copied and pasted to achieve. I suggest that Microsoft's design experts, in this respect can be more humane point. Finally, this information can be exported directly to a text file in this window or directly to a copy and paste operation. Instead of opening the log file to perform these behaviors.
Also note that the tool does not repair itself to problematic files. So running this tool does not require administrator privileges. That is, ordinary users can also run the program to check if the s
you, Let's search your 200 buyers for cold words. You can take a look at the following table:
All I'm saying is that these 302 search all sources with two words, cold word, any optimization software on the hot Word lookup will not appear these two words, and it is the two cold words, let me 20th-26th this week to deal 31 orders, all 100 yuan of casual shoes, Even in the shop most of the current deal or the former agent of cheap canvas
what we are talking about. Span > : Sweet fan single shoes, sandals, small heels ~ The shoes of all these styles have been quickly collected. Sweet fan single shoes, sandals, small heels ~ These styles of All-tao single shoes quickly accept sweet fan single shoes, sandal
result set (XP Professional Edition) rsop. MSC
Scanner and camera sticpl. CPL
Task Scheduler control schedtasks
Windows Security Center wscui. CPL
Services. MSC
Shared Folder fsmgmt. MSC
Disable Windows Shutdown
Audio and audio device attributes mmsys. CPL
Spider games
Cliconfg
System Configuration editor sysedit
Msconfig
System File Check Tool (scan now) SFC/scannow
System File Check Tool (scan next time)
window .. ex _ c: windowssystem32Rundll32.exe (x indicates the drive letter, rundll. ex _ indicates the file to be decompressed. c: windowssystem32 indicates the target folder, which must be determined based on the actual situation) to restore the lost file to the system. Of course, you can also copy the file directly from other normal machines to the corresponding directory of the local machine.
In addition, you can use the Regsvr32 program file to restore the lost dll link file. During restor
.. ex _ c: \ windows \ system32 \ rundll32.exe (X represents the drive letter, rundll. ex _ indicates the file to be decompressed. c: \ windows \ system32 indicates the target folder, which must be determined based on the actual situation) to restore the lost file to the system. Of course, you can also copy the file directly from other normal machines to the corresponding directory of the local machine.
In addition, you can use the regsvr32 program file to restore the lost DLL link file. During
installed)
Quicktime. CPL
Region and language options
Intl. CPL
Registry Editor
Regedit
Registry Editor
Regedit32
Remote Desktop
Mstsc
Removable Storage
Ntmsmgr. MSC
Removable Storage Operation Request
Ntmsoprq. MSC
Rule result set (XP Professional Edition)
Rsop. MSC
Scanners and cameras
Sticpl. CPL
Task Plan
Control schedtasks
Center wscui. cpl services. MSC shared folder fsmgmt. MSC disables the audio and audio device attributes of Windows Shutdown mmsys. cpl spider game spider SQL client network utility cliconfg System Configuration editor sysedit System Configuration Utility msconfig System File Check Tool (scan now) SFC/scannow System File Check Tool (SCAN upon next startup) SFC/scanonce System File Check Tool (SCAN upon eac
). After you press enter, the file will be registered in the Registry, and then click "OK" in the pop-up dialog box.
2. dll file recovery
The DLL file name is a dynamic link library file, which is usually stored in the windowssystem32 folder. The file is lost or replaced, and can also be accessed to Windows, however, system errors often occur during application execution. This error can usually be caused by SFC (System File Checker ).
, or the firewall policy is incorrect, you can try to check the policy, reduce the firewall security level, or directly turn it off and try to restore the normal state.
V. network protocol and NIC Driver Problems
IE cannot be browsed. It may be caused by network protocol (especially TCP/IP Protocol) or network card driver damage. You can try to re-drive the network card and network protocol.
Vi. HOSTS file Problems
The modification of the HOSTS file also causes abnormal browsing. The solution is
, the security level is too high, IE is accidentally put into the blocked access list, or the firewall policy is incorrect, you can try to check the policy, reduce the firewall security level, or directly turn it off and try to restore the normal state.V. network protocol and NIC Driver ProblemsIE cannot be browsed. It may be caused by network protocol (especially TCP/IP Protocol) or network card driver damage. You can try to re-drive the network card and network protocol.Vi. HOSTS file Problems
KeyboardMsAC3Decoder(If you have already installed) ac3filter.cplPassword propertiesPassword.cplPerformancePerfmon.mscPerformancePerfmonPhone and Modem OptionsTelephon.cplPower Options PropertiesPowercfg.cplPrinters and FaxesControl printersPrinters FolderPrintersTrueTypeWord-font procedureEudceditQuicktime (If you have already installed) quicktime.cplRegional and Language OptionsIntl.cplRegistry EditorRegeditRegistry EditorRegedit32Remote DesktopMstscRemovable StorageNtmsmgr.mscRemovable Stora
problem of network firewall If the network firewall is set improperly, such as high security level, accidentally put IE into the block access list, the wrong firewall policy, etc., you can try to check the policy, reduce the firewall security level or directly turn off the test to return to normal. Five, network protocols and Nic-driven problems IE can not browse, there may be network protocol (especially TCP/IP protocol) or network card driver damage caused, can try to reconnect the network
documentation
When the system files related to IE are replaced or damaged, it will affect the normal use of IE, you can use the SFC command to repair, the WIN98 system in the "run" to perform SFC, and then perform a scan; win2000/xp/2003 performs SFC in "Run"/ Scannow try to fix it.
In which only IE can not browse the Web page, and QQ can be on, it is often du
, accidentally put IE into the block access list, the wrong firewall policy, and so on, you can try to check the policy, reduce the firewall security level or directly turn off the test is back to normal.
V. Network protocols and Nic-driven issues
IE can not browse, there may be network protocol (especially TCP/IP protocol) or network card driver damage caused, can try to reconnect the network card driver and network protocol.
Vi. issues of the hosts document
The Hosts file is modified, will
, the wrong firewall policy, etc., you can try to check the policy, reduce the firewall security level or directly shut down the test is back to normal. V. Network protocol and NIC driver issues IE cannot be browsed, there may be network protocols (especially TCP/IP protocol) or NIC driver corruption, try to re-network the NIC driver and network protocol. Vi. issues with the HOSTS file HOSTS The file is modified, it will also cause the browsing is not normal, the solution is of course empty HO
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.