Solved

Overclocking

Posted on 1999-01-25
3
260 Views
Last Modified: 2010-04-27
I have p233MMX and I would like to know of the different ways in which I could overclock it and what would be the maximum speed it could possibly run at.
0
Comment
Question by:rkoshy
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 9

Accepted Solution

by:
rmarotta earned 100 total points
ID: 1138191
rkoshy,
You should find all the information you need here:

http://www.tomshardware.com/guides/cpu/index.html

Let me know if you need more.

Regards,
Ralph
0
 
LVL 3

Expert Comment

by:Diplomat
ID: 1138192
Rkoshy,

In general, there is only one way to overclock the Pentium processor by changing the jumper settings on the System Board.

Microprocessors manufacturers (Intel, AMD, Cyrix, IBM, etc..) always leave a safety margin above the maximum CPU speed. There is no strict rule regarding that margin, but I believe it is around 10%. Therefore hopefully your 233MHZ could be overclocked to 266MHZ but I doubt if you can make it work at 300 MHZ.

The Diplomat
0
 
LVL 9

Expert Comment

by:rmarotta
ID: 1138193
Hmmmmmm,
I'm running a Celeron 300A at 504MHz without problems.........
0

Featured Post

Instantly Create Instructional Tutorials

Contextual Guidance at the moment of need helps your employees adopt to new software or processes instantly. Boost knowledge retention and employee engagement step-by-step with one easy solution.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

this article is a guided solution for most of the common server issues in server hardware tasks we are facing in our routine job works. the topics in the following article covered are, 1) dell hardware raidlevel (Perc) 2) adding HDD 3) how t…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
How to Install VMware Tools in Red Hat Enterprise Linux 6.4 (RHEL 6.4) Step-by-Step Tutorial
This video shows how to use Hyena, from SystemTools Software, to update 100 user accounts from an external text file. View in 1080p for best video quality.

738 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question