Reading Hard Drive Manufacturing Information

Primary Controller - Master drive Drive Model Number________________: Maxtor 87000D8 Drive Serial Number_______________: F80AMMEA Drive Controller Revision Number__: TAVX3222 Controller Buffer Size on Drive___: 262144 bytes Drive Type________________________: Fixed Physical Geometry: 14475 Cylinders 15 Heads 63 Sectors per track Observed Hard Drives Manufacturing Information

Downloads

Download source (and exectuable) - 30 Kb


Comments

  • Merge icons on tool bar are grayed out. How can I fix this? - Microsoft Office Word Forum - WordBanter

    Posted by faitildspetle on 12/12/2012 10:40am

    By WebOsPublisher2 Phone Lookup icons. Search results for phone lookup icon. Phone Lookup Icon All the Icons Results for Phone Lookup Icon You can purchase these icons for your projects. Click on icons to purchase them. Phone lookup Search Icon Library All the Icons Icons | Products | Download Icons | Order | Icons | Support Copyright © 2005-2012 Aha-Soft. All rights reserved. Ready-made Icon Sets People Icons for Vista Multimedia Icons for Vista Perfect Toolbar Icons Business Toolbar Icons Database Toolbar Icons customicondesign.cmo

    Reply
Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • Migrating away from Windows Server 2003 is an investment in your organization's future, and there has never been a better time to begin the migration process. Take the next step to transform your datacenter by upgrading your server platform with leading edge Windows Operating Systems and SanDisk flash solutions.

  • Although much publicity around computer security points to hackers and other outside attacks, insider threats can be particularly insidious and dangerous, whether caused by malice or employee negligence. In this report, you learn the eight most significant cybersecurity threats that could impact your organization (at any time), Forbes cited internal threats as No. 3, noting that internal attacks can be "the most devastating" due to the amount of damage privileged users can inflict and the type of data they can …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date