Windows Vista system disk decryption: Users folder

Source: Internet
Author: User

From XP to Windows Vista, every loyal friend of Windows will be curious to observe and play with every inch of the skin of the next-generation operating system Vista. She is like a newborn, filled with fresh blood and distinctive places, but he is also like a mummy, always keeping the complete genes of the Windows family.
Today, let me take you through the mysterious system partition (drive C) in Vista. Let's talk about "C: Users" first ".

"C: Users", you can see the file path that stores user information and related program information in the system file. In Vista, this folder has many potential modifications compared with the previous generation of systems, making the Organization of user data more secure and logical, in addition, it can access user data through security intelligence in many places on the network. In addition, there is a high-level Public folder, which replaces the location of shared folders in "My Computer" in XP. The Public folder is the place where resources are shared in the local network. It provides public folders for favorites, documents, downloads, music, pictures, videos, and recorded TV programs. This is also a major modification of Vista over the previous generation systems. In "C: Users", Microsoft basically separates the areas that allow the program to write data from the areas in the program storage. This can effectively prevent malicious script files or malicious executable files from being created by hackers.

"C: Users USERNAME \" usually contains these files by default. The following describes the folders.

The "start" menu stores the shortcut icons of the user's Start Menu-all programs that are not installed by default, hidden by default.

"AppData" and "Application Data" store temporary Data of the user program. That is, the software you have installed and the configuration files. Including shortcuts in the taskbar and some input files. The contents in this directory vary depending on the software used in your system. Therefore, to facilitate system installation, you can back up related items in the folder before installing the new system. For example, Application DataMicrosoftInternet assumerquick Launch contains a row of shortcut files on the right. There are also unnecessary buffer files, for example, all files in Microsoft tofficerecent can be deleted. The former will increase the volume of "AppData" with the extension of the system usage time, and the author will be very large, with 1.2 GB, and the size of new users is about 20 mb. Both folders are important. deleting them at will make many applications unavailable. However, you can use a lot of junk cleanup software to clean up and lose weight. Hidden by default.

Cookies are also called cookies. Browsers are stored in folders on your computer. Cookies are a data card used to record the user's personal data, the information of the computer system used, and the webpages browsed by the user. . This is equivalent to sending a membership card to the new visitor. When the user re-visits the website next time, his computer browser will automatically display this membership card, and the user can access the website without having to perform heavy checks. However, this also brings security risks to our privacy. For example, if someone else does not need to know my username and password, they can access my usual website through my computer, or the e-mail addresses I save in cookies are collected by other websites and sold to other websites (that is why we receive enthusiastic spam from an unknown website ), and so on. If your browser does not work properly, you may delete all Temporary Internet Files on your computer. However, after this operation, you will lose all Cookies. When you access a website again, the website will regard you as a new user and assign you a new user ID and a new Cookie. The result will lead to a deviation between the ratio of New and Old users in website statistics, and it is difficult for you to restore the previously saved Parameter options. However, if you use a public computer to access the Internet (for example, in an Internet cafe or in an office), we recommend that you clear cookies. After all, security first is hidden by default.

"Local Settings ". The "Temporary Internet Files" folder in the IE download file buffer is located in the Local Settings folder under each user directory. Local Settings this folder stores application data, history, and temporary files. When we run the program installed in the system, the program will automatically extract the data of the application in this folder. Temporary Internet Files. When you use IE to browse a webpage, the system automatically places the browsed webpage content in this directory, when you open the same web page again, the system will extract it from this Directory, which can speed up browsing. Each user's folder has such a large cache folder. Although the IE File Buffer can speed up the web page, it is also large in size. This wastes a lot of our hard disk space, so we can put all users' IE cache files in the same folder, which can save disk space and make it easy for multiple users to access the Internet. During modification, right-click the IE icon, select the "Internet properties" command, and then open the "Internet properties" dialog box. Find the "Temporary Internet Files" option in the "General" tab, click the "Settings" button to bring up the Settings dialog box, and click the "Move folder" button in the folder, select a folder under the specified user. Other users follow this method. Hidden by default.

"My Documents" stores these folders. You can delete all of them. They are hidden by default.

The "NetHood" folder stores shortcuts for shared folders stored in network neighbors when each user uses network neighbors. With these shortcuts, we can quickly open the desired shared folders. If you save the shortcut for each user to access the network neighbor to a specified folder, we can quickly access the shared folder of the computer in the same network segment in any user environment, it facilitates file sharing. Open the Registry Editor when you modify the key, find the "Nethood" subkey under the Shell Folders branch, and then open the "Edit string" dialog box for this subkey, enter the location of the specified folder in the "value data" Field of the dialog box. Other users can modify the folder according to this method. In the future, the shortcuts of shared folders accessed by users through network neighbors will be saved in this folder.

"PrintHood" prints the shared directory, which is hidden by default.

"Recent" recently opened documents can be deleted and hidden by default.

"SendTo" is sent to the folder. The content in this folder corresponds to the content in the send item in the right-click menu, where you can add or modify the items in the send menu. You can right-click the send menu to quickly process specified files, such as sending them to "my documents", quickly compressing specified files, and sending emails, this makes our daily operations easy. In fact, we can also copy the shortcut of the frequently used folder (such as a USB flash drive) to SendTo. After right-clicking and selecting the "send" command, we can see that there is an extra USB drive letter under the menu. In this way, we can quickly send the specified file to the USB flash drive through the "send" menu.

"Templates" is a template file with common programs stored in the folder, such as winword.doc?powerpnt.ppt=excel.xls. The template is a style that includes the section structure, Font Style, page layout, and other elements. It determines the basic structure and style of the document. After learning about the template function, we can set a personalized template as needed in this folder. When creating a template, right-click in the blank area of the folder and choose "New> Microsoft Word documentation" to create a new wordfile and rename it winword2.doc. Double-click the file and then set the font, Font, and page size, and save the file. Right-click "Resource Manager" and select "New> Microsoft Word documentation". Then, double-click the created document. You will find that the document has been used in winword8.doc.

The NTUSER. DAT, ntuser. ini, and ntuser. dat. LOG files are part of the Registry. They act on a single user. The "Resource Manager", taskbar, network printer, user settings, attachment settings (including calculators, clocks, notebooks, and super terminals) in the control panel are stored.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.