Forgot your password?
typodupeerror
Businesses Stats Hardware

IDC: PC Shipments Decline Worse Than Forecasted, No Recovery Expected 393

Posted by Unknown Lamer
from the youtube-monkeys-don't-need-keyboards dept.
symbolset writes "Zach Whittaker over at ZDNet covers an IDC report. In it the 2013 9.7% forecast decline in PC shipments is advanced to 10.1%. Further, IDC's longer-term forecast turns quite grim: contracting 23% from 2012 levels by 2017. There is also a projection of future Windows tablet sales, and a statement that total Windows tablet sales for 2013 are expected to be 'less than 7.5 million units.'"
This discussion has been archived. No new comments can be posted.

IDC: PC Shipments Decline Worse Than Forecasted, No Recovery Expected

Comments Filter:
  • My PC is NSA spyware (Score:0, Informative)

    by Anonymous Coward on Tuesday December 03, 2013 @09:15AM (#45582623)

    Microsoft helped the NSA bypass their crypto. They were the first to join PRISM.

    Why would I buy products from a company that spies on me for the NSA?

  • Re:Expected (Score:4, Informative)

    by recoiledsnake (879048) on Tuesday December 03, 2013 @12:02PM (#45584419)

    Pasted from one of my earlier comments:

    Here are some references about boot malware which UEFI secure boot can prevent.

    http://www.chmag.in/article/sep2011/rootkits-are-back-boot-infection [chmag.in]

    http://www.theregister.co.uk/2010/11/16/tdl_rootkit_does_64_bit_windows/ [theregister.co.uk]

    http://www.computerworld.com/s/article/9217953/Rootkit_infection_requires_Windows_reinstall_says_Microsoft [computerworld.com]

    I recommend reading atleast the first link.

    Here's one juicy bit:

    TDL4 is the most recent high tech and widely spread member of the TDSS family rootkit, targeting x64 operating systems too such as Windows Vista and Windows 7. One of the most striking features of TDL4 is that it is able to load its kernel-mode driver on systems with an enforced kernel-mode code signing policy (64-bit versions of Microsoft Windows Vista and 7) and perform kernel-mode hooks with kernel-mode patch protection policy enabled.

    When the driver is loaded into kernel-mode address space it overwrites the MBR (Master Boot Record) of the disk by sending SRB (SCSI Request Block) packets directly to the miniport device object, then it initializes its hidden file system. The bootkit’s modules are written into the hidden file system from the dropper.

    The TDL4 bootkit controls two areas of the hard drive one is the MBR and other is the hidden file system created at the time of malware deployment. When any application reads the MBR, the bootkit changes data and returns the contents of the clean MBR i.e. prior to the infection, and also it takes care of Infected MBR by protecting it from overwriting.

    The hidden file system with the malicious components also gets protected by the bootkit. So if any application is making an attempt to read sectors of the hard disk where the hidden file system is stored, It will return zeroed buffer instead of the original data.

    The bootkit contains code that performs additional checks to prevent the malware from the cleanup. At every start of the system TDL4 bootkit driver gets loaded and initialized properly by performing tasks as follows: Reads the contents of the boot sector, compares it with the infected image stored in hidden file system, if it finds any difference between these two images it rewrites the infected image to the boot sector. Sets the DriverObject field of the miniport device object to point to the bootkit’s driver object and also hooks the DriverStartIo field of the miniport’s driver object. If kernel debugging is enabled then this TDL4 does not install any of it’s components.

    TDL4 Rootkit hooks the ATAPI driver i.e. standard windows miniport drivers like atapi.sys. It keeps Device Object at lowest in the device stack, which makes a lot harder to dump TDL4 files.

    All these striking features have made TDL4 most notorious Windows rootkit and it is also very important to mention that the key to its success is the boot sector infection.

    Another bit:

    The original MBR and driver component are stored in encrypted form using the same encryption. Driver component hooks ATAPI's DriverStartIo routine where it monitors for write operations. In case of write operation targeted at the MBR sector, it is changed to read operation. This way it is trying to bypass repair operation by Security Products.

  • by David_Hart (1184661) on Tuesday December 03, 2013 @01:53PM (#45585919)

    Sounds like what everyone else is saying, that current hardware is good enough and they have no reason to update.

    That was true in the seventh generation when PlayStation 3 and Xbox 360 were stuck on tech that was high-end in 2005. But now, the latest consoles are up to 2013 tech (AMD Jaguar, do the math), and PC games' system requirements are likely to rise to meet PlayStation 4 and Xbox One specs.

    If you bought or built a PC in the last couple of years it is already more powerful than the new consoles. To bring it up to par you may have to add RAM (about $65 worth) and a video card (about $150). PCs will continue to have an advantage over consoles as it takes time for console development.

    http://www.digitaltrends.com/computing/pc-vs-ps4-xbox-one-how-to-upgrade-pc/ [digitaltrends.com]

FORTUNE'S FUN FACTS TO KNOW AND TELL: #44 Zebras are colored with dark stripes on a light background.

Working...