Doesn't Anyone know?

david8115

Distinguished
Mar 8, 2009
119
0
18,680
This motherboard: Gigabyte Ep45-UD3L, on newegg says it's 2.0, there's a tigerdirectblog that says it's 2.0, on the board it, look like just x16, and on the board it says x16. Will this have the same performance as a regular 2.0 board,
On the Gigabyte website, it says it is a x16 conformed to a 2.0 standard, so what does exactly mean?
Also, will this have any problems running a Gtx 260 c216, or i'll have a better luck, choosing some other mobos?
 
Don't worry about the PCIe 1.x and PCIe 2.0 standards. You won't notice the difference. You won't have a problem with the GTX260 as PCIe 2.0 is backward compatible. You won't loose or gain performance by going PCIe 2.0 or PCIe 1.x.

And finally, P45-UD3L is PCIe 2.0.

Note: If getting any current EP45/or "E" series boards, DO NOT INSTALL DES software.
 

Brandon00000

Distinguished
Apr 3, 2009
37
0
18,530


the 260 275 285 and the 295 can all run on just a X16 slot you just wont get as good performance go with the p5n-d it is only like 130.00 and you can sli later with it getting a motherboard that does not support 2.0 and putting a 260 on it would not make much sense however it will work
 

david8115

Distinguished
Mar 8, 2009
119
0
18,680


What is DES software?
 

Brandon00000

Distinguished
Apr 3, 2009
37
0
18,530



des is cryptology i dont know what he is talking about however i do know it is cryptology software
 

Brandon00000

Distinguished
Apr 3, 2009
37
0
18,530
Symmetric ciphers are significantly faster than asymmetric ciphers, but the requirements for key exchange make them difficult to use.

In an asymmetric cipher, the encryption key and the decryption keys are separate. In an asymmetric system, each person has two keys. One key, the public key, is shared publicly. The second key, the private key, should never be shared with anyone.

When you send a message using asymmetric cryptography, you encrypt the message using the recipients public key. The recipient then decrypts the message using his private key. That is why the system is called asymmetric.

Because asymmetric ciphers tend to be significantly more computationally intensive, they are usually used in combination with symmetric ciphers to implement effect public key cryptography. The asymmetric cipher is used to encrypt a session key and the encrypted session key is then used to encrypt the actual message. This gives the key-exchange benefits of asymmetric ciphers with the speed of symmetric ciphers