In Windows XP and Windows 2000 systems, there is a command that I am not generally familiar with, but powerful, that is: Syskey command.
This command can effectively enhance your system security. Perhaps you would say that it is not safe to enter your account and password when you enter Windows XP or Windows 2000? The famous Win 2000 input Method vulnerability you should have heard, if your computer is more than one person to use, other people can completely through the user to break the simple
information when you start linxu.
Get started with a simple application
We use a floppy disk to start a linux system with only one serial port and keyboard input to display the output x86 architecture. The specific application executed is to run minicom and dial through the serial port. Software required: minicom-xx.src.tar.gz and syslinux-xx.tar.gz, xx represents the version number, before starting, create a directory in the home directory
Recently in the "do-it-yourself-write operating system" Yu Yu, see the first page is covered, the book said to prepare a blank floppy disk, all 2010 years, where to find a floppy disk ah, since the contact with the computer I have not seen a floppy, it is estimated to go to the Science and Technology Museum to find it, hehe. In fact, in the second chapter-to buil
version of the software package.
So how do System Administrators know the latest software versions and security vulnerabilities? I recommend to RedHat support website (https://www.redhat.com/apps/support ). Generally, after receiving a notification about a security vulnerability, RedHat finds a solution in the shortest possible time, publish and connect the latest software package on the Technical Support Platform. Generally, you can find the latest software version on the Linux operating syste
program. such as: MKE2FS, Ifconfig and so on./usrThis directory is the largest disk space in the Linux system directory, the directory has many applications, his subdirectory is also more complex, and there are many differences between the system, I will introduce it in the next table./devAll the files under this directory are special files, and the Linux system regards all peripherals as a file, which means that your operation on the file representing the peripherals represents the operation o
In Windows XP and Windows 2000 systems, there is a command that I am not generally familiar with, but powerful, that is: Syskey command.
This command can effectively enhance your system security. Perhaps you would say that it is not safe to enter your account and password when you enter Windows XP or Windows 2000? The famous Win 2000 input Method vulnerability you should have heard, if your computer is more than one person to use, other people can completely through the user to break the simple
1. Boot virus capture
Virus extraction in the boot area is simple. First, use Format A:/S to copy the boot system file to A floppy disk, and then copy some system execution files from the hard disk to the floppy disk. The specific steps are as follows: Enter the MS-DOS mode, Format A system disk, Format A:/s, for different systems, copy the following files to the same disk:
For the gdi.exernl286.exe1_progma
This section describes what happens when a Linux system boots and shuts down, and should be done correctly. If the correct procedure is not followed, the file may be corrupted or missing.
Boot and Shutdown overview
The process of turning on a computer and causing its operating system to be loaded is called booting. The name comes from a computer pulling itself up to its bootstraps, but the act itself slightly Stic.During startup, the computer first loads a small piece of program called Bootstrap
Boot press F1 How to solve? How to remove Boot press F1?
Have you ever encountered, every boot will appear "press F1 to Continue,del to enter SETUP", and then the screen will not jump, must first press the shortcut key F1, the computer can start normally?
Boot press F1 fault analysis?
Under normal circumstances, require the boot press F1 to enter is the system's BIOS settings have no impact on the system startup of small problems, so first check the BIOS in the hardware information settings a
This section describes what happens when a Linux system boots and shuts down, and should be done correctly. If the correct procedure is not followed, the file may be corrupted or missing.
Boot and Shutdown overview
The process of turning on a computer and causing its operating system to be loaded is called booting. The name comes from a computer pulling itself up to its bootstraps, but the act itself slightly Stic.
During startup, the computer first loads a small piece of program called Bootst
the appropriate display jumper. If there is no display switch on the motherboard, then we should go to the system CMOS settings to change the display type.
Message: Press ESC to skip memory test
Usually the reason: press the ESC key to skip memory detection.
Solution: The machine in every cold start, to detect memory; At this point, if we do not want the system to detect memory, you can press the ESC key to skip this step.
Tip: Floppy disk (s) fail
C
in with different users and run different programs. Quickly build a user for your family and friends.
Second, in Linux, how to use floppy disk, CD and DOS and other non-Linux partitions
This is the most asked question for Linux beginners. As everyone has become accustomed to Microsoft's access methods, always want to use similar ideas to find floppy disk and CD-ROM. But in Linux, it follows the way UNIX
Here we will introduce a little-known command in WINXP and win2000: syskey
This command can effectively enhance your system security. Maybe you have to enter your account and password when entering XP or 2000. Isn't this safe? You should have heard of the famous Win2000 Input Method Vulnerability. If your computer is used by many people, others can access the system by breaking the simple password of others, attackers can exploit various vulnerabilities to obtain administrator privileges. Wi
In Windows XP and Windows 2000 systems, there is a command that I am not generally familiar with, but powerful, that is: Syskey command.
This command can effectively enhance your system security. Perhaps you would say that it is not safe to enter your account and password when you enter Windows XP or Windows 2000? The famous Win 2000 input Method vulnerability you should have heard, if your computer is more than one person to use, other people can completely through the user to break the simple
most complex notebook computer, including the most parts, which include floppy drive, hard drive, optical drive, CPU, memory, motherboard, battery, graphics and so on. Therefore, although the same type of component, the volume is much smaller than the desktop computer, in the framework of the design process is also more sophisticated, the function is no less than the current notebook computer with a full built-in way, hard disk, memory, batteries, gr
disk drive can read the traditional "disk, but its access speed is slightly inferior to zip.FDD interface: This is a built-in soft drive interface. It is a traditional soft drive interface that is directly connected to the soft drive interface on the computer motherboard at a low price.A floppy disk is a floppy disk. It is a device that reads 3.5 inch or 5.25 inch flop
$ {boot_once}]; then
Saved_entry =$ {chosen}
Save_env saved_entry
Fi
}
Function recordfail {
Set recordfail = 1
If [-n $ {have_grubenv}]; then if [-z $ {boot_once}]; then save_env recordfail; fi
}
Insmod ext2
Set root = '(hd0, 14 )'
Search -- no-floppy -- fs-uuid -- set 2d78a415-57ce-48d8-88f8-638bdef7e281
If loadfont/usr/share/grub/unicode. pf2; then
Set gfxmode = 640x480
Insmod gfxterm
Insmod vbe
If terminal_output gfxterm; then true; else
# For ba
Jiangmin anti-virus pure DoS (floppy disk + CD + U disk + NTFS General) v20050805 free version
(The virus database version 9.00.607 is updated to 2005.07.29)
Usage:
KV. rar decompress the package and run kV. bat. The graphic selection menu is displayed. Use the "Rotate" and "Rotate" keys on the keyboard to switch between them.
1. Menu 1 hard disk anti-virus: After the command is executed, the virus is directly eliminated in Windows DOS mode.
2. Menu 2
has accepted new users. You should enter the command "passwd newuser", the screen will prompt you to enter the password, enter again to confirm, a new user will be added successfully, it is really simple. Log on right away and try it.
Linux provides six virtual consoles, with ALT + F1 ~ F6 switchover (use CRTL + ALT + F1 ~ in X-window ~ F6 switch), each console can use different users to log on and run different programs. Create a user for your family and friends.
II. how to use non-Linux parti
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.