Win 7 System Boot Acceleration Complete Introduction

Source: Internet
Author: User
Tags ini valid

Now speed up the win 7 system boot speed has always been a hot topic, there are many ways to spread the network, the triple tutorial for everyone to organize some speed up the win 7 system boot speed method, in the next few days, will be released in stages, this topic includes preface and boot principle, optimization settings, font cleaning, Service optimization, registry cleanup, self-starter management, special effects and performance seven parts, please continue to pay attention.

To put it simply, when you go from the login window to the full access to the Windows desktop (your mouse pointer is not rotated in a circle), the main job of the system is to load the Windows global configuration from the registry and the "personality" configuration of the logged-in user, from these profiles, the step-by-step work in sequence, For example, load your system theme, load your desktop wallpaper, play your designated or default login sound, and load the boot up program with various software.

In this article, we will directly come up with the most hands-on verification and management of the software boot load project, the first thing to do here is not only to dramatically improve your system's boot speed, but also to find out some of the system's pitfalls, such as Trojans and viruses that are here as a permanent entry into your memory. Of course, this article is very difficult to write, it is difficult to write the place, different users of different hardware, with different computer brands or DIY installed, this leads to the management of these boot-loading software when the resolution is difficult, because in these loading projects, many are related to the driver of the hardware.

OK, let's talk about how to clean up these boot-loaded software.

1, how the software allows Windows system to be included in the boot loading list, the formal software, you can easily find where it is, and those cunning or malicious software huidong hide Tibet, so that people are not very familiar with the computer is difficult to find. Here's a list of possible hiding places for programs that start with Windows:

1 Classic startup--"Startup" folder

Click on "Start Menu"-"All Programs", see this "Startup" folder? This is the classic Windows startup location, right click on the Start menu and choose Open to open it, where programs and shortcuts will run automatically when the system starts. Drag the shortcuts to the things you want to load (shortcuts to text files, and so on) to the Start menu button, and then to all the programs above the Startup folder, OK, the next boot will be included in this project.

2 Famous startup--Registry Startup entry

The registry is the place where the startup program hides most, with the following main items:

A, the Run key

The run key is the virus's most favored self starter, the key position is [Hkey_current_usersoftwaremicrosoftwindowscurrentversionrun] and [Hkey_local_ Machinesoftwaremicrosoftwindowscurrentversionrun], all programs under it are automatically executed in sequence every time that you start the login.

There is also an unnoticed run key, located in the registry [Hkey_current_usersoftwaremicrosoftwindowscurrentversionpoliciesexplorerrun] and [Hkey_local_ Machinesoftwaremicrosoftwindowscurrentversionpoliciesexplorerrun], also want to look carefully.

B, RunOnce key

RunOnce is located in [Hkey_current_usersoftwaremicrosoftwindowscurrentversionrunonce] and [Hkey_local_ Machinesoftwaremicrosoftwindowscurrentversionrunonce] Key, unlike run, a program under RunOnce will only be executed automatically once.

C, RunServicesOnce key

The RunServicesOnce key is located in [Hkey_current_usersoftwaremicrosoftwindowscurrentversionrunservicesonce] and [HKEY_LOCAL_ Machinesoftwaremicrosoftwindowscurrentversionrunservicesonce], where the program will automatically start the execution once the system is loaded

D, RunServices key

RunServices programs that start after RunServicesOnce are located in the registry [Hkey_current_usersoftwaremicrosoftwindowscurrentversionrunservices] and [ Hkey_local_machinesoftwaremicrosoftwindowscurrentversionrunservices] key.

E, RunOnceEx key

This key is a system-specific startup registry key for Windows Xp/2003 and beyond Vista, and is located in [Hkey_current_usersoftwaremicrosoftwindowscurrentversionrunonceex] and [Hkey_local_machinesoftwaremicrosoftwindowscurrentversionrunonceex].

F, Load key

The program for the load key value under [Hkey_current_usersoftwaremicrosoftwindowsntcurrentversionwindows] can also be started from.

G, Winlogon key

The key is located in the registry [Hkey_current_usersoftwaremicrosoftwindows Ntcurrentversionwinlogon] and [Hkey_local_ Machinesoftwaremicrosoftwindows Ntcurrentversionwinlogon], note that the following notify, Userinit, Shell key values will also have a self-initiated program, and its key values can be separated by commas, This enables you to start multiple programs when you log in.

H, other registry locations

There are other key values, and there are often programs that run automatically here, such as:

[Hkey_current_usersoftwaremicrosoftwindowscurrentversionpoliciessystemshell] [Hkey_local_machinesoftwaremicrosoftwindowscurrentversionshellserviceobjectdelayload] [Hkey_current_usersoftwarepoliciesmicrosoftwindowssystemscripts] [Hkey_local_machinesoftwarepoliciesmicrosoftwindowssystemscripts]

Tip: The difference between the [HKEY_LOCAL_MACHINE] and [HKEY_CURRENT_USER] keys of the registry: the former is valid for all users and the latter is only valid for the current user.

Want to study friends, recommend that you look at the "cow!" pulled out virus Trojan Rogue software hiding in the registry 7 dens.

3 Old Start-Automatic batch processing file

From the DOS era friends must know Autoexec.bat (located in the System packing directory) This automatic batch processing file, it will automatically run when the computer starts, many early virus on the fancy it, use deltree, format and other dangerous commands to destroy hard disk data. such as "C-Disk Killer" is to use a "deltree/y c:*.*" command, so that the computer to start automatically delete all Files C disk, harmful to countless.

Tip: In Windows 98, Autoexec.bat also has a buddy--winstart.bat file, Winstart.bat is located in the Windows folder and is automatically executed at startup. In Windows me/2000/xp/ In Vista and Windows7, these two batch files are not executed by default.

4 Common Startup-system configuration file

Some autorun programs are also loaded in Windows configuration files (including Win.ini, System.ini, and Wininit.ini files).

A, Win.ini Documents

Using Notepad to open the Win.ini file, you can add the executable program directly after the "run=" and "load=" statements in the [Windows] section, as long as the program name and path are written after "=".

Small prompts the program after "load=" to minimize running since startup, and "Run=" after the program will run normally.

B, System.ini documents

Using Notepad, open the System.ini file and locate the "shell=" statement under the [Boot] section, which defaults to "Shell=Explorer.exe" and runs Windows shell Explorer.exe at startup. Virus can not be unkind, such as "Demon Kiss" virus simply change it to "Shell=c:yzw.exe", if you forcibly delete "Demon Kiss" virus program yzw.exe,windows will prompt an error, let you reload windows, scary not? There are also polite little viruses, such as turning the sentence into " Shell=Explorer.exe Other program name ", see the following other program name must be a virus program as shown in Figure 2.

C, Wininit.ini

Wininit.ini files are system profiles that are easily overlooked by many computer users, because the file is automatically deleted when Windows starts, which means that the commands in the file are automatically executed once. This profile is generated primarily by the software installer, and is operated on files that cannot be deleted, updated, and renamed after the Windows graphical interface is started. If the virus is written in dangerous order, then the consequences of the "C-Disk Killer" is no different.

Tip: If you do not know where they are stored, press F3 to open the Search dialog box to search, click "Start → run", enter sysedit carriage return, open the "System Configuration Editor", where you can easily view and modify the above files.

5 Intelligent Start-open/Shutdown/Login/Logoff script

In Windows 2000/xp/vista/windows7, click start → run (enter gpedit.msc in the WINDOWS7 system in the Start menu), enter gpedit.msc return to open the Group Policy Editor, In the left pane, expand Local Computer policy → user Configuration → admin templates → system → login Then, in the right pane, double-click "Run these programs when users log on," and click the Show button to display a program that was started under "projects running at logon."

6) timed Start--mission plan

By default, the Scheduled Tasks program starts with Windows and runs in the background. If you add a program to the Scheduled Tasks folder, and you set the scheduled task to system startup or logon, you can also implement the program from startup. Programs loaded through scheduled tasks typically have their icons in the taskbar system Tray area. You can also view the items in the Control Panel by double-clicking the Scheduled Tasks icon.

3, in the end those boot start items can be banned?

This problem is the most complex place, said above, different computers installed different drivers may need to boot load, different computers installed a different application software, it is difficult to distinguish!

However, there are some basic principles, or we are accustomed to:

1 sound card, graphics-related driver boot loader, generally can be directly prohibited.

2 QQ, MSN and other IM software and anti-virus software, system firewall will generally allow the boot automatically load (of course, to see the personal habit).

3 Add-ins that involve Input method classes can be banned, such as Microsoft Pinyin.

4 The add-in for the player class can be blocked.

5) Google toolbar and other IE browser plug-in class boot Start Project can be directly prohibited off

6 Windows7 System Desktop Gadgets, this depends on a person's preference

7 Unknown procedures, please search inside the search engine, and then decided that the basic search is to see whether the malicious program, basic one can be clear.

Said so much, you should also be tired, if you still do not understand the place, please tell us Oh!

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.