prompts the Windows master process to stop working when the computer is in normal use
1, open the C disk--windows--system32;
2, find rundll32.exe documents;
3, right click Rundll32.exe, select "Properties"
4, click to switch to "security";
5, click the "Edit" button;
6, check Full Control-Allow, click OK;
7, or from other normal
A few days ago with Java JMF to open the camera, now I use OPENCV to open the camera. Here is the specifics of the operation
1. Download and install OpenCV
Download the OpenCV version of Windows opencv.org on the official website. (i downloaded the opencv-3.1.0.exe), download after the installation of automatic decompression, choose the installation location on the line.
2. Configure Environment variables
Compute
the installed driver, the above driver information back to the installed version, verified that my computer restarts, plugged into the USB to serial cable, can be used normally. 650) this.width=650, "width=" height= "src="/e/u261/themes/default/images/spacer.gif, "style=" Background:url ( "/e/u261/themes/default/images/word.gif") no-repeat center;border:1px solid #ddd; "alt=" Spacer.gif "/>650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M02/72
Set the keyboard to boot to protect the computer from being used First, you should carefully read the motherboard manual and patch the patch cord on the motherboard ( KeyboardPowerOnSelection ) To enable the keyboard boot function of the motherboard. And then the motherboard Bios " IntegratedPeripherals ", Usually two parameters need to be set, one is" P OwerONFUnction "Should be set to" E Nabled ", The other is" KBPOwerONPAssword ", Ente
For a friend who has become accustomed to using shortcuts, it should be a scary thing to find out when a shortcut key that is often used is not working. This is not, today in the forum to find a friend in this and feel depressed, win+e key combination, while pressing the equivalent of double-clicking the computer icon, That is to open the computer database, we are a lot of things should be stored in it? Do
First we need to turn on the mobile phone's Bluetooth personal hotspot.
We paired the Bluetooth with the mobile phone and connected it.
Locate the Bluetooth icon at the bottom right of your computer's desktop.
We click on the right button to choose to join the personal area network.
We right-click on the list of devices and choose to use when connecting.
At this point you can see the network has been successfully connected to the lower
Q: My computer is always in the process of being used, but the monitor power LED is still lit. Power on again, sometimes no response, sometimes the operating system can normally start, but not long, the power is automatically closed. Sometimes the operating system restarts automatically every two minutes, but immediately loses power. Sometimes the boot one hours does not appear this situation. In addition, the power to the other machine to try and no
Article title: use sshfs to Mount hosts all over the world to your computer. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
If you use sshfs to Mount hosts all over the world to your comp
Brief introductionThis article describes how to use C # code to get your computer off, restart, logoff, lock, Hibernate, sleep.How to implement first, use the using statement to add the namespaces we need:
usingSystem.Diagnostics;
usingSystem.Runtime.InteropServices;
ShutdownThe code is as follows:
you use an external microphone for voice input to achieve the best recording effect.
3. Voice Input mode
Message Fly Enter the default for you to open the quiet mode, you say after a sentence, to be successful return to the words you just finished, you can continue to say a word, the process is as follows::
In general, when you use the comput
A variety of small problems in their own use process continued to updateHttp://jingyan.baidu.com/article/624e74598306c334e8ba5a00.html follow this, but this is older.I write something attached, not the same place I would sayWrite f/q.1. Said L make Ubuntu ivecd or U disk start (Note: U disk start requires a U disk, a mobile hard disk U disk equivalent to the installation program, mobile hard disk equivalent to the installation of the completed program
How to use the speech function of the computer version of the message flying method
When the input method is set to fly Input method, you can click on the status bar of the Voice input button (shortcut key: F6), after the click Will pop. Voice input is spoken to the microphone at this point. Click the X button (shortcut: ESC) to close the speech bar.
When you first enable speech, you can adjust your recor
Win7 System computer keyboard SCROLL LOCK SCROLL LOCK key how to use?
The specific methods are as follows:
1, first scroll LOCK button in the upper right of the computer;
2, Scroll lock button name called ' Lock rolling Screen ', in fact, is to lock the mouse cursor;
3, first need to open the file can be read, and press the SCROLL LOC
1. Establish a good safety habit. Do not open a number of unknown messages and attachments, do not go to a few unfamiliar websites, do not perform the download from the Internet without anti-virus software processing files, these can ensure that your computer is more secure.
2. Frequently upgrade security patches. Most network viruses are transmitted through system vulnerabilities, such as Shockwave, Shock Wave, and so on, it is recommended that user
As a novice in the IT industry, I prefer to search for something that is helpful to me, below is an example of shutting down with this machine's DOS command:Open the Run window with window+r, enter CMD, enter the console, find the relevant command of shutdown, enter Shutdown.exe, you can seeHow to use the following commands:The commands you can enter are:Shutdown-s-T 3600 (6 hours after shutdown)Shutdown-a (cancel your settings)At Shutodwn-s (turn off
expire-this is different from the traditional HTTP Cookie. Bytes
◆ I have found two locations on the local system. the SOL file is % user profile % Application DataMacromediaFlash Player and % user profile % Application DataMacromediaFlash Player # export dobjects \. Here, % user profile % indicates the user folder directory, generally, C: Documents and Settings \ is used in XP \. For the Vista system, you may also pay attention to the Roaming folder under the % user profile % directory. Bytes
Mac users know that every time the computer is turned on or restarted, there will be a very special boot tone. If you want to temporarily prohibit the start-up tone, one way is to always hold down the keyboard mute button, of course you can also use the following method of using terminal commands:Open the terminal, enter the following command and return, to disable the boot tone:sudo nvram systemaudiovolume
We often need to upload new photos of our mobile phones to our computers for backup, or we need to send e-books, video content, and some text messages to our phones for use on our computers. The use of the network disk needs in the mobile phone and computer installation of the same network disk after the landing synchronization, cumbersome procedures. The data li
tutorial on the use of the ping command for Apple Mac computer
1, first we want to open "terminal", in the Finder, open one click "Finder"-"Application"
2, find "utility" in the application, and use the left mouse button to click it into the "utility", utility in the right side of the window, compare the position below!
3, generally, in the "util
want to let others see the information put in!
Running: cmd
Type: attrib +s +a +h +r Then, you go back to see the e Disk Bak directory, there are tools this folder!
This is true to hide, whether or not you show hidden files, this folder is not visible
What do you do when you need a visit?
Open My Computer---type e:baktools to enter directly, on condition that you have to remember your own hidden folder name (remember)
Now you need to cancel t
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.