Corsair Vengeance DDR3-1600 MHz 16 GB: ideal for overclocking

According to sources, the range of Corsair added a new set of dual-channel memory modules Vengeance DDR3-1600 . In the catalog of the manufacturer set was designated CMZ16GX3M2A1600C9 .
 
The set consists of two modules total volume of 16 GB. The modules support the latest Intel XMP 1.3 Profiles and aim to work in tandem with Intel last generation (Ivy Bridge). The modules operate at 1600 MHz with 9-9-9-24 latencies with a voltage of 1.5 V.

The cost of memory modules Corsair Vengeance DDR3-1600 is 135 dollars.
Below the specifications:
Cooling methods
heatsink
Energy management
Voltage of the
1.5 V
Memory
Internal memory
16384 MB
Internal memory type
DDR3
Memory clock speed
1600 MHz
Appropriate use
PC / server
ECC
-
Memory layout
2 x 8192 MB
Memory form factor
240-pin DIMM
CAS Latency
9
Lead Plated
Gold
Type of packaging
DIMM
Unbuffered memory
Yes
Packaging
Package weight
59 g
Packing Dimensions (WxDxH)
15 x 135 x 150 mm

Corsair the line of DDR3 Vengeance with a new kit Dual-Channel 16 GB and a frequency equal to 1600 MHz The kit is initialed CMZ16GX3M2A1600C9 and is composed of two modules of 8 GB with timings to 9-9-9-24 and operating voltage of 1.5 volts. The modules are then equipped with the classic sink that characterizes the rest kit Vengeance and that can also do overclock safely.

Security Update 2012-004 for OS X automatically disables Java

Apple rolled out a security update for the operating system OS X, which covers vulnerabilities in the technology of Java, is used in all modern browsers. This company has reported on a special page of the official site technical support Apple.
 
Apple has to pay more attention to the relevance of Java in your operating system, Mac OS X after the discovery of a zombie network Flashback , which contained about 700 000 computers. A botnet has been created by the Trojan, exploiting vulnerabilities in the technology of Java.

"In Java, there are many security vulnerabilities, some of which allow third-party applets to execute malicious code," - said in a statement accompanying the update. Apple has not said whether there were reported cases of the use of these vulnerabilities to attack users of Mac. In «Java for OS X 2012-004» Company configures the operating system computers to automatically disable Java.

"This update configures the Java plugin to disable, if applets do not run in a long time. If the previous update, entitled «Java for OS X 2012-003» has not been established, the update immediately shut down a Web plug-in Java. Java applets can be re-enabled by pressing the field labeled "inactive plugin" Web page "- according to the documentation for the upgrade.

In early April, it became aware of the existence of the botnet Flashback. It was the first known botnet network of the Mac, which until this case is considered the most secure from malicious software. Investigation into the incident revealed that the creation of botnets has become possible because Apple is not time released a security update for Java, although the company Oracle - Software Developer Java - this update has produced a relatively long time. Soon after the discovery of a botnet Apple released the update, closing the vulnerability, but the number of infected computers for a long time remained significant.

In recent years, Apple is constantly increasing its sales of computers and the emergence of botnets Flashback may indicate that the anti-virus expert forecasts for an increase in the number of malware for Mac coming true.
 

Popular Posts

Most Reading

Tags

Android (474) Business (1) Food (1) Science (18) technology (132)

Nice Technology