Trust can you run it




















Zekiran View Profile View Posts. It's a good 'general' idea, yeah. For any specific needs, like "will this particular card beat out another particular card" there are better places to look.

Naedmi View Profile View Posts. I was told a couple of years ago that the exe version you download to automatically scan your specs is now riddled with advertising malware.

The site in general will give you an idea if you can run a game or not, but there are instances where it will tell you that you can run a game you won't be able to run or it'll tell you that you can't run a game that you can run now. I would personally take it with a grain of salt nowadays. I have an excellent suggestion. Spend some time learning how to read your particular PC specs. The specifications listed in minimum and recommended are actually just ballpark guesses, as they try to encompass as many machine types as possible.

Treacherous computing becomes a paradise for corruption. Word processors such as Microsoft Word could use treacherous computing when they save your documents, to make sure no competing word processors can read them. Today we must figure out the secrets of Word format by laborious experiments in order to make free word processors read Word documents. If Word encrypts documents using treacherous computing when saving them, the free software community won't have a chance of developing software to read them—and if we could, such programs might even be forbidden by the Digital Millennium Copyright Act.

Programs that use treacherous computing will continually download new authorization rules through the Internet, and impose those rules automatically on your work.

If Microsoft, or the US government, does not like what you said in a document you wrote, they could post new instructions telling all computers to refuse to let anyone read that document. Each computer would obey when it downloads the new instructions. Your writing would be subject to style retroactive erasure. You might be unable to read it yourself. You might think you can find out what nasty things a treacherous-computing application does, study how painful they are, and decide whether to accept them.

Even if you can find this out, it would be foolish to accept the deal, but you can't even expect the deal to stand still. Once you come to depend on using the program, you are hooked and they know it; then they can change the deal. Some applications will automatically download upgrades that will do something different—and they won't give you a choice about whether to upgrade.

Today you can avoid being restricted by proprietary software by not using it. If a free program has a malicious feature, other developers in the community will take it out, and you can use the corrected version.

You can also run free application programs and tools on nonfree operating systems; this falls short of fully giving you freedom, but many users do it. Treacherous computing puts the existence of free operating systems and free applications at risk, because you may not be able to run them at all.

Some versions of treacherous computing would require the operating system to be specifically authorized by a particular company. Free operating systems could not be installed. Some versions of treacherous computing would require every program to be specifically authorized by the operating system developer. You could not run free applications on such a system.

If you did figure out how, and told someone, that could be a crime. There are proposals already for US laws that would require all computers to support treacherous computing, and to prohibit connecting old computers to the Internet. But even if they don't legally force you to switch to treacherous computing, the pressure to accept it may be enormous.

If only a treacherous-computing machine can read the latest Word documents, many people will switch to it, if they view the situation only in terms of individual action take it or leave it.

To oppose treacherous computing, we must join together and confront the situation as a collective choice. To block treacherous computing will require large numbers of citizens to organize.

We need your help! The GNU Project distributes the GNU Privacy Guard, a program that implements public-key encryption and digital signatures, which you can use to send secure and private email. I run it perfectly fine. Don't trust it. Kikazaru View Profile View Posts. Yougamers by futuremark was a more reliable site to see if your computer can run a game, but unfortunately the website has been shutdown.

Though, they'll move the "game-o-meter" benchmark to their main website later this year. I used to trust "Can you run it" but that was with an old PC. When I started custom builds it never got it right. It was constantly telling me I lacked in something and when I looked at it, it either didn't have some information from my PC or it read it wrong.

Sometimes I played the very game it said I couldn't play and I would turn up the graphics as high as they would go and my PC worked just fine. Ultimately it's just a waste of time. Trespasser07 View Profile View Posts. Not dependable. So i googled the comparison, and no contest.

Intel i5 beats the crap out of the Phenom II on every front. So my question to Can you run It is: who makes your determinations? Originally posted by Trespasser07 :.

Originally posted by Darkangel98s :.



0コメント

  • 1000 / 1000