removed, with Notepad to open it, the contents of the
[Boot Loader]timeout=30Default=D:\[Operating Systems]D:\="Microsoft Windows 2000 Professional"multi(0)disk(0)rdisk(0)partition(2)C:\="Microsoft Windows 98" /fastdetect
To
[Boot Loader]timeout=0Default=C:\[Operating Systems]C:\="Microsoft Windows 98"multi(0)disk(
In theory, pure 32-bit Windows 2000 does not panic, but that's only theoretically. A virus or hardware and hardware driver mismatch causes Windows2000 to crash, and when Windows 2000 crashes, the monitor screen turns blue and the Stop failure message appears. Below we introduce the general stop fault handling method an
Yesterday, many machines were changed to the administrator password. This search on the Internet finally found the easiest and most convenient solution.
The first thing we should talk about is not to trust any so-called online collections and cheats. As long as you do not have to operate and practice it yourself, do not trust the so-called online skills. Yesterday is an example, after reading an article, I deleted the Sam file from a computer on the Windows
With the rapid development of the Internet and the increasing demand for mobile office, more and more people want to remotely access the LAN located in the company. Thus, remote access technology emerged. Next we will discuss how to implement remote access service-ras in a Windows 2000 network ).
The remote access service is a standard C/S mode (Client/Server) service, divided into two parts: remote access
To view this type of files, you need to set to show hidden files. The specific settings are as follows:Open the Control Panel (classic view)-> Folder Options-> View-> advanced settings, and deselect the "Hide protected operating system files (recommended)" check box )", replace "hidden files and folders" with "show all files and folders", and leave.
The "[user name]" in the following section is the user name currently logged on, usually as administrator.
20
"Open Parent Path" is the concept started in Windows 2003, before Windows XP, Windows 2000 brought IIS is not "Windows 2003" this argument. The default setting for Windows 2003 IIS6.0 after installation is not to open the parent
Recently installed the server version of Windows 2000, when not installed Active Directory, access to Windows about 1.5 (my machine configuration is k6-2 64M memory hard disk is the West number of WD205BA). Because of DCOM, active Directory is installed. As a result, it took about 10 minutes to get into windows, and he
What is data compression?
Here, data compression is the Windows 2000 built-in characteristics on NTFS partition. in theory, compression works by replacing character characters of repeated information with a few characters, and transmitting only one copy of Repeated sequences of data. it is not a tool, such as WinRAR or WinZip, but built-in characteristics on NTFS partition.
Data Compression is used to st
As a network administrator, do you know what is happening on your host or server--who has visited it. What they have done. What is the purpose. What the. You don't know. In fact, Windows 2000 to provide us with a security audit function, we do administrator this line, the most need to be familiar with this function, otherwise you how to tube it. Security audits can record several security-related events in
First, security policy
It is well known that the Windows 2000 system itself has many security vulnerabilities. Patching is a way to reduce most vulnerabilities, but it does not eliminate small vulnerabilities, which are often important ways to attack or invade. The "Local security policy" that comes with Windows 2000
It is believed that most of the people currently using the ASP version are built in the IIS3.0 or IIS4.0 in the ASP2.0, server platform is also more NT4.0, with Windows 2000 will be in February 17, since the previous magazine media has been reported on Windows 2000 expansion of server performance and versions (server v
First, Introduction:
A security template is a new feature of Windows 2000. It is a physical representation of the security configuration, consisting of a file (. inf) of the security properties supported by Windows 2000. It organizes all existing security attributes into one location to simplify security management. Se
Monitor and manage TCP/IP in Windows 2000 pro
Monitor and manage TCP/IP in Windows 2000 pro
Http://ct.techrepublic.com.com/clicks? C = 448961-55382566 brand = techrepublic Ds = 5 FS = 0
By Jim BoyceBy Jim BoyceTranslated by endurer 2005.09.13
Keywords:Operating systems | Windows
I purchased a new founder computer (configured as 2.8GC/512 MB/120 GB), installed Windows 2000 operating system and Norton Antivirus software, and installed Shock Wave patches. I often went online (1 ~ 2 hours) sudden shutdown and restart, no prompt. I thought that I had just got a virus and got a trojan while surfing the Internet. I did not agree that Windows
How to block CTRL + ALT + DEL in Windows NT/2000Author: ac952_z_cn
PrefaceIn Windows 9x, we can use systemparametersinfo (spi_screensaverrunning, 1, null, 0); To block CTRL + ALT + DEL, but it does not work in NT/2000, even the wh_keyboard_ll low-level keyboard hook cannot be intercepted! By replacing Gina DLL, the function of blocking CTRL + ALT + DEL
Oracle|window
How to Kill a single Oracle thread in a Windows 2000 environment
Source: http://metalink.oracle.com
Key word: Oracle Thread Kill
Description: This article describes the use of Orakill tools in Windows environments
Body:
Have you ever experienced anything like this? A user process that consumes resources for a long time without releasing it ca
( SQL 2000 is installed in Windows 2003, there are no 32-bit and 64-bit points for 03 systems)(32-bit system needs to restart the machine, 64 not required)Download the database at the siteTwo folders after decompressionInstall first SQL2000 Step 1: Double-click the Autorun.exe file in the root directory of the disc.Click to start the installationIf the installation continues, there will be an error.Follow t
connection and management through the management unit of Internet Information Service. (System Service)Tlntsvr.exe allows a remote user to log on to the system and run the console program using the command line. (System Service)
Allows you to manage web and FTP services through the management units of Internet Information Services. (System Service)Tftpd.exe implements the TFTP Internet standard. The user name and password are not required for this standard. Part of the Remote Installation servi
Computer security includes not only protecting your computer's local data, but also securing your data on your network. A good operating system can identify people who attempt to access computer resources, prevent specific resources from being inappropriately accessed by users, and provide users with a simple and efficient way to set up and maintain the security of the computer.
Currently, PC users are often windows, compared to previous versions,
With the rapid development of the Internet and the increase of people's demand for mobile office, more and more people want to have remote access to the intranet within the company, and the remote access technology comes into being. Let's discuss how to implement the remote Access Service in a Windows 2000 network (remote Access Service-ras).
The remote Access service is a standard C/s mode (client/server)
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.