How to make the records of running software disappear under the Win7 system

Source: Internet
Author: User

Clean the trace in the running box. In order to prevent others from stealing their own "run" privacy, you are best to use the following methods to the operation of the box in a timely manner to clean up;

1 First click on Ghost Win7 System "start-run", in the Run dialog box enter "Regedit" Return to open Registry Editor;

2) then expand the positioning to the Hkey_current_usersoftwaremicrosoftwindowscurrentversionexplorerrunmru branch in turn;

3 in the corresponding RunMRU branch of the right side of the window, select each record in sequence, and perform the "modify" "Delete" instructions, delete all of them, and eventually restart the computer, you will find that the use of traces of the operation has been cleared.

Second, every time the use of network ants download the program or information, the system will be in the program's download list to actively retain the corresponding information download address, illegal users can be based on these addresses your important documents or procedures quietly "for themselves", and then bring you security lost. In order to prevent this phenomenon of attack, you must firmly establish security awareness, download the important information, must be in time to network ants in the address traces sorted out, the specific methods are as follows:

1 The first to open the network ant download list interface, select the more important list box address records, and then click "Modify" menu items in the "delete" instructions, so that the corresponding address records were eradicated;

2 Similarly, select other important address records in turn, and perform the deletion instructions, and remove them from the list box.

Third, sorting the trace in the search box, each time using the Find dialog box to find important information, several recent policy keywords will be the "Find" dialog box active recall, the next time the other people use the "Find" dialog box, you can easily know how many times you have recently searched for privacy, in order to ensure the safety of privacy, to the "find" The privacy records in the box are sorted out.

Iv. finishing traces in office, using any of the programs in office to modify or visit the document, will be in the corresponding program under the "File" menu item, leaving the recent traces of the visit, click the Trace, others will be able to steal your privacy information. For this reason, it is necessary for you to eradicate these traces of cleanliness in time.

Five, organize the traces in the Clipboard. If you perform a cut or copy operation, the system will "free" a small amount of space to temporarily "retain" the content that was cut or copied at that time, in some applications, the Clipboard can even dozens of of the cut, imitation content actively retained, in order to prevent privacy information leakage, You must remember to delete the important contents of the Clipboard in a timely manner.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.