One big change long-time Elder Scroll players will you’re not going to want to miss playing this gem. Get it now. ▲

$49.99 (PC)/$59.99 (PC CE); $59.99 (360)/$69.99 (360 CE)


ESRB: (T)een • Take 2 Games • www.elderscrolls.com

CPU / June 2006 89


Auto Assault has evolved past its original
bland, brown, barren wasteland environments.
Developer NetDevil went back to the drawing
board and returned with plenty of varied envi-
ronments that look and feel different during
Mad Max Takes On World Of Warcraft -by Dr. Maleprop gameplay. Keyboard/mouse control conveys
what it should, and we were surprised to find that

T he past 20 years of auto combat have been


exemplified in the likes of Auto Duel
(Microprose), Destruction Derby (Psygnosis),
mutation. That leaves Earth with three races to
duke it out: Humans, Mutants, and Biomeks.
Unlike any other MMORPG currently available,
playing with a gamepad worked very well, too.
Like most MMORPGs, you’ll spend a lot of your
time in combat as you work to level-up your vehi-
High Octane (Bullfrog), Carmageddon (Interplay), Auto Assault focuses on the cars, which means cle. The crafting system is deep and not entirely
and Interstate ’76 (Activision). These are the you’ll pick a car and then spend much of your obvious. There’s plenty to loot, and the combat
games that would have most influenced us if we time customizing your vehicle. Each vehicle will among vehicles is a lot more compelling.
were the developers of NCsoft’s newest have characters’ classes relating to combat, Whether Auto Assault can match the num-
MMORPG: Auto Assault. stealth, etc., and your decision will alter your bers seen in World Of Warcraft remains to be
Developer NetDevil has given Auto Assault a game. And that’s before all the modifications that seen. Guild Wars managed to pry us away from
rich and detailed back story, but we’ll summarize: you can make to your vehicle, which also heavily WoW for many, many months, and Auto Assault
a meteor shower brings a contagion that mutates affects your game experience. stands to break new ground in the genre. ▲
humans. This leads to all-out war and
something equivalent to a global ther-
monuclear confrontation. And
behold—yet another race is formed via

$49.99 (PC)/$59.99 (Limited Edition)


ESRB: (T)een • NCsoft
www.autoassault.com

pop up in one of many game genres the U.S. release includes the original
depending on the situation and add 2002 Space Rangers that wasn’t
an element to the gameplay that released stateside. Space Rangers 2
scripted events just can’t re-create. took us off guard but will be a
Considering how rich and varied mainstay on our hard drive for
the gameplay is, it’s surprising just many months to come. ▲
Don’t Let It Fly Under Your Radar -by Dr. Maleprop how elegant the control and inter-
face feels without being simplistic.

T he first addictive game you


may not have heard about is
inspired by the Xbox 360’s popular
This simplified hybrid turn-
based/real-time space combat/
trader by Russian developer El-
It’s rare to have genres, such as
space combat, turn-based/real-time
strategy, text adventuring, and
Geometry Wars Evolved: Grid Wars emental Games is intuitive but more rolled successfully into a sin-
2, which looks good even on requires time to fully understand its gle game. We don’t recommend
widescreen LCDs and is tough to varied gameplay elements. Unlike passing up the opportunity to play
put down. Our other selection is Galactic Civilization II, which focus- the genre-defying SR2. It’s cheap,
the single-player Space Rangers 2: es on galactic conquest, Space and the open-ended gameplay
RoD, which isn’t free but available Rangers 2 focuses on your single rewards well. As if that
at a budget-friendly (not to be con- spaceship. The dynamic universe in isn’t enough,
fused with “budget” title) price which you travel is attractive and
point of $29.99. deceptively varied. Special missions

$29.99 (PC) • ESRB: (T)een


Cinemaware Marquee
www.spacerangers2.com

90 June 2006 / www.computerpoweruser.com


$59.99 (X360), $39.99 (PC, Xbox, PS2) • 2K Sports • www.2ksports.com/games/mlb2k6

system’s controller design and button lay- that puts you in charge of steering an MLB
out, and regardless of what system you franchise via the draft, trades, minor
play on, you’ll find them easy to pick up. league operations, and in-game strategy,
Pitching and hitting controls are especial- too. As with most sports games, the com-
ly effective, although if you’re used to old- mentary from the booth can get a little stale
Welcome To The Bigs school games where you mash a button to at times, and we’re still not quite where we
-by Chris Trumble swing the bat, the Swing Stick will take a need to be in making real-world players
few innings to get used to. Each swing is look convincingly human, these are minor,
he boys of summer are back on your made up of two motions of the right analog common gripes, and they don’t warrant
T favorite game console. We took a few
versions of 2K Sports’ Major League
stick; you pull it back to initiate your batter’s
backswing and step into the pitch, and
passing on MLB 2K6. ▲

Baseball 2K6 for a spin and found the you push it forward to take your cut.
game to be deep, pretty, and fun to play. It Throwing to pick off a runner when
won’t surprise anyone that the Xbox 360 you’re in the field is pretty easy, too; just
version is the most elaborate graphically, press the button that corresponds to the
but that aside the various flavors of 2K6 base you want to throw to, and hold the
are largely identical. The controls you’ll use button longer for a harder throw.
on both sides of each inning vary only If you’re looking for more than a quick
inasmuch as necessary according to each game, MLB 2K6 has a GM Career mode

$59.99 (X360), $49.99 (Xbox, PS2), $39.99 (PC)


ESRB: (T)een • Eidos • www.tombraider.com

Crystal Dynamics Rescues Lara - by Chris Trumble

ntil very recently, Eidos’ Tomb Raider fran- Eidos took the drastic action of taking
U chise was a sort of cautionary tale demon-
strating the danger that lies in churning out too
Tomb Raider away from Core, the devel-
opment company that created Lara Croft
many tepid sequels to cash in on a hot proper- in the first place, and giving it to Crystal
ty. When it hit the scene in 1996, the first Dynamics, a developer that had huge
installment for the PlayStation was a huge suc- success with another popular third-person
cess, capitalizing on the popularity of the then- action franchise, The Legacy Of Kain.
nascent 3D action genre and a hip, sexy lead Looks like it was the right call. Tomb
character that soon became a gaming icon. Raider: Legend has pretty much everything
The first sequel or two did pretty well, too, that made the first TR game fun, but adds
because let’s face it: As much as we complain to that a few new moves, controls that are
about sequels, we seem to love buying ‘em, tighter and more responsive than they’ve
and Eidos was all too happy to keep them ever been, and—of course—cutting-edge
coming. It wasn’t long, however, before TR’s graphics. We reviewed the Xbox 360
luster began to fade. By the time TR: The version, and it’s a thing of beauty in
Angel Of Darkness showed up for PS2 and high-def, with characters and environ-
PC in 2003, many who’d enjoyed the first two ments that are equally sharp. We would
or three games had lost interest, and worse have liked it to last a bit longer, but oth-
yet quite a few of those who paid the price of erwise we recommend this game
admission for Angel were sorely disappointed. wholeheartedly. ▲

CPU / June 2006 91


Datel XSATA
Never Run Out
Of Space On
Your Xbox 360

Character Smorgasbord
-by Chris Trumble
D atel seems to be making quite a
name for itself in the realm of
console storage growth. The latest
expansion project is the Xbox 360. We
$39.99 (PS2) don’t know about you, but having a
ESRB: (T)een • Konami paltry 12-ish gigabytes of useable stor-
www.konami.com age is more than just embarrassing—it
leaves us wanting more.
The XSATA is a plug-and-play device
that’s molded to fit neatly in between
the 20GB Xbox 360 external hard drive
and the top of the console. The device

W e’ve seen lots of console RPGs over the


years, and although in lots of cases there’s
precious little to separate one franchise or title
your party to six members. But having so many folks
standing by means you can customize your party to
include the Hero, your main character, and all sorts
features a USB 2.0 connector in the back
that lets you connect your 360 hard
drive directly to a PC hard drive for
from another, we’ve always liked Konami’s of combinations of other characters, allowing you to backups. Also, you can share anything
Suikoden series for one big reason: the variety of build a party that best suits your style of play. on the 360 that’s not locked directly to
the characters. Battles are turn-based, menu-driven affairs, and your console/account with your friends
The common thread among all the Suikoden we were pleased to note that Suikoden V’s battle via email. The best part is that you never
games is the108 Stars of Destiny, a number of diverse menu gives you an Auto option that can alleviate have to unplug your 360 hard drive once
characters that you can recruit throughout the some of the tedious button mashing in one-sided you have the XSATA sitting below it.
game by talking to the right folks and doing plenty battles. We also enjoyed the game’s look and So what’s not to like? Well, the laser-
of exploring in towns and so forth. Of course, you sounds, and aside from taking a little too long to blue color for one. Is it asking too much
can’t use all 108 at any one time; the game limits get going in earnest, the story is fun, too. ▲ to wish for an XSATA in 360 green to
match our consoles? After all, not
everyone wants to bling their 360. ▲

$39.99 (Xbox 360) • ESRB: N/A


Datel Design & Development • www.datel.co.uk

Ideazon MERC
Another Specialized Gaming Keyboard $39.99 (PC) • ESRB: N/A • Electronic Arts • www.zboard.com

W e’ve looked at the Ideazon Zboard in the


past. The ability to customize your PC’s
primary game controller (the keyboard) was a
MERC features game-specific keys (tilted for-
ward by 11 degrees) on its left side, a normal
keyboard, and a numeric keypad with merged
software to make the keyboard work with the
games it supports. We were surprised, however,
to discover that the software didn’t let us cus-
superb idea, but having to replace the keyset HOME/END keys. PAGE DOWN/DELETE tomize the keys. Fortunately, there’s a driver
just to type was a major inconvenience. Also, require a toggle before you can use them. This update in the works that will address this issue.
paying nearly $20 for custom keysets was change comes as a result of Ideazon trying to Pricing is reasonable considering how well
another big drawback. Last but not least, most cram so many more keys into what’s already a the keyboard functions for work and play. If
users of the Zboard owned a “real” keyboard for slightly larger than average keyboard. The inte- you have a ergonomic, split keyboard craving,
daily use. grated gaming keys no longer require a user to then we recommend you keep your keyboard
Ideazon took note and addressed the short- purchase game-specific keysets. You’ll need to and pair it with something such as the Wolf
comings of the Zboard: Enter the MERC. The install the included Claw Devour. ▲

92 June 2006 / www.computerpoweruser.com


The Cutting Edge

The First Personal Computer


J ustinnovative
like sound films and tape recordings,
people created personal com-
the unit sold for roughly a third of the Micral-
N’s price. Both its price and the magazine pub-
puters before the technologies and distribution licity paid off better than expected. The com-
systems were in place to make them financially puter’s designers calculated that they needed to
viable. (I bet you didn’t know the first sound sell 200 units over the year to break even, but
film came along in 1895, not 1929. Ask me received more than 4,000 orders within the first
about it sometime.) The year in this case was three months of the Altair’s debut.
1971, and the computer in question was John The Altair 8800’s unrivaled U.S. market
V. Blankenbaker’s Kenbak-1. He marketed it dominance was not to last, though: When you
through the pages of Scientific American. discover a goldmine, expect to see plenty of
The Kenbak-1 came along just before the tourists with pickaxes down the road. However,
introduction of microprocessors, so it was built it did spark one important development. A pair
largely from TTL components. It employed a of young men got Roberts interested in a
von Neumann architecture, and all registers BASIC interpreter, which they knocked out in
were stored in the main memory. There was roughly 30 days of intense programming. It
no CPU, but the computer did come with 256 was delivered on paper tape and worked, lead- Barry Brenesal has written
bytes of RAM. Blankenbaker intended his pio- ing the two gents—Paul Allen and Bill Gates— more than 1,000 published
neering PC to teach students programming, to form a company known as Microsoft. articles and reviews on
and was uninterested in what other program- By 1976, the PC market was poised to electronic technology since
mers might make of it—let alone end users explode. Savvy entrepreneurs realized that it 1987. His first personal
without programming skills. Approximately could become a tool anybody might use—with computer was a Radio Shack
40 of these units were sold, before operations the proper motivation. Around this time, Steve TRS-80 model 100.
closed down in 1973. Wozniak designed a PC for his It was last seen functioning
At just about the same own personal use, but his as a boat anchor.
time, in 1973, François friend, Steve Jobs, was
Gernelle issued the first convinced that it had
commercial, non-kit PC much greater potential.
that was based on a micro- The result was the Apple I,
processor chip (the Intel which never sold well. (Until recently, There was
8008). His company, R2E, that is. With roughly 30 left in existence,
coined the term “microcomputer” in reference authentic originals in good condition now fetch
to its Micral-N. This PC was definitely a leap $15,000.) The Apple II of 1977 was another no CPU,
forward, with a real-time system and parallel matter. It looked like a modern computer, came
and serial I/O cards. It wasn’t cheap, though: with 4KB of RAM (expandable to a whopping
8,500 French Francs ($1,300) could buy you a 48KB), offered built-in sound, expansion slots, but the
lot of good meals on the Champs-Elysées. But an audio cassette interface for loading/saving
the Micral-N did well, and the company con-
tinued innovating, introducing a monitor-key-
data, and high-resolution and color modes. Like
the Micral-N, the Apple II wasn’t cheap: It sold
computer
board in 1974 and a hard drive the following for $1,298. But it impressed.
year. Had its international strategy been better,
perhaps R2E could have broken into the U.S.
On a personal note, a couple of friends pur-
chased an early Apple II and had a party to
did come
market, but this never occurred, and toward the show it off. A group of us were suitably
end of the 1970s the company was phased out.
Now we jump to 1975, when the cover of
impressed by its visual interface and made fun
of the primitive syntax in an accompanying
with 256
Popular Electronics’ January edition featured the adventure game. (We were all writers. You’d
MITS Altair 8800 computer kit. No, the Altair
was definitely not the first PC (although one of
expect that.) We subsequently praised the PC in
our various lines of work; so in a way, you could
bytes of
its inventors, Ed Roberts, is said to have coined say we all helped Steve Jobs make himself into
the term “personal computer” in describing it).
But it did start plenty of hobbyists thinking in
the tremendous success story that he is, today.
But we never got a cent for it. Computer tech-
RAM.
terms of personal computer use, especially since nology is really a cutthroat business, isn’t it? ▲

Wax nostalgic with Barry at Barry@cpumag.com

94 June 2006 / www.computerpoweruser.com


TIPS & TRICKS

mode. For privacy, you can keep Media


Player from saving your recently played files
or visited URLs. Likewise, use the Error
Reports section to prevent WinXP or Of-
fice from sending error reports when they
encounter problems. Use the Services menu
to disable a number of automated tasks that
access the Internet without your knowl-
edge, such as auto-updating and the clock
synch tool. Unless you’re on a network that
actively uses the network messenger service,
you’ll probably want to check the Disable
Windows XP Restoration Kit Messenging Service option because this is a
well-known hole for hackers.

The Click From Hell


One of the annoying default properties
ny advanced PC user may To bypass the logon procedure. Dou- in Windows is the navigation click that

A need to reinstall WinXP from


time to time just to clear out
all the dross of drives and
incompatible, leftover software installa-
tions. But then, onto that refreshingly clean
ble-click Logon, select Autologon, check
the Log On Automatically At System
Startup box, and, if necessary, insert any
password you have for your account.
Internet Explorer emits when you activate
a link. To silence it click Start, Settings,
Control Panel, and double-click Sounds
And Audio Devices. Click the Sounds tab.
In the Program Events window, scroll
Desktop comes the first reminder that Counter-Intelligence down and click Start Navigation item in
you’ve also lost all of those wonderful The other necessary tool for fresh the Windows Explorer branch. Use the
tweaks and customizations you’d accumu- WinXP installations is xp-AntiSpy (free; drop-down menu to change the sound to
lated over the years. This month we gather www.xp-antispy.org). This downloadable None and click OK.
together some important Windows tweaks app isn’t spyware protection but an indis-
every power user may want to re-remember pensable security setting tweaker; the short- At Your Service
when he starts with a fresh WinXP install. est route to replugging all of those security Over the years you may have learned
holes and background Windows reporting about and turned off many of the back-
Step One: Cheat! mechanisms that threaten your privacy and ground Windows Services that can chew
Don’t pop open the Registry Editor just can open you up to hack attacks. up CPU cycles and even open some securi-
yet because a lot of adjustments we used to Here are just a few highlights: In the ty holes. To bring up your Services option,
make in the Registry Editor are now cov- MediaPlayer section of xp-AntiSpy, you click Start, Run, type services.msc in the
ered by utilities such as Microsoft’s Tweak can check the options for not sending infor- Open field, and click OK. Double-click
UI (www.microsoft.com/windowsxp/down mation about your player to Microsoft or any Service to bring up its Properties win-
loads/powertoys/xppowertoys.mspx). You not starting the Media Player in the Guide dow and in it the description drop-down
can browse through the many options in
Tweak UI for yourself, but we’ll drill to
some essentials.
Turn off balloon tips. Highlight the
Taskbar And Start Menu line, uncheck If you want a clearer, cleaner view of your As you install more applications to the
Enable Balloon Tips, and click OK. image thumbnails in a folder, you can sup- Windows Desktop, the Programs menu
To return or remove essential icons press the file names that appear beneath becomes disordered and cluttered.
to your Desktop. Click the Desktop each image. Make sure you’re not in thumb- Restoring alphabetical order to this mess
line, check/uncheck the appropriate nail view and then hold down the SHIFT key is a matter of deleting a Registry key.
boxes, and click OK. when you switch back into thumbnail view, First click Start, Run, type regedit in the
To stop Windows from starting which removes the file names. This change Open field, and click OK. Next go to
every CD or DVD you insert in the will stay in effect every time you revisit this HKEY_CURRENT_USER\SOFTWARE\
optical drive. Double-click My Com- folder and use thumbnail view until you turn MICROSOFT\WINDOWS\CURRENTVER-
puter, AutoPlay, select Drives, uncheck it off. To turn it off, switch out of thumbnail SION\EXPLORER\MENUORDER and high-
the drives you want to disable for view and back in again holding the SHIFT key light and delete the Start Menu2 subkey.
AutoPlay, and click OK. to restore the default setting. Close the Registry Editor and reboot.

96 June 2006 / www.computerpoweruser.com


TIPS & TRICKS

click Add/Remove Windows Components


on the left-hand side, uncheck Indexing the indispensable menu delay tweak
Service, and click Next and Finish. that reduces this default lag. In the Regis-
try Editor, go to HKEY_LOCAL_MA-
Spare Your Drive CHINE\SOFTWARE\MICROSOFT\
Reclaim disk space by disabling or re- WINDOWS\CURRENTVERSION\
setting a number of WinXP functions. EXPLORER and open the MenuShow-
Right-click the Recycle Bin, select Delay Value. Change the value to 300 or
Properties, and adjust the slider to reduce 200 and then reboot.
the percentage of your drives the Bin uses
Quicker Exits
to store deleted files.
Microsoft’s Tweak UI PowerToy is a good If the hiberfil.sys exists in your root The only thing more frustrating than
shortcut to the essential tweaks every directory, then Windows’ disk-hogging long boot times is a long shut down time.
power user might like to make when he Hibernate function is enabled. If you The widely known culprit involves
reinstalls Windows. never use Hibernate, double-click Power Windows waiting for Services to shut
Options in the Control Panel, click the themselves down first. To change this dra-
options for stopping the service now, let- Hibernate tab, and uncheck the Enable matically, in the Registry Editor go to
ting it start automatically, disabling, or set- Hibernation box to turn it off and save HKEY_LOCAL_MACHINE\SYSTEM\
ting it to Manual. up to 1GB of space. CURRENTCONTROLSET\CONTROL
System Restore can eat up to 12% of where you’ll find the WaitToKillService-
Add Prefetch Switches your hard drive unless Timeout. Double-click the value and
To launch third-party you tame it. Right-click change the Value Data to 10000 or lower
apps faster, create a My Computer, select after you try it out. Be careful, though, set-
Desktop shortcut for the Properties, and click the ting it too low can inadvertently shut down
program, right-click the System Restore tab. programs too quickly and lose data.
app, and select Prop- Highlight your main
erties. In the Target box, hard drive and adjust the by Steve Smith
type /prefetch:1 at the slider. (This will limit
end of the command the number of restore
line and click OK. points Windows saves.)
Of course, if you like
Optimize Prefetching working without System
xp-AntiSpy lets you quickly plug all of
WinXP’s prefetch sys- those security and privacy holes that Restore’s safety net, you Hydro-Power!
tem can speed boot and Windows leaves wide open by default. can check the Turn Off he search for natural renewable
application load times by
preloading parts of fre-
System Restore box. T energy sources is ongoing, but
Tango Group Limited is taking a whack
quently used programs into memory. Terminate DLLs at water-powered technology on a
To optimize the setting, open the Reg- Windows can junk up its own memo- small scale. Tango has launched a line
istry Editor, go to HKEY_LOCAL_ ry by holding onto a terminated pro- of water-powered gadgets, including
MACHINE\SYSTEM\CURRENTCON- gram’s DLLs. To stop this function, three digital clocks, two calculators,
TROLSET\CONTROL\SESSION open the Registry Editor, right-click the and a water-powered battery (for use
MANAGER\MEMORY MANAGE- HKEY_LOCAL_MACHINE\SOFT- in Tango’s water-powered gadgets).
MENT\PREFETCHPARAMETERS, and WARE\MICROSOFT\WINDOWS\ When the water evaporates from the
double-click EnablePrefetcher. Type 3 in CURRENTVERSION\EXPLORER device’s reservoir, just fill ‘em back up,
the Value Data field to enable both boot key, click New, Key, and then name it and they’re ready to go. Batteries not
Source: tangogroup.net/products.php

and application prefetching, which acceler- AlwaysUnloadDLL. Double-click the included (and not needed).
ates both operations noticeably. Default value in the right-hand pane
and set the Value Data to 1. Reboot for
Disable Indexing this to take effect.
Unless you do a lot of file searching, this
background task adds unnecessary memory Snag That Lag
use and disk thrashing when you access a It’s a new Windows installation, but
file. To turn it off, double-click Add Or why are Start submenus popping up so
Remove Programs in the Control Panel, sluggishly? Because you need to put in

CPU / June 2006 97


TIPS & TRICKS

right pane. Clicking the Icon View and


Tree View options changes the view be-
tween displaying files and folders as icons
and displaying files and folders as smaller
icons with additional information attached.
If you click and hold these buttons, a sub-
menu appears from which you can choose a
more detailed version of that view. These
additional options include:
Multicolumn View—aligns icons in
columns instead of rows.
Info List View—displays filenames
and small icons in the same format as
the Tree View but without additional
Explore With Konqueror file information.
Detailed List View—same as the Tree
View, but folders aren’t expandable with-
in the window. Tree View does provide
ast month, we looked at Nautilus Home—displays a directory tree for an option to view a folder’s contents

L (page 98), the file manager for the


Gnome desktop environment.
This month, we turn our focus to
Konqueror (www.konqueror.org), which in
addition to being a Web browser, is also the
your Home folder in the left pane.
Metabar—displays data about the file
or folder that is currently selected in
another pane or that’s entered
in Konqueror’s address bar. If
beneath that folder.
Text View—same as the Detailed List
View but with no icons.

file manager for the KDE desktop environ- you can perform actions on
ment. For this article we used Konqueror the file (for example, opening
version 3.5.2, which we took from a a text file with a text editor
Kubuntu LiveCD distro. If you’re already installed on your system), a
using KDE, check the Konqueror version list of possible actions will dis-
you have by opening Konqueror and select- play in the left pane.
ing About Konqueror from the Help menu. Network—an interface that
provides easy access to major
Find Your Way Around KDE FTP and Web resources.
When you open Konqueror initially, it Root Folder—displays the
may greet you with a relatively bare-bones directory tree for your entire
version. If so, you can click Settings, file system in the left pane.
Toolbars, and Main Toolbar to display This is the view many users Not only is Konqueror a file manager for the KDE
the Show Navigation Panel button. You unfamiliar with Linux expect desktop environment, it’s also a Web browser.
can use this button to display a side pane. to find in a file manager.
If you’d rather not have this additional Services—a catch-all interface for vari- Image View—a three-paned approach
toolbar shown, just close it from the ous programs and configuration options. that displays a file-system tree in a far-left
menu. With the side pane open, however, System—a file-system browser orga- pane, thumbnails of images contained in a
you’ll notice a series of tabs along the left nized by drives, devices, and network selected folder in a middle pane, and con-
that includes the options: shares rather than a directory tree. tents of a selected image in a far-right pane.
Amarok—if you have the Amarok File Size View—a two-paned view in
music utility installed, an icon of a howl- Control Folder Content Views which the left pane displays a file-system
ing wolf is the first tab shown. Clicking it Konqueror also offers an interesting tree and the right pane displays a graphical
loads Amarok in the left pane to let you selection of options for viewing the con- representation of the selected file’s size.
navigate the music-building program to tents of a folder. You can select one of the
your music collection. various options by clicking View and then Konqueror As A File Manager
Bookmarks—loads your Konqueror View Mode or use one of two view buttons If you’re using Konqueror for file-man-
bookmarks in the left pane. available in the window. The view buttons, agement purposes, chances are good you
History—loads your Web surfing his- along with a collection of other icons, only have the side pane enabled and the Root
tory in the left pane. appear when there are files displayed in the Folder or Home tabs displayed. In either

98 June 2006 / www.computerpoweruser.com


TIPS & TRICKS

case, using Konqueror remains the same.


In a typical KDE setup, you open a file/
folder in Konqueror with a single click.
There are typically also arrows or plus signs
next to folders to expand them (if you’re In addition to Konqueror’s
using a view that offers this feature). main toolbar at the top, the
To move or copy a file from one loca- program also offers a side
tion to another in Konqueror, just click pane to the left where you
and drag it to the new location, after can access various tabs.
which a dialog box will ask if you want to
move or copy the file. You can also right-
click a file you want to move or copy and
in the resulting context menu select either
Move To or Copy To. Selecting multiple
files/folders works the same in Konqueror
as in Nautilus. Just press and hold the contains various options. If not, click features. Think of it as KDE’s Swiss Army
CTRL key while clicking one at a time Help and Konqueror Introduction. You Knife, compass, and everything else. For
the files you want included. If you want a can return to this point at any time by more tips and tricks on how to use
chunk of files that are listed in order, opening a new Konqueror window or just Konqueror, go to the Starting Points
select the first file, press and hold the using the Back arrow. Options include: screen and click Tips. This will display a
SHIFT key, and click the last file. Right- Home Folder—the contents of your page of hints to make even better use
clicking a selected group of files will dis- home directory. of Konqueror.
play a context menu offering options Network Folders—shared folders
beyond the standard Cut, Copy, Rename, available via Bluetooth, Samba, and other by Dee-Ann LeBlanc
and Move. Some of these include: network interfaces. An Add A Network
Open With—a selection of applica- Folder option lets you add WebDAV and
tions the OS offers to open the file/folder. FTP tools, Windows drives (through
There’s also an Other option to use a pro- Samba), and SSH sessions.
gram not shown in the menu.
Preview In—a selection of tools for
Applications—a list of installed pro-
grams on the system.
Flash Pet Collar
oes your dog like to run wild or
displaying a file/folder’s contents inside
Konqueror without needing to open a
Storage Media—a list of the system’s
storage options. D your cat fancy an occasional night
out on the town? If so, help keep track
separate program. Other is an option Trash—the contents of your trash can.
here, as well. About Kubuntu—in a default Kon- of your little critters with the MicroID
Actions—a set of common options queror setup, this option points to Collar, a device that puts a flash memo-
related to a file. For example, options for Settings, which opens the KDE Control ry card and USB controller right into a
a text file might include printing it, edit- Center. In Kubuntu this option opens an pet collar to electronically store the

www.informationweek.com/news/showArticle.jhtml?articleID=183702747
ing it as the root user, creating a data CD About Kubuntu dialog box. pet owner’s contact information. The
using the K3b app, and transferring the There’s also a search option in Starting MicroID Collar also lets pet owners store
file via Bluetooth. Points that acts as a GUI to the OS’ locate detailed facts about their pets, including
Compress—options for creating various command, which helps you search for files. medical information, related treatments,
archive types from the file/folder or adding and any other useful information. Any-
the file/folder to an existing archive. Konquer Your Desktop one who finds a lost pooch or kitty can
Properties—provides a preview of the You can use Konqueror as a file man- then access that data by inserting the
file’s contents and opens a Properties ager, Web browser, and a viewer to see card into a computer. Jonathan Warren
dialog box for the file with options for your documents, but it’s also a one-stop of West Palm Beach, Fla., invented the
viewing and altering file permissions. interface for many KDE settings and MicroID Collar, which recently won the
PetSafe Idea Fetch pet invention contest
The Start Points Screen over 5,000 other entries. The device will
When you launch Konqueror, you be available at PETCO stores this fall.
should see a Starting Points screen that

CPU / June 2006 99


Shavings From The Rumour Mill

All Roads Lead


To Merom
I tevenis a four
fact that for the last three or maybe
years, AMD has sold more note-
sized hard drive, other bundled software,
memory, connectors, and the rest, and it’s
books in retail in the USA than Intel. It is also hard even for a Via-based system integrator to
a fact that for the same period of time Intel compete with the likes of Dell and HP.
has sold more of its branded Centrino This brings us back to Intel Merom, the
machines to large organisations than AMD. dual-core CPUs that Intel will introduce at
That could be about to change, but the the end of this year in desktop, mobile, serv-
uncertainties in the notebook market—especially er, and Apple versions. We managed to get
now that we’re finally getting gaming and good some details of these processors between the
graphics support as well as larger screens—make last column and this—they are, as we pre-
it hard for anyone, least of all AMD and Intel, to dicted a good while back, 64-bit ready, but Mike Magee is an industry
be sure what’s going to happen. that doesn’t matter too much. By the end of veteran. He cut his teeth on
First, the bad news: Despite their best this year, almost every X86 CPU will be ancient products like the Dragon
efforts, neither Intel nor AMD have managed dual-core and 64-bit capable, well before any and the Japanese PC platforms
to design crafty CPUs that significantly extend consumer Windows operating system is long before the IBM-PC won. He
a notebook’s battery life. Indeed, our impres- ready, according to all accounts. worked for a corporate reseller in
sion is battery life has dropped, and the reason It’s likely Microsoft will introduce versions the mid-’80s and saw the Compaq
is clear to see. Screen sizes have got bigger, and of Vista which are 64-bit capable in time for 386 sandwich box and every GUI
whenever you rev up a processor and chipset, the massive onslaught from both AMD and known to humankind. Mike
it’s inevitable that the overheads in terms of Intel, but we very much doubt that any but decided that the way to go was the
power consumption increase, as well. There’s the most dedicated CAD, design, and data- Interweb around 1994 after
no getting away from it. base vendors will have software waiting for editing PC mags in the late ’80s
Oh, there’s more bad news. Fuel cell tech- the processors. Microsoft may make some and ’90s. A co-founder of The
nology is still in its infancy, and even research gestures toward 64-bitness with the introduc- Register, Mike started the
and development-intensive Intel hasn’t man- tion of Office 2007 in, er, 2007, but no one chip-driven INQUIRER
aged to come up with a viable design. A recent is really expecting the software vendors to put (www.theinquirer.net) in 2001.
report suggested Casio could be on the verge their weight behind this in what still seems He has contacts from top to
of a breakthrough, but “could be” is a long like the early years. bottom in the business, spanning
way from a product you can buy, so we’re a Nor will you find many firms making drivers the entire chain, who help him
few years away from 20-hour notebook bat- to join the 64-bit bandwagon, we predict. Few root out interesting rumours
tery life, still. And very unfortunately. enough rushed to support Windows XP 64 and speculation.
Still, using CPUs designed for notebooks when that came out, and that means they’ll
but with a power socket is a great idea; we’re want to keep their current peripherals compliant By the end of
seeing such machines from Intel during the with 32-bit Windows, especially as not everyone
course of this year. They’ll be quiet and will want to join the Microsoft Vista band-
power-efficient. They’ll also be expensive, but wagon for a while yet. this year, almost
this is the PC industry. And because Intel Hyper-Threading is
Via’s latest CPU is not on the side of power
intensive at all, and one or two PC firms have
rather a defunct technology now that dual
cores have come along, you’re unlikely to see
every X86
already started selling machines using the tech. any vast improvements in performance
Guess what? They’re still going to cost you because the clock speeds are going to be pretty CPU will be dual-
around $500 or so, and that’s because of the similar anyway.
high cost of the other components surround- Except, possibly, in the case of Apple
ing a CPU. Although notebook LCD panels machines. Because they run Mac OS X and a core and 64-bit
continue to fall in price, add in a copy of driver port is theoretically easier for this OS
Microsoft Windows XP Home, a reasonably than for Microsoft. ▲ capable . . .
Send rumours to “Mad Mike” Magee at Mike@cpumag.com.

CPU / June 2006 101


Hot Seat

Power Management:
From The Edge Of Mobility To The Center Of The Enterprise

F orrarelyyears,heard“power management” was a term


in processor or system design
• A 120-watt processor pulls 100 amps of
current, while a washing machine draws
circles, unless you happened to be designing a five to 10 amps. Talk about dirty laundry!
new notebook PC or mobile phone. The
“clock race” around desktop and server com- In all seriousness, power management is very
puting resulted in power consumption and complex and not always understood at the user
management taking a back seat to speed. But level. The multi-faceted and pervasive nature of
recently, three parallel trends have moved the power will demand clever and creative ways to
topic of power management to the forefront overcome the limits of technology scaling and
of processor and system design. power density at the silicon level. Just as the
First, the emergence of mobile computing as industry did with increasing overall perfor-
a critical mode of computing focused attention mance, power efficiency advances are a system-
on some very real challenges around improving wide phenomenon. Even as AMD continues its Phil Hester is corporate vice
battery life and lowering heat . . . and the solu- pioneering work on “performance-per-watt” as a president and CTO at AMD,
tions for mobile computing began to flow across design goal, there remain tremendous opportu- responsible for setting the
the entire computing spectrum. nities at multiple levels of the overall solution. architectural and product
Second, the increasing power densities that At the process level, for example, our R&D strategies and plans for
were part and parcel of the clock-rate paradigm teams are consistently creating higher perfor- AMD’s microprocessor
were becoming increasingly problematic. You mance, more power-efficient transistors. To business. Hester also chairs
simply couldn’t cool things efficiently anymore. ensure we stay at the forefront of processor per- the AMD Technology Council,
The emergence of dual-core and multi-core formance-per-watt, we have set a goal of intro- ensuring that product
was the final element that brought power man- ducing these new transistors about every quarter, development, integration, and
agement into the spotlight as a critical design continuing the rate of technology improvement. process organizations align
consideration. How loads run on different cores, At the design level, we are investigating new technology capabilities with
how they can be managed more efficiently, and ways of increasing power efficiency by control- product direction.
how we continue to add more and more intelli- ling the individual power envelopes for each of
gence inside the processor, all have helped to the cores within our multi-core designs.
focus attention. End-user demand for lower With the emergence of 64-bit desktop OSes
power solutions is growing rapidly across all and applications, the push to parallelism on the
industry segments, led by enterprise customers. desktop gives us opportunities to think more sys- . . . power
In the spirit of disclosure, I queried some of temically about power efficiency in the context
my colleagues in AMD’s technology develop- of multithreaded applications, for example
ment group about their experiences and obser- aggressive use of “P-state” and “C-state” at the becomes
vations on the power management topic, so OS level to autonomously mange power. While
this article also reflects their contributions. multi-core inherently gives power efficiency a
Since power management is such a huge focus boost today, there’s much more to come in time. just as
for us at AMD, I thought I might get some One of our most important goals in this effort
interesting responses. Here are a couple of is to deliver maximum performance, per watt,
data points that rarely make it to the surface: per dollar, per square foot in the data center. critical a
• For every watt consumed by a typical comput- When you look at the true “total cost of owner-
er, the physical server/computer installation
requires two additional watts, most of it for
ship” of a PC, power becomes just as critical a
component as software or support. Even as we
component
cooling. When you consider the average cost approach some limitations (like voltage scaling)
of a commercial kilowatt/hour in October
2005 was 8.89 cents, and multiply that by the
and opportunities (like new materials and pro-
cesses) it’s clear that power management and
as software
sheer number of desktops and servers in use, efficiency are now integral considerations for any
you can see why IT managers are paying a lot
of attention to power consumption.
processor design. The power imperative has
moved from the edges into the mainstream. ▲
or support.
Send comments to Phil@cpumag.com

102 June 2006 / www.computerpoweruser.com


What’s Cooking . . .

Technically
Speaking
An Interview With Katherine
Albrecht, Author & RFID Watchdog
atherine Albrecht has been called the Erin Brockovich of
K RFID. She defines a consumer privacy expert, however, as
“someone who pays attention to the risks that consumers run
when they go about their regular business.” Albrecht’s actions
would seem to back up her words. She’s the founder and direc-
tor of CASPIAN (Consumers Against Supermarket Privacy
Invasion and Numbering), a consumer watchdog group that
has more than 12,000 subscribers to its Web site (www
.nocards.org) and representatives in all 50 states and 30 coun-
tries. Albrecht, who’s finishing up a doctorate degree in con-
sumer education at Harvard University, is also the co-author of
“Spychips: How Major Corporations And Government Plan
To Track Your Every Move With RFID.”

by Barry Brenesal

CPU: What is your main concern about whereby when a consumer made a pur- recommend it both for identifying and
RFID technology? chase, the consumer’s identity would be tracking people as they move around in
linked with the unique number on the public locations and quasi-public locations,
Albrecht: It’s an incredibly powerful RFID tag at the point of sale. It’s stored in such as retail stores. They also recommend
technology that easily lends itself to abuse. the database. Right now, there are compa- using it for marketing purposes. One exam-
RFID readers can be placed invisibly in the nies that specialize in consolidating that ple they gave is looking in a woman’s bag
environment. RFID tags can be placed on point-of-sale information from various because the radio waves from RFID travel
clothes and in people’s belongings. And retailers. In fact, one company, IRI (Infor- directly through what we usually rely on to
maybe the most worrisome part is that the mation Resources, Inc.), states that they protect our privacy, like backpacks, bags,
companies that are aiming to put the read- consolidate information from over 30,000 and purses. If she’s carrying a baby bottle,
ers in the environment and the tags into different retail locations into centralized then they recommend interactive electronic
people’s belongings have spelled out some databases. The concern is that this informa- advertising to spam her with environmental
pretty frightening plans for how they hope tion would be linked, so that instead of ads of other baby products.
to abuse the technology—literally to use it knowing that I wear size 7 Nike running
to spy on people. shoes, they would know I wear size 7 Nike CPU: Any mention of looking inside
running shoes with a unique ID number. someone’s bag is going to raise the hackles
CPU: What could RFID tagging track? And as IBM goes on to explain it, now that of a lot of people, but realistically how far
you have this link between the individual away can a company track RFID tags?
Albrecht: Probably the best example is a and the item, when those people walk
patent from IBM called “Identification and around, you capture the unique RFID Albrecht: It depends on what kind of
tracking of persons using RFID-tagged numbers from their belongings by hiding tag you have, what the frequency is, and
items.” They filed it a few years back. IBM reader devices in the environment. Then the strength of the reader. For the
has been in on the RFID/EPC (Electronic you can cross-reference them in your data- 13.56MHz tags that they’re talking about
Product Code) formal plan for many years. base and have a pretty good sense of who doing item-level tagging and barcode
Essentially, what they describe is a system just walked by [the hidden reader]. They replacement, you’d probably get about 3

104 June 2006 / www.computerpoweruser.com


What’s Cooking . . . Technically Speaking

to 5 feet of read range. And obviously, from a satellite, as in finding a hiker lost in dollars of investment. It’s a sleeping giant
with 3 feet of read range, you could read the woods. You’re not going to be able to because the industry has kept its growth
tags on somebody going through such a read their implant from a satellite. You’re and advancements out of the public eye.
doorway. We also found that Philips Elec- not even going to be able to read it from You’ve got corporations and governments
tronics has developed an RFID antenna across the road. pouring huge sums of money into develop-
that can be invisibly woven into a shoe. It ing the superstructure, and you’ve got the
can be read from reader devices in the CPU: So the main problem isn’t the dis- average citizen having no input into that
floor—and try getting more than an inch tance a RFID tag can be read but rather the decision-making process because they’re
away from the floor. You don’t need a lot quantity and quality of information that’s not even aware that this is going on.
of read range to read somebody who’s lit- shared through the use of the technology?
erally standing on top of your reader. CPU: Can effective legislative controls
Not only does IBM want to use this to Albrecht: The developers of that tech- be put on RFID tagging and reading?
identify and track people for marketing pur- nology are the people who actually envi-
poses, they recommend putting this tech- sion a network of readers that would be Albrecht: I really don’t believe that the
nology into the hands of law enforcement. everywhere. If and when that does occur, answer to solving our privacy problems is
They give their list of locations where they when every doorway is rigged with an going to the legislatures with our hats in
think it would be appropriate to place these RFID reader, when every doormat has our hands and asking for help. The one
[tag readers] that—the hair stands up on the one in it, when these are in shelving and role I think is appropriate for legislation is
back of most people’s necks—museums, ceiling tiles, it becomes an issue of distrib- to make sure people know where the
libraries, shopping malls, sports arenas, the- ution and instant computer analysis. RFID tags are. Some consumers will
aters. They even talk about putting RFID choose to embrace them and seek out
readers in public restrooms. The concern is CPU: On the Web site 463: Inside Tech products using RFID. I say more power
that as you walk around, you could be iden- Policy, it states, ‘. . . beyond electronic to them. Other people will choose to
tified with a form of ‘virtual frisk’ based on payments, RFID technology is still a far avoid products containing RFID. But let
all your possessions. That’s why I think ways away from moving from the pallet consumers make that decision. Let the
RFID is particularly insidious—because you to the product level.’ Would you object to marketplace decide.
can do it invisibly, silently, and secretly. No

We oppose RFID tagging when it winds up in the hands of the


consumer, period. — Katherine Albrecht
one need ever know that you did it. So if RFID tags on packaging as opposed to CPU: Can you foresee a situation where
you are a marketer, you could use that in the label or product? the majority of consumers don’t care, and
a lot of sneaky ways. If you are a govern- you’ll have to buy and use products that
ment agent, then it starts becoming Albrecht: We oppose RFID tagging employ RFID tagging?
downright chilling. when it winds up in the hands of the con-
sumer, period. As far as the packaging Albrecht: That could happen. That is
CPU: Do you see positive benefits for goes, we found one patent by an IBM- one of the risks of letting the market
some uses of RFID tags? What about tag- supplier company called Isogon [IBM decide.
ging small children in a mall, which the acquired Isogon in July 2005] for a reader
Legoland Denmark theme park is reported- device that can be put on the side of a car. CPU: Then that gets back to the issue of
ly pursuing? Tagging some pets? Tagging You can drive down the street on garbage legislation as a prophylactic.
criminals in minimum-security facilities? collection day and scan people’s trash.
Albrecht: The heavy-handed legislative
Albrecht: Regarding the theme park, I’d CPU: So is the RFID industry growing solution would say this stuff is dangerous,
like to actually look at the reports on that too quickly? therefore ban it, limit it, control its use.
and see what they’re doing. I know that in And there are many privacy organizations
Mexico the news reports suggest RFID will Albrecht: Beyond a doubt. There have out there that advocate that approach.
prevent kidnappings, so people are encour- already been hundreds of millions of CASPIAN just is not one of them.
aged to sign up and get VeriChip implants.
But I really think they’re relying on the Subscribers can read bonus content with Katherine Albrecht at
misconception that an implant can be read www.cpumag.com/cpujun06/albrecht

CPU / June 2006 105


What’s Cooking . . .
by Kristina Spencer

Under Development
A Peek At What's Brewing In The Laboratory

Wi-Fi Catches The mmWave RFID Tags Go Plastic


othing ruins the eye candy of a sleek There have been previous attempts to har- he ability for manufacturers to place
N wall-mounted flat-screen TV like the
bundle of cables required to connect the TV to
ness mmWave frequencies for data transmis-
sion, but they resulted in expensive, bulky
T RFID tags on every item they make
and sell could be a retailer’s dream but a pri-
the DVD player, cable box, and other periph- solutions. IBM researcher Brian Floyd vacy advocate’s nightmare. Tagged items
erals. Although you can organize, disguise, or explains that the new technology improves would make it easier and cheaper to track
hide the wires, the speed and data transmission on these past attempts in several ways. “Our inventory during shipping and while on the
limitations of current Wi-Fi technology present chipset uses IBM’s standard silicon technolo- shelves. But some consumer watchdog
a serious hurdle for any digital aesthete looking gy and integrates all analog portions of the groups are concerned someone could use
to cut the cords. But this may soon change. radio. Additionally, we have embedded the active RFID tags to track items and those
Scientists at IBM’s Thomas J. Watson antennas directly into the package, where a who use them after the items leave the store.
Research Center recently announced a new prototype module consisting of a receiver, (See page 104 for more on RFID tags.)
chipset that’s capable of transmitting and transmitter, and two antennas occupies an The debate has remained academic thus
receiving data at up to 1GBps, bringing the area the size of a dime.” far, as item-level tagging hasn’t been feasible
dream of wireless HDTV much closer to “In the end,” Floyd says, “this results in a partially because of the cost of manufactur-
reality. Operating at 60GHz in an unli- very low-cost solution that should allow ing silicon-based RFID tags. Scientists at
censed portion of the radio spectrum known 60GHz to have much broader marketability.” Philips Research in The Netherlands, how-
as the mmWave (millimeter wave) frequen- Once the technology is refined and an ever, have created a fully-functional RFID
cy band, the chipset makes use of shorter IEEE standard is approved (currently in the tag based completely on plastic electronics.
wavelengths that transmit data much faster early stages in the 802.15.3c working group), The paper-thin, postage stamp-sized tags
than today’s Wi-Fi (which uses 2.4GHz or IBM hopes electronics manufacturers adopt can transmit ID codes at the industry-stan-
5GHz bands) can. An additional benefit of the technology very quickly. Floyd believes dard 13.56MHz, and no complex assembly
mmWave technology is that its transmission consumers could begin seeing 60GHz prod- steps are required to print the tags (and an
range, limited to about 30 feet, creates a ucts—such as wireless HD multimedia inter- antenna) directly onto a plastic substrate.
WPAN (wireless personal-area network) faces on TVs and peripherals and WPANs The scientists also developed a 64-bit
inaccessible to neighbors or passers-by, mak- used to connect various home portable code generator to show that circuits com-
ing WPAN far more secure than wireless devices—hitting the market within two to plex enough for item-level tagging is possi-
LANs that can transmit up to 150 feet. four years. ▲ ble with the plastic electronics. “We have
proven that the number of bits of the iden-
Philips has created the first fully functional 13.56MHz all-plastic RFID tag, tification code is not the limiting factor in
which is paper-thin and no larger than a postage stamp. plastic RFID,” says Steve Klink, senior com-
munications manager for Philips Research.
“So whatever amount of bits the standard
will require can be realized in plastic RFID.”
Klink notes that while photolithogra-
phy was used to make the tags, “to fully
exploit all the benefits of plastic electron-
ics for RFID applications, the tags would
have to be manufactured by in-line pro-
cessing (printing steps) instead of batch
processing (photolithography).”
The sale of plastic RFID tags is still a
ways off. Klink says, “We have shown the
technical feasibility of plastic RFID tags;
the next step is to demonstrate the produc-
tion feasibility. This will still take a couple
of years of research.” ▲

106 June 2006 / www.computerpoweruser.com


What’s Cooking . . . Under Development

Color-Coding The Web


Web site link. When reader
software that’s installed on a
device with a CCD/CMOS
camera (such as a cell phone)
scans the code, it’s transmitted
to the server, which then deliv-
ers the linked content.
One potential downside is
that because someone could
scan and print ColorCodes, he
could alter a ColorCode in a
ou’re reading a magazine That small, colorful image is pattern of lines, a standard way that could re-route the
Y or watching TV when an
ad catches your eye. You make
a ColorCode, and ColorCodes
are starting to make a splash in
ColorCode uses four colors
arranged into a 5- x 5-cell
code to a different piece of
data. Unless this vulnerability is
a mental note of the Web site Japan and South Korea where block that’s much easier for addressed, the technology isn’t
address, intending to surf to it codes are showing up in print scanners to read, even at long a likely candidate for any trans-
later when you’re at your com- media, TV, clothing, and on distances and with poor resolu- actions requiring secure access.
puter. The moment passes, postage stamps and at art gal- tion. Codes can be as small as a Although you will need to
however, your attention moves leries. A company called Color- 3mm square with no upper visit Japan or Korea to see
on, and you never follow up. zip is now marketing the tech- size limit and can be easily ColorCode in action, that may
Imagine instead that you can nology, which Korean research- incorporated into company not be the case for long. Ac-
aim your cell phone or PDA at ers first developed in 2000. logos and graphic designs. cording to Colorzip’s Web site,
a small, colorful image in an Think of ColorCodes as Each unique ColorCode is it has three patents pending in
ad, click, and download data barcodes but better. While bar- indexed on a central server and the United States and is cur-
on the spot relating to the codes differentiate between linked to a piece of data, be it rently “considering USA and
product or company. items through a very intricate text, video, photo, music, or a Europe operations.” ▲

Want Email Out Of Your Inbox? Step On It!


ven with a well-config- Using a Dance Dance Rev- the dual step, which lets users Meyers, a Step User Interface
E ured spam filter, infor-
mation workers and heavy
olution floor pad as the input
device, StepMail lets users
delete mail with a satisfying
stomp of the feet, proved the
Project Group member, in a
Microsoft press release. “By
email users may have to still scroll through, open, delete, most enjoyable action, accord- allowing information workers
scan and delete dozens, if not and flag messages for later ing to comments from those to stand and continue to read,
hundreds, of email messages response. StepPhoto lets users involved in the study. delete, and flag email messages,
every day. But what if instead sort through and review digital Because the Step User In- StepMail gives them a break
of having to use a keyboard photos in a similar manner. terface programs provide no from the keyboard and mouse,
and a mouse to perform this Different step commands— way of actually entering text, which reduces the risk of
repetitive task you could use single step, step and hold, and the apps weren’t intended as a repetitive stress injury in their
another body part? Say a foot a dual step requiring a jump— replacement for a mouse and hands and wrists and engages
or two? accomplish the various actions keyboard. “We wanted to pro- more of their bodies’ muscles.”
That is the idea behind in both apps. Not surprisingly, vide an alternative,” says Brian Don’t expect the next release
StepMail and StepPhoto, two of Outlook to come with a
programs recently demonstrat- dance pad included, but alter-
ed at Microsoft Research’s native user interfaces based on
TechFest 2006. The Step User this research could eventually
Interface Group designed the find their way into Microsoft
programs and tested them products. The Step User Inter-
using a small group of partici- face Group plans to continue
pants as a possible solution to exploring such improvements
combat rising incidents of to the system as voice-assisted
repetitive stress injuries and text entry and smaller and
soaring obesity rates among more portable input devices. ▲
information workers.

CPU / June 2006 107


back door | q&a

Q&A With Robert &


Richard Garriott

R
obert and Richard Garriott We’re only now just
have been making video
games together for more
Ri getting out our
online games. Ultima
than 25 years. Richard pub- Online, EverQuest, and
lished his first game, Akala- World Of Warcraft are first-
beth, for the Apple II computer in 1977. generation games, meaning
Robert was an “overeducated” older the teams that made them
brother collecting degrees until he started did not do much before that.
collecting money from Richard’s early They are medieval fantasies where
publishers. Together the Garriott brothers you’re grinding through levels. The
co-founded Origin Systems in 1983. At pace is plodding. You constantly re-
Origin, Richard focused on creating games spawn your avatar. Now with Guild
such as the Ultima fantasy role-playing Wars and City Of Heroes, with
game series; Robert worked on the busi- Auto Assault and Tabula Rasa, these
ness side. In 1992 Electronic Arts bought are more fast-paced games. They’re
the company, but Richard stayed on to action-oriented. The play is more
create Ultima Online. The Garriotts dynamic. The entire stage of the
joined NCSoft in 2001. The Academy of play environment changes over time. but the real number you need to make
Interactive Arts & Sciences and the Game You get story lines. your development costs back is higher.
Developers Choice Awards recently hon-
ored Richard with a lifetime achievement Is there a limited number of people What are some of the opportunities
award. He’s also working on his next
online game, Tabula Rasa (as of this writ-
Q interested in these games? Q for NCSoft in the U.S. market?

ing). Robert is the president and CEO the World Of Warcraft has passed 6 If you look at the fantasy role-
North American subsidiary of NCSoft in
Austin, Texas.
Ro million subscribers, and people
say that it’s the limit. It’s hitting new lim-
Ro playing online game, it’s about
80% of the online games market now.
its every day. In South Korea we did well But as a genre, it’s a very small part of
After 25 years, what are some of with Lineage, another medieval role-play- the overall games market. That’s an
Q the things you’re still learning
about games and who plays them?
ing game. The original game had a great
number of subscribers. Now there are still
anomaly. NCSoft is still the top compa-
ny in the medieval/fantasy role-playing
a lot of concurrent users. When World market. We love it, but there is more we
We get new surprises every year. Of Warcraft came out, people said that can do. There are all these other genres
Ri When we launched Ultima Online
in 1997, we built a virtual landscape. We
Lineage would go away, but both games
still have big numbers.
that no one is doing.

get a million people to move in. But only What’s in the future for online
10 to 20 are in the city. Things go horribly
wrong. And you, as the designer, didn’t Q City Of Heroes has been a suc-
cess for NCSoft even with a
Q gaming?

have any way to communicate to players smaller number of subscribers. How Online invisibility. You used to
what went wrong. We observed emergent
behaviors. We spent a lot of time building
many subscribers do you really need to
make money?
Ro be able to tell who was a com-
puter-controlled, non-player character
things. We built a virtual economy. The and who was a real person. Over time it’s
herbivores would multiply in one area. The About 100,000 subscribers. The harder to tell the difference. You will go
predators would come in and eat the vil-
lagers. Players came out in force and killed
Ro problem is that product develop-
ment costs are skyrocketing. In 2001, it
into the game, and you won’t know who
is real. You can be online, and it’s going
off all of the predators. Then the herbivores cost about $5 million to make a quality to be invisible to the other player, where
would multiply. game. Now it’s $15 million to $25 mil- he can’t tell the difference. ▲
lion. The return on investment has not
What are you trying to do to make gone up three to four times. You still need
Q your games popular? the 100,000 subscribers to make a profit,
Subscribers can go to www.cpumag.com
/cpujun06/garriott for bonus content.

108 June 2006 / www.computerpoweruser.com

Вам также может понравиться