Language Selection

English French German Italian Portuguese Spanish

NVIDIA GeForce 7800GTX + 1.0-7675 Driver Preview

Filed under
Software
Reviews

Within a few hours, NVIDIA is expected to release their new set of display drivers (1.0-7675). Among other improvements, these new drivers should correct a majority of the problems that previously plagued the 7800GTX Linux performance. Some such problems were the 2D/3D clock switch not operating properly and the GPU not being able to surpass the 415MHz mark. Although in our testing we were using an early build of the 1.0-7675 x86_64 drivers, we're pleased to say these issues are no longer a problem. The G70 immediately scaled up to 468MHz; past the 430MHz reference mark. This article is in continuation of our previous piece entitled the NVIDIA GeForce 7800GTX Linux Preview. The 6600GT and 7800GTX 1.0-7667 benchmark results were obtained from the previous article as no hardware or software changes had occurred to this testbed except for the driver upgrade. Below are the system components once again that we used during testing.

Hardware Components

Processor: AMD Athlon 64 3000+ (Winchester)
Motherboard: Tyan Tomcat K8E (S2865AG2NRF)
Memory: 2 x 512MB OCZ EL PC-3200 Titanium
Hard Drives: 160GB Western Digital SATA 7200RPM
Optical Drives: Lite-On 16x DVD-ROM & Lite-On 52x CD-RW
Add-On Devices: NetGear WAG311 802.11g & Chaintech AV-710
Case: Sytrin Nextherm ICS-8200
Power Supply: Sytrin 460W (ActivePFC)

Software Components

Operating System: FedoraCore4
Linux Kernel: 2.6.12-1.1398
GCC (GNU Compiler): 4.0.0
Xorg 6.8.2

Full Review.

More in Tux Machines

Security Leftovers

  • Windows flaw lets attackers take over A-V software

    A 15-year-old flaw in every version of Windows right from XP to Windows 10 allows a malicious attacker to take control of a system through the anti-virus software running on the system.

  • Google Continues to Make Strides in Improving Android Security
  • Google cites progress in Android security, but patching issues linger
  • Dark Matter
    Today, March 23rd 2017, WikiLeaks releases Vault 7 "Dark Matter", which contains documentation for several CIA projects that infect Apple Mac Computer firmware (meaning the infection persists even if the operating system is re-installed) developed by the CIA's Embedded Development Branch (EDB). These documents explain the techniques used by CIA to gain 'persistence' on Apple Mac devices, including Macs and iPhones and demonstrate their use of EFI/UEFI and firmware malware. Among others, these documents reveal the "Sonic Screwdriver" project which, as explained by the CIA, is a "mechanism for executing code on peripheral devices while a Mac laptop or desktop is booting" allowing an attacker to boot its attack software for example from a USB stick "even when a firmware password is enabled". The CIA's "Sonic Screwdriver" infector is stored on the modified firmware of an Apple Thunderbolt-to-Ethernet adapter.

today's howtos

Kernel Space/Linux

Red Hat News