During Windows Startup, many programs are automatically started. In XP/2 K, there are many ways to enable Windows Automatic startup. The following describes the two most important folders and eight registration keys.
1. Dedicated Startup folder of the current user
This is a common location for Automatic startup of many applications. All shortcuts for Windows Automatic startup in this folder. The User Startup Folder is generally started in the "Documents and Settings" <username> "start" menu program, where "<username>" is the name of the currently logged-on user account.
2. Effective startup folders for all users
This is the second important position to find an Automatic startup program. No matter what identity the user uses to log on to the system, the shortcut to put the folder is always automatically started-this is the difference between it and the user-specific Startup Folder. This folder is generally started in the "documents" and settingsall users "start" menu program.
Iii. Load registration key
There is not much information about the registration key. In fact, it can also automatically start the program. Location: HKEY_CURRENT_USER software Microsoft WindowsNT CurrentVersion windows load.
Iv. userinit registration key
Location: HKEY_LOCAL_MACHINE software Microsoft WindowsNT CurrentVersion Winlogon USERINIT. This also enables the system to automatically initialize the program at startup. Quotation marks (excluding quotation marks ).
V. assumerrun registration key
Unlike load and userinit, The assumerrun key is available in both HKEY_CURRENT_USER and HKEY_LOCAL_MACHINE. The specific location is HKEY_CURRENT_USER software Microsoft Windows CurrentVersion policies policerrun, and HKEY_LOCAL_MACHINE software Microsoft Windows CurrentVersion policies policerrun.
6. runservicesonce registration key
The runservicesonce registration key is used to start the service program. the start time is before the user logs on and prior to other programs started by the registration key. Runservicesonce registration key location: HKEY_CURRENT_USER software Microsoft Windows CurrentVersion runservicesonce, and HKEY_LOCAL_MACHINE software Microsoft Windows CurrentVersion runservicesonce.
VII. runservices registration key
The program specified by the runservices registration key runs immediately after the program specified by runservicesonce, but both run before the user logs on. Runservices: HKEY_CURRENT_USER software Microsoft Windows CurrentVersion runservices, and HKEY_LOCAL_MACHINE software Microsoft Windows CurrentVersion runservices.
8. runoncesetup registration key
Runoncesetup specifies the program that the user runs after logon. Its location is HKEY_CURRENT_USER software Microsoft Windows CurrentVersion runoncesetup and HKEY_LOCAL_MACHINE software Microsoft Windows CurrentVersion runoncesetup.
9. runonce registration key
The installer usually runs the program automatically with the runonce key, which is located in HKEY_LOCAL_MACHINE software Microsoft Windows CurrentVersion runonce and HKEY_CURRENT_USER software Microsoft Windows CurrentVersion runonce. The runonce key under HKEY_LOCAL_MACHINE runs the program immediately after the user logs on. The runtime is before the program specified by other run keys. The runonce key under HKEY_CURRENT_USER runs after the operating system processes other run keys and the content of the "Start" folder. If it is XP, you also need to Check HKEY_LOCAL_MACHINE software Microsoft Windows CurrentVersion runonceex.
10. Run registration key
Run is the most common registration key for automatically running programs. Its location is HKEY_CURRENT_USER software Microsoft Windows CurrentVersion run and HKEY_LOCAL_MACHINE software Microsoft Windows CurrentVersion run. The run key under HKEY_CURRENT_USER runs immediately following the run key under HKEY_LOCAL_MACHINE, but both are before processing the "Start" folder.
Personal Opinion:
For online users, to make the system safe and easy to use, first, install a firewall. xp2 comes with the vulnerability, A friend who is lucky enough to install it will understand how dangerous the network is.) Second, it is necessary to maintain the system frequently, including the upgrade of various systems and soft killer systems, back up the best system!