Feeds

Dr Tom overclocks T'birds, Durons and Athlons

AMD can lock its multipliers all it likes

  • alert
  • submit to reddit

As usual, we do the legwork around the land where the ware is hard so you don't have to.

Tom has found a way of overclocking the socket processors from AMD. Go here to find out the right settings for the copper bridges. The good doctor says that these techniques will work for any motherboard. Tweaktown has also posted a similar article here so check that out too.

So, go ahead, lock (or sort of lock) those multipliers AMD, it doesn't stop this lot!

As well as that, good news for CeleryII owners. HardOCP has posted an article detailing how to boost your voltage from 1.65 to 1.8. They guys reckon this will work on just about any mainboard with adjustable voltage for the CPU.

Meanwhile, Arstechnica has been thinking about RAM. This piece gives a thorough background to the subject - which lets face it, is more complicated than it used to be. I mean, do you know the difference between CAS 2 and CAS 3? You will by the end of the article.

You know, this always happens. You forget to bookmark a site in a fit of "I have too many things on my favourites list, I'll remember this one", and then realise the amount of good stuff that has been going on there while you've been gone. Anandtech has loads of good stuff, but the latest is a clued up buyers guide to the GeForce2 GTS cards out there. ®

Related stories

Hardware Roundups

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.