Notebook back, internal injuries, with a complex mood to do some simple sorting.
First I want to reinstall the system, but also forget, uninstall software vs Reload, in fact, are almost injured machine.
1, Rogue Software
Normal startup has gone, after the boot casually open a "My Computer" will be a long time, the software will not shut down, forced shutdown was refused. Want to shut down normally, can only find the software "close" interface is not a small workload, the machine is very tired! Hot.
These software, are "antivirus" "Clean" "assistant", in fact, they are aboveboard virus. That is, using code that is different from the code in the virus database achieves similar purposes. Anti-Virus principle in addition to common technology, mainly by the comparison of code fragments it?
Open the registry, found a lot of drivers, I think one by one control, but after all limited capacity, a lot of program names are not familiar, and I am a theoretical type of people, the theory is not before, do not want to have any actual combat, so I have no actual combat. So had to give up, one by one open the directory of the program, with their own uninstall software to uninstall.
I actually have a distrust of these uninstall software, but this is only "rogue software", they are not viruses, which makes me save a lot of effort. These own uninstall software let me in a very short period of time, the completion of the computer's thin body.
So I thought, why can't viruses be like these software? Because the virus is relatively small, easy to isolate, and these software is connected inside, became a system. Like a lot of foreign software, using the bottom is not much, but the formation of their own huge structure with the algorithm, and make their own engine, rich in flesh and blood. In the case of Linux parameters, the regular expression processing is only the basis of the foundation, but the actual code is annoying!
These huge bloated rogue software, in fact, have a lot of weaknesses.
After a bit of cleaning up the driver, the software will no longer recur, after all, they are not intended to hurt you, so these operations for I have no practical experience of the person is also OK. Of course, there are a lot of dead bodies, forget it, maybe I will study them later.
2, special record of mobile phone driver
I just can't figure out how a mobile phone driver can get 40+m, but I give up immediately, basically this thing as long as can use on the line. Simply record as follows
To implement a mobile phone with a computer, you probably need:
User-mode driver service, seemingly is wudfHost.exe (this thing unexpectedly did not close interface, make me extremely disgusted!) )
corresponding to a w**df**0001** sys, the name was forgotten, and not only this one,
Wpdusb.sys and Wudfrd.sys seem to be, both of which are clearly appearing in the mobile phone driver information.
Ssudmdm.sys and Modem.sys are Samsung modems.
Chargefaster.sys and Ssudbus.sys are charged with the Samsung bus driver? Other than that
Winusb.sys, too. It seems to be Microsoft's USB drive, which is used by Android.
In short I estimate 1-2m completely can solve, 2M said more. 40M can contain 2 or 30 different models.
3, New user
In order not to produce a strange, the administrator from the Welcome screen, with the new user generation. These operations with the control panel is very annoying, the direct registration table is concise.
Then the new user's desktop, My Documents, and so on, cut from the original place.
The new user does not have the operation permission to the NTFS disk, but can create the new folder, is Full control, inside can operate freely
NTFS has a security attribute (visible when a simple share is turned off), fat does not.
Group Policy is divided into two the same area, in fact, the former is LocalMachine, the latter is the current user. The operation here is still not directly registered to the convenience of the registry. For example, if you want to hide the user A's Folder options, the registry can be a single item in the hidden, Group Policy is a get nothing.
The presence of multiple users explains a number of phenomena, such as:
The structure of the registry, in the Windows NT ProfileList inside, lists all users, there is logon default, there are system and so on, but does not include the odd account such as ASPNET. This way, the registry is a bit clearer because the current account is not authorized to modify localmachine.
With this, first log on as an administrator, run Ranas, load User B's profile, and then modify its permissions. Modify the time, because the permissions have inherited the argument, so appear slightly annoying, actually from the code point of view is OK.
After the change, User B login can not change the registry of their own part of the (Can be modified, Group Policy can also be modified by itself, so it is useless).
In addition, Microsoft's RunAs tool will have error 5: Denied access to the problem can be studied under.
Sid features, s-1-5-21-, admin is 500, new user 1000 +
WiFi requires SCZ and server services
4, Network neighbor
Found a "new" friend FengZhuang in Pc-20121228zryh, may also be myself.
First article-------Organize computer