How to Use Pen Drive As RAM
For XP
Insert your pen-drive. Let your PC read it.(Minimum 2 GB)
Right click on My Computer.
Click on Properties from context menu.
Click on Advanced tab.
Click on Settings under Performance.
Click on Advanced tab.
Click on Change button under Virtual memory.
Select your USB drive.
Click on custom size radio button and give the values as follows;
Initial Size:1020
Maximum size:1020
The size depends upon your free memory capacity of your pen drive. So you can change this limit according to your pen drive size.
Click on Set button, then click on OK.
Now you have to restart the computer. The speed of your computer will be increase
For Windows 7
Plug in your pendrive-> Format with NTFS or FAT32
Now go to properties->Select ReadyBoost
Check Use this device->Choose maximum space to reserve system speed
Click on Apply and OK. Your readyboost PenDrive is ready Now to Use.
Here is an personal suggestion HP and Sandisk is the Best for this work so what are you waiting for.
Related Posts:
Hack Windows 8 Java vulnerability
Java signed applet Hack Windows 8 Java vulnerability
In this tutorial we will look at how difficult it can be to hack modern
operating systems.
Hack any Window… Read More
Add new exploits to Metasploit from Exploit-db
Exploit-db
As usual, a few official words from the developers before I express my personal views.
The Exploit Database
is the ultimate archive of public exploits and corresponding vulnerable
software, developed for u… Read More
Tor in Kali Linux
Installing Tor in Kali Linux
What is Tor?
Tor is free software and an open network that helps you defend
against traffic analysis, a form of network surveillance that threatens
personal… Read More
exploiting windows7 using kali linux
How to Hack Windows 7 Using Metasploit In Kali Linux Tutorial
1). Start Backtrack2). Type "Startx" To enter GUI mode of Backtrack.3). Go To terminal4). Type "msfconsole"In Victim Machine1). Start the victim M… Read More
Hack facebook , gmail with Social Engineering Toolkit
Social Engineering Toolkit
Humans are the weakest link in any security system ~Shashwat (That'll be me)
Social engineering toolkit does not exploit vulnerability in the
mechanism of any service. It exploits the weakness … Read More
0 comments:
Post a Comment