How to delete certain files in win7 requires the trustedinstaller permission

How to delete some files in win7 requires the trustedinstaller permission to install a dual system, and then to delete a system for some reasons, the system is on the drive C, the system to be deleted is on the drive D, however, when you delete the

Window Management Right-click menu

1. Run the following command: regsvr32/u igfxpph. dll OK. Note that/u has a space on each side, or copy the space directly to run it. 2. Clear the remaining items in the right-click menu as follows: (1) on the System desktop, click Start> Run. (2)

Windows 32 64-bit Dll Storage

Windows 32 64-bit system Dll storage sometimes people doubt whether the underlying structure of a system can ensure that the system is safe and efficient when used. The 64-bit version of Windows is perfect in this regard. Windows XP and Windows

How to remove watermarks in win8

Win8 watermark removal method win8 watermark is too annoying, it seems that there is no good activation method yet. however, there are several ways to remove the watermark. you will find that explorer.exe can remove the watermark if it is restarted,

How to enable a Computer Policy

A friend asked me how to solve the problem because the computer policy cannot be opened.Solution:1. Right-click my computer and then click Properties ".2. on the "advanced" tab, click "environment variables ".3. Under "system variables",

Command to reload the configuration file without restarting the server

In the configuration of FreeBSD server, sometimes a letter in the configuration file is required to restart the server, which is a little troublesome. Recently, some commands have been found to make the new configuration file take effect without

The spread of porn has no harm! Skills in anti-pornography on the Internet

With the rapid popularization of Internet cafes and home computers, Internet access has become a public activity. To protect the physical and mental health of minors, Anti-Pornography has become a top priority for parents and teachers. This article

Dual-database servers implement distributed data operations and hardware failover

Functions provided:1. When a large amount of data is added for modification and summary query, the two types of data operations are performed independently on the corresponding server,2. When a server crashes, the program uses the connection pool of

Quickly clear all congested garbage from computer systems

With ease and smoothness, have you noticed that the disk space on your computer system is decreasing every day? Is it slower than a day like the Old Monkey King? That's right! During Windows Installation and use, a considerable number of junk files

Remove Windows from add-on Errors

When you install and uninstall some applications in the system, or frequently perform anti-virus operations on the system, the system may be unable to load the relevant content during future startup. When we encounter such an embarrassing phenomenon,

How to delete hidden components of Windows XP

For the sake of system security, Windows XP may hide many components. Even if you do not use these application components, You cannot delete them from the system. The following method allows you to delete the hidden components of Windows XP. Step 1:

In-depth Summary of Vista cracking methods

The following lists the methods used to crack vista, which are arranged in the chronological order.1. replacement methodPrinciple: replacing some license files of vista to activate vista with the serial number of the test version is the earliest

What is the hot ground of Trojan horse exemption in Vista sidebar?

The Sidebar is a new feature that Vista is proud of. It allows many small programs to be displayed on the desktop in real time, which is very convenient for use. Once released, it will be favored by users. However, I recently noticed a problem when

Rundll32.exe process details

Rundll32.exe, as its name implies, "executes a 32-bit DLL file ". The internal implementation is the internal implementation of the dllfile. In this process, only rundll32.exe is available, and no DLL backdoor process is available. In this way,

Allows Windows and Linux to coexist perfectly on one computer

The simplest way for NT to coexist with Linux is to install lilo in the boot area of the linux primary partition when installing lilo in LInux. Then, after the boot disk of win98 is restarted, run fdisk to set the linux primary partition to active.

A few tricks to get into the Remote Desktop

We often use the Remote Desktop feature in the LAN to facilitate information exchange with other workstations. Many people will think that this feature is almost useless, but in actual use, we sometimes encounter various special Remote Desktop

Vista experienced XP problems: QQ can access but cannot open the webpage

The method is similar. Of course, vista is more advanced. Friends who often walk on the Internet should have encountered the problem of "QQ can but cannot open the webpage. This problem is extremely common in Windows XP systems and generally occurs

Multi-point attack: how to clear stubborn system files

When we delete or rename some files, the system will prompt that they cannot be operated. The following describes how to clear stubborn files in several ways. First: cleverly uninstall For example, if this stubborn program is on the E disk, open

Reasons why Vista is getting slower and slower after installation

What if your Windows Vista operating system becomes slower and slower after it is installed? The following is an analysis for you. 1. The Registry has become more bloated. The Registry's impact on system speed is unclear. Microsoft designs a

Use 360 security guard to teach you how to handle installation in five minutes

Patching is a good helper for pirated users. Source: CCID Author: kaduo For most users, it takes a long time to install a system: first install the system, then install the driver, anti-virus software, and applications ...... If you can complete

Total Pages: 1788 1 .... 1782 1783 1784 1785 1786 .... 1788 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.