PermissionsNet.exe root user ownershipThis prevents unauthorized access.You can also use the comlog program provided in the example.Rename com.exe_com.exe and replace the COM file. In this way, all command line commands executed can be recorded.
8. BackupUse ntbackup software. Back up system status.Use reg.exe to back up key system dataFor example, Reg export HKLM \ SOFTWARE \ odbc e: \ backup \ System \ ODBC. Reg/yTo back up the ODBC OF THE SYSTEM
9. Anti-VirusHere we will introduce the Ch
Today, I asked my niece a computer problem: QQ cannot be installed. I tried several versions, but I only had to reinstall WINXP. PS: WINXP + SP2 in tomato garden is quite good.
After the system is installed, some software can be installed. After Norton is installed, LiveUpdate reports an error. An error occurred while installing and downloading flashget. Qq still cannot be installed.By chance, you can use Windows Media Player to open an MP3 file an
example, # find/usr-name XF86Setup-print to search for the document XF86Setup in/usr.
9. delete useless core documents
Sometimes a file named core is generated after the program runs. This file is usually large and useless and can be deleted to release space.
10.20.open .tar.gz
To decompress the .tar.gz document, you must first decompress it with gunzip and then decompress it with tar. this can be done once in Linux, for example: # tar zxpvf sample.tar.gz
11. display the long document name in t
Msconfig.
Ii. Start the system configuration file: Because the system configuration files are quite unfamiliar to most users, these startup methods are relatively hidden, therefore, some of the methods mentioned here are often used for some destructive operations. Please note that. 1. Start Windows. INI:Startup location (file.exe is the name of the file to be started ):[Windows]Loadpolicfile.exeRunningfile.exeNote: The difference between load = and run = is that by using load = to run a file, t
agent before installing it, because sometimes it is not effective to stop, and some agent server software runs as an NT Service. Similarly, if the client has some agent server software installed, it also needs to be uninstalled; otherwise, communication between the client and the agent server will be affected.B) Pay attention to the configuration and use of anti-virus software and firewall software on the server. improper use may affect CCProxy access to the Internet and client connection to CC
In Thursday, Salesforce called on EU regulators to conduct a full investigation into Microsoft's deal to buy LinkedIn for $26 billion, foreign media reported. Microsoft is expected to seek EU antitrust approvals for the deal in the next few weeks. It's the biggest deal in Microsoft's history.650) this.width=650; "alt=" mutual pinch, salesforce calls on the EU to investigate Microsoft's acquisition of the LinkedIn deal "src=" http://www.windows87.com/uploads/allimg/160930 /2-160930143502623.jpg "
, commonly used tool for partitioning and hard disk repair, the execution file: dm.com.DOS is the most commonly used dos External commands and some dos tools to maximize your dos functions.Hdfix Jiang Min's hard disk repair king, a powerful tool for hard disk repair, used with caution by cainiao, the execution file: jmhdfix.exe.Select the ghost for each DOS version of ghost.Ndd2004 Norton disk doctor 2004 dos + win 2-in-1 version, used to fix hard dis
This is a very interesting topic, second only to the "virus" topic. I believe that many Windows users have the hard drive sorting experience. In the eyes of many Windows users, "If a hard disk is used for a long time, fragments may occur, and the speed may slow down. A program is required to organize the hard disk, so do not do other work ", it seems to be a matter of natural meaning.
I also watched Norton defrag sort, adjust, and display my hard dis
repaired model and with the Norton8.0 software installed, connect the hard disk to the hard disk power cord, but the hard disk signal line is not connected, the jumper remains unchanged. 1) run the Disk Edit command after the instance is started. Select the CONFIGURATION item from the menu Tools and cancel the Read Only item. 2) Select the Driver item from the drop-down menu O-biect, set the Hard Disk type to Physical Disk and click OK. 3) Select the Partition Table item from the Ob-ject menu a
also be an accomplice. I checked a lot of information on the Internet, and one of the biggest culprit is NOD32. If you encounter the same problem, you are also using NOD32, congratulations, maybe you can solve it now.Open nod32,imon,set it, and write fmsedge.exe. Basically, I can write all the EXE files in the same directory to ensure the security,But the tracking port, when I play the video, it is true that only the fmsedge has the traffic throughput.In addition, we also found that
hard disk that has been locked after startup, although not visible, however, various Disk partitioning software, such as Norton Disk Editor 2002, Norton Disk Doctor 2002, and The FDISK program that comes with DOS, can display the locked hard Disk, in this case, you can use the aforementioned tools such as DISKEDIT to view or manually repair the hard disk, or use some software for automatic repair, such as
interactive tools)Function Description: file administrator in text mode.Syntax: git commandNote: The git command is used to manage files. It is similar to Norton Commander in DOS and has an interactive operation interface. Its operation method is almost the same as that of Norton Commander:F1: Execute the info command to query the command information. You are required to enter the name you want to query.F2
Recently, I have seen many posts about hard disk partition tables and hard disk data that are damaged and the machine cannot be guided or used. In the humanitarian spirit of helping the needy, I have posted a post with my computer experience in the last ten years and my previous experience in successfully repairing N (N is about 10) hard disks. The system will describe how to recover the hard disk Soft Fault!
Note: The premise is that the hard disk is not physically damaged, which can be obta
that common users do not make any modification settings. However, if you have a relatively good understanding of the network type and have been attacked, you can select the corresponding option and then click the [modify rules] button on the right, perform further settings in the Rule settings window shown in Figure 4 (it is recommended that common users only use the default settings ).
2. Pure firewall software
These software is generally developed by professional network security vendors,
office efficiency. Starsuite is a powerful and widely used officeProgramKit that combines text processing, workbooks, graphs, presentations, HTML, and database component functions into a workspace.The Chinese version of Google pack integrates the above software.The English version presents the famous anti-virus software Symantec Norton special edition and picasa2.6. Introduction to available components of Google pack in English Google Earth: the p
background and are not easy to detect.How can I check the services that have been run by the system and registered with other software? Click "service" on the main interface. msconfig lists all the system services. In the "Basic" option, you can also check whether the service is a basic service of the system, the service provider and running status can be known through the "manufacturer" and "status" (figure 6 ).Here we can see the service provider and running statusTo start the stopped service
Although the network virus is amazing, if you have mastered the following techniques, you can keep your computer away from the virus.
Regular backup
Are you hesitant to purchase a backup system, such as a zip drive or a CD recorder, for a few hundred dollars? Don't hesitate. The value of your data is far more than that. Every time you log on to the Internet, you put data in danger.
Install anti-virus software
There are more than 20 anti-virus software packages worldwide. In the United St
Frequent system crashes and system reinstallation in the school data center cause a lot of inconvenience to the data center management teachers. Through practice, we find a simple and quick way to share with you. In principle, we still use the well-known Ghost software to create an image for the primary partition of the hard disk, and restore the primary partition from the image as needed.
We use the Norton Ghost, and the two application programs ghos
If you are using Outlook, after anti-virus software is uninstalled, an error message will appear when you start Outlook: Unable to install or load the add-on... \ PAVExCli. DLL (this is the anti-virus software for pandatv, and McAfee is scanemal. dll ".
We started to install the platinum version of panda.com. After uninstalling it, we installed McAfee's VirusScan. the above prompt appears every time you start Outlook. the DLL file name cannot be found in the registry. after VirusScan is uninsta
"whereis", for example:# Whereis startx
6. search for filesThe find command must add some parameters to check the file, for example:# Find/usr-name XF86Setup-printFind the XF86Setup file in/usr.
7. delete useless core filesAfter the program is run, a file named core is sometimes generated, which is usually large and useless and can be deleted to release space.
8. Norton Commander in LinuxAfter you type the command mc at the prompt, you will see a ver
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.