My e-Machines desktop


 
Thread Tools Search this Thread
Operating Systems Linux My e-Machines desktop
# 1  
Old 01-27-2004
My e-Machines desktop

processor : 0
vendor_id : GenuineIntel
cpu family : 15
model : 2
model name : Intel(R) Celeron(R) CPU 2.20GHz
stepping : 7
cpu MHz : 2192.913
cache size : 8 KB
fdiv_bug : no
hlt_bug : no
f00f_bug : no
coma_bug : no
fpu : yes
fpu_exception : yes
cpuid level : 2
wp : yes
flags : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge
mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm
bogomips : 4377.80
# 2  
Old 01-27-2004
So what's the question? Smilie
# 3  
Old 01-27-2004
WHOOPS! I meant to post it in the " Post Your /proc/cpuinfo here!"
Login or Register to Ask a Question

Previous Thread | Next Thread

8 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

Connection between 2 machines via shell

Friends like I do the following To have a machine where I have a shell, which when run should go to a B machine which should take a few files and apply awk several validations and if that is correct execute a Procedure which is in machine B, it is possible to do that? (1 Reply)
Discussion started by: tricampeon81
1 Replies

2. Ubuntu

Ping between two virtual machines

Hello, I installed two virtual machines ubuntu10 on VM VirtualBox . Please, what are the steps to make a ping from one of these two machines on the other (the configurations )? Thank you. (4 Replies)
Discussion started by: chercheur111
4 Replies

3. Shell Programming and Scripting

rcp on IBM machines

Hi does anybody know if "rcp" command has an IBM version, similar to "ping" which is "dping" on IBM. Thanks -A (1 Reply)
Discussion started by: aoussenko
1 Replies

4. Red Hat

Change root on 80 machines

I have inherited an 80 machine cluster and need to change root on all of them. :confused: Any ideas on an automated way to do that? ---------- Post updated at 11:29 AM ---------- Previous update was at 11:15 AM ---------- Assuming a stronger password, would this be a reasonable method for... (4 Replies)
Discussion started by: rd42
4 Replies

5. Cybersecurity

How were UNIX machines taken over by SPAMMERS?

Hello, Three of our machines at work were sending out SPAM on the internet. 2 of them were so old I knew that the hackers just exploited the vulnerabilities in the old systems. The cause of concern is that one one of the machines is a new Centos 5.3 box.The only proof we have is that 4-6 emails... (3 Replies)
Discussion started by: mojoman
3 Replies

6. Shell Programming and Scripting

Allow only particular machines to access

Hi! I have a need to allow only certain IP addresses to access a machine running Red Hat Linux. I am not sure how this can be accomplished. Thanks in advance for your help. nua7 (2 Replies)
Discussion started by: nua7
2 Replies

7. AIX

Booting RS/6000 machines from CD

I'm new to the AIX/RS6000 world - Trying to do an fresh Install of 5.2 on an 43P Model 140 RS/6000 machine. The book said hit F5 on boot up to boot to CD, but F5 only brings up Diagnostic mode. I changed the boot order to boot 1. Floppy 2. CD 3. HD 4. Network still no Dice Anything I'm... (1 Reply)
Discussion started by: almuwatta
1 Replies

8. UNIX for Dummies Questions & Answers

switching between machines

I work for a local authority, and have been asked to extend a project I recently worked on currently there are two (2) menus in operation each menu allows us to allow or deny access to users the problem the menus are on seperate machines (Iwant to make these menus sub menus) I want to... (1 Reply)
Discussion started by: w33man
1 Replies
Login or Register to Ask a Question