Detailed description of tools and applications in Windows XP

Source: Internet
Author: User
Tags windows support zip folder
Detailed description of tools and applications in Windows XP

Http://windows.chinaitlab.com/basic/42471.html

 

In order to allow your computer to play more functions, many users follow the principle of "to run fast, you have to graze it, "Fill" many third-party software in the computer. Among the many installed software, some of them do not need to be installed at all, because tools with similar functions already exist in Windows XP.

I. CD Burning

When burning a CD, many users often use professional recording software, such as Nero. In fact, a CD burning tool is integrated in Windows XP.

1. Burn a data disc

Place the recorder into the recorder, double-click the drive letter where the recorder is located, and drag and drop the file to be burned to the recorder.

Click the "write these files to CD" option in the "CD write task" task pane on the left, start the "CD write" wizard, and name the burning disc in the "CD name" box, click "Next" to write data to the recording disk.

2. Burn music discs

In addition to burning data CDs, we also plan to burn MP3 files into music CDs, which can also be directly performed in Windows XP.

Copy or drag an MP3 file directly to the drive letter where the recorder is located. Click the "write these files to CD" option in the "CD write task" task pane on the left to start the "CD write" Wizard, in the "CD name" box, name the CD.

Click "Next". In the displayed "do you want to generate a music CD" dialog box, click "generate a music CD" and click "Next" to call the Windows Media Player.Program(Hereinafter referred to as WMP), enter the "Copy to CD or device" window, click "copy" button to start music CD production.

Note: music CD is not burned in multiple segments, so files cannot be appended to the recorded CD. In addition, open the folder for storing music files and click the copy all projects to music CD option in the left-side "Music task" task pane to complete music CD creation.

Ii. File compression and decompression

When using a computer, File compression and decompression are the most common operations. Many users use third-party decompression software, such as WinRAR. However, if you are eager to extract a zip file from Windows XP but cannot find third-party software, is there any other way? In fact, in Windows XP, compressed files in ZIP format have been integrated with corresponding tools.

1. compressed file

Select the file or folder to be compressed, right-click the file or folder, and select the "send to → ZIP folder" command to automatically compress the file or folder.

2. decompress the file

When extracting a folder, we can select the compressed package, right-click it, and select the "extract all" command option. In the displayed extraction wizard, click "Next", click "Browse" in the displayed dialog box, select a storage path for the extracted files, and click "Next" to decompress the files.

However, what should I do if I only want to extract some files in the compressed package separately?

Double-click to open the package, select the file to be decompressed, and drag it to another folder to decompress the package. In addition, you can directly cut and copy files in the compressed package.

3. Miao Jian automatically decompress the package

The name of the compressed file generated using the above method is the same as the original file name, although it can be renamed after the compressed file is generated, but can we customize the name of the compressed file while compressing it? In addition, if third-party compression software is not installed in other operating systems, such as Windows 98, Can We decompress the package?

Under normal circumstances, if the operating system does not provide the decompression function or does not have third-party software, the file cannot be decompressed, but there is a file that can be decompressed, it is automatically decompressed package. If all the compressed files can be automatically decompressed, you do not need to decompress the software.

Click the "Start> Run" menu items, enter "iexpress" in the displayed dialog box, and press enter to display the "iexpress wizard (wizard)" dialog box.

Select "create new self extraction directive file (create a new self-extracting file)" and click "Next". In the displayed dialog box, select "extract file only (Extract files only) "option, click" Next. In the subsequent dialog box, enter the title of the compressed package and click "Next. In the displayed dialog box, select "No prompt (no prompt)" and click "Next. In the displayed dialog box, select "do not display a license (no license agreement is displayed)" and click "Next. In the displayed dialog box, click "add" to add all files to be compressed to the list box. Now, keep the default settings for all subsequent operations. Click "Next" to go to the archive storage dialog box.

Click the "Browse" button to name the package name and select its storage path. Select the "store files using long file name inside package (use a long file name in the package)" option, click "Next" to compress the file.

After the compression is completed, click the "finish" button. In the end, we can see a common compressed package for self-extracting in all Windows operating systems.

4. Set the password

For security reasons, it is best to set a password for a compressed package sent to a friend. You can also set a password for the compressed package in Windows XP.

Double-click the compressed package and click the "file → add password" menu command. In the "add password" dialog box that appears, enter the password and click "OK.

When you decompress or open the file in the compressed package, the system will prompt you to enter the password. Even if other compression software is used to decompress the compressed file, a password is required to ensure the security of the file.

5. compress the file in the NTFS partition

In addition, we can also use the NTFS disk format in Windows XP to compress files or folders.

Select a file or folder in the NTFS partition, right-click, select the "properties" command, and click the "General" tab in the displayed dialog box, click "advanced" to open the "Advanced properties" dialog box. Select the "compress content to save disk space" option and click "OK" to compress files or folders.

This compression operation is actually performed on the NTFS disk. When a compressed file is opened, the system will decompress it, and when it is closed, it will compress it, resulting in a reduction in system performance, therefore, we do not recommend that you use this method to compress files.

Iii. file encryption and decryption

Protecting file security is a top priority when using computers. To effectively protect the privacy of your files, many users use third-party encryption software to encrypt and decrypt the files. In fact, in Windows XP, using the nfts format disk partition feature and built-in functions, you can have a variety of methods to ensure file security.

Note: The following operations are performed on the NTFS partition.

1. Simple file encryption

In Windows XP, there is a folder that is located in "Documents and Settings" under the drive letter of the system. It is a folder named after the username of the system logon.

Select the file, right-click the file, select the "properties" command, and click the "share" tab in the displayed dialog box, as long as the "set this folder to private" option is selected, you can protect all files in this folder. Even the system administrator cannot open it. The "set this folder to private" option in other folder properties is unavailable in gray.

Tip: By using this method, each user can only protect the folder named by the user's user name, and cannot perform similar settings for folders named by other user names. A dedicated folder cannot be shared, but a shared folder cannot.

2. user permission Encryption

If multiple users share one computer and do not set up, the file security of different users will be compromised. Using Windows XP to grant different permissions to your files, you can flexibly and conveniently protect your files.

Tip: Windows XP uses simple file sharing by default. In this case, you cannot set access permissions for folders or files. You can double-click "my computer". In the displayed window, click the "Tools> Folder Options" menu command, click the "View" tab in the displayed dialog box, and remove the "use simple file sharing" option from the "Advanced Settings" list.

(1) understand different user types and permissions

Right-click "my computer" and choose "manage". In the displayed "Computer Management" window, double-click the "local user and group> group" option, multiple user groups are displayed in the window on the right. Each user group has different permissions.

The Administrator Group has full access control over the computers/domains. The backup operator group can back up and restore the computers without having to log on to or shut down them based on their file permissions, however, security settings cannot be changed. The power user group has most of the management permissions. you can install applications that do not modify operating system files and do not need to install system services, and run verified applications; the replicator group permission is to copy files within the domain. The user group permission can use most programs installed on the computer, but cannot install or delete other programs by yourself, and cannot install hardware, however, you can change the name and image of your account and change or delete the password of your account. The Guest group has the same access permissions as the "user group", but has more restrictions.

(2) Set User Access Permissions

How can we determine the permissions of different users to access folders on their own? In this example, the "DD" user in the user group is denied to access the folder.

Select a folder or file in the NTFS format partition, right-click it, select the "properties" command, and click the "Security" tab in the displayed dialog box, then, delete the user group in the "Group or user name" list.

Tip: if the item cannot be deleted, click the "advanced" button. In the displayed dialog box, "inherit the permission items that can be applied to sub-objects from the parent item, remove the items that are explicitly defined here, and click "copy" in the prompt box that appears.

Click "add" and add "DD" to the displayed dialog box. In the "DD Permissions" list, select "full control" in "deny, click "OK" to prevent the user from accessing your file.

You can set different permissions for other users or groups in the same way to meet different file access requirements.

3. Use EFs for file protection

EFS (Encrypting File System, encrypted file system) is a practical function unique to Windows 2000/XP. files and data on NTFS volumes can be directly encrypted and saved, this greatly improves data security.

(1) What is EFS encryption

EFS encryption is based on public key policies. When using EFS to encrypt a file or folder, the system will first generate a fek consisting of pseudo-random numbers (file encryption key, file encryption key), and then use fek and data extension standard XAlgorithmCreate an encrypted file, store it on the hard disk, and delete the unencrypted original file. Then, the system uses your public key to encrypt the fek and stores the encrypted fek in the same encrypted file. When accessing the encrypted file, the system first decrypts the fek using the current user's private key, and then decrypts the file using fek. When you use EFs for the first time, if you do not have a public/private key pair (collectively referred to as a key), the key is generated first and then encrypted. If you log on to the domain environment, the key generation depends on the domain controller; otherwise, the key generation depends on the local machine.

The EFS encryption system is transparent to users. That is to say, if you encrypt some data, your access to the data will be completely allowed and will not be subject to any restrictions. When other unauthorized users attempt to access encrypted data, they will receive an error message "Access Denied. The user authentication process of EFS encryption is performed when you log on to Windows. As long as you log on to Windows, you can open any authorized encrypted file.

(2) EFS encryption

Select a file in the NTFS partition, right-click it, select the "properties" command, click the "General" tab in the displayed dialog box, and then click the "advanced" button, in the displayed dialog box, select the "encrypt content to protect data" option and click "OK.

At this point, you can find that the color of the encrypted file name turns green. When other users log on to the system and open the file, a message "Access Denied" appears, indicating that EFS is successfully encrypted. If you want to cancel the file encryption, you only need to remove the "encrypted content to protect data" option.

(3) EFS decryption

What if other people want to share files or folders encrypted by EFS? After the system is reinstalled, the SID (Security Identifier) changes so that the files encrypted by EFS cannot be opened, therefore, to ensure that others can share EFS encrypted files or reinstall the system to open EFS encrypted files, you must back up the certificate.

Click "Start> Run" and enter "certmgr. MSC ", Press enter, and in the displayed" certificate "dialog box, double-click to expand the" Certificate-current user → personal → Certificate "option, the certificate named by your username will appear in the column on the right. Select the certificate, right-click the certificate, and select "all tasks> export" to open the "Certificate export wizard" dialog box.

When the wizard prompts "whether to export the private key with the Certificate", select the "yes, export private key" option, the wizard prompts you to request a password. For security reasons, you can set a secure password for the certificate. After selecting the saved file name and file path, click "finish" to export the certificate smoothly. A file with the pfx extension appears on the SAVE path.

To use the encrypted file after another user or reinstall the system, simply remember the certificate and password, right-click the certificate, and select the "Install Certificate" command, the certificate import wizard dialog box is displayed. By default, click "Next" and enter the correct password to import the certificate. Then, the encrypted file can be opened smoothly.

Iv. System Backup and Restoration

When the system crashes and cannot be started, you only need to back up some backup software, such as Ghost and recovery genie, in this way, the lost data can be retrieved again when a fault occurs. Many of our friends are very familiar with these commonly used backup tools. With these tools, our system is often at risk.

Do you have to use these third-party tool software? You can easily back up and restore your system by using the System Restoration function provided by Windows XP.

1. System Backup

Click "Start> All Programs> accessories> System Tools> System Restoration" to open the "System Restoration" dialog box, click "create restore origin", and click "Next. In the displayed dialog box, enter a descriptive text for the Restore point to help identify the Restore Point. Click "CREATE" to complete the creation.

2. System Restoration

After the Restore point is created, we can rest assured. When a problem occurs in your system, click the "Start> All Programs> accessories> System Tools> System Restoration" menu, in the displayed dialog box, click "Restore my computer to an earlier time" and click "Next". In the displayed dialog box, select the date when the restoration point is created in the calendar on the left, and all restore points created in this day are displayed on the right. Select the corresponding Restore Point, click "Next" to restore the system.

3. Restoration in special circumstances

The above is the process of restoring the system when the operating system can be normally entered. How can we restore the system if the system cannot be accessed? There are two scenarios:

(1) Security Mode

If the security mode is enabled when the system starts, you can restore the system in security mode to restore the system.

Click "Start> program> attachment> System Tools> System Restoration". In the displayed dialog box, click the "Restore my computer to an earlier time" option, click "Next", select a restore point in the displayed dialog box, and click "OK". The system restarts and restores the system.

(2) Use the command line

If the system cannot enter security mode, but you can still enter "security mode with command line prompts", you can enter "C: run the \ windows \ system32 \ restore \ rstrui "command and press enter (the drive letter of the system is drive C as an example). The system restore operation interface can also be opened to restore the system.

Tip: you cannot create a new restore point in the preceding two modes. During System Restoration, it is best to close all background running programs, such as anti-virus software and firewall.

4. Search for defective system files

Sometimes, some system files are damaged for unknown reasons, resulting in unstable system operation. If the system is re-installed or restored due to the defect of some files, it is indeed a bit of a sense of "killing chicken with a knife. In Windows XP, the "System File Checker" function can be used to easily deal with these problems.

Click "Start> Run", enter "cmd" in the displayed dialog box, and press enter to enter the "command prompt" window. Enter the "SFC" command at the prompt and press the Enter key to display the meaning of each parameter of the command.

For example, enter the "SFC/scannow" command at the command prompt and press Enter. Then, the "System File Checker" checks whether the current system file is damaged and the version is correct, if an error is found, the program requires you to insert a Windows XP installation CD to fix the problem or replace the incorrect file to ensure system stability.

V. Import and browse digital photos

After using a digital camera to take many excellent works, you usually install the application provided by the camera, and use the software to transmit digital photos to your PC, then use ACDSee and other third-party image View Software for browsing. In fact, you don't have to worry about it. simply use the "scanner and camera wizard" and "Image Browsing" functions provided by Windows XP.

1. easy import of digital photos

After the camera is powered on and the digital camera is correctly connected to the computer, the system will automatically pop up the connection dialog box, select the "Microsoft scanner and camera wizard" option, click the "OK" button, the scanner and camera wizard dialog box is displayed. Click "Next". In the displayed dialog box, select the image you want to obtain and select the saved folder for the photo.

If you want to delete an image from a digital camera after saving the image, you can select the "copy and then delete the photo from the device" option, click "Next" to import the photo from the camera to your computer.

2. Browse digital photos

(1) playback in the form of a magic lamp

Open the folder for storing digital photos, and you can see the "Picture Task" task pane on the left side of the dialog box. Click the "view as slide" option to play a photo in the form of a magic lamp. During the photo browsing process, you can find buttons in the upper-right corner of the screen for easy operation, such as playing, pausing, and closing.

Tip: If the left-side task pane is not displayed in the dialog box, click the "Tools> Folder Options" menu command and click the "General" tab in the displayed dialog box, in the "task" list, click the "display common tasks in Folders" option.

(2) browsing in thumbnail form

When you view a photo in a thumbnail, you can see the specific content of each photo. Double-click the corresponding photo to call the "Windows Image and fax viewer" that comes with the system for browsing. In this viewer, you can also rotate, zoom in, zoom out, and print the photo.

(3) branding photos of the Times

Right-click a photo and select a command from the shortcut menu. Click the "properties" command and click the "summary" tab in the displayed dialog box. You can enter the topic and Scenario Description of the photo in the corresponding section. Click "advanced" to view the EXIF information of the digital photo.

Various information about digital photos is recorded in EXIF, such as the camera manufacturer, camera model, pixel size, exposure value, white balance value, and other parameters. With these parameters, a photo printer that can read files in EXIF format can print the photos based on the parameters provided in the exif file, instead of using a computer to read the data.

6. Install the "cool" tool on the CD

Have you noticed the installation CD of Windows XP? It not only brings us Windows XP installation files, but also provides some tools not automatically installed by windows in the \ support \ tools directory, to provide additional solutions for system applications.

1. Install powerful support tools

Run the setup.exe or suptools. MSI file in the \ support \ toolsdirectory to install the support tool. During the installation process, you can select either "classic installation" or "full installation.

Tip: you can install 57 tools through "typical installation", while "full installation" will install 103 tools.

After the installation is complete, click "Start> All Programs> Windows support tools". There are three program items in the menu. Click "command prompt" to enter the command line. After the command prompt, enter the "dir" command to view many executable files of the exe, these tools are supported by Windows XP.

However, not every tool has a graphical user interface. Some tools must be run from the command line. The running mode of such tools is usually controlled by command line parameters, enter the program name of a tool and add "/? "Parameters to get the list of command line parameters and their usage instructions.

Because Windows XP supports many tools, we cannot list them one by one. Here we will introduce several commonly used tools to help you.

2. Anti-Installation Tool

When uninstalling some programs, we sometimes find that some programs cannot be fully uninstalled, and there may also be error prompts, system crashes, and other phenomena. These problems occur mainly because the program itself is not fully installed or the program file is damaged, and thus the anti-installation program cannot be executed.

If you delete all the installation directories of the program, but the key values of the program exist in the Registry, the above problems may still exist. How do I clear these programs? Many users use third-party anti-installation software to uninstall them. In fact, the msicu.exe?msizap.exe tool in the Windows XP support tool can help you.

(1.exe use msicuu.exe for convenience

Open the support tool installation directory (c: \ Program Files \ support toolsfolder, double-click the msicuu.exe file, open the "Windows Installer Clean Up" dialog box, in this dialog box, we can see the list of programs installed in the system, select the programs to be deleted, and click the "rmove (delete)" button to help you clear the problematic programs.

Note: When msicuu.exe is used, you must log on as an administrator. Otherwise, an error message is displayed.

(2) Command Format anti-Installation Tool

Click the "Start> All Programs> Windows support tools> command prompt" menu, enter "msizap" at the command prompt, and press the Enter key to view all available command line parameters of msizap.exe. Here, we will delete Office 2003 as an example.

Click "Start> Run" and enter "Regedit" in the displayed dialog box. Press enter to open the Registry Editor and go to HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Uninstall, in the following items, it is found that its identifier is {90110804-6000-11d3-8cf-0150048383c9 }.

Return to the Command Prompt window and enter the "msizap t {90110804-6000-11d3-8cfe-0150048383c9}" command (double quotation marks are not included in the input) to delete Office 2003.

Note: msizap.exe may delete some system files, so msizap.exe can be used only when "add or delete programs", such as "、msicu.exe, are ineffective.

3. Search for duplicate files in the disk

There are always some duplicate files in the computer. On the one hand, these files are not easy to manage, and on the other hand, they will waste some space. There are many third-party software related to searching for duplicate files, and a small tool named dupfinder.exe was created early in the support tool.

Double-click the program in the installation directory of the support tool (c: \ Program Files \ support tools) to open a graphic window, in the search in (Search) enter the corresponding partition drive letter or path in the "column, and then click" Start search ". You will soon be able to find many duplicate files. Click the "file" menu to select the corresponding options in the Open menu list and perform operations according to different requirements.

Tip: for the sake of security, you can repeat the file re-command or move the operation. It is recommended that you delete the file after the system is restarted and all operations can still run normally.

4. file comparison

Are the duplicate files found in the above operations exactly the same? A file named windiff.exe is available in the support tool to give you a clearer understanding. Windiff.exe compares the files or files in two folders with ASCII codes to find out the differences between the two.

Start the program and you will see a graphic window. Click the "File> compare files (compare files)" or "File> compare directories (compare Directories)" menu command, select two files or folders to compare them.

Click the "Expand (details)" button to view more detailed comparison results. For the differences between the two files, the first file is marked in red foreground, and the second file is marked in yellow background.

5. view more detailed file attributes

For file attributes, you can also view the command files in the support tools.

In the support tool installation directory, double-click vfi.exe to open this visual file information tool. Open the "file" menu and select a file or folder from the drop-down list to view the details of each file, this includes the file name, extension, creation date, modification date, version, language,CodePage.

Click the "Touch" button to display a calendar and clock. You only need to set the date and time information, and click the "OK" button to change the original file creation date, very convenient.

6. Make Windows XP compatible with more programs

In the process of using Windows XP, some old programs cannot be well installed and run in the system environment, which is indeed a pity. However, you can access the support \ toolsfolder on the Windows XP installation CD, double-click the act20.exe file, and install the application compatibility Toolkit (Application compatibility Toolkit) to solve these problems.

Run the executable file of the installation directory to simulate other operating systems on Windows XP, such as Windows 9x and Windows 2000, in this way, you have cheated on programs that cannot be installed or run on Windows XP, so that they can be installed or run smoothly.

Go to the installation directory of application compatibility toolkit, and you can see that there are three applications: Compatibility administration tool and application verifier1_qfixapp.exe. You can perform compatibility tests on applications to varying degrees. In this example, qfixapp.exe is executed.

Double-click qfixapp.exe to open the main interface of the program. Click "Browse" and select the executable file to be run or installed.

Click the "layers" tab, select a suitable operation environment option, and click "run. If the program still cannot be installed or run, click the "fixes" tab to select or cancel the options until the program can run. Because the setting project is very professional, if you are interested, try it.

There is also a cab compressed file named deploy under the Support \ tools directory of the installation disc. After it is decompressed to a temporary directory, the setupmgr can be used to create a response file for unattended automatic installation. You can set the information to be answered during the installation process and make it into a file, which is called a response file. The installer can call the generated response file to enable unattended automatic installation.

7. Magic of "Toys" -- powertoys

To enhance the functionality of Windows XP, Microsoft provides an enhanced tool set-powertoys for Windows XP (hereinafter referred to as powertoys ). With this, we can easily set some functional settings for Windows XP.

However, for powertoys, Microsoft did not provide the Chinese version of this version, and the new version of the tool needs to be downloaded and installed one by one. However, we can use the Chinese version of the complete Toolkit (Http://cnno1.ys168.com/).

Tip: when installing the powertoys advanced version, you must uninstall the earlier version before installing it.

1. easily change the image size

How can I replace a 1024x768 image with a 800x600 image? Many friends mostly use third-party software such as Photoshop and ACDSee. Modifying a single image is not difficult yet, but if you want to modify a lot of images, this method will be a little hard-working. With powertoys, there will be no more troubles.

Select all the image files to be modified, right-click them, and select the "change image size" command to go to the image modification dialog box, and click the "advanced" button, in the displayed dialog box, you can select an image size as needed. You can also enter a custom value in the "Custom" box. If you select the "change image size" option, the original image will be overwritten with the modified image. Otherwise, a new image file will be generated, and the "decrease image size" option will be selected, this will reduce the size of a large image, but the size of a small image will not grow.

2. Create an HTML slide

I have taken many digital photos. If I want to share these photos with other friends, I have to send them to them. However, this makes me feel new, and it is not very convenient for my friends to browse. When you plan to publish these images to the Internet, you must understand the basic knowledge of creating webpages. This will undoubtedly cause a lot of trouble for new friends.

In fact, with powertoys installed, you can easily create HTML slides, which not only makes it easier for friends to browse, but also can publish them online, let people all over the world see your masterpiece.

Click the menu item "Start> All Programs> powertoys> HTML slide creation wizard" to start the creation wizard. When running the wizard, click "add file" or "add folder" to add images. In the "options" dialog box, you can set the image size, playback type, and storage path as needed, and click "Next" to create the slides.

Click default.htm in the saved directory to view your own HTML slides.

3. Use tweakui to optimize the system

Tweakui is a system optimization tool launched by Microsoft. In fact, after you install powertoys, it is located in the powertoys program group. Click "Start> All Programs> powertoys> tweakui system settings" To Go To The tweakui Settings dialog box.

(1) make a worry-free mouse

When multiple pages are enabled on the desktop, you can click the corresponding page to switch between different windows. Can I switch without clicking the mouse?

Expand the "Mouse" option in the left-side list of the settings window, click the "x-mouse" option, and select the "Activate mouse" and "automatically activate window" options in the right-side window, respectively, click OK.

When you move the mouse over a different window page on the desktop, you can find that the mouse appears at the beginning of the window.

(2) remove the "little tail" of the shortcut"

There are always ugly "little tails" in those shortcuts. In the past, everyone used to remove them by modifying the Registry. Modifying the registry is dangerous and inconvenient, in the tweakui settings window, you can easily remove it.

Expand the "Resource Manager" option in the left-side list of the settings window, click the "shortcut icon" option, select the "no arrow" option in the right-side window, and click "OK.

(3) Hide the drive icon

To ensure security, we often hide some drives that store important data. The hiding method is nothing more than modifying the registry and using third-party software, and using tweakui can also easily hide these drive icons.

Click the "my computer" option in the list on the left and click the "Hard Disk" option. All drive letters in the system are displayed in the window on the right, removing the drive letter to be hidden, click OK.

(4) hide important options in the control panel

The control panel is very powerful and can be used to make multiple modifications to the system. This is precisely because, in order to prevent others from modifying their systems through the options in the control panel, it is necessary to block some important options. Here, we take the "System" shielding option as an example.

Open the "control panel" option in the list on the left. Multiple project options appear in the window on the right. Remove the "sysdm. Cpl" option and click "OK.

4. One Machine for four purposes

Have you ever thought of seeing four different desktops on a single display and performing different operations on each desktop? If Windows XP does not have multiple users, if a single user exists, other users can perform different operations on different desktops. Let everyone do their jobs and do not interfere with each other. Isn't it beautiful? The virtual desktop function in powertoys can help you.

Right-click the system toolbar and choose "toolbar> msvdm" to view the added virtual desktop button in the taskbar, the buttons from left to right are the overall preview button, 1 ~ The quick switch button on the desktop on the 4th. When you click the preview button, you can see the overall screen of the four desktops. Click the corresponding window to enter the corresponding desktop environment. You can perform different operations on different desktops without worrying about mutual interference. At the same time, you can avoid desktop congestion.

Click the "msvdm" button in the taskbar and select the "Configure desktop images (configure desktop images)" command to open the "Change desktop background" dialog box, next, you can select an image in the "desktop background" list to change the background of the four desktops as you like.

When you select the "shared desktop" command, you can use the Alt + TAB keys to quickly switch between virtual desktop environments. Select "show quick switch bottons (show quick switch button)" to display the Quick Switch buttons for these virtual desktops in the taskbar.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.