Who are the most nervous writers on Quora

magazine for computer technology

Transcript

1 With job market magazine for computer technology e 3.70 Austria e 3.90 Switzerland CHF 6.90 Benelux e 4.40 Italy e 4.40 Spain e 4, smartphones in the test The Android upper class Better than the iphone: dual core, HDMI, large displays Apps for better photos PCs with Core i-2000 mobile scanner HSPA + with 21 Mbit / s That works with HTML5 More pep on the web D legally binding Kinect as a mouse replacement Encryption under Linux Windows 7 for latecomers Safe and flexible thanks to virtual machines Three PCs in a VMware, Virtual Box & Co. for Mac OS, Linux and Windows

2 Copyright by Heise Zeitschriften Verlag

3 c card spam Oh my god, those amateurs! Have I not preached for years that discretion is the top priority when stealing user data? But no, these idiots had to open the really big barrel at Sony and steal 103 million records at once. And then they don't even really clean up when you go out and delete the log entries. Bungler! All of our years of detailed work is gone. Like a prayer wheel, I wrote to everyone who started training as a cyber crook with us: Don't be noticed! We had specially concentrated on the small online shops. Sometimes a hundred credit card numbers here, sometimes a hundred there. Wait for the grass to grow and then never debit huge amounts to stay under the fraud prevention radar. Small cattle also make crap - and we had our peace. But now even the boulevard is screaming the alarm. Every grandma now knows from breakfast watching TV how to check her bank statements and change passwords. A disaster! We can't even make up for the losses through our division. Now every digital bazooka can stock up on enough real e-mail addresses to send spam, and we are left with our data. Everyone looks at the damage done to Sony, but nobody sees how much we, the credit card mafia, are suffering from this "coup". 24 billion? Ridiculous! Nobody wants our professionally procured card numbers anymore, the prices are in the basement. Who buys numbers in packs of ten when millions of them are available elsewhere? We're drowning in the plastic rubbish of the counterfeit cards. So that something like that doesn't happen again, I wrote to the federal government: You should kindly enact new data protection laws. People should feel safe again and move around the net without knowing it. After all, we have thousands of jobs at stake. Hartmut Gieselmann Copyright by Heise Zeitschriften Verlag

4 Copyright by Heise Zeitschriften Verlag

5 Copyright by Heise Zeitschriften Verlag

Thanks to the Google operating system and Android Market, the software leaves little to be desired. What the Android operating system can do 86 Eight top smartphones in the test 90 D legally binding 78 PCs with Core i Mobile Scanner 132 HSPA + with 21 Mbit / s With a data rate of a good 21 Mbit / s, the HSPA + mobile technology now achieves the speed of current DSL connections . This can be used, for example, to install mobile hotspots for travel groups or fixed connections for corporate and home networks. 126 HSPA + router with WLAN and DSL 126 How HSPA + accelerates UMTS networks 130 Windows 7 for latecomers 162 Kinect as a mouse replacement 168 Encryption under Linux 192 Copyright by Heise Zeitschriften Verlag

7 More pep on the web HTML5 promises to bring full-fledged applications, even 3D games, to the web browser and to play videos without additional plug-ins. Thanks to numerous free frameworks and auxiliary libraries, you can quickly get to grips with the new techniques. 140 Why HTML5 is a big hit 140 HTML5 video in practice 146 Frameworks and libraries 152 Drawing on the canvas element 180 Apps for better photos The smartphone is increasingly replacing the digital camera and thanks to software for post-processing and uploading to Flickr & Co. the PC at the same time: 43 Android and iphone apps for safe snapshots, correct colors and effective looks. Three PCs in one Everyone benefits from virtualization: those who switch to Mac and Linux can continue to use Windows applications, tinkerers can experiment safely and particularly cautious contemporaries can surf the web without a care. We will help you choose the right software and give you starting tips.

8 Copyright by Heise Zeitschriften Verlag

9 Copyright by Heise Zeitschriften Verlag

10 Reader forum letters,, hotline bug fixed Cover story Notebooks with Power, c t 10/11 In your test you devalued the MSI GT680 quite a bit, because the copy available to you was configured incorrectly. I bought the notebook last week before the test was available and my model was configured correctly. Working with it is really fun, you clearly notice the advantage of the built-in SSD. I think that the notebook comes off too badly in your article, even if such configuration errors should of course not be. I consciously bought the notebook as a desktop replacement and find that the price-performance ratio is very good. Stephan Hartmann We are pleased to hear that MSI has corrected the error described in newer deliveries. At least the first batch of the notebook, which came on the market at the end of March, was affected by the configuration error. Depending on the throughput at the individual dealer, it is therefore possible that an incorrectly configured GT680 is still being sold here and there. Why change password? Shared network, possibilities, obligations and risks with the Internet for guests, c t 10/11, p. 170 Why should you change the standard WLAN password of the Fritzbox? This consists of a long combination of numbers that hardly anyone can remember and which is only written on a router and its CD that are difficult to reach. Why should you exchange that for the password? People are lazy and the passwords are accordingly simple. A company thought about taking advantage of laziness (before I have to change the WLAN, I prefer to use the Fritzbox's WLAN password) and now it's wrong again? Simon Harms Anyone can copy the password within seconds and use it later without you necessarily noticing. If you have changed the password, the automatic coupling via WPS still remains (please press for a longer period of time for comments and questions about articles (xx stands for the abbreviation at the end of the respective article text). For general ct or other topics, please contact the editorial staff for technical questions only on or by phone during our daily reader consultation hours. Address, fax and telephone numbers, other e-mail addresses following the reader forum pages. The editors reserve the right to publish letters and discussion notes in abbreviated form. Answers from the editors are in italics . on the WLAN button). If you deactivate this in the configuration, a wireless Internet Schnorrer no longer has a chance with the Fritz! Box. We have been advising complex, non-guessable WLAN passwords for some time now. VPN included You write that WiFi guests have to install VPN software from the service providers. As a Hotsplots customer, I allow myself to point out that this is part of the concept of my provider: In addition to the OpenVPN package, the user downloads a personalized configuration file that he only has to copy into a specific folder. At Fon things seem to be different, but you are not fine with problems with the public prosecutor. Harald Weiss The bigger problem Caution, customer: Telephone terror, If the elevator rings three times, ct 10/11, p. 76 The disturbed night's sleep or, alternatively, the loss of a long-used number is certainly painful for telephone customers with numbers just below that of the Elevator service hotline. On the other hand, I would find it even more painful to be locked in a defective elevator and, after pressing the emergency call button, to only be connected to a private connection by the defective impulse dialer (double error), where nobody is at home Martin R. Siegert Half Solution As someone who has ever had the pleasure of being stuck in an elevator cabin for several hours at night (that was in the pre-cell phone era), I am simply appalled by the inactivity of Schindler. The company is of course honored that the company is able to build elevators that can apparently be operated for several decades. It is less honorable, however, not to want to see that the telephone technology installed there does not last that long and simply has to be replaced at some point. The solution now targeted by the company by changing the phone number is definitely only one side of the coin. The T. family has their peace and quiet, but what about the people trapped in the elevators? In any case, from my experience I can say in no uncertain terms that the announcement No connection on this number is definitely not what you want to hear when you are stuck in an elevator and trying to call the emergency services. Jens Wahnes Obligation to Observe An elevator is developed according to the safety level SIL 3 (IEC 61508) and the product liability also includes the product observation obligation. An elevator is certainly not connected to the telephone network in order to send meaningless messages. And the IWV, as you noticed in the article, is a bit older, so this security mechanism was implemented at Schindler at an early stage and not just recently, when every company printer reports its toner consumption via the Internet to the maintenance company for billing and service reports. Now some of these messages apparently do not arrive where they can be reliably processed. This could increase the risk of a dangerous accident and for Schindler there is the risk of contributory negligence in dangerous accidents, because the manufacturer is also obliged to monitor the product, so that he must also observe the use of his product in order to be able to counter safety-related problems. Possible maximum risk: A user in a company takes the elevator on Maundy Thursday evening when everyone else has already gone home. The elevator gets stuck and the user is only found on Tuesday after a warm Easter weekend because his emergency call or the fault message did not arrive. Ralf Pfeifer In response to a direct request from a firefighter who was concerned about our report, Schindler assured us that it had been ensured that no elevator emergency calls were lost. Conclusion question playing cards, quiet and fast mid-range graphics cards, c t 10/11, p. 108 I was very pleased to read an article about cards in the mid-range price range. Obviously my GTX460 (1 GByte) was a good choice after all, if I look at the tip in the conclusion. The price-performance ratio is optimal and overclocking reserves are also available. What seems a little incomprehensible to me, however, is the recommendation of the GTX460 with 768 MB of memory. Compared to the 1 GB version, this only has a 192-bit memory interface and is therefore somewhat slower than the 1 GB version (256 bits). Otherwise, c t always recommended graphics cards with a wide memory interface. Carsten Salveter The recommendation for the 768 MB version of the GeForce GTX 460 was primarily due to its excellent price-performance ratio: Such a card is cheaper than some of the GeForce test candidates, but still faster. With its 256-bit memory interface, the 1 GByte variant is a bit more nimble than the 768 card, but it is also more expensive. 10 c t 2011, issue 11 Copyright by Heise Zeitschriften Verlag

11 c t 2011, issue 11 Copyright by Heise Zeitschriften Verlag 11

12 Letters Readers' Forum,, Hotline Optimizing SSD speed Quick starter, system acceleration with SSD, c t 9/11, p. 124 There are two things that users should pay attention to who are interested in maximum performance. On the one hand, the speed of the internal SATA interface should be checked: With a Lenovo T61p, the full SATA-II speed was only available after a BIOS update found on the network, previously only SATA with 1.5 GBit / s. Furthermore, trying out different AHCI drivers has paid off for me. The read speed with the MS driver was approximately five percent faster than with the Intel driver. Incidentally, contrary to the statement in the article, I am of the opinion that a 64 GB SSD may be sufficient under Windows 7, although I admit that this may not be valid for hunters and gatherers. On my SSD of this size two thirds are free, photos and music are of course mostly outsourced. Heiko Lopau Impossible to use Wolkenkuckucksbüro, web services for texting, arithmetic and presenting, ct 10/11, p. 124 In the article, you show the ability for the Microsoft Web Office web application to copy / paste data from the application as well as to insert this. I think this is very useful, especially for spreadsheets, to import existing data collections or to copy out calculated data in order to use them elsewhere. In fact, copy and paste works in the word processing and presentation components, but not in the spreadsheet, which is more important to me. To use them there, you have to use IE8 or 9 with apparently proprietary extensions. A sensible use in other browsers such as Firefox, Chrome or Opera is made impossible. Rainer Grabbe Clooney & Co not important Kabel +, HD receiver with CI + interface and recording function, c t 10/11, p. 114 Thank you for the comprehensive report on CI +. As a shift worker, I have so far been satisfied with the Kabel Deutschland hard disk recorder (Humax DVR 9000C). With my Satelco EasyWatch HDTV PCI (DVB-C) I can watch and record the public broadcasters in HD. With the Humax I was able to record private and pay TV programs and then enjoy them later without advertising. Actually, I wanted to upgrade to HD for private use at the end of the year. But why should I upgrade? I can no longer watch most of the HD programs because of my shift schedule and the new restrictions. Nice, I can just go for a walk or visit the fitness center more often. May the private suffocate from their greed and all Hollywood too. Sure, some series run on the Internet and blockbusters on max cathedrals. Certainly there will soon be decryption software and firmware hacks for recorders, but Cloney & Co. are not that important to me after all. Matthias Zwerschke Gute Nachrichten News robots, news apps and RSS readers for Android, c t 10/11, p. 152 A great article with lots of new app suggestions. Unfortunately, the article on RSS readers for Android fell short of the mark on the article pages, unfortunately, because there is more to report. In particular, as an RSS junkie, I missed the relatively new GoodNews app, which c t referred to in the app notes a few issues ago. Good News offers extensive possibilities to organize feed articles with tags and markings or to save them for later reading. You won't find the built-in podcast player with streaming or download, your own optimization proxy for improved display of offline content and the locale interface in other apps. Sebastian Laiblin 300 or 350 watts? Six for Sandy, Cheap boards for Intel's Core i3-2000, Core i or Core i7-2000, ct 10/11, p. 140 In the footnote to the table with the technical data of the LGA1155 mainboards tested, it says: am 230 volts - Mains measured with power supply Enermax ErPro W. So far I only know models with at least 350 watts from the Enermax model series. Is that a mistake or are you testing with a Erlkönig power supply? Kai Zimmer It's a simple mistake on our part: We measured with the ErPro W (EES350AWT), which we briefly introduced in c t 5/11 on page 60. Do two digital ones also work? I would like to put together a new computer with an H67 chipset and a Core i CPU soon. My question: Can I digitally connect two monitors to this PC at the same time (via DVI and HDMI) without having to plug in an extra graphics card? Ralf Schelberg Yes, that works. However, as with many graphics cards, the power consumption increases significantly, namely by around 6 watts. The current Intel processor graphics can only digitally connect displays with more than 1920ˇx 1200 pixels via DisplayPort (DP) because it does not support dual-link DVI. Is the power supply enough? Playing cards, quiet and fast mid-range graphics cards, c t 10/11, p. 108 I built the Intel system based on the PC design proposal from c t 24/2008 and have been completely satisfied with it ever since. I've been thinking about getting an SSD as a system drive for a long time. Your penultimate c t edition on the subject of SSD tuning has reinforced me even further. However, I also want to install a more powerful graphics card, as I've been playing a bit more often lately. I'm thinking of the GeForce GTX 550 Ti from MSI. Now to my question: Is the existing power supply sufficient for this? How can I safely calculate the power consumption? According to my rough calculation, the Enermax Pro W now has around 230 watts reserve that should be enough for the maximum 116 watts of the GeForce GTX 550 Ti, or do other factors play an important role? Silvio Köhler We suspect that the existing power supply is sufficient - it also has the necessary 6-pin PCI-Express power connection. However, the very dynamically fluctuating power requirements of PC components cannot be assessed in advance with absolute reliability.Help is provided by web tools such as the extreme Power Supply Calculator (psucalculatorlite.jsp). However, if your PC does not run stable after upgrading, you can always replace the power supply later. New technology, new problems Navigation aid, How to equip Macs for IPv6 Internet, ct 9/11, p. 144 It is true that in IPv6 the firewall replaces the function of NAT in IPv4, but the average consumer does not pale Glimmer of firewalls. NAT's natural protection is then simply gone. Systems in general are becoming more and more complicated and fragile, rather than simpler and more secure. Ralf Lauerwald Additions & Corrections Blender Brief presentation of the Reflecta DigiEndoscope, c t 10/11, p. 56 According to the manufacturer, the DigiEndoscope has protection class IP44 (splash-proof) and IP68 (waterproof when permanently submerged). 12 c t 2011, issue 11 Copyright by Heise Zeitschriften Verlag

13 Copyright by Heise Zeitschriften Verlag

14 Imprint Service Imprint Editorial Postfach, Hanover Helstorfer Str. 7, Hanover Telephone: 05 11 / Telefax: 05 11 / (For hotline numbers and addresses of the editorial staff, see notes on the right) Editor-in-chief: Christian Persson (cp) (responsible for the text part) , Dipl.-Ing. Detlef Grell (gr) Deputy Editors-in-chief: Stephan Ehrmann (se), Jürgen Kuri (jk), Georg Schnurer (gs) Leading editors: Harald Bögeholz (bo), Dr. Oliver Diedrich (odi), Johannes Endres (je), Axel Kossel (ad), Ulrike Kuhlmann (uk), Dr. Jürgen Rink (jr), Jürgen Schmidt (ju), Peter Siering (ps), Andreas Stiller (as), Ingo T. Storm (it), Dorothee Wiegand (dwi), Christof Windeck (ciw), Jörg Wirtgen (jow), Dr. Volker Zota (vza) Editors: Ernst Ahlers (ea), Daniel Bachfeld (dab), Jo Bager (jo), Achim Barczok (acb), Bernd Behr (bb), Andreas Beier (adb), Benjamin Benz (bbe), Holger Bleich (hob), Herbert Braun (heb), Volker Briegleb (vbr), Dieter Brors (db), Mirko Dölle (mid), Ronald Eikenberg (rei), Boi Feddern (boi), Martin Fischer (mfi), Tim Gerber ( tig), Hartmut Gieselmann (hag), Gernot Goppel (ggo), Sven Hansen (sha), Johannes Haupt (jha), Ulrich Hilgefort (uh), Gerald Himmelein (ghi), Christian Hirsch (chh), Jan-Keno Janssen ( jkj), Nico Jurran (nij), Reiko Kaps (rek), Peter König (pek), André Kramer (akr), Lutz Labs (ll), Oliver Lau (ola), Thorsten Leemhuis (thl), Urs Mansmann (uma) , Ole Meiners (olm), Angela Meyer (anm), Carsten Meyer (cm), Frank Möcke (fm), Andrea Müller (amu), Florian Müssig (mue), Peter Nonhoff-Arps (pen), Rudolf Opitz (rop) , Matthias Parbel (map), Stefan Porteck (spo), Christiane Rütten (cr), Peter Schmitz (psz), Dr. Hans- Peter Schüler (hps), Hajo Schulz (hos), Johannes Schuster (jes), Markus Stöbe (mst), Rebecca Stolze (rst), Andrea Trinkwalder (atr), Axel Vahldiek (axv), Judith Wedderwille (jdw), Andreas Wilkens (anw), Christian Wölbert (cwo), Peter-Michael Ziegler (pmz), Dušan Živadinović (dz) Coordination: Martin Triadan (mat) Editorial assistance: Susanne Cölle (suc), Christopher Tränkmann (right) Programming team: Karin Volz- Fresia, management (kvf), Erich Kramer (km), Arne Mertins (ame) Technical assistance: Ralf Schneider, management (rs), Hans-Jürgen Berndt (hjb), Denis Fröhlich (dfr), Christoph Hoppe (cho) , Stefan Labusga (sla), Jens Nohl (jno), Tim Rittmeier (tir), Wolfram Tege (te) Correspondents: Munich publishing office: Rainald Menge-Sonnentag (rme), Hans-Brush-Str. 10a, Haar, Tel .: 0 89 /, Fax: 0 89 /, Berlin: Richard Sietmann, Blankeneser Weg 16, Berlin, Tel .: 0 30 /, Fax: 0 30 /, Frankfurt: Volker Weber, Elly-Heuss- Knapp-Weg 8, Darmstadt, Tel .: /, USA: Erich Bonnert, 1617 Tartarian Way, San Jose, CA 95129, Tel .:, Fax:, Permanent staff: Ralph Altmann, Leo Becker (lbe), Manfred Bertuch, Jörg Birkelbach, Detlef Borchers, Tobias Engler, Monika Ermert, Dr. Noogie C. Kaufmann, Dr. M. Michael König, Stefan Krempl, Christoph Laue, Prof. Dr. Jörn Loviscach, Kai Mielke, Ralf Nebelo, Dr. Klaus Peeck, Prof. Dr. Thomas J. Schult, Ben Schwan (bsc), Christiane Schulzki-Haddouti, Sven-Olaf Suhl (ssu) DTP production: Wolfgang Otto (director), Ben Dietrich Berlin, Peter-Michael Böhm, Martina Bruns, Martina Fredrich, Ines Gehre, Jörg Gottschalk, Birgit Graff, Angela Hilberg, Astrid Seifert, Edith Tötsches, Dieter Wahner, Dirk Wollschläger, Brigitta Zurheiden Art Director: Thomas Saur, Layout Concept: Hea-Kyoung Kim, Photography: Andreas Wodrich, Video Production: Johannes Maurer Illustrations : Editorial: Hans-Jürgen Mash Marhenke, Hanover; List: Ritsch & Renn, Vienna; Story: Susanne Wustmann and Michael Thiele, Dortmund; Lead: Thomas Saur, Stefan Arand Verlag Heise Zeitschriften Verlag GmbH & Co. KG PO Box, Hanover Helstorfer Str. 7, Hanover Telephone: 05 11 / Fax: 05 11 / Internet: Publisher: Christian Heise, Ansgar Heise, Christian Persson Managing Director: Ansgar Heise, Steven P. Steinkraus, Dr. Alfons Schräder Member of the management: Beate Gerold Publishing director: Dr. Alfons Schräder Advertising management: Udo Elsner (-222) (responsible for the advertising section) Sales Manager Asia-Pacific: Babette Lahn (-240) Media advice: ZIP 0, 1 + 9: Erika Hajmassy (-266) ZIP 3 + 4: Ann Katrin Jähnke (-893) Postcode 5 + 6: Patrick Werner (-894) Postcode 2 + 7: Simon Tiebel (-890) Postcode 8: Werner Ceeh (0 89 /) Abroad (excluding Asia): Bettina Scheel (-892) Branded articles : Ann Katrin Jähnke (-893) Job market: Erika Hajmassy (-266) Advertisement disposition: Post code 0 5 / Asia: Maik Fricke (-165) Post code 6 9 / Abroad: Astrid Meier, Head (-221) Fax advertisements: 05 11 / , -224 Advertising agencies abroad (Asia): CyberMedia Communications Inc., 3F, No. 144, Xiushan Rd., Xizhi City, Taipei County 22175, Taiwan (ROC), Tel .:, Fax:, Advertising prices: The advertising price list No. 28 of January 1, 2011 applies. Head of Sales and Marketing: Mark A. Cano (- 299) Advertising management: Julia Conrades (-156) Production team management: Bianca Nagel (-456) Printing: APPL echter druck GmbH, Delpstrasse 15, Würzburg Special printing service: Bianca Nagel, Tel .: 05 11 /, Fax: Subscription service : Tel .: +49 (0) 40 / Customer account in Austria: Dresdner Bank AG, BLZ 19675, Account No. EUR, SWIFT: DRES AT WX Customer account in Switzerland: UBS AG, Zurich, Account No. 206 P For subscribers in Switzerland, order via: Thali AG, Aboservice, Industriestr. 14, CH-6285 Hitzkirch, Tel .: 041 /, Fax: 041 / Internet: Retail sales: MZV Moderner Zeitschriften Vertrieb GmbH & Co. KG, Ohmstrasse 1, Unterschleißheim, Postfach 12 32, Unterschleißheim, Tel. 0 89 /, Fax 0 89 / Internet: ct appears fortnightly, single price e 3.70; Austria e 3.90; Switzerland CHF 6.90; Benelux e 4.40; Italy e 4.40; Spain e 4.40 subscription prices: The annual subscription costs including shipping costs: Domestic 84.00 e, Austria 89.00 e, rest of the world 98.00 e (Switzerland 151.50 CHF); Reduced subscription for schoolchildren, students, apprentices, civil servants and those doing basic military service (only upon presentation of a corresponding certificate): Domestic 67.00 e, Austria 72.00 e, rest of the world 79.00 e (Switzerland 129.00 CHF); c t plus subscriptions (including access to the c t article archive) cost e 9.00 per year (Switzerland CHF 15.60) surcharge. For AUGE-, BvDW-e.V.-, GI-, GUUG-, Mac-e.V.-, VBIO, VDE and VDI members the price of the reduced subscription applies (against membership card). Airmail on request. Despite careful examination by the editorial staff, the publisher cannot accept liability for the correctness of the publications. The applicable legal and postal regulations for the purchase, installation and commissioning of electronic devices as well as transmitting and receiving devices must be observed. No part of this publication may be reproduced in any form or processed, duplicated or distributed using electronic systems without the express written consent of the publisher. The programs, circuit diagrams and printed circuits may only be used for the purpose of further training and for the personal use of the reader. No liability can be accepted for unsolicited manuscripts. By handing over the manuscripts and images to the editorial staff, the author grants the publisher the exclusive right to publish. Paid work becomes the right of disposal of the publisher. All publications in c t are made without taking any patent protection into account. Product names are used without guarantee of free usage. Printed in Germany. All rights reserved. Printed on chlorine-free paper. Copyright 2011 by Heise Zeitschriften Verlag GmbH & Co. KG ISSN AWA ACTA c t on the Internet c t homepage: All URLs for the issue: Link under the title picture or under for the current issue. Software for c t articles: in the section Drivers & more under Software for c t. You will also find test and analysis programs there. Anonymous ftp: on the server ftp.heise.de in the directory / pub / ct (enter ftp://ftp.heise.de/pub/ct in the WWW browser) and on ct.de/ftp software directory: driver Service: Contact to the editorial team Please send comments or additional questions about c t articles directly to the responsible member of the editorial team. You can tell who is responsible by the two- or three-letter abbreviation in brackets at the end of each article text. You will find the corresponding name in the imprint on the right. The abbreviations are also used for personal addressing of. All -addresses of the editorial members have the form Use the abbreviation of the addressee instead of xx. General -Address of the editorial team for letters from the readers, to which no individual answer is expected: c t-hotline: Mail inquiries to the technical hotline of the editors are only accepted on ct.de/hotline. Please note the information on this website, where you will also find a search engine for all hotline tips that have already been published. The telephone hotline is open every working day between 1 p.m. and 2 p.m. on 05 11 /. You can contact the editorial office during normal office hours on 05 11 / Contact to authors: You can only contact authors who are not part of the editorial team by letter via the editorial office's address. We will be happy to forward your letter. Subscription service orders, address changes, delivery problems, etc .: Heise Zeitschriften Verlag GmbH & Co. KG Customer Service, PO Box, Hamburg Telephone: +49 (0) 40 / Fax: +49 (0) 40 / ct Subscribe: Online orders via the Internet (de / abo) or The standard subscription can be canceled at any time with effect from the next but one issue. The c t-plus subscription runs for at least one year and can be canceled at the end of the one-year period for the next but one issue. For subscription prices see imprint. c t research With our article register you can quickly and easily search for c t articles on your computer: The register program for Windows, Linux and Mac OS is on www. heise.de/ct/ftp/register.shtml for free download; There you will also find information on how to get updates regularly via. You can also search for articles online on the ct homepage ct.de. However, only a few articles are fully published on the web. Re-ordering of individual issues and articles: c t issues whose publication date is no more than two years ago can be delivered at the issue price plus 1.50 e shipping costs. You can purchase individual articles from 1990 onwards in the heise-article-archive (; free online access to these articles is included for those who subscribe to the c't-Plus subscription. The articles from 1983 to 1989 are only available together on one DVD Available from the publisher for 19 € plus 3 € postage costs. c t-crypto campaign Information on the crypto campaign is available at ct.de/pgpca. The authenticity of our certification keys can be checked with the following fingerprints: Key ID: DAFFB000 ct magazine CERTIFICATE A3B5 24C2 01A0 D0F2 355E 5D1F 2BAE 3CF6 DAFF B000 Key-ID: B3B2A12C ct magazine CERTIFICATE 19ED 6E14 58EB A451 C5E DBD2 45FC B3B2 A12C 14 ct 2011, issue 11 Copyright by Heise Verlag

15 Copyright by Heise Zeitschriften Verlag

16 Copyright by Heise Zeitschriften Verlag

17 c t list Ritsch & Renn, Vienna c t 2011, issue 11 Copyright by Heise Zeitschriften Verlag 17

18 up to date Smartphones Jörg Wirtgen Whirling around motion profiles in the iphone and ipad Programming errors in Apple's ios lead to unprotected location data The iphone and ipad save the whereabouts of the users, it was said shortly before Easter. The allegations were rampant, and there was even talk of publishing precise movement profiles and sending them to advertisers. Exact investigations have shown that the stored data are not quite as sensitive, but they are also by no means uncritical. Apple finally admitted several errors and promised to correct them. One week before Easter, the developer Pete Warden and the scientist Alasdair Allan published their explosive discovery: The iphone writes the whereabouts of its user in a huge file, which is automatically saved in a backup on the user's PC. The file is neither encrypted nor otherwise secured against unauthorized viewing; this data collection cannot be switched off completely. Warden and Allan also supplied a program for displaying the movement data (see c t-link at the end of this article), and it can actually be used to create impressively detailed travel diaries. Although the discoverers wrote that there was no evidence that the data was being sent to Apple, news quickly spread that Apple knew where its customers were and that advertisers were getting this data. Analyzes soon surfaced that Apple was not the only bad guy, but that Google was collecting the same thing from Android users, as was Microsoft with Windows Phone 7. It took Apple a week before Apple reacted publicly and declared in a press release, like the ones in question Data have arisen. In addition, Apple admitted three errors and announced an update for the iphone and ipad that they should fix. Some of the allegations against Apple are therefore untenable, because they miss the core of the problem. Target state One after the other: The iphone actually sends its whereabouts along with information about nearby WLANs and cellular cells to Apple. This has been known for a long time and is in the terms of use, which every user has to confirm who wants to download apps via iTunes, but probably nobody reads them completely. The problems that have now been discovered do not affect this process at all. Warden and Allan also do not accuse Apple of making mistakes when handling the location data received in this way. The problems occur elsewhere, namely when collecting the data on the iphone. A look at the data stored by Apple will help you understand the situation. In July 2010, in response to a request from members of the US Senate, Apple set out very precisely what information is being collected, how and for what purpose (see c t-link). Accordingly, Apple maintains four databases with location-based information on its servers: One database contains the coordinates of WLANs and cellular cells. Apple uses the anonymized user data to maintain this database. No information that allows conclusions to be drawn about users ends up in the database. The second database contains diagnostic information from randomly selected users who have to explicitly agree to this use again. The third contains the whereabouts of users in an anonymous form, which does not allow any conclusions to be drawn about specific persons. For example, Apple cites traffic density analysis as the purpose of this database. In the fourth database, Apple notes which user received which iad advertisement. The iad advertising is location-based, but Apple wants to ensure that the advertiser does not receive any information about individual users, especially not their whereabouts. The iphone and ipad store the position data of tens of thousands of cellular and WLAN cells. The sheer volume makes it easy to see where the user should have been, if not exactly when he was there. 18 c t 2011, issue 11 Copyright by Heise Zeitschriften Verlag

19 current smartphones Because this iphone was only in Cologne once, the return journey by train to Hanover can be followed quite well. However, some cell phone towers like the one in Osnabrück are unrealistically far away. What they have in common with Google and Microsoft is that they also maintain databases with the coordinates of WLANs and cellular cells and access the location data of their smartphone users for this purpose. According to their terms of use, Google and Microsoft also store the data anonymously and do not create a movement profile, but they have not disclosed their internals in the same detail as Apple. There is no indication that Apple, Google, or Microsoft are storing more data than stated, that they are slapping on anonymization, or that they are giving unauthorized access to the data. Too Much Stored Apple's errors take place on the iphone itself and are independent of the transmission of the data. Apple admitted three errors a week after the problem became known. The first mistake is that a database used internally in the iphone ends up unencrypted on the PC with which the iphone is synchronized. The second mistake is that this database is getting as big as it is in the first place. The third error concerns the deactivation of the location. It is planned (at Apple, Google and Microsoft) that the smartphone does not send its position data away when the user switches off the location services. This goes hand in hand with functional restrictions, for example Maps can no longer show where the user is. (The fact that the determination of the location is linked to the sending of the data is not apparent from a technical point of view, but that's a different topic) This deactivation does not work properly with the iphone: The database also grows when the user uses the location services in the settings turns off.However, according to our investigations, it grows far less than when the order is switched on, and only under seldom occurring conditions that we cannot exactly understand. The file in question ends up in the iphone backup, under Windows normally in a directory under C: \ Users \ \ AppData \ Roaming \ Apple Computer \ MobileSync \ Backup. ITunes creates a subdirectory there for each synchronized device. The easiest way to identify it is based on the date of the last synchronization. Certain tools determine which file from the backup is involved, or one looks for the file that contains the string CellLocation. It is an SQL database that can be viewed with any reasonably modern viewer such as the SQLite Database Browser 2.x. This database does not contain a complete movement profile of the user, but rather the coordinates of WLAN routers and mobile radio cells in the vicinity of the user together with a time stamp. Each of these radio cells can only be found once in the database, regardless of how often you have been there, and cells may be saved that the user was not near. The exact whereabouts of the user is not recorded. In particular, it is not a database of whereabouts and time stamps of the kind described by Apple in the Location Histories For Location Aware Devices patent, which was sometimes mentioned in this context. Traces of the other location data (diagnosis, GPS data, iad data) were not found in the iphone backup. WLANs are identified via the MAC address of their router, which does not allow any conclusions to be drawn about the operator, mobile radio cells via the three entries MCC (a country code), MNC (provider code) and LAC / CI (managed by the provider). Another identification method is available for the radio cells of the CDMA standard, which is not used in Europe. Table analysis Apple says in the press release about these allegations, what the database is used for: for faster location of the cell phone. Instead of waiting several minutes for GPS tracking, the iphone uses triangulation to determine its location from the coordinates and the reception strengths of the WLAN and radio cells in its surroundings, and it looks up these coordinates in the database. How communication works can be seen in the letter from June 2010. According to this, the iphone sends its GPS coordinates and a list of the received radio cells to Apple as soon as an app wants to determine the position of the cell phone and provided that one is connected to the Internet via WLAN. Apple then sends back the coordinates of these cells, as well as the IDs and coordinates of other WLAN and cell phone cells in the vicinity. If the iphone is only connected via UMTS, the iphone saves the request and sends it to Apple every 12 hours via WLAN to locate it, they are no longer used, but only to maintain the database. However, this description does not seem to be completely up-to-date, because we found some location data in the databases of the editorial devices that we can hardly explain other than that the c t 2011, issue 11 Copyright by Heise Zeitschriften Verlag 19

20 current smartphones Nonetheless, our databases gave a terrifyingly good impression of where users were, the less often they visited an area, the more detailed the log was. In order for an attacker to gain access to the data, they must have access to the user's PC or iPhone, otherwise they will not be able to access the data. In both cases, the attacker will also find more sensitive data there, such as email access, credit card and account information, and all photos. Even the incomplete movement data may be a valuable target for jealous partners, divorce lawyers, suspicious bosses or envious colleagues. In one day Barcelona, ​​Düsseldorf, Hanover, Munich and New Delhi. This shows how limited the data can be used as a movement log. iphone collects data even when no app is calling up the location data. Apple does not reveal what exactly the timestamp stored for each WiFi and cellular location means. In any case, it is not about the exact time when you were there, but rather when the iphone put together the next block of inquiries or sent it off. It is noticeable that hundreds of cell phone cells with identical timestamps appear every 30 minutes. No movement log A complete movement log cannot be determined from the data because each radio cell only appears once. The timestamp says that you may have been there for the first time at this point in time or shortly before. However, the coordinates are also occasionally updated when the locations have changed. The old entry is then overwritten and the old time stamp is lost. The time stamp can also mean that the user was in the vicinity for the last time at this point in time (or shortly before). The user doesn't even have to be near a cell. Our investigations found interesting outliers, especially among the WLAN locations: For example, an editorial iPhone should have been in Hanover, Düsseldorf, Barcelona, ​​Darmstadt and New Delhi at the same time, and on closer inspection at the exhibition grounds in Hanover, Düsseldorf and Barcelona, near a Motorola subsidiary in India and at a university in Darmstadt. The solution to the riddle: The editor was strolling through CeBIT that day, so that the iphone probably came into the reception area of ​​various WLAN routers that were recorded in the Apple database with an earlier location. In response to the location request, Apple obviously sent WLANs that are close to the old location, so we came across dozens of Spanish WLANs in a circle around the exhibition center. The cell phone locations contained transmitters that were dozens of kilometers away, which could hardly be explained by the particularly good ranges of these transmitters. It is possible that the table was out of date here too, after all, the providers occasionally set up their radio cells in new locations. Other explanations are also conceivable, such as peculiarities in the algorithm that decides which cellular cells in the vicinity are communicated to the smartphone. That shouldn't have happened: on April 21st. we switched off the location service of this iPhone on April 26th. it has received over 500 new location information. Outlook Apple has announced that it will eliminate all of the bugs mentioned. In a future update for the iphone and ipad, four measures are to be taken: The database backup no longer ends up on the PC; Entries older than a week are deleted from the database; the error is corrected that the above mechanism partly continues to run even when the location is switched off; When the location is switched off, the previous file should also be completely deleted. In a second, later update, Apple wants to encrypt the database on the iphone itself to protect against attacks via jailbreak. Until the first update has arrived, which was not the case at the time of going to press, users cannot completely defend themselves against data collection. If you reset the cell phone to factory settings, the database disappears. Immediately after activating and setting up an Internet connection, however, the iphone starts collecting again. It is particularly worrying that the faulty failure to switch off the data collection was only noticed through the error that the database is unencrypted in the backup. That does not throw a good light on the handling of confidential data and the seriousness with which the manufacturers devote themselves to data protection. It is to be feared that at some point a major accident will also occur with the data stored at Apple, Google or Microsoft, similar to the Sony hack (see page 22). If an error occurs in the anonymization of the data, millions of movement profiles are open to the attackers. Other service providers can also be affected, for example the operators of live traffic services such as TomTom and Navigon also receive anonymized movement information, and the mobile phone providers even have movement profiles that can be clearly assigned to the mobile phone users. And Apple has now proven that two critical errors can happen at the same time. (jow) 20 c t 2011, issue 11 Copyright by Heise Zeitschriften Verlag

21 Copyright by Heise Zeitschriften Verlag

22 current data security Hartmut Gieselmann The million dollar hack Data thieves break into Sony's networks In mid-April, strangers broke into the servers of the Playstation Network and Sony Online Entertainment and stole data from 103 million accounts. Sony cannot rule out that ten million credit card numbers were also stolen from the thieves. The Playstation Store will not open its doors again until the end of May. Kaz Hirai, head of Sony Computer Entertainment, took more than ten days before he stepped in front of the press with his chief information officer Shinji Hasejima and PR chief Shiro Kambe and apologized with a deep bow. Sony's engineers had failed to install the latest security updates for their Playstation Network web servers. And so Hasejima had to admit that criminals were able to break into the Playstation Network through a known security hole in the web server and copy the data from 78 million user accounts. The data thieves had access to the system from April 17th to 19th, before Sony noticed the attack and switched off the Playstation Network and its new music and video service Qriocity on April 20th, a unique event in the company's history. It wasn't until May 2 that the security experts noticed that the data thieves had also broken into the Sony Online Entertainment (SOE) servers on April 16, and there they found 24.6 million account data along with 12,700 credit card numbers and 10,700 account data from online Stole from RPGs outside of the US. According to Sony, the latter are said to have been stored on an outdated database from 2007, which begs the question: Why does the company keep such sensitive data for so long? The attackers installed a tool on the PSN web server with which they were able to gain access rights to the application server and finally to several database servers of the PSN and to overcome intermediate firewalls. Data records from 78 million PSN and Qriocity accounts were stored unencrypted on the database server, including name, e-mail address, date of birth, gender and login ID; According to Sony, the passwords were stored as hash values. According to Sony, ten million PSN customers had their credit card numbers and billing addresses stored in the system, but these were stored in encrypted form. The three-digit security number on the back of the credit card was not stored in the system. There are no indications of unauthorized access to the credit card database, but this cannot be ruled out because the attacker camouflaged his break-in in several places. A total of 37 million PS3 consoles and 16 million PSPs were registered in the Playstation Network. According to Sony, 3.2 million PSN accounts are registered in Germany. If the proportion is broken down, around 400,000 credit card numbers could be affected in this country. Sony asked those customers who use their PSN or SOE passwords for other purposes to change them there immediately. Although only the hash values ​​of the passwords were stored, they can generally be cracked using the brute force method. Only from a length of eleven characters does the computational effort become too high. Likewise, more attempts at phishing should be expected in the future. With the help of the stolen information, the attackers can address their victims individually and thus appear more credible. Sony itself will not ask its customers for any personal data, either by e-mail, letter or telephone. In the future, PSN and SOE customers should check their credit card statements carefully and report irregularities to their bank. Kaz Hirai promised to support affected customers in the best possible way. In some regions, Sony will also cover the cost of blocking a credit card. Gradual restart The affected PSN data center was maintained by AT&T in California. Sony had been planning a move to a new data center for a long time, which the break-in brought forward and accelerated. The new system will be secured with additional monitoring programs, firewalls and encryption methods. Sony hired three external security companies to investigate the incident and has since called on the FBI to prosecute the criminals. By the time of going to press, the PSN and the SOE servers for the role-playing games Everquest, Everquest 2, Free Realms and DC-Universe were offline. For this issue to appear, the PSN online games, film streaming, playback of films that have already been rented, Playstation Home and the chat system should be restarted. However, the Playstation Store and the Qriocity shop would not reopen until the end of May, announced Hirai. To log in to the new system, Sony wanted to distribute a firmware update for the PS3 and PSP that will force customers to change their password. The SDKs for the developer consoles are also to be exchanged. As compensation, Sony wants to give customers one month of free access to the Playstation Plus and Qriocity services as well as to the SOE role-playing games. Depending on the region, there will be additional free downloads from Sony's games portfolio. Details would be announced by the regional divisions of Sony Computer Entertainment. Source: Sony The hackers penetrated the PSN through a known security hole in the web server and gained access to the application and database server. Investigate data protection officers Shortly after the break-in became known in California, the first class action lawsuit was filed against Sony. This accuses the group of not having adequately secured its customer data and, among other things, violating the Payment Card Industry Data Security Standard (PCI DSS), which stipulates special security precautions. In Europe, it is currently being investigated in Great Britain whether the operating company of the Playstation Network based there has violated data protection regulations and has informed its customers about the incident too late. (hag) 22 c t 2011, issue 11 Copyright by Heise Zeitschriften Verlag

23 Copyright by Heise Zeitschriften Verlag

24 current processors Andreas Stiller Processor whisper From forging and hot iron AMD comments on the ARM rumors, organizes a large developer conference on the subject of fusion, Intel could possibly offer itself to Apple as a chip manufacturer and is introducing the revolutionary 22 nm process with tri Gate transistors before. No, AMD does not want to switch to the ARM architecture for the small mobile devices. ARM's technology hero Jem Davies was invited to be the keynote speaker at the AMD Fusion Developer Conference in Bellevue / Seattle in June, but only so that he could beat the drum for topics such as heterogeneous computing and OpenCL. Davies, however, took the chance beforehand and, like his boss, Warren East, fueled the speculation. According to them, AMD is currently rethinking its mobile strategy and so ARM has a good chance of connecting here. AMD, in the form of product manager John Taylor, felt compelled to straighten things out again. AMD wanted to stick to x86 for the tablet sector too, where its Llano processors and Brazzos platforms are selling so well in netbooks. With the aforementioned developer conference, AMD is finally following suit, after Intel with the IDF and Nvidia with the GTC have been organizing large-scale developer forums for many years at AMD, there were only smaller Tech Day events. However, Nvidia only recently postponed the GPU Technology Conference planned for October this year to next year, in order to avoid the Supercomputer Conference in November and to be able to position itself better internationally, it is officially said. But many scene watchers believe that the next chip called Kepler will simply not be ready in time and that it will take a few more months only comes from a revaluation of the Globalfoundries share. Operationally, AMD was only $ 54 million, compared to 182 million in the previous year. Above all, losses in the investment sector are pressing here, because the processors made a profit of 100 million dollars (previous year: 146 million). And the graphics division brought in 19 million (previously 48 million). With the Phenom II X4 980 Black Edition, AMD now also has the quad-core currently clocked at 3.7 GHz on the x86 market (with 6 MB L3, 125 W TDP, US $ 195 OEM price) sold the fastest Pentium 4 single cores 570, 670 and 672, which reached 3.8 GHz and which at that time with 115 watt TDP were discredited as swallowing woodpeckers. The new Phenom also has a free multiplier and can certainly be heated to 4 GHz and correspondingly higher TDP values. 3D transistors While AMD is one of the few companies in the industry that, despite all ARM efforts, does not yet have a license from the small British design house. The latest important customer for ARM Cortex A9 / A15 is other LG, Intel is broadly positioned in this regard. With Infineon's mobile division, licenses for various smaller ARM chips came into the house; In addition, Intel holds licenses for the ARM946 and especially for the multi-core ARM11 MPCore chip, as used in the HTC Wildfire, iPhone 3G, iPod Touch, Amazon Kindle, Nintendo 3DS and Nokia N800 tablets.Analysts now see an opportunity for Intel, if not as a processor supplier, then at least as a manufacturing forge to its partner Apple for future ipads and iphones. After all, Apple is currently in a violent conflict with its current manufacturing partner Samsung over numerous tablet and smartphone patents. And with the imacs, Mac Pros and MacBooks, the cooperation between Intel and Apple is apparently working out brilliantly. Apple has just released the new imacs with Sandy Bridge processors, which are the first desktop systems to shine with Intel's new Thunderbolt interconnect (see p. 44). In addition, at the beginning of May Intel demonstrated its technological lead with a large-scale webcast on the topic of the 22 nm process. Indeed, Intel is at least a year ahead of assembled competition in manufacturing technology. The P1270 process works with a number of magic tricks so that it can continue to create such tiny structures with 193 nm lasers. In the past, every physics student could have proven that this is not possible in purely physical terms, but it is possible. Liquid (presumably water) had already been introduced between the lenses and the wafer with the 32 nm process. With this so-called immersion lithography alone, structures that are around 40 percent smaller can be achieved. But what CEO Otellini had previously announced as a revolutionary progress goes far beyond the tricky downsizing of structures, because for the first time Intel is also conquering the third dimension of silicon CMOS chips for mass production. As early as 2002, Intel researchers had presented the technology of tri-gate transistors, back then for 65 nm, image: Intel Intel also invents multiplication: Under Multiplying two numbers, Intel has now been granted US patent 7,930,337. Unlike kindergartens with the GEMA fee for children's songs, schools will probably not have to reckon with requirements for the small and large multiplication tables, because behind the cocky title hides a special implementation of the Karatsuba algorithm developed in 1960 by the Russian mathematician Anatoli-Alexejewitsch Karazuba zur fast calculation of long number multiplications. Now, nine years later, at 22 nm, it is ready to be used in processors. They had actually expected their introduction with the 45 nm process, but Intel was still able to get by with classic CMOS transistors. In particular, tri-gate transistors have lower leakage currents and are therefore more energy-efficient than conventional transistors. AMD, IBM and others have also been working on similar techniques (FinFets) for many years. The Sandy Bridge chip, reduced to 22 nm (shrinked), with the new tri-gate transistors that were initially only used for caches, bears the name Ivy Bridge. According to more recent roadmaps, it is only planned for the beginning of 2012. His associated chipset Panther Point so server boss Skaugen at the IDF in Beijing will finally support USB 3.0 in addition to Thunderbolt. But it's about time. (as) After many years of development, they are now being used in the processors with Intel's 22 nm process, the three-dimensional tri-gate transistors. 24 c t 2011, issue 11 Copyright by Heise Zeitschriften Verlag

25 Copyright by Heise Zeitschriften Verlag

26 currently embedded compact voltage converters If you don't want to struggle with constructing efficient switching converters for your own circuit, you can solder the UEI25 DC-DC converter directly onto your circuit board. The small modules (2.4 cm x 2.8 cm x 0.8 cm) deliver either 3.3, 5 or 12 volts of earthquake aftermath electricity wirelessly. The wireless power transmitters bq (transmitter) and bq51013 (receiver) from provide up to 5 watts Texas Instruments. The receiver chip measures just 1.9 mm x 3 mm. The efficiency should reach nearly 93 percent because it is only around and up to 25 watts. At 36 to 75 volts (DC), the input voltage is more tailored to telecommunications electronics than to hobbyist needs. After all, in addition to the SMD version, there is also one for conventional printed circuit boards. The manufacturer Murata specifies the efficiency of the converters with up to 91 percent, the temperature range with 40 to +85 ˇC. (bbe) The UEI25 switching converters work with an efficiency of up to 91 percent. With around 2,000 additional workers, Renesas is currently trying to get a chip factory in Hitachinaka, Japan (Ibaraki province), which has been idle since the severe earthquake, back on its feet. From June 15, 200 mm wafers are due to start up again, and parts of the system could be productive again at the beginning of July. In the meantime, Renesas tries to compensate for the failures with other Fabs. Renesas advises that further power outages or aftershocks could jeopardize this schedule. In addition to many inconspicuous but essential components for electronic devices, Renesas also produced the currently most widespread USB 3.0 chips. The company took over this together with the company NEC. The semiconductor manufacturer's share price slumped from 850 to 590 yen immediately after the earthquake in March, but has since worked its way up to 739 yen. (bbe) Contactless transmission and not about long distances. The receiver chip costs US $ 3.50 in thousands, and the bqtesla150lp Wireless Power Evaluation Kit is available from the Texas Instruments online shop for US $ 299. (bbe) Charging mobile devices wirelessly: The power transformers from Texas Instruments achieve an efficiency of up to 93 percent. Programming aid Mini-Board for Core-i-2000 Embedded Notes The real-time operating system ThreadX from Express Logic now also supports the AMD series G processors. These Atom competitors combine an x86 processor core with an integrated graphics unit. The open source real-time operating system FreeRTOS is entering its seventh round. Existing projects should benefit from the performance improvements without changing their own code, because the kernel is fully downward compatible. Timer callbacks are new, Grace is a little programming helper with this melodious name that Texas Instruments offers free of charge as a plug-in for its own Code Composer Studio. With it, the developer can configure the peripheral units of his MSP430 microcontroller via menus and buttons. Grace then supposedly generates easily readable C code from it. The plugin can generate register settings for A / D converters, operational amplifiers, timers, serial interfaces, clock generators and other peripheral devices for MSP430G2xx and MSP430F2xx chips as well as many ez430 modules. Code Composer Studio can be expanded with plug-ins comparatively easily because it is based on the open source development environment Eclipse. (bbe) Intel's current Core-i processors of the Sandy Bridge generation fit on the mini-ITX mainboard KINO-QM670, but only the mobile versions with G2 socket. The QM67 chipset masters the remote maintenance functions AMT 7.0. A Trusted Platform Module is available as a special accessory. Two SO-DIMM slots accommodate up to 8 GB of RAM; there are two SATA-II and SATA-6G ports each for drives. You can expand with a PCIe x16 and a PCIe mini card. The manufacturer IEI already provides plenty of connections via the ATX cover: 2 x Gigabit Ethernet, 2 x USB 3.0, 2 x USB 2.0, 2 x audio as well as 2 x HDMI and one VGA and RS-232 port each. A single 12-volt line is sufficient for the supply. IEI gives only one example of the power requirement, namely 6.5 A (i.e. 78 watts), in the event that a Core i7 with 2.2 GHz clock frequency is used. In this country, ICP Germany offers the board from 292 euros. (bbe) The only 17 cm x 17 cm large mainboard KINO-QM670 accommodates a Core-i processor for notebooks. which manage without interrupts, a port for the MSP430 microcontroller from Texas Instruments and two additional demo projects. This means that 27 architectures with 17 different toolchains are now supported. The ADP LED driver module from Analog Devices can regulate the currents independently of one another for up to nine LEDs. You can also program it to flash as well as fade in and fade out sequences. 26 Copyright by Heise Zeitschriften Verlag c t 2011, issue 11

27 Copyright by Heise Zeitschriften Verlag

28