Showing results 1 to 20 of 58

July 30, 2012 by

Fujitsu Stylistic M532 review

This smart-looking, lightweight 10.1in. Android tablet comes with a good range of preinstalled business software. Although its lack of support for USB devices and USB charging is unfortunate, Fujitsu has made an admirable job of producing a tablet that's equally usable in the office and at home.

November 4, 2009 by

Intel's 2010 roadmap

From hardware-accelerated AES encryption via 32nm manufacturing to GPU integration and six cores, Intel's CPU roadmap holds great promise. The chip-maker's upcoming Larrabee 3D graphics processor remains short on detail though.

July 6, 2009 by

Fujitsu LifeBook S7220

Fujitsu's LifeBook S7220 is a solidly built 14.1in. notebook with integrated mobile broadband, a comfortable keyboard and decent performance, so long as you don't need fast graphics.

January 28, 2008 by

Fujitsu Lifebook P1610

The Fujitsu Lifebook P1610 Tablet PC is a pint-sized tablet notebook which can handle a full range of applications, albeit at less than stunning operational speeds.

January 23, 2008 by

Fujitsu LifeBook E8410

Fujitsu E Series LifeBooks are designed to offer desktop-level functionality in a notebook format. Its screen is outstanding in terms of both resolution and image quality, and this alone makes it a viable desktop replacement system.

November 14, 2007 by

Fujitsu Siemens LifeBook S6410

The LifeBook S6410 offers a good combination of functionality and performance in a stylish ultraportable form factor. We particularly like the integrated 3G connectivity and the webcam, although there are also one or two let-downs.

July 23, 2007 by

Fujitsu Siemens Primergy TX120

Fujitsu Siemens’ Primergy TX120 offers full server functionality, while also meeting the needs of smaller businesses with its compact design, quiet operation and low power consumption.

November 11, 2006 by

Critical Broadcom Windows driver exploit released!

According to Johnny Cache, this particular exploit is extremely reliable and results in "100% ownage" which means your computer belongs to the hacker if it's attacked using this exploit. Since the exploit has been rolled in to the Metasploit 3.0 framework which includes kernel-level shell code, the exploit can be performed with a moderate amount of hacking knowledge. This flaw is extremely dangerous because it exploits the kernel of the operating system which means it bypasses all conventional security measures like anti-virus, HIDS, firewalls, and user privileges. The attack range is limited to Wi-Fi range which is typically 100 to 200 feet but can be extended with high-powered antennas.


You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.
See All
See All

Most Popular