Asus ROG Gunslinger 9
From Wiki-IoT
Revision as of 01:54, 14 October 2025 by Jeandecian (talk | contribs)
Classification
| Asus ROG Gunslinger 9 | |
|---|---|
| Classification | |
| Grade | A+ |
| Calculator version | 1 |
| Classification date | 2025-10-13 |
| Information | |
| Name | ASUS ROG Strix G9 |
| Brand by Parent | ASUS by ASUS |
| Generation | 1st (within the “Strix G9” line) |
| Model(s) | ROG Strix G9 (15.6‑inch) – variants: GTX 1650 Ti, RTX 2060, RTX 3070 (2021‑22) |
| Release date | 2022-02-01 |
| Type/Category | Gaming Laptop |
| Website | [1] |
| Status | In sale |
| More | |
| Dimensions | 360 mm × 248 mm × 28.5 mm https://rog.asus.com/laptops/strix/ 15.6‑inch form factor Mass |
| Mass | 2.4 kg |
| Operating system | Windows 10 Home / Pro (pre‑installed) |
| Companion App | ASUS Armoury Crate |
| CPU | Intel Core i7‑10710U (10th Gen) or i7‑10750H |
| GPU | NVIDIA GeForce GTX 1650 Ti (base) / RTX 2060 / RTX 3070 |
| Memory | 16 GB DDR4‑2666 MHz |
| Storage | 512 GB PCIe NVMe SSD (M.2 2280) |
| Battery | 4‑cell 49 Wh Li‑ion |
| Power | 45 W (standard) / 90 W (RTX 3070) |
| Charging | 45 W USB‑C (Power Delivery |
| Display | 15.6‑inch FHD (1920×1080), 144 Hz, 120 ms response |
| Camera | 720 p integrated webcam |
| Sound | Stereo 2‑W speakers (Dolby Audio) – |
| Connectivity | Wi‑Fi 802.11ac, Bluetooth 5.0, USB 3.1 Gen 2×2, HDMI 2.0, USB‑C (USB‑3.1) |
| Device | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Known hardware tampering | None | [2] | |
| Known vulnerabilities | None | [3] | |
| Prior attacks | None | [4] | |
| Updatability | Very common | [5] | |
| Category score | 1 | ||
| System | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Authentication with other systems | Full | [6] | |
| Communications | Encrypted with up-to-date encryption | [7] | |
| Storage | Encrypted with up-to-date encryption | [8] | |
| Category score | 1 | ||
| User Authentication | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Account management | Full | [9] | |
| Authentication | Secure | [10] | |
| Brute-force protection | Exist | [11] | |
| Event logging | Access event logged | [12] | |
| Passwords | Require change after setup with complexity requirements | [13] | |
| Category score | 1 | ||
| Grade | A+ |
|---|