Some of the devices used in the computer are not used at all, or encountered some devices are not normal use, we can view these devices, through the Device Manager can be processor, hard drive, storage controller, monitor, keyboard, mouse devices, image equipment and network adapters and so on equipment operation and management, So how do you disable the specified device? Let's take a look at the specific setup tutorial.
1, open the computer, directl
Talking about the current chat tools, the most popular estimate is the QQ program, almost everyone has more than one QQ account, whether it is on the computer or mobile phone, we are always logged in the state, so Tencent QQ in China is still very extensive. In fact, in our Win7 computer has a homing chat tool, called NetMeeting, it is estimated that few people know, because the use of it is very few, but this program is still very powerful, the most basic text chat, video voice chat, picture se
In the company, schools, internet cafes and other places often need to disable the USB interface, there are many reasons, such as preventing staff to take away confidential information, to prevent students to take games to school room to play. It's also possible that your PC doesn't want anyone to plug in a U disk or a mobile device. But your mouse and keyboard disk is also USB interface what to do now? Then how to
First, why there is the need to disable MAC system Spotlight:Some users because of the use of relatively old Apple computer in the running of a newer system; It is also possible that you are a speed control, can not stand the occasional card Dayton operation, must be all causes of the cause of the elimination of all the reasons for the lag, or you may not use the spotlight function, from the green point of view, not wasted system resources , so close
Original address: http://www.if-not-true-then-false.com/2010/yum-remove-repo-repository-yum-disable-repo-repository/
Quick Guide, howto Remove and disable YUM repo (repository). Yum command itself does not contain any way to remove the repository. YUM repo The files is located in/etc/yum.repos.d/directory.
I Use the Kde.repo file with following content as example on this guide:
[KDE]
Name=kde
m
The mysqldump has a default parameter of Disable-keys, which is turned on by default.This is not a problem in most cases, but in exceptional cases it can have disastrous consequences.Recalled a few years ago, a well-known mobile phone forum Day inexplicable magic Brush does not open the Web page, finally no way to stop maintenance small half-day situation, according to the Grapevine, is the problem caused.The whole process is guessed as follows:1, the
First, some of the major dll files in the system can achieve high security as long as they are modified.First, download an EXESCOPE6.3-6.4 tool if you have not changed the DLL.1. It is the prototype of the library file dll that Browselc. dll ie needs to call.
2. Shdoclc. dll System window and Setting Dialog Box ...... for example, deleting a file rename.
3. Shell32.dll and above are similar
4.erer.exe start the program called by the menu... the system will load it into the system.
5. Download Th
Linux Disable ping and enable ping# echo 1 >/proc/sys/net/ipv4/icmp_echo_ignore_allif you want to recover, just:# echo 0 >/proc/sys/net/ipv4/icmp_echo_ignore_allcan, very convenient, do not go to special use IPChains or iptables. or you can do it in the following ways.enter the Linux system as root and edit the file Icmp_echo_ignore_allVi/proc/sys/net/ipv4/icmp_echo_ignore_alldisable ping after changing its value to 1To
How to disable ping response under Linux:Echo 1 >/proc/sys/net/ipv4/icmp_echo_ignore_allIf you want to disable ping response as soon as you boot, add the above statement to/etc/rc.d/rc.local.If you want to resume using the ping command, you can enter:echo 0〉/proc/sys/net/ipv4/icmp_echo_igore_all command.Dolly MixEnter the Linux system as root and edit the file Icmp_echo_ignore_allVi/proc/sys/net/ipv4/icmp_e
How to disable ping response under Linux:Echo 1 >/proc/sys/net/ipv4/icmp_echo_ignore_allIf you want to disable ping response as soon as you boot, add the above statement to/etc/rc.d/rc.local.If you want to resume using the ping command, you can enter:echo 0〉/proc/sys/net/ipv4/icmp_echo_igore_all command.Dolly MixEnter the Linux system as root and edit the file Icmp_echo_ignore_allVi/proc/sys/net/ipv4/icmp_e
1. Volume Shadow Copy Service
Volume Shadow Copy is the management and execution for backup and other purposes of the shadow copy, usually need to use less, you can disable it, just to open the Win7 flagship version of the computer's running window, Enter Service.msc and click Return, jump out of the service window, find the Volume Shadow copy option and double-click, in the pop-up window, our startup type is set to Disabled or manual.
2. F
First, open the IE browser on the Win7 system, then click the "Tools" item in the menu bar, then select "Manage Add-ins". In the open Admin add-in interface, click Toolbars and extensions in the left pane, and then disable all of the plugins inside.
Second, after all the plug-ins are disabled, then click the "Close" button, you can see that the plug-in has all been disabled successfully.
If you do not want to
1. Deactivate equipment
Right-click on my Computer--> management, and then select Device Manager--> Universal Serial Bus controller--> has two USB root hub disable these two items inside: Conventional--> device method--> Deactivate
2. Disable in BIOS type
Enter the BIOS settings, select the "Integrated peripherals" option, expand the "Usb1.1controller" and "usb2.0contr01ler" option to set the propertie
Although sometimes we set the default browser, but the use of some software and Windows features will still open IE browser, to completely eliminate this situation can only disable IE browser. The following system of the small series for you to introduce the WIN7 system how to disable IE browser!
1. First, open the Control Panel, click "Program";
2. Then select "Turn on or turn off Windows features
How to disable IE browser SSL3.0 remove computer network security vulnerabilities
Google has discovered a widespread SSL3.0 security vulnerability that could lead to data being hacked by hackers, hijacking data transmitted between users and Web sites, and stealing sensitive information such as user names and passwords. Because of the serious security vulnerabilities in the SSL3.0 protocol, we need to disable
The lock screen is a new function of the win8/win8.1 system, and after powering up and leaving the computer screen for a long time, WIN8 will enter the lock screen interface. win8/win8.1 Lock Screen Interface provides weather, calendar and notification information and other things, for some users, may be more practical, but also some pursuit of minimalist users, may not like the win8/win8.1 lock screen interface. So how does Win8.1 disable the lock sc
A tricky question:If the serial port is not plugged into the PC, the Petalinux system will not start. Then want to disable the serial port, disable off, re-petalinux-config--get-hw-description-p. /And then Petalinux-build, there was an error..../build/linux/u-boot/src/u-boot-plnx/common/board_f.c:in function ' init_baud_rate ': [All]/home//...BUILD/LINUX/U-BOOT/SRC/U-BOOT-PLNX/COMMON/BOARD_F.C:143:$: Error:
Today began the actual combat Java Virtual Machine four: "Disable System.GC ()".Total of 5 Series
"Heap overflow processing" in one of the actual Java virtual machines
Virtual machine working mode for Java Virtual machine
The three "G1 of the New generation GC" of Java Virtual machine
Live Java Virtual machine Four "Disable System.GC ()"
Real-time Java Virtual Machine Five "turn on
For a Microsoft Windows 2000 version of this article, see 245437 (http://support.microsoft.com/kb/245437/EN-US/).
Warning: Improper use of Registry Editor can cause serious problems that may require you to reinstall your operating system. Microsoft cannot guarantee that problems caused by improper use of the registry can be resolved. Using Registry Editor requires your own risk.
This pageOverview More information Use Registry control cache time subnet Priority Division
SummaryWindows contains th
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.