\ currentversion\ explorer\ Namespace the keywords and the string values of the right window (used for recovery), then delete the unwanted branches, close the Registry Editor, restart WIN98, and then look at the desktop, it has disappeared.
9. Set two IP addresses for a single machine
In general, you can configure only one IP address for one network adapter, but you can configure multiple IP addresses for a network card by modifying the system
In Windows 10, how does one hide the registry?
Using Hook HHIVE: GetCellRoutine () to hide the registry is a public method for a long time. Although some Anti Rootkit tools cannot be bypassed, this method is very stable to use, windows XP-
Many scenarios are using GetVersion, GetVersionEx these two APIs to query the operating system version number to determine the current operating system is the Windows family which, before the Win10, this method is the line of the pass, But after the appearance of Win10, this method is not allowed to judge Win10.Here is a way to read the registry, which has been verified to be feasible:[CPP]View PlainCopy
The installation and configuration of zend optimizer are very simple. I didn't plan to write the zend optimizer configuration tutorial. However, to ensure the integrity of the PHP environment configuration tutorial on Windows, I installed zend optimizer3.3.3 with my heart. I accidentally found that zend optimizer3.3.3 currently does not support PHP5.3, therefore,
When our computer is used for a long time, there will be a lot of registration information, has no use, but do not know how to delete, occupy the computer memory, these redundant information not only affect the registry itself access efficiency, but also lead to a reduction in the overall performance of the system. Therefore, it is necessary for Windows users to periodically clean up the
select the software you want to analyze).
Here I choose flashget (Internet Express) as an example, detailing how to optimize the master to make software green run version.
Depending on the size and complexity of the software being analyzed, intelligent analysis may take several 10 seconds to a few minutes of time, when the analysis is complete, you can see in the associated File box in the bottom of the software is normal to run all the files,
When the computer is used for a long time, there will be a slow computer boot speed. Today, small knitting to share with you how to optimize the speed of Windows optimization, hope to be helpful to everyone.
Master of Windows Optimization
Master of Windows optimization the boot speed optimization mainly by reducing the time to guide information and
Protecting the Windows registry in the way mentioned in this article prevents attackers from attacking it remotely.
problem
The registry is the core of the Windows operating system. However, by default, the registry of all window
The Windows XP operating system is known for its stable performance and beautiful appearance. But by modifying the registry, we can make the system more consistent with our personality. In the following article, we will provide some application techniques to make your system more personalized.
1, modify the Windows XP login background pattern
In the face of a lon
Q: I used Windows optimizer master to set up the system, accidentally hiding the partition D disk where Windows Optimizer is located. Now D is out of sight, and Windows Optimization Master can't start. Please help to solve the problem.
A: Don't worry, the
Many users are using Windows Tuning Master to set up a system that has inadvertently hidden the partition D disk of the Windows optimizer master, causing the last D disk to disappear. So, what about partitioning being hidden by Windows Optimizer master?
. There are 4 files that need to be downloaded in Windows 2000/xp: Www.speedguide.net/files/sguide www.speedguide.net/files/sguide www.speedguide.net/ Files/winxp http://www.speedguide.net/files/sg_webtweak_2k.zip★ Execute modify files, optimize system settings to extract the downloaded 4 compressed files into the appropriate folder, Executes the registry files for 4. reg in 4 files, imports the file inform
enhanced. When the new interface is slow to run on a lower performance system, you can choose to revert to the old version of the interface.
3, improved the software intelligent uninstall.
4, increase the Disk Optimization Settings Wizard.
5, Add Desktop Optimization Settings Wizard.
6. Registry cleanup Adds an analysis of invalid items in the personalized Start menu after XP.
7, improved the garbage file cleanup.
8, improved the system personality s
When we install the software, often install some patches, or the computer system often dozen patches, unknowingly patch will occupy a lot of space. Now, however, it's easy, and the Windows Optimizer master has provided the user with a patch cleanup feature to help users clean up the residual information in these residue files or in the registry.
How to cl
used in this description:
Apache 2.2.4 -- www.apache.comPHP 5.2.0 -- www.php.netMySQL 5.0.27 -- www.mysql.comZend optimizer 3.2.0 -- www.zend.comPhpMyAdmin 2.9.2 -- www.phpmyadmin.netNote: Windows XP should not install IIS, PHP, Apache, MySQL, and Zend before performing the following operations.
Installation tips for Apache 2.2.4
1. Open my computer, enter drive D, and create a new folder M named l
Zend Optimizer is a PHP acceleration software, the correct installation of Zend Optimizer, PHP execution efficiency than not installed Zend optimizer faster 40%-100%, Web page open faster, while reducing the consumption of server resources.
First, install PHP
Please refer to the Windows 2003 iis+php5.4.3 insta
1, set the life timeHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters
DefaultTTL REG_DWORD 0-0xff (0-255 decimal, default value 128)
Description: Specifies the default time to Live (TTL) value set in outgoing IP packets. The TTL determines the maximum time that an IP packet survives on the network before reaching its destination. It actually qualifies the number of routers that the IP packet is allowed to pass before it is discarded. This value is sometimes used to detect rem
}"; components:help; Flags:isreadme[Registry]; Key values in the registry for this segment of the handlerROOT:HKLM; Subkey:software\microsoft\windows\currentversion\run; valuetype:string; Valuename:test; Valuedata:{app}\ipmsg.exe; Flags: uninsdeletevalue
Next to the end, after the installation is complete, you can check the registry:Indeed added to the
HKEY_CURRENT_USER \ NETWORK \ RECENT to delete all the subitems under the primary key RECENT.
15. expanded the "recycle bin" right-click Function
The recycle bin is a system-level desktop icon in Windows 98. Its right-click menu is not powerful enough. For example, the right-click menu of the recycle bin does not have the delete or rename function, which may cause inconvenience to the actual application, therefore, we can modify the
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.