is stored on the hard drive 0-channel 0 cylinder 1 sector, the maximum length is one sector. When booting from the hard disk, the BIOS bootloader mounts the master boot record to 0:7c00h and then gives control to the master boot record. In general, the boot zone virus exists on a floppy disk. Because there is no partition on the floppy disk, you can consider it as the master boot record for the
. In this way, Windows XP requires one more password at startup, which plays a role of two encryption times. When the operating system is started, a window will prompt "this computer requires a password to start before we enter the user name and password. Please enter the start password ". This is the first password protection we have just created.
Ii. Password floppy disk
1. if we select "Save Startup Password on a
Article title: Linux tutorial-Disk Management. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
In the Liunx system, how to effectively use and manage buckets is a very important technology. This chapter describes how to view the usage of the storage space in the system, how to dump files, and how to format a floppy
In our network life, computer viruses pose a major threat to us. We are very concerned about how to prevent viruses. In fact, the prevention of computer viruses is not simply a few words. Some of us have very many mistakes in our understanding, next let's take a look at some of the mistakes we encounter when dealing with computer viruses.1. the DIR operation on the infected floppy disk will cause the hard disk to be infected (wrong)
If the computer me
In our network life, computer viruses pose a major threat to us. We are very concerned about how to prevent viruses. In fact, the prevention of computer viruses is not simply a few words. Some of us have very many mistakes in our understanding, next, let's take a look at the top 15 mistakes we made in the face of computer viruses.
The DIR operation on the infected floppy disk may cause the hard disk to be infected.
If the computer memory does not cont
Article Title: detailed steps for creating a boot disk in a LINUX environment. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
Linux boot floppy disks include boot disks and boot/root disks. The so-called boot disks can only be used to start Linux systems installed on hard disks, the boot/root disk itself is a mini
used, it is recommended that the disk partition be in NTFS format.3. Select Start password, enter a password, and then click OK. This will enable Windows XP to encrypt the password twice when it starts. When the operating system is started, a window will prompt "this computer requires a password to start before we enter the user name and password. Please enter the start password ". This is the first password protection we have just created.Ii. Password flop
Four methods for creating a Linux boot disk
Linux boot floppy disks include boot disks and boot/root disks. The so-called boot disks can only be used to start Linux systems installed on hard disks, the boot/root disk itself is a mini Linux system. Linux boot floppy disk is an essential tool for system restoration. Therefore, it is very useful to master how to create a boot
is a very sensitive topic to teach you how to write viruses. Will this cause virus flooding? Is it necessary to learn how to write viruses? This involves a problem. What is the cause of virus flooding? Is there too many people who write viruses, or are there too few people who know how to deal with viruses? When scammers are everywhere, should we let everyone know how to prevent them from being cheated or conceal them? How can we help people understand whether it is illegal?
I. How to Write Mas
into registers each time.
When an interrupt occurs, the Interrupt Processing code reads the two interrupt status registers (ISR ). It regards ISR in 0x20 as a low 8-bit 16-bit interrupt register and ISR in 0xa0 as its high 8-bit. In this way, ISR 1st-bit interruption in 0xa0 will be considered as system interruption 9. Because the second digit on pic1 is used for hierarchical connection to pic2, it cannot be used for other purposes. Any interruption on pic2 will cause the second digit of pic1
a Linux system, directories and devices are treated as files, and there are four file types: ⑴ ordinary files, which are commonly referred to as files, are represented by a symbol "-" before the beginning of a long list of directories. The ⑵ directory file, which we usually call the directory, is represented by the first letter "D" in the long list way. ⑶ character device files, such as displays, printers, terminals, and so on, are represented by a letter "C" before the beginning of a long list
Http://blog.sina.com.cn/s/blog_5028978101008wk2.html
Direct Disk Service (Service--int 13H)00h-Disk System Reset01h-Read Disk System state02h-Read Sector03h-Writing Sector04h-Test Sector05h-formatted track06h-format Bad Track07h-formatted Drive08h-Read Drive parameters09h-initialization of hard drive parameters0ah-Read Long sector0bh-Write Long sector0ch-Search0dh-HDD System Reset0eh-Read Sector buffer0fh-Write Sector buffer10h-Read Drive status11h-Calibration Drive12h-Controller RAM Diagnostic
).
If the image file is too large, we can also split the image file (Figure 5) so that the image file can be saved separately. We can also set some specific parameters of ghost, such as shielding some errors occurred, so as to better image production.
Finally, choose to complete the data backup is back to the DOS interface or restart the computer, according to their actual needs to choose. After you have chosen, put the floppy
Use U disk to do the startup disk when U disk root directory has a menu.lst file, this file is stored in the U disk boot process menu options. Here's an explanation of what it means:
Title Boot from DOS Toolkit----Define Menu Name
Map--floppies=2----(defines the number of emulated disks)
Map--hook----(make emulation effective)
#kernel (CD)/boot/grub/memdisk. GZ c=60 h=8 s=36 Floppy----Specify the Memdisk kernel (now very rarely used, so the comman
partition Table window, at which point you continue to press ENTER, and a disk MS SAM database File window appears. Press ENTER again, the user in the system will be all displayed, in "Your choince:[]" enter "0"And then press ENTER (if your system administrator user name is not administrator, but other name, just enter the serial number before its name). After the "Would" to Rest this user ' s password? (Y,n)[N]: [] "After the prompt, you enter" Y "and press ENTER, wait a moment will appear" Pa
steps:
Before you begin the recovery process, make sure that you have the following items at hand:
The ASR floppy disk that you previously created.
The backup media that you created earlier.
The original operating system installation CD.
If you have a mass storage controller and you know that the manufacturer has provided it with a separate driver file (which differs from the driver file that is provided
It is best not to set a password for a laptop easily, because the boot password for a laptop is not stored in a CMOS circuit as a PC and can be cleared by discharge, currently, newer laptops Store Passwords in several logic circuits on the motherboard, and individuals cannot crack the passwords.
However, you can try the following method to remove the boot password of an older laptop.
One is to change the hardware configuration of the machine. For example, if you take down the hard disk and resta
Article Title: describes the 14th step of the BabyLinux production process. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
Directory
1. What is BabyLinux?
2. Why is such a linux
3. Who should read this document?
4. Knowledge
V. Introduction to linux boot process
6. Compile the kernel
7. Compile busybox
8. Create a root file system
9. Create a ramdisk Imag
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.