Let's recognize the Win7 startup knowledge Encyclopedia

Source: Internet
Author: User
Tags comparison ini

The most common startup item we have in everyday Windows is its own startup folder, but few people check it out carefully. Because it is exposed, the program is loaded into this folder and automatically loads the program when the system is started, so it can be easily changed by external factors.

Below let small weave bring everybody together to understand the Win7 specific have what launch item!

One, the specific location is the Start menu, "Start" option

On the hard disk location is: C:documentsandsettingsadministrator "Start" menu program to start;

The location in the registry is: Hkey_current_usersoftwaremicrosoftwindowscurrentversionrun

Second, Msconfig

Msconfig is the System Configuration Utility in the Windows system, which is wide enough to include: System.ini, Win.ini, Startup items, and so on. In the same way, the inside is also a very favorite place to start the program!

1.system.ini

First, enter "Msconfig" in the "Run" dialog box to start the System Configuration Utility (same below), find the System.ini tag, inside the "shell= ..." can be used to load special programs. If your shell= behind is not the default Explorer.exe, or there is a program name behind, then you have to be careful, please carefully check the appropriate procedures are safe!

2.win.ini

If we want to load a program: Hack.exe, then it can be in win. INI is implemented using the following statement:

[Windows]

Load=hack.exe

Run=hacke.exe

What to do, you should know it!

This point, use the Rubik's Cube (click here to download) in the system settings-startup item settings, at a glance, and can easily remove and add startup items.

3. "Start" project

The boot tag in the System Configuration Utility is not the same thing as the "startup" folder we mentioned above, and this startup project in the System Configuration Utility is a collection of Windows system startup projects. Almost all startup projects can be found here-and, of course, programs that have been specially programmed can be not shown here in another way.

Open the Startup tab, and the Startup Project lists the startup program name, under command is the specific program attached command, and the final "location" is the program's location in the registry. You can be suspicious of the program for detailed path, command check, once found that the error, you can use the "disable" below to prohibit the program when the boot load.

Generally speaking, in addition to the system based on hardware and kernel part of the system software startup project, other start-up projects are appropriate to change, including: antivirus programs, specific firewall programs, playback software, memory management software. That is, the startup project contains a list of all of our visible programs, and you can use it to manage your startup program.

Third, the corresponding startup loading project in the registry

Registry Startup items are viruses and trojans most love! The stubborn nature of the virus Trojan is through the registry to achieve, so the usual time can download a registry monitor to monitor the registry changes, Rubik's Cube (click this download) A series of security features will also be included in subsequent releases to monitor malware modifications to the system, and so on. Especially when installing new software or running new programs, be sure not to be fooled by the beautiful appearance of the program. Be sure to see the essence of it is not a Trojan camouflage shell or a bundle of programs! If necessary, you can restore the registry according to the backup, so there is a lot of online registration, so there is no more details.

We can also use the manual method to check the corresponding location in the registry, although many of them are and above the location repeat, but for network security, be careful never too much!

Pay attention to the security, Clean system registry keys for comparison, if found inconsistent place, we must find out what it is! Do not believe in the outside of the "system", "Windows", "ProgramFiles" and other names, everyone knows "the truth". If after a detailed comparison, you can be sure that it is unclear procedures, do not hesitate to delete immediately!

Four, Wininit.ini

We know that Windows Installer often calls this program to implement the deletion after the installation program, so don't underestimate it, if you tamper with it, it can be said to be very covert, very perfect.

It is in the Windows directory of the system disk and opens it with Notepad (sometimes Wininit.hak files) to see the appropriate content. Obviously, we can add the corresponding statements inside to achieve the purpose of modifying the system program or deleting the program. If it is a file-related trojan, you can delete it by Winint.ini to the original file after infection, so as to really hide yourself!

Five, the fight under DOS

Finally, we say that the boot project load under DOS, Config.sys, Autoexec.bat, *.bat and other files can be used in a specific programming way to achieve the purpose of loading programs. So do not think that DOS is an outdated thing, good DOS programming can often achieve very simple, very practical functions.

Through the above detailed explanation, I believe that we have a basic understanding of the launch of the WINDOWS7 system, the operation should also be handy!

Related Article

E-Commerce Solutions

Leverage the same tools powering the Alibaba Ecosystem

Learn more >

Apsara Conference 2019

The Rise of Data Intelligence, September 25th - 27th, Hangzhou, China

Learn more >

Alibaba Cloud Free Trial

Learn and experience the power of Alibaba Cloud with a free trial worth $300-1200 USD

Learn more >

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.