Software name: one-click ghost
Software: v8.3 build 060903
Installation environment: Win2000, XP, and 2003
Running Environment: DoS
Software type: Data Recovery
Authorization Form: free
Software Introduction: one-click ghost is a boot disk released
When we use computers, there are always invisible files that we don't want to see. How can we quickly hide important files and conveniently view hidden files? You may wish to use virtual disks to hide files. If Chen Guan had been fond of learning,
Word is very slow to open, the machine has been used for a long time (2 years), and do not want to reinstall, After reloading many things have to be installed.
Office2003 is replaced by 2007, which is slow to open.
Is it a virus?
Then I found a
The dual-system is installed. When the system is started, it is selected to start XP or 98 countdown reading seconds. The default value is 30 seconds. How can it be changed to a shorter value?
Recently, I still had to worry about the dynamic change of Ubuntu Desktop background with only two directories. I searched for resources online and found an XML script generation tool. This is because an XML scripting language is required for
The WebPlayer9 player control is completely played based on the memory cache technology and does not generate or read/write any files, including temporary folders. More effective disk protection. In fact, a folder named my_vod_caching is generated,
To view this type of files, you need to set to show hidden files. The specific settings are as follows:Open the Control Panel (classic view)-> Folder Options-> View-> advanced settings, and deselect the "Hide protected operating system files
First, you need to add the file type to the menu and start the application of such files. If it is a new file that will be automatically opened at startup or an application that you can use immediately, such as Notepad, WordPad, or drawing, no
It is only recommended for friends with basic computer knowledge!
1. Open "my computer"-"Tools"-"Folder Options"-"View"-tick-"OK" before "show all files and folders"
2. Delete the content in the following folders:C: \ Documents and Settings \ User
Disclaimer: This article only outlines various hidden Trojan techniques.No specific production method
In the past, I thought that as long as files sent by netizens are not casually run, they will not contain viruses or Trojans, but then
Use the "donkey" to catch bots !! Is it because you put an "electric donkey" on the road and waited for the "turkey" to come over and accidentally stepped on the "electric donkey" and the result became a "zombie. Many friends say that it is
It is suspected that computer startup is too slow, which is a common heart disease for every computer fan. It is everyone's wish to make computer startup faster, I have summarized the "Step 15" to speed up the computer startup during the use of the
Keywords: manually clear "proxy trojan download" realplayer.exeLab environment: Windows2000
In the morning open the computer, suddenly found the home page was modified into a http://www.7939.com.After changing the home page to a blank page in
Introduction
This experiment is intended to help you learn how to add your applications to the running level of Vista.
Purpose
This experiment allows you to customize the running level of any program.
Procedure
1-ensure that Vista UAC is enabled
Possible cause: a third-party component is referenced in your project, and this third-party component is a commercial component. It defines licenseprovider (typeof (licfilelicenseprovider) in the main usage class of the component ))This attribute.
In a project (. csproj. user ),(. csproj ),(. SLN ),(. suo ),(. projdata ),(. SCC) What are the files with the suffix, and what is the purpose? The query results are summarized as follows:
Solution file (. sln and. suo)
Visual Studio. NET uses two
Learn more about INF filesEveryone knows that there are countless INF files in my computer, but few know what the INF file is. At best, it only stays at the awareness that the INF file can unlock the locked registry. So what is the INF file and what
In. in the discuz project of net, the background management module is discuze. web. admin is a separate module. However, the folder for opening the solution cannot find the folder for separate modules, but is stored in discuz. in the admin folder of
1. The content of this article comes from courseware and student notes of famous universities (on campus, I often see someone buying notes at high prices)2. The instructor does not provide references, so he can only thank you for your
When the project uses Android: installlocation = "preferexternal ",Installation Error: install_failed_container_error
Today I am debugging my program on n880. Sometimes the program reports that it cannot be installed. Use ADB install to display
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.