RHEL 7 CentOS 7 To disable the IPV6 method and the previous version is not the same, this article sorted out the processing method: The source of this article: http://blog.csdn.net/bluishglc/article/details/ 41390785 prohibit any form of reprint, otherwise will entrust CSDN official safeguard rights and interests.
First, we have to give the most fundamental solution: modify grub to not load the IPV6 module at boot time
After this modification, us
Made a page, comment on the time, there is a UL can show, but here with Ajax, local refresh, if clicked click the Browser Refresh button, UL inside there is no content
To avoid this, I want to disable the refresh feature of the page
For a while, find the following code to disable F5 "I tested three browsers, IE and Firefox can, 360 security browsers can not"
However, there is no code to
JS code disables the replication feature:
Copy Code code as follows:
Note that this code must be placed behind the body element, in front or in the head without any effect.
Complement: Document.body.onselectstart page check function.
Document.body.oncontextmenu page Right menu.
Document.body.ondragstart page content drag and drop function, drag can be achieved replication. You need to disable replication when you prohibit it.
Filesystemobject| Tips | disable
As we all know, the power and destructiveness of the FileSystemObject component is why it is frequently disabled by free home providers (those that support ASP).
First: Unregister the component with the regsrv32/u C:\WINDOWS\SYSTEM\scrrun.dll (win98 path).
Second: Modify the value of the Progid, the way in which the component is invoked in the ASP is usually the Set object name =server.createobject ("Progid"), at which
Using 360 security guards can be summed up a number of computer skills, which prohibit the start of the automatic startup function is very useful, but if the computer does not have 360 security guards how to manually prohibit the boot Startup items? This article small set for everyone to bring computer prohibit boot boot skills.
How do I disable boot entry? Computer disable boot up tips
No 360 security gu
Ports and processes are an essential part of the system, and some Trojan horses are also compromised by ports or processes. Of course, the purpose of the original port is to allow the user's computer to connect with the network. But the increase of network hackers, let some criminals steal the user's information and important information, resulting in or light or heavy loss. Therefore, ports that are not required should be disabled, such as 135 and 456 ports. So how do I quickly
1 To disable or enable the device in the BIOS, you need to restart the machine, and then press the hotkey to enter the BIOS, usually when the computer starts the self-test, it will appear on the screen to enter the BIOS hotkey, usually similar "; Press F1 to enter BIOS ", such as the prompt, this time by pressing the instructions of the F1 key can enter the BIOS setup interface. Depending on the motherboard model and BIOS version, the BIOS setup inter
Office add-ins are modules that Office programs need to load automatically when they start a program in order to perform a function, such as calligraphy copybook function, manuscript function, making envelope function, and so on. Users can enable or disable Office add-ins to improve the efficiency of Office programs, depending on their work needs.
The steps to enable or disable Office add-ins in Word2007 a
If you want to disable, we need to enter the following command in the terminal: sudo 0Then navigate to/private/var/vm/to delete the already existing Sleepimage filecd/private/var/vm/Use the following command to delete the file sudo RM SleepimageFinally we want to prevent OS X from continuing to create the file, so we need the following command to generate an empty file that cannot be replaced Touch Sleepimage chmod /private/var/vm/sleepimageOf cou
Modify the/proc/sys/net/ipv4/icmp_echo_ignore_all content to 1 to disable ping content for 0 to turn on Ping.Sysctl-w net.ipv4.icmp_echo_ignore_all=1 The effect of this order is ibid.There is another way to use the iptables-in Ping.Iptables-a input-p ICMP--icmp-type 8-s 0/0-j DROPThe ping command works by sending an ICMP request message to the destination IP and then the destination IP to reply to an ICMP message. The above command is to use the Iptab
1, # Chkconfig--list: Display the service that can start automatically on bootResults: iptables 0:off 1:off 2:on 3:on 4:on 5:on 6:off indicates that the iptables power on 2, 3, 4, 5-level service automatically.2. # chkconfig--ADD command name: Add Power on auto start command name ServiceChkconfig--add iptables: Boot automatically start iptables service;After power-on through the command iptables-l-n check whether the setting is successful;3. # chkconfig--del command name: Delete boot command nam
1. Disable/Restore Spotlight for Mac system:Enter the following in the terminal to disable:sudo launchctl unload-w /system/library/launchdaemons/com.apple.metadata.mds.plistIn the terminal, enter the following content recovery:sudo launchctl load-w /system/library/launchdaemons/com.apple.metadata.mds.plist2. Delete/Restore the spotlight icon for your Mac system:Enter the following in the terminal to delete:cd/system/library/coreservices/sudomv search.
When we use the computer, what should we do if we encounter some problems that cannot be solved, or what important data is lost in the computer? Many people will pound to reload the system, so that the problem can be solved, in fact, we do not know, the computer has a System Restore settings, and the effect of the reload system is similar, can also help us solve a lot of problems. But there is also the disadvantage is that when we do not need to restore the system, in the event of inadvertently
of others, what do you intend to do? many people in order to "safe", they insist on using the computer (computer) in time to clean IE cache files, delete cookies work. Have to admire the perseverance of doing so every day, but there is a fact is undeniable-it is too troublesome to do so every day. So how simple and effective to prevent people from using cookies to spy on us? This can be achieved by directly to cookies. cookies are actually small packets of bread that contain information a
1, click the top right corner of the "Tools" button, and then click "Manage Add-ins."
2, please select "All Add-ins". All IE add-ons are displayed in the list on the right, with detailed add-in information and the load time of each add-in that you can determine based on the usage and load time of the add-in and which add-ons can be disabled.
3, select the add-on you want to disable, click "Disable
This article mainly introduces jquery disable right-click function Mask F5 refresh the specific implementation, need friends can refer to the next1. Disable right-click function code as follows: $ (document). Ready (function () {$ (document). Bind ("ContextMenu", function (e) {alert ("sorry! No right-clicking! "); return false; }); }); 2, shielding F5 Refresh copy code $ (document). Ready (function () {$ (
The first step: Press the Win+x key under the win8.1 desktop and choose Device Manager to open the following image:
The second step: After opening Device Manager, we in the device list to expand the "image device", you can generally see that you have a device, is your camera, of course, some users may have installed a scanner and other equipment, the camera generally shows "CAMERA";
The third step: Right click on "Set Like Head" Select
1. Use the combination shortcut key +r to open the Run window, enter "regedit" carriage return confirmation. As shown in the following figure
2. Locate the Hkey_current_usersoftwaremicrosoftwindowscurrentversionpoliciesexplorer key value in the Open Registry Editor. As shown in the following figure
3. In the right margin of the interface, the right key new –dword32 named Nocdburning. As shown in the following figure
4. Double-click to open the new nocdburning, modify the
In order to improve the user experience, many software including some well-known sites have adopted some add-ons, when users browse the page or use the relevant software, will pop up the need for you to install the control prompts. While this improves the user experience, it's not a good thing to have too much load in IE browsers.
Solving method
Start IE Browser, click the tool button on the top right, the gear looks like, and then click Manage Add-ins from the menu that pops up.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.