1. Cancel IE Enhanced Security Configuration dialog box
When browsing the Web page using Windows Server 2003 's own Internet Explorer, a Security prompt dialog box appears, in fact, because Microsoft has set IE's default security level to high. You
From last August to now, the shock wave and shock waves make countless people's love machine restart countless times, tossing the hell. Of course now there are patches, with the special kill tools, their power has been greatly weakened. But still
On the cleaning of Windows system, although there are many methods on the web, others as long as a few simple to do.
1. Organize the hard drive regularly
Serious hard disk fragmentation can drastically reduce your computer's response speed.
The intelligence of the computer has brought us great convenience, also bury the fuse, once others use or invade your computer, through a simple search will find a lot of information, such as you have deleted the received and sent messages, visited
If you think the desktop n many icons too much, too messy! Now let me teach you a simple way to manage shortcuts so that the desktop no longer put a pile of icons affect your desktop!!! (xp/2000 under Use, me/98 similar!)
I. Setting up a
Programs run with their own priorities, all programs occupy processor resources, processor processing tasks have a priority, the average computer has 31 priorities, the system's kernel occupies the highest level, so that the system is stable, and
This article describes how to use the Window.Open method to open a child window, when we want to close the main window, this time all the child windows will also be closed. Below has my realization thought and the code, shares to everybody.
Realize
Often see a friend in the forum complaining about the need to free memory, in fact, if you installed Windows 2003, then you do not need to seek those who need to register to be used for a long time third-party memory management software. Because
One, right key "stop sharing" method
Right-click on a Shared item (such as h$) in the Computer Management window, select Stop sharing, and then close the share, and the following share icon disappears, and all items are repeated several times to
It looks a little weird, and it never happened. Did someone make Win98 into a 40MB size with basic functionality? The system can be compressed and deleted, as long as it has some basic functions to use.
Here's an article that will teach you how to
The advent of ghost has brought us great convenience, and it has many convenient and practical uses besides backup and recovery system. But in the face of the full screen of the English to operate, it really makes people a bit uneasy, a little
Windows 2003 is increasingly favored by users for its steady performance, but you still need to tighten Windows 2003 security in the face of new viruses.
1. User password settings
Set a key password to a large extent to avoid password attacks.
mysql5.7 installation configuration method, organize a share for everyone
Download
MySQL 5.7.msi
Installation
Double-click Mysql.msi and follow the prompts to install.
Issues to be aware of after installation ( emphasis )
Set MySQL environment
In IE and Google Chrome is all normal, is very depressed, and found many kinds of calls in the IFrame function method, the problem has not been resolved. Today on Google search again, patiently browsing the search results, and finally found someone
This is the installation step for Tomcat 7.0 under Windows.
Method/Step
Double-click the. exe installer to display the Welcome page as shown in the following illustration.
Click the Next button to see the page shown below
Click the Agree
The general "illegal operation" has two options: "Close" and "detail information." But the "details" inside the content most people do not understand, had to hastily closed. Now don't be afraid, let me explain to you the specific meaning of each
1. Modify Computer Name
Working Group: Netdom Renamecomputer%computername%/newname:08r2servercore
In the domain environment: Netdom renamecomputer%computername%/newname:08r2servercore/userd:administrator/passwordd:p@ssw0rd
2. Set the computer IP
Steps/Methods
(i) principle
1, the principle of minimizing: first to hide the window, and then in the lower right corner to draw the icon.
2, the principle of restoration: The window will be displayed, and then the picture in the tray
The example in this article describes the simulation popup function implemented by jquery. Share to everyone for your reference, specific as follows:
Initialize documents $ (document). Ready (); ----------------the pop-up div imitation modal
The following is a record of the Win7 (32-bit) system, the installation of the Zip decompression version of the method:First, download the ZIP archive packageAddress: http://tomcat.apache.org/download-80.cgiSecond, decompressionI unpacked the
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.