ASE Labs
Welcome Guest. Please register or log in now. There are 1578 people online (0 Friends).
  • Home
  • Articles
  • News
  • Forum
  • Register/Login

News

January 31, 2011

Sandy Bridge Chipset (Cougar Point) Flawed

Poster: Aron Schatz
Posted on January 31, 2011 at 6:05:18 PM
Looks like a round of problems like the FDIV bug in Intel Pentium processors is about to happen again. It turns out that the Serial ATA controller on the Sandy Bridge chipset (not the CPU, itself) is flaky. It might or might not crap out on ports 2-5 which are generally the last ones used. If you have a hard drive and an optical drive, it is likely you'll never even know there is a problem. Even if you use the remaining four ports, the failure rate may be as high as 15% or so. If you have a board, it might be a good idea to find out the RMA policy.

Quote

The company expects to begin delivering the updated version of the chipset to customers in late February and expects full volume recovery in April. Intel stands behind its products and is committed to product quality. For computer makers and other Intel customers that have bought potentially affected chipsets or systems, Intel will work with its OEM partners to accept the return of the affected chipsets, and plans to support modifications or replacements needed on motherboards or systems. The systems with the affected support chips have only been shipping since January 9th and the company believes that relatively few consumers are impacted by this issue. The only systems sold to an end customer potentially impacted are Second Generation Core i5 and Core i7 quad core based systems. Intel believes that consumers can continue to use their systems with confidence, while working with their computer manufacturer for a permanent solution. For further information consumers should contact Intel at http://www.intel.com on the support page or contact their OEM manufacturer.


http://newsroom.intel.com/community/intel_newsroom/blog/2011/01/31/intel-identifies-chipset-design-error-implementing-solution
Tags Bugs Intel Chipset Sandy Bridge
[Print] [Top]
0 Comments
October 19, 2010

Microsoft nukes Zeus malware from 275,000 Windows machines

Poster: Daniel Doty
Posted on October 19, 2010 at 10:24:16 PM
According to Microsoft, the companies Malicious Software Removal Tool has nuked over 275,000 machines running Windows operating system of the Zeus malware, or better known as the Zbot malware. Here is what Jeff Williams from Microsoft had to say about it:

Quote

Of the 1,344,669 computers cleaned, this is about 1 in 5, a ratio that’s higher than we typically see even when accounting for the normal, first-month spike which results from adding a new family but not exceptionally so.

To put this in greater perspective the removals of Zbot are almost as many as the removals of the #2 and #3 malware families this month combined (Win32/Vundo and Win32/Bubnix respectively). Approximately 86 million computers have run this version of MSRT as we compile this data so we should expect this number to increase as the month continues.



For the complete read on this, head on over toZDNet and check it out.
Tags Bugs Microsoft malware Zeus Zbot jeff williams
[Print] [Top]
0 Comments
December 21, 2007

Windows Explorer Tagged As Virus

Poster: Aron Schatz
Posted on December 21, 2007 at 5:28:08 PM
Okay, it was a false positive from Kaspersky. It still is a funny read. This is why you need to be extremely careful of anti-virus software.

Quote

The security company's systems had decided that a virus called Huhk-C was present in the explorer.exe file, leading to its confinement or, in some cases, deletion. As Windows Explorer is the graphical user interface (GUI) for Windows' file system, this made it difficult to perform many common tasks within the operating system, such as finding files. David Emm, a senior technology consultant at Kaspersky Lab, told ZDNet UK on Friday that the company was still examining its checklist to find out why the false positive "slipped through the net."
Tags Bugs Software
[Print] [Top]
0 Comments
June 11, 2007

OpenOffice.org Worm In The Wild

Poster: Aron Schatz
Posted on June 11, 2007 at 2:20:46 PM
Be sure to keep your systems up to date. And I mean all of them including Linux and Mac. The worm in the wild goes after all the OSes that OO.org runs on.

Quote

Once opened, the OpenOffice file, called badbunny.odg, launches a macro that behaves in several different ways, depending on the user's operating system. On Windows systems, it drops a file called drop.bad, which is moved to the system.ini file in the user's mIRC folder. It also executes the JavaScript virus badbunny.js, which replicates to other files in the folder. On Apple Mac systems, the worm drops one of two Ruby script viruses in files respectively called badbunny.rb and badbunnya.rb. On Linux systems, the worm drops both badbunny.py as an XChat script and badbunny.pl as a Perl virus.
Tags Bugs Software
[Print] [Top]
8 Comments
February 15, 2007

Daylight Savings Time Change

Poster: Rich
Posted on February 15, 2007 at 1:19:04 PM
I know that many of us know this already; But for those who don't: This year, the Daylight Savings Time schedule has changed. Be sure to check with your OS manufacturer for updates and fixes to solve the problem. My suggestion would be to turn off the automatic clock and just set it manually until you know that their patches work. You may have no choice but to do this for some older devices that manufacturers no longer support. This really shouldn't become a large problem.....
http://www.msnbc.msn.com/id/17135007/

Quote

"Daylight saving time arrives a little earlier — March 11 — and stays a little later — Nov. 4 — this year. And it’s bringing a problem along with it that could affect everything from stock trades to airline schedules to your BlackBerry. Software created before the law mandating the change passed in 2005 is set to automatically advance its timekeeping by one hour on the first Sunday in April, not the second Sunday in March. Congress decided that more early evening daylight would translate into energy savings. The result is a glitch reminiscent of the Y2K bug, when cataclysmic crashes were feared if computers interpreted the year 2000 as 1900 and couldn’t reconcile time appearing to move backward. If banks and other institutions aren't properly prepared, automatic stock trades reportedly might happen at the wrong hour, buildings that unlock at a certain time could stay shut, and airline flight schedules could be scrambled."
Tags Bugs
[Print] [Top]
0 Comments
January 17, 2007

Oracle Fixes 51 Security Flaws

Poster: Aron Schatz
Posted on January 17, 2007 at 3:16:54 AM
If you are running Oracle make sure to patch your box. 51 flaws were fixed today.

Quote

The update is part of the Redwood City, Calif., company's quarterly patch cycle. Oracle preannounced its patch release Thursday, when, for the first time, it published an advance notification so customers could plan ahead to apply the fixes. Oracle's actual Tuesday "Critical Patch Update" has one fix less than the company originally announced. Instead of the planned 27 fixes for its database products, 26 vulnerabilities are addressed in the company's flagship software.
Tags Patch Bugs Oracle
[Print] [Top]
0 Comments
December 6, 2006

Another Zero-Day Alert For MS Word

Poster: Aron Schatz
Posted on December 6, 2006 at 3:10:53 PM
This flaw extends back all the way to MS Word 2000. There is no patch yet which is why this is a Zero Day security risk.

Quote

A security advisory from the Redmond, Wash., company said the flaw can be exploited if a user simply opens a rigged Word document. Affected software versions include Microsoft Word 2000, Microsoft Word 2002, Microsoft Office Word 2003, Microsoft Word Viewer 2003, Microsoft Word 2004 for Mac and Microsoft Word 2004 v. X for Mac. The Microsoft Works 2004, 2005 and 2006 suites are also affected because they include Microsoft Word.
Tags Bugs Security Microsoft
[Print] [Top]
0 Comments
December 4, 2006

Vista Cracks May Be Malware

Poster: Aron Schatz
Posted on December 4, 2006 at 3:55:45 PM
Be careful if you are searching for Vista cracks to strip activation off the product that you purchased. Some people are putting out trojans instead of a helpful crack. Jerks.

Quote

Malware makers are starting to take advantage of the number of users searching for cracks for the pirated copies of Vista floating around. A new download has started circulating around the crack boards called "Windows Vista All Versions Activation 21.11.06". It purports to be an activation crack for any version of Vista. However, the file is actually a trojan-carrier which will install Trojan-PSW.Win32.LdPinch.aze onto your PC. BitTorrent users who posted reviews of the crack said that a number of antivirus programs detected the malware, though Norton AntiVirus and NOD32 did not.
Tags Bugs Software
[Print] [Top]
4 Comments
November 22, 2006

Firefox 2 Password Manager Flaw

Poster: Aron Schatz
Posted on November 22, 2006 at 4:07:27 PM
There is a bug in the saved password manager that Firefox uses. It turns out that Firefox will fill in forms that are hidden from the user. That can be used very easily in a phishing attack.

Quote

RCSR attacks are also actively targeting Microsoft Internet Explorer, however a flaw in Firefox makes the attack much more likely to succeed. The Password Manager component of FireFox can be exploited to send a username and password combination to an attacker's computer without the user's knowledge. Users of both Firefox and Internet Explorer need to be aware that their information can be stolen in this way when visiting blog and forum websites at trusted addresses.
Tags Bugs Security Firefox
[Print] [Top]
4 Comments
November 1, 2006

DoS Bug Found In Firefox 2

Poster: Aron Schatz
Posted on November 1, 2006 at 10:22:41 PM
Another security flaw has been found in Firefox 2. Even though there may be bugs, Mozilla should be quick to patch the browser. Unlike waiting till "patch Tuesday" like some other company...

Quote

The vulnerability lies in the way the open-source browser handles JavaScript code. Viewing a rigged Web page will cause the browser to exit, a representative for Mozilla, the publisher of the software, said Wednesday. Contrary to claims on security mailing lists, the bug cannot be exploited to run arbitrary code on a PC running Firefox 2, the representative said. This flaw in the JavaScript Range object is different from the denial-of-service vulnerability in Firefox 2 that was confirmed by Mozilla last week. That bug is related to a more serious security hole, which was fixed in earlier versions of Firefox, the organization has said.
Tags Bugs Browsers Security Firefox
[Print] [Top]
1 Comment
October 31, 2006

Windows ICS Attack Can Bring Down Firewall

Poster: Aron Schatz
Posted on October 31, 2006 at 3:01:48 PM
This is not that big of a deal for most people, but if you are running internet connection sharing it may be. Move to a router.

Quote

The code, which was posted on the Internet early Sunday morning, could be used to disable the Windows Firewall on a fully patched Windows XP PC that was running Windows' Internet Connection Service (ICS). This service allows Windows users to essentially turn their PC into a router and share their Internet connection with other computers on the local area network (LAN.) It is typically used by home and small-business users. The attacker could send a malicious data packet to another PC using ICS that would cause the service to terminate. Because this service is connected to the Windows firewall, this packet would also cause the firewall to stop working, said Tyler Reguly, a research engineer at nCircle Network Security Inc., who has blogged about the issue.
Tags Windows Bugs
[Print] [Top]
0 Comments
October 30, 2006

Another IE7 Flaw

Poster: Aron Schatz
Posted on October 30, 2006 at 6:38:02 PM
Here is another IE7 flaw that enables a phishing attack. The error stems from a trusted source. Not to trusted, is it?

Quote

The browser flaw could affect users who visit a trusted site by opening a pop-up window in that site but containing malicious code. This is the second IE 7 flaw that has been discovered since Microsoft released the browser two weeks ago. Last week, a security flaw was discovered in IE 7 that could spoof the address of a pop-up window. The two IE 7 flaws, if used in conjunction with each other, can easily dupe all but the most security-minded users, said Thomas Kristensen, chief technology officer of security company Secunia, which discovered the flaws.
Tags Bugs Browsers Software IE
[Print] [Top]
0 Comments
October 17, 2006

Buy iPod, Get Virus

Poster: Aron Schatz
Posted on October 17, 2006 at 9:58:16 PM
Interesting story. It seems that some iPods left the factory with a virus for Windows. Apple then blames Microsoft for their shoddy OS. I agree, but it was Apple's fault for the virus being on the unit.

Quote

The company said that a small number of video iPods made after Sept. 12 included the RavMonE virus. It said it has seen fewer than 25 reports of the problem, which it said does not affect other models of the media player, nor does it affect Macs. The Cupertino, Calif.-based company apologized on its Web site for the problem, but also used the opportunity to jab at Microsoft, its operating system rival. "As you might imagine, we are upset at Windows for not being more hardy against such viruses, and even more upset with ourselves for not catching it," Apple said on its site.
Tags Bugs Security Software
[Print] [Top]
1 Comment
October 3, 2006

OS X Exploit Out

Poster: Aron Schatz
Posted on October 3, 2006 at 3:13:27 AM
There is a so-called Zero Day exploit for the Mac floating about. There is a patch from Apple's updater. Get it now.

Quote

The code takes advantage of a weakness in core parts of Mac OS X and could let a user gain additional privileges. Apple provided a fix for the error-handling mechanism of the kernel last week, but the exploit appears to have been authored before then. "It appears to have been written well before the vulnerability was fixed," said Dino Dai Zovi, a researcher with Matasano Security who was credited by Apple with discovering the flaw when the patch was released. "It appears to be a zero-day exploit and may have been distributed before the patch was released."
Tags Bugs OSX
[Print] [Top]
7 Comments
August 9, 2006

DHS: Fix Your Windows

Poster: Aron Schatz
Posted on August 9, 2006 at 5:14:46 PM
No, not from the leaks in your house. There is a Blaster type patch that Homeland Stupidity wants you to apply. Get to it. Patch up to OSX.

Quote

Microsoft worked with the Department of Homeland Security on the alert, a company representative said. "Microsoft...encourages customers to deploy this update on their systems as soon as possible, given that we are aware of targeted exploitation of the vulnerability," the representative said. Microsoft deems the vulnerability critical for all versions of Windows. However, users of Windows XP with Service Pack 2 and Windows Server 2003 with Service Pack 1 should be protected by the Windows Firewall if they do not use file sharing and printer sharing, Christopher Budd, a security program manager at Microsoft, said in an interview Tuesday.
Tags Windows Patch Bugs
[Print] [Top]
0 Comments
August 2, 2006

Apple Patches 26 Flaws

Poster: Aron Schatz
Posted on August 2, 2006 at 12:15:46 PM
Get your software update working. Apple has released patches for a new batch of flaws. And remember, just because you run a non-Windows OS does not mean you are immune to problems.

Quote

The bulk of the Mac OS X flaws affect both the client and server versions of the operating system. Attackers could exploit several of the vulnerabilities, specifically those related to image processing and file compression, by crafting malicious files and tricking people into opening them, Apple said. This attack method is seen often on computers that run Microsoft's Windows operating system. Other flaws could expose user data, let a malicious user gain elevated privileges on a system running Mac OS X, or cause a crash, Apple said.
Tags Bugs Apple Mac OSX
[Print] [Top]
0 Comments
July 20, 2006

MySpace Ads Deliver Spyware

Poster: Aron Schatz
Posted on July 20, 2006 at 2:32:08 PM
In yet another reason why you shouldn't be running IE, a MySpace ad installs spyware if your computer isn't patched. Either run Firefox, or patch your computers! Better, do both.

Quote

Internet Explorer users who visited a Web page containing this ad and whose IE was not equipped with the WMF patch would not get that warning. Rather, their machines would silently download a Trojan horse program that installs junk software in the PurityScan/ClickSpring family of adware. This stuff bombards the user with pop-up ads and tracks their Web usage. Only a little more than half of the anti-virus programs used at anti-virus testing service AV-Test.org flagged the various programs that the Trojan tried to download as malicious or suspicious.
Tags Spyware Bugs IE
[Print] [Top]
0 Comments
May 30, 2006

Tuesday Tech News

Poster: Aron Schatz
Posted on May 30, 2006 at 1:52:19 PM
Vista bug hunt on.

Quote

The company already knows of some problems and expects others. Only about 40 percent of Windows XP applications can run without any modification, for example. A good chunk of the remainder require only very slight tweaks. Many of those incompatibilities have already been fixed, either through workarounds put in place by Microsoft or in collaboration with the application's maker.


Virgin Mobile tries ad supported phones.

Quote

Virgin, one of the first providers to offer such a service, hopes the service will appeal to its often cash-strapped customers, 65 percent of whom are younger than 30 years old. "Very practically speaking a lot of our customers are value conscious. They manage budgets that are finite," said Howard Handler, the company's chief marketing officer.
Tags News Bugs Mobile Tech Ad
[Print] [Top]
0 Comments
April 13, 2005

Major Windows Bug Found!

Poster: Aron Schatz
Posted on April 13, 2005 at 3:19:42 PM
This bug was found by Steve. It occured on a computer in a domain running Windows XP Pro.

Quote

My Computer>Properties>Advanced>User Profiles
Click on Settings

Under "Profiles stored on this computer" will be entries for every account that has logged on to the machine (representing the saved profile associated with the local or domain account).

Periodically a profile with a name of "unknown" will appear in the list (it should not).

If you select the "unknown profile" and click on delete, the currently logged in profile will be deleted with no warning to save the contents of the "My Documents" folder.


This is worse than it sounds. If you see an account "unknown" and delete it, say goodbye to your current user account. Windows starts deleting it that moment and the only way to stop it is to cut the power. You will literally see icons and documents being deleted in front of your eyes! Microsoft is working on a patch for this.
Tags Bugs
[Print] [Top]
December 31, 2004

Friday Tech News - Virus Edition

Poster: Aron Schatz
Posted on December 31, 2004 at 10:52:07 PM
Anti-Santy worm infects sites.

Quote

F-Secure said on Friday that it was aware of seven sites that had been defaced by the worm, which appears designed to combat the Santy worm. The anti-Santy worm searches Google for sites that use the PHP Bulletin Board (phpBB) software exploited by the earlier worm, infects the sites and attempts to make the sites more secure by installing a patch.


Cell phone worm source released.

Quote

This follows reports on Tuesday that a number of variants of the Cabir worm have been detected and that these offshoots have evolved beyond their comparatively benign predecessors. The worm affects phones running the Symbian operating system that use Bluetooth wireless technology.


Tojan preys on help rendering bug in XP SP2.

Quote

Microsoft has had significant problems securing its Web browser in 2004. As a result, the freely available open-source browser Firefox has gained market share. Security experts have recommended that computer users consider other browsers and some schools have told their students to use a non-Microsoft browser.


Malware hides in DRM. I hate DRM.

Quote

A loophole in the Windows Media DRM process allows companies to create ersatz media files and link them to adware. Normally, when you download a protected Windows Media file, you also receive a license that lets you play it. According to Caulton, if Windows Media Player can't find a valid license on your PC, it checks in with a remote system running Microsoft's Windows Media DRM Server.
Tags Bugs
[Print] [Top]
December 10, 2004

MS to Patch Five Windows Flaws

Poster: Aron Schatz
Posted on December 10, 2004 at 4:14:55 PM
Get automatic updates ready, Microsoft is preparing to release a patch to fix five (5) security holes. They are not critical flaws, but it is important to keep Windows up to date.

Quote

The fixes for the glitches in the Windows operating system will appear on Dec. 14, according to the posting. Microsoft typically releases patches on the second Tuesday of each month, a schedule it decided upon more than a year ago.
Tags Bugs
[Print] [Top]
December 9, 2004

Popup Hijacking

Poster: Aron Schatz
Posted on December 9, 2004 at 5:40:51 PM
Everyone beware of a new tactic that allows malicious sites to hijack popup windows. ALL browsers are affected. Yes, even Firefox. I just tried it.

Quote

Secunia Research has reported a vulnerability, which affects most browsers. The vulnerability can be exploited by a malicious web site to "hi-jack" a named browser window, regardless of which web site is the true "owner" of the window.
Tags Bugs
[Print] [Top]
November 23, 2004

Another IE Flaw

Poster: Aron Schatz
Posted on November 23, 2004 at 4:10:26 PM
This one comes even with the SP2 'security enhancements'. A site could bypass the security prompt and download a script automatically. Yet another 'feature' by Microsoft. Get firefox: http://www.mozilla.org

Quote

"This is certainly something that is bypassing some of the security features that are meant to be there. It is a way of bypassing the dialogs in IE. It will result in the (malicious) file being saved on the user's computer," said Richmond, who added that the matter would be worse if that file could be saved in a computer’s start-up folder.
Tags Bugs
[Print] [Top]
May 3, 2004

Sasser in force

Poster: Aron Schatz
Posted on May 3, 2004 at 9:25:47 PM
The newest variant of the worm is spreading quickly. My roommate was just infected. He had Norton on which detected it, but if he had gone to Windows Update, this wouldn't have happened.

Quote

The new worm, Sasser.B, like its predecessor Sasser.A, takes advantage of a vulnerability in unpatched versions of Windows XP and Windows 2000 systems. The worms infect vulnerable systems by establishing a remote connection to the targeted computer, installing a File Transfer Protocol (FTP) server and then downloading themselves to the new host.
Tags Bugs
[Print] [Top]
March 9, 2004

Don't download patches over email

Poster: Aron Schatz
Posted on March 9, 2004 at 4:57:02 PM
If you are receiving emails supposedly from Microsoft, don't be fooled. A new virus is popping up pretending to be a MyDoom patch. Don't execute files from emails and run an Antivirus scanner! http://www.grisoft.com it's free! I use it.

Quote

Sober.d arrives as e-mail pretending to be from Microsoft with a patch for the MyDoom worm. Microsoft does not e-mail its customers with new patch information. The subject line could be in either German or English, with random letters or words in some variation of "new Microsoft security patch." The body text, also in German or English, reads:
Next Page »
Tags Bugs
[Print] [Top]
February 17, 2004

Security flaw found in Windows Source

Poster: Aron Schatz
Posted on February 17, 2004 at 4:07:45 PM
The code was leaked a few days ago and already there are reports that flaws are present in the OS. In IE5 actually, still it shows that releasing source code can actually help.

Quote

According to a message posted by SecurityGlobal.net LLC's Security Tracker Web site, a vulnerability was reported in Microsoft Internet Explorer Version 5 that lets a "remote user execute arbitrary code on the target system."
Tags Bugs
[Print] [Top]
January 16, 2004

PC Virii cost $55 billion loss

Poster: Aron Schatz
Posted on January 16, 2004 at 6:00:01 PM
Virus writers must be living it up right now. $55 Billion in losses. That's not a number to sneeze at.

Quote

Last year, there was almost one major virus attack every month, including the well-known Slammer worm, which shut down Internet service providers in South Korea, disrupted plane schedules and knocked out automatic teller machines in January. The Lovegate Internet e-mail worm surfaced in February, while the Bugbear and Sobig viruses, which spread via infected e-mail, appeared in June.
Tags Bugs
[Print] [Top]
November 12, 2003

A Slew of Windows Patches

Poster: Aron Schatz
Posted on November 12, 2003 at 4:47:06 PM
Fire up that internet connection and prepare to patch your installs. Microsoft has released a few new security patches for Windows and Office. It is pretty said when an Office program can be a vulnerability.

Quote

Perhaps the most serious flaw is a memory error in the Windows Workstation service, a software component that facilitates access to network resources such as printers and files. The vulnerability could allow an attacker to gain control of a person's PC via the Internet in much the same way the MSBlast worm was spread to hundreds of thousands of computers in August.


Remember to visit Windowsupdate at least once a week.
Tags Bugs
[Print] [Top]
September 10, 2003

More Windows problems

Poster: Aron Schatz
Posted on September 10, 2003 at 8:42:02 PM
Get another patch for your windows box this week. Another RPC problem this week. What's next week?

Quote

The third is a denial-of-service flaw that affects a component known as the remote procedure call (RPC) process. The RPC process facilitates activities such as sharing files and allowing others to use a computer's printer. By sending too much data to the RPC process, an attacker can cause the system to grant full access to its resources. By using the flaws in tandem, a hacker could load unwanted programs onto computers through the buffer overrun flaws and then use the infected computers to launch a denial-of-service attack.
Tags Bugs
[Print] [Top]
September 4, 2003

MS Office Critical Flaw

Poster: Aron Schatz
Posted on September 4, 2003 at 4:50:42 PM
Another week, another flaw. If you run MS Office instead of Open Office (http://www.openoffice.org), you'll want to get the new patch. There is patch for a critical flaw. An Office program has a critical flaw.

Quote

Several other alerts also involve Office applications. A vulnerability in recent versions of Word could allow hackers to automatically run macros, which are mini-programs typically used to automate routine tasks. The flaw--classified as "important"--requires opening a maliciously crafted document, according to the security bulletin. Customers using Word 2002, 2000, 98 or 97 or Works Suite 2003, 2002 or 2001 are urged to apply the patch, as described in the bulletin.
Tags Bugs
[Print] [Top]
Page: ««First [1] 2 3 Last»»
Login
Welcome Guest. Please register or log in now.
Forgot your password?
Navigation
  • Home
  • Articles
  • News
  • Register/Login
  • Shopping
  • ASE Forums
  • Anime Threads
  • HardwareLogic
  • ASE Adnet
Latest News
  • Kingston HyperX Cloud 2 Pro Gaming Headset Unboxing
  • Synology DS415+ Unboxing
  • D-Link DCS-5020L Wireless IP Pan/Tilt IP Camera
  • Actiontec WiFi Powerline Network Extender Kit Unboxing
  • Durovis Dive Unboxing
  • Bass Egg Verb Unboxing
  • Welcome to the new server
  • Gmail Gets Optional Preview Pane
  • HBO Go on Consoles
  • HP Touchpad Update
Latest Articles
  • D-Link Exo AC2600 Smart Mesh Wi-Fi Router DIR-2660-US
  • HyperX Double Shot PBT Keys
  • Avantree ANC032 Wireless Active Noise Cancelling Headphones
  • ScharkSpark Beginner Drones
  • HyperX Alloy FPS RGB Mechanical Gaming Keyboard
  • D-Link DCS-8300LH Full HD 2-Way Audio Camera
  • Contour Unimouse Wireless Ergonomic Mouse
  • HyperX Cloud Alpha Pro Gaming Headset
  • Linksys Wemo Smart Home Suite
  • Fully Jarvis Adjustable Standing Desk
Latest Topics
  • Hello
  • Welcome to the new server at ASE Labs
  • Evercool Royal NP-901 Notebook Cooler at ASE Labs
  • HyperX Double Shot PBT Keys at ASE Labs
  • Avantree ANC032 Wireless Active Noise Cancelling Headphones at ASE Labs
  • ScharkSpark Beginner Drones at ASE Labs
  • HyperX Alloy FPS RGB Mechanical Gaming Keyboard at ASE Labs
  • D-Link DCS-8300LH Full HD 2-Way Audio Camera at ASE Labs
  • Kingston SDX10V/128GB SDXC Memory at ASE Labs
  • What are you listening to now?
  • Antec Six Hundred v2 Gaming Case at HardwareLogic
  • Sans Digital TR5UTP 5-Bay RAID Tower at HardwareLogic
  • Crucial Ballistix Smart Tracer 6GB PC3-12800 BL3KIT25664ST1608OB at HardwareLogic
  • Cooler Master Storm Enforcer Mid-Tower Gaming Case at HardwareLogic
  • Arctic M571-L Gaming Laser Mouse at ASE Labs
  • Contour Unimouse Wireless Ergonomic Mouse at ASE Labs
Advertisement
Advertisement
Press Release
  • Huntkey Has Launched Its New Power Strips with USB Chargers on Amazon US
  • Inspur Releases TensorFlow-Supported FPGA Compute Acceleration Engine TF2
  • Hot Pepper Introduces Spicy New Smartphones in US Markets
  • Sharp Introduces New Desktop Printers For The Advanced Office
  • DJI Introduces Mavic 2 Pro And Mavic 2 Zoom: A New Era For Camera Drones
  • DJI Introduces Mavic 2 Pro And Mavic 2 Zoom: A New Era For Camera Drones
  • Fujifilm launches "instax SQUARE SQ6 Taylor Swift Edition", designed by instax global partner Taylor Swift
  • Huawei nova 3 With Best-in-class AI Capabilities Goes on Sale Today
  • Rand McNally Introduces Its Most Advanced Dashboard Camera
  • =?UTF-8?Q?My_Size_to_Showcase_Its_MySizeId=E2=84=A2_Mobil?= =?UTF-8?Q?e_Measurement_Technology_at_CurvyCon_NYC?=
Home - ASE Publishing - About Us
© 2010 Aron Schatz (ASE Publishing) [Queries: 15 (8 Cached)] [Rows: 459 Fetched: 202] [Page Generation time: 3.9512140750885]