Professional Documents
Culture Documents
Industrial Centre Secondary Computer Teachers Basic Computer Maintenance and Troubleshooting Techniques
A Typical Power Supply Rating Label Major Selection Considerations for Motherboard
• Processor
speed and package
• Form factor
Number and type of bus slots
• PCI – 32 vs 64 bit; ISA is fading out
• AGP - match the display controller
• DRAM system
Type and Number of DRAM Slots;DDR, parity
DRAM capacity; can the motherboard support 4GB?
• On board features
Network – Ethernet 10/100/1000
Sound chips
Location and type of Interfaces
• SCSI, serial, USB 2.0, Firewire, etc.
Double Data Rate RAM ( DDR RAM) 184 pin DIMM Module • Peak bandwidth for PC800 RIMM Modules (dual memory
channel)
(2 Bytes) x (800 MHz Data Rate) x 2 channels = 3,200 MB/s or
3.2 GB/s.
• Peak bandwidth for PC1600 DIMMs Modules 168 pins 168 pins 184 pins 184 pins 184 pins 184 pins 184 pins
(8 Bytes) x (200 MHz Data Rate) = 1,600 MB/s or 1.6 GB/s DIMM DIMM RIMM RIMM DIMM DIMM DIMM
3.3 V 3.3 V 2.5 V 2.5 V 2.5 V 2.5 V 2.5 V
• Once the processor receives an Interrupt Request, it INT (Hex) IRQ Common Uses
finishes its current instruction, places a few things on the 00 - 01 Exception Hand lers -
Non -Maskabl e IRQ (Parity
stack, and executes the appropriate Interrupt Service 02 Non-Maskable IRQ
Errors)
Routine (ISR) which can remove the byte from the port 03 - 07
08
Exception Hand lers
Hard ware IRQ0 S ystem Timer
-
and place it in a buffer. Once the ISR has finished, the 09 Hard ware IRQ1 Keyboard Controller
• Example - Minimum Hardware Requirement for Windows 2000 • The Windows 2000 Setup program will automatically checks the
Server hardware and software and reports any potential conflicts. However, to
ensure a successful installation, one should make sure that their
Component Component Component Component computer hardware is compatible with Windows 2000 Server before
starting the setup process. To do this, verify that the hardware is on the
133 MHz or Higher 133 MHz or Higher 133 MHz or Higher HCL. The HCL is included in the Windows 2000 Server installation
CPU (Up to 2 processors) (Up to 4 processors) (Up to 8 processors) CD-ROM in the Support folder in Hcl.txt. The HCL lists each hardware
Memory 64 MB (max. 4GB) 128 MB (max. 4GB) 256 MB (max. 8GB) model that has passed the Hardware Compatibility Tests (HCTs). The
list also indicates which devices Windows 2000 Server supports. Testing
Hard Disk 650 MB of free space 1 GB of free space is conducted by Windows Hardware Quality Labs (WHQL) and by
some hardware vendors. Installing Windows 2000 Server on a computer
Display Video Graphics Array (VGA)
that does not have hardware listed in the HCL might not be successful.
Accessories Keyboard, mouse or other pointing device .
Driver 12x or faster CD-ROM driver and 3.5-inch floppy driver
• Ignore
•Allows all files to be installed, whether they've been signed or
not.
• Warn
•Notifies the user if a driver that's being installed hasn't been
signed, and gives the user a chance to say "no" to the installation.
Warn also gives the user the option to install unsigned versions of
a protected driver file.
• Block
•Prevents all unsigned drivers from being installed.
Prop erties
• This reinstallation enables users to recover from system
problems that result from the installation or update of a • Windows XP will back up drivers that are active and functional. It
particular driver.. will not back up inactive or malfunctioning drivers.
• OS saves files and folders in the first available space on a • The process of finding and consolidating fragmented files
hard disk and not necessarily in an area of contiguous and folders is called defragmenting. In Microsoft
space. This leads to file and folder fragmentation. When Windows, the Disk Defragmenter is used to locate
your hard disk contains a lot of fragmented files and fragmented files and folders and then defragment them. It
folders, your computer takes longer to gain access to them does this by moving the pieces of each file or folder to one
because it requires several additional reads to collect the location so that each file or folder occupies a single area of
various pieces. Creating new files and folders also takes contiguous space on the hard disk. Consequently, your
longer because the available free space on the hard disk is system can gain access to and save files and folders more
scattered. Your computer must save a new file or folder in efficiently. By consolidating files and folders, the Disk
various locations on the hard disk. Defragmenter also consolidates free space, making it less
likely that new files will be fragmented. Disk Defragmenter
defragments FAT16, FAT32, and NTFS volumes.
• The Disk Defragmenter window has three panes that • By comparing the Analysis display band to the Defragmentation display
provide the following information band during defragmentation and at its conclusion, you can quickly see the
The upper portion of the window lists the volumes you can analyze improvement in the volume.
and defragment.
The middle portion is a graphic representation of how fragmented • To analyze or defragment a volume, you can choose one of the options
the selected volume is. described in the following table.
The lower portion is a dynamic representation of the volume that is
continuously updated during defragmentation.
Option Description
• The display colors indicate the condition of the volume. Analyze Click this button to analyze the disk for fragmentation. After the
Red indicates fragmented files. analysis, the Analysis display band provides a graphical representation
Dark blue indicates contiguous (nonfragmented) files. of how fragmented the volume is.
White indicates free space on the volume. Defragment Click this button to defragment the disk. After defragmentation, the
Green indicates system files, which Disk Defragmenter cannot Defragmentation display band provides a graphical representation of
move. the defragmented volume.
• considerations
system vs. data
cost of Backup
3 Restore
1 • Backing Up Data
S erver
The goal of all backup jobs is to ensure that lost data can be recovered
Backup efficiently and quickly. A backup job is a single process of backing up
data. Regularly backing up data on server hard disks and client
S erver
computer hard disks prevents data loss due to disk drive failures,
power outages, virus infections, and other such incidents. If data loss
S erver
2 occurs and you have carefully planned and performed regular backup
jobs, you can restore the lost data, whether the lost data is a single file
or an entire hard disk.
Data Corruption
Tape: A tape is more convenient for large backup jobs because of its
high storage capacity. However, tapes have a limited life and can
deteriorate. Be sure to check the tape manufacturer's recommendations
for usage.
3. Differential
1. Normal
A differential backup, only selected files and folders that have a marker
A normal backup, known as a full backup, all selected files and folders are
are backed up. Because a differential backup does not clear markers, if
backed up. A normal backup does not rely on markers to determine which
you did two differential backups in a row on a file, the file would be
files to back up, but it does clear the archive attribute from all files.
backed up each time. This backup type is moderately fast at backing up
Normal backups speed up the restore process because the backup files are
and restoring data.
the most current and you do not need to restore multiple backup jobs.
However, they are the most time consuming and require the most storage
4. Incremental
capacity of any backup type.
An incremental backup, only selected files and folders that have a marker
are backed up. An incremental backup clears markers. Because it clears
2. Copy
markers, if you did two incremental backups in a row on a file and
A copy backup, all selected files and folders are backed up. It neither
nothing changed in the file, the file would not be backed up the second
looks for nor clears markers. If you do not want to clear markers and
time. This backup type is very fast at backing up data and slow at
affect other backup types, use a copy backup. For example, use a copy
restoring data.
backup between a normal and an incremental backup to create an archival
snapshot of network data.
Example 1
During a daily backup, all selected files and folders that have
changed during the day are backed up. A daily backup neither
looks for nor clears markers. If you want to back up all files and
folders that change during the day without affecting a backup N D D D D
schedule, use a daily backup.
Example 2
N I I I I
• When a user create a backup job, the following should be • You can use Backup to back up the system state data. If the system state
data on a computer has been backed up and that same computer system
specified: fails, you can rebuild the computer with the original Windows 2000
Drives, Folders, or Files to Back Up compact disc and the system state data.
Backup Destination
• The system state data contains the information to restore the operating
Path and File Name, or a Tape to Use
system to its pre-failure state. The system state data includes the
Backup Options following system components:
Description of the Backup Job
• Registry
Whether the Media Contains Existing Backup Jobs
• Component Services class registration database
Advanced Backup Options • System startup files
• Certificate Services database
• Active Directory™ directory service
• Sysvol folder
Component DC** Server** Professional Microsoft Windows 2000 includes tools for monitoring system resources.
Task Manager presents a snapshot of programs and processes that are
Registry
running on your computer and provides a summary of the computer's
CS* Class Registration Database processor and memory usage. System Monitor and Performance Logs and
Alerts provide detailed data about the resources used by specific
System Startup Files components of the operating system and computer. Specifically, these
utilities contains:-
Certificate Services Database
z Monitor event logs to monitor information about system operations.
Active Directory
z Task Manager for monitoring system resources.
Sysvol Folder z System Monitor for monitoring system performance.
* CS Component Services
** DC A domain controller running Windows 2000 Server
z Alerts to notify a user or an administrator when certain system criteria
*** Server A computer running Windows 2000 Server that is also a certificate server are met or exceeded.
z Counters are available for monitoring and tune for optimizing
performance.
030725 CIT A PC M aintenanc e.ppt 91 030725 CIT A PC M aintenanc e.ppt 92
Monitoring Event Logs Event Log Checking as a Security Measure
• After events are recorded in these logs, view and analyze
• Events are user actions that are recorded based on an Audit the logs to detect activities and events that require
policy, or any significant occurrence as encountered by the
system or in an application. administrative consideration.
• Monitoring events helps to identify and track security • Based on your analysis of the logs, one may resolve
events, resource use, or system and application errors. security violations, address system problems, or reallocate
• 3 types of logs are available on Microsoft Systems resources for better performance.
Security events, based on an Audit policy, are • You may also need to recommend changes in Audit policy,
recorded in the security log. audit settings, security settings, application configuration,
System events automatically configured by Windows or system configuration.
2000 are recorded in the system log.
Applications events determined by the application
developer are recorded in the application log.
Security Event Logs The System Log and The Application Log
The security log records security events such as valid and invalid logon •The system log.
attempts in addition to events related to resource use, such as creating, This log contains events logged by the Windows 2000 system
opening, or deleting files. An administrator specifies what events are
recorded in the security log. For example, if the administrator has enabled components. For example, the failure of a driver or other system
log on auditing, all attempts to log on to the system are recorded in the component to load during startup is recorded in the system log.
security log. Logs can be used to provide a history of events. The event types logged by system components are predetermined
by Windows 2000.
There are three types of system and application events: Information, Information
Warning, and Error. Each event contains detailed information such as the
type of event and the service associated with the event. Event z The successful operation of an application, driver, or service.
information can be used to accurately identify the event for taking
appropriate action. System events are generated by Windows 2000 and
recorded in system logs. Application events are generated by Warning
applications and recorded in application logs.
z An event that is not necessarily significant but may indicate a future
problem with system operations.
Information
Error
Error Warning z A significant problem with system operations, such as loss of data or
loss of functionality.
• Limit the size of event logs if hard disk space is a problem and select
a method to overwrite older log event entries with new log entries.
Overwriting older event logs is called event log wrapping.
• When you enable an Event log wrapping option, you lose old entries.
If your security needs are high and you want to keep a history of
events, you can choose to archive old event entries instead of
overwriting them.
Size Limit
• The size of each log, which can range from 64 kilobytes (KB) to 4
Action to Take gigabytes (GB). The default size is 512 KB.
when Limit
Reached • The action that Windows 2000 takes when a log is full can be
controlled by configuring the Event log wrapping options
available.
030725 CIT A PC M aintenanc e.ppt 101 030725 CIT A PC M aintenanc e.ppt 102
• For convenience, one can export the Log to a File Format • For example, you can use Task Manager to identify an
to View in other Application, example:- application or process that is using a disproportionate
Log-file format (.evt ) amount of system resources. In addition, the Task Manager
status bar provides you with measurements of a system or
Text-file format (.txt)
program activity.
Comma-delimited text-file format (.csv)
030725 CIT A PC M aintenanc e.ppt 103 030725 CIT A PC M aintenanc e.ppt 104
Monitoring Programs Monitoring Process
Select Process
Measures to Display
030725 CIT A PC M aintenanc e.ppt 105 030725 CIT A PC M aintenanc e.ppt 106
The Processes tab can be used to view a list of running • Use the Process tab in Task Manager to identify the
processes and their measures. Measures are measurements of resource use of a program. After you identify the
a process, such as total processor time or the amount of applications that are using the most processor time, move
memory in use. The list that appears on the Processes tab some of these applications to another computer to distribute
includes all processes that run in their own address space, the workload. Sort column entries ascending or descending
including all applications and system services. Both the user order to identify high usage.
and the system can initialize a process, but you can only end
a process that is initialized by a user. • For example, to identify the high-processor use by an
application, click the CPU column. The first time you click
the column, it sorts the applications in ascending order of
usage. Clicking again sorts the applications in descending
order of CPU usage. You can only sort by one column at a
time.
030725 CIT A PC M aintenanc e.ppt 107 030725 CIT A PC M aintenanc e.ppt 108
System Performance Monitoring Using Performance Measures to View Processor Time
• Use the Performance tab in Task Manager to identify the amount of
system resources the operating system or an application is using and to
To monitor the current view the percentage of processor time that is being used by the kernel
performance of your mode. The kernel is the core of an operating system that manages
computer, you use the memory, files, and peripheral devices; maintains the time and date;
Performance tab. This tab launches applications; and allocates system resources.
displays a dynamic overview
of the computer's current • To view the percentage of processor time that is in kernel mode, on the
performance, including a View menu, click Show Kernel Times.
graph and numeric display of
processor and memory usage. • The processor time in kernel mode appears in red in the graphs. This is a
measure of the time that applications are using operating system services.
The remaining time, shown in green, is known as user mode. This is a
measure of the time that is spent running threads within the application
code.
030725 CIT A PC M aintenanc e.ppt 109 030725 CIT A PC M aintenanc e.ppt 110
• If you need more detail than that provided by the Task Manager, you • Objects In System Monitor Are Major Components or
can use System Monitor to obtain more comprehensive information
about your computer or other computers on the network. Use System Subsystems of the Computer System
Monitor in Performance in Microsoft Management Console (MMC) to • Instances Are Multiples of the Same Object
collect and view real-time or logged data about memory, disk,
processor, and network activity. This information can be used to • Counters:
diagnose how the system and applications are functioning to ensure that
you are optimizing the system. For example, you can determine if your Are Measurements of different aspects of objects
system is low on disk space.
Continually gather data on objects
• System Monitor information can be viewed in graph, histogram (bar Provide data on all instances of an object
chart), or report form. Graphs, histograms, and reports can be viewed in
a browser and printed when performance data is saved as a Hypertext Can be selected to displayed in System Monitor
Markup Language (HTML) file.
030725 CIT A PC M aintenanc e.ppt 111 030725 CIT A PC M aintenanc e.ppt 112
Object, Instances and Counters Adding Counters
• Objects.
In System Monitor, objects are major components or subsystems of
the computer system. They can be hardware, such as the hard disk, or
software such as a process. There are a fixed number of objects in Add counters to
Windows 2000. Add Counters… view data in the
Save As… graph area
Properties…
• Instances.
Instances are multiples of the same object type. For example, if a
system has multiple processors, the Processor object type will have
multiple instances.
• Counters.
Counters gather data on different aspects of objects. For example, for
the Process object, counters gather data on the processor time and the
user time. Counters are built in to the operating system and
continually capture data, whether it is visible in System Monitor or
not. If an object type has multiple instances, counters track statistics
for each instance or the total of all instances.
030725 CIT A PC M aintenanc e.ppt 113 030725 CIT A PC M aintenanc e.ppt 114
Counters continually gather data on system performance, when 3. In the Performance object list, select an object to monitor.
you add counters, you just adding their displays in System
The objects that are available are based on the services and
Monitor. This allows you to monitor system performance. applications installed on the local computer. You can choose
several counters for each object. The following table describes core
To add counters in System Monitor, perform the following steps: objects in Windows 2000 System Monitor.
1. Click Start, point to Programs, point to Administrative Tools, 4. Click All counters or Select counters from list to choose
and then click Performance. individual counters.
When you start Performance for the first time, a blank System 5. If an object has instances, click All instances or Select instances
Monitor graph appears. from list to choose individual instances.
2. Right-click the System Monitor details pane, and then click Add 6. Click Add, and then click Close to close the Add Counters dialog
Counters. box.
030725 CIT A PC M aintenanc e.ppt 115 030725 CIT A PC M aintenanc e.ppt 116
View Counter Data View Counter Data
100
You can view the data of your counters in real time. Display this data in
80
Chart
three different ways:
60
40 • Histogram.
20
Report •Displays data in a bar chart. This view is useful for
\\PHOENIX simplifying graphs with multiple counters.
0 LogicalDisk _Total
Last 0.000 Average 1.993 Minimum % Disk Read Time 0.000
Max imum 15.000 Duration
% Disk Write Time 0.000
Memory • Report.
100 Available Bytes 38830080.000
•Displays numerical data in columns. This view is useful for
Histogram
80 Processor _Total
collecting data that you can export into a spreadsheet, such as
% Processor Time 16.162
60 Excel.
40
20 • Chart.
0 •Displays data in a line graph. This view is useful for
Last 16.162 Average 4.851 Minimum 0.000 monitoring real time data or data logged over time.
Max imum 31.000 Duration 1:40
030725 CIT A PC M aintenanc e.ppt 117 030725 CIT A PC M aintenanc e.ppt 118
• Change and customize display settings by right-clicking the • Optimize performance so that the operating system and
System Monitor details pane, and then clicking Properties. applications use system resources more efficiently. The
level of system performance that you consider acceptable
when your system is handling a typical workload and
running all required services is its baseline. The baseline
• Save performance data as an HTML file, and then open the performance is a subjective standard that the user or the
HTML file from Microsoft Internet Explorer or another administrator determines based on the typical level of
Web browser. You can also print the data from the browser. performance under typical workloads and usage. The
To save data as an HTML file, right-click the details pane baseline can be the measure used for setting performance
of System Monitor, and then type a file name for the HTML expectations of your system.
file.
030725 CIT A PC M aintenanc e.ppt 119 030725 CIT A PC M aintenanc e.ppt 120
Optimizing Performance The Performance Optimization Process
Take
Corrective Action
030725 CIT A PC M aintenanc e.ppt 121 030725 CIT A PC M aintenanc e.ppt 122
• The optimization process helps you to determine what •Analyzing Monitoring Data.
actions to take to improve system performance in response • Analyzing monitoring data consists of examining counter values that are
reported while the system is performing various operations. During this
to demands on the system. Performance optimization process one can determine:
begins with thoughtful and organized record keeping.
• Which processes are most active and which programs or threads
(if any) are monopolizing a resource.
• The performance optimization process includes the
following tasks:- • Whether the overuse of any hardware resource causes a decrease
in system performance.
• Analyzing Monitoring Data.
• Identifying areas of unacceptable performance • Whether there are residual effect of bottlenecks and other
• Taking corrective action. hardware resources that are underused. For example, if the system
starts to run slower and the hard disk activity increases, this could
indicate a hard drive problem or insufficient RAM to support the
applications and operating system.
030725 CIT A PC M aintenanc e.ppt 123 030725 CIT A PC M aintenanc e.ppt 124
The Performance Optimization Process Examining Memory Performance
• Identifying areas of unacceptable performance • Establish a Baseline Range for Normal Values to Help Identify
• As a result of this analysis, you may find that your system Trends and Problems
performs satisfactorily at some times and unsatisfactorily at others.
In general, deciding whether or not performance is acceptable is a
subjective judgment that varies significantly with variations in • Use Counters to Examine Memory
user environments. The values you establish as the baselines for Monitor Pages per second
your system are the best basis for comparison. In addition, be Monitor Available Bytes
aware that performance varies over time and your monitoring
needs to include different periods of system usage.
• Examine Page Files
Indicates low memory if frequent paging
• Taking corrective action.
• Depending on the causes of these variations and the degree of Check the paging file size
difference, you may choose to take corrective action or to accept Use counters to monitor the paging file size
these variations and postpone tuning or upgrading resources to a
later date. In some instances, the corrective action may not have
enough impact to make the change worthwhile.
030725 CIT A PC M aintenanc e.ppt 125 030725 CIT A PC M aintenanc e.ppt 126
030725 CIT A PC M aintenanc e.ppt 127 030725 CIT A PC M aintenanc e.ppt 128
Examining Memory Performance Examining Processor Performance
• Checking the Paging File Size • Use Counters to Examine Processor Performance
• To see if a paging file is approaching its upper limit, check the actual • Examine Usage Values for Workstations
file size and compare this value to the maximum paging file size setting High usage can indicate efficient handling
in System in Control Panel. If these two numbers are close in value,
consider increasing initial paging file size or running fewer programs. Additional data must be gathered
The paging file is located on the disk where you installed the OS - • Examine Usage Values for Servers
Windows 2000. To check the size of the paging file, view the file size
shown for Pagefile.sys in Windows Explorer. If disk space is adequate, High usage unacceptable
you can increase the size of the paging file. The recommended size for High usage can cause bottlenecks
the paging file is equivalent to 1.5 times the amount of RAM available
on your system.
030725 CIT A PC M aintenanc e.ppt 129 030725 CIT A PC M aintenanc e.ppt 130
When you examine processor performance, consider the role If you are monitoring a workstation that is running Windows
of the computer and the type of work being done. Depending 2000, high usage values can mean that the system is efficiently
on what the computer is doing, high processor values could handling a heavy workload. For example, if the computer is
mean that the system is efficiently handling a heavy workload, starting a new process, it may use 100 percent of the
or it could mean that it is struggling to keep up. However, if processor's time. Although this type of usage can slow the
more than a few processes are contending for the processor's performance of other applications on that computer, you need
time, installing a faster processor may improve throughput. to gather more data to determine whether the processor load is
keeping other work from being done. If so, you can change the
workload by moving the application to a different computer or
changing the current tasks that the computer performs.
030725 CIT A PC M aintenanc e.ppt 131 030725 CIT A PC M aintenanc e.ppt 132
Examining Processor Performance for Servers Examining Disk Performance
Processor values around 100 percent on a server that is • Monitor Both Physical Disk and Logical Disk Objects to
processing many client requests indicate that processes are Examine Performance
queuing up, waiting for processor time, and causing a
bottleneck. A bottleneck occurs when one subsystem is so • Use Counters to Examine Disk Activity and Determine:
overloaded with work that the other subsystems are not fully Percentage of unallocated disk space
utilized or are idle waiting for the overloaded subsystem to Size of I/O operations
complete a task. Such a sustained level of processor usage is Speed data moves
unacceptable for a server. Rates bytes transferred
Number of read and writes completed in a second
030725 CIT A PC M aintenanc e.ppt 133 030725 CIT A PC M aintenanc e.ppt 134
030725 CIT A PC M aintenanc e.ppt 135 030725 CIT A PC M aintenanc e.ppt 136
Various Third Party Performance Meters Overclocking
• WinBench • Overclocking can cause stability problem and overheat the
http://www.etestinglabs.com/benchmarks/winbench/winbenc chip.
h.asp • In some P4 motherboard such as the ASUS P4G8X and
• Iometer P4PE allow the user to adjust the CPU core voltage (25mV
http://sourceforge.net/projects/iometer/ increment) and clock frequency (100MHz – 200MHz at
• HDTach / CDTach / DVDTach 1MHz step). It also provide a fix frequency for PCI and
AGP bus
http://www.tcdlabs.com/hdtech.htm
http://www.asus.com/mb/socket478/p4g8x-d/overview.htm
• HWiNFO32
• The Pentium Pro, Celeron, and Pentium II/III, AMD K6
http://www.hwinfo.com
processors automatically determine their voltage settings
• A collection from acnc by controlling the motherboard-based voltage regulator.
http://www.acnc.com/benchmarks.html That's done through built-in voltage ID (VID) pins.
030725 CIT A PC M aintenanc e.ppt 137 030725 CIT A PC M aintenanc e.ppt 138
operating frequency of the processor core is exceeded. • Front side Bus North Bridge
Local Bus
528MBps @ 66MHz
AGP
• Since Pentium II, both AMD and Intel has been multiplier- • processor to chipset 32 e.g. AG P 2x
32bit /8 x 66 x 2 = 5 28MBps
bus
locked to avoid remarking. PCI Bus (33MHz / 66 MHz)
For AMD CPU, need soldering/bridging the clock pads to • Not affected by 32 / 64
8 / 16
030725 CIT A PC M aintenanc e.ppt 139 030725 CIT A PC M aintenanc e.ppt 140
Overclocking (cont.) Overclocking Software
• Free Intel Processor Frequency ID Utility is available at:- • Hmonitor can be used to monitor the thermal and fan speed
http://www.intel.com/support/processors/tools/frequencyid/index.h sensors on mainboard.
tm http://www.hmonitor.com
• Professionals do not recommend overlocking for obvious • WCPUID is a popular bench mark in the overclocking
reason that overclocking void the processor’s warranty and world.
can cause a stability problem. Recently, it seems that the http://www.h-oda.com
CPU companies is using this as a gimmick to push sales.
• The popular 3DMark
• You can try overclocking at your own risk. Please
http://www.futuremark.com/
remember to check the documentation of the motherboard
and processor to find the appropriate settings. • The popular WinBench and test reports is available at:-
http://www.etestinglabs.com/
• The Overclocking Database is available at:-
http://www.sysopt.com/ocdatabase.html • Free PC test tool
http://www.tufftest.com