Skip to main content

Maximum RAM that your OS can support :

Windows 8 64 bit Enterprise,Prof
essional : 512 GB
Windows 8 64 bit :128 GB
Windows 8 32 bit : 4 GB
Windows 7 64 bit Ultimate, Enterprise
& Professional :192 GB Windows 7 64
bit Home Premium:16 GB
Windows 7 64 bit Home Basic : 8 GB
Windows 7 32 bit (all editions except
Starter) :4 GB
Windows 7 32 bit Starter : 2 GB
Windows Vista 64 bit Ultimate,
Enterprise & Business: 128 GB
Windows Vista 64 bit Home
Premium :16GB
Windows Vista 64 bit Home Basic :
8GB
Windows Vista 32 bit (all editions
except Starter) : 4 GB
Windows 7 32 bit Starter :1 GB
Windows XP 64 bit : 128 GB
Windows XP 32 bit : 4 GB
Mac OS X 64 bit :96 GB
Linux 64 bit :1 TB
Linux 32 bit :4 GB
Linux 32 bit (with PAE) :64 GB

Comments

Popular posts from this blog

Physical Teleportation Theoretical method to do It!

Teleportation is the ability of moving matter from one point in time and space to another point in time and space instantaneously. There are different types of teleportation available at this time both visual and physical teleportation are possible and we use visual teleportation as our starting point. Types Visual body teleportation Astral body teleportation The different types of visual teleportation are. visual body or astral body teleportation , or visual object teleportation but before we can master teleportation we must first learn the art of Telekinesis/Psychokinesis and Clairsentience and the higher state of consciousness the seventh sense. Other abilities useful in teleportation are Tele-Visualization and ESP (Extrasensory Perception). The ability of teleportation is used in Time travel, Interstellar travel, and Dimensional travel. Teleportation is the near instantaneous transport of the Psychic from one location to another and there is no other fo...

Man in the middle attack

Man-in-the-Middle Attack ————————————— Man-In-The-Middle attack is the type of attack where attackers intrude into an existing connection to intercept the exchanged data and inject false information. It involves eavesdropping on a connection, intruding into a connection, intercepting messages, and selectively modifying data. DEFINITION : —————— The term "Man-in-the-middle attack" (MITM attack) refers to the type of attack where the attacker intrudes into the communication between the endpoints on a network to inject false information and intercept the data transferred between them. MITM attack is also known as: ————————————— Bucket-brigade attack —————————— Fire brigade attack —————————...

Professional Tips ON How To Be A Great Guitar Player

Professional Tips ON How To Be  A Great Guitar Player Everyone has their favourite and everyone loves their favourite for a different reason. When I was 13 I didn't play guitar, but my favourite guitar player was Slash  from  GN'R . Why? because he looked like the best guitar player in the world, he wore cool clothes, played his guitar in a cool way, wore a cool hat and was in a cool band. When I learned to play guitar I found and affection for playing blues music and then  Stevie Ray Vaughn became my favourite guitarist. I liked him the best because he could play fast, sound soulful and wore a cool hat. Everyone likes their heroes for different reasons, so what makes a great player great? I mean  Eric Clapton  is considered to be a great and so is Randy Rhoads , but they have distincly different styles, so what makes us consider them both to be greats? I have attempted to compile a list of criteria that guitarists fit to be a great. Some fit into mor...