Well we are quite hardcore gamers.Many people like us are.And we all know the budget it takes to become one hard core gamer.Its huge.But this post is for people who can compromise just a little in their gaming standards for budget.
If you are aware of graphic cards of n-vidia you would be aware of 9400gt.
It is a low budget graphic card which is disregarded evrywhere.But let me tell you I have one and I m ,in fact quite satisfied the way it handles all the latest games despite of being regarded as a card suited only for movies.
My PC specs are-:
Intel Core 2 Duo E6700 2.40 GHz
2GB DDR2 RAM
9400GT(overclocked using EVGA Precision)
Here is the list of games that I was able to play successfully using a 9400GT.
1)Batman Arkham Asylum:
Resolution-:1280X1024
Graphics Detail-:High(No ambient occlusion)
Avg fps:25
2)Protoype:
Resolution-:1152X764
Graphics Detail-:High
Shadow -:High
Anti-aliasing-:2x
Avg. fps:25
3)Assassin's Creed
Resolution-:1280x1024
Everything MAXED OUT!!!(except anti-aliasing)
Avg. fps:24
4)Velvet Assassin
Resolution-:1152x764
Graphics Detail-:Medium
No Anti-aliasing
Avg fps:22
5)Call Of Duty Modern Warfare 2
Resolution-:1152x764
Everything MAXED OUT Except Anti-Aliasing
Avg fps:27
6)Bioshock
Resolution-:1152x764
Everything MAXED OUT!!(No AA)
Avg fps:23
7)Dead Space
Resolution-:1280x1024
Everything MAXED OUT!!
Avg fps:30
8)Fallout 3
Resolution-:1024x768
Graphics Detail:High
Avg fps:23
And many more.....
And yes I will keep updating this post!
Cheers
Legal Disclaimer
In any blog that deals with so many controversial topics and skills, it has become necessary to address a few incidents and implement a user terms and services agreement. We want to provide a free, safe and legal training environment to the users of this blog.
Computervedas is definitely not a place that promotes or encourages computer hacking (unethical), but rather it is a Computer Security related website. In fact, Computer Hacking and Computer Security are the two concepts that goes hand-in-hand. They are like the two faces of the same coin. So with the existence of close proximity between Hacking and Security, it is more likely that people often mistake our blog to be one that promotes Hacking. But in reality, our goal is to prevent hacking. We believe that unless you know how to hack (ethically), you cannot defend yourself from malicious hack attacks.
Your usage of this website constitutes your agreement to the following terms.
1. All the information provided on this blog are for educational purposes only. The blog is no way responsible for any misuse of the information.
2. This blog is totally meant for providing information on “Computer Security” “Computer Programming” and other related topics and is no way related towards the terms “CRACKING” or “HACKING” (Unethical).
3. Few articles (posts) on this blog may contain the information related to “Hacking Passwords” or “Hacking Email Accounts” (Or Similar terms). These are not the GUIDES of Hacking. They only provide information about the legal ways of retrieving the passwords. You shall not misuse the information to gain unauthorised access. However you may try out these hacks on your own computer at your own risk. Performing hack attempts (without permission) on computers that you do not own is illegal.
4.The virus creation section on this blog provides demonstration on coding simple viruses using high level programming languages. These viruses are simple ones and cause no serious damage to the computer. However we strongly insist that these information shall only be used to expand programming knowledge and not for causing malicious attacks.
5. All the information on this blog are meant for developing Hacker Defense attitude among the users and help preventing the hack attacks.We insist that these information shall not be used for causing any kind of damage directly or indirectly. However you may try these codes on your own computer at your own risk.
6. The word “Hack” or “Hacking” that is used on this blog shall be regarded as “Ethical Hack” or “Ethical Hacking” respectively.
7. We believe only in White Hat Hacking. On the other hand we condemn Black Hat Hacking.
8. Most of the information provided on this blog are simple computer tricks (may be called by the name hacks) and are no way related to the term hacking.
9. Some of the tricks provided by us may no longer work due to fixture in the bugs that enabled the exploits. We are not responsible for any direct or indirect damage caused due to the usage of the hacks provided on this site.
10. The blog holds no responsibility for the contents found in user comments and forum since we do not monitor them. However we may remove any sensitive information present in the user comments or on the forum upon request.
11. We reserve the right to modify the Disclaimer at any time without notice.
12.We believe that hacking is an art and one can put it to good use.Know Hacking but No Hacking!
Followers
USEFUL INFO
Labels
- About Us (1)
- Advanced Hacking (4)
- C++ (1)
- Gaming (1)
- Graphic Cards (1)
- Hardware (2)
- Miscellaneous (1)
- Simple Viruses (1)
- Windows 7 (3)
- Windows Xp (1)
- Windows Xp Hacks (5)
6 comments:
- Henry J said...
-
very nice info. keep itup.
Visit 10 websites and earn 5$. Click here to see the Proof - Unknown said...
-
What a amazing blog For all and beginners and this is very informative post for all who want
Remote Technicaly support - Unknown said...
-
Our aim is to train you on Latest Technology. Our trainings are specialy desIgned to comply with industry needs..........Mobile Repairing Institute in Delhi & Laptop Repairing Centre in Delhi
-
Excellent post with information. Love your blog.
-
Lovely post with information sir. Mobile Repairing Course in Delhi
-
This is good site and nice point of view.I learnt lots of useful information.Tablet Repairing Course in Delhi