different servers, make it a server farm, each server has a different user name and password and provide a different service, so the security is higher. But people who are willing to do so have a feature----money:).
Well, to get to the bottom of this, the server's database for Ms-sql,ms-sql service software SQL2000 installed in the d:ms-sqlserver2k directory, to the SA account set a strong enough password, installed a SP3 patch. In order to facilitate web page producers to manage the Web, the
With unlimited broadband popularity, in order to facilitate BT download, many friends love 24-hour hanging machine. All-weather online, which gives some viruses, trojans "intrusion" system has brought great convenience, they can invade our computer in the middle of the night, wanton abuse. Recently, the author in helping a friend antivirus, encountered a "cannot remove virus", the following will be killing experience with everyone to share.
1. Virus discovered. The friend's computer installs is
Use Windows 2000/XP Dual system users, in the daily work is best not to log in as a member of the Administrators group, usually should use the ordinary users (Users group member) identity login system, because the Users group account can not modify system registry settings, operating system files or program files, Therefore, the virus, Trojan has innate immune function! However, users cannot use applications that can only be executed by system administrators.
What if you want to use all the fea
: ms-sqlserver2K directory, set a strong enough password for the SA account, install the SP3 patch. In order to facilitate web page makers to manage the web page, the site also opened the FTP service, FTP service software is used SERV-U 5.1.0.0, installed in d: ftpserviceserv-u directory. Anti-virus software and the firewall use Norton Antivirus and BlackICE. The paths are d: ortonAV and d: firewalllackice. The virus database has been updated to the l
page, the site also opened the FTP service, FTP service software is used SERV-U 5.1.0.0, installed in d: ftpserviceserv-u directory. Anti-virus software and the firewall use Norton Antivirus and BlackICE. The paths are d: ortonAV and d: firewalllackice. The virus database has been updated to the latest version, the firewall rule repository defines that only port 80 and port 21 are open to the outside world. The content of the website is a forum on th
I installed Windows XP and Norton 2002 Chinese anti-virus software on my machine. Recently, the Internet virus has been rampant. Although I have not been "impacted" by the shock wave, I have been hit by a Trojan ".
I. Shocking Trojans
When I opened a plain text file after I went offline that day, Norton suddenly reported a virus and refused to access the file (figure 1 ). How does a plain text file contai
Many people have installed dual systems, and the file security of multiple systems must be taken into account under the dual system. Here we provide two practical tips for using anti-virus software in two dual systems for your reference.
I. Dual-System Virus Database Upgrade Method
We know that many people now have dual-systems to facilitate computer installation. For example, I have installed Windows 98 + XP. However, For Norton Anti-virus software
With the popularization of unlimited bandwidth, many friends love to host up 24 hours a day to facilitate BT download. Around the clock online, it brings great convenience to some viruses and Trojans "intrude" systems. They can intrude into our computers in the middle of the night, and do nothing. Recently, when I helped a friend kill viruses, I encountered a "virus that cannot be deleted". I will share my experience with you.
1. Detect the virus. My friend installed Windows XP Professional Edit
company, after data corruption, the data can be restored to a large extent. The reason why many instances cannot be recovered exists, more than 90% of this is due to misoperation in the subsequent recovery process, resulting in greater damage. So I hope my friends will remember the following two points:1. if data on the hard disk is lost, immediately shut down and do not perform any write operations on the hard disk. This will increase the difficulty of the repair and affect the repair success
earlier versions.
C: Program FilesCommon FilesSymantec SharedPersist. bak Norton Antivirus Event Log File
C: Program FilesCommon FilesSymantec SharedValidate. dat Norton Antivirus Event Log File
C: Program FilesCommon FilesSymantec SharedPersist. Dat Norton Antivirus Event Log File
Norton AntiVirus may be limited to v
"start"> "Kingsoft drug overlord 2005 Security combo> Kingsoft drug overlord 2005", and click "online upgrade" in the pop-up main interface. Then, the software will pop up an online upgrade prompt wizard (as shown in Figure 5), we select "upgrade from local and local area network", and click "Next ".
Figure 5
The software will continue to ask us about the storage location of the upgraded files, click the Browse button to select the path we backed up to (6), and then proceed with the correspond
account password, install the SP3 patch. In order to facilitate web page makers to manage the web page, the site also opened the FTP service, FTP service software is used SERV-U 5.1.0.0, installed in D: \ ftpservice \ Serv-U directory. Anti-virus software and the firewall use Norton Antivirus and BlackICE. The paths are D: \ nortonav and D: \ firewall \ BlackICE. The virus database has been updated to the latest version, the firewall rule repository
EndurerOriginal
2006-10-20 th1Version
A netizen's computer, installed with Symantec's Norton, is reported every day and foundW32.looked. I, Cleared.
Remote Assistance in secure mode with network connection is successively used by Norton and dr. webcureit and rising online free scanning, a virus was not found, and several files mentioned in the Symantec virus report were not found. But return to the norma
:).
Well, to put it back, the server database for the MS-SQL, MS-SQL service software SQL2000 installed in the d: \ ms-sqlserver2K directory, set a sufficient strength for the SA account password, install the SP3 patch. In order to facilitate web page makers to manage the web page, the site also opened the FTP service, FTP service software is used SERV-U 5.1.0.0, installed in d: \ ftpservice \ serv-u directory. Anti-virus software and the firewall use Norto
cannot be deleted according to the conventional method. Let's modify the Registry together.
Run regedit to open the Registry Editor and choose HKEY_LOCAL_MACHINE/system/CurrentControlSet/services/LanmanServer/parameters. For Windows 2000 Professional and Windows XP, create a New DWORD key named "autoscaling wks" in the right panel and set the key value to "0". For Windows 2000 Server and Windows Server 2003, create a DWORD key named "AutoShareServer" and set the key value to "0". The setting ta
1. Norton Ghost's convenience and problemsMost of our win users have used Norton Ghost, as long as the current system backup to generate image files, such as the system poisoning or crashes, with Norton Ghost recovery back to the back of the time.This can be said to be the basic principle of Memo (Memento) mode, first backup, need to restore. So the memo mode is
) with the help of PartitionMagic mobile program
After a Windows 98 user has fully installed the PartitionMagic, the Magicmover tool makes it easy to move programs. Click the Magicmover command under Start, program, PowerQuest PartitionMagic to open the Magicmover main interface, and then browse the drives and folders in the list box to select the application you want to move. Magicmover will automatically scan all the drives, automatically analyze your selections, and after scanning, in the "S
enough password, installed a SP3 patch.
In order to facilitate web page producers to manage the Web, the site also opened the FTP service, FTP service software using the Serv-u 5.1.0.0, installed in the D:/ftpservice/serv-u directory. Antivirus software and firewalls are the Norton Antivirus and BlackICE respectively, the path is D:/nortonav and D:/firewall/blackice, virus Library has been upgraded to the latest, firewall rule library definition onl
Many people are curious, often can see in Task Manager Vptray.exe process, in the end what is vptray.exe process, can close? Today's small make up to tell you about the task Manager on the Vptray.exe process related content. Because the recent netizens to the small series should process out now task Manager process items above, and also occupy a certain amount of memory space.
The following is a description of the Vptray.exe process:
Process Name: Vptray.exe
Detailed name: Viruspr
server has a different user name and password and provide a different service, so the security is higher. But people who are willing to do so have a feature----money:).
Well, to get to the bottom of this, the server's database for Ms-sql,ms-sql service software SQL2000 installed in the D:\ms-sqlserver2K directory, to the SA account set a strong enough password, installed a SP3 patch. In order to facilitate web page producers to manage the Web, the site also opened the FTP service, FTP service s
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.