Win32_lean_and_mean
1. Reference:https://msdn.microsoft.com/en-us/library/windows/desktop/aa383745 (v=vs.85). aspx2. Instructions for use:You can reduce the size of the Windows headers files by excluding some of the common API declarations as follows:•Define Win32_lean_and_meanto exclude APIs such as cryptography, DDE, RPC, Shell, and
Where do people often go to download software and applications? Have you ever thought about the security of software, applications, or resources that have been downloaded back? When Windows 10 and Office 2016 were released, many friends who did not have permission used the third-party website to download the installation image. And how do you ensure that the image or software that you download is the official version, and that you have not been tamper
Shortcut keys? Windows series:Individually press windows: Show or hide the Start menu?Windows+break: Displays the System Properties dialog box?Windows+d: Show Desktop?Windows+m: Minimize All windows?
Common windows running command gpedit. msc ----- Group Policy
Sndrec32 ------- Recorder
NSLookup ------- IP address Detector
Explorer ------- open the Resource Manager
Logoff --------- logout command
Tsshutdn ------- 60 seconds countdown shutdown command
Lusrmgr. msc ---- local users and groups
Services. msc --- local service settings
Oobe/msobe/A ---- check whether XP is activated
Notepad -------- open not
$ sharingNET share ipc$/Del Delete ipc$ shareNET share C $/del Delete c: shareNET User Guest12345 log in with the guest user and change the password to12345NET password Password change system login password netstat-a See what ports are open, common Netstat-an netstat-n view Port network connectivity, common Netstat-an netstat-v view work in progress NETSTAT-P protocol Name Example: Netstat-p tcq/ip View a p
Comments: For more information about windows network security, see the common network attack methods.Windows Network Security 1. Concept of Network Security Definition of Network Security: hardware, software, and data of the network system are protected, and the system can run normally continuously without being damaged, changed, or leaked due to accidental or malicious reasons, the network service will not
Management Utility
Calc-----------Start Calculator
Charmap--------Start character mapping table
CLICONFG-------SQL SERVER Client Network Utility
CLIPBRD--------Clipboard Viewer
Conf-----------start NetMeeting
Compmgmt.msc---Computer Management
cleanmgr-------Waste Finishing
CIADV.MSC------Indexing Service Program
OSK------------Open the On-screen keyboard
ODBCAD32-------ODBC data Source Manager
oobe/msoobe/a----Check if XP is active
Lusrmgr.msc----native Users and Groups
Design principles:1. Easy installation: No activation, no unattended, no manual loading Sata/raid drive, automatic installation of a variety of hardware drivers, free to choose landscaping themes and common software.2. Fast, Save resources: Optimize system parameters in advance, direct integration of patches, no need to install and then upgrade one after another and leave a lot of junk files.3. Stable security: Integrates all the latest key patches, m
Install Ubuntu 3 on a hard disk in Windows-configure the android development environment and common settings in ubuntuRelated links:Install Ubuntu on a hard disk in Windows-install Ubuntu11.10http in XP: // www.bkjia.com/ OS /201205/130282.html;Ubuntu II for Windows hard drive-install Ubuntu11.10 for Win7 http://www.bk
Windows Common performance counters
Counter is a data indicator that describes the performance of servers or operating systems. Counters play a key role in "Monitoring and Analysis" in performance testing. Especially when analyzing the scalability of the system and locating performance bottlenecks, the analysis of counter values is critical. However, it must be noted that a single performance coun
Introduction to some common shortcuts used in Windows 8
1. Shutdown machine
The problem is a bit funny, but some friends do not know that the Start menu in Windows 8 will be replaced by the Metro interface, the shutdown button also disappeared, we can use several methods to achieve shutdown:
A. ALT+F4: Shortcut keys, Windo
you know: Windows caches DNS resolution results to the local computer.
DNS caching helps users get faster access to the IP of a common web site, but sometimes it can be counterproductive. For example: A Web site in the public network DNS changed the IP address, and the user's local DNS cache has not expired, it will access the wrong IP address.
If you encounter similar problems, you can force
Common files in the BSP package for Windows CE System Development
BSP introduction (board support package) is an underlying software development kit between the underlying hardware and the upper-layer software. It is mainly used to shield hardware and provide the operating system and hardware driver. The specific functions include:
(1) single board hardware initialization, mainly including CPU initializatio
[SOURCE DOWNLOAD]Indispensable Windows Native (8)-C language: struct, common body, enumeration, type definitionWebabcdIntroducedEssential C language of Windows Native
Structural body
Shared body
Enumeration
Type-defined character
ExampleCStruct.h#ifndef _myhead_struct_ #define #ifdef __cplusplus extern " C " #endif Char *demo_cstruct
---restore content starts---Small dream today to share with you the Windows Phone 8.1 common launcher instances, including:
Phone launcher
SMS Launcher
Mail launcher
Add Appointment | Memo to Calendar
Map Launcher
Map Route Launcher
Windows Phone 8.1 Common launcher-phone launcher:We u
sequence of Windows programs depends on the order in which events occur. program execution is driven by messages generated sequentially. programmers can write message processing programs for message types to process received messages, or send other messages to drive other processing programs, but you do not have to determine the order in which messages are generated in advance. This is a notable feature of event-driven in object-oriented programming.
is not unusable. This ID is stored in the SIM card, but it indicates the authentication on the GSM network! So if your mobile phone is used in the CDMA network, you don't know how to get this ID .... the linegetgeneralinfo here can read the IMEI and imsi information at the same time, as well as the factory information (this information is the chipset manufacturer, such as Qualcomm :))! In the retrieval of this number, rIL can also obtain the IMEI information (ril_initializ is a function), but s
Common tools for accessing ext3 and Reiser partitions in Windows-general Linux technology-Linux technology and application information. For more information, see the following. [I = s] This post was last edited by gary168
1. ext2ifs
Both of this tool and javase2fs are written by John Newbigin using Delphi. Objective e2fs Copyright (C) 2000, Ext2IFS v0.3 Copyright (C) 2004, and thus we can speculate which
When using Windows XP systems, we inevitably encounter a wide variety of errors and problems. At this time we have to do is not "unprepared", but know how to troubleshoot, how to solve the problem. Now we're going to analyze the main scenarios that are causing Windows XP to fail, and how these failures can be resolved.
1. Failure caused by third party software
Some software programs are not well written,
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.