Solved

How to list all the hardware of a PC ?

Posted on 2004-10-07
5
287 Views
Last Modified: 2010-04-26
Hi all,

I'm currently looking for a soft (free if possible) to list all the components of a PC : HD size, RAM size, ...

I would like this soft generates a report which can be emailed or printed.

TIA
0
Comment
Question by:Richard Coffre
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
5 Comments
 
LVL 57

Accepted Solution

by:
Pete Long earned 500 total points
ID: 12246841
Find Out System Information

Everest Home Edition
http://www.lavalys.com/download.php?dlid=1

Belarc Advisor
http://www.belarc.com/free_download.html

SiSoft Sandra
http://www.sisoftware.net/

WCPUID (CPU memory an motherboard info)
http://www.webattack.com/get/wcpuid.shtml

OR If you are getting messed about give this a try (I've not used it though)
http://www.halfdone.com/Development/UnknownDevices/

0
 
LVL 57

Expert Comment

by:Pete Long
ID: 12246842
belarc produces a report in HTML :)

Pete
0
 
LVL 15

Expert Comment

by:mcp_jon
ID: 12246864
Try out AIDA32 Enterprise Edition, it's free and very, very Powerfull !!

Here's the link " http://www.webattack.com/get/aida32.shtml "

Best Regards !
0
 
LVL 7

Expert Comment

by:philby11
ID: 12247040
Sorry to say Aida32 is no more, it's now everest home edition.
0
 
LVL 57

Expert Comment

by:Pete Long
ID: 12248372
:) ThanQ
0

Featured Post

Online Training Solution

Drastically shorten your training time with WalkMe's advanced online training solution that Guides your trainees to action. Forget about retraining and skyrocket knowledge retention rates.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this article you will get to know about pros and cons of storage drives HDD, SSD and SSHD.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …

691 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question