Guidelines on key technologies and practices for data recovery

Source: Internet
Author: User
Tags password protection strong password
Guide to key technologies and practices for data recovery
Basic Information
Author: Weng shengxin Wu Bohan Xie bangtie [Translator's introduction]
Press: Electronic Industry Press
ISBN: 9787121167010
Mounting time:
Published on: February 1, June 2012
Start: 16
Page number: 488
Version: 1-1
Category: Computer> database storage and management more about data recovery
Introduction
Computer books
The guide to key technologies and practices for data recovery explains the most common data recovery methods from three aspects: data recovery principles, data recovery methods, and data recovery practices, we strive to use the simplest method and the most effective steps to explain the actual operations of data recovery to the maximum extent, so that readers can grasp the data recovery methods after reading this book. The book is divided into 12 chapters, covering the principles of data recovery, basic hard disk knowledge, hard disk rescue technology, Windows file system, Windows document repair, data security and data backup, floppy disk, CD, digital devices, data Recovery instances, common data recovery software and typical cases, unguided recovery by the operating system, and data recovery test sites. By reading this book, you can master the computer security skills to maximize data security and restore lost data.
The guidelines on key technologies and practices of data recovery are applicable to computer enthusiasts and computer assembly and maintenance personnel. They can also be used as teaching materials for professional teachers and students and social training courses in colleges and universities.
Directory
Guide to key technologies and practices for data recovery
Chapter 1 hard disk structure and storage Principle 1
1.1 recognize hard drive 1
1.1.1 hard disk interface 1
1.1.2 disassemble Hard Disk 2
1.1.3 disk logical structure 6
1.2 Hard Disk Data Organization 7
1.2.1 primary Boot Sector 8
1.2.2 Operating System Boot Sector 8
1.2.3 File Allocation Table 9
1.2.4 directory Area 9
1.2.5 data Zone 9
1.2.6 hard disk partition 10
1.2.7 File Format 11
1.2.8 data storage Principle 11
1.2.9 hard disk formatting 12
1.3 principles of data recovery 13
1.3.1 Do not act rashly 13
1.3.2 think twice. 13
1.3.3 patience + carefulness = 70% success rate 14
1.3.4 daily use habits 14
1.3.5 reasonably store recovered data 16
1.3.6 correct data recovery service 16
1.4 hard drive Indicators 17
1.4.1 hard disk storage capacity 17
1.4.2 Hard Drive Speed 17
1.4.3 hard disk cache 18
1.4.4 transmission rate 18
Chapter 19 Operating System Security 19
2.1 computer threats 19
2.1.1 computer virus 19
2.1.2 popular Trojan 19
2.1.3 rogue software 20
2.1.4 anti-virus Measure 22
2.2 clear malicious programs 23
2.2.1 clear computer viruses 23
2.2.2 killing popular Trojans 25
2.2.3 clear malicious plug-in 26
2.2.4 system first aid 27
2.2.5 system repair 29
2.2.6 System Health Check 30
2.3 block malicious programs 31
2.3.1 system vulnerability fixing 31
2.3.2 Trojan firewall 33
2.3.3 three-dimensional defense 36
2.4 system maintenance 36
2.4.1 clear system garbage 36
2.4.2 boot acceleration 37
2.4.3 C drive Migration 38
2.5 software manager 39
2.5.1 software upgrade 41
2.5.2 Software Uninstall 41
Chapter 4 data security and data backup 43
3.1 Windows File Protection Mechanism 43
3.1.1 Working Principle of Windows File Protection 43
3.1.2 System File Check 43
3.2 prohibit access and view 44
3.2.1 hide drive 44
3.2.2 prohibit access to drive 46
3.2.3 registry lock and unlock 48
3.2.4 forbidden access to "control panel" 50
3.2.5 prohibit access to command prompt 51
3.3 Set User Permissions 53
3.3.1 Windows Default User Group 53
3.3.2 Windows user management 54
3.3.3 create group users 55
3.3.4 set folder access permission 57
3.4 set instance permissions for multiple accounts 58
3.4.1 target 58 for multi-account permission setting
3.4.2 set Private "My Documents" 60
3.4.3 set folder permissions 62
3.5 using EFs for document encryption 64
3.5.1 EFS encrypted file or folder 65
3.5.2 identify security identifier 66
3.5.3 Export Certificate 66
3.5.4 Import Certificate 68
3.6 file (folder) encryption software 69
3.6.1 folder encryption 70
3.6.2 file encryption 72
3.7 data deletion Security 72
3.7.1 data deletion security overview 73
3.7.2 can overwritten data be restored? 74
3.7.3 use wipeinfo to erase file 74
3.7.4 use clean disk security to permanently delete files 75
3.7.5 use winhex to permanently delete a file or fill in Area 77
3.7.6 use absolute security to erase data files 78
3.7.7 low-level formatting thoroughly destroys data 79
3.7.8 write 0 81
3.8 Use System Restore 82
3.8.1 start the system to restore 82
3.8.2 Start System Restoration 82
3.8.3 cancel Restoration Operation 84
3.8.4 create a system restore point 85
3.9 data file backup and restoration 86
3.9.1 backup data file 87
3.9.2 restore data file 90
3.10 restore a system using a system image 93
3.10.1 preparations before image 94
3.10.2 create a system image backup computer 96
3.10.3 use a system image to restore the computer 98
Chapter 2 Windows File System 4th
4.1 Windows File System Overview 102
4.1.1 fat12 file system 102
4.1.2 fat16 and FAT32 file system 102
4.1.3 NTFS file system 103
4.1.4 primary partition, extended partition, logical partition, disk volume 103
4.1.5 FAT file systems 104
4.1.6 NTFS file system 105
4.1.7 next-generation Windows File System winfs 105
4.2 NTFS partition encryption system EFS 107
4.2.1 what are EFS 107
4.2.2 conditions for using EFS 107
4.2.3 principles and descriptions of EFS 107
4.2.4 EFS and NTFS coexist 108
4.2.5 EFS attribute 108
4.2.6 NTFS Index 108
4.3 NTFS Disk Quota 109
4.3.1 enable the disk quota of 110
4.3.2 Disk Quota Project Manager 111
4.4 Dynamic Disk management 113
4.5 sparse file 115
4.6 Unicode supports 115
4.7 raid introduction 116
4.7.1 RAID 0 0 116
4.7.2 RAID 1 118
4.7.3 RAID 0 + 1 119
4.7.4 RAID 3 120
4.7.5 RAID 5 121
4.8 conversion between fat and NTFS: 122
4.8.1 convert the FAT32 File System to NTFS 122
4.8.2 use convert.exe to convert the partition format 130
4.8.3 convert NTFS disk format to FAT32 Format 132
Chapter 2 Windows document repair 5th
5.1 Windows Common Document types 134
5.1.1 audio file extension 135
5.1.2 compression file extension 135
5.1.3 the image file extension is 135
5.1.4 The animation file extension 136
5.1.5 RM, rmvb Format 136
5.2 File Association 136
5.2.1 create a file association 136
5.2.2 unable to "open a file" 137
5.2.3 use drag and drop to open file 140
5.2.4 use "send" to open file 140
5.2.5 use right-click menu 143
5.2.6 restore all Windows default file associations 143
5.3 Office document repair 144
5.3.1 Use the automatic recovery function to repair document 145
5.3.2 manually open recovery file repair Word Document 146
5.3.3 repair of damaged documents by document format 147
5.3.4 format resetting method repair damaged document 148
5.3.5 "open and fix" document 148
5.3.6 restore text from any file to repair Word documents 149
5.3.7 convert format repair Excel document 150
5.3.8 Excel Repair Tool 151
5.3.9 access document repair 152
5.3.10 office fix 153
5.3.11 easyrecovery fix Office document 153
5.4 video file repair 156
5.4.1 common media formats 156
5.4.2 clear annoying "Dig wow" 157
5.4.3 create a universal player 158
5.4.4 fixed ASF and WMV Format 159
5.4.5 AVI file repair 162
5.4.6 mpeg file repair 163
5.4.7 video files cannot be dragged to play 164
5.4.8 the image and sound are not synchronized 166
5.4.9 Video Converter 167
5.5 audio file repair 168
5.5.1 noncook fixed MP3 168
5.5.2 mp3trim 169 with music Truncation
5.5.3 fixed RM Format 170
5.5.4 during playback, you cannot drag the RM file to restore 171
5.7 fix compressed files 172
5.7.1 use WinRAR's built-in repair function 172
5.7.2 use easyrecovery to restore compressed files 174
5.7.3 use advanced RAR repair to fix RAR document 175
5.8 image file repair 176
5.9 common software repair 177
5.9.1 reinstall application 177
5.9.2 software inventory 178
5.9.3 178 software upgrade
5.9.4 uninstall software 179
5.10 limitations of file repair 180
Chapter 2 Password Security Policy 6th
6.1 Windows logon password policy 181
6.1.1 create a password to reset disk 181
6.1.2 reset disk 182 with Password
6.1.3 use PE system to crack Windows login password 183
6.1.4 use the DOS command to clear the Windows Password 185
6.2 QQ password policy 187
6.2.1 enable security component 187
6.2.2 Good password input habits: 187
6.2.3 change QQ password 188
6.2.4 password protection 189
6.2.5 password protection 190 through password protection mobile phone
6.2.6 mobile phone verification QQ logon 191
6.2.7 retrieve password 192
6.2.8 PROTECT message records 193
6.2.9 no trace of chat records 194
6.2.10 lock QQ 194
6.2.11 cleverly avoiding the threat of Trojan viruses to chat information 196
6.2.12 quickly retrieve all friends who lost QQ 198
6.3 restore Word document password 198
6.3.1 set password protection Word document 199
6.3.2 use WORD Password Recovery to restore WORD Password 200
6.4 restore the Excel document password 201
6.4.1 set worksheet protection 201
6.4.2 set workbook protection 203
6.4.3 protect part of cells 204
6.4.4 cell protection formula 205
6.4.5 set the access password 206
6.4.6 use Excel password recovery to restore the Excel password 206
6.4.7 crack the Office file Password 207
6.5 restore RAR document password 210
6.5.1 encrypted compressed file 210
6.5.2 restore compressed file Password 211
6.6 restore PDF document password 213
6.6.1 Create PDF document 213
6.6.2 encrypted PDF 214
6.6.3 crack PDF encryption document 215
6.7 password setting policy 216
6.7.1 set a strong password of 217
6.7.2 prevent others' guesses: 217
6.7.3 "password prompt" 218
Chapter 2 mobile storage devices 7th
7.1 CD format and category 220
7.1.1 green disk 221
7.1.2 Gold Disk 221
7.1.3 Blue drive 221
7.1.4 other disks 222
7.2 main formats of DVD-r/RW: 222
7.2.1 DVD-r/RW 222
7.2.2 DVD + R/RW 222
7.2.3 DVD + R/-r DL 223
7.2.4 DVD-ram 223
7.3 how to use and protect a CD 223
7.3.1 drive and burner 223
7.3.2 how to use the CD 224
7.3.3 CD protection method 224
7.4 data burning method 225
7.4.1 The system's built-in burning function 225
7.4.2 Nero wizard 227
7.4.3 Nero burning Rom mode 231
7.4.4 multiple-mode burning 235
7.4.5 create an iso cd image file 235
7.4.6 copy the disc 237
7.4.7 System Boot Disk Burning 238
7.5 CD Data Recovery Method 238
7.5.1 cdcheck239
7.5.2 bad copy 240
7.6 digital companion and mobile storage devices 241
7.6.1 digital partner Introduction 242
7.6.2 about mobile hard drive 243
7.6.3 digital memory cards and their classification 243
7.7 digital device data recovery method 245
7.7.1 digital photo recovery 245
7.7.2 photorescue expert 246
7.7.3 PC Inspector file recovery 248
7.7.4 active @ undelete 251
7.8 bitlocker drive encryption 253
7.8.1 bitlocker conditions 253
7.8.2 encrypted Mobile Disk 256
7.8.3 decrypt the Mobile Disk 258
7.8.4 restore the key 259
7.9 USB flash drive utility 261
7.9.1 USB flash drive encryption tool 261
7.9.2 USB flash drive Repair Tool 262
7.9.3 USB flash drive data recovery software 264
7.9.4 USB flash disk Boot Tool 265
Chapter 4 data recovery instance 8th
8.1 fault recovery console 268
8.1.1 start the fault recovery console 268
8.1.2 System File NTFS. sys lost 269
8.1.3 you cannot log on to Windows 270 after deleting the Sam file by mistake
8.1.4 Windows XP cannot start 270 on both systems
8.2 restoring the environment in Windows 7 270
8.2.1 create a system repair disc 273
8.2.2 fix startup manager 273
8.2.3 fixed System Boot Sector 274
8.2.4 memory error diagnosis 275
8.3 MBR backup and repair 276
8.3.1 The fdisk/MBR command fixes the hard disk's Master Boot Record 276
8.3.2 Use fixmbr to repair the Master Boot Record 277
8.3.3 kv3000 backup partition table 278
8.3.4 kv3000 recover hard drive Master Boot Record 279
8.3.5 disk genius backup and recovery partitioned table 279
8.4 handling of system damage that cannot be started 281
8.4.1 Hal. dll file loss 281
8.4.2 error 281 when "ntldr is missing press any key to restart" is displayed during system Logon
8.4.3 Automatic Restart 281 due to System File Corruption
8.4.4 solution to the "Hard Disk bomb" virus 283
8.4.5 restart 284 After startup
8.4.6 restart 285 after an error occurs during startup
8.5 disk partition management 285
8.5.1 create primary partition 286
8.5.2 create an extended partition 286
8.5.3 merge partitions 287
8.5.4 adjust the partition capacity by 288
8.5.5 partition conversion 290
8.5.6 fast partition formatting 291
8.6 kv3000 restore instance 292
8.6.1 basic hard disk information 292
8.6.2 kv3000 repair extended partition loss 295
8.6.3 kv3000 primary partition parameter error 297
8.6.4 kv3000 manual Master Boot Record reconstruction 298
8.6.5 kv3000 restore fat 301
8.7 pc-3000 introduction 303
Chapter 1 common data recovery software and typical cases 9th
9.1 recover4all 304
9.2 easyrecovery 306
9.2.1 drive test 308
9.2.2 test smart 310
9.2.3 partition test 312
9.2.4 retrieve accidentally deleted data 313
9.2.5 restore formatted data 314
9.2.6 advanced data recovery 315
9.2.7 repair of damaged files 317
9.3 finalrecovery 317
9.3.1 standard recovery 318
9.3.2 advanced recovery 319
9.4 finaldata 320
9.4.1 finaldata features 320
9.4.2 recover lost data 321
9.5 Sanming hard drive doctor 323
9.6 windows PE 325
9.6.1 maintain system 326
9.6.2 fix Windows User Password 328
9.6.3 rebuilding a partitioned table 329
9.7 software comparison and testing 331
9.7.1 normal scan test 331
9.7.2 deep scan 331
9.7.3 historical file scan 331
9.7.4 features and summary 332
Chapter 1 data recovery test site 10th
10.1 Virtual Machine overview 333
10.1.1 awareness of virtualization technology 333
10.1.2 what should I use virtual machine 334?
10.1.3 understanding of Virtual Machine Software 335
10.2 install the operating system on the Virtual Machine 336
10.2.1 Image File Creation 336
10.2.2 create VM 340
10.2.3 set VM 342
10.2.4 simulate BIOS settings 343
10.2.5 format a simulated partition 346
10.2.6 install virtual OS 347
10.2.7 install VM tool 351
10.3 VM Internet access 353
10.3.1 install vnic 353
10.3.2 set network connection 355
10.3.3 VM access 356
10.4 Virtual Machine file sharing 356
10.4.1 set sharing 356
10.4.2 drag to fast transfer file 360
10.4.3 use a mobile device to transfer files 363
10.5 Virtual Machine backup 364
10.5.1 snapshot and restoration 364
10.5.2 suspension and recovery 367
10.5.3 save real-risk result 369
10.6 build a real virtual network 371
10.6.1 Virtual Network basics 371
10.6.2 virtual network card 372
10.6.3 relationship between subnets and NICs 375
10.6.4 build "physical" Network 376
Chapter 2 hard drive Saving Technology 11th
11.1 hard drive Saving Technology basics 385
11.1.1 initialize the hard disk 385
11.1.2 principle of hard drive saving 386
11.1.3 hard drive failure performance 387
11.1.4 hard drive detection software 388
11.2 Hard Drive boot repair 389
11.2.1 no new hard disk 389 detected on the motherboard
11.2.2 after the hard disk is changed, the system prompts "non-system disk or disk error. Replace and strike any key when ready" 389.
11.2.3 prompt "invalid Partition Table" 390
11.2.4 Transmit System File 390
11.2.5 set as active partition 390
11.2.6 logical lock handling 391
11.2.7 use fdisk to restore Master Boot Record 392
11.2.8 use fixmbr to restore Master Boot records 393
11.2.9 Master Boot Record backed up with kv3000 394
11.3 Hard Disk Partition Table damage recovery 394
11.3.1 backup and recovery partitioned table 394
11.3.2 use diskman to automatically create a partitioned table 396
11.3.3 Jinshan hard disk repair device 398
11.4 0 Magnetic Track repair 400
11.4.1 use PM to repair damaged 0 track 400
11.4.2 use diskedit to repair damaged 0 track 401
11.4.3 use diskman to repair damaged 0 track 404
11.5 Bad Sectors on hard disks: 404
11.5.1 unable to read or write files to hard disk 404
11.5.2 hard disk error reporting in Event Viewer 405
11.5.3 hard disk scanning is automatically performed for each computer startup 405
11.5.4 the computer crashes or the file is damaged 406
11.5.5 disk I/O error Replace the disk, and then press any key 406
11.5.6 non-system disk or disk error. Replace and strike any key when ready 407
11.5.7 disk boot failure Insert disk and press ENTER 407
11.6 hard drive Bad Sectors handling 407
11.6.1 principles for classification and repair of hard drive Bad Sectors 408
11.6.2 use tools to repair logical bad track 408
11.6.3 use tools to shield Physical Bad Sectors 410
11.6.4 hard disk low-level formatting 411
11.6.5 bad disk partition 413
11.6.6 bad track repair tool 415
11.6.7 hard disk regenerators 418
11.7 hard drive troubleshooting 420
11.7.1 the system cannot recognize the hard disk 420
11.7.2 Fault Caused by hard drive interface pin disconnection 420
11.7.3 prompt C: drive failure run Setup Utility 420
11.7.4 the hard disk (s) diagnosis fail 421 error is displayed.
11.7.5 error message: Invalid drive specification 421
11.7.6 a date error in drive C 421 is prompted
11.7.7 error loading operating system 421
11.7.8 error message: Invalid Partition Table 421
11.7.9 error message: HDD controller failure 421
11.7.10 error message: track 0 bad, disk unusable 422
11.7.11 repeated disk reading: 422
11.7.12 bad track 422 on the hard drive
11.7.13 the self-check on the computer is normal, but the hard disk 422 cannot be started
11.7.14 hard disk partition cannot be formatted 423
11.7.15 hard drive cannot be started, and there is no error message 423
11.7.16 "a hard disk problem detected in Windows" 423
Chapter 2 computer Common Fault Handling 12th
12.1 computer Cleaning tools 425
12.1.1 portable hairdryer 425
12.1.2 high-pressure air sprinkler tank 426
12.1.3 soft brush 426
12.1.4 special vacuum cleaner 426
12.1.5 eraser 427
12.1.6 rag 427
12.1.7 cleaning kit 427
12.2 common memory Fault Handling 428
12.2.1 memory considerations 428
12.2.2 unable to install system 429 due to memory problems
12.2.3 memory slot damage caused by crashes 429
12.2.4 when memory test fail is started, the system crashes at 429.
12.2.5 blue screen 429 due to memory Quality Problems
12.2.6 blue screen Fault Caused by electromagnetic interference memory 429
12.2.7 when the memory usage increases, the system resources are reduced by 429.
12.2.8 random display 430
12.2.9 memory delay affects system stability by 430
12.2.10 no alert is triggered when the host is started, or 430 is disabled
12.2.11 memory read/write failure 430
12.2.12 memory short-circuit causes host power-on failure 431
12.3 CPU common troubleshooting 431
12.3.1 frequent crashes due to high CPU temperature 431
12.3.2 system exception caused by poor contact with the CPU slot 431
12.3.3 failure to pass self-check or often crash 431 upon startup
12.3.4 CPU pin oxidation caused by poor contact with the motherboard causes a crash of 432
12.3.5 CPU temperature increases by 432 due to excessive thermal Silica Gel
12.3.6 CPU temperature increases by 432 too fast
13.3.7 black screen 433 caused by overclock CPU
13.3.8 blue screen fault caused by over-frequency CPU 433
13.3.9 after the CPU is too frequently, no response is made to 433 upon startup.
13.3.10 insufficient CPU power, resulting in 433 crashes
12.4 troubleshooting of main board 434
12.4.1 The system clock is often slowed down by 434
12.4.2 hard disk 434 cannot be found at each startup
12.4.3 The system cannot start 434 due to loose of the CPU slot
12.4.4 the motherboard cannot be started due to excessive dust 434
12.4.5 disconnection 435 due to insufficient CMOS power supply
12.4.6 BIOS settings cannot be saved 435
After the 12.4.7 motherboard is powered on, neither an alarm nor a 435 display is reported.
12.4.8 the main board is not started and no alarm is reported. 435
12.4.9 the system is abnormal due to the aging of the motherboard capacitor 436
12.4.10 abnormal display due to motherboard failure 436
12.4.11 sudden power loss of computer 436
12.5 video card troubleshooting 437
12.5.1 black screen 437 appears when the computer is started
12.5.2 screen Jitter Caused by oxidation of video card 437
12.5.3 black screen 438 caused by video card Installation Problems
12.5.4 computer exception caused by unfixed graphics card 438
12.5.5 poor contact with the power supply interface of the video card causes black screen 438
12.5.6 black screen display 439 after hardware maintenance
12.5.7 invalid operation due to video card fan problems 439
12.5.8 poor heat dissipation caused by computer exceptions 439
12.5.9 some abnormal vertical lines in Windows 440
12.5.10 incomplete screen and text display in Windows 441
After the machine is started on 12.5.11, the screen shake 441
12.5.12 there is a vertical line 441 on the display screen
441 cannot be found for the driver of the video card 12.5.13
12.5.14 improper Driver selection 442
12.5.15 video card driver exception causes system black screen 442
12.5.16 reboot failure caused by the video card driver 442
12.5.17 garbled 442 on the screen when the computer was just started
12.5.18 boot: no display 443
12.6 display troubleshooting 443
12.6.1 An error occurred while accessing the operating system 443 after switching to an LCD display
12.6.2 LCD display icon blur 444
12.6.3 LCD display blur 444
12.6.4 failed to adjust refresh frequency fault 445
12.6.5 Problems of Water ripple and screen display on LCD 445
12.6.6 poor display performance: 445
12.7 sound card troubleshooting 448
12.7.1 recording fails when the microphone and sound card are connected normally.
12.7.2 after the NIC or other devices are installed, the sound card does not sound 449
12.7.3 when playing a game, there is always no 449 sound
12.7.4 audio failure caused by volume control error 449
12.7.5 Audio Distortion 450
12.7.6 the computer is playing audio files, but cannot hear 451 of the sound
12.7.7 upgrade the sound card driver to solve the Sound Card problem 451
12.7.8 MP3 video playback audio inconsistency 451
12.7.9 sound card silent 451
12.7.10 the sound card emits an excessively high noise of 451.
12.7.11 sound card drive obsolete, resulting in system failure 452
12.8 HDMI audio troubleshooting 452
12.8.1 HDMI audio 453 connection
12.8.2 display without image 453
12.8.3 poor quality of HDMI cables, affecting video and audio performance by 454
12.8.4 unable to connect the video card to the motherboard audio 455
12.8.5 audio driver fault 456
12.8.6 video card driver failure causes "only images have no sound" 456
12.8.7 HDMI audio cannot output 457
12.8.8 audio and video exceptions caused by low-performance video cards: 458
12.8.9 sound lagging due to improper audio cable connection 458
12.8.10 video playback software is improperly set, and audio in HD videos is abnormal: 458
12.9 BIOS setting instance 459
12.9.1 set the startup sequence 459
12.9.2 default/optimized value for loading BIOS 460
12.9.3 set the administrator password 460
12.9.4 Set User Password 460
12.9.5 how to clear BIOS information 460
12.10 driver fault 462
12.10.1 importance of drivers 462
12.10.2 understanding the Device Manager 462
12.10.3 install the driver 463
12.10.4 common driver troubleshooting 465
Appendix a bios logging code 471
A.1 Award bios 471
A.2 ami bios 471
A.3 Phoenix BIOS 471
Appendix B ASCII 473
B .1 ASCII value: Control Character 473
B .2 common ASCII code 474 on the keyboard
B .3 common hexadecimal conversion 475

Source of this book: China Interactive publishing network

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.