I have been using XP for a long time. I have tried and sorted out many interesting Registry Modification Techniques. Here I will write them for your reference. When talking about Registry Modification, there is always a saying: Be careful. Backup is
Process is
ProgramAn execution activity on a computer. When you run a program, you start a process. Obviously, the program is dead (static), and the process is active (dynamic ). Processes can be divided into system processes and user processes.
I personally think this is a useful article about server security suggestions, which is ignored in many places at ordinary times. Here I will list them for ease of viewing. After configuring the server, I will check the betting points, very
In the Win XP SP2 system, if a file is hidden and you want to recover it, You can directly enter it in the address bar when you click "Do not hide file" in "Tools, for example, if the file name is game, enter D: \ game in the address bar at D: \.
In fact, there is no difference between the wap site and the web site. We only need to add the content type (MIME) in iis/apache. Let's take a look at the example and the tutorial below.
Here, we use the most typical IIS server as an example:To
Group Policy is an important function in windows. In particular, we can use group policies on servers to perform many restrictive operations, such as ip addresses, ports, and some security settings.
1. Press and hold the win key + R key to open the
This article uses phpmyadmin as an example to show you how to configure a website under iis step by step, and then add php running permissions to the website. If you need this, refer to it.
I. Create a directory on the d: disk named phpmyadmin, and
For more information about how to use winscp to upload files through the SSH port for next batch processing in windows, see this article.
1. Download winscpYou can find it on the Internet. I installed winscp under c :.2. Save the command to be
This article to introduce to you about HTTP 401.5 unauthorized: ISAPI-CGI application Authorization failure solution, have encountered such problems can refer to the reference.
Error message:
You are not authorized to view this page. The URL you
When a friend sees the Service Unavailable prompt, the general response is that the website is invalid, but the real problem is whether the Service Unavailable is prompted in English. Of course not. Let's share the solution to this problem.
Today,
USB boot disks are usually used, because you cannot reinstall the system at ordinary times. If the boot disc is not started, making a USB boot disk is a very feasible method, I remember this situation when I last reinstalled the system. After
There is a significant difference between Virtual PC and Virtual Server 2005 R2 with SP1 in terms of operation management. After the VMAdditions plug-in is installed on Virtual PC, you can directly drag and drop the host file to the guest system, or
What is the role of the hibernate file hiberfil. sys? How can I clear it? Is the system disk space insufficient recently? How can I simply delete the system Sleep file?
Recently, I was reminded by Windows that "the system disk space is insufficient"
Preparations:
Download the right version of http://www.mongodb.org/downloads to official
Here we use mongodb windows 32bit
Decompress mongodb to the d: \ mongodb \ directory, and create a new directory db (for storing data) and a directory logs
When using a local computer, there is a beautiful background. Due to work needs, you need to remotely connect to the local
On the local computer, but after connecting to the remote computer, you cannot see the beautiful background you set. What is
Yesterday, a buddy asked me how to make a Winpe. In fact, it is better to modify the Winpe by yourself. You can also learn it! Hey hey, when it comes to modification, the companion will take win7pe as an example. In fact, it is mainly the boot. wim,
I. use DHCP to allocate Ip addresses and Ip/TCP Properties
Create a new scope and next step
Configuration scope name
Ip Range
Keep default
Keep default
Next step
Next step complete
Right-click to activate
Group Policy
1. Prohibit R & D department from using USB to log on to other computers
2. Sales Department removable disk encryption
3. ntfs encryption of Finance Department
4. Force password policy. The manager uses the granular password policy,
It is very important to learn how to view the Windows route table information. So I studied the specific steps for viewing the Windows route table information. I will share with you here, hoping to help you. Time can be amazing in this way. People
If you have installed Windows 8, the following describes how to configure and install a vro for win8, which is similar to Windows 7. First, connect the cables according to the instructions. First open the network on the computer, and then click --
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service