Thursday 29 January 2009

Vehicular Network Security Overview

I have read research paper from University of California (Department of Information and Computer Science) written by Magda El Zarki, Sharad Mehrotra, Gene Tsudik and Nalini Venkatasubramanian which titled "Security Issues in a Future Vehicular Network".

They have made an assumption that the security and privacy issues in vehicular network security are fairly common to most mobile and wireless network settings usch as authentication, data integrity, resistance to various denial-of-service attacks
and so forth.

In that paper, they highlighted a few important items for vehicular network security.

· No confidentiality: the issue of data secrecy or confidentiality is not of concern in this network environment; none of the application scenarios we consider require any data to be kept secret. This is
quite unusual in mobile networks. For example, in
many modern cell phone networks (GSM, CDPD etc.) a secure channel is maintained between the cell phone and the nearest base station and/or local subscriber registry

· No key distribution: most mobile network security architectures include provisions for key distribution. This is not only the case when an encrypted channel is set up; many settings require a key to be shared for authentication and data integrity reasons. In our case, key distribution is unnecessary for two reasons:

1) there will be no bulk data transmitted (on a continuous basis) either among cars
or between cars and roadside infrastructure, and,

2) vehicles traveling at high speeds (as most do on highways) will likely spend little time within a cell of a given base station. Also, vehicles communicating in
an ad hoc network broadcast their data, thus, pair-wise (or group-wise) key distribution is not needed.

· No hand-over: typically, one of the notable security features of mobile networks is the secure hand-over protocol [3, 4], e.g., as a node moves from one cell to another, its state (including any on-going connection data) is handed over from one base station to the next. However, explicit hand-over is not needed if communication is largely one-way, i.e., vehicles reporting current speed and other parameters to the base stations.

· No battery power concerns: this is actually the most important distinguishing factor of the network environment outlined in this proposal. In practically all mobile networks, power (CPU) consumption is a paramount concern. This includes not only power utilized for reception and transmission but also the power necessary to perform (usually expensive) cryptographic operations on weak and batterychallenged computing devices such as small PDAs, packet radios or cell phones. In our case, power consumption is not relevant since a running vehicle provides an ample source of battery power.

· No CPU speed issues: a related concern in many mobile networks is the low CPU speed of the mobile node. Hence, there is usually a goal to minimize the use of cryptography because of the relatively long delays it imposes (e.g., an average Palm Pilot or Handspring PDA takes seconds to generate a digital signature). This often results in security protocols that are “contorted” to minimize the use of cryptography; sometimes, with disastrous consequences, e.g., the original GSM security architecture. Since “nodes” in our context are vehicles, more powerful (faster) CPUs can be assumed.

· Extreme Time Sensitivity: as mentioned earlier, all data is very much time-sensitive. In applications such as VIVA, the needs for timeliness are only part of the problem. Time synchronization is also extremely important (although we can perhaps count on the GPS devices to provide accurate and uniform clock readings). Moreover, the system must be intolerant of replays (hostile and otherwise).

Taking the above differences into account leads us to a fairly simple security architecture with the following notable features:

· Digital Signatures: we require all broadcasts in VIVA as well as all “reports” in HITCH to be digitally signed by the originating vehicle. Since each vehicle (and the roadside infrastructure) will receive many more messages that it will send, the cost of signature verification is of more importance than that of signature generation. Therefore, at least at the beginning, we are likely to use RSA-based digital signatures (as opposed to, say, DSA). Of course, an appropriate message and signature format will be defined.

· Time-stamping and sequencing: all communication in both applications will include both sequence numbers as well as timestamps. Clock synchronization is a non-issue, for the time being, as all vehicles and fixed infrastructure components are (per our assumption) equipped with GPS receivers and GPS is also a time service.

· Certification Infrastructure (PKI): public key digital signatures are not particularly useful without a certification infrastructure. Designing a nimble, scalable and secure PKI has been a major challenge in the last decade. (See, for example, IETF PKI efforts.) We must take into account the unique aspects of our network environment in designing an appropriate PKI. Moreover, there are some recent and promising results in cryptography that obviate the need to public key certificates. For example, the Boneh/Franklin identity-based encryption system is an elegant method of obtaining public key cryptography without any certificates: in it, an entity’s public key is derived from a unique identity string, e.g., an email address or X.500 distinguished name. (This could be a vehicle identification number, in their case.)

Vehicular Network Security Overview

I have read research paper from University of California (Department of Information and Computer Science) written by Magda El Zarki, Sharad Mehrotra, Gene Tsudik and Nalini Venkatasubramanian which titled "Security Issues in a Future Vehicular Network".

They have made an assumption that the security and privacy issues in vehicular network security are fairly common to most mobile and wireless network settings usch as authentication, data integrity, resistance to various denial-of-service attacks
and so forth.

In that paper, they highlighted a few important items for vehicular network security.

· No confidentiality: the issue of data secrecy or confidentiality is not of concern in this network environment; none of the application scenarios we consider require any data to be kept secret. This is
quite unusual in mobile networks. For example, in
many modern cell phone networks (GSM, CDPD etc.) a secure channel is maintained between the cell phone and the nearest base station and/or local subscriber registry

· No key distribution: most mobile network security architectures include provisions for key distribution. This is not only the case when an encrypted channel is set up; many settings require a key to be shared for authentication and data integrity reasons. In our case, key distribution is unnecessary for two reasons:

1) there will be no bulk data transmitted (on a continuous basis) either among cars
or between cars and roadside infrastructure, and,

2) vehicles traveling at high speeds (as most do on highways) will likely spend little time within a cell of a given base station. Also, vehicles communicating in
an ad hoc network broadcast their data, thus, pair-wise (or group-wise) key distribution is not needed.

· No hand-over: typically, one of the notable security features of mobile networks is the secure hand-over protocol [3, 4], e.g., as a node moves from one cell to another, its state (including any on-going connection data) is handed over from one base station to the next. However, explicit hand-over is not needed if communication is largely one-way, i.e., vehicles reporting current speed and other parameters to the base stations.

· No battery power concerns: this is actually the most important distinguishing factor of the network environment outlined in this proposal. In practically all mobile networks, power (CPU) consumption is a paramount concern. This includes not only power utilized for reception and transmission but also the power necessary to perform (usually expensive) cryptographic operations on weak and batterychallenged computing devices such as small PDAs, packet radios or cell phones. In our case, power consumption is not relevant since a running vehicle provides an ample source of battery power.

· No CPU speed issues: a related concern in many mobile networks is the low CPU speed of the mobile node. Hence, there is usually a goal to minimize the use of cryptography because of the relatively long delays it imposes (e.g., an average Palm Pilot or Handspring PDA takes seconds to generate a digital signature). This often results in security protocols that are “contorted” to minimize the use of cryptography; sometimes, with disastrous consequences, e.g., the original GSM security architecture. Since “nodes” in our context are vehicles, more powerful (faster) CPUs can be assumed.

· Extreme Time Sensitivity: as mentioned earlier, all data is very much time-sensitive. In applications such as VIVA, the needs for timeliness are only part of the problem. Time synchronization is also extremely important (although we can perhaps count on the GPS devices to provide accurate and uniform clock readings). Moreover, the system must be intolerant of replays (hostile and otherwise).

Taking the above differences into account leads us to a fairly simple security architecture with the following notable features:

· Digital Signatures: we require all broadcasts in VIVA as well as all “reports” in HITCH to be digitally signed by the originating vehicle. Since each vehicle (and the roadside infrastructure) will receive many more messages that it will send, the cost of signature verification is of more importance than that of signature generation. Therefore, at least at the beginning, we are likely to use RSA-based digital signatures (as opposed to, say, DSA). Of course, an appropriate message and signature format will be defined.

· Time-stamping and sequencing: all communication in both applications will include both sequence numbers as well as timestamps. Clock synchronization is a non-issue, for the time being, as all vehicles and fixed infrastructure components are (per our assumption) equipped with GPS receivers and GPS is also a time service.

· Certification Infrastructure (PKI): public key digital signatures are not particularly useful without a certification infrastructure. Designing a nimble, scalable and secure PKI has been a major challenge in the last decade. (See, for example, IETF PKI efforts.) We must take into account the unique aspects of our network environment in designing an appropriate PKI. Moreover, there are some recent and promising results in cryptography that obviate the need to public key certificates. For example, the Boneh/Franklin identity-based encryption system is an elegant method of obtaining public key cryptography without any certificates: in it, an entity’s public key is derived from a unique identity string, e.g., an email address or X.500 distinguished name. (This could be a vehicle identification number, in their case.)

Vehicular Network Security Overview

I have read research paper from University of California (Department of Information and Computer Science) written by Magda El Zarki, Sharad Mehrotra, Gene Tsudik and Nalini Venkatasubramanian which titled "Security Issues in a Future Vehicular Network".

They have made an assumption that the security and privacy issues in vehicular network security are fairly common to most mobile and wireless network settings usch as authentication, data integrity, resistance to various denial-of-service attacks
and so forth.

In that paper, they highlighted a few important items for vehicular network security.

· No confidentiality: the issue of data secrecy or confidentiality is not of concern in this network environment; none of the application scenarios we consider require any data to be kept secret. This is
quite unusual in mobile networks. For example, in
many modern cell phone networks (GSM, CDPD etc.) a secure channel is maintained between the cell phone and the nearest base station and/or local subscriber registry

· No key distribution: most mobile network security architectures include provisions for key distribution. This is not only the case when an encrypted channel is set up; many settings require a key to be shared for authentication and data integrity reasons. In our case, key distribution is unnecessary for two reasons:

1) there will be no bulk data transmitted (on a continuous basis) either among cars
or between cars and roadside infrastructure, and,

2) vehicles traveling at high speeds (as most do on highways) will likely spend little time within a cell of a given base station. Also, vehicles communicating in
an ad hoc network broadcast their data, thus, pair-wise (or group-wise) key distribution is not needed.

· No hand-over: typically, one of the notable security features of mobile networks is the secure hand-over protocol [3, 4], e.g., as a node moves from one cell to another, its state (including any on-going connection data) is handed over from one base station to the next. However, explicit hand-over is not needed if communication is largely one-way, i.e., vehicles reporting current speed and other parameters to the base stations.

· No battery power concerns: this is actually the most important distinguishing factor of the network environment outlined in this proposal. In practically all mobile networks, power (CPU) consumption is a paramount concern. This includes not only power utilized for reception and transmission but also the power necessary to perform (usually expensive) cryptographic operations on weak and batterychallenged computing devices such as small PDAs, packet radios or cell phones. In our case, power consumption is not relevant since a running vehicle provides an ample source of battery power.

· No CPU speed issues: a related concern in many mobile networks is the low CPU speed of the mobile node. Hence, there is usually a goal to minimize the use of cryptography because of the relatively long delays it imposes (e.g., an average Palm Pilot or Handspring PDA takes seconds to generate a digital signature). This often results in security protocols that are “contorted” to minimize the use of cryptography; sometimes, with disastrous consequences, e.g., the original GSM security architecture. Since “nodes” in our context are vehicles, more powerful (faster) CPUs can be assumed.

· Extreme Time Sensitivity: as mentioned earlier, all data is very much time-sensitive. In applications such as VIVA, the needs for timeliness are only part of the problem. Time synchronization is also extremely important (although we can perhaps count on the GPS devices to provide accurate and uniform clock readings). Moreover, the system must be intolerant of replays (hostile and otherwise).

Taking the above differences into account leads us to a fairly simple security architecture with the following notable features:

· Digital Signatures: we require all broadcasts in VIVA as well as all “reports” in HITCH to be digitally signed by the originating vehicle. Since each vehicle (and the roadside infrastructure) will receive many more messages that it will send, the cost of signature verification is of more importance than that of signature generation. Therefore, at least at the beginning, we are likely to use RSA-based digital signatures (as opposed to, say, DSA). Of course, an appropriate message and signature format will be defined.

· Time-stamping and sequencing: all communication in both applications will include both sequence numbers as well as timestamps. Clock synchronization is a non-issue, for the time being, as all vehicles and fixed infrastructure components are (per our assumption) equipped with GPS receivers and GPS is also a time service.

· Certification Infrastructure (PKI): public key digital signatures are not particularly useful without a certification infrastructure. Designing a nimble, scalable and secure PKI has been a major challenge in the last decade. (See, for example, IETF PKI efforts.) We must take into account the unique aspects of our network environment in designing an appropriate PKI. Moreover, there are some recent and promising results in cryptography that obviate the need to public key certificates. For example, the Boneh/Franklin identity-based encryption system is an elegant method of obtaining public key cryptography without any certificates: in it, an entity’s public key is derived from a unique identity string, e.g., an email address or X.500 distinguished name. (This could be a vehicle identification number, in their case.)

Tuesday 27 January 2009

Wireless Network Security Overview

Currently, the Wireless Network Security standards and protocols are fall into 3 categories:

Encryption
It use to ensures privacy of data transmitted through the air
It can be done at Layer 2 (WPA2, WPA, WEP, TKIP, AES) or Layer 3 (VPN)

Authentication
It can ensures that only authorized users with proper credentials are allowed to use the network such as security certificate or LDAP matching attribute (login and password).
Authentication methods include EAP, captive portal, VPN

Access Control
Provides a policy enforcement structure to control the traffic of authorized users, including networks, bandwidth, time of day, and protocols. Some solutions preferred to integrate with Network Access Control (NAC) supported appliance for managing the access control.

Wireless Network Security Overview

Currently, the Wireless Network Security standards and protocols are fall into 3 categories:

Encryption
It use to ensures privacy of data transmitted through the air
It can be done at Layer 2 (WPA2, WPA, WEP, TKIP, AES) or Layer 3 (VPN)

Authentication
It can ensures that only authorized users with proper credentials are allowed to use the network such as security certificate or LDAP matching attribute (login and password).
Authentication methods include EAP, captive portal, VPN

Access Control
Provides a policy enforcement structure to control the traffic of authorized users, including networks, bandwidth, time of day, and protocols. Some solutions preferred to integrate with Network Access Control (NAC) supported appliance for managing the access control.

Wireless Network Security Overview

Currently, the Wireless Network Security standards and protocols are fall into 3 categories:

Encryption
It use to ensures privacy of data transmitted through the air
It can be done at Layer 2 (WPA2, WPA, WEP, TKIP, AES) or Layer 3 (VPN)

Authentication
It can ensures that only authorized users with proper credentials are allowed to use the network such as security certificate or LDAP matching attribute (login and password).
Authentication methods include EAP, captive portal, VPN

Access Control
Provides a policy enforcement structure to control the traffic of authorized users, including networks, bandwidth, time of day, and protocols. Some solutions preferred to integrate with Network Access Control (NAC) supported appliance for managing the access control.

Tuesday 6 January 2009

Windows XP Drivers for Acer Aspire 4520






Download Acer Aspire 4520 Chipset + LAN Driver for Win XP

Description: Chipset and LAN Drivers for Win XP & Vista
Version: Chipset (13.13) LAN (65.7.5.0)
Release: Date 2007-07-19
Size: 7.68 MB
Download: Chipset(13.13_logo) + Lan(65.7.5.0_logo).zip
DownloadMirror Link

Download Acer Aspire 4520 Video Driver For Win XP

Description: Video Driver for Win XP
Version: 7.15.11.126
Release Date: 2007-07-23
Size: 66.9 MB
Download: VGA_XP(7.15.11.126_logo).zip
Download:Mirror Link

Download Acer Aspire 4520 Atheros Wireless Lan Driver For Win XP

Description: Atheros Wireless Lan for Win XP & Vista
Version: 5.3.0.45
Release Date: 2007-07-23
Size: 2.66 MB
Download: Wireless_Atheros_XP32_XP64_WHQL_(5.3.0.45_logo).zip
Download:Mirror LInk

Download Acer Aspire 4520 Broadcom Wireless Lan Driver For Win XP

Description: Broadcom Wireless Lan for Win XP & Vista
Version: 4.100.15.5
Release Date: 2006-12-04
Size: 2.58 MB
Download: Wireles_Broadcom_XP_(4.100.15.5_logo).zip
Download:Mirror Link

Download Acer Aspire 4520 Modem Drivers Foxconn Conexant For Win XP

Description: Foxconn Conexant Modem Driver
Version: 2.1.77.9
Release Date: 2007-07-23
Size: 1.61 MB
Download: Modem_Foxccon_Conexant_(2.1.77.9_logo).zip
Download:Mirror Link

Download Acer Aspire 4520 Modem Drivers LiteOn For Win XP

Description: LiteOn Modem Driver
Version: 2.1.77.9
Release Date: 2007-07-23
Size: 1.35 MB
Download: Modem_Liteon_(2.1.77.9_logo).zip
Download:Mirror Link

Download Acer Aspire 4520 Card Reader Driver For Win XP

Description: Card reader driver for Win XP / Vista
Version: 3.51.01
Release Date: 2007-07-23
Size: 2.57 MB
Download: CardReader_WinXP,VISTA(32bit,64Bbit)(3.51.01_logo).zip
Download:Mirror Link

Download Acer Aspire 4520 Audio Driver For Win XP

Description: Audio driver for Win XP / Vista
Version: 5.10.0.5423
Release Date: 2007-07-23
Size: 36.8 MB
Download: Audio_WinXP,VISTA(32bit,64Bbit)_(5.10.0.5423_logo).zip
Download:Mirror Link

Download Acer Aspire 4520 Touchpad Driver For Win XP

Description: Touchpad Driver for Win XP / Vista
Version: 9.2.3.1
Release Date: 2007-07-23
Size: 24.1 MB
Download: TouchPad_Synaptics_Vista_Vista64_x64_XP_2K_(9.2.3.1_logo).zip
Download:Mirror Link

Download Acer Aspire 4520 BlueTooth Driver For Win XP

Description: BlueTooth Driver for Win XP / Vista
Version: 5.1.0.3300
Release Date: 2007-07-23
Size: 96.5 MB
Download: Bluetooth_(5.1.0.3300_logo).zip
Download:Mirror Link

Download Acer Aspire 4520 HID CIR (Infra-red) For Win XP

Description: Infrared Notebook Embedded Controllers
Version: 7.1.64.1010
Release Date: 2007-07-23
Size: 10.3 MB
Download: CIR_(7.1.64.1010_logo).zip
Download:Mirror Link

Download Acer Aspire 4520 Webcam Driver (Suyin) For Win XP

Description: Acer Crystal Eye Webcam Driver (Suyin)
Version: 5.7.28.500
Release Date: 2007-07-23
Size: 7.55 MB
Download: CCD_Suyin_WinXP,VISTA(32bit,64Bbit)(5.7.28.500_logo).zip
Download:Mirror Link

Download Acer Aspire 4520 Webcam Driver (Bison) For Win XP

Description: Acer Crystal Eye Webcam Driver (Bison)
Version: 7.32.701.09
Release Date: 2007-07-23
Size: 5.6 MB
Download: CCD_Bison_x86,x64_(v7.32.701.09_logo).zip
Download:Mirror Link

Download Acer Aspire 4520 Launch Manager For Win XP

Description: Launch Manager for Win 2000 / XP / Vista
Version: 2.0
Release Date: 2007-06-08
Size: 2.56 MB
Download: Launch Manager_Xp,Vista x86,x64_(2.00 b12_logo).zip
Download:Mirror Link

Download Instructions

When you click on a Download Mirror link and a new page opens that is of uploading.com, click on “download free” on that page. After that wait for the timer to finish and than click on “download”!

The files are RAR archives you will need winrar to open the files.

resource from: http://www.getpcmemory.com/about/

Windows XP Drivers for Acer Aspire 4520






Download Acer Aspire 4520 Chipset + LAN Driver for Win XP

Description: Chipset and LAN Drivers for Win XP & Vista
Version: Chipset (13.13) LAN (65.7.5.0)
Release: Date 2007-07-19
Size: 7.68 MB
Download: Chipset(13.13_logo) + Lan(65.7.5.0_logo).zip
DownloadMirror Link

Download Acer Aspire 4520 Video Driver For Win XP

Description: Video Driver for Win XP
Version: 7.15.11.126
Release Date: 2007-07-23
Size: 66.9 MB
Download: VGA_XP(7.15.11.126_logo).zip
Download:Mirror Link

Download Acer Aspire 4520 Atheros Wireless Lan Driver For Win XP

Description: Atheros Wireless Lan for Win XP & Vista
Version: 5.3.0.45
Release Date: 2007-07-23
Size: 2.66 MB
Download: Wireless_Atheros_XP32_XP64_WHQL_(5.3.0.45_logo).zip
Download:Mirror LInk

Download Acer Aspire 4520 Broadcom Wireless Lan Driver For Win XP

Description: Broadcom Wireless Lan for Win XP & Vista
Version: 4.100.15.5
Release Date: 2006-12-04
Size: 2.58 MB
Download: Wireles_Broadcom_XP_(4.100.15.5_logo).zip
Download:Mirror Link

Download Acer Aspire 4520 Modem Drivers Foxconn Conexant For Win XP

Description: Foxconn Conexant Modem Driver
Version: 2.1.77.9
Release Date: 2007-07-23
Size: 1.61 MB
Download: Modem_Foxccon_Conexant_(2.1.77.9_logo).zip
Download:Mirror Link

Download Acer Aspire 4520 Modem Drivers LiteOn For Win XP

Description: LiteOn Modem Driver
Version: 2.1.77.9
Release Date: 2007-07-23
Size: 1.35 MB
Download: Modem_Liteon_(2.1.77.9_logo).zip
Download:Mirror Link

Download Acer Aspire 4520 Card Reader Driver For Win XP

Description: Card reader driver for Win XP / Vista
Version: 3.51.01
Release Date: 2007-07-23
Size: 2.57 MB
Download: CardReader_WinXP,VISTA(32bit,64Bbit)(3.51.01_logo).zip
Download:Mirror Link

Download Acer Aspire 4520 Audio Driver For Win XP

Description: Audio driver for Win XP / Vista
Version: 5.10.0.5423
Release Date: 2007-07-23
Size: 36.8 MB
Download: Audio_WinXP,VISTA(32bit,64Bbit)_(5.10.0.5423_logo).zip
Download:Mirror Link

Download Acer Aspire 4520 Touchpad Driver For Win XP

Description: Touchpad Driver for Win XP / Vista
Version: 9.2.3.1
Release Date: 2007-07-23
Size: 24.1 MB
Download: TouchPad_Synaptics_Vista_Vista64_x64_XP_2K_(9.2.3.1_logo).zip
Download:Mirror Link

Download Acer Aspire 4520 BlueTooth Driver For Win XP

Description: BlueTooth Driver for Win XP / Vista
Version: 5.1.0.3300
Release Date: 2007-07-23
Size: 96.5 MB
Download: Bluetooth_(5.1.0.3300_logo).zip
Download:Mirror Link

Download Acer Aspire 4520 HID CIR (Infra-red) For Win XP

Description: Infrared Notebook Embedded Controllers
Version: 7.1.64.1010
Release Date: 2007-07-23
Size: 10.3 MB
Download: CIR_(7.1.64.1010_logo).zip
Download:Mirror Link

Download Acer Aspire 4520 Webcam Driver (Suyin) For Win XP

Description: Acer Crystal Eye Webcam Driver (Suyin)
Version: 5.7.28.500
Release Date: 2007-07-23
Size: 7.55 MB
Download: CCD_Suyin_WinXP,VISTA(32bit,64Bbit)(5.7.28.500_logo).zip
Download:Mirror Link

Download Acer Aspire 4520 Webcam Driver (Bison) For Win XP

Description: Acer Crystal Eye Webcam Driver (Bison)
Version: 7.32.701.09
Release Date: 2007-07-23
Size: 5.6 MB
Download: CCD_Bison_x86,x64_(v7.32.701.09_logo).zip
Download:Mirror Link

Download Acer Aspire 4520 Launch Manager For Win XP

Description: Launch Manager for Win 2000 / XP / Vista
Version: 2.0
Release Date: 2007-06-08
Size: 2.56 MB
Download: Launch Manager_Xp,Vista x86,x64_(2.00 b12_logo).zip
Download:Mirror Link

Download Instructions

When you click on a Download Mirror link and a new page opens that is of uploading.com, click on “download free” on that page. After that wait for the timer to finish and than click on “download”!

The files are RAR archives you will need winrar to open the files.

resource from: http://www.getpcmemory.com/about/

Windows XP Drivers for Acer Aspire 4520






Download Acer Aspire 4520 Chipset + LAN Driver for Win XP

Description: Chipset and LAN Drivers for Win XP & Vista
Version: Chipset (13.13) LAN (65.7.5.0)
Release: Date 2007-07-19
Size: 7.68 MB
Download: Chipset(13.13_logo) + Lan(65.7.5.0_logo).zip
DownloadMirror Link

Download Acer Aspire 4520 Video Driver For Win XP

Description: Video Driver for Win XP
Version: 7.15.11.126
Release Date: 2007-07-23
Size: 66.9 MB
Download: VGA_XP(7.15.11.126_logo).zip
Download:Mirror Link

Download Acer Aspire 4520 Atheros Wireless Lan Driver For Win XP

Description: Atheros Wireless Lan for Win XP & Vista
Version: 5.3.0.45
Release Date: 2007-07-23
Size: 2.66 MB
Download: Wireless_Atheros_XP32_XP64_WHQL_(5.3.0.45_logo).zip
Download:Mirror LInk

Download Acer Aspire 4520 Broadcom Wireless Lan Driver For Win XP

Description: Broadcom Wireless Lan for Win XP & Vista
Version: 4.100.15.5
Release Date: 2006-12-04
Size: 2.58 MB
Download: Wireles_Broadcom_XP_(4.100.15.5_logo).zip
Download:Mirror Link

Download Acer Aspire 4520 Modem Drivers Foxconn Conexant For Win XP

Description: Foxconn Conexant Modem Driver
Version: 2.1.77.9
Release Date: 2007-07-23
Size: 1.61 MB
Download: Modem_Foxccon_Conexant_(2.1.77.9_logo).zip
Download:Mirror Link

Download Acer Aspire 4520 Modem Drivers LiteOn For Win XP

Description: LiteOn Modem Driver
Version: 2.1.77.9
Release Date: 2007-07-23
Size: 1.35 MB
Download: Modem_Liteon_(2.1.77.9_logo).zip
Download:Mirror Link

Download Acer Aspire 4520 Card Reader Driver For Win XP

Description: Card reader driver for Win XP / Vista
Version: 3.51.01
Release Date: 2007-07-23
Size: 2.57 MB
Download: CardReader_WinXP,VISTA(32bit,64Bbit)(3.51.01_logo).zip
Download:Mirror Link

Download Acer Aspire 4520 Audio Driver For Win XP

Description: Audio driver for Win XP / Vista
Version: 5.10.0.5423
Release Date: 2007-07-23
Size: 36.8 MB
Download: Audio_WinXP,VISTA(32bit,64Bbit)_(5.10.0.5423_logo).zip
Download:Mirror Link

Download Acer Aspire 4520 Touchpad Driver For Win XP

Description: Touchpad Driver for Win XP / Vista
Version: 9.2.3.1
Release Date: 2007-07-23
Size: 24.1 MB
Download: TouchPad_Synaptics_Vista_Vista64_x64_XP_2K_(9.2.3.1_logo).zip
Download:Mirror Link

Download Acer Aspire 4520 BlueTooth Driver For Win XP

Description: BlueTooth Driver for Win XP / Vista
Version: 5.1.0.3300
Release Date: 2007-07-23
Size: 96.5 MB
Download: Bluetooth_(5.1.0.3300_logo).zip
Download:Mirror Link

Download Acer Aspire 4520 HID CIR (Infra-red) For Win XP

Description: Infrared Notebook Embedded Controllers
Version: 7.1.64.1010
Release Date: 2007-07-23
Size: 10.3 MB
Download: CIR_(7.1.64.1010_logo).zip
Download:Mirror Link

Download Acer Aspire 4520 Webcam Driver (Suyin) For Win XP

Description: Acer Crystal Eye Webcam Driver (Suyin)
Version: 5.7.28.500
Release Date: 2007-07-23
Size: 7.55 MB
Download: CCD_Suyin_WinXP,VISTA(32bit,64Bbit)(5.7.28.500_logo).zip
Download:Mirror Link

Download Acer Aspire 4520 Webcam Driver (Bison) For Win XP

Description: Acer Crystal Eye Webcam Driver (Bison)
Version: 7.32.701.09
Release Date: 2007-07-23
Size: 5.6 MB
Download: CCD_Bison_x86,x64_(v7.32.701.09_logo).zip
Download:Mirror Link

Download Acer Aspire 4520 Launch Manager For Win XP

Description: Launch Manager for Win 2000 / XP / Vista
Version: 2.0
Release Date: 2007-06-08
Size: 2.56 MB
Download: Launch Manager_Xp,Vista x86,x64_(2.00 b12_logo).zip
Download:Mirror Link

Download Instructions

When you click on a Download Mirror link and a new page opens that is of uploading.com, click on “download free” on that page. After that wait for the timer to finish and than click on “download”!

The files are RAR archives you will need winrar to open the files.

resource from: http://www.getpcmemory.com/about/