User Control Panel
Search iVirtua
Advanced/Tag Search...
Search Users...
What is iVirtua Exclusive Community?
  • An exclusive gaming industry community targeted to, and designed for Professionals, Businesses and Students in the sectors and industries of Gaming, New Media and the Web, all closely related with it's Business and Industry.
  • A Rich content driven service including articles, contributed discussion, news, reviews, networking, downloads, and debate.
  • We strive to cater for cultural influencers, technology decision makers, early adopters and business leaders in the gaming industry.
  • A medium to share your or contribute your ideas, experiences, questions and point of view or network with other colleagues here at iVirtua Community.
Guest's Communication
Live Chat
Teamspeak (VOIP) Audio Conference
Private Messages
Check your Private Messages
Choose an iVirtua Community theme to reflect your interests...
Business Theme
India/Arabic Theme

Gaming Theme
iVirtua Recommends
Fly Emirates Advertising
1013 results for author
CrossfireX: 2560x1600 gameplay becomes a reality in Hardware, Internet, Networking, Comms and Security
“AMD ATI Radeon4850/4870 CrossfireX” review at Guru3D. Hilbert’s lost it again – high poweredgraphics have that effect on him... Anyway, what’s come to light, lately, isthe high power consumption of the 4800 series (now double-up on the cards andimagine), and the irregular driver performance. You can see a broad spectrum ofresults, but when Hilbert gets CrossfireX to work, it works great. But do putthings in perspective when reading: with the latest generation of graphics cardsworking in dual-GPU setups, you’ll be looking at buying a 30-inch LCD for2560x1600 gameplay.Readit here.
XS Reviews is cracking open the Zalman GS1000 computer case, targeted at justabout anyone who wants to build a supercomputer at home. It supports E-ATX andvery long PCI cards and has hot-swappable bays for HDDs. Lots of space inside,if you’re “just” using a standard ATX mobo, but the panels are a bit dodgy,thinks the author. Not a snip at £100, but if Zalman could swap out those panelswith something better, they’d have a winner.Readon.
A few years ago we were hack-napped off to a press conference abroad just tosee how Philips would conquer the world of mobile telephony. Some 18 monthslater, Philips withdrew from the market, unable to compete with the big namesand (our personal opinion) mostly due to their utterly rubbish user interface.Now Philips is reviving the brand (Xenium 9@9) in China with the brand new X800.ePrice in Taiwan has the review. The X800 is a full touchscreen design (no, youwon’t have nightmares about the old Xeniums) and it looks like something out ofHTC’s workshop, to be honest. Careful when reading the page, it didn’t play nicewithGooglenglish,but you’ll get the gist (and the photos).
Andrew at Tweak Town took some time to write a guide on how to replace theheatspreaders on your RAM. Naturally it’s one of the warranty-voiding themes,but if you’re in need of improving cooling, it’s a necessary evil. Andrewsoutlines three basic methods to do this (hot, cold, lukewarm), but it all comesdown to be REALLY careful with sharp metallic objects in close proximity of aPCB.Letloose the mad aussie scientist in you.
T-break had a party with the ECS P45T-A Black Edition. ECS isn’t really knownas a top grade mobo maker, but it doesn’t fall behind the competition featurewise with this one. The board supports Crossfire, but it’ll break down the lanesinto 2x8 as per the P45 specs, but when you try your hand at an overclock, Abbasthinks you’ll be left wanting. The “Black Edition” brings to mind ideas ofmodding, overclocking and serious tweaking. That isn’t the case, it seems. Goodprice, tho’.Readon.
Tosh has hit the Portégè brand with its shrink ray and launched the G810.It’s no longer a notebook, as it were, it’s a Windows Mobile 6.0 smartphone witheverything touchscreen. It’s targeted at the same market as the HTC TouchCruise, but you really can’t avoid comparing the details with the iPhone. It’sHSDPA enabled and even includes GPS functionality. The only real thing goingagainst it is the slow speed of the image capture (slow flash, we guess). $550will buy you one.Readthe review here.
Hardware Zone is gobsmacked by Gigabyte’s most extreme P45 mobo – the aptlynamed GA-EP45T-EXTREME. This board has it all, it seems, even a waterblock onthe northbridge that runs liquid cooling to the southbridge and the rows ofcapacitors. It also allows you to stick in 3 ATI cards and is populated by abevy of LEDs that alert you about your overclocking misdeeds. It’s only apreview, butit’stasty.
Posted by Editorial Team Tue Jul 08, 2008 7:42 am
10 Best Hacking and Security Software Tools for Linux in Hardware, Internet, Networking, Comms and Security
Linuxis a hacker’s dream computer operating system. It supports tons oftools and utilities for cracking passwords, scanning networkvulnerabilities, and detecting possible intrusions. I have here acollection of 10 of the best hacking and security software tools forLinux. Please always keep in mind that these tools are not meant toharm, but to protect.

1. John the Ripper

John the Ripperis a free password cracking software tool initially developed for theUNIX operating system. It is one of the most popular passwordtesting/breaking programs as it combines a number of password crackersinto one package, autodetects password hash types, and includes acustomizable cracker. It can be run against various encrypted passwordformats including several crypt password hash types most commonly foundon various Unix flavors (based on DES, MD5, or Blowfish), Kerberos AFS,and Windows NT/2000/XP/2003 LM hash. Additional modules have extendedits ability to include MD4-based password hashes and passwords storedin LDAP, MySQL and others.

2. Nmap

Nmapis my favorite network security scanner. It is used to discovercomputers and services on a computer network, thus creating a "map" ofthe network. Just like many simple port scanners, Nmap is capable ofdiscovering passive services on a network despite the fact that suchservices aren't advertising themselves with a service discoveryprotocol. In addition Nmap may be able to determine various detailsabout the remote computers. These include operating system, devicetype, uptime, software product used to run a service, exact versionnumber of that product, presence of some firewall techniques and, on alocal area network, even vendor of the remote network card.

Nmapruns on Linux, Microsoft Windows, Solaris, and BSD (including Mac OSX), and also on AmigaOS. Linux is the most popular nmap platform andWindows the second most popular.

3. Nessus

Nessusis a comprehensive vulnerability scanning software. Its goal is todetect potential vulnerabilities on the tested systems such as:

-Vulnerabilities that allow a remote cracker to control or access sensitive data on a system.
-Misconfiguration (e.g. open mail relay, missing patches, etc).
-Defaultpasswords, a few common passwords, and blank/absent passwords on somesystem accounts. Nessus can also call Hydra (an external tool) tolaunch a dictionary attack.
-Denials of service against the TCP/IP stack by using mangled packets

Nessusis the world's most popular vulnerability scanner, estimated to be usedby over 75,000 organizations worldwide. It took first place in the2000, 2003, and 2006 security tools survey from SecTools.Org.

4. chkrootkit

chkrootkit(Check Rootkit) is a common Unix-based program intended to help systemadministrators check their system for known rootkits. It is a shellscript using common UNIX/Linux tools like the strings and grep commandsto search core system programs for signatures and for comparing atraversal of the /proc filesystem with the output of the ps (processstatus) command to look for discrepancies.

It can be used from a"rescue disc" (typically a Live CD) or it can optionally use analternative directory from which to run all of its own commands. Thesetechniques allow chkrootkit to trust the commands upon which it dependa bit more.

There are inherent limitations to the reliability ofany program that attempts to detect compromises (such as rootkits andcomputer viruses). Newer rootkits may specifically attempt to detectand compromise copies of the chkrootkit programs or take other measuresto evade detection by them.

5. Wireshark

Wiresharkis a free packet sniffer computer application used for networktroubleshooting, analysis, software and communications protocoldevelopment, and education. In June 2006, the project was renamed fromEthereal due to trademark issues.

The functionality Wiresharkprovides is very similar to tcpdump, but it has a GUI front-end, andmany more information sorting and filtering options. It allows the userto see all traffic being passed over the network (usually an Ethernetnetwork but support is being added for others) by putting the networkinterface into promiscuous mode.

Wireshark uses thecross-platform GTK+ widget toolkit, and is cross-platform, running onvarious computer operating systems including Linux, Mac OS X, andMicrosoft Windows. Released under the terms of the GNU General PublicLicense, Wireshark is free software.

6. netcat

netcat is a computer networking utility for reading from and writing to network connections on either TCP or UDP.

Netcatwas voted the second most useful network security tool in a 2000 pollconducted by on the nmap users mailing list. In 2003, itgained fourth place, a position it also held in the 2006 poll.

The original version of netcat is a UNIX program. Its author is known as *Hobbit*. He released version 1.1 in March of 1996.

Netcat is fully POSIX compatible and there exist several implementations, including a rewrite from scratch known as GNU netcat.

7. Kismet

Kismetis a network detector, packet sniffer, and intrusion detection systemfor 802.11 wireless LANs. Kismet will work with any wireless card whichsupports raw monitoring mode, and can sniff 802.11a, 802.11b and802.11g traffic.

Kismet is unlike most other wireless networkdetectors in that it works passively. This means that without sendingany loggable packets, it is able to detect the presence of bothwireless access points and wireless clients, and associate them witheach other.

Kismet also includes basic wireless IDS featuressuch as detecting active wireless sniffing programs includingNetStumbler, as well as a number of wireless network attacks.

8. hping

hpingis a free packet generator and analyzer for the TCP/IP protocol. Hpingis one of the de facto tools for security auditing and testing offirewalls and networks, and was used to exploit the idle scan scanningtechnique (also invented by the hping author), and now implemented inthe Nmap Security Scanner. The new version of hping, hping3, isscriptable using the Tcl language and implements an engine for stringbased, human readable description of TCP/IP packets, so that theprogrammer can write scripts related to low level TCP/IP packetmanipulation and analysis in very short time.

Like most tools used in computer security, hping is useful to both system administrators and crackers (or script kiddies).

9. Snort

Snortis a free and open source Network Intrusion prevention system (NIPS)and network intrusion detection (NIDS) capable of performing packetlogging and real-time traffic analysis on IP networks.

Snortperforms protocol analysis, content searching/matching, and is commonlyused to actively block or passively detect a variety of attacks andprobes, such as buffer overflows, stealth port scans, web applicationattacks, SMB probes, and OS fingerprinting attempts, amongst otherfeatures. The software is mostly used for intrusion preventionpurposes, by dropping attacks as they are taking place. Snort can becombined with other software such as SnortSnarf, sguil, OSSIM, and theBasic Analysis and Security Engine (BASE) to provide a visualrepresentation of intrusion data. With patches for the Snort sourcefrom Bleeding Edge Threats, support for packet stream antivirusscanning with ClamAV and network abnormality with SPADE in networklayers 3 and 4 is possible with historical observation.

10. tcpdump

tcpdumpis a common computer network debugging tool that runs under the commandline. It allows the user to intercept and display TCP/IP and otherpackets being transmitted or received over a network to which thecomputer is attached.

In some Unix-like operating systems, auser must have superuser privileges to use tcpdump because the packetcapturing mechanisms on those systems require elevated privileges.However, the -Z option may be used to drop privileges to a specificunprivileged user after capturing has been set up. In other Unix-likeoperating systems, the packet capturing mechanism can be configured toallow non-privileged users to use it; if that is done, superuserprivileges are not required.

The user may optionally apply aBPF-based filter to limit the number of packets seen by tcpdump; thisrenders the output more usable on networks with a high volume oftraffic.

Do you have a favorite security software tool for Linux? Feel free to comment and tell us about it.
Posted by Editorial Team Fri Jul 04, 2008 6:06 am
DEBATE: Video games come with male territory in The Great Debates!
He can otherwise be the perfectly articulate gent, but put your average blokenext to a games console and he becomes transfigured - Man becomes Caveman.Such are the findings of recent research in which brain activity wasanalysed while participants played video games.
In what must have been a nightmare of wiring, scientists at StanfordUniversity rigged up participants to an MRI scanner while they played aspecially designed game, the object being to make the most gains interritory.

The study revealed differences in motivation between the sexes. In malesubjects, this brain activity increased as territory was accumulated.Writing in the Journal of Psychiatric Research, the report's author, DrAllan Reiss, concluded: “It's fair to say that males tend to be moreintrinsically territorial. It doesn't take a genius to figure out whohistorically are the conquerors and tyrants of our species.”
The study showed that women, although getting the hang of the game and able toassess how to win, were less driven to succeed. Well, that explains my verylimited discussions with my girlfriend on the subject of video games: “I cansee you're obsessed with blowing up that flashing red thing, darling. I justdon't understand why.”

DEBATE: Video games come with male territory
Do they?
Posted by Editorial Team Sun Jun 01, 2008 7:14 pm
DEBATE Games influencing young male culture more than music? in The Great Debates!
American author, critic and filmmaker Nelson George has stated that he believes videogames are now more influential to young male culture than music.

Speaking in a new book, Crime, by Alix Lambert and to be published by Fuel later this month, George compares videogames to hip-hop music and culture, which during the 80s and 90s had a massive influence on all aspects of mainstream and popular culture.

"Videogames are more important than hip-hop. There's no doubt about it," said George, in an extract of the book printed in The Guardian this weekend.

"The violence and nihilism that everyone thinks is in hip-hop is pumped up about 18 times in videogames. That's really what's driving young male culture, that's really the new rock n' roll."

While violent lyrics are just one of the bad influences that critics blame rap music for, George believes that not enough people are looking at videogames and the influence they have on a young male audiences.

"The funny thing about this debate is so many hip-hop critics are fixated on rap and not talking enough about videogames, which aren't a racially determinant form."

He also believes that Rockstar, and companies like EA with its music-influenced Def Jam franchise, have been smart to incorporate hip-hop culture into games.

"Obviously these Grand Theft Auto guys were very canny because they tied in to Scarface, they tied in to hip-hop. But the games are different – they're not folk statements. Hip-hop was a folk music up until the late 80s."

"With videogames the relationship to the culture is different, they're much more like movies. They're a really interesting hybrid. The Grand Theft Auto dudes were all about figuring out how to tap into urban culture. Vidoegames, like movies, take in so many disciplines. At the same time, it's not folk expressions – at least, the way I understand it – of an individual."
Posted by Editorial Team Tue May 20, 2008 5:01 pm
GamesAid UK Games industry charity launched in Business and Industry in Gaming, Media, Web, IT and Computing

                              <!-- Author Start -->                              Phil Elliott                              <!-- Author End -->                              
                                   09:00 (BST)
                              GamesAid charity launched                                                                                                                                       <!-- Article Start -->                                        

A new videogames industry charity called GamesAid has been set up withthe purpose of raising money predominantly to support children'scharities in the UK.
Founded by seven trustees, including Mastertronic's Andy Payne,Sports Interactive's Miles Jacobson and Relentless co-founder AndyEades, the charity will operate around a special industry socialnetwork website with the principal aim of democratising fund-raisingefforts and maintaining transparency of operation.
The website will also enable the charity to run without theneed for a fixed office location and staff, so that overheads can bereduced to a minimum - with the initial goal of keeping costs to below5 per cent of total funds raised.
"It's down to the people in the industry to suggestcharities, to get involved in the diligence process, to help steer theTrustees' opinions, to communicate with others, to build good feeling -to do the stuff that raises cash," Payne told
"It's a new way of doing it," added Eades. "It's in the Web 2.0 world -it's a kind of socially democratising approach to charity. What you'veseen work with social networks, we're going to try some of those ideasout.

"It's a charity that anybody in the games industry can getinvolved with, and the Trustees are just there to oversee with noself-interest. Hopefully that will allow other people to raise money,choose which charities receive funds - and anybody who wants to knowthe information, to find out who GamesAid has donated to, can findout."

Further information on how to get involved with GamesAid will be available soon on and


GamesAid is a new UK video games industry based charity. Itdistributes funds to a diverse range of charities; it is a means ofgiving something back on behalf of the industry.
GamesAidacts as a broker of charitable activity on behalf of the industry,taking advice from all sectors. It is a non trading body. The charityis administered by Trustees, who operate on a fixed term basis. It isformally run by a chairman, who is also on a fixed term.
         GamesAid is a children and young people’s charity
Posted by Editorial Team Sat May 17, 2008 6:37 pm
How to fight splogs in Programming, Web and Software Design/Development
At first glance, it seems like a regular blog. But look closer andyou'll see there's something very odd about the blog's content: It'svery familiar. Too familiar.
That's because you wrote it -- six months ago on your own blog.The rest of the content doesn't make sense: The same word repeated overand over again. There are ads all over the sidebar for products likeViagra and mortgage loans.
This, you realize, is a splog, and you're the victim.
"Splogs," or spam blogs, are one of the methods spammers haveadopted to manipulate the blogosphere for profit. The phenomenonstarted getting really bad in 2005, when Google's blog-hosting service,Blogger, was inundated with more than 13,000 fake blogs spawned by a script.
Splog topics are often so nonsensical and wide-ranging they can be hard to pinpoint. Scott Beale of Laughing Squid said some really strange splogs have shown up on his watch list, everything from "Phish Rocks, Dude" to "Geeks Meet Greeks."
But why do sploggers do it? How do you know if you've been splogged? And what can you do to stop it? Here are a few tips.
This page is a wiki. If you have any extra advice to offer, go ahead and add it.


[/TD][/TR][/TABLE] if (window.showTocToggle) { var tocShowText = "show"; var tocHideText = "hide"; showTocToggle(); }
Find Out If You're Being Splogged
Splogs lift content from real blogs to increase the splog's PageRankat Google and generate ad revenue. The problem for bloggers is theirblog's PageRank may drop, and they may be associated with spam,damaging their reputation.
To find out if your blog is being ripped off, subscribe to newsfeeds at search engines like Technorati, Google Blog Search andIceRocket. Use search terms like your name, your site's name or itsURL. Most bloggers use these services to track what other blogs sayabout them, but it will also detect splogs lifting your content. You'llrecognize a splog by the unusual number of buzzwords in the maincontent area. And splogs often redirect visitors to an entirelydifferent site.
Tip: Analyze a blog's URL for suspicious keywords andthings like hyphens -- for some reason, most splogs' titles arehyphenated. Although some sites like Why Dogs Eat Poop are completely legitimate, despite the hyphens in the URL.
Tip: Use Google Alerts to track how your content, name, and web sites are being used on the web -- it's amazing what Google can find for you.

Report Splogs
While splogs may seem like a minor annoyance to the individualblogger, the overall effect of splogs is far-reaching. So, for thecommunity's sake, when you notice a splog -- report it. If the splog ison Blogger,you can easily report it by clicking the Flag button on the top rightcorner of the page. This will notify Blogger admins about objectionablecontent, and the splog should be removed. If the splog is on anotherblogging platform, you may have to contact the host directly.
Tip: If the splog has Google ads on it, the site can bereported to Google's AdSense program, and the account could be revoked.Look for the link that says "Ads by Google" at the bottom of thesplog's AdSense array. You'll see a form on the next page. Leave ashort note describing why you think the site is violating the terms ofservice for AdSense. Be sure to include the term "spamreport" beforeyou click Submit.
Tip: On the flip side of things, many blogs are easy to spot as being legitimate. For example, author of the PLR Model Blogdisplays his full name in his postings, which is quite rare. Othersigns of legitimacy include valid email addresses, lack ofadvertisements, non-spam comments which have been moderated, and soforth.

Remove Comment and Trackback Spam
While comment and trackback spam are not technically splogs, theyare related. Spammers who deal in comment and trackback spam sometimeslink to splogs in the hope of gaming the site's PageRank. Having a goodcomment-moderation system helps.

  • Movable Type has an upgraded Junk folder system to combat spam.
  • TypePad also has a Spam option for each comment.
  • WordPress also comes with built-in comment moderation that can help put spam on ice.

Trackback spam is harder to fight, and a lot of bloggers have resorted to turning off trackbacks entirely.

What to Do Next
One of the best ways to fight splogs is to be vocal about them.Demand accountability and diligence from hosting providers, and demandadditional barriers in the blog-creation process.
High-profile bloggers like Mark Cuban are demanding higherstandards from Google and Blogger. So far, Google seems to belistening. Blogger added a CAPTCHA human verification system to theblog-creation process so it can't be easily automated, and the companyhas published a list of deleted URLs so other search engines can removeknown splogs from their indexes.
Posted by Editorial Team Tue May 06, 2008 10:16 am
NBC to Apple: Build antipiracy into iTunes in Syndicated News: Hardware, Networking, Computing, IT, and Business and Industry News
NBC to Apple: Build antipiracy into iTunes
SAN FRANCISCO--NBC Universal would like to have its TV shows distributed once again through Apple's iTunes service, a top executive said Wednesday, but he called for antipiracy measures to help protect his business' revenue.

George Kliavkoff, chief digital officer at NBC Universal, didn't specifically mention Apple by name ...

Author: Stephen Shankland
Publish Date: Wed, 16 Apr 2008 18:26:00 GMT
Posted by CNET Thu Apr 17, 2008 6:27 am
Apple cloning: Worth it? in Syndicated News: Hardware, Networking, Computing, IT, and Business and Industry News
Apple cloning: Worth it?
It doesn't take much to put Apple in the news, and this afternoon's excuse is that a Miami-based company called PsyStar is selling a Mac clone.

Its Web site was down earlier--ostensibly because of the overwhelming reaction to its product. As Computerworld's Gregg Keizer reports:


Before its ...

Author: Gordon Haff
Publish Date: Mon, 14 Apr 2008 22:43:00 GMT
Posted by CNET Thu Apr 17, 2008 6:27 am
Pleco may be bringing a full-featured Chinese dictionary to in Syndicated News: Hardware, Networking, Computing, IT, and Business and Industry News
Pleco may be bringing a full-featured Chinese dictionary to iPhone
The inventor of the increasingly ubiquitous Pleco Chinese-English dictionary software for Palm and Windows Mobile devices said the company is "very seriously considering developing" an iPhone version.

In an interview in April's China International Business (not yet online), Michael Love tells of developing the 6-year-old product and how it'...

Author: Graham Webster
Publish Date: Mon, 14 Apr 2008 09:55:00 GMT
Posted by CNET Thu Apr 17, 2008 6:27 am
Apple ships Final Cut Server in Syndicated News: Hardware, Networking, Computing, IT, and Business and Industry News
Apple ships Final Cut Server

Apple's tool for media management, Final Cut Server, is now available, the company announced Tuesday.

The software application is meant for managing the production of large-scale video projects. Final Cut Server enables automatic cataloging, viewing, and annotating of video, and is available for both the Mac and PC. It ...

Author: Erica Ogg
Publish Date: Tue, 08 Apr 2008 17:46:00 GMT
Posted by CNET Thu Apr 17, 2008 6:27 am
Apple issues QuickTime updates in Syndicated News: Hardware, Networking, Computing, IT, and Business and Industry News
Apple issues QuickTime updates
Apple has released a QuickTime security update to address "highly critical" security flaws in its media player that could allow malicious attackers to take control of a user's system.

The security flaws affect QuickTime 7 versions running on the Mac OS X and Windows. Users are advised to update ...

Author: Dawn Kawamoto
Publish Date: Tue, 08 Apr 2008 15:37:00 GMT
Posted by CNET Thu Apr 17, 2008 6:27 am
Apple picking on NYC green living trademark in Syndicated News: Hardware, Networking, Computing, IT, and Business and Industry News
Apple picking on NYC green living trademark
There are many ways to slice--or draw--an apple, but the Cupertino, Calif., computer maker is once again claiming right to its own methodology.

An image from the GreeNYC Web site showing the logo Apple is disputing.

Just as we were enjoying a reprieve from Apple trademark cases, ...

Author: Michelle Meyers
Publish Date: Sat, 05 Apr 2008 17:06:00 GMT
Posted by CNET Thu Apr 17, 2008 6:27 am
Apple passes Wal-Mart in music sales? in Syndicated News: Hardware, Networking, Computing, IT, and Business and Industry News
Apple passes Wal-Mart in music sales?
Tech blog Ars Technica says they've got their hands on an internal Apple memo that shows iTunes has topped Wal-Mart Stores in total global music sales.

The data in the memo cites a report from the month of January conducted by The NPD Group, a market research firm. NPD'...

Author: Erica Ogg
Publish Date: Thu, 03 Apr 2008 17:03:00 GMT
Posted by CNET Thu Apr 17, 2008 6:27 am
The Apple rumor that just won't die in Syndicated News: Hardware, Networking, Computing, IT, and Business and Industry News
The Apple rumor that just won't die
An Apple rumor a day keeps a slow news day away. Right? Though idle chit chat about tech's most gossiped-about company pops up all the time, they tend to be quashed or talked to death before another one comes along that's juicier. One recent rumor is still floating ...

Author: Erica Ogg
Publish Date: Wed, 02 Apr 2008 21:29:00 GMT
Posted by CNET Thu Apr 17, 2008 6:27 am
Study gives insight into iPhone users in Syndicated News: Hardware, Networking, Computing, IT, and Business and Industry News
Study gives insight into iPhone users
(Credit: Rubicon Consulting)

About half of them are under 30 years old, 15 percent of them are students, and they now have bigger mobile phone bills. Who are they?

iPhone users,  according to a recent online survey conducted by research firm Rubicon Consulting. Rubicon conducted the survey of  460 iPhone users in the U.S. last month (PDF).  (...

Author: Anne Dujmovic
Publish Date: Wed, 02 Apr 2008 04:03:00 GMT
Posted by CNET Thu Apr 17, 2008 6:27 am
Page 1 of 68 Goto page 1, 2, 3 ... 66, 67, 68  Next
iVirtua Latest
Latest Discussion

Latest Articles and Reviews

Latest Downloads
Subscribe to the iVirtua Community RSS Feed
Use RSS and get automatically notified of new content and contributions on the iVirtua Community.

Tag Cloud
access amd announced applications author based beta building business card case company content cool core course cpu create data deal dec demo design desktop developers development digital download drive email feature features file files firefox flash free future gaming google graphics hardware help industry information intel internet iphone ipod jan launch linux lol love mac market media memory million mobile money movie music net nintendo nov nvidia oct office official online patch performance playing power price product program ps3 pst publish ram release released report rss sales screen search security sep server show size software sony source speed support technology thu tue update video vista war web website wii windows work working works xbox 360 2006 2007 2008

© 2006 - 2008 iVirtua Community (UK), Part of iVirtua Media Group, London (UK). Tel: 020 8144 7222

Terms of Service and Community RulesAdvertise or Affiliate with iVirtuaRSSPress Information and Media CoverageiVirtua Version 4PrivacyContact