Method/Step
1.Windows Genuine authentication Notification (Windows Genuine Advantage)
Windows Genuine Advantage (also known as Microsoft's Genuine validator) in Vista is intended to determine whether the Windows system installed on your computer is genuine and to remind you to take action, that is to say, to resist piracy. If WGA detects that the system you are using is not a genuine system, it will take a series of measures against your system. In earlier versions of WGA, it would have been a direct denial of your right to access the system, which was a bit sensational, wasn't it? Now, WGA is no longer "harsh", and if the target user's computer is a pirated version of Windows, it pops up every time you start a user who is a victim of pirated software, and 5 seconds before you can choose to process later. Although it is possible to cancel the window by setting it, it does not cancel the verification icon on the tray after the boot, unless the user buys a genuine Windows key, the verification icon will always exist. Nevertheless, the real master knows how to avoid WGA harassment, so fundamentally, it has no purpose of existence. In general, WGA is a very impractical feature, and Microsoft should eliminate this annoying feature in Windows 7.
2. Registration Form
The Windows Registry is a central, hierarchical database used in Microsoft Windows 9x, Windows CE, Windows NT, Windows 2000, Windows XP, and Windows Vista for storage for one or more users, The information required by the application and hardware devices to configure the system. The registry contains information that Windows keeps referencing during run time, such as each user's profile, the applications installed on the computer, and the document types that each application can create, the folder and application icon's property sheet settings, what hardware is present on the system, and which ports are being used. The registry is a set of files that control the appearance of the operating system and how to respond to external events. These "events" range from directly accessing a hardware device to the interface how to respond to a particular user to how the application runs, and so on.
When a user prepares to run an application, the registry provides the application information to the operating system so that the application can be found, the location of the correct data file is specified, and other settings can be used. The registry holds location information about the default data and secondary files, menus, button bars, window state, and other optional options. It also saves the installation information (such as date), the user installing the software, the software version number and the date, the serial number, and so on. Depending on the installation software, the information it includes is different.
Therefore, the registry is a huge data repository, which stores the operating system, the application of the various information required to run, without it, the entire system will be paralyzed. When you use an application to modify the behavior of Windows, it actually modifies the registry at the bottom of the list. However, if you want to make a lot of changes to the system, then you have to directly edit the registry, which is a very cumbersome and highly dangerous things. Because, a little careless, you will make a mistake, and a small registry error may cause the entire system to crash. Other operating systems, such as Apple's Mac OS x and open source Linux, do not have the concept of a registry, and they perform very well. Microsoft should also consider abandoning the registry because it has caused too much disaster for Windows systems.
3. ActiveX control (ActiveX Controls)
ActiveX is a technique that allows Web authors to embed small programs into web pages or other interfaces to provide additional functionality. These embedded programs are called ActiveX Controls. Developers can use any programming language that supports Microsoft Common Object model to create ActiveX controls. On the Internet, the characteristics of the ActiveX plug-in software is: The general software requires users to download and then perform the installation, and ActiveX Plug-ins is when users browse to a specific Web page, ie browser can automatically download and prompts the user to install. A prerequisite for an ActiveX plug-in installation is that it must be approved and validated by the user.
Although the ActiveX control is powerful, it does not support other browsers. And, it is very unsafe, easy for hackers to use as an attack system of a very effective means, the use of ActiveX control virus transmission examples are countless. ActiveX controls, while prevalent, will never be long-term. Because of the rise of Ajax and Web 2.0 technologies, many Web sites are created in both ways, so it is clear that even without ActiveX, very complex applications can be made available through browsers. Under pressure from outside, Microsoft should stop using this technology.
4. User Account Control
User account controls (UAC: User Accounts control) is a new technology introduced by Microsoft in Windows Vista to improve system security, requiring all users to run programs and tasks in standard account mode to prevent unauthorized programs from being installed. and prevents standard users from making improper system setup changes. At first, this feature was called User Accountprotection, which was later renamed as the current user Account Control.
UAC is primarily used to troubleshoot users who log on as administrators. Because some system functions or programs need to operate as administrator, many users, including IT specialists, log on to the system as an administrator, which poses a lot of problems for system security. Microsoft has also tried to solve this problem in previous operating systems, and now UAC allows users to log on as an administrator, but performs most of the work with normal user privileges, and the system promotes the user's operational rights when they try to perform actions that require higher privileges.
While user Account Control provides security to the system, the cost of this security is too high, and you need to endure it over and over again---no meaningful pop-up windows and absurd interrupts. This is a huge inconvenience to users, and Microsoft should consider masking this feature in Windows 7.
5. Windows Conference Centre (Windows Meeting Center)
The Windows Conference Center is a new feature in Windows Vista that many users don't even know about. Even if you know that there is such a function, you may never have used it. The Windows Conference Center can be understood as a virtual conference room on the Web. Through the program, we can create a password-protected virtual space on the Internet, to accept visits from friends or colleagues, in this virtual space, you can share applications, shared files, file modifications and other operations.
But there is no whiteboard in the Windows Conference Center, and chat mode is worthless and does not support VoIP, so who will use the conference center? There should be no more of this function in Windows 7.
Note : More wonderful tutorials Please pay attention to the triple computer tutorial section, triple Computer office group: 189034526 welcome you to join