Solved

asus V9180SE

Posted on 2006-11-04
2
3,040 Views
Last Modified: 2012-06-27
give me a link to download asus V9180SE drivers
0
Comment
Question by:ammadeyy
2 Comments
 
LVL 13

Expert Comment

by:wlennon
ID: 17873698
I think you will find all the downloads and updates here:

http://support.asus.com/download/download.aspx?SLanguage=en-us
0
 
LVL 26

Accepted Solution

by:
PCBONEZ earned 250 total points
ID: 17873964
Newest Versions:

XP 64 bit (beta) -- Version  71.84  2005/06/01 update  --  File Size  33.06 (MBytes)
ftp://dlsvr03.asus.com/pub/ASUS/vga/nVidia/Ref_Drv/nv7184_wxp64.zip

Win2000/XP -- Version  81.89  2005/11/18  -- File Size  43.76 (MBytes)  
ftp://dlsvr03.asus.com/pub/ASUS/vga/nVidia/Released_Drv/nv8189_w2kxp.zip

Win98/ME -- Version  52.16  2003/11/09  --   File Size  18.33 (MBytes)  
ftp://dlsvr03.asus.com/pub/ASUS/vga/nVidia/Released_Drv/Win9xME5216.zip

I'm gonna feel real silly if the links don't work.....
.
0

Featured Post

Simplifying Server Workload Migrations

This use case outlines the migration challenges that organizations face and how the Acronis AnyData Engine supports physical-to-physical (P2P), physical-to-virtual (P2V), virtual to physical (V2P), and cross-virtual (V2V) migration scenarios to address these challenges.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Does a test card exist for a randomly rebooting PC 14 84
new laptop new users 8 67
Uniden UDW20055 3 70
Autocad laptop 9 31
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This article outlines why you need to choose a backup solution that protects your entire environment – including your VMware ESXi and Microsoft Hyper-V virtualization hosts – not just your virtual machines.
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

735 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question