How to Use Pen Drive As RAM
For XP
Insert your pen-drive. Let your PC read it.(Minimum 2 GB)
Right click on My Computer.
Click on Properties from context menu.
Click on Advanced tab.
Click on Settings under Performance.
Click on Advanced tab.
Click on Change button under Virtual memory.
Select your USB drive.
Click on custom size radio button and give the values as follows;
Initial Size:1020
Maximum size:1020
The size depends upon your free memory capacity of your pen drive. So you can change this limit according to your pen drive size.
Click on Set button, then click on OK.
Now you have to restart the computer. The speed of your computer will be increase
For Windows 7
Plug in your pendrive-> Format with NTFS or FAT32
Now go to properties->Select ReadyBoost
Check Use this device->Choose maximum space to reserve system speed
Click on Apply and OK. Your readyboost PenDrive is ready Now to Use.
Here is an personal suggestion HP and Sandisk is the Best for this work so what are you waiting for.
Related Posts:
Exploiting OpenSSL-Heartbleed
Detecting OpenSSL-Heartbleed with Nmap & Exploiting with Metasploit
You can now quickly detect the
OpenSSL-Heartbleed vulnerability very quickly on a network using the
ever popular nmap command, and with the lat… Read More
Heartbleed Vulnerability exploitation
Hi HACKERS,
In recent weeks, the Heartbleed vulnerability of OpenSSL has been dominating the information security headlines. This vulnerability enables an attacker to extract data from the server's memory that ma… Read More
Nmap Commands
Top 30 Nmap Command Examples For Sys/Network Admins
Nmap
is short for Network Mapper. It is an open source security tool for
network exploration, security scanning and auditing. However, nmap
command comes with lots of… Read More
Introduction To Armitage in Kali
Introduction To Armitage in Kali Armitage is a graphical cyber attack management tool for the Metasploit Project that visualizes targets and recommends exploits
… Read More
Metasploit Browser Autopwn
Metasploit Browser Autopwn
In nowadays due to firewall restrictions and patch management
policies exploitation of systems has become much more difficult.However
one of the most efficient way is the use of client-si… Read More
0 comments:
Post a Comment