You can use the following registry file to disable:
Windows Registry Editor Version 5.00
; Turn off Offline Files (System)
[Hkey_local_machine\software\policies\microsoft\windows\netcache]
"Enabled" =dword:00000000
"Noconfigcache" =dword:00000001
"Nomakeavailableoffline" =dword:00000001
"Nocacheviewer" =dword:00000001
; Turn off Offline Files (User)
[Hkey_current_user\software\policies\microsoft\windows\netcache]
"Enabled" =dword:00000000
"
Environment:Ubuntu 16.04What is Compiz:Https://zh.wikipedia.org/wiki/Compiz, simple to understand is the realization of Ubuntu 3D effectBenefits of disabling:Save memory and CPUDisable method:1, direct deletion is not possible, because this is integrated with the desktop Manager unity, the direct Delete command is:2. Install another desktop manager first3, logout, re-login system, on the right side of the user name, there will be a button, choose the GNOME Flashback (metacity) option, entered an
Tags: Linux Recycle Bin Script sourceConvert RM command to MV Command, cannot use the-R parameter, will report an error, because the MV command does not have the-R parameter, the following is the method:
Create a hidden folder in the user's home directory ~/.trash as the garbage collection station[[emailprotected] shellXT]# mkdir -p ~/.trash
Write a script
#设置别名, RM is delete file, RL is view Recycle Bin, ur is recovery fileAlias rm= ' Trash 'Alias Rl= ' Trashlist 'Alias ur= '
Tags: RDPEnable_rdp_nla#Powershell script to enable Network level authentication for Remote Desktop Services connections#the need arose when tryi Ng to RDP using a third party application and it gave the following error: #The remote computer ' Disable_rdp_nla #Powershell script to enable Network level authentication for Remote Desktop Services connections#the need arose when tryi Ng to RDP using a third party application and it gave the following error: #The remote computer ' Enable and
One: Generate key
Shell Point tool New user key generation
You can see the key generation interface, choose the RSA encryption algorithm, the key length is set to 2048 here.
The key has been generated, select Next, Next.
Enter the key name, and the password to encrypt the key, and proceed to the next step.
Now you can see the public key information and save the public key copy.
Create a hidden directory in the root user home directory. SSH, and create a Authorized_key file in this
Symptom: SELinux configuration disabled after the boot card in the scroll bar failed to enter the systemWorkaround: Modify the SELinux configuration in single-user mode 单用户进入方式1)开机按 键盘 e 进入系统2)找到 linux16 开始,LANG=zh_CN.UTF-8结尾一行,尾部加 ( 空格 加上 selinux=0)3)然后 ctrl + x 启动,就看到熟悉的登录界面。修改正确selinux vim /etc/selinux/configVim/etc/selinux/configThis file controls the state of the SELinux on the system. Selinux= can take one of the these three Valu
Disable usb in Domain Policy and usb in Domain Policy
Documents and templates can be downloaded in http://pan.baidu.com/s/1qYTcjTy
Pro_usb_users.adm this template can be disabled to the specified drive letter, for user policy
Pro_usb_computers.adm this template is intended for computers. Generally, it is enough.
You can start from three aspects
In fact, the adm configuration file seems to have modified the local group policy. In fact, it is implemen
Disable the CentOS 6 and CentOS 7 firewalls.
CentOS6.5 view the Firewall Status:
1
[Linuxidc @ localhost ~] $ Service iptable status
Display result:
1 2 3 4 5
[Linuxidc @ localhost ~] $ Service iptable status Redirecting to/bin/systemctl status iptable. service ● iptable. service Loaded: not-found (Reason: No such file or directory) Active: inactive (dead) -- indicates that the firewall has been disabled
services. They are system-level services, because I am an entry-level Linux player, so I choose not to touch them.
Acpid, haldaemon, messagebus, klogd, network, syslogd
Acpid, haldaemon, messagebus, klogd, network, syslogd
However, the most commonly used Linux service isSshdTo connect to Linux through SSH. This is essential. Therefore, we strongly recommend that you keep this. AndSendmailService. I used centos Linux 5.2. I installed and changed the service by default during insta
-level services, because I am an entry-level Linux player, so I choose not to touch them.
Acpid, haldaemon, messagebus, klogd, network, syslogd
However, the most commonly used Linux service isSshdTo connect to Linux through SSH. This is essential. Therefore, we strongly recommend that you keep this. AndSendmailService. I used centos Linux 5.2. I installed and changed the service by default during installation. Because it is useless, I disabled it. This service is slow enough to start.Finally,
How to disable IPv6 in Linux Kernel
To disable IPv6 in Linux, you can use the following methods:
Method 1:
In/etc/modprobe. d/dist. add install ipv6/bin/true to the conf file, and use lsmod | grep ipv6 After reboot. The IPv6 module is not loaded, ipv6 directory files are also unavailable in the/proc/sys/net directory. [Root @ root net] # ls
Core ipv4 netfilter unix
Method 2:
In/boot/grub. in the conf file,
how to disable ports not used by computers
Each Service corresponds to a corresponding port. For example, the WWW Service port in zookeeper is 80, SMTP is 25, and FTP is 21, these services are enabled by default during Win2000 installation. It is unnecessary for individual users to disable the port, that is, to disable useless services. Configure it in "se
First, some of the major dll files in the system can achieve high security as long as they are modified.First, download an EXESCOPE6.3-6.4 tool if you have not changed the DLL.1. It is the prototype of the library file dll that Browselc. dll ie needs to call.
2. Shdoclc. dll System window and Setting Dialog Box ...... for example, deleting a file rename.
3. Shell32.dll and above are similar
4.erer.exe start the program called by the menu... the system will load it into the system.
5. Download Th
Currently, vrouters are widely used and users are not familiar with some routing settings. So I studied how to turn off unnecessary services in vro settings, disable insecure and unnecessary services on the VBR settings. Here, we assume that the vro is configured with ports Ethernet0 and ethernet1.
Router (config) # no cdp run // disable CDP. CDP uses multicast addresses to discover the Hostname, hardware d
Solution to the error "err-disable" on the switch port
Instance:
We pulled an MSTP line from the customer's IDC room. After connecting to the Cisco 3750x, the port lights will not light up, and the port will not light up after it is changed, the error "err-disable" is reported because the client has a loop.
Fault symptom:
Line failure, physical indicator light is not on, some will be displayed in Orange (di
For how to disable useless ports in win2000, I mentioned this in my previous posts and Shared Folder Security I wrote yesterday.Here I am writing security knowledge basics for your reference:Each Service corresponds to the corresponding port. For example, the WWW Service port of zookeeper is 80, smtp is 25, ftp is 21, and the service is enabled by default in win2000 installation. It is unnecessary for individual users to
Someone may ask, "What is the relationship between this and lync? "
It's related!
It does not matter. It does not matter!
I used to have a lync environment in at least two projects and had to reinstall Exchange Server 2013.
However, when I met students, I made some preparations and sent them out to help students learn!
When uninstalling Exchange Server 2013, You need to disable the mailboxes of several users. If you do not
Each Service corresponds to the corresponding port. For example, the WWW Service port of zookeeper is 80, smtp is 25, ftp is 21, and the service is enabled by default in win2000 installation. It is unnecessary for individual users to disable the port, that is, to disable useless services.
In "service" in "Administrative Tools" of "Control Panel", configure.
1. Close ports such as 7.9: Close Simple TCP/IP Se
support IPV6 is incompatible with your Internet service provider's legacy IPV4 network, and so on.
This does not mean, of course, that you should blindly disable IPV6 on your Linux machine. Given all the benefits IPv6 promised, as a part of society we end up embracing it, but as part of the troubleshooting process for end users, if IPV6 is really the culprit, you can try to shut it down.
Here are some tips for disabling IPv6 in parts of Linux (for
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.