Barrow HDM2280-PA Waterblock for NVMe 2280/22110 Size M2, Double Sided Auxiliary Cooling. It wasn't easy to put in between the CPU & GPU Waterblocks. It was difficult to drain and not get anything wet when removing the tubes. Was it worth it? YES! Will I do it again? NO! :) It depends on load as to how much the temperature difference is, but it is at least 21C degrees cooler on average.

 

UPDATE: I added a RADEON VII with EK Waterblock to the Comparison. A Discord User and myself tested our Radeon RX 5700 XT's today. We both ran a 15 minute Furmark test. PowerColor Liquid Devil 5700 XT vs AMD 5700 XT Anniv. Ed. with Bykski Water Block. Both had 2 X 360 Radiators and both ended up with inline water at 36C. He used Liquid Devil's UNLEASHED BIOS stock and I used AMD Anniv. Factory OC BIOS stock. He saved time not having to put on WB and I saved $50 and lost an hour. We called it a draw. Above are the results. ALL TESTS WERE RAN ON DEC. 21, 2019.

Why Pay More? This G1/4" fitting size and 14mm tubing and connectors is the most common size of watercooling for computers. The ones we look at here are pretty much standard from different vendors and the PRICES ARE MUCH LOWER. There are all sorts of name brands and sizes. Vendors and Big Youtubers try to lock you in to using their custom systems. That's fine if you want to spend $500-$1,000 for watercooling parts (I can think of one huge youtuber specifically). I DON'T WANT TO PAY A $1,000! So check out these, lowest cost, great performing, most standardized size, watercooling parts. If you want to pay more, go watch those big name youtubers and their big name sponsors. All the parts I show are available for low prices below from multiple vendors.


Bykski AMD RX 5700XT WaterBlock, Anniversery Edition & LCD PRE-Installation Video
Also, featuring the Bykski Watercooling Inline Temperature LCD. As soon as the AMD 3950X comes out, I'll try to make another video of the installation and water cooled temperatures.

SC MAG

Even dead employees pose a security risk when their accounts are still active

Ransomware attackers compromised deceased employee's account to access a domain admin account. The incident is a sad reminder of some cyber hygiene standards too often overlooked. The post Even dead...


Apple Patches Three New iOS Zero-Days

While Apple has a significant focus on making iOS secure, one researcher said increasingly complex capabilities often bring vulnerabilities. The post Apple Patches Three New iOS Zero-Days appeared...


‘One of the most beautiful bugs I’ve seen’: Decade-old sudo bug grants Linux root access

Cybersecurity researchers and the U.S. Cyber Command are warning users about a decade-old buffer overflow bug in sudo that can grant root access to malicious users with low level access to systems....


Law enforcement strikes back at Emotet, one of the world’s most popular ransomware loaders

The voluntary, collaborative posture taken by different private and public stakeholders is what sets this takedown apart from others. The post Law enforcement strikes back at Emotet, one of the...


Think of remote access as a business continuity issue

FBI Director Christopher Wray speaks at an event in Washington, D.C. Security pros knew that attacks on VPNs had become serious when the FBI and CISA issued a warning last fall. Today’s columnist,...


Phishing scheme shows CEOs may be ‘most valuable asset,’ and ‘greatest vulnerability’

Cybercriminals have been using a phishing kit featuring fake Office 365 password alerts as a lure to target the credentials of chief executives, business owners and other high-level corporate...


BEC attack techniques exploit Microsoft 365 messages

Attackers exploit Microsoft 365 “read receipt” and “out of office” message loopholes to evade auto-remediation of a malicious email. The post BEC attack techniques exploit Microsoft 365 messages...


The cyber ‘journeymen’: Apprentices may be the solution to the skills gap

Aspiring infosec professionals have the opportunity to hone their craft as companies develop talent from within, potentially with government funding, and chip away at the diversity problem. The post...


Google to offer suite of new zero trust capabilities through Chrome browser

With backing from Google infrastructure and support from a host of industry partners, the features have the potential to significantly expand the footprint of zero trust solutions within industry...


Google discloses spearphishing targeting security researchers

Depending on how widespread the compromises were, it could potentially taint some research and defensive strategies that threat intelligence firms share with businesses and other organizations. The...