We know that using the Windows operating system in your open file, enter a variety of passwords or chat with friends with QQ, may cause personal secrets leaks, will leave traces on the machine. For security reasons, if you're on a public computer,
I. Possible leaks and the location of their existence
There are two places in windows that may leak our secrets: one exists in the folder, one is in the register.
1. Folder: In the "Start" menu in the "document" will display the files we have
The latest investigation reports show that the Anti-Spyware tool is insufficient and "spyware" is still operating on the Internet. But you don't have to be discouraged. If you learn and follow the following ten tricks, spyware will be
The latest investigation reports show that the Anti-Spyware tool is insufficient and "spyware" is still operating on the Internet. But you don't have to be discouraged. If you learn and follow the following ten tricks, spyware will be
1. Temporary files generated during software installation
Many software are installed, first to extract their own installation files to a temporary directory (typically Windows folder under the Temp directory), such as WinZip Tools, and then install.
Purge history
The clear method is to go to the Control Panel →internet Options dialog box, click its delete files and purge history option buttons on the General page, or delete temporary Internet files directly under Windows The contents of the
1. Minimize the number of HTTP requestsIn the end user response time, 80% is used to download the content, this part of the time includes the download page image, style sheet, script, flash and so on. Reducing the number of HTTP requests by
Automatically import registry, with detection:
On Error Resume Next
Dim Msg,fso,shell
Set FSO = WScript.CreateObject ("Scripting.FileSystemObject")
Set WshShell = WScript. CreateObject ("Wscript.Shell")
Set shell = WScript.CreateObject
English Original: http://developer.yahoo.com/performance/rules.htmlChinese Original: http://www.ha97.com/2710.html1. Minimize the number of HTTP requests 80% of the end-user response time is used to download the content. This part of the time
Yahoo Team experience: Site page performance optimization of the 34 golden rule1. Minimize the number of HTTP requests (make fewer HTTP requests)80% of the end-user response time is used to download the content. This part of the time includes images
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.