Tag Archives: Week

For Sale – Alienware 13 R3 OLED, GTX 1060, i7-7700HQ, 16GB RAM, 512GB SSD

I bought this excellent gaming laptop on here a week or two ago but have decided it’s not for me.

It’s in immaculate condition and comes fully boxed.

Here are the specs:

Alienware 13 – R3
16GB 2667MHz DDR4 Memory Non-ECC
Primary 4-cell 76W/HR Battery
512GB PCIe Solid State Drive
13.3 inch QHD (2560 x 1440) OLED Anti-Glare 400-nits Display with Touch
180W AC Adapter
Processor: Intel® Core™ i7-7700HQ (Quad Core,up to 3.8GHz, 6MB Cache, 45W)
NVIDIA GeForce GTX 1060 Graphics with 6GB GDDR5 vRAM

Here is a link to the thread I bought it from which includes photos.

For Sale – Alienware 13 R3 OLED, GTX 1060, i7, 512GB SSD

I would be willing to accept a trade for the latest Apple iPad Pro

Price and currency: £1100
Delivery: Delivery cost is included within my country
Payment method: BT, PayPal Gift or cash
Location: Accrington
Advertised elsewhere?: Not advertised elsewhere
Prefer goods collected?: I have no preference

______________________________________________________
This message is automatically inserted in all classifieds forum threads.
By replying to this thread you agree to abide by the trading rules detailed here.
Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:

  • Landline telephone number. Make a call to check out the area code and number are correct, too
  • Name and address including postcode
  • Valid e-mail address

DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.

Inside the private event where Microsoft, Google, Salesforce and other rivals share security secrets

Speaking this week on the Microsoft campus, L-R: Erik Bloch, Salesforce security products and program management director; Alex Maestretti, engineering manager on the Netflix Security Intelligence and Response Team; David Seidman, Google security engineering manager; and Chang Kawaguchi, director for Microsoft Office 365 security. (GeekWire Photos / Todd Bishop)

REDMOND, Wash. — At first glance, the gathering inside Building 99 at Microsoft this week looked like many others inside the company, as technical experts shared hard-earned lessons for using machine learning to defend against hackers.

Ram Shankar Siva Kumar, Microsoft security data wrangler, spearheaded the event.

It looked normal, that is, until you spotted the person in the blue Google shirt addressing the group, next to speakers from Salesforce, Netflix and Microsoft, at a day-long event that included representatives of Facebook, Amazon and other big cloud providers and services that would normally treat technical insights as closely guarded secrets.

As the afternoon session ended, the organizer from Microsoft, security data wrangler Ram Shankar Siva Kumar, complimented panelist Erik Bloch, the Salesforce security products and program management director, for “really channeling the Ohana spirit,” referencing the Hawaiian word for “family,” which Salesforce uses to describe its internal culture of looking out for one another.

It was almost enough to make a person forget the bitter rivalry between Microsoft and Salesforce.

Siva Kumar then gave attendees advice on finding the location of the closing reception. “You can Bing it, Google it, whatever it is,” he said, as the audience laughed at the rare concession to Microsoft’s longtime competitor.

It was no ordinary gathering at Microsoft, but then again, it’s no ordinary time in tech. The Security Data Science Colloquium brought the competitors together to focus on one of the biggest challenges and opportunities in the industry.

Machine learning, one of the key ingredients of artificial intelligence, is giving the companies new superpowers to identify and guard against malicious attacks on their increasingly cloud-oriented products and services. The problem is that hackers are using many of the same techniques to take those attacks to a new level.

Dawn Song, UC Berkeley computer science and engineering professor.

“The challenge is that security is a very asymmetric game,” said Dawn Song, a UC Berkeley computer science and engineering professor who attended the event. “Defenders have to defend across the board, and attackers only need to find one hole. So in general, it’s easier for attackers to leverage these new techniques.”

That helps to explain why the competitors are teaming up.

“At this point in the development of this technology it’s really critical for us to move at speed to all collaborate,” explained Mark Russinovich, the Microsoft Azure chief technology officer. “A customer of Google is also likely a customer of Microsoft, and it does nobody any good or gives anybody a competitive disadvantage to keep somebody else’s customer, which could be our own customer, insecure. This is for the betterment of everybody, the whole community.”

[Editor’s Note: Russinovich is a keynoter at the GeekWire Cloud Tech Summit, June 27 in Bellevue, Wash.]

This spirit of collaboration is naturally more common in the security community than in the business world, but the colloquium at Microsoft has taken it to another level. GeekWire is the first media organization to go inside the event, although some presentations weren’t opened up to us, due in part to the sensitive nature of some of the information the companies shared.

The event, in its second year, grew out of informal gatherings between Microsoft and Google, which resulted in part from connections Siva Kumar made on long-distance runs with Google’s tech security experts. After getting approval from his manager, he brought one of the Google engineers to Microsoft two years ago to compare notes with his team.

The closing reception for the Security Data Science Colloquium at Microsoft this week. (GeekWire Photo / Todd Bishop)

Things have snowballed from there. After the first event, last year, Siva Kumar posted about the colloquium, describing it as a gathering of “security data scientists without borders.” As the word got out, additional companies asked to be involved, and Microsoft says this year’s event was attended by representatives of 17 different tech companies in addition to university researchers.

The event reflects a change in Microsoft’s culture under CEO Satya Nadella, as well as a shift in the overall industry’s approach. Of course, the companies are still business rivals that compete on the basis of beating each other’s products. But in years or decades past, many treated security as a competitive advantage, as well. That’s what has changed.

“This is not a competing thing. This is not about us trying to one up each other,” Siva Kumar said. “It just feels like, year over year, our problems are just becoming more and more similar.”

Siamac Mirzaie of Netflix presents at the event. (GeekWire Photo / Todd Bishop)

In one afternoon session this week, representatives from Netflix, one of Amazon Web Services’ marquee customers, gave detailed briefings on the streaming service’s internal machine learning tools, including its “Trainman” system for detecting and reporting unusual user activity.

Developing and improving the system has been a “humbling journey,” said Siamac Mirzaie from the Netflix Science & Analytics Team, before doing a deep dive on the technical aspects of Trainman.

Depending on the situation, he said, Netflix uses either Python, Apache Spark or Flink to bring the data into its system and append the necessary attributes to the data. It then uses simple rules, statistical models and machine learning models to detect anomalies using Flink or Spark, followed by a post-processing layer that uses a combination of Spark and Node.js. That’s followed by a program for visualizing the anomalies in a timeline that people inside the company can use to drill down into and understand specific events.

“The idea is to refine the various data anomalies that we’ve generated in the previous stage into anomalies that our application owner or security analyst can actually relate to,” Mirzaie said.

The stakes are high given the $8 billion that Netflix is expected to spend on content this year.

But the stakes might be even higher for Facebook. The social network, which has been in the international spotlight over misuse of its platform by outside companies and groups, says it uses a combination of automated and manual systems to identify fraudulent and suspicious activity.

Facebook, which held a similar event of its own in April, was among the companies that presented during the gathering at Microsoft this week. Facebook recently announced that it used new machine learning practices to detect more than 500,000 accounts tied to financial scams.

Mark Russinovich, Microsoft Azure CTO, in his conference room on the company’s Redmond campus this week. (GeekWire Photo / Todd Bishop)

During his keynote, Microsoft’s Russinovich talked in detail about Windows PowerShell, the command-line program that is a popular tool for attackers in part because it’s built into the system. Microsoft’s Windows Defender Advanced Threat Protection is designed to detect suspicious command lines, and Microsoft was previously using a traditional model that was trained to recognize potentially malicious sequences of characters.

“That only got us so far,” Russinovich said in an interview.

After brainstorming ways to solve the problem, the company’s security defense researchers figured out how to apply deep neural networks, more commonly used in vision-based object detection, for use in PowerShell malicious script detection, as well. They essentially came up with a way to encode command lines to make them look like images to the machine learning model, Russinovich explained. The result surpassed the traditional technique “by a significant amount,” he said.

At the closing panel discussion, David Seidman, Google security engineering manager, summed up the stated philosophy of the event. “We are not trying to compete on the basis of our corporate security,” Seidman said. “Google is not trying to get ahead of Microsoft in the cloud because Microsoft got compromised. That’s the last thing we want to see.”

“We are fighting common enemies,” Seidman added. “The same attackers are coming after all of us, and an incident at one company is going to affect that customer’s trust in all the cloud companies they do business with. So we have very much aligned interests here.”

FBI fights business email compromise with global crackdown

The United States Department of Justice this week announced the arrests of 74 individuals alleged to have committed fraud by participating in business-email-compromise scams.

The arrests are the result of an international enforcement effort, coordinated by the FBI, known as Operation Wire Wire, which was designed to crack down on email-account-compromise schemes targeting individuals and businesses of all sizes.

Business email compromise (BEC) is a growing problem, accounting for the highest reported losses, according to the FBI’s “2017 Internet Crime Report.” Criminal organizations use social engineering to identify employees who are authorized to make financial transactions, and then send fraudulent emails from company executives or foreign suppliers requesting wire transfers of funds.

Some schemes are directed at individuals in human resources or other departments in an effort to collect personally identifiable information, such as employee tax records. Others target individual victims, especially those involved in real estate transactions and the elderly.

In January, according to the Department of Justice, the U.S. federal agencies worked with international law enforcement on Operation Wire Wire to find and prosecute alleged fraudsters. The six-month coordinated effort involved the U.S. Department of Homeland Security, the U.S. Department of the Treasury and the U.S. Postal Inspection Service, and it resulted in 42 arrests in the United States, 29 in Nigeria and three in Canada, Mauritius and Poland. Law enforcement recovered $14 million in financial wire fraud during the operation, and they seized close to $2.4 million.

‘Nigerian princes’ turn to BEC

The techniques and tactics of Nigerian criminal organizations have become more sophisticated, according to Agari Data Inc. The email security company captured and analyzed the contents of 78 email accounts associated with 10 criminal organizations — nine in Nigeria — and reported increased BEC activities against North American companies and individuals between 2016 and 2018.

The research involved 59,692 unique messages in email communications originating from 2009 to 2017. According to the findings, business email compromise represented the largest attack vector for email fraud at 24%, even though many of these criminal groups migrated to BEC attacks, starting in 2016. Previously, these groups had focused predominantly on “romance” fraud schemes.

Business email compromise often overlaps or has similarities with cyberfraud schemes involving romance, lotteries, employment opportunities, vehicle sales and rental scams. In some cases, money mules “hired” using romance schemes or fraudulent employment opportunities may not be aware of the BEC scams. Mules receive the ill-gotten funds stateside and transfer the monies to difficult-to-trace, off-shore accounts set up by criminals.

Since January, up to $1 million in assets has been seized domestically, and 15 alleged money mules have been identified by FBI task forces and charged “for their role in defrauding victims.”

BEC schemes are hard to detect, because they do not rely on victims downloading malicious email attachments or clicking on fake URLs. Instead, this type of cyberfraud uses identity deception — 82%, according to Agari — email spoofing or corrupted email accounts, accessed via malware or credential theft. Researchers found 3.97% of intended targets who responded to the initial emails used in business email compromise became victims.

For Sale – i5-8400 CPU (OEM) 2 Years Warranty

Purchased a week or so ago but decided to go for a i7 will come with original purchase receipt for the 2 year warranty (cex). Excellent CPU ran really cool with my cheap AIO water cooler.

£125

Price and currency: 125
Delivery: Delivery cost is included within my country
Payment method: Bank Transfer
Location: Stoke-on-Trent
Advertised elsewhere?: Advertised elsewhere
Prefer goods collected?: I have no preference

______________________________________________________
This message is automatically inserted in all classifieds forum threads.
By replying to this thread you agree to abide by the trading rules detailed here.
Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:

  • Landline telephone number. Make a call to check out the area code and number are correct, too
  • Name and address including postcode
  • Valid e-mail address

DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.

Box workflow gets upgrade with Progressly purchase

Box last week acquired workflow software company Progressly for an undisclosed amount, with the hopes of upgrading its own core workflow and automation to better suit its customers.

The acquisition of Progressly is an interesting one for document management company Box, as it just last year released Relay, a product it developed in partnership with IBM that is also meant to help companies with workflow management. The idea behind the Progressly purchase, according to analysts, is to beef up the Box workflow capabilities.

“While Box and IBM have been talking about Relay for years, I have not seen much traction of it in the industry,” said Alan Lepofsky, a principal analyst at Constellation Research Inc. “I think it will be good for Box to expand the capabilities of their own native workflow engine, increasing the number of triggers and actions that can occur both inside Box, as well as becoming an engine for processes within other tools.”

The importance of workflow automation for companies can’t be understated. Between onboarding, contract management and other business necessities, a company can save a lot of time and money with a capable automation process.

While the Box workflow capabilities were there, they were described as “rudimentary” by Holly Muscolino, a research vice president at IDC.

“The way [Box] is positioning it is that the software from Progressly, or at least the team at Progressly, will develop software that will go into the core Box product,” Muscolino said. “They have a rudimentary workflow in Box, but this will enhance that.”

Box also has partnerships established with other business process companies, like Nintex and Pega.  Muscolino said she sees this acquisition as potentially adding triggers to get partner processes automated within Box.

And improving the Box workflow capabilities is not expected to lead to a new product, according to Lepofsky, but rather enhance the existing features within Box.

Native workflow inside Box should be considered more of a feature and not an additional monetary channel.
Alan Lepofskyprincipal analyst, Constellation Research Inc.

“Native workflow inside Box should be considered more of a feature and not an additional monetary channel,” Lepofsky said.

Lepofsky added that customers can find more automation capabilities within competitors, like Microsoft OneDrive and Flow. And by beefing up the workflow with the Box acquisition of Progressly, the company is trying to better challenge the other players in the market.

“I think the driving factor was customer need,” Lepofsky said. “The opportunity to help automate content-centric workflows is a big step in helping people get their jobs done.”

While improving the Box workflow features seemed to be the main reason for the Progressly purchase, Box’s chief product officer, Jeetu Patel, also made it clear that the small team of 12 at Progressly was a factor in the acquisition, calling the team in a blog post a “group of highly talented individuals that have created a world-class product with a vision that is directly aligned with the team here at Box.”

Patel added that the Progressly team will “allow us to play a bigger role in how Box customers digitize and automate business processes.”

The terms of the acquisition were not disclosed.

MEF targets multivendor interoperability for network services

MEF this week touted its progress in multivendor interoperability by announcing its active software-defined WAN implementation project. Three SD-WAN vendors — Riverbed Technology, Nuage Networks from Nokia and VMware’s VeloCloud — are leading the MEF project, focusing on multivendor SD-WAN use cases. Software development services provider Amartus is also participating with the SD-WAN vendors.

MEF — a Los Angeles-based association, with more than 200 members — launched its multivendor SD-WAN implementation project last year in an attempt to standardize services across multiple providers and technologies. But multivendor interoperability has numerous aspects, according to Joe Ruffles, global standards architect at Riverbed, based in San Francisco, and co-leader of the SD-WAN implementation project. Companies merge; they need to partner with somebody to increase geographic reach, or they want basic interoperability and service chaining, he said.

The implementation project allows member vendors to get their hands dirty, while actively testing and proving out proposed SD-WAN interoperability issues, Ruffles said. Each vendor uses MEF’s cloud-based dev-test platform, MEFnet, to develop its respective SD-WAN technology. They then interconnect and orchestrate those SD-WAN implementations using MEF’s Presto API, which is part of MEF’s Lifecycle Service Orchestration (LSO) framework.

The Presto API communicates with orchestration and management to help service providers manage multiple SD-WAN implementations with a single orchestrator. Additionally, it helps create better multivendor interoperability among SD-WAN controllers and edge devices, according to Ralph Santitoro, head of SDN, network functions virtualization and SD-WAN at Fujitsu and MEF distinguished fellow.

“Member companies can get together and connect their appliances or run software in the environment and actually do things,” Santitoro said. “They can actually prove out different topics or items that are important to them or the industry.”

Other MEF members can build from the existing SD-WAN implementation project or suggest additional projects and issues, Ruffles said. “It’s not so much a phase as it is continuous, depending on who has an issue and who’s available to work on it,” he added.

Standardized specs lead to better automation processes

The SD-WAN implementation project work benefits more than its current participants, according to Santitoro. By “playing in the sandbox,” members can feed the knowledge learned from the testing environment into MEF’s work on SD-WAN specifications. For example, participants can more accurately define SD-WAN requirements, capabilities, architecture and what’s needed for multivendor interoperability.

“We learn by hand what has to be done, and then we use that information to make changes or additions to the API,” Ruffles said.

In addition to the SD-WAN specs, MEF this week published specs for retail and wholesale Ethernet services, subscriber and operator Layer 1 services, and IP services. These services — especially IP services — have historically been defined in various ways, Santitoro said, which can impede automation. To combat the discrepancies, MEF is defining the fundamentals of IP services and their attributes, which will then help define and build broader services.

“We’ll create things like the VPN [virtual private network] service, internet access service, private cloud access service and operator wholesale services — particularly the IP-VPN case,” said David Ball, MEF’s services committee co-chair and editor of the MEF IP services project.

These definitions and specs will then be fed into MEF’s LSO architecture to help establish a standard vocabulary, so SD-WAN buyers and sellers understand what they need or get with particular services, Santitoro said. Further, defining services and their requirements helps create standardized processes for orchestration and automation, he added.

“Automation is really about consistency and being able to create a model of a service, so services are deployed, designed and implemented in a similar fashion,” he said.

For Sale – Steelseries Stratus XL Joypad….. prices reduced

Bought a new system this week ( MSI Trident 3) so upgraded the ram from the machine, the machine has only been turned on once and run for 30 min so pretty much new.
Had a quick look around online and it seems the going rate is around £80ish
So £55 delivered obviously if it can be found cheaper please link and i will adjust. New price of £35 deliverd

Also i have a brand new sealed steelseries joypad again the cheapest i found was £47
So £40 new price £35 delivered

View attachment 1019067

View attachment 1019068

Price and currency: £55 and £40
Delivery: Delivery cost is not included
Payment method: BT
Location: Portsmouth
Advertised elsewhere?: Not advertised elsewhere
Prefer goods collected?: I have no preference

______________________________________________________
This message is automatically inserted in all classifieds forum threads.
By replying to this thread you agree to abide by the trading rules detailed here.
Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:

  • Landline telephone number. Make a call to check out the area code and number are correct, too
  • Name and address including postcode
  • Valid e-mail address

DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.

Click to expand…

Cato’s network security feature on the hunt for threats

Cato Networks last week upped its SD-WAN-as-a-service offering Cato Cloud with the Cato Threat Hunting System, a network security feature built into the software-defined WAN platform to detect threats and minimize the time it takes to remove them.

The Cato Threat Hunting System offers full visibility into network traffic, and can access and identify real-time traffic that any endpoint initiates, Cato said in a statement. This means Cato can see IP addresses, session and flow information and application types within the network.

Additionally, Cato said it uses machine learning algorithms to “mine the network” for suspicious activity. If the network security feature deems something is a risk, human analysts from Cato inspect and confirm the alerts and notify the customers of the threat. Customers can also use the security operations center to deploy policies to contain exposed endpoints. 

Cato said the Threat Hunting System differs in its approach by eliminating the need to install additional monitoring tools or sensors within the network. Instead, it is integrated into Cato’s SD-WAN platform. Cato already offers network security features, including next-generation firewalls, secure web gateways and advanced threat protection.

Masergy offers adjustable bandwidth for public connectivity

Masergy recently updated its managed SD-WAN offering to let customers adjust WAN bandwidth as-needed. Masergy previously offered the ability to scale bandwidth in private networks, but the recent update targets networks using public connectivity like broadband internet.

Customers can control their global SD-WAN bandwidth consumption in real-time through Masergy’s Intelligent Service Control portal, according to a company statement. Based on location, adjustments can be made to appropriately designate bandwidth and prepare for data consumption spikes or plunges, Masergy said. The update also allows customers to schedule automatic bandwidth adjustments for upcoming projects.

The update supports uses that require atypical bandwidth usage, such as data backups, multisite video conferences and disaster recovery measures, Masergy said. Customers are billed incrementally for specific increases of bandwidth consumption. The feature is available now as a built-in option in Masergy’s Intelligent Service Control portal.

Verizon SDN deployment growth report results

Enterprises see the value of software-defined networking deployment to help scale network functionality, according to a recent report sponsored by Verizon.

In a survey of 165 senior IT leaders, 49% said they considered the imperative to scale — to increase network agility in order to deliver services more efficiently — a major trigger for SDN deployment. Following closely at 47% was the need to address network security issues and the desire to reduce costs by deploying SDN. In conjunction with network security, respondents said they thought increased network security was a major SDN benefit, in addition to better application performance.

The top concern about SDN deployment included the potential for disruption during implementation. These included concerns about the complexity of migrating existing services. A full 62% of respondents indicated they were concerned they might lack the right in-house IT skills to handle the migration.

In terms of actual deployment, 57% of respondents replied they expect to deploy SDN within the next two years; 15% reported they had already deployed it or were currently in the process of implementation.

London-based Longitude, a research firm acquired by the Financial Times, conducted the survey in the first quarter of 2018.

Lifesize looks to make outfitting huddle rooms cheaper

Lifesize this week released a device for wireless screen sharing and previewed a software-based video conferencing room kit. The products should appeal to businesses looking for relatively cheap ways to add collaboration technology to huddle rooms.

Companies can plug Lifesize Share into any monitor with an HDMI port, including the video conferencing systems of third-party providers. The device lets users wirelessly share files, individual browser tabs or their computer screens. It also syncs with cellphones.

Users can manage all of the Lifesize Share displays through an online portal, which is accessible via a customizable URL. Lifesize, meanwhile, keeps the software of the Share devices updated via the cloud. The devices could be particularly useful in huddle rooms, which often lack the more expensive equipment found in large conference rooms.

“Really, it’s about keeping it simple for users when they bring their own device into the room,” said Rob Arnold, an analyst at Frost & Sullivan. “This alleviates that physical connection problem.”

Cisco released a similar product last month, Cisco Webex Share, which is expected to become available this fall. Dozens of other products for sharing content wirelessly from PCs and mobile devices are already on the market — perhaps the best-selling among them being Barco ClickShare, Arnold said. Despite the number of available products, demand for more options is growing.

Businesses often cite “content” as the second most important aspect of a meeting, behind audio and above video, Arnold said. “Some rooms don’t really need video, but you need content, and you need audio.”

The ability to manage Lifesize Share devices from an online portal could help the product stand out, said Ira Weinstein, managing partner of Recon Research Inc., based in Coral Springs, Fla.

“It’s a lower-cost device with some of the features of some of the more expensive platforms,” Weinstein said. Lifesize Share costs $499, which includes a two-year subscription and warranty.

Lifesize meeting room kit targets huddle rooms

The Lifesize meeting room kit, called Dash, lets businesses turn meeting rooms into resources people can reserve through calendaring software and manage using an Android or iOS tablet left in the room. The software application that facilitates the connection runs on a Chromebox.

The vendor plans to demo its meeting room kit at the InfoComm conference in Las Vegas next week. The platform competes against similar products available from web conferencing vendors, including Zoom and BlueJeans.

Lifesize is known for its Icon series video conferencing cameras and conference phones. However, many businesses can’t afford to purchase those endpoints for all of their huddle rooms. Therefore, Lifesize hopes Dash appeals to existing customers as a lower-cost alternative.

Lifesize released a cloud-based web conferencing platform four years ago to replace its on-premises video conferencing servers. The announcements of Dash and Share this week are the vendor’s latest attempts to pivot toward a business model based on the sale of software and services that complement its hardware.

“This is a way for taking an existing Lifesize customer and making it more cost-effective for them to scale,” Weinstein said of Dash. “And I think it’s a great way to drop the overall cost of people who are considering getting further into video, but have found it cost-prohibitive.”

For Sale – Steelseries Stratus XL Joypad….. prices reduced

Bought a new system this week ( MSI Trident 3) so upgraded the ram from the machine, the machine has only been turned on once and run for 30 min so pretty much new.
Had a quick look around online and it seems the going rate is around £80ish
So £55 delivered obviously if it can be found cheaper please link and i will adjust. New price of £35 deliverd

Also i have a brand new sealed steelseries joypad again the cheapest i found was £47
So £40 new price £35 delivered

View attachment 1019067

View attachment 1019068

Price and currency: £55 and £40
Delivery: Delivery cost is not included
Payment method: BT
Location: Portsmouth
Advertised elsewhere?: Not advertised elsewhere
Prefer goods collected?: I have no preference

______________________________________________________
This message is automatically inserted in all classifieds forum threads.
By replying to this thread you agree to abide by the trading rules detailed here.
Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:

  • Landline telephone number. Make a call to check out the area code and number are correct, too
  • Name and address including postcode
  • Valid e-mail address

DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.

Click to expand…