|
Post by DEATH on Apr 30, 2004 7:45:57 GMT -5
Level 2, or L2 cache is basically just the mouth of the processor, determining how much data it can swallow at once.....well sorta. it's basically just a temporary storage on the processor for data as it's being processed. the amount of backside (L1 and L2...pentium IV architecture establishes a set L1 amount of cache, so L2 is the only variable) can drastically affect how fast your computer runs full-throttle.
|
|
|
Post by The Shadow on Apr 30, 2004 10:49:36 GMT -5
I was just looking at it because it has an insane amount of memory, burner, and good graphics card (the $500 mail-in doesn't hurt, either)...my mom has an E-machine that sucks...so-o-o-o slow-w-w-w-w...Hudson knows that, too. I'm just trying to find something afF**dable that can burn CDs and run my newer games (my old old OLD computer, that one that I thought had a serious error until you pointed out that the C: drive was just unplugged [I'm an idiot], can run the DOS stuff, like Doom II, (not III...I wish), Wolfenstein, Civ II, even AoE II...and one of my all-time favorites from the Gibbs DOS Supply Co., Ltd.: ABUSE. That one was so fun, even if the sound never did work. Took me a while to beat on hard, though. Whoa, I got sidetracked there. Anyway, I'm nowhere NEAR having a thousand bucks to blow on computers yet, and it's not going to happen this year. I'm going to get out of school in mid-June and go back in mid-July. That leaves me only three weeks to do anything, because one week will be taken up with the Wyoming trip with ACC. No job for me this summer. But hopefully next year I'll find time for one. I also need to get crackin' on my driver's license...haven't had time for that, either. One last thing about computers: HAVE YOU ALL SEEN THE NEW DELL (can't remember its name)? It got an awesome rating from CGW (sorry, don't have the magazine at hand...can't give you the details), and the laptop version lets you select finish jobs (any basic color, or stuff like flags, skulls, other designs) for a mere...four thousand dollars. Cheap, huh?
|
|
|
Post by The Shadow on Apr 30, 2004 10:51:08 GMT -5
Level 2, or L2 cache is basically just the mouth of the processor, determining how much data it can swallow at once.....well sorta. it's basically just a temporary storage on the processor for data as it's being processed. the amount of backside (L1 and L2...pentium IV architecture establishes a set L1 amount of cache, so L2 is the only variable) can drastically affect how fast your computer runs full-throttle. Ah. I see. So that's what that one screen from Warlords: Battlecry means when it says, "Filling Cache", right?
|
|
|
Post by DEATH on Apr 30, 2004 17:02:40 GMT -5
uh, probably not.
cache is a word that gets thrown around a lot with computers.
you have a cache on your video card, on your hard drive, your CD-ROM, essentially any and every peripheral.
what it's probably referring to is putting a set of game instructions into a pre-determined amount of system memory (RAM)....i.e. loading integer values, game commands, sprites, sounds, etc.
|
|
|
Post by The Shadow on Apr 30, 2004 17:28:23 GMT -5
Sure, but could you just let me sound smart for a minute or two?
|
|
|
Post by DEATH on May 1, 2004 23:47:35 GMT -5
oh okay.... now what were you telling me about the other day....hmmm..... oh yes! you were talking about how the Arithmetic Logic Unit of your Transistor-Transistor Logic, Pentium Family class 3, model 6 stepping 2-based central processor was such a freaking piece of crap and bottle necked your whole system, and oddly enough, detached it's own heatsink and managed to melt your Carbon Metallic Oxide Semi-conductors within the chip structure of your motherboard's main BIOS chip, which I thought was quite unusual. you then went into this mad rant containing several disconnect and unrelated advanced computer terms that made you sound INCREDIBLY computer-intelligent! qouting this astonishing outburst: "Networking switch gigahertz routing terrabyte point-to-point tunneling protocol Dynamic Host Configuration Protocal catagory 5 unshielded twisted pair cable vertically cross connected to a gigabit HDLC frame relay fiber-based backbone firewalling an implicit denial list on a ICMP echo flooded File Transfer Protocol!!!"
|
|
|
Post by The Shadow on May 1, 2004 23:55:52 GMT -5
LOL!!!!! That's more like it. I won't say anything more, for fear of marring my newly-found reputation as a certified computer GENIUS!!!
|
|
|
Post by DEATH on May 2, 2004 21:12:35 GMT -5
While we're on the topic of computers (and while sheldon remains a GENIUS), i thought i'd share the following. for those who use these boards interested in securing thier computer from hackers and other annoyances, the following is helpful. to fully understand exactly how bad it really is the world of cyber-security, you can either A. take an advanced computer networking class with a teacher who gets paid to consult with the likes of AT&T, Sprint and BellSouth about networking security (the guy really is a FREAKING GENIUS when it comes to networking...what he knows about hacking is scary!), or B. simply visit the following page from www.grc.com (an expert in web security) detailing a web attack attack of massive proportions that was staged against GRC, and how this GRC analyst actually infiltrated the hacker underground to learn more about the nature of the beast. a long read, but DEFINITELY worth it if you got the time, and shows you a small glimpse of both the world of cybercrimals that the average user is totally oblivious to, and also shows you a little bit about why i've come to hate microsoft so much. the first few paragraphs may be a bit over your head, but keep reading....most of it is easy enough for about anyone to grasp. GRC has plenty of pages on explaining the terms associated with web security, as well. here is the URL: www.grc.com/dos/grcdos.htmclick on the HOME link at the bottom of the page to go back to the main page. here is a link to the GRC security tests to show you how vunerable (or in the case of the computer in my room, INVUNERABLE ;D) your system is to attacks. my Win. ME system in my room, currently firewalled by Sygate Personal Firewall (which is FREE) passed every test as completely port-stealthed from the world outside of my bedroom, which means essentially that when someone decides to attempt to hack me using my IP, it appears as no computer is here. i've even considered getting software to 'spoof' or fake my IP, which would completely seal me....but then again, it's more entertaining watching confused hackers port scan me multiple times (which is a federal offense) attempting to comprehend why there isn't a live computer attached to the live IP, lol. anyways, here's the link...it should work. if not, just go to the main GRC page and click on the Shields UP! link under the 'HOT SPOTS' section. grc.com/x/ne.dll?bh0bkyd2And lastly, for those wanting to secure themselves, check out the Sygate Personal Firewall over at www.download.com/ . For those of you too lazy to do the search for it, here's the specific page: download.com.com/3000-2092-10247416.html?tag=lst-0-1make sure to read the help files included with it before you go crazy firewalling yourself. reading up on how firewalls work in general would help. if you get too confused just send me a message, or reply on here. DON'T set it up ignorantly though, you can SERIOUSLY mess up your computer in regards to connecting to the 'net and networking in general. don't worry, it's only dangerous in the hands of an idiot! I'M FIRED
|
|
|
Post by DEATH on May 2, 2004 22:26:55 GMT -5
Here's some Sygate screen shots from my computer tonight. The Attack Log Screen. Yep, all those from a few hours of browsing in one day. Now, mind you, the 204.1.226.228 Port Scans are from the GRC testing service, which is routed through Verio, their ISP. www.IMGSpot.com/uploads/Log Screen Shot.jpg[/img] A BackTrace of one of the Port Scans in progress. This can take 30 seconds to 5 minutes or more, depending on how quickly you react to the Port Scan (Sygate pops a little window up to alert you), and how many routers they had to hop to get to you, that you must now hop back through. And finally, getting the target information on the IP. After clicking the Whois button on the BackTrace window, Sygate uses various services and public indexes to determine as much as possible. Almost always you can get their ISP and state. if you're quick you can usually get their town and street address. If you're lucky, you can get their phone number and more.... ;D. The Whois displayed in the window is of Verio, GRC's ISP, and if you could scroll down, you'd see I was even able to get their fax and office number, lol! All of it's perfectly legal too, since they attacked you and all, and since you're using public services to gather information, instead of stealing it. Very cool!
|
|
|
Post by The Shadow on May 4, 2004 10:17:13 GMT -5
Of course, the only remaining question is...what was the Untitled Paint document?!?
|
|
|
Post by DEATH on May 4, 2004 15:51:51 GMT -5
the paint document was what i was pasting the screen shots (generated by the Print Screen button) into and then saving as JPGs so you could all see them.
|
|
|
Post by The Shadow on May 4, 2004 17:49:10 GMT -5
Ah, I see. That's pretty freaking cool! Can we send him letter bombs now? ;D
|
|
|
Post by ActsOfStupidity on May 9, 2004 16:00:47 GMT -5
cake, I love cake...
|
|
|
Post by The Shadow on May 11, 2004 8:11:53 GMT -5
|
|
|
Post by DEATH on Jun 15, 2004 9:02:47 GMT -5
now when you say cakes and pies, do you mean cakes and pies ingested through the eye socket? because i can certainly assist you in delivering cakes and pies through your eye sockets!
|
|