pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

Technical guide to the Intel Penryn Core 2 Processor

Technical guide to the Intel Penryn Core 2 Processor

The Penryn CPU is another in Intel's line of Core 2 processors and the first fabricated using its 45nm die technology. The processors replace the 'Merom' range of processors, the and dual- and quad-core versions catering for the differing requirements of consumer machines. The Penryn is … [Read more...]

Filed Under: Intel Core CPUs Tagged With: Core 2, CPU, Intel, Penryn, processor

Guide to the Intel Core 2 Quad and Extreme processors

Guide to the Intel Core 2 Quad and Extreme processors

In November 2006 Intel released the first in their range of Intel Core 2 Quad processors. Codenamed the 'Kentsfield', the newly released processors were two Core 2 Duo chips connected by a 1066 MHz FSB all continued on one multi-chip module. The series number for the more powerful Core 2 … [Read more...]

Filed Under: Intel Core CPUs Tagged With: Core 2, CPU, Extreme, Intel, processor, Quad

Intel Mobile Pentium II technology guide

The natural progression of the low-power Deschutes family of Pentium II processors to the portable PC market took place with the launch of the Mobile Pentium II range in April 1998. The new processor, and its companion Mobile 440BX chipset, … [Read more...]

Filed Under: CPU Technology Tagged With: CPU, Intel, mobile computers, Pentium II


Eliminating Common WordPress Vulnerabilities to DDoS Attacks

Distributed Denial of Service (DDoS) attacks are serious threats that every website manager must be prepared for. Unfortunately, some of the most … [Read More...]

Securing Your Privacy Against Deep Packet Inspections

Network administrators, cybersecurity analysts and watchdogs use a variety of different tools to monitor Internet traffic. Deep packet inspection is … [Read More...]

Identifying and Protecting Against the Most Dangerous Keyloggers

Keyloggers are among the most frightening tools in the hands of a skilled hacker. They are malicious devices or malware applications that enable … [Read More...]

Excel Shortcuts for More Complicated Commands

We previously wrote an article on the benefits of using keyboard shortcuts in Excel. The shortcuts we focused on were used for simple formatting … [Read More...]

CleanTalk as Your Weapon against Spam

CleanTalk as Your Weapon against Spam

Are you tired of spam? You aren't alone. It has become a massive epidemic over the past few years. Around 14.5 billion spam messages are sent every … [Read More...]

VPN in 2019: Shortcut to Prevent Data Theft and Monitoring

VPN in 2019: Shortcut to Prevent Data Theft and Monitoring

Not all people are in the know about the beneficial functions of Virtual Private Networks. Some users install them to unblock torrenting sites, for … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

Monitor Ergonomics

Whilst the quality of the monitor and graphics card, and in particular, the refresh rate at which the combination can … [Read More...]

Inkjet Color Perception

Visible light falls between 380nm (violet) and 780nm (red) on the electromagnetic spectrum, sandwiched between ultraviolet … [Read More...]

CMOS – complementary metal oxide silicon – RAM chips on motherboards

Motherboards also include a separate block of memory made from very low power consumption CMOS (complementary metal oxide silicon) RAM chips, … [Read More...]

Return to top of page

Copyright © 2019 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors