Killer NIC K1 and Custom BitTorrent Client Tested 106
NetworkingNed writes "The new Killer NIC K1 is the successor to the much debated original Killer NIC card that offers the same features at a lower price: this time for about $170 or so. Not cheap, that's for sure. But in this review at PC Perspective, not only is the new card tested under the drastically updated Vista networking stack with improved results, but the free BitTorrent client that runs on the Killer NIC is reviewed as well; with it you should be able to download torrents without affecting online gaming performance. Enough to warrant a $175 network card?"
Re:Enough to warrant a $175 network card? (Score:3, Insightful)
Spend the money elsewhere (Score:5, Insightful)
If you're so worried about bittorrent degrading your performance, save your money - haul out that "obsolete" 1-2ghz machine and you won't have to leave your main box running (and costing electricity) when you seed.
Do they take your brain when you get one? (Score:5, Insightful)
Why not just setup a test network with a workstation with that NIC, a test server, a sniffer and some test scripts?
You image the workstation so you can start clean with each NIC you're testing.
You use the sniffer so you can see what is actually on the wire.
You use the scripts instead of doing anything manually because you want to remove the human factor as much as possible.
YES! Those are all the reasons why you run your own test server instead of adding additional variables to a test. So, are you going to do the test correctly?
I guess not. Even with knowing every reason NOT to do that, you went ahead anyway.
So what I'm wondering is why haven't we seen any REAL evaluations by people who know what they're doing? Do the Killer NIC people simply refuse to provide hardware to anyone who has a clue?
So you didn't even bother to test against a mid-range card? You used the chip on your motherboard.
That's why you would use a sniffer.
And, once again, you didn't even go out and pick up a $50 NIC to compare it against.
That's why you script the tests.
And that didn't tell you something?
Seriously, you didn't test against a $50 NIC?
Re:Spend the money elsewhere (Score:4, Insightful)
I'll still say that you don't need to trademark every silly thing that your card does "special". Like, "This case now with SafeCorner(tm) so that you're likely to get less BloodNStuff(tm) on your NetworkBOOST(tm)"
It just sounds way too much like you're marketing snake oil...
That's the whole point of the story. (Score:5, Insightful)
That's the whole point of the Killer NIC : It *does run* Linux.
The whole story can be broiled down to the Killer NIC being in fact a nice small router with loadbalancing/QoS/Pcket prioritizing. Plus a small server with it own mass storge pugable in USB.
The Killer NIC is nothing more than a glorified router shrinked to the size of a PCI card.
Once you get the basic idea there are only two quirks :
- It is sold completly ready to go. Whereas
- As this is a PCI card and not a box that must communicated of the internet, the driver can use special hooks and directly tap into the Windows TCP/IP stack. Thus the router can sort and select packaets before they even leave the computer. Thus joe's gaming traffic gets put in front with higher priority than the traffic generated by the dozen of spywares/trojans/virus/spam zombies running in background.
Basically it's targeted to the same people who need quad-core CPUs : geeks who want to hack it, and clueless users who need to still have performance even when everthing is crawling under the load of crapware.
Re:Do they take your brain when you get one? (Score:3, Insightful)
paranoia, but paranoia is good from a security POV (Score:3, Insightful)
I'm just referring to packets that are tagged, and when the packets are tagged as such, the NIC effectively ignores them if not specifically destined for its MAC (making same packets impossible to detect even with a hub and another box with a same nic). One could have NICs send out detailed, compressed data concerning addresses and ports, and perhaps even a complete duplicate dump of data being sent to a specific host, if requested remotely.
Now sure, this is the ultimate in paranoia. First, you would require complete complacency on the part of those designing NIC chips, and in many cases this is even done by contracted IC Design firms. There are just too many people involved to have some form of high level conspiracy, allowing for the ultimate in government control.
However, we now have a NIC that is effectively a machine of its own, making it inordinately simple for all sorts of black hat shenanigans. Even if one were to trust the company, a card like this, if exploitable remotely, would be great to set up a nice little monitoring station and even a spam relay on. How would you detect it, if you're a simple user and you don't have another Linux box or firewall to detect the traffic outgoing? Firewalls are also effectively useless (unless in a locked down state that few put them in) once a box is allowed access to NAT. There are simple ways to punch holes through firewall, and using NAT, keep them open with little traffic.
Of course, one could also just phone home every few hours anyhow.
Frankly, while I *like* real hardware NICs, I at least trust that Intel's 100% hardware NIC is going to be relatively unexploitable. It's a single purpose device, so you're not going to be (I hope!) easily loading a trojan on there.
This thing however? It sounds like you could load anything on that "NIC".
Stay away. We don't even know anything about this *company*, let alone it's security review process for the software running the NIC.
Its that Gamer rip off branding again (Score:2, Insightful)