Tag Archives: that

For Sale – AMD Ryzen 2700X – Asus ROG Crosshair VII Hero X470 – Powercolor RX580 8GB V1 (Better Cooler)

Ok guys i have for sale these items that are only a couple of months old.

AMD Ryzen 2700X (without Cooler) – £220
Asus ROG Crosshair X470 Vii – £180
2 x Powercolor RX580 8GB GPU £190 each
Asus RT-AC88U AC3100 Dual-Band Router £130
EVGA 1070Ti Black edition £350

All come fully boxed as new and come with receipts for warranty.

Price and currency: 220
Delivery: Delivery cost is not included
Payment method: BT
Location: Oldham
Advertised elsewhere?: Advertised elsewhere
Prefer goods collected?: I prefer the goods to be collected

______________________________________________________
This message is automatically inserted in all classifieds forum threads.
By replying to this thread you agree to abide by the trading rules detailed here.
Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:

  • Landline telephone number. Make a call to check out the area code and number are correct, too
  • Name and address including postcode
  • Valid e-mail address

DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.

Hyper-V HyperClear Mitigation for L1 Terminal Fault

Introduction

A new speculative execution side channel vulnerability was announced recently that affects a range of Intel Core and Intel Xeon processors. This vulnerability, referred to as L1 Terminal Fault (L1TF) and assigned CVE 2018-3646 for hypervisors, can be used for a range of attacks across isolation boundaries, including intra-OS attacks from user-mode to kernel-mode as well as inter-VM attacks. Due to the nature of this vulnerability, creating a robust, inter-VM mitigation that doesn’t significantly degrade performance is particularly challenging.

For Hyper-V, we have developed a comprehensive mitigation to this attack that we call HyperClear. This mitigation is in-use by Microsoft Azure and is available in Windows Server 2016 and later. The HyperClear mitigation continues to allow for safe use of SMT (hyper-threading) with VMs and, based on our observations of deploying this mitigation in Microsoft Azure, HyperClear has shown to have relatively negligible performance impact.

We have already shared the details of HyperClear with industry partners. Since we have received questions as to how we are able to mitigate the L1TF vulnerability without compromising performance, we wanted to broadly share a technical overview of the HyperClear mitigation and how it mitigates L1TF speculative execution side channel attacks across VMs.

Overview of L1TF Impact to VM Isolation

As documented here, the fundamental premise of the L1TF vulnerability is that it allows a virtual machine running on a processor core to observe any data in the L1 data cache on that core.

Normally, the Hyper-V hypervisor isolates what data a virtual machine can access by leveraging the memory address translation capabilities provided by the processor. In the case of Intel processors, the Extended Page Tables (EPT) feature of Intel VT-x is used to restrict the system physical memory addresses that a virtual machine can access.

Under normal execution, the hypervisor leverages the EPT feature to restrict what physical memory can be accessed by a VM’s virtual processor while it is running. This also restricts what data the virtual processor can access in the cache, as the physical processor enforces that a virtual processor can only access data in the cache corresponding to system physical addresses made accessible via the virtual processor’s EPT configuration.

By successfully exploiting the L1TF vulnerability, the EPT configuration for a virtual processor can be bypassed during the speculative execution associated with this vulnerability. This means that a virtual processor in a VM can speculatively access anything in the L1 data cache, regardless of the memory protections configured by the processor’s EPT configuration.

Intel’s Hyper-Threading (HT) technology is a form of Simultaneous MultiThreading (SMT). With SMT, a core has multiple SMT threads (also known as logical processors), and these logical processors (LPs) can execute simultaneously on a core. SMT further complicates this vulnerability, as the L1 data cache is shared between sibling SMT threads of the same core. Thus, a virtual processor for a VM running on a SMT thread can speculatively access anything brought into the L1 data cache by its sibling SMT threads. This can make it inherently unsafe to run multiple isolation contexts on the same core. For example, if one logical processor of a SMT core is running a virtual processor from VM A and another logical processor of the core is running a virtual processor from VM B, sensitive data from VM B could be seen by VM A (and vice-versa).

Similarly, if one logical processor of a SMT core is running a virtual processor for a VM and the other logical processor of the SMT core is running in the hypervisor context, the guest VM could speculatively access sensitive data brought into the cache by the hypervisor.

Basic Inter-VM Mitigation

To mitigate the L1TF vulnerability in the context of inter-VM isolation, the most straightforward mitigation involves two key components:

  1. Flush L1 Data Cache On Guest VM Entry – Every time the hypervisor switches a processor thread (logical processor) to execute in the context of a guest virtual processor, the hypervisor can first flush the L1 data cache. This ensures that no sensitive data from the hypervisor or previously running guest virtual processors remains in the cache. To enable the hypervisor to flush the L1 data cache, Intel has released updated microcode that provides an architectural facility for flushing the L1 data cache.
  2. Disable SMT – Even with flushing the L1 data cache on guest VM entry, there is still the risk that a sibling SMT thread can bring sensitive data into the cache from a different security context. To mitigate this, SMT can be disabled, which ensures that only one thread ever executes on a processor core.

The L1TF mitigation for Hyper-V prior to Windows Server 2016 employs a mitigation based on these components. However, this basic mitigation has the major downside that SMT must be disabled, which can significantly reduce the overall performance of a system. Furthermore, this mitigation can result in a very high rate of L1 data cache flushes since the hypervisor may switch a thread between the guest and hypervisor contexts many thousands of times a second. These frequent cache flushes can also degrade the performance of the system.

HyperClear Inter-VM Mitigation

To address the downsides of the basic L1TF Inter-VM mitigation, we developed the HyperClear mitigation. The HyperClear mitigation relies on three key components to ensure strong Inter-VM isolation:

  1. Core Scheduler
  2. Virtual-Processor Address Space Isolation
  3. Sensitive Data Scrubbing

Core Scheduler

The traditional Hyper-V scheduler operates at the level of individual SMT threads (logical processors). When making scheduling decisions, the Hyper-V scheduler would schedule a virtual processor onto a SMT thread, without regards to what the sibling SMT threads of the same core were doing. Thus, a single physical core could be running virtual processors from different VMs simultaneously.

Starting in Windows Server 2016, Hyper-V introduced a new scheduler implementation for SMT systems known as the “Core Scheduler“. When the Core Scheduler is enabled, Hyper-V schedules virtual cores onto physical cores. Thus, when a virtual core for a VM is scheduled, it gets exclusive use of a physical core, and a VM will never share a physical core with another VM.

With the Core Scheduler, a VM can safely take advantage of SMT (Hyper-Threading). When a VM is using SMT, the hypervisor scheduling allows the VM to use all the SMT threads of a core at the same time.

Thus, the Core Scheduler provides the essential protection that a VM’s data won’t be directly disclosed across sibling SMT threads. It protects against cross-thread data exposure of a VM since two different VMs never run simultaneously on different threads of the same core.

However, the Core Scheduler alone is not sufficient to protect against all forms of sensitive data leakage across SMT threads. There is still the risk that hypervisor data could be leaked across sibling SMT threads.

Virtual-Processor Address Space Isolation

SMT Threads on a core can independently enter and exit the hypervisor context based on their activity. For example, events like interrupts can cause a SMT thread to switch out of running the guest virtual processor context and begin executing the hypervisor context. This can happen independently for each SMT thread, so one SMT thread may be executing in the hypervisor context while its sibling SMT thread is still running a VM’s guest virtual processor context. An attacker running code in the less trusted guest VM virtual processor context on one SMT thread can then use the L1TF side channel vulnerability to potentially observe sensitive data from the hypervisor context running on the sibling SMT thread.

One potential mitigation to this problem is to coordinate hypervisor entry and exit across SMT threads of the same core. While this is effective in mitigating the information disclosure risk, this can significantly degrade performance.

Instead of coordinating hypervisor entry and exits across SMT threads, Hyper-V employs strong data isolation in the hypervisor to protect against a malicious guest VM leveraging the L1TF vulnerability to observe sensitive hypervisor data. The Hyper-V hypervisor achieves this isolation by maintaining separate virtual address spaces in the hypervisor for each guest SMT thread (virtual processor). When the hypervisor context is entered on a specific SMT thread, the only data that is addressable by the hypervisor is data associated with the guest virtual processor associated with that SMT thread. This is enforced through the hypervisor’s page table selectively mapping only the memory associated with the guest virtual processor. No data for any other guest virtual processor is addressable, and thus, the only data that can be brought into the L1 data cache by the hypervisor is data associated with that current guest virtual processor.

Thus, regardless of whether a given virtual processor is running in the guest VM virtual processor context or in the hypervisor context, the only data that can be brought into the cache is data associated with the active guest virtual processor. No additional privileged hypervisor secrets or data from other guest virtual processors can be brought into the L1 data cache.

This strong address space isolation provides two distinct benefits:

  1. The hypervisor does not need to coordinate entry and exits into the hypervisor across sibling SMT threads. So, SMT threads can enter and exit the hypervisor context independently without any additional performance overhead.
  2. The hypervisor does not need to flush the L1 data cache when entering the guest VP context from the hypervisor context. Since the only data that can be brought into the cache while executing in the hypervisor context is data associated with the guest virtual processor, there is no risk of privileged/private state in the cache that needs to be protected from the guest. Thus, with this strong address space isolation, the hypervisor only needs to flush the L1 data cache when switching between virtual cores on a physical core. This is much less frequent than the switches between the hypervisor and guest VP contexts.

Sensitive Data Scrubbing

There are cases where virtual processor address space isolation is insufficient to ensure isolation of sensitive data. Specifically, in the case of nested virtualization, a single virtual processor may itself run multiple guest virtual processors. Consider the case of a L1 guest VM running a nested hypervisor (L1 hypervisor). In this case, a virtual processor in this L1 guest may be used to run nested virtual processors for L2 VMs being managed by the L1 nested hypervisor.

In this case, the nested L1 guest hypervisor will be context switching between each of these nested L2 guests (VM A and VM B) and the nested L1 guest hypervisor. Thus, a virtual processor for the L1 VM being maintained by the L0 hypervisor can run multiple different security domains – a nested L1 hypervisor context and one or more L2 guest virtual machine contexts. Since the L0 hypervisor maintains a single address space for the L1 VM’s virtual processor, this address space could contain data for the nested L1 guest hypervisor and L2 guests VMs.

To ensure a strong isolation boundary between these different security domains, the L0 hypervisor relies on a technique we refer to as state scrubbing when nested virtualization is in-use. With state scrubbing, the L0 hypervisor will avoid caching any sensitive guest state in its data structures. If the L0 hypervisor must read guest data, like register contents, into its private memory to complete an operation, the L0 hypervisor will overwrite this memory with 0’s prior to exiting the L0 hypervisor context. This ensures that any sensitive L1 guest hypervisor or L2 guest virtual processor state is not resident in the cache when switching between security domains in the L1 guest VM.

For example, if the L1 guest hypervisor accesses an I/O port that is emulated by the L0 hypervisor, the L0 hypervisor context will become active. To properly emulate the I/O port access, the L0 hypervisor will have to read the current guest register contents for the L1 guest hypervisor context, and these register contents will be copied to internal L0 hypervisor memory. When the L0 hypervisor has completed emulation of the I/O port access, the L0 hypervisor will overwrite any L0 hypervisor memory that contains register contents for the L1 guest hypervisor context. After clearing out its internal memory, the L0 hypervisor will resume the L1 guest hypervisor context. This ensures that no sensitive data stays in the L0 hypervisor’s internal memory across invocations of the L0 hypervisor context. Thus, in the above example, there will not be any sensitive L1 guest hypervisor state in the L0 hypervisor’s private memory. This mitigates the risk that sensitive L1 guest hypervisor state will be brought into the data cache the next time the L0 hypervisor context becomes active.

As described above, this state scrubbing model does involve some extra processing when nested virtualization is in-use. To minimize this processing, the L0 hypervisor is very careful in tracking when it needs to scrub its memory, so it can do this with minimal overhead. The overhead of this extra processing is negligible in the nested virtualization scenarios we have measured.

Finally, the L0 hypervisor state scrubbing ensures that the L0 hypervisor can efficiently and safely provide nested virtualization to L1 guest virtual machines. However, to fully mitigate inter-VM attacks between L2 guest virtual machines, the nested L1 guest hypervisor must implement a mitigation for the L1TF vulnerability. This means the L1 guest hypervisor needs to appropriately manage the L1 data cache to ensure isolation of sensitive data across the L2 guest virtual machine security boundaries. The Hyper-V L0 hypervisor exposes the appropriate capabilities to L1 guest hypervisors to allow L1 guest hypervisors to perform L1 data cache flushes.

Conclusion

By using a combination of core scheduling, address space isolation, and data clearing, Hyper-V HyperClear is able to mitigate the L1TF speculative execution side channel attack across VMs with negligible performance impact and with full support of SMT.

GE rumors highlight digital culture hardship for CIOs

Headlines that GE is planning to sell off pieces of its digital division spread like wildfire across Wall Street and the tech community. The rumors are part of an ongoing narrative for GE, as it attempts to become part software company.

GE’s digital ambitions started in 2011 under Jeff Immelt’s direction, and the shift to software has seen its share of fits and starts since the launch of GE Digital in 2015. But rather than debate whether the latest rumors are true, CIOs should be taking notes on the digital transformation master class unfolding before their eyes.

GE’s turnaround CEO, John Flannery, is attempting to achieve a delicate balance that right-sizes the company, but does not give up on the company’s push to disrupt the industrial space with digital technologies.

Indeed, tech experts believe the rumors about GE Digital — true or not — illustrate how hard it is to create a digital strategy and build a digital culture.

“Not every company is going to be a software company for the majority of its revenue. But every company has to be a technology company at heart,” said Nigel Fenwick, an analyst at Forrester Research. “And that means figuring out what kind of changes, culturally, companies are going to need in order to adopt a digital mindset.”

‘Strategic clarity’

The recent rumors about GE Digital triggered a response from Flannery, who quickly published a piece that highlighted the company’s commitment to digital, to the industrial internet of things and to its technology platform Predix. And it would be surprising if GE planned to abandon its investment in the industrial internet of things, as the impact that IoT and digital devices will have on every industry will be profound, according to Alfonso Velosa, an analyst at Gartner.

“Everybody is starting to see this. The problem is, it’s still early days,” he said.

For CIOs charged with digital transformation, one takeaway from the GE rumor mill is unambiguous. To succeed, CIOs will need to think through difficult questions, such as how to integrate the technology into business processes and customer processes, as well as when to build technology internally and when to work with trusted partners.

Developing a blueprint that addresses questions like these requires a clear set of strategic objectives from senior leaders, or what Velosa called “strategic clarity.” Otherwise, companies risk taking their eye off what they see as the ultimate prize, Velosa said.

Case in point: GE’s original idea was to implement data centers for customers. “At a certain point, they realized that wasn’t their differentiation,” he said. “But investing in either a data center and/or a [colocation] strategy took resources and people’s attention away from what was really the core problem.”

Chip Childers, CTO at Cloud Foundry Foundation, an open source cloud computing project based in San Francisco, recommended that CIOs of more traditional companies — be they manufacturing or not — also look at talent when taking on a digital transformation project. He said they should take stock of the technical skills they have on hand and how those skills can support product development.

If talent gaps exist, Childers suggested CIOs seek out domain experts they can train “to go build the software, systems and applications that are going to be valuable to the enterprise customer.”

Getting a seat at the product development table may not be feasible for all CIOs, especially those who face the antiquated perspective that IT is a cost center, rather than a strategic partner. In those cases, a CIO’s best strategy is “to figure out how to be an amazing service provider to the product team,” Childers said.

A digital culture

Nigel Fenwick, analyst, ForresterNigel Fenwick

Technology and strategy aside, the bigger digital transformation barrier for GE — and for most companies — is culture, according to Forrester’s Fenwick.

“Culture comes down to how to prioritize what to do next, how do you determine where to invest your dollars, and how do you determine how to recognize innovation inside the company,” he said.

A company like GE, which builds products to 99.99% perfection, also has to figure out how to enable its employees to fail fast inside the company. And that’s no easy task, according to Fenwick. “They’ve learned how to build a successful foundation to develop products that work right the first time. Then, you try to change that culture,” he said. “That’s a very difficult, uphill battle.”

Every company has to be a technology company at heart. And that means figuring out what kind of changes, culturally, companies are going to need in order to adopt a digital mindset.
Nigel Fenwickanalyst at Forrester

A good way for CIOs to start chipping at the entrenched culture is metrics — what Fenwick said is the low-hanging fruit for establishing a digital culture.

“Metrics drive behavior,” he said. “And the behavior of employees is a key part of culture.”

Rather than align IT metrics to business metrics, IT metrics should be the same as business metrics. CIOs should look to business units or marketing and create metrics that hold IT professionals accountable to business goals, such as revenue, profitability and customer impact.

Companies that are successfully driving digital transformation see customer metrics such as net promoter score or customer satisfaction as critical to their longevity.

“They believe that the revenue of the future will follow these customer metrics,” he said.

While common metrics may seem small, Fenwick said it’s an important step for IT and for the enterprise as a whole. A shared set of goals can, for example, help create a common language for the company, which can reduce friction between departments and get everyone focused on the same goals, according to Fenwick.

“Getting that focus and making sure everyone in IT understands the reason they’re paid to come into work every day is not to write software. They’re paid to come into work every day to create value for customers, and they do that by writing software,” Fenwick said.

For Sale – Synology DiskStation DS415+ NAS and 2 x 6TB WD Red Drives

I am selling the NAS and 2 drives that I bought from Amazon.co.uk in 2014.

I paid £477 for the NAS and £225 for each hard drive when new.

The 2 drives are Western Digital Red drives, designed specifically for NAS enclosures but can of course be used in other applications. They are 6 TB each.

There are 4 bays in the NAS, I’m keeping 2 of the HDDs for my new NAS which is why I am only selling 2 of them.

The NAS itself is in great condition and hasn’t skipped a beat since I got it. I’ve taken a photo of a scratch on the front gloss panel but its hard to see, you have to move it around with the light to get it to show. Near silent operation and I’ve given is a blow out with the air duster.

Local collection is welcome, it might take me a couple of days to package it up if postage is preferred.

Thanks for looking.

Price and currency: £450
Delivery: Delivery cost is included within my country
Payment method: Cash on collection or Bank tansfer
Location: BARNET
Advertised elsewhere?: Not advertised elsewhere
Prefer goods collected?: I prefer the goods to be collected

______________________________________________________
This message is automatically inserted in all classifieds forum threads.
By replying to this thread you agree to abide by the trading rules detailed here.
Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:

  • Landline telephone number. Make a call to check out the area code and number are correct, too
  • Name and address including postcode
  • Valid e-mail address

DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.

SAP Concur creates Slack bot for booking flights

SAP Concur has created a Slack bot that lets users book travel and submit expenses within the team collaboration app. It’s the type of advanced business integration that Slack has embraced as a way to differentiate its platform from Microsoft Teams and Cisco Spark.

The SAP Concur Slack bot lets workers search and book flights within a Slack messaging channel. The integration makes it possible to share a flight itinerary with other Slack team members, who can then schedule the same travel arrangements with a couple of clicks. After travelers book a flight, they can direct the bot to create an expense report.

The travel bot is SAP Concur’s latest partnership with Slack. In March, the two vendors released a Slack bot that lets a user file, approve and manage expense reports. A worker could create an expense report, for example, by messaging the bot, “Expense $15 for lunch.”

SAP Concur has not released any bots that are compatible with Slack competitors Microsoft Teams or Cisco Webex Teams, although it does have integrations with Microsoft Outlook 365 and the AI voice assistant platform Alexa for Business.

SAP Concur’s Slack bot for travel uses technology from the consumer flight search tool Hello Hipmunk, which SAP Concur acquired in 2016. The business-grade application of the software syncs with the travel policies enterprises set within SAP Concur.

“I can see significant potential for this to cut down on email back and forth that typically occurs when a travel department sends a list of options to an employee, and then they respond, and then there’s some back and forth before everyone agrees on a travel plan,” said Irwin Lazar, analyst at Nemertes Research based in Mokena, Ill.

Slack builds on integration advantage

Slack has a better track record than its rivals for being able to accommodate and take advantage of deep integrations with third-party business software like SAP Concur, said Wayne Kurtzman, analyst at IDC. Slack has more than 1,500 apps in its directory, far exceeding the inventory of other leading team collaboration platforms.

“Microsoft and Cisco have to make pushes — and they will — to leverage AI in new and different ways that make work easier, but it really has to be easier,” Kurtzman said. “Slack appears ready for the competition, and the team collaboration market will retain double-digit growth rates for most of the next 10 years.”

Slack has recently taken steps to make integrations more useful, and easier to create. Last month, the vendor acquired Missions, a division of the startup Robots & Pencils, to incorporate its technology for helping nondevelopers build workflows and integrations within Slack. The company also introduced a new paradigm for using third-party apps, letting users export contextual information from Slack into those business tools.

Businesses are looking for ways to streamline workflows so that employees can get work done faster, and with easier access to the context they need to make decisions. As a result, the integration of business apps with team collaboration platforms like Slack has become one of the hottest new trends in collaboration.

But those integrations need to balance convenience, complexity and confidentiality, said Alan Lepofsky, analyst at Constellation Research. The industry is still in the early stages of determining which tasks are best done in separate apps rather than within a platform like Slack — as well as which types of apps to trust with confidential data, he said.

“That said, I think the creation of these ‘work-related’ bots is a step in the right direction, as our future will certainly be filled with digital assistants. The question is when and to what level of granularity,” Lepofsky said.

For Sale – Apple MacBook Pro SSD – Samsung Apple 256GB SSD (MZ-JPV256S/0A4)

I upgraded the SSD on my MacBook Pro 13″ Early 2015 so I am selling the 256GB that came with the machine.

[​IMG]

[​IMG]

[​IMG]

[​IMG]

The manufacturer date is January 2017.
As I mentioned previously, this has been taken out from a MBP 13″ Early 2015 laptop but I believe this SSD is compatible with 2013 – 2015 MBP Retinas. I offer no guarantee for this.

Price and currency: 150
Delivery: Delivery cost is included within my country
Payment method: Bank Transfer
Location: Edinburgh
Advertised elsewhere?: Advertised elsewhere
Prefer goods collected?: I prefer the goods to be collected

______________________________________________________
This message is automatically inserted in all classifieds forum threads.
By replying to this thread you agree to abide by the trading rules detailed here.
Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:

  • Landline telephone number. Make a call to check out the area code and number are correct, too
  • Name and address including postcode
  • Valid e-mail address

DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.

For Sale – AMD Ryzen 2700X – Asus ROG Crosshair VII Hero X470 – Powercolor RX580 8GB V1 (Better Cooler)

Ok guys i have for sale these items that are only a couple of months old.

AMD Ryzen 2700X (without Cooler) – £220
Asus ROG Crosshair Vii – £180
2 x Powercolor RX580 8GB GPU £190 each
Asus RT-AC88U AC3100 Dual-Band Router £130
EVGA 1070Ti Black edition £350

All come fully boxed as new and come with receipts for warranty.

Price and currency: 220
Delivery: Delivery cost is not included
Payment method: BT
Location: Oldham
Advertised elsewhere?: Advertised elsewhere
Prefer goods collected?: I prefer the goods to be collected

______________________________________________________
This message is automatically inserted in all classifieds forum threads.
By replying to this thread you agree to abide by the trading rules detailed here.
Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:

  • Landline telephone number. Make a call to check out the area code and number are correct, too
  • Name and address including postcode
  • Valid e-mail address

DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.

For Sale – HP 8200 Elite SFF PC (Core i7 2600, 8GB RAM, 500GB HD)

Selling a HP 8200 Elite SFF PC, that I got a couple of years for my parents to use. They’ve just gone and got themselves a laptop, so PC is now surplus to requirements.

Full details on this range of PC’s is available from HP here, but the specs of this machine are:

Intel Core i7 2600 (Sandybridge) 4-Core 8-Thread CPU @ 3.4Ghz
8GB RAM (2 x 4GB)
500 Gb SATA Hard Disk
SATA SuperMulti LightScribe DVD writer
Intel Gigabit Ethernet
Onboard Intel HD Graphics
Windows 10 Pro x64

This is still a very competent machine for everyday office and internet tasks, and even does well at stuff like video encoding, due to the i7 CPU. It would even be a decent 1080p gaming machine, easily beating any of the current gen consoles, if you put a low profile 1050/ti card in there.

I’ve given the machine a once over, and have just done a clean install of the latest version of Windows 10 Pro on it, fully legal, and activated with the Windows 7 Pro OEM code attached to the case of the PC (Windows 10 upgrade program).

This listing is for just the PC and a power cable, no accessories.

Looking for £150 + postage via cheapest parcel2go service, that’s sufficiently insured. It’s not a big machine, so shouldn’t cost too much, but I’ve not packaged it up and weighed it yet (looking for a box at the moment ) so not sure on postage cost yet. I’ll update the thread once I’ve worked it out.

Payment by BT is preferred, but would consider PPG from established iTrader’s.

Any questions, let me know.

Price and currency: 150
Delivery: Delivery cost is not included
Payment method: BT preferred, possible PPG for established iTraders
Location: Chorley, Lancashire (PR7)
Advertised elsewhere?: Not advertised elsewhere
Prefer goods collected?: I have no preference

______________________________________________________
This message is automatically inserted in all classifieds forum threads.
By replying to this thread you agree to abide by the trading rules detailed here.
Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:

  • Landline telephone number. Make a call to check out the area code and number are correct, too
  • Name and address including postcode
  • Valid e-mail address

DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.

For Sale – Synology DiskStation DS415+ NAS and 2 x 6TB WD Red Drives

I am selling the NAS and 2 drives that I bought from Amazon.co.uk in 2014.

I paid £477 for the NAS and £225 for each hard drive when new.

The 2 drives are Western Digital Red drives, designed specifically for NAS enclosures but can of course be used in other applications. They are 6 TB each.

There are 4 bays in the NAS, I’m keeping 2 of the HDDs for my new NAS which is why I am only selling 2 of them.

The NAS itself is in great condition and hasn’t skipped a beat since I got it. I’ve taken a photo of a scratch on the front gloss panel but its hard to see, you have to move it around with the light to get it to show. Near silent operation and I’ve given is a blow out with the air duster.

Local collection is welcome, it might take me a couple of days to package it up if postage is preferred.

Thanks for looking.

Price and currency: £450
Delivery: Delivery cost is included within my country
Payment method: Cash on collection or Bank tansfer
Location: BARNET
Advertised elsewhere?: Not advertised elsewhere
Prefer goods collected?: I prefer the goods to be collected

______________________________________________________
This message is automatically inserted in all classifieds forum threads.
By replying to this thread you agree to abide by the trading rules detailed here.
Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:

  • Landline telephone number. Make a call to check out the area code and number are correct, too
  • Name and address including postcode
  • Valid e-mail address

DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.

For Sale – AMD Ryzen 2700X – Asus ROG Crosshair VII Hero X470 – Powercolor RX580 8GB V1 (Better Cooler)

Ok guys i have for sale these items that are only a couple of months old.

AMD Ryzen 2700X (without Cooler) – £220
Asus ROG Crosshair Vii – £180
2 x Powercolor RX580 8GB GPU £190 each
Asus RT-AC88U AC3100 Dual-Band Router £130

All come fully boxed as new and come with receipts for warranty.

Price and currency: £220
Delivery: Goods must be exchanged in person
Payment method: BT
Location: Oldham
Advertised elsewhere?: Advertised elsewhere
Prefer goods collected?: I have no preference

______________________________________________________
This message is automatically inserted in all classifieds forum threads.
By replying to this thread you agree to abide by the trading rules detailed here.
Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:

  • Landline telephone number. Make a call to check out the area code and number are correct, too
  • Name and address including postcode
  • Valid e-mail address

DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.